HOME    SEARCH    ABOUT US    CONTACT US    HELP   
           
This is an obsolete version of the rule. Please click on the rule number to view the current version.

18.4.113    ACCEPTABLE TECHNOLOGY

(1) An acceptable technology must be capable of creating signatures that conform to the following requirements. The technology must:

(a) be unique to the person using it;

(b) be capable of verification;

(c) be under the sole control of the person using it;

(d) be linked to the data in such a manner that if the data are changed, the digital signature is invalidated; and

(e) conform to Title 2, chapter 20, part 1 of the Montana Code Annotated.

(2) The technology known as public key infrastructure is an acceptable technology for use by persons conducting business with the department, provided that the digital signature is created consistent with the provisions in Title 2, chapter 20, part 1, MCA, and these rules.

(3) Other technologies that may be existing or may be developed in the future will be deemed "acceptable" if they provide the same, or better, security as the public key infrastructure. These other technologies must be approved on a case-by-case basis by the department prior to use. These rules will be amended if necessary to adopt new acceptable technologies.

History: 2-20-105, MCA; IMP, 2-20-105, MCA; NEW, 2004 MAR p. 2915, Eff. 12/3/04.

Home  |   Search  |   About Us  |   Contact Us  |   Help  |   Disclaimer  |   Privacy & Security