Date: April 20 th, Monday Enevening. Faculty of Computing and ICT Under Department: Bachelor of Business in Information Technology Senior Lecturer: Ahmed Abdillahi Sanco. Ahmed Abdillahi Sanco1
All the States and Countries over the world has a different in view for customers and it’s transaction by: Customer Protection Privacy Culture and Language Overall awareness of the issues has been defined internationally, The legal framework, which traditionally relies on paper-based commerce procedures and requirements such as hand-written signatures, is in the process of being adapted to these new technologies. Chapter Five : International Legal Considerations in E-commerce
At the global level, the availability of the United Nations Commission on International Trade Law (UNCITRAL) Model Law on electronic commerce has adopted the kind of transactions that can be carried on over the Internet are: a. Transactions involving physical goods, (i.e. Amazon.com) b. Transactions involving non electronic services (i.e. law, accounting, architecture) c. Transactions involving electronic services (i.e. Aol, Yahoo, software design) d. Transaction involving information (i.e. New York Times on-line, Lexus, pornography)
e. Financial transactions (i.e. on-line banking, on- line gambling, on-line payment mechanisms) f. Hybrid transactions As Electronic commerce is a key element in the OECD (the Organization For Economic Cooperation And Development)Ìs vision for economic growth and improved social conditions, and as electronic commerce is inherently trans border and its development will depend on international solutions, On October 7-9, 1998, nearly a thousand participants, including Ministers and high-level officials from all 29 OECD Member countries,
12 non-member countries, 12 international organizations, and representatives from business, trade unions, consumer groups and other non- governmental organizations gathered in Ottawa for a Ministerial Conference ÏA Borderless World - Realizing the Potential of Global Electronic Commerce has those four reasons or topics. 1. Building trust for users and consumers; The use of technology and the implementation of policy designed to protect privacy and collection of personal data and incorporate appropriate redress mechanisms for misuse of the above.
2. Establishing ground rules for the digital marketplace; Consumers and business people are looking to governments to ensure that the rules in the virtual world are equivalent to, transparent, and as predictable as those in the physical world as close as possible. 3. Enhancing the information infrastructure for electronic commerce; Creating universal and affordable access which depends upon appropriate telecommunication policies and regulatory frameworks.
4. Maximizing the benefits; Use has to be widespread which links citizens of the world. This area by outlining who is doing what to solve these various problems together: 1. The OECD Action Plan for Electronic Commerce; 2. The Report on International and Regional Bodies: Activities and Initiatives in Electronic Commerce; and 3. The Global Action Plan for Electronic Commerce prepared by Business with Recommendations for Governments.
Electronic signature and Authentication The terms “electronic authentication” and “electronic signature” are used to refer to various techniques currently available on the market or still under development for the purpose of replicating in an electronic environment some or all of the functions identified as characteristic of handwritten signatures or other traditional authentication methods. in 1996 provides a framework to adapt legislation. The most common type of International legal consideration is :-
Typical examples in Legal Consideration include the following: 1. Notarization the act of signing has a particular formal significance due to the reinforced trust associated with a special ceremony. This is the case, for instance, with notarization, i.e. the certification by a notary public to establish the authenticity of a signature on a legal document, which often requires the physical appearance of the person before the notary;
2. Generation of a digital signature To sign a document or any other item of information, the signatory first delimits precisely the borders of what is to be signed. Then a hash function in the signatory’s software computes a hash result unique (for all practical purposes) to the information to be signed. The signatory’s software then transforms the hash result into a digital signature using the signatory’s private key.
3. Verification of digital signature Digital signature verification is the process of checking the digital signature by reference to the original message and a given public key, thereby determining whether the digital signature was created for that same message using the private key that corresponds to the referenced public key. Verification of a digital signature is accomplished by computing a new hash result for the original message, by means of the same hash function used to create the digital signature.
4. Other uses of digital signature technology Digital signature technology has a much broader use than merely to “sign” electronic communications in the same manner that handwritten signatures are used to sign documents. Indeed, digitally signed certificates are often used, for instance, to “authenticate” servers or websites, for example in order to guarantee to their users that the server or website is the one it purports to be or is genuinely attached to the company that claims to run the server or website.
5. Public and private keys A complementary key used for digital signatures is named the “private key” which is used only by the signatory to create the digital signature and should be kept secret, while the “public key” is ordinarily more widely known and is used by a relying party to verify the digital signature. The private key is likely to be kept on a smart card or to be accessible through a personal identification number (PIN) or a biometric identification device, such as thumbprint recognition.
Computer Crimes The Department of Justice categorizes computer crime in three ways: The computer as a target - attacking the computers of others or funny to make anger (spreading viruses is an example). The computer as a weapon - using a computer to commit "traditional crime" that we see in the physical world. The computer as an accessory - using a computer to store illegal or stolen information which can be some times discovered that you stolen on it.
Ten Command of Computer Ethics These are the Ethics an IT Person can avoid to loose his dignity because The Bad thing will fallow you for ever. Do not use a computer to harm other people. Do not interfere with other people's computer work or resources without authorization. Do not snoop around in other people's files or other people's intellectual output.. Do not use a computer to steal. Do not use a computer to bear false witness. Do not use or copy software for which you have not paid. Do not use a computer in ways that show consideration and respect.