{"id":3368,"date":"2019-03-08T07:20:54","date_gmt":"2019-03-08T07:20:54","guid":{"rendered":"https:\/\/signdesk.com\/in\/?p=3368"},"modified":"2025-09-17T05:31:37","modified_gmt":"2025-09-17T11:01:37","slug":"amendment-ekyc-techniques-allowed","status":"publish","type":"post","link":"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed","title":{"rendered":"New Amendment States \u2018Other\u2019 e-KYC Techniques Allowed for e-Signatures"},"content":{"rendered":"<h2><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-6181 size-full\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2019\/03\/New-amendment.jpg\" alt=\"New Amendment States \u2018Other\u2019 e-KYC Techniques Allowed for e-Signatures\" width=\"1200\" height=\"627\" \/><\/h2>\n<h2><span style=\"color: #008000;\">e-KYC Techniques Allowed for e-Signatures:-<\/span><\/h2>\n<p><span style=\"font-weight: 400; color: #000000; font-size: 16px; font-family: 'open sans';\">The Ministry of Electronics and Information Technology has issued a notification amending the Second Schedule to the <strong><a style=\"color: #000000;\" href=\"https:\/\/en.wikipedia.org\/wiki\/Information_Technology_Act,_2000\">Information Technology Act, 2000<\/a>.<\/strong> In a nutshell, Section 3A of the <strong>IT Act,2000<\/strong> specifies that a subscriber may authenticate any electronic record by such electronic signature or electronic authentication which is considered reliable and may be specified in the Second Schedule. The Second Schedule of the Information Technology Act prior to the amendment only mentioned e-Authentication technique using <a style=\"color: #000000; font-size: 16px; font-family: 'open sans';\" href=\"https:\/\/melento.ai\/en-in\/blog\/aadhaar-based-ekyc\"><strong>Aadhaar e-KYC services<\/strong><\/a> as the only mode of e-Authentication. This, in turn, meant that the mode of the electronic signature would have to be <a style=\"color: #000000; font-size: 16px; font-family: 'open sans';\" href=\"https:\/\/melento.ai\/en-in\/blog\/legal-validity-esign-india\"><strong>Aadhaar eKYC based to be valid<\/strong><\/a>. <\/span><\/p>\n<p><span style=\"font-weight: 400; color: #000000; font-size: 16px; font-family: 'open sans';\">The amendment to the Second Schedule dated 5th March 2019 has inserted the word \u201cother\u201d after Aadhaar in Second Schedule. The Second Schedule post the amendment would read as \u2018<strong>e-Authentication technique using Aadhaar and other e-KYC services<\/strong>\u2019. This indicates that <strong><a style=\"color: #000000; font-size: 16px; font-family: 'open sans';\" href=\"https:\/\/melento.ai\/en-in\/electronic-signature\">Electronic Signature<\/a><\/strong> can now be generated by the Certifying Authority, using e-Authentication techniques which may or may not be Aadhaar, as long as it is issued in accordance with the e-Authentication Guidelines issued by the Controller of Certifying Authority.<\/span><\/p>\n<p><span style=\"font-weight: 400; color: #000000; font-size: 16px; font-family: 'open sans';\">Consequent Amendments have been made to Form C Schedule IV of the Information Technology Certifying Authority Rules, 2000.<\/span><\/p>\n<p><span style=\"color: #000000; font-size: 16px; font-family: 'open sans';\"><strong>It is to be noted that prior to the substitution Form C was as hereinunder<\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong>FORM C<\/strong><\/p>\n<p>&nbsp;<\/p>\n<div class=\"text-center\" style=\"width: 100px; height: 100px; border: 1px solid black; color: black; background: #eaf4ff; float: right; padding-top: 37px;\">Photo<\/div>\n<div style=\"clear: both;\"><\/div>\n<div><\/div>\n<div>\n<p>&nbsp;<\/p>\n<p><b>APPLICATION FORM FOR ISSUE OF DIGITAL SIGNATURE CERTIFICATE THROUGH AADHAAR BASED IDENTITY VERIFICATION OF DIGITAL SIGNATURE CERTIFICATE APPLICANT<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Class of certificate applied: Individual<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Aadhaar No*<\/span>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 :\u00a0<span style=\"font-weight: 400;\">&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Name<\/span> <span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 : &#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">E-mail address\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 : &#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Residential Address*<\/span> <span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a0 : &#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Valid Phone Number\u00a0 \u00a0 \u00a0 \u00a0: \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Date:<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Authenticated by Aadhaar e-KYC ref No (response code)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Note1- This is an electronic application form automatically generated through Aadhaar e-KYC based electronic authentication of the applicant.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Note 2- * Denotes Mandatory Field.<\/span><\/p>\n<\/div>\n<div>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">After the substitution-<\/span><\/p>\n<p style=\"text-align: center;\"><b>FORM C<\/b><\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"text-center\" style=\"width: 100px; height: 100px; border: 1px solid black; color: black; background: #eaf4ff; float: right; padding-top: 37px;\">Photo<\/div>\n<div style=\"clear: both;\"><\/div>\n<div><\/div>\n<div>\n<p>&nbsp;<\/p>\n<p><b>APPLICATION FORM FOR ISSUE OF DIGITAL SIGNATURE CERTIFICATE THROUGH eKYC BASED IDENTITY VERIFICATION OF DIGITAL SIGNATURE CERTIFICATE APPLICANT<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Class of certificate applied: Individual<\/span><\/p>\n<p><span style=\"font-weight: 400;\">eKYC No <\/span> <span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0: &#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Name<\/span> <span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0: &#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">E-mail address\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0: &#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Residential Address<\/span> <span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0: &#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mobile Phone Number\u00a0 \u00a0 \u00a0: \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Date &#8230;&#8230;&#8230;&#8230;&#8230;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Authenticated by e-KYC services ref. No: (response code)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Note 1. This is an electronic application form automatically generated through e-KYC based electronic authentication of an applicant.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Note 2. * Denotes mandatory fields &#8220;.<\/span><\/p>\n<p><b>Analysis- <\/b><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Aadhaar based Authentication has been substituted with eKYC Based Identity Verification <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Aadhaar Number has been substituted with eKYC Number<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">This change being effected post the Aadhaar Verdict introduces the scope of Electronic Signature being generated based on other KYC details in addition to Aadhaar eKYC Services.<\/span><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: center;\"><span style=\"font-weight: 400;\">Amendment to the Second Schedule of IT Act,2000<\/span><\/h3>\n<p>&nbsp;<\/p>\n<div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3379 aligncenter\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2019\/03\/Amendment-to-the-Second-Schedule-of-IT-Act2000-p.1-234x300.jpg\" alt=\"Amendment to the Second Schedule of IT Act,2000 p.1\" width=\"335\" height=\"430\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3380 aligncenter\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2019\/03\/Amendment-to-the-Second-Schedule-of-IT-Act2000-p.2-234x300.jpg\" alt=\"Amendment to the Second Schedule of IT Act,2000 p.2\" width=\"335\" height=\"429\" \/><\/p>\n<h3><\/h3>\n<h3 style=\"text-align: center;\"><span style=\"font-weight: 400;\">Amendment to IT (Certifying Authorities) Rules,2000<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-3381 aligncenter\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2019\/03\/Amendment-to-IT-Rules-2000-p.1-234x300.jpg\" alt=\"Amendment to IT Rules 2000 p.1\" width=\"333\" height=\"427\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3382 aligncenter\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2019\/03\/Amendment-to-IT-Rules-2000-p.2-232x300.jpg\" alt=\"Amendment to IT Rules 2000 p.2\" width=\"333\" height=\"430\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3383 aligncenter\" src=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2019\/03\/Amendment-to-IT-Rules-2000-p.3-235x300.jpg\" alt=\"Amendment to IT Rules 2000 p.3\" width=\"336\" height=\"429\" \/><\/p>\n<\/div>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>e-KYC Techniques Allowed for e-Signatures:- The Ministry of Electronics and Information Technology has issued a notification amending the Second Schedule to the Information Technology Act, 2000. In a nutshell, Section 3A of the IT Act,2000 specifies that a subscriber may authenticate any electronic record by such electronic signature or electronic authentication which is considered reliable [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":6181,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page_templates\/blog-new-3.php","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[14],"tags":[33,796,824,848,981,1848],"class_list":["post-3368","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ekyc","tag-aadhaar","tag-e-kyc","tag-ekyc","tag-electronic-signature","tag-esign","tag-paperless"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Amendment: \u2018Other\u2019 e-KYC Techniques for e-Signatures&#039; | Melento (Formerly SignDesk)<\/title>\n<meta name=\"description\" content=\"New amendment to IT Act,2000 allows other e-KYC techniques for e-Signatures. Read more to find out the changes made in the Act.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Amendment: \u2018Other\u2019 e-KYC Techniques for e-Signatures&#039; | Melento (Formerly SignDesk)\" \/>\n<meta property=\"og:description\" content=\"New amendment to IT Act,2000 allows other e-KYC techniques for e-Signatures. Read more to find out the changes made in the Act.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed\" \/>\n<meta property=\"og:site_name\" content=\"Melento (Formerly SignDesk)\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-08T07:20:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-17T11:01:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2019\/03\/New-amendment-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Abhijith NS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abhijith NS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed\",\"name\":\"Amendment: \u2018Other\u2019 e-KYC Techniques for e-Signatures' | Melento (Formerly SignDesk)\",\"isPartOf\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed#primaryimage\"},\"image\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed#primaryimage\"},\"thumbnailUrl\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2019\/03\/New-amendment-1.jpg\",\"datePublished\":\"2019-03-08T07:20:54+00:00\",\"dateModified\":\"2025-09-17T11:01:37+00:00\",\"author\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23\"},\"description\":\"New amendment to IT Act,2000 allows other e-KYC techniques for e-Signatures. Read more to find out the changes made in the Act.\",\"breadcrumb\":{\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed#primaryimage\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2019\/03\/New-amendment-1.jpg\",\"contentUrl\":\"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2019\/03\/New-amendment-1.jpg\",\"width\":1200,\"height\":627,\"caption\":\"New Amendment States \u2018Other\u2019 e-KYC Techniques Allowed for e-Signatures\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/melento.ai\/en-in\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Amendment States \u2018Other\u2019 e-KYC Techniques Allowed for e-Signatures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#website\",\"url\":\"https:\/\/melento.ai\/en-in\/blog\/\",\"name\":\"Melento\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/melento.ai\/en-in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23\",\"name\":\"Abhijith NS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g\",\"caption\":\"Abhijith NS\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Amendment: \u2018Other\u2019 e-KYC Techniques for e-Signatures' | Melento (Formerly SignDesk)","description":"New amendment to IT Act,2000 allows other e-KYC techniques for e-Signatures. Read more to find out the changes made in the Act.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed","og_locale":"en_US","og_type":"article","og_title":"Amendment: \u2018Other\u2019 e-KYC Techniques for e-Signatures' | Melento (Formerly SignDesk)","og_description":"New amendment to IT Act,2000 allows other e-KYC techniques for e-Signatures. Read more to find out the changes made in the Act.","og_url":"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed","og_site_name":"Melento (Formerly SignDesk)","article_published_time":"2019-03-08T07:20:54+00:00","article_modified_time":"2025-09-17T11:01:37+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2019\/03\/New-amendment-1.jpg","type":"image\/jpeg"}],"author":"Abhijith NS","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Abhijith NS","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed","url":"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed","name":"Amendment: \u2018Other\u2019 e-KYC Techniques for e-Signatures' | Melento (Formerly SignDesk)","isPartOf":{"@id":"https:\/\/melento.ai\/en-in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed#primaryimage"},"image":{"@id":"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed#primaryimage"},"thumbnailUrl":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2019\/03\/New-amendment-1.jpg","datePublished":"2019-03-08T07:20:54+00:00","dateModified":"2025-09-17T11:01:37+00:00","author":{"@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23"},"description":"New amendment to IT Act,2000 allows other e-KYC techniques for e-Signatures. Read more to find out the changes made in the Act.","breadcrumb":{"@id":"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed#primaryimage","url":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2019\/03\/New-amendment-1.jpg","contentUrl":"https:\/\/melento.ai\/en-in\/blog\/wp-content\/uploads\/2019\/03\/New-amendment-1.jpg","width":1200,"height":627,"caption":"New Amendment States \u2018Other\u2019 e-KYC Techniques Allowed for e-Signatures"},{"@type":"BreadcrumbList","@id":"https:\/\/melento.ai\/en-in\/blog\/amendment-ekyc-techniques-allowed#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/melento.ai\/en-in\/blog\/"},{"@type":"ListItem","position":2,"name":"New Amendment States \u2018Other\u2019 e-KYC Techniques Allowed for e-Signatures"}]},{"@type":"WebSite","@id":"https:\/\/melento.ai\/en-in\/blog\/#website","url":"https:\/\/melento.ai\/en-in\/blog\/","name":"Melento","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/melento.ai\/en-in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/ec422007f10d83f117454e7779dc4d23","name":"Abhijith NS","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/melento.ai\/en-in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/eae9ee21b4305af36d9e50b14e1f8a195d238df959bb0003ea7d069b856acbd4?s=96&d=mm&r=g","caption":"Abhijith NS"}}]}},"_links":{"self":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts\/3368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/comments?post=3368"}],"version-history":[{"count":0,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/posts\/3368\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/media\/6181"}],"wp:attachment":[{"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/media?parent=3368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/categories?post=3368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/melento.ai\/en-in\/blog\/wp-json\/wp\/v2\/tags?post=3368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}