30 Tex. Admin. Code § 19.12 - Authorized Electronic Signature
(a) When
the electronic signature device is used to create an individual's electronic
signature, the code or mechanism must be unique to that individual at the time
the signature is created and the individual must be uniquely entitled to use
it. Signatories shall:
(1) protect the
electronic signature device from compromise; and
(2) report to the commission any evidence
that the device has been compromised, within one business day of the
discovery.
(b) An
electronic signature device is compromised if the code or mechanism is
available for use by any other individual.
(c) An electronic document must bear the
valid electronic signature of a signatory if that signatory is required under
the authorized program or the state program to sign the paper document for
which the electronic document substitutes.
(d) An electronic signature on an electronic
document is valid if it has been created with an electronic signature device
that the identified signatory is uniquely entitled to use for signing that
document; the device has not been compromised; and the signatory is an
individual who is authorized to sign the document by virtue of his or her legal
status and/or his or her relationship to the entity on whose behalf the
signature is executed.
(e) The
presence of an electronic signature on an electronic document submitted to the
commission establishes that the signatory intended to sign the electronic
document and to submit it to the commission to fulfill the purpose of the
electronic document.
Notes
State regulations are updated quarterly; we currently have two versions available. Below is a comparison between our most recent version and the prior quarterly release. More comparison features will be added as we have more versions to compare.
No prior version found.