18. Functions of Controller

18. Functions of Controller The Controller may perform all or any of the following function, namely:- (a) exercising supervision over the activities of Certifying Authorities; (b) certifying public keys of the Certifying Authorities; (c) laying down the standards to be maintained by Certifying Authorities; (d) specifying the qualifications and experience which employees of the Certifying … Read more

16. Security procedure

16. Security procedure The Central Government shall, for the purpose of this Act, prescribe the security procedure having regard to commercial circumstances prevailing at the time when the procedure was used, including- (a) the nature of the transaction; (b) the level of sophistication of the parties with reference to their technological capacity; (c) the volume … Read more

15. Secure digital signature

If, by application of a security procedure agreed to by the parties concerned, it can be verified that a digital signature, at the time it was affixed, was – (a) unique to the subscriber affixing it; (b) capable of identifying such subscriber; (c) created in a manner or using a means under the exclusive control … Read more

13. Time and place of dispatch and receipt of electronic record

13. Time and place of dispatch and receipt of electronic record (1) Save as otherwise agreed to between the originator and the addressee, the dispatch of an electronic record occurs when it enters a computer resource outside the control of the originator. (2) Save as otherwise agreed between the originator and the addressee, the time of … Read more

error: The content on this website is (C) Lawgic.info. Ask for permission at info@lawgic.info !!