Publishing False digital signature certificates - Sec.73

Section 73 IT Act penalises the publication of false or revoked electronic signature certificates. Learn about the legal requirements, two-year jail term, and why verification is critical.

May 21, 2012

Section 73 of the Information Technology Act governs the integrity of the digital certification process in India. It prohibits the publication of Electronic Signature Certificates that are known to be false, revoked, or unaccepted by the subscriber. In a digital economy where identity verification is the bedrock of trust, publishing a fraudulent certificate is a serious criminal offence that undermines the entire e-commerce and legal ecosystem.\n

\n\n

What Constitutes an Offence under Section 73?

\n

The law is specific about the three conditions where publishing an electronic signature certificate becomes illegal. You cannot make a certificate available to others if you know that the Certifying Authority listed did not actually issue it, or if the subscriber named in the certificate never accepted it. Furthermore, any person who publishes a certificate while knowing it has been revoked or suspended is liable, unless the purpose is specifically for verifying a signature created before that suspension.\n

\n\n

IT Act Penalties for False Certificate Publication

\n

The consequences for violating Section 73 are significant. A person found guilty of contravening these provisions can be punished with imprisonment for a term of up to two years, a fine of up to one lakh rupees, or both. This penalty reflects the state's interest in maintaining the reliability of cyber law in India and ensuring that digital credentials carry the same weight as physical signatures.\n

\n\n

Why Digital Signature Verification Matters

\n

For businesses, the risk is not just in the illegal act of publication but in the reliance on fraudulent credentials. Using a false certificate can lead to contract nullification, financial loss, and secondary legal disputes. Implementing robust managed security protocols for credential handling is the first line of defence against identity-related fraud. Verification should always precede acceptance of any high-value digital signature.\n

\n\n

Role of Digital Forensics in Certificate Disputes

\n

Investigations into Section 73 violations often require a deep dive into server logs, certificate repository history, and communication trails between the subscriber and the Certifying Authority. Proving \"knowledge\" of the certificate's falsity is the central challenge in these cases. Our team uses specialized digital forensics techniques to establish a factual timeline of issuance, acceptance, and publication, providing the evidence needed for legal resolution.\n

\n\n

Secure Your Digital Certification Process

\n

Maintaining the integrity of your digital signatures is critical for valid e-contracts and secure corporate communications. If you suspect that a false certificate has been published in your name, or if you need to audit your organization's certification handle, contact our cyber law experts for a comprehensive security review and legal advisory.\n

Found this helpful?

Share this page with others