Author Archives: Neeraj Aarora

Forensic Audit: Preventing the Abuse of Insolvency Code

The significance of forensic audit has gained paramount importance as the corporate debtors are moving for restructuring and bidding themselves for stressed assets. The concern has gained momentum particularly after the Essar Steel & Bhushan Steel has undergone Insolvency process … Continue reading

More Galleries | 1 Comment

Intercepted Mobile Evidence on CD: Infringement of Constitutional Right of Defence

Electronic Interception of Telephonic Communication, also known as “Wiretapping” always clouded with various controversies  as to illegality or breach of privacy however, an important concern as to what standard of evidence, the prosecution needs to establish the Admissibility, Authenticity, Veracity … Continue reading

Posted in Cyber Lawyer, Information Technology Act | 1 Comment

SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases

“We have broken SHA-1 in practice,” and “SHAttered attack” can be used to compromise anything that relies on SHA-1, says a group of researchers from the CWI Research centres in Amsterdam and Google. The information available on https://shattered.io/  also enables … Continue reading

More Galleries | 1 Comment

Every Computer Output does not require 65B Certificate – IEA, 1872

CERTIFICATE U/S 65B NOT REQUIRED TO PROVE FIR Admissibility of the electronic records has been one of the controversial issues in every case where it is being relied upon by any of the parties. The reason is the ease with … Continue reading

Posted in Information Technology Act | 2 Comments

Restriction on WhatsApp Group in J&K- An Another Failed Attempt To Regulate The Internet

The philosophy of Prof. Lawrence Lessing regarding the control of internet through its code and ‘the declaration of independence of cyberspace’ by John Perry Barlaw are in interlocked stage. The movement of the governance of internet is slowly and slowly … Continue reading

More Galleries | Leave a comment