Section 30 of ITA, 2000 : Section 30: Certifying Authority To Follow Certain Procedures
The Information Technology Act, 2000
Bare Act
- CHAPTER VI: REGULATION OF CERTIFYING AUTHORITIES
Every Certifying Authority shall, -
- make use of hardware, software and procedures that are secure from intrusion and misuse;
- provide a reasonable level of reliability in its services which are reasonably suited to the performance of intended functions;
- adhere to security procedures to ensure that the secrecy and privacy of the electronic signatures are assured;
- be the repos...
The content above is a free preview available without login.
Login now to access this section in the Kanoon Library and unlock full, well-structured, and expertly formatted content with KanoonGPT Search and easy navigation using previous/next section buttons.
Simplified Act
Every company that issues digital certificates (Certifying Authority) must:
- use secure technology and processes to prevent unauthorized access and misuse;
- ensure that its services are dependable and appropriate for the tasks they're meant to perfo...
Explanation using Example
Let's consider a hypothetical scenario. Imagine a company named SecureSign Inc., which acts as a Certifying Authority under the Information Technology Act, 2000.
- SecureSign Inc. uses state-of-the-art servers, firewalls, and intrusion detection systems to ensure their hardware and software are secure from any unauthorized access or misuse.
- The company provides reliable services to its customers, ensuring their electronic signature services work seamlessly for signing documents online, which is the inten...