The National Marine Fisheries Service Policy Directive 32-110, "Use and Implementation of Electronic Signatures" outlines the following requirements for an approved electronic signature system:

  1. Technical non-repudiation services
  2. Legally binding the electronic transaction to an entity
  3. Providing chain of custody audit trails
  4. Providing an electronic receipt or acknowledgment of a successful submission
  5. Collecting only necessary information in the electronic signature authentication process
  6. Create a long-term retention and access policy
  7. Periodic review and re-evaluation of the electronic signature process

This sections documents design details that address these requirements.

Binding the Transaction to an Entity and Non-repudiation

Requirements 1 and 2 above are addressed in the design of three component parts of the system:

The WCEFT E-Signature Risk Assessment has concluded that OMB Assurance Level 2 (confidence exists in the asserted identity) was appropriate for the West Coast E-fishticket. This was a considered decision justified by low likelihood of occurrence, low and moderate impact of harm, and multiple and strong mitigating controls, including: multiple and sometimes counter-balancing sources of information; permitted entities with an ongoing trusted relationship with NMFS; faster detection of reporting omissions; and immediate feedback for detectable errors. Note that the identity is established from association with an existing processing permit, and not through the registration to submit fish tickets electronically.

The proposed identity assertion, person proofing, and registration starts with a permit holder completing a NMFS electronic fish ticket agreement, establishing a linkage between the processing permit, the permit holder, and the processor employee(s) who is/are authorized to submit electronic fish tickets for that permit. (See Identity Assertion, Person Proofing and Registration for a broader discussion of these issues and alternatives.)

Terms and conditions presented during registration and the signing ceremony contribute to binding the transaction to the entity and non-repudiation. (See terms and conditions and signing ceremony for a broader discussion of these issues and alternatives.) Terms and conditions specified during the registration process include the following statement on the paper form just above the required signature block:

Dave or Dayna needs to fill this in

Terms and conditions presented during the signing ceremony (when the processor has entered fish ticket data into the program and is submitting the data to NMFS) includes the following statement just above the required signature block:

By typing my name in the indicated fields, I hereby certify that all of the information submitted in, and in support of, this fish ticket is true, accurate and complete. I am also agreeing to conduct business electronically with the National Oceanic and Atmospheric Administration in accordance with the Government Paperwork Elimination Act (GPEA) (P.L. 105-277, 44 U.S.C. 3504 note). I understand that transactions and/or signatures in records may not be denied legal effect solely because they are conducted, executed, or prepared in electronic form, and that if a law requires a record or signature to be in writing, an electronic record or signature satisfies that requirement. I further understand that false statements made knowingly and willfully on this submission are punishable by fine and/or imprisonment under the provisions of 16 U.S.C. §1857 and 18 U.S.C. §1001.

The signer must make a willful act to demonstrate that they have read and agreed with the statement above. They must place a check mark in a check box that is labeled "I have read and understand the statement above." In addition to placing a check mark in the check box, the applicant must also type their name and their password to complete the electronic signing ceremony. Attempting to proceed to the next step of the electronic transaction without completing the above steps will cause the system to display a message instructing the applicant that they must read the terms and conditions statement, enter their name, and their password before their information will be accepted.

Technically the transaction data is bound to entity identity data by the signer's name captured in the electronic signature and also specified in the registration data, and by a shared identifier (permit number) in the registration data (electronic fish ticket agreement), the processor permit database, and the e-ticket submission. (See document binding and integrity for a broader discussion of these issues and alternatives.)

No authentication token and protocol issues are involved in this non-repudiation. Technical controls for document integrity and audit trails contribute to binding the transaction to the entity and non-repudiation, but those controls are more appropriately discussed in the next section.

Providing Chain of Custody Audit Trails

NMFS policy directive 32-110 specifies "...audit trails that ensure the chain of custody for the transaction. These audit trails should identify the sending location, sending individual or entity, date and time stamp of receipt, and other measures that will ensure the integrity of the document. These audit trails must validate the integrity of the transaction and prove: (1) that the connection between the submitter and NMFS has not been tampered with; and (2) how the document was controlled upon receipt by NMFS."

The proposed design implements the following audit trail controls for submission of e-tickets via email:

Dave or Dayna needs to re-write section below to describe how you actually get submissions through email or web

  1. The NMFS email interface program will run periodically (perhaps every 5 minutes), login to the postoffice, and open the inbox.
  2. The email interface program will consider every message currently in the inbox, and for each message:
    1. Log receipt of the email message into audit trail tables.
    2. If the email message is recognized (recognized messages were generated by e-ticket software and submitted by registered permit holders).
      1. Generate a unique e-ticket message identier.
      2. Handle possible return-receipt-requested.
      3. Extract e-ticket message payload(s) (zip attachments)
        1. For each e-ticket payload:
        2. Log receipt of payload into audit trail tables.
        3. Unzip and unmarshall the payload, creating an e-ticket object; if payload cannot be unzipped or unmarshalled the receipt is formed from the raw input data and unzip/unmarshall errors are noted and logged.
        4. Process the e-ticket object, inserting into the database (if possible) and creating a receipt (appropriate data checks are applied in this step and any errors noted in the receipt.)
        5. Return the receipt to the appropriate party.
        6. Log the result into audit trail tables.
  3. These audit trail data items should be written to audit trail tables by the email interface application using a database account which has insert privileges to the database but does not have update or delete privileges. (And update and delete privileges on the audit trail tables should be carefully controlled by the database administrator.)

Providing an Electronic Receipt or Acknowledgment of a Successful Submission

The proposed receipt process is as follows:

  1. After the data import program has interpreted (or attempted to interpret) the submitted e-logbook data, the data import program writes a receipt file. The proposed receipt will consist of

    Dave or Dayna needs to describe the receipt and check that the statements below are accurate

  2. Assuming that the data import was successful, or at least successful enough that the e-ticket's permit could be ascertained, the receipt file will also be emailed directly by the data import program to the address of record for the permit holder
  3. If the receipt file cannot be emailed directly to the address of record for the permit holder the operator executing the data import program is notified so that they can take steps to inform the submitter

Collecting Only Necessary Information in the Electronic Signature Authentication Process

Since the proposed system relies heavily on mitigating controls, no additional information is collected specifically for the e-signature process.

Create a Long-Term Retention and Access Policy

Retention and access policies already exist for this logbook data under NOAA file series 1505-11, Catch Statistics Files. This section discusses the special records management considerations which arise due to incorporation of an electronic signature.

NMFS policy directive 32-110 specifies

Electronic audit trails must provide a chain of custody for the secure electronic transaction that can be used to ensure the integrity of the document. The audit trail information may be needed for audits, disputes, or court cases many years after the transaction itself took place and long-term retention of not only the signed document but the accompanying audit trail should be addressed (See Sub-section 6 below).... As a general rule when the risk associated with a transaction increases the number of components tracked as part of the audit trail should increase.... The original
document along with it audit trail should not be deleted from the agency's records.... Additional information on audit trails can be found in the NARA guidelines for records management with regard to implementing electronic signatures Records Management Guidance for Agencies Implementing Electronic Signature Technologies.

NARA's Records Management Guidance for Agencies Implementing Electronic Signature Technologies section 4.1 establishes characteristics of trustworthy records in terms of reliability, authenticity, integrity, and usability. NARA advises that these characteristics are a matter of degree. Transactions that are critical to the agency business needs may need a greater assurance level that they are reliable, authentic, maintain integrity and are usable than transactions of less critical importance.

The guidance document section 4.2 states "for a record to remain reliable, authentic, with its integrity maintained, and usable for as long as the record is needed, it is necessary to preserve its content, context, and sometimes its structure."

Dave or Dayna needs to check that the statements below are accurate

The proposed e-signature enabled system preserves content (ticket data), context (audit trail data and permit data), and structure (links among related tables) by maintaining a historical record of all changes to its database tables. Updates to the data result in inserts into history tables, leaving the prior values intact in the history records. Deletions of data result in insertions into history tables that indicate that the prior data is no longer valid. But in all cases, the history records allow reconstruction of a point-in-time view of the data.

The guidance document section 4.3 describes two approaches to ensuring the trustworthiness of electronically-signed records over time. This e-signature implementation will maintain documentation of record validity (including trust verification records, or audit trails) gathered at or near the time of record signing (the first approach specified).

The guidance document section 4.4 describes steps to ensure trustworthy electronically-signed records as follows:

Other considerations raised in the guidance document include:

Periodic Review and Re-Evaluation of the Electronic Signature Process

The proposed e-signature system should be reviewed annually for several years, as this technology is unfamiliar to the agency and our customers and we expect to learn from experience.