Section 30 of ITA, 2000 : Section 30: Certifying Authority To Follow Certain Procedures
The Information Technology Act, 2000
Bare Act
- CHAPTER VI: REGULATION OF CERTIFYING AUTHORITIES
Every Certifying Authority shall, -
- make use of hardware, software and procedures that are secure from intrusion and misuse;
- provide a reasonable level of reliability in its services which are reasonably suited to the performance of intended functions;
- adhere to security procedures to ensure that the secrecy and privacy of the electronic signatures are assured;
- be the repository of all electronic signature Certificates issued under this Act;
- publish information regarding its practices, electronic signature Certificates and current status of such certificates;
- observe such other standards as may be specified by regulations.
Simplified Act
Every company that issues digital certificates (Certifying Authority) must:
- use secure technology and processes to prevent unauthorized access and misuse;
- ensure that its services are dependable and appropriate for the tasks they're meant to perform;
- follow strict security measures to keep digital signatures confidential and protect the identity of the users;
- keep a ...
Explanation using Example
Let's consider a hypothetical scenario. Imagine a company named SecureSign Inc., which acts as a Certifying Authority under the Information Technology Act, 2000.
- SecureSign Inc. uses state-of-the-art servers, firewalls, and intrusion detection systems to ensure their hardware and software are secure from any unauthorized access or misuse.
- The company provides reliable services to its customers, ensuring their electronic signature services work seamlessly for signing documents online, which is the intended function.
- SecureSign Inc. follows stringent security procedures, including encryption and two-factor authentication, to ensure the privacy and secrecy of the electronic signatures generated through their platform.
- As a Certifying Authority, Secure...