99-5409. Management of Federal Information Resources  

  • [Federal Register Volume 64, Number 43 (Friday, March 5, 1999)]
    [Notices]
    [Pages 10896-10902]
    From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
    [FR Doc No: 99-5409]
    
    
    
    [[Page 10895]]
    
    _______________________________________________________________________
    
    Part VI
    
    
    
    
    
    Office of Management and Budget
    
    
    
    
    
    _______________________________________________________________________
    
    
    
    Management of Federal Information Resources; Notice
    
    Federal Register / Vol. 64, No. 43 / Friday, March 5, 1999 / 
    Notices
    
    [[Page 10896]]
    
    
    
    OFFICE OF MANAGEMENT AND BUDGET
    
    
    Management of Federal Information Resources
    
    AGENCY: Office of Management and Budget, Executive Office of the 
    President.
    
    ACTION: Proposed Implementation of the Government Paperwork Elimination 
    Act.
    
    -----------------------------------------------------------------------
    
    SUMMARY: The Office of Management and Budget (OMB) requests public and 
    agency comment on proposed procedures and guidance to implement the 
    Government Paperwork Elimination Act (GPEA). Under the GPEA, agencies 
    must generally provide for the optional use and acceptance of 
    electronic documents and signatures, and electronic record keeping 
    where practicable, by October 2003.
    
    DATES: Persons who wish to comment on the GPEA procedures and guidance 
    should submit their comments no later than July 5, 1999. Each 
    Department and Agency is asked to submit a single coordinated set of 
    comments.
    
    ADDRESSES: Electronic comments will be included as part of the official 
    record. Please send comments electronically to: gpea@omb.eop.gov. 
    Alternatively, hardcopy comments may be addressed to: Information 
    Policy and Technology Branch, Office of Information and Regulatory 
    Affairs, Office of Management and Budget, Room 10236 New Executive 
    Office Building, Washington, D.C. 20503.
    
    ELECTRONIC AVAILABILITY: This document is available on the Internet in 
    the OMB library of the ``Welcome to the White House'' home page, http:/
    /www.whitehouse.gov/WH/EOP/OMB/, the CIO Council's home page, http://
    cio.gov, and at the Government Information Technology Services Board's 
    security home page at http://gits-sec.treas.gov.
    
    FOR FURTHER INFORMATION CONTACT: Peter Weiss, Information Policy and 
    Technology Branch, (202) 395-3630. Press inquiries should be addressed 
    to the OMB Communications Office, (202) 395-7254.
    
    SUPPLEMENTARY INFORMATION: Public confidence in the security of the 
    government's electronic information and information technology is 
    essential in creating government services that are more accessible, 
    efficient, and easy to use. Electronic commerce, electronic mail, and 
    electronic benefits transfer sensitive information within government, 
    between the government and private industry or individuals, and among 
    governments. These electronic systems must protect the information's 
    confidentiality, assure that the information is not altered in an 
    unauthorized way, and be available when needed. A corresponding policy 
    and management structure must support these protections.
        In a major step in this direction, the Congress recently enacted 
    legislation, supported by the Administration, intended to increase the 
    ability of citizens to interact with the Federal government 
    electronically. The Government Paperwork Elimination Act, Title XVII of 
    Pub. L. 105-277, provides for Federal agencies, by October 21, 2003, to 
    give persons who are required to maintain, submit, or disclose 
    information the option of doing so electronically when practicable as a 
    substitute for paper, and to use electronic authentication (electronic 
    signature) methods to verify the identity of the sender and the 
    integrity of electronic content. The Act specifically provides that 
    electronic records and their related electronic signatures are not to 
    be denied legal effect, validity, or enforceability merely because they 
    are in electronic form.
        OMB's proposed implementation of the Act is in two parts. The first 
    part sets forth the policies and procedures for implementing the Act, 
    and requesting certain specific agencies to provide assistance in 
    particular areas. The second part is intended to provide Federal 
    managers with practical implementation guidance.
        OMB requests comments on the proposed procedures and guidance.
    Donald Arbuckle,
    Deputy Administrator and Acting Administrator, Office of Information 
    and Regulatory Affairs.
    
    Proposed OMB Procedures and Guidance on Implementing the Government 
    Paperwork Elimination Act
    
        This provides Executive agencies with the guidance needed to 
    implement the Government Paperwork Elimination Act (GPEA), Pub. L. 105-
    277, Title XVII, which took effect on October 21, 1998. The GPEA is an 
    important tool to fulfill the Administration's vision of improved 
    customer service and governmental efficiency through the use of 
    information technology. This vision, articulated in Vice President 
    Gore's 1997 report, Access America (http://gits.gov), involves 
    widespread use of the Internet, with Federal agencies transacting 
    business electronically, in the same way as commercial enterprises. 
    Those who wished to do business in this way could avoid traveling to 
    government offices, waiting in line, or mailing paper forms. Delivery 
    of government services in this way would normally save the government 
    time and money as well.
        Access America recognized, however, that:
        Public confidence in the security of the government's electronic 
    information and information technology is essential to creating 
    government services that are more accessible, efficient, and easy to 
    use. Electronic commerce, electronic mail, and electronic benefits 
    transfer sensitive information within government, between governments 
    and private industry or individuals, and among governments. These 
    electronic systems must protect the information's confidentiality, 
    assure that the information is not altered in an unauthorized way, and 
    be available when needed.
    
    Part I. Policy and Procedures
    
    Section 1. Policy
    
        The GPEA charges the Office of Management and Budget, in 
    consultation with the Commerce Department and other appropriate 
    entities, with the development of procedures for Executive agencies to 
    follow in using and accepting electronic documents and signatures. 
    These procedures reflect and are to be executed with due consideration 
    of the following policies:
        a. Maintaining compatibility with standards and technology for 
    electronic signatures generally used in commerce and industry and by 
    State governments;
        b. not inappropriately favoring one industry or technology;
        c. ensuring that electronic signatures are as reliable as is 
    appropriate for the purpose in question and that electronic record 
    keeping systems reliably preserve the information submitted;
        d. providing wherever appropriate for the electronic acknowledgment 
    of electronic filings that are successfully submitted; and
        e. providing, to the extent feasible and appropriate, for multiple 
    methods of electronic signatures or identifiers for the submission of 
    such forms where the agency anticipates receipt of 50,000 or more 
    electronic submittals of a particular form.
    
    Section 2. Procedures
    
        a. The GPEA recognizes that adoption of electronic systems should 
    be consistent with the need to ensure that investments in information 
    technology are economically prudent to accomplish the agency's mission 
    and give due regard to privacy and security.
    
    [[Page 10897]]
    
    Moreover, it is Administration policy that a decision to not allow the 
    option of electronic filing and record keeping should be supported by a 
    specific showing that, in the context of a particular application, 
    there is no reasonably cost-effective combination of technologies and 
    management controls that can minimize the risk of significant harm. 
    Accordingly, agencies should develop and implement plans to use and 
    accept documents in electronic form, and engage in electronic 
    transactions.
        b. An agency's determination of which technology is appropriate for 
    a given transaction must include a risk assessment, and an evaluation 
    of targeted customer or user needs. Performing a risk assessment to 
    evaluate electronic signature alternatives should not be viewed as an 
    isolated activity or an end in itself. These agency risk assessments 
    should draw from and feed into the interrelated requirements of the 
    Paperwork Reduction Act, the Computer Security Act, the Government 
    Performance and Results Act, the Clinger-Cohen Act, the Federal 
    Managers Financial Integrity Act, and the Chief Financial Officers Act.
        c. The initial use of the risk assessment is to identify and 
    mitigate risks in the context of available technologies and their 
    relative total costs and effects on the program being analyzed. The 
    assessment also should be used to develop baselines and verifiable 
    performance measures that track the agency's mission, strategic plans, 
    and tactical goals.
        d. The analysis of costs and benefits should be designed so that it 
    can be used, not only as a guide to selecting among the technologies 
    under consideration, but also to generate a business case and 
    verifiable return on investment to support decisions regarding overall 
    programmatic direction, investment decisions, and budgetary priorities. 
    The effects on the public and its needs and readiness to move to an 
    electronic environment are important considerations.
    
    Section 3. Agency Responsibilities
    
        a. In order to ensure a smooth and cost-effective transition to a 
    more electronic government providing improved service to the public, 
    each agency shall:
        1. Include in its strategic IT plans supporting program 
    responsibilities (required under OMB Circular A-11) a summary of the 
    agency's schedule to implement optional electronic maintenance, 
    submission, or disclosure of information when practicable as a 
    substitute for paper, including through the use of electronic 
    signatures when practicable, by the end of Fiscal Year 2003 (note: 
    agencies need not revise their reports on Federal purchasing and 
    payment already required by OMB M-99-02, but should include the 
    automation of purchasing and payment functions in their schedule);
        2. consider whether an appropriate combination of information 
    security practices, authentication technologies and management controls 
    for each application will be practicable, and if so, which combination 
    will minimize risk and maximize benefits in a cost effective manner;
        3. promulgate or amend regulations or policies as necessary and 
    appropriate to: (1) Implement optional electronic submission, 
    maintenance, or disclosure of information, and the use of any necessary 
    electronic signature alternatives; and (2) permit private employers who 
    have record keeping responsibilities imposed by the Federal government 
    to electronically store and file information pertaining to their 
    employees electronically;
        4. maintain appropriate information system confidentiality and 
    security in accordance with the guidance contained OMB Circular A-130, 
    Appendices I and III, and use, to the maximum extent practicable, 
    technologies either prescribed in Federal Information Processing 
    Standards promulgated by the Secretary of Commerce or supported by 
    voluntary consensus standards as defined in OMB Circular A-119;
        5. provide, to the extent feasible and appropriate, more than one 
    electronic signature option for public reporting forms which are 
    collected annually in electronic form from more than 50,000 
    respondents; and
        6. report progress against the strategic plans developed in 
    response to 1. above through the annual agency reports submitted to OMB 
    under the Paperwork Reduction Act, including any determination that a 
    particular application is inappropriate for conversion to electronic 
    filing.
        (b) Department of Commerce.
        The Department of Commerce shall promulgate Federal Information 
    Processing Standards as appropriate to further the specific goals of 
    the GPEA. The Department should also develop best practices in the area 
    of authentication technologies and implementations, including 
    cryptographic digital signature technology, with assistance from the 
    Government Information Technology Services Board, the Chief Information 
    Officers Council and the President's Management Council.
        (c) Department of the Treasury.
        The Department of the Treasury shall prescribe policies and 
    practices for the use of electronic authentication techniques in 
    Federal payments and collections, and ensure that they fulfill the the 
    goals of GPEA.
        (d) Department of Justice.
        The Department of Justice shall develop and publish practical 
    guidance on legal considerations related to agency use of electronic 
    filing and record keeping.
        (e) General Services Administration.
        The General Services Administration shall support agencies' 
    implementation of electronic signatures and related electronic service 
    delivery.
    
    Part II. Paperwork Elimination Through the Use of Electronic 
    Signatures and Electronic Record Keeping
    
        This part provides Federal managers with basic information to 
    assist in planning for an orderly and efficient transition to 
    electronic government. Agencies should begin their planning promptly to 
    ensure compliance with the timetable in the GPEA.
    
    Section 1. Introduction and Background
    
        a. As required by the Government Paperwork Elimination Act (GPEA), 
    this Part provides guidance for agencies to use in deciding whether to 
    use electronic signature technology for an application, which 
    electronic signature technology may be most appropriate, and how to 
    minimize the risk of fraud, error, or misuse when implementing an 
    electronic signature technology to authenticate electronic 
    transactions. These procedures are consistent with the requirement of 
    the Paperwork Reduction Act of 1995 (PRA) that agencies shall 
    ``consistent with the Computer Security Act of 1987 (CSA)(40 U.S.C. 759 
    note), identify and afford security protections commensurate with the 
    risk and magnitude of the harm resulting from the loss, misuse, or 
    unauthorized access to or modification of information collected or 
    maintained by or on behalf of an agency.'' 44 U.S.C. 3506(g)(3).
        b. As the GPEA, PRA, and CSA recognize, the goal of information 
    security is to protect the integrity of electronic records and 
    transactions. Different security approaches offer varying levels of 
    assurance in an electronic environment. Among these approaches (in an 
    ascending level of assurance) are (1) the so-called ``shared secrets'' 
    methods, e.g., personal identification numbers or passwords, (2) 
    digitized signatures or biometric means of identification such as 
    fingerprints or retinal patterns and voice recognition,
    
    [[Page 10898]]
    
    and (3) digital signatures. Combinations of approaches (e.g., digital 
    signatures with biometrics) are also possible and may provide even 
    higher levels of assurance. Deciding which to use in an application 
    depends upon the risks associated with the loss, misuse or compromise 
    of the information compared to the cost and effort associated with 
    deploying and managing the increasingly secure methods to mitigate 
    those risks. Agencies must strike a balance, recognizing that achieving 
    absolute security is likely to be in most cases highly improbable and 
    prohibitively expensive.
    
    Section 2. What Is an ``Electronic Signature?''
    
        a. The GPEA defines ``electronic signature'' as follows:
    
        A method of signing an electronic message that--
        (A) Identifies and authenticates a particular person as the 
    source of the electronic message; and
        (B) Indicates such person's approval of the information 
    contained in the electronic message. (GPEA, section 1709(1)).
    
        This definition should be interpreted by reference to accepted 
    legal definitions of signatures. The term ``signature'' has long been 
    understood as including ``any symbol executed or adopted by a party 
    with present intention to authenticate a writing.'' (Uniform Commercial 
    Code, 1-201(39)(1970)). These flexible definitions permit the use of 
    different electronic signature technologies, such as digital 
    signatures, digitized signatures or biometrics, discussed below. For 
    this reason, while it is the case that, for historical reasons, the 
    Federal Rules of Evidence are tailored to the admissibility of paper-
    based evidence, the Rules of Evidence have no bias against electronic 
    evidence.
        b. In enacting the GPEA, Congress addressed the legal effect and 
    validity of electronic signatures or other electronic authentication:
    
        Electronic records submitted or maintained in accordance with 
    procedures developed under this title, or electronic signatures or 
    other forms of electronic authentication used in accordance with 
    such procedures, shall not be denied legal effect, validity, or 
    enforceability because such records are in electronic form. (GPEA, 
    section 1707).
    
    Section 3. Risk Factors To Consider In Planning and Implementing an 
    Electronic Signature or Record Keeping System
    
        Electronic signature technologies can offer degrees of confidence 
    in authenticating identity greater even than the presence of a 
    handwritten signature. These digital tools should be used to control 
    risks in a cost-effective manner. In determining whether an electronic 
    signature is sufficiently reliable for a particular purpose, agencies 
    should consider the relationships between the parties, the value of the 
    transaction, and the likely need for accessible, persuasive information 
    regarding the transaction at some later date. Once these factors are 
    considered separately, an agency should consider them together to 
    evaluate its sensitivity to risk for a particular process.
        a. The relationship between the parties. Agency transactions fall 
    into five general categories, each of which may be vulnerable to 
    different security risks:
        (1) Intra-agency transactions (i.e., those which remain within the 
    same Federal agency).
        (2) Inter-agency transactions (i.e., those between Federal 
    agencies).
        (3) Transactions between a Federal agency and state or local 
    government agencies.
        (4) Transactions between a Federal agency and a private 
    organization--contractor, university, non-profit organization, or other 
    entity.
        (5) Transactions between a Federal agency and a member of the 
    general public.
        Inter- or intra-governmental transactions of a relatively routine 
    nature will generally entail little risk of a trading partner later 
    repudiating the transaction, and almost no risk of the trading partner 
    committing fraud. Similarly, transactions between a regulatory agency 
    and a publicly traded corporation or other known entity regulated by 
    that agency bear a relatively low risk of repudiation or fraud. Risk 
    also tends to be relatively low in cases where there is an ongoing 
    relationship between the parties. On the other hand, a one-time 
    transaction between a person and an agency, which has legal or 
    financial implications, bears the highest risk. In all cases, the 
    relative value of the transaction needs to be considered.
        b. The value of the transaction. Agency transactions fall into five 
    general categories, each of which may be vulnerable to different 
    security risks:
        (1) Transactions involving the transfer of funds.
        (2) Transactions where the parties commit to actions or contracts 
    that may give rise to financial or legal liability.
        (3) Transactions involving information protected under the Privacy 
    Act or other agency-specific statutes obliging that access to the 
    information be restricted.
        (4) Transactions where the party is fulfilling a legal 
    responsibility which, if not performed, creates a legal liability 
    (criminal or civil).
        (5) Transactions where no funds are transferred, no financial or 
    legal liability is involved and no privacy or confidentiality issues 
    are involved (electronic signatures are least necessary in these 
    transactions and should not be used unless specifically required by law 
    or regulation).
        c. The likely need for accessible, persuasive information regarding 
    the transaction at a later point. Agency transactions fall into five 
    general categories:
        (1) Transactions where the information generated will never be 
    needed again.
        (2) Transactions where the information generated may later be 
    subject to audit.
        (3) Transactions where the information generated may later be 
    subject to dispute by one of the parties (or alleged parties) to the 
    transaction.
        (4) Transactions where the information generated may later be 
    subject to dispute by a non-party to the transaction.
        (5) Transactions where the information generated may later be 
    needed as proof in court.
        d. Synthesizing the Risk Factors.
        (1) To evaluate the suitability of electronic signature 
    alternatives for a particular application, the agency needs to perform 
    a qualitative risk analysis and should then determine the particular 
    technologies and management controls best suited to minimizing the risk 
    to an acceptable level while maximizing the benefits to the parties 
    involved.
        (2) Risk analyses must recognize that no signature alternative is 
    totally reliable and secure. Every method of signature, whether 
    electronic or paper, can be compromised to some degree with enough 
    technology or due to poor security procedures or practices. In 
    estimating the cost of any system, agencies should include costs 
    associated with hardware, software, administration and support of the 
    system, both short-term and long-term. If it would be extremely 
    expensive to set up a very secure system, but past experience with 
    fraud risks and a careful analysis of those risks shows that exposure 
    is low, a less expensive system that deters the majority of fraud is 
    probably warranted. However, in making this tradeoff, agencies should: 
    (a) Evaluate whether the security elements of a less expensive system 
    can be disproportionately exploited resulting in greater exposure to 
    fraud than would be expected in
    
    [[Page 10899]]
    
    comparable non-automated systems; and (b) consider management and other 
    non-technical process controls which could reduce those risks.
        (3) A qualitative risk analysis also should recognize that all 
    risks and benefits are not quantifiable. While some transactions can be 
    assigned a definite monetary value that may be placed at risk, many 
    cannot. For example, the value of deterring fraud cannot generally be 
    quantified. Should an agency conclude that a new automated system is 
    less secure than an old, paper-based system, attempts to commit fraud 
    or to repudiate transactions may increase. On the benefit side, it is 
    not always possible to assign a dollar value to the increased 
    efficiency that an agency experiences when it automates a labor-
    intensive process, although agencies should attempt to make this 
    estimation whenever feasible. Usually, it is not possible to quantify 
    in monetary terms attitudes such as increased customer satisfaction and 
    willingness to cooperate with an agency, which are engendered by the 
    transition from onerous paper processes to user-friendly electronic 
    processes.
        (4) One advantage of electronic authentication is that an agency 
    may strengthen the signature validation by incorporating electronic 
    links between the user and preexisting data about that user in the 
    agency's records. The IRS has successfully adopted this approach in its 
    TeleFile program, which enables selected taxpayers to file 1040EZs with 
    a touch-tone phone. Taxpayers get Customer Service Numbers (CSNs, i.e., 
    PINs) that they then use to sign their returns and which help to 
    validate their identities to the agency. Even though a CSN is not 
    unique to an individual taxpayer (since it is only five digits long), 
    the IRS authenticates the filer by using other identifying factors, 
    such as the taxpayer's date of birth, taxpayer identification number, 
    and by using additional procedures. This approach is not used over the 
    Internet. Rather, it occurs in short-term connections over telephone 
    lines, an environment where it is comparatively difficult for 
    malefactors to eavesdrop and to steal information or to substitute 
    false information for fraudulent purposes.
        (5) The Computer Security Act places on agency managers the 
    responsibility to select an appropriate combination of technologies and 
    practices to minimize risk cost-effectively while maximizing benefits 
    to the agency and to its customers. These decisions, however 
    qualitative, should be documented for later review and adjustment.
    
    Section 4. Privacy and Disclosure
    
        Section 1708 of the GPEA limits the use of information collected in 
    electronic signature services for communications with a Federal agency. 
    It directs agencies and their staff and contractor personnel not to 
    such use information for any purpose other than for facilitating the 
    communication. Exceptions exist if the person (or entity) who is the 
    subject of the information provides affirmative consent to the 
    additional use of the information, or if such additional use is 
    otherwise provided by law. Accordingly, agencies should follow several 
    privacy tenets:
        a. Electronic authentication should only be required where needed. 
    Many transactions do not need, and should not require, detailed 
    information about the individual.
        b. When electronic authentication is required for a transaction, do 
    not collect more information from the user than is required for the 
    application.
        c. Users should be able to decide the scope of their electronic 
    means of authentication. In other words, if a user wants a certain 
    mechanism for authentication to work only with a single agency or for a 
    single type of transaction, the user's desires should be honored if 
    practicable. Conversely, if the user wishes to have the authentication 
    work with multiple agencies or for multiple types of transactions, that 
    should also be permitted consistent with how the agency employs such 
    means of authentication and with relevant statute and regulation.
        d. Agencies should ensure, and users should be informed, that 
    information collected for the purpose of issuing or using electronic 
    means of authentication will be managed and protected in accordance 
    with applicable requirements under the Privacy Act, the Computer 
    Security Act, and any agency-specific statutes mandating the protection 
    of such information.
    
    Section 5. Overview of Current Electronic Signature Technologies
    
        This section addresses two categories of security: (1) Non-
    cryptographic methods of authenticating identity; and (2) cryptographic 
    control methods. The non-cryptographic approach relies solely on an 
    identification and authentication mechanism linked to a specific 
    software application. Cryptographic controls can be used for multiple 
    applications, if properly managed, and encompass authentication and 
    encryption services. A highly secure implementation may combine both 
    categories of technologies. The spectrum of electronic signature 
    technologies currently available is described below.
        a. Non-Cryptographic Methods of Authenticating Identity
        (1) Personal Identification Number (PIN) or password: A user 
    accessing an agency's electronic application is requested to enter a 
    ``shared secret'' (called ``shared'' because it is known both to the 
    user and to the system), such as a password or PIN. When the user of a 
    system enters her name, she also enters a password or PIN. The system 
    checks that password or PIN as a shared secret to ``authenticate'' the 
    user. If the authentication process is performed over an open network 
    such as the Internet, it is usually essential that at least the shared 
    secret be encrypted; this can be accomplished through the technology 
    called ``Secure Sockets Layer'' currently built into almost all popular 
    Web browsers, in a fashion that is transparent to the end user.
        (2) Smart Card: A smart card is a plastic card the size of a credit 
    card which contains an embedded chip that can generate, store, and/or 
    process data. It can be used to facilitate various authentication 
    technologies. A user inserts the smart card into a card reader device 
    attached to a microcomputer or network input device. In the computer, 
    information from the card's chip is read by security software only when 
    the user enters a PIN, password, or biometric identifier. This method 
    provides greater security than use of a PIN alone, because a user must 
    have both (a) physical possession of the smart card and (b) knowledge 
    of the PIN. Good security requires that the smart card and the PIN 
    never be kept together. Note that the PIN, password or biometric 
    identifier in this case is a secret shared between the user and the 
    smart card, not between the user and a local or remote computer.
        (3) Digitized Signature: A digitized signature is a graphical image 
    of a handwritten signature. Some applications require a user to create 
    his or her hand-written signature using a special computer input 
    device, such as a digital pen and pad. The digitized representation of 
    the entered signature is compared with a stored copy of the graphical 
    image of the handwritten signature. If special software considers both 
    images comparable, the signature is considered valid. This application 
    of technology shares the same security issues as those using the PIN or 
    password approach, because the digitized signature is another form of 
    shared secret known both to the user and to the system. The digitized 
    signature is more reliable for
    
    [[Page 10900]]
    
    authentication than a password or PIN because there is a biometric 
    component to the creation of the image of the handwritten signature. 
    Forging a digitized signature can be more difficult than forging a 
    paper signature to the extent that the technology digitally compares 
    the submitted signature image with the known signature image, and is 
    better than the human eye. Another element in a digitized signature 
    which helps make it unique is measuring how each stroke is made--its 
    duration or pen pressure, for example. This information can also be 
    compared to a reference value. As with all shared secret techniques, 
    compromise of a digitized signature image file could pose a security 
    risk to users.
        (4) Biometrics: Individuals have unique physical characteristics 
    that can be converted into digital form and then interpreted by a 
    computer. Among these are voice patterns (where an individual's spoken 
    words are converted into a special electronic representation), 
    fingerprints, and the blood vessel patterns present on the retina (or 
    rear) of one or both eyes. In this technology, the physical 
    characteristic is measured (by a microphone, optical reader, or some 
    other device), converted into digital form, and then compared with a 
    copy of that characteristic stored in the computer and authenticated 
    beforehand as belonging to a particular person. If the test pattern and 
    the previously stored patterns are sufficiently close (to a degree 
    which is usually selectable by the authenticating application), the 
    authentication will be accepted by the software, and the transaction 
    allowed to proceed. Biometric applications can provide very high levels 
    of authentication especially when the identifier is obtained in the 
    presence of a third party (making spoofing difficult), but as with any 
    shared secret, if the digital form is compromised, impersonation 
    becomes a serious risk. Thus, just like PINs, such information should 
    not be sent over open networks unless it is encrypted. Moreover, 
    measurement and recording of a physical characteristic can raise 
    privacy concerns.
    b. Cryptographic Control
        Creating electronic signatures may involve the use of cryptography 
    in two ways: symmetric (or shared private key) cryptography, or 
    asymmetric (public key/private key) cryptography. The latter is used in 
    producing digital signatures, discussed further below.
        (1) Shared Private Key Cryptography. In shared private key 
    (symmetric) approaches, the user signs a document and verifies the 
    signature using a single key (consisting of a long string of zeros and 
    ones) that is not publicly known, or is secret. Since the same key does 
    these two functions, it must be transferred from the signer to the 
    recipient of the message. This situation can undermine confidence in 
    the authentication of the user's identity because the private key is 
    shared between sender and recipient and therefore is no longer unique 
    to one person. Since the private key is shared between the sender and 
    possibly many recipients, it is really not ``private'' to the sender 
    and hence has lesser value as an authentication mechanism. This 
    approach offers no additional cryptographic strength over digital 
    signatures (see below). Further, digital signatures avoid the need for 
    the shared secret.
        (2) Public/Private Key (Asymmetric) Cryptography--Digital 
    Signatures. (a) To produce a digital signature, a user has his or her 
    computer generate two mathematically linked keys--a private signing key 
    that is kept private, and a public validation key that is available to 
    the public. The private key cannot be deduced from the public key. In 
    practice, the public key is made part of a ``digital certificate,'' 
    which is a specialized electronic document digitally signed by the 
    issuer of the certificate, binding the identity of the individual to 
    his or her private key in an unalterable fashion.
        (b) A ``digital signature'' is created when the owner of a private 
    signing key uses that key to create a unique mark (called a ``signed 
    hash'') on an electronic document or file. The recipient employs the 
    owner's public key to validate the authenticity of the attached private 
    key. This process also verifies that the document was not altered. 
    Since the two keys are mathematically linked, they are unique: only one 
    public key will validate signatures made using its corresponding 
    private key. Moreover, if the private key has been properly protected 
    from compromise or loss, the signature is unique to the individual who 
    owns it, that is, the owner is bound by the signature. One concern in 
    relatively high-risk transactions is that the private key owner could 
    feign loss to repudiate a transaction. This concern can be mitigated by 
    encoding the private key onto a smart card or an equivalent device, and 
    by using a biometric mechanism (rather than a PIN or password) as the 
    shared secret between the user and the smart card for unlocking the 
    private key to effect a signature. It can also be addressed by agencies 
    establishing clear procedures for a particular implementation, so that 
    all parties know what the obligations, risks and consequences are.
        The reliability of the digital signature is directly proportional 
    to the degree of confidence one has in the link between the owner's 
    identity and the digital certificate, how well the owner has protected 
    the private key from compromise or loss, and to the cryptographic 
    strength of the methodology used to generate the key pair. Further 
    information on digital signatures can be found in Access with Trust 
    (http://gits-sec.treas.gov), a report published by OMB and NPR.
    c. Technical Considerations of the Various Technologies
        (1) While generally the most certain method for assuring identity 
    electronically, use of digital signatures requires agencies to develop 
    a series of policies and documents which provide the important 
    underlying framework of trust and which facilitate the evaluation of 
    risk. The framework identifies how well the signer's identity is bound 
    to his or her public key in a digital certificate (identity proofing); 
    whether the private key is placed on a highly secure hardware token or 
    is encapsulated in software only; and how difficult it is for a 
    malefactor to deduce using cryptographic methods the private key (the 
    cryptographic strength of the key-generating algorithm).
        (2) By themselves, digitized (not digital) signatures, PINs and 
    biometric identifiers do not directly bind identity to the contents of 
    a document. For them to do so, they must be used in conjunction with 
    some other mechanism. Biometric identifiers such as retinal patterns 
    used in conjunction with digital signatures can offer far greater proof 
    of identify than pen and ink signatures.
        (3) While not as robust as biometric identifiers and digital 
    signatures, PINs have the decided advantage of proven customer and 
    citizen acceptance, as evidenced by the universal use of PINs for 
    automated teller machine transactions. Such transactions, however, 
    typically occur over proprietary networks rather than open networks 
    like the Internet, where eavesdropping on transactions is much easier, 
    unless the messages are encrypted.
        (4) It is important to remember that technical factors are but one 
    aspect to be considered when an agency plans to implement electronic 
    signature-based applications. Other important aspects are considered in 
    the following sections.
    
    [[Page 10901]]
    
    Section 6. Agency Implementation of Electronic Signature and 
    Authentication
    
        After the agency has conducted the risk analysis and identified an 
    appropriate electronic signature or other electronic authentication, 
    the agency will then proceed to implement this decision. In doing so, 
    agencies should consider the following:
        a. Develop a regulatory or policy scheme. Agencies should consider 
    whether their programmatic regulations or policies support the use and 
    enforceability of electronic signature alternatives to handwritten 
    signatures. By clearly informing the regulated community that 
    electronic signatures and records will be acceptable and used for 
    enforcement purposes, their legal standing is enhanced. Several 
    agencies have already promulgated policies and regulations making this 
    clear, and a number are developing them:
        Securities and Exchange Commission (17 CFR Part 232), electronic 
    regulatory filings; Environmental Protection Agency (55 FR 31,030 
    (1990)), policy on electronic reporting;
        Food and Drug Administration (21 CFR Part 11), electronic 
    signatures and records; Internal Revenue Service (Treasury Reg. 
    301.6061-1), signature alternatives for tax filings;
        Federal Acquisition Regulation (41 CFR Parts 2 and 4), electronic 
    contracts; General Services Acquisition Regulation (48 CFR Part 
    552.216-73), electronic orders; Federal Property Management Regulations 
    (41 CFR Part 101-41), electronic bills of lading.
        When specifying the requirements for using electronic record 
    keeping by regulated entities (particularly the maintenance of 
    electronic forms pertaining to employees by employers), agencies should 
    consider the ``Performance Guideline for the Legal Acceptance of 
    Records Produced by Information Technology Systems,'' developed by the 
    Association for Information and Image Management (ANSI AIIM TR31). This 
    document provides suggestions for maximizing the likelihood that 
    electronically filed and stored documents will be accorded full legal 
    recognition. If an agency chooses to use digital signatures, a 
    regulation may specify that each individual will be issued a unique 
    digital signature certificate to use, agree to keep the private key 
    confidential, and agree to accept responsibility for anything that is 
    submitted using that key, or other conditions under which the agency 
    will accept electronic submissions using it.
        b. Use a mutually-understood, signed agreement between the person 
    or entity submitting the electronically-signed information and the 
    receiving Federal agency.
        (1) As a matter of efficiency, contractual arrangements with large 
    numbers of trading partners would be best accomplished by setting forth 
    an agency's terms and conditions in a regulation. Arrangements with 
    smaller numbers of trading partners may lend themselves to one or more 
    agreements, using a document referred to as a ``terms and conditions'' 
    agreement. These agreements can ensure that all conditions of 
    submission and receipt of data electronically are known and understood 
    by the submitting parties. This is particularly the case where terms 
    and conditions are not spelled out in agency programmatic regulations.
        (2) It is also important to establish that the user of the digital 
    signature or PIN/password is fully aware of what he or she is signing 
    at the time of signature. This can be ensured by programming 
    appropriate ceremonial banners that alert the individual of the gravity 
    of the action into the software application. The presence of such 
    banners can later be used to demonstrate to a court that the user was 
    fully informed of and aware of what he or she was signing.
        c. Minimize the likelihood of repudiation. Agencies should develop 
    well-documented and established mechanisms and procedures to tie 
    transaction in a legally binding way to an individual. The integrity of 
    even the most secure digital signature rests on the continuing 
    confidentiality of the private key, for example. Similarly, in the case 
    of electronic signatures based on the use of PINs, the integrity of the 
    transaction depends on the user not disclosing the PIN. If a defendant 
    is later charged with a crime based on an electronically signed 
    document, he or she would have every incentive to show a lack of 
    control over (or loss of) the private key or PIN. Indeed, if that 
    defendant plans to commit fraud, he or she may intentionally compromise 
    the secrecy of the key or PIN, so that the government would later be 
    unable to link him or her to the electronic transaction.
        Thus, transactions which appear to be at high risk for fraud, e.g., 
    one-time high-value transactions with persons not previously known to 
    an agency, may require extra safeguards or may not be appropriate for 
    electronic transactions. One way to mitigate this risk is to require 
    that private keys be encoded on hardware tokens, making possession of 
    the token a critical requirement. Another way to guard against fraud is 
    to include other identifying data in the transaction that links the key 
    or PIN to the individual, preferably something not readily available to 
    others.
        d. Access to the electronic data, after receipt, needs to be 
    carefully controlled yet available in a meaningful and timely fashion. 
    Security measures should be in place that ensure that no one is able to 
    alter a transaction, or substitute something in its place, once it has 
    been received by the agency. Thus, the receiving agency needs to take 
    prudent steps to control access to the electronic transaction through 
    such methods as limiting access to the computer database containing the 
    transaction, and performing processing with the data using copies of 
    the transaction rather than the original. Moreover, the information may 
    be needed for audits, disputes, or court cases many years after the 
    transaction itself took place. Agencies should make plans for storing 
    data, and providing meaningful and timely access to it for as long as 
    such access will be necessary.
        e. Ensure the ``Chain of Custody.'' Electronic audit trails must 
    provide a chain of custody for the secure electronic transaction that 
    identifies sending location, sending entity, date and time stamp of 
    receipt, and other measures used to ensure the integrity of the 
    document. These trails must be sufficiently complete and reliable to 
    validate the integrity of the transaction and to prove that, (a) the 
    connection between the submitter and the receiving agency has not been 
    tampered with, and (b) how the document was controlled upon receipt.
        f. Provide an acknowledgment of receipt. The agency's system for 
    receiving electronic transactions may be required by statute to have a 
    mechanism for acknowledging receipt of transactions received, and 
    acknowledging confirmation of transactions sent, with specific 
    indication of the party with whom the agency is dealing.
        g. Obtain legal counsel during the design of the system. Collection 
    and use of electronic data may raise legal issues, particularly if it 
    is information that bears on the legality of the process or that may 
    eventually be needed for proof in court.
    Section 7. Summary of the Procedures and Checklist
        To summarize the process which agencies should employ to evaluate 
    authentication mechanisms (electronic signatures) for electronic 
    transactions and documents, the following steps apply:
        1. Examine the current business process that is being converted to 
    employ electronic documents or
    
    [[Page 10902]]
    
    transactions, identifying the existing risks associated with fraud, 
    error or misuse, as well as customer needs and demands.
        2. Consider what risks may arise from the use of electronic 
    transactions or documents. This evaluation should take into account the 
    relationships of the parties, the value of the transactions or 
    documents, and the later need for the documents.
        3. Identify the benefits that accrue from the use of electronic 
    transactions or documents.
        4. Consult with counsel about any specific legal implications about 
    the use of electronic transactions or documents in the particular 
    application.
        5. Evaluate how each electronic signature alternative may minimize 
    risk compared to the costs incurred in adopting an alternative.
        6. Determine whether any electronic signature alternative in 
    conjunction with appropriate process controls represents a practicable 
    trade-off between cost and risk on the one hand, and benefits on the 
    other. If so, determine, to the extent possible at the time, which 
    signature alternative is the best one. Document this determination to 
    allow later evaluation and audit.
        7. Develop plans for retaining and disposing of information, 
    ensuring that it can be made continuously available to those who will 
    need it, for managerial control of sensitive data and accommodating 
    changes in staffing, and for ensuring adherence to these plans.
        8. Determine if regulations or policies are adequate to support 
    electronic transactions and record keeping, or if ``terms and 
    conditions'' agreements are appropriate for the particular application.
        9. Develop plans for seeking the continuing input of technology 
    experts for updates on the changing state of technology and the 
    continuing advice of legal counsel for updates on the changing state of 
    the law in these areas.
        10. Integrate these plans into the agency's strategic IT planning 
    and regular reporting to OMB.
        11. Perform periodic review and re-evaluation, as appropriate.
    
    [FR Doc. 99-5409 Filed 3-4-99; 8:45 am]
    BILLING CODE 3110-01-U
    
    
    

Document Information

Published:
03/05/1999
Department:
Management and Budget Office
Entry Type:
Notice
Action:
Proposed Implementation of the Government Paperwork Elimination Act.
Document Number:
99-5409
Dates:
Persons who wish to comment on the GPEA procedures and guidance should submit their comments no later than July 5, 1999. Each Department and Agency is asked to submit a single coordinated set of comments.
Pages:
10896-10902 (7 pages)
PDF File:
99-5409.pdf