Section 84A of ITA, 2000 : Section 84A: Modes Or Methods For Encryption

ITA, 2000

JavaScript did not load properly

Some content might be missing or broken. Please try disabling content blockers or use a different browser like Chrome, Safari or Firefox.

Explanation using Example

Let's consider an example. Imagine there's a startup company named 'SafePay' that has developed an innovative e-commerce platform. The platform is gaining popularity, but it needs to ensure that all transactions are secure to maintain the trust of its customers. The Central Government, under Section 84A of The Information Technology Act, 2000, can prescribe certain methods or modes for encryption to be used by 'SafePay'. This could be a specific encryption algorithm or a set of security protocols that 'SafePay' needs to implement to securely encrypt the transaction data, thus promoting secure e-commerce and e-governance.

Update: Our AI tools are cooking — and they are almost ready to serve! Stay hungry — your invite to the table is coming soon.
Update: KanoonGPT Chat interface is launched for beta testing. Try it out here

Download Digital Bare Acts on mobile or tablet with "Kanoon Library" app

Kanoon Library Android App - Play Store LinkKanoon Library iOS App - App Store Link