Section 3A of ITA, 2000 : Section 3A: Electronic Signature
ITA, 2000
JavaScript did not load properly
Some content might be missing or broken. Please try disabling content blockers or use a different browser like Chrome, Safari or Firefox.
Explanation using Example
Let's consider a scenario where John, a subscriber to an online banking service, wants to make a transaction. According to Section 3A of The Information Technology Act, 2000, John can authenticate his transaction using an electronic signature or authentication technique specified in the Second Schedule and considered reliable.
John's bank uses a two-factor authentication technique where John receives a one-time password (OTP) on his registered mobile number. This authentication technique is linked only to John (as per 2a), and at the time of signing, the OTP is under John's control only (as per 2b).
If anyone tries to alter John's electronic signature (the OTP in this case), it will be detectable (as per 2c). Similarly, any changes to the transaction details after John authenticates it with his OTP will also be detectable (as per 2d). This technique meets other conditions prescribed by the Central Government, making it a reliable method.
In this way, John can securely complete his online banking transactions thanks to the provisions of Section 3A of The Information Technology Act, 2000.