CYBER LAW : INFORMATION TECHNOLOGY ACT, 2000
Topic : Lecture on Cyber Law
Audience: B.Sc.(IT) 6th Semester, Marwari College Ranchi.
Topic content : Information Technology Act, 2000
(i) the signature creation data, at the time of affixing signature, was under the exclusive control of signatory and no other person; and
(ii) the signature creation data was stored and affixed in such exclusive manner as may be prescribed
Explanation- In case of digital signature, the “signature creation data” means the private key of the subscriber
Section 16: Security procedures and Practices
The Central Government may for the purposes of sections 14 and 15 prescribe the security procedures and practices
Provided that in prescribing such security procedures and practices, the Central Government shall have regard to the commercial circumstances, nature of transactions and such other related factors as it may consider appropriate
Comments
Post a Comment