Section 84A of ITA, 2000 : Section 84A: Modes Or Methods For Encryption
ITA, 2000
JavaScript did not load properly
Some content might be missing or broken. Please try disabling content blockers or use a different browser like Chrome, Safari or Firefox.
Explanation using Example
Let's consider an example. Imagine there's a startup company named 'SafePay' that has developed an innovative e-commerce platform. The platform is gaining popularity, but it needs to ensure that all transactions are secure to maintain the trust of its customers. The Central Government, under Section 84A of The Information Technology Act, 2000, can prescribe certain methods or modes for encryption to be used by 'SafePay'. This could be a specific encryption algorithm or a set of security protocols that 'SafePay' needs to implement to securely encrypt the transaction data, thus promoting secure e-commerce and e-governance.