Secure Storage of DSC Tokens
- Always store your DSC in a certified USB token with built-in encryption.
- Avoid saving certificate files directly on your computer or shared devices.
- Do not leave the token connected to the system when not in use.
- Keep the token in a secure and locked location to prevent theft or tampering.
- Use only tokens provided by authorized Certifying Authorities.
Protect the PIN or Password
- Set a strong, unique PIN or password for your DSC token.
- Never share your DSC PIN with unauthorized individuals.
- Do not write the PIN on the token or store it in insecure files.
- Change the PIN immediately if you suspect it has been compromised.
- Use two-factor authentication if supported by your DSC software.
Limit Access to Authorized Users Only
- Ensure only the designated individual has access to the DSC.
- Organizations should assign DSCs role-wise to prevent misuse.
- Maintain clear internal policies for DSC usage and handling.
- Revoke DSCs of employees who leave or change roles.
- Avoid using one DSC for multiple users or departments.
Regular Monitoring and Renewal
- Keep track of the DSC’s expiry date and renew it before expiration.
- Check regularly for any unauthorized or suspicious DSC activity.
- Revoke and replace DSCs that are lost, compromised, or misused.
- Maintain an audit trail of usage for official and legal compliance.
- Confirm that certificate details are accurate and up to date.
Use Trusted Devices and Environments
- Connect and use your DSC only on trusted and malware-free systems.
- Install updates for DSC drivers and token management utilities.
- Avoid signing documents or making filings on public or unsecured computers.
- Use secure browsers and disable unnecessary plugins when using DSCs.
- Enable firewall and antivirus protection to detect malicious activity.
Compliance with Legal and IT Standards
- Ensure DSCs are issued by licensed Certifying Authorities.
- Follow guidelines under the Information Technology Act, 2000.
- Sign only documents that you fully understand and authorize.
- Maintain backups of critical filings and signed documents.
- Educate users on DSC handling, legal use, and security risks.



0 Comments