Section 30 of The Information Technology Act, 2000 View Chapter 6

Certifying Authority to follow certain procedures.

Every Certifying Authority shall,--

(a) make use of hardware, software and procedures that are secure from intrusion and misuse;

(b) provide a reasonable level of reliability in its services which are reasonably suited to the performance of intended functions;

(c) adhere to security procedures to ensure that the secrecy and privacy of the 1 [electronic signatures] are assured; 2 ***

3 [(ca) be the repository of all electronic signature Certificates issued under this Act;

(cb) publish information regarding its practices, electronic signature Certificates and current status of such certificates; and]

(d) observe such other standards as may be specified by regulations

-------------------------------------------------------------------------------------------

Footnote -

1. Subs. by Act 10 of 2009, s. 2, for "Digital Signature" (w.e.f. 27-10-2009).

2. The word "and" omitted by s. 15, ibid. (w.e.f. 27-10-2009).

3. Ins. by s. 15, ibid. (w.e.f. 27-10-2009).