|(a) When the electronic signature device is used to create an individual's electronic signature, the code or mechanism must be unique to that individual at the time the signature is created and the individual must be uniquely entitled to use it. Signatories shall: (1) protect the electronic signature device from compromise; and (2) report to the commission any evidence that the device has been compromised, within one business day of the discovery. (b) An electronic signature device is compromised if the code or mechanism is available for use by any other individual. (c) An electronic document must bear the valid electronic signature of a signatory if that signatory is required under the authorized program or the state program to sign the paper document for which the electronic document substitutes. (d) An electronic signature on an electronic document is valid if it has been created with an electronic signature device that the identified signatory is uniquely entitled to use for signing that document; the device has not been compromised; and the signatory is an individual who is authorized to sign the document by virtue of his or her legal status and/or his or her relationship to the entity on whose behalf the signature is executed. (e) The presence of an electronic signature on an electronic document submitted to the commission establishes that the signatory intended to sign the electronic document and to submit it to the commission to fulfill the purpose of the electronic document.