{"id":21559,"date":"2026-04-06T07:55:21","date_gmt":"2026-04-06T07:55:21","guid":{"rendered":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/?p=21559"},"modified":"2026-04-06T08:02:45","modified_gmt":"2026-04-06T08:02:45","slug":"standard-operating-procedure-sop-investigation-of-offences-under-the-copyright-act-1957","status":"publish","type":"post","link":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/standard-operating-procedure-sop-investigation-of-offences-under-the-copyright-act-1957\/","title":{"rendered":"Standard Operating Procedure (SOP) &#8211; Investigation of Offences under the Copyright Act, 1957"},"content":{"rendered":"<ol>\n<li><strong>Introduction<\/strong><\/li>\n<\/ol>\n<p>Copyright protection is a cornerstone of Intellectual Property Rights (IPR) law, safeguarding the creative output of authors, artists, musicians, filmmakers, and software developers. Criminal infringement\u2014the unauthorized reproduction, distribution, or sale of copyrighted works\u2014not only causes massive economic loss but also stifles innovation.<\/p>\n<p>This SOP provides a standardized framework for Law Enforcement Agencies (LEAs) in India to handle copyright complaints, conduct lawful searches, manage digital evidence, and ensure successful prosecution under the current legal landscape.<\/p>\n<p><strong>Core Objectives:<\/strong><\/p>\n<ul>\n<li>Ensure uniform enforcement of the <strong>Copyright Act, 1957<\/strong>.<\/li>\n<li>Standardize evidentiary procedures in line with the <strong>BNSS, 2023<\/strong> and <strong>BSA, 2023<\/strong>.<\/li>\n<li>Protect the rights of creators while maintaining fair investigation protocols.<\/li>\n<li>Bridge the gap between traditional policing and technical\/digital intellectual property theft.<\/li>\n<\/ul>\n<ol start=\"2\">\n<li><strong> Legal Framework &amp; Jurisdiction<\/strong><\/li>\n<\/ol>\n<p>Investigations must be conducted within the intersection of IPR-specific laws and general criminal procedure.<\/p>\n<p><strong>A. Primary Statutes<\/strong><\/p>\n<ul>\n<li><strong>Copyright Act, 1957:<\/strong> The substantive law defining offences and powers.<\/li>\n<li><strong>Bharatiya Nagarik Suraksha Sanhita, 2023 (BNSS):<\/strong> Governs the procedure for investigation, search, and seizure (replacing CrPC).<\/li>\n<li><strong>Bharatiya Nyaya Sanhita, 2023 (BNS):<\/strong> Applied in cases involving fraud, cheating, or criminal conspiracy alongside copyright theft.<\/li>\n<li><strong>Bharatiya Sakshya Adhiniyam, 2023 (BSA):<\/strong> Governs the admissibility of evidence, particularly electronic records (replacing the Indian Evidence Act).<\/li>\n<li><strong>Information Technology Act, 2000:<\/strong> Relevant for <strong><em>server-side seizures<\/em><\/strong> and <strong><em>data decryption<\/em><\/strong>.<\/li>\n<\/ul>\n<p><strong><em>NOTE: <\/em><\/strong><\/p>\n<p><strong><em>Server-side seizure<\/em><\/strong><em> happens when the police take control of the remote computer (the server) that hosts an illegal website or app. Instead of just grabbing a physical laptop, they &#8220;lock down&#8221; the online storage where all the pirated movies, software, or user data are kept. This prevents the criminal from deleting the evidence from a distance and allows the police to shut down the illegal service immediately.<\/em><\/p>\n<p><strong><em>Data decryption<\/em><\/strong><em> is the process of unlocking files that have been scrambled or password-protected by criminals to hide their contents. Since pirates often &#8220;encrypt&#8221; their data to keep it secret, the police use special tools or legal orders under the IT Act to turn those codes back into readable files. This ensures that the evidence, such as stolen source code or illegal movies, can actually be seen and proved in a court of law.<\/em><\/p>\n<p><strong>B. Key Penal Provisions<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td>\n<p><strong>Section<\/strong><\/p>\n<\/td>\n<td>\n<p><strong>Description<\/strong><\/p>\n<\/td>\n<td>\n<p><strong>Nature of Offence<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><strong>Section 63<\/strong><\/p>\n<\/td>\n<td>\n<p>Infringement of Copyright or other rights.<\/p>\n<\/td>\n<td>\n<p><strong>Cognizable &amp; Non-Bailable<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><strong>Section 63A<\/strong><\/p>\n<\/td>\n<td>\n<p>Enhanced penalty for second and subsequent convictions.<\/p>\n<\/td>\n<td>\n<p>Cognizable<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><strong>Section 64<\/strong><\/p>\n<\/td>\n<td>\n<p>Power of Police to seize infringing copies and plates without warrant.<\/p>\n<\/td>\n<td>\n<p>Procedural Power<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><strong>Section 65<\/strong><\/p>\n<\/td>\n<td>\n<p>Possession of plates for the purpose of making infringing copies.<\/p>\n<\/td>\n<td>\n<p>Cognizable<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p><strong>Section 65A\/B<\/strong><\/p>\n<\/td>\n<td>\n<p>*Circumvention of technological measures and protection of Rights Management Info.<\/p>\n<\/td>\n<td>\n<p>Digital Offence<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><em>*Circumvention of technological measures<\/em><\/strong><em> means breaking or bypassing the digital &#8220;locks&#8221; that creators put on their work to stop piracy. For example, if a movie is protected by a password or special software that prevents it from being copied, and someone uses a &#8220;crack&#8221; or a hacking tool to get around that lock, they have committed this offence. It is essentially the act of breaking a digital security system to access or copy protected content.<\/em><\/p>\n<p><strong><em>Protection of Rights Management Information (RMI)<\/em><\/strong><em> refers to the digital &#8220;ID cards&#8221; attached to a work, such as watermarks, the author&#8217;s name, or terms of use hidden in the file&#8217;s data. If a pirate removes this digital info or changes the owner\u2019s name to hide the fact that the work is stolen, they are violating RMI protections. In simple terms, this law punishes people for tampering with the digital labels that prove who truly owns the work.<\/em><\/p>\n<p><strong>C. Legal Precedent:<\/strong> In <em>Knit Pro Industries vs. State of NCT of Delhi (2022)<\/em>, the Supreme Court clarified that offences under Section 63 are cognizable. This empowers the police to register an FIR and arrest without a warrant.<\/p>\n<p><strong>3. Essential Definitions for Investigators<\/strong><\/p>\n<ul>\n<li><strong>Work:<\/strong> Includes literary, dramatic, musical, artistic works, cinematograph films, and sound recordings.<\/li>\n<li><strong>Infringing Copy:<\/strong> Any reproduction made without the license\/consent of the owner. In the case of software, it includes unauthorized &#8220;cracked&#8221; versions.<\/li>\n<li><strong>Plate:<\/strong> Includes any block, mould, transfer, negative, or duplication equipment (including hard drive &#8220;masters&#8221; or server images) used for printing or reproducing copies.<\/li>\n<li><strong>Rights Management Information (RMI):<\/strong> Digital watermarks or metadata that identify the work and the author. Removing this is a specific offence under Section 65B.<\/li>\n<\/ul>\n<ol start=\"4\">\n<li><strong> Receipt and Scrutiny of Complaints<\/strong><\/li>\n<\/ol>\n<p>A criminal investigation begins with the receipt of a written complaint. The Investigating Officer (I.O.) must verify the &#8220;Locus Standi&#8221; (right to sue) of the complainant.<\/p>\n<p><strong>A. Who can file Complaint?<\/strong><\/p>\n<ul>\n<li>The original author or creator.<\/li>\n<li>The Copyright Owner (if different from the author, e.g., a music label).<\/li>\n<li>An Exclusive Licensee.<\/li>\n<li>An Authorized Representative\/Attorney (must possess a valid <strong>Power of Attorney<\/strong> or <strong>Letter of Authority<\/strong>).<\/li>\n<\/ul>\n<p><strong>B. Essential Documentation for the Complaint<\/strong><\/p>\n<p>The I.O. should request the following to build a prima facie case:<\/p>\n<ul>\n<li><strong>Proof of Ownership:<\/strong> Copyright registration certificate (though registration is optional in India, it serves as strong evidence).<\/li>\n<li><strong>Chain of Title:<\/strong> If the complainant is not the author, provide the <strong>Deed of Assignment<\/strong> or <strong>License Agreement<\/strong>.<\/li>\n<li><strong>Comparison Chart:<\/strong> A physical or digital side-by-side comparison of the original work and the alleged infringing copy.<\/li>\n<li><strong>Source Information:<\/strong> Precise location of the infringement (URL, shop address, or warehouse).<\/li>\n<\/ul>\n<ol start=\"5\">\n<li><strong> Preliminary Verification<\/strong><\/li>\n<\/ol>\n<p>Before registering an FIR, the I.O. should conduct a &#8220;Discreet Inquiry&#8221; to avoid malicious litigation:<\/p>\n<ul>\n<li><strong>Identity Check:<\/strong> Verify the credentials of the complainant and their firm.<\/li>\n<li><strong>Market Intelligence:<\/strong> Confirm if the accused is a known habitual offender or a legitimate reseller with a disputed license (the latter may be a civil matter).<\/li>\n<li><strong>Technical Check:<\/strong> If the infringement is digital, verify the URL\/Website is active.<\/li>\n<\/ul>\n<ol start=\"6\">\n<li><strong> Registration of FIR<\/strong><\/li>\n<\/ol>\n<p>Once the I.O. is satisfied that a cognizable offence is made out, an FIR must be registered under <strong>Section 173 of BNSS<\/strong>.<\/p>\n<p><strong>The FIR must explicitly mention:<\/strong><\/p>\n<ul>\n<li>The specific nature of the work (e.g., &#8220;Software Source Code&#8221; or &#8220;Cinematograph Film&#8221;).<\/li>\n<li>The specific sections (Section 63 for infringement, Section 65 for equipment).<\/li>\n<li>The &#8220;Knowledge&#8221; factor: State that the accused is knowingly infringing for commercial gain.<\/li>\n<\/ul>\n<ol start=\"7\">\n<li><strong> Search and Seizure Protocols<\/strong><\/li>\n<\/ol>\n<p>Under <strong>Section 64<\/strong>, any police officer (not below the rank of <strong>Sub-Inspector<\/strong>) can seize infringing copies without a warrant if they are satisfied that an offence is being committed.<\/p>\n<p><strong>A. Mandatory Compliance under BNSS<\/strong><\/p>\n<p>The new criminal laws place heavy emphasis on the integrity of the search process:<\/p>\n<ul>\n<li><strong>Independent Witnesses:<\/strong> Search must be conducted in the presence of at least two independent and respectable inhabitants of the locality (Panchas).<\/li>\n<li><strong>Mandatory Videography:<\/strong> Under <strong>Section 105 of BNSS<\/strong>, the search and seizure process <strong>must be videographed<\/strong>. This recording must be sent to the Magistrate without delay to prevent claims of &#8220;planted evidence.&#8221;<\/li>\n<li><strong>The Seizure Memo. (Panchnama):<\/strong> A detailed list of all items seized, signed by the I.O. and witnesses.<\/li>\n<\/ul>\n<p><strong>B. Items Subject to Seizure<\/strong><\/p>\n<ul>\n<li><strong>Infringing Material:<\/strong> Books, DVDs, merchandise, or unauthorized hardware.<\/li>\n<li><strong>Reproduction Tools:<\/strong> Printing plates, stencil duplicators, master hard drives, and &#8220;cracking&#8221; software.<\/li>\n<li><strong>Financial Evidence:<\/strong> Invoices, ledgers, and shipping labels that prove the scale of the piracy operation.<\/li>\n<\/ul>\n<p>C. <strong>Notification to Registrar<\/strong><\/p>\n<p>As per <strong>Section 64(2)<\/strong>, the I.O. must, as soon as practicable, inform the <strong>Registrar of Copyrights<\/strong> about the seizure. This is a statutory requirement often missed by investigators, which can be exploited by the defense.<\/p>\n<ol start=\"8\">\n<li><strong> Handling Digital and Cyber Evidence<\/strong><\/li>\n<\/ol>\n<p>Digital piracy (warez sites, torrents, Telegram bots) requires a specialized forensic approach.<\/p>\n<p><strong><em>NOTE: <\/em><\/strong><em>The services of a forensic expert may be required in such cases.<\/em><\/p>\n<p><em>Investigating digital piracy requires a shift from traditional physical evidence to <strong>cyber-forensics<\/strong>. Because data on warez sites, torrents, and Telegram bots can be deleted in seconds, the approach must be fast, technical, and legally sound.<\/em><\/p>\n<p><em>Here is the specialized forensic approach broken into three main phases:<\/em><\/p>\n<ol>\n<li><strong><em> Identification and Preservation (The &#8220;Digital Snapshot&#8221;)<\/em><\/strong><\/li>\n<\/ol>\n<p><em>The first step is to lock down the evidence before the suspect can hit a &#8220;delete&#8221; button or wipe a remote server.<\/em><\/p>\n<ul>\n<li><strong><em>Live Mirroring:<\/em><\/strong><em> Investigators use specialized tools to &#8220;mirror&#8221; or copy a website exactly as it appears online. This includes capturing all links, hidden directories, and user forums.<\/em><\/li>\n<li><strong><em>Hash Value Recording:<\/em><\/strong><em> Every piece of digital evidence must have a <strong>Hash Value<\/strong> (a unique digital fingerprint) calculated immediately. If the file is changed by even one bit later on, the hash value will change, making the evidence inadmissible in court.<\/em><\/li>\n<li><strong><em>IP Tracking:<\/em><\/strong><em> Investigators work with Internet Service Providers (ISPs) to trace the IP addresses of the site administrators and bot creators to find their physical location.<\/em><\/li>\n<\/ul>\n<ol start=\"2\">\n<li><strong><em> Deep Technical Analysis (The &#8220;Digital Trail&#8221;)<\/em><\/strong><\/li>\n<\/ol>\n<p><em>Once the data is preserved, forensic experts look for the &#8220;who&#8221; and &#8220;how&#8221; behind the piracy.<\/em><\/p>\n<ul>\n<li><strong><em>Log File Analysis:<\/em><\/strong><em> Experts examine server logs to see who uploaded the pirated content and when. This can often link a &#8220;username&#8221; to a real-world IP address or email.<\/em><\/li>\n<li><strong><em>Source Code Inspection:<\/em><\/strong><em> For &#8220;cracked&#8221; software or apps, forensics can identify the specific tools used to bypass security, which helps prove that the circumvention was intentional.<\/em><\/li>\n<li><strong><em>Financial Forensics:<\/em><\/strong><em> Piracy is usually for profit. Investigators track &#8220;Follow the Money&#8221; trails through crypto-wallets, PayPal accounts, or advertisement revenue linked to the warez site to prove commercial intent.<\/em><\/li>\n<\/ul>\n<ol start=\"3\">\n<li><strong><em> Legal Authentication (The &#8220;Courtroom Bridge&#8221;)<\/em><\/strong><\/li>\n<\/ol>\n<p><em>Technical data is useless unless it follows the law (specifically <strong>Section 63 of the BSA, 2023<\/strong> in India).<\/em><\/p>\n<ul>\n<li><strong><em>Chain of Custody:<\/em><\/strong><em> Every person who touched the digital evidence must be logged. This proves the data wasn&#8217;t tampered with from the moment it was seized until it reached the judge.<\/em><\/li>\n<li><strong><em>Certificate of Authenticity:<\/em><\/strong><em> A formal certificate must be attached to all digital printouts or screenshots. This confirms that the computer system used to collect the evidence was working properly and the data is a true representation of the original crime scene.<\/em><\/li>\n<\/ul>\n<p><strong>A. The &#8220;Hash Value&#8221; Rule<\/strong><\/p>\n<p>When seizing computers, servers, or mobile devices, the I.O. must ensure the &#8220;Hash Value&#8221; (digital fingerprint) of the storage media is calculated immediately at the scene. This ensures the data was not altered after seizure.<\/p>\n<p><strong>B. Admissibility under BSA, 2023<\/strong><\/p>\n<p>Any digital evidence (screenshots, server logs, WhatsApp chats) is only admissible if accompanied by a certificate under <strong>Section 63 of the Bharatiya Sakshya Adhiniyam (BSA)<\/strong> (formerly Section 65B of the Evidence Act).<\/p>\n<ul>\n<li>This certificate must be signed by a person in a responsible official position in relation to the operation of the relevant device.<\/li>\n<\/ul>\n<p><strong>C. Network Forensics<\/strong><\/p>\n<ul>\n<li><strong>IP Logs:<\/strong> Request subscriber details from ISPs (Internet Service Providers).<\/li>\n<li><strong>Payment Gateways:<\/strong> Track the flow of money from subscribers to the pirate site owners to establish &#8220;commercial intent.&#8221;<\/li>\n<\/ul>\n<ol start=\"9\">\n<li><strong> Examination of Witnesses<\/strong><\/li>\n<\/ol>\n<p>Statements should be recorded under <strong>Section 180 of BNSS<\/strong>.<\/p>\n<ul>\n<li><strong>Expert Witnesses:<\/strong> Statements from technical experts or &#8220;Authorized Examiners&#8221; who can certify that the seized goods are not originals.<\/li>\n<li><strong>Market Witnesses:<\/strong> Customers who were misled into buying pirated goods.<\/li>\n<li><strong>The &#8220;Scene of Crime&#8221; Unit:<\/strong> In complex cases, the forensic team should record their findings regarding the setup used for mass duplication.<\/li>\n<\/ul>\n<ol start=\"10\">\n<li><strong> Arrest Procedure<\/strong><\/li>\n<\/ol>\n<p>While the offence is non-bailable, arrest is not mandatory in every case. The I.O. must follow the guidelines in <strong>Section 35 of BNSS<\/strong> (Arrest of Persons).<\/p>\n<p><strong>Arrest is justified if:<\/strong><\/p>\n<ul>\n<li>The accused is a repeat offender (Section 63A).<\/li>\n<li>There is a risk of the accused deleting remote cloud servers or destroying evidence.<\/li>\n<li>The scale of infringement suggests an organized crime syndicate.<\/li>\n<\/ul>\n<ol start=\"11\">\n<li><strong> Final Report (Charge Sheet)<\/strong><\/li>\n<\/ol>\n<p>Upon completion of the investigation, a Final Report must be filed under <strong>Section 193 of BNSS<\/strong> before the Metropolitan Magistrate or Judicial Magistrate, First Class.<\/p>\n<p>The Charge Sheet Dossier must include:<\/p>\n<ul>\n<li><strong>Ownership Documentation:<\/strong> Validating the complainant\u2019s rights.<\/li>\n<li><strong>Expert Opinion\/Forensic Report:<\/strong> Confirming the items are &#8220;infringing copies.&#8221;<\/li>\n<li><strong>BSA Certificate:<\/strong> For all digital evidence (Under Section 63 BSA).<\/li>\n<li><strong>Videography Records:<\/strong> The digital media (CD\/Pen drive) containing the search video, supported by a certificate of integrity.<\/li>\n<li><strong>Chain of Custody Log:<\/strong> Proving the seized items remained in the Malkhana (evidence locker) untouched until production in court.<\/li>\n<\/ul>\n<ol start=\"12\">\n<li><strong> Best Practices and Checklists<\/strong><\/li>\n<\/ol>\n<table width=\"615\">\n<tbody>\n<tr>\n<td>\n<p><strong>Phase<\/strong><\/p>\n<\/td>\n<td>\n<p><strong>Action Item<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Pre-Search<\/p>\n<\/td>\n<td>\n<p>Ensure the I.O. is at least a <strong>Sub-Inspector<\/strong>.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>During Search<\/p>\n<\/td>\n<td>\n<p>Use a mobile device to record the entire entry and seizure process.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Post-Seizure<\/p>\n<\/td>\n<td>\n<p>Send notification to the Registrar of Copyrights, New Delhi.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Evidence<\/p>\n<\/td>\n<td>\n<p>Ensure &#8220;Hash Values&#8221; are recorded for all digital devices.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td>\n<p>Ethics<\/p>\n<\/td>\n<td>\n<p>Avoid seizing personal devices of employees unless directly used for the crime.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ol start=\"13\">\n<li><strong> Conclusion<\/strong><\/li>\n<\/ol>\n<p>Copyright investigation in the 21st century is as much about data as it is about physical goods. By adhering to this SOP, investigating officers ensure that they satisfy the rigorous standards of the <strong>BNSS<\/strong> and <strong>BSA<\/strong>, thereby minimizing the chances of procedural acquittals. Effective enforcement acts as a deterrent, protecting India\u2019s creative economy and ensuring that &#8220;originality&#8221; remains rewarded by law.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Copyright protection is a cornerstone of Intellectual Property Rights (IPR) law, safeguarding the creative output of authors, artists, musicians, filmmakers, and software developers. Criminal infringement\u2014the unauthorized reproduction, distribution, or sale of copyrighted works\u2014not only causes massive economic loss but also stifles innovation. This SOP provides a standardized framework for Law Enforcement Agencies (LEAs) in<\/p>\n","protected":false},"author":49,"featured_media":21558,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"two_page_speed":[],"_jetpack_memberships_contains_paid_content":false,"_joinchat":[],"footnotes":""},"categories":[21],"tags":[5149,28],"class_list":{"0":"post-21559","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-intellectual-property","8":"tag-intellectual-property","9":"tag-top-news"},"jetpack_featured_media_url":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-content\/uploads\/2026\/04\/SOP-OF-COPYRIGHT-CASE-INVESTIGATION.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/posts\/21559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/users\/49"}],"replies":[{"embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/comments?post=21559"}],"version-history":[{"count":2,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/posts\/21559\/revisions"}],"predecessor-version":[{"id":21590,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/posts\/21559\/revisions\/21590"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/media\/21558"}],"wp:attachment":[{"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/media?parent=21559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/categories?post=21559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.legalserviceindia.com\/Legal-Articles\/wp-json\/wp\/v2\/tags?post=21559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}