—(1) If, through the application of a specified security procedure, or a commercially reasonable security procedure agreed to by the parties involved, it can be verified that an electronic signature was, at the time it was made —
unique to the person using it;
capable of identifying such person;
created in a manner or using a means under the sole control of the person using it; and
linked to the electronic record to which it relates in a manner such that if the record was changed the electronic signature would be invalidated,
such signature shall be treated as a secure electronic signature.
(2) Whether a security procedure is commercially reasonable shall be determined in accordance with section 17(2).
[ETA, s. 17]