CAN 3-34 - Electronic Signature, Record Keeping and Documents

Appendix A

Electronic Signatures/Records/Documents Compliance Checklist:

S/N

Control Steps

Item to be checked

Operators Checks

Airworthiness Inspector remarks

(A} Secure Electronic Signatures

1

Determine whether the security procedure is reasonable based on:

  • (a) nature of the transaction;

  • (b) sophistication of the parties;

  • (c) volume of similar transactions engaged in by either or all parties;

  • (d) availability of alternatives

  • (e) cost of alternative procedures;

  • (f) procedures in general use for similar types of transactions.

Assess whether the means of identification and authentication (e.g., User-ID and password, onetime or dynamic password, biometrics, digital certificate) used are adequate, suitable and effective for the system.

2

Verify whether the application of a specified security procedure or a commercial reasonable security procedure enables an electronic signature to provide a unique identification with reasonable certainty. Through control and archives, the system should be capable of determining if the signature is genuine and if the individual is authorised to participate. This capability should be an interval part of the system.

An individual using an electronic signature should be required to identify himself or herself, and the system that produces the electronic signature should then authenticate that identification.

3