Loading…

Section 20 TITCAR (The Information Technology (Certifying Authorities) Rules, 2000): Method of Destroying Private Key.-Upon termination of use of a private key, all copies of the private key in computer memory and shared disk space must be securely destroyed by overwriting. Private key destruction procedures must be described in the Certification Practice Statement or other publicly available document | Law on Tips | Law on Tips