[ Search ] [ Legislation ] [ Bill Summary ]
[ Home ] [ Back ] [ Bottom ]
[ Introduced ] | [ Engrossed ] | [ House Amendment 001 ] |
[ Senate Amendment 002 ] |
90_HB3180enr New Act 5 ILCS 70/1.15 from Ch. 1, par. 1016 5 ILCS 140/7 from Ch. 116, par. 207 15 ILCS 405/14.01 rep. 720 ILCS 5/17-3 from Ch. 38, par. 17-3 Creates the Electronic Commerce Security Act. Authorizes the use of digital signatures and other forms of electronic signatures in a manner designed to provide legal certainty necessary to effect transactions over public electronic networks. Provides that electronic records can satisfy the legal requirement that information must be in writing. Sets forth requirements for use of electronic signatures by State agencies. Grants rule-making authority to the Secretary of State regarding use by State agencies. Establishes criminal penalties and civil remedies for violations. Amends certain Acts to make changes accommodating the Act. Effective July 1, 1999. LRB9009236JSmg HB3180 Enrolled LRB9009236JSmg 1 AN ACT relating to electronic commerce security, amending 2 named Acts. 3 Be it enacted by the People of the State of Illinois, 4 represented in the General Assembly: 5 ARTICLE 1. SHORT TITLE; PURPOSE 6 Section 1-101. Short title. This Act may be cited as the 7 Electronic Commerce Security Act. 8 Section 1-105. Purposes and construction. This Act shall 9 be construed consistently with what is commercially 10 reasonable under the circumstances and to effectuate the 11 following purposes: 12 (1) To facilitate electronic communications by means of 13 reliable electronic records. 14 (2) To facilitate and promote electronic commerce, by 15 eliminating barriers resulting from uncertainties over 16 writing and signature requirements, and promoting the 17 development of the legal and business infrastructure 18 necessary to implement secure electronic commerce. 19 (3) To facilitate electronic filing of documents with 20 State and local government agencies, and promote efficient 21 delivery of government services by means of reliable 22 electronic records. 23 (4) To minimize the incidence of forged electronic 24 records, intentional and unintentional alteration of records, 25 and fraud in electronic commerce. 26 (5) To help to establish uniformity of rules and 27 standards regarding the authentication and integrity of 28 electronic records. 29 (6) To promote public confidence in the integrity and 30 reliability of electronic records and electronic commerce. HB3180 Enrolled -2- LRB9009236JSmg 1 Section 1-110. Variation by agreement. As between parties 2 involved in generating, sending, receiving, storing, or 3 otherwise processing electronic records, the applicability of 4 provisions of this Act may be waived by agreement of the 5 parties, except for the provisions of Sections 10-140, 6 15-210, 15-215, 15-220, and subsection (b) of Section 10-130 7 of this Act. 8 ARTICLE 5. ELECTRONIC RECORDS AND SIGNATURES GENERALLY 9 Section 5-105. Definitions. 10 "Asymmetric cryptosystem" means a computer-based system 11 capable of generating and using a key pair consisting of a 12 private key for creating a digital signature and a public key 13 to verify the digital signature. 14 "Certificate" means a record that at a minimum: (a) 15 identifies the certification authority issuing it; (b) names 16 or otherwise identifies its subscriber or a device or 17 electronic agent under the control of the subscriber; (c) 18 contains a public key that corresponds to a private key under 19 the control of the subscriber; (d) specifies its operational 20 period; and (e) is digitally signed by the certification 21 authority issuing it. 22 "Certification authority" means a person who authorizes 23 and causes the issuance of a certificate. 24 "Certification practice statement" is a statement 25 published by a certification authority that specifies the 26 policies or practices that the certification authority 27 employs in issuing, managing, suspending, and revoking 28 certificates and providing access to them. 29 "Correspond", with reference to keys, means to belong to 30 the same key pair. 31 "Digital signature" means a type of electronic signature 32 created by transforming an electronic record using a message HB3180 Enrolled -3- LRB9009236JSmg 1 digest function and encrypting the resulting transformation 2 with an asymmetric cryptosystem using the signer's private 3 key such that any person having the initial untransformed 4 electronic record, the encrypted transformation, and the 5 signer's corresponding public key can accurately determine 6 whether the transformation was created using the private key 7 that corresponds to the signer's public key and whether the 8 initial electronic record has been altered since the 9 transformation was made. A digital signature is a security 10 procedure. 11 "Electronic" includes electrical, digital, magnetic, 12 optical, electromagnetic, or any other form of technology 13 that entails capabilities similar to these technologies. 14 "Electronic record" means a record generated, 15 communicated, received, or stored by electronic means for use 16 in an information system or for transmission from one 17 information system to another. 18 "Electronic signature" means a signature in electronic 19 form attached to or logically associated with an electronic 20 record. 21 "Information" includes data, text, images, sound, codes, 22 computer programs, software, databases, and the like. 23 "Key pair" means, in an asymmetric cryptosystem, 2 24 mathematically related keys, referred to as a private key and 25 a public key, having the properties that (i) one key (the 26 private key) can encrypt a message that only the other key 27 (the public key) can decrypt, and (ii) even knowing one key 28 (the public key), it is computationally unfeasible to 29 discover the other key (the private key). 30 "Message digest function" means an algorithm that maps or 31 translates the sequence of bits comprising an electronic 32 record into another, generally smaller, set of bits (the 33 message digest) without requiring the use of any secret 34 information such as a key, such that an electronic record HB3180 Enrolled -4- LRB9009236JSmg 1 yields the same message digest every time the algorithm is 2 executed using such record as input and it is computationally 3 unfeasible that any 2 electronic records can be found or 4 deliberately generated that would produce the same message 5 digest using the algorithm unless the 2 records are precisely 6 identical. 7 "Operational period of a certificate" begins on the date 8 and time the certificate is issued by a certification 9 authority (or on a later date and time certain if stated in 10 the certificate) and ends on the date and time it expires as 11 noted in the certificate or is earlier revoked, but does not 12 include any period during which a certificate is suspended. 13 "Person" means an individual, corporation, business 14 trust, estate, trust, partnership, limited partnership, 15 limited liability partnership, limited liability company, 16 association, joint venture, government, governmental 17 subdivision, agency, or instrumentality, or any other legal 18 or commercial entity. 19 "Private key" means the key of a key pair used to create 20 a digital signature. 21 "Public key" means the key of a key pair used to verify a 22 digital signature. 23 "Record" means information that is inscribed, stored, or 24 otherwise fixed on a tangible medium or that is stored in an 25 electronic or other medium and is retrievable in perceivable 26 form. 27 "Repository" means a system for storing and retrieving 28 certificates or other information relevant to certificates, 29 including information relating to the status of a 30 certificate. 31 "Revoke a certificate" means to permanently end the 32 operational period of a certificate from a specified time 33 forward. 34 "Rule of law" means any statute, ordinance, common law HB3180 Enrolled -5- LRB9009236JSmg 1 rule, court decision, or other rule of law enacted, 2 established or promulgated by the State of Illinois, or any 3 agency, commission, department, court, other authority or 4 political subdivision of the State of Illinois. 5 "Security procedure" means a methodology or procedure 6 used for the purpose of (1) verifying that an electronic 7 record is that of a specific person or (2) detecting error or 8 alteration in the communication, content, or storage of an 9 electronic record since a specific point in time. A security 10 procedure may require the use of algorithms or codes, 11 identifying words or numbers, encryption, answer back or 12 acknowledgment procedures, or similar security devices. 13 "Signature device" means unique information, such as 14 codes, algorithms, letters, numbers, private keys, or 15 personal identification numbers (PINs), or a uniquely 16 configured physical device, that is required, alone or in 17 conjunction with other information or devices, in order to 18 create an electronic signature attributable to a specific 19 person. 20 "Signed" or "signature" includes any symbol executed or 21 adopted, or any security procedure employed or adopted, using 22 electronic means or otherwise, by or on behalf of a person 23 with intent to authenticate a record. 24 "State agency" means and includes all officers, boards, 25 commissions, courts, and agencies created by the Illinois 26 Constitution, whether in the executive, legislative or 27 judicial branch, all officers, departments, boards, 28 commissions, agencies, institutions, authorities, 29 universities, bodies politic and corporate of the State; and 30 administrative units or corporate outgrowths of the State 31 government which are created by or pursuant to statute, other 32 than units of local government and their officers, school 33 districts and boards of election commissioners; all 34 administrative units and corporate outgrowths of the above HB3180 Enrolled -6- LRB9009236JSmg 1 and as may be created by executive order of the Governor. 2 "Subscriber" means a person who is the subject named or 3 otherwise identified in a certificate, who controls a private 4 key that corresponds to the public key listed in that 5 certificate, and who is the person to whom digitally signed 6 messages verified by reference to such certificate are to be 7 attributed. 8 "Suspend a certificate" means to temporarily suspend the 9 operational period of a certificate for a specified time 10 period or from a specified time forward. 11 "Trustworthy manner" means through the use of computer 12 hardware, software, and procedures that, in the context in 13 which they are used: (a) can be shown to be reasonably 14 resistant to penetration, compromise, and misuse; (b) provide 15 a reasonable level of reliability and correct operation; (c) 16 are reasonably suited to performing their intended functions 17 or serving their intended purposes; (d) comply with 18 applicable agreements between the parties, if any; and (e) 19 adhere to generally accepted security procedures. 20 "Valid certificate" means a certificate that a 21 certification authority has issued and that the subscriber 22 listed in the certificate has accepted. 23 "Verify a digital signature" means to use the public key 24 listed in a valid certificate, along with the appropriate 25 message digest function and asymmetric cryptosystem, to 26 evaluate a digitally signed electronic record, such that the 27 result of the process concludes that the digital signature 28 was created using the private key corresponding to the public 29 key listed in the certificate and the electronic record has 30 not been altered since its digital signature was created. 31 Section 5-110. Legal recognition. Information, records, 32 and signatures shall not be denied legal effect, validity, or 33 enforceability solely on the grounds that they are in HB3180 Enrolled -7- LRB9009236JSmg 1 electronic form. 2 Section 5-115. Electronic records. 3 (a) Where a rule of law requires information to be 4 "written" or "in writing", or provides for certain 5 consequences if it is not, an electronic record satisfies 6 that rule of law. 7 (b) The provisions of this Section shall not apply: 8 (1) when its application would involve a 9 construction of a rule of law that is clearly 10 inconsistent with the manifest intent of the lawmaking 11 body or repugnant to the context of the same rule of law, 12 provided that the mere requirement that information be 13 "in writing", "written", or "printed" shall not by itself 14 be sufficient to establish such intent; 15 (2) to any rule of law governing the creation or 16 execution of a will or trust, living will, or healthcare 17 power of attorney; and 18 (3) to any record that serves as a unique and 19 transferable instrument of rights and obligations 20 including, without limitation, negotiable instruments and 21 other instruments of title wherein possession of the 22 instrument is deemed to confer title, unless an 23 electronic version of such record is created, stored, and 24 transferred in a manner that allows for the existence of 25 only one unique, identifiable, and unalterable original 26 with the functional attributes of an equivalent physical 27 instrument, that can be possessed by only one person, and 28 which cannot be copied except in a form that is readily 29 identifiable as a copy. 30 Section 5-120. Electronic signatures. 31 (a) Where a rule of law requires a signature, or 32 provides for certain consequences if a document is not HB3180 Enrolled -8- LRB9009236JSmg 1 signed, an electronic signature satisfies that rule of law. 2 (b) An electronic signature may be proved in any manner, 3 including by showing that a procedure existed by which a 4 party must of necessity have executed a symbol or security 5 procedure for the purpose of verifying that an electronic 6 record is that of such party in order to proceed further with 7 a transaction. 8 (c) The provisions of this Section shall not apply: 9 (1) when its application would involve a 10 construction of a rule of law that is clearly 11 inconsistent with the manifest intent of the lawmaking 12 body or repugnant to the context of the same rule of law, 13 provided that the mere requirement of a "signature" or 14 that a record be "signed" shall not by itself be 15 sufficient to establish such intent; 16 (2) to any rule of law governing the creation or 17 execution of a will or trust, living will, or healthcare 18 power of attorney; and 19 (3) to any record that serves as a unique and 20 transferable instrument of rights and obligations 21 including, without limitation, negotiable instruments and 22 other instruments of title wherein possession of the 23 instrument is deemed to confer title, unless an 24 electronic version of such record is created, stored, and 25 transferred in a manner that allows for the existence of 26 only one unique, identifiable, and unalterable original 27 with the functional attributes of an equivalent physical 28 instrument, that can be possessed by only one person, and 29 which cannot be copied except in a form that is readily 30 identifiable as a copy. 31 Section 5-125. Original. 32 (a) Where a rule of law requires information to be 33 presented or retained in its original form, or provides HB3180 Enrolled -9- LRB9009236JSmg 1 consequences for the information not being presented or 2 retained in its original form, that rule of law is satisfied 3 by an electronic record if there exists reliable assurance as 4 to the integrity of the information from the time when it was 5 first generated in its final form, as an electronic record or 6 otherwise. 7 (b) The criteria for assessing integrity shall be 8 whether the information has remained complete and unaltered, 9 apart from the addition of any endorsement or other 10 information that arises in the normal course of 11 communication, storage and display. The standard of 12 reliability required to ensure that information has remained 13 complete and unaltered shall be assessed in the light of the 14 purpose for which the information was generated and in the 15 light of all the relevant circumstances. 16 (c) The provisions of this Section do not apply to any 17 record that serves as a unique and transferable instrument of 18 rights and obligations including, without limitation, 19 negotiable instruments and other instruments of title wherein 20 possession of the instrument is deemed to confer title, 21 unless an electronic version of such record is created, 22 stored, and transferred in a manner that allows for the 23 existence of only one unique, identifiable, and unalterable 24 original with the functional attributes of an equivalent 25 physical instrument, that can be possessed by only one 26 person, and which cannot be copied except in a form that is 27 readily identifiable as a copy. 28 Section 5-130. Admissibility into evidence. 29 (a) In any legal proceeding, nothing in the application 30 of the rules of evidence shall apply so as to deny the 31 admissibility of an electronic record or electronic signature 32 into evidence: 33 (1) on the sole ground that it is an electronic HB3180 Enrolled -10- LRB9009236JSmg 1 record or electronic signature; or 2 (2) on the grounds that it is not in its original 3 form or is not an original. 4 (b) Information in the form of an electronic record 5 shall be given due evidentiary weight by the trier of fact. 6 In assessing the evidential weight of an electronic record or 7 electronic signature where its authenticity is in issue, the 8 trier of fact may consider the manner in which it was 9 generated, stored or communicated, the reliability of the 10 manner in which its integrity was maintained, the manner in 11 which its originator was identified or the electronic record 12 was signed, and any other relevant information or 13 circumstances. 14 Section 5-135. Retention of electronic records. 15 (a) Where a rule of law requires that certain documents, 16 records or information be retained, that requirement is met 17 by retaining electronic records of such information in a 18 trustworthy manner, provided that the following conditions 19 are satisfied: 20 (1) the electronic record and the information 21 contained therein are accessible so as to be usable for 22 subsequent reference at all times when such information 23 must be retained; 24 (2) the information is retained in the format in 25 which it was originally generated, sent, or received or 26 in a format that can be demonstrated to represent 27 accurately the information originally generated, sent or 28 received; and 29 (3) such data as enables the identification of the 30 origin and destination of the information, the 31 authenticity and integrity of the information, and the 32 date and time when it was sent or received, if any, is 33 retained. HB3180 Enrolled -11- LRB9009236JSmg 1 (b) An obligation to retain documents, records or 2 information in accordance with subsection (a) does not extend 3 to any data the sole purpose of which is to enable the record 4 to be sent or received. 5 (c) Nothing in this Section shall preclude any State 6 agency from specifying additional requirements for the 7 retention of records that are subject to the jurisdiction of 8 such agency. 9 Section 5-140. Electronic use not required. Nothing in 10 this Act shall be construed to: 11 (1) require any person to create, store, transmit, 12 accept, or otherwise use or communicate information, 13 records, or signatures by electronic means or in 14 electronic form; or 15 (2) prohibit any person engaging in an electronic 16 transaction from establishing reasonable requirements 17 regarding the medium on which it will accept records or 18 the method and type of symbol or security procedure it 19 will accept as a signature. 20 Section 5-145. Applicability of other statutes or rules. 21 Notwithstanding any provisions of this Act, if any other 22 statute or rule requires approval by a State agency prior to 23 the use or retention of electronic records or the use of 24 electronic signatures, the provisions of that other statute 25 or rule shall also apply. 26 ARTICLE 10. SECURE ELECTRONIC RECORDS AND SIGNATURES 27 Section 10-105. Secure electronic record. 28 (a) If, through the use of a qualified security 29 procedure, it can be verified that an electronic record has 30 not been altered since a specified point in time, then such HB3180 Enrolled -12- LRB9009236JSmg 1 electronic record shall be considered to be a secure 2 electronic record from such specified point in time to the 3 time of verification, if the relying party establishes that 4 the qualified security procedure was: 5 (1) commercially reasonable under the 6 circumstances; 7 (2) applied by the relying party in a trustworthy 8 manner; and 9 (3) reasonably and in good faith relied upon by the 10 relying party. 11 (b) A qualified security procedure for purposes of this 12 Section is a security procedure to detect changes in the 13 content of an electronic record that is: 14 (1) previously agreed to by the parties; or 15 (2) certified by the Secretary of State in 16 accordance with Section 10-135 as being capable of 17 providing reliable evidence that an electronic record has 18 not been altered. 19 Section 10-110. Secure electronic signature. 20 (a) If, through the use of a qualified security 21 procedure, it can be verified that an electronic signature is 22 the signature of a specific person, then such electronic 23 signature shall be considered to be a secure electronic 24 signature at the time of verification, if the relying party 25 establishes that the qualified security procedure was: 26 (1) commercially reasonable under the 27 circumstances; 28 (2) applied by the relying party in a trustworthy 29 manner; and 30 (3) reasonably and in good faith relied upon by the 31 relying party. 32 (b) A qualified security procedure for purposes of this 33 Section is a security procedure for identifying a person that HB3180 Enrolled -13- LRB9009236JSmg 1 is: 2 (1) previously agreed to by the parties; or 3 (2) certified by the Secretary of State in 4 accordance with Section 10-135 as being capable of 5 creating, in a trustworthy manner, an electronic 6 signature that: 7 (A) is unique to the signer within the context 8 in which it is used; 9 (B) can be used to objectively identify the 10 person signing the electronic record; 11 (C) was reliably created by such identified 12 person, (e.g., because some aspect of the procedure 13 involves the use of a signature device or other 14 means or method that is under the sole control of 15 such person), and that cannot be readily duplicated 16 or compromised; and 17 (D) is created, and is linked to the 18 electronic record to which it relates, in a manner 19 such that if the record or the signature is 20 intentionally or unintentionally changed after 21 signing the electronic signature is invalidated. 22 Section 10-115. Commercially reasonable; reliance. 23 (a) The commercial reasonableness of a security 24 procedure is a question of law to be determined in light of 25 the purposes of the procedure and the commercial 26 circumstances at the time the procedure was used, including 27 the nature of the transaction, sophistication of the parties, 28 volume of similar transactions engaged in by either or both 29 of the parties, availability of alternatives offered to but 30 rejected by either of the parties, cost of alternative 31 procedures, and procedures in general use for similar types 32 of transactions. 33 (b) Whether reliance on a security procedure was HB3180 Enrolled -14- LRB9009236JSmg 1 reasonable and in good faith is to be determined in light of 2 all the circumstances known to the relying party at the time 3 of the reliance, having due regard to the: 4 (1) information that the relying party knew or 5 should have known of at the time of reliance that would 6 suggest that reliance was or was not reasonable; 7 (2) the value or importance of the electronic 8 record, if known; 9 (3) any course of dealing between the relying party 10 and the purported sender and the available indicia of 11 reliability or unreliability apart from the security 12 procedure; 13 (4) any usage of trade, particularly trade 14 conducted by trustworthy systems or other computer-based 15 means; and 16 (5) whether the verification was performed with the 17 assistance of an independent third party. 18 Section 10-120. Presumptions. 19 (a) In resolving a civil dispute involving a secure 20 electronic record, it shall be rebuttably presumed that the 21 electronic record has not been altered since the specific 22 point in time to which the secure status relates. 23 (b) In resolving a civil dispute involving a secure 24 electronic signature, it shall be rebuttably presumed that 25 the secure electronic signature is the signature of the 26 person to whom it correlates. 27 (c) The effect of presumptions provided in this Section 28 is to place on the party challenging the integrity of a 29 secure electronic record or challenging the genuineness of a 30 secure electronic signature both the burden of going forward 31 with evidence to rebut the presumption and the burden of 32 persuading the trier of fact that the nonexistence of the 33 presumed fact is more probable than its existence. HB3180 Enrolled -15- LRB9009236JSmg 1 (d) In the absence of a secure electronic record or a 2 secure electronic signature, nothing in this Act shall change 3 existing rules regarding legal or evidentiary rules regarding 4 the burden of proving the authenticity and integrity of an 5 electronic record or an electronic signature. 6 Section 10-125. Creation and control of signature 7 devices. Except as otherwise provided by another applicable 8 rule of law, whenever the creation, validity, or reliability 9 of an electronic signature created by a qualified security 10 procedure under Section 10-105 or 10-110 is dependent upon 11 the secrecy or control of a signature device of the signer: 12 (1) the person generating or creating the signature 13 device must do so in a trustworthy manner; 14 (2) the signer and all other persons that rightfully 15 have access to such signature device must exercise reasonable 16 care to retain control and maintain the secrecy of the 17 signature device, and to protect it from any unauthorized 18 access, disclosure, or use, during the period when reliance 19 on a signature created by such device is reasonable; 20 (3) in the event that the signer, or any other person 21 that rightfully has access to such signature device, knows or 22 has reason to know that the secrecy or control of any such 23 signature device has been compromised, such person must make 24 a reasonable effort to promptly notify all persons that such 25 person knows might foreseeably be damaged as a result of such 26 compromise, or where an appropriate publication mechanism is 27 available (which, for State agencies, may include the 28 official newspaper designated pursuant to Section 4 of the 29 Illinois Purchasing Act where appropriate), to publish notice 30 of the compromise and a disavowal of any signatures created 31 thereafter. 32 Section 10-130. Attribution of signature. HB3180 Enrolled -16- LRB9009236JSmg 1 (a) Except as provided by another applicable rule of 2 law, a secure electronic signature is attributable to the 3 person to whom it correlates, whether or not authorized, if: 4 (1) the electronic signature resulted from acts of 5 a person that obtained the signature device or other 6 information necessary to create the signature from a 7 source under the control of the alleged signer, creating 8 the appearance that it came from that party; 9 (2) the access or use occurred under circumstances 10 constituting a failure to exercise reasonable care by the 11 alleged signer; and 12 (3) the relying party relied reasonably and in good 13 faith to its detriment on the apparent source of the 14 electronic record. 15 (b) The provisions of this Section shall not apply to 16 transactions intended primarily for personal, family, or 17 household use, or otherwise defined as consumer transactions 18 by applicable law including, but not limited to, credit card 19 and automated teller machine transactions except to the 20 extent allowed by applicable consumer law. 21 Section 10-135. Secretary of State authority to certify 22 security procedures. 23 (a) A security procedure may be certified by the 24 Secretary of State, as a qualified security procedure for 25 purposes of Sections 10-105 or 10-110, following an 26 appropriate investigation or review, if: 27 (1) the security procedure (including any 28 technology and algorithms it employs) is completely open 29 and fully disclosed to the public, and has been so for a 30 sufficient length of time, so as to facilitate a 31 comprehensive review and evaluation of its suitability 32 for the intended purpose by the applicable information 33 security or scientific community; and HB3180 Enrolled -17- LRB9009236JSmg 1 (2) the security procedure (including any 2 technology and algorithms it employs) has been generally 3 accepted in the applicable information security or 4 scientific community as being capable of satisfying the 5 requirements of Section 10-105 or 10-110, as applicable, 6 in a trustworthy manner. 7 (b) In making a determination regarding whether the 8 security procedure (including any technology and algorithms 9 it employs) has been generally accepted in the applicable 10 information security or scientific community, the Secretary 11 of State shall consider the opinion of independent experts in 12 the applicable field and the published findings of such 13 community, including applicable standards organizations such 14 as the American National Standards Institute (ANSI), 15 International Standards Organization (ISO), International 16 Telecommunications Union (ITU), and the National Institute of 17 Standards and Technology (NIST). 18 (c) Such certification shall be done through the 19 adoption of rules in accordance with the provisions of the 20 Illinois Administrative Procedure Act and shall specify a 21 full and complete identification of the security procedure, 22 including requirements as to how it is to be implemented, if 23 appropriate. 24 (d) The Secretary of State may also decertify a security 25 procedure as a qualified security procedure for purposes of 26 Sections 10-105 or 10-110 following an appropriate 27 investigation or review and the adoption of rules in 28 accordance with the provisions of the Illinois Administrative 29 Procedure Act if subsequent developments establish that the 30 security procedure is no longer sufficiently trustworthy or 31 reliable for its intended purpose, or for any other reason no 32 longer meets the requirements for certification. 33 (e) The Secretary of State shall have exclusive 34 authority to certify security procedures under this Section. HB3180 Enrolled -18- LRB9009236JSmg 1 Section 10-140. Unauthorized use of signature device. 2 (a) No person shall knowingly or intentionally access, 3 copy, or otherwise obtain possession of or recreate the 4 signature device of another person without authorization for 5 the purpose of creating, or allowing or causing another 6 person to create, an unauthorized electronic signature using 7 such signature device. A person convicted of a violation of 8 this subsection shall be guilty of a Class A misdemeanor. 9 (b) No person shall knowingly alter, disclose, or use 10 the signature device of another person without authorization, 11 or in excess of lawful authorization, for the purpose of 12 creating, or allowing or causing another person to create, an 13 unauthorized electronic signature using such signature 14 device. A person convicted of a violation of this subsection 15 shall be guilty of a Class 4 felony. A person convicted of a 16 violation of this subsection who has previously been 17 convicted of a violation of this subsection or Section 15-210 18 shall be guilty of a Class 3 felony. A person who violates 19 this Section in furtherance of any scheme or artifice to 20 defraud in excess of $50,000 shall be guilty of a Class 2 21 felony. 22 ARTICLE 15. EFFECT OF A DIGITAL SIGNATURE 23 Section 15-101. Secure electronic record. A digital 24 signature that is created using an asymmetric algorithm 25 certified by the Secretary of State under item (2) of 26 subsection (b) of Section 10-105 shall be considered to be a 27 qualified security procedure for purposes of detecting 28 changes in the content of an electronic record under Section 29 10-105 if the digital signature was created during the 30 operational period of a valid certificate, and is verified 31 by reference to the public key listed in such certificate. HB3180 Enrolled -19- LRB9009236JSmg 1 Section 15-105. Secure electronic signature. A digital 2 signature that is created using an asymmetric algorithm 3 certified by the Secretary of State under item (2) of 4 subsection (b) of Section 10-110 shall be considered to be a 5 qualified security procedure for purposes of identifying a 6 person under Section 10-110 if: 7 (1) the digital signature was created during the 8 operational period of a valid certificate, was used 9 within the scope of any other restrictions specified or 10 incorporated by reference in the certificate, if any, and 11 can be verified by reference to the public key listed in 12 the certificate; and 13 (2) the certificate is considered trustworthy 14 (i.e., an accurate binding of a public key to a person's 15 identity) because the certificate was issued by a 16 certification authority in accordance with standards, 17 procedures, and other requirements specified by the 18 Secretary of State, or the trier of fact independently 19 finds that the certificate was issued in a trustworthy 20 manner by a certification authority that properly 21 authenticated the subscriber and the subscriber's public 22 key, or otherwise finds that the material information set 23 forth in the certificate is true. 24 Section 15-115. Secretary of State authority to adopt 25 rules. 26 (a) The Secretary of State may adopt rules applicable to 27 both the public and private sectors for the purpose of 28 defining when a certificate is considered sufficiently 29 trustworthy under Section 15-105 such that a digital 30 signature verified by reference to such a certificate will be 31 considered a qualified security procedure under Section 32 10-110. The rules may include (1) establishing or adopting 33 standards applicable to certification authorities or HB3180 Enrolled -20- LRB9009236JSmg 1 certificates, compliance with which may be measured by 2 becoming certified by the Secretary of State, becoming 3 accredited by one or more independent accrediting entities 4 recognized by the Secretary of State, or by other appropriate 5 means and (2) where appropriate, establishing fees to be 6 charged by the Secretary of State to recover all or a portion 7 of its costs in connection therewith. 8 (b) In developing the rules, the Secretary of State 9 shall endeavor to do so in a manner that will provide 10 maximum flexibility to the implementation of digital 11 signature technology and the business models necessary to 12 support it, that will provide a clear basis for the 13 recognition of certificates issued by foreign certification 14 authorities, and, to the extent reasonably possible, that 15 will maximize the opportunities for uniformity with the laws 16 of other jurisdictions (both within the United States and 17 internationally). 18 (c) The Secretary of State shall have exclusive 19 authority to adopt rules authorized by this Section. 20 Section 15-201. Reliance on certificates foreseeable. 21 It is foreseeable that persons relying on a digital signature 22 will also rely on a valid certificate containing the public 23 key by which the digital signature can be verified, during 24 the operational period of such certificate and within any 25 limits specified in such certificate. 26 Section 15-205. Restrictions on publication of 27 certificate. No person may publish a certificate, or 28 otherwise knowingly make it available to anyone likely to 29 rely on the certificate or on a digital signature that is 30 verifiable with reference to the public key listed in the 31 certificate, if such person knows that: 32 (1) the certification authority listed in the HB3180 Enrolled -21- LRB9009236JSmg 1 certificate has not issued it; 2 (2) the subscriber listed in the certificate has 3 not accepted it; or 4 (3) the certificate has been revoked or suspended, 5 unless such publication is for the purpose of verifying a 6 digital signature created prior to such revocation or 7 suspension, or giving notice of revocation or suspension. 8 Section 15-210. Fraudulent use. No person shall 9 knowingly create, publish, alter, or otherwise use a 10 certificate for any fraudulent or other unlawful purpose. A 11 person convicted of a violation of this Section shall be 12 guilty of a Class 4 felony. A person convicted of a violation 13 of this Section who previously has been convicted of a 14 violation of this Section or Section 10-140 shall be guilty 15 of a Class 3 felony. A person who violates this Section in 16 furtherance of any scheme or artifice to defraud in excess of 17 $50,000 shall be guilty of a Class 2 felony. 18 Section 15-215. False or unauthorized request. No 19 person shall knowingly misrepresent his or her identity or 20 authorization in requesting or accepting a certificate or in 21 requesting suspension or revocation of a certificate. A 22 person convicted of a violation of this Section shall be 23 guilty of a Class A misdemeanor. A person who violates this 24 Section 10 times within a 12-month period, or in furtherance 25 of any scheme or artifice to defraud, shall be guilty of a 26 Class 4 felony. A person who violates this Section in 27 furtherance of any scheme or artifice to defraud in excess of 28 $50,000 shall be guilty of a Class 2 felony. 29 Section 15-220. Unauthorized use of signature device. No 30 person shall knowingly access, alter, disclose, or use the 31 signature device of a certification authority used to issue HB3180 Enrolled -22- LRB9009236JSmg 1 certificates without authorization, or in excess of lawful 2 authorization, for the purpose of creating, or allowing or 3 causing another person to create, an unauthorized electronic 4 signature using such signature device. A person convicted of 5 a violation of this Section shall be guilty of a Class 3 6 felony. A person who violates this Section in furtherance of 7 any scheme or artifice to defraud shall be guilty of a Class 8 2 felony. 9 Section 15-301. Trustworthy services. Except as 10 conspicuously set forth in its certification practice 11 statement, a certification authority and a person maintaining 12 a repository must maintain its operations and perform its 13 services in a trustworthy manner. 14 Section 15-305. Disclosure. 15 (a) For each certificate issued by a certification 16 authority with the intention that it will be relied upon by 17 third parties to verify digital signatures created by 18 subscribers, a certification authority must publish or 19 otherwise make available to the subscriber and all such 20 relying parties: 21 (1) its certification practice statement, if any, 22 applicable thereto; and 23 (2) its certificate that identifies the 24 certification authority as a subscriber and that contains 25 the public key corresponding to the private key used by 26 the certification authority to digitally sign the 27 certificate (its "certification authority certificate"). 28 (b) In the event of an occurrence that materially and 29 adversely affects a certification authority's operations or 30 system, its certification authority certificate, or any other 31 aspect of its ability to operate in a trustworthy manner, the 32 certification authority must act in accordance with HB3180 Enrolled -23- LRB9009236JSmg 1 procedures governing such an occurrence specified in its 2 certification practice statement, or in the absence of such 3 procedures, must use reasonable efforts to notify any persons 4 that the certification authority knows might foreseeably be 5 damaged as a result of such occurrence. 6 Section 15-310. Issuance of a certificate. A 7 certification authority may issue a certificate to a 8 prospective subscriber for the purpose of allowing third 9 parties to verify digital signatures created by the 10 subscriber only after: 11 (1) the certification authority has received a request 12 for issuance from the prospective subscriber; and 13 (2) the certification authority has: 14 (A) complied with all of the relevant practices and 15 procedures set forth in its applicable certification 16 practice statement, if any; or 17 (B) in the absence of a certification practice 18 statement addressing these issues, confirmed in a 19 trustworthy manner that: 20 (i) the prospective subscriber is the person 21 to be listed in the certificate to be issued; 22 (ii) the information in the certificate to be 23 issued is accurate; and 24 (iii) the prospective subscriber rightfully 25 holds a private key capable of creating a digital 26 signature, and the public key to be listed in the 27 certificate can be used to verify a digital 28 signature affixed by such private key. 29 Section 15-315. Representations upon issuance of 30 certificate. 31 (a) By issuing a certificate with the intention that it 32 will be relied upon by third parties to verify digital HB3180 Enrolled -24- LRB9009236JSmg 1 signatures created by the subscriber, a certification 2 authority represents to the subscriber, and to any person who 3 reasonably relies on information contained in the 4 certificate, in good faith and during its operational period, 5 that: 6 (1) the certification authority has processed, 7 approved, and issued, and will manage and revoke if 8 necessary, the certificate in accordance with its 9 applicable certification practice statement stated or 10 incorporated by reference in the certificate or of which 11 such person has notice, or in lieu thereof, in accordance 12 with this Act or the law of the jurisdiction governing 13 issuance of the certificate; 14 (2) the certification authority has verified the 15 identity of the subscriber to the extent stated in the 16 certificate or its applicable certification practice 17 statement, or in lieu thereof, that the certification 18 authority has verified the identity of the subscriber in 19 a trustworthy manner; 20 (3) the certification authority has verified that 21 the person requesting the certificate holds the private 22 key corresponding to the public key listed in the 23 certificate; and 24 (4) except as conspicuously set forth in the 25 certificate or its applicable certification practice 26 statement, to the certification authority's knowledge as 27 of the date the certificate was issued, all other 28 information in the certificate is accurate, and not 29 materially misleading. 30 (b) If a certification authority issued the certificate 31 subject to the laws of another jurisdiction, the 32 certification authority also makes all warranties and 33 representations, if any, otherwise applicable under the law 34 governing its issuance. HB3180 Enrolled -25- LRB9009236JSmg 1 Section 15-320. Revocation of a certificate. 2 (a) During the operational period of a certificate, the 3 certification authority that issued the certificate must 4 revoke the certificate in accordance with the policies and 5 procedures governing revocation specified in its applicable 6 certification practice statement, or in the absence of such 7 policies and procedures, as soon as possible after: 8 (1) receiving a request for revocation by the 9 subscriber named in the certificate, and confirming that 10 the person requesting revocation is the subscriber, or is 11 an agent of the subscriber with authority to request the 12 revocation; 13 (2) receiving a certified copy of an individual 14 subscriber's death certificate, or upon confirming by 15 other reliable evidence that the subscriber is dead; 16 (3) being presented with documents effecting a 17 dissolution of a corporate subscriber, or confirmation by 18 other evidence that the subscriber has been dissolved or 19 has ceased to exist; 20 (4) being served with an order requiring revocation 21 that was issued by a court of competent jurisdiction; or 22 (5) confirmation by the certification authority 23 that: 24 (A) a material fact represented in the 25 certificate is false; 26 (B) a material prerequisite to issuance of the 27 certificate was not satisfied; 28 (C) the certification authority's private key 29 or system operations were compromised in a manner 30 materially affecting the certificate's reliability; 31 or 32 (D) the subscriber's private key was 33 compromised. 34 (b) Upon effecting such a revocation, the certification HB3180 Enrolled -26- LRB9009236JSmg 1 authority must notify the subscriber and relying parties in 2 accordance with the policies and procedures governing notice 3 of revocation specified in its applicable certification 4 practice statement, or in the absence of such policies and 5 procedures, promptly notify the subscriber, promptly publish 6 notice of the revocation in all repositories where the 7 certification authority previously caused publication of the 8 certificate, and otherwise disclose the fact of revocation on 9 inquiry by a relying party. 10 ARTICLE 20. DUTIES OF SUBSCRIBERS 11 Section 20-101. Obtaining a certificate. All material 12 representations knowingly made by a person to a certification 13 authority for purposes of obtaining a certificate naming such 14 person as a subscriber must be accurate and complete to the 15 best of such person's knowledge and belief. 16 Section 20-105. Acceptance of a certificate. 17 (a) A person accepts a certificate that names such 18 person as a subscriber by publishing or approving publication 19 of it to one or more persons, or in a repository, or 20 otherwise demonstrating approval of it, while knowing or 21 having notice of its contents. 22 (b) By accepting a certificate, the subscriber listed in 23 the certificate represents to any person who reasonably 24 relies on information contained in the certificate, in good 25 faith and during its operational period, that: 26 (1) the subscriber rightfully holds the private key 27 corresponding to the public key listed in the 28 certificate; 29 (2) all representations made by the subscriber to 30 the certification authority and material to the 31 information listed in the certificate are true; and HB3180 Enrolled -27- LRB9009236JSmg 1 (3) all information in the certificate that is 2 within the knowledge of the subscriber is true. 3 Section 20-110. Revocation of certificate. Except as 4 otherwise provided by another applicable rule of law, if the 5 private key corresponding to the public key listed in a valid 6 certificate is lost, stolen, accessible to an unauthorized 7 person, or otherwise compromised during the operational 8 period of the certificate, a subscriber who has learned of 9 the compromise must promptly request the issuing 10 certification authority to revoke the certificate and publish 11 notice of revocation in all repositories in which the 12 subscriber previously authorized the certificate to be 13 published, or otherwise provide reasonable notice of the 14 revocation. 15 ARTICLE 25. STATE AGENCY USE OF 16 ELECTRONIC RECORDS AND SIGNATURES 17 Section 25-101. State agency use of electronic records. 18 (a) Each State agency shall determine if, and the extent 19 to which, it will send and receive electronic records and 20 electronic signatures to and from other persons and otherwise 21 create, use, store, and rely upon electronic records and 22 electronic signatures. 23 (b) In any case where a State agency decides to send or 24 receive electronic records, or to accept document filings by 25 electronic records, the State agency may, by appropriate 26 agency rule (or court rule where appropriate), giving due 27 consideration to security, specify: 28 (1) the manner and format in which such electronic 29 records must be created, sent, received, and stored; 30 (2) if such electronic records must be signed, the 31 type of electronic signature required, the manner and HB3180 Enrolled -28- LRB9009236JSmg 1 format in which such signature must be affixed to the 2 electronic record, and the identity of, or criteria that 3 must be met by, any third party used by the person filing 4 the document to facilitate the process; 5 (3) control processes and procedures as appropriate 6 to ensure adequate integrity, security, confidentiality, 7 and auditability of such electronic records; and 8 (4) any other required attributes for such 9 electronic records that are currently specified for 10 corresponding paper documents, or reasonably necessary 11 under the circumstances. 12 (c) All rules adopted by a State agency shall include 13 the relevant minimum security requirements established by the 14 Department of Central Management Services, if any. 15 (d) Whenever any rule of law requires or authorizes the 16 filing of any information, notice, lien, or other document or 17 record with any State agency, a filing made by an electronic 18 record shall have the same force and effect as a filing made 19 on paper in all cases where the State agency has authorized 20 or agreed to such electronic filing and the filing is made in 21 accordance with applicable rules or agreement. 22 (e) Nothing in this Act shall be construed to require 23 any State agency to use or to permit the use of electronic 24 records or electronic signatures. 25 Section 25-105. Department of Central Management 26 Services to adopt State standards. 27 (a) The Department of Central Management Services may 28 adopt rules setting forth minimum security requirements for 29 the use of electronic records and electronic signatures by 30 State agencies. 31 (b) The Department of Central Management Services shall 32 specify appropriate minimum security requirements to be 33 implemented and followed by State agencies for (1) the HB3180 Enrolled -29- LRB9009236JSmg 1 generation, use, and storage of key pairs, (2) the issuance, 2 acceptance, use, suspension, and revocation of certificates, 3 and (3) the use of digital signatures. 4 (c) Each State agency shall have the authority to issue, 5 or contract for the issuance of, certificates to (i) its 6 employees and agents and (ii) persons conducting business or 7 other transactions with such State agency and to take other 8 actions consistent therewith, including the establishment of 9 repositories and the suspension or revocation of certificates 10 so issued, provided that the foregoing is conducted in 11 accordance with all the rules, procedures, and policies 12 specified by the Department of Central Management Services. 13 The Department of Central Management Services shall have the 14 authority to specify the rules, procedures, and policies 15 whereby State agencies may issue or contract for the issuance 16 of certificates. 17 (d) The Department of Central Management Services may 18 specify appropriate minimum standards and requirements that 19 must be satisfied by a certification authority before: 20 (1) its services are used by any State agency for 21 the issuance, publication, revocation, and suspension of 22 certificates to such agency, or its employees or agents 23 (for official use); or 24 (2) the certificates it issues will be accepted for 25 purposes of verifying digitally signed electronic records 26 sent to any State agency by any person. 27 (e) Where appropriate, the rules adopted by the 28 Department of Central Management Services pursuant to this 29 Section shall specify differing levels of minimum standards 30 from which implementing State agencies can select the 31 standard most appropriate for a particular application. 32 (f) The General Assembly, through the Joint Committee on 33 Legislative Support Services, and the Supreme Court, 34 separately for the respective branches, may adopt rules HB3180 Enrolled -30- LRB9009236JSmg 1 setting forth the minimum security requirements for the use 2 of electronic records and electronic signatures by the 3 respective branches. The rules shall generally be consistent 4 with the rules adopted by the Department of Central 5 Management Services. The Joint Committee on Legislative 6 Support Services and the Supreme Court may also accept the 7 rules adopted by the Department of Central Management 8 Services for the use of electronic records and electronic 9 signatures by the respective branches. 10 (g) Except as provided in subsection (f) and in Section 11 25-101, the Department of Central Management Services shall 12 have exclusive authority to adopt rules authorized by this 13 Section. 14 Section 25-115. Interoperability. To the extent 15 reasonable under the circumstances, rules adopted by the 16 Department of Central Management Services or a State agency 17 relating to the use of electronic records or electronic 18 signatures shall be drafted in a manner designed to encourage 19 and promote consistency and interoperability with similar 20 requirements adopted by government agencies of other states 21 and the federal government. 22 ARTICLE 30. ENFORCEMENT; CIVIL REMEDY; SEVERABILITY 23 Section 30-1. Enforcement. The Secretary of State may 24 investigate complaints or other information indicating 25 violations of rules adopted by the Secretary of State under 26 this Act. The Secretary of State shall certify to the 27 Attorney General, for such action as the Attorney General may 28 deem appropriate, all information he or she obtains that 29 discloses a violation of any provision of this Act or the 30 rules adopted by the Secretary of State under this Act. HB3180 Enrolled -31- LRB9009236JSmg 1 Section 30-5. Civil remedy. Whoever suffers loss by 2 reason of a violation of Section 10-140, 15-210, 15-215, or 3 15-220 of this Act or Section 17-3 of the Criminal Code of 4 1961 may, in a civil action against the violator, obtain 5 appropriate relief. In a civil action under this Section, 6 the court may award to the prevailing party reasonable 7 attorneys fees and other litigation expenses. 8 Section 30-110. Severability. The provisions of this 9 Act are severable under Section 1.31 of the Statute on 10 Statutes. 11 ARTICLE 95. AMENDATORY PROVISIONS 12 Section 95-1. The Statute on Statutes is amended by 13 changing Section 1.15 as follows: 14 (5 ILCS 70/1.15) (from Ch. 1, par. 1016) 15 Sec. 1.15. "Written" and "in writing" may include 16 printing, electronic, and any other mode of representing 17 words and letters; but when the written signature of any 18 person is required by law ontoany official or public 19 writing or bond, required by law, it shall be (1)inthe 20 proper handwriting of such person or, in case he is unable to 21 write, his proper mark or (2) an electronic signature as 22 defined in the Electronic Commerce Security Act, except as 23 otherwise provided by law. 24 (Source: P.A. 88-672, eff. 12-14-94.) 25 Section 95-5. The Freedom of Information Act is amended 26 by changing Section 7 as follows: 27 (5 ILCS 140/7) (from Ch. 116, par. 207) 28 Sec. 7. Exemptions. HB3180 Enrolled -32- LRB9009236JSmg 1 (1) The following shall be exempt from inspection and 2 copying: 3 (a) Information specifically prohibited from 4 disclosure by federal or State law or rules and 5 regulations adopted under federal or State law. 6 (b) Information that, if disclosed, would 7 constitute a clearly unwarranted invasion of personal 8 privacy, unless the disclosure is consented to in writing 9 by the individual subjects of the information. The 10 disclosure of information that bears on the public duties 11 of public employees and officials shall not be considered 12 an invasion of personal privacy. Information exempted 13 under this subsection (b) shall include but is not 14 limited to: 15 (i) files and personal information maintained 16 with respect to clients, patients, residents, 17 students or other individuals receiving social, 18 medical, educational, vocational, financial, 19 supervisory or custodial care or services directly 20 or indirectly from federal agencies or public 21 bodies; 22 (ii) personnel files and personal information 23 maintained with respect to employees, appointees or 24 elected officials of any public body or applicants 25 for those positions; 26 (iii) files and personal information 27 maintained with respect to any applicant, registrant 28 or licensee by any public body cooperating with or 29 engaged in professional or occupational 30 registration, licensure or discipline; 31 (iv) information required of any taxpayer in 32 connection with the assessment or collection of any 33 tax unless disclosure is otherwise required by State 34 statute; and HB3180 Enrolled -33- LRB9009236JSmg 1 (v) information revealing the identity of 2 persons who file complaints with or provide 3 information to administrative, investigative, law 4 enforcement or penal agencies; provided, however, 5 that identification of witnesses to traffic 6 accidents, traffic accident reports, and rescue 7 reports may be provided by agencies of local 8 government, except in a case for which a criminal 9 investigation is ongoing, without constituting a 10 clearly unwarranted per se invasion of personal 11 privacy under this subsection. 12 (c) Records compiled by any public body for 13 administrative enforcement proceedings and any law 14 enforcement or correctional agency for law enforcement 15 purposes or for internal matters of a public body, but 16 only to the extent that disclosure would: 17 (i) interfere with pending or actually and 18 reasonably contemplated law enforcement proceedings 19 conducted by any law enforcement or correctional 20 agency; 21 (ii) interfere with pending administrative 22 enforcement proceedings conducted by any public 23 body; 24 (iii) deprive a person of a fair trial or an 25 impartial hearing; 26 (iv) unavoidably disclose the identity of a 27 confidential source or confidential information 28 furnished only by the confidential source; 29 (v) disclose unique or specialized 30 investigative techniques other than those generally 31 used and known or disclose internal documents of 32 correctional agencies related to detection, 33 observation or investigation of incidents of crime 34 or misconduct; HB3180 Enrolled -34- LRB9009236JSmg 1 (vi) constitute an invasion of personal 2 privacy under subsection (b) of this Section; 3 (vii) endanger the life or physical safety of 4 law enforcement personnel or any other person; or 5 (viii) obstruct an ongoing criminal 6 investigation. 7 (d) Criminal history record information maintained 8 by State or local criminal justice agencies, except the 9 following which shall be open for public inspection and 10 copying: 11 (i) chronologically maintained arrest 12 information, such as traditional arrest logs or 13 blotters; 14 (ii) the name of a person in the custody of a 15 law enforcement agency and the charges for which 16 that person is being held; 17 (iii) court records that are public; 18 (iv) records that are otherwise available 19 under State or local law; or 20 (v) records in which the requesting party is 21 the individual identified, except as provided under 22 part (vii) of paragraph (c) of subsection (1) of 23 this Section. 24 "Criminal history record information" means data 25 identifiable to an individual and consisting of 26 descriptions or notations of arrests, detentions, 27 indictments, informations, pre-trial proceedings, trials, 28 or other formal events in the criminal justice system or 29 descriptions or notations of criminal charges (including 30 criminal violations of local municipal ordinances) and 31 the nature of any disposition arising therefrom, 32 including sentencing, court or correctional supervision, 33 rehabilitation and release. The term does not apply to 34 statistical records and reports in which individuals are HB3180 Enrolled -35- LRB9009236JSmg 1 not identified and from which their identities are not 2 ascertainable, or to information that is for criminal 3 investigative or intelligence purposes. 4 (e) Records that relate to or affect the security 5 of correctional institutions and detention facilities. 6 (f) Preliminary drafts, notes, recommendations, 7 memoranda and other records in which opinions are 8 expressed, or policies or actions are formulated, except 9 that a specific record or relevant portion of a record 10 shall not be exempt when the record is publicly cited and 11 identified by the head of the public body. The exemption 12 provided in this paragraph (f) extends to all those 13 records of officers and agencies of the General Assembly 14 that pertain to the preparation of legislative documents. 15 (g) Trade secrets and commercial or financial 16 information obtained from a person or business where the 17 trade secrets or information are proprietary, privileged 18 or confidential, or where disclosure of the trade secrets 19 or information may cause competitive harm, including all 20 information determined to be confidential under Section 21 4002 of the Technology Advancement and Development Act. 22 Nothing contained in this paragraph (g) shall be 23 construed to prevent a person or business from consenting 24 to disclosure. 25 (h) Proposals and bids for any contract, grant, or 26 agreement, including information which if it were 27 disclosed would frustrate procurement or give an 28 advantage to any person proposing to enter into a 29 contractor agreement with the body, until an award or 30 final selection is made. Information prepared by or for 31 the body in preparation of a bid solicitation shall be 32 exempt until an award or final selection is made. 33 (i) Valuable formulae, designs, drawings and 34 research data obtained or produced by any public body HB3180 Enrolled -36- LRB9009236JSmg 1 when disclosure could reasonably be expected to produce 2 private gain or public loss. 3 (j) Test questions, scoring keys and other 4 examination data used to administer an academic 5 examination or determined the qualifications of an 6 applicant for a license or employment. 7 (k) Architects' plans and engineers' technical 8 submissions for projects not constructed or developed in 9 whole or in part with public funds and for projects 10 constructed or developed with public funds, to the extent 11 that disclosure would compromise security. 12 (l) Library circulation and order records 13 identifying library users with specific materials. 14 (m) Minutes of meetings of public bodies closed to 15 the public as provided in the Open Meetings Act until the 16 public body makes the minutes available to the public 17 under Section 2.06 of the Open Meetings Act. 18 (n) Communications between a public body and an 19 attorney or auditor representing the public body that 20 would not be subject to discovery in litigation, and 21 materials prepared or compiled by or for a public body in 22 anticipation of a criminal, civil or administrative 23 proceeding upon the request of an attorney advising the 24 public body, and materials prepared or compiled with 25 respect to internal audits of public bodies. 26 (o) Information received by a primary or secondary 27 school, college or university under its procedures for 28 the evaluation of faculty members by their academic 29 peers. 30 (p) Administrative or technical information 31 associated with automated data processing operations, 32 including but not limited to software, operating 33 protocols, computer program abstracts, file layouts, 34 source listings, object modules, load modules, user HB3180 Enrolled -37- LRB9009236JSmg 1 guides, documentation pertaining to all logical and 2 physical design of computerized systems, employee 3 manuals, and any other information that, if disclosed, 4 would jeopardize the security of the system or its data 5 or the security of materials exempt under this Section. 6 (q) Documents or materials relating to collective 7 negotiating matters between public bodies and their 8 employees or representatives, except that any final 9 contract or agreement shall be subject to inspection and 10 copying. 11 (r) Drafts, notes, recommendations and memoranda 12 pertaining to the financing and marketing transactions of 13 the public body. The records of ownership, registration, 14 transfer, and exchange of municipal debt obligations, and 15 of persons to whom payment with respect to these 16 obligations is made. 17 (s) The records, documents and information relating 18 to real estate purchase negotiations until those 19 negotiations have been completed or otherwise terminated. 20 With regard to a parcel involved in a pending or actually 21 and reasonably contemplated eminent domain proceeding 22 under Article VII of the Code of Civil Procedure, 23 records, documents and information relating to that 24 parcel shall be exempt except as may be allowed under 25 discovery rules adopted by the Illinois Supreme Court. 26 The records, documents and information relating to a real 27 estate sale shall be exempt until a sale is consummated. 28 (t) Any and all proprietary information and records 29 related to the operation of an intergovernmental risk 30 management association or self-insurance pool or jointly 31 self-administered health and accident cooperative or 32 pool. 33 (u) Information concerning a university's 34 adjudication of student or employee grievance or HB3180 Enrolled -38- LRB9009236JSmg 1 disciplinary cases, to the extent that disclosure would 2 reveal the identity of the student or employee and 3 information concerning any public body's adjudication of 4 student or employee grievances or disciplinary cases, 5 except for the final outcome of the cases. 6 (v) Course materials or research materials used by 7 faculty members. 8 (w) Information related solely to the internal 9 personnel rules and practices of a public body. 10 (x) Information contained in or related to 11 examination, operating, or condition reports prepared by, 12 on behalf of, or for the use of a public body responsible 13 for the regulation or supervision of financial 14 institutions or insurance companies, unless disclosure is 15 otherwise required by State law. 16 (y) Information the disclosure of which is 17 restricted under Section 5-108 of the Public Utilities 18 Act. 19 (z) Manuals or instruction to staff that relate to 20 establishment or collection of liability for any State 21 tax or that relate to investigations by a public body to 22 determine violation of any criminal law. 23 (aa) Applications, related documents, and medical 24 records received by the Experimental Organ 25 Transplantation Procedures Board and any and all 26 documents or other records prepared by the Experimental 27 Organ Transplantation Procedures Board or its staff 28 relating to applications it has received. 29 (bb) Insurance or self insurance (including any 30 intergovernmental risk management association or self 31 insurance pool) claims, loss or risk management 32 information, records, data, advice or communications. 33 (cc) Information and records held by the Department 34 of Public Health and its authorized representatives HB3180 Enrolled -39- LRB9009236JSmg 1 relating to known or suspected cases of sexually 2 transmissible disease or any information the disclosure 3 of which is restricted under the Illinois Sexually 4 Transmissible Disease Control Act. 5 (dd) Information the disclosure of which is 6 exempted under Section 30 of the Radon Industry Licensing 7 Act. 8 (ee) Firm performance evaluations under Section 55 9 of the Architectural, Engineering, and Land Surveying 10 Qualifications Based Selection Act. 11 (ff) Security portions of system safety program 12 plans, investigation reports, surveys, schedules, lists, 13 data, or information compiled, collected, or prepared by 14 or for the Regional Transportation Authority under 15 Section 2.11 of the Regional Transportation Authority Act 16 or the State of Missouri under the Bi-State Transit 17 Safety Act. 18 (gg)(ff)Information the disclosure of which is 19 restricted and exempted under Section 50 of the Illinois 20 Prepaid Tuition Act. 21 (hh) Information that would disclose or might lead 22 to the disclosure of secret or confidential information, 23 codes, algorithms, programs, or private keys intended to 24 be used to create electronic or digital signatures under 25 the Electronic Commerce Security Act. 26 (2) This Section does not authorize withholding of 27 information or limit the availability of records to the 28 public, except as stated in this Section or otherwise 29 provided in this Act. 30 (Source: P.A. 90-262, eff. 7-30-97; 90-273, eff. 7-30-97; 31 90-546, eff. 12-1-97; revised 12-24-97.) 32 Section 95-10. The State Comptroller Act is amended by 33 changing Section 14.01 as follows: HB3180 Enrolled -40- LRB9009236JSmg 1 (15 ILCS 405/14.01) 2 Sec. 14.01. Digital signatures. 3 (a) In any communication between a State agency and the 4 Comptroller in which a signature is required or used, any 5 party to the communication may affix a signature by use of a 6 digital signature that complies with the requirements of this 7 Section. The use of a digital signature shall have the same 8 force and effect as the use of a manual signature if and only 9 if it embodies all of the following attributes: 10 (1) It is unique to the person using it. 11 (2) It is capable of verification. 12 (3) It is under the sole control of the person 13 using it. 14 (4) It is linked to data in such a manner that if 15 the data are changed, the digital signature is 16 invalidated. 17 (5) It conforms to regulations adopted by the 18 Comptroller. 19 (b) The use or acceptance of a digital signature shall 20 be at the option of the parties. Nothing in this Section 21 shall require a State agency to use or permit the use of a 22 digital signature. 23 (c) "Digital signature" has the meaning ascribed to that 24 term in the Electronic Commerce Security Actmeans an25electronic identifier, created by computer, intended by the26party using it to have the same force and effect as the use27of a manual signature. 28 (Source: P.A. 90-37, eff. 6-27-97.) 29 Section 95-15. The Criminal Code of 1961 is amended by 30 changing Section 17-3 as follows: 31 (720 ILCS 5/17-3) (from Ch. 38, par. 17-3) 32 Sec. 17-3. Forgery. HB3180 Enrolled -41- LRB9009236JSmg 1 (a) A person commits forgery when, with intent to 2 defraud, he knowingly: 3 (1) makes or alters any document apparently capable 4 of defrauding another in such manner that it purports to 5 have been made by another or at another time, or with 6 different provisions, or by authority of one who did not 7 give such authority; or 8 (2) issues or delivers such document knowing it to 9 have been thus made or altered; or 10 (3) possesses, with intent to issue or deliver, any 11 such document knowing it to have been thus made or 12 altered; or.13 (4) unlawfully uses the signature device of another 14 to create an electronic signature of that other person, 15 as those terms are defined in the Electronic Commerce 16 Security Act. 17 (b) An intent to defraud means an intention to cause 18 another to assume, create, transfer, alter or terminate any 19 right, obligation or power with reference to any person or 20 property. 21 (c) A document apparently capable of defrauding another 22 includes, but is not limited to, one by which any right, 23 obligation or power with reference to any person or property 24 may be created, transferred, altered or terminated. A 25 document includes any record or electronic record as those 26 terms are defined in the Electronic Commerce Security Act. 27 (d) Sentence. 28 Forgery is a Class 3 felony. 29 (Source: P.A. 77-2638.) 30 ARTICLE 99. EFFECTIVE DATE 31 Section 99-1. Effective date. This Act takes effect 32 July 1, 1999.