CHAPTER VIII

DUTIES OF SUBSCRIBERS  

40. Generating key pair.

Where any Digital Signature Certificate, the public key of which corresponds to the private key of that subscriber which is to be listed in the Digital Signature Certificate has been accepted by a subscriber, then, the subscriber shall generate the key pair by applying the security procedure.

41.Acceptance of Digital Signature Certificate.

(1) A subscriber shall be deemed to have accepted a Digital Signature Certificate if he publishes or authorizes the publication of a Digital Signature Certificate—

(a) to one or more persons;

(b) in a repository, or

otherwise demonstrates his approval of the Digital Signature Certificate in any manner.

(2) By accepting a Digital Signature Certificate the subscriber certifies to all who reasonably rely on the information contained in the Digital Signature Certificate that—

 

(a) the subscriber holds the private key corresponding to the public key listed in the Digital Signature Certificate and is entitled to hold the same;

(b) all representations made by the subscriber to the Certifying Authority and all material relevant to the information contained in the Digital Signature Certificate are true;

(c) all information in the Digital Signature Certificate that is within the knowledge of the subscriber is true.

42. Control of private key.

(1) Every subscriber shall exercise reasonable care to retain control of the private key corresponding to the r public key listed in his Digital Signature Certificate and take all steps to prevent its disclosure to a person not authorised to affix the digital signature of the subscriber.

(2) If the private key corresponding to the public key listed in the Digital Signature Certificate has been compromised, then, the subscriber shall communicate the same without any delay to the Certifying Authority in a such manner as may be specified by the regulations.

Explanation- For the purpose of this sub-section-

(i) or removal of doubts it is hereby declared that the subscriber shall be liable till he has informed the certifying authority that the Private Key has been compromised.

Literary Freeware: Not for Commercial Use. Copyright (c)  
This HTML version was converted by - us. 
Based on the text edition . 
Permission is granted to make and distribute copies of this publication provided the 
copyright notice and this permission notice are preserved on all copies.

Copyright © 1998-2001
imi All rights reserved.
Comments or Enquiry Please
CONTACT INTERACT MANAGEMENT INC.