SlideShare a Scribd company logo
1 of 13
Wildman Harrold | 225 West Wacker Drive | Chicago, IL 60606 | (312) 201-2000 | wildman.com
© 2010 Wildman, Harrold, Allen & Dixon LLP.
International Adoption and
Cross Jurisdiction Issues in
eSignatures and eRecords
Thomas J. Smedinghoff
Wildman, Harrold, Allen & Dixon, LLP
Chicago
2© 2010 Wildman, Harrold, Allen & Dixon LLP.
International eSignature Models
• Approximately 100 countries have e-signature legislation of some
form; approaches include –
• Minimalist approach -- technology neutral signature model
• E.g., U.S., Australia, UNCITRAL Model Law
• Technology-specific approach (PKI)
• E.g., Utah (repealed), Washington, Malaysia, Egypt, Colombia, Korea,
etc.
• Dual signature approach
• U.S. states (Arizona, Illinois, Iowa*, South Carolina*) – secure electronic
signature
• EU – Electronic Signatures Directive – advanced electronic signature
• E.g., Canada, China, New Zealand, Singapore, Thailand, Vietnam, etc.
3© 2010 Wildman, Harrold, Allen & Dixon LLP.
General Approach to eSignatures
• Form of signature + Attributes
• Form of signature = the data object that represents the
signature
• Attributes = the qualities that must be present to validate
the form of signature as a legally binding signature (may or
may not be qualities of the form of signature)
• Other signature requirements typically added by
evidentiary law – e.g., identity of signer and integrity
of signed record
(From both E-SIGN and UETA)
4© 2010 Wildman, Harrold, Allen & Dixon LLP.
U.S Approach to eSignatures
• Form of signature = any sound, symbol, or process
• Clicking “I Agree” button
• Digital signature (PKI)
• Digitized imaged of handwritten signature
• PIN, password
• Typed name
• Voice signature
• Attributes
• Form of signature must be attached to, or logically associated
with, the record being signed
• Form of signature must be executed or adopted with the intent
to sign
5© 2010 Wildman, Harrold, Allen & Dixon LLP.
Washington State Approach to
Digital Signatures
• Form of signature = a transformation of a message
using an asymmetric cryptosystem such that -
• Attributes
• a person having the initial message and the signer’s public key
can accurately determine –
• Whether the transformation was created using the private key that
corresponds to the signer’s public key; and
• Whether the initial message has been altered since the
transformation was made
(NOTE: This statute is likely preempted by E-SIGN)
6© 2010 Wildman, Harrold, Allen & Dixon LLP.
Canadian Approach to
eSignatures
• Form of signature = one or more letters, characters,
numbers or other symbols in digital form
• Attributes
• Form of signature must be incorporated in, attached to or
associated with an electronic document
• Form of signature must be executed or adopted with the intent to
sign (implied?)
7© 2010 Wildman, Harrold, Allen & Dixon LLP.
Canadian Approach to
“Secure” eSignatures
• Form of signature = one or more letters, characters,
numbers or other symbols in digital form
• Attributes
• Form of signature must be incorporated in, attached to or
associated with an electronic document
• Form of signature must be executed or adopted with the intent to
sign (implied?)
• Form of signature must be –
• Unique to the signer
• Created by technology under the sole control of the signer
• Created by technology that can be used to identify the signer
• linked to the document in such a manner that it can be used to
determine whether the document was changed after it was signed;
8© 2010 Wildman, Harrold, Allen & Dixon LLP.
EU Approach to
“Basic” eSignatures
• Form of signature = any data in electronic form
• Attributes
• Form of signature must be attached to, or logically
associated with, other electronic data
• Form of signature must serve as a method of authentication
9© 2010 Wildman, Harrold, Allen & Dixon LLP.
EU Approach to
“Advanced” eSignatures
• Form of signature = any data in electronic form
• Attributes
• Form of signature must be attached to, or logically
associated with, other electronic data
• Form of signature must serve as a method of authentication
• Form of signature must be –
• uniquely linked to the signer
• capable of identifying the signer
• created using means that the signatory can maintain under his
sole control, and
• linked to the data to which it relates in such a manner that any
subsequent change of the data is detectable;
10© 2010 Wildman, Harrold, Allen & Dixon LLP.
UN Convention – Promoting
Cross-Border Interoperability
• UN Convention on the Use of Electronic
Communications in International contracts
• International treaty designed to remove barriers to
international e-commerce
• Primary focus is on requirements of writing, signature, and original
• History
• Negotiated by UNCITRAL 2001 – 2005
• Approved by United Nations General Assembly 2005
• Signed by 18 countries
• Ratified by 2 countries so far (Honduras and Singapore)
• U.S. working on ratification process – expected in 2011
11© 2010 Wildman, Harrold, Allen & Dixon LLP.
UN Convention
Approach to eSignatures
• New, more flexible approach to electronic signatures
• Focuses on a “method” rather than data as the form
of signature
• Focuses on reliability of attributes as appropriate for
the purpose
12© 2010 Wildman, Harrold, Allen & Dixon LLP.
UN Convention
Approach to eSignatures
• Form of signature = a method
• Attributes
• Method must identify the signatory
• Method must indicate the signatory’s intention
• Method must be either –
• As reliable as appropriate for the purpose of the transaction,
or
• Proven in fact to identify the signatory and indicate the
signatory’s intent
13© 2010 Wildman, Harrold, Allen & Dixon LLP.
Significance of
UN Convention Approach
• “Method” allows for multi-step process
• The Form of Signature itself does not need to possess all
of the attributes
• So long as the overall process does
• Approach recognizes that security of process is a
relative concept
• Requirements vary with the transaction
• Includes a safe harbor allowing proponents to prove up the
required attributes
• At end of the day, virtually identical to U.S.
requirements

More Related Content

What's hot

Trademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital ageTrademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital ageJudy Yen
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital EraFrederick Lane
 
An introduction to electronic data management
An introduction to electronic data managementAn introduction to electronic data management
An introduction to electronic data managementJamez Lee S. Hunter
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
judy's legal employment resume
judy's legal employment resumejudy's legal employment resume
judy's legal employment resumejudith hickman
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?walescva
 
Privacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinPrivacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinBoyle_Fredrickson
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerceWisnu Dewobroto
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerceUjjwal Joshi
 
Fulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftFulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftSteve Meek
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miismcgilla
 
EIM Presentation.13 07.2011
EIM Presentation.13 07.2011EIM Presentation.13 07.2011
EIM Presentation.13 07.2011Pod Legal
 

What's hot (20)

Trademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital ageTrademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital age
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
An introduction to electronic data management
An introduction to electronic data managementAn introduction to electronic data management
An introduction to electronic data management
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
judy's legal employment resume
judy's legal employment resumejudy's legal employment resume
judy's legal employment resume
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?
 
Privacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinPrivacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in Wisconsin
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
Pls 780 week 5
Pls 780 week 5Pls 780 week 5
Pls 780 week 5
 
Pls 780 week_6
Pls 780 week_6Pls 780 week_6
Pls 780 week_6
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Fulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftFulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity Theft
 
Plss780 week 10
Plss780 week 10Plss780 week 10
Plss780 week 10
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
 
Pls780 week 2
Pls780 week 2Pls780 week 2
Pls780 week 2
 
EIM Presentation.13 07.2011
EIM Presentation.13 07.2011EIM Presentation.13 07.2011
EIM Presentation.13 07.2011
 
Pls 780 week 8
Pls 780 week 8Pls 780 week 8
Pls 780 week 8
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 

Viewers also liked

Leadership Niagara 2015
Leadership Niagara 2015Leadership Niagara 2015
Leadership Niagara 2015Paul Copcutt
 
Maksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rusMaksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rusMaksim Yurlov
 
Best Practices for E-Signature Adoption By Independent Agents
Best Practices for E-Signature Adoption By Independent AgentsBest Practices for E-Signature Adoption By Independent Agents
Best Practices for E-Signature Adoption By Independent AgentseSignLive by VASCO
 
Niagara Region 2015
Niagara Region 2015Niagara Region 2015
Niagara Region 2015Paul Copcutt
 
McMaster Social Science - Career Countdown Conference
McMaster Social Science - Career Countdown ConferenceMcMaster Social Science - Career Countdown Conference
McMaster Social Science - Career Countdown ConferencePaul Copcutt
 
Seguridad Operaciones de Protección de Personas.
Seguridad Operaciones de Protección de Personas.Seguridad Operaciones de Protección de Personas.
Seguridad Operaciones de Protección de Personas.oswaldo chomba
 

Viewers also liked (10)

Student Lending
Student LendingStudent Lending
Student Lending
 
Leadership Niagara 2015
Leadership Niagara 2015Leadership Niagara 2015
Leadership Niagara 2015
 
Legal Framework for Electronic Records in LATAM and Spain
Legal Framework for Electronic Records in LATAM and SpainLegal Framework for Electronic Records in LATAM and Spain
Legal Framework for Electronic Records in LATAM and Spain
 
Maksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rusMaksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rus
 
Best Practices for E-Signature Adoption By Independent Agents
Best Practices for E-Signature Adoption By Independent AgentsBest Practices for E-Signature Adoption By Independent Agents
Best Practices for E-Signature Adoption By Independent Agents
 
Felix Global 2015
Felix Global 2015Felix Global 2015
Felix Global 2015
 
Fanshawe 2016
Fanshawe 2016Fanshawe 2016
Fanshawe 2016
 
Niagara Region 2015
Niagara Region 2015Niagara Region 2015
Niagara Region 2015
 
McMaster Social Science - Career Countdown Conference
McMaster Social Science - Career Countdown ConferenceMcMaster Social Science - Career Countdown Conference
McMaster Social Science - Career Countdown Conference
 
Seguridad Operaciones de Protección de Personas.
Seguridad Operaciones de Protección de Personas.Seguridad Operaciones de Protección de Personas.
Seguridad Operaciones de Protección de Personas.
 

Similar to Smedinghoff: International Adoption

The Cloud and e-Signatures - Illinois License Law
The Cloud and e-Signatures - Illinois License LawThe Cloud and e-Signatures - Illinois License Law
The Cloud and e-Signatures - Illinois License LawCarrie Bey-Little
 
Read These 9 Tips For E-Commerce Business | Power Seller Center
Read These 9 Tips For E-Commerce Business | Power Seller CenterRead These 9 Tips For E-Commerce Business | Power Seller Center
Read These 9 Tips For E-Commerce Business | Power Seller Centerpower sellers center
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptxshrutiganpule74
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature Mahmoud Ezzat
 
Electronic Signatures in Commercial Practice
Electronic Signatures in Commercial PracticeElectronic Signatures in Commercial Practice
Electronic Signatures in Commercial PracticeGregg Oldring
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signaturesCoSign by ARX
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesTania Fuchs
 
e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.4Point Solutions
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?Swaleh Ahmed
 
eSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for DigitisationeSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for Digitisationitnewsafrica
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commercesadaf tst
 

Similar to Smedinghoff: International Adoption (20)

The Cloud and e-Signatures - Illinois License Law
The Cloud and e-Signatures - Illinois License LawThe Cloud and e-Signatures - Illinois License Law
The Cloud and e-Signatures - Illinois License Law
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Read These 9 Tips For E-Commerce Business | Power Seller Center
Read These 9 Tips For E-Commerce Business | Power Seller CenterRead These 9 Tips For E-Commerce Business | Power Seller Center
Read These 9 Tips For E-Commerce Business | Power Seller Center
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptx
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
E signature-signyourdoc
E signature-signyourdocE signature-signyourdoc
E signature-signyourdoc
 
Electronic Signatures in Commercial Practice
Electronic Signatures in Commercial PracticeElectronic Signatures in Commercial Practice
Electronic Signatures in Commercial Practice
 
Security and trust in e payment
Security and trust in e  paymentSecurity and trust in e  payment
Security and trust in e payment
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signatures
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
 
e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.
 
E lock digital signatures
E lock digital signaturesE lock digital signatures
E lock digital signatures
 
Carrie Peter
Carrie Peter Carrie Peter
Carrie Peter
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Online privacy
Online privacyOnline privacy
Online privacy
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
 
eSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for DigitisationeSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for Digitisation
 
Cryptography
CryptographyCryptography
Cryptography
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 

More from Electronic Signature & Records Association

More from Electronic Signature & Records Association (15)

MISMO / eMortgage Update
MISMO / eMortgage UpdateMISMO / eMortgage Update
MISMO / eMortgage Update
 
FTC Dot.com Disclosures 2.0
FTC Dot.com Disclosures 2.0FTC Dot.com Disclosures 2.0
FTC Dot.com Disclosures 2.0
 
Smedinghoff Identity Management: Who's Signing?
Smedinghoff Identity Management: Who's Signing?Smedinghoff Identity Management: Who's Signing?
Smedinghoff Identity Management: Who's Signing?
 
Sabett: ESRA Identity Management 11-09-10
Sabett:  ESRA Identity Management 11-09-10Sabett:  ESRA Identity Management 11-09-10
Sabett: ESRA Identity Management 11-09-10
 
Patrick Hartford: eMortgages eDisclosures and eClosings
Patrick Hartford: eMortgages eDisclosures and eClosingsPatrick Hartford: eMortgages eDisclosures and eClosings
Patrick Hartford: eMortgages eDisclosures and eClosings
 
Patfry: Revised Uniform Law on Notarial Acts
Patfry: Revised Uniform Law on Notarial ActsPatfry: Revised Uniform Law on Notarial Acts
Patfry: Revised Uniform Law on Notarial Acts
 
Margo Tank: Legal and Regulatory Update
Margo Tank: Legal and Regulatory UpdateMargo Tank: Legal and Regulatory Update
Margo Tank: Legal and Regulatory Update
 
IRS Expansion of e-Signature Applications
IRS Expansion of e-Signature ApplicationsIRS Expansion of e-Signature Applications
IRS Expansion of e-Signature Applications
 
Harry Gardner: eWarehouse Lending
Harry Gardner: eWarehouse LendingHarry Gardner: eWarehouse Lending
Harry Gardner: eWarehouse Lending
 
David Whitaker: Managing Your Vendors
David Whitaker: Managing Your VendorsDavid Whitaker: Managing Your Vendors
David Whitaker: Managing Your Vendors
 
Edward O'Sheehan: Electronic Signatures: The Wave of the Future
Edward O'Sheehan: Electronic Signatures: The Wave of the FutureEdward O'Sheehan: Electronic Signatures: The Wave of the Future
Edward O'Sheehan: Electronic Signatures: The Wave of the Future
 
ESRA Update 2011
ESRA Update 2011ESRA Update 2011
ESRA Update 2011
 
Legal & Regulatory Update SPeRS 2.0
Legal & Regulatory Update SPeRS 2.0Legal & Regulatory Update SPeRS 2.0
Legal & Regulatory Update SPeRS 2.0
 
Taking Transactions Mobile
Taking Transactions MobileTaking Transactions Mobile
Taking Transactions Mobile
 
IRS Alternative Signatures
IRS Alternative SignaturesIRS Alternative Signatures
IRS Alternative Signatures
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Smedinghoff: International Adoption

  • 1. Wildman Harrold | 225 West Wacker Drive | Chicago, IL 60606 | (312) 201-2000 | wildman.com © 2010 Wildman, Harrold, Allen & Dixon LLP. International Adoption and Cross Jurisdiction Issues in eSignatures and eRecords Thomas J. Smedinghoff Wildman, Harrold, Allen & Dixon, LLP Chicago
  • 2. 2© 2010 Wildman, Harrold, Allen & Dixon LLP. International eSignature Models • Approximately 100 countries have e-signature legislation of some form; approaches include – • Minimalist approach -- technology neutral signature model • E.g., U.S., Australia, UNCITRAL Model Law • Technology-specific approach (PKI) • E.g., Utah (repealed), Washington, Malaysia, Egypt, Colombia, Korea, etc. • Dual signature approach • U.S. states (Arizona, Illinois, Iowa*, South Carolina*) – secure electronic signature • EU – Electronic Signatures Directive – advanced electronic signature • E.g., Canada, China, New Zealand, Singapore, Thailand, Vietnam, etc.
  • 3. 3© 2010 Wildman, Harrold, Allen & Dixon LLP. General Approach to eSignatures • Form of signature + Attributes • Form of signature = the data object that represents the signature • Attributes = the qualities that must be present to validate the form of signature as a legally binding signature (may or may not be qualities of the form of signature) • Other signature requirements typically added by evidentiary law – e.g., identity of signer and integrity of signed record (From both E-SIGN and UETA)
  • 4. 4© 2010 Wildman, Harrold, Allen & Dixon LLP. U.S Approach to eSignatures • Form of signature = any sound, symbol, or process • Clicking “I Agree” button • Digital signature (PKI) • Digitized imaged of handwritten signature • PIN, password • Typed name • Voice signature • Attributes • Form of signature must be attached to, or logically associated with, the record being signed • Form of signature must be executed or adopted with the intent to sign
  • 5. 5© 2010 Wildman, Harrold, Allen & Dixon LLP. Washington State Approach to Digital Signatures • Form of signature = a transformation of a message using an asymmetric cryptosystem such that - • Attributes • a person having the initial message and the signer’s public key can accurately determine – • Whether the transformation was created using the private key that corresponds to the signer’s public key; and • Whether the initial message has been altered since the transformation was made (NOTE: This statute is likely preempted by E-SIGN)
  • 6. 6© 2010 Wildman, Harrold, Allen & Dixon LLP. Canadian Approach to eSignatures • Form of signature = one or more letters, characters, numbers or other symbols in digital form • Attributes • Form of signature must be incorporated in, attached to or associated with an electronic document • Form of signature must be executed or adopted with the intent to sign (implied?)
  • 7. 7© 2010 Wildman, Harrold, Allen & Dixon LLP. Canadian Approach to “Secure” eSignatures • Form of signature = one or more letters, characters, numbers or other symbols in digital form • Attributes • Form of signature must be incorporated in, attached to or associated with an electronic document • Form of signature must be executed or adopted with the intent to sign (implied?) • Form of signature must be – • Unique to the signer • Created by technology under the sole control of the signer • Created by technology that can be used to identify the signer • linked to the document in such a manner that it can be used to determine whether the document was changed after it was signed;
  • 8. 8© 2010 Wildman, Harrold, Allen & Dixon LLP. EU Approach to “Basic” eSignatures • Form of signature = any data in electronic form • Attributes • Form of signature must be attached to, or logically associated with, other electronic data • Form of signature must serve as a method of authentication
  • 9. 9© 2010 Wildman, Harrold, Allen & Dixon LLP. EU Approach to “Advanced” eSignatures • Form of signature = any data in electronic form • Attributes • Form of signature must be attached to, or logically associated with, other electronic data • Form of signature must serve as a method of authentication • Form of signature must be – • uniquely linked to the signer • capable of identifying the signer • created using means that the signatory can maintain under his sole control, and • linked to the data to which it relates in such a manner that any subsequent change of the data is detectable;
  • 10. 10© 2010 Wildman, Harrold, Allen & Dixon LLP. UN Convention – Promoting Cross-Border Interoperability • UN Convention on the Use of Electronic Communications in International contracts • International treaty designed to remove barriers to international e-commerce • Primary focus is on requirements of writing, signature, and original • History • Negotiated by UNCITRAL 2001 – 2005 • Approved by United Nations General Assembly 2005 • Signed by 18 countries • Ratified by 2 countries so far (Honduras and Singapore) • U.S. working on ratification process – expected in 2011
  • 11. 11© 2010 Wildman, Harrold, Allen & Dixon LLP. UN Convention Approach to eSignatures • New, more flexible approach to electronic signatures • Focuses on a “method” rather than data as the form of signature • Focuses on reliability of attributes as appropriate for the purpose
  • 12. 12© 2010 Wildman, Harrold, Allen & Dixon LLP. UN Convention Approach to eSignatures • Form of signature = a method • Attributes • Method must identify the signatory • Method must indicate the signatory’s intention • Method must be either – • As reliable as appropriate for the purpose of the transaction, or • Proven in fact to identify the signatory and indicate the signatory’s intent
  • 13. 13© 2010 Wildman, Harrold, Allen & Dixon LLP. Significance of UN Convention Approach • “Method” allows for multi-step process • The Form of Signature itself does not need to possess all of the attributes • So long as the overall process does • Approach recognizes that security of process is a relative concept • Requirements vary with the transaction • Includes a safe harbor allowing proponents to prove up the required attributes • At end of the day, virtually identical to U.S. requirements