Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

    • Environmental Topics
    • Air
    • Bed Bugs
    • Cancer
    • Chemicals, Toxics, and Pesticide
    • Emergency Response
    • Environmental Information by Location
    • Health
    • Land, Waste, and Cleanup
    • Lead
    • Mold
    • Radon
    • Research
    • Science Topics
    • Water Topics
    • A-Z Topic Index
    • Laws & Regulations
    • By Business Sector
    • By Topic
    • Compliance
    • Enforcement
    • Laws and Executive Orders
    • Regulations
    • Report a Violation
    • Environmental Violations
    • Fraud, Waste or Abuse
    • About EPA
    • Our Mission and What We Do
    • Headquarters Offices
    • Regional Offices
    • Labs and Research Centers
    • Planning, Budget, and Results
    • Organization Chart
    • EPA History

Breadcrumb

  1. Home
  2. Cross-Media Electronic Reporting Rule
  3. CROMERR 101 Training
  4. Lesson 7: From Requirements to Solutions

Lesson 7: Key Decision 1 - Type of Credential Used

  • How Credentials Are Issued
    • Most credentials issued by or registered with the system require protection as they travel between registrant and system.
    • Credentials that are registered (rather than issued) may need the system to enforce strength requirements and—where issued by a third party—ensure authenticity.
    • Credentials that incorporate biometrics or include cryptographic keys will need specialized technologies to support them.
    • Credentials issued in connection with hardware tokens will require support for users' implementation.
  • Approach to Binding Signatures to Document Content
    • Credentials that include cryptographic keys may execute signatures that are automatically bound to the document being signed by incorporating a message digest or hash value uniquely related to the document content.
    • Other kinds of credentials lack this functionality, and so require an independent approach to signature binding.
  • How Signatures Are Validated
    • Signatures executed with third party credentials require interaction with the issuing authority to determine that the credentials are authentic.
    • Credentials that provide cryptographic keys may require decryption functionality for validation of the signatures they execute.
  • How Signatures Are Included in the COR As defined in § 3.3 of CROMERR, a true and correct copy of an electronic document received by an electronic document receiving system, which copy can be viewed in a human-readable format that clearly and accurately associates all the information provided in the electronic document with descriptions or labeling of the information. A copy of record includes: 1) All electronic signatures contained in or logically associated with that document; 2) The date and time of receipt; and 3) Any other information used to record the meaning of the document or the circumstances of its receipt.

    Credentials that are included "in the clear" in the signatures they execute (for example, as a PIN or password) need to be "shielded" in some way on the copies of record (COR), for example, by being encrypted or hashed.

Back | Next

Cross-Media Electronic Reporting Rule

  • Learn about the Cross-Media Electronic Reporting Rule (CROMERR)
  • CROMERR 101 Training
    • Lesson 1: Overview of the Final Rule
      • Lesson 1: What Does the Rule Do?
      • Lesson 1: What Does the Rule NOT Do?
      • Lesson 1: Who is Affected?
      • Lesson 1: When Does the Rule NOT Apply?
      • Lesson 1: End of Lesson
    • Lesson 2: Quick Tour of the Final Rule
      • Lesson 2: End of Lesson
    • Lesson 3: Application Requirements
      • Lesson 3: Required Elements of a CROMERR Application
      • Lesson 3: Typical Application Components
      • Lesson 3: Cover Sheet
      • Lesson 3: Attorney General (AG) Certification
      • Lesson 3: System Description(s)
      • Lesson 3: Submitting the Application
      • Lesson 3: End of Lesson
    • Lesson 4: The EPA Review and Approval Process under Part 3
      • Lesson 4: Technical Review Committee (TRC)
      • Lesson 4: End of Lesson
    • Lesson 5: CROMERR-Compliant Electronic Reporting
      • Lesson 5: Overview of CROMERR Requirements for Electronic Reporting
      • Lesson 5: Requirements for Authorized Program e-Reporting
      • Lesson 5: Standards for an Acceptable Electronic Document Receiving System
      • Lesson 5: Defining "Valid Electronic Signatures"
      • Lesson 5: System Requirements for Receiving e-Signatures
      • Lesson 5: Priority vs. Non-Priority Reports
      • Lesson 5: Title: Enforceability Provisions
      • Lesson 5: Title: End of Lesson
    • Lesson 6: Using the Checklist to Work through System Requirements
      • Lesson 6: Registration
      • Lesson 6: Signature Process
      • Lesson 6: Submission Process
      • Lesson 6: Signature Validation
      • Lesson 6: Copy of Record (COR)
      • Lesson 6: The CROMERR Requirements and the Checklist Items
      • Lesson 6: End of Lesson
    • Lesson 7: From Requirements to Solutions
      • Lesson 7: From Requirements to Specific Solutions
      • Lesson 7: From Requirements to Specific Solutions Two Key Decisions
      • Lesson 7: Key Decision 1 - Type of Credential Used
      • Lesson 7: Key Decision 1 - Type of Credential Used (continued)
      • Lesson 7: Key Decision 2 - Defining the Copy of Record (COR)
      • Lesson 7: From Key Decisions to CROMERR-Compliant Solutions
      • Lesson 7: End of Lesson
    • Lesson 8: Four Critical Checklist Items
      • Lesson 8: CROMERR System Checklist Items
      • Lesson 8: Additional Sample Solutions
      • Lesson 8: End of Lesson
  • Overview for CROMERR
  • Program Announcements & Initiatives
  • Approved CROMERR Applications
  • CROMERR Federal Register Notices
  • Application Tools & Templates
  • Sample Applications & Checklists
  • Glossary
  • Frequently Asked Questions
  • Help Desk
Contact Us about Cross-Media Electronic Reporting Rule
Contact Us to ask a question, provide feedback, or report a problem.
Last updated on October 29, 2024
  • Assistance
  • Spanish
  • Arabic
  • Chinese (simplified)
  • Chinese (traditional)
  • French
  • Haitian Creole
  • Korean
  • Portuguese
  • Russian
  • Tagalog
  • Vietnamese
United States Environmental Protection Agency

Discover.

  • Accessibility Statement
  • Budget & Performance
  • Contracting
  • EPA www Web Snapshot
  • Grants
  • No FEAR Act Data
  • Plain Writing
  • Privacy
  • Privacy and Security Notice

Connect.

  • Data
  • Inspector General
  • Jobs
  • Newsroom
  • Regulations.gov
  • Subscribe
  • USA.gov
  • White House

Ask.

  • Contact EPA
  • EPA Disclaimers
  • Hotlines
  • FOIA Requests
  • Frequent Questions
  • Site Feedback

Follow.