Document Fragment View
Fragment Information
Showing contexts for: cloud computing in Manoj Malviya vs The State Of Madhya Pradesh on 27 May, 2021Matching Fragments
7. Heard the learned counsel for the parties and perused the record.
8. On perusal of the record, it is found that so far as the applicant's second bail application M.Cr.C.No. 48438/2020 is concerned, this Court, in its order dated 21.12.2020 has held as under:-
"6. It is further submitted that though the charge sheet has been filed due to compulsion of the time limit prescribed by the law but the investigation with regard to the data stored in, several electronic devices are still going on. It is asserted that many gadgets, computers, widgets used to save data in encrypted digitized form have been seized and to extract the truth, the data has to be decrypted, decoded and retrieved. This will reveal several misdeeds of the persons involved in the crime. The offence is a very complicated one. The data saved in digitised form is protected by the passwords etc. It is not very easy to crack the password and retrieve the data. The petitioner is a software engineer. He has developed the software. He knows all the commands. On finding an opportunity, it will be very easy for him to corrupt or delete the data stored in the hard disc, clouds etc. or from the gadgets or the computers forever and bail may provide him such an opportunity. The petitioner can easily remove all the clues, evidence of the crime by sitting anywhere in the country or abroad if he gets access to the machines. This will seriously impair the investigation or hamper the same.
"7. Further, it is asserted that many gadgets, computers, widgets used to save data in encrypted digitised form have been seized and to extract the truth, the data has to be decrypted, decoded and retrieved. This will reveal several misdeeds of the persons involved in the crime. The offence is a very complicated one. The data preserved in digitised form is protected by the passwords etc. It is not very easy to retrieve the data after cracking the passwords. The petitioner is a software engineer. He has developed the software. He knows all the commands. On finding an opportunity, it is very easy for him to corrupt or delete data from the hard disc, clouds etc. or from the gadgets or the computers forever and bail may provide him such an opportunity. The petitioner can easily remove all the clues, evidence of the crime by sitting anywhere in the country or abroad if he gets access to the machines. This will seriously impair the investigation or hamper the same.