Oklahoma Administrative Code
Title 60 - Archives and Records Commission
Chapter 15 - Administration of Uniform Real Property Electronic Recording Act
Subchapter 1 - General Provisions
Section 60:15-1-3 - Glossary of Terms

Universal Citation: OK Admin Code 60:15-1-3

Current through Vol. 42, No. 1, September 16, 2024

The following words, terms, phrases, acronyms, and abbreviations are defined in other Oklahoma Statutes and are included here for use in connection with the Act or these rules, or are words, terms, phrases, acronyms, or abbreviations that may require further explanation to assist in the understanding of the Act and these rules.

(1) ACH: Automated Clearing House

(2) Agreement: means the bargain of the parties in fact, as found in their language or inferred from other circumstances and from rules, regulations, and procedures given the effect of agreements under laws otherwise applicable to a particular transaction.

(3) ANSI: American National Standards Institute

(4) Asymmetric encryption: A method of encryption that uses two keys, a public key and a private key. Together, the keys constitute a key pair. Although the keys are mathematically related, it is not possible to deduce one from the other. The public key is published in a public repository and can be freely distributed. The private key remains secret, known only to the key holder.

(5) Authentication: The act of tying an action or result to the person claiming to have performed the action. Authentication generally requires a password or encryption key to perform, and the process will fail if the password or key is incorrect.

(6) Automated transaction: means a transaction conducted or performed, in whole or in part, by electronic means or electronic records, in which the acts or records of one or both parties are not reviewed by an individual in the ordinary course in forming a contract, performing under an existing contract, or fulfilling an obligation required by the transaction.

(7) Computer program: means a set of statements or instructions to be used directly or indirectly in an information processing system in order to bring about a certain result.

(8) Digitized signature or digital signature: A representation of a handwritten signature, existing as a computerized image file. Digitized signatures are one of several types of electronic signatures, and have no relation to digital signatures.

(9) DTD: Document Type Definition: A document created using the Standard Generalized Markup Language (SGML) that defines a unique markup language such as XHTML or XML. A DTD includes a list of tags, attributes, and rules of usage.

(10) Electronic commerce: Also known as e-Commerce, refers to trade that occurs electronically, usually over the Internet. Electronic commerce often involves sharing information, buying or selling products, or extending both new and traditional services to customers via electronic means. Electronic commerce allows business to take advantage of e-mail, the Web, and other online innovations to improve the business process and offer consumers more ways to access products, faster information transfer and decreasing costs.

(11) Electronic record: A record created, generated, sent, communicated, received or stored by electronic means.

(12) Electronic notary: A notary public who provides electronic notarial acts pursuant to the provisions of section 86.3 of Title 16 of the Oklahoma Statutes.

(13) Encrypt: To apply an encryption key to a message in order to make it unreadable without a description key in an effort to prevent unintended use of the information.

(14) E-SIGN: Electronic Signatures in Global & National Commerce ( 15 U.S.C. Sections 7001 - 7006) .

(15) FTP: File Transfer Protocol

(16) Hash function: A mathematical algorithm that takes an electronic document and creates a document fingerprint. The document fingerprint is much smaller than the original document, and does not allow the reconstitution of the original document from the fingerprint. A slightly different document, processed through the same hash function, would produce a very different document fingerprint. A hash function helps to secure data by providing a way to ensure that data is not tampered with.

(17) HTML: HyperText Markup Language

(18) HTTP: HyperText Transfer Protocol

(19) HTTPS: HyperTextTransfer Protocol Secure

(20) Information: means data, text, images, sounds, codes, computer programs, software, databases, or the like.

(21) ISO: International Standards Organization

(22) Key pair: A set of keys, including a private key and a public key, used in asymmetric encryption. Sometimes a key pair will be reserved for specific uses, such as creating digital signatures.

(23) Metadata: Commonly described as "data about data." Metadata is used to locate and manage information resources by classifying those resources and by capturing information not inherent in the resource.

(24) Nonrepudiation: Effectively implementing a process in such a way that the creator of a digital signature cannot deny having created it. Nonrepudiation involves supplying enough evidence about the identity of the signer and the integrity of a message so that the origin, submission, delivery, and integrity of the message cannot be denied. Protecting the private key of a user is also a critical factor in ensuring nonrepudiation. The entire Public Key Infrastructure (PKI) industry exists to create and ensure the trust necessary for nonrepudiation.

(25) Notary public: "Notary public" and "notary" mean any individual appointed and commissioned by the Oklahoma Secretary of State pursuant to the provisions of section 1 of Title 49 of the Oklahoma Statutes who performs notarial acts pursuant to the provisions of the Uniform Law on Notarial Acts, as adopted in Oklahoma set out in Sections 111 through 121 of Title 49 of the Oklahoma Statutes.

(26) OAIS: Open Archival Information Systems

(27) PDF: Portable Document Format. A file format created by Adobe Systems, Inc. that uses the PostScript printer description language to create documents. PDF files capture the appearance of the original document, can store both text and images, are difficult to modify, and can be rendered with free cross-platform viewer software.

(28) Portal: A Web site considered an entry point to other Web sites, often by being or providing access to a search engine, useful content, or by functioning as a gateway to other Web locations or both. Portals are usually provided free of charge, in the hope that users will use the site.

(29) Private Key: A large, randomly generated prime number used in asymmetric encryption. The private key is used to encrypt a document fingerprint which is the result of processing an electronic document through a hash function in order to create a digital signature. A private key is generated by its holder at the same time a related public key is created. While the public half of a key pair is made available to anyone, the private key is only known by its owner, who must keep it confidential to maintain its integrity.

(30) Proprietary: Indicates that software or other employed technology is owned or controlled exclusively by the vendor. These software solutions are not generally transferable to other systems without payment of license fees.

(31) Public Key: A large, randomly generated prime number used to decrypt an electronic document that has been encrypted with a private key. A public key is generated by its holder at the same time a related private key is created. Within the Public Key Infrastructure (PKI), public keys are used to verify digital signatures. Public keys are contained in digital certificates, published and otherwise distributed by the issuing certificate authority (CA).

(32) PKI: Public Key Infrastructure. The framework of different entities working together to create trust in electronic transactions. The PKI industry facilitates signed transactions by using asymmetric encryption to ensure security and verifiable authenticity. The PKI includes all parties, policies, agreements, and technologies applicable to a transaction. This infrastructure allows all concerned parties to trust electronic transactions created within the standards set by the PKI industry.

(33) Schema: A method for specifying the structure and content of specific types of electronic documents which use XML.

(34) Security procedure: means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term "security procedure" includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

(35) SSL: Secure Socket Layer. A security technology that uses both asymmetric and symmetric cryptography to protect data transmitted over the Internet.

(36) Signature Authentication: The process by which a digital signature is used to confirm the identity of a signer and the validity of the document.

(37) Signed Digital Document: An electronic document that includes an embedded digital signature. The digital signature contains an encrypted document fingerprint, which allows anyone receiving the document to verify its validity using the process of signature authentication.

(38) Submitting Party: The entity that originates an electronic document. This is usually a bank, title company, attorney, or anyone that either inputs data into a specific template or associates an image or both, and wishes to send the documentation for electronic recordation to the county clerk.

(39) TIFF: Tagged Information File Format. An image file format commonly used for photographs, scanned documents, or other graphics. TIFF images are graphics that are made up of individual dots or pixels. Files in the TIFF format are distinguished by a ".tif" filename extension. Group 4 TIFF (Tagged Image File Format) images are commonly used, because this format preserves the image in the most accurate and legible form.

(40) TBP: Trusted Business Partner.

(41) Third party vendor: Entity that may act as an intermediary in an electronic transaction. The vendor will usually add value to the transaction, such as verifying accuracy and completeness of index entries, authentication of the submitting party, or any other specific requirement of the county clerk.

(42) Transaction: means an action or set of actions occurring between two or more persons relating to the conduct of business, commercial, or governmental affairs.

(43) UETA: Uniform Electronic Transactions Act. The uniform act on which the Uniform Electronic Transactions Act as adopted in Oklahoma set out at Sections 15-101 through 15-121 of Title 12A of the Oklahoma Statutes was based authorizing electronic documents and digital signatures to stand as equals with their paper counterparts.

(44) URPERA: Uniform Real Property Electronic Recording Act. The uniform act on which the Uniform Real Property Electronic Recording Act as adopted in Oklahoma set out in Sections 86.1 through 86.7 of Title 16 of the Oklahoma Statutes, was based authorizing county clerks to accept electronic documents for recording in accordance with established standards.

(45) VPN: Virtual Private Network

(46) Wet signature: An original handwritten signature applied to a document.

(47) XHTML: Extensible HyperText Markup Language

(48) XML Extensible Markup Language (XML): A computer language used to create markup languages. XML allows developers to specify a document type definition (DTD) or schema in order to devise new markup languages for general or specific uses.

Added at 27 Ok Reg 1369, eff 6-11-10

Disclaimer: These regulations may not be the most recent version. Oklahoma may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the state site. Please check official sources.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.