Information Technology Act, 2000
30. Certifying Authority to follow certain
procedures.-
Every Certifying Authority shall,-
(a) make use of hardware, software, and
procedures that the secure from intrusion and misuse;
(b) provide a reasonable level of reliability
in its services which are reasonably suited to the performance of intended
functions;
(c) adhere to security procedures to ensure
that the secrecy and privacy of the digital signatures are assured; and
(d) observe such other standards as may be
specified by regulations.