The electronic signature Fernando Galindo Philosophy of Law University of Zaragoza Bologna University Bologna April 28 2000.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
KSTCD Branch/HRD Section/TrainForTrade & STICT Branch/ ICT Analysis Section1 Module 2 Legal validity of data messages.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
A case of Armenia: Legal framework for E-procurement in Public Procurement Sector Mr Karen Brutyan, PhD, PFM and PP EBRD Consultant, Wolf Theiss 1-2 December.
INTRODUCTION INTO PRIVATE INTERNATIONAL LAW OF THE EUROPEAN UNION Marko Jovanovic, LL.M. MASTER IN EUROPEAN INTEGRATION Private International Law in the.
Local Commerce in Social Networks in Mexico and its Regulations.
Workshop on registered electronic mail policies and implementations (ETT 57074) Ankara, –
Implementation of Electronic Signature Law Kęstutis Andrijauskas Information Society Development Committee under the Government of the Republic.
PenalNet Secure e-communications in Criminal Law Practice Antonio Ruiz-Giménez de Aguilar, CEO of PenalNet.
Respecting Privacy in Global Networks/ Guernsey, Wednesday 11 th April, Paula Ortiz López Spanish Data Protection Agency.
Legal Issues on PKI & qualified electronic certificates. THIBAULT VERBIEST Attorney-at-law at the Brussels and Paris Bar Professor at the Universities.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
DIGITAL SIGNATURE AND ELECTRONIC DOCUMENTS IN ITALY Prof. Pierluigi Ridolfi AIPA Authority for Information Technology in the Public Administration V. Solferino,
Legal Informatics Fernando Galindo Philosophy of Law University of Zaragoza Lapland University Rovaniemi March
EU: Bilateral Agreements of Member States. Formerly concluded international agreements of Member States with third countries Article 351 TFEU The rights.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Workshop Ankara, –  Introduction  Legal background in Slovenia  Usage areas  Accreditations and supervision  REM service.
Workshop on registered electronic mail policies and implementation Ankara, March 2015 Davide Mula REM country practice in legal infrastructure,
Electronic evidence in Spanish civil procedure: where wishes clash against reality Julio Pérez Gil Universidad de Burgos.
© Julia Wilk (FHÖV NRW) 1 Digital Signatures. © Julia Wilk (FHÖV NRW)2 Structure 1. Introduction 2. Basics 3. Elements of digital signatures 4. Realisation.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Ministry of Transport, Information Technology and Communications Technological base: Interoperability Tsvetanka Kirilova Ministry of TITC Bulgaria.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
 The Development of the European Union Iryna Basova Jillian Dowd Ruikang Wang.
Marketing - Best Practice from a Legal Point of View Yvonne Cunnane - Information Technology Law Group 30 November 2006.
National Smartcard Project Work Package 8 – Security Issues Report.
“NATIONAL CHAMBER OF PRIVATE BAILIFF OFFICERS ” in the new era of the online execution SIAIP INTRODUCTION 16 th of December 2014.
Company LOGO Workshop on Macedonian e-Gov project and best UE practices (Slovenian experience) Skopje Blagica Andreeva Ministry of Information.
Legislation, Regulation, Guidelines
Circulation of authentic instruments under Regulation 650/2012 speaker – Ivaylo Ivanov – Bulgarian Notary Chamber.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Alignment of South African E-Commerce Law Tana Pistorius Department of Mercantile Law UNISA CYBER SA 3 – CONFERENCE & BOOK LAUNCH.
PRESENTATION TO SELECT COMMITTEE ELECTRONIC COMMUNICATIONS AND TRANSACTIONS BILL ANDILE NGCABA12 JUNE 2002.
Audit of Public Procurement
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
Experiences in Undergraduate Studies in the University of Zaragoza LEFIS Undergraduate studies Oslo, 19 th -20 th May 2006.
M. ANGELA JIMENEZ 1 UNIT 5. REGULATION OF EXTERNAL AUDIT IFAC AND E.C.
THE E-COMMERCE LEGAL ENVIRONMENT Bangkok, November, 2002 David Marsh.
Personal data protection in criminal procedure International collaboration and principle of proportionality LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Ministry of Waters and Environmental Protection, ROMANIA 1 BERCEN 1 st Exchange program – November 2002 Croatia PROBLEMS AND SOLUTIONS IN COOPERATION.
LEFIS Master in Legal issues for the Information Society Pilar Lasala University of Zaragoza LEFIS Postgraduate studies Rotterdam, 16 th -17 th June 2006.
1 ELECTRONIC PRESCRIBING AND APPLICATION OF NEW TECHNOLOGIES IN THE SPANISH PHARMACY Carmen Peña López Secretary General. General Spanish Council of Pharmacists.
Transboundary Trust Space February 16, 2012 Ensuring trust in information exchange – proposal and approaches from Russia and CIS-states (RCC states) National.
Government of Brazil Ministry of Justice Department of Consumer Protection and Defense Consumer Protection and Defense in Electronic Commerce Eliane Moreira.
Network Security Lecture 27 Presented by: Dr. Munam Ali Shah.
Law and Justice in a Global Society Artificial Intelligence and Law Ontology and Philosophy of Law: from REIMDOC as example Fernando Galindo University.
Postgraduate Course LAW AND NEW TECHNOLOGIES Facultad de Derecho Universidad de Valladolid España.
FTAA Joint Government-Private Sector Committee of Experts on Electronic Commerce - Feb.15, 2002 Some views on consumer protection in the context of electronic.
The LEFIS UNIZAR PKI as a Case of Identification Management at a Regional Level.
Management System of Judicial Cases. Abstract The system A historical perspective A workflow Some figures The next steps 2.
Laws and Codes for the Internet: a Continental European Legal Perspective Fernando Galindo Faculty of Law University of Zaragoza Belfast,
PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA.
European enforcement order for uncontested claims Regulation n. 805/2004 of the European Parliament and of the Council of April
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign, Security and.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
ROMANIA NATIONAL NATURAL GAS REGULATORY AUTHORITY Public Service Obligations in Romanian Gas Sector Ligia Medrea General Manager – Authorizing, Licensing,
-1- WORKSHOP ON DATA PROTECTION AND DATA TRANSFERS TO THIRD COUNTRIES Technical and organizational security measures Skopje, 16 May - 17 May 2011 María.
POSSIBLE E-SERVICES AND ELECTRONIC TRANSACTIONS IN LITHUANIA
University of Zaragoza
PRESENTATION OF MONTENEGRO
THE NEW GENERAL DATA PROTECTION REGULATION: A EUROPEAN OR A GLOBAL STANDARD? Bart van der Sloot Senior Researcher Tilburg Institute for Law, Technology,
Electronic Transactions & Authentication
INTRODUCTION INTO PRIVATE INTERNATIONAL LAW OF THE EUROPEAN UNION
Pooja programmer,cse department
Legal Environment for Business in Nepal 26 February 2017
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

The electronic signature Fernando Galindo Philosophy of Law University of Zaragoza Bologna University Bologna April

The electronic signature zProblems: communications in Internet and threatened Rights zSolution zThe mark for a regulation zNormative solutions zThe norms in the practice zConclusion

Communications in Internet (1) zFirst.- Internet as exception solution: communication in military crisis (nuclear war) zSecond.- Partial solution: scientific and academic communications zThrid.- Global solution: electronic trade and security of the State

Communications in Internet (2) zThe users' identification of the telematic messages zIt is not easy to know who sends them, to who they are sent or when they are sent zIntegrity of the messages zThe messages can be modified by another person zConfidentiality of the messages zThey can be seen by other people

The threatened Rights (1) zJuridical security (Cons. art.9.3): " it doesn't exist when there is a document in a municipal file of which is ignored who presents it, when presents it, on behalf of who presents it and for what reason presents it..." (TS 3.ª S, 17 Jul Presenter: Mr. Martín Herrero). In the same way it doesn't exist when the electronic messages that consist on a simple electronic testimony of their mere emission and reception, are not reliable

The threatened Rights (2) zThe person's dignity and their inviolable rights that are inherent (Cons. art. 10): they cannot be respected when the real data of the originator or the receiver of the message are not known

The threatened Rights (3) zPrivacy and secret of the communications (Cons. art. 18): "they imply the existence of an own and reserved environment in front of the action and knowledge of the other ones, necessary according to the rules of our culture to maintain a minimum quality of humane life"(TC 2.ª S, 231/1988 of 2 Dic. - Presenter: Mr. López Guerra)

The threatened Rights (4) zMarket freedom (Cons. art. 38): it cannot exist when there is not security in the mercantile traffic and it is not known, with certainty, the name of the buyers neither, therefore, there is guarantee with regard to their payment capacity

The threatened Rights (5) zThe consumer’s and user’s defense (Cons. art. 51), it cannot be carried out when one doesn't know who are the consumers or the salespersons

The threatened Rights (6) z"The police action in the functions of verification and discovery of the crime and the criminal's prosecution" (Cons. art. 126). It cannot put into practice in case forecasts don't exist for the legal interception of the ciphered communications

Solution zCiphered zCryptography of public key zElectronic signature zPreserves the identification and the integrity zCiphered of confidentiality zGuarantees the secret of the content zCertification entities zMake public the keys and their holder's attributes

The mark for a regulation zLaw of digital signature of the State of Utah (1995) zGerman law to regulate the general conditions of the Services of Information and Communication (1997) zItalian regulation about the approaches and modalities for the formation, the file and the transmission of documents with computer and telematic instruments (1998) zFrench regulation on cryptography (1998 and 1999) zSurvey of the Department of Trade and Industry of the United Kingdom on cryptographic legislation (1999). Parlament Bill (in discussion) zProposals of the European Union (from 1997)

Normative solutions zSPANISH LEGAL CONTEXT zGeneral Law of Telecommunications (1998) zOrganic Law of the Judicial Power (1994) zLaw of Civil Procedure (2000) zLaw of the Public Administrations (1992) zLaw of Accompaniment to the Budgets of 1998 zSentence of the High Court of 3 Nov zContracts between users and certification entities z Reglament of the Tax on the Incomes of Physical People of 1999

Normative solutions (electronic signature) zRoyal Decret Law 14/1999 September 17 on electronic signature zDirective 1999/93/ec of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures(DOCE 19.I.2000)

General Law of Telecommunications (1) zArts. 49 at 53: z1. It is remembered the principle of the secret of the communications regulated in the Constitution (arts and 55.2) and in the Law of Criminal Prosecution (art. 579). The principle is of forced execution by the operators that gives services or exploit nets of telecommunications. z2. It is settled down the possibility of using the ciphered of the messages as mean of protection of the same ones. It is made the forecast that the norms in development of the law will be able to settle down «conditions for the procedures of ciphered».

General Law of Telecommunications (2) zArts. 49 at 53: z3. It is settled down that in that referred to the ciphered that guarantees the confidentiality the Government «will be able to impose the obligation of notifying well to an organ of the General Administration of the State or to a public organism, the used algorithms or any procedure of ciphered to effects of their control, in correspondance with the effective normative». z4. The operators of nets or services «that use any procedure of ciphered, will facilitate to the General Administration of the State without cost some for this and to effects of the opportune inspection, the decodifier device that use».

Organic Law of the Judicial Power (1) zArt. 230, 1994 reform: z1. The Tribunals will be able to use any technical, electronic, computer and telematic means, for the development of their activity and exercise of their functions z2. The documents emitted by the previous means, whichever it is their support, will enjoy the validity and effectiveness of an original document whenever it is guaranteed their authenticity, integrity and the execution of the procedural requirements.

Organic Law of the Judicial Power (2) zArt. 230, 1994 reform: z3. The cases that are processed with support computer means will guarantee the identification and the exercise of the jurisdictional function... as well as the confidentiality, privacy and security of the data of personal character that contain... z4. People that demand the judicial protection of their rights and interests will be able to be related with the Administration of Justice through the technical means to that the first section refers when they are compatible with those that prepare the Tribunals and they respect the guarantees and requirements foreseen in the procedure.

Law of Civil Procedure zArt. 152 zThe processal communication acts made by electronic, computers and similar means are possible zArts. 299 and from 382 to 384 zThe means and tools that can reproduce words, date, numbers and mathematics operation are evidence

Law of the Public Administrations (1992) (1) zArt. 38, regulation of 1999: zThe registrations will be in computer support zThe Public Administrations will have «intercomunicación systems and coordination of registrations that guarantee their computer compatibility, as well as the telematic transmission of the seats registers them and of the applications, writings, communications and documents that are presented in anyone of the registrations»

Law of the Public Administrations (1992) (2) zArt. 45: incorporation of technical means zThe art. establishes the use of technical and electronic, computer and telematic means for the Public Administrations zThe citizens will be able to use them in relationships with PPAA. zTheir use will guarantee the identification zThe documents generated by these means will have validity... whenever it is guaranteed their authenticity, integrity and conservation zR.D. 263/1996, 16 February regulates the use of electronic, computer and telematic techniques for the General Administration of the State

Law of Accompaniment to the Budgets of 1998 zArt. 79: authorizes to the National Factory of Currency and Bell and to the Public Entity of Mail and Telegraphs to the benefit of necessary technical and administrative services to guarantee the security, validity and effectiveness of the emission and reception of communications and documents through technical and electronic, computer and telematic means. zAuthorization to be constituted as suppliers of certification services

Sentence of the High Court of 3 Nov z«In consequence, although, the same as in the case of the common documents, it can have electronic documents without signature, the electronic document (and, especially, the electronic document with function of mercantile turn) it is firmable, in the sense that the requirement of the hand signature or equivalent ican be substituted, for the side of the cryptography, by means of figures, signs, codes, bars, keys or other alpha-numeric attributes that allow to assure the origin and truthfulness of their responsibility and the authenticity of their content».

Contracts between users and certification entities zVeri Sign zAgency of Electronic Certification (ACE) zSISCER (System of Certification) zNational factory of Currency and Bell (FNMT) zFoundation for the Study of the Security of the Telecommunications (FESTE)

Spanish Royal Decree zOn electronic signature zIt gives legal effects to the electronic signature zRegulation of the certification services providers zRegister for the certification services providers zAdministrative inspection of the cert. ser. prov. zRegulation on the expedition and loss of legal validity of the certificates zInfractions and sanctions

Directive zLegal Mark for the certification services proviiders zDefinition of the European requirements for the certi. ser. prov. and the certificates zAcknowledges different techniques of electronic signature zPromotes the free offert of services, without need of previous authorization zAccepts the introduction of voluntary systems of accreditation zPromotes the juridical validity of the electronic signatures zIntroduces norms on liability zIntroduces mechanisms of international cooperation

Directive: technical features zRequirements for qualified certificates zRequirements for certification service providers issuing qualified certificates zRequirements for secure signature creation devices zRecommendations for secure signature verification

The norms in the practice zThe telematic declaration of tax (societies and incomes) zThe telematic transmission of notifications between Courts and Procurators zThe contracts of purchases by telephone (Royal Decree December ) zThe exchange documents in electronic format (PISTA) zThe development of technical standards: European Electronic Signature Standardization Initiative (EESSI) zThe application of the electronic signature zThe certification from legal institutions

Criptography in the Courts (1) zProject Aequitas Procuradores (1998) zParticipants: zGeneral Council of the Procurators from Spain (through the School of Zaragoza) zGovernment from Aragon zMinistry of Justice zGeneral Council of the Judicial Power zPSINet zUniversity of Zaragoza

Criptography in the Courts (2) zObject of the project: zTelematic transmission of notifications zFrom the Courts to Procurators zFrom Procurators to the Courts zTo other institutions, jurists and citizens

Certification (1) zFESTE (November 1997): zGeneral Council of the Corridors of Trade zGeneral Council of the Notaries zGeneral Council of the Legal profession zUniversity of Zaragoza zPSINet

Certification (2) zFunctions: RULES HOMOLOGATION PROVIDER INTRANETS STUDIES FORMATION CERTIFICATES (PROOF)

Certification (3) zCertificates: proof

Conclusion zThere are enough references for the use of the basic mechanisms that are lighting the installation of the society of the telecommunications. zIn short: there are solutions for the use of the cryptography as mechanism of projection of the electronic trade in the widest sense in the expression: sale and purchase of products and communication among the citizens and the Public Administrations.