Challenger App

No.1 PSC Learning App

1M+ Downloads
Any electronic signature or electronic authentication technique shall be considered reliable :

AIf the signature creation data or the authentication data are, within the context in which they are used, linked to the signatory or, as the case may be, the authenticator and of no other person

BIf the signature creation data or the authentication data were, at the time of signing, under the control of the signatory or, as the case may be, the authenticator and of no other person

CIf any alteration to the information made after its authentication by electronic signature is detectable

DAll the above

Answer:

D. All the above


Related Questions:

What is the role of ICT in promoting transparency in government through SMART Governance?

  1. Making government information and documents accessible to the public.
  2. Restricting access to government information to authorized personnel only.
  3. Increasing the complexity of government processes to maintain exclusivity.
  4. Reducing the availability of information about administrative agencies.

    Consider the following statements about the components supporting the success of Mission Mode Projects (MMPs). Which statement is accurate?

    1. Capacity building initiatives, including the establishment of State e-Governance Mission Teams (SeMTs), are crucial for MMP success.
    2. Awareness campaigns are designed to inform the public about e-governance services and encourage implementer ownership.
    3. The Department of Electronics and Information Technology (DeitY) assesses project impact and e-readiness of states.
    4. Setting high-level standards and policies is not a priority for ensuring interoperability.
      What is the main purpose of the e-Kranti initiative?

      What is the main focus of the Government-to-Employee (G2E) e-governance model?

      1. Streamlining communication and services between government and its employees.
      2. Providing direct services to external citizens through digital channels.
      3. Facilitating data exchange between different government agencies.
      4. Creating digital platforms for businesses to interact with government.
        What specific threats are mentioned under technical challenges for e-governance?