State of Illinois
90th General Assembly
Legislation

   [ Search ]   [ Legislation ]   [ Bill Summary ]
[ Home ]   [ Back ]   [ Bottom ]


[ Introduced ][ Enrolled ][ House Amendment 001 ]
[ Senate Amendment 002 ]

90_HB3180eng

      New Act
      5 ILCS 70/1.15            from Ch. 1, par. 1016
      5 ILCS 140/7              from Ch. 116, par. 207
      15 ILCS 405/14.01 rep.
      720 ILCS 5/17-3           from Ch. 38, par. 17-3
          Creates the Electronic Commerce Security Act.  Authorizes
      the use of digital signatures and other forms  of  electronic
      signatures  in  a  manner designed to provide legal certainty
      necessary  to  effect  transactions  over  public  electronic
      networks.   Provides that electronic records can satisfy  the
      legal requirement that information must be in writing.   Sets
      forth  requirements for use of electronic signatures by State
      agencies.  Grants rule-making authority to the  Secretary  of
      State  regarding use by State agencies.  Establishes criminal
      penalties and civil remedies for violations.  Amends  certain
      Acts  to make changes accommodating the Act.   Effective July
      1, 1999.
                                                     LRB9009236JSmg
HB3180 Engrossed                               LRB9009236JSmg
 1        AN ACT relating to electronic commerce security, amending
 2    named Acts.
 3        Be it enacted by the People of  the  State  of  Illinois,
 4    represented in the General Assembly:
 5                  ARTICLE 1.  SHORT TITLE; PURPOSE
 6        Section 1-101. Short title.  This Act may be cited as the
 7    Electronic Commerce Security Act.
 8        Section 1-105. Purposes and construction.  This Act shall
 9    be   construed   consistently   with   what  is  commercially
10    reasonable under the  circumstances  and  to  effectuate  the
11    following purposes:
12        (1)  To  facilitate electronic communications by means of
13    reliable electronic records.
14        (2)  To facilitate and promote  electronic  commerce,  by
15    eliminating   barriers   resulting  from  uncertainties  over
16    writing  and  signature  requirements,  and   promoting   the
17    development   of   the   legal  and  business  infrastructure
18    necessary to implement secure electronic commerce.
19        (3)  To facilitate electronic filing  of  documents  with
20    State  and  local  government agencies, and promote efficient
21    delivery  of  government  services  by  means   of   reliable
22    electronic records.
23        (4)  To  minimize  the  incidence  of  forged  electronic
24    records, intentional and unintentional alteration of records,
25    and fraud in electronic commerce.
26        (5)  To   help  to  establish  uniformity  of  rules  and
27    standards  regarding  the  authentication  and  integrity  of
28    electronic records.
29        (6)  To promote public confidence in  the  integrity  and
30    reliability of electronic records and electronic commerce.
HB3180 Engrossed            -2-                LRB9009236JSmg
 1        Section 1-110. Variation by agreement. As between parties
 2    involved  in  generating,  sending,  receiving,  storing,  or
 3    otherwise processing electronic records, the applicability of
 4    provisions  of  this  Act  may  be waived by agreement of the
 5    parties,  except  for  the  provisions  of  Sections  10-140,
 6    15-210, 15-215, 15-220, and subsection (b) of Section  10-130
 7    of this Act.
 8       ARTICLE 5.  ELECTRONIC RECORDS AND SIGNATURES GENERALLY
 9        Section 5-105. Definitions.
10        "Asymmetric  cryptosystem"  means a computer-based system
11    capable of generating and using a key pair  consisting  of  a
12    private key for creating a digital signature and a public key
13    to verify the digital signature.
14        "Certificate"  means  a  record  that  at  a minimum: (a)
15    identifies the certification authority issuing it; (b)  names
16    or  otherwise  identifies  its  subscriber  or  a  device  or
17    electronic  agent  under  the  control of the subscriber; (c)
18    contains a public key that corresponds to a private key under
19    the control of the subscriber;  (d) specifies its operational
20    period; and (e) is  digitally  signed  by  the  certification
21    authority issuing it.
22        "Certification  authority"  means a person who authorizes
23    and causes the issuance of a certificate.
24        "Certification  practice  statement"   is   a   statement
25    published  by  a  certification  authority that specifies the
26    policies  or  practices  that  the  certification   authority
27    employs   in  issuing,  managing,  suspending,  and  revoking
28    certificates and providing access to them.
29        "Correspond", with reference to keys, means to belong  to
30    the same key pair.
31        "Digital  signature" means a type of electronic signature
32    created by transforming an electronic record using a  message
HB3180 Engrossed            -3-                LRB9009236JSmg
 1    digest  function  and encrypting the resulting transformation
 2    with an asymmetric cryptosystem using  the  signer's  private
 3    key  such  that  any  person having the initial untransformed
 4    electronic record,  the  encrypted  transformation,  and  the
 5    signer's  corresponding  public  key can accurately determine
 6    whether the transformation was created using the private  key
 7    that  corresponds  to the signer's public key and whether the
 8    initial  electronic  record  has  been  altered   since   the
 9    transformation  was  made.  A digital signature is a security
10    procedure.
11        "Electronic"  includes  electrical,  digital,   magnetic,
12    optical,  electromagnetic,  or  any  other form of technology
13    that entails capabilities similar to these technologies.
14        "Electronic   record"   means   a    record    generated,
15    communicated, received, or stored by electronic means for use
16    in  an  information  system  or  for  transmission  from  one
17    information system to another.
18        "Electronic  signature"  means  a signature in electronic
19    form attached to or logically associated with  an  electronic
20    record.
21        "Information"  includes data, text, images, sound, codes,
22    computer programs, software, databases, and the like.
23        "Key  pair"  means,  in  an  asymmetric  cryptosystem,  2
24    mathematically related keys, referred to as a private key and
25    a public key, having the properties that  (i)  one  key  (the
26    private  key)  can  encrypt a message that only the other key
27    (the public key) can decrypt, and (ii) even knowing  one  key
28    (the   public  key),  it  is  computationally  unfeasible  to
29    discover  the other key (the private key).
30        "Message digest function" means an algorithm that maps or
31    translates the sequence  of  bits  comprising  an  electronic
32    record  into  another,  generally  smaller,  set of bits (the
33    message digest) without  requiring  the  use  of  any  secret
34    information  such  as  a  key, such that an electronic record
HB3180 Engrossed            -4-                LRB9009236JSmg
 1    yields the same message digest every time  the  algorithm  is
 2    executed using such record as input and it is computationally
 3    unfeasible  that  any  2  electronic  records can be found or
 4    deliberately generated that would produce  the  same  message
 5    digest using the algorithm unless the 2 records are precisely
 6    identical.
 7        "Operational  period of a certificate" begins on the date
 8    and  time  the  certificate  is  issued  by  a  certification
 9    authority (or on a later date and time certain if  stated  in
10    the  certificate) and ends on the date and time it expires as
11    noted in the certificate or is earlier revoked, but does  not
12    include any period during which a certificate is suspended.
13        "Person"   means  an  individual,  corporation,  business
14    trust,  estate,  trust,  partnership,  limited   partnership,
15    limited  liability  partnership,  limited  liability company,
16    association,   joint   venture,   government,    governmental
17    subdivision,  agency,  or instrumentality, or any other legal
18    or commercial entity.
19        "Private key" means the key of a key pair used to  create
20    a digital signature.
21        "Public key" means the key of a key pair used to verify a
22    digital signature.
23        "Record"  means information that is inscribed, stored, or
24    otherwise fixed on a tangible medium or that is stored in  an
25    electronic or other medium and is retrievable in  perceivable
26    form.
27        "Repository"  means  a  system for storing and retrieving
28    certificates or other information relevant  to  certificates,
29    including   information   relating   to   the   status  of  a
30    certificate.
31        "Revoke a  certificate"  means  to  permanently  end  the
32    operational  period  of  a  certificate from a specified time
33    forward.
34        "Rule of law" means any statute,  ordinance,  common  law
HB3180 Engrossed            -5-                LRB9009236JSmg
 1    rule,   court   decision,  or  other  rule  of  law  enacted,
 2    established or promulgated by the State of Illinois,  or  any
 3    agency,  commission,  department,  court,  other authority or
 4    political subdivision of the State of Illinois.
 5        "Security procedure" means  a  methodology  or  procedure
 6    used  for  the  purpose  of  (1) verifying that an electronic
 7    record is that of a specific person and (2)  detecting  error
 8    or alteration in the communication, content, or storage of an
 9    electronic  record since a specific point in time. A security
10    procedure  may  require  the  use  of  algorithms  or  codes,
11    identifying words or  numbers,  encryption,  answer  back  or
12    acknowledgment procedures, or similar security devices.
13        "Signature  device"  means  unique  information,  such as
14    codes, algorithms, letters, numbers, private keys,  or  PINs,
15    or  a  uniquely configured physical device, that is required,
16    alone or in conjunction with other information or devices, in
17    order to create an electronic  signature  attributable  to  a
18    specific person.
19        "Signed"  or  "signature" includes any symbol executed or
20    adopted, or any security procedure employed or adopted, using
21    electronic means or otherwise, by or on behalf  of  a  person
22    with intent to authenticate a record.
23        "State  agency"  means and includes all officers, boards,
24    commissions, courts, and agencies  created  by  the  Illinois
25    Constitution,   whether  in  the  executive,  legislative  or
26    judicial   branch,   all   officers,   departments,   boards,
27    commissions,     agencies,     institutions,     authorities,
28    universities, bodies politic and corporate of the State;  and
29    administrative  units  or  corporate  outgrowths of the State
30    government which are created by or pursuant to statute, other
31    than units of local government  and  their  officers,  school
32    districts   and   boards   of   election  commissioners;  all
33    administrative units and corporate outgrowths  of  the  above
34    and as may be created by executive order of the Governor.
HB3180 Engrossed            -6-                LRB9009236JSmg
 1        "Subscriber"  means  a person who is the subject named or
 2    otherwise identified in a certificate, who controls a private
 3    key that  corresponds  to  the  public  key  listed  in  that
 4    certificate,  and  who is the person to whom digitally signed
 5    messages verified by reference to such certificate are to  be
 6    attributed.
 7        "Suspend  a certificate" means to temporarily suspend the
 8    operational period of a  certificate  for  a  specified  time
 9    period or from a specified time forward.
10        "Trustworthy  manner"  means  through the use of computer
11    hardware, software, and procedures that, in  the  context  in
12    which  they  are  used:  (a)  can  be  shown to be reasonably
13    resistant to penetration, compromise, and misuse; (b) provide
14    a reasonable level of reliability and correct operation;  (c)
15    are  reasonably suited to performing their intended functions
16    or  serving  their  intended  purposes;   (d)   comply   with
17    applicable  agreements  between  the parties, if any; and (e)
18    adhere to generally accepted security procedures.
19        "Valid  certificate"   means   a   certificate   that   a
20    certification  authority  has  issued and that the subscriber
21    listed in the certificate has accepted.
22        "Verify a digital signature" means to use the public  key
23    listed  in  a  valid  certificate, along with the appropriate
24    message  digest  function  and  asymmetric  cryptosystem,  to
25    evaluate a digitally signed electronic record, such that  the
26    result  of  the  process concludes that the digital signature
27    was created using the private key corresponding to the public
28    key listed in the certificate and the electronic  record  has
29    not been altered since its digital signature was created.
30        Section 5-110.  Legal recognition.  Information, records,
31    and signatures shall not be denied legal effect, validity, or
32    enforceability  solely  on  the  grounds  that  they  are  in
33    electronic form.
HB3180 Engrossed            -7-                LRB9009236JSmg
 1        Section 5-115.  Electronic records.
 2        (a)  Where  a  rule  of  law  requires  information to be
 3    "written"  or  "in  writing",   or   provides   for   certain
 4    consequences  if  it  is  not, an electronic record satisfies
 5    that rule of law.
 6        (b)  The provisions of this Section shall not apply:
 7             (1)  when   its   application   would   involve    a
 8        construction   of   a   rule   of  law  that  is  clearly
 9        inconsistent with the manifest intent  of  the  lawmaking
10        body or repugnant to the context of the same rule of law,
11        provided  that  the  mere requirement that information be
12        "in writing", "written", or "printed" shall not by itself
13        be sufficient to establish such intent;
14             (2)  to any rule of law governing  the  creation  or
15        execution  of a will or trust, living will, or healthcare
16        power of attorney; and
17             (3)  to any record  that  serves  as  a  unique  and
18        transferable   instrument   of   rights  and  obligations
19        including, without limitation, negotiable instruments and
20        other instruments of  title  wherein  possession  of  the
21        instrument   is   deemed   to  confer  title,  unless  an
22        electronic version of such record is created, stored, and
23        transferred in a manner that allows for the existence  of
24        only  one  unique, identifiable, and unalterable original
25        with the functional attributes of an equivalent  physical
26        instrument, that can be possessed by only one person, and
27        which  cannot  be copied except in a form that is readily
28        identifiable as a copy.
29        Section 5-120.  Electronic signatures.
30        (a)  Where  a  rule  of  law  requires  a  signature,  or
31    provides for  certain  consequences  if  a  document  is  not
32    signed, an electronic signature satisfies that rule of law.
33        (b)  An electronic signature may be proved in any manner,
HB3180 Engrossed            -8-                LRB9009236JSmg
 1    including  by  showing  that  a  procedure existed by which a
 2    party must of necessity have executed a  symbol  or  security
 3    procedure  for  the  purpose  of verifying that an electronic
 4    record is that of such party in order to proceed further with
 5    a transaction.
 6        (c)  The provisions of this Section shall not apply:
 7             (1)  when   its   application   would   involve    a
 8        construction   of   a   rule   of  law  that  is  clearly
 9        inconsistent with the manifest intent  of  the  lawmaking
10        body or repugnant to the context of the same rule of law,
11        provided  that  the  mere requirement of a "signature" or
12        that  a  record  be  "signed"  shall  not  by  itself  be
13        sufficient to establish such intent;
14             (2)  to any rule of law governing  the  creation  or
15        execution  of a will or trust, living will, or healthcare
16        power of attorney; and
17             (3)  to any record  that  serves  as  a  unique  and
18        transferable   instrument   of   rights  and  obligations
19        including, without limitation, negotiable instruments and
20        other instruments of  title  wherein  possession  of  the
21        instrument   is   deemed   to  confer  title,  unless  an
22        electronic version of such record is created, stored, and
23        transferred in a manner that allows for the existence  of
24        only  one  unique, identifiable, and unalterable original
25        with the functional attributes of an equivalent  physical
26        instrument, that can be possessed by only one person, and
27        which  cannot  be copied except in a form that is readily
28        identifiable as a copy.
29        Section 5-125.  Original.
30        (a)  Where a rule  of  law  requires  information  to  be
31    presented  or  retained  in  its  original  form, or provides
32    consequences for  the  information  not  being  presented  or
33    retained  in its original form, that rule of law is satisfied
HB3180 Engrossed            -9-                LRB9009236JSmg
 1    by an electronic record if there exists reliable assurance as
 2    to the integrity of the information from the time when it was
 3    first generated in its final form, as an electronic record or
 4    otherwise.
 5        (b)  The  criteria  for  assessing  integrity  shall   be
 6    whether  the information has remained complete and unaltered,
 7    apart  from  the  addition  of  any  endorsement   or   other
 8    information   that   arises   in   the   normal   course   of
 9    communication,   storage   and   display.   The  standard  of
10    reliability required shall be assessed in the  light  of  the
11    purpose  for  which  the information was generated and in the
12    light of all the relevant circumstances.
13        (c)  The provisions of this Section do not apply  to  any
14    record that serves as a unique and transferable instrument of
15    rights   and   obligations   including,  without  limitation,
16    negotiable instruments and other instruments of title wherein
17    possession of the  instrument  is  deemed  to  confer  title,
18    unless  an  electronic  version  of  such  record is created,
19    stored, and transferred in  a  manner  that  allows  for  the
20    existence  of  only one unique, identifiable, and unalterable
21    original with the  functional  attributes  of  an  equivalent
22    physical  instrument,  that  can  be  possessed  by  only one
23    person, and which cannot be copied except in a form  that  is
24    readily identifiable as a copy.
25        Section 5-130.  Admissibility into evidence.
26        (a)  In  any legal proceeding, nothing in the application
27    of the rules of evidence  shall  apply  so  as  to  deny  the
28    admissibility of an electronic record or electronic signature
29    into evidence:
30             (1)  on  the  sole  ground  that it is an electronic
31        record or electronic signature; or
32             (2)  on the grounds that it is not in  its  original
33        form or is not an original.
HB3180 Engrossed            -10-               LRB9009236JSmg
 1        (b)  Information  in  the  form  of  an electronic record
 2    shall be given due evidentiary weight by the trier  of  fact.
 3    In assessing the evidential weight of an electronic record or
 4    electronic  signature where its authenticity is in issue, the
 5    trier of fact  may  consider  the  manner  in  which  it  was
 6    generated,  stored  or  communicated,  the reliability of the
 7    manner in which its integrity was maintained, the  manner  in
 8    which  its originator was identified or the electronic record
 9    was  signed,  and   any   other   relevant   information   or
10    circumstances.
11        Section 5-135.  Retention of electronic records.
12        (a)  Where a rule of law requires that certain documents,
13    records  or  information be retained, that requirement is met
14    by retaining electronic records  of  such  information  in  a
15    trustworthy  manner,  provided  that the following conditions
16    are satisfied:
17             (1)  the  electronic  record  and  the   information
18        contained  therein  are accessible so as to be usable for
19        subsequent reference at all times when  such  information
20        must be retained;
21             (2)  the  information  is  retained in the format in
22        which it was originally generated, sent, or  received  or
23        in  a  format  that  can  be  demonstrated  to  represent
24        accurately  the information originally generated, sent or
25        received;
26             (3)  such data as enables the identification of  the
27        origin   and   destination   of   the   information,  the
28        authenticity and integrity of the  information,  and  the
29        date  and  time  when it was sent or received, if any, is
30        retained.
31        (b)  An  obligation  to  retain  documents,  records   or
32    information in accordance with subsection (a) does not extend
33    to any data the sole purpose of which is to enable the record
HB3180 Engrossed            -11-               LRB9009236JSmg
 1    to be sent or received.
 2        (c)  Nothing  in  this  Section  shall preclude any State
 3    agency  from  specifying  additional  requirements  for   the
 4    retention  of records that are subject to the jurisdiction of
 5    such agency.
 6        Section 5-140.  Electronic use not required.  Nothing  in
 7    this Act shall be construed to:
 8             (1)  require  any person to create, store, transmit,
 9        accept, or  otherwise  use  or  communicate  information,
10        records,   or   signatures  by  electronic  means  or  in
11        electronic form; or
12             (2)  prohibit any person engaging in  a  transaction
13        from  establishing  reasonable requirements regarding the
14        medium on which it will accept records or the method  and
15        type  of symbol or security procedure it will accept as a
16        signature.
17        Section 5-145.  Applicability of other statutes or rules.
18    Notwithstanding any provisions of  this  Act,  if  any  other
19    statute  or rule requires approval by a State agency prior to
20    the use or retention of electronic  records  or  the  use  of
21    electronic  signatures,  the provisions of that other statute
22    or rule shall also apply.
23        ARTICLE 10.  SECURE ELECTRONIC RECORDS AND SIGNATURES
24        Section 10-105. Secure electronic record.
25        (a)  If,  through  the  use  of  a   qualified   security
26    procedure,  it  can be verified that an electronic record has
27    not been altered since a specified point in time,  then  such
28    electronic   record  shall  be  considered  to  be  a  secure
29    electronic record from such specified point in  time  to  the
30    time  of  verification, if the relying party establishes that
HB3180 Engrossed            -12-               LRB9009236JSmg
 1    the qualified security procedure was:
 2             (1)  commercially     reasonable      under      the
 3        circumstances;
 4             (2)  applied  by  the relying party in a trustworthy
 5        manner; and
 6             (3)  reasonably and in good faith relied upon by the
 7        relying party.
 8        (b)  A qualified security procedure for purposes of  this
 9    Section  is  a  security  procedure  to detect changes in the
10    content of an electronic record that is:
11             (1)  previously agreed to by the parties; or
12             (2)  certified  by  the  Secretary   of   State   in
13        accordance  with  Section  10-135  as  being  capable  of
14        providing reliable evidence that an electronic record has
15        not been altered.
16        Section 10-110.  Secure electronic signature.
17        (a)  If,   through   the  use  of  a  qualified  security
18    procedure, it can be verified that an electronic signature is
19    the signature of a  specific  person,  then  such  electronic
20    signature  shall  be  considered  to  be  a secure electronic
21    signature at the time of verification, if the  relying  party
22    establishes that the qualified security procedure was:
23             (1)  commercially      reasonable      under     the
24        circumstances;
25             (2)  applied by the relying party in  a  trustworthy
26        manner; and
27             (3)  reasonably and in good faith relied upon by the
28        relying party.
29        (b)  A  qualified security procedure for purposes of this
30    Section is a security procedure for identifying a person that
31    is:
32             (1)  previously agreed to by the parties; or
33             (2)  certified  by  the  Secretary   of   State   in
HB3180 Engrossed            -13-               LRB9009236JSmg
 1        accordance  with  Section  10-135  as  being  capable  of
 2        creating,   in   a   trustworthy  manner,  an  electronic
 3        signature that:
 4                  (A)  is unique to the signer within the context
 5             in which it is used;
 6                  (B)  can be used to  objectively  identify  the
 7             person signing the electronic record;
 8                  (C)  was  reliably  created  by such identified
 9             person, (e.g., because some aspect of the  procedure
10             involves  the  use  of  a  signature device or other
11             means or method that is under the  sole  control  of
12             such  person), and that cannot be readily duplicated
13             or compromised; and
14                  (D)  is  created,  and   is   linked   to   the
15             electronic  record  to which it relates, in a manner
16             such  that  if  the  record  or  the  signature   is
17             intentionally   or   unintentionally  changed  after
18             signing the electronic signature is invalidated.
19        Section 10-115. Commercially reasonable; reliance.
20        (a)  The  commercial   reasonableness   of   a   security
21    procedure  is  to  be determined by the court in light of the
22    purposes of the procedure and the commercial circumstances at
23    the time the procedure was used, including the nature of  the
24    transaction, sophistication of the parties, volume of similar
25    transactions  engaged  in  by  either or both of the parties,
26    availability of  alternatives  offered  to  but  rejected  by
27    either  of  the  parties, cost of alternative procedures, and
28    procedures in general use for similar types of transactions.
29        (b)  Whether  reliance  on  a  security   procedure   was
30    reasonable  and in good faith is to be determined in light of
31    all the circumstances known to the relying party at the  time
32    of the reliance, having due regard to the:
33             (1)  information  that  the  relying  party  knew or
HB3180 Engrossed            -14-               LRB9009236JSmg
 1        should have known of at the time of reliance  that  would
 2        suggest that reliance was or was not reasonable;
 3             (2)  the  value  or  importance  of  the  electronic
 4        record, if known;
 5             (3)  any course of dealing between the relying party
 6        and  the  purported  sender  and the available indicia of
 7        reliability or  unreliability  apart  from  the  security
 8        procedure;
 9             (4)  any   usage   of   trade,   particularly  trade
10        conducted by trustworthy systems or other  computer-based
11        means; and
12             (5)  whether the verification was performed with the
13        assistance of an independent third party.
14        Section 10-120. Presumptions.
15        (a)  In  resolving  a  civil  dispute  involving a secure
16    electronic record, it shall be rebuttably presumed  that  the
17    electronic  record  has  not  been altered since the specific
18    point in time to which the secure status relates.
19        (b)  In resolving a  civil  dispute  involving  a  secure
20    electronic  signature,  it  shall be rebuttably presumed that
21    the secure electronic  signature  is  the  signature  of  the
22    person to whom it correlates.
23        (c)  The  effect of presumptions provided in this Section
24    is to place on the  party  challenging  the  integrity  of  a
25    secure  electronic record or challenging the genuineness of a
26    secure electronic signature both the burden of going  forward
27    with  evidence  to  rebut  the  presumption and the burden of
28    persuading the trier of fact that  the  nonexistence  of  the
29    presumed fact is more probable than its existence.
30        (d)  In  the  absence  of a secure electronic record or a
31    secure electronic signature, nothing in this Act shall change
32    existing rules regarding legal or evidentiary rules regarding
33    the burden of proving the authenticity and  integrity  of  an
HB3180 Engrossed            -15-               LRB9009236JSmg
 1    electronic record or an electronic signature.
 2        Section   10-125.  Creation   and  control  of  signature
 3    devices. Except as otherwise provided by  another  applicable
 4    rule  of law, whenever the creation, validity, or reliability
 5    of an electronic signature created by  a  qualified  security
 6    procedure  under  Section  10-105 or 10-110 is dependent upon
 7    the secrecy or control of a signature device of the signer:
 8        (1)  the person  generating  or  creating  the  signature
 9    device must do so in a trustworthy manner;
10        (2)  the  signer  and  all  other persons that rightfully
11    have access to such signature device must exercise reasonable
12    care to retain  control  and  maintain  the  secrecy  of  the
13    signature  device,  and  to  protect it from any unauthorized
14    access, disclosure, or use, during the period  when  reliance
15    on a signature created by such device is reasonable;
16        (3)  in  the  event  that the signer, or any other person
17    that rightfully has access to such signature device, knows or
18    has reason to know that the secrecy or control  of  any  such
19    signature  device has been compromised, such person must make
20    a reasonable effort to promptly notify all persons that  such
21    person knows might foreseeably be damaged as a result of such
22    compromise,  or where an appropriate publication mechanism is
23    available,  to  publish  notice  of  the  compromise  and   a
24    disavowal of any signatures created thereafter.
25        Section 10-130.  Attribution of signature.
26        (a)  Except  as  provided  by  another applicable rule of
27    law, a secure electronic signature  is  attributable  to  the
28    person to whom it correlates, whether or not authorized, if:
29             (1)  the  electronic signature resulted from acts of
30        a person that obtained  the  signature  device  or  other
31        information  necessary  to  create  the  signature from a
32        source under the control of the alleged signer,  creating
HB3180 Engrossed            -16-               LRB9009236JSmg
 1        the appearance that it came from that party;
 2             (2)  the  access or use occurred under circumstances
 3        constituting a failure to exercise reasonable care by the
 4        alleged signer; and
 5             (3)  the relying party relied reasonably and in good
 6        faith to its detriment on  the  apparent  source  of  the
 7        electronic record.
 8        (b)  The  provisions  of  this Section shall not apply to
 9    transactions intended  primarily  for  personal,  family,  or
10    household  use, or otherwise defined as consumer transactions
11    by applicable law including, but not limited to, credit  card
12    and  automated  teller  machine  transactions  except  to the
13    extent allowed by applicable consumer law.
14        Section 10-135. Secretary of State authority  to  certify
15    security procedures.
16        (a)  A   security  procedure  may  be  certified  by  the
17    Secretary of State, as a  qualified  security  procedure  for
18    purposes   of   Sections   10-105  or  10-110,  following  an
19    appropriate investigation or review, if:
20             (1)  the   security   procedure    (including    any
21        technology  and algorithms it employs) is completely open
22        and fully disclosed to the public, and has been so for  a
23        sufficient   length  of  time,  so  as  to  facilitate  a
24        comprehensive review and evaluation  of  its  suitability
25        for  the  intended  purpose by the applicable information
26        security or scientific community; and
27             (2)    the   security   procedure   (including   any
28        technology  and algorithms it employs) has been generally
29        accepted  in  the  applicable  information  security   or
30        scientific  community  as being capable of satisfying the
31        requirements of Section 10-105 or 10-110, as  applicable,
32        in a trustworthy manner.
33        (b)  In  making  a  determination  regarding  whether the
HB3180 Engrossed            -17-               LRB9009236JSmg
 1    security procedure (including any technology  and  algorithms
 2    it  employs)  has  been  generally accepted in the applicable
 3    information security or scientific community,  the  Secretary
 4    of State shall consider the opinion of independent experts in
 5    the  applicable  field  and  the  published  findings of such
 6    community, including applicable standards organizations  such
 7    as   the   American   National  Standards  Institute  (ANSI),
 8    International  Standards  Organization  (ISO),  International
 9    Telecommunications Union (ITU), and the National Institute of
10    Standards and Technology (NIST).
11        (c)  Such  certification  shall  be  done   through   the
12    adoption  of  rules  in accordance with the provisions of the
13    Illinois Administrative Procedure Act  and  shall  specify  a
14    full  and  complete identification of the security procedure,
15    including requirements as to how it is to be implemented,  if
16    appropriate.
17        (d)  The Secretary of State may also decertify a security
18    procedure  as  a qualified security procedure for purposes of
19    Sections  10-105   or   10-110   following   an   appropriate
20    investigation   or  review  and  the  adoption  of  rules  in
21    accordance with the provisions of the Illinois Administrative
22    Procedure Act if subsequent developments establish  that  the
23    security  procedure  is no longer sufficiently trustworthy or
24    reliable for its intended purpose, or for any other reason no
25    longer meets the requirements for certification.
26        (e)  The  Secretary  of  State   shall   have   exclusive
27    authority to certify security procedures under this Section.
28        Section 10-140.  Unauthorized use of signature device.
29        (a)  No  person  shall knowingly or intentionally access,
30    copy, or otherwise  obtain  possession  of  or  recreate  the
31    signature  device of another person without authorization for
32    the purpose of  creating,  or  allowing  or  causing  another
33    person  to create, an unauthorized electronic signature using
HB3180 Engrossed            -18-               LRB9009236JSmg
 1    such signature device. A person convicted of a  violation  of
 2    this subsection shall be guilty of a Class A misdemeanor.
 3        (b)  No  person  shall  knowingly alter, disclose, or use
 4    the signature device of another person without authorization,
 5    or in excess of lawful  authorization,  for  the  purpose  of
 6    creating, or allowing or causing another person to create, an
 7    unauthorized   electronic   signature  using  such  signature
 8    device. A person convicted of a violation of this  subsection
 9    shall  be guilty of a Class 4 felony. A person convicted of a
10    violation  of  this  subsection  who  has   previously   been
11    convicted of a violation of this subsection or Section 15-210
12    shall  be  guilty  of a Class 3 felony. A person who violates
13    this Section in furtherance of  any  scheme  or  artifice  to
14    defraud  in  excess  of  $50,000 shall be guilty of a Class 2
15    felony.
16             ARTICLE 15.  EFFECT OF A DIGITAL SIGNATURE
17        Section 15-101.  Secure  electronic  record.   A  digital
18    signature  that  is  created  using  an  asymmetric algorithm
19    certified by  the  Secretary  of  State  under  item  (2)  of
20    subsection  (b) of Section 10-105 shall be considered to be a
21    qualified  security  procedure  for  purposes  of   detecting
22    changes  in the content of an electronic record under Section
23    10-105 if  the  digital  signature  was  created  during  the
24    operational  period  of a valid certificate,  and is verified
25    by reference to the public key listed in such certificate.
26        Section 15-105.  Secure electronic signature.  A  digital
27    signature  that  is  created  using  an  asymmetric algorithm
28    certified by  the  Secretary  of  State  under  item  (2)  of
29    subsection  (b) of Section 10-110 shall be considered to be a
30    qualified security procedure for purposes  of  identifying  a
31    person under Section 10-110 if:
HB3180 Engrossed            -19-               LRB9009236JSmg
 1             (1)  the  digital  signature  was created during the
 2        operational period  of  a  valid  certificate,  was  used
 3        within  the  scope of any other restrictions specified or
 4        incorporated by reference in the certificate, if any, and
 5        can be verified by reference to the public key listed  in
 6        the certificate; and
 7             (2)  the   certificate   is  considered  trustworthy
 8        (i.e., an accurate binding of a public key to a  person's
 9        identity)   because  the  certificate  was  issued  by  a
10        certification authority  in  accordance  with  standards,
11        procedures,  and  other  requirements  specified  by  the
12        Secretary  of  State,  or the trier of fact independently
13        finds that the certificate was issued  in  a  trustworthy
14        manner   by   a  certification  authority  that  properly
15        authenticated the subscriber and the subscriber's  public
16        key, or otherwise finds that the material information set
17        forth in the certificate is true.
18        Section  15-115.  Secretary  of  State authority to adopt
19    rules.
20        (a)  The Secretary of State may adopt rules applicable to
21    both the public  and  private  sectors  for  the  purpose  of
22    defining   when  a  certificate  is  considered  sufficiently
23    trustworthy  under  Section  15-105  such  that   a   digital
24    signature verified by reference to such a certificate will be
25    considered  a  qualified  security  procedure  under  Section
26    10-110.  The  rules  may include (1) establishing or adopting
27    standards  applicable   to   certification   authorities   or
28    certificates,  compliance  with  which  may  be  measured  by
29    becoming  certified  by  the  Secretary  of  State,  becoming
30    accredited  by  one  or more independent accrediting entities
31    recognized by the Secretary of State, or by other appropriate
32    means and (2) where  appropriate,  establishing  fees  to  be
33    charged by the Secretary of State to recover all or a portion
HB3180 Engrossed            -20-               LRB9009236JSmg
 1    of its costs in connection therewith.
 2        (b)  In  developing  the  rules,  the  Secretary of State
 3    shall endeavor to  do  so  in  a  manner  that  will  provide
 4    maximum   flexibility   to   the  implementation  of  digital
 5    signature technology and the  business  models  necessary  to
 6    support   it,  that  will  provide  a  clear  basis  for  the
 7    recognition of certificates issued by  foreign  certification
 8    authorities,  and,  to  the  extent reasonably possible, that
 9    will maximize the opportunities for uniformity with the  laws
10    of  other  jurisdictions  (both  within the United States and
11    internationally).
12        (c)  The  Secretary  of  State   shall   have   exclusive
13    authority to adopt rules authorized by this Section.
14        Section  15-201.  Reliance  on  certificates foreseeable.
15    It is foreseeable that persons relying on a digital signature
16    will also rely on a valid certificate containing  the  public
17    key  by  which  the digital signature can be verified, during
18    the operational period of such  certificate  and  within  any
19    limits specified in such certificate.
20        Section    15-205.  Restrictions    on   publication   of
21    certificate.    No  person  may  publish  a  certificate,  or
22    otherwise knowingly make it available  to  anyone  likely  to
23    rely  on  the  certificate  or on a digital signature that is
24    verifiable with reference to the public  key  listed  in  the
25    certificate, if such person knows that:
26             (1)  the   certification  authority  listed  in  the
27        certificate has not issued it;
28             (2)  the subscriber listed in  the  certificate  has
29        not accepted it; or
30             (3)  the  certificate has been revoked or suspended,
31        unless such publication is for the purpose of verifying a
32        digital signature created prior  to  such  revocation  or
HB3180 Engrossed            -21-               LRB9009236JSmg
 1        suspension, or giving notice of revocation or suspension.
 2        Section   15-210.  Fraudulent   use.    No  person  shall
 3    knowingly  create,  publish,  alter,  or  otherwise   use   a
 4    certificate  for any fraudulent or other unlawful purpose.  A
 5    person convicted of a violation  of  this  Section  shall  be
 6    guilty of a Class 4 felony. A person convicted of a violation
 7    of  this  Section  who  previously  has  been  convicted of a
 8    violation of this Section or Section 10-140 shall  be  guilty
 9    of  a  Class  3 felony. A person who violates this Section in
10    furtherance of any scheme or artifice to defraud in excess of
11    $50,000 shall be guilty of a Class 2 felony.
12        Section  15-215.  False  or  unauthorized  request.    No
13    person  shall  knowingly  misrepresent his or her identity or
14    authorization in requesting or accepting a certificate or  in
15    requesting  suspension  or  revocation  of  a certificate.  A
16    person convicted of a violation  of  this  Section  shall  be
17    guilty  of a Class A misdemeanor.  A person who violates this
18    Section 10 times within one year, or in  furtherance  of  any
19    scheme  or  artifice to defraud, shall be guilty of a Class 4
20    felony. A person who violates this Section in furtherance  of
21    any  scheme or artifice to defraud in excess of $50,000 shall
22    be guilty of a Class 2 felony.
23        Section 15-220.  Unauthorized use of signature device. No
24    person shall knowingly access, alter, disclose,  or  use  the
25    signature  device  of a certification authority used to issue
26    certificates without authorization, or in  excess  of  lawful
27    authorization,  for  the  purpose of creating, or allowing or
28    causing another person to create, an unauthorized  electronic
29    signature  using such signature device. A person convicted of
30    a violation of this Section shall be  guilty  of  a  Class  3
31    felony.  A person who violates this Section in furtherance of
HB3180 Engrossed            -22-               LRB9009236JSmg
 1    any scheme or artifice to defraud shall be guilty of a  Class
 2    2 felony.
 3        Section   15-301.  Trustworthy   services.    Except   as
 4    conspicuously   set   forth  in  its  certification  practice
 5    statement, a certification authority and a person maintaining
 6    a repository must maintain its  operations  and  perform  its
 7    services in a trustworthy manner.
 8        Section 15-305.  Disclosure.
 9        (a)  For  each  certificate  issued  by  a  certification
10    authority  with  the intention that it will be relied upon by
11    third  parties  to  verify  digital  signatures  created   by
12    subscribers,   a  certification  authority  must  publish  or
13    otherwise make available  to  the  subscriber  and  all  such
14    relying parties:
15             (1)  its  certification  practice statement, if any,
16        applicable thereto; and
17             (2)  its    certificate    that    identifies    the
18        certification authority as a subscriber and that contains
19        the public key corresponding to the private key  used  by
20        the   certification   authority  to  digitally  sign  the
21        certificate (its "certification authority certificate").
22        (b)  In the event of an occurrence  that  materially  and
23    adversely  affects  a certification authority's operations or
24    system, its certification authority certificate, or any other
25    aspect of its ability to operate in a trustworthy manner, the
26    certification  authority  must   act   in   accordance   with
27    procedures  governing  such  an  occurrence  specified in its
28    certification practice statement, or in the absence  of  such
29    procedures, must use reasonable efforts to notify any persons
30    that  the  certification authority knows might foreseeably be
31    damaged as a result of such occurrence.
HB3180 Engrossed            -23-               LRB9009236JSmg
 1        Section   15-310.  Issuance   of   a    certificate.    A
 2    certification   authority   may  issue  a  certificate  to  a
 3    prospective subscriber for  the  purpose  of  allowing  third
 4    parties   to   verify   digital  signatures  created  by  the
 5    subscriber only after:
 6        (1)  the certification authority has received  a  request
 7    for issuance from the prospective subscriber; and
 8        (2)  the certification authority has:
 9             (A)  complied with all of the relevant practices and
10        procedures  set  forth  in  its  applicable certification
11        practice statement, if any; or
12             (B)  in the  absence  of  a  certification  practice
13        statement   addressing   these  issues,  confirmed  in  a
14        trustworthy manner that:
15                  (i)  the prospective subscriber is  the  person
16             to be listed in the certificate to be issued;
17                  (ii)  the  information in the certificate to be
18             issued is accurate;
19                  (iii)  the  prospective  subscriber  rightfully
20             holds a private key capable of  creating  a  digital
21             signature,  and  the  public key to be listed in the
22             certificate  can  be  used  to  verify   a   digital
23             signature affixed by such private key.
24        Section   15-315.  Representations   upon   issuance   of
25    certificate.
26        (a)  By  issuing a certificate with the intention that it
27    will be relied  upon  by  third  parties  to  verify  digital
28    signatures   created   by  the  subscriber,  a  certification
29    authority represents to the subscriber, and to any person who
30    reasonably   relies   on   information   contained   in   the
31    certificate, in good faith and during its operational period,
32    that:
33             (1)  the  certification  authority  has   processed,
HB3180 Engrossed            -24-               LRB9009236JSmg
 1        approved,  and  issued,  and  will  manage  and revoke if
 2        necessary,  the  certificate  in  accordance   with   its
 3        applicable  certification  practice  statement  stated or
 4        incorporated by reference in the certificate or of  which
 5        such person has notice, or in lieu thereof, in accordance
 6        with  this  Act  or the law of the jurisdiction governing
 7        issuance of the certificate;
 8             (2)  the certification authority  has  verified  the
 9        identity  of  the  subscriber to the extent stated in the
10        certificate  or  its  applicable  certification  practice
11        statement, or in lieu  thereof,  that  the  certification
12        authority  has verified the identity of the subscriber in
13        a trustworthy manner;
14             (3)  the certification authority has  verified  that
15        the  person  requesting the certificate holds the private
16        key  corresponding  to  the  public  key  listed  in  the
17        certificate; and
18             (4)  except  as  conspicuously  set  forth  in   the
19        certificate  or  its  applicable  certification  practice
20        statement,  to the certification authority's knowledge as
21        of  the  date  the  certificate  was  issued,  all  other
22        information in  the  certificate  is  accurate,  and  not
23        materially misleading.
24        (b)  If  a certification authority issued the certificate
25    subject  to   the   laws   of   another   jurisdiction,   the
26    certification   authority   also  makes  all  warranties  and
27    representations, if any, otherwise applicable under  the  law
28    governing its issuance.
29        Section 15-320.  Revocation of a certificate.
30        (a)  During  the operational period of a certificate, the
31    certification authority  that  issued  the  certificate  must
32    revoke  the  certificate  in accordance with the policies and
33    procedures governing revocation specified in  its  applicable
HB3180 Engrossed            -25-               LRB9009236JSmg
 1    certification  practice  statement, or in the absence of such
 2    policies and procedures, as soon as possible after:
 3             (1)  receiving  a  request  for  revocation  by  the
 4        subscriber named in the certificate, and confirming  that
 5        the person requesting revocation is the subscriber, or is
 6        an  agent of the subscriber with authority to request the
 7        revocation;
 8             (2)  receiving a certified  copy  of  an  individual
 9        subscriber's  death  certificate,  or  upon confirming by
10        other reliable evidence that the subscriber is dead;
11             (3)  being  presented  with  documents  effecting  a
12        dissolution of a corporate subscriber, or confirmation by
13        other evidence that the subscriber has been dissolved  or
14        has ceased to exist;
15             (4)  being served with an order requiring revocation
16        that was issued by a court of competent jurisdiction; or
17             (5)  confirmation  by  the  certification  authority
18        that:
19                  (A)  a   material   fact   represented  in  the
20             certificate is false;
21                  (B)  a material prerequisite to issuance of the
22             certificate was not satisfied;
23                  (C)  the certification authority's private  key
24             or  system  operations  were compromised in a manner
25             materially affecting the certificate's  reliability;
26             or
27                  (D)  the    subscriber's    private   key   was
28             compromised.
29        (b)  Upon effecting such a revocation, the  certification
30    authority  must  notify the subscriber and relying parties in
31    accordance with the policies and procedures governing  notice
32    of  revocation  specified  in  its  applicable  certification
33    practice  statement,  or  in the absence of such policies and
34    procedures, promptly notify the subscriber, promptly  publish
HB3180 Engrossed            -26-               LRB9009236JSmg
 1    notice  of  the  revocation  in  all  repositories  where the
 2    certification authority previously caused publication of  the
 3    certificate, and otherwise disclose the fact of revocation on
 4    inquiry by a relying party.
 5                 ARTICLE 20.  DUTIES OF SUBSCRIBERS
 6        Section  20-101.  Obtaining a certificate.   All material
 7    representations knowingly made by a person to a certification
 8    authority for purposes of obtaining a certificate naming such
 9    person as a subscriber must be accurate and complete  to  the
10    best of such person's knowledge and belief.
11        Section 20-105.  Acceptance of a certificate.
12        (a)  A  person  accepts  a  certificate  that  names such
13    person as a subscriber by publishing or approving publication
14    of it to  one  or  more  persons,  or  in  a  repository,  or
15    otherwise  demonstrating  approval  of  it,  while knowing or
16    having notice of its contents.
17        (b)  By accepting a certificate, the subscriber listed in
18    the certificate  represents  to  any  person  who  reasonably
19    relies  on  information contained in the certificate, in good
20    faith and during its operational period, that:
21             (1)  the subscriber rightfully holds the private key
22        corresponding  to  the   public   key   listed   in   the
23        certificate;
24             (2)  all  representations  made by the subscriber to
25        the  certification  authority   and   material   to   the
26        information listed in the certificate are true; and
27             (3)  all  information  in  the  certificate  that is
28        within the knowledge of the subscriber is true.
29        Section 20-110.  Revocation of  certificate.   Except  as
30    otherwise  provided by another applicable rule of law, if the
HB3180 Engrossed            -27-               LRB9009236JSmg
 1    private key corresponding to the public key listed in a valid
 2    certificate is lost, stolen, accessible  to  an  unauthorized
 3    person,  or  otherwise  compromised  during  the  operational
 4    period  of  the  certificate, a subscriber who has learned of
 5    the   compromise   must   promptly   request   the    issuing
 6    certification authority to revoke the certificate and publish
 7    notice  of  revocation  in  all  repositories  in  which  the
 8    subscriber   previously  authorized  the  certificate  to  be
 9    published, or otherwise  provide  reasonable  notice  of  the
10    revocation.
11                  ARTICLE 25.  STATE AGENCY USE OF
12                  ELECTRONIC RECORDS AND SIGNATURES
13        Section  25-101.  State agency use of electronic records.
14        (a)  Each State agency shall determine if, and the extent
15    to which, it will send and  receive  electronic  records  and
16    electronic signatures to and from other persons and otherwise
17    create,  use,  store,  and  rely  upon electronic records and
18    electronic signatures.
19        (b)  In any case where a State agency decides to send  or
20    receive  electronic records, or to accept document filings by
21    electronic records, the  State  agency  may,  by  appropriate
22    agency  rule  (or  court  rule where appropriate), giving due
23    consideration to security, specify:
24             (1)  the manner and format in which such  electronic
25        records must be created, sent, received, and stored;
26             (2)  if  such electronic records must be signed, the
27        type of electronic signature  required,  the  manner  and
28        format  in  which  such  signature must be affixed to the
29        electronic record, and the identity of, or criteria  that
30        must be met by, any third party used by the person filing
31        the document to facilitate the process;
32             (3)  control processes and procedures as appropriate
HB3180 Engrossed            -28-               LRB9009236JSmg
 1        to  ensure adequate integrity, security, confidentiality,
 2        and auditability of such electronic records; and
 3             (4)  any  other   required   attributes   for   such
 4        electronic  records  that  are  currently  specified  for
 5        corresponding  paper  documents,  or reasonably necessary
 6        under the circumstances.
 7        (c)  All rules adopted by a State  agency  shall  include
 8    the relevant minimum security requirements established by the
 9    Secretary of State, if any.
10        (d)  Whenever  any rule of law requires or authorizes the
11    filing of any information, notice, lien, or other document or
12    record with any State agency, a filing made by an  electronic
13    record  shall have the same force and effect as a filing made
14    on paper in all cases where the State agency  has  authorized
15    or agreed to such electronic filing and the filing is made in
16    accordance with applicable rules or agreement.
17        (e)  Nothing  in  this  Act shall be construed to require
18    any State agency to use or to permit the  use  of  electronic
19    records or electronic signatures.
20        Section   25-105.  Secretary  of  State  to  adopt  State
21    standards.
22        (a)  The Secretary of State may adopt rules setting forth
23    minimum security  requirements  for  the  use  of  electronic
24    records and electronic signatures by State agencies.
25        (b)  The  Secretary  of  State  shall specify appropriate
26    minimum security requirements to be implemented and  followed
27    by State agencies for (1) the generation, use, and storage of
28    key pairs, (2) the issuance, acceptance, use, suspension, and
29    revocation  of  certificates,  and  (3)  the  use  of digital
30    signatures.
31        (c)  Each State agency shall have the authority to issue,
32    or contract for the issuance  of,  certificates  to  (i)  its
33    employees  and agents and (ii) persons conducting business or
HB3180 Engrossed            -29-               LRB9009236JSmg
 1    other transactions with such State agency and to  take  other
 2    actions  consistent therewith, including the establishment of
 3    repositories and the suspension or revocation of certificates
 4    so issued,  provided  that  the  foregoing  is  conducted  in
 5    accordance  with  all  the  rules,  procedures,  and policies
 6    specified by the Secretary of State. The Secretary  of  State
 7    shall  have  the  authority to specify the rules, procedures,
 8    and policies whereby State agencies may issue or contract for
 9    the issuance of certificates.
10        (d)  The  Secretary  of  State  may  specify  appropriate
11    minimum standards and requirements that must be satisfied  by
12    a certification authority before:
13             (1)  its  services  are used by any State agency for
14        the issuance, publication, revocation, and suspension  of
15        certificates  to  such agency, or its employees or agents
16        (for official use); or
17             (2)  the certificates it issues will be accepted for
18        purposes of verifying digitally signed electronic records
19        sent to any State agency by any person.
20        (e)  Where  appropriate,  the  rules   adopted   by   the
21    Secretary  of  State  pursuant  to this Section shall specify
22    differing levels of minimum standards from which implementing
23    State agencies can select the standard most appropriate for a
24    particular application.
25        (f)  Except as provided in Section 25-101, the  Secretary
26    of  State  shall  have  exclusive  authority  to  adopt rules
27    authorized by this Section.
28        Section   25-115.  Interoperability.    To   the   extent
29    reasonable under  the circumstances,  rules  adopted  by  the
30    Secretary  of  State or a State agency relating to the use of
31    electronic records or electronic signatures shall be  drafted
32    in a manner designed to encourage and promote consistency and
33    interoperability   with   similar   requirements  adopted  by
HB3180 Engrossed            -30-               LRB9009236JSmg
 1    government  agencies  of  other  states   and   the   federal
 2    government.
 3        ARTICLE 30.  ENFORCEMENT; CIVIL REMEDY; SEVERABILITY
 4        Section  30-1.  Enforcement.   The Secretary of State may
 5    investigate  complaints  or  other   information   indicating
 6    violations  of  rules adopted by the Secretary of State under
 7    this Act  or  otherwise  indicating  fraudulent  or  unlawful
 8    conduct under this Act.  The Secretary of State shall certify
 9    to  the  Attorney  General,  for  such action as the Attorney
10    General may deem  appropriate,  all  information  he  or  she
11    obtains  that  discloses a violation of any provision of this
12    Act or the rules adopted by the Secretary of State under this
13    Act.
14        Section 30-5.  Civil remedy.   Whoever  suffers  loss  by
15    reason  of  a violation of Section 10-140, 15-210, 15-215, or
16    15-220 of this Act or Section 17-3 of the  Criminal  Code  of
17    1961  may,  in  a  civil  action against the violator, obtain
18    appropriate relief.  In a civil action  under  this  Section,
19    the  court  may  award  to  the  prevailing  party reasonable
20    attorneys fees and other litigation expenses.
21        Section 30-110.  Severability.  The  provisions  of  this
22    Act  are  severable  under  Section  1.31  of  the Statute on
23    Statutes.
24                 ARTICLE 95.  AMENDATORY PROVISIONS
25        Section 95-1.  The Statute  on  Statutes  is  amended  by
26    changing Section 1.15 as follows:
27        (5 ILCS 70/1.15) (from Ch. 1, par. 1016)
HB3180 Engrossed            -31-               LRB9009236JSmg
 1        Sec.   1.15.  "Written"  and  "in  writing"  may  include
 2    printing, electronic, and  any  other  mode  of  representing
 3    words  and  letters;  but  when  the written signature of any
 4    person is required by law to any official or  public  writing
 5    or  bond,  required  by  law,  it  shall  be  in  the  proper
 6    handwriting of such person or, in case he is unable to write,
 7    his proper mark, except as otherwise provided by law.
 8    (Source: P.A. 88-672, eff. 12-14-94.)
 9        Section  95-5.  The Freedom of Information Act is amended
10    by changing Section 7 as follows:
11        (5 ILCS 140/7) (from Ch. 116, par. 207)
12        Sec. 7.  Exemptions.
13        (1)  The following shall be exempt  from  inspection  and
14    copying:
15             (a)  Information    specifically   prohibited   from
16        disclosure  by  federal  or  State  law  or   rules   and
17        regulations adopted under federal or State law.
18             (b)  Information    that,    if   disclosed,   would
19        constitute a clearly  unwarranted  invasion  of  personal
20        privacy, unless the disclosure is consented to in writing
21        by  the  individual  subjects  of  the  information.  The
22        disclosure of information that bears on the public duties
23        of public employees and officials shall not be considered
24        an invasion of personal  privacy.   Information  exempted
25        under  this  subsection  (b)  shall  include  but  is not
26        limited to:
27                  (i)  files and personal information  maintained
28             with   respect   to  clients,  patients,  residents,
29             students  or  other  individuals  receiving  social,
30             medical,   educational,    vocational,    financial,
31             supervisory  or  custodial care or services directly
32             or  indirectly  from  federal  agencies  or   public
HB3180 Engrossed            -32-               LRB9009236JSmg
 1             bodies;
 2                  (ii)  personnel  files and personal information
 3             maintained with respect to employees, appointees  or
 4             elected  officials  of any public body or applicants
 5             for those positions;
 6                  (iii)  files    and    personal     information
 7             maintained with respect to any applicant, registrant
 8             or  licensee  by any public body cooperating with or
 9             engaged    in    professional    or     occupational
10             registration, licensure or discipline;
11                  (iv)  information  required  of any taxpayer in
12             connection with the assessment or collection of  any
13             tax unless disclosure is otherwise required by State
14             statute; and
15                  (v)  information   revealing  the  identity  of
16             persons  who  file  complaints   with   or   provide
17             information  to  administrative,  investigative, law
18             enforcement or penal  agencies;  provided,  however,
19             that   identification   of   witnesses   to  traffic
20             accidents,  traffic  accident  reports,  and  rescue
21             reports  may  be  provided  by  agencies  of   local
22             government,  except  in  a case for which a criminal
23             investigation is  ongoing,  without  constituting  a
24             clearly  unwarranted   per  se  invasion of personal
25             privacy under this subsection.
26             (c)  Records  compiled  by  any  public   body   for
27        administrative   enforcement   proceedings  and  any  law
28        enforcement or correctional agency  for  law  enforcement
29        purposes  or  for  internal matters of a public body, but
30        only to the extent that disclosure would:
31                  (i)  interfere with  pending  or  actually  and
32             reasonably  contemplated law enforcement proceedings
33             conducted by any  law  enforcement  or  correctional
34             agency;
HB3180 Engrossed            -33-               LRB9009236JSmg
 1                  (ii)  interfere   with  pending  administrative
 2             enforcement  proceedings  conducted  by  any  public
 3             body;
 4                  (iii)  deprive a person of a fair trial  or  an
 5             impartial hearing;
 6                  (iv)  unavoidably  disclose  the  identity of a
 7             confidential  source  or  confidential   information
 8             furnished only by the confidential source;
 9                  (v)  disclose     unique     or     specialized
10             investigative  techniques other than those generally
11             used and known or  disclose  internal  documents  of
12             correctional    agencies   related   to   detection,
13             observation or investigation of incidents  of  crime
14             or misconduct;
15                  (vi)  constitute   an   invasion   of  personal
16             privacy under subsection (b) of this Section;
17                  (vii)  endanger the life or physical safety  of
18             law enforcement personnel or any other person; or
19                  (viii)  obstruct     an     ongoing    criminal
20             investigation.
21             (d)  Criminal history record information  maintained
22        by  State  or local criminal justice agencies, except the
23        following which shall be open for public  inspection  and
24        copying:
25                  (i)  chronologically      maintained     arrest
26             information, such  as  traditional  arrest  logs  or
27             blotters;
28                  (ii)  the  name of a person in the custody of a
29             law enforcement agency and  the  charges  for  which
30             that person is being held;
31                  (iii)  court records that are public;
32                  (iv)  records   that  are  otherwise  available
33             under State or local law; or
34                  (v)  records in which the requesting  party  is
HB3180 Engrossed            -34-               LRB9009236JSmg
 1             the  individual identified, except as provided under
 2             part (vii) of paragraph (c)  of  subsection  (1)  of
 3             this Section.
 4             "Criminal  history  record  information"  means data
 5        identifiable  to  an   individual   and   consisting   of
 6        descriptions   or   notations   of  arrests,  detentions,
 7        indictments, informations, pre-trial proceedings, trials,
 8        or other formal events in the criminal justice system  or
 9        descriptions  or notations of criminal charges (including
10        criminal violations of local  municipal  ordinances)  and
11        the   nature   of   any  disposition  arising  therefrom,
12        including sentencing, court or correctional  supervision,
13        rehabilitation  and  release.  The term does not apply to
14        statistical records and reports in which individuals  are
15        not  identified  and  from which their identities are not
16        ascertainable, or to information  that  is  for  criminal
17        investigative or intelligence purposes.
18             (e)  Records  that  relate to or affect the security
19        of correctional institutions and detention facilities.
20             (f)  Preliminary  drafts,  notes,   recommendations,
21        memoranda   and  other  records  in  which  opinions  are
22        expressed, or policies or actions are formulated,  except
23        that  a  specific  record or relevant portion of a record
24        shall not be exempt when the record is publicly cited and
25        identified by the head of the public body. The  exemption
26        provided  in  this  paragraph  (f)  extends  to all those
27        records of officers and agencies of the General  Assembly
28        that pertain to the preparation of legislative documents.
29             (g)  Trade   secrets  and  commercial  or  financial
30        information obtained from a person or business where  the
31        trade  secrets or information are proprietary, privileged
32        or confidential, or where disclosure of the trade secrets
33        or information may cause competitive harm, including  all
34        information  determined  to be confidential under Section
HB3180 Engrossed            -35-               LRB9009236JSmg
 1        4002 of the Technology Advancement and  Development  Act.
 2        Nothing   contained   in  this  paragraph  (g)  shall  be
 3        construed to prevent a person or business from consenting
 4        to disclosure.
 5             (h)  Proposals and bids for any contract, grant,  or
 6        agreement,   including   information  which  if  it  were
 7        disclosed  would  frustrate  procurement   or   give   an
 8        advantage  to  any  person  proposing  to  enter  into  a
 9        contractor  agreement  with  the  body, until an award or
10        final selection is made.  Information prepared by or  for
11        the  body  in  preparation of a bid solicitation shall be
12        exempt until an award or final selection is made.
13             (i)  Valuable  formulae,   designs,   drawings   and
14        research  data  obtained  or  produced by any public body
15        when disclosure could reasonably be expected  to  produce
16        private gain or public loss.
17             (j)  Test   questions,   scoring   keys   and  other
18        examination  data  used   to   administer   an   academic
19        examination   or  determined  the  qualifications  of  an
20        applicant for a license or employment.
21             (k)  Architects'  plans  and  engineers'   technical
22        submissions  for projects not constructed or developed in
23        whole or in part  with  public  funds  and  for  projects
24        constructed or developed with public funds, to the extent
25        that disclosure would compromise security.
26             (l)  Library    circulation    and   order   records
27        identifying library users with specific materials.
28             (m)  Minutes of meetings of public bodies closed  to
29        the public as provided in the Open Meetings Act until the
30        public  body  makes  the  minutes available to the public
31        under Section 2.06 of the Open Meetings Act.
32             (n)  Communications between a  public  body  and  an
33        attorney  or  auditor  representing  the public body that
34        would not be subject  to  discovery  in  litigation,  and
HB3180 Engrossed            -36-               LRB9009236JSmg
 1        materials prepared or compiled by or for a public body in
 2        anticipation  of  a  criminal,  civil  or  administrative
 3        proceeding  upon  the request of an attorney advising the
 4        public body, and  materials  prepared  or  compiled  with
 5        respect to internal audits of public bodies.
 6             (o)  Information  received by a primary or secondary
 7        school, college or university under  its  procedures  for
 8        the  evaluation  of  faculty  members  by  their academic
 9        peers.
10             (p)  Administrative   or    technical    information
11        associated  with  automated  data  processing operations,
12        including  but  not  limited   to   software,   operating
13        protocols,  computer  program  abstracts,  file  layouts,
14        source  listings,  object  modules,  load  modules,  user
15        guides,  documentation  pertaining  to  all  logical  and
16        physical   design   of   computerized  systems,  employee
17        manuals, and any other information  that,  if  disclosed,
18        would  jeopardize  the security of the system or its data
19        or the security of materials exempt under this Section.
20             (q)  Documents or materials relating  to  collective
21        negotiating  matters  between  public  bodies  and  their
22        employees  or  representatives,  except  that  any  final
23        contract  or agreement shall be subject to inspection and
24        copying.
25             (r)  Drafts, notes,  recommendations  and  memoranda
26        pertaining to the financing and marketing transactions of
27        the  public body. The records of ownership, registration,
28        transfer, and exchange of municipal debt obligations, and
29        of  persons  to  whom  payment  with  respect  to   these
30        obligations is made.
31             (s)  The records, documents and information relating
32        to   real   estate   purchase  negotiations  until  those
33        negotiations have been completed or otherwise terminated.
34        With regard to a parcel involved in a pending or actually
HB3180 Engrossed            -37-               LRB9009236JSmg
 1        and reasonably  contemplated  eminent  domain  proceeding
 2        under  Article  VII  of  the  Code  of  Civil  Procedure,
 3        records,  documents  and  information  relating  to  that
 4        parcel  shall  be  exempt  except as may be allowed under
 5        discovery rules adopted by the  Illinois  Supreme  Court.
 6        The records, documents and information relating to a real
 7        estate sale shall be exempt until a sale is consummated.
 8             (t)  Any and all proprietary information and records
 9        related  to  the  operation  of an intergovernmental risk
10        management association or self-insurance pool or  jointly
11        self-administered  health  and  accident  cooperative  or
12        pool.
13             (u)  Information     concerning    a    university's
14        adjudication  of  student  or   employee   grievance   or
15        disciplinary  cases,  to the extent that disclosure would
16        reveal the  identity  of  the  student  or  employee  and
17        information  concerning any public body's adjudication of
18        student or employee  grievances  or  disciplinary  cases,
19        except for the final outcome of the cases.
20             (v)  Course  materials or research materials used by
21        faculty members.
22             (w)  Information  related  solely  to  the  internal
23        personnel rules and practices of a public body.
24             (x)  Information  contained   in   or   related   to
25        examination, operating, or condition reports prepared by,
26        on behalf of, or for the use of a public body responsible
27        for   the   regulation   or   supervision   of  financial
28        institutions or insurance companies, unless disclosure is
29        otherwise required by State law.
30             (y)  Information  the   disclosure   of   which   is
31        restricted  under  Section  5-108 of the Public Utilities
32        Act.
33             (z)  Manuals or instruction to staff that relate  to
34        establishment  or  collection  of liability for any State
HB3180 Engrossed            -38-               LRB9009236JSmg
 1        tax or that relate to investigations by a public body  to
 2        determine violation of any criminal law.
 3             (aa)  Applications,  related  documents, and medical
 4        records    received    by    the    Experimental    Organ
 5        Transplantation  Procedures  Board  and   any   and   all
 6        documents  or  other records prepared by the Experimental
 7        Organ  Transplantation  Procedures  Board  or  its  staff
 8        relating to applications it has received.
 9             (bb)  Insurance or  self  insurance  (including  any
10        intergovernmental  risk  management  association  or self
11        insurance  pool)  claims,   loss   or   risk   management
12        information, records, data, advice or communications.
13             (cc)  Information and records held by the Department
14        of  Public  Health  and  its  authorized  representatives
15        relating   to   known  or  suspected  cases  of  sexually
16        transmissible disease or any information  the  disclosure
17        of  which  is  restricted  under  the  Illinois  Sexually
18        Transmissible Disease Control Act.
19             (dd)  Information   the   disclosure   of  which  is
20        exempted under Section 30 of the Radon Industry Licensing
21        Act.
22             (ee)  Firm performance evaluations under Section  55
23        of  the  Architectural,  Engineering,  and Land Surveying
24        Qualifications Based Selection Act.
25             (ff)  Security portions  of  system  safety  program
26        plans,  investigation reports, surveys, schedules, lists,
27        data, or information compiled, collected, or prepared  by
28        or   for  the  Regional  Transportation  Authority  under
29        Section 2.11 of the Regional Transportation Authority Act
30        or the State  of  Missouri  under  the  Bi-State  Transit
31        Safety Act.
32             (gg)  (ff)  Information  the  disclosure of which is
33        restricted and exempted under Section 50 of the  Illinois
34        Prepaid Tuition Act.
HB3180 Engrossed            -39-               LRB9009236JSmg
 1             (hh)  Information  that would disclose or might lead
 2        to the disclosure of secret or confidential  information,
 3        codes,  algorithms, programs, or private keys intended to
 4        be used to create electronic or digital signatures  under
 5        the Electronic Commerce Security Act.
 6        (2)  This  Section  does  not  authorize  withholding  of
 7    information  or  limit  the  availability  of  records to the
 8    public,  except  as  stated  in  this  Section  or  otherwise
 9    provided in this Act.
10    (Source: P.A. 90-262, eff.  7-30-97;  90-273,  eff.  7-30-97;
11    90-546, eff. 12-1-97; revised 12-24-97.)
12        Section  95-10.  The  State Comptroller Act is amended by
13    changing Section 14.01 as follows:
14        (15 ILCS 405/14.01)
15        Sec. 14.01.  Digital signatures.
16        (a)  In any communication between a State agency and  the
17    Comptroller  in  which  a  signature is required or used, any
18    party to the communication may affix a signature by use of  a
19    digital signature that complies with the requirements of this
20    Section.   The use of a digital signature shall have the same
21    force and effect as the use of a manual signature if and only
22    if it embodies all of the following attributes:
23             (1)  It is unique to the person using it.
24             (2)  It is capable of verification.
25             (3)  It is under the  sole  control  of  the  person
26        using it.
27             (4)  It  is  linked to data in such a manner that if
28        the  data  are  changed,   the   digital   signature   is
29        invalidated.
30             (5)  It  conforms  to  regulations  adopted  by  the
31        Comptroller,  which  shall  not conflict with the minimum
32        security requirements specified by the Secretary of State
HB3180 Engrossed            -40-               LRB9009236JSmg
 1        under the Electronic Commerce Security Act.
 2        (b)  The use or acceptance of a digital  signature  shall
 3    be  at  the  option  of the parties.  Nothing in this Section
 4    shall require a State agency to use or permit the  use  of  a
 5    digital signature.
 6        (c)  "Digital signature" has the meaning ascribed to that
 7    term  in  the  Electronic  Commerce  Security  Act  means  an
 8    electronic  identifier,  created by computer, intended by the
 9    party using it to have the same force and effect as  the  use
10    of a manual signature.
11    (Source: P.A. 90-37, eff. 6-27-97.)
12        Section  95-15.   The Criminal Code of 1961 is amended by
13    changing Section 17-3 as follows:
14        (720 ILCS 5/17-3) (from Ch. 38, par. 17-3)
15        Sec. 17-3. Forgery.
16        (a)  A  person  commits  forgery  when,  with  intent  to
17    defraud, he knowingly:
18             (1)  makes or alters any document apparently capable
19        of defrauding another in such manner that it purports  to
20        have  been  made  by  another or at another time, or with
21        different provisions, or by authority of one who did  not
22        give such authority; or
23             (2)  issues  or delivers such document knowing it to
24        have been thus made or altered; or
25             (3)  possesses, with intent to issue or deliver, any
26        such document knowing  it  to  have  been  thus  made  or
27        altered; or.
28             (4)  unlawfully uses the signature device of another
29        to  create  an electronic signature of that other person,
30        as those terms are defined  in  the  Electronic  Commerce
31        Security Act.
32        (b)  An  intent  to  defraud  means an intention to cause
HB3180 Engrossed            -41-               LRB9009236JSmg
 1    another to assume, create, transfer, alter or  terminate  any
 2    right,  obligation  or  power with reference to any person or
 3    property.
 4        (c)  A document apparently capable of defrauding  another
 5    includes,  but  is  not  limited  to, one by which any right,
 6    obligation or power with reference to any person or  property
 7    may  be  created,  transferred,  altered  or  terminated.   A
 8    document  includes  any  record or electronic record as those
 9    terms are defined in the Electronic Commerce Security Act.
10        (d)  Sentence.
11        Forgery is a Class 3 felony.
12    (Source: P.A. 77-2638.)
13                     ARTICLE 99.  EFFECTIVE DATE
14        Section 99-1.  Effective  date.  This  Act  takes  effect
15    July 1, 1999.

[ Top ]