Challenger App

No.1 PSC Learning App

1M+ Downloads
Any electronic signature or electronic authentication technique shall be considered reliable :

AIf the signature creation data or the authentication data are, within the context in which they are used, linked to the signatory or, as the case may be, the authenticator and of no other person

BIf the signature creation data or the authentication data were, at the time of signing, under the control of the signatory or, as the case may be, the authenticator and of no other person

CIf any alteration to the information made after its authentication by electronic signature is detectable

DAll the above

Answer:

D. All the above


Related Questions:

What is implied by the statement 'organizations must use technology to engage with their clients and adjust to evolving expectations'?
Which of the following is an example of a Government-to-Citizen (G2C) service?

Which of the following best describes the role of government in relation to e-governance?

  1. Governments are the main providers of services to their citizens.
  2. Governments should only provide services to technologically advanced citizens.
  3. E-governance is solely about digitizing existing government processes without improving efficiency.
    What is a significant challenge associated with digital signature systems for authentication?
    For how long does the Academic Bank of Credits (ABC) securely store a student's academic credits?