(a)

are reasonably secure from intrusion and misuse;

(b)

provide a reasonable level of reliability and correct operation:

(c)

area reasonably suited to performing the intended functions; and

(d)

adhere to generally accepted security procedures;

“security procedure” means the security procedure prescribed under section 15;
“subscriber” means a person in whose name the Digital Signature Certificate is issued;
“verify” in relation to a digital signature, electronic record or public key, means to determine whether —
(i)

the initial electronic record was affixed with the digital signature by the use of the
private key corresponding to the public key of the subscriber;

(ii)

the initial electronic record is retained intact or has been altered since such electronic
record was so affixed with the digital signature.

Part II - Digital Signature

Authentication electronic records.
3.(1)
Subject to the provisions of this section any subscriber of may authenticate an electronic record by
affixing his digital signature.
(2)
The authentication of an electronic record shall be effected by the use of an asymmetric crypto system
and hash function. For the purposes of this subsection. “hash function” means an algorithm mapping or translation
of one sequence of bits into another. generally smaller, set known as “hash result' such that an electronic record
yields the same hash result every time the algorithm is executed with the same electronic record as its input
making it computationally infeasible —
(a)

To derive or reconstruct the original electronic record from the hash result produced by
the algorithm;

(b)

That two electronic records can produce the same hash result using the algorithm.

(3)

Any person by the use of a public key of the subscriber may verify the electronic record.

(4)

The private key and the public key are unique to the subscriber and constitute a functioning key pair.

Part Ill - Electronic Governance
4.
Where any law provides that information or any other matter shall be in writing then, notwithstanding
anything contained in such Law, such requirement shall ho deemed to have been satisfied if such or matter is (a)

rendered or made available in an electronic form: and

(b)

accessible so as to be usable for a subsequent reference.

3

Select target paragraph3