850.106—Electronic signatures.

(a) Subject to any provisions prescribed by the Director under § 850.104
(1) An electronic communication may be deemed to satisfy any statutory or regulatory requirement under CSRS, FERS, FEGLI, FEHB or RFEHB for a written election, notice, application, consent, request, or specific form format;
(2) An electronic signature of an electronic communication may be deemed to satisfy any statutory or regulatory requirement under CSRS, FERS, FEGLI, FEHB or RFEHB that an individual submit a signed writing to OPM;
(3) An electronic signature of a witness to an electronic signature may be deemed to satisfy any statutory or regulatory requirement under CSRS, FERS, FEGLI, FEHB or RFEHB for a signature to be witnessed; and
(4) Any statutory or regulatory requirement under CSRS, FERS, FEGLI, FEHB or RFEHB that a signature be notarized may be satisfied if the electronic signature of the person authorized to sign is attached to or logically associated with all other information and records required to be included by the applicable statute or regulation.
(b) For purposes of this section, an electronic signature is a method of signing an electronic communication, including an application, claim, or notice, designation of beneficiary, or assignment that—
(1) Identifies and authenticates a particular person as the source of the electronic communication; and
(2) Indicates such person's approval of the information contained in the electronic communication.
(c) The Director will issue directives under § 850.104 that identify the acceptable methods of effecting electronic signatures for particular purposes under this part. Acceptable methods of creating an electronic signature may include—
(1) Non-cryptographic methods, including—
(i) Personal Identification Number (PIN) or password;
(ii) Smart card;
(iii) Digitized signature; or
(iv) Biometrics, such as fingerprints, retinal patterns, and voice recognition;
(2) Cryptographic control methods, including—
(i) Shared symmetric key cryptography;
(ii) Public/private key (asymmetric) cryptography, also known as digital signatures;
(3) Any combination of methods described in paragraphs (c)(1) and (c)(2) of this section; or
(4) Such other means as the Director may find appropriate.