Information Technology Act, 2000

Second Schedule - ELECTRONIC SIGNATURE OR ELECTRONIC AUTHENTICATION TECHNIQUE AND PROCEDURE

SECOND SCHEDULE

[See sub-section (1) of section 3A]

ELECTRONIC SIGNATURE OR ELECTRONIC AUTHENTICATION TECHNIQUE AND PROCEDURE

Sl. No.DescriptionProcedure
(1)(2)(3)
[1.

e-authentication technique using Aadhaar [or other] e-KYC services

Authentication of an electronic record by e-authentication Technique which shall be done by-

(a)-the applicable use of e-authentication, hash, and asymmetric crypto system techniques, leading to issuance of Digital Signature Certificate by Certifying Authority
(b)-a trusted third party service .... To read the full section download the app from Google Play store