


{"id":5303,"date":"2026-04-04T15:28:33","date_gmt":"2026-04-04T09:58:33","guid":{"rendered":"https:\/\/lawsikho.com\/blog\/?p=5303"},"modified":"2026-04-04T15:48:31","modified_gmt":"2026-04-04T10:18:31","slug":"cyber-crime-fir-india-2026-how-to-file-under-bns-section-111-online-complaint-process-legal-remedies","status":"publish","type":"post","link":"https:\/\/lawsikho.com\/blog\/cyber-crime-fir-india-2026-how-to-file-under-bns-section-111-online-complaint-process-legal-remedies\/","title":{"rendered":"Cyber Crime FIR India 2026: How to File Under BNS Section 111, Online Complaint Process &#038; Legal Remedies"},"content":{"rendered":"<p><em>Last verified: April 2026<\/em><\/p>\n<p>Cyber crime in India hit \u20b9805 crore in losses in just the first eight months of FY26, with over 10.64 lakh reported incidents. UPI fraud alone accounted for 13 lakh cases in FY25 with losses exceeding \u20b91,000 crore. Yet 51% of victims never filed a complaint. The new criminal laws \u2014 BNS, BNSS, and BSA \u2014 that replaced the IPC, CrPC, and Evidence Act on 1 July 2024 have fundamentally changed how cyber crimes are reported, investigated, and prosecuted in India.<\/p>\n<p>This guide walks you through every step. From filing an online complaint on the National Cyber Crime Reporting Portal (NCRP) to registering an e-FIR under BNSS Section 173, preserving electronic evidence under BSA Section 63, and understanding the new organised crime provisions under BNS Section 111. Whether you are a victim seeking immediate relief or a criminal lawyer advising a client, this is your complete reference.<\/p>\n<h2>Table of Contents<\/h2>\n<ul>\n<li><a href=\"#new-laws\">How India&#8217;s New Criminal Laws Changed Cyber Crime Prosecution<\/a>\n<ul>\n<li><a href=\"#bns-cyber\">BNS Provisions for Cyber Crimes<\/a><\/li>\n<li><a href=\"#bnss-efir\">BNSS Section 173: e-FIR and Zero FIR<\/a><\/li>\n<li><a href=\"#bsa-evidence\">BSA Section 63: Electronic Evidence Rules<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#section-111\">BNS Section 111: When Cyber Crime Becomes Organised Crime<\/a>\n<ul>\n<li><a href=\"#section-111-elements\">Essential Elements of Section 111<\/a><\/li>\n<li><a href=\"#section-111-punishment\">Punishment and Bail Provisions<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#community-questions\">What Victims and Lawyers Are Actually Asking<\/a><\/li>\n<li><a href=\"#online-complaint\">Step-by-Step: Filing a Cyber Crime Complaint Online<\/a>\n<ul>\n<li><a href=\"#ncrp-portal\">National Cyber Crime Reporting Portal (NCRP)<\/a><\/li>\n<li><a href=\"#helpline-1930\">1930 Helpline: The Golden Hour for Financial Fraud<\/a><\/li>\n<li><a href=\"#efir-process\">Filing an e-FIR Under BNSS Section 173<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#types-sections\">Types of Cyber Crimes and Applicable Sections<\/a>\n<ul>\n<li><a href=\"#bns-sections\">BNS Sections for Cyber Offences<\/a><\/li>\n<li><a href=\"#it-act-sections\">IT Act Sections Still in Force<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#evidence-preservation\">How to Preserve Electronic Evidence for Court<\/a>\n<ul>\n<li><a href=\"#bsa-63-certificate\">BSA Section 63 Certificate Requirements<\/a><\/li>\n<li><a href=\"#evidence-checklist\">Evidence Preservation Checklist<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#legal-remedies\">Legal Remedies Available to Cyber Crime Victims<\/a>\n<ul>\n<li><a href=\"#criminal-remedies\">Criminal Remedies<\/a><\/li>\n<li><a href=\"#civil-remedies\">Civil Remedies and Compensation<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#exemptions\">Exemptions and Defences in Cyber Crime Cases<\/a><\/li>\n<li><a href=\"#common-mistakes\">Common Mistakes That Weaken Your Cyber Crime Case<\/a><\/li>\n<li><a href=\"#upi-fraud\">UPI Fraud: Special Procedures and Recovery<\/a><\/li>\n<li><a href=\"#disclaimer\">Disclaimer<\/a><\/li>\n<li><a href=\"#faq\">Frequently Asked Questions<\/a><\/li>\n<li><a href=\"#conclusion\">Conclusion<\/a><\/li>\n<\/ul>\n<p><!-- H2-1 --><\/p>\n<h2 id=\"new-laws\">How India&#8217;s New Criminal Laws Changed Cyber Crime Prosecution<\/h2>\n<p>On 1 July 2024, three new laws replaced the colonial-era criminal framework. The Bharatiya Nyaya Sanhita (BNS) replaced the IPC. The Bharatiya Nagarik Suraksha Sanhita (BNSS) replaced the CrPC. The Bharatiya Sakshya Adhiniyam (BSA) replaced the Indian Evidence Act. For cyber crime practitioners, the changes are substantial.<\/p>\n<h3 id=\"bns-cyber\">BNS Provisions for Cyber Crimes<\/h3>\n<p>The BNS expanded the scope of cyber crime prosecution in three key ways:<\/p>\n<ul>\n<li><strong>Section 111<\/strong> \u2014 classifies cyber crime as &#8220;organised crime&#8221; for the first time, with penalties up to life imprisonment or death<\/li>\n<li><strong>Sections 318-319<\/strong> \u2014 cheating and fraud provisions now explicitly cover electronic means, including texts, emails, and social media<\/li>\n<li><strong>Section 336<\/strong> \u2014 forgery provisions extended to electronic forgery (bogus websites, password theft)<\/li>\n<li><strong>Section 319(2)<\/strong> \u2014 cheating by impersonation \u2014 punishment increased from 3 years (IPC) to 5 years (BNS)<\/li>\n<\/ul>\n<p>The critical shift: under the IPC, most cyber crimes were prosecuted as general cheating (Section 420) or forgery. The BNS creates specific pathways for cyber offences with enhanced punishments.<\/p>\n<h3 id=\"bnss-efir\">BNSS Section 173: e-FIR and Zero FIR<\/h3>\n<p>Section 173 of the BNSS introduces two game-changing provisions for cyber crime reporting:<\/p>\n<p><strong>e-FIR (Section 173(1)(ii)):<\/strong> Information about a cognizable offence can now be given through &#8220;electronic communication.&#8221; The informant must sign within 3 days. This means you can initiate an FIR via email or the NCRP portal without visiting a police station.<\/p>\n<p><strong>Zero FIR (Section 173(1)):<\/strong> The BNSS mandates that any police station must register an FIR for a cognizable offence regardless of jurisdiction. Cyber crimes often cross jurisdictional boundaries \u2014 the victim is in Mumbai, the server is in Bangalore, the accused is in Delhi. Zero FIR eliminates the &#8220;not our jurisdiction&#8221; excuse.<\/p>\n<p>If a police officer refuses to register your FIR, you have a statutory remedy: send the substance of your complaint in writing to the Superintendent of Police, who must either investigate personally or direct an investigation.<\/p>\n<h3 id=\"bsa-evidence\">BSA Section 63: Electronic Evidence Rules<\/h3>\n<p>Section 63 of the BSA replaces the old Section 65B of the Indian Evidence Act. The key changes:<\/p>\n<ul>\n<li>Electronic records (emails, WhatsApp messages, screenshots, CCTV footage) are now classified as &#8220;documents&#8221; \u2014 admissible without needing proof of the original<\/li>\n<li>The term &#8220;communication device&#8221; has been added \u2014 records from phones, laptops, and tablets are directly admissible<\/li>\n<li>A two-part certificate is now required: one from the person in charge of the device, and a second from an &#8220;expert&#8221;<\/li>\n<li>Courts increasingly expect forensic procedures \u2014 proper acquisition, hash verification, and chain of custody documentation<\/li>\n<\/ul>\n<p>For cyber crime victims, this means your WhatsApp screenshots, UPI transaction records, and email trails can be evidence \u2014 but only if you preserve them correctly with proper BSA Section 63 certification. More on this in the <a href=\"#evidence-preservation\">evidence preservation section<\/a>.<\/p>\n<p><!-- H2-2 --><\/p>\n<h2 id=\"section-111\">BNS Section 111: When Cyber Crime Becomes Organised Crime<\/h2>\n<p>Section 111 is the most significant addition to India&#8217;s cyber crime framework. For the first time, cyber crime committed as part of a syndicate is classified as &#8220;organised crime&#8221; \u2014 attracting the same punishment as kidnapping, extortion, and contract killing.<\/p>\n<h3 id=\"section-111-elements\">Essential Elements of Section 111<\/h3>\n<p>To prosecute under Section 111, the prosecution must establish all of the following:<\/p>\n<ol>\n<li><strong>Continuing unlawful activity<\/strong> \u2014 evidenced by either:\n<ul>\n<li>Multiple charge-sheets filed within the preceding 10 years, OR<\/li>\n<li>Aggregate financial loss exceeding \u20b91 crore<\/li>\n<\/ul>\n<\/li>\n<li><strong>Acting as part of an organised crime syndicate<\/strong> \u2014 the accused must be acting in concert with others, singly or jointly, as a member of or on behalf of a syndicate<\/li>\n<li><strong>Use of violence, threat, intimidation, coercion, or other unlawful means<\/strong><\/li>\n<li><strong>Purpose of obtaining material or financial benefit<\/strong><\/li>\n<\/ol>\n<p>The definition explicitly includes &#8220;cyber-crimes&#8221; alongside kidnapping, robbery, extortion, and human trafficking. This is not a stretch interpretation \u2014 the statute names cyber crime directly.<\/p>\n<p>Practical examples that trigger Section 111:<\/p>\n<ul>\n<li>A call centre running repeated phishing scams targeting multiple victims (continuing unlawful activity + syndicate)<\/li>\n<li>A hacking group systematically breaching company databases for ransom (organised syndicate + financial benefit)<\/li>\n<li>A network operating fake e-commerce websites across multiple states (continuing activity + multiple charge-sheets)<\/li>\n<\/ul>\n<h3 id=\"section-111-punishment\">Punishment and Bail Provisions<\/h3>\n<p>The punishment under Section 111 is severe:<\/p>\n<ul>\n<li><strong>Imprisonment:<\/strong> Life imprisonment or death, depending on the severity of the crime<\/li>\n<li><strong>Fine:<\/strong> In addition to imprisonment<\/li>\n<li><strong>Property attachment:<\/strong> Properties acquired through organised crime proceeds can be attached<\/li>\n<\/ul>\n<p>Bail provisions under Section 111:<\/p>\n<ul>\n<li>Organised crime offences are <strong>cognizable and non-bailable<\/strong> from the outset<\/li>\n<li>The Punjab and Haryana High Court in <em>Jaskaran Singh v. State<\/em> (2025) held that mere allegations cannot justify indefinite detention \u2014 the constitutional presumption of liberty applies<\/li>\n<li>Anticipatory bail is extremely difficult but not impossible \u2014 the court will consider the strength of evidence and the accused&#8217;s criminal history<\/li>\n<\/ul>\n<p>For criminal lawyers: Section 111 is a powerful tool for prosecutors dealing with cyber crime syndicates. But it requires careful case building \u2014 the &#8220;continuing unlawful activity&#8221; and &#8220;syndicate&#8221; elements must be established with evidence. <a href=\"https:\/\/lawsikho.com\/critical-criminal-litigation\">LawSikho&#8217;s Critical Criminal Litigation programme<\/a> covers BNS organised crime provisions and defence strategies in depth.<\/p>\n<p><!-- H2-3 --><\/p>\n<h2 id=\"community-questions\">What Victims and Lawyers Are Actually Asking<\/h2>\n<p>Reddit threads, Quora questions, and legal forums are flooded with confusion about the new cyber crime framework. Here are the real questions \u2014 and straight answers.<\/p>\n<p>A frequently asked question across platforms: &#8220;I lost money in a UPI scam. Should I file an FIR or a complaint on cybercrime.gov.in?&#8221; Both. Call 1930 immediately (within the first hour if possible \u2014 this is the &#8220;golden hour&#8221; for fund freezing). Then file on the NCRP portal. Then file an FIR at your local police station or via e-FIR under BNSS Section 173. The three are not alternatives \u2014 they serve different purposes.<\/p>\n<p>A recurring concern on legal forums: &#8220;The police station said cyber crime is not their jurisdiction and refused to register my FIR.&#8221; This is now illegal under BNSS Section 173. Any police station must register your FIR regardless of jurisdiction (Zero FIR). If they refuse, complain to the Superintendent of Police in writing. You can also file directly on cybercrime.gov.in to bypass the local station entirely.<\/p>\n<p>Another common question: &#8220;Can WhatsApp screenshots be used as evidence?&#8221; Yes, but with conditions. Under BSA Section 63, electronic records are admissible as documents. However, you need a proper Section 63 certificate. A screenshot without certification may be challenged in court. The Delhi High Court (2024) specifically held that WhatsApp screenshots alone are not enough \u2014 proper device and platform linkage is required.<\/p>\n<p>A question from criminal lawyers: &#8220;When does a regular cyber fraud case escalate to Section 111 organised crime?&#8221; When the prosecution can show continuing unlawful activity (multiple charge-sheets in 10 years OR losses exceeding \u20b91 crore) AND the accused acted as part of a syndicate. A single-incident UPI fraud by an individual is Section 318 BNS \u2014 not Section 111.<\/p>\n<p><!-- H2-4 --><\/p>\n<h2 id=\"online-complaint\">Step-by-Step: Filing a Cyber Crime Complaint Online<\/h2>\n<p>India has multiple channels for reporting cyber crime. Use the right channel based on the type of crime and urgency.<\/p>\n<h3 id=\"ncrp-portal\">National Cyber Crime Reporting Portal (NCRP)<\/h3>\n<p>The <a href=\"https:\/\/cybercrime.gov.in\" target=\"_blank\" rel=\"noopener\">NCRP (cybercrime.gov.in)<\/a> is the Government of India&#8217;s official platform for reporting cyber crimes online. Here is the step-by-step process:<\/p>\n<ol>\n<li><strong>Visit cybercrime.gov.in<\/strong> \u2014 select &#8220;File a Complaint&#8221; on the homepage<\/li>\n<li><strong>Select crime category:<\/strong>\n<ul>\n<li>&#8220;Report Women\/Child Related Crime&#8221; \u2014 for child pornography, CSAM, sexual exploitation<\/li>\n<li>&#8220;Report Other Cyber Crime&#8221; \u2014 for financial fraud, hacking, identity theft, social media crimes<\/li>\n<li>&#8220;Report Financial Fraud&#8221; \u2014 separate quick-track for UPI\/banking fraud (connects to 1930 system)<\/li>\n<\/ul>\n<\/li>\n<li><strong>Register with your mobile number<\/strong> \u2014 you will receive an OTP (valid for 30 minutes)<\/li>\n<li><strong>Fill complaint details<\/strong> \u2014 mandatory fields include:\n<ul>\n<li>Your name, phone number, email address<\/li>\n<li>Date, time, and description of the incident<\/li>\n<li>Accused details (if known) \u2014 phone number, email, social media handles<\/li>\n<li>Financial details \u2014 bank account numbers, UPI IDs, transaction IDs<\/li>\n<\/ul>\n<\/li>\n<li><strong>Upload evidence<\/strong> \u2014 screenshots, transaction receipts, email headers, chat logs<\/li>\n<li><strong>Submit and note your complaint reference number<\/strong> \u2014 use this to track progress<\/li>\n<li><strong>Track status<\/strong> \u2014 visit cybercrime.gov.in\/Webform\/chkackstatus.aspx with your reference number<\/li>\n<\/ol>\n<p>The NCRP routes your complaint to the relevant state cyber cell based on the jurisdiction of the offence. Response times vary by state \u2014 metropolitan cyber cells typically respond faster than rural districts.<\/p>\n<h3 id=\"helpline-1930\">1930 Helpline: The Golden Hour for Financial Fraud<\/h3>\n<p>For UPI fraud, bank fraud, or any financial cyber crime, call 1930 immediately. The first hour after the fraud is critical \u2014 this is the &#8220;golden hour&#8221; where banks can freeze the accused&#8217;s account before funds are transferred further.<\/p>\n<p>How the 1930 system works:<\/p>\n<ol>\n<li>You call 1930 and report the financial fraud with transaction details<\/li>\n<li>The Cyber Fraud Mitigation Centre (CFMC) receives your complaint in real time<\/li>\n<li>Bank officials and police officers at the CFMC initiate immediate account freezing<\/li>\n<li>The complaint is forwarded to your local cyber police station for FIR registration<\/li>\n<\/ol>\n<p>Recovery statistics reveal why speed matters. Uttar Pradesh&#8217;s CFMC achieved an 88.65% recovery rate in March 2026 \u2014 up from 24.56% in September 2025 \u2014 through real-time bank-police coordination during the golden hour. The national average recovery rate remains at only 6%. The difference is almost entirely about how quickly the victim reports.<\/p>\n<h3 id=\"efir-process\">Filing an e-FIR Under BNSS Section 173<\/h3>\n<p>Section 173(1)(ii) of the BNSS allows you to file an FIR through electronic communication. The process:<\/p>\n<ol>\n<li><strong>Send information electronically<\/strong> \u2014 email or NCRP portal to the nearest police station&#8217;s official email ID<\/li>\n<li><strong>Include all essential details<\/strong> \u2014 nature of offence, date, time, accused details, evidence summary<\/li>\n<li><strong>Sign within 3 days<\/strong> \u2014 visit the police station within 3 days to sign the FIR. The e-FIR is recorded on receipt but must be verified by your physical signature<\/li>\n<li><strong>Receive your free copy<\/strong> \u2014 the police must provide a free copy of the registered FIR<\/li>\n<\/ol>\n<p>If the police station refuses to register your e-FIR:<\/p>\n<ul>\n<li>Send the complaint in writing to the Superintendent of Police (SP) of the district<\/li>\n<li>The SP must either investigate personally or direct an investigation<\/li>\n<li>You can also file a complaint to the jurisdictional Magistrate under Section 175 BNSS<\/li>\n<\/ul>\n<p><!-- H2-5 --><\/p>\n<h2 id=\"types-sections\">Types of Cyber Crimes and Applicable Sections<\/h2>\n<p>The new criminal laws work alongside the Information Technology Act, 2000 (which remains in force). Different types of cyber crime attract different sections \u2014 knowing the right provision is critical for FIR drafting.<\/p>\n<h3 id=\"bns-sections\">BNS Sections for Cyber Offences<\/h3>\n<table>\n<thead>\n<tr>\n<th>Cyber Crime Type<\/th>\n<th>BNS Section<\/th>\n<th>Old IPC Section<\/th>\n<th>Punishment<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Online cheating \/ fraud<\/td>\n<td>Section 318<\/td>\n<td>Section 420<\/td>\n<td>Up to 7 years + fine<\/td>\n<\/tr>\n<tr>\n<td>Cheating by impersonation online<\/td>\n<td>Section 319(2)<\/td>\n<td>Section 419<\/td>\n<td>Up to 5 years + fine (increased from 3 years)<\/td>\n<\/tr>\n<tr>\n<td>Simple cheating<\/td>\n<td>Section 317<\/td>\n<td>Section 417<\/td>\n<td>Up to 1 year + fine<\/td>\n<\/tr>\n<tr>\n<td>Electronic forgery<\/td>\n<td>Section 336<\/td>\n<td>Section 463<\/td>\n<td>Up to 2 years + fine<\/td>\n<\/tr>\n<tr>\n<td>Data theft<\/td>\n<td>Section 303<\/td>\n<td>Section 378<\/td>\n<td>Up to 3 years + fine<\/td>\n<\/tr>\n<tr>\n<td>Criminal breach of trust (digital)<\/td>\n<td>Section 316<\/td>\n<td>Section 405<\/td>\n<td>Up to 5 years + fine (increased from 3 years)<\/td>\n<\/tr>\n<tr>\n<td>Organised cyber crime (syndicate)<\/td>\n<td>Section 111<\/td>\n<td>No equivalent<\/td>\n<td>Life imprisonment to death<\/td>\n<\/tr>\n<tr>\n<td>Cyber stalking<\/td>\n<td>Section 78<\/td>\n<td>Section 354D<\/td>\n<td>Up to 3 years + fine (first offence)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3 id=\"it-act-sections\">IT Act Sections Still in Force<\/h3>\n<p>The IT Act, 2000 was not repealed by the new criminal laws. Its cyber-specific provisions remain in force and are frequently invoked alongside BNS sections:<\/p>\n<table>\n<thead>\n<tr>\n<th>IT Act Section<\/th>\n<th>Offence<\/th>\n<th>Punishment<\/th>\n<th>When to Use<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Section 66<\/td>\n<td>Hacking \u2014 unauthorised access to computer systems<\/td>\n<td>Up to 3 years + fine<\/td>\n<td>When the accused accessed a system without authorisation<\/td>\n<\/tr>\n<tr>\n<td>Section 66C<\/td>\n<td>Identity theft \u2014 fraudulent use of another&#8217;s electronic signature, password, or unique ID<\/td>\n<td>Up to 3 years + fine up to \u20b91 lakh<\/td>\n<td>When someone uses your credentials to impersonate you online<\/td>\n<\/tr>\n<tr>\n<td>Section 66D<\/td>\n<td>Cheating by personation using computer resource<\/td>\n<td>Up to 3 years + fine up to \u20b91 lakh<\/td>\n<td>Phishing attacks, fake websites impersonating legitimate services<\/td>\n<\/tr>\n<tr>\n<td>Section 66E<\/td>\n<td>Violation of privacy \u2014 capturing\/publishing private images<\/td>\n<td>Up to 3 years + fine up to \u20b92 lakh<\/td>\n<td>Non-consensual intimate images, voyeurism via hidden cameras<\/td>\n<\/tr>\n<tr>\n<td>Section 66F<\/td>\n<td>Cyber terrorism<\/td>\n<td>Life imprisonment<\/td>\n<td>When cyber attack targets critical information infrastructure<\/td>\n<\/tr>\n<tr>\n<td>Section 43<\/td>\n<td>Unauthorised access, damage, disruption to computer systems<\/td>\n<td>Compensation up to \u20b95 crore (civil remedy)<\/td>\n<td>Civil remedy for system damage \u2014 does not require criminal prosecution<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Practical tip for lawyers: file FIRs citing both BNS and IT Act provisions. For example, a phishing attack would cite BNS Section 318 (cheating) + BNS Section 319(2) (impersonation) + IT Act Section 66D (cheating by personation using computer resource). Multiple provisions strengthen the case and cover different elements of the offence.<\/p>\n<p><!-- H2-6 --><\/p>\n<h2 id=\"evidence-preservation\">How to Preserve Electronic Evidence for Court<\/h2>\n<p>Electronic evidence is fragile. Messages can be deleted. Accounts can be deactivated. IP addresses change. Transaction records expire from banking apps. Preserve evidence immediately \u2014 before you even file the complaint.<\/p>\n<h3 id=\"bsa-63-certificate\">BSA Section 63 Certificate Requirements<\/h3>\n<p>Under BSA Section 63, electronic records are admissible as documents. But admissibility requires a proper certificate. Without it, your evidence can be challenged and potentially excluded.<\/p>\n<p>The Section 63 certificate must include:<\/p>\n<ul>\n<li><strong>Part 1 (Device Owner Certificate):<\/strong>\n<ul>\n<li>Identification of the electronic record<\/li>\n<li>Description of how it was produced<\/li>\n<li>Details about the device (make, model, operating system)<\/li>\n<li>Statement that the device was in regular use and functioning properly<\/li>\n<li>Signed by the person in charge of the device<\/li>\n<\/ul>\n<\/li>\n<li><strong>Part 2 (Expert Certificate):<\/strong>\n<ul>\n<li>Verification by a qualified expert<\/li>\n<li>Hash value verification (to prove the record was not tampered with)<\/li>\n<li>Chain of custody documentation<\/li>\n<li>Forensic acquisition methodology used<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>The Delhi High Court (2024) specifically held that WhatsApp screenshots without proper Section 63 certification are insufficient. Device and platform linkage must be established \u2014 meaning you must prove the screenshot came from a specific device, at a specific time, from a verified account.<\/p>\n<h3 id=\"evidence-checklist\">Evidence Preservation Checklist<\/h3>\n<p>Use this checklist immediately upon discovering a cyber crime:<\/p>\n<p><strong>Financial fraud (UPI\/bank):<\/strong><\/p>\n<ul>\n<li>\u2610 Screenshot all transaction details from your banking app (amount, date, time, transaction ID, beneficiary)<\/li>\n<li>\u2610 Screenshot the fraudulent UPI ID or account number<\/li>\n<li>\u2610 Download bank statement showing the fraudulent transaction (PDF from net banking)<\/li>\n<li>\u2610 Save SMS alerts related to the transaction<\/li>\n<li>\u2610 Do NOT delete any messages from the accused<\/li>\n<\/ul>\n<p><strong>Social media \/ messaging fraud:<\/strong><\/p>\n<ul>\n<li>\u2610 Screenshot the fraudulent profile or page (include URL in the screenshot)<\/li>\n<li>\u2610 Screenshot all conversations with timestamps visible<\/li>\n<li>\u2610 Note the accused&#8217;s user ID, phone number, and profile URL<\/li>\n<li>\u2610 Export WhatsApp chat (Settings > Chats > Export Chat) \u2014 this creates a verifiable log<\/li>\n<li>\u2610 Record screen if possible (video evidence of the fraudulent content)<\/li>\n<\/ul>\n<p><strong>Hacking \/ unauthorised access:<\/strong><\/p>\n<ul>\n<li>\u2610 Do NOT restart or shut down the affected device<\/li>\n<li>\u2610 Screenshot any error messages, unauthorised access alerts, or changed settings<\/li>\n<li>\u2610 Check and screenshot login history (email, social media, banking apps)<\/li>\n<li>\u2610 Preserve server logs if available (for businesses)<\/li>\n<li>\u2610 Engage a certified forensic examiner for device imaging before taking any action<\/li>\n<\/ul>\n<p><strong>For all types:<\/strong><\/p>\n<ul>\n<li>\u2610 Note the exact date and time you discovered the crime<\/li>\n<li>\u2610 Save all evidence in multiple locations (cloud backup + external drive)<\/li>\n<li>\u2610 Get a Section 63 BSA certificate prepared by a qualified expert<\/li>\n<li>\u2610 Maintain a written log of every step you took (chronological record)<\/li>\n<\/ul>\n<p><!-- H2-7 --><\/p>\n<h2 id=\"legal-remedies\">Legal Remedies Available to Cyber Crime Victims<\/h2>\n<p>Victims of cyber crime have both criminal and civil remedies available. The choice depends on whether you want punishment for the accused, recovery of money, or both.<\/p>\n<h3 id=\"criminal-remedies\">Criminal Remedies<\/h3>\n<ol>\n<li><strong>FIR under BNS + IT Act<\/strong> \u2014 the primary remedy. File at your local police station, via e-FIR (BNSS Section 173), or through cybercrime.gov.in. The police investigate and file a chargesheet.<\/li>\n<li><strong>Complaint to Magistrate (BNSS Section 175)<\/strong> \u2014 if the police refuse to register your FIR, file a complaint directly with the jurisdictional Magistrate who can direct the police to investigate.<\/li>\n<li><strong>Complaint to Superintendent of Police<\/strong> \u2014 if the SHO refuses to register the FIR, send a written complaint to the district SP. The SP must either investigate or direct investigation.<\/li>\n<\/ol>\n<h3 id=\"civil-remedies\">Civil Remedies and Compensation<\/h3>\n<ol>\n<li><strong>IT Act Section 43 \u2014 Compensation up to \u20b95 crore<\/strong> \u2014 civil remedy for unauthorised access, data damage, or system disruption. File before the Adjudicating Officer appointed under the IT Act. No criminal prosecution required.<\/li>\n<li><strong>Civil suit for damages<\/strong> \u2014 file a civil suit for recovery of losses caused by the cyber crime. Can be filed alongside criminal proceedings.<\/li>\n<li><strong>Banking ombudsman complaint<\/strong> \u2014 for UPI\/banking fraud where the bank failed to take timely action on your report. File with the RBI&#8217;s Banking Ombudsman.<\/li>\n<li><strong>Consumer forum complaint<\/strong> \u2014 if the cyber crime involves deficiency of service by a digital platform or bank. File under the Consumer Protection Act, 2019.<\/li>\n<\/ol>\n<p><a href=\"https:\/\/lawsikho.com\/critical-criminal-litigation\">LawSikho&#8217;s Critical Criminal Litigation programme<\/a> covers both criminal and civil remedies for cyber crime cases, including FIR drafting under the new BNS framework.<\/p>\n<p><!-- H2-8 --><\/p>\n<h2 id=\"exemptions\">Exemptions and Defences in Cyber Crime Cases<\/h2>\n<p>Not every digital activity that seems suspicious constitutes a cyber crime. Several statutory defences and exemptions exist.<\/p>\n<p><strong>1. Good Faith Exemption (IT Act Section 79)<\/strong><\/p>\n<p>Who is protected: intermediaries (social media platforms, e-commerce marketplaces, ISPs) that merely provide access to third-party content.<\/p>\n<p>Legal basis: Section 79, Information Technology Act, 2000.<\/p>\n<p>Scope: exempt FROM liability for third-party content hosted on the platform. NOT exempt from: liability if the intermediary had actual knowledge of the illegal content and failed to act, or if the intermediary modified or selected the content.<\/p>\n<p>Conditions: the intermediary must comply with IT (Intermediary Guidelines) Rules, 2021. Must have a grievance redressal mechanism. Must remove content within 36 hours of a government or court order.<\/p>\n<p>Practical implication: if your complaint is against a platform (Facebook, WhatsApp, Amazon) for hosting fraudulent content, the platform may invoke Section 79 immunity. Your remedy is against the person who posted the fraudulent content, not the platform \u2014 unless the platform had actual knowledge and failed to act.<\/p>\n<p><strong>2. Authorised Access Defence<\/strong><\/p>\n<p>Who is protected: persons who access a computer system with proper authorisation (system administrators, IT security auditors, authorised penetration testers).<\/p>\n<p>Legal basis: Section 66 IT Act requires &#8220;without permission of the owner&#8221; as an element. BNS Section 303 requires &#8220;dishonest intention.&#8221;<\/p>\n<p>Scope: exempt FROM prosecution if the access was authorised by the system owner. NOT exempt from: liability if the authorised person exceeded the scope of their authorisation or used access for personal gain.<\/p>\n<p>Conditions: authorisation must be documented. Verbal permissions are difficult to prove. Best practice: maintain written authorisation with specific scope.<\/p>\n<p>Practical implication: ethical hackers and IT security professionals should always have written authorisation before conducting penetration testing. Without documentation, even authorised testing can be mistaken for hacking.<\/p>\n<p><strong>3. Bona Fide Research Exemption<\/strong><\/p>\n<p>Who is protected: security researchers who discover and report vulnerabilities in good faith.<\/p>\n<p>Legal basis: no explicit statutory exemption in Indian law. However, the IT Act Section 66 requires &#8220;intent to cause wrongful loss or damage&#8221; \u2014 bona fide research without malicious intent may not meet this element.<\/p>\n<p>Scope: this is a defence, not a statutory exemption. The accused must prove good faith and absence of malicious intent.<\/p>\n<p>Conditions: the researcher must report the vulnerability to the system owner. Must not exploit the vulnerability for personal gain. Must not access or exfiltrate data beyond what is necessary to demonstrate the vulnerability.<\/p>\n<p>Practical implication: India lacks a formal &#8220;safe harbour&#8221; for security researchers (unlike the US CFAA reforms). Researchers should coordinate through CERT-In&#8217;s responsible disclosure framework to minimise legal risk.<\/p>\n<p><strong>4. Preliminary Inquiry Threshold (BNSS Section 173(3))<\/strong><\/p>\n<p>Who is protected: accused persons in cases where the offence is punishable with 3-7 years imprisonment.<\/p>\n<p>Legal basis: Section 173(3), BNSS 2023.<\/p>\n<p>Scope: the police officer may conduct a preliminary inquiry before registering an FIR \u2014 with prior permission from a superior officer. This applies to cyber crimes like simple cheating (Section 317 BNS \u2014 up to 1 year) and hacking (Section 66 IT Act \u2014 up to 3 years).<\/p>\n<p>Conditions: applies only to offences punishable between 3-7 years. For offences punishable with 7+ years (Section 318 \u2014 cheating with delivery of property, Section 111 \u2014 organised crime), FIR registration is mandatory without preliminary inquiry.<\/p>\n<p>Practical implication: for minor cyber crimes, the police may conduct a preliminary investigation before formally registering an FIR. This is not refusal \u2014 it is a legally permitted intermediate step. But for serious financial fraud (Section 318) or organised cyber crime (Section 111), the police must register the FIR immediately.<\/p>\n<p><strong>5. Extraterritorial Jurisdiction Protection<\/strong><\/p>\n<p>Who is affected: foreign nationals and entities whose cyber activities involve an Indian computer or network.<\/p>\n<p>Legal basis: Section 75 IT Act \u2014 the Act applies to offences committed outside India if the act involves a computer, computer system, or network located in India.<\/p>\n<p>Scope: crimes under Sections 66, 66C, 66D, and 66F can be prosecuted in India even if committed by a foreign national abroad \u2014 provided they involve an Indian computer or network.<\/p>\n<p>Practical implication: international phishing operations targeting Indian bank customers can be prosecuted under Indian law. However, enforcement depends on mutual legal assistance treaties (MLATs) and cooperation from foreign law enforcement.<\/p>\n<p><!-- H2-9 --><\/p>\n<h2 id=\"common-mistakes\">Common Mistakes That Weaken Your Cyber Crime Case<\/h2>\n<p>Based on practitioner experience, these errors are the most common reasons cyber crime cases fail:<\/p>\n<p><strong>1. Delayed reporting.<\/strong> Every hour of delay reduces recovery chances in financial fraud. The 1930 helpline and golden hour system exist because speed is everything. Reporting 48 hours after a UPI fraud means the money has already been moved through multiple accounts.<\/p>\n<p><strong>2. Tampering with electronic evidence.<\/strong> Restarting a hacked device, deleting suspicious messages, or taking screenshots without proper metadata preservation. Once evidence is tampered with, even accidentally, the BSA Section 63 certificate becomes harder to obtain.<\/p>\n<p><strong>3. Filing in the wrong jurisdiction.<\/strong> Under BNSS, Zero FIR eliminates this problem \u2014 any police station must register. But many victims still waste days finding the &#8220;right&#8221; police station. File wherever you are. The case will be transferred to the appropriate jurisdiction after registration.<\/p>\n<p><strong>4. Incomplete FIR details.<\/strong> Vague descriptions like &#8220;someone cheated me online&#8221; are insufficient. Include: transaction IDs, account numbers, UPI IDs, phone numbers, email addresses, IP addresses (if known), and exact amounts. The more specific your FIR, the faster the investigation.<\/p>\n<p><strong>5. Not citing the correct sections.<\/strong> Filing under only Section 420 IPC (now Section 318 BNS) when IT Act sections also apply. Always cite both BNS and IT Act provisions. For organised fraud, include Section 111 BNS. For identity theft, include Section 66C IT Act alongside BNS Section 319(2).<\/p>\n<p><strong>6. Not preserving the Section 63 certificate.<\/strong> Many victims preserve screenshots but forget the BSA Section 63 certificate. Without the certificate, your electronic evidence may be inadmissible. Get the certificate prepared immediately \u2014 do not wait until trial.<\/p>\n<p><!-- H2-10 --><\/p>\n<h2 id=\"upi-fraud\">UPI Fraud: Special Procedures and Recovery<\/h2>\n<p>UPI fraud deserves special attention because it is the most common cyber crime in India and has specific recovery mechanisms that do not apply to other cyber crimes.<\/p>\n<p>The scale: over 13 lakh UPI fraud cases in FY25 with losses exceeding \u20b91,000 crore. In the first 8 months of FY26, losses already hit \u20b9805 crore across 10.64 lakh incidents.<\/p>\n<p><strong>Immediate steps for UPI fraud recovery:<\/strong><\/p>\n<ol>\n<li><strong>Within 1 hour:<\/strong> Call 1930 with transaction details (amount, time, UPI ID of receiver, your bank account number)<\/li>\n<li><strong>Within 2 hours:<\/strong> File complaint on <a href=\"https:\/\/cybercrime.gov.in\" target=\"_blank\" rel=\"noopener\">cybercrime.gov.in<\/a> \u2014 select &#8220;Report Financial Fraud&#8221;<\/li>\n<li><strong>Within 24 hours:<\/strong> Visit your bank and file a written complaint requesting chargeback\/dispute resolution<\/li>\n<li><strong>Within 3 days:<\/strong> File e-FIR at your local police station under BNSS Section 173 \u2014 cite BNS Section 318 + IT Act Section 66D<\/li>\n<li><strong>Within 30 days:<\/strong> File a complaint with the Banking Ombudsman if the bank has not resolved your dispute<\/li>\n<\/ol>\n<p><strong>Why the golden hour matters:<\/strong><\/p>\n<p>When you report within the first hour, the CFMC can freeze the accused&#8217;s bank account before the money is moved to another account. Once the money passes through 2-3 mule accounts, recovery becomes nearly impossible. The national average recovery rate is only 6% \u2014 but states with active golden hour protocols achieve 80%+ recovery rates.<\/p>\n<p><strong>FIR mandatory for:<\/strong><\/p>\n<ul>\n<li>Losses exceeding \u20b910 lakh (mandatory under the e-Zero FIR initiative)<\/li>\n<li>Any cognizable offence under BNS\/IT Act<\/li>\n<li>When banks require an FIR for processing your fund recovery claim<\/li>\n<\/ul>\n<p><!-- Disclaimer --><\/p>\n<h2 id=\"disclaimer\">Disclaimer<\/h2>\n<p>This article is for informational and educational purposes only. It does not constitute legal advice. Cyber crime laws are complex and fact-specific \u2014 the applicable sections depend on the specific circumstances of each case. For advice on your case, consult a criminal lawyer experienced in cyber crime matters. <a href=\"https:\/\/lawsikho.com\/critical-criminal-litigation\">LawSikho&#8217;s Critical Criminal Litigation programme<\/a> provides structured training on BNS\/BNSS\/BSA but is not a substitute for personalised legal counsel.<\/p>\n<p><!-- FAQ --><\/p>\n<h2 id=\"faq\">Frequently Asked Questions<\/h2>\n<h3>Getting Started<\/h3>\n<p><strong>1. How do I file a cyber crime FIR online in India?<\/strong><\/p>\n<p>You have three channels: (1) File on the National Cyber Crime Reporting Portal at cybercrime.gov.in \u2014 register with mobile OTP, select crime category, fill details, upload evidence; (2) File an e-FIR by sending complaint via electronic communication to your local police station under BNSS Section 173(1)(ii) \u2014 sign within 3 days; (3) Call 1930 for financial fraud. All three can be used simultaneously.<\/p>\n<p><strong>2. What is the 1930 helpline and when should I call it?<\/strong><\/p>\n<p>The 1930 helpline is India&#8217;s national cyber financial fraud helpline operated by the Cyber Fraud Mitigation Centre (CFMC). Call it immediately upon discovering any financial fraud \u2014 UPI scam, net banking fraud, card fraud. The first hour (golden hour) is critical for freezing the accused&#8217;s account and recovering funds. The national average recovery rate is only 6%, but states with active golden hour protocols achieve 80%+ recovery.<\/p>\n<p><strong>3. Can any police station register my cyber crime FIR?<\/strong><\/p>\n<p>Yes. Under BNSS Section 173(1), any police station must register an FIR for a cognizable offence regardless of where the crime occurred (Zero FIR). If the SHO refuses, send a written complaint to the Superintendent of Police. You can also file directly on cybercrime.gov.in or approach the Magistrate under BNSS Section 175.<\/p>\n<h3>Legal Framework<\/h3>\n<p><strong>4. What is BNS Section 111 and when does it apply to cyber crime?<\/strong><\/p>\n<p>Section 111 of the Bharatiya Nyaya Sanhita classifies cyber crime committed by organised syndicates as &#8220;organised crime&#8221; \u2014 punishable with life imprisonment to death. It applies when: (a) there is continuing unlawful activity (multiple charge-sheets in 10 years OR losses > \u20b91 crore); (b) the accused acts as part of a syndicate; (c) for financial benefit. Single-incident frauds do not trigger Section 111.<\/p>\n<p><strong>5. Which sections should I cite in my cyber crime FIR?<\/strong><\/p>\n<p>Cite both BNS and IT Act provisions. For online cheating: BNS Section 318 + IT Act Section 66D. For identity theft: BNS Section 319(2) + IT Act Section 66C. For hacking: BNS Section 303 + IT Act Section 66. For organised cyber fraud: add BNS Section 111. For forgery: BNS Section 336. Multiple provisions strengthen your case.<\/p>\n<p><strong>6. Are WhatsApp screenshots admissible as evidence in cyber crime cases?<\/strong><\/p>\n<p>Yes, but only with a proper BSA Section 63 certificate. The certificate requires two parts: (1) device owner certificate identifying the electronic record and device details; (2) expert certificate with hash verification and chain of custody documentation. The Delhi High Court (2024) held that screenshots without certification are insufficient. Preserve evidence immediately and get the certificate prepared before trial.<\/p>\n<h3>Process and Procedures<\/h3>\n<p><strong>7. What is the difference between an FIR and a complaint on cybercrime.gov.in?<\/strong><\/p>\n<p>A complaint on cybercrime.gov.in is an information report that gets routed to the relevant cyber cell \u2014 it may or may not result in an FIR depending on the cyber cell&#8217;s assessment. An FIR under BNSS Section 173 is a formal police registration that triggers mandatory investigation. For best results, do both: file on cybercrime.gov.in AND register an FIR at your local station or via e-FIR.<\/p>\n<p><strong>8. What happens after I file a cyber crime FIR?<\/strong><\/p>\n<p>The investigation follows this sequence: (1) Police contact your bank\/payment platform for transaction records; (2) They trace the accused&#8217;s bank account and request account details from the beneficiary bank; (3) If the accused is identified, police issue summons or make arrests; (4) Police collect electronic evidence and prepare a chargesheet under BNSS Section 193; (5) Chargesheet is filed in court within 60-90 days. You receive updates if you track via the NCRP portal.<\/p>\n<p><strong>9. Can I get anticipatory bail in a cyber crime case?<\/strong><\/p>\n<p>For most cyber crimes (Sections 317, 318, 319 BNS, Section 66 IT Act), anticipatory bail under BNSS Section 482 is available. For organised cyber crime under BNS Section 111, anticipatory bail is extremely difficult \u2014 the offence is non-bailable. The court considers the nature of accusation, severity of evidence, and whether the accused is likely to flee or tamper with evidence.<\/p>\n<h3>Recovery and Remedies<\/h3>\n<p><strong>10. How do I recover money lost in UPI fraud?<\/strong><\/p>\n<p>Speed is everything. Call 1930 within the first hour. File on cybercrime.gov.in. Complain to your bank in writing within 24 hours requesting chargeback. File e-FIR within 3 days. If the bank doesn&#8217;t resolve within 30 days, complain to the Banking Ombudsman. The golden hour protocol can freeze the accused&#8217;s account before funds are transferred further.<\/p>\n<p><strong>11. Can I claim compensation without filing a criminal case?<\/strong><\/p>\n<p>Yes. IT Act Section 43 provides a civil remedy \u2014 compensation up to \u20b95 crore for unauthorised access, data damage, or system disruption. File before the Adjudicating Officer appointed under the IT Act. No criminal prosecution is required. You can also file a consumer complaint if the cyber crime involves deficiency of service by a platform or bank.<\/p>\n<p><strong>12. What is the time limit for filing a cyber crime complaint?<\/strong><\/p>\n<p>There is no specific time limit for filing an FIR for cognizable offences. However, for financial fraud, delay drastically reduces recovery chances \u2014 report within 1 hour for the best chance of fund freezing. For IT Act offences, the limitation period is generally 3 years from the date of the offence. For BNS offences, there is no limitation for offences punishable with 3+ years imprisonment.<\/p>\n<h3>Advanced and Special Cases<\/h3>\n<p><strong>13. Can a cyber crime committed outside India be prosecuted here?<\/strong><\/p>\n<p>Yes. IT Act Section 75 gives extraterritorial jurisdiction \u2014 offences committed outside India are prosecutable if they involve a computer, computer system, or network located in India. International phishing operations targeting Indian bank customers can be prosecuted under Sections 66, 66C, 66D, and 66F. Enforcement depends on MLAT cooperation with the country where the accused is located.<\/p>\n<p><strong>14. My employer falsely accused me of data theft \u2014 what are my defences?<\/strong><\/p>\n<p>Key defences: (1) Authorised access \u2014 you had written permission to access the data as part of your role; (2) No dishonest intention \u2014 BNS Section 303 requires intent to cause wrongful loss; (3) No data was actually taken \u2014 accessing is not the same as theft under BNS Section 303; (4) The data was not &#8220;property&#8221; capable of being stolen. Document your authorisation, job description, and the scope of your access rights. Seek legal counsel immediately.<\/p>\n<p><strong>15. Can I file a cyber crime complaint against someone who defamed me on social media?<\/strong><\/p>\n<p>Yes. Online defamation is covered under BNS Section 356 (defamation). If the defamation involves forgery or impersonation, add BNS Section 336 (forgery) and IT Act Section 66D. However, defamation is a compoundable offence \u2014 meaning you can settle. For serious cases involving identity theft or morphed images, add IT Act Section 66C (identity theft) and Section 66E (violation of privacy). File on cybercrime.gov.in under &#8220;Social Media Crime.&#8221;<\/p>\n<p><!-- Conclusion --><\/p>\n<h2 id=\"conclusion\">Conclusion<\/h2>\n<p>India&#8217;s new criminal laws have given both victims and prosecutors stronger tools to fight cyber crime. BNS Section 111 targets organised cyber syndicates with life imprisonment. BNSS Section 173 enables e-FIR and Zero FIR, eliminating jurisdictional barriers. BSA Section 63 makes electronic evidence more accessible \u2014 with proper certification.<\/p>\n<p>But the law only works if you act fast. Call 1930 within the golden hour. Preserve evidence before filing. Cite the correct BNS and IT Act provisions. Get your BSA Section 63 certificate prepared immediately. The difference between recovering your money and losing it permanently is measured in hours, not days.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last verified: April 2026 Cyber crime in India hit \u20b9805 crore in losses in just the first eight months of FY26, with over 10.64 lakh reported incidents. UPI fraud alone&hellip;<\/p>\n","protected":false},"author":32,"featured_media":5311,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5303","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/lawsikho.com\/blog\/wp-json\/wp\/v2\/posts\/5303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lawsikho.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lawsikho.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lawsikho.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/lawsikho.com\/blog\/wp-json\/wp\/v2\/comments?post=5303"}],"version-history":[{"count":1,"href":"https:\/\/lawsikho.com\/blog\/wp-json\/wp\/v2\/posts\/5303\/revisions"}],"predecessor-version":[{"id":5304,"href":"https:\/\/lawsikho.com\/blog\/wp-json\/wp\/v2\/posts\/5303\/revisions\/5304"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lawsikho.com\/blog\/wp-json\/wp\/v2\/media\/5311"}],"wp:attachment":[{"href":"https:\/\/lawsikho.com\/blog\/wp-json\/wp\/v2\/media?parent=5303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lawsikho.com\/blog\/wp-json\/wp\/v2\/categories?post=5303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lawsikho.com\/blog\/wp-json\/wp\/v2\/tags?post=5303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}