{
    "version" : "https://jsonfeed.org/version/1",
    "content" : "news",
    "type" : "single",
    "title" : "Digital Autopen Playbook pinpoints how agencies can leverage technology for digital signatures |Digital.gov",
    "description": "Digital Autopen Playbook pinpoints how agencies can leverage technology for digital signatures",
    "home_page_url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/","feed_url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2023/05/23/digital-autopen-playbook-pinpoints-how-agencies-can-leverage-technology-for-digital-signatures/index.json","item" : [
    {"kicker" : "<no value>","title" :"Digital Autopen Playbook pinpoints how agencies can leverage technology for digital signatures","deck" : "How to create and use a digital autopen for Federal Register documents","summary" : "The Digital Autopen Playbook is a practical guide to help federal agencies create and use a digital autopen for Federal Register documents.","date" : "2023-05-23T15:48:00-05:00","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"kenneth-myers" : "Kenneth Myers","tyler-jones" : "Tyler Jones"},"topics" : {
        
            "security" : "Security"
            },"primary_image" : { "uid" : "ficam-digital-autopen-playbook-website", "alt" :
  "Screen capture of the Digital Autopen Playbook website homepage on IDmanagement.gov.", "width" :
  "1200", "height" :
  "630", "credit" :
  "", "caption" :
  "", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2023-05-23-digital-autopen-playbook-pinpoints-how-agencies-can-leverage-technology-for-digital-signatures.md",
      
      "filepath" :"news/2023/05/2023-05-23-digital-autopen-playbook-pinpoints-how-agencies-can-leverage-technology-for-digital-signatures.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2023/05/2023-05-23-digital-autopen-playbook-pinpoints-how-agencies-can-leverage-technology-for-digital-signatures.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2023/05/2023-05-23-digital-autopen-playbook-pinpoints-how-agencies-can-leverage-technology-for-digital-signatures.md","slug" : "digital-autopen-playbook-pinpoints-how-agencies-can-leverage-technology-for-digital-signatures","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2023/05/23/digital-autopen-playbook-pinpoints-how-agencies-can-leverage-technology-for-digital-signatures/","weight" : "1","content" :"\u003cp\u003eEach day, federal agencies publish documents in the Federal Register—including proposed rules, final rules, public notices, and presidential actions.\u003c/p\u003e\n\n\n\u003cdiv class=\"image image-right\"\u003e\n  \u003cimg\n    src=\"https://s3.amazonaws.com/digitalgov/gsa-blue-logo-sq_w200.png\"  alt='The GSA logo in white, at the bottom of a blue square.'\n    srcset=\"https://s3.amazonaws.com/digitalgov/gsa-blue-logo-sq_bu.jpg 48w,https://s3.amazonaws.com/digitalgov/gsa-blue-logo-sq_w800.png 800w,https://s3.amazonaws.com/digitalgov/gsa-blue-logo-sq_w400.png 400w,https://s3.amazonaws.com/digitalgov/gsa-blue-logo-sq_w200.png 200w\"\n    sizes=\"(max-width: 600px) 40vw, 400px\"\n  /\u003e\u003c/div\u003e\n\n\n\u003cp\u003eMany federal web managers have a role in submitting documents to the \u003ca href=\"https://www.archives.gov/federal-register\"\u003eOffice of the Federal Register\u003c/a\u003e at the National Archives and Records Administration (NARA) for publication on \u003ca href=\"https://www.federalregister.gov/\"\u003eFederalRegister.gov\u003c/a\u003e. Security and authenticity are always a top priority for these documents, especially when it comes to signatures.\u003c/p\u003e\n\u003cp\u003eThankfully, the days of being forced to wait for an authorizing sponsor to return from a conference or vacation — where they can’t access the technology to use a federal identification card for their signature — are gone. Now when that sponsor is unavailable, they may authorize the use of a `digital autopen` to add their digital signature to a Federal Register document. Digital signatures ensure that signatures are verified, authentic, and legitimate, and a digital autopen allows authorized individuals to ensure better workflow efficiency and timely submission to the Federal Register.\u003c/p\u003e\n\n\n\u003cdiv class=\"image image-right\"\u003e\n  \u003cimg\n    src=\"https://s3.amazonaws.com/digitalgov/cio-council-logo-comp_w200.png\"  alt='The blue and white seal for the U.S. CIO Council. It has an abstract gray eagle and 12 gray stars in the center.'\n    srcset=\"https://s3.amazonaws.com/digitalgov/cio-council-logo-comp_bu.jpg 48w,https://s3.amazonaws.com/digitalgov/cio-council-logo-comp_w1200.png 1200w,https://s3.amazonaws.com/digitalgov/cio-council-logo-comp_w800.png 800w,https://s3.amazonaws.com/digitalgov/cio-council-logo-comp_w400.png 400w,https://s3.amazonaws.com/digitalgov/cio-council-logo-comp_w200.png 200w\"\n    sizes=\"(max-width: 600px) 40vw, 400px\"\n  /\u003e\u003c/div\u003e\n\n\n\u003cp\u003eThe \u003ca href=\"https://www.idmanagement.gov/ficam/#identity-credential-and-access-management-subcommittee\"\u003eIdentity, Credential, and Access Management Subcommittee\u003c/a\u003e created the \u003ca href=\"https://playbooks.idmanagement.gov/playbooks/autopen/\"\u003eDigital Autopen Playbook\u003c/a\u003e as a practical guide to help federal agencies create and use a digital autopen for Federal Register documents. It outlines controls around the digital autopen certificate to meet the Office of the Federal Register’s digital signature requirements for Federal Register documents and cybersecurity.\u003c/p\u003e\n\u003cp\u003eThe playbook includes the three steps that allow federal agencies to create and implement a Federal Register digital autopen process: \u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\u003ca href=\"https://playbooks.idmanagement.gov/playbooks/autopen/#step-1-define-the-agency-process\"\u003eDefine the agency process\u003c/a\u003e to delegate signing Federal Register documents.\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://playbooks.idmanagement.gov/playbooks/autopen/#step-2-define-controls\"\u003eDefine controls\u003c/a\u003e to ensure the certificate and associated key are used only for the intended purpose.\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"https://playbooks.idmanagement.gov/playbooks/autopen/#step-3-obtain-a-digital-autopen-certificate\"\u003eObtain a role-based digital signature certificate\u003c/a\u003e from a public key infrastructure (PKI) shared service provider.\u003c/li\u003e\n\u003c/ol\u003e\n\u003cp\u003eAn agency must define the delegation process, including maintaining, auditing, and measuring the process through a standard operating procedure. The rules, or \u003ca href=\"https://playbooks.idmanagement.gov/playbooks/autopen/#:~:text=Develop%20a%20Standard%20Operating%20Procedure\"\u003estandard operating procedure\u003c/a\u003e, can be found in the playbook. \u003c/p\u003e\n\u003cp\u003eAgencies are encouraged to tailor the playbook to fit their unique organizational structure, requirements, and mission needs. The Subcommittee also encourages agencies and other information technology program participants, such as cybersecurity program managers, to tailor this playbook to fit their unique organizational structure, mission, and technical requirements.\u003c/p\u003e\n\n\n\n\u003carticle\n  class=\"dg-note \"\n\u003e\n  \u003ch4 class=\"dg-note__heading\"\u003e\n    \u003csvg\n      class=\"dg-note__icon usa-icon dg-icon dg-icon--large\"\n      aria-hidden=\"true\"\n      focusable=\"false\"\n    \u003e\n      \u003cuse xlink:href=\"/preview/gsa/digitalgov.gov/bc-archive-content-3/uswds/img/sprite.svg#notifications\"\u003e\u003c/use\u003e\n    \u003c/svg\u003e\n    \n      Note\n    \n  \u003c/h4\u003e\n  \u003cp\u003e\u003cstrong\u003eConnect\u003c/strong\u003e with others in the digital identity field. Email \u003ca href=\"mailto:icam@gsa.gov\"\u003eicam@gsa.gov\u003c/a\u003e to join the Digital Identity Community of Practice. Include “Join the Digital Identity Community” in the subject line.\u003c/p\u003e\n\u003cp\u003e\u003cstrong\u003eVisit\u003c/strong\u003e \u003ca href=\"https://www.idmanagement.gov/\"\u003eIDManagement.gov\u003c/a\u003e to explore its resources for vendors, program managers, and acquisition professionals.\u003c/p\u003e\n\n\u003c/article\u003e\n\n"}
  ]
}
