Section 30 of Information Technology Act, 2000-Certifying Authority to follow certain procedures:
Every Certifying Authority shall,-
(a) make use of hardware, software, and procedures that the secure from intrusion and misuse;
(b) provide a reasonable level of reliability in its services which are reasonably suited to the performance of intended functions;
(c) adhere to security procedures to ensure that the secrecy and privacy of the digital signatures are assured; and
(d) observe such other standards as may be specified by regulations.
No comments :
Post a Comment