E-Business Law in China By Chris Hartnett. Signatures in China Function of a signature is to provide evidence of Function of a signature is to provide.

Slides:



Advertisements
Similar presentations
Research and Innovation Participant Portal Concept for electronic-only grant management in Horizon 2020 Peter HÄRTWICH
Advertisements

International forum on eNotarization and eApostilles The impact of e-technology on notarial acts: legal and technical possibilities and limits -relevance.
6/4/2014 Introduction to Contract Review and Negotiation Robert W. Smithee, JD Director Virtual Medical Group Programs Center for Healthcare Innovation,
UNITED NATIONS COMMISION ON INTERNATIONAL TRADE LAW Enhancing legal certainty for electronic signatures and other authentication methods José Angelo Estrella.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
International Telecommunication Union HIPSSA Project Support for Harmonization of the ICT Policies in Sub-Sahara Africa.
The Austrian Governmental eDelivery System Technical Aspects Ankara, March 17th, 2015 Christian Maierhofer, EGIZ The E-Government Innovation Center is.
Incorporation of Terms. The Importance of Incorporation of Terms 1.The terms become binding to the parties 2.No other terms can be introduced to the contract.
XP New Perspectives on Microsoft Excel 2003, Second Edition- Tutorial 8 1 Microsoft Office Excel 2003 Tutorial 8 – Developing an Excel Application.
1 Exploring Acceptance and Legal Nature of eRecords Within a Paper-Based Framework Electronic Signature & Records Association November 14, 2012 Rafael.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Workshop on registered electronic mail policies and implementations (ETT 57074) Ankara, –
Naklo, A.Komšo 1 eInvoices and Tax Regulation Andja Komšo Tax Administration.
INFORMATION TECHNOLOGY LAW LECTURE 3- ELECTRONIC SIGNATURE Dr. Kadir Bas.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Legal Issues on PKI & qualified electronic certificates. THIBAULT VERBIEST Attorney-at-law at the Brussels and Paris Bar Professor at the Universities.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Using Digital Credentials On The World-Wide Web M. Winslett.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Cyber Law & Islamic Ethics
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Procurement Forum October 16, ELECTRONIC SIGNATURES Arkansas Department of Human Services Ray Stafford.
The Electronic Transaction Getting Paperless signatures with zipLogix Digital Ink®
zipLogix ® Digital Ink Training Sending files to be signed using the new zipForm ® Plus Go Beyond.
Dr. Diganta Biswas School of Law Christ University, Bangalore.
National Smartcard Project Work Package 8 – Security Issues Report.
ELECTRONIC SIGNATURES in Law and Practice John D. Gregory October 5, 2009.
1 Card Scanning Solutions SigniShell CSSN – Card Scanning Solutions THE ULTIMATE SIGNATURE CAPTURE & AUTHENTICATION SOLUTION.
Legislation, Regulation, Guidelines
Information Technology Act India is one of the few countries other than U.S.A, Singapore, Malaysia in the world that have Information Technology.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
PowerPoint Lesson 10 Sharing and Delivering Presentations Microsoft Office 2010 Advanced Cable / Morrison 1.
General Awareness Training Security Awareness Module 3 Take Action! Where To Go for Help.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
Word Lesson 13 Sharing Documents Microsoft Office 2010 Advanced Cable / Morrison 1.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
Evaluating trusted electronic documents Petr Švéda Security and Protection of Information ‘03 © 2003 Petr Švéda, FI MU.
The Role of Vital Records in Driver’s License Administration Linda Lewis President and CEO, AAMVA.
Abdias Lira Wolters Kluwer Financial Services.  Background and Overview  Common Workflows  Feature Comparison.
The Singapore Treaty on the Law of Trademarks Kiev March Noëlle Moutout Assistant Legal Officer.
Presenting Checks for Payment Created By: Laura Kinchen.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Assignments Locate an assignment Attach an assignment Turn in an assignment.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Electronic Records Management Alan Cameron Records Management Consultant.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
7 FAQ’s About Signing Documents Online
eSignature Today and in the Future
Using iLocker.
Chapter 7 Part 1 Internal Control
Lesson 9 Sharing Documents
- POSITIONING PAPER IN DIGITAL WORLD -
Computer an Electronic Filing Cabinet
Red Flags Rule An Introduction County College of Morris
Digital Signatures and Forms
Legislation, Regulation, Guidelines
Microsoft Office Excel 2003
ELECTRONIC SIGNATURES
ELECTRONIC SIGNATURES
Hire Xpress User’s Training A Human Resources guide to Hire Xpress
Presentation transcript:

E-Business Law in China By Chris Hartnett

Signatures in China Function of a signature is to provide evidence of Function of a signature is to provide evidence of –Identity of the signatory –That the signatory adopts the contents of the document Only acceptable forms are handwritten signature and seal Only acceptable forms are handwritten signature and seal

Current Signature Law data in electronic form contained in or attached to a data message and that is used to identify the signatory and indicate his endorsement of the contents of such document data in electronic form contained in or attached to a data message and that is used to identify the signatory and indicate his endorsement of the contents of such document Emphasizes the function, not form Emphasizes the function, not form

Cont. Once parties decide to use electronic signatures, the validity cannot be challenged Once parties decide to use electronic signatures, the validity cannot be challenged Person is responsible for their own signature Person is responsible for their own signature

Reliable Electronic Signatures (RES) Stricter rules governing creation of RES Stricter rules governing creation of RES –Controlled only by the signatory –Any change to the signature can be noticed Issued by a government office (ECSP) Issued by a government office (ECSP) RES recognized worldwide RES recognized worldwide

Strengths of the Act Technology neutral Technology neutral Clearly defined terms Clearly defined terms Clear on when a contract ends and begins Clear on when a contract ends and begins

Weaknesses of the Act No valid rules on RES identification No valid rules on RES identification Liability with electronic signatures Liability with electronic signatures

How to Prevent your RES from Being Stolen Keep your RES in a secure location Keep your RES in a secure location –Password protect files Use wired keyboards Use wired keyboards Store your RES on portable hard drives Store your RES on portable hard drives