Challenger App

No.1 PSC Learning App

1M+ Downloads
Any electronic signature or electronic authentication technique shall be considered reliable :

AIf the signature creation data or the authentication data are, within the context in which they are used, linked to the signatory or, as the case may be, the authenticator and of no other person

BIf the signature creation data or the authentication data were, at the time of signing, under the control of the signatory or, as the case may be, the authenticator and of no other person

CIf any alteration to the information made after its authentication by electronic signature is detectable

DAll the above

Answer:

D. All the above


Related Questions:

How can Information Technology (IT) benefit government operations?
Which Indian government body initiated the OpenForge platform?

Identify the correct statements regarding Government-to-Government (G2G) interactions.

  1. G2G interactions are exclusively horizontal, occurring between agencies at the same level.
  2. The main objective is to improve efficiency and performance within the public sector.
  3. This model involves the electronic sharing of data and information between different government agencies.
  4. G2G interactions can be vertical, between different levels of government.
    What is the primary benefit of the rapid growth and adoption of communications technology in government?
    What has provided the tools for more efficient, faster, and effective governance?