1311.25—Requirements for obtaining a CSOS digital certificate.
The unqualified name “whipped cream” should not be applied to any product other than one made by whipping the cream that complies with the standards of identity for whipping cream ( §§ 131.150 and 131.157 of this chapter ). If flavoring and/or sweetening is added, the resulting product is a flavored and/or sweetened whipped cream, and should be so identified.
(a)
To obtain a certificate to use for signing electronic orders for controlled substances, a registrant or person with power of attorney for a registrant must complete the application that the DEA Certification Authority provides and submit the following:
(1)
Two copies of identification, one of which must be a government-issued photographic identification.
(2)
A current listing of DEA registrations for which the individual has authority to sign controlled substances orders.
(4)
An acknowledgment that the applicant has read and understands the Subscriber Agreement and agrees to the statement of subscriber obligations that DEA provides.
(b)
The applicant must provide the completed application to the registrant's coordinator for CSOS digital certificate holders who will review the application and submit the completed application and accompanying documentation to the DEA Certification Authority.
(c)
When the Certification Authority approves the application, it will send the applicant a one-time use reference number and access code, via separate channels, and information on how to use them. Using this information, the applicant must then electronically submit a request for certification of the public digital signature key. After the request is approved, the Certification Authority will provide the applicant with the signed public key certificate.
(d)
Once the applicant has generated the key pair, the Certification Authority must prove that the user has possession of the key. For public keys, the corresponding private key must be used to sign the certificate request. Verification of the signature using the public key in the request will serve as proof of possession of the private key.