BACK TO IT ACT
IT Act 2000

Section 36

Representations upon Issuance of Digital Signature Certificate

THE STATUTE

Original Text

A Certifying Authority while issuing a Digital Signature Certificate shall certify that— (a) it has complied with the provisions of this Act and the rules and regulations made thereunder; (b) it has published the Digital Signature Certificate or otherwise made it available to such person relying on it and the subscriber has accepted it; (c) the subscriber holds the private key corresponding to the public key listed in the Digital Signature Certificate; (d) the subscriber's public key and private key constitute a functioning key pair; (e) the information contained in the Digital Signature Certificate is accurate; and (f) it has no knowledge of any material fact which if it had been included in the Digital Signature Certificate would adversely affect the reliability of the representations made in clauses (a) to (d).

Simplified

Section 36 defines the statutory representations that a Certifying Authority (CA) makes to the world when it issues a Digital Signature Certificate. These representations are not contractual warranties to the subscriber alone — they are made to any person who relies on the certificate. The six representations cover compliance with the IT Act and regulations; publication and subscriber acceptance of the certificate; the subscriber's possession of the corresponding private key; the functionality of the key pair (both keys work together correctly); the accuracy of the certificate's information (subscriber name, public key, validity period, etc.); and the absence of any known material fact that would undermine the certificate's reliability. Clause (f) is particularly significant: it imposes a knowledge-based duty of disclosure on the CA. If a CA knows something material — for example, that the subscriber's identity verification was incomplete, or that there are concerns about the subscriber's key management — it cannot issue the certificate without disclosure. These representations create the legal foundation for relying party trust in the PKI system. A bank, court, or government agency that relies on a Digital Signature Certificate to authenticate a transaction is entitled to rely on Section 36's representations. If a CA issues a certificate while knowing these representations are false — for instance, the identity verification was fraudulent — the CA faces civil liability to affected relying parties and regulatory consequences from the Controller of Certifying Authorities.

Legal Evolution

Section 36 was in the original IT Act 2000, modelled on the American Bar Association's Digital Signature Guidelines (1996) and Utah Digital Signature Act (1995), which first codified the concept of CA representations in PKI law. The provision underpins the legal trust model of India's licensed CA system.

Key Amendments

Unchanged since the original IT Act 2000.

The CCA Regulations have supplemented Section 36 with detailed audit and verification requirements for CAs.