(b) any other entity that processes or stores computer data on
behalf of such a communication service or users of such
a service.
PART II—AUTHENTICITY AND INTEGRITY OF DATA MESSAGE
3.
Authenticity of data message
(1) For the purposes of section 7 of the Act, where the authenticity
of a data message is in issue, the authenticity shall be proved by
evidence showing that—
(a) the data message is self-authenticating;
(b) the data message has a harsh mark or metadata;
(c) the data message is a public record; or
(d) there is factual specificity about the process by which the
information is created, acquired, maintained and preserved,
including evidence prescribed in sub regulation (2).
(2) The evidence referred to in sub regulation (1) is as follows—
(a) that the person uses the computer from which the message
originates;
(b) that the computer is reliable;
(c) that the person has developed a procedure for inserting data
into the computer;
(d) that the procedure has built-in safeguards to ensure accuracy
and identify errors such as the computer policy and system
control procedures, including—
(i)
control of access to the database;
(ii) control of access to the program;
(iii) recording and logging of changes;
856