Information Technology (Preservation and Retention of Information by Intermediaries Providing Digital Locker Facilities) Rules, 2016 - G.S.R. 711(E) - Indian Law
📋
Contents
Cases Cited
Referred In
Notifications
Circulars
Forms
Manuals
Acts
Rules & Regulations
Case Laws New
Ref Provisions New
Plus +
Source NTF
Summary
Similar
Note
Bookmark
Share
✓ Copied successfully !
Print
Print Options
For full text, please login
Login to TaxTMI
Verification Pending
The Email Id has not been verified. Click on the link we have sent on
Digital Locker retention rules prescribe authority, provider obligations, consented URI access and mandatory security and audit requirements. The rules create a Government administered Digital Locker system for preservation and retention of issuer issued electronic records, appointing a Digital Locker authority to license and manage service providers (portals, repositories, gateways) under DeitY technical standards. They set enrollment and operational protocols for subscribers, issuers and requesters (URI push/pull, consented access via gateways), require service provider compliance with authorising terms, mandate grievance officers, suspension/revocation procedures, subscriber credential duties, fee and portability rules, audit regimes with independent auditors, confidentiality protections, offsite backups, Indian data location, and adherence to prescribed security practices.
Cases where this provision is explicitly mentioned in the judgment/order text; may not be exhaustive. To view the complete list of cases mentioning this section, Click here.
Provisions expressly mentioned in the judgment/order text.
Digital Locker retention rules prescribe authority, provider obligations, consented URI access and mandatory security and audit requirements.
The rules create a Government administered Digital Locker system for preservation and retention of issuer issued electronic records, appointing a Digital Locker authority to license and manage service providers (portals, repositories, gateways) under DeitY technical standards. They set enrollment and operational protocols for subscribers, issuers and requesters (URI push/pull, consented access via gateways), require service provider compliance with authorising terms, mandate grievance officers, suspension/revocation procedures, subscriber credential duties, fee and portability rules, audit regimes with independent auditors, confidentiality protections, offsite backups, Indian data location, and adherence to prescribed security practices.
Full Summary is available for active users!
Note: It is a system-generated summary and is for quick reference only.