67A: Proof as to digital Signature : Except in the case of a secure digital signature, if the digital signature of any subscriber is alleged to an electronic record, the fact that such digital signature is the digital signature of the subscriber must be proved.
Section 15 defining Secure Digital Signature was fulfilled by the ordinary digital signature itself and hence the difference sought to be made in this regard between the secure digital signature and the other digital signature was not perceptible to layman.
15 Secure Digital Signature If, by application of a security procedure agreed to by the parties concerned, it can be verified that a digital signature, at the time it was affixed, was -
SignaturesNotification dated October 29, 2004, the MCIT sought to bring in the distinction between the Secure Digital Signature and the other Digital Signature by the following notification.
Secure digital signature : A digital signature shall be deemed to be a secure digital signature for the purposes of the Act if the following procedure has been applied to it, namely :
There are three cornerstones to that commitment: Setting the highest standards of intellectual rigor: This also forms a part of our commitment to our employees - to foster their creative talents and create an environment for them to learn and sharpen their security skills. We encourage their own research ideas and enable them to claim credit for their discoveries, tools, and papers.
Promoting internationalism: We test critical software - operating systems, databases, etc. - and release advisories under our Responsible Disclosure program. We also develop free tools, and white papers on secure digital signature, auditing and implementing security.
Building strong relationships: Each assignment that we undertake is capped off with an intense Knowledge Transfer to the client giving him details on our tools and methodologies for carrying out the assignment. We even hand over any new techniques or tools that we develop during that assignment.