How To Initiate for the Prosecution
There are certain mandatory steps that should be followed in the hierarchical manner in order to file a complainant in the Indian Court for the prosecution procedures. Here are the general steps:
-
Gather all of the available evidences & save snapshots of evidence.
-
Immediately contact an expert cyber law for assistance in preparing the formal notice for prosecution.
-
Make a background history of facts chronologically as per the available facts
-
Write down names, physical and internet addresses of suspected accused.
-
File a draft of complaint and possible remedies.
-
Take the assistance of Cyber law expert and police to gather further necessary evidence such as tracking & tracing of the IP in case of e-mails and search, seizure or arrest as per the specific condition.
-
Cyber forensic study and report of the network, hardware, server or equipment related to the Cyber Crime.
STEPS TO FILE A COMPLAINT
-
Trial
-
Contents of charge
-
issue of process - summons, warrant
-
Examine the witnesses
-
examine the complainant on oath
-
Initiation of Criminal Proceedings-cognizance of offenses by magistrates
STEPS TO FILE A COMPLAINT
All the complaints related to cyber crime should be addressed to the in-charge of the cyber crime cell as soon as possible. In order to file a complaint proclaiming commission of a cyber crime, the following documents should be provided:
I. Following information/documents should be provided to file a complaint in the case of hacking:
-
Server Logs.
-
A copy of hacked web page in soft copy and hard copy format, if your website is hacked.
-
Soft copy of the original data and compromised data, if data is compromised on your computer, server or any other network equipment.
-
Complete details of access control mechanism i.e which persons/organization has accesses and what kinds of access on the compromised system.
-
List of suspects - if the victim has suspect on anyone.
-
Detailed answers to following questions :
What ? (What is compromised - data, website or anything else)
Who? (Who might have indulged in compromising the system)
when? (When the system was compromised - expected date & time)
Why? (Why the system might have been compromised)
Where? (Where is the impact of attack-identifying the target system from the network)
How many? (How many systems are compromised)
II. Following is the list of steps that should be taken in case of vulgar e-mail, e-mail abuse, extortion etc.
-
Extract the extended headers of the offending e-mail
-
Submit soft copy as well as hard copy of the offending e-mail.
-
Do not delete the offending e-mail from your e-mail box.
-
Save the copy of offending e-mail on your system's hard drive.
|