Digital Signature Acceptance Policy
Purpose
The purpose of this policy is to provide guidance on when digital signatures are considered accepted means of validating the identity of a signer in (^Company^) electronic documents and correspondence, and thus a substitute for traditional “wet” signatures, within the organization. Because communication has become primarily electronic, the goal is to reduce confusion about when a digital signature is trusted.
Scope
This policy applies to all (^Company^) employees and affiliates.
This policy applies to all (^Company^) employees, contractors, and other agents conducting (^Company^) business with a (^Company^)-provided digital key pair. This policy applies only to intra-organization digitally signed documents and correspondence and not to electronic materials sent to or received from non-(^Company^) affiliated persons or organizations.
Policy
A digital signature is an acceptable substitute for a wet signature on any intra-organization document or correspondence, with the exception of those noted on the site of the Chief Financial Officer (CFO) on the organization’s intranet.
The CFO’s office will maintain an organization-wide list of the types of documents and correspondence that are not covered by this policy.
Digital signatures must apply to individuals only. Digital signatures for roles, positions, or titles (e.g. the CFO) are not considered valid.
Responsibilities
Digital signature acceptance requires specific action on both the part of the employee signing the document or correspondence (hereafter the signer), and the employee receiving/reading the document or correspondence (hereafter the recipient).
- Signer Responsibilities
- Signers must obtain a signing key pair from (^Company Identity Management Group^). This key pair will be generated using (^Company^)’s Public Key Infrastructure (PKI) and the public key will be signed by the (^Company^)’s Certificate Authority (CA), (^Certificate Authority Name^).
- Signers must sign documents and correspondence using software approved by (^Company^) IT organization.
- Signers must protect their private key and keep it secret.
- If a signer believes that the signer’s private key was stolen or otherwise compromised, the signer must contact (^Company^) Identity Management Group immediately to have the signer’s digital key pair revoked.
- Recipient Responsibilities
- Recipients must read documents and correspondence using software approved by (^Company^) IT department.
- Recipients must verify that the signer’s public key was signed by the (^Company^)’s Certificate Authority (CA), (^Certificate Authority Name^), by viewing the details about the signed key using the software they are using to read the document or correspondence.
- If the signer’s digital signature does not appear valid, the recipient must not trust the source of the document or correspondence.
- If a recipient believes that a digital signature has been abused, the recipient must report the recipient’s concern to (^Company^) Identity Management Group.
Policy Compliance
Compliance Measurement
The Infosec team will verify compliance to this policy through various methods, including but not limited to, business tool reports, internal and external audits, and feedback to the policy owner.
Exceptions
Any exception to the policy must be approved by the Infosec team in advance.
Non-Compliance
An employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.