Challenger App

No.1 PSC Learning App

1M+ Downloads
Any electronic signature or electronic authentication technique shall be considered reliable :

AIf the signature creation data or the authentication data are, within the context in which they are used, linked to the signatory or, as the case may be, the authenticator and of no other person

BIf the signature creation data or the authentication data were, at the time of signing, under the control of the signatory or, as the case may be, the authenticator and of no other person

CIf any alteration to the information made after its authentication by electronic signature is detectable

DAll the above

Answer:

D. All the above


Related Questions:

⁠The primary limitation of MIS is:
What is one of the main objectives behind the launch of RuPay?

Which of the following best describes the core concept of E-Governance?

  1. E-Governance primarily focuses on digitizing government documents and records.
  2. E-Governance involves using Information and Communication Technology (ICT) to improve government operations, citizen services, and interactions.
  3. E-Governance is exclusively about online voting systems and digital democracy.
  4. E-Governance refers to the use of technology for government-to-government communication only.
    What must boards of directors ensure regarding social responsibility?
    What is myScheme and when was it launched?