Professional Documents
Culture Documents
Electronic Search and Seizure Article
Electronic Search and Seizure Article
Akash Gupta
O.P. Jindal Global University, Sonipat, Haryana, India
Arushi Bajpai
O.P. Jindal Global University, Sonipat, Haryana, India
Abstract
In the past two decades, there has been an exponential rise in the use of technology for com-
mission of crimes. In certain scenarios, investigation of such crimes call for inspections of an
accused’s personal electronic devices. In India, there is no law regulating the field of search and
seizure of electronic devices in a criminal investigation. Only recently, Virendra Khanna v State
of Karnataka laid down certain guidelines in this regard. Furthermore, on multiple occasions,
the Indian Courts have relied on the US jurisprudence on the matter. Due to a well-developed
jurisprudence in the USA on this subject, the authors have chosen to do a comparative study
between the two countries. This paper seeks to examine how these two major democracies
balance the right to privacy against the need to unearth information for better investigation.
While analysing the lack of a well-rounded law on the matter, this paper also analyses the pro-
visions in the Digital Personal Data Protection Act 2023 and the Bharatiya Nagarik Suraksha
Sanhita Bill 2023 and highlights the missed opportunities to frame guidelines on the issue of
search and seizure of electronic device. Section II of the paper introduces the readers to
the law on electronic search and seizure in the USA. Section III examines the Indian position.
It discusses the law as it was pre-Virendra Khanna, then goes into the law laid down by the
Karnataka High Court in Virendra Khanna and critically analyses the same. It also looks at the
progress made in the field through other legislation. Section IV deals with a comparative analysis
of the USA and Indian law on the subject and section V provides mechanisms and ways in which
the current law can be modified to deal with some of the inadequacies of the matter.
Keywords
Code of Criminal Procedure 1973, digital records, electronic evidence, reasonable expectation
of privacy, search, seizure
Corresponding author:
Malika Galib Shah, Assistant Professor, Jindal Global Law School, O.P. Jindal Global University, Sonipat, Haryana.
Email: mgshah@jgu.edu.in
2 The International Journal of Evidence & Proof 0(0)
I. Introduction
In the past two decades, there has been an exponential rise in the use of technology for commission of crimes.
In certain scenarios, investigation of such crimes call for inspections of an accused’s personal electronic
devices. In India, there is no law regulating the field of search and seizure of electronic devices in a criminal
investigation. Only recently, Virendra Khanna v State of Karnataka1 laid down certain guidelines in this
regard. Therefore, it is pertinent to look at some other jurisdictions which have a developed jurisprudence
on this subject matter. As the subject of electronic search and seizure in criminal investigations is a well-
discussed issue in the USA, the authors have chosen to do a comparative study in this paper. India and
USA have varying laws with respect to the search of digital evidence. A digital search is fundamentally dif-
ferent from a physical document. For example, if access is granted for search of a smartphone, then police can
easily gain personal information through the chats present in the social media accounts such as WhatsApp,
Instagram, Facebook etc. This is not only breach of privacy of the individual who is being searched but also of
the people who were communicating with the individual through social media. It is a multi-layer infringe-
ment on privacy of individuals who do not consent to give away their information or have any role to
play in the ongoing investigation (Chander, 2021). The dire need of information for investigation purposes
needs to be balanced with the right to privacy of an individual (Mukhopadhyay, 2020). This paper seeks to
examine how major democracies such as India and the USA balance these rights of their citizens. India and
the USA follow the common law system and yet, unlike the Indian System, the USA has developed jurispru-
dence on matters of search and seizures of electronic records. Furthermore, Indian Courts have on various
occasions relied upon the decisions of the USA Courts when the law in India has been silent on a subject.
This paper also analyses the provisions in the Digital Personal Data Protection Act 2023 and the
Bharatiya Nagarik Suraksha Sanhita Bill 2023 and highlights the missed opportunities to frame guidelines
on the issue of search and seizure of electronic device while protecting the fundamental right to privacy.
Section II of the paper introduces the readers to the law on electronic search and seizure in the USA.
Section III examines the Indian position. It discusses the law as it was in pre-Virendra Khanna judgment,
then goes into the law laid down by the Karnataka High Court in Virendra Khanna and critically analyses
the same. It also looks at the progress made in the field through other legislation. Section IV deals with a
comparative analysis of the USA and Indian law on the subject and section V provides mechanisms and
ways in which the current law can be modified to deal with some of the inadequacies of the matter.
In the United States, the field of electronic search and seizure is governed by two laws, namely the
Fourth Amendment to the USA Constitution and the statutory privacy laws at 18 U.S.C. §§ 2510-22,
18 U.S.C. §§ 2701-12 and 18 U.S.C. §§ 3121-27. The Fourth Amendment provides for limitation of
powers of governmental agencies to search for electronic evidence without a warrant.
For a search to be constitutional, it should not be in violation of a person’s reasonable or legitimate
expectation of privacy.2 This doctrine was first developed in Katz v United States, where the police,
in order to impede a gambling ring, wiretapped a public phone booth (Katz at 361). Here, a two-prong
test was established to determine a reasonable expectation of privacy. The court held that firstly, the
person must establish that their activities would be private and secondly, that such a subjective expect-
ation is one that the society or a layperson would consider ‘reasonable’. The court held that there existed a
reasonable expectation of privacy, even if the phone call took place via a public phone booth (Katz at
Shah et al. 3
361). Subsequently, the Supreme Court of the USA, when upholding the rights of privacy of a citizen, has
held that a person has a ‘reasonable expectation of privacy’ in their personal property and during a phone
call conversation3 (Katz at 361). On the contrary, when there exits any activity in the public forum, there
can be no reasonable or legitimate expectation of privacy4 (Payton at 143). In Rakas v Illinois,5 the peti-
tioners were charged with armed robbery and the sawed-off rifle and rifle shells that were recovered from
a search of a car were presented as evidence in court (Rakas at 143). The Supreme Court held that the
petitioners had no property or interest in the automobile searched, nor did they have an interest in the
property seized, and hence they could not have a legitimate expectation of privacy, and their Fourth
Amendment rights were not violated despite the absence of a warrant for the search.
With respect to search of electronic devices, the question is whether individuals have a reasonable
expectation of privacy in the contents of their personal electronic devices. The courts answered this ques-
tion by making a parallel analogy of the data stored in electronic devices with things stored in closed con-
tainers such as suitcases and went on to hold that individuals do have a reasonable expectation of privacy
in the data contained within their electronic devices.6
Courts in the United States have been successful in drawing a distinction of data stored in personal
devices and in a closed storage unit with respect to search and seizure law. The court in United States
v Walser held that:
Analogies to other physical objects, such as dressers or flea cabinets, do not often inform the situations we now
face as judges when applying search and seizure law.7
The court focused on the right to privacy of an individual and observed that a computer holds an enor-
mous amount of data covering too many areas of an individual’s personal life. Hence, there exists a threat
of evading the privacy of the individual when the police execute a search for an electronic device as evi-
dence (Walser at 986). The Tenth Circuit has refused the search of a computer’s hard drive without a
warrant or an exception to the warrant requirement.8
As for procedure, there are various types of warrants in USA such as a ‘geofence warrant’ and
‘keyword warrant’. In the former category, information pertaining to all the electronic devices are gath-
ered for a particular area and the suspects are identified from that mass data. In the latter, suspects are
identified from a large mass of IP addresses that had searched some term on a browser (Morrison,
2021). In both kinds of warrants, data belonging to people who do not consent for collection of their per-
sonal data is obtained in the USA. In some instances, a person may not be aware of the fact that their
personal data was collected without their consent (Geofence Warrants and the Fourth Amendment,
2021). This is a pertinent issue with respect to collection of electronic evidence.
Individuals have a reasonable expectation of privacy relating to their electronic devices, but these
expectations are subject to be displaced under some exceptions. For instance, if an individual has
stored a private data on a computer in public library, it is not subject to the Fourth Amendment.9
Individuals lose their Fourth Amendment protections when they provide control of their data to a third
party.10 The Supreme Court has held that there is no Fourth Amendment violation when information
revealed to a third party discloses the data to the government agencies, even if there is an expectation
that the third party will keep the data confidential.11
The reason behind this model is that the third parties are not bound to keep the confidential intact even
if there exists a non-disclosure agreement between the parties. For instance, the bank account information
of the customers are not covered by the Fourth Amendment protection.12
Along with the reasonable expectation doctrine as envisioned in the Fourth Amendment, the United
States has well-developed jurisprudence with respect to the requirement of greater privacy rights for the
use of electronic devices as evidence.
4 The International Journal of Evidence & Proof 0(0)
amended to include electronic evidence as evidence within the meaning of the Act. The Information
Technology Act, 2000 (IT Act) was enacted to provide for this gap on electronic devices and evidence.
Section 69(1) of the IT Act also empowers specified officers to decrypt any information transmitted/
received/stored in any computer resource. The Reasonable Security Practices Rules, 2011, which are
framed under Section 43A of the Information Technology Act, give power to any government agency
to acquire personal data from an intermediary for the purpose of detecting, investigating, preventing,
prosecuting and punishing offences (Joshi, 2014).
phrase ‘during the regular ordinary course of the investigation’ is wide enough to cover any situation
within its ambit. This phrase does not require the presence of a special circumstance to be present for
this kind of an invasion into ones privacy but the investigating officer will only have to prove before
the court that the search is generally required in ordinary course of an investigation.
While granting warrants for search of electronic evidence, the Magistrates do not look at the particular
facts of the case thoroughly due to paucity of time, as there is a humungous backlog of cases. Due to this,
the search warrants granted lack detail with respect to the scope of search. Without any detailed warrant,
the police officials can exercise their wide discretion, which may lead to breach of privacy (Chander,
2021).
The other condition is in ‘emergent situations’.28 The decision on what constitutes an emergent situ-
ation has also been left to the police officer. The only condition in such a case is that a detailed reason for
the existence of an emergent situation and the consequent search, without either the consent of the
accused or the authority of the court, has to be written down.29 If the search is made without stating
the reasons or following the procedure, even though it may be illegal, the seizure made subsequent to
this illegal search will not be held inadmissible, meaning the illegality of search has no great
significance.30
The judgment has also failed to recognise the true import of these all-pervasive devices into one’s life
and has compared it to an ‘identification mark’ like a handwriting or voice sample or a specimen signa-
ture.31 The comparison seems to be ill-founded, given the limited information that the accused is giving in
the latter case. Unlike the handwriting sample as an identification mark, electronic devices expose the
most private and personal information of the accused before the investigating authorities, allowing an
insight into information not even remotely associated with the case. Other identification marks such as
voice, handwriting and signature samples have a specific purpose to the object sought to be achieved
during investigation or trial, and the same can be clearly established before the court as well.
Once access has been attained, the investigating agency can freely access not only the data on the
device, which included financial transactions, privileged communication, personal details etc., but also
any material that may be available on cloud services.32 The onus to protect and safeguard this sensitive
and personal information has been left solely on the investigating officer, in the absence of any proper
mechanism to safeguard such information and any agency for the prosecution of the concerned officer
in case of any delinquency.33
The power of search is also to be carefully exercised in light of recognition of the right to privacy as a
fundamental right in the celebrated Puttaswamy judgment. In the Puttaswamy judgment, the right to
privacy has not only been considered as a derivative from Article 21 of the Indian Constitution, but
also as a ‘basic, irreducible condition’ that is ‘necessary and unavoidable entailment of rights guaranteed
in the text of the Constitution’.34 Informational control has been recognised as one of the many aspects of
this right to privacy, as it ‘empowers the individual to use privacy as a shield to retain personal control
over information pertaining to the person’.35 The power to search electronic devices has the possibility of
infringing upon a person’s right to life and person liberty, including the right to a dignified life postulated
in Article 21, among other fundamental rights enumerated in part III of the Indian Constitution. Like other
rights this right is also not unfettered but subject to reasonable restrictions.36 At a minimum, for a privacy
constraining measure to be lawful and legitimate, a three-fold test laid must be satisfied:
For any restriction to be imposed on the right to privacy, all three conditions need to be fulfilled.
Proportionality is a general principle that has been used as a criterion to ensure fairness and justice to
8 The International Journal of Evidence & Proof 0(0)
all persons approaching the court against any state action. In this situation the action taken by the gov-
ernment has to be justified by a cause serious enough to be valid to breach the fundamental right guar-
anteed to the individual (Indian Evidence Act 1872). By equating the seizure of electronic devices with
physical documents, the court failed to recognise an essential difference between the two. During the
process of search and seizure involving physical documents, the person in question has to provide
only certain documents that are required of them, rather than all the documents on themselves, unlike
what it entails to search and seize an electronic device for reasons already stated. In the Virendra
Khanna judgment, the court did not consider such search as a breach of the fundamental right to
privacy, even though it failed to meet all of the conditions laid down in Puttaswamy.
Another reason to equate the search and seizure of physical documents with that of electronic docu-
ments has been the inclusion of electronic records in the definition of documentary evidence under the
Indian Evidence Act. The court has failed to recognise the different purposes the two legislations aim
to achieve. CrPC lays down the procedure for conducting search and seizure, among other things. The
Indian Evidence Act on the contrary deals with the admissibility and evidentiary value of the substance
already collected through the procedure laid down in CrPC. It handles the procedure and treatment of
such collected substances during trial as evidence, much different from the procedure detailed in CrPC.
instead of differentiating evidence and testimony on the basis of how direct it is in incriminating
someone, emphasis must be placed on upholding the rights of the accused and treating digital searches
as different from general searches.
VI. Conclusion
Electronic devices have become an integral part of our ecosystem and contain valuable information which
is all-pervasive. Offences involve the use of such digital devices, which has made it difficult for the inves-
tigating authorities to keep up with the advancements due to lack of any clear provision with respect to
electronic search and seizure. In light of the absence of any clear law on the matter, Karnataka High
Court’s judgment in Virendra Khanna is a welcome step that attempts to crystalise the law on this
point. However, with concerns around infringement of the right to privacy as well as the right against
self-incrimination, the law needs to be revisited and revised to look at the nuances on the matter.
Lessons can be learnt from the well-established principles in the USA, while devising a strategy
which is native to us and considers our peculiar position and situation as well.
Funding
The authors received no financial support for the research, authorship, and/or publication of this article.
ORCID iD
Malika Galib Shah https://orcid.org/0000-0002-8829-4140
References
Bhandari V and Lahiri K (2020) The surveillance state, privacy and criminal investigation in India:
Possible futures in a post-Puttaswamy world. University of Oxford Human Rights Hub Journal
3(2): 15.
Bhatia G (2018) Privacy and the Criminal Process: Selvi v State of Karnataka, 22 April. SSRN.
Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3166849 (accessed February
2024).
Biju R (2022) Guidelines on Seizure of Digital Devices: Supreme Court Issues Notice on Foundation for
Media Professionals’ Petition, 19 October. Live Law. Available at: www-livelaw-in.opj.remotlog.
12 The International Journal of Evidence & Proof 0(0)
com/top-stories/supreme-court-search-and-seizure-of-digital-devices-guidelines-212018 (accessed
June 2023).
Chander M (2021) Laws Around Electronic Evidence Compromise India’s Criminal Justice System, 2
April. Article 14. Available at: https://article-14.com/post/laws-around-electronic-evidence-compromise-
india-s-criminal-justice-system (accessed June 2023).
Fakhoury H and Kayyali D (2014) Know Your Rights, October. Electronic Frontier Foundation.
Available at: www.eff.org/issues/know-your-rights#footnote8_uoa1i9w (accessed June 2023).
Geofence Warrants and the Fourth Amendment (2021, May) Harvard Law Review 134(7).
Hobbie N Jr (2021) Reconsidering the foregone conclusion doctrine: Compelled decryption and the
original meaning of self-incrimination. University of New Hampshire Law Review 20: 51.
Joshi D (2014) Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and
India, 31 May. The Centre for Internet & Society. Available at: https://cis-india.org/internet-
governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age (accessed June 2023).
Kerr OS (2019) Compelled decryption and the privilege against self-incrimination. Texas Law Review
97(4): 767.
Morrison S (2021) Here’s How Police Can Get Your Data — Even If You Aren’t Suspected of a Crime,
31 July. Vox. Available at: www.vox.com/recode/22565926/police-law-enforcement-data-warrant
(accessed July 2023).
Mukhopadhyay D (2020) Explainer: Law Enforcement Access to Personal Electronic Devices
#SaveOurPrivacy, 3 August. Internet Freedom Foundation. Available at: https://internetfreedom.in/
search-seizure-personal-electronic-device/ (accessed June 2023).
Packer HL (1964) Two models of the criminal process. University of Pennsylvania Law Review 113(1):
1–68.
Packer HL (1968) The Limits of Criminal Sanction. Stanford, CA: Stanford University Press.
plain view doctrine (n.d.) Legal Information Institute. Available at: www.law.cornell.edu/wex/plain_
view_doctrine_0 (accessed June 2023).
Roach K (1999) Four models of the criminal process. The Journal of Criminal Law and Criminology
(1973–) 89: 671.
Sekri A (2020) Mobile Phones and Criminal Investigations in India, 2 May. SSRN. Available at: https://
papers.ssrn.com/sol3/papers.cfm?abstract_id=3590996 (accessed May 2023).
Trepel S (2007–2008) Digital searches, general warrants, and the case for the courts. Yale Journal of Law
and Technology 10: 120.
Shah et al. 13
14 The International Journal of Evidence & Proof 0(0)