German Digital Signature Law (SigG)

Working Draft, November 4, 1996

Translation and Commentary by Christopher Kuner, Esq.

Morrison & Foerster LLP, Brussels

Translation copyright 1996 Christopher Kuner. Reproduction is permitted, provided that this translator's note, including the above copyright notice, is retained in its entirety.

Commentary: This translation is of the "Working Draft" of November 4, which contains several changes to the previous draft (the "Reporter's Draft" of September 19, 1996); changes from the previous draft are marked in boldface. The Law is expected to be approved by the German cabinet in late 1996 or early 1997 and to be enacted into law by parliament in the spring of 1997. Among the important changes from the previous draft are the following: (1) expanded authority of the government to charge for costs incurred in licensing of certifiers ( 4(6)); (2) greater use of associated certificates to demonstrate the licensing of professionals ( 5(2)); and (3) procedures for the fulfillment of technical requirements and recognition of certificates for EU or EEA Member States ( 14(5), 15). Changes have also been made to the Draft Digital Signature Ordinance; a revised translation thereof will be made available on this site shortly.

 1

Objective and Area of Application

(1) The purpose of this law is to create general conditions for digital signatures under which they may be deemed secure and forgeries of digital signatures or falsifications of signed data may be reliably ascertained.

(2) The application of other procedures for digital signatures is permitted insofar as digital signatures are not legally required under this law.

 2

Definitions

(1) A digital signature within the meaning of this law is a seal on digital data created with a private signature key, which seal allows, by use of the associated public key marked with a signature key certificate of a certifier or of the Authority under  3, the owner of the signature key and the unforged character of the data to be ascertained.

(2) A certifier within the meaning of this law is a natural or legal person which attests to the attribution of public signature keys to natural persons and holds a license therefor under  4.

(3) A signature key certificate within the meaning of this law is a digital attestation marked with a digital signature concerning the attribution of a public signature key to a natural person.

(4) A time stamp within the meaning of this law is a digital attestation of a certifier marked with a digital signature that certain digital data was presented to it at a certain time.

 3

The Authority

The granting of licenses and the issuance of signature key certificates for certifiers, as well as supervision of compliance with this law and with the Legal Ordinance under  16, rest with the Authority under  66 of the Telecommunications Act.

 4

Granting of Licenses for Certifiers

(1) The operation of a certifier requires a license of the Authority, which is to be granted upon application.

(2) The license shall be denied if there are factual grounds for the assumption that the applicant does not possess the reliability necessary for the operation of a certifier, if the applicant does not demonstrate that it possesses the necessary expert knowledge for the operation of a certifier, or if it can be expected that the further requirements for the operation of a certifier under this law and the Legal Ordinance under  15 will not be present upon commencing operations.

(3) An applicant possesses the necessary reliability if it can guarantee that it will comply as license holder with the relevant legal requirements for the operation of a certifier. The necessary expert knowledge is present if those persons working in the certifier possess the necessary knowledge, experience, and qualifications. The further requirements for the operation of the certifier are present if the measures for fulfilling the security requirements of this law and the Legal Ordinance under  16 are promptly notified to the Authority in a security plan, the implementation of which has been examined and verified by an instance recognized by the Authority.

(4) The license may contain subsidiary provisions, insofar as these are necessary to ensure that the certifier fulfills the requirements of this law and the Legal Ordinance under  16 upon commencing and during operations.

(5) The Authority issues the certificates for signature keys that are used to sign signature key certificates. The provisions for the issuance of signature key certificates by certifiers apply correspondingly for the Authority, which shall maintain access to the signature key certificates which it has issued at all times and for everyone over publicly-accessible telecommunications connections. This also applies to information concerning the addresses and telephone numbers of certifiers, the blocking of signature key certificates which it has issued, the termination of and the prohibition against performing licensed activities, as well as the revocation of licenses.

(6) Costs (fees and expenses) shall be imposed for public services under this law and the Legal Ordinance under  16.

 5

Issuing Signature Key Certificates and Time Stamps

(1) The certifier shall reliably identify persons who apply for a signature key certificate. It shall confirm the attribution of a public signature key to an identified person by a signature key certificate and shall maintain access to such, as well as to associated certificates (para. 2), at all times and for everyone over publicly-accessible telecommunications connections in a verifiable manner and with the agreement of the signature key owner.

(2) Upon request of an applicant, the certifier shall record information concerning the applicant's power of representation for a third party or its licensing by a third party in the signature key certificate or in a associated certificate, insofar as consent of the third party that such licensing or power of representation be recorded in a certificate is reliably demonstrated.

(3) Upon request of an applicant, the certifier shall record a pseudonym in the signature key certificate in place of the applicant's name.

(4) The certifier shall take measures so that data for signature key certificates cannot be forged or falsified in a way which is not visible. It shall furthermore take steps so that the confidentiality of a private signature key is guaranteed. Private signature keys may not be stored by a certifier.

(5) It shall use reliable personnel for the exercise of certification activities, and shall use technical components in accordance with  14 for making signature keys accessible and creating signature key certificates. This also applies to technical components which make possible the verification of signature key certificates under para. 1, sentence 2.

 6

Duty of Instruction

The certifier shall instruct the applicant under  5 para. 1 concerning the measures necessary to contribute to secure digital signatures and their reliable verification. It shall instruct the applicant concerning which technical components fulfill the requirements of  14, paras. 1 and 2, as well as concerning the attribution of digital signatures created with a private signature key. It shall point out to the applicant that data with digital signatures may need to be re-signed before the security value of an available signature decreases with time.

 7

Contents of Signature Key Certificates

(1) A signature key certificate shall contain at least the following:

1. The name of the signature key owner, which much be marked with an additional notation if there is the possibility of confusion, or with an unmistakable pseudonym attributable to the signature key owner which shall be identified as such;

2. the attributed public signature key;

3. the name of the algorithms with which the public key of the signature key owner as well as the public key of the certifier can be used;

4. the number of the certificate;

5. the beginning and end of the certificate's validity;

6. the name of the certifier;

7. information as to whether use of the signature key is limited to specific types and scopes of applications; and

8. information concerning associated certificates.

(2) Information concerning the power of representation for a third party or licensing by a third party may be recorded in the signature key certificate or associated certificates.

 8

Blocking of Signature Key Certificates

(1) A certifier shall block a signature key certificate or an associated certificate upon request of a signature key owner or his representative if the certificate was issued based on false information under  7, if the certifier ends its activities and they are not continued by another certifier, or if the Authority orders blocking under  13, para. 5, sentence 2. The blocking shall indicate the time from which it applies. Retroactive blocking is not permitted.

(2) If a certificate contains information about a third party, such party as well may demand blocking of the certificate.

(3) The Authority shall block certificates issued by it under  4, para. 5 if a certifier terminates its activities or its license is revoked.

 9

Time Stamps

A certifier shall mark digital data upon request with a time stamp. Section 5, para. 5, sentences 1 and 2 apply accordingly.

 10

Documentation

A certifier shall document the security measures taken to comply with this law and the Legal Ordinance under  16 as well as the issued signature key certificates in such a way that the data and its unfalsified condition may be verified at any time.

 11

Termination of Activities

(1) Upon termination of its activities, a certifier shall notify this to the Authority as soon as possible and shall ensure that signature key certificates valid at the time of termination are taken over by another certifier or are blocked.

(2) It shall transfer documentation under  10 to the certifier that takes over its certificates, or otherwise to the Authority.

(3) It shall immediately notify the Authority of any application for the opening of bankruptcy or composition proceedings.

 12

Data Protection

(1) The certifier may collect personal data only directly from the affected person and only insofar as necessary for the purposes of a signature key certificate. Collecting data from a third party is only permissible if the person affected gives his consent. Data may only be used for purposes other than those described in sentence 1 if this law or another legal provision so permits or the person affected has given his consent.

(2) In the case of a signature key owner using a pseudonym, the certifier shall transmit data concerning his identity in individual cases only upon request of the proper authorities, insofar as this is necessary to prosecute crimes or misdemeanors, to protect against dangers for the public safety or public order, or to fulfill the legal duties of the constitutional protection authorities of the federal government and the federal states, the federal security service, the military security service or the criminal customs authorities. Such information shall be documented.

(3) Section 38 of the Federal Data Protection Act shall apply, with the proviso that an examination may also be made even if there are no grounds for a violation of data protection provisions.

 13

Control and Implementation of Responsibilities

(1) The Authority may take steps with regard to certifiers in order to ensure compliance with this law and the Legal Ordinance. It may also and in particular forbid the use of inappropriate technical components and forbid the exercise of licensed activities temporarily in whole or in part. Persons who give the false impression of having a license under  4 may be forbidden to perform certification.

(2) Certifiers shall allow the Authority to enter their business and operational premises during normal business hours for the purpose of supervision under para. 1, sentence 1, and upon request shall present any relevant books, records, receipts, writings, and other records for inspection, and shall provide information and necessary assistance. The person required to provide the information may refuse to provide it with regard to questions, the answering of which would subject him or one of his family members mentioned in  383 paras. 1 through 3 of the Civil Procedure Code to the danger of criminal prosecution or to a procedure under the Law on Misdemeanors. The person required to provide the information shall be informed of this right.

(3) In case of non-compliance with the duties arising under this law or the Legal Ordinance, or upon the coming into existence of a ground for refusing a license, the Authority shall revoke such license, if measures in accordance with para. 1, sentence 2 seem likely to be unsuccessful.

(4) In case of revocation of a license or the termination of activities of a certifier, the Authority shall ensure that such activity is taken over by another certifier or that contracts with signature key owners are wound up. This also applies with regard to an application for the opening of bankruptcy or composition proceedings, if the licensed activity is not being continued.

(5) The validity of signature key certificates issued by a certifier shall be unaffected by revocation of a license. The Authority may order blocking of signature key certificates if facts justify the assumption that certificates have been forged or are not sufficiently secure from forgery, or that the technical components used for application of signature keys demonstrate security defects which allow the forgery of digital signatures or the falsification of signed data to go undetected.

 14

Technical Components

(1) During the creation and storage of signature keys and the creation and checking of digital signatures, technical components shall be used which have security features that make forgery of digital signatures and falsification of signed data reliably visible and protect against the unauthorized use of private signature keys.

(2) For the representation of data which is to be signed, technical components with security features shall be used which show unmistakably and in advance the creation of a digital signature and allow a determination of the data to which the digital signature refers. For the checking of signed data, technical components shall be used which have security features that allow it to be determined whether the signed data are unchanged, to which data the digital signature refers, and to which signature key owner the digital signature is to be attributed.

(3) With regard to technical components with which signature key certificates are maintained in a verifiable or accessible manner in accordance with  5, para. 1, sentence 2, measures shall be taken in order to protect the certificate registries from unauthorized alteration and access.

(4) With regard to technical components under paras. 1 to 3, they shall be sufficiently examined under the state of the art and the fulfillment of the requirements shall be verified by an instance recognized by the Authority.

(5) It can be assumed that the requirements under paras. 1 and 2 regarding technical security are fulfilled with regard to technical components which are placed in circulation or legally manufactured in accordance with the rules or requirements of another Member State of the European Union or of another Contracting State of the Treaty on the European Economic Area, and which guarantee the same level of security. In individual cases and when there is a good reason, the Authority may require a demonstration that the requirements under para. 1 have been fulfilled. Insofar as a confirmation of an instance recognized by the Authority is required to be presented to demonstrate technical security requirements within the meaning of paras. 1 through 3, then confirmations by authorities licensed in other Member States of the European Union or in other Contracting States of the European Economic Area shall be considered, if the technical requirements, examinations, and examination procedures on which the examination reports of such instances are based are equivalent to the those of instances recognized by the German authorities.

 15

Foreign Signature Key Certificates

(1) Digital signatures which may be checked with a public signature key for which a foreign signature key certificate of another Member State of the European Union or of another Contracting State of the Treaty on the European Economic Area exists are deemed to be equivalent to digital signatures under this law.

(2) Para. 1 also applies to other States, insofar as supranational or international agreements concerning the recognition of signature key certificates have been concluded.

 16

The Legal Ordinance

The federal government is empowered to promulgate by Legal Ordinance the provisions necessary to implement  3 through 15, with regard to:

1. Further details of the procedure for granting, transfer, and revocation of a license, as well as the procedure for termination of licensed activities;

2 The circumstances giving rise to fees under  4, para. 6, the amount of fees, and the reimbursement of expenses under the Act on Administrative Costs;

3. Further structuring of the duties of certifiers;

4. The validity period of signature key certificates;

5. Further structuring of control over certifiers;

6. Further requirements for the technical components as well as the examination of technical components and confirmation that the requirements have been fulfilled;

7. The time period after which a new digital signature should be used, as well as the procedure therefor.

END