Challenger App

No.1 PSC Learning App

1M+ Downloads
Any electronic signature or electronic authentication technique shall be considered reliable :

AIf the signature creation data or the authentication data are, within the context in which they are used, linked to the signatory or, as the case may be, the authenticator and of no other person

BIf the signature creation data or the authentication data were, at the time of signing, under the control of the signatory or, as the case may be, the authenticator and of no other person

CIf any alteration to the information made after its authentication by electronic signature is detectable

DAll the above

Answer:

D. All the above


Related Questions:

Which of the following describes Unauthorized Data Manipulation?
How does ICT aid government processes in e-governance?
The World Bank definition of e-Governance emphasizes the use of ICT to enhance:
What specific threats are mentioned under technical challenges for e-governance?
What is a major risk associated with storing private information on government servers in e-governance?