The Information Technology Act, 2000
CHAPTER V: SECURE ELECTRONIC RECORDS AND SECURE ELECTRONIC SIGNATURE
Section 16: Security Procedures And Practices
Explanation using examples
Let's consider a hypothetical scenario. Suppose there is a major e-commerce company in India called "BuyItAll". This