The law of evidence and e-commerce Presented by: Anthony Okulo Advocate High Court of Kenya 25th August 2008Anthony. A Okulo.

Slides:



Advertisements
Similar presentations
Efforts of Pakistan to Curb Electronic Crimes and Combat Cyber Terrorism Syed Mohammed Anwer Director Legal Ministry of Information Technology Government.
Advertisements

A GIA is a contract between a surety company and a contractor (or subcontractor)/principal. A GIA is a standard, typical document in the construction.
Concept of Law and Sources of Law
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
Independent Contractor Orientation HIPAA What Is HIPAA? Health Insurance Portability and Accountability Act of 1996 The Health Insurance Portability.
KSTCD Branch/HRD Section/TrainForTrade & STICT Branch/ ICT Analysis Section1 Module 2 Legal validity of data messages.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
ITA 2008: Law Enforcement & Incident Response -The way forward- By Talwant Singh Addl. Distt. & Sessions Judge Delhi
Health Insurance Portability Accountability Act of 1996 HIPAA for Researchers: IRB Related Issues HSC USC IRB.
Workshop on registered electronic mail policies and implementations (ETT 57074) Ankara, –
PROSPECTUS AND COMMENCEMENT OF BUSINESS
INFORMATION TECHNOLOGY LAW LECTURE 3- ELECTRONIC SIGNATURE Dr. Kadir Bas.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
Cyber Crime: Judicial Perspective By Talwant Singh Addl. Distt. & Sessions Judge Delhi
I NFORMATION T ECHNOLOGY A CT B ACKGROUND 1. Drew inspiration from Model Law on Electronic Commerce adopted by the United Nations Commission of.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
Electronic evidence in Spanish civil procedure: where wishes clash against reality Julio Pérez Gil Universidad de Burgos.
UNITED NATIONS COMMISION ON INTERNATIONAL TRADE LAW (UNCITRAL) Current issues on electronic contracting José Angelo Estrella Faria Legal Officer UNCITRAL.
 E-Commerce  The sale of goods and services by computer over the Internet  Internet  A collection of millions of computers that provide a network.
Business Law Module 4 Module IV: Information Technology Act 2000
Cyber Law & Islamic Ethics
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
CROMERR Applied to Industrial Pretreatment Linko Data Systems, Inc. PretreatmentPretreatment & Fats Oil and Grease SoftwareFats Oil and Grease Software.
Cyber Laws in Pakistan. Cyber Crime Activity in which computers or networks are a tool, a target, or a place of criminal activity. Cyber crime also stated.
Dr. Diganta Biswas School of Law Christ University, Bangalore.
Legislation, Regulation, Guidelines
Several different ways to indicate person by electronic signature 1.typing the signer's name into the signature area 2.pasting in a scanned version of.
COPYRIGHT GRANTS AND THE E-SIGN ACT Jeanne M. Hamburg Norris, McLaughlin & Marcus, P.A. 875 Third Avenue New York, New York (212)
Business Law for the Entrepreneur and Manager
Alignment of South African E-Commerce Law Tana Pistorius Department of Mercantile Law UNISA CYBER SA 3 – CONFERENCE & BOOK LAUNCH.
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Data Protection & FOI Data Protection: Background Human Right to Privacy Unenumerated right under Irish Constitution Explicit right under European Convention.
Indian Penal Code Act, 1860 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled Legal Expert with.
End Use and User of Ammunition AT05 Slide 1. Types of End Use Documents  End User Certificate (EUC)  Delivery Verification Certificate (DVC) AT05 Slide.
The law on Intermediary Liability in India
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
1 Chapter 32 e-business Copyright © Nelson Australia Pty Ltd 2003.
OHS Seminar DO THE TIME – avoid the crime! Miles Crawley 8 June 2007.
DIGITAL SIGNATURE.
INTERNATIONAL ARBITRATION Leonardo Graffi STUDYING LAW AT ROMA TRE FALL SEMESTER 22 October 2010.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
ARC 807: Professional Practice and Procedure Department of Architecture, Federal University of Technology, Akure, Nigeria ARC 807: Professional Practice.
Indiana’s Public Access Laws Heather Willis Neal Indiana Public Access Counselor Columbus Police Department August 18, 2009.
TEAM MEMBERS : NAMEMATRIX NO. AMAI A/P EH POO SAYNIE PHONGSWAT A/P E TENG SITI SARAH BINTI ABDUL MUSAWIL THAANIALAKSHMI RAVINDRAN
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
“ Copyright © Allyn & Bacon 2008 Criminal Evidence Chapter Twelve: Documentary and Scientific Evidence This multimedia product and its contents are protected.
Amendments of the Indian Evidence Act, 1872 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled.
The Bankers` Books Evidence Act. Banks keep their accounting and its details in various ledgers, registers. When any claim of the bank is required to established.
FORMATION OF COMPANY. Steps for formation of a company  Electronic filing of form  Incorporation of company  Certificate of incorporation  Promoter.
N ATIONAL R EGULATION ICT AND E- COMMERCE IN THE G AMBIA Presented By: Sanusi Drammeh (ICT Officer), MOICI Yahya Samateh (Senior Economist), MOTIE.
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
LAWS OF MALAYSIA ACT 658 ELECTRONIC COMMERCE ACT 2006.
POLICE REPORT.
Nassau Association of School Technologists
Connectivity to bank and sample account structure
1st Workshop On Transposition Of SADC Cybersecurity Model Laws In National Laws For Namibia Windhoek, Namibia - 30 April 2013 Transposition of SADC.
Wyoming Statutes §§ through
Electronic Transactions & Authentication
Legal And Policy Framework
PRESENTATION OF MONTENEGRO
Data protection issues in regulatory investigations
POLICE REPORT.
SCHOOL OF LAW L 470- INFORMATION TECHNOLOGY LAW
Law of Evidence Burden and standard of proof.
Legal challenges facing franchising in Kenya
Tools & Approaches for Ongoing Privacy Compliance
Good Spirit School Division
Presentation transcript:

The law of evidence and e-commerce Presented by: Anthony Okulo Advocate High Court of Kenya 25th August 2008Anthony. A Okulo LLB, LLM1

Introduction The objectives of this presentation is to: a) A nalyze and the law of evidence and e-commerce b) To determine whether electronic evidence is admissible in court under the Evidence Act cap 80 c) To preview the proposed Electronic Transactions Bill of th August 2008Anthony. A Okulo LLB, LLM2

Topics of Discussion 1. Definition of e-commerce 2. The Evidence Act Cap The Copyright Act No.11 of Conditions to be satisfied under the Evidence Act 5. Limitations of the law of evidence 6. The Electronic Transactions Bill of Offences and penalties 8. Conclusion 25th August 2008Anthony. A Okulo LLB, LLM3

E-Commerce E-commerce is the use of electronic networks to exchange or transfer business information, services, products and payments through the internet Electronic Transactions Bill, 2007 The internet is a worldwide computer network with three important facilities, amongst others that are provided via the internet, these are: , the worldwide web and Usenet. Godfrey v Demon Internet Ltd [1999] 4 All ER th August 2008Anthony. A Okulo LLB, LLM4

The Evidence Act Cap 80 “Evidence” denotes the means in which an alleged matter of fact, the truth of which is submitted to investigation, is proved or disproved……an includes:  Statements by accused persons  Admissions  Observations by the court in its judicial capacity 25th August 2008Anthony. A Okulo LLB, LLM5

The Evidence Act Cap 80 Section 65 Primary evidence means the document itself is produced for inspection in court S65(1) Secondary evidence includes a) Certified copies b) Copies from the original by mechanical process c) Copies compared by the original d) Counter parts of the original e) Oral accounts of a document by a person who has seen them 25th August 2008Anthony. A Okulo LLB, LLM6

Copyright Act No. 11 of 2001 A “computer” means an electronic or similar device having information processing capabilities (section 2(1) Copyright Act 2001) A “computer program” means a set of instructions expressed in words, codes, schemes or in other form which is capable, when incorporated in a medium that the computer can read, of causing a computer to perform a particular task or result. (section 2(1) Copyright Act 2001) 25th August 2008Anthony. A Okulo LLB, LLM7

Copyright Act No. 11 of 2001 Literary work means, irrespective of the quality a) (amongst others) b) Computer programs c) Tables and compilations of data including tables and compilations of data stored and embodied in a computer or a medium used in conjunction with a computer 25th August 2008Anthony. A Okulo LLB, LLM8

The Evidence Act Cap 80 Section 65 (5) (C) A statement contained in a document and included in printed material produced by a computer (computer print-out) shall if the following conditions are satisfied, be deemed to also be a document..... And shall be admissible in any proceedings without further proof of production of the original or of the facts stated therein of which direct evidence would be admissible. Hearsay rule: ‘ an assertion other than one made by a person while giving oral evidence in the proceedings is inadmissible as evidence of a fact asserted’ Cross and Tapper on Evidence (8 th edn, 1995) p46 25th August 2008Anthony. A Okulo LLB, LLM9

The Evidence Act Cap 80 Section 65 (6) (a)-(d) The computer print-out containing the statement must have been produced by the computer during the period in which the computer was regularly used to store or process the information for the purposes of any activities regularly carried on over that period by a person having lawful control over the use of the computer S.65 (6) (a) R v Governor of Brixton Prison, ex p Levin 1997 (HL)All E.R at 289 The print-outs are tended to prove the transfers of funds which they record. They do not assert that such transfers took place. They record the transfers themselves, created by the interaction between whoever purported to request the transfers and the computer program. The evidential status of the computer print- outs is no different from that of a photocopy of a forged cheque. 25th August 2008Anthony. A Okulo LLB, LLM10

The Evidence Act Cap 80 Section 65 (6) (a) – (d) The computer was operating properly or, if not, that any respect in which it was not operating properly was not such as to affect the production of the document or the accuracy of its content's 65 (6) (C ) Director of Public Prosecutions Versus Mckeown 1997 (HL) All ER at 737 The clock display of an Intoximeter was not functioning properly. The courts distinguished between a relevant and irrelevant malfunction. A malfunction is relevant if it affects the way in which the computer processes, stores or retrieves the information used to generate the statement tendered in evidence. Other malfunctions do not matter. 25th August 2008Anthony. A Okulo LLB, LLM11

The Evidence Act Cap 80 Section 65 (6) (a) – (d) The Computer was, during the period to which the proceedings relate, used in the ordinary course of business regularly and was supplied with information of the kind contained in the document or the kind of information so contained is derived S. 65 (6) (b) The information contained in the statement reproduces or is derived from information supplied to the computer in the ordinary course of business S. 65 (6) (d) 25th August 2008Anthony. A Okulo LLB, LLM12

The Evidence Act Cap 80 Section 65 (6) (7) (a)-(d) Where over any period, the function of storing or processing information for the purposes of any activities regularly carried out or….was regularly performed by computers, by: a) By a combination of computers operating over that period… All computers used for that purpose during that period shall be treated for the purpose of this section as constituting a single computer and references in this section to a computer shall be construed accordingly 25th August 2008Anthony. A Okulo LLB, LLM13

The Evidence Act Cap 80 Section 65 (6) (7) (a)-(d) Combination of computers Godfrey vs Demon Internet Limited [1999] 4 ALL ER 342 The internet is a worldwide computer network with three important facilities, amongst others that are provided via the internet, these are; , the worldwide Web and Usenet 25th August 2008Anthony. A Okulo LLB, LLM14

The Evidence Act Cap 80 Section 65 (8) (7) (a)-(c ) Certification DPP v McKeown [1997] 1 All ER 737 This section is a specialized exception to the hearsay rule which on compliance with its conditions, enables evidence which …could have been given orally, to be given instead by a certificate admissible on mere production. Note: Hearsay rule: ‘ an assertion other than one made by a person while giving oral evidence in the proceedings is inadmissible as evidence of a fact asserted’ Cross and Tapper on Evidence (8 th edn, 1995) p46 25th August 2008Anthony. A Okulo LLB, LLM15

The Evidence Act Cap 80 Section 65 (9) (a)-(c ) Documents produced with or without human intervention Owners of Motor ship Sapporo Maru versus Owners of Steam Tanker Statue of liberty [1968] 2 All E.R. at 195 The defendants resisted the admissibility of a strip of film[that recorded two ships colliding at sea] on the grounds that it [was] a piece of evidence produced purely mechanically without human intervention and as such offends the hearsay rule. The court ruled that the law is bound to take cognizance of the fact that mechanical means have replace[d] human effort 25th August 2008Anthony. A Okulo LLB, LLM16

Limitations of existing laws Requirement to give information in writing Requirement to provide a signature Requirement to produce a document Requirement to record information Requirement to retain a document Must be in material form 25th August 2008Anthony. A Okulo LLB, LLM17

Limitations of existing laws THE EVIDENCE ACT DOES NOT RECOGNISE ELECTRONIC DATA All documents must be produced in material form 25th August 2008Anthony. A Okulo LLB, LLM18

Electronic Transactions Bill, 2007 Part 111 Section 6 Information shall not be denied legal effect, validity or enforceability solely on the ground that it is in the form of an electronic version 25th August 2008Anthony. A Okulo LLB, LLM19

Electronic Transactions Bill, 2007 Part 111 Section 8 Where the law requires information to be in writing, the requirement of the law is fulfilled if the information is contained in electronic version that is accessible and intelligible so as to be usable for subsequent reference 25th August 2008Anthony. A Okulo LLB, LLM20

Legal requirements (electronic versions) Legal requirements (contract formation) Recognition of electronic signatures Originality (forms) Originator and addressee Formation and validity of contracts Time and place of dispatch and receipts of electronic versions Time of contract formation Acknowledgement of receipts Attribution of electronic versions Automated message systems License for electronic certification services 25th August 2008Anthony. A Okulo LLB, LLM21

Liability of Service Providers Privacy and Security Mere conduit Caching Hosting Information location tools Unlawful activities Obligations to monitor Exemptions Protected information systems Security regulations Collection of personal information Accuracy of information Access to records 25th August 2008Anthony. A Okulo LLB, LLM22

E-GovernmentGeneral provisions Electronic filling and issue of documents Publication of rules and regulations in the Kenya Gazette Jurisdiction of the courts Restrictions on disclosure of information Limitation of liability Regulations 25th August 2008Anthony. A Okulo LLB, LLM23

Amendments to the Evidence Act Any information contained in an electronic record which is printed on a paper, stored, recorded or copied optical or electromagnetic media produced by a computer shall be deemed as a document and therefore admissible in court if certain conditions are satisfied………………. 25th August 2008Anthony. A Okulo LLB, LLM24

Amendments to the Penal Code Schedule C Unauthorised access Unauthorised data access Data Interference System Interference Electronic Fraud Electronic Forgery Misuse of electronic systems Unauthorized access to password Misuse of encryption Malicious code Cyber stalking Spamming Spoofing Unauthorized interception Cyber Terrorism Waging Cyber War Child Pornography Enhanced punishment Corporate liability Power of investigation officer to access electronic systems and data 25th August 2008Anthony. A Okulo LLB, LLM25

Conclusion THE ELECTRONIC TRANSACTIONS BILL,2007 WILL CREATE AN ENABLING ENVIRONMENT FOR E-COMMERCE TO FLORISH IN KENYA 25th August 2008Anthony. A Okulo LLB, LLM26