23. How is controller or Certifying Authority appointed? What are his functions under the Information Technology Act?

Electronic messages

In an age where electronic communication and digital transactions are becoming the norm, ensuring the authenticity, security, and trustworthiness of digital data is crucial. The Information Technology Act, 2000 (IT Act) addresses this through a framework that regulates Digital Signatures, Electronic Records, and Certifying Authorities (CAs). At the core of this system is the Controller of Certifying Authorities (CCA), a central figure appointed to oversee and regulate the digital signature infrastructure in India.


Appointment of the Controller and Certifying Authorities

The Controller of Certifying Authorities (CCA) is appointed under Section 17 of the IT Act, 2000 by the Central Government. The CCA is generally a high-ranking officer, typically of the level of Additional Secretary to the Government of India. The appointment is made through an official notification, and the Controller acts under the directions of the Central Government.

Alongside the CCA, the Act also provides for the appointment of Certifying Authorities (CAs) under Section 20. These are licensed entities (government or private) authorized to issue Digital Signature Certificates (DSCs) to individuals, companies, and other organizations. The CCA grants these licenses and supervises their operation.


Functions of the Controller of Certifying Authorities

The Controller’s powers and responsibilities are detailed in Sections 18 and 19 of the IT Act. The Controller plays a key role in ensuring the credibility, security, and legal validity of digital signatures in India. Below are the major functions:

1. Licensing of Certifying Authorities

As per Section 18(a), the Controller is empowered to grant, renew, suspend, or revoke licenses to Certifying Authorities. Only licensed CAs can issue legally valid Digital Signature Certificates.

2. Certifying the Public Keys

Under Section 18(d), the Controller certifies the public keys of Certifying Authorities, ensuring their credibility and establishing a Public Key Infrastructure (PKI) for the country.

3. Laying Down Standards and Practices

Section 18(b) empowers the Controller to specify standards regarding the form and content of Digital Signature Certificates, security procedures, and other technical specifications.

4. Audit and Monitoring

The Controller has the authority to audit and inspect the operations of Certifying Authorities to ensure compliance with prescribed rules (Section 18(g)). This includes verifying the security of CA systems, procedures, and storage of digital signature data.

5. Investigation of Misconduct

In case of complaints or misuse of digital certificates, the Controller has the power to investigate and take necessary actions, including suspension or revocation of CA licenses (Sections 18(i) and 18(j)).

6. Maintaining a Repository of Digital Certificates

Section 18(e) assigns the Controller the responsibility of maintaining a publicly accessible database of all Digital Signature Certificates, making the verification process transparent.

7. Dispute Resolution and Regulation

The Controller also serves as a regulatory authority, resolving disputes between users and Certifying Authorities and issuing directions or guidelines from time to time.


Legal Framework Supporting Controller’s Powers

  • Information Technology (Certifying Authorities) Rules, 2000: These rules detail the procedures for licensing, auditing, and renewal of Certifying Authorities.
  • Digital Signature (End-Entity) Rules, 2015: These specify responsibilities of digital signature holders.
  • Indian Evidence Act, 1872 (as amended): Recognizes digital signatures and certificates issued by CAs as legally admissible in court, provided they are issued by a CA licensed under the CCA.

Role of Certifying Authorities (CAs)

Certifying Authorities are licensed organizations that issue Digital Signature Certificates. Their responsibilities include:

  • Verifying applicant identity before issuing a DSC
  • Ensuring secure systems for key generation and storage
  • Following the directions of the Controller and adhering to auditing standards
  • Maintaining confidentiality and reliability in certificate issuance

Importance in E-Governance and Cybersecurity

The role of the Controller and Certifying Authorities is central to e-governance, e-commerce, e-filing of taxes, and cybersecurity. Without a robust digital signature infrastructure, digital contracts and documents would lack legal enforceability and security.

Digital signatures, regulated by the Controller, ensure:

  • Authentication of sender identity
  • Integrity of the data (no tampering)
  • Non-repudiation (sender cannot deny sending the message)

Mnemonic Sentence:

“Great Secure Certificates Are Always Monitored, Investigated, and Regulated Carefully.”

Mnemonic WordMeaning
GreatGranting licenses to Certifying Authorities (Section 18(a))
SecureSetting standards for secure digital signatures (Section 18(b))
CertificatesCertifying public keys and digital certificates (Section 18(d))
AreAuditing Certifying Authorities (Section 18(g))
AlwaysActing on complaints and misuse (Sections 18(i), 18(j))
MonitoredMaintaining digital certificate repository (Section 18(e))
InvestigatedInvestigating misconduct or fraud by CAs (Sections 18(i), 18(j))
AndAdvising, resolving disputes, and issuing directions (Regulatory role)
RegulatedRegulating the functioning of Certifying Authorities consistently
CarefullyEnsuring compliance with laws and maintaining public trust

Leave a Reply

Your email address will not be published. Required fields are marked *