[ Search ] [ Legislation ] [ Bill Summary ]
[ Home ] [ Back ] [ Bottom ]
[ Engrossed ] | [ Enrolled ] | [ House Amendment 001 ] |
[ Senate Amendment 002 ] |
90_HB3180 New Act 5 ILCS 70/1.15 from Ch. 1, par. 1016 5 ILCS 140/7 from Ch. 116, par. 207 15 ILCS 405/14.01 rep. 720 ILCS 5/17-3 from Ch. 38, par. 17-3 Creates the Electronic Commerce Security Act. Authorizes the use of digital signatures and other forms of electronic signatures in a manner designed to provide legal certainty necessary to effect transactions over public electronic networks. Provides that electronic records can satisfy the legal requirement that information must be in writing. Sets forth requirements for use of electronic signatures by State agencies. Grants rule-making authority to the Secretary of State regarding use by State agencies. Establishes criminal penalties and civil remedies for violations. Amends certain Acts to make changes accommodating the Act. Effective July 1, 1999. LRB9009236JSmg LRB9009236JSmg 1 AN ACT relating to electronic commerce security, amending 2 named Acts. 3 Be it enacted by the People of the State of Illinois, 4 represented in the General Assembly: 5 ARTICLE 1. SHORT TITLE; PURPOSE 6 Section 1-101. Short title. This Act may be cited as the 7 Electronic Commerce Security Act. 8 Section 1-105. Purposes and construction. This Act shall 9 be construed consistently with what is commercially 10 reasonable under the circumstances and to effectuate the 11 following purposes: 12 (1) To facilitate electronic communications by means of 13 reliable electronic records. 14 (2) To facilitate and promote electronic commerce, by 15 eliminating barriers resulting from uncertainties over 16 writing and signature requirements, and promoting the 17 development of the legal and business infrastructure 18 necessary to implement secure electronic commerce. 19 (3) To facilitate electronic filing of documents with 20 State and local government agencies, and promote efficient 21 delivery of government services by means of reliable 22 electronic records. 23 (4) To minimize the incidence of forged electronic 24 records, intentional and unintentional alteration of records, 25 and fraud in electronic commerce. 26 (5) To help to establish uniformity of rules and 27 standards regarding the authentication and integrity of 28 electronic records. 29 (6) To promote public confidence in the integrity and 30 reliability of electronic records and electronic commerce. -2- LRB9009236JSmg 1 Section 1-110. Variation by agreement. As between parties 2 involved in generating, sending, receiving, storing, or 3 otherwise processing electronic records, the applicability of 4 provisions of this Act may be waived by agreement of the 5 parties, except for the provisions of Sections 10-140, 6 15-210, 15-215, 15-220, and subsection (b) of Section 10-130 7 of this Act. 8 ARTICLE 5. ELECTRONIC RECORDS AND SIGNATURES GENERALLY 9 Section 5-105. Definitions. 10 "Asymmetric cryptosystem" means a computer-based system 11 capable of generating and using a key pair consisting of a 12 private key for creating a digital signature and a public key 13 to verify the digital signature. 14 "Certificate" means a record that at a minimum: (a) 15 identifies the certification authority issuing it; (b) names 16 or otherwise identifies its subscriber or a device or 17 electronic agent under the control of the subscriber; (c) 18 contains a public key that corresponds to a private key under 19 the control of the subscriber; (d) specifies its operational 20 period; and (e) is digitally signed by the certification 21 authority issuing it. 22 "Certification authority" means a person who authorizes 23 and causes the issuance of a certificate. 24 "Certification practice statement" is a statement 25 published by a certification authority that specifies the 26 policies or practices that the certification authority 27 employs in issuing, managing, suspending, and revoking 28 certificates and providing access to them. 29 "Correspond", with reference to keys, means to belong to 30 the same key pair. 31 "Digital signature" means a type of electronic signature 32 created by transforming an electronic record using a message -3- LRB9009236JSmg 1 digest function and encrypting the resulting transformation 2 with an asymmetric cryptosystem using the signer's private 3 key such that any person having the initial untransformed 4 electronic record, the encrypted transformation, and the 5 signer's corresponding public key can accurately determine 6 whether the transformation was created using the private key 7 that corresponds to the signer's public key and whether the 8 initial electronic record has been altered since the 9 transformation was made. A digital signature is a security 10 procedure. 11 "Electronic" includes electrical, digital, magnetic, 12 optical, electromagnetic, or any other form of technology 13 that entails capabilities similar to these technologies. 14 "Electronic record" means a record generated, 15 communicated, received, or stored by electronic means for use 16 in an information system or for transmission from one 17 information system to another. 18 "Electronic signature" means a signature in electronic 19 form attached to or logically associated with an electronic 20 record. 21 "Information" includes data, text, images, sound, codes, 22 computer programs, software, databases, and the like. 23 "Key pair" means, in an asymmetric cryptosystem, 2 24 mathematically related keys, referred to as a private key and 25 a public key, having the properties that (i) one key (the 26 private key) can encrypt a message that only the other key 27 (the public key) can decrypt, and (ii) even knowing one key 28 (the public key), it is computationally unfeasible to 29 discover the other key (the private key). 30 "Message digest function" means an algorithm that maps or 31 translates the sequence of bits comprising an electronic 32 record into another, generally smaller, set of bits (the 33 message digest) without requiring the use of any secret 34 information such as a key, such that an electronic record -4- LRB9009236JSmg 1 yields the same message digest every time the algorithm is 2 executed using such record as input and it is computationally 3 unfeasible that any 2 electronic records can be found or 4 deliberately generated that would produce the same message 5 digest using the algorithm unless the 2 records are precisely 6 identical. 7 "Operational period of a certificate" begins on the date 8 and time the certificate is issued by a certification 9 authority (or on a later date and time certain if stated in 10 the certificate) and ends on the date and time it expires as 11 noted in the certificate or is earlier revoked, but does not 12 include any period during which a certificate is suspended. 13 "Person" means an individual, corporation, business 14 trust, estate, trust, partnership, limited partnership, 15 limited liability partnership, limited liability company, 16 association, joint venture, government, governmental 17 subdivision, agency, or instrumentality, or any other legal 18 or commercial entity. 19 "Private key" means the key of a key pair used to create 20 a digital signature. 21 "Public key" means the key of a key pair used to verify a 22 digital signature. 23 "Record" means information that is inscribed, stored, or 24 otherwise fixed on a tangible medium or that is stored in an 25 electronic or other medium and is retrievable in perceivable 26 form. 27 "Repository" means a system for storing and retrieving 28 certificates or other information relevant to certificates, 29 including information relating to the status of a 30 certificate. 31 "Revoke a certificate" means to permanently end the 32 operational period of a certificate from a specified time 33 forward. 34 "Rule of law" means any statute, ordinance, common law -5- LRB9009236JSmg 1 rule, court decision, or other rule of law enacted, 2 established or promulgated by the State of Illinois, or any 3 agency, commission, department, court, other authority or 4 political subdivision of the State of Illinois. 5 "Security procedure" means a methodology or procedure 6 used for the purpose of (1) verifying that an electronic 7 record is that of a specific person and (2) detecting error 8 or alteration in the communication, content, or storage of an 9 electronic record since a specific point in time. A security 10 procedure may require the use of algorithms or codes, 11 identifying words or numbers, encryption, answer back or 12 acknowledgment procedures, or similar security devices. 13 "Signature device" means unique information, such as 14 codes, algorithms, letters, numbers, private keys, or PINs, 15 or a uniquely configured physical device, that is required, 16 alone or in conjunction with other information or devices, in 17 order to create an electronic signature attributable to a 18 specific person. 19 "Signed" or "signature" includes any symbol executed or 20 adopted, or any security procedure employed or adopted, using 21 electronic means or otherwise, by or on behalf of a person 22 with intent to authenticate a record. 23 "State agency" means and includes all officers, boards, 24 commissions, courts, and agencies created by the Illinois 25 Constitution, whether in the executive, legislative or 26 judicial branch, all officers, departments, boards, 27 commissions, agencies, institutions, authorities, 28 universities, bodies politic and corporate of the State; and 29 administrative units or corporate outgrowths of the State 30 government which are created by or pursuant to statute, other 31 than units of local government and their officers, school 32 districts and boards of election commissioners; all 33 administrative units and corporate outgrowths of the above 34 and as may be created by executive order of the Governor. -6- LRB9009236JSmg 1 "Subscriber" means a person who is the subject named or 2 otherwise identified in a certificate, who controls a private 3 key that corresponds to the public key listed in that 4 certificate, and who is the person to whom digitally signed 5 messages verified by reference to such certificate are to be 6 attributed. 7 "Suspend a certificate" means to temporarily suspend the 8 operational period of a certificate for a specified time 9 period or from a specified time forward. 10 "Trustworthy manner" means through the use of computer 11 hardware, software, and procedures that, in the context in 12 which they are used: (a) can be shown to be reasonably 13 resistant to penetration, compromise, and misuse; (b) provide 14 a reasonable level of reliability and correct operation; (c) 15 are reasonably suited to performing their intended functions 16 or serving their intended purposes; (d) comply with 17 applicable agreements between the parties, if any; and (e) 18 adhere to generally accepted security procedures. 19 "Valid certificate" means a certificate that a 20 certification authority has issued and that the subscriber 21 listed in the certificate has accepted. 22 "Verify a digital signature " means to use the public key 23 listed in a valid certificate, along with the appropriate 24 message digest function and asymmetric cryptosystem, to 25 evaluate a digitally signed electronic record, such that the 26 result of the process concludes that the digital signature 27 was created using the private key corresponding to the public 28 key listed in the certificate and the electronic record has 29 not been altered since its digital signature was created. 30 Section 5-110. Legal recognition. Information, records, 31 and signatures shall not be denied legal effect, validity, or 32 enforceability solely on the grounds that they are in 33 electronic form. -7- LRB9009236JSmg 1 Section 5-115. Electronic records. 2 (a) Where a rule of law requires information to be 3 "written" or "in writing", or provides for certain 4 consequences if it is not, an electronic record satisfies 5 that rule of law. 6 (b) The provisions of this Section shall not apply: 7 (1) when its application would involve a 8 construction of a rule of law that is clearly 9 inconsistent with the manifest intent of the lawmaking 10 body or repugnant to the context of the same rule of law, 11 provided that the mere requirement that information be 12 "in writing", "written", or "printed" shall not by itself 13 be sufficient to establish such intent; 14 (2) to any rule of law governing the creation or 15 execution of a will or trust, living will, or healthcare 16 power of attorney; and 17 (3) to any record that serves as a unique and 18 transferable instrument of rights and obligations 19 including, without limitation, negotiable instruments and 20 other instruments of title wherein possession of the 21 instrument is deemed to confer title, unless an 22 electronic version of such record is created, stored, and 23 transferred in a manner that allows for the existence of 24 only one unique, identifiable, and unalterable original 25 with the functional attributes of an equivalent physical 26 instrument, that can be possessed by only one person, and 27 which cannot be copied except in a form that is readily 28 identifiable as a copy. 29 Section 5-120. Electronic signatures. 30 (a) Where a rule of law requires a signature, or 31 provides for certain consequences if a document is not 32 signed, an electronic signature satisfies that rule of law. 33 (b) An electronic signature may be proved in any manner, -8- LRB9009236JSmg 1 including by showing that a procedure existed by which a 2 party must of necessity have executed a symbol or security 3 procedure for the purpose of verifying that an electronic 4 record is that of such party in order to proceed further with 5 a transaction. 6 (c) The provisions of this Section shall not apply: 7 (1) when its application would involve a 8 construction of a rule of law that is clearly 9 inconsistent with the manifest intent of the lawmaking 10 body or repugnant to the context of the same rule of law, 11 provided that the mere requirement of a "signature" or 12 that a record be "signed" shall not by itself be 13 sufficient to establish such intent; 14 (2) to any rule of law governing the creation or 15 execution of a will or trust, living will, or healthcare 16 power of attorney; and 17 (3) to any record that serves as a unique and 18 transferable instrument of rights and obligations 19 including, without limitation, negotiable instruments and 20 other instruments of title wherein possession of the 21 instrument is deemed to confer title, unless an 22 electronic version of such record is created, stored, and 23 transferred in a manner that allows for the existence of 24 only one unique, identifiable, and unalterable original 25 with the functional attributes of an equivalent physical 26 instrument, that can be possessed by only one person, and 27 which cannot be copied except in a form that is readily 28 identifiable as a copy. 29 Section 5-125. Original. 30 (a) Where a rule of law requires information to be 31 presented or retained in its original form, or provides 32 consequences for the information not being presented or 33 retained in its original form, that rule of law is satisfied -9- LRB9009236JSmg 1 by an electronic record if there exists reliable assurance as 2 to the integrity of the information from the time when it was 3 first generated in its final form, as an electronic record or 4 otherwise. 5 (b) The criteria for assessing integrity shall be 6 whether the information has remained complete and unaltered, 7 apart from the addition of any endorsement or other 8 information that arises in the normal course of 9 communication, storage and display. The standard of 10 reliability required shall be assessed in the light of the 11 purpose for which the information was generated and in the 12 light of all the relevant circumstances. 13 (c) The provisions of this Section do not apply to any 14 record that serves as a unique and transferable instrument of 15 rights and obligations including, without limitation, 16 negotiable instruments and other instruments of title wherein 17 possession of the instrument is deemed to confer title, 18 unless an electronic version of such record is created, 19 stored, and transferred in a manner that allows for the 20 existence of only one unique, identifiable, and unalterable 21 original with the functional attributes of an equivalent 22 physical instrument, that can be possessed by only one 23 person, and which cannot be copied except in a form that is 24 readily identifiable as a copy. 25 Section 5-130. Admissibility into evidence. 26 (a) In any legal proceeding, nothing in the application 27 of the rules of evidence shall apply so as to deny the 28 admissibility of an electronic record or electronic signature 29 into evidence: 30 (1) on the sole ground that it is an electronic 31 record or electronic signature; or 32 (2) on the grounds that it is not in its original 33 form or is not an original. -10- LRB9009236JSmg 1 (b) Information in the form of an electronic record 2 shall be given due evidentiary weight by the trier of fact. 3 In assessing the evidential weight of an electronic record or 4 electronic signature where its authenticity is in issue, the 5 trier of fact may consider the manner in which it was 6 generated, stored or communicated, the reliability of the 7 manner in which its integrity was maintained, the manner in 8 which its originator was identified or the electronic record 9 was signed, and any other relevant information or 10 circumstances. 11 Section 5-135. Retention of electronic records. 12 (a) Where a rule of law requires that certain documents, 13 records or information be retained, that requirement is met 14 by retaining electronic records of such information in a 15 trustworthy manner, provided that the following conditions 16 are satisfied: 17 (1) the electronic record and the information 18 contained therein are accessible so as to be usable for 19 subsequent reference at all times when such information 20 must be retained; 21 (2) the information is retained in the format in 22 which it was originally generated, sent, or received or 23 in a format that can be demonstrated to represent 24 accurately the information originally generated, sent or 25 received; 26 (3) such data as enables the identification of the 27 origin and destination of the information, the 28 authenticity and integrity of the information, and the 29 date and time when it was sent or received, if any, is 30 retained. 31 (b) An obligation to retain documents, records or 32 information in accordance with subsection (a) does not extend 33 to any data the sole purpose of which is to enable the record -11- LRB9009236JSmg 1 to be sent or received. 2 (c) Nothing in this Section shall preclude any State 3 agency from specifying additional requirements for the 4 retention of records that are subject to the jurisdiction of 5 such agency. 6 Section 5-140. Electronic use not required. Nothing in 7 this Act shall be construed to: 8 (1) require any person to create, store, transmit, 9 accept, or otherwise use or communicate information, 10 records, or signatures by electronic means or in 11 electronic form; or 12 (2) prohibit any person engaging in a transaction 13 from establishing reasonable requirements regarding the 14 medium on which it will accept records or the method and 15 type of symbol or security procedure it will accept as a 16 signature. 17 ARTICLE 10. SECURE ELECTRONIC RECORDS AND SIGNATURES 18 Section 10-105. Secure electronic record. 19 (a) If, through the use of a qualified security 20 procedure, it can be verified that an electronic record has 21 not been altered since a specified point in time, then such 22 electronic record shall be considered to be a secure 23 electronic record from such specified point in time to the 24 time of verification, if the relying party establishes that 25 the qualified security procedure was: 26 (1) commercially reasonable under the 27 circumstances; 28 (2) applied by the relying party in a trustworthy 29 manner; and 30 (3) reasonably and in good faith relied upon by the 31 relying party. -12- LRB9009236JSmg 1 (b) A qualified security procedure for purposes of this 2 Section is a security procedure to detect changes in the 3 content of an electronic record that is: 4 (1) previously agreed to by the parties; or 5 (2) certified by the Secretary of State in 6 accordance with Section 10-135 as being capable of 7 providing reliable evidence that an electronic record has 8 not been altered. 9 Section 10-110. Secure electronic signature. 10 (a) If, through the use of a qualified security 11 procedure, it can be verified that an electronic signature is 12 the signature of a specific person, then such electronic 13 signature shall be considered to be a secure electronic 14 signature at the time of verification, if the relying party 15 establishes that the qualified security procedure was: 16 (1) commercially reasonable under the 17 circumstances; 18 (2) applied by the relying party in a trustworthy 19 manner; and 20 (3) reasonably and in good faith relied upon by the 21 relying party. 22 (b) A qualified security procedure for purposes of this 23 Section is a security procedure for identifying a person that 24 is: 25 (1) previously agreed to by the parties; or 26 (2) certified by the Secretary of State in 27 accordance with Section 10-135 as being capable of 28 creating, in a trustworthy manner, an electronic 29 signature that: 30 (A) is unique to the signer within the context 31 in which it is used; 32 (B) can be used to objectively identify the 33 person signing the electronic record; -13- LRB9009236JSmg 1 (C) was reliably created by such identified 2 person, (e.g., because some aspect of the procedure 3 involves the use of a signature device or other 4 means or method that is under the sole control of 5 such person), and that cannot be readily duplicated 6 or compromised; and 7 (D) is created, and is linked to the 8 electronic record to which it relates, in a manner 9 such that if the record or the signature is 10 intentionally or unintentionally changed after 11 signing the electronic signature is invalidated. 12 Section 10-115. Commercially reasonable; reliance. 13 (a) The commercial reasonableness of a security 14 procedure is to be determined by the court in light of the 15 purposes of the procedure and the commercial circumstances at 16 the time the procedure was used, including the nature of the 17 transaction, sophistication of the parties, volume of similar 18 transactions engaged in by either or both of the parties, 19 availability of alternatives offered to but rejected by 20 either of the parties, cost of alternative procedures, and 21 procedures in general use for similar types of transactions. 22 (b) Whether reliance on a security procedure was 23 reasonable and in good faith is to be determined in light of 24 all the circumstances known to the relying party at the time 25 of the reliance, having due regard to the: 26 (1) information that the relying party knew or 27 should have known of at the time of reliance that would 28 suggest that reliance was or was not reasonable; 29 (2) the value or importance of the electronic 30 record, if known; 31 (3) any course of dealing between the relying party 32 and the purported sender and the available indicia of 33 reliability or unreliability apart from the security -14- LRB9009236JSmg 1 procedure; 2 (4) any usage of trade, particularly trade 3 conducted by trustworthy systems or other computer-based 4 means; and 5 (5) whether the verification was performed with the 6 assistance of an independent third party. 7 Section 10-120. Presumptions. 8 (a) In resolving a civil dispute involving a secure 9 electronic record, it shall be rebuttably presumed that the 10 electronic record has not been altered since the specific 11 point in time to which the secure status relates. 12 (b) In resolving a civil dispute involving a secure 13 electronic signature, it shall be rebuttably presumed that 14 the secure electronic signature is the signature of the 15 person to whom it correlates. 16 (c) The effect of presumptions provided in this Section 17 is to place on the party challenging the integrity of a 18 secure electronic record or challenging the genuineness of a 19 secure electronic signature both the burden of going forward 20 with evidence to rebut the presumption and the burden of 21 persuading the trier of fact that the nonexistence of the 22 presumed fact is more probable than its existence. 23 (d) In the absence of a secure electronic record or a 24 secure electronic signature, nothing in this Act shall change 25 existing rules regarding legal or evidentiary rules regarding 26 the burden of proving the authenticity and integrity of an 27 electronic record or an electronic signature. 28 Section 10-125. Creation and control of signature 29 devices. Except as otherwise provided by another applicable 30 rule of law, whenever the creation, validity, or reliability 31 of an electronic signature created by a qualified security 32 procedure under Section 10-105 or 10-110 is dependent upon -15- LRB9009236JSmg 1 the secrecy or control of a signature device of the signer: 2 (1) the person generating or creating the signature 3 device must do so in a trustworthy manner; 4 (2) the signer and all other persons that rightfully 5 have access to such signature device must exercise reasonable 6 care to retain control and maintain the secrecy of the 7 signature device, and to protect it from any unauthorized 8 access, disclosure, or use, during the period when reliance 9 on a signature created by such device is reasonable; 10 (3) in the event that the signer, or any other person 11 that rightfully has access to such signature device, knows or 12 has reason to know that the secrecy or control of any such 13 signature device has been compromised, such person must make 14 a reasonable effort to promptly notify all persons that such 15 person knows might foreseeably be damaged as a result of such 16 compromise, or where an appropriate publication mechanism is 17 available, to publish notice of the compromise and a 18 disavowal of any signatures created thereafter. 19 Section 10-130. Attribution of signature. 20 (a) Except as provided by another applicable rule of 21 law, a secure electronic signature is attributable to the 22 person to whom it correlates, whether or not authorized, if: 23 (1) the electronic signature resulted from acts of 24 a person that obtained the signature device or other 25 information necessary to create the signature from a 26 source under the control of the alleged signer, creating 27 the appearance that it came from that party; 28 (2) the access or use occurred under circumstances 29 constituting a failure to exercise reasonable care by the 30 alleged signer; and 31 (3) the relying party relied reasonably and in good 32 faith to its detriment on the apparent source of the 33 electronic record. -16- LRB9009236JSmg 1 (b) The provisions of this Section shall not apply to 2 transactions intended primarily for personal, family, or 3 household use, or otherwise defined as consumer transactions 4 by applicable law including, but not limited to, credit card 5 and automated teller machine transactions except to the 6 extent allowed by applicable consumer law. 7 Section 10-135. Secretary of State authority to certify 8 security procedures. 9 (a) A security procedure may be certified by the 10 Secretary of State, as a qualified security procedure for 11 purposes of Sections 10-105 or 10-110, following an 12 appropriate investigation or review, if: 13 (1) the security procedure (including any 14 technology and algorithms it employs) is completely open 15 and fully disclosed to the public, and has been so for a 16 sufficient length of time, so as to facilitate a 17 comprehensive review and evaluation of its suitability 18 for the intended purpose by the applicable information 19 security or scientific community; and 20 (2) the security procedure (including any 21 technology and algorithms it employs) has been generally 22 accepted in the applicable information security or 23 scientific community as being capable of satisfying the 24 requirements of Section 10-105 or 10-110, as applicable, 25 in a trustworthy manner. 26 (b) In making a determination regarding whether the 27 security procedure (including any technology and algorithms 28 it employs) has been generally accepted in the applicable 29 information security or scientific community, the Secretary 30 of State shall consider the opinion of independent experts in 31 the applicable field and the published findings of such 32 community, including applicable standards organizations such 33 as the American National Standards Institute (ANSI), -17- LRB9009236JSmg 1 International Standards Organization (ISO), International 2 Telecommunications Union (ITU), and the National Institute of 3 Standards and Technology (NIST). 4 (c) Such certification shall be done through the 5 adoption of rules in accordance with the provisions of the 6 Illinois Administrative Procedure Act and shall specify a 7 full and complete identification of the security procedure, 8 including requirements as to how it is to be implemented, if 9 appropriate. 10 (d) The Secretary of State may also decertify a security 11 procedure as a qualified security procedure for purposes of 12 Sections 10-105 or 10-110 following an appropriate 13 investigation or review and the adoption of rules in 14 accordance with the provisions of the Illinois Administrative 15 Procedure Act if subsequent developments establish that the 16 security procedure is no longer sufficiently trustworthy or 17 reliable for its intended purpose, or for any other reason no 18 longer meets the requirements for certification. 19 (e) The Secretary of State shall have exclusive 20 authority to certify security procedures under this Section. 21 Section 10-140. Unauthorized use of signature device. 22 (a) No person shall knowingly or intentionally access, 23 copy, or otherwise obtain possession of or recreate the 24 signature device of another person without authorization for 25 the purpose of creating, or allowing or causing another 26 person to create, an unauthorized electronic signature using 27 such signature device. A person convicted of a violation of 28 this subsection shall be guilty of a Class A misdemeanor. 29 (b) No person shall knowingly alter, disclose, or use 30 the signature device of another person without authorization, 31 or in excess of lawful authorization, for the purpose of 32 creating, or allowing or causing another person to create, an 33 unauthorized electronic signature using such signature -18- LRB9009236JSmg 1 device. A person convicted of a violation of this subsection 2 shall be guilty of a Class 4 felony. A person convicted of a 3 violation of this subsection who has previously been 4 convicted of a violation of this subsection or Section 15-210 5 shall be guilty of a Class 3 felony. A person who violates 6 this Section in furtherance of any scheme or artifice to 7 defraud in excess of $50,000 shall be guilty of a Class 2 8 felony. 9 ARTICLE 15. EFFECT OF A DIGITAL SIGNATURE 10 Section 15-101. Secure electronic record. A digital 11 signature that is created using an asymmetric algorithm 12 certified by the Secretary of State under item (2) of 13 subsection (b) of Section 10-105 shall be considered to be a 14 qualified security procedure for purposes of detecting 15 changes in the content of an electronic record under Section 16 10-105 if the digital signature was created during the 17 operational period of a valid certificate, and is verified 18 by reference to the public key listed in such certificate. 19 Section 15-105. Secure electronic signature. A digital 20 signature that is created using an asymmetric algorithm 21 certified by the Secretary of State under item (2) of 22 subsection (b) of Section 10-110 shall be considered to be a 23 qualified security procedure for purposes of identifying a 24 person under Section 10-110 if: 25 (1) the digital signature was created during the 26 operational period of a valid certificate, was used 27 within the scope of any other restrictions specified or 28 incorporated by reference in the certificate, if any, and 29 can be verified by reference to the public key listed in 30 the certificate; and 31 (2) the certificate is considered trustworthy -19- LRB9009236JSmg 1 (i.e., an accurate binding of a public key to a person's 2 identity) because the certificate was issued by a 3 certification authority in accordance with standards, 4 procedures, and other requirements specified by the 5 Secretary of State, or the trier of fact independently 6 finds that the certificate was issued in a trustworthy 7 manner by a certification authority that properly 8 authenticated the subscriber and the subscriber's public 9 key, or otherwise finds that the material information set 10 forth in the certificate is true. 11 Section 15-115. Secretary of State authority to adopt 12 rules. 13 (a) The Secretary of State may adopt rules applicable to 14 both the public and private sectors for the purpose of 15 defining when a certificate is considered sufficiently 16 trustworthy under Section 15-105 such that a digital 17 signature verified by reference to such a certificate will be 18 considered a qualified security procedure under Section 19 10-110. The rules may include (1) establishing or adopting 20 standards applicable to certification authorities or 21 certificates, compliance with which may be measured by 22 becoming certified by the Secretary of State, becoming 23 accredited by one or more independent accrediting entities 24 recognized by the Secretary of State, or by other appropriate 25 means and (2) where appropriate, establishing fees to be 26 charged by the Secretary of State to recover all or a portion 27 of its costs in connection therewith. 28 (b) In developing the rules, the Secretary of State 29 shall endeavor to do so in a manner that will provide 30 maximum flexibility to the implementation of digital 31 signature technology and the business models necessary to 32 support it, that will provide a clear basis for the 33 recognition of certificates issued by foreign certification -20- LRB9009236JSmg 1 authorities, and, to the extent reasonably possible, that 2 will maximize the opportunities for uniformity with the laws 3 of other jurisdictions (both within the United States and 4 internationally). 5 (c) The Secretary of State shall have exclusive 6 authority to adopt rules authorized by this Section. 7 Section 15-201. Reliance on certificates foreseeable. 8 It is foreseeable that persons relying on a digital signature 9 will also rely on a valid certificate containing the public 10 key by which the digital signature can be verified, during 11 the operational period of such certificate and within any 12 limits specified in such certificate. 13 Section 15-205. Restrictions on publication of 14 certificate. No person may publish a certificate, or 15 otherwise knowingly make it available to anyone likely to 16 rely on the certificate or on a digital signature that is 17 verifiable with reference to the public key listed in the 18 certificate, if such person knows that: 19 (1) the certification authority listed in the 20 certificate has not issued it; 21 (2) the subscriber listed in the certificate has 22 not accepted it; or 23 (3) the certificate has been revoked or suspended, 24 unless such publication is for the purpose of verifying a 25 digital signature created prior to such revocation or 26 suspension, or giving notice of revocation or suspension. 27 Section 15-210. Fraudulent use. No person shall 28 knowingly create, publish, alter, or otherwise use a 29 certificate for any fraudulent or other unlawful purpose. A 30 person convicted of a violation of this Section shall be 31 guilty of a Class 4 felony. A person convicted of a violation -21- LRB9009236JSmg 1 of this Section who previously has been convicted of a 2 violation of this Section or Section 10-140 shall be guilty 3 of a Class 3 felony. A person who violates this Section in 4 furtherance of any scheme or artifice to defraud in excess of 5 $50,000 shall be guilty of a Class 2 felony. 6 Section 15-215. False or unauthorized request. No 7 person shall knowingly misrepresent his or her identity or 8 authorization in requesting or accepting a certificate or in 9 requesting suspension or revocation of a certificate. A 10 person convicted of a violation of this Section shall be 11 guilty of a Class A misdemeanor. A person who violates this 12 Section 10 times within one year, or in furtherance of any 13 scheme or artifice to defraud, shall be guilty of a Class 4 14 felony. A person who violates this Section in furtherance of 15 any scheme or artifice to defraud in excess of $50,000 shall 16 be guilty of a Class 2 felony. 17 Section 15-220. Unauthorized use of signature device. No 18 person shall knowingly access, alter, disclose, or use the 19 signature device of a certification authority used to issue 20 certificates without authorization, or in excess of lawful 21 authorization, for the purpose of creating, or allowing or 22 causing another person to create, an unauthorized electronic 23 signature using such signature device. A person convicted of 24 a violation of this Section shall be guilty of a Class 3 25 felony. A person who violates this Section in furtherance of 26 any scheme or artifice to defraud shall be guilty of a Class 27 2 felony. 28 Section 15-301. Trustworthy services. Except as 29 conspicuously set forth in its certification practice 30 statement, a certification authority and a person maintaining 31 a repository must maintain its operations and perform its -22- LRB9009236JSmg 1 services in a trustworthy manner. 2 Section 15-305. Disclosure. 3 (a) For each certificate issued by a certification 4 authority with the intention that it will be relied upon by 5 third parties to verify digital signatures created by 6 subscribers, a certification authority must publish or 7 otherwise make available to the subscriber and all such 8 relying parties: 9 (1) its certification practice statement, if any, 10 applicable thereto; and 11 (2) its certificate that identifies the 12 certification authority as a subscriber and that contains 13 the public key corresponding to the private key used by 14 the certification authority to digitally sign the 15 certificate (its "certification authority certificate"). 16 (b) In the event of an occurrence that materially and 17 adversely affects a certification authority's operations or 18 system, its certification authority certificate, or any other 19 aspect of its ability to operate in a trustworthy manner, the 20 certification authority must act in accordance with 21 procedures governing such an occurrence specified in its 22 certification practice statement, or in the absence of such 23 procedures, must use reasonable efforts to notify any persons 24 that the certification authority knows might foreseeably be 25 damaged as a result of such occurrence. 26 Section 15-310. Issuance of a certificate. A 27 certification authority may issue a certificate to a 28 prospective subscriber for the purpose of allowing third 29 parties to verify digital signatures created by the 30 subscriber only after: 31 (1) the certification authority has received a request 32 for issuance from the prospective subscriber; and -23- LRB9009236JSmg 1 (2) the certification authority has: 2 (A) complied with all of the relevant practices and 3 procedures set forth in its applicable certification 4 practice statement, if any; or 5 (B) in the absence of a certification practice 6 statement addressing these issues, confirmed in a 7 trustworthy manner that: 8 (i) the prospective subscriber is the person 9 to be listed in the certificate to be issued; 10 (ii) the information in the certificate to be 11 issued is accurate; 12 (iii) the prospective subscriber rightfully 13 holds a private key capable of creating a digital 14 signature, and the public key to be listed in the 15 certificate can be used to verify a digital 16 signature affixed by such private key. 17 Section 15-315. Representations upon issuance of 18 certificate. 19 (a) By issuing a certificate with the intention that it 20 will be relied upon by third parties to verify digital 21 signatures created by the subscriber, a certification 22 authority represents to the subscriber, and to any person who 23 reasonably relies on information contained in the 24 certificate, in good faith and during its operational period, 25 that: 26 (1) the certification authority has processed, 27 approved, and issued, and will manage and revoke if 28 necessary, the certificate in accordance with its 29 applicable certification practice statement stated or 30 incorporated by reference in the certificate or of which 31 such person has notice, or in lieu thereof, in accordance 32 with this Act or the law of the jurisdiction governing 33 issuance of the certificate; -24- LRB9009236JSmg 1 (2) the certification authority has verified the 2 identity of the subscriber to the extent stated in the 3 certificate or its applicable certification practice 4 statement, or in lieu thereof, that the certification 5 authority has verified the identity of the subscriber in 6 a trustworthy manner; 7 (3) the certification authority has verified that 8 the person requesting the certificate holds the private 9 key corresponding to the public key listed in the 10 certificate; and 11 (4) except as conspicuously set forth in the 12 certificate or its applicable certification practice 13 statement, to the certification authority's knowledge as 14 of the date the certificate was issued, all other 15 information in the certificate is accurate, and not 16 materially misleading. 17 (b) If a certification authority issued the certificate 18 subject to the laws of another jurisdiction, the 19 certification authority also makes all warranties and 20 representations, if any, otherwise applicable under the law 21 governing its issuance. 22 Section 15-320. Revocation of a certificate. 23 (a) During the operational period of a certificate, the 24 certification authority that issued the certificate must 25 revoke the certificate in accordance with the policies and 26 procedures governing revocation specified in its applicable 27 certification practice statement, or in the absence of such 28 policies and procedures, as soon as possible after: 29 (1) receiving a request for revocation by the 30 subscriber named in the certificate, and confirming that 31 the person requesting revocation is the subscriber, or is 32 an agent of the subscriber with authority to request the 33 revocation; -25- LRB9009236JSmg 1 (2) receiving a certified copy of an individual 2 subscriber's death certificate, or upon confirming by 3 other reliable evidence that the subscriber is dead; 4 (3) being presented with documents effecting a 5 dissolution of a corporate subscriber, or confirmation by 6 other evidence that the subscriber has been dissolved or 7 has ceased to exist; 8 (4) being served with an order requiring revocation 9 that was issued by a court of competent jurisdiction; or 10 (5) confirmation by the certification authority 11 that: 12 (A) a material fact represented in the 13 certificate is false; 14 (B) a material prerequisite to issuance of the 15 certificate was not satisfied; 16 (C) the certification authority's private key 17 or system operations were compromised in a manner 18 materially affecting the certificate's reliability; 19 or 20 (D) the subscriber's private key was 21 compromised. 22 (b) Upon effecting such a revocation, the certification 23 authority must notify the subscriber and relying parties in 24 accordance with the policies and procedures governing notice 25 of revocation specified in its applicable certification 26 practice statement, or in the absence of such policies and 27 procedures, promptly notify the subscriber, promptly publish 28 notice of the revocation in all repositories where the 29 certification authority previously caused publication of the 30 certificate, and otherwise disclose the fact of revocation on 31 inquiry by a relying party. 32 ARTICLE 20. DUTIES OF SUBSCRIBERS -26- LRB9009236JSmg 1 Section 20-101. Obtaining a certificate. All material 2 representations knowingly made by a person to a certification 3 authority for purposes of obtaining a certificate naming such 4 person as a subscriber must be accurate and complete to the 5 best of such person's knowledge and belief. 6 Section 20-105. Acceptance of a certificate. 7 (a) A person accepts a certificate that names such 8 person as a subscriber by publishing or approving publication 9 of it to one or more persons, or in a repository, or 10 otherwise demonstrating approval of it, while knowing or 11 having notice of its contents. 12 (b) By accepting a certificate, the subscriber listed in 13 the certificate represents to any person who reasonably 14 relies on information contained in the certificate, in good 15 faith and during its operational period, that: 16 (1) the subscriber rightfully holds the private key 17 corresponding to the public key listed in the 18 certificate; 19 (2) all representations made by the subscriber to 20 the certification authority and material to the 21 information listed in the certificate are true; and 22 (3) all information in the certificate that is 23 within the knowledge of the subscriber is true. 24 Section 20-110. Revocation of certificate. Except as 25 otherwise provided by another applicable rule of law, if the 26 private key corresponding to the public key listed in a valid 27 certificate is lost, stolen, accessible to an unauthorized 28 person, or otherwise compromised during the operational 29 period of the certificate, a subscriber who has learned of 30 the compromise must promptly request the issuing 31 certification authority to revoke the certificate and publish 32 notice of revocation in all repositories in which the -27- LRB9009236JSmg 1 subscriber previously authorized the certificate to be 2 published, or otherwise provide reasonable notice of the 3 revocation. 4 ARTICLE 25. STATE AGENCY USE OF 5 ELECTRONIC RECORDS AND SIGNATURES 6 Section 25-101. State agency use of electronic records. 7 (a) Each State agency shall determine if, and the extent 8 to which, it will send and receive electronic records and 9 electronic signatures to and from other persons and otherwise 10 create, use, store, and rely upon electronic records and 11 electronic signatures. 12 (b) In any case where a State agency decides to send or 13 receive electronic records, or to accept document filings by 14 electronic records, the State agency may, by appropriate 15 agency rule (or court rule where appropriate), giving due 16 consideration to security, specify: 17 (1) the manner and format in which such electronic 18 records must be created, sent, received, and stored; 19 (2) if such electronic records must be signed, the 20 type of electronic signature required, the manner and 21 format in which such signature must be affixed to the 22 electronic record, and the identity of, or criteria that 23 must be met by, any third party used by the person filing 24 the document to facilitate the process; 25 (3) control processes and procedures as appropriate 26 to ensure adequate integrity, security, confidentiality, 27 and auditability of such electronic records; and 28 (4) any other required attributes for such 29 electronic records that are currently specified for 30 corresponding paper documents, or reasonably necessary 31 under the circumstances. 32 (c) All rules adopted by a State agency shall include -28- LRB9009236JSmg 1 the relevant minimum security requirements established by the 2 Secretary of State, if any. 3 (d) Whenever any rule of law requires or authorizes the 4 filing of any information, notice, lien, or other document or 5 record with any State agency, a filing made by an electronic 6 record shall have the same force and effect as a filing made 7 on paper in all cases where the State agency has authorized 8 or agreed to such electronic filing and the filing is made in 9 accordance with applicable rules or agreement. 10 (e) Nothing in this Act shall be construed to require 11 any State agency to use or to permit the use of electronic 12 records or electronic signatures. 13 Section 25-105. Secretary of State to adopt State 14 standards. 15 (a) The Secretary of State may adopt rules setting forth 16 minimum security requirements for the use of electronic 17 records and electronic signatures by State agencies. 18 (b) The Secretary of State shall specify appropriate 19 minimum security requirements to be implemented and followed 20 by State agencies for (1) the generation, use, and storage of 21 key pairs, (2) the issuance, acceptance, use, suspension, and 22 revocation of certificates, and (3) the use of digital 23 signatures. 24 (c) Each State agency shall have the authority to issue, 25 or contract for the issuance of, certificates to (i) its 26 employees and agents and (ii) persons conducting business or 27 other transactions with such State agency and to take other 28 actions consistent therewith, including the establishment of 29 repositories and the suspension or revocation of certificates 30 so issued, provided that the foregoing is conducted in 31 accordance with all the rules, procedures, and policies 32 specified by the Secretary of State. The Secretary of State 33 shall have the authority to specify the rules, procedures, -29- LRB9009236JSmg 1 and policies whereby State agencies may issue or contract for 2 the issuance of certificates. 3 (d) The Secretary of State may specify appropriate 4 minimum standards and requirements that must be satisfied by 5 a certification authority before: 6 (1) its services are used by any State agency for 7 the issuance, publication, revocation, and suspension of 8 certificates to such agency, or its employees or agents 9 (for official use); or 10 (2) the certificates it issues will be accepted for 11 purposes of verifying digitally signed electronic records 12 sent to any State agency by any person. 13 (e) Where appropriate, the rules adopted by the 14 Secretary of State pursuant to this Section shall specify 15 differing levels of minimum standards from which implementing 16 State agencies can select the standard most appropriate for a 17 particular application. 18 (f) Except as provided in Section 25-101, the Secretary 19 of State shall have exclusive authority to adopt rules 20 authorized by this Section. 21 Section 25-115. Interoperability. To the extent 22 reasonable under the circumstances, rules adopted by the 23 Secretary of State or a State agency relating to the use of 24 electronic records or electronic signatures shall be drafted 25 in a manner designed to encourage and promote consistency and 26 interoperability with similar requirements adopted by 27 government agencies of other states and the federal 28 government. 29 ARTICLE 30. ENFORCEMENT; CIVIL REMEDY; SEVERABILITY 30 Section 30-1. Enforcement. The Secretary of State may 31 investigate complaints or other information indicating -30- LRB9009236JSmg 1 violations of rules adopted by the Secretary of State under 2 this Act or otherwise indicating fraudulent or unlawful 3 conduct under this Act. The Secretary of State shall certify 4 to the Attorney General, for such action as the Attorney 5 General may deem appropriate, all information he or she 6 obtains that discloses a violation of any provision of this 7 Act or the rules adopted by the Secretary of State under this 8 Act. 9 Section 30-5. Civil remedy. Whoever suffers loss by 10 reason of a violation of Section 10-140, 15-210, 15-215, or 11 15-220 of this Act or Section 17-3 of the Criminal Code of 12 1961 may, in a civil action against the violator, obtain 13 appropriate relief. In a civil action under this Section, 14 the court may award to the prevailing party reasonable 15 attorneys fees and other litigation expenses. 16 Section 30-110. Severability. The provisions of this 17 Act are severable under Section 1.31 of the Statute on 18 Statutes. 19 ARTICLE 95. AMENDATORY PROVISIONS 20 Section 95-1. The Statute on Statutes is amended by 21 changing Section 1.15 as follows: 22 (5 ILCS 70/1.15) (from Ch. 1, par. 1016) 23 Sec. 1.15. "Written" and "in writing" may include 24 printing, electronic, and any other mode of representing 25 words and letters; but when the written signature of any26person is required by law to any official or public writing27or bond, required by law, it shall be in the proper28handwriting of such person or, in case he is unable to write,29his proper mark, except as otherwise provided by law. -31- LRB9009236JSmg 1 (Source: P.A. 88-672, eff. 12-14-94.) 2 Section 95-5. The Freedom of Information Act is amended 3 by changing Section 7 as follows: 4 (5 ILCS 140/7) (from Ch. 116, par. 207) 5 Sec. 7. Exemptions. 6 (1) The following shall be exempt from inspection and 7 copying: 8 (a) Information specifically prohibited from 9 disclosure by federal or State law or rules and 10 regulations adopted under federal or State law. 11 (b) Information that, if disclosed, would 12 constitute a clearly unwarranted invasion of personal 13 privacy, unless the disclosure is consented to in writing 14 by the individual subjects of the information. The 15 disclosure of information that bears on the public duties 16 of public employees and officials shall not be considered 17 an invasion of personal privacy. Information exempted 18 under this subsection (b) shall include but is not 19 limited to: 20 (i) files and personal information maintained 21 with respect to clients, patients, residents, 22 students or other individuals receiving social, 23 medical, educational, vocational, financial, 24 supervisory or custodial care or services directly 25 or indirectly from federal agencies or public 26 bodies; 27 (ii) personnel files and personal information 28 maintained with respect to employees, appointees or 29 elected officials of any public body or applicants 30 for those positions; 31 (iii) files and personal information 32 maintained with respect to any applicant, registrant -32- LRB9009236JSmg 1 or licensee by any public body cooperating with or 2 engaged in professional or occupational 3 registration, licensure or discipline; 4 (iv) information required of any taxpayer in 5 connection with the assessment or collection of any 6 tax unless disclosure is otherwise required by State 7 statute; and 8 (v) information revealing the identity of 9 persons who file complaints with or provide 10 information to administrative, investigative, law 11 enforcement or penal agencies; provided, however, 12 that identification of witnesses to traffic 13 accidents, traffic accident reports, and rescue 14 reports may be provided by agencies of local 15 government, except in a case for which a criminal 16 investigation is ongoing, without constituting a 17 clearly unwarranted per se invasion of personal 18 privacy under this subsection. 19 (c) Records compiled by any public body for 20 administrative enforcement proceedings and any law 21 enforcement or correctional agency for law enforcement 22 purposes or for internal matters of a public body, but 23 only to the extent that disclosure would: 24 (i) interfere with pending or actually and 25 reasonably contemplated law enforcement proceedings 26 conducted by any law enforcement or correctional 27 agency; 28 (ii) interfere with pending administrative 29 enforcement proceedings conducted by any public 30 body; 31 (iii) deprive a person of a fair trial or an 32 impartial hearing; 33 (iv) unavoidably disclose the identity of a 34 confidential source or confidential information -33- LRB9009236JSmg 1 furnished only by the confidential source; 2 (v) disclose unique or specialized 3 investigative techniques other than those generally 4 used and known or disclose internal documents of 5 correctional agencies related to detection, 6 observation or investigation of incidents of crime 7 or misconduct; 8 (vi) constitute an invasion of personal 9 privacy under subsection (b) of this Section; 10 (vii) endanger the life or physical safety of 11 law enforcement personnel or any other person; or 12 (viii) obstruct an ongoing criminal 13 investigation. 14 (d) Criminal history record information maintained 15 by State or local criminal justice agencies, except the 16 following which shall be open for public inspection and 17 copying: 18 (i) chronologically maintained arrest 19 information, such as traditional arrest logs or 20 blotters; 21 (ii) the name of a person in the custody of a 22 law enforcement agency and the charges for which 23 that person is being held; 24 (iii) court records that are public; 25 (iv) records that are otherwise available 26 under State or local law; or 27 (v) records in which the requesting party is 28 the individual identified, except as provided under 29 part (vii) of paragraph (c) of subsection (1) of 30 this Section. 31 "Criminal history record information" means data 32 identifiable to an individual and consisting of 33 descriptions or notations of arrests, detentions, 34 indictments, informations, pre-trial proceedings, trials, -34- LRB9009236JSmg 1 or other formal events in the criminal justice system or 2 descriptions or notations of criminal charges (including 3 criminal violations of local municipal ordinances) and 4 the nature of any disposition arising therefrom, 5 including sentencing, court or correctional supervision, 6 rehabilitation and release. The term does not apply to 7 statistical records and reports in which individuals are 8 not identified and from which their identities are not 9 ascertainable, or to information that is for criminal 10 investigative or intelligence purposes. 11 (e) Records that relate to or affect the security 12 of correctional institutions and detention facilities. 13 (f) Preliminary drafts, notes, recommendations, 14 memoranda and other records in which opinions are 15 expressed, or policies or actions are formulated, except 16 that a specific record or relevant portion of a record 17 shall not be exempt when the record is publicly cited and 18 identified by the head of the public body. The exemption 19 provided in this paragraph (f) extends to all those 20 records of officers and agencies of the General Assembly 21 that pertain to the preparation of legislative documents. 22 (g) Trade secrets and commercial or financial 23 information obtained from a person or business where the 24 trade secrets or information are proprietary, privileged 25 or confidential, or where disclosure of the trade secrets 26 or information may cause competitive harm, including all 27 information determined to be confidential under Section 28 4002 of the Technology Advancement and Development Act. 29 Nothing contained in this paragraph (g) shall be 30 construed to prevent a person or business from consenting 31 to disclosure. 32 (h) Proposals and bids for any contract, grant, or 33 agreement, including information which if it were 34 disclosed would frustrate procurement or give an -35- LRB9009236JSmg 1 advantage to any person proposing to enter into a 2 contractor agreement with the body, until an award or 3 final selection is made. Information prepared by or for 4 the body in preparation of a bid solicitation shall be 5 exempt until an award or final selection is made. 6 (i) Valuable formulae, designs, drawings and 7 research data obtained or produced by any public body 8 when disclosure could reasonably be expected to produce 9 private gain or public loss. 10 (j) Test questions, scoring keys and other 11 examination data used to administer an academic 12 examination or determined the qualifications of an 13 applicant for a license or employment. 14 (k) Architects' plans and engineers' technical 15 submissions for projects not constructed or developed in 16 whole or in part with public funds and for projects 17 constructed or developed with public funds, to the extent 18 that disclosure would compromise security. 19 (l) Library circulation and order records 20 identifying library users with specific materials. 21 (m) Minutes of meetings of public bodies closed to 22 the public as provided in the Open Meetings Act until the 23 public body makes the minutes available to the public 24 under Section 2.06 of the Open Meetings Act. 25 (n) Communications between a public body and an 26 attorney or auditor representing the public body that 27 would not be subject to discovery in litigation, and 28 materials prepared or compiled by or for a public body in 29 anticipation of a criminal, civil or administrative 30 proceeding upon the request of an attorney advising the 31 public body, and materials prepared or compiled with 32 respect to internal audits of public bodies. 33 (o) Information received by a primary or secondary 34 school, college or university under its procedures for -36- LRB9009236JSmg 1 the evaluation of faculty members by their academic 2 peers. 3 (p) Administrative or technical information 4 associated with automated data processing operations, 5 including but not limited to software, operating 6 protocols, computer program abstracts, file layouts, 7 source listings, object modules, load modules, user 8 guides, documentation pertaining to all logical and 9 physical design of computerized systems, employee 10 manuals, and any other information that, if disclosed, 11 would jeopardize the security of the system or its data 12 or the security of materials exempt under this Section. 13 (q) Documents or materials relating to collective 14 negotiating matters between public bodies and their 15 employees or representatives, except that any final 16 contract or agreement shall be subject to inspection and 17 copying. 18 (r) Drafts, notes, recommendations and memoranda 19 pertaining to the financing and marketing transactions of 20 the public body. The records of ownership, registration, 21 transfer, and exchange of municipal debt obligations, and 22 of persons to whom payment with respect to these 23 obligations is made. 24 (s) The records, documents and information relating 25 to real estate purchase negotiations until those 26 negotiations have been completed or otherwise terminated. 27 With regard to a parcel involved in a pending or actually 28 and reasonably contemplated eminent domain proceeding 29 under Article VII of the Code of Civil Procedure, 30 records, documents and information relating to that 31 parcel shall be exempt except as may be allowed under 32 discovery rules adopted by the Illinois Supreme Court. 33 The records, documents and information relating to a real 34 estate sale shall be exempt until a sale is consummated. -37- LRB9009236JSmg 1 (t) Any and all proprietary information and records 2 related to the operation of an intergovernmental risk 3 management association or self-insurance pool or jointly 4 self-administered health and accident cooperative or 5 pool. 6 (u) Information concerning a university's 7 adjudication of student or employee grievance or 8 disciplinary cases, to the extent that disclosure would 9 reveal the identity of the student or employee and 10 information concerning any public body's adjudication of 11 student or employee grievances or disciplinary cases, 12 except for the final outcome of the cases. 13 (v) Course materials or research materials used by 14 faculty members. 15 (w) Information related solely to the internal 16 personnel rules and practices of a public body. 17 (x) Information contained in or related to 18 examination, operating, or condition reports prepared by, 19 on behalf of, or for the use of a public body responsible 20 for the regulation or supervision of financial 21 institutions or insurance companies, unless disclosure is 22 otherwise required by State law. 23 (y) Information the disclosure of which is 24 restricted under Section 5-108 of the Public Utilities 25 Act. 26 (z) Manuals or instruction to staff that relate to 27 establishment or collection of liability for any State 28 tax or that relate to investigations by a public body to 29 determine violation of any criminal law. 30 (aa) Applications, related documents, and medical 31 records received by the Experimental Organ 32 Transplantation Procedures Board and any and all 33 documents or other records prepared by the Experimental 34 Organ Transplantation Procedures Board or its staff -38- LRB9009236JSmg 1 relating to applications it has received. 2 (bb) Insurance or self insurance (including any 3 intergovernmental risk management association or self 4 insurance pool) claims, loss or risk management 5 information, records, data, advice or communications. 6 (cc) Information and records held by the Department 7 of Public Health and its authorized representatives 8 relating to known or suspected cases of sexually 9 transmissible disease or any information the disclosure 10 of which is restricted under the Illinois Sexually 11 Transmissible Disease Control Act. 12 (dd) Information the disclosure of which is 13 exempted under Section 30 of the Radon Industry Licensing 14 Act. 15 (ee) Firm performance evaluations under Section 55 16 of the Architectural, Engineering, and Land Surveying 17 Qualifications Based Selection Act. 18 (ff) Security portions of system safety program 19 plans, investigation reports, surveys, schedules, lists, 20 data, or information compiled, collected, or prepared by 21 or for the Regional Transportation Authority under 22 Section 2.11 of the Regional Transportation Authority Act 23 or the State of Missouri under the Bi-State Transit 24 Safety Act. 25 (gg)(ff)Information the disclosure of which is 26 restricted and exempted under Section 50 of the Illinois 27 Prepaid Tuition Act. 28 (hh) Information that would disclose or might lead 29 to the disclosure of secret or confidential information, 30 codes, algorithms, programs, or private keys intended to 31 be used to create electronic or digital signatures under 32 the Electronic Commerce Security Act. 33 (2) This Section does not authorize withholding of 34 information or limit the availability of records to the -39- LRB9009236JSmg 1 public, except as stated in this Section or otherwise 2 provided in this Act. 3 (Source: P.A. 90-262, eff. 7-30-97; 90-273, eff. 7-30-97; 4 90-546, eff. 12-1-97; revised 12-24-97.) 5 (15 ILCS 405/14.01 rep.) 6 Section 95-10. The State Comptroller Act is amended by 7 repealing Section 14.01. 8 Section 95-15. The Criminal Code of 1961 is amended by 9 changing Section 17-3 as follows: 10 (720 ILCS 5/17-3) (from Ch. 38, par. 17-3) 11 Sec. 17-3. Forgery. 12 (a) A person commits forgery when, with intent to 13 defraud, he knowingly: 14 (1) makes or alters any document apparently capable 15 of defrauding another in such manner that it purports to 16 have been made by another or at another time, or with 17 different provisions, or by authority of one who did not 18 give such authority; or 19 (2) issues or delivers such document knowing it to 20 have been thus made or altered; or 21 (3) possesses, with intent to issue or deliver, any 22 such document knowing it to have been thus made or 23 altered; or.24 (4) unlawfully uses the signature device of another 25 to create an electronic signature of that other person, 26 as those terms are defined in the Electronic Commerce 27 Security Act. 28 (b) An intent to defraud means an intention to cause 29 another to assume, create, transfer, alter or terminate any 30 right, obligation or power with reference to any person or 31 property. -40- LRB9009236JSmg 1 (c) A document apparently capable of defrauding another 2 includes, but is not limited to, one by which any right, 3 obligation or power with reference to any person or property 4 may be created, transferred, altered or terminated. A 5 document includes any record or electronic record as those 6 terms are defined in the Electronic Commerce Security Act. 7 (d) Sentence. 8 Forgery is a Class 3 felony. 9 (Source: P.A. 77-2638.) 10 ARTICLE 99. EFFECTIVE DATE 11 Section 99-1. Effective date. This Act takes effect 12 July 1, 1999.