AdvocateKhoj
Login : Advocate | Client
Home Post Your Case My Account Law College Law Library
    

Information Technology (Certifying Authorities) Rules, 2000

2. Definitions.-

In these Rules, unless the context otherwise requires,

a. "Act" means the Information Technology Act, 2000 (21 of 2000);

b. "applicant" means Certifying Authority applicant;

c. "auditor" means any internationally accredited computer security professional or agency appointed by the Certifying Authority and recognized by the Controller for conducting technical audit of operation of Certifying Authority;

d. "Controller" means Controller of Certifying Authorities appointed under sub-section (1) of Section 17 of the Act;

e. "Digital Signature Certificate" means Digital Signature Certificate issued under sub-section (4) of section 35 of the Act;

f. "information asset" means all information resources utilized in the course of any organization’s business and includes all information, applications (software developed or purchased), and technology (hardware, system software and networks);

g. "license" means a license granted to Certifying Authorities for the issue of Digital Signature Certificates under these rules;

h. "licensed Certifying Authority" means Certifying Authority who has been granted a license to issue Digital Signature Certificates;

i. "person" shall include an individual; or a company or association or body of individuals; whether incorporated or not; or Central Government or a State Government or any of the Ministries or Departments, Agencies or Authorities of such Governments;

j. "Schedule" means a schedule annexed to these rules;

k. "subscriber identity verification method" means the method used to verify and authenticate the identity of a subscriber; 

l. trusted person" means any person who has: –

(i) direct responsibilities for the day-to-day operations, security and performance of those business activities that are regulated under the Act or these Rules in respect of a Certifying Authority; or

(ii) duties directly involving the issuance, renewal, suspension, revocation of Digital Signature Certificates (including the identification of any person requesting a Digital Signature Certificate from a licensed Certifying Authority), creation of private keys or administration of a Certifying Authority's computing facilities.

m. words and expressions used herein and not defined but defined in Schedule-IV shall have the meaning respectively assigned to them in that schedule.











Client Area | Advocate Area | Blogs | About Us | User Agreement | Privacy Policy | Advertise | Media Coverage | Contact Us | Site Map
Powered by Neosys Inc
Information provided on advocatekhoj.com is solely available at your request for informational purposes only and should not be interpreted as soliciting or advertisement