Section 30 of ITA, 2000 : Section 30: Certifying Authority To Follow Certain Procedures

The Information Technology Act, 2000

Bare Act

  • CHAPTER VI: REGULATION OF CERTIFYING AUTHORITIES

Every Certifying Authority shall, - make use of hardware, software and procedures that are secure from intrusion and misuse; provide a reasonable level of reliability in its services which are reasonably suited to the performance of intended functions; adhere to security procedures to ensure that the secrecy and privacy of the electronic signatures are assured; be the repo...

The content above is a free preview available without login.

Login now to access this section in the Kanoon Library and unlock full, well-structured, and expertly formatted content with KanoonGPT Search and easy navigation using previous/next section buttons.

Simplified Act

Every company that issues digital certificates (Certifying Authority) must: use secure technology and processes to prevent unauthorized access and misuse; ...

Explanation using Example

Let's consider a hypothetical scenario. Imagine a company named SecureSign Inc., which acts as a Certifying Authority under the Information Technology Act, 2000. SecureSign Inc. uses state-of-the-art servers, firewalls, and intrusion detection systems to ensure their hardware and software are secure from any unauthorized access or mi...

Unlock Pro Features

Enjoy exclusive access to simplified content, detailed explanations, and premium insights to enhance your understanding.

Join Pro and support our initiative to make advanced AI and language models accessible for the Indian legal community.

Upgrade to Pro

To read this Act offline, get our "Kanoon Library" Mobile App

Kanoon Library Android App - Play Store LinkKanoon Library iOS App - App Store Link