E-commerce Law Electronic signatures and security.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
ONLINE PRIVACY & DATA PROTECTION VERINE ETSEBETH.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Workshop on registered electronic mail policies and implementations (ETT 57074) Ankara, –
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Shouting from the Rooftops: Improving Security Dr. Maury Pinsk FRCPC University of Alberta Division of Pediatric Nephrology.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
Legalities of ICT Chapter 7.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
How to get your free Windows Store Access
ELECTRONIC COMMUNICATION ACT 2000 Raashida & Sangeetha.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Cyber Law & Islamic Ethics
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signatures. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies are as good as original.
Digital Certificates. What is a Digital Certificate? A digital certificate is the equivalent of your business card in the e-commerce world. It says who.
EPS (Electronic payment system) is an online business process used for fund transfer using electronic means, i.e  Personal computers  services  Mobile.
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
E-Commerce and the Law Section Understanding Business and Personal Law E-Commerce and the Law Section 13.3 Contracts for the Sale of Goods What.
Electronic Payment Systems
COPYRIGHT GRANTS AND THE E-SIGN ACT Jeanne M. Hamburg Norris, McLaughlin & Marcus, P.A. 875 Third Avenue New York, New York (212)
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
E-commerce Law Consumer Protection. This lecture will examine legislation protecting consumers. We will look specifically at: –Consumer Protection (Distance.
Lloydes TSB Case Study Lloyds: LloydsTsb is the banking arm of Lloyds International One of the only banks left with rural branches found in villages They.
Secure Electronic Transaction (SET)
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
Types of Electronic Infection
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Systems that support electronically executed business transactions.
DIGITAL SIGNATURE.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
LECTURE – V e-COMMERCE İstanbul Commerce University Vocational School.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
Information Systems Design and Development Security Precautions Computing Science.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
Unit 3 Section 6.4: Internet Security
Uses Uses of cryptography Lab today on RSA
Digital Signature.
Digital Signatures and Forms
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Presentation transcript:

E-commerce Law Electronic signatures and security

Identity One of the most important issues on the Internet is identity. Anyone can be anyone on the Internet. When in a computer chatroom, how do you know who you are really chatting with?

Identity Why is identity important? Because … … … Identity ensures enforceability.

Enforceability For example Bill s Paul and offers him 4000 blank CD ROMs for £400. Paul s Bill and accepts.

Enforceability Paul then discovers that he can buy the same number of CDs from Carla who imports them cheaply from China for £300. When Bill delivers the CDs to Paul, Paul refuses to accept them and states that someone other than himself must have sent the and made the contract.

Enforceability What is the legal position? The answer lies in enforceability and proving on the balance of probabilities that Paul made the contract with Bill. If Bill went to court would he win?

Enforceability This will always depend upon the evidence that is available. The same situation is true for shopping on the Internet.

Enforceability The problem here lies with identity. If you could prove identity you could enforce contracts more easily. How can you prove who the person is at the other end of the electronic communication?

Electronic Signatures The lawfor electronic signatures is founded in European Directive 1999/93. It was formalised into UK law by the Electronic Communications Act It was once to be called the Electronic Commerce Act, but was renamed during its passage as a large part of it deals with telecommunications.

Electronic Signatures During its transition through Parliament, the main purpose of the ECA was “to help build confidence in electronic commerce and the technology underlying it.”

Electronic Signatures The Act provides a major legal benefit - the legal recognition of electronic signatures. Section 7 of the Act gives electronic signatures the same legal standing as a manual signature.

Section 7 (1)In any legal proceedings- (a) an electronic signature incorporated into or logically associated with a particular electronic communication or particular electronic data, and (b) the certification by any person of such a signature

Section 7 (cont’d) shall each be admissible in evidence in relation to any question as to the authenticity of the communication or data or as to the integrity of the communication or data.

What is an Electronic Signature? An electronic signature is a manual signature in electronic form, for example

What is an electronic signature? For the purposes of the Electronic Communications Act An electronic signature is a digital certificate which verifies the identity of an individual.

What is an electronic signature? They can be used in two ways. 1.Stored in your internet browser 2.Attached to an

Stored in the internet browser. This allows an electronic retailer to confirm the identity of a person who is ‘shopping’ on the internet. example

Electronic signatures can be attached to s to confirm the identity of the sender. N.B. Section 7 of the ECA gives an signed in this way the same legal force as if it was signed by hand.

Associated benefits Electronic signatures have a very useful associated benefit, which is: ~ totally secure . Secure will be very important for lawyers in the future.

Secure Electronic signatures use dual key cryptography What is dual key cryptography?

Dual Key Cryptography Every electronic signature has 2 keys associated with it. 1. A private key 2. A public key

Private Key This is kept by the person sending an and is used to encrypt the electronic signature.

Public Key This is sent with the electronic signature and allows the electronic signature to be unencrypted.

Peter’s Private Key Peter’s Public Key Dual Key Cryptography PeterPaul

Effect of the encrypted signature When the electronic signature is unencrypted, it will: ~ 1.Inform the recipient whether the has been tampered with. 2.Authenticate the as coming from the person it appears to be from.

Secure Secure is possible as soon as one person has another’s public key. An , and any associated documents, can be encrypted by that public key which can only be unencrypted by the corresponding private key.

Secure Completely secure is very significant for solicitors as it will allow quick and confidential communication with others.

Problems with Electronic Signatures There are some disadvantages with electronic signatures. 1.They are not free 2.They do not remove fraud.

Cost? It is possible to get free electronic signatures, although these are only for individual use. Electronic Signatures for business cost money. The largest supplier of electronic signatures is called Verisign.

Fraud As yet in this country there is nothing to prevent another person getting a signature on your behalf and contracting as you. This is more difficult in America.

The impact of electronic signatures What impact have electronic signatures had on the world? Not as much as could be hoped for - yet.

The impact of electronic signatures E-commerce has increased. However, would e-commerce have increased anyway? Probably yes.

The impact of electronic signatures Electronic Signatures are set to have a major impact on property transfer.

Electronic Conveyancing This will remove the paper requirements for the buying and selling of property. A solicitor will act as an agent for property owners and sign all documents electronically on their behalf.

Electronic Conveyancing Allowing electronic conveyancing has required an important change to the law. Prior to 2002, all conveyances needed to comply with s2 of the Law of Property (Miscellaneous Provisions) Act 1989.

Electronic Conveyancing This requires contracts to be made in writing – s2(1). Electronic conveyancing will not be in writing because it is electronic. Therefore the law had to be changed

Electronic Conveyancing This change came in the form of section 91(4)(a) of the Land Registration Act This states that an electronic conveyancing document is deemed to be ‘in writing’.

The future of Electronic Signatures In the future Electronic Signatures will be probably be carried by every individual. They are already being put on smart chips on credit cards.

The future of Electronic Signatures These smart cards will in the distant future carry lots of other information, for example: Fingerprints DNA information Medical records

Smart Chips