Section 30 of ITA, 2000 : Section 30: Certifying Authority To Follow Certain Procedures

ITA, 2000

JavaScript did not load properly

Some content might be missing or broken. Please try disabling content blockers or use a different browser like Chrome, Safari or Firefox.

Explanation using Example

Let's consider a hypothetical scenario. Imagine a company named SecureSign Inc., which acts as a Certifying Authority under the Information Technology Act, 2000.

  1. SecureSign Inc. uses state-of-the-art servers, firewalls, and intrusion detection systems to ensure their hardware and software are secure from any unauthorized access or misuse.
  2. The company provides reliable services to its customers, ensuring their electronic signature services work seamlessly for signing documents online, which is the intended function.
  3. SecureSign Inc. follows stringent security procedures, including encryption and two-factor authentication, to ensure the privacy and secrecy of the electronic signatures generated through their platform.
  4. As a Certifying Authority, SecureSign Inc. stores all electronic signature Certificates issued under the IT Act, acting as a trusted repository.
  5. The company maintains transparency by publishing information about its practices, details about the electronic signature Certificates it issues, and the current status of these certificates on its official website.
  6. SecureSign Inc. also adheres to any additional standards or regulations specified by the governing bodies, ensuring their services are up-to-date and compliant with the latest rules.
Update: Our AI tools are cooking — and they are almost ready to serve! Stay hungry — your invite to the table is coming soon.
Update: KanoonGPT Chat interface is launched for beta testing. Try it out here

Download Digital Bare Acts on mobile or tablet with "Kanoon Library" app

Kanoon Library Android App - Play Store LinkKanoon Library iOS App - App Store Link