Public Act 90-0759 of the 90th General Assembly

State of Illinois
Public Acts
90th General Assembly

[ Home ] [ Public Acts ] [ ILCS ] [ Search ] [ Bottom ]


Public Act 90-0759

HB3180 Enrolled                                LRB9009236JSmg

    AN ACT relating to electronic commerce security, amending
named Acts.

    Be it enacted by the People of  the  State  of  Illinois,
represented in the General Assembly:

              ARTICLE 1.  SHORT TITLE; PURPOSE

    Section 1-101. Short title.  This Act may be cited as the
Electronic Commerce Security Act.

    Section 1-105. Purposes and construction.  This Act shall
be   construed   consistently   with   what  is  commercially
reasonable under the  circumstances  and  to  effectuate  the
following purposes:
    (1)  To  facilitate electronic communications by means of
reliable electronic records.
    (2)  To facilitate and promote  electronic  commerce,  by
eliminating   barriers   resulting  from  uncertainties  over
writing  and  signature  requirements,  and   promoting   the
development   of   the   legal  and  business  infrastructure
necessary to implement secure electronic commerce.
    (3)  To facilitate electronic filing  of  documents  with
State  and  local  government agencies, and promote efficient
delivery  of  government  services  by  means   of   reliable
electronic records.
    (4)  To  minimize  the  incidence  of  forged  electronic
records, intentional and unintentional alteration of records,
and fraud in electronic commerce.
    (5)  To   help  to  establish  uniformity  of  rules  and
standards  regarding  the  authentication  and  integrity  of
electronic records.
    (6)  To promote public confidence in  the  integrity  and
reliability of electronic records and electronic commerce.
    Section 1-110. Variation by agreement. As between parties
involved  in  generating,  sending,  receiving,  storing,  or
otherwise processing electronic records, the applicability of
provisions  of  this  Act  may  be waived by agreement of the
parties,  except  for  the  provisions  of  Sections  10-140,
15-210, 15-215, 15-220, and subsection (b) of Section  10-130
of this Act.

   ARTICLE 5.  ELECTRONIC RECORDS AND SIGNATURES GENERALLY

    Section 5-105. Definitions.
    "Asymmetric  cryptosystem"  means a computer-based system
capable of generating and using a key pair  consisting  of  a
private key for creating a digital signature and a public key
to verify the digital signature.
    "Certificate"  means  a  record  that  at  a minimum: (a)
identifies the certification authority issuing it; (b)  names
or  otherwise  identifies  its  subscriber  or  a  device  or
electronic  agent  under  the  control of the subscriber; (c)
contains a public key that corresponds to a private key under
the control of the subscriber;  (d) specifies its operational
period; and (e) is  digitally  signed  by  the  certification
authority issuing it.
    "Certification  authority"  means a person who authorizes
and causes the issuance of a certificate.
    "Certification  practice  statement"   is   a   statement
published  by  a  certification  authority that specifies the
policies  or  practices  that  the  certification   authority
employs   in  issuing,  managing,  suspending,  and  revoking
certificates and providing access to them.
    "Correspond", with reference to keys, means to belong  to
the same key pair.
    "Digital  signature" means a type of electronic signature
created by transforming an electronic record using a  message
digest  function  and encrypting the resulting transformation
with an asymmetric cryptosystem using  the  signer's  private
key  such  that  any  person having the initial untransformed
electronic record,  the  encrypted  transformation,  and  the
signer's  corresponding  public  key can accurately determine
whether the transformation was created using the private  key
that  corresponds  to the signer's public key and whether the
initial  electronic  record  has  been  altered   since   the
transformation  was  made.  A digital signature is a security
procedure.
    "Electronic"  includes  electrical,  digital,   magnetic,
optical,  electromagnetic,  or  any  other form of technology
that entails capabilities similar to these technologies.
    "Electronic   record"   means   a    record    generated,
communicated, received, or stored by electronic means for use
in  an  information  system  or  for  transmission  from  one
information system to another.
    "Electronic  signature"  means  a signature in electronic
form attached to or logically associated with  an  electronic
record.
    "Information"  includes data, text, images, sound, codes,
computer programs, software, databases, and the like.
    "Key  pair"  means,  in  an  asymmetric  cryptosystem,  2
mathematically related keys, referred to as a private key and
a public key, having the properties that  (i)  one  key  (the
private  key)  can  encrypt a message that only the other key
(the public key) can decrypt, and (ii) even knowing  one  key
(the   public  key),  it  is  computationally  unfeasible  to
discover  the other key (the private key).
    "Message digest function" means an algorithm that maps or
translates the sequence  of  bits  comprising  an  electronic
record  into  another,  generally  smaller,  set of bits (the
message digest) without  requiring  the  use  of  any  secret
information  such  as  a  key, such that an electronic record
yields the same message digest every time  the  algorithm  is
executed using such record as input and it is computationally
unfeasible  that  any  2  electronic  records can be found or
deliberately generated that would produce  the  same  message
digest using the algorithm unless the 2 records are precisely
identical.
    "Operational  period of a certificate" begins on the date
and  time  the  certificate  is  issued  by  a  certification
authority (or on a later date and time certain if  stated  in
the  certificate) and ends on the date and time it expires as
noted in the certificate or is earlier revoked, but does  not
include any period during which a certificate is suspended.
    "Person"   means  an  individual,  corporation,  business
trust,  estate,  trust,  partnership,  limited   partnership,
limited  liability  partnership,  limited  liability company,
association,   joint   venture,   government,    governmental
subdivision,  agency,  or instrumentality, or any other legal
or commercial entity.
    "Private key" means the key of a key pair used to  create
a digital signature.
    "Public key" means the key of a key pair used to verify a
digital signature.
    "Record"  means information that is inscribed, stored, or
otherwise fixed on a tangible medium or that is stored in  an
electronic or other medium and is retrievable in  perceivable
form.
    "Repository"  means  a  system for storing and retrieving
certificates or other information relevant  to  certificates,
including   information   relating   to   the   status  of  a
certificate.
    "Revoke a  certificate"  means  to  permanently  end  the
operational  period  of  a  certificate from a specified time
forward.
    "Rule of law" means any statute,  ordinance,  common  law
rule,   court   decision,  or  other  rule  of  law  enacted,
established or promulgated by the State of Illinois,  or  any
agency,  commission,  department,  court,  other authority or
political subdivision of the State of Illinois.
    "Security procedure" means  a  methodology  or  procedure
used  for  the  purpose  of  (1) verifying that an electronic
record is that of a specific person or (2) detecting error or
alteration in the communication, content, or  storage  of  an
electronic  record since a specific point in time. A security
procedure  may  require  the  use  of  algorithms  or  codes,
identifying words or  numbers,  encryption,  answer  back  or
acknowledgment procedures, or similar security devices.
    "Signature  device"  means  unique  information,  such as
codes,  algorithms,  letters,  numbers,  private   keys,   or
personal   identification   numbers  (PINs),  or  a  uniquely
configured physical device, that is  required,  alone  or  in
conjunction  with  other  information or devices, in order to
create an electronic signature  attributable  to  a  specific
person.
    "Signed"  or  "signature" includes any symbol executed or
adopted, or any security procedure employed or adopted, using
electronic means or otherwise, by or on behalf  of  a  person
with intent to authenticate a record.
    "State  agency"  means and includes all officers, boards,
commissions, courts, and agencies  created  by  the  Illinois
Constitution,   whether  in  the  executive,  legislative  or
judicial   branch,   all   officers,   departments,   boards,
commissions,     agencies,     institutions,     authorities,
universities, bodies politic and corporate of the State;  and
administrative  units  or  corporate  outgrowths of the State
government which are created by or pursuant to statute, other
than units of local government  and  their  officers,  school
districts   and   boards   of   election  commissioners;  all
administrative units and corporate outgrowths  of  the  above
and as may be created by executive order of the Governor.
    "Subscriber"  means  a person who is the subject named or
otherwise identified in a certificate, who controls a private
key that  corresponds  to  the  public  key  listed  in  that
certificate,  and  who is the person to whom digitally signed
messages verified by reference to such certificate are to  be
attributed.
    "Suspend  a certificate" means to temporarily suspend the
operational period of a  certificate  for  a  specified  time
period or from a specified time forward.
    "Trustworthy  manner"  means  through the use of computer
hardware, software, and procedures that, in  the  context  in
which  they  are  used:  (a)  can  be  shown to be reasonably
resistant to penetration, compromise, and misuse; (b) provide
a reasonable level of reliability and correct operation;  (c)
are  reasonably suited to performing their intended functions
or  serving  their  intended  purposes;   (d)   comply   with
applicable  agreements  between  the parties, if any; and (e)
adhere to generally accepted security procedures.
    "Valid  certificate"   means   a   certificate   that   a
certification  authority  has  issued and that the subscriber
listed in the certificate has accepted.
    "Verify a digital signature" means to use the public  key
listed  in  a  valid  certificate, along with the appropriate
message  digest  function  and  asymmetric  cryptosystem,  to
evaluate a digitally signed electronic record, such that  the
result  of  the  process concludes that the digital signature
was created using the private key corresponding to the public
key listed in the certificate and the electronic  record  has
not been altered since its digital signature was created.

    Section 5-110.  Legal recognition.  Information, records,
and signatures shall not be denied legal effect, validity, or
enforceability  solely  on  the  grounds  that  they  are  in
electronic form.

    Section 5-115.  Electronic records.
    (a)  Where  a  rule  of  law  requires  information to be
"written"  or  "in  writing",   or   provides   for   certain
consequences  if  it  is  not, an electronic record satisfies
that rule of law.
    (b)  The provisions of this Section shall not apply:
         (1)  when   its   application   would   involve    a
    construction   of   a   rule   of  law  that  is  clearly
    inconsistent with the manifest intent  of  the  lawmaking
    body or repugnant to the context of the same rule of law,
    provided  that  the  mere requirement that information be
    "in writing", "written", or "printed" shall not by itself
    be sufficient to establish such intent;
         (2)  to any rule of law governing  the  creation  or
    execution  of a will or trust, living will, or healthcare
    power of attorney; and
         (3)  to any record  that  serves  as  a  unique  and
    transferable   instrument   of   rights  and  obligations
    including, without limitation, negotiable instruments and
    other instruments of  title  wherein  possession  of  the
    instrument   is   deemed   to  confer  title,  unless  an
    electronic version of such record is created, stored, and
    transferred in a manner that allows for the existence  of
    only  one  unique, identifiable, and unalterable original
    with the functional attributes of an equivalent  physical
    instrument, that can be possessed by only one person, and
    which  cannot  be copied except in a form that is readily
    identifiable as a copy.

    Section 5-120.  Electronic signatures.
    (a)  Where  a  rule  of  law  requires  a  signature,  or
provides for  certain  consequences  if  a  document  is  not
signed, an electronic signature satisfies that rule of law.
    (b)  An electronic signature may be proved in any manner,
including  by  showing  that  a  procedure existed by which a
party must of necessity have executed a  symbol  or  security
procedure  for  the  purpose  of verifying that an electronic
record is that of such party in order to proceed further with
a transaction.
    (c)  The provisions of this Section shall not apply:
         (1)  when   its   application   would   involve    a
    construction   of   a   rule   of  law  that  is  clearly
    inconsistent with the manifest intent  of  the  lawmaking
    body or repugnant to the context of the same rule of law,
    provided  that  the  mere requirement of a "signature" or
    that  a  record  be  "signed"  shall  not  by  itself  be
    sufficient to establish such intent;
         (2)  to any rule of law governing  the  creation  or
    execution  of a will or trust, living will, or healthcare
    power of attorney; and
         (3)  to any record  that  serves  as  a  unique  and
    transferable   instrument   of   rights  and  obligations
    including, without limitation, negotiable instruments and
    other instruments of  title  wherein  possession  of  the
    instrument   is   deemed   to  confer  title,  unless  an
    electronic version of such record is created, stored, and
    transferred in a manner that allows for the existence  of
    only  one  unique, identifiable, and unalterable original
    with the functional attributes of an equivalent  physical
    instrument, that can be possessed by only one person, and
    which  cannot  be copied except in a form that is readily
    identifiable as a copy.

    Section 5-125.  Original.
    (a)  Where a rule  of  law  requires  information  to  be
presented  or  retained  in  its  original  form, or provides
consequences for  the  information  not  being  presented  or
retained  in its original form, that rule of law is satisfied
by an electronic record if there exists reliable assurance as
to the integrity of the information from the time when it was
first generated in its final form, as an electronic record or
otherwise.
    (b)  The  criteria  for  assessing  integrity  shall   be
whether  the information has remained complete and unaltered,
apart  from  the  addition  of  any  endorsement   or   other
information   that   arises   in   the   normal   course   of
communication,   storage   and   display.   The  standard  of
reliability required to ensure that information has  remained
complete  and unaltered shall be assessed in the light of the
purpose for which the information was generated  and  in  the
light of all the relevant circumstances.
    (c)  The  provisions  of this Section do not apply to any
record that serves as a unique and transferable instrument of
rights  and  obligations   including,   without   limitation,
negotiable instruments and other instruments of title wherein
possession  of  the  instrument  is  deemed  to confer title,
unless an electronic  version  of  such  record  is  created,
stored,  and  transferred  in  a  manner  that allows for the
existence of only one unique, identifiable,  and  unalterable
original  with  the  functional  attributes  of an equivalent
physical instrument,  that  can  be  possessed  by  only  one
person,  and  which cannot be copied except in a form that is
readily identifiable as a copy.

    Section 5-130.  Admissibility into evidence.
    (a)  In any legal proceeding, nothing in the  application
of  the  rules  of  evidence  shall  apply  so as to deny the
admissibility of an electronic record or electronic signature
into evidence:
         (1)  on the sole ground that  it  is  an  electronic
    record or electronic signature; or
         (2)  on  the  grounds that it is not in its original
    form or is not an original.
    (b)  Information in the  form  of  an  electronic  record
shall  be  given due evidentiary weight by the trier of fact.
In assessing the evidential weight of an electronic record or
electronic signature where its authenticity is in issue,  the
trier  of  fact  may  consider  the  manner  in  which it was
generated, stored or communicated,  the  reliability  of  the
manner  in  which its integrity was maintained, the manner in
which its originator was identified or the electronic  record
was   signed,   and   any   other   relevant  information  or
circumstances.

    Section 5-135.  Retention of electronic records.
    (a)  Where a rule of law requires that certain documents,
records or information be retained, that requirement  is  met
by  retaining  electronic  records  of  such information in a
trustworthy manner, provided that  the  following  conditions
are satisfied:
         (1)  the   electronic  record  and  the  information
    contained therein are accessible so as to be  usable  for
    subsequent  reference  at all times when such information
    must be retained;
         (2)  the information is retained in  the  format  in
    which  it  was originally generated, sent, or received or
    in  a  format  that  can  be  demonstrated  to  represent
    accurately the information originally generated, sent  or
    received; and
         (3)  such  data as enables the identification of the
    origin  and   destination   of   the   information,   the
    authenticity  and  integrity  of the information, and the
    date and time when it was sent or received,  if  any,  is
    retained.
    (b)  An   obligation  to  retain  documents,  records  or
information in accordance with subsection (a) does not extend
to any data the sole purpose of which is to enable the record
to be sent or received.
    (c)  Nothing in this Section  shall  preclude  any  State
agency   from  specifying  additional  requirements  for  the
retention of records that are subject to the jurisdiction  of
such agency.

    Section  5-140.  Electronic  use not required. Nothing in
this Act shall be construed to:
         (1)  require any person to create, store,  transmit,
    accept,  or  otherwise  use  or  communicate information,
    records,  or  signatures  by  electronic  means   or   in
    electronic form; or
         (2)  prohibit  any  person engaging in an electronic
    transaction  from  establishing  reasonable  requirements
    regarding the medium on which it will accept  records  or
    the  method  and  type of symbol or security procedure it
    will accept as a signature.

    Section 5-145.  Applicability of other statutes or rules.
Notwithstanding any provisions of  this  Act,  if  any  other
statute  or rule requires approval by a State agency prior to
the use or retention of electronic  records  or  the  use  of
electronic  signatures,  the provisions of that other statute
or rule shall also apply.

    ARTICLE 10.  SECURE ELECTRONIC RECORDS AND SIGNATURES

    Section 10-105. Secure electronic record.
    (a)  If,  through  the  use  of  a   qualified   security
procedure,  it  can be verified that an electronic record has
not been altered since a specified point in time,  then  such
electronic   record  shall  be  considered  to  be  a  secure
electronic record from such specified point in  time  to  the
time  of  verification, if the relying party establishes that
the qualified security procedure was:
         (1)  commercially     reasonable      under      the
    circumstances;
         (2)  applied  by  the relying party in a trustworthy
    manner; and
         (3)  reasonably and in good faith relied upon by the
    relying party.
    (b)  A qualified security procedure for purposes of  this
Section  is  a  security  procedure  to detect changes in the
content of an electronic record that is:
         (1)  previously agreed to by the parties; or
         (2)  certified  by  the  Secretary   of   State   in
    accordance  with  Section  10-135  as  being  capable  of
    providing reliable evidence that an electronic record has
    not been altered.

    Section 10-110.  Secure electronic signature.
    (a)  If,   through   the  use  of  a  qualified  security
procedure, it can be verified that an electronic signature is
the signature of a  specific  person,  then  such  electronic
signature  shall  be  considered  to  be  a secure electronic
signature at the time of verification, if the  relying  party
establishes that the qualified security procedure was:
         (1)  commercially      reasonable      under     the
    circumstances;
         (2)  applied by the relying party in  a  trustworthy
    manner; and
         (3)  reasonably and in good faith relied upon by the
    relying party.
    (b)  A  qualified security procedure for purposes of this
Section is a security procedure for identifying a person that
is:
         (1)  previously agreed to by the parties; or
         (2)  certified  by  the  Secretary   of   State   in
    accordance  with  Section  10-135  as  being  capable  of
    creating,   in   a   trustworthy  manner,  an  electronic
    signature that:
              (A)  is unique to the signer within the context
         in which it is used;
              (B)  can be used to  objectively  identify  the
         person signing the electronic record;
              (C)  was  reliably  created  by such identified
         person, (e.g., because some aspect of the  procedure
         involves  the  use  of  a  signature device or other
         means or method that is under the  sole  control  of
         such  person), and that cannot be readily duplicated
         or compromised; and
              (D)  is  created,  and   is   linked   to   the
         electronic  record  to which it relates, in a manner
         such  that  if  the  record  or  the  signature   is
         intentionally   or   unintentionally  changed  after
         signing the electronic signature is invalidated.

    Section 10-115. Commercially reasonable; reliance.
    (a)  The  commercial   reasonableness   of   a   security
procedure  is  a question of law to be determined in light of
the  purposes   of   the   procedure   and   the   commercial
circumstances  at  the time the procedure was used, including
the nature of the transaction, sophistication of the parties,
volume of similar transactions engaged in by either  or  both
of  the  parties, availability of alternatives offered to but
rejected by  either  of  the  parties,  cost  of  alternative
procedures,  and  procedures in general use for similar types
of transactions.
    (b)  Whether  reliance  on  a  security   procedure   was
reasonable  and in good faith is to be determined in light of
all the circumstances known to the relying party at the  time
of the reliance, having due regard to the:
         (1)  information  that  the  relying  party  knew or
    should have known of at the time of reliance  that  would
    suggest that reliance was or was not reasonable;
         (2)  the  value  or  importance  of  the  electronic
    record, if known;
         (3)  any course of dealing between the relying party
    and  the  purported  sender  and the available indicia of
    reliability or  unreliability  apart  from  the  security
    procedure;
         (4)  any   usage   of   trade,   particularly  trade
    conducted by trustworthy systems or other  computer-based
    means; and
         (5)  whether the verification was performed with the
    assistance of an independent third party.

    Section 10-120. Presumptions.
    (a)  In  resolving  a  civil  dispute  involving a secure
electronic record, it shall be rebuttably presumed  that  the
electronic  record  has  not  been altered since the specific
point in time to which the secure status relates.
    (b)  In resolving a  civil  dispute  involving  a  secure
electronic  signature,  it  shall be rebuttably presumed that
the secure electronic  signature  is  the  signature  of  the
person to whom it correlates.
    (c)  The  effect of presumptions provided in this Section
is to place on the  party  challenging  the  integrity  of  a
secure  electronic record or challenging the genuineness of a
secure electronic signature both the burden of going  forward
with  evidence  to  rebut  the  presumption and the burden of
persuading the trier of fact that  the  nonexistence  of  the
presumed fact is more probable than its existence.
    (d)  In  the  absence  of a secure electronic record or a
secure electronic signature, nothing in this Act shall change
existing rules regarding legal or evidentiary rules regarding
the burden of proving the authenticity and  integrity  of  an
electronic record or an electronic signature.

    Section   10-125.  Creation   and  control  of  signature
devices. Except as otherwise provided by  another  applicable
rule  of law, whenever the creation, validity, or reliability
of an electronic signature created by  a  qualified  security
procedure  under  Section  10-105 or 10-110 is dependent upon
the secrecy or control of a signature device of the signer:
    (1)  the person  generating  or  creating  the  signature
device must do so in a trustworthy manner;
    (2)  the  signer  and  all  other persons that rightfully
have access to such signature device must exercise reasonable
care to retain  control  and  maintain  the  secrecy  of  the
signature  device,  and  to  protect it from any unauthorized
access, disclosure, or use, during the period  when  reliance
on a signature created by such device is reasonable;
    (3)  in  the  event  that the signer, or any other person
that rightfully has access to such signature device, knows or
has reason to know that the secrecy or control  of  any  such
signature  device has been compromised, such person must make
a reasonable effort to promptly notify all persons that  such
person knows might foreseeably be damaged as a result of such
compromise,  or where an appropriate publication mechanism is
available  (which,  for  State  agencies,  may  include   the
official  newspaper  designated  pursuant to Section 4 of the
Illinois Purchasing Act where appropriate), to publish notice
of the compromise and a disavowal of any  signatures  created
thereafter.

    Section 10-130.  Attribution of signature.
    (a)  Except  as  provided  by  another applicable rule of
law, a secure electronic signature  is  attributable  to  the
person to whom it correlates, whether or not authorized, if:
         (1)  the  electronic signature resulted from acts of
    a person that obtained  the  signature  device  or  other
    information  necessary  to  create  the  signature from a
    source under the control of the alleged signer,  creating
    the appearance that it came from that party;
         (2)  the  access or use occurred under circumstances
    constituting a failure to exercise reasonable care by the
    alleged signer; and
         (3)  the relying party relied reasonably and in good
    faith to its detriment on  the  apparent  source  of  the
    electronic record.
    (b)  The  provisions  of  this Section shall not apply to
transactions intended  primarily  for  personal,  family,  or
household  use, or otherwise defined as consumer transactions
by applicable law including, but not limited to, credit  card
and  automated  teller  machine  transactions  except  to the
extent allowed by applicable consumer law.

    Section 10-135. Secretary of State authority  to  certify
security procedures.
    (a)  A   security  procedure  may  be  certified  by  the
Secretary of State, as a  qualified  security  procedure  for
purposes   of   Sections   10-105  or  10-110,  following  an
appropriate investigation or review, if:
         (1)  the   security   procedure    (including    any
    technology  and algorithms it employs) is completely open
    and fully disclosed to the public, and has been so for  a
    sufficient   length  of  time,  so  as  to  facilitate  a
    comprehensive review and evaluation  of  its  suitability
    for  the  intended  purpose by the applicable information
    security or scientific community; and
         (2)    the   security   procedure   (including   any
    technology  and algorithms it employs) has been generally
    accepted  in  the  applicable  information  security   or
    scientific  community  as being capable of satisfying the
    requirements of Section 10-105 or 10-110, as  applicable,
    in a trustworthy manner.
    (b)  In  making  a  determination  regarding  whether the
security procedure (including any technology  and  algorithms
it  employs)  has  been  generally accepted in the applicable
information security or scientific community,  the  Secretary
of State shall consider the opinion of independent experts in
the  applicable  field  and  the  published  findings of such
community, including applicable standards organizations  such
as   the   American   National  Standards  Institute  (ANSI),
International  Standards  Organization  (ISO),  International
Telecommunications Union (ITU), and the National Institute of
Standards and Technology (NIST).
    (c)  Such  certification  shall  be  done   through   the
adoption  of  rules  in accordance with the provisions of the
Illinois Administrative Procedure Act  and  shall  specify  a
full  and  complete identification of the security procedure,
including requirements as to how it is to be implemented,  if
appropriate.
    (d)  The Secretary of State may also decertify a security
procedure  as  a qualified security procedure for purposes of
Sections  10-105   or   10-110   following   an   appropriate
investigation   or  review  and  the  adoption  of  rules  in
accordance with the provisions of the Illinois Administrative
Procedure Act if subsequent developments establish  that  the
security  procedure  is no longer sufficiently trustworthy or
reliable for its intended purpose, or for any other reason no
longer meets the requirements for certification.
    (e)  The  Secretary  of  State   shall   have   exclusive
authority to certify security procedures under this Section.
    Section 10-140.  Unauthorized use of signature device.
    (a)  No  person  shall knowingly or intentionally access,
copy, or otherwise  obtain  possession  of  or  recreate  the
signature  device of another person without authorization for
the purpose of  creating,  or  allowing  or  causing  another
person  to create, an unauthorized electronic signature using
such signature device. A person convicted of a  violation  of
this subsection shall be guilty of a Class A misdemeanor.
    (b)  No  person  shall  knowingly alter, disclose, or use
the signature device of another person without authorization,
or in excess of lawful  authorization,  for  the  purpose  of
creating, or allowing or causing another person to create, an
unauthorized   electronic   signature  using  such  signature
device. A person convicted of a violation of this  subsection
shall  be guilty of a Class 4 felony. A person convicted of a
violation  of  this  subsection  who  has   previously   been
convicted of a violation of this subsection or Section 15-210
shall  be  guilty  of a Class 3 felony. A person who violates
this Section in furtherance of  any  scheme  or  artifice  to
defraud  in  excess  of  $50,000 shall be guilty of a Class 2
felony.

         ARTICLE 15.  EFFECT OF A DIGITAL SIGNATURE

    Section 15-101.  Secure  electronic  record.   A  digital
signature  that  is  created  using  an  asymmetric algorithm
certified by  the  Secretary  of  State  under  item  (2)  of
subsection  (b) of Section 10-105 shall be considered to be a
qualified  security  procedure  for  purposes  of   detecting
changes  in the content of an electronic record under Section
10-105 if  the  digital  signature  was  created  during  the
operational  period  of a valid certificate,  and is verified
by reference to the public key listed in such certificate.
    Section 15-105.  Secure electronic signature.  A  digital
signature  that  is  created  using  an  asymmetric algorithm
certified by  the  Secretary  of  State  under  item  (2)  of
subsection  (b) of Section 10-110 shall be considered to be a
qualified security procedure for purposes  of  identifying  a
person under Section 10-110 if:
         (1)  the  digital  signature  was created during the
    operational period  of  a  valid  certificate,  was  used
    within  the  scope of any other restrictions specified or
    incorporated by reference in the certificate, if any, and
    can be verified by reference to the public key listed  in
    the certificate; and
         (2)  the   certificate   is  considered  trustworthy
    (i.e., an accurate binding of a public key to a  person's
    identity)   because  the  certificate  was  issued  by  a
    certification authority  in  accordance  with  standards,
    procedures,  and  other  requirements  specified  by  the
    Secretary  of  State,  or the trier of fact independently
    finds that the certificate was issued  in  a  trustworthy
    manner   by   a  certification  authority  that  properly
    authenticated the subscriber and the subscriber's  public
    key, or otherwise finds that the material information set
    forth in the certificate is true.

    Section  15-115.  Secretary  of  State authority to adopt
rules.
    (a)  The Secretary of State may adopt rules applicable to
both the public  and  private  sectors  for  the  purpose  of
defining   when  a  certificate  is  considered  sufficiently
trustworthy  under  Section  15-105  such  that   a   digital
signature verified by reference to such a certificate will be
considered  a  qualified  security  procedure  under  Section
10-110.  The  rules  may include (1) establishing or adopting
standards  applicable   to   certification   authorities   or
certificates,  compliance  with  which  may  be  measured  by
becoming  certified  by  the  Secretary  of  State,  becoming
accredited  by  one  or more independent accrediting entities
recognized by the Secretary of State, or by other appropriate
means and (2) where  appropriate,  establishing  fees  to  be
charged by the Secretary of State to recover all or a portion
of its costs in connection therewith.
    (b)  In  developing  the  rules,  the  Secretary of State
shall endeavor to  do  so  in  a  manner  that  will  provide
maximum   flexibility   to   the  implementation  of  digital
signature technology and the  business  models  necessary  to
support   it,  that  will  provide  a  clear  basis  for  the
recognition of certificates issued by  foreign  certification
authorities,  and,  to  the  extent reasonably possible, that
will maximize the opportunities for uniformity with the  laws
of  other  jurisdictions  (both  within the United States and
internationally).
    (c)  The  Secretary  of  State   shall   have   exclusive
authority to adopt rules authorized by this Section.

    Section  15-201.  Reliance  on  certificates foreseeable.
It is foreseeable that persons relying on a digital signature
will also rely on a valid certificate containing  the  public
key  by  which  the digital signature can be verified, during
the operational period of such  certificate  and  within  any
limits specified in such certificate.

    Section    15-205.  Restrictions    on   publication   of
certificate.    No  person  may  publish  a  certificate,  or
otherwise knowingly make it available  to  anyone  likely  to
rely  on  the  certificate  or on a digital signature that is
verifiable with reference to the public  key  listed  in  the
certificate, if such person knows that:
         (1)  the   certification  authority  listed  in  the
    certificate has not issued it;
         (2)  the subscriber listed in  the  certificate  has
    not accepted it; or
         (3)  the  certificate has been revoked or suspended,
    unless such publication is for the purpose of verifying a
    digital signature created prior  to  such  revocation  or
    suspension, or giving notice of revocation or suspension.

    Section   15-210.  Fraudulent   use.    No  person  shall
knowingly  create,  publish,  alter,  or  otherwise   use   a
certificate  for any fraudulent or other unlawful purpose.  A
person convicted of a violation  of  this  Section  shall  be
guilty of a Class 4 felony. A person convicted of a violation
of  this  Section  who  previously  has  been  convicted of a
violation of this Section or Section 10-140 shall  be  guilty
of  a  Class  3 felony. A person who violates this Section in
furtherance of any scheme or artifice to defraud in excess of
$50,000 shall be guilty of a Class 2 felony.

    Section  15-215.  False  or  unauthorized  request.    No
person  shall  knowingly  misrepresent his or her identity or
authorization in requesting or accepting a certificate or  in
requesting  suspension  or  revocation  of  a certificate.  A
person convicted of a violation  of  this  Section  shall  be
guilty  of a Class A misdemeanor.  A person who violates this
Section 10 times within a 12-month period, or in  furtherance
of  any  scheme  or artifice to defraud, shall be guilty of a
Class 4  felony.  A  person  who  violates  this  Section  in
furtherance of any scheme or artifice to defraud in excess of
$50,000 shall be guilty of a Class 2 felony.

    Section 15-220.  Unauthorized use of signature device. No
person  shall  knowingly  access, alter, disclose, or use the
signature device of a certification authority used  to  issue
certificates  without  authorization,  or in excess of lawful
authorization, for the purpose of creating,  or  allowing  or
causing  another person to create, an unauthorized electronic
signature using such signature device. A person convicted  of
a  violation  of  this  Section  shall be guilty of a Class 3
felony. A person who violates this Section in furtherance  of
any  scheme or artifice to defraud shall be guilty of a Class
2 felony.

    Section   15-301.  Trustworthy   services.    Except   as
conspicuously  set  forth  in  its   certification   practice
statement, a certification authority and a person maintaining
a  repository  must  maintain  its operations and perform its
services in a trustworthy manner.

    Section 15-305.  Disclosure.
    (a)  For  each  certificate  issued  by  a  certification
authority with the intention that it will be relied  upon  by
third   parties  to  verify  digital  signatures  created  by
subscribers,  a  certification  authority  must  publish   or
otherwise  make  available  to  the  subscriber  and all such
relying parties:
         (1)  its certification practice statement,  if  any,
    applicable thereto; and
         (2)  its    certificate    that    identifies    the
    certification authority as a subscriber and that contains
    the  public  key corresponding to the private key used by
    the  certification  authority  to  digitally   sign   the
    certificate (its "certification authority certificate").
    (b)  In  the  event  of an occurrence that materially and
adversely affects a certification authority's  operations  or
system, its certification authority certificate, or any other
aspect of its ability to operate in a trustworthy manner, the
certification   authority   must   act   in  accordance  with
procedures governing such  an  occurrence  specified  in  its
certification  practice  statement, or in the absence of such
procedures, must use reasonable efforts to notify any persons
that the certification authority knows might  foreseeably  be
damaged as a result of such occurrence.

    Section    15-310.  Issuance    of   a   certificate.   A
certification  authority  may  issue  a  certificate   to   a
prospective  subscriber  for  the  purpose  of allowing third
parties  to  verify  digital  signatures   created   by   the
subscriber only after:
    (1)  the  certification  authority has received a request
for issuance from the prospective subscriber; and
    (2)  the certification authority has:
         (A)  complied with all of the relevant practices and
    procedures set  forth  in  its  applicable  certification
    practice statement, if any; or
         (B)  in  the  absence  of  a  certification practice
    statement  addressing  these  issues,  confirmed   in   a
    trustworthy manner that:
              (i)  the  prospective  subscriber is the person
         to be listed in the certificate to be issued;
              (ii)  the information in the certificate to  be
         issued is accurate; and
              (iii)  the  prospective  subscriber  rightfully
         holds  a  private  key capable of creating a digital
         signature, and the public key to be  listed  in  the
         certificate   can   be  used  to  verify  a  digital
         signature affixed by such private key.

    Section   15-315.  Representations   upon   issuance   of
certificate.
    (a)  By issuing a certificate with the intention that  it
will  be  relied  upon  by  third  parties  to verify digital
signatures  created  by  the  subscriber,   a   certification
authority represents to the subscriber, and to any person who
reasonably   relies   on   information   contained   in   the
certificate, in good faith and during its operational period,
that:
         (1)  the   certification  authority  has  processed,
    approved, and issued,  and  will  manage  and  revoke  if
    necessary,   the   certificate  in  accordance  with  its
    applicable certification  practice  statement  stated  or
    incorporated  by reference in the certificate or of which
    such person has notice, or in lieu thereof, in accordance
    with this Act or the law of  the  jurisdiction  governing
    issuance of the certificate;
         (2)  the  certification  authority  has verified the
    identity of the subscriber to the extent  stated  in  the
    certificate  or  its  applicable  certification  practice
    statement,  or  in  lieu  thereof, that the certification
    authority has verified the identity of the subscriber  in
    a trustworthy manner;
         (3)  the  certification  authority has verified that
    the person requesting the certificate holds  the  private
    key  corresponding  to  the  public  key  listed  in  the
    certificate; and
         (4)  except   as  conspicuously  set  forth  in  the
    certificate  or  its  applicable  certification  practice
    statement, to the certification authority's knowledge  as
    of  the  date  the  certificate  was  issued,  all  other
    information  in  the  certificate  is  accurate,  and not
    materially misleading.
    (b)  If a certification authority issued the  certificate
subject   to   the   laws   of   another   jurisdiction,  the
certification  authority  also  makes  all   warranties   and
representations,  if  any, otherwise applicable under the law
governing its issuance.
    Section 15-320.  Revocation of a certificate.
    (a)  During the operational period of a certificate,  the
certification  authority  that  issued  the  certificate must
revoke the certificate in accordance with  the  policies  and
procedures  governing  revocation specified in its applicable
certification practice statement, or in the absence  of  such
policies and procedures, as soon as possible after:
         (1)  receiving  a  request  for  revocation  by  the
    subscriber  named in the certificate, and confirming that
    the person requesting revocation is the subscriber, or is
    an agent of the subscriber with authority to request  the
    revocation;
         (2)  receiving  a  certified  copy  of an individual
    subscriber's death certificate,  or  upon  confirming  by
    other reliable evidence that the subscriber is dead;
         (3)  being  presented  with  documents  effecting  a
    dissolution of a corporate subscriber, or confirmation by
    other  evidence that the subscriber has been dissolved or
    has ceased to exist;
         (4)  being served with an order requiring revocation
    that was issued by a court of competent jurisdiction; or
         (5)  confirmation  by  the  certification  authority
    that:
              (A)  a  material  fact   represented   in   the
         certificate is false;
              (B)  a material prerequisite to issuance of the
         certificate was not satisfied;
              (C)  the  certification authority's private key
         or system operations were compromised  in  a  manner
         materially  affecting the certificate's reliability;
         or
              (D)  the   subscriber's   private    key    was
         compromised.
    (b)  Upon  effecting such a revocation, the certification
authority must notify the subscriber and relying  parties  in
accordance  with the policies and procedures governing notice
of  revocation  specified  in  its  applicable  certification
practice statement, or in the absence of  such  policies  and
procedures,  promptly notify the subscriber, promptly publish
notice of  the  revocation  in  all  repositories  where  the
certification  authority previously caused publication of the
certificate, and otherwise disclose the fact of revocation on
inquiry by a relying party.

             ARTICLE 20.  DUTIES OF SUBSCRIBERS

    Section 20-101.  Obtaining a certificate.   All  material
representations knowingly made by a person to a certification
authority for purposes of obtaining a certificate naming such
person  as  a subscriber must be accurate and complete to the
best of such person's knowledge and belief.

    Section 20-105.  Acceptance of a certificate.
    (a)  A person  accepts  a  certificate  that  names  such
person as a subscriber by publishing or approving publication
of  it  to  one  or  more  persons,  or  in  a repository, or
otherwise demonstrating approval  of  it,  while  knowing  or
having notice of its contents.
    (b)  By accepting a certificate, the subscriber listed in
the  certificate  represents  to  any  person  who reasonably
relies on information contained in the certificate,  in  good
faith and during its operational period, that:
         (1)  the subscriber rightfully holds the private key
    corresponding   to   the   public   key   listed  in  the
    certificate;
         (2)  all representations made by the  subscriber  to
    the   certification   authority   and   material  to  the
    information listed in the certificate are true; and
         (3)  all information  in  the  certificate  that  is
    within the knowledge of the subscriber is true.

    Section  20-110.  Revocation  of  certificate.  Except as
otherwise provided by another applicable rule of law, if  the
private key corresponding to the public key listed in a valid
certificate  is  lost,  stolen, accessible to an unauthorized
person,  or  otherwise  compromised  during  the  operational
period of the certificate, a subscriber who  has  learned  of
the    compromise   must   promptly   request   the   issuing
certification authority to revoke the certificate and publish
notice  of  revocation  in  all  repositories  in  which  the
subscriber  previously  authorized  the  certificate  to   be
published,  or  otherwise  provide  reasonable  notice of the
revocation.

              ARTICLE 25.  STATE AGENCY USE OF
              ELECTRONIC RECORDS AND SIGNATURES

    Section 25-101.  State agency use of electronic  records.
    (a)  Each State agency shall determine if, and the extent
to  which,  it  will  send and receive electronic records and
electronic signatures to and from other persons and otherwise
create, use, store, and  rely  upon  electronic  records  and
electronic signatures.
    (b)  In  any case where a State agency decides to send or
receive electronic records, or to accept document filings  by
electronic  records,  the  State  agency  may, by appropriate
agency rule (or court rule  where  appropriate),  giving  due
consideration to security, specify:
         (1)  the  manner and format in which such electronic
    records must be created, sent, received, and stored;
         (2)  if such electronic records must be signed,  the
    type  of  electronic  signature  required, the manner and
    format in which such signature must  be  affixed  to  the
    electronic  record, and the identity of, or criteria that
    must be met by, any third party used by the person filing
    the document to facilitate the process;
         (3)  control processes and procedures as appropriate
    to ensure adequate integrity, security,  confidentiality,
    and auditability of such electronic records; and
         (4)  any   other   required   attributes   for  such
    electronic  records  that  are  currently  specified  for
    corresponding paper documents,  or  reasonably  necessary
    under the circumstances.
    (c)  All  rules  adopted  by a State agency shall include
the relevant minimum security requirements established by the
Department of Central Management Services, if any.
    (d)  Whenever any rule of law requires or authorizes  the
filing of any information, notice, lien, or other document or
record  with any State agency, a filing made by an electronic
record shall have the same force and effect as a filing  made
on  paper  in all cases where the State agency has authorized
or agreed to such electronic filing and the filing is made in
accordance with applicable rules or agreement.
    (e)  Nothing in this Act shall be  construed  to  require
any  State  agency  to use or to permit the use of electronic
records or electronic signatures.

    Section   25-105.  Department   of   Central   Management
Services to adopt State standards.
    (a)  The Department of Central  Management  Services  may
adopt  rules  setting forth minimum security requirements for
the use of electronic records and  electronic  signatures  by
State agencies.
    (b)  The  Department of Central Management Services shall
specify  appropriate  minimum  security  requirements  to  be
implemented and  followed  by  State  agencies  for  (1)  the
generation,  use, and storage of key pairs, (2) the issuance,
acceptance, use, suspension, and revocation of  certificates,
and (3) the use of digital signatures.
    (c)  Each State agency shall have the authority to issue,
or  contract  for  the  issuance  of, certificates to (i) its
employees and agents and (ii) persons conducting business  or
other  transactions  with such State agency and to take other
actions consistent therewith, including the establishment  of
repositories and the suspension or revocation of certificates
so  issued,  provided  that  the  foregoing  is  conducted in
accordance with  all  the  rules,  procedures,  and  policies
specified  by  the Department of Central Management Services.
The Department of Central Management Services shall have  the
authority  to  specify  the  rules,  procedures, and policies
whereby State agencies may issue or contract for the issuance
of certificates.
    (d)  The Department of Central  Management  Services  may
specify  appropriate  minimum standards and requirements that
must be satisfied by a certification authority before:
         (1)  its services are used by any State  agency  for
    the  issuance, publication, revocation, and suspension of
    certificates to such agency, or its employees  or  agents
    (for official use); or
         (2)  the certificates it issues will be accepted for
    purposes of verifying digitally signed electronic records
    sent to any State agency by any person.
    (e)  Where   appropriate,   the   rules  adopted  by  the
Department of Central Management Services  pursuant  to  this
Section  shall  specify differing levels of minimum standards
from  which  implementing  State  agencies  can  select   the
standard most appropriate for a particular application.
    (f)  The General Assembly, through the Joint Committee on
Legislative   Support   Services,   and  the  Supreme  Court,
separately for  the  respective  branches,  may  adopt  rules
setting  forth  the minimum security requirements for the use
of  electronic  records  and  electronic  signatures  by  the
respective branches.  The rules shall generally be consistent
with  the  rules  adopted  by  the  Department   of   Central
Management  Services.   The  Joint  Committee  on Legislative
Support Services and the Supreme Court may  also  accept  the
rules   adopted  by  the  Department  of  Central  Management
Services for the use of  electronic  records  and  electronic
signatures by the respective branches.
    (g)  Except  as provided in subsection (f) and in Section
25-101, the Department of Central Management  Services  shall
have  exclusive  authority  to adopt rules authorized by this
Section.

    Section   25-115.  Interoperability.    To   the   extent
reasonable under  the circumstances,  rules  adopted  by  the
Department  of  Central Management Services or a State agency
relating to the  use  of  electronic  records  or  electronic
signatures shall be drafted in a manner designed to encourage
and  promote  consistency  and  interoperability with similar
requirements adopted by government agencies of  other  states
and the federal government.

    ARTICLE 30.  ENFORCEMENT; CIVIL REMEDY; SEVERABILITY

    Section  30-1.  Enforcement.   The Secretary of State may
investigate  complaints  or  other   information   indicating
violations  of  rules adopted by the Secretary of State under
this Act.  The  Secretary  of  State  shall  certify  to  the
Attorney General, for such action as the Attorney General may
deem  appropriate,  all  information  he  or she obtains that
discloses a violation of any provision of  this  Act  or  the
rules adopted by the Secretary of State under this Act.
    Section  30-5.  Civil  remedy.   Whoever  suffers loss by
reason of a violation of Section 10-140, 15-210,  15-215,  or
15-220  of  this  Act or Section 17-3 of the Criminal Code of
1961 may, in a civil  action  against  the  violator,  obtain
appropriate  relief.   In  a civil action under this Section,
the court  may  award  to  the  prevailing  party  reasonable
attorneys fees and other litigation expenses.

    Section  30-110.  Severability.   The  provisions of this
Act are severable  under  Section  1.31  of  the  Statute  on
Statutes.

             ARTICLE 95.  AMENDATORY PROVISIONS

    Section  95-1.   The  Statute  on  Statutes is amended by
changing Section 1.15 as follows:

    (5 ILCS 70/1.15) (from Ch. 1, par. 1016)
    Sec.  1.15.  "Written"  and  "in  writing"  may   include
printing,  electronic,  and  any  other  mode of representing
words and letters; but when  the  written  signature  of  any
person  is  required  by  law  on  to  any official or public
writing or bond, required by law, it  shall  be  (1)  in  the
proper handwriting of such person or, in case he is unable to
write,  his  proper  mark  or  (2) an electronic signature as
defined in the Electronic Commerce Security  Act,  except  as
otherwise provided by law.
(Source: P.A. 88-672, eff. 12-14-94.)

    Section  95-5.  The Freedom of Information Act is amended
by changing Section 7 as follows:

    (5 ILCS 140/7) (from Ch. 116, par. 207)
    Sec. 7.  Exemptions.
    (1)  The following shall be exempt  from  inspection  and
copying:
         (a)  Information    specifically   prohibited   from
    disclosure  by  federal  or  State  law  or   rules   and
    regulations adopted under federal or State law.
         (b)  Information    that,    if   disclosed,   would
    constitute a clearly  unwarranted  invasion  of  personal
    privacy, unless the disclosure is consented to in writing
    by  the  individual  subjects  of  the  information.  The
    disclosure of information that bears on the public duties
    of public employees and officials shall not be considered
    an invasion of personal  privacy.   Information  exempted
    under  this  subsection  (b)  shall  include  but  is not
    limited to:
              (i)  files and personal information  maintained
         with   respect   to  clients,  patients,  residents,
         students  or  other  individuals  receiving  social,
         medical,   educational,    vocational,    financial,
         supervisory  or  custodial care or services directly
         or  indirectly  from  federal  agencies  or   public
         bodies;
              (ii)  personnel  files and personal information
         maintained with respect to employees, appointees  or
         elected  officials  of any public body or applicants
         for those positions;
              (iii)  files    and    personal     information
         maintained with respect to any applicant, registrant
         or  licensee  by any public body cooperating with or
         engaged    in    professional    or     occupational
         registration, licensure or discipline;
              (iv)  information  required  of any taxpayer in
         connection with the assessment or collection of  any
         tax unless disclosure is otherwise required by State
         statute; and
              (v)  information   revealing  the  identity  of
         persons  who  file  complaints   with   or   provide
         information  to  administrative,  investigative, law
         enforcement or penal  agencies;  provided,  however,
         that   identification   of   witnesses   to  traffic
         accidents,  traffic  accident  reports,  and  rescue
         reports  may  be  provided  by  agencies  of   local
         government,  except  in  a case for which a criminal
         investigation is  ongoing,  without  constituting  a
         clearly  unwarranted   per  se  invasion of personal
         privacy under this subsection.
         (c)  Records  compiled  by  any  public   body   for
    administrative   enforcement   proceedings  and  any  law
    enforcement or correctional agency  for  law  enforcement
    purposes  or  for  internal matters of a public body, but
    only to the extent that disclosure would:
              (i)  interfere with  pending  or  actually  and
         reasonably  contemplated law enforcement proceedings
         conducted by any  law  enforcement  or  correctional
         agency;
              (ii)  interfere   with  pending  administrative
         enforcement  proceedings  conducted  by  any  public
         body;
              (iii)  deprive a person of a fair trial  or  an
         impartial hearing;
              (iv)  unavoidably  disclose  the  identity of a
         confidential  source  or  confidential   information
         furnished only by the confidential source;
              (v)  disclose     unique     or     specialized
         investigative  techniques other than those generally
         used and known or  disclose  internal  documents  of
         correctional    agencies   related   to   detection,
         observation or investigation of incidents  of  crime
         or misconduct;
              (vi)  constitute   an   invasion   of  personal
         privacy under subsection (b) of this Section;
              (vii)  endanger the life or physical safety  of
         law enforcement personnel or any other person; or
              (viii)  obstruct     an     ongoing    criminal
         investigation.
         (d)  Criminal history record information  maintained
    by  State  or local criminal justice agencies, except the
    following which shall be open for public  inspection  and
    copying:
              (i)  chronologically      maintained     arrest
         information, such  as  traditional  arrest  logs  or
         blotters;
              (ii)  the  name of a person in the custody of a
         law enforcement agency and  the  charges  for  which
         that person is being held;
              (iii)  court records that are public;
              (iv)  records   that  are  otherwise  available
         under State or local law; or
              (v)  records in which the requesting  party  is
         the  individual identified, except as provided under
         part (vii) of paragraph (c)  of  subsection  (1)  of
         this Section.
         "Criminal  history  record  information"  means data
    identifiable  to  an   individual   and   consisting   of
    descriptions   or   notations   of  arrests,  detentions,
    indictments, informations, pre-trial proceedings, trials,
    or other formal events in the criminal justice system  or
    descriptions  or notations of criminal charges (including
    criminal violations of local  municipal  ordinances)  and
    the   nature   of   any  disposition  arising  therefrom,
    including sentencing, court or correctional  supervision,
    rehabilitation  and  release.  The term does not apply to
    statistical records and reports in which individuals  are
    not  identified  and  from which their identities are not
    ascertainable, or to information  that  is  for  criminal
    investigative or intelligence purposes.
         (e)  Records  that  relate to or affect the security
    of correctional institutions and detention facilities.
         (f)  Preliminary  drafts,  notes,   recommendations,
    memoranda   and  other  records  in  which  opinions  are
    expressed, or policies or actions are formulated,  except
    that  a  specific  record or relevant portion of a record
    shall not be exempt when the record is publicly cited and
    identified by the head of the public body. The  exemption
    provided  in  this  paragraph  (f)  extends  to all those
    records of officers and agencies of the General  Assembly
    that pertain to the preparation of legislative documents.
         (g)  Trade   secrets  and  commercial  or  financial
    information obtained from a person or business where  the
    trade  secrets or information are proprietary, privileged
    or confidential, or where disclosure of the trade secrets
    or information may cause competitive harm, including  all
    information  determined  to be confidential under Section
    4002 of the Technology Advancement and  Development  Act.
    Nothing   contained   in  this  paragraph  (g)  shall  be
    construed to prevent a person or business from consenting
    to disclosure.
         (h)  Proposals and bids for any contract, grant,  or
    agreement,   including   information  which  if  it  were
    disclosed  would  frustrate  procurement   or   give   an
    advantage  to  any  person  proposing  to  enter  into  a
    contractor  agreement  with  the  body, until an award or
    final selection is made.  Information prepared by or  for
    the  body  in  preparation of a bid solicitation shall be
    exempt until an award or final selection is made.
         (i)  Valuable  formulae,   designs,   drawings   and
    research  data  obtained  or  produced by any public body
    when disclosure could reasonably be expected  to  produce
    private gain or public loss.
         (j)  Test   questions,   scoring   keys   and  other
    examination  data  used   to   administer   an   academic
    examination   or  determined  the  qualifications  of  an
    applicant for a license or employment.
         (k)  Architects'  plans  and  engineers'   technical
    submissions  for projects not constructed or developed in
    whole or in part  with  public  funds  and  for  projects
    constructed or developed with public funds, to the extent
    that disclosure would compromise security.
         (l)  Library    circulation    and   order   records
    identifying library users with specific materials.
         (m)  Minutes of meetings of public bodies closed  to
    the public as provided in the Open Meetings Act until the
    public  body  makes  the  minutes available to the public
    under Section 2.06 of the Open Meetings Act.
         (n)  Communications between a  public  body  and  an
    attorney  or  auditor  representing  the public body that
    would not be subject  to  discovery  in  litigation,  and
    materials prepared or compiled by or for a public body in
    anticipation  of  a  criminal,  civil  or  administrative
    proceeding  upon  the request of an attorney advising the
    public body, and  materials  prepared  or  compiled  with
    respect to internal audits of public bodies.
         (o)  Information  received by a primary or secondary
    school, college or university under  its  procedures  for
    the  evaluation  of  faculty  members  by  their academic
    peers.
         (p)  Administrative   or    technical    information
    associated  with  automated  data  processing operations,
    including  but  not  limited   to   software,   operating
    protocols,  computer  program  abstracts,  file  layouts,
    source  listings,  object  modules,  load  modules,  user
    guides,  documentation  pertaining  to  all  logical  and
    physical   design   of   computerized  systems,  employee
    manuals, and any other information  that,  if  disclosed,
    would  jeopardize  the security of the system or its data
    or the security of materials exempt under this Section.
         (q)  Documents or materials relating  to  collective
    negotiating  matters  between  public  bodies  and  their
    employees  or  representatives,  except  that  any  final
    contract  or agreement shall be subject to inspection and
    copying.
         (r)  Drafts, notes,  recommendations  and  memoranda
    pertaining to the financing and marketing transactions of
    the  public body. The records of ownership, registration,
    transfer, and exchange of municipal debt obligations, and
    of  persons  to  whom  payment  with  respect  to   these
    obligations is made.
         (s)  The records, documents and information relating
    to   real   estate   purchase  negotiations  until  those
    negotiations have been completed or otherwise terminated.
    With regard to a parcel involved in a pending or actually
    and reasonably  contemplated  eminent  domain  proceeding
    under  Article  VII  of  the  Code  of  Civil  Procedure,
    records,  documents  and  information  relating  to  that
    parcel  shall  be  exempt  except as may be allowed under
    discovery rules adopted by the  Illinois  Supreme  Court.
    The records, documents and information relating to a real
    estate sale shall be exempt until a sale is consummated.
         (t)  Any and all proprietary information and records
    related  to  the  operation  of an intergovernmental risk
    management association or self-insurance pool or  jointly
    self-administered  health  and  accident  cooperative  or
    pool.
         (u)  Information     concerning    a    university's
    adjudication  of  student  or   employee   grievance   or
    disciplinary  cases,  to the extent that disclosure would
    reveal the  identity  of  the  student  or  employee  and
    information  concerning any public body's adjudication of
    student or employee  grievances  or  disciplinary  cases,
    except for the final outcome of the cases.
         (v)  Course  materials or research materials used by
    faculty members.
         (w)  Information  related  solely  to  the  internal
    personnel rules and practices of a public body.
         (x)  Information  contained   in   or   related   to
    examination, operating, or condition reports prepared by,
    on behalf of, or for the use of a public body responsible
    for   the   regulation   or   supervision   of  financial
    institutions or insurance companies, unless disclosure is
    otherwise required by State law.
         (y)  Information  the   disclosure   of   which   is
    restricted  under  Section  5-108 of the Public Utilities
    Act.
         (z)  Manuals or instruction to staff that relate  to
    establishment  or  collection  of liability for any State
    tax or that relate to investigations by a public body  to
    determine violation of any criminal law.
         (aa)  Applications,  related  documents, and medical
    records    received    by    the    Experimental    Organ
    Transplantation  Procedures  Board  and   any   and   all
    documents  or  other records prepared by the Experimental
    Organ  Transplantation  Procedures  Board  or  its  staff
    relating to applications it has received.
         (bb)  Insurance or  self  insurance  (including  any
    intergovernmental  risk  management  association  or self
    insurance  pool)  claims,   loss   or   risk   management
    information, records, data, advice or communications.
         (cc)  Information and records held by the Department
    of  Public  Health  and  its  authorized  representatives
    relating   to   known  or  suspected  cases  of  sexually
    transmissible disease or any information  the  disclosure
    of  which  is  restricted  under  the  Illinois  Sexually
    Transmissible Disease Control Act.
         (dd)  Information   the   disclosure   of  which  is
    exempted under Section 30 of the Radon Industry Licensing
    Act.
         (ee)  Firm performance evaluations under Section  55
    of  the  Architectural,  Engineering,  and Land Surveying
    Qualifications Based Selection Act.
         (ff)  Security portions  of  system  safety  program
    plans,  investigation reports, surveys, schedules, lists,
    data, or information compiled, collected, or prepared  by
    or   for  the  Regional  Transportation  Authority  under
    Section 2.11 of the Regional Transportation Authority Act
    or the State  of  Missouri  under  the  Bi-State  Transit
    Safety Act.
         (gg)  (ff)  Information  the  disclosure of which is
    restricted and exempted under Section 50 of the  Illinois
    Prepaid Tuition Act.
         (hh)  Information  that would disclose or might lead
    to the disclosure of secret or confidential  information,
    codes,  algorithms, programs, or private keys intended to
    be used to create electronic or digital signatures  under
    the Electronic Commerce Security Act.
    (2)  This  Section  does  not  authorize  withholding  of
information  or  limit  the  availability  of  records to the
public,  except  as  stated  in  this  Section  or  otherwise
provided in this Act.
(Source: P.A. 90-262, eff.  7-30-97;  90-273,  eff.  7-30-97;
90-546, eff. 12-1-97; revised 12-24-97.)

    Section  95-10.  The  State Comptroller Act is amended by
changing Section 14.01 as follows:
    (15 ILCS 405/14.01)
    Sec. 14.01.  Digital signatures.
    (a)  In any communication between a State agency and  the
Comptroller  in  which  a  signature is required or used, any
party to the communication may affix a signature by use of  a
digital signature that complies with the requirements of this
Section.   The use of a digital signature shall have the same
force and effect as the use of a manual signature if and only
if it embodies all of the following attributes:
         (1)  It is unique to the person using it.
         (2)  It is capable of verification.
         (3)  It is under the  sole  control  of  the  person
    using it.
         (4)  It  is  linked to data in such a manner that if
    the  data  are  changed,   the   digital   signature   is
    invalidated.
         (5)  It  conforms  to  regulations  adopted  by  the
    Comptroller.
    (b)  The  use  or acceptance of a digital signature shall
be at the option of the parties.   Nothing  in  this  Section
shall  require  a  State agency to use or permit the use of a
digital signature.
    (c)  "Digital signature" has the meaning ascribed to that
term  in  the  Electronic  Commerce  Security  Act  means  an
electronic identifier, created by computer, intended  by  the
party  using  it to have the same force and effect as the use
of a manual signature.
(Source: P.A. 90-37, eff. 6-27-97.)

    Section 95-15.  The Criminal Code of 1961 is  amended  by
changing Section 17-3 as follows:

    (720 ILCS 5/17-3) (from Ch. 38, par. 17-3)
    Sec. 17-3. Forgery.
    (a)  A  person  commits  forgery  when,  with  intent  to
defraud, he knowingly:
         (1)  makes or alters any document apparently capable
    of  defrauding another in such manner that it purports to
    have been made by another or at  another  time,  or  with
    different  provisions, or by authority of one who did not
    give such authority; or
         (2)  issues or delivers such document knowing it  to
    have been thus made or altered; or
         (3)  possesses, with intent to issue or deliver, any
    such  document  knowing  it  to  have  been  thus made or
    altered; or.
         (4)  unlawfully uses the signature device of another
    to create an electronic signature of that  other  person,
    as  those  terms  are  defined in the Electronic Commerce
    Security Act.
    (b)  An intent to defraud means  an  intention  to  cause
another  to  assume, create, transfer, alter or terminate any
right, obligation or power with reference to  any  person  or
property.
    (c)  A  document apparently capable of defrauding another
includes, but is not limited to,  one  by  which  any  right,
obligation  or power with reference to any person or property
may  be  created,  transferred,  altered  or  terminated.   A
document includes any record or electronic  record  as  those
terms are defined in the Electronic Commerce Security Act.
    (d)  Sentence.
    Forgery is a Class 3 felony.
(Source: P.A. 77-2638.)

                 ARTICLE 99.  EFFECTIVE DATE

    Section  99-1.  Effective  date.  This  Act  takes effect
July 1, 1999.

[ Top ]