(5 ILCS 175/15-105)
Secure electronic signature.
A digital signature that is
using an asymmetric algorithm certified by the Secretary of State under
item (2) of subsection (b) of
10-110 shall be
considered to be a qualified security procedure for purposes of identifying a
person under Section 10-110
(1) the digital signature was created during the
operational period of a valid certificate, was used within the scope of any other restrictions specified or incorporated by reference in the certificate, if any, and can be verified by reference to the public key listed in the certificate; and
(2) the certificate is considered trustworthy (i.e.,
an accurate binding of a public key to a person's identity) because the certificate was issued by a certification authority in accordance with standards, procedures, and other requirements specified by the Secretary of State, or the trier of fact independently finds that the certificate was issued in a trustworthy manner by a certification authority that properly authenticated the subscriber and the subscriber's public key, or otherwise finds that the material information set forth in the certificate is true.
(Source: P.A. 90-759, eff. 7-1-99