Secure Electronic Records And Digital Signatures ( Section 14 to 16)


Section : 14. Secure electronic record

Where any security procedure has been applied to an electronic record at a specific
point of time. then such record shall be deemed to be a secure electronic record from such
point of time to the time of verification.

Section : 15. Secure digital signature

If, by application of a security procedure agreed to by the parties concerned, it can
be verified that a digital signature, at the time it was affixed, was—
(a) unique to the subscriber affixing it;
(b) capable of identifying such subscriber;
(c) created in a manner or using a means under the exclusive control of the
subscriber and is linked to the electronic record to which it relates in such a manner
that if the electronic record was altered the digital signature would be invalidated,
then such digital signature shall be deemed to be a secure digital signature.

Section : 16. Security procedure

The Central Government shall for the purposes of this Act prescribe the security
procedure having regard to commercial circumstances prevailing at the time when the
procedure was used, including—
(a) the nature of the transaction;
(b) the level of sophistication of the parties with reference to their
technological capacity;
(c) the volume of similar transactions engaged in by other parties;
(a) the availability of alternatives offered to but rejected by any party;
(e) the cost of alternative procedures; and
(f) the procedures in general use for similar types of transactions or communications.

4 comments:

  1. Hey! This post couldn't be written any better! Reading through this post reminds me of my old room mate! He always kept chatting about this. I will forward this post to him. Fairly certain he will have a good read. Thanks for sharing!
    Acceso a la información pública

    ReplyDelete
  2. Good to Read such a nice blog post, thank you for sharing the information.
    E-Signature Software

    ReplyDelete
  3. This comment has been removed by the author.

    ReplyDelete
  4. Very informative post. Thank you for sharing it. Also Email messages, macros, or electronic documents can be authenticated with digital signatures, which are electronic, encrypted stamps. Know more: digital signature online

    ReplyDelete