BACK TO IT ACT
IT Act 2000

Section 41

Acceptance of Digital Signature Certificate

THE STATUTE

Original Text

(1) A subscriber shall be deemed to have accepted a Digital Signature Certificate if he publishes or authorises the publication of a Digital Signature Certificate— (a) to one or more persons; (b) in a repository; or otherwise demonstrates his approval of the Digital Signature Certificate in any manner. (2) By accepting a Digital Signature Certificate the subscriber certifies to all who reasonably rely on the information contained in the Digital Signature Certificate that— (a) the subscriber holds the private key corresponding to the public key listed in the Digital Signature Certificate and is entitled to hold the same; (b) all representations made by the subscriber to the Certifying Authority and all material relevant to the information contained in the Digital Signature Certificate are true; (c) all information in the Digital Signature Certificate that is within the knowledge of the subscriber is true.

Simplified

Section 41 defines the act of acceptance of a Digital Signature Certificate and the legal representations that acceptance entails. Acceptance is established by conduct: publishing the certificate, authorising the CA to publish it in a repository, or otherwise demonstrating approval. This is significant because it means acceptance is not just a formal signed form — any act of making the certificate available to relying parties constitutes acceptance. The representations triggered by acceptance are subscriber-facing counterparts to the CA's Section 36 representations. By accepting, the subscriber certifies to all who reasonably rely on the certificate three things: first, that they hold the corresponding private key and are entitled to hold it (ruling out stolen or fraudulently obtained certificates); second, that all information they provided to the CA and all material in the certificate is true (ruling out identity fraud in the certificate application process); and third, that all information in the certificate within the subscriber's knowledge is true. These representations run to relying parties — not just to the CA. A subscriber who accepts a certificate while knowing that information in it is false, or while having no right to the private key, makes false representations to every party who subsequently relies on that certificate. This exposes the subscriber to civil liability for damages suffered by relying parties and potentially criminal liability under Sections 66C (identity theft) and 66D (impersonation using computer resources).

Legal Evolution

Section 41 was in the original IT Act 2000, drawn from the PKI legal framework developed by the ABA Digital Signature Guidelines (1996). It creates the bilateral representation structure of the PKI trust model: the CA represents the certificate's validity (Section 36), and the subscriber represents their own entitlement and the certificate information's accuracy (Section 41).

Key Amendments

Unchanged since the original IT Act 2000.