Several different ways to indicate person by electronic signature 1.typing the signer's name into the signature area 2.pasting in a scanned version of.

Slides:



Advertisements
Similar presentations
Part IV Statutes of Frauds. R2 § 110. Classes of Contracts Covered (1) The following classes of contracts [may not be enforced] unless there is a written.
Advertisements

Chapter 8 Export Business Negotiation and Conclusion of Contract Abstract: This chapter tells the general procedures of business negotiation, the basical.
2-105(1) "Goods" means all things (including specially manufactured goods) which are movable at the time of identification to the contract for sale other.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa: Transposition of SADC Cyber-security.
PART III FULFILMENT OF LEGAL REQUIREMENTS BY ELECTRONICS MEANS.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
KSTCD Branch/HRD Section/TrainForTrade & STICT Branch/ ICT Analysis Section1 Module 2 Legal validity of data messages.
© 2013 Sri U-Thong Limited. All rights reserved. This presentation has been prepared by Sri U-Thong Limited and its holding company (collectively, “Sri.
Review Questions Business 205
E NABLING ELECTRONIC TRANSACTIONS : BASIC PRINCIPLES Department of Commercial Law University of Cape Town.
Q UINCY COLLEGE Paralegal Studies Program Paralegal Studies Program Litigation and Procedure Discovery: Overview and Interrogatories Litigation and Procedure.
Legality of Electronic Images under the Electronic Transactions Ordinance Presentation by Mr Alan Siu, Deputy Secretary for Information Technology and.
Discussion on SA-500 – AUDIT EVIDENCE
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Legal Issues on PKI & qualified electronic certificates. THIBAULT VERBIEST Attorney-at-law at the Brussels and Paris Bar Professor at the Universities.
MANAGEMENT & LEGAL IMPLICATIONS OF eCOMMERCE Electronic Contracts.
Mª ANGELA JIMENEZ 1 UNIT 4. EXTERNAL AUDIT BASIS CONCEPTS.
The E-Signatures Act and eConsent Karin Fuog Nelnet Policy Services November 6, 2006.
ESIGN 101 Ken Moyle Margo Tank David Whitaker Chief Legal Officer
1. 2 ECRF survey - Electronic signature Mr Yves Gonner Luxembourg, June 12, 2009.
European payment order Regulation (EC) No 1896/2006 of the European Parliament and of the Council of 12 December 2006 creating a European order for payment.
UNITED NATIONS COMMISSION ON INTERNATIONAL TRADE LAW UNCITRAL Model Law on Electronic Commerce Renaud Sorieul Senior legal Officer UNCITRAL.
CROMERR Applied to Industrial Pretreatment Linko Data Systems, Inc. PretreatmentPretreatment & Fats Oil and Grease SoftwareFats Oil and Grease Software.
Dr. Diganta Biswas School of Law Christ University, Bangalore.
National Smartcard Project Work Package 8 – Security Issues Report.
Legislation, Regulation, Guidelines
Prorogation & Argumentation Radka Chlebcová Simona Trávníčková.
E-commerce Law Electronic signatures and security.
COPYRIGHT GRANTS AND THE E-SIGN ACT Jeanne M. Hamburg Norris, McLaughlin & Marcus, P.A. 875 Third Avenue New York, New York (212)
E-Signatures The Community framework on e-signatures (Directive 1999/93/EC) Dr Ioannis Iglezakis Visiting Lecturer University of Thessaloniki, Greece.
1 A decade of revisions at UNCITRAL Special Course 6 – James Castello Lecture 1 Arbitration Academy PA R I S SUMMER COURSES
Alignment of South African E-Commerce Law Tana Pistorius Department of Mercantile Law UNISA CYBER SA 3 – CONFERENCE & BOOK LAUNCH.
The law of evidence and e-commerce Presented by: Anthony Okulo Advocate High Court of Kenya 25th August 2008Anthony. A Okulo.
HIPAA PRIVACY AND SECURITY AWARENESS.
EService Process Descriptions. COSCA/NACM Standards for Electronic Filing Processes Technical and Business Approaches Section 1.2A Court rules may provide.
1. The applicant, as an alternative to submitting applications in the usual manner in the concerned office, can submit the application to a CHO i CE Agent.
Business Law and the Regulation of Business Chapter 19: Introduction to Sales and Leases By Richard A. Mann & Barry S. Roberts.
2-105(1) "Goods" means all things (including specially manufactured goods) which are movable at the time of identification to the contract for sale other.
Part 3 – The Law of Contract Prepared by Michael Bozzo, Mohawk College Chapter 7 – An Introduction to Contracts © 2015 McGraw-Hill Ryerson Limited 7-1.
QUALITY OF EVIDENCE FRCC Compliance Workshop September/October 2008.
1 Chapter 32 e-business Copyright © Nelson Australia Pty Ltd 2003.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Part 11, Electronic Records; Electronic Signatures
INTERNATIONAL ARBITRATION Leonardo Graffi STUDYING LAW AT ROMA TRE FALL SEMESTER 22 October 2010.
IBT - E-Commerce Contracts Issues Victor H. Bouganim WCL, American University.
TEAM MEMBERS : NAMEMATRIX NO. AMAI A/P EH POO SAYNIE PHONGSWAT A/P E TENG SITI SARAH BINTI ABDUL MUSAWIL THAANIALAKSHMI RAVINDRAN
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
The Singapore Treaty on the Law of Trademarks Kiev March Noëlle Moutout Assistant Legal Officer.
Introduced some basic knowledge of the contract First, what is the contract? Contract, also known as contract. China's definition of the contract, the.
Advocacy and Legal Advice Centre - Internal procedures -
Amendments of the Indian Evidence Act, 1872 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled.
PKI Services for CYPRUS STOCK EXCHANGE Kostas Nousias.
N ATIONAL R EGULATION ICT AND E- COMMERCE IN THE G AMBIA Presented By: Sanusi Drammeh (ICT Officer), MOICI Yahya Samateh (Senior Economist), MOTIE.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
Copyright © 2010 South-Western Legal Studies in Business, a part of South-Western Cengage Learning. and the Legal Environment, 10 th edition by Richard.
1 ETHICAL LAWYERING CLASS 3. 2 Cal. Bus. & Prof (a) Any person advertising or holding himself or herself out as practicing or entitled to practice.
Improving Compliance with ISAs Presenters: Al Johnson & Pat Hayle.
LAWS OF MALAYSIA ACT 658 ELECTRONIC COMMERCE ACT 2006.
Raising Confidence in e-Commerce: the United Nations Convention on the Use of Electronic Communications in International Contracts José Angelo Estrella.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA)
UNITED NATIONS COMMISSION ON INTERNATIONAL TRADE LAW
Electronic Transactions & Authentication
Fundamentals of business law, 10e
Legal And Policy Framework
Legislation, Regulation, Guidelines
Function of the International Court of Justice (ICJ):
14. “(1) Unless otherwise agreed where the originator has stated that the electronic communication is conditional on receipt of acknowledgment, the electronic.
The Office of Open Records webinar will begin soon
© 2013 Sri U-Thong Limited. All rights reserved
Presentation transcript:

Several different ways to indicate person by electronic signature 1.typing the signer's name into the signature area 2.pasting in a scanned version of the signer's signature 3.clicking an "I Accept" button 4.using cryptographic "scrambling" technology

Two elements of electronic signature 1.Material – all kinds of data which are unique and can be used in electronic signature (fingerprints, voice record, PIN code) 2.Functional – electronic signature characteristic which allows identify the subject

PIN code technology and electronic signature technology Equivalent or not? Technical aspect and legal aspect

Digital signatures Cryptographic Signatures (PKI – Public Key Infrastructure) XML-Based Signatures Blind signature Undeniable Signature

Electronic signature legitimation schemes 1.minimum regulation 2.clear technological consolidation (PKI) 3.legitimation based on technological neutrality principle

Electronic signature electronic signature electronic signature means data in electronic form which are attached to or logically associated with other electronic data and which serve as a method of authentication advanced electronic signature advanced electronic signature means an electronic signature which meets the following requirements: (a) it is uniquely linked to the signatory (b) it is capable of identifying the signatory (c) it is created using means that the signatory can maintain under his sole control (d) it is linked to the data to which it relates in such a manner that any subsequent change of the data is detectable

Electronic signature legal power Allowable as evidence in trial Conditions: 1.Security 2.Based on secure signature formative technology 3.Certified on valid qualified certificate

Electronic signature legal power Allowable as additional evidence in trial Electronic signature can not be considered as invalid due to the fact that: 1.it is in electronic form 2.not based upon a qualified certificate 3.not based upon a qualified certificate issued by an accredited certification-service- provider 4.not created by a secure signature-creation device ????

Types of certificates 1. Certificate means an electronic attestation, which links signature-verification data to a signatory and confirms or allows to establish the identity of that signatory

Types of certificates 2. Qualified-certificate means a certificate produced by a certification-service-provider who fulfils the requirements laid down by the Government or its authorised institution. This certificate contains the following data: 1.notation to indicate that it is a qualified-certificate; 2.identifiers of the certification-service-provider and his country of residence; 3.name and surname or the pseudonym of the signatory ; 4.specific attributes of the signatory, if that is required considering the projected goals of the certificate’s use; 5.signature-verification data, which corresponds to the signature-creation data under the control of the signatory; 6.periods of the beginning and end of validity of the certificate; 7.certificate identifier, supplied by certification-service-provider; 8.secure-electronic-signature of the certification-service-provider; 9.limitations on the scope of use of the certificate, if applicable; 10.limits of the value of transactions fort which the certificate can be used, if applicable;

Types of documents Written Written – paper or electronic Others Others – audio, video,

Dual nature of electronic contract on a computer screen 1.may appear on a computer screen to consist of words in a written form strings of numbers and symbols 2.in reality this is merely a representation of the information stored by the computer in electronic form, which does not consist of words but strings of numbers and symbols

Modern policies point to certain imperatives of writing contract 1.the need for certainty within contractual relationships 2.the importance of the parties giving serious deliberation to a decision to enter a land transaction 3.the need to memorialise the agreement for later reference 4.the importance of authentication of the contract to inhibit the likelihood of fraud

Writing - "any mode of representing or reproducing words in a visible form" England, the United States and Australia United Kingdom: Interpretation Act 1978 (UK), Schedule 1: "Writing" includes typing, printing, lithography, photography and other modes of representing or reproducing words in a visible form, and expressions referring to writing are construed accordingly. Australia: Acts Interpretation Act 1954 (Qld) s. 36: "writing includes any mode of representing or reproducing words in a visible form"

The types of media which has been accepted as writing in England and Australia 1) A recital in a will 2) An affidavit 3) Letters 4) A reply to a requisition 5) A statement in a rent book 6) A recital in a settlement 7) A receipt 8) A cheque 9) Telegrams 10) Bills of exchange 11) Facsimiles

US courts are prepared to hold that an is a sufficient writing Shattuck v. Klotzbach 2001 Mass. Super. LEXIS 642, 14 Mass. L. Rep. 360 (Mass. Super. Ct. 2001) where the parties created an agreement of sale by .

The policy objective of the writing requirement in the Statute of Frauds (USA) 1.First the objective is to promote certainty and deliberation in transactions. 2.The second objective is to memorialise the agreement in a reliable form which could be referred to later by the parties and if necessary, produced as evidence in court proceedings.

First objective Acts Interpretation Act 1954 (Qld), s 36; Interpretation Act 1987 (NSW) s. 21: "writing includes printing, photography, photocopying, lithography, typewriting and any other mode of representing or reproducing words in visible form" This definition applies to the visible representation of electronic data as words on a computer screen. If a party can see it and read it, the document is in a visible form.

Second objective Central to this view is the assumption that words on a paper document cannot be altered without detection In order to satisfy this policy objective, the parties should chose a method of creating the electronic contract that is reliable and assures the integrity of the document is maintained. Digital signature

Australia – Electronic Transactions (Queensland) Act Requirement the giving of information in writing may be satisfied by the giving of the information by way of an electronic communication Electronic communication: 1.communication using cables and wires 2.radio waves 3.visible light 4.microwaves 5.infrared signals and 6.other energy in the electromagnetic spectrum

Electronic document have the same functional equivalence as a paper document Giving of information 1) Giving of information: a person "is required to give information in writing" Information must be readily 2) Information must be readily accessible so as to be useable for future reference Consent 3) Consent: consent that can reasonably be inferred from the conduct of the person concerned

Possible situations where consent may be inferred include Previous course of dealingsPrevious course of dealings where electronic communication was used commenced correspondenceA person commenced correspondence or makes an offer via electronic communication and the other party responds in kind A person hands to another a business card with an address indicating the card included contact details

Electronic contracts (two positions) 1.First terms of contract are in electronic form and the party will is express in electronic form 2.Second the contract is oral or written in the traditional way the contract have references to the web-site terms of contract are discuss in cyberspace the party will is on traditional way

UNCITRAL Model Law on Electronic Commerce with Guide to Enactment 1996 Legal recognition of data messages Information shall not be denied legal effect, validity or enforceability solely on the grounds that it is in the form of a data message. Written Signature Original

Legal recognition of data messages WRITTEN Where the law requires information to be in writing, that requirement is met by a data message if the information contained therein is accessible so as to be usable for subsequent reference

Legal recognition of data messages SIGNATURE Where the law requires a signature of a person, that requirement is met in relation to a data message if: method is approval 1. a method is used to identify that person and to indicate that person’s approval of the information contained in the data message that method is as reliable 2. that method is as reliable as was appropriate for the purpose for which the data message was generated or communicated, in the light of all the circumstances, including any relevant agreement

Legal recognition of data messages ORIGINAL Where the law requires information to be presented or retained in its original form, that requirement is met by a data message if: reliable assurance as to the integrity of the information 1.there exists a reliable assurance as to the integrity of the information from the time when it was first generated in its final form, as a data message or otherwise capable of being displayed 2.where it is required that information be presented, that information is capable of being displayed to the person to whom it is to be presented.

Admissibility and evidential weight of data messages Information in the form of a data message shall be given due evidential weight In any legal proceedings, nothing in the application of the rules of evidence shall apply so as to deny the admissibility of a data message in evidence: on the sole ground that it is a data message if it is the best evidence that the person adducing it could reasonably be expected to obtain, on the grounds that it is not in its original form

Information forms and evidences message and attachment power point presentation text created by MS Word or other text redactors spread sheet graphic animation pictures audio and video material voice mail 2004 American Advocate Association

Retention of data messages Where the law requires that certain documents, records or information be retained, that requirement is met by retaining data messages, provided that the following conditions are satisfied is accessiblethe information contained therein is accessible so as to be usable for subsequent reference generated, sent or received can be demonstratedthe data message is retained in the format in which it was generated, sent or received, or in a format which can be demonstrated to represent accurately the information generated, sent or received identificationsuch information, if any, is retained as enables the identification of the origin and destination of a data message and the date and time when it was sent or received

Requirement for data message (including electronic document) 1.authentic 2.reliable 3.accessible and usable 4.authenticate by electronic signature 5.usable as evidence 6.possible for reproduction 7.acceptable form for trial

Electronic contract Where a data message is used in the formation of a contract, that contract shall not be denied validity or enforceability on the sole ground that a data message was used for that purpose

Attribution of data messages originator itself 1.A data message is that of the originator if it was sent by the originator itself data message is deemed to be that of the originator 2.As between the originator and the addressee, a data message is deemed to be that of the originator if it was sent: by a person who had the authority to act on behalf of the originator in respect of that data message by an information system programmed by, or on behalf of, the originator to operate automatically

Attribution of data messages addressee is entitled to regard a data message as being that of the originator 3.As between the originator and the addressee, an addressee is entitled to regard a data message as being that of the originator, and to act on that assumption, if: in order to ascertain whether the data message was that of the originator, the addressee properly applied a procedure previously agreed to by the originator for that purpose; or the data message as received by the addressee resulted from the actions of a person whose relationship with the originator or with any agent of the originator enabled that person to gain access to a method used by the originator to identify data messages as its own.

Acknowledgement of receipt Sending a data message, or by means of that data message, the originator has requested or has agreed with the addressee that receipt of the data message be acknowledged originator has not agreed with the addressee acknowledgement may be given by Where the originator has not agreed with the addressee that the acknowledgement be given in a particular form or by a particular method, an acknowledgement may be given by: any communication by the addressee, automated or otherwise any conduct of the addressee sufficient to indicate to the originator that the data message has been received

Time and place of dispatch and receipt of data messages enters an information system outside the control of the originator Unless otherwise agreed between the originator and the addressee, the dispatch of a data message occurs when it enters an information system outside the control of the originator or of the person who sent the data message on behalf of the originator.

Time of dispatch and receipt of data messages Unless otherwise agreed between the originator and the addressee, the time of receipt of a data message is determined as follows: has designated 1.if the addressee has designated an information system for the purpose of receiving data messages, receipt occurs: at the time when the data message enters the designated information system if the data message is sent to an information system of the addressee that is not the designated information system, at the time when the data message is retrieved by the addressee has not designated 2.if the addressee has not designated an information system, receipt occurs when the data message enters an information system of the addressee.

Place of dispatch and receipt of data messages originator has its place of business Unless otherwise agreed between the originator and the addressee, a data message is deemed to be dispatched at the place where the originator has its place of business, and is deemed to be received at the place where the addressee has its place of business. For the purposes of this paragraph: has more than one place of business closest relationship to the underlying transaction 1.if the originator or the addressee has more than one place of business, the place of business is that which has the closest relationship to the underlying transaction or, where there is no underlying transaction, the principal place of business; does not have a place of businesshabitual residence 2.if the originator or the addressee does not have a place of business, reference is to be made to its habitual residence