Rule 38
Security Guidelines To Comply
(1) Working procedures and practices of the Certifying Authority shall be consistent with law.
(2) The Certifying Authority shall have to perform its business in a manner by which security, credibility and confidentiality of digital signature, information and other matters shall be fully ensured.
(3) Information technology and security guidelines to be used by the Certifying Authority shall be as issued by Government of Nepal. upon the recommendation of the Controller,
(4) The information technology and security policy to be used by the Certifying Authority shall be based on security guidelines issued in accordance with Sub-rule (3).