Section 40 of ITA, 2000 : Section 40: Generating Key Pair
ITA, 2000
JavaScript did not load properly
Some content might be missing or broken. Please try disabling content blockers or use a different browser like Chrome, Safari or Firefox.
Explanation using Example
Let's consider a scenario where John, an online business owner, decides to use digital signatures for his transactions. According to Section 40 of the Information Technology Act, 2000, John must generate his key pair (private and public keys) by following a security procedure once he accepts any Digital Signature Certificate. The public key of this certificate must correspond to his private key. This way, John's digital transactions are secured and authenticated, ensuring the safety of his business operations.
Update: Our Pro subscription pricing is now simplified. See our Pro plans
Update: Our AI tools are cooking — and they are almost ready to serve! Stay hungry — your invite to the table is coming soon.
Update: KanoonGPT Chat interface is launched for beta testing. Try it out here