(iv)

make forgery of digital signatures and falsification of signed data

reliably noticeable and protect against the unauthorised use of the private key;
(c) for the purpose of collecting identification data, technical components that
function in a manner that—
(i)

does not reveal the identification data; and

(ii)

ensures that the identification data is stored only on the data storage

medium with the private key;
(d)

for the representation of data to which a signature is to be applied or
associated, technical components that have security features which—

(i)

show unmistakably and in advance the creation of a digital signature; and
(ii)

allow a determination of the data to which the digital signature

refers;
(e)

for the purposes of checking signed data, technical components that have
security features which allow the determination of —
(i)

whether the signed data are unchanged;

(ii)

which date the digital signature refers; and

(iii)

which private key owner the digital signature is to be attributed;

(f)

in the case of verifying certificates, technical components that allow clear
and reliable determination of whether verified certificates were present,
without having been invalidated, in the published with a recognized
repository;

(g)

in the case of a record maintained for the purposes of disclosure to the

certification authority or any other record maintained in a verifiable or accessible
manner under the Act or these Regulations, technical components that protect—
(i)

the data storage mediums in which the records are stored; and

(ii)

the repositories in which the records are published,

from unauthorized access and unauthorized modification;
(h)

for the generation of time-stamps, technical components that function in

Select target paragraph3