{"id":248912,"date":"2021-05-29T13:06:42","date_gmt":"2021-05-29T07:36:42","guid":{"rendered":"https:\/\/www.scconline.com\/blog\/?p=248912"},"modified":"2021-12-27T13:24:18","modified_gmt":"2021-12-27T07:54:18","slug":"committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones","status":"publish","type":"post","link":"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/","title":{"rendered":"Committed a crime? Now, face(scan) the consequences! The law of self-incrimination and locked smartphones"},"content":{"rendered":"<p style=\"text-align: center;\"><span style=\"color: #000080;\"><em>On the legality of compelling an accused to disclose his smartphone\/laptop password, or open his phone through face scan, or fingerprint and the constitutional protection against self-incrimination. \u00a0<\/em><\/span><\/p>\n<p style=\"text-align: justify;\"><strong>\u00a0<\/strong><\/p>\n<p style=\"text-align: justify;\">Our smartphones are an extension of our minds and souls. Our deepest desires. Our darkest secrets. Our smartphones know it all. You remember that smartphone ad where the manufacturer said something on the lines of, \u201cyour phone knows all about you, but not us\u201d<em>. <\/em>They were not lying. Your smartphone indeed knows everything about you. Knows way too much \u2013 in fact.<\/p>\n<p style=\"text-align: justify;\">It, therefore, comes as no surprise that smartphones can offer up a wealth of evidence as far as criminal investigations are concerned. An accused\u2019s phone reveals not only where the accused was, at a given time, but also who did she text or speak with. It tells us, what did she google and what did she buy online. It also demonstrates the trends and history of her financial dealings. When coupled with a smart watch, a smart car, or even a smart refrigerator, it offers even deeper insights both into the criminal, as well as the crime. It offers much more evidence than a house\/office search ever has or will.<\/p>\n<p style=\"text-align: justify;\">Smartphones are, therefore, a great aid in crime detection and investigation and their importance can hardly be emphasised enough.<\/p>\n<p style=\"text-align: justify;\">Our notoriously arcane procedural laws, however, were not designed with the smartphone in mind. Therefore, there is little guidance in our laws, on whether an accused can be compelled to deliver up\/produce his smartphone\/laptop\/email password, in the course of a criminal investigation.<\/p>\n<p style=\"text-align: justify;\">Let us assume that, in a given case, a smartphone\/laptop (being \u201cproperty\u201d or \u201cthing\u201d within the meaning of Criminal Procedure Code, 1973), is seized by the police. However, that \u2013 by itself \u2013 is not the end of the matter. After that arises the issue of retrieving evidence from that electronic equipment or mailbox. This is what brings us to the elephant in the room.<\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"color: #000080;\">Legal issue<\/span> <\/strong><\/p>\n<p style=\"text-align: justify;\">If the seized smartphone\/laptop is locked (as they are likely to be \u2013 in almost every case), how do the investigators access the contents of the smartphone\/laptop\/mailbox and retrieve evidence?<\/p>\n<p style=\"text-align: justify;\">Can the accused be compelled to provide his password, or give his face scan\/fingerprint?<\/p>\n<p style=\"text-align: justify;\">Would that violate the constitutional protection against \u201cbeing compelled to be a witness against oneself\u201d? [Article 20(3) of the Constitution of India.]<\/p>\n<p style=\"text-align: justify;\">And, secondly, is there a provision in our procedural law that permits the investigators to seek disclosure of passwords, face scans, etc.?<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000080;\"><strong>The Court\u2019s ruling in <em>Virendra Khanna<\/em><\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">These were precisely the questions that arose for consideration in the recent case of<em> Virendra Khanna <\/em>v<em>. State of Karnataka<\/em><a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a><em>.<\/em><\/p>\n<p style=\"text-align: justify;\"><strong>\u00a0<\/strong><\/p>\n<p style=\"text-align: justify;\">The facts of the case were fairly straightforward. The accused was charged for an offence under the Narcotic Drugs and Psychotropic Substances Act, 1985 (NDPS Act). The investigators claimed that the accused\u2019s smartphone and email account contained crucial incriminating evidence, and since the same were locked, the investigating officer sought Court\u2019s intervention in this regard.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">To further its case, the prosecution argued:<\/p>\n<p>&nbsp;<\/p>\n<ol style=\"text-align: justify;\">\n<li>Disclosure of phone or computer password is not in the nature of personal testimony. (Reliance in this regard was placed on<em> State of Bombay <\/em>v<em>. Kathi Kalu Oghad<\/em><a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a>.)<\/li>\n<li>Such an order does not violate the fundamental right to privacy as the right to privacy is not an absolute right and can be curtailed in case:<\/li>\n<\/ol>\n<p style=\"padding-left: 40px; text-align: justify;\">(<em>a<\/em>) It is sanctioned by law.<\/p>\n<p style=\"padding-left: 40px; text-align: justify;\">(<em>b<\/em>) It serves a legitimate State interest\/compelling State interest; (prevention and investigation of crime, in this case).<\/p>\n<p style=\"padding-left: 40px; text-align: justify;\">\u00a0(<em>c<\/em>) It is proportionate; in the sense that there is a rational nexus between the object (the discovery of truth in a criminal investigation) and the means adopted to achieve the said object. (The \u201cmeans\u201d, therefore, should not be excessive and the object sought to be achieved should be so important and time sensitive \u2013 so as to justify the making of inroads into someone\u2019s privacy.)<\/p>\n<p style=\"padding-left: 40px; text-align: justify;\">(<em>d<\/em>) In order to satisfy the requirement of \u201csanction of law\u201d, the prosecution argued that Section 139 of the Evidence Act, 1872, Sections 54-A and 311-A CrPC empower the court to direct the accused to disclose his password\/face scan, etc.<\/p>\n<p style=\"padding-left: 40px; text-align: justify;\">\u00a0(<em>e<\/em>) Analogy was drawn to permissibility of \u201cidentification\u201d of the accused, and taking of DNA samples, specimen signatures\/handwriting samples, and voice samples.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">The accused, of course, resisted this on the ground of this amounting to \u201ccompulsion to testify against himself\u201d, and a violation of his right to privacy. Further, this, it was argued, amounted to a denial of his right to silence and rights under Articles 20 and 21 of the Constitution.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">In this background, the Court framed and decided the following issues:<\/p>\n<table style=\"height: 3264px;\" width=\"737\">\n<tbody>\n<tr>\n<td width=\"75\"><strong><span style=\"color: #800000;\">Issue No.<\/span><\/strong><\/td>\n<td width=\"265\">\n<p style=\"text-align: center;\"><strong><span style=\"color: #800000;\">Issue<\/span><\/strong><\/p>\n<\/td>\n<td width=\"283\">\n<p style=\"text-align: center;\"><strong><span style=\"color: #800000;\">Court\u2019s decision and reasoning<\/span><\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"75\">\n<p style=\"text-align: center;\">1.<\/p>\n<\/td>\n<td width=\"265\">Can a direction be issued to an accused to furnish the password, passcode, or biometrics in order to open the smartphone and\/or email account?<\/td>\n<td width=\"283\">Yes. The investigating officer (IO) can always issue directions for \u201cfurnishing of information, material objects or the like\u201d.<\/td>\n<\/tr>\n<tr>\n<td width=\"75\">\n<p style=\"text-align: center;\">2.<\/p>\n<\/td>\n<td width=\"265\">Can a court issue a suo motu order to the accused to furnish a password, passcode or biometrics?<\/td>\n<td width=\"283\">No. Investigation is the domain\/prerogative of the IO. Court is not supposed to be investigating itself, and can act only on an application filed by either of the parties.<\/td>\n<\/tr>\n<tr>\n<td width=\"75\">\n<p style=\"text-align: center;\">3.<\/p>\n<\/td>\n<td width=\"265\">In the event of a direction being issued and the accused not furnishing the password, passcode, or biometrics, what is the recourse available to an investigating officer?<\/td>\n<td width=\"283\">IO can approach the court seeking directions to the accused to provide the same and\/or \u201ccarry out search of the smartphone or electronic equipment\u201d.<\/td>\n<\/tr>\n<tr>\n<td width=\"75\">\n<p style=\"text-align: center;\">4.<\/p>\n<\/td>\n<td width=\"265\">\n<p style=\"text-align: left;\">What is the consideration for the issuance of a search warrant in order to search a smartphone or computer system?<\/p>\n<\/td>\n<td width=\"283\">It is open to courts\/IOs to issue a notice under Section 91 CrPC to the accused to produce a \u201cdocument\u201d or \u201cthing\u201d which would include a smartphone, a laptop, etc.<\/p>\n<p>&nbsp;<\/p>\n<p>Section 92 CrPC may permit the IO and\/or the court to seek documents from a \u201ctelegraph authority\u201d.<\/p>\n<p>&nbsp;<\/p>\n<p>Section 93 permits the court to issue search warrants w.r.t. a \u201cplace\u201d.<\/p>\n<p>&nbsp;<\/p>\n<p>These provisions empower the search and seizure of things from a \u201cplace\u201d and smartphones, computers, servers, etc. may construed as \u201cplaces\u201d for the purposes of this section.<\/p>\n<p>&nbsp;<\/p>\n<p>Further, Section 100 CrPC requires a person in charge of a closed place (analogy to a phone, laptop or a mailbox) to permit and facilitate a search ordered by the court.<\/p>\n<p>&nbsp;<\/p>\n<p>In emergent circumstances, powers under Section 102 CrPC may also be exercised by the IO to seize electronic equipment, and under Section 165 CrPC a search\/seizure can be carried out even without a warrant.<\/p>\n<p>&nbsp;<\/p>\n<p>Further, Section 69(1) of the Information Technology Act, 2000 also empowers specified officers to pass orders compelling decryption of any information generated, transmitted, received or stored in a computer resource.<\/td>\n<\/tr>\n<tr>\n<td width=\"75\">\n<p style=\"text-align: center;\">5.<\/p>\n<\/td>\n<td width=\"265\">Would the data gathered from a smartphone and\/or email account ipso facto prove the guilt of the accused?<\/td>\n<td width=\"283\">Depends. Data gathered from the accused\u2019s phone\/laptop, etc. would be like any other property\/evidence gathered during investigation. What would be the weight attached to such evidence is a fact-intensive exercise and a matter of appreciation of evidence, in the light of specific facts and circumstances of each case.<\/td>\n<\/tr>\n<tr>\n<td width=\"75\">\n<p style=\"text-align: center;\">6.<\/p>\n<\/td>\n<td width=\"265\">Would providing a password, passcode or biometrics amount to self-incrimination or testimonial compulsion?<\/td>\n<td width=\"283\">No. Given the law laid down in <em>Kathi Kalu Oghad<\/em> <em>case<\/em><a href=\"#_ftn3\" name=\"_ftnref3\">[3]<\/a>, such information does not amount to accused being compelled to be \u201ca witness against oneself\u201d. Merely providing one\u2019s password, passcode, biometrics, does not amount to making an \u201coral statement\u201d or a \u201cwritten statement\u201d. Therefore, it cannot be said to be a \u201ctestimonial compulsion\u201d.<\/p>\n<p>&nbsp;<\/p>\n<p>Article 20 and Section 161 CrPC are, therefore, not violated.<\/td>\n<\/tr>\n<tr>\n<td width=\"75\">\n<p style=\"text-align: center;\">7.<\/p>\n<\/td>\n<td width=\"265\">Would providing of password, passcode or biometrics violate the right to privacy of a person providing the said password, passcode or biometrics?<\/td>\n<td width=\"283\">No. The case comes within the exceptions carved out in <em>Puttaswamy case<\/em><a href=\"#_ftn4\" name=\"_ftnref4\">[4]<\/a><em>.<\/em> The IO, however, should not disclose this information to third parties without the permission of the court and deal with it in a manner conducive to the accused\u2019s right to privacy.<\/td>\n<\/tr>\n<tr>\n<td width=\"75\">\n<p style=\"text-align: center;\">8.<\/p>\n<\/td>\n<td width=\"265\">What steps could be taken if the accused or any other person connected with the investigation were to refuse to furnish a password, passcode or biometrics despite issuance of a search warrant and or a direction to provide a password, passcode or biometrics of that person?<\/td>\n<td width=\"283\">In default of accused providing his password, the court can draw an adverse inference against the accused under Section 114 of the Evidence Act, if password is not provided or a wrong password is provided.<\/p>\n<p>&nbsp;<\/p>\n<p>In such a case of non-cooperation of the accused, the IO may reach out to the manufacturer to access such information and in case of manufacturer not facilitating such access, the IO can, with the permission of the court, \u201chack into the smartphone and\/or email account\u201d with, of course, the necessary expert assistance.<\/td>\n<\/tr>\n<tr>\n<td width=\"75\">\n<p style=\"text-align: center;\">9.<\/p>\n<\/td>\n<td width=\"265\">What are the protection and safeguard that the investigating officer would have to take in respect of the smartphone and\/or electronic equipment?<\/td>\n<td width=\"283\">No proper rules formulated in this regard. Pending such formulation, Court laid down some broad guidelines, such as inclusion of qualified forensic examiners in such endeavours and preparation of proper chain of custody documents, etc.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000080;\"><strong>Comment<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">The judgment must be lauded for addressing a gaping hole in our procedural law and introducing some semblance of a method to the process.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Having said that, the judgment falls short on a few counts. For instance, it fails to engage with the issue of right to privacy in sufficient detail, in general and specifically, the requirement of proportionality.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">While the court permitted search\/seizures of electronic equipment and it added a caveat that when the court is issuing search warrants it should tailor the order narrowly and with precision so as to \u201cpreserve the privacy of the concerned\u201d (para 12.22<a href=\"#_ftn5\" name=\"_ftnref5\">[5]<\/a>) but, unfortunately, it did not elaborate on this further. More specific directions in this regard would have been apt for the guidance of the courts and the investigators, and would have prevented misuse.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Further, the requirement of any transgression into right to privacy being \u201csanctioned by law\u201d was not sufficiently examined. Though the judgment must be credited for interpreting \u201cplace\u201d (used in CrPC) as applicable to a device\/electronic equipment\/mailbox, (which is a fairly modern and technocratic interpretation), it fails to engage adequately with the other sections relied upon by the prosecution \u2013 including Sections 54-A and 311-A CrPC, for instance.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Further, the judgment, when it sources the power of seeking passwords to Section 91 CrPC (as tantamount to seeking \u201cdocuments\u201d), commits another fallacy. It ignores a line of decisions where Section 91 CrPC has been held to be inapplicable in case of an accused. (See, for instance, <em>State of Gujarat<\/em> v. <em>Shyamlal Mohanlal Choksi<\/em><a href=\"#_ftn6\" name=\"_ftnref6\">[6]<\/a> and <em>M.<\/em> <em>Kalanithi Maran <\/em>v<em>. State<\/em><a href=\"#_ftn7\" name=\"_ftnref7\">[7]<\/a>.) These cases categorically hold that a notice under Section 91 CrPC cannot be issued to an accused as the same amounts to compelling the accused to be a witness against himself. The effect of these decisions has not been considered while sourcing the power to Section 91 CrPC.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Another aspect that has not been considered is the fact that, in some jurisdictions, the courts have made a search warrant mandatory in such cases, with a view to ensure some judicial scrutiny. The desirability of having such a safety valve has not been considered adequately.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">Another aspect of practical importance is the issue of rights of the accused upon seizure<em>. <\/em>For instance, greater clarity is needed on whether the accused would be able to seek a cloned copy of the smartphone\/laptop seized, with a view to be able to use it, and to find out and rely upon exculpatory evidence, if any.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">We hope a future decision would go into these aspects. Given how vexed the issue is, this is certainly (and hopefully) not the last that we read on this issue.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">All said and done, the decision is a crucial one. Indeed, there are privacy-related concerns when it comes to smartphones\/laptops, etc., but a narrowly tailored right with the investigators to seek such information is the need of the hour. The judgment would hopefully lead to a more nuanced discourse on balancing of the competing imperatives of a proper investigation, on one hand, and the accused\u2019s right to privacy on the other.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><span style=\"color: #008000;\">\u2020 Former Judge and Lawyer, Supreme Court of India, e-mail <a style=\"color: #008000;\" href=\"mailto:contact@bharatchugh.in\">contact@bharatchugh.in<\/a>.<\/span><\/p>\n<p style=\"padding-left: 40px;\"><span style=\"color: #008000;\">The Author wants to thank Siddharth, Shreyash, Roopali, Rashi, Yachika, Hamna and Tejbir for their excellent suggestions and research.<\/span><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/1ZEFFTeF\">2021 SCC OnLine Kar 5032<\/a>.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/K736BR3r\">AIR 1961 SC 1808<\/a>.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a><em> Id.<\/em><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref4\" name=\"_ftn4\">[4]<\/a> <em>K.S. Puttaswamy<\/em> v. <em>Union of India<\/em>, <a href=\"http:\/\/www.scconline.com\/DocumentLink\/nnXl4mu5\">(2018) 1 SCC 809<\/a> : 2017 SCC OnLine SC 1462.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref5\" name=\"_ftn5\">[5]<\/a> <em>Virendra Khanna case<\/em>, <a href=\"http:\/\/www.scconline.com\/DocumentLink\/1ZEFFTeF\">2021 SCC OnLine Kar 5032<\/a>.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref6\" name=\"_ftn6\">[6]<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/4Lrr70V7\">AIR 1965 SC 1251<\/a>.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref7\" name=\"_ftn7\">[7]<\/a> <a href=\"http:\/\/www.scconline.com\/DocumentLink\/tKJ7W761\">2003 SCC OnLine Mad 936<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Bharat Chugh\u2020<br \/>\nCite as: 2021 SCC OnLine Blog Exp 37<\/p>\n","protected":false},"author":8808,"featured_media":248913,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[42503,1191],"tags":[41353,9871,46030,46029],"class_list":["post-248912","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-legal-analysis","category-op-ed","tag-bharat-chugh","tag-right-to-privacy","tag-self-incrimination","tag-smartphones"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Committed a crime? Now, face(scan) the consequences! The law of self-incrimination and locked smartphones | SCC Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Committed a crime? Now, face(scan) the consequences! The law of self-incrimination and locked smartphones\" \/>\n<meta property=\"og:description\" content=\"by Bharat Chugh\u2020 Cite as: 2021 SCC OnLine Blog Exp 37\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/\" \/>\n<meta property=\"og:site_name\" content=\"SCC Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/scc.online\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-29T07:36:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-27T07:54:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/05\/Committed-a-crime1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1330\" \/>\n\t<meta property=\"og:image:height\" content=\"887\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bhumika Indulia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bhumika Indulia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/\",\"url\":\"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/\",\"name\":\"Committed a crime? Now, face(scan) the consequences! The law of self-incrimination and locked smartphones | SCC Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.scconline.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/05\/Committed-a-crime1.jpg\",\"datePublished\":\"2021-05-29T07:36:42+00:00\",\"dateModified\":\"2021-12-27T07:54:18+00:00\",\"author\":{\"@id\":\"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/919ec47cc1b871b362af05740398033a\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/#primaryimage\",\"url\":\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/05\/Committed-a-crime1.jpg\",\"contentUrl\":\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/05\/Committed-a-crime1.jpg\",\"width\":1330,\"height\":887},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.scconline.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Committed a crime? Now, face(scan) the consequences! The law of self-incrimination and locked smartphones\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.scconline.com\/blog\/#website\",\"url\":\"https:\/\/www.scconline.com\/blog\/\",\"name\":\"SCC Times\",\"description\":\"Bringing you the Best Analytical Legal News\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.scconline.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/919ec47cc1b871b362af05740398033a\",\"name\":\"Bhumika Indulia\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/04\/Me-150x150.jpg\",\"contentUrl\":\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/04\/Me-150x150.jpg\",\"caption\":\"Bhumika Indulia\"},\"url\":\"https:\/\/www.scconline.com\/blog\/post\/author\/editor_1\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Committed a crime? Now, face(scan) the consequences! The law of self-incrimination and locked smartphones | SCC Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/","og_locale":"en_US","og_type":"article","og_title":"Committed a crime? Now, face(scan) the consequences! The law of self-incrimination and locked smartphones","og_description":"by Bharat Chugh\u2020 Cite as: 2021 SCC OnLine Blog Exp 37","og_url":"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/","og_site_name":"SCC Times","article_publisher":"https:\/\/www.facebook.com\/scc.online\/","article_published_time":"2021-05-29T07:36:42+00:00","article_modified_time":"2021-12-27T07:54:18+00:00","og_image":[{"width":1330,"height":887,"url":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/05\/Committed-a-crime1.jpg","type":"image\/jpeg"}],"author":"Bhumika Indulia","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bhumika Indulia","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/","url":"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/","name":"Committed a crime? Now, face(scan) the consequences! The law of self-incrimination and locked smartphones | SCC Times","isPartOf":{"@id":"https:\/\/www.scconline.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/#primaryimage"},"image":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/05\/Committed-a-crime1.jpg","datePublished":"2021-05-29T07:36:42+00:00","dateModified":"2021-12-27T07:54:18+00:00","author":{"@id":"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/919ec47cc1b871b362af05740398033a"},"breadcrumb":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/#primaryimage","url":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/05\/Committed-a-crime1.jpg","contentUrl":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/05\/Committed-a-crime1.jpg","width":1330,"height":887},{"@type":"BreadcrumbList","@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/05\/29\/committed-a-crime-now-facescan-the-consequences-the-law-of-self-incrimination-and-locked-smartphones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.scconline.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Committed a crime? Now, face(scan) the consequences! The law of self-incrimination and locked smartphones"}]},{"@type":"WebSite","@id":"https:\/\/www.scconline.com\/blog\/#website","url":"https:\/\/www.scconline.com\/blog\/","name":"SCC Times","description":"Bringing you the Best Analytical Legal News","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.scconline.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/919ec47cc1b871b362af05740398033a","name":"Bhumika Indulia","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/04\/Me-150x150.jpg","contentUrl":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/04\/Me-150x150.jpg","caption":"Bhumika Indulia"},"url":"https:\/\/www.scconline.com\/blog\/post\/author\/editor_1\/"}]}},"jetpack_featured_media_url":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/05\/Committed-a-crime1.jpg","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":286938,"url":"https:\/\/www.scconline.com\/blog\/post\/2023\/03\/18\/right-of-self-incrimination-in-digital-age-whether-compelled-disclosure-of-password-biometrics-is-unconstitutional\/","url_meta":{"origin":248912,"position":0},"title":"Right of Self-Incrimination in Digital Age: Whether Compelled Disclosure of Password\/Biometrics is Unconstitutional?","author":"Editor","date":"March 18, 2023","format":false,"excerpt":"by Ankur Mody\u2020 and Siddharth Sijoria\u2020\u2020","rel":"","context":"In &quot;Op Eds&quot;","block_context":{"text":"Op Eds","link":"https:\/\/www.scconline.com\/blog\/post\/category\/op-ed\/legal-analysis\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-778.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-778.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-778.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/03\/MicrosoftTeams-image-778.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":339419,"url":"https:\/\/www.scconline.com\/blog\/post\/2025\/01\/20\/self-incrimination-not-cooperation-with-investigation-p-h-hc-grants-bail-to-accused\/","url_meta":{"origin":248912,"position":1},"title":"\u2018Co-operation with investigation doesn\u2019t extend to self-incrimination&#8217;; Punjab &amp; Haryana HC grants anticipatory bail to accused in Municipal Corporation corruption case","author":"Editor","date":"January 20, 2025","format":false,"excerpt":"\u201cThe investigating agency must instead rely on independent and lawful methods to gather information rather than pressuring the accused to act against their constitutional safeguards. Insisting on custodial interrogation solely for self-incriminatory purposes is unconstitutional and sets a dangerous precedent.\u201d","rel":"","context":"In &quot;Case Briefs&quot;","block_context":{"text":"Case Briefs","link":"https:\/\/www.scconline.com\/blog\/post\/category\/casebriefs\/"},"img":{"alt_text":"Punjab and Haryana High Court","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/02\/Punjab-and-Haryana-High-Court.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/02\/Punjab-and-Haryana-High-Court.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/02\/Punjab-and-Haryana-High-Court.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/02\/Punjab-and-Haryana-High-Court.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":342927,"url":"https:\/\/www.scconline.com\/blog\/post\/2025\/03\/04\/delhi-high-court-issues-guidelines-students-smartphones-legal-news\/","url_meta":{"origin":248912,"position":2},"title":"\u2018Students should not be barred from carrying smartphones\u2019; Delhi High Court issues guiding principles for the use of smartphones in schools","author":"Arunima","date":"March 4, 2025","format":false,"excerpt":"The factual matrix in this case presented a situation in which a minor student was visited with certain consequences by reason of misusing a smartphone while in school.","rel":"","context":"In &quot;Case Briefs&quot;","block_context":{"text":"Case Briefs","link":"https:\/\/www.scconline.com\/blog\/post\/category\/casebriefs\/"},"img":{"alt_text":"Delhi High Court","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/02\/Delhi-High-Court.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/02\/Delhi-High-Court.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/02\/Delhi-High-Court.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/02\/Delhi-High-Court.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":276795,"url":"https:\/\/www.scconline.com\/blog\/post\/2022\/11\/05\/delhi-court-compelling-accused-to-give-his-system-password-to-io-police-violates-article-203-and-s-1612-crpc\/","url_meta":{"origin":248912,"position":3},"title":"Delhi Court| Compelling accused to give his system password to IO\/Police violates Article 20(3) and S 161(2) CrPC","author":"Editor","date":"November 5, 2022","format":false,"excerpt":"\u00a0 \u00a0 Rouse Avenue District Courts, Delhi: In a case filed by Central Bureau of Investigation questioning the power of investigating agency (Police) to seek password (user ID) of the computer system seized from the accused along with password of a Tally Software which was being used by the accused\u2026","rel":"","context":"In &quot;Case Briefs&quot;","block_context":{"text":"Case Briefs","link":"https:\/\/www.scconline.com\/blog\/post\/category\/casebriefs\/"},"img":{"alt_text":"Rouse Avenue","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2022\/07\/rouse_avenue.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2022\/07\/rouse_avenue.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2022\/07\/rouse_avenue.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2022\/07\/rouse_avenue.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2022\/07\/rouse_avenue.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":44141,"url":"https:\/\/www.scconline.com\/blog\/post\/2016\/04\/16\/accused-cannot-be-subjected-to-narcoanalysis-polygraph-and-beap-tests-against-his-will-consent\/","url_meta":{"origin":248912,"position":4},"title":"Accused cannot be subjected to narcoanalysis, polygraph and BEAP tests against his will &#038; consent","author":"Sucheta","date":"April 16, 2016","format":false,"excerpt":"Chhattisgarh High Court: Deciding the question as to the legal permissibility of narcoanalysis, polygraph test (lie detector) and BEAP (Brain Electrical Activation Profile) test on an accused during investigation, the Bench of Sanjay K. Agrawal, J. held that such tests cannot be conducted without the consent of the person suspected\u2026","rel":"","context":"In &quot;Case Briefs&quot;","block_context":{"text":"Case Briefs","link":"https:\/\/www.scconline.com\/blog\/post\/category\/casebriefs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":352357,"url":"https:\/\/www.scconline.com\/blog\/post\/2025\/07\/04\/tax-investigations-right-against-self-incrimination\/","url_meta":{"origin":248912,"position":5},"title":"Tax Investigations and Right Against Self-Incrimination: Balancing Legal Safeguards","author":"Prachi Bhardwaj","date":"July 4, 2025","format":false,"excerpt":"by Harshdeep Khurana*, Rachit Jain** and Dhanur Gupta***","rel":"","context":"In &quot;Experts Corner&quot;","block_context":{"text":"Experts Corner","link":"https:\/\/www.scconline.com\/blog\/post\/category\/experts_corner\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2025\/07\/Tax-Investigations-and-right-against-self-incrimination.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2025\/07\/Tax-Investigations-and-right-against-self-incrimination.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2025\/07\/Tax-Investigations-and-right-against-self-incrimination.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2025\/07\/Tax-Investigations-and-right-against-self-incrimination.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/posts\/248912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/users\/8808"}],"replies":[{"embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/comments?post=248912"}],"version-history":[{"count":0,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/posts\/248912\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/media\/248913"}],"wp:attachment":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/media?parent=248912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/categories?post=248912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/tags?post=248912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}