Section 3A of ITA, 2000 : Section 3A: Electronic Signature

The Information Technology Act, 2000

Bare Act

  • CHAPTER II: DIGITAL SIGNATURE AND ELECTRONIC SIGNATURE

3A Electronic signature - (1) Notwithstanding anything contained in section 3, but subject to the provisions of sub-section (2), a subscriber may authenticate any electronic record by such electronic signature or electronic authentication technique which -

  • (a) is considered reliable; and
  • (b) may be specified in the Second Schedule.

(2) For the purposes of this section any electronic signature or electronic authentication technique shall be considered reliable if -

  • (a) the signature creation data or the authentication data are, within the context in which they are used, linked to the signatory or, as the case may be, the authenticator and to no other person;
  • (b) the signature creation data or the authentication data were, at the time of signing, under the control of the signatory or, as the case may be, the authenticator and of no other person;
  • (c) any alteration to the electronic signature made after affixing such signature is detectable;
  • (d) any alteration to the information made after its authentication by electronic signature is detectable; and
  • (e) it fulfils...

The content above is a free preview available without login.

Login now to access this section in the Kanoon Library and unlock full, well-structured, and expertly formatted content with KanoonGPT Search and easy navigation using previous/next section buttons.

Simplified Act

Simplified Explanation of Section 3A of The Information Technology Act, 2000

Electronic Signatures

(1) Even though section 3 says something different, as long as you follow the rules in part (2), you can use an electronic signature or a way to prove who you are online to sign any digital document. This electronic signature method must be:

  • (a) trusted, and
  • (b) possibly listed in a specific part of the law called the Second Schedule.

(2) An electronic signature or way to prove who you are online is trusted if:

  • (a) it's conne...

Explanation using Example

Let's consider a scenario where John, a subscriber to an online banking service, wants to make a transaction. According to Section 3A of The Information Technology Act, 2000, John can authenticate his transaction using an electronic signature or authentication technique specified in the Second Schedule and considered reliable.

John's bank uses a two-factor authentication technique where John receives a one-time password (OTP) on his re...

To AI Chat with Act via KanoonGPT, Search Section, see Act Info, Table of Contents

Unlock Pro Features

Enjoy exclusive access to simplified content, detailed explanations, and premium insights to enhance your understanding.

Join Pro and support our initiative to make advanced AI and language models accessible for the Indian legal community.

Exciting "AI Features" launched !! Happy New Year price increase anytime soon !
Upgrade to Pro

To read this Act offline, get our "Kanoon Library" Mobile App

Kanoon Library Android App - Play Store LinkKanoon Library iOS App - App Store Link