Evidence Law

Authentication

Authentication in law is the process of verifying and proving the genuineness of a document, signature, electronic record, or other evidence so that it can be admitted and relied upon in court proceedings.


What is Authentication?


**Authentication** is the legal process of **establishing the genuineness** of a document, signature, seal, electronic record, or other piece of evidence — proving that it is what it claims to be, that it was made or executed by the person who purportedly made it, and that it has not been tampered with or forged. Before a document can be admitted as evidence in court and given evidentiary weight, it must be properly authenticated.


In everyday terms, authentication answers the fundamental question: "Is this document real?" When someone presents a contract in court claiming it was signed by the opposing party, the court needs proof that the signature is genuine and the document has not been altered. The process of providing that proof is authentication.


Legal Definition and Framework


Authentication of documents in India is governed primarily by the **Indian Evidence Act, 1872 (Sections 67-73)** — now largely replaced by the **Bharatiya Sakshya Adhiniyam, 2023 (BSA)** — and by specific provisions in other statutes.


Authentication of Private Documents


**Section 67 of the Evidence Act (Section 69 BSA):**


If a document is alleged to be signed or to have been written wholly or in part by any person, the signature or the handwriting of so much of the document as is alleged to be in that person's handwriting must be proved to be in their handwriting. This is the foundational provision — the proponent of a document must prove that the signatures and handwriting on it are genuine.


**Methods of proving handwriting and signatures:**


- **Section 47 (Section 46 BSA):** Opinion of a person who is acquainted with the handwriting of the person alleged to have written the document is relevant. This includes persons who have seen the person write, who have received documents purporting to be in their handwriting, or who have in the ordinary course of business regularly received documents reputed to be in their handwriting.


- **Section 45 (Section 44 BSA):** The opinion of a **handwriting expert** is relevant. Courts regularly rely on reports from government examiners of questioned documents and forensic science laboratories.


- **Section 73 (Section 75 BSA):** The court may itself **compare** the disputed handwriting or signature with an admitted or proved specimen of the person's handwriting. The court may also direct any person present in court to write specified words for the purpose of comparison.


Authentication of Public Documents


**Section 74 (Section 76 BSA)** defines public documents to include documents forming the acts of sovereign authority, official bodies, tribunals, and public officers. **Section 77 (Section 79 BSA)** provides that **certified copies** of public documents are admissible as proof of the contents of the original.


- **Section 76 (Section 78 BSA):** Every public officer having the custody of a public document is bound to give certified copies of it to any person who has a right to inspect the document.


- **Section 79 (Section 81 BSA):** The court shall **presume** that every document purporting to be a certificate or certified copy of a public document is genuine. This is a significant evidentiary presumption that eases the authentication burden for public documents.


Authentication of Electronic Records


With the increasing prevalence of digital evidence, authentication of electronic records has become critical:


- **Section 65A and 65B of the Evidence Act (Section 63 BSA):** Electronic records can be admitted as evidence if accompanied by a **certificate** (under Section 65B(4)) from a person who is in a responsible official position in relation to the operation of the relevant device or the management of the relevant activities. The certificate must identify the electronic record, describe how it was produced, and state that the device was operating properly.


- The Supreme Court in **Anvar P.V. v. P.K. Basheer (2014) 10 SCC 473** held that electronic evidence is inadmissible without the mandatory certificate under Section 65B(4). This was partially relaxed in **Arjun Panditrao Khotkar v. Kailash Kushanrao Gorantyal (2020) 7 SCC 1**, where the court clarified that if the original electronic device is produced, the certificate is not required, but if secondary evidence (printout, copy) is relied upon, the certificate is mandatory.


- **Section 85A (Section 88 BSA):** The court shall presume that every electronic record purporting to be an agreement containing the **electronic signature** of the parties was concluded by them.


Authentication Under Other Statutes


- **Registration Act, 1908:** Documents compulsorily registrable (like sale deeds) are authenticated through the process of **registration** before the Sub-Registrar, who verifies the identity of the executants and their signatures.


- **Notaries Act, 1952:** **Notarised documents** carry a presumption of authentication — the notary's seal and signature authenticate the signatures of the parties who signed before the notary.


- **Information Technology Act, 2000:** **Digital signatures** and **electronic signatures** authenticate electronic documents. Section 3 of the IT Act provides for authentication of electronic records through digital signatures using asymmetric cryptography.


When Does This Term Matter?


Proving Documents in Court


Every document produced in court must be **proved** (authenticated) before it can be treated as evidence. Under **Section 61-66 of the Evidence Act**, documents may be proved by:


- **Primary evidence** (Section 62) — the original document itself.

- **Secondary evidence** (Section 63) — certified copies, photocopies, or oral accounts of the contents, when the original is unavailable.


The party relying on a document must call a witness who can authenticate it — typically the author, the signatory, an attesting witness, or an expert.


Challenging Authentication — Disputed Documents


The opposing party may challenge the authentication of a document by:


- Denying the signature or handwriting.

- Alleging forgery or fabrication.

- Challenging the chain of custody (for electronic records).

- Questioning the reliability of the electronic device or system that produced the record.


When a document is challenged, the burden of proving its genuineness falls on the party relying on it. The court may order a **forensic examination** of the document — including chemical analysis of ink and paper, examination of fingerprints, and digital forensic analysis for electronic records.


Presumptions That Ease Authentication


The Evidence Act provides several presumptions that reduce the burden of authentication:


- **Section 79:** Certified copies of public documents are presumed genuine.

- **Section 80:** Documents produced as record of evidence in court are presumed genuine.

- **Section 85:** Powers of attorney authenticated by a notary are presumed to be executed and authenticated as required by law.

- **Section 90:** Documents thirty years old, produced from proper custody, are presumed genuine without formal proof of signature or handwriting.


Practical Significance


- **Always preserve originals** — courts give maximum evidentiary value to original documents. Keep originals safely and produce them when required.

- **Electronic evidence requires a certificate** — failure to comply with Section 65B requirements can render crucial digital evidence inadmissible.

- **Get documents notarised or registered** where possible — this provides a presumption of authentication that significantly eases the burden of proof.

- **Forensic examination** can take months — factor in the time required for handwriting analysis, digital forensics, and chemical testing when planning litigation strategy.

- **Maintain proper records** of electronic communications — metadata, server logs, and timestamps can be critical for authenticating emails, messages, and digital transactions.


Frequently Asked Questions


How is a WhatsApp message authenticated in court?


WhatsApp messages are **electronic records** and must be authenticated under **Section 65B of the Evidence Act (Section 63 BSA)**. The party relying on the messages must produce a **certificate** under Section 65B(4) from a person familiar with the device on which the messages were received or stored. Additionally, the party must establish the identity of the sender — which can be done through evidence that the phone number belongs to the sender, corroborating circumstances, and the content of the messages. Courts have admitted WhatsApp messages as evidence when properly authenticated, including in matrimonial disputes, commercial litigation, and criminal cases.


Can a photocopy of a document be used as evidence?


A photocopy is **secondary evidence** under **Section 63 of the Evidence Act**. It can be admitted only when the conditions for admitting secondary evidence under **Section 65** are satisfied — for example, when the original is lost, destroyed, in the possession of the opposing party, or a public document. The party must first show why the original is not being produced and then prove that the photocopy is a true reproduction of the original. Courts are cautious about photocopies because they can be more easily fabricated than originals.


What is the role of a forensic handwriting expert in authentication?


A **forensic handwriting expert** (examiner of questioned documents) compares disputed handwriting or signatures with admitted or known specimens of the person's handwriting. The expert analyses characteristics such as pen pressure, letter formation, spacing, slant, and connecting strokes. Their opinion is admissible under **Section 45 of the Evidence Act (Section 44 BSA)** as expert evidence. However, the court is not bound by the expert's opinion — it is merely one piece of evidence that the court considers alongside other evidence. The Supreme Court in **Murari Lal v. State of M.P. (1980) 1 SCC 704** held that while expert opinion on handwriting is valuable, it must be corroborated by other circumstances.


Does a digitally signed document need further authentication?


A document bearing a valid **digital signature** as defined under **Section 3 of the Information Technology Act, 2000** is presumed to be authenticated by the person whose digital signature it bears, under **Section 85B of the Evidence Act (Section 88A BSA)**. The digital signature itself provides authentication because it uses asymmetric cryptography — a private key known only to the signer and a public key that can verify the signature. However, the presumption is rebuttable, and the opposing party can challenge the digital signature by proving that the private key was compromised, the certificate was invalid, or the system was tampered with.


Disclaimer: This glossary entry is for informational purposes only and does not constitute legal advice.