Section 30 of ITA, 2000 : Section 30: Certifying Authority To Follow Certain Procedures
The Information Technology Act, 2000
Bare Act
- CHAPTER VI: REGULATION OF CERTIFYING AUTHORITIES
Every Certifying Authority shall, - make use of hardware, software and procedures that are secure from intrusion and misuse; provide a reasonable level of reliability in its services which are reasonably suited to the performance of intended functions; adhere to security procedures to ensure that the secrecy and privacy of the electronic signatures are assured; be the repo...
The content above is a free preview available without login.
Login now to access this section in the Kanoon Library and unlock full, well-structured, and expertly formatted content with KanoonGPT Search and easy navigation using previous/next section buttons.
Simplified Act
Every company that issues digital certificates (Certifying Authority) must: use secure technology and processes to prevent unauthorized access and misuse; ...
Explanation using Example
Let's consider a hypothetical scenario. Imagine a company named SecureSign Inc., which acts as a Certifying Authority under the Information Technology Act, 2000. SecureSign Inc. uses state-of-the-art servers, firewalls, and intrusion detection systems to ensure their hardware and software are secure from any unauthorized access or mi...