Literary Warrant for Functional Requirement #8a

This requirement derives from the law, customs, standards and professional best practices accepted by society and codified in the literature of different professions concerned with records and recordkeeping. The warrant is as follows:
Citation "Procedures and General Requirements" `NVLAP' National Voluntary Laboratory Accreditation Program (U.S. Department of Commerce/Technology Administration and National Institute of Standards and Technology, NIST Handbook 150)
Pages 8
Extract The name of at least one Approved Signatory must appear on all calibration or test reports endorsed with the NVLAP logo or referencing NVLAP accreditation.

Citation Guttman, B. Computer security considerations in Federal procurements. NIST Special Pub 800- 4.
Pages 64
Extract Identification and authentication are basic building blocks of security features in systems. For many systems, every user initiated activity within the system (e.g., accessing or printing a file, sending a message) should be attributable to a user of the system.

Citation Bradgate, R. Evidential Issues of EDI. In: EDI & the Law. 1989.
Pages 32
Extract In general, signed documents are regarded as possessing special evidential weight. Signature of transaction documents and transaction records generally has the effect of authenticating those records in that the signature (a) identifies the signer as party to the transaction and (b) indicates his assent to the contents of the signed document.

Citation Wright, B. The Law of electronic commerce. 1991.
Pages 105-106
Extract In simple form, the data controls in and electronic messaging system might be analyzed as follows: 1. Controls ... which ensure transaction originators are identified ...

Citation Saltman, R. Good security practices for electronic commerce, including electronic data interchange.
Pages 21
Extract The following are basic objectives for the security of EDI transaction sets: ... 4) Sender authentication. The recipient can verify the originator.