AdvocateKhoj
Login : Advocate | Client
Home Post Your Case My Account Law College Law Library
    

Certifying Authorities Rules, 2000


20.Security Guidelines for Certifying Authorities.-

(1) The Certifying Authorities shall have the sole responsibility of integrity, confidentiality and protection of information and information assets employed in its operation, considering classification, declassification, labeling, storage, access and destruction of information assets according to their value, sensitivity and importance of operation. 

(2) Information Technology Security Guidelines and Security Guidelines for Certifying Authorities aimed at protecting the integrity, confidentiality and availability of service of Certifying Authority are given in

Schedule-II and Schedule-III respectively.  

(i)The Certifying Authority shall formulate its Information Technology and Security Policy for operation complying with these guidelines and submit it to the Controller before commencement of operation:

(ii)Provided that any change made by the Certifying Authority in the Information Technology and Security Policy shall be submitted by it within two weeks to the Controller.





Certifying   Authorities Rules, 2000 Back






Client Area | Advocate Area | Blogs | About Us | User Agreement | Privacy Policy | Advertise | Media Coverage | Contact Us | Site Map
powered by nubia  |  driven by neosys