BACK TO IT ACT
IT Act 2000
Section 16
Security Procedures and Practices
THE STATUTE
Original Text
For the purposes of this Act, the Central Government may, for the purpose of its application in relation to any Ministry or Department of the Central Government, prescribe the security procedures and practices: Provided that in prescribing such security procedures and practices, the Central Government shall have due regard to the commercial circumstances prevailing at the time when the procedure or practice was specified, including— (a) the nature of the transaction; (b) the level of sophistication of the parties with their training and experience; (c) the volume of similar transactions engaged in by other parties; (d) the importance of speed in making the contract or other action take effect; (e) the physical location of the parties; (f) for human-based systems, the need to prevent unauthorised access to the communication system and to maintain the integrity of the message; (g) the commercially available and practicable nature of the technology.
Simplified
Section 16 is the rule-making foundation for the IT Act's security framework — it empowers the Central Government to prescribe what counts as a 'security procedure' for the purposes of Sections 14 (secure electronic records) and 15 (secure electronic signatures). Without prescribed security procedures, the enhanced evidentiary protections in those sections cannot operate. The proviso contains a sophisticated, multi-factor test for commercial reasonableness that the government must consider when prescribing procedures. These factors include the nature and value of the transaction, the sophistication of the parties involved, industry practice volume, the importance of speed (acknowledging that heavily secured procedures slow down high-frequency transactions), the physical locations of the parties (relevant to cross-border transactions), technical safeguards for human-operated systems, and the practical commercial availability of the required technology. This multi-factor framework prevents the government from prescribing gold-standard security procedures that are technically ideal but commercially impractical for the relevant transaction type. For example, the security procedure appropriate for a high-value property registration differs from that appropriate for routine e-commerce orders. The Information Technology (Security Procedures) Rules 2004 were notified under this section, specifying cryptographic hash functions, asymmetric cryptographic systems, and digital signature standards that satisfy the Section 14-15 requirements.
Legal Evolution
Section 16 was in the original IT Act 2000. The Information Technology (Security Procedures) Rules 2004 were the primary exercise of this power. The section reflects a deliberate policy choice to keep technical standards in delegated legislation (which can be updated as technology evolves) rather than the primary statute.
Key Amendments
Unchanged since the original IT Act 2000.
Information Technology (Security Procedures) Rules 2004 notified under this section.