INFORMATION TECHNOLOGY LAW LECTURE 3- ELECTRONIC SIGNATURE Dr. Kadir Bas.

Slides:



Advertisements
Similar presentations
What is. Digital Certificate It is an identity.
Advertisements

© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008.
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
UNITED NATIONS COMMISION ON INTERNATIONAL TRADE LAW Enhancing legal certainty for electronic signatures and other authentication methods José Angelo Estrella.
AN OVERVIEW OF DATA PROTECTION LAW IN THE GCC NICK OCONNELL, Senior Associate – TMT JUNE 2013.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
Digital Stamps of Companies Tarvi Martens SK, Estonia.
KSTCD Branch/HRD Section/TrainForTrade & STICT Branch/ ICT Analysis Section1 Module 2 Legal validity of data messages.
The Austrian Governmental eDelivery System Technical Aspects Ankara, March 17th, 2015 Christian Maierhofer, EGIZ The E-Government Innovation Center is.
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
 The Health Insurance Portability and Accountability Act of  Federal Law designed to protect sensitive information.  HIPAA violations are enforced.
Incorporation of Terms. The Importance of Incorporation of Terms 1.The terms become binding to the parties 2.No other terms can be introduced to the contract.
Introducing… Crime Pack ®. 2 What is Crime Pack ® ? Crime Pack is our Commercial Crime Policy that is comprised of frequently requested crime extensions.
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
1 Exploring Acceptance and Legal Nature of eRecords Within a Paper-Based Framework Electronic Signature & Records Association November 14, 2012 Rafael.
Workshop on registered electronic mail policies and implementations (ETT 57074) Ankara, –
Naklo, A.Komšo 1 eInvoices and Tax Regulation Andja Komšo Tax Administration.
Implementation of Electronic Signature Law Kęstutis Andrijauskas Information Society Development Committee under the Government of the Republic.
PAPERLESS BUSINESS in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE - Advisor to the Governor.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Legal Issues on PKI & qualified electronic certificates. THIBAULT VERBIEST Attorney-at-law at the Brussels and Paris Bar Professor at the Universities.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
DIGITAL SIGNATURE AND ELECTRONIC DOCUMENTS IN ITALY Prof. Pierluigi Ridolfi AIPA Authority for Information Technology in the Public Administration V. Solferino,
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
The E-Signatures Act and eConsent Karin Fuog Nelnet Policy Services November 6, 2006.
1. 2 ECRF survey - Electronic signature Mr Yves Gonner Luxembourg, June 12, 2009.
© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.
Dr. Diganta Biswas School of Law Christ University, Bangalore.
National Smartcard Project Work Package 8 – Security Issues Report.
Legislation, Regulation, Guidelines
COPYRIGHT GRANTS AND THE E-SIGN ACT Jeanne M. Hamburg Norris, McLaughlin & Marcus, P.A. 875 Third Avenue New York, New York (212)
E-Signatures The Community framework on e-signatures (Directive 1999/93/EC) Dr Ioannis Iglezakis Visiting Lecturer University of Thessaloniki, Greece.
Compliance and Regulation for Mobile Solutions Amanda J. Smith Messick & Lauer, P.C. May 16, 2013.
Business Law for the Entrepreneur and Manager
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
Secure Electronic Transaction (SET)
1 HIPAA OVERVIEW ETSU. 2 What is HIPAA? Health Insurance Portability and Accountability Act.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
LIMITED LIABILITY COMPANY A) Concept Article 573 – (1) A limited liability company shall be incorporated by one or more real persons or legal entities.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Copyright © 2004 by Prentice-Hall. All rights reserved. PowerPoint Slides to Accompany BUSINESS LAW E-Commerce and Digital Law International Law and Ethics.
Data Protection Act AS Module Heathcote Ch. 12.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Paperless Government and the Law John D. Gregory Ministry of the Attorney General June 5, 2009.
When Can You Redact Information Without Requesting an Attorney General Decision? Karen Hattaway Assistant Attorney General Open Records Division Views.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Chapter 27 Negotiation, Holder in Due Course, and Defenses Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
The Singapore Treaty on the Law of Trademarks Kiev March Noëlle Moutout Assistant Legal Officer.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
LECTURE – V e-COMMERCE İstanbul Commerce University Vocational School.
Electronic Signatures CTO Workshop January 6, 2005 System Computing Services.
E-SIGNED DocFlow SYSTEM in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE – E-Business Development Consultant.
© 2007 Prentice Hall, Business Law, sixth edition, Henry R. Cheeseman Chapter 22: Creation of Negotiable Instruments Chapter 22: Creation of Negotiable.
31-1 Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
František Nonnemann Skopje, 10th October 2012 JHA Data protection and re-use of PSI as a tool for public control–CZ approach.
TRANSBORDER DATA FLOWS INA MEIRING. THE PROTECTION OF PERSONAL INFORMATION ACT (“POPI”) > 'personal information' means information relating to an identifiable,
Quanzhou City, June 11, 2009 IPR 2 Project H A R D E R R E C H T S A N W Ä L T E Munich EU-China Workshop on the Regulation of Online Business and Related.
Personal Data Protection
Chapter 30 Negotiability and Negotiation of Commercial Paper
Electronic conveyancing in Portugal
Data Protection Legislation
Chapter 14 Online Commerce and E-Contracts
EU Directive 95/46/EC (Paragraph 2) “Whereas data-processing systems are designed to serve man; whereas they must Respect their fundamental rights.
Legislation, Regulation, Guidelines
WELCOME CONRACT LAW.
Overview of the recommendations regarding approximation of the Law on personal data protection to the new EU General data protection regulation Valerija.
Presentation transcript:

INFORMATION TECHNOLOGY LAW LECTURE 3- ELECTRONIC SIGNATURE Dr. Kadir Bas

E-Signature As a result of the increasing use of the Internet for commercial and public purposes, it has become necessary to provide means that increase the legal credibility of electronic transactions. E-signatures generally serves for this purpose by being a way of the authentication of the transaction.

Different Methods of E-Signature E-signatures may be made in different methods such as: -Biometric methods based on the biometric features of persons, such as voice, eye retina or finger prints. -PIN codes used in credit cards - a scanned image of the signatory’s handwritten signature to the document -to make a handwritten signature by using a computer tool which automatically transfer it to the computer. -E-signature made with public key (asymmetric) encryption (digital signature)

E-Signature Regulations Many countries including the US, Germany, Singapore have e- signature laws. The EU regulates e-signature with a directive (99/93/EC). In Turkey, there are two legal instruments regarding e-signature: - Electronic Signature Law (Elektronik Imza Kanunu) No: Directive on the Implementation of Electronic Signature Law (Elektronik Imza Kanunun Uygulanmasina iliskin Usul ve Esaslar Hakkinda Yonetmelik)

The Definition of E-Signature Law No 5070 defines electronic signature as ‘data in electronic form which are attached to or logically associated with other electronic data and which serve as a method of authentication’. This definition does not choose any method of e-signature over others. This is called technology neutrality. Technology neutrality enables the Law to cover the technological developments in relation to e-signature, without any legal amendment. The Law attributes the legal consequences of handwritten signatures only to secure e-signatures.

Secure Electronic Signature In order to be classified as a secure e-signature, a signature must: be exclusively assigned to the signature owner, be generated with the secure electronic signature creation device which is kept under the sole control of the signature owner, enable the identification of the signature owner based on the qualified electronic certificate, enable detection as to whether signed electronic data has or has not been altered or not subsequent to the signature being applied.

The Legal Effects of A Secure E-Signature General Rule: A secure e-signature normally have the same legal effect as that of a handwritten signature. This means: -where the Law requires a contract to be concluded in written format, electronic document signed with e- signature will satisfy this requirement. -Electronic document signed by e-signature will be considered as a senet, i.e. conclusive evidence (kesin delil).

The Legal Effects of A Secured E-Signature Exception: contracts which are subject to a special ceremony or an official form pursuant to laws and warranty contracts cannot be made with e-signature. Examples: -Sales of immovable goods : must be made at the registry of title deed (Tapu sicili) -Sales of motor vehicles: must be made at the notary. -Warranty contracts (teminat sozlesmeleri)

Electronic Certificate Service Providers (ECSPs) ECSPs are public or private persons or entities who provide electronic certificates, time-stamp and other services related to electronic signatures. ECSPs can start its operation after two months following to that they notify the BTK (Information and Communications Technologies Authority- Bilgi Teknolojileri ve Iletisim Kurumu). Electronic certificates which are provided by ECSPs must be Qualified Electronic Certificate (Nitelikli Elektronik Sertifika) which includes certain features described in Article 9 of Law No 5070.

Cancellation of a Qualified Electronic Certificate The ECSP will cancel a qualified electronic certificate if: -the certificate holder requests cancellation -If information given by the holder in relation to the certificate appears to be false or these information change -If the legal capacity of the owner is restricted or he dies or bankrupts.

Data Protection The ECSP: must not request from the certificate holder to give personal data, other than those necessary for the purpose of issuing the certificate must not collect any data without the explicit consent of the holder. must not place the certificate to the reaching of third parties, without the written consent of the holder must not use the certificate for other purposes

Criminal Provisions Unauthorised use of certificate creation data From 1 year to 3 years imprisonment plus fine Forgery in electronic certificates (elektronik sertifikada sahtecilik) From 2 years to 5 years imprisonment plus fine These penalties will be increased by 50 %, if the crimes are committed by the employees of the ECSPs Besides these criminal penalties, the perpetrator of these crimes should compensate for any damages made to third parties

THANK YOU!