First, understand the core legal risk.
Under the IT Act, offences such as unauthorised access (section 43/66), data theft, or hacking are triggered only if you accessed a system without permission or exceeded authorised access. Merely possessing leaked data is not automatically illegal, but how you obtained it becomes crucial. If the company can suggest that the data was procured by intrusion, scraping, password misuse, or backend access, they may attempt criminal action.
Therefore, your entire strategy must be built around showing lawful, passive, or third-party receipt of data, not active extraction.
Second, never submit raw leaked data directly in open court filings.
Do not annex full datasets, spreadsheets, databases, or personal records of third parties to petitions, complaints, or affidavits. This is the biggest mistake people make. Producing bulk personal data publicly can expose you to allegations of:
unlawful retention of personal data,
violation of privacy,
and misuse of sensitive information.
Instead, rely on derivative proof, not primary disclosure.
Third, document the source of the leaked data carefully.
You must be able to clearly state, on affidavit if required, that:
the data came to you unsolicited, or
it was received from affected individuals themselves, or
it was available through a publicly accessible source, misconfigured server, open link, or email, or
it was shared by another lawful recipient (customer, vendor, employee).
Do not speculate. If you cannot safely explain the source, do not personally hold the data.
Fourth, use hashing, redaction, and sampling instead of full disclosure.
Courts accept proof of data leaks through:
redacted samples (masking names, IDs, phone numbers),
hashes of files (to prove authenticity without revealing contents),
metadata (timestamps, file paths, headers),
screenshots showing exposure (without downloading full files),
and controlled samples showing identical patterns across multiple affected users.
This establishes the existence and scale of a leak without circulating sensitive content.
Fifth, route evidence through a neutral authority.
The safest method is to never be the final custodian of the leaked data.
You can:
submit sealed material to the court with a request that it be opened only by the court,
request appointment of a court commissioner / forensic expert to examine the data source,
lodge a complaint before the CERT-In, Data Protection Board, or sectoral regulator (depending on the data type),
or have affected users individually file affidavits confirming that their data was exposed.
Once a statutory or judicial authority takes custody, your personal exposure drops sharply.
Sixth, rely heavily on circumstantial and corroborative evidence.
Data breach cases do not require you to prove hacking line-by-line. Courts accept:
identical errors across multiple records,
data fields that only the company possesses,
timestamps matching company system events,
breach notifications (or lack thereof),
logs, emails, or admissions,
and expert opinions based on limited samples.
A pattern is often more powerful than raw data.
Seventh, protect yourself procedurally before making allegations.
Before filing any complaint or suit:
consult counsel and prepare a protective affidavit explaining lawful possession,
avoid public disclosure (social media, blogs, mass emails),
do not communicate directly with the company threatening exposure,
and preserve evidence in a read-only, non-tampered form.
If a complaint is filed through an advocate, allegations of “hacking” lose credibility.
Eighth, anticipate and neutralise retaliation.
If you reasonably fear retaliatory FIRs or seizure:
approach the court proactively and seek protection,
record that you are willing to cooperate with any neutral forensic examination,
explicitly deny unauthorised access in pleadings,
and request that any technical examination be court-supervised.
Courts are increasingly sensitive to SLAPP-style retaliation in data and whistle-blower matters.
In short, the rule is simple:
Do not act like an investigator; act like a reporter of a breach.
You prove that a leak exists, not how to exploit it.