(iv)
make forgery of digital signatures and falsification of signed data
reliably noticeable and protect against the unauthorised use of the private key;
(c) for the purpose of collecting identification data, technical components that
function in a manner that—
(i)
does not reveal the identification data; and
(ii)
ensures that the identification data is stored only on the data storage
medium with the private key;
(d)
for the representation of data to which a signature is to be applied or
associated, technical components that have security features which—
(i)
show unmistakably and in advance the creation of a digital signature; and
(ii)
allow a determination of the data to which the digital signature
refers;
(e)
for the purposes of checking signed data, technical components that have
security features which allow the determination of —
(i)
whether the signed data are unchanged;
(ii)
which date the digital signature refers; and
(iii)
which private key owner the digital signature is to be attributed;
(f)
in the case of verifying certificates, technical components that allow clear
and reliable determination of whether verified certificates were present,
without having been invalidated, in the published with a recognized
repository;
(g)
in the case of a record maintained for the purposes of disclosure to the
certification authority or any other record maintained in a verifiable or accessible
manner under the Act or these Regulations, technical components that protect—
(i)
the data storage mediums in which the records are stored; and
(ii)
the repositories in which the records are published,
from unauthorized access and unauthorized modification;
(h)
for the generation of time-stamps, technical components that function in