Cyber Law Unit 2
Cyber Law Unit 2
Certifying Authorities Under the Information Technology Act, 2000, and Their
Roles and Functions
The Information Technology Act, 2000 (IT Act) establishes Certifying Authorities (CAs) as
critical entities in India’s digital ecosystem, responsible for issuing and managing electronic
signatures, including digital signatures, to ensure secure and legally valid electronic
transactions. CAs are licensed by the Controller of Certifying Authorities (CCA) and play a
pivotal role in maintaining trust, security, and reliability in the electronic signature regime.
Below is a detailed explanation of Certifying Authorities, their roles, functions, duties, and
powers, based on the provided text.
A Certifying Authority is a legal entity in India, duly licensed by the Controller of Certifying
Authorities under the provisions of the Information Technology Act, 2000, as amended. Their
primary function is to issue Electronic Signature Certificates (ESCs), including Digital Signature
Certificates (DSCs), which authenticate electronic records and ensure their legal validity. CAs act
as trusted third parties that verify the identity of subscribers and link their public keys to their
identities, facilitating secure e-commerce, e-governance, and other digital transactions.
Legal Framework: The IT Act, particularly Sections 30-39, outlines the mandatory
procedures, duties, and responsibilities of CAs to ensure security, compliance, and public
trust.
Examples: Licensed CAs in India include e-Mudhra, CCA India, and others authorized by
the CCA.
Certifying Authorities are entrusted with a range of roles, functions, duties, and powers under
the IT Act, 2000, to support the electronic signature ecosystem. These are detailed below, based
on the provided text:
Role: CAs are responsible for issuing Electronic Signature Certificates (ESCs), including
Digital Signature Certificates (DSCs), to subscribers who apply for them.
Process:
o Application: A subscriber must submit an application in the prescribed form, as
per Section 35(1) and Rule 23(a) of the IT (Certifying Authorities) Rules, 2000.
The form, outlined in Schedule IV, varies for individuals, Hindu Undivided
Families (HUFs), local authorities, and government organizations, requiring
details like identity proof, contact information, date of birth, credit card details,
PAN number, and bank details.
o Fees: The application must include a fee, not exceeding ₹25,000, as prescribed by
the Central Government (Section 35(2)). Different fees may apply for different
classes of applicants to align with social justice goals.
Significance: This function ensures that subscribers can authenticate electronic records
securely, supporting e-commerce, e-governance, and legal transactions.
Role: CAs must maintain secure systems and reliable services to preserve trust in the
electronic signature regime.
Functions:
o Secure Hardware and Software: Under Section 30(a), CAs are mandated to use
hardware, software, and procedures that are secure from intrusion and misuse.
This is critical to prevent compromise of the CA’s systems, which could
undermine the entire electronic signature framework.
o Repository of Certificates: Section 30(ca) designates CAs as the repository for all
ESCs issued under the IT Act, maintaining a database of issued certificates.
Significance: These measures ensure the integrity and trustworthiness of the electronic
signature system, preventing unauthorized access and fostering public confidence.
Role: CAs must make mandatory representations when issuing DSCs to certify their
compliance and the functionality of the certificates.
Functions:
o Compliance Certification: CAs must certify compliance with the IT Act, 2000, IT
Rules, 2000, and other regulations.
o Publication or Availability: CAs must certify that the DSC has been published or
made available to the subscriber or relying parties, and that the subscriber has
accepted it.
o Key Pair Functionality: CAs must certify that the subscriber holds a private key
corresponding to the public key listed in the DSC, and that the key pair is
functional (Section 36(a)-(cb)).
o Accuracy of Information: CAs must ensure and certify that the information in the
DSC is accurate and that no material facts affecting reliability are omitted
(Section 36(d)).
Significance: These representations build trust by ensuring that DSCs are issued with
verified, accurate, and functional key pairs, supporting secure authentication.
Role: CAs are responsible for ensuring full compliance with the IT Act, 2000, and its
associated rules, regulations, and orders.
Functions:
o Employee Compliance: CAs must ensure that all employees or engaged persons
comply with the provisions of the IT Act, 2000, and related rules during their
tenure.
Significance: Compliance ensures the legal and operational integrity of CAs, preventing
misuse and maintaining the credibility of the electronic signature regime.
Role: CAs must publicly display their license to enhance transparency and trust.
Function:
o Section 32 mandates that CAs display their license, issued by the CCA, at a
conspicuous place in their business premises, visible to the public.
o This ensures that visitors and potential subscribers can verify the CA’s legitimacy,
reinforcing trust in the electronic signature system.
Role: CAs must surrender their license to the CCA if it is suspended or revoked.
Functions:
Function:
o Section 34 mandates CAs to disclose details about their business of issuing ESCs,
including practices, certificate statuses, and other relevant information, as
specified by regulations.
Significance: Disclosures ensure that subscribers and the public are informed about the
CA’s authenticity, practices, and reliability, strengthening the electronic signature regime.
Role: CAs have the authority to suspend DSCs under specific conditions, ensuring the
integrity of the certification process.
Functions:
o Duration and Process: Suspension cannot exceed 15 days unless the subscriber is
given an opportunity to be heard, adhering to principles of natural justice. If
justified, the suspension may be extended, with no maximum period specified.
Role: CAs are empowered to revoke DSCs under specific circumstances to maintain trust
and security.
Functions:
o Grounds for Revocation:
Significance: Revocation powers ensure that invalid or compromised DSCs are removed
from circulation, preventing misuse and maintaining trust.
Discretionary Powers:
o CAs have discretion to accept or reject ESC applications after reviewing the CPS
and conducting inquiries (Section 35(4)).
o They can suspend or revoke DSCs based on subscriber requests, public interest,
or specific events like death or dissolution (Sections 37, 38).
Regulatory Oversight: The CCA oversees CAs, ensuring compliance and granting or
revoking licenses, which reinforces their accountability.
Significance: These powers enable CAs to maintain the integrity and reliability of the
electronic signature system while balancing subscriber rights and public interest.
While CAs are critical to the electronic signature regime, they face challenges that impact their
effectiveness:
1. Security Risks: Ensuring hardware, software, and procedures are secure from intrusion
and misuse is challenging, as any breach could compromise the entire CA system.
2. Cost and Infrastructure: Maintaining secure systems and reliable services requires
significant investment, which may increase costs for subscribers.
3. Compliance Burden: Adhering to the IT Act, rules, and regulations, including employee
compliance, can be resource-intensive.
4. Public Trust: Building and maintaining public trust requires consistent transparency,
reliable services, and robust security practices.
Conclusion
Certifying Authorities under the Information Technology Act, 2000, are pivotal entities licensed
by the Controller of Certifying Authorities to issue and manage Electronic Signature
Certificates, including Digital Signature Certificates. Their roles and functions include issuing
certificates, ensuring security and reliability, making statutory disclosures, and managing
suspension and revocation processes. By adhering to Sections 30-39 and related rules, CAs
ensure compliance with the IT Act, maintain the secrecy and integrity of electronic signatures,
and foster trust in India’s digital ecosystem. Their responsibilities, such as certifying key pair
functionality, publishing certificate statuses, and complying with natural justice principles, are
critical for supporting e-commerce, e-governance, and cybersecurity. Despite challenges like
security risks and compliance burdens, CAs play an indispensable role in enabling secure and
legally valid electronic transactions, aligning with India’s digital transformation goals.
The Controller of Certifying Authorities (CCA) is a statutory authority appointed by the Central
Government under Section 17 of the IT Act, 2000, to license and regulate Certifying Authorities
(CAs) that issue digital and electronic signatures for authenticating electronic records. The CCA
plays a central role in promoting e-commerce and e-governance by ensuring the widespread
and secure use of digital signatures in India.
Establishment: The Office of the CCA was established on November 1, 2000, following
the implementation of the IT Act on October 17, 2000.
Root Certifying Authority of India (RCAI): Under Section 18(b), the CCA operates the
RCAI, which digitally signs the public keys of CAs using its own private key. This enables
users to verify that a certificate is issued by a licensed CA, ensuring trust in the digital
signature ecosystem.
Significance: The CCA ensures the smooth functioning of the electronic signature regime,
fostering trust and security in digital transactions, which is critical for India’s digital economy
and governance initiatives.
The appointment of the CCA is governed by Section 17 of the IT Act, 2000, with the following
details:
1. Appointment Process:
o The Central Government appoints the CCA through a notification in the Official
Gazette.
o The first CCA, Mr. Kailash Nath Gupta, was appointed on October 17, 2000,
coinciding with the IT Act’s implementation.
o The CCA operates under the general control, direction, and superintendence of
the Central Government (Section 17(2)).
o Deputy and Assistant Controllers work under the supervision and control of the
CCA, performing duties assigned by the Controller.
o The qualifications, experience, and terms of employment for the CCA, Deputy
Controllers, Assistant Controllers, and other officers are prescribed by the Central
Government via notification.
4. Office Location:
o The Central Government designates the Head Office and Branch Office of the
CCA. Currently, the CCA’s office is based in Delhi.
Significance: The structured appointment process ensures that the CCA is a competent
authority capable of regulating CAs effectively, maintaining the integrity of the digital signature
framework.
The CCA is entrusted with a wide range of functions, duties, and powers under Sections 18-29
of the IT Act, 2000, to ensure the effective implementation and regulation of the electronic
signature regime. These functions, as detailed in Section 18 and other provisions, are outlined
below:
The CCA exercises supervision and control over the activities of CAs to ensure
compliance with the IT Act, 2000, and related rules and regulations.
Significance: Supervision ensures that CAs adhere to legal and technical standards,
preventing misuse and fostering public trust.
2. Certifying Public Keys of CAs (Section 18(b))
The CCA operates the Root Certifying Authority of India (RCAI), which digitally signs the
public keys of CAs using its own private key.
This certification enables users to verify that a DSC or ESC is issued by a licensed CA,
ensuring authenticity and reliability.
Significance: By certifying CA public keys, the CCA establishes a chain of trust, critical for
secure digital transactions.
The CCA specifies technical and operational standards that CAs must maintain,
including security procedures, hardware, and software requirements.
These standards ensure uniformity and reliability across all CAs, promoting a secure
electronic signature ecosystem.
The CCA defines the qualifications and experience required for CA employees to ensure
they have the expertise to manage certificate issuance and security processes.
Significance: Qualified staff enhance the reliability and security of CA services, reducing
risks of errors or breaches.
The CCA outlines conditions under which CAs conduct their business, such as
compliance with security protocols and operational guidelines.
Significance: These conditions ensure that CAs operate within a regulated framework,
maintaining trust and accountability.
The CCA specifies the content of written, printed, or visual materials and
advertisements related to ESCs and public keys.
This ensures that CA communications are accurate, transparent, and not misleading.
Significance: Regulated materials prevent false claims, enhancing public confidence in
CAs.
The CCA defines the form and content of ESCs and associated keys to ensure consistency
and compliance with legal standards.
The CCA prescribes the form and manner in which CAs maintain their accounts, ensuring
transparency and financial accountability.
The CCA specifies the terms, conditions, and remuneration for auditors appointed to
audit CA operations.
The CCA facilitates the establishment and regulation of electronic systems by CAs, either
individually or jointly, to support certificate issuance and management.
Significance: This promotes efficient and secure digital infrastructure for electronic
signatures.
The CCA specifies the manner in which CAs interact with subscribers, ensuring fair and
transparent dealings.
Significance: This protects subscribers from unfair practices and ensures consistent
service delivery.
The CCA resolves conflicts of interest between CAs and subscribers, ensuring equitable
outcomes.
Significance: This maintains fairness and trust in the electronic signature ecosystem.
The CCA defines the duties of CAs, such as ensuring compliance with the IT Act,
maintaining security, and publishing certificate statuses.
The CCA maintains a publicly accessible database containing disclosure records of CAs,
Cross Certifying Authorities, and Foreign Certifying Authorities. This database includes:
The CCA has the discretionary power to recognize Foreign Certifying Authorities to
issue ESCs in India, subject to prior approval from the Central Government.
o The CCA grants licenses after verifying compliance with technical and operational
standards.
o CA licenses are valid for 5 years, and renewal applications must be submitted at
least 45 days before expiry, accompanied by a ₹5,000 fee.
o The Central Government may prescribe the renewal form, but no specific
proforma is currently stipulated.
o The CCA has discretionary power to grant or reject license applications after
reviewing documents and other factors.
Significance: Licensing ensures that only qualified entities operate as CAs, maintaining
the integrity of the electronic signature regime.
Suspension:
o The CCA can suspend a CA’s license pending an inquiry into contraventions, via a
written order.
Revocation:
o The CCA must publish notices of suspension or revocation in the public database,
accessible 24/7 via a website, and may further publicize the contents at its
discretion.
The CCA or its authorized officer is mandated to investigate contraventions of the IT Act,
2000, IT Rules, or regulations.
The CCA has powers similar to those of income-tax authorities under Sections 131-136
of the Income Tax Act, 1961, including:
Investigations are deemed judicial proceedings under Sections 193, 228, and 196 of the
Indian Penal Code, and the CCA is considered a civil court for Section 195 purposes (but
not for Chapter XXVI of the Code of Criminal Procedure, 1973).
Significance: These powers enable the CCA to enforce compliance and address violations
effectively.
The CCA or its authorized officer can access computer systems and data if there is
reasonable cause to suspect a contravention of the IT Act or rules, supported by prima
facie evidence.
The CCA can direct technical assistance from system operators to facilitate searches or
data access.
Significance: This power ensures the CCA can investigate potential breaches, maintaining
the security of the electronic signature regime.
The CCA can direct CAs or their employees to take specific measures or cease activities
to ensure compliance with the IT Act, rules, or regulations.
The CCA can delegate its powers to Deputy Controllers, Assistant Controllers, or other
officers via written communication.
Delegated officers can exercise powers under Chapter VI of the IT Act, as if they were
the CCA.
Conclusion
The Controller of Certifying Authorities (CCA), appointed under Section 17 of the Information
Technology Act, 2000, is a central authority responsible for licensing and regulating Certifying
Authorities (CAs) to ensure a secure and reliable electronic signature regime in India. Appointed
by the Central Government through a notification, the CCA operates under its supervision and
oversees the Root Certifying Authority of India (RCAI) and a public database of CA certificates.
Its functions include supervising CAs, certifying their public keys, setting standards, issuing and
renewing licenses, investigating contraventions, and resolving conflicts. The CCA’s powers, such
as suspending or revoking licenses, accessing data, and issuing compliance directions, ensure
regulatory control and trust in the digital signature ecosystem. By performing these roles, the
CCA supports India’s e-commerce and e-governance initiatives, aligning with global standards
and fostering a secure digital economy.
The Cyber Appellate Tribunal (CAT), also referred to as the Cyber Regulations Appellate
Tribunal, was established under Section 48 of the IT Act, 2000, to provide a forum for hearing
appeals against orders passed by Adjudicating Officers or the CCA. It is a quasi-judicial body,
meaning it has powers similar to those of a civil court but operates with greater flexibility and is
not bound by the strict procedural rules of the Code of Civil Procedure, 1908. The CAT was
created to address legal challenges arising from the digital age, such as cybercrimes, electronic
transactions, and disputes involving digital signatures, ensuring speedy and specialized
resolution.
Establishment: The CAT was established in 2006 by the Central Government via
notification, as mandated by Section 48(1). The first and only CAT in India is
headquartered in New Delhi, as specified by Rule 13 of the Cyber Regulation Tribunal
Rules, 2000, though the Chairperson may authorize sittings at other locations if
necessary.
Jurisdiction: The CAT has appellate jurisdiction across India, covering appeals against
decisions or orders related to contraventions of the IT Act, such as issues involving digital
signatures, cybercrimes, or data protection. The Central Government specifies the
matters and places under the CAT’s jurisdiction via notification.
Current Status: The CAT is currently defunct, with its functions transferred to the
Telecom Disputes Settlement and Appellate Tribunal (TDSAT), as noted in some
sources. However, this response focuses on the CAT’s establishment and functions as
defined in the IT Act, 2000.
Significance: The CAT was designed to provide an independent and specialized forum for
resolving cyber-related disputes, ensuring the effective implementation of the IT Act and
protecting the rights of individuals and businesses in the digital landscape.
The composition of the CAT is outlined in Section 49 of the IT Act, 2000, and has evolved over
time:
Original Structure: Initially, the CAT was a single-member body led by a Presiding
Officer, appointed by the Central Government via notification.
o Benches: The CAT’s jurisdiction and powers may be exercised through Benches,
each constituted by the Chairperson with one or two members, as deemed fit.
The Central Government specifies the areas of jurisdiction for each Bench via
notification. The Chairperson may transfer members between Benches or assign
complex cases to a larger Bench (Section 49(3)-(5)).
Headquarters: The primary location for CAT hearings is New Delhi, but the Chairperson
may direct sittings at other places if circumstances warrant (Rule 13, Cyber Regulation
Tribunal Rules, 2000).
Significance: The multi-member structure and flexible Bench system enhance the CAT’s ability
to handle complex cyber disputes efficiently, with expertise in both legal and technical domains.
Section 50 of the IT Act, 2000, specifies the qualifications for the Presiding Officer (or
Chairperson and members post-2008 amendment):
1. High Court Judge: The individual must be, have been, or be qualified to be a Judge of a
High Court, ensuring deep legal expertise.
2. Indian Legal Service: Alternatively, the individual must be or have been a member of the
Indian Legal Service and have held a Grade I post for at least three years.
4. Term of Office:
o The Chairperson serves for five years or until the age of 65, whichever is earlier.
o Incompetence or inefficiency.
Significance: These stringent qualifications ensure that the CAT is led by individuals with legal
and technical expertise, capable of addressing complex cyber disputes. The removal process
upholds principles of natural justice.
The CAT is endowed with significant powers under Section 58 of the IT Act, 2000, to discharge
its appellate functions effectively. These powers align with those of a civil court under the Code
of Civil Procedure, 1908, but the CAT operates with greater procedural flexibility:
o Section 58(1) states that the CAT is not bound by the Code of Civil Procedure,
1908, but is guided by the principles of natural justice (e.g., fair hearing,
impartiality).
o The CAT has the authority to regulate its own procedure, including the location
of hearings, providing flexibility to adapt to case-specific needs.
o The CAT has the same powers as a civil court under the Code of Civil Procedure,
1908, in the following matters (Section 58(2)):
o Significance: These powers enable the CAT to conduct thorough and fair
proceedings, ensuring access to evidence and witnesses.
3. Judicial Proceedings:
o Proceedings before the CAT are deemed judicial proceedings under Sections
193, 228, and 196 of the Indian Penal Code, ensuring legal sanctity (e.g.,
penalties for false evidence or contempt).
o The CAT is considered a civil court for the purposes of Section 195 and Chapter
XXVI of the Code of Criminal Procedure, 1973, reinforcing its authority in
handling evidence-related matters.
4. Appellate Jurisdiction:
o The CAT has the authority to exercise appellate jurisdiction over decisions or
orders passed by the Controller of Certifying Authorities or Adjudicating
Officers, both on facts and law (Section 57).
o It can investigate the accuracy, legality, and propriety of such decisions, ensuring
comprehensive review.
o The CAT can review its own orders, allowing it to correct mistakes or reconsider
decisions based on new evidence or legal grounds (Section 58(2)).
6. Exclusivity of Jurisdiction:
o No civil court can entertain suits or proceedings on matters that the IT Act
empowers the CAT or Adjudicating Officer to handle, nor can it grant injunctions
against actions taken under the Act (Section 61).
o Any person aggrieved by a CAT decision can appeal to the High Court within 60
days (extendable by another 60 days for sufficient cause) on matters of fact or
law (Section 62).
o The CAT is the final fact-finding authority, with the High Court serving as the
second appellate forum.
o Significance: This provides a mechanism for further review, ensuring justice while
maintaining the CAT’s specialized role.
Significance: The CAT’s powers, combining civil court authority with procedural flexibility,
enable it to efficiently resolve complex cyber disputes while adhering to principles of natural
justice.
The CAT’s primary function is to serve as an appellate body for disputes under the IT Act, 2000.
Its key functions, derived from the Act and web sources, include:
o The CAT hears appeals from any person aggrieved by an order of the Controller
of Certifying Authorities or an Adjudicating Officer under the IT Act.
o Appeals must be filed within 45 days of the order, as per Section 57.
o The CAT examines the accuracy, legality, and propriety of the order, both on
facts and law, ensuring comprehensive review.
o Significance: This flexibility allows the CAT to adapt to the unique needs of cyber
cases, ensuring efficient dispute resolution.
o The CAT can summon witnesses, enforce their attendance, examine them on
oath, and compel the production of documents or electronic records (Section
58(2)).
o Significance: This ensures that the CAT has access to all necessary evidence to
make informed decisions.
o By adhering to principles of natural justice (e.g., right to a fair hearing), the CAT
ensures impartial and transparent proceedings, fostering public confidence in the
digital legal framework.
Defunct Status: As of recent sources, the CAT is no longer operational, and its functions
have been transferred to the Telecom Disputes Settlement and Appellate Tribunal
(TDSAT).
Conclusion
The Cyber Appellate Tribunal (CAT), established under Section 48 of the Information
Technology Act, 2000, serves as a specialized quasi-judicial body to hear appeals against orders
of the Controller of Certifying Authorities or Adjudicating Officers. Headquartered in New
Delhi, it comprises a Chairperson and additional members with legal or IT expertise, appointed
by the Central Government. The CAT’s powers, outlined in Section 58, include summoning
witnesses, compelling document production, and reviewing its own orders, with the flexibility to
regulate its own procedures while adhering to principles of natural justice. Its functions include
adjudicating cyber-related disputes, ensuring fair hearings, and supporting e-commerce and e-
governance. Although currently defunct with its responsibilities transferred to the TDSAT, the
CAT’s framework under the IT Act remains a cornerstone for addressing digital disputes,
ensuring a robust legal framework for India’s digital ecosystem.