Skip page top navigationFDA Logo--links to FDA home page Logo of and Link to start page of Office of Regulatory Affairs, U.S. Food and Drug Administration U.S. Food and Drug Administration Office of Regulatory Affairs HHS Logo and link to Department of Health and Human Services website

FDA Home Page | Federal-State | Import Program | Compliance | Inspection | Science | ORA Search

Title 21 Code of Federal Regulations (21 CFR Part 11)
Electronic Records; Electronic Signatures
Final Rule Published in the Federal Register

Web page issued:  March, 2000; reformatted June 01, 2001 (with updated email addresses for FDA contacts) tc


Page 3 of 4 Previous

Page 1 | 2 | 3 | 4

Next Page 4


VIII. Electronic Records--Controls for Open Systems (Sec. 11.30)

Proposed Sec. 11.30 states that: ``Open systems used to create,
modify, maintain, or transmit electronic records shall employ
procedures and controls designed to ensure the authenticity, integrity
and confidentiality of electronic records from the point of their
creation to the point of their receipt.'' In addition, Sec. 11.30
states:
* * * Such procedures and controls shall include those
identified in Sec. 11.10, as appropriate, and such additional
measures as document encryption and use of established digital
signature standards acceptable to the agency, to ensure, as
necessary under the circumstances, record authenticity, integrity,
and confidentiality.
94. One comment suggested that the reference to digital signature
standards be deleted because the agency should not be setting standards
and should not dictate how to ensure record authenticity, integrity,
and confidentiality. Other comments requested clarification of the
agency's expectations with regard to digital signatures: (1) The kinds
that would be acceptable, (2) the mechanism for announcing which
standards were acceptable (and whether that meant FDA would be
certifying particular software), and (3) a definition of digital
signature. One comment asserted that FDA should accept international
standards for digital signatures. Some comments also requested a
definition of encryption. One comment encouraged the agency to further
define open systems.
The agency advises that Sec. 11.30 requires additional controls,
beyond those identified in Sec. 11.10, as needed under the
circumstances, to ensure record authenticity, integrity, and
confidentiality for open systems. Use of digital signatures is one
measure that may be used, but is not specifically required. The agency
wants to ensure that the digital signature standard used is, in fact,
appropriate. Development of digital signature standards is a complex
undertaking, one FDA does not expect to be performed by individual
firms on an ad hoc basis, and one FDA does not now seek to perform.
The agency is nonetheless concerned that such standards be robust
and secure. Currently, the agency is aware of two such standards, the
RSA (Rivest-Shamir-Adleman), and NIST's Digital Signature Standard
(DSS). The DSS became Federal Information Processing Standard (FIPS)
186 on December 1, 1994. These standards are incorporated in different
software programs. The agency does not seek to certify or otherwise
approve of such programs,

[[Page 13452]]

but expects people who use such programs to ensure that they are
suitable for their intended use. FDA is aware that NIST provides
certifications regarding mathematical conformance to the DSS core
algorithms, but does not formally evaluate the broader programs that
contain those algorithms. The agency has revised the final rule to
clarify its intent that firms retain the flexibility to use any
appropriate digital signature as an additional system control for open
systems. FDA is also including a definition of digital signature under
Sec. 11.3(b)(5).
The agency does not believe it necessary to codify the term
``encryption'' because, unlike the term digital signature, it has been
in general use for many years and is generally understood to mean the
transforming of a writing into a secret code or cipher. The agency is
aware that there are several commercially available software programs
that implement both digital signatures and encryption.
95. Two comments noted that use of digital signatures and
encryption is not necessary in the context of PDMA, where access to an
electronic record is limited once it is signed and stored. One of the
comments suggested that proposed Sec. 11.30 be revised to clarify this
point.
As discussed in comment 94 of this document, use of digital
signatures and encryption would be an option when extra measures are
necessary under the circumstances. In the case of PDMA records, such
measures may be warranted in certain circumstances, and unnecessary in
others. For example, if electronic records were to be transmitted by a
firm's representative by way of a public online service to a central
location, additional measures would be necessary. On the other hand,
where the representative's records are hand delivered to that location,
or transferred by direct connection between the representative and the
central location, such additional measures to ensure record
authenticity, confidentiality, and integrity may not be necessary. The
agency does not believe that it is practical to revise Sec. 11.30 to
elaborate on every possible situation in which additional measures
would or would not be needed.
96. One comment addressed encryption of submissions to FDA and
asked if people making those submissions would have to give the agency
the appropriate ``keys'' and, if so, how the agency would protect the
security of such information.
The agency intends to develop appropriate procedures regarding the
exchange of ``keys'' attendant to use of encryption and digital
signatures, and will protect those keys that must remain confidential,
in the same manner as the agency currently protects trade secrets.
Where the agency and a submitter agree to use a system that calls for
the exchange of secret keys, FDA will work with submitters to achieve
mutually agreeable procedures. The agency notes, however, that not all
encryption and digital signature systems require that enabling keys be
secret.
97. One comment noted that proposed Sec. 11.30 does not mention
availability and nonrepudiation and requested clarification of the term
``point of receipt.'' The comment noted that, where an electronic
record is received at a person's electronic mailbox (which resides on
an open system), additional measures may be needed when the record is
transferred to the person's own local computer because such additional
transfer entails additional security risks. The comment suggested
wording that would extend open system controls to the point where
records are ultimately retained.
The agency agrees that, in the situation described by the comment,
movement of the electronic record from an electronic mailbox to a
person's local computer may necessitate open system controls. However,
situations may vary considerably as to the ultimate point of receipt,
and FDA believes proposed Sec. 11.30 offers greater flexibility in
determining open system controls than revisions suggested by the
comment. The agency advises that the concept of nonrepudiation is part
of record authenticity and integrity, as already covered by
Sec. 11.10(c). Therefore, FDA is not revising Sec. 11.30 as suggested.

IX. Electronic Records--Signature Manifestations (Sec. 11.50)

Proposed Sec. 11.50 requires that electronic records that are
electronically signed must display in clear text the printed name of
the signer, and the date and time when the electronic signature was
executed. This section also requires that electronic records clearly
indicate the meaning (such as review, approval, responsibility, and
authorship) associated with their attendant signatures.
98. Several comments suggested that the information required under
proposed Sec. 11.50 need not be contained in the electronic records
themselves, but only in the human readable format (screen displays and
printouts) of such records. The comments explained that the records
themselves need only contain links, such as signature attribute codes,
to such information to produce the displays of information required.
The comments noted, for example, that, where electronic signatures
consist of an identification code in combination with a password, the
combined code and password itself would not be part of the display.
Some comments suggested that proposed Sec. 11.50 be revised to clarify
what items are to be displayed.
The agency agrees and has revised proposed Sec. 11.50 accordingly.
The intent of this section is to require that human readable forms of
signed electronic records, such as computer screen displays and
printouts bear: (1) The printed name of the signer (at the time the
record is signed as well as whenever the record is read by humans); (2)
the date and time of signing; and (3) the meaning of the signature. The
agency believes that revised Sec. 11.50 will afford persons the
flexibility they need to implement the display of information
appropriate for their own electronic records systems, consistent with
other system controls in part 11, to ensure record integrity and
prevent falsification.
99. One comment stated that the controls in proposed Sec. 11.50
would not protect against inaccurate entries.
FDA advises that the purpose of this section is not to protect
against inaccurate entries, but to provide unambiguous documentation of
the signer, when the signature was executed, and the signature's
meaning. The agency believes that such a record is necessary to
document individual responsibility and actions.
In a paper environment, the printed name of the individual is
generally present in the signed record, frequently part of a
traditional ``signature block.'' In an electronic environment, the
person's name may not be apparent, especially where the signature is
based on identification codes combined with passwords. In addition, the
meaning of a signature is generally apparent in a paper record by
virtue of the context of the record or, more often, explicit phrases
such as ``approved by,'' ``reviewed by,'' and ``performed by.'' Thus,
the agency believes that for clear documentation purposes it is
necessary to carry such meanings into the electronic record
environment.
100. One comment suggested that proposed Sec. 11.50 should apply
only to those records that are required to be signed, and that the
display of the date and time should be performed in a secure manner.
The agency intends that this section apply to all signed electronic
records regardless of whether other regulations require them to be
signed. The agency believes that if it is important enough that a
record be signed, human readable

[[Page 13453]]

displays of such records must include the printed name of the signer,
the date and time of signing, and the meaning of the signature. Such
information is crucial to the agency's ability to protect public
health. For example, a message from a firm's management to employees
instructing them on a particular course of action may be critical in
litigation. This requirement will help ensure clear documentation and
deter falsification regardless of whether the signature is electronic
or handwritten.
The agency agrees that the display of information should be carried
out in a secure manner that preserves the integrity of that
information. The agency, however, does not believe it is necessary at
this time to revise Sec. 11.50 to add specific security measures
because other requirements of part 11 have the effect of ensuring
appropriate security.
Because signing information is important regardless of the type of
signature used, the agency has revised Sec. 11.50 to cover all types of
signings.
101. Several comments objected to the requirement in proposed
Sec. 11.50(a) that the time of signing be displayed in addition to the
date on the grounds that such information is: (1) Unnecessary, (2)
costly to implement, (3) needed in the electronic record for auditing
purposes, but not needed in the display of the record, and (4) only
needed in critical applications. Some comments asserted that recording
time should be optional. One comment asked whether the time should be
local to the signer or to a central network when electronic record
systems cross different time zones.
The agency believes that it is vital to record the time when a
signature is applied. Documenting the time when a signature was applied
can be critical to demonstrating that a given record was, or was not,
falsified. Regarding systems that may span different time zones, the
agency advises that the signer's local time is the one to be recorded.
102. One comment assumed that a person's user identification code
could be displayed instead of the user's printed name, along with the
date and time of signing.
This assumption is incorrect. The agency intends that the printed
name of the signer be displayed for purposes of unambiguous
documentation and to emphasize the importance of the act of signing to
the signer. The agency believes that because an identification code is
not an actual name, it would not be a satisfactory substitute.
103. One comment suggested that the word ``printed'' in the phrase
``printed name'' be deleted because the word was superfluous. The
comment also stated that the rule should state when the clear text must
be created or displayed because some computer systems, in the context
of electronic data interchange transactions, append digital signatures
to records before, or in connection with, communication of the record.
The agency disagrees that the word ``printed'' is superfluous
because the intent of this section is to show the name of the person in
an unambiguous manner that can be read by anyone. The agency believes
that requiring the printed name of the signer instead of codes or other
manifestations, more effectively provides clarity.
The agency has revised this section to clarify the point at which
the signer's information must be displayed, namely, as part of any
human readable form of the electronic record. The revision, in the
agency's view, addresses the comment's concern regarding the
application of digital signatures. The agency advises that under
Sec. 11.50, any time after an electronic record has been signed,
individuals who see the human readable form of the record will be able
to immediately tell who signed the record, when it was signed, and what
the signature meant. This includes the signer who, as with a
traditional signature to paper, will be able to review the signature
instantly.
104. One comment asked if the operator would have to see the
meaning of the signature, or if the information had to be stored on the
physical electronic record.
As discussed in comment 100 of this document, the information
required by Sec. 11.50(b) must be displayed in the human readable
format of the electronic record. Persons may elect to store that
information directly within the electronic record itself, or in
logically associated records, as long as such information is displayed
any time a person reads the record.
105. One comment noted that proposed Sec. 11.50(b) could be
interpreted to require lengthy explanations of the signatures and the
credentials of the signers. The comment also stated that this
information would more naturally be contained in standard operating
procedures, manuals, or accompanying literature than in the electronic
records themselves.
The agency believes that the comment misinterprets the intent of
this provision. Recording the meaning of the signature does not infer
that the signer's credentials or other lengthy explanations be part of
that meaning. The statement must merely show what is meant by the act
of signing (e.g., review, approval, responsibility, authorship).
106. One comment noted that the meaning of a signature may be
included in a (digital signature) public key certificate and asked if
this would be acceptable. The comment also noted that the certificate
might be easily accessible by a record recipient from either a
recognized database or one that might be part of, or associated with,
the electronic record itself. The comment further suggested that FDA
would benefit from participating in developing rules of practice
regarding certificate-based public key cryptography and infrastructure
with the Information Security Committee, Section of Science and
Technology, of the American Bar Association (ABA).
The intent of this provision is to clearly discern the meaning of
the signature when the electronic record is displayed in human readable
form. The agency does not expect such meaning to be contained in or
displayed by a public key certificate because the public key is
generally a fixed value associated with an individual. The certificate
is used by the recipient to authenticate a digital signature that may
have different meanings, depending upon the record being signed. FDA
acknowledges that it is possible for someone to establish different
public keys, each of which may indicate a different signature meaning.
Part 11 would not prohibit multiple ``meaning'' keys provided the
meaning of the signature itself was still clear in the display of the
record, a feature that could conceivably be implemented by software.
Regarding work of the ABA and other standard-setting organizations,
the agency welcomes an open dialog with such organizations, for the
mutual benefit of all parties, to establish and facilitate the use of
electronic record/electronic signature technologies. FDA's
participation in any such activities would be in accordance with the
agency's policy on standards stated in the Federal Register of October
11, 1995 (60 FR 53078).
Revised Sec. 11.50, signature manifestations, reads as follows:
(a) Signed electronic records shall contain information
associated with the signing that clearly indicates all of the
following:
(1) The printed name of the signer;
(2) The date and time when the signature was executed; and
(3) The meaning (such as review, approval, responsibility, or
authorship) associated with the signature.
(b) The items identified in paragraphs (a)(1), (a)(2), and
(a)(3) of this section shall be subject to the same controls as for
electronic records and shall be included as part of any human
readable form of the electronic record (such as electronic display
or printout).

[[Page 13454]]

X. Electronic Records--Signature/Record Linking (Sec. 11.70)

107. Proposed Sec. 11.70 states that electronic signatures and
handwritten signatures executed to electronic records must be
verifiably bound to their respective records to ensure that signatures
could not be excised, copied, or otherwise transferred to falsify
another electronic record.
Many comments objected to this provision as too prescriptive,
unnecessary, unattainable, and excessive in comparison to paper-based
records. Some comments asserted that the objectives of the section
could be attained through appropriate procedural and administrative
controls. The comments also suggested that objectives of the provision
could be met by appropriate software (i.e., logical) links between the
electronic signatures and electronic records, and that such links are
common in systems that use identification codes in combination with
passwords. One firm expressed full support for the provision, and noted
that its system implements such a feature and that signature-to-record
binding is similar to the record-locking provision of the proposed PDMA
regulations.
The agency did not intend to mandate use of any particular
technology by use of the word ``binding.'' FDA recognizes that, because
it is relatively easy to copy an electronic signature to another
electronic record and thus compromise or falsify that record, a
technology based link is necessary. The agency does not believe that
procedural or administrative controls alone are sufficient to ensure
that objective because such controls could be more easily circumvented
than a straightforward technology based approach. In addition, when
electronic records are transferred from one party to another, the
procedural controls used by the sender and recipient may be different.
This could result in record falsification by signature transfer.
The agency agrees that the word ``link'' would offer persons
greater flexibility in implementing the intent of this provision and in
associating the names of individuals with their identification codes/
passwords without actually recording the passwords themselves in
electronic records. The agency has revised proposed Sec. 11.70 to state
that signatures shall be linked to their electronic records.
108. Several comments argued that proposed Sec. 11.70 requires
absolute protection of electronic records from falsification, an
objective that is unrealistic to the extent that determined individuals
could falsify records.
The agency acknowledges that, despite elaborate system controls,
certain determined individuals may find a way to defeat
antifalsification measures. FDA will pursue such illegal activities as
vigorously as it does falsification of paper records. For purposes of
part 11, the agency's intent is to require measures that prevent
electronic records falsification by ordinary means. Therefore, FDA has
revised Sec. 11.70 by adding the phrase ``by ordinary means'' at the
end of this section.
109. Several comments suggested changing the phrase ``another
electronic record'' to ``an electronic record'' to clarify that the
antifalsification provision applies to the current record as well as
any other record.
The agency agrees and has revised Sec. 11.70 accordingly.
110. Two comments argued that signature-to-record binding is
unnecessary, in the context of PDMA, beyond the point of record
creation (i.e., when records are transmitted to a point of receipt).
The comments asserted that persons who might be in a position to
separate a signature from a record (for purposes of falsification) are
individuals responsible for record integrity and thus unlikely to
falsify records. The comments also stated that signature-to-record
binding is produced by software coding at the time the record is
signed, and suggested that proposed Sec. 11.70 clarify that binding
would be necessary only up to the point of actual transmission of the
electronic record to a central point of receipt.
The agency disagrees with the comment's premise that the need for
binding to prevent falsification depends on the disposition of people
to falsify records. The agency believes that reliance on individual
tendencies is insufficient insurance against falsification. The agency
also notes that in the traditional paper record, the signature remains
bound to its corresponding record regardless of where the record may
go.
111. One comment suggested that proposed Sec. 11.70 be deleted
because it appears to require that all records be kept on inalterable
media. The comment also suggested that the phrase ``otherwise
transferred'' be deleted on the basis that it should be permissible for
copies of handwritten signatures (recorded electronically) to be made
when used, in addition to another unique individual identification
mechanism.
The agency advises that neither Sec. 11.70, nor other sections in
part 11, requires that records be kept on inalterable media. What is
required is that whenever revisions to a record are made, the original
entries must not be obscured. In addition, this section does not
prohibit copies of handwritten signatures recorded electronically from
being made for legitimate reasons that do not relate to record
falsification. Section 11.70 merely states that such copies must not be
made that falsify electronic records.
112. One comment suggested that proposed Sec. 11.70 be revised to
require application of response cryptographic methods because only
those methods could be used to comply with the regulation. The comment
noted that, for certificate based public key cryptographic methods, the
agency should address verifiable binding between the signer's name and
public key as well as binding between digital signatures and electronic
records. The comment also suggested that the regulation should
reference electronic signatures in the context of secure time and date
stamping.
The agency intends to permit maximum flexibility in how
organizations achieve the linking called for in Sec. 11.70, and, as
discussed above, has revised the regulation accordingly. Therefore, FDA
does not believe that cryptographic and digital signature methods would
be the only ways of linking an electronic signature to an electronic
document. In fact, one firm commented that its system binds a person's
handwritten signature to an electronic record. The agency agrees that
use of digital signatures accomplishes the same objective because, if a
digital signature were to be copied from one record to another, the
second record would fail the digital signature verification procedure.
Furthermore, FDA notes that concerns regarding binding a person's name
with the person's public key would be addressed in the context of
Sec. 11.100(b) because an organization must establish an individual's
identity before assigning or certifying an electronic signature (or any
of the electronic signature components).
113. Two comments requested clarification of the types of
technologies that could be used to meet the requirements of proposed
Sec. 11.70.
As discussed in comment 107 of this document, the agency is
affording persons maximum flexibility in using any appropriate method
to link electronic signatures to their respective electronic records to
prevent record falsification. Use of digital signatures is one such
method, as is use of software locks to prevent sections of codes

[[Page 13455]]

representing signatures from being copied or removed. Because this is
an area of developing technology, it is likely that other linking
methods will emerge.

XI. Electronic Signatures--General Requirements (Sec. 11.100)

Proposed Sec. 11.100(a) states that each electronic signature must
be unique to one individual and not be reused or reassigned to anyone
else.
114. One comment asserted that several people should be permitted
to share a common identification code and password where access control
is limited to inquiry only.
Part 11 does not prohibit the establishment of a common group
identification code/password for read only access purposes. However,
such commonly shared codes and passwords would not be regarded, and
must not be used, as electronic signatures. Shared access to a common
database may nonetheless be implemented by granting appropriate common
record access privileges to groups of people, each of whom has a unique
electronic signature.
115. Several comments said proposed Sec. 11.100(a) should permit
identification codes to be reused and reassigned from one employee to
another, as long as an audit trail exists to associate an
identification code with a given individual at any one time, and
different passwords are used. Several comments said the section should
indicate if the agency intends to restrict authority delegation by the
nonreassignment or nonreuse provision, or by the provision in
Sec. 11.200(a)(2) requiring electronic signatures to be used only by
their genuine owners. The comments questioned whether reuse means
restricting one noncryptographic based signature to only one record and
argued that passwords need not be unique if the combined identification
code and password are unique to one individual. One comment recommended
caution in using the term ``ownership'' because of possible confusion
with intellectual property rights or ownership of the computer systems
themselves.
The agency advises that, where an electronic signature consists of
the combined identification code and password, Sec. 11.100 would not
prohibit the reassignment of the identification code provided the
combined identification code and password remain unique to prevent
record falsification. The agency believes that such reassignments are
inadvisable, however, to the extent that they might be combined with an
easily guessed password, thus increasing the chances that an individual
might assume a signature belonging to someone else. The agency also
advises that where people can read identification codes (e.g., printed
numbers and letters that are typed at a keyboard or read from a card),
the risks of someone obtaining that information as part of a
falsification effort would be greatly increased as compared to an
identification code that is not in human readable form (one that is,
for example, encoded on a ``secure card'' or other device).
Regarding the delegation of authority to use electronic signatures,
FDA does not intend to restrict the ability of one individual to sign a
record or otherwise act on behalf of another individual. However, the
applied electronic signature must be the assignee's and the record
should clearly indicate the capacity in which the person is acting
(e.g., on behalf of, or under the authority of, someone else). This is
analogous to traditional paper records and handwritten signatures when
person ``A'' signs his or her own name under the signature block of
person ``B,'' with appropriate explanatory notations such as ``for'' or
``as representative of'' person B. In such cases, person A does not
simply sign the name of person B. The agency expects the same procedure
to be used for electronic records and electronic signatures.
The agency intends the term ``reuse'' to refer to an electronic
signature used by a different person. The agency does not regard as
``reuse'' the replicate application of a noncryptographic based
electronic signature (such as an identification code and password) to
different electronic records. For clarity, FDA has revised the phrase
``not be reused or reassigned to'' to state ``not be reused by, or
reassigned to,'' in Sec. 11.100(a).
The reference in Sec. 11.200(a) to ownership is made in the context
of an individual owning or being assigned a particular electronic
signature that no other individual may use. FDA believes this is clear
and that concerns regarding ownership in the context of intellectual
property rights or hardware are misplaced.
116. One comment suggested that proposed Sec. 11.100(a) should
accommodate electronic signatures assigned to organizations rather than
individuals.
The agency advises that, for purposes of part 11, electronic
signatures are those of individual human beings and not organizations.
For example, FDA does not regard a corporate seal as an individual's
signature. Humans may represent and obligate organizations by signing
records, however. For clarification, the agency is substituting the
word ``individual'' for ``person'' in the definition of electronic
signature (Sec. 11.3(b)(7)) because the broader definition of person
within the act includes organizations.
117. Proposed Sec. 11.100(b) states that, before an electronic
signature is assigned to a person, the identity of the individual must
be verified by the assigning authority.
Two comments noted that where people use identification codes in
combination with passwords only the identification code portion of the
electronic signature is assigned, not the password. Another comment
argued that the word ``assigned'' is inappropriate in the context of
electronic signatures based upon public key cryptography because the
appropriate authority certifies the bind between the individual's
public key and identity, and not the electronic signature itself.
The agency acknowledges that, for certain types of electronic
signatures, the authorizing or certifying organization issues or
approves only a portion of what eventually becomes an individual's
electronic signature. FDA wishes to accommodate a broad variety of
electronic signatures and is therefore revising Sec. 11.100(b) to
require that an organization verify the identity of an individual
before it establishes, assigns, certifies, or otherwise sanctions an
individual's electronic signature or any element of such electronic
signature.
118. One comment suggested that the word ``verified'' in proposed
Sec. 11.100(b) be changed to ``confirmed.'' Other comments addressed
the method of verifying a person's identity and suggested that the
section specify acceptable verification methods, including high level
procedures regarding the relative strength of that verification, and
the need for personal appearances or supporting documentation such as
birth certificates. Two comments said the verification provision should
be deleted because normal internal controls are adequate, and that it
was impractical for multinational companies whose employees are
globally dispersed.
The agency does not believe that there is a sufficient difference
between ``verified'' and ``confirmed'' to warrant a change in this
section. Both words indicate that organizations substantiate a person's
identity to prevent impersonations when an electronic signature, or any
of its elements, is being established or certified. The agency
disagrees with the assertion that this requirement is unnecessary.
Without verifying someone's identity at the outset of establishing or
certifying

[[Page 13456]]

an individual's electronic signature, or a portion thereof, an imposter
might easily access and compromise many records. Moreover, an imposter
could continue this activity for a prolonged period of time despite
other system controls, with potentially serious consequences.
The agency does not believe that the size of an organization, or
global dispersion of its employees, is reason to abandon this vital
control. Such dispersion may, in fact, make it easier for an impostor
to pose as someone else in the absence of such verification. Further,
the agency does not accept the implication that multinational firms
would not verify the identity of their employees as part of other
routine procedures, such as when individuals are first hired.
In addition, in cases where an organization is widely dispersed and
electronic signatures are established or certified centrally,
Sec. 11.100(b) does not prohibit organizations from having their local
units perform the verification and relaying this information to the
central authority. Similarly, local units may conduct the electronic
signature assignment or certification.
FDA does not believe it is necessary at this time to specify
methods of identity verification and expects that organizations will
consider risks attendant to sanctioning an erroneously assigned
electronic signature.
119. Proposed Sec. 11.100(c) states that persons using electronic
signatures must certify to the agency that their electronic signature
system guarantees the authenticity, validity, and binding nature of any
electronic signature. Persons utilizing electronic signatures would,
upon agency request, provide additional certification or testimony that
a specific electronic signature is authentic, valid, and binding. Such
certification would be submitted to the FDA district office in which
territory the electronic signature system is in use.
Many comments objected to the proposed requirement that persons
provide FDA with certification regarding their electronic signature
systems. The comments asserted that the requirement was: (1)
Unprecedented, (2) unrealistic, (3) unnecessary, (4) contradictory to
the principles and intent of system validation, (5) too burdensome for
FDA to manage logistically, (6) apparently intended only to simplify
FDA litigation, (7) impossible to meet regarding ``guarantees'' of
authenticity, and (8) an apparent substitute for FDA inspections.
FDA agrees in part with these comments. This final rule reduces the
scope and burden of certification to a statement of intent that
electronic signatures are the legally binding equivalent of handwritten
signatures.
As noted previously, the agency believes it is important, within
the context of its health protection activities, to ensure that persons
who implement electronic signatures fully equate the legally binding
nature of electronic signatures with the traditional handwritten paper-
based signatures. The agency is concerned that individuals might
disavow an electronic signature as something completely different from
a traditional handwritten signature. Such contention could result in
confusion and possibly extensive litigation.
Moreover, a limited certification as provided in this final rule is
consistent with other legal, regulatory, and commercial practices. For
example, electronic data exchange trading partner agreements are often
written on paper and signed with traditional handwritten signatures to
establish that certain electronic identifiers are recognized as
equivalent to traditional handwritten signatures.
FDA does not expect electronic signature systems to be guaranteed
foolproof. The agency does not intend, under Sec. 11.100(c), to
establish a requirement that is unattainable. Certification of an
electronic signature system as the legally binding equivalent of a
traditional handwritten signature is separate and distinct from system
validation. This provision is not intended as a substitute for FDA
inspection and such inspection alone may not be able to determine in a
conclusive manner an organization's intent regarding electronic
signature equivalency.
The agency has revised proposed Sec. 11.100(c) to clarify its
intent. The agency wishes to emphasize that the final rule dramatically
curtails what FDA had proposed and is essential for the agency to be
able to protect and promote the public health because FDA must be able
to hold people to the commitments they make under their electronic
signatures. The certification in the final rule is merely a statement
of intent that electronic signatures are the legally binding equivalent
of traditional handwritten signatures.
120. Several comments questioned the procedures necessary for
submitting the certification to FDA, including: (1) The scheduling of
the certification; (2) whether to submit certificates for each
individual or for each electronic signature; (3) the meaning of
``territory'' in the context of wide area networks; (4) whether such
certificates could be submitted electronically; and (5) whether
organizations, after submitting a certificate, had to wait for a
response from FDA before implementing their electronic signature
systems. Two comments suggested revising proposed Sec. 11.100(c) to
require that all certifications be submitted to FDA only upon agency
request. One comment suggested changing ``should'' to ``shall'' in the
last sentence of Sec. 11.100(c) if the agency's intent is to require
certificates to be submitted to the respective FDA district office.
The agency intends that certificates be submitted once, in the form
of a paper letter, bearing a traditional handwritten signature, at the
time an organization first establishes an electronic signature system
after the effective date of part 11, or, where such systems have been
used before the effective date, upon continued use of the electronic
signature system.
A separate certification is not needed for each electronic
signature, although certification of a particular electronic signature
is to be submitted if the agency requests it. The agency does not
intend to establish certification as a review and approval function. In
addition, organizations need not await FDA's response before putting
electronic signature systems into effect, or before continuing to use
an existing system.
A single certification may be stated in broad terms that encompass
electronic signatures of all current and future employees, thus
obviating the need for subsequent certifications submitted on a
preestablished schedule.
To further simplify the process and to minimize the number of
certifications that persons would have to provide, the agency has
revised Sec. 11.100(c) to permit submission of a single certification
that covers all electronic signatures used by an organization. The
revised rule also simplifies the process by providing a single agency
receiving unit. The final rule instructs persons to send certifications
to FDA's Office of Regional Operations (HFC-100), 5600 Fishers Lane,
Rockville, MD 20857. Persons outside the United States may send their
certifications to the same office.
The agency offers, as guidance, an example of an acceptable
Sec. 11.100(c) certification:
Pursuant to Section 11.100 of Title 21 of the Code of Federal
Regulations, this is to certify that [name of organization] intends
that all electronic signatures executed by our employees, agents, or
representatives, located anywhere in the world, are the legally
binding equivalent of traditional handwritten signatures.

[[Page 13457]]

The agency has revised Sec. 11.100 to clarify where and when
certificates are to be submitted.
The agency does not agree that the initial certification be
provided only upon agency request because FDA believes it is vital to
have such certificates, as a matter of record, in advance of any
possible litigation. This would clearly establish the intent of
organizations to equate the legally binding nature of electronic
signatures with traditional handwritten signatures. In addition, the
agency believes that having the certification on file ahead of time
will have the beneficial effect of reinforcing the gravity of
electronic signatures by putting an organization's employees on notice
that the organization has gone on record with FDA as equating
electronic signatures with handwritten signatures.
121. One comment suggested that proposed Sec. 11.100(c) be revised
to exclude from certification instances in which the purported signer
claims that he or she did not create or authorize the signature.
The agency declines to make this revision because a provision for
nonrepudiation is already contained in Sec. 11.10.
As a result of the considerations discussed in comments 119 and 120
of this document, the agency has revised proposed Sec. 11.100(c) to
state that:
(c) Persons using electronic signatures shall, prior to or at
the time of such use, certify to the agency that the electronic
signatures in their system, used on or after August 20, 1997, are
intended to be the legally binding equivalent of traditional
handwritten signatures.
(1) The certification shall be submitted in paper form and
signed with a traditional handwritten signature to the Office of
Regional Operations (HFC-100), 5600 Fishers Lane, Rockville, MD
20857.
(2) Persons using electronic signatures shall, upon agency
request, provide additional certification or testimony that a
specific electronic signature is the legally binding equivalent of
the signer's handwritten signature.

XII. Electronic Signature Components and Controls (Sec. 11.200)

122. Proposed Sec. 11.200 sets forth requirements for electronic
signature identification mechanisms and controls. Two comments
suggested that the term ``identification code'' should be defined.
Several comments suggested that the term ``identification mechanisms''
should be changed to ``identification components'' because each
component of an electronic signature need not be executed by a
different mechanism.
The agency believes that the term ``identification code'' is
sufficiently broad and generally understood and does not need to be
defined in these regulations. FDA agrees that the word ``component''
more accurately reflects the agency's intent than the word
``mechanism,'' and has substituted ``component'' for ``mechanism'' in
revised Sec. 11.200. The agency has also revised the section heading to
read ``Electronic signature components and controls'' to be consistent
with the wording of the section.
123. Proposed Sec. 11.200(a) states that electronic signatures not
based upon biometric/behavioral links must: (1) Employ at least two
distinct identification mechanisms (such as an identification code and
password), each of which is contemporaneously executed at each signing;
(2) be used only by their genuine owners; and (3) be administered and
executed to ensure that attempted use of an individual's electronic
signature by anyone other than its genuine owner requires collaboration
of two or more individuals.
Two comments said that proposed Sec. 11.200(a) should acknowledge
that passwords may be known not only to their genuine owners, but also
to system administrators in case people forget their passwords.
The agency does not believe that system administrators would
routinely need to know an individual's password because they would have
sufficient privileges to assist those individuals who forget passwords.
124. Several comments argued that the agency should accept a single
password alone as an electronic signature because: (1) Combining the
password with an identification code adds little security, (2)
administrative controls and passwords are sufficient, (3) authorized
access is more difficult when two components are needed, (4) people
would not want to gain unauthorized entry into a manufacturing
environment, and (5) changing current systems that use only a password
would be costly.
The comments generally addressed the need for two components in
electronic signatures within the context of the requirement that all
components be used each time an electronic signature is executed.
Several comments suggested that, for purposes of system access,
individuals should enter both a user identification code and password,
but that, for subsequent signings during one period of access, a single
element (such as a password) known only to, and usable by, the
individual should be sufficient.
The agency believes that it is very important to distinguish
between those (nonbiometric) electronic signatures that are executed
repetitively during a single, continuous controlled period of time
(access session or logged-on period) and those that are not. The agency
is concerned, from statements made in comments, that people might use
passwords that are not always unique and are frequently words that are
easily associated with an individual. Accordingly, where nonbiometric
electronic signatures are not executed repetitively during a single,
continuous controlled period, it would be extremely bad practice to use
a password alone as an electronic signature. The agency believes that
using a password alone in such cases would clearly increase the
likelihood that one individual, by chance or deduction, could enter a
password that belonged to someone else and thereby easily and readily
impersonate that individual. This action could falsify electronic
records.
The agency acknowledges that there are some situations involving
repetitive signings in which it may not be necessary for an individual
to execute each component of a nonbiometric electronic signature for
every signing. The agency is persuaded by the comments that such
situations generally involve certain conditions. For example, an
individual performs an initial system access or ``log on,'' which is
effectively the first signing, by executing all components of the
electronic signature (typically both an identification code and a
password). The individual then performs subsequent signings by
executing at least one component of the electronic signature, under
controlled conditions that prevent another person from impersonating
the legitimate signer. The agency's concern here is the possibility
that, if the person leaves the workstation, someone else could access
the workstation (or other computer device used to execute the signing)
and impersonate the legitimate signer by entering an identification
code or password.
The agency believes that, in such situations, it is vital to have
stringent controls in place to prevent the impersonation. Such controls
include: (1) Requiring an individual to remain in close proximity to
the workstation throughout the signing session; (2) use of automatic
inactivity disconnect measures that would ``de-log'' the first
individual if no entries or actions were taken within a fixed short
timeframe; and (3) requiring that the single component needed for
subsequent signings be known to, and usable only by, the authorized
individual.
The agency's objective in accepting the execution of fewer than all
the components of a nonbiometric

[[Page 13458]]

electronic signature for repetitive signings is to make it impractical
to falsify records. The agency believes that this would be attained by
complying with all of the following procedures where nonbiometric
electronic signatures are executed more than once during a single,
continuous controlled session: (1) All electronic signature components
are executed for the first signing; (2) at least one electronic
signature component is executed at each subsequent signing; (3) the
electronic signature component executed after the initial signing is
only used by its genuine owner, and is designed to ensure it can only
be used by its genuine owner; and (4) the electronic signatures are
administered and executed to ensure that their attempted use by anyone
other than their genuine owners requires collaboration of two or more
individuals. Items 1 and 4 are already incorporated in proposed
Sec. 11.200(a). FDA has included items 2 and 3 in final Sec. 11.200(a).
The agency cautions, however, that if its experience with
enforcement of part 11 demonstrates that these controls are
insufficient to deter falsifications, FDA may propose more stringent
controls.
125. One comment asserted that, if the agency intends the term
``identification code'' to mean the typical user identification, it
should not characterize the term as a distinct mechanism because such
codes do not necessarily exhibit security attributes. The comment also
suggested that proposed Sec. 11.200(a) address the appropriate
application of each possible combination of a two-factor authentication
method.
The agency acknowledges that the identification code alone does not
exhibit security attributes. Security derives from the totality of
system controls used to prevent falsification. However, uniqueness of
the identification code when combined with another electronic signature
component, which may not be unique (such as a password), makes the
combination unique and thereby enables a legitimate electronic
signature. FDA does not now believe it necessary to address, in
Sec. 11.200(a), the application of all possible combinations of
multifactored authentication methods.
126. One comment requested clarification of ``each signing,''
noting that a laboratory employee may enter a group of test results
under one signing.
The agency advises that each signing means each time an individual
executes a signature. Particular requirements regarding what records
need to be signed derive from other regulations, not part 11. For
example, in the case of a laboratory employee who performs a number of
analytical tests, within the context of drug CGMP regulations, it is
permissible for one signature to indicate the performance of a group of
tests (21 CFR 211.194(a)(7)). A separate signing is not required in
this context for each separate test as long as the record clearly shows
that the single signature means the signer performed all the tests.
127. One comment suggested that the proposed requirement, that
collaboration of at least two individuals is needed to prevent attempts
at electronic signature falsification, be deleted because a responsible
person should be allowed to override the electronic signature of a
subordinate. Several comments addressed the phrase ``attempted use''
and suggested that it be deleted or changed to ``unauthorized use.''
The comments said that willful breaking or circumvention of any
security measure does not require two or more people to execute, and
that the central question is whether collaboration is required to use
the electronic signature.
The agency advises that the intent of the collaboration provision
is to require that the components of a nonbiometric electronic
signature cannot be used by one individual without the prior knowledge
of a second individual. One type of situation the agency seeks to
prevent is the use of a component such as a card or token that a person
may leave unattended. If an individual must collaborate with another
individual by disclosing a password, the risks of betrayal and
disclosure are greatly increased and this helps to deter such actions.
Because the agency is not condoning such actions, Sec. 11.200(a)(2)
requires that electronic signatures be used only by the genuine owner.
The agency disagrees with the comments that the term ``attempted use''
should be changed to ``unauthorized uses,'' because ``unauthorized
uses'' could infer that use of someone else's electronic signature is
acceptable if it is authorized.
Regarding electronic signature ``overrides,'' the agency would
consider as falsification the act of substituting the signature of a
supervisor for that of a subordinate. The electronic signature of the
subordinate must remain inviolate for purposes of authentication and
documentation. Although supervisors may overrule the actions of their
staff, the electronic signatures of the subordinates must remain a
permanent part of the record, and the supervisor's own electronic
signature must appear separately. The agency believes that such an
approach is fully consistent with procedures for paper records.
As a result of the revisions noted in comments 123 to 127 of this
document, Sec. 11.200(a) now reads as follows:
(a) Electronic signatures that are not based upon biometrics
shall:
(1) Employ at least two distinct identification components such
as an identification code and password.
(i) When an individual executes a series of signings during a
single, continuous period of controlled system access, the first
signing shall be executed using all electronic signature components;
subsequent signings shall be executed using at least one electronic
signature component that is only executable by, and designed to be
used only by, the individual.
(ii) When an individual executes one or more signings not
performed during a single, continuous period of controlled system
access, each signing shall be executed using all of the electronic
signature components.
(2) Be used only by their genuine owners; and
(3) Be administered and executed to ensure that attempted use of
an individual's electronic signature by anyone other than its
genuine owner requires collaboration of two or more individuals.
128. Proposed Sec. 11.200(b) states that electronic signatures
based upon biometric/behavioral links be designed to ensure that they
could not be used by anyone other than their genuine owners.
One comment suggested that the agency make available, by public
workshop or other means, any information it has regarding existing
biometric systems so that industry can provide proper input. Another
comment asserted that proposed Sec. 11.200(b) placed too great an
emphasis on biometrics, did not establish particular levels of
assurance for biometrics, and did not provide for systems using
mixtures of biometric and nonbiometric electronic signatures. The
comment recommended revising the phrase ``designed to ensure they
cannot be used'' to read ``provide assurances that prevent their
execution.''
The agency's experience with biometric electronic signatures is
contained in the administrative record for this rulemaking, under
docket no. 92N-0251, and includes recommendations from public comments
to the ANPRM and the proposed rule. The agency has also gathered, and
continues to gather, additional information from literature reviews,
general press reports, meetings, and the agency's experience with this
technology. Interested persons have had extensive opportunity for input
and comment regarding biometrics in part 11. In addition, interested
persons may continue to contact the agency at any time regarding
biometrics or any other relevant technologies. The agency notes

[[Page 13459]]

that the rule does not require the use of biometric-based electronic
signatures.
As the agency's experience with biometric electronic signatures
increases, FDA will consider holding or participating in public
workshops if that approach would be helpful to those wishing to adopt
such technologies to comply with part 11.
The agency does not believe that proposed Sec. 11.200(b) places too
much emphasis on biometric electronic signatures. As discussed above,
the regulation makes a clear distinction between electronic signatures
that are and are not based on biometrics, but treats their acceptance
equally.
The agency recognizes the inherent security advantages of
biometrics, however, in that record falsification is more difficult to
perform. System controls needed to make biometric-based electronic
signatures reliable and trustworthy are thus different in certain
respects from controls needed to make nonbiometric electronic
signatures reliable and trustworthy. The requirements in part 11
reflect those differences.
The agency does not believe that it is necessary at this time to
set numerical security assurance standards that any system would have
to meet.
The regulation does not prohibit individuals from using
combinations of biometric and nonbiometric-based electronic signatures.
However, when combinations are used, FDA advises that requirements for
each element in the combination would also apply. For example, if
passwords are used in combination with biometrics, then the benefits of
using passwords would only be realized, in the agency's view, by
adhering to controls that ensure password integrity (see Sec. 11.300).
In addition, the agency believes that the phrase ``designed to
ensure that they cannot be used'' more accurately reflects the agency's
intent than the suggested alternate wording, and is more consistent
with the concept of systems validation. Under such validation,
falsification preventive attributes would be designed into the
biometric systems.
To be consistent with the revised definition of biometrics in
Sec. 11.3(b)(3), the agency has revised Sec. 11.200(b) to read,
``Electronic signatures based upon biometrics shall be designed to
ensure that they cannot be used by anyone other than their genuine
owners.''

XIII. Electronic Signatures--Controls for Identification Codes/
Passwords (Sec. 11.300)

The introductory paragraph of proposed Sec. 11.300 states that
electronic signatures based upon use of identification codes in
combination with passwords must employ controls to ensure their
security and integrity.
To clarify the intent of this provision, the agency has added the
words ``[p]ersons who use'' to the first sentence of Sec. 11.300. This
change is consistent with Secs. 11.10 and 11.30. The introductory
paragraph now reads, ``Persons who use electronic signatures based upon
use of identification codes in combination with passwords shall employ
controls to ensure their security and integrity. Such controls shall
include: * * *.''
129. One comment suggested deletion of the phrase ``in combination
with passwords'' from the first sentence of this section.
The agency disagrees with the suggested revision because the change
is inconsistent with FDA's intent to address controls for electronic
signatures based on combinations of identification codes and passwords,
and would, in effect, permit a single component nonbiometric-based
electronic signature.
130. Proposed Sec. 11.300(a) states that controls for
identification codes/passwords must include maintaining the uniqueness
of each issuance of identification code and password.
One comment alleged that most passwords are commonly used words,
such as a child's name, a State, city, street, month, holiday, or date,
that are significant to the person who creates the password. Another
stated that the rule should explain uniqueness and distinguish between
issuance and use because identification code/password combinations
generally do not change for each use.
FDA does not intend to require that individuals use a completely
different identification code/password combination each time they
execute an electronic signature. For reasons explained in the response
to comment 16, what is required to be unique is each combined password
and identification code and FDA has revised the wording of
Sec. 11.300(a) to clarify this provision. The agency is aware, however,
of identification devices that generate new passwords on a continuous
basis in synchronization with a ``host'' computer. This results in
unique passwords for each system access. Thus, it is possible in theory
to generate a unique nonbiometric electronic signature for each
signing.
The agency cautions against using passwords that are common words
easily associated with their originators because such a practice would
make it relatively easy for someone to impersonate someone else by
guessing the password and combining it with an unsecured (or even
commonly known) identification code.
131. Proposed Sec. 11.300(b) states that controls for
identification codes/passwords must ensure that code/password issuances
are periodically checked, recalled, or revised.
Several comments objected to this proposed requirement because: (1)
It is unnecessary, (2) it excessively prescribes ``how to,'' (3) it
duplicates the requirements in Sec. 11.300(c), and (4) it is
administratively impractical for larger organizations. However, the
comments said individuals should be encouraged to change their
passwords periodically. Several comments suggested that proposed
Sec. 11.300(b) include a clarifying example such as ``to cover events
such as password aging.'' One comment said that the section should
indicate who is to perform the periodic checking, recalling, or
revising.
The agency disagrees with the objections to this provision. FDA
does not view the provision as a ``how to'' because organizations have
full flexibility in determining the frequency and methods of checking,
recalling, or revising their code/password issuances. The agency does
not believe that this paragraph duplicates the regulation in
Sec. 11.300(c) because paragraph (c) specifically addresses followup to
losses of electronic signature issuances, whereas Sec. 11.300(b)
addresses periodic issuance changes to ensure against their having been
unknowingly compromised. This provision would be met by ensuring that
people change their passwords periodically.
FDA disagrees that this system control is unnecessary or
impractical in large organizations because the presence of more people
may increase the opportunities for compromising identification codes/
passwords. The agency is confident that larger organizations will be
fully capable of handling periodic issuance checks, revisions, or
recalls.
FDA agrees with the comments that suggested a clarifying example
and has revised Sec. 11.300(b) to include password aging as such an
example. The agency cautions, however, that the example should not be
taken to mean that password expiration would be the only rationale for
revising, recalling, and checking issuances. If, for example,
identification codes and passwords have been copied or compromised,
they should be changed.
FDA does not believe it necessary at this time to specify who in an
organization is to carry out this system control, although the agency
expects

[[Page 13460]]

that units that issue electronic signatures would likely have this
duty.
132. Proposed Sec. 11.300(c) states that controls for
identification codes/passwords must include the following of loss
management procedures to electronically deauthorize lost tokens, cards,
etc., and to issue temporary or permanent replacements using suitable,
rigorous controls for substitutes.
One comment suggested that this section be deleted because it
excessively prescribes ``how to.'' Another comment argued that the
proposal was not detailed enough and should distinguish among
fundamental types of cards (e.g., magstripe, integrated circuit, and
optical) and include separate sections that address their respective
use. Two comments questioned why the proposal called for ``rigorous
controls'' in this section as opposed to other sections. One of the
comments recommended that this section should also apply to cards or
devices that are stolen as well as lost.
The agency believes that the requirement that organizations
institute loss management procedures is neither too detailed nor too
general. Organizations retain full flexibility in establishing the
details of such procedures. The agency does not believe it necessary at
this time to offer specific provisions relating to different types of
cards or tokens. Organizations that use such devices retain full
flexibility to establish appropriate controls for their operations. To
clarify the agency's broad intent to cover all types of devices that
contain or generate identification code or password information, FDA
has revised Sec. 11.300(c) to replace ``etc.'' with ``and other devices
that bear or generate identification code or password information.''
The agency agrees that Sec. 11.300(c) should cover loss management
procedures regardless of how devices become potentially compromised,
and has revised this section by adding, after the word ``lost,'' the
phrase ``stolen, missing, or otherwise potentially compromised.'' FDA
uses the term ``rigorous'' because device disappearance may be the
result of inadequate controls over the issuance and management of the
original cards or devices, thus necessitating more stringent measures
to prevent problem recurrence. For example, personnel training on
device safekeeping may need to be strengthened.
133. Proposed Sec. 11.300(d) states that controls for
identification codes/passwords must include the use of transaction
safeguards to prevent unauthorized use of passwords and/or
identification codes, and, detecting and reporting to the system
security unit and organizational management in an emergent manner any
attempts at their unauthorized use.
Several comments suggested that the term ``emergent'' in proposed
Sec. 11.300(d) be replaced with ``timely'' to describe reports
regarding attempted unauthorized use of identification codes/passwords
because: (1) A timely report would be sufficient, (2) technology to
report emergently is not available, and (3) timely is a more
recognizable and common term.
FDA agrees in part. The agency considers attempts at unauthorized
use of identification codes and passwords to be extremely serious
because such attempts signal potential electronic signature and
electronic record falsification, data corruption, or worse--
consequences that could also ultimately be very costly to
organizations. In FDA's view, the significance of such attempts
requires the immediate and urgent attention of appropriate security
personnel in the same manner that individuals would respond to a fire
alarm. To clarify its intent with a more widely recognized term, the
agency is replacing ``emergent'' with ``immediate and urgent'' in the
final rule. The agency believes that the same technology that accepts
or rejects an identification code and password can be used to relay to
security personnel an appropriate message regarding attempted misuse.
134. One comment suggested that the word ``any'' be deleted from
the phrase ``any attempts'' in proposed Sec. 11.300(d) because it is
excessive. Another comment, noting that the question of attempts to
enter a system or access a file by unauthorized personnel is very
serious, urged the agency to substitute ``all'' for ``any.'' This
comment added that there are devices on the market that can be used by
unauthorized individuals to locate personal identification codes and
passwords.
The agency believes the word ``any'' is sufficiently broad to cover
all attempts at misuse of identification codes and passwords, and
rejects the suggestion to delete the word. If the word ``any'' were
deleted, laxity could result from any inference that persons are less
likely to be caught in an essentially permissive, nonvigilant system.
FDA is aware of the ``sniffing'' devices referred to by one comment and
cautions persons to establish suitable countermeasures against them.
135. One comment suggested that proposed Sec. 11.300(d) be deleted
because it is impractical, especially when simple typing errors are
made. Another suggested that this section pertain to access to
electronic records, not just the system, on the basis that simple
miskeys may be typed when accessing a system.
As discussed in comments 133 and 134 of this document, the agency
believes this provision is necessary and reasonable. The agency's
security concerns extend to system as well as record access. Once
having gained unauthorized system access, an individual could
conceivably alter passwords to mask further intrusion and misdeeds. If
this section were removed, falsifications would be more probable to the
extent that some establishments would not alert security personnel.
However, the agency advises that a simple typing error may not
indicate an unauthorized use attempt, although a pattern of such
errors, especially in short succession, or such an apparent error
executed when the individual who ``owns'' that identification code or
password is deceased, absent, or otherwise known to be unavailable,
could signal a security problem that should not be ignored. FDA notes
that this section offers organizations maximum latitude in deciding
what they perceive to be attempts at unauthorized use.
136. One comment suggested substituting the phrase ``electronic
signature'' for ``passwords and/or identification codes.''
The agency disagrees with this comment because the net effect of
the revision might be to ignore attempted misuse of important elements
of an electronic signature such as a ``password'' attack on a system.
137. Several comments argued that: (1) It is not necessary to
report misuse attempts simultaneously to management when reporting to
the appropriate security unit, (2) security units would respond to
management in accordance with their established procedures and lines of
authority, and (3) management would not always be involved.
The agency agrees that not every misuse attempt would have to be
reported simultaneously to an organization's management if the security
unit that was alerted responded appropriately. FDA notes, however, that
some apparent security breeches could be serious enough to warrant
management's immediate and urgent attention. The agency has revised
proposed Sec. 11.300(d) to give organizations maximum flexibility in
establishing criteria for management notification. Accordingly,
Sec. 11.300(d) now states that controls for identification codes/
passwords must include:
Use of transaction safeguards to prevent unauthorized use of
passwords and/or identification codes, and to detect and report

[[Page 13461]]

in an immediate and urgent manner any attempts at their unauthorized
use to the system security unit, and, as appropriate, to
organizational management.
138. Proposed Sec. 11.300(e) states that controls for
identification codes/passwords must include initial and periodic
testing of devices, such as tokens or cards, bearing identifying
information, for proper function.
Many comments objected to this proposed device testing requirement
as unnecessary because it is part of system validation and because
devices are access fail-safe in that nonworking devices would deny
rather than permit system access. The comments suggested revising this
section to require that failed devices deny user access. One comment
stated that Sec. 11.300(e) is unclear on the meaning of ``identifying
information'' and that the phrase ``tokens or cards'' is redundant
because cards are a form of tokens.
FDA wishes to clarify the reason for this proposed requirement, and
to emphasize that proper device functioning includes, in addition to
system access, the correctness of the identifying information and
security performance attributes. Testing for system access alone could
fail to discern significant unauthorized device alterations. If, for
example, a device has been modified to change the identifying
information, system access may still be allowed, which would enable
someone to assume the identity of another person. In addition, devices
may have been changed to grant individuals additional system privileges
and action authorizations beyond those granted by the organization. Of
lesser significance would be simple wear and tear on such devices,
which result in reduced performance. For instance, a bar code may not
be read with the same consistent accuracy as intended if the code
becomes marred, stained, or otherwise disfigured. Access may be
granted, but only after many more scannings than desired. The agency
expects that device testing would detect such defects.
Because validation of electronic signature systems would not cover
unauthorized device modifications, or subsequent wear and tear,
validation would not obviate the need for periodic testing.
The agency notes that Sec. 11.300(e) does not limit the types of
devices organizations may use. In addition, not all tokens may be
cards, and identifying information is intended to include
identification codes and passwords. Therefore, FDA has revised proposed
Sec. 11.300(e) to clarify the agency's intent and to be consistent with
Sec. 11.300(c). Revised Sec. 11.300(e) requires initial and periodic
testing of devices, such as tokens or cards, that bear or generate
identification code or password information to ensure that they
function properly and have not been altered in an unauthorized manner.




Page Updated: June 01, 2001 tc

Page 3 of 4  Previous

Page 1 | 2 | 3 | 4

Next Page 4