CAN 3-34 - Electronic Signature, Record Keeping and Documents
Appendix A
Electronic Signatures/Records/Documents Compliance Checklist:
S/N | Control Steps | Item to be checked | Operators Checks | Airworthiness Inspector remarks |
(A} Secure Electronic Signatures | ||||
1 | Determine whether the security procedure is reasonable based on:
| Assess whether the means of identification and authentication (e.g., User-ID and password, onetime or dynamic password, biometrics, digital certificate) used are adequate, suitable and effective for the system. | ||
2 | Verify whether the application of a specified security procedure or a commercial reasonable security procedure enables an electronic signature to provide a unique identification with reasonable certainty. Through control and archives, the system should be capable of determining if the signature is genuine and if the individual is authorised to participate. This capability should be an interval part of the system. | An individual using an electronic signature should be required to identify himself or herself, and the system that produces the electronic signature should then authenticate that identification. | ||
3 |