Sec 14 to 16 Chapter V (Secure Electronic Records and Secure [Electronic Signature]) The Information Technology Act, 200

Sec 14 to 16 Chapter V (Secure Electronic Records and Secure [Electronic Signature]) The Information Technology Act, 200

14. 1Secure electronic record.—

   Where any security procedure has been applied to an electronic record at a specific point of time, then such record shall he deemed to be a secure electronic record from such point of time to the time of verification.

(1. Subs. by Act 10 of 2009, s. 2, for ―digital signatures‖ (w.e.f. 27-10-2009).

2 [15. Secure electronic signature.—

An electronic signature shall be deemed to be a secure electronic signature if—

   (i) the signature creation data, at the time of affixing signature, was under the exclusive control of signatory and no other person; and

  (ii) the signature creation data was stored and affixed in such exclusive manner as may be prescribed.

   Explanation.–In case of digital signature, the ―signature creation data‖ means the private key of the subscriber.

(2. Subs. by s 11, ibid., for sections 15 and 16 (w.e.f. 27-10-2009).

16. Security procedures and practices.—

   The Central Government may, for the purposes of sections 14 and 15, prescribe the security procedures and practices:

   Provided that in prescribing such security procedures and practices, the Central Government shall have regard to the commercial circumstances, nature of transactions and such other related factors as it may consider appropriate.]