IT Act 2000 Second Schedule : [See sub-section (1) of section 3A] :

Information Technology Act 2000
The Second Schedule :
[See sub-section (1) of section 3A] :
Electronic Signature Or Electronic Authentication Technique And Procedure :
——–
Sl.No. (1): 1.[1
Description (2) : e-authentication Technique using Aadhaar e-KYC services
Procedure (3) : Authentication of an electronic record by e-authentication Technique which shall be done by-
(a) the applicable use of e-authentication, hash, and asymmetric crypto system techniques, leading to issuance of Digital Signature Certificate by Certifying Authority.
(b) a trusted third party service by subscribers key pair-generation, storing of key pairs 2.[***] and creation of digital signature provided that the trusted third party shall be offered by the certifying authority. The trusted third party shall send application form and certificate signing request to the Certifying Authority for issuing a Digital Signature Certificate to the subscriber.
(c) Issuance of Digital Signature Certificate by Certifying Authority shall be based on e-authentication, particulars specified in Form C of Schedule IV of the Information Technology (Certifying Authorities) Rules, 2000, digitally signed verified information from Aadhaar e-KYC services and electronic consent of Digital Signature Certificate applicant.
(d) The manner and requirements for e-authentication shall be as issued by the Controller from time to time.
(e) The security procedure for creating the subscribers key pair shall be in accordance with the e-authentication guidelines issued by the Controller.
(f) The standards referred to in rule 6 of the Information Technology (Certifying Authorities) Rules, 2000 shall be complied with, in so far as they relate to the certification function of public key of Digital Signature Certificate applicant.
3.[(g) The manner in which the information is authenticated by means of digital signature shall comply with the manner and standards specified in rules 3 to 12 of the Digital Signature (End entity) Rules, 2015 in so far as they relate to the creation, storage, and verification of Digital Signature]]
——-
1.Inserted by Notification G.S.R 61(E) dated 27.01.2015
2.Omitted on hardware security module by Notification No G.S.R 539(E), dated 30.06.2015
3.Sub by Notification No G.S.R 446(E), dated 27.04.2016
———
[The Third Schedule.] :
Omitted by the Information Technology (Amendment) Act, 2008 (10 of 2009), s. 50 (w.e.f. 27-10-2009).
——–
[The Fourth Schedule.] :
Omitted by s. 50, ibid. (w.e.f. 27-10-2009).

Leave a Reply