(iv) backup practices; and
(v) audit procedures to assure the continuing integrity of the
records;
(e) that the person keeps the computer in a good state of repair;
and
(f)

that the computer was in working order at the time the witness
obtained the readout.

4. Self-authenticating data messages.
For the purposes of regulation (3) (a) a data message is selfauthenticating if—
(a) the message has a sign, inscription, logo, tag or other unique
feature identifying it with a particular business, institution or
person and the origin of the message is not in dispute;
(b) the message can be attributed to the originator under section
19 of the Act.
5.

Use of harsh marks or metadata
(1) A data message may be authenticated by use of its harsh marks
or metadata.
(2) For the purpose of this regulation—
(a) “harsh mark” refers to a unique identifier attached to a data
message;
(b) “metadata” means information describing the history,
tracking, or management of a data message and includes
information showing the date or person creating or accessing
the data message or transmittal information.
857

Select target paragraph3