Be administered and executed to ensure that attempted use of an individual’s electronic signature by anyone other than its genuine owner requires collaboration of two or more individuals.
System ensures the items apply to electronic signatures that are not based upon biometrics
Employ at least 2 distinct identification components such as ID code & password
The system can only be used by their genuine owners
Company must employ use of digital signatures for record authenticity and integrity
Company must generate accurate & complete copies of records in both human readable & electronic form suitable for inspection, review, and copying
Company must ensure that individual identity will be verified before a signature
The system must be able to limit system access to authorized individuals
Ensure that record changes do not obscure previously recorded information
The system must employ the use of authority checks to ensure that only authorized individuals use the system