Advanced electronic signatures provide a secure way to sign electronic documents and satisfy legal signature requirements. They work using public key cryptography and digital certificates. A digital certificate contains a person's public key and identification, allowing them to create an advanced electronic signature by digitally signing documents using their corresponding private key. South African law, including the Electronic Communications and Transactions Act, recognizes advanced electronic signatures as equivalent to handwritten signatures in many contexts.
This document provides an overview of cyber law in India. It summarizes the Information Technology Act 2000, which provides the legal framework for electronic commerce and digital signatures. It outlines some key sections of the act related to digital signatures, cyber crimes, data privacy, penalties, and amendments made in 2008. Examples of cyber crimes in India are also briefly described. The summary is intended to convey the high-level purpose and scope of cyber law in India according to this document.
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The Act was enacted in 2000 to provide legal recognition to electronic records and digital signatures. It is based on the UNCITRAL Model Law on E-Commerce.
- The objectives are to facilitate electronic governance and commerce. It defines electronic records, digital signatures, secure systems, etc. and recognizes their legal validity.
- It applies to the whole of India and any offenses committed outside India involving computers in India. Various cybercrimes are punishable under the Act.
- It establishes provisions for public key infrastructure, digital signature certificates, duties of subscribers, and regulates certifying authorities to facilitate
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
The document provides an overview of the Information Technology Act, 2000 of India. Some key points:
- The Act aims to provide legal recognition to electronic records and transactions carried out online. It defines electronic records and digital signatures.
- It establishes a Controller of Certifying Authorities to regulate and license Certifying Authorities to issue digital signature certificates.
- The Act recognizes electronic governance and gives legal validity to electronic records and digital signatures. It aims to facilitate electronic filing of documents.
- It defines offences related to cybercrime and provides penalties and adjudication process for contravention of the Act's provisions. Adjudicating officers are empowered to determine compensation in cases of loss or unfair advantage resulting
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
The document provides an overview of the Information Technology Act 2000 of India. Some key points:
- The IT Act was enacted in 2000, making India the 12th country to adopt cyber laws, and is based on UNCITRAL model law on e-commerce.
- The Act aims to provide legal recognition for electronic transactions and facilitate e-governance. It defines electronic records and digital signatures.
- A Controller of Certifying Authorities regulates and licenses Certifying Authorities to issue digital signature certificates using public key infrastructure.
- The Act recognizes electronic records and digital signatures as legally valid. It aims to facilitate electronic governance and commerce.
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The IT Act was enacted in 2000, making India the 12th country to adopt cyber laws, and is based on UNCITRAL model law on e-commerce.
- The objectives of the Act were to provide legal recognition for electronic transactions and documents, facilitate e-governance, and amend related laws to include electronic forms.
- It defines important terms like electronic records, digital signatures, and secure digital signatures verified using public key infrastructure.
- The Act provides for legal recognition of electronic records and digital signatures, and regulates the functions of the Controller of Certifying Authorities and licensed Cert
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
The document provides an overview of the Information Technology Act 2000 of India. Some key points:
- The IT Act was enacted in 2000, making India one of the first 12 countries to adopt cyber laws. It is based on the UNCITRAL Model Law on e-commerce.
- The objectives of the Act were to provide legal recognition for electronic transactions and facilitate e-governance. It amended several other Indian laws to include electronic records and digital signatures.
- The Act applies to cyber offenses committed in India or involving Indian systems. It defines important terms like electronic records, digital signatures, and secure electronic records using cryptography.
- Digital signatures use public key infrastructure for verification by relying parties
This document provides an overview of cyber law in India. It summarizes the Information Technology Act 2000, which provides the legal framework for electronic commerce and digital signatures. It outlines some key sections of the act related to digital signatures, cyber crimes, data privacy, penalties, and amendments made in 2008. Examples of cyber crimes in India are also briefly described. The summary is intended to convey the high-level purpose and scope of cyber law in India according to this document.
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The Act was enacted in 2000 to provide legal recognition to electronic records and digital signatures. It is based on the UNCITRAL Model Law on E-Commerce.
- The objectives are to facilitate electronic governance and commerce. It defines electronic records, digital signatures, secure systems, etc. and recognizes their legal validity.
- It applies to the whole of India and any offenses committed outside India involving computers in India. Various cybercrimes are punishable under the Act.
- It establishes provisions for public key infrastructure, digital signature certificates, duties of subscribers, and regulates certifying authorities to facilitate
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
The document provides an overview of the Information Technology Act, 2000 of India. Some key points:
- The Act aims to provide legal recognition to electronic records and transactions carried out online. It defines electronic records and digital signatures.
- It establishes a Controller of Certifying Authorities to regulate and license Certifying Authorities to issue digital signature certificates.
- The Act recognizes electronic governance and gives legal validity to electronic records and digital signatures. It aims to facilitate electronic filing of documents.
- It defines offences related to cybercrime and provides penalties and adjudication process for contravention of the Act's provisions. Adjudicating officers are empowered to determine compensation in cases of loss or unfair advantage resulting
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
The document provides an overview of the Information Technology Act 2000 of India. Some key points:
- The IT Act was enacted in 2000, making India the 12th country to adopt cyber laws, and is based on UNCITRAL model law on e-commerce.
- The Act aims to provide legal recognition for electronic transactions and facilitate e-governance. It defines electronic records and digital signatures.
- A Controller of Certifying Authorities regulates and licenses Certifying Authorities to issue digital signature certificates using public key infrastructure.
- The Act recognizes electronic records and digital signatures as legally valid. It aims to facilitate electronic governance and commerce.
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The IT Act was enacted in 2000, making India the 12th country to adopt cyber laws, and is based on UNCITRAL model law on e-commerce.
- The objectives of the Act were to provide legal recognition for electronic transactions and documents, facilitate e-governance, and amend related laws to include electronic forms.
- It defines important terms like electronic records, digital signatures, and secure digital signatures verified using public key infrastructure.
- The Act provides for legal recognition of electronic records and digital signatures, and regulates the functions of the Controller of Certifying Authorities and licensed Cert
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
The document provides an overview of the Information Technology Act 2000 of India. Some key points:
- The IT Act was enacted in 2000, making India one of the first 12 countries to adopt cyber laws. It is based on the UNCITRAL Model Law on e-commerce.
- The objectives of the Act were to provide legal recognition for electronic transactions and facilitate e-governance. It amended several other Indian laws to include electronic records and digital signatures.
- The Act applies to cyber offenses committed in India or involving Indian systems. It defines important terms like electronic records, digital signatures, and secure electronic records using cryptography.
- Digital signatures use public key infrastructure for verification by relying parties
The Information Technology Act 2000 was enacted in India on May 17, 2000 to provide legal recognition to electronic commerce and transactions carried out by electronic data interchange and other means of electronic communication. The Act is based on a model law adopted by the UN on e-commerce. It aims to facilitate electronic governance and filing of documents. Some key components of the Act include provisions around digital signatures, duties of subscribers, penalties for offences, and protection for network service providers. It also defines important terms related to e-commerce and cyber security.
DIGITAL SIGNATURE VS ELECTRONIC SIGNATURES.pdfFilingBee
DSCs (Digital Signature Certificates) are the digital (electronic) equivalents of physical or paper certificates. Physical certificates include things like driver's licences, passports, and membership cards.
Information Technology Act 2000 An OverviewAnubhav
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The Act aims to provide legal recognition for electronic transactions and facilitate e-filing/payments with the government.
- It defines important terms like electronic records, digital signatures, and security procedures. Digital signatures created using asymmetric cryptographic keys can verify electronic records.
- A public key infrastructure (PKI) allows parties without prior agreements to verify each other's identities through digital certificates issued by a certification authority.
- The Act lays out the legal processes for digital signatures to authenticate electronic records in a secure manner similar to physical signatures.
The Electronic Commerce Act 2000 of Ireland validates electronic communications and signatures to the same extent as paper-based ones, provided the receiving party consents. For financial advisors, electronic records meet legal retention obligations if they assure integrity and accessibility of information over time. Digiproving electronic signatures satisfy these requirements by making documents unalterable after signing and certifying the time and location of creation. However, "advanced electronic signatures" involving digital certificates from certification authorities are recognized as witnessed signatures but come with overhead of identity proofing and annual costs.
Ethics of Online Forms and E-Signatures for AttorneysGreg McLawsen
Did you really ever think you’d see the day when a pen-
and-ink signature on a document, or even an original document, wasn’t required? Well, that day has come – and you need to insure you are not only in compliance with court rules, but also ethics rules. We’ll examine:
• The RPCs relevant to documents and signatures (RPC 1.6 on confidentiality of information), and touch upon on the attorneys duty to supervise associate attorneys, legal support staff, and LLLTs (5.1, 5.2, 5.3, and 5.10)
• The competent use of various e-signature services
• The ethical and technical requirements for safeguarding client signatures
• How to competently and safely complete and submit on-line forms
This presentation was given at the January 22, 2016 annual CLE of the Washington State Bar Association's Solo and Small Practice Section
The document provides an overview of the Information Technology Act 2000 of India. It discusses key objectives of the act such as providing legal recognition to electronic transactions and records. It also defines important terms used in the act like computer, electronic record, digital signature. The roles of regulatory authorities like the Controller of Certifying Authorities in licensing and auditing Certifying Authorities are summarized. Provisions around digital signatures, electronic records and their admissibility as evidence are also briefly outlined.
The document summarizes key aspects of India's Information Technology Act 2000 and its subsequent amendment in 2008. It discusses the objectives of the original act, which included providing legal recognition to electronic transactions and digital signatures. It also describes some important exclusions. The amendment act in 2008 addressed issues like data privacy, information security, and defined additional cyber crimes. The document also provides explanations of digital signatures, digital signature certificates, and concepts like verification and expiration. Finally, it discusses cyber crimes and cyber law, defining them and outlining penalties under the Indian act.
This document provides an introduction to cyber law and intellectual property rights. It defines key terms related to the internet and world wide web such as how the web was invented by Tim Berners-Lee. It also summarizes provisions of the Indian IT Act 2000 related to email validity, e-commerce, and digital signatures. The document further discusses cyber crimes, cyber squatting, and features of the IT Act related to tampering and publishing obscene content. It provides an overview of how digital signatures are used and authenticated under the IT Act.
20130911 oid dumortier_draft regulationJos Dumortier
The document discusses a draft EU regulation related to e-identification and trust services. It questions whether signatures will still be needed given digital processes produce evidence by registering what happens rather than exchanging signed documents. Specifically:
1. The draft regulation proposes mutual recognition of e-IDs across EU member states for online government services.
2. It also aims to define trust services like electronic signatures, seals, time stamps, and delivery services and grant them legal presumptions of integrity, accuracy, and authenticity.
3. However, the document argues that in a digital context, evidence is produced through digital records of processes rather than exchanging signed documents. Manual signatures and their digital equivalents could now be removed from some
This document discusses key aspects of the Information Technology Act, 2000 in India, including its objectives and provisions related to electronic governance and digital signatures.
Some key points:
- The Act aims to facilitate electronic commerce and give legal recognition to electronic records and digital signatures. It allows for electronic filing of documents with the government.
- Digital signatures work by encrypting a message digest with a private key, and can be verified using the corresponding public key. Digital certificates bind a public key to an individual.
- The Act provides for legal recognition of electronic records, digital signatures, retention of electronic documents, and publication of official notices electronically. It also specifies rules for attribution, acknowledgment and dispatch of electronic records.
Whitepaper: What You Should Know About eSignature LawDocuSign
These days international borders are becoming less and less of a hurdle to conducting business. Particularly in industrialized countries, the law recognizes that business accelerators such as electronic signatures are essential to remaining competitive in the global economy. An understanding of the law regarding electronic signatures in the European Union and DocuSign’s strong adherence to these laws, as follows, provides businesses with the confidence to conduct business and get signatures electronically anywhere in the world.
The document summarizes key aspects of the Information Technology Act 2000 of India. It defines important terms like digital signature, subscriber, certifying authority. It explains the objectives of the act to facilitate e-commerce and e-governance. It describes digital signature certificates, their classes and responsibilities of subscribers. It also provides an overview of penalties and adjudication processes covered in the act for cyber crimes.
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
The document provides an overview of the Information Technology Act 2000 in India. It discusses key aspects of the act such as its objectives, definitions, provisions regarding electronic records and digital signatures. It also describes the role of the Controller of Certifying Authorities (CCA) in regulating and licensing Certifying Authorities, setting standards for public key infrastructure and digital signature certification processes. The CCA establishes a hierarchy with the government as the root of trust to help secure electronic communications and transactions through digital signatures certified by licensed Certifying Authorities.
- The document provides an overview of cyber laws and cyber crimes in India, outlining the Information Technology Act 2000 and its subsequent amendment in 2008 which established the primary laws governing cybercrimes.
- It describes how the Act defines key terms like "computer" and the scope of offenses covered under the law. It also discusses how the Act established procedures for adjudication of civil offenses and appeals.
- Major Acts in India like the Indian Penal Code, Indian Evidence Act, and Bankers' Books Evidence Act were also amended after the IT Act to recognize electronic records and better address cybercrimes.
- However, issues like territorial jurisdiction in cross-border cybercrimes are still not fully addressed under current
This document is the Republic Act No. 8792, also known as the Electronic Commerce Act of 2000, which provides legal recognition and use of electronic commercial and non-commercial transactions and documents in the Philippines. Some key points:
- It aims to facilitate domestic and international dealings through electronic means and recognizes the authenticity and reliability of electronic documents.
- It defines terms related to electronic transactions and documents, such as electronic signature and electronic data message.
- It provides for the legal recognition and equivalence of electronic writings, documents, and signatures to their paper-based counterparts if certain reliability conditions are met.
- It establishes rules for attributing electronic messages and signatures to originators, and addresses formation of electronic
An electronic signature is any electronic means that indicates a person's adoption of the contents of an electronic message or that the person who claims to have written a message is the one who wrote it. Electronic signatures provide similar legal protections as handwritten signatures by authenticating the identity of the signer and indicating their intent. Digital signatures use public key infrastructure and cryptography, including public and private keys, to securely sign electronic documents and ensure they have not been tampered with. Laws like the Information Technology Act of 2000 in India define electronic signatures and establish their legal validity, helping enable electronic transactions and the use of electronic signatures.
The document discusses cyberlaw and security in India. It provides an overview of the Information Technology Act 2000, which is the primary legislation dealing with internet issues. The objectives of the act are to provide a legal framework for e-commerce and facilitate electronic government filings and transactions. The act recognizes digital signatures and certifying authorities. It also covers some aspects of security, such as defining secure systems and procedures, and making breach of security a civil and criminal offense.
The adoption of the Uniform Electronic Transactions Act (UETA) and the Electronic Signatures in Global and National Commerce Act (ESIGN) established the legal validity of electronic records and signatures. These laws state that electronic documents cannot be denied legal effect solely because they are electronic. To qualify as an electronic signature, the system used must keep a record of the signature process or add a statement to the signed record indicating it was electronically signed. Consent from consumers is also required to use electronic records for transactions. Proper record retention and an audit trail are necessary to uphold electronically signed contracts if later disputed.
How To Write Law Essays Exams By S.I. Strong (EnglClaire Webber
The document provides instructions for creating an account and submitting assignment requests on the HelpWriting.net website. It outlines a 5-step process: 1) Create an account with a password and email, 2) Complete an order form with instructions and deadline, 3) Review bids from writers and choose one, 4) Receive the paper and authorize payment if satisfied, 5) Request revisions until fully satisfied and receive a refund if plagiarized.
Give You Wedding A Hint Of Luxury. When You Plan, UsClaire Webber
The document discusses the importance of intelligence fusion centers in sharing information between federal, state, and local law enforcement agencies. It notes that if the FBI had informed local law enforcement about the previous arrest of the Orlando nightclub shooter for domestic violence with his ex-girlfriend, and his link to terror groups, it could have helped prevent the deadly shooting. Fusion centers are presented as important for facilitating communication across different levels of law enforcement.
The Information Technology Act 2000 was enacted in India on May 17, 2000 to provide legal recognition to electronic commerce and transactions carried out by electronic data interchange and other means of electronic communication. The Act is based on a model law adopted by the UN on e-commerce. It aims to facilitate electronic governance and filing of documents. Some key components of the Act include provisions around digital signatures, duties of subscribers, penalties for offences, and protection for network service providers. It also defines important terms related to e-commerce and cyber security.
DIGITAL SIGNATURE VS ELECTRONIC SIGNATURES.pdfFilingBee
DSCs (Digital Signature Certificates) are the digital (electronic) equivalents of physical or paper certificates. Physical certificates include things like driver's licences, passports, and membership cards.
Information Technology Act 2000 An OverviewAnubhav
The document provides an overview of the Information Technology Act 2000 in India. Some key points:
- The Act aims to provide legal recognition for electronic transactions and facilitate e-filing/payments with the government.
- It defines important terms like electronic records, digital signatures, and security procedures. Digital signatures created using asymmetric cryptographic keys can verify electronic records.
- A public key infrastructure (PKI) allows parties without prior agreements to verify each other's identities through digital certificates issued by a certification authority.
- The Act lays out the legal processes for digital signatures to authenticate electronic records in a secure manner similar to physical signatures.
The Electronic Commerce Act 2000 of Ireland validates electronic communications and signatures to the same extent as paper-based ones, provided the receiving party consents. For financial advisors, electronic records meet legal retention obligations if they assure integrity and accessibility of information over time. Digiproving electronic signatures satisfy these requirements by making documents unalterable after signing and certifying the time and location of creation. However, "advanced electronic signatures" involving digital certificates from certification authorities are recognized as witnessed signatures but come with overhead of identity proofing and annual costs.
Ethics of Online Forms and E-Signatures for AttorneysGreg McLawsen
Did you really ever think you’d see the day when a pen-
and-ink signature on a document, or even an original document, wasn’t required? Well, that day has come – and you need to insure you are not only in compliance with court rules, but also ethics rules. We’ll examine:
• The RPCs relevant to documents and signatures (RPC 1.6 on confidentiality of information), and touch upon on the attorneys duty to supervise associate attorneys, legal support staff, and LLLTs (5.1, 5.2, 5.3, and 5.10)
• The competent use of various e-signature services
• The ethical and technical requirements for safeguarding client signatures
• How to competently and safely complete and submit on-line forms
This presentation was given at the January 22, 2016 annual CLE of the Washington State Bar Association's Solo and Small Practice Section
The document provides an overview of the Information Technology Act 2000 of India. It discusses key objectives of the act such as providing legal recognition to electronic transactions and records. It also defines important terms used in the act like computer, electronic record, digital signature. The roles of regulatory authorities like the Controller of Certifying Authorities in licensing and auditing Certifying Authorities are summarized. Provisions around digital signatures, electronic records and their admissibility as evidence are also briefly outlined.
The document summarizes key aspects of India's Information Technology Act 2000 and its subsequent amendment in 2008. It discusses the objectives of the original act, which included providing legal recognition to electronic transactions and digital signatures. It also describes some important exclusions. The amendment act in 2008 addressed issues like data privacy, information security, and defined additional cyber crimes. The document also provides explanations of digital signatures, digital signature certificates, and concepts like verification and expiration. Finally, it discusses cyber crimes and cyber law, defining them and outlining penalties under the Indian act.
This document provides an introduction to cyber law and intellectual property rights. It defines key terms related to the internet and world wide web such as how the web was invented by Tim Berners-Lee. It also summarizes provisions of the Indian IT Act 2000 related to email validity, e-commerce, and digital signatures. The document further discusses cyber crimes, cyber squatting, and features of the IT Act related to tampering and publishing obscene content. It provides an overview of how digital signatures are used and authenticated under the IT Act.
20130911 oid dumortier_draft regulationJos Dumortier
The document discusses a draft EU regulation related to e-identification and trust services. It questions whether signatures will still be needed given digital processes produce evidence by registering what happens rather than exchanging signed documents. Specifically:
1. The draft regulation proposes mutual recognition of e-IDs across EU member states for online government services.
2. It also aims to define trust services like electronic signatures, seals, time stamps, and delivery services and grant them legal presumptions of integrity, accuracy, and authenticity.
3. However, the document argues that in a digital context, evidence is produced through digital records of processes rather than exchanging signed documents. Manual signatures and their digital equivalents could now be removed from some
This document discusses key aspects of the Information Technology Act, 2000 in India, including its objectives and provisions related to electronic governance and digital signatures.
Some key points:
- The Act aims to facilitate electronic commerce and give legal recognition to electronic records and digital signatures. It allows for electronic filing of documents with the government.
- Digital signatures work by encrypting a message digest with a private key, and can be verified using the corresponding public key. Digital certificates bind a public key to an individual.
- The Act provides for legal recognition of electronic records, digital signatures, retention of electronic documents, and publication of official notices electronically. It also specifies rules for attribution, acknowledgment and dispatch of electronic records.
Whitepaper: What You Should Know About eSignature LawDocuSign
These days international borders are becoming less and less of a hurdle to conducting business. Particularly in industrialized countries, the law recognizes that business accelerators such as electronic signatures are essential to remaining competitive in the global economy. An understanding of the law regarding electronic signatures in the European Union and DocuSign’s strong adherence to these laws, as follows, provides businesses with the confidence to conduct business and get signatures electronically anywhere in the world.
The document summarizes key aspects of the Information Technology Act 2000 of India. It defines important terms like digital signature, subscriber, certifying authority. It explains the objectives of the act to facilitate e-commerce and e-governance. It describes digital signature certificates, their classes and responsibilities of subscribers. It also provides an overview of penalties and adjudication processes covered in the act for cyber crimes.
Information technology-act 2000- an overview-sethassociatespptDiya Mirza
The document provides an overview of the Information Technology Act 2000 in India. It discusses key aspects of the act such as its objectives, definitions, provisions regarding electronic records and digital signatures. It also describes the role of the Controller of Certifying Authorities (CCA) in regulating and licensing Certifying Authorities, setting standards for public key infrastructure and digital signature certification processes. The CCA establishes a hierarchy with the government as the root of trust to help secure electronic communications and transactions through digital signatures certified by licensed Certifying Authorities.
- The document provides an overview of cyber laws and cyber crimes in India, outlining the Information Technology Act 2000 and its subsequent amendment in 2008 which established the primary laws governing cybercrimes.
- It describes how the Act defines key terms like "computer" and the scope of offenses covered under the law. It also discusses how the Act established procedures for adjudication of civil offenses and appeals.
- Major Acts in India like the Indian Penal Code, Indian Evidence Act, and Bankers' Books Evidence Act were also amended after the IT Act to recognize electronic records and better address cybercrimes.
- However, issues like territorial jurisdiction in cross-border cybercrimes are still not fully addressed under current
This document is the Republic Act No. 8792, also known as the Electronic Commerce Act of 2000, which provides legal recognition and use of electronic commercial and non-commercial transactions and documents in the Philippines. Some key points:
- It aims to facilitate domestic and international dealings through electronic means and recognizes the authenticity and reliability of electronic documents.
- It defines terms related to electronic transactions and documents, such as electronic signature and electronic data message.
- It provides for the legal recognition and equivalence of electronic writings, documents, and signatures to their paper-based counterparts if certain reliability conditions are met.
- It establishes rules for attributing electronic messages and signatures to originators, and addresses formation of electronic
An electronic signature is any electronic means that indicates a person's adoption of the contents of an electronic message or that the person who claims to have written a message is the one who wrote it. Electronic signatures provide similar legal protections as handwritten signatures by authenticating the identity of the signer and indicating their intent. Digital signatures use public key infrastructure and cryptography, including public and private keys, to securely sign electronic documents and ensure they have not been tampered with. Laws like the Information Technology Act of 2000 in India define electronic signatures and establish their legal validity, helping enable electronic transactions and the use of electronic signatures.
The document discusses cyberlaw and security in India. It provides an overview of the Information Technology Act 2000, which is the primary legislation dealing with internet issues. The objectives of the act are to provide a legal framework for e-commerce and facilitate electronic government filings and transactions. The act recognizes digital signatures and certifying authorities. It also covers some aspects of security, such as defining secure systems and procedures, and making breach of security a civil and criminal offense.
The adoption of the Uniform Electronic Transactions Act (UETA) and the Electronic Signatures in Global and National Commerce Act (ESIGN) established the legal validity of electronic records and signatures. These laws state that electronic documents cannot be denied legal effect solely because they are electronic. To qualify as an electronic signature, the system used must keep a record of the signature process or add a statement to the signed record indicating it was electronically signed. Consent from consumers is also required to use electronic records for transactions. Proper record retention and an audit trail are necessary to uphold electronically signed contracts if later disputed.
How To Write Law Essays Exams By S.I. Strong (EnglClaire Webber
The document provides instructions for creating an account and submitting assignment requests on the HelpWriting.net website. It outlines a 5-step process: 1) Create an account with a password and email, 2) Complete an order form with instructions and deadline, 3) Review bids from writers and choose one, 4) Receive the paper and authorize payment if satisfied, 5) Request revisions until fully satisfied and receive a refund if plagiarized.
Give You Wedding A Hint Of Luxury. When You Plan, UsClaire Webber
The document discusses the importance of intelligence fusion centers in sharing information between federal, state, and local law enforcement agencies. It notes that if the FBI had informed local law enforcement about the previous arrest of the Orlando nightclub shooter for domestic violence with his ex-girlfriend, and his link to terror groups, it could have helped prevent the deadly shooting. Fusion centers are presented as important for facilitating communication across different levels of law enforcement.
College Admission Essay Sample - Popular CollegeClaire Webber
The document discusses the steps to get writing help from HelpWriting.net, which includes creating an account, submitting a request with instructions and deadline, and reviewing bids from writers to select one and place a deposit. It notes that customers can request revisions until satisfied and will receive a full refund if the paper is plagiarized. The process aims to ensure high-quality original content that meets customers' needs.
Lined Paper, Writing Paper, Paper Texture, Free PrintableClaire Webber
Carcinoembryonic antigen (CEA) is a classic tumor marker that has been used in clinical studies of colon cancer. CEA is one of several markers such as CA242, CA199, CA72-4 that can indicate the presence of colon cancer. While some newer markers like TGF also show promise as colon cancer markers, CEA remains an important biomarker that is routinely measured to detect and monitor colon cancer.
How To Write A Research Paper Tips To Use AssigClaire Webber
This document provides a 5-step process for writing a research paper with HelpWriting.net's assistance:
1. Create an account and provide contact information.
2. Complete an order form with paper instructions, sources, and deadline. Attach a writing sample if wanting the writer to mimic your style.
3. Review bids from writers and choose one based on qualifications. Place a deposit to start the assignment.
4. Review the completed paper and authorize final payment if pleased. Free revisions are available.
5. Multiple revisions can be requested to ensure satisfaction. Plagiarized work results in a full refund.
The document provides instructions for requesting writing assistance from the HelpWriting.net website, including creating an account, completing an order form with instructions and deadline, reviewing writer bids and choosing one to complete the assignment, revising the paper if needed, and knowing revisions and refunds are available.
The document provides instructions for using the HelpWriting.net service to have papers written. It outlines a 5-step process: 1) Create an account; 2) Submit a request with instructions and deadline; 3) Review bids from writers and select one; 4) Review the completed paper and authorize payment; 5) Request revisions until satisfied. It emphasizes that original, high-quality work is guaranteed or a full refund will be provided.
George Orwell Why I Write Essay, Writing, George OrClaire Webber
The document discusses how to develop effective study skills for distance learning, including becoming an independent learner through self-assessment questionnaires and identifying learning styles. It outlines learning outcomes around locating relevant information, time management, and reflection. The document emphasizes gaining an understanding of distance learning skills to aid academic progress and achieving good grades in an engineering management degree program.
Synthesis Essay A Helpful Writing Guide For StudentsClaire Webber
Here are a few suggestions to help achieve your sleep goal:
- Establish a consistent bedtime routine. For example, take a warm bath, read for 30 minutes, then go to bed at the same time each night. Routines signal to your body it's time to wind down.
- Limit screen time before bed. The blue light from screens can disrupt your circadian rhythm and make it harder to fall asleep.
- Create a sleep-friendly environment. Make sure your bedroom is cool, dark and quiet. Use blackout curtains if needed.
- Avoid large meals, caffeine and alcohol close to bedtime. These can interfere with quality sleep.
- Exercise daily, but not right before bed. Physical
Sentence Starters Coolguides In 2021 SenteClaire Webber
This document provides instructions for requesting an assignment writing service from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, with the option of a full refund for plagiarized work. The document promises original, high-quality content and support through the writing process.
This document provides instructions for requesting and receiving writing assistance from the website HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and select one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions to ensure satisfaction, with a refund offered for plagiarized work.
1763 Best Note Pages - Hojas Para Cartas ImagesClaire Webber
1. The document provides instructions for requesting writing help from HelpWriting.net. It outlines a 5 step process: create an account, submit a request form with instructions and deadline, writers will bid on the request, select a writer and provide a deposit, and review and pay for the completed paper.
2. The site uses a bidding system where writers submit bids to work on requests. Customers can review qualifications, history and feedback to select a writer, then a deposit is required to start the work.
3. Customers can request revisions until satisfied with the paper. HelpWriting.net promises original, high-quality work and offers refunds if papers are plagiarized.
The document discusses the pros and cons of lobbying. It begins by defining lobbying as attempting to influence government officials' decisions, especially legislators. It notes that lobbying is done by individuals, corporations, advocacy groups, and other interested parties. While lobbying allows for representation of various constituencies, it can also be dominated by powerful corporate interests that seek to influence policy for their own benefit rather than the public good. When special interests have outsized influence, it can undermine democracy by diminishing the impact of voters' choices. The document suggests lobbying has led to fundamental changes in the US that are detrimental to democracy.
How To Write An Essay On Global Warming. Global Warming And CClaire Webber
This document provides a 5-step process for requesting writing assistance from HelpWriting.net. It explains how to create an account, submit a request with instructions and deadline, review bids from writers and choose one, authorize payment after reviewing the paper, and request revisions if needed. The process aims to ensure original, high-quality content and full satisfaction of the customer's needs.
002 Essay Example Intro Paragraph How To Write An Introduction LeaClaire Webber
The document discusses solutions for American Vinyl Products to improve their customer service. It describes issues they currently face based on a complaint from a major client. It proposes having one employee focus on large corporate accounts to address the main revenue source. It also suggests adjusting employee hours to better accommodate clients in different time zones. Letting go of small individual clients and focusing resources on larger business partnerships is also proposed.
The document discusses how Americans often view significant events as tragedies and turn them into narratives where they play the roles of characters. It analyzes how Americans viewed the September 11th terrorist attacks as a national tragedy, dramatizing the destruction and reaffirming America's identity as a wealthy superpower. The attacks prompted calls for bringing the attackers to justice through legal systems and demonstrated America's military strength in responding to such events.
How To Write Introductions Ielts Writing, Ielts Writing AcClaire Webber
This document describes the process of synthesizing aspirin through a chemical reaction. It involves combining 4.032g of salicylic acid with 8.0mL of acetic anhydride using a catalyst of phosphoric acid on a hot water bath. The product was then dried in a drawer for a week. A melting point apparatus was used to assess the purity of the dried sample and confirm the synthesis of aspirin.
The document provides a 5-step guide to essay writing on HelpWriting.net. It outlines the process of creating an account, completing an order form to request an essay, reviewing writer bids and choosing a writer, reviewing the completed paper, and having the option to request revisions until satisfied. The guide explains how the website aims to provide original, high-quality content and offers refunds if plagiarism is found.
Writing Paper Template Format Template WritinClaire Webber
This study examined how body composition, size, and age affect glucose regulation in fasting individuals. Blood glucose levels were measured for three subjects at intervals over 120 minutes. Subject 1 and the experimental subject had similar glucose levels initially, but Subject 1 did not regulate glucose as well later on. Subject 2 had high glucose at all readings, indicating poor regulation, and was the oldest with the highest BMI and waist-to-hip ratio. The results suggest body composition plays an important role in how well the body regulates glucose levels during fasting.
The document provides steps for requesting writing assistance from HelpWriting.net. It outlines the registration process, how to submit a request including instructions and deadline, how writers bid on requests and are selected, reviewing and authorizing payment for completed papers, and utilizing revisions. The key aspects are registering an account, submitting a request form with instructions, selecting a writer based on bids, reviewing and paying for satisfactory work, and having the option of revisions.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
1. Advanced Electronic Signatures
By Grant Christianson
Up until the recent past, where the law required a signature, statement or document
to be notarised, acknowledged, verified or made under oath, that requirement was
typically met only if the handwritten signature of the person authorised to perform
those acts was used. The goal of this requirement was to safeguard authenticity and
provide appropriate proof should a legal dispute arise at a later stage.
It is now possible to achieve the same end with a few simple keystrokes on a
computer, thanks to innovative software development and legislative recognition of
the rapidly changing manner in which business is done. The accreditation of
authentication products and services in terms of s 37 of the Electronic
Communications and Transactions Act 25 of 2002 (ECT Act) allows for the electronic
signatures of such products and services to qualify as advanced electronic
signatures, thus safeguarding the authenticity of the signature.
Accreditation is done by the South African Accreditation Authority
(www.saaa.gov.za), which released accreditation regulations in 2007. These set out
the criteria, standards and processes to be followed by authentication and
certification providers (www.info.gov.za/view/DownloadFileAction?id=72249,
accessed 21-9-2012).
Useful definitions
An e-mail can be viewed, in law, as an original written communication; a data
message made up of data and compiled using a computer programme (eg Microsoft
Outlook). The following definitions from the ECT Act and the Copyright Act 98 of
1978 assist in understanding this better:
2. • ‘E-mail’ means a data message used or intended to be used as a mail message
between the originator and addressee in an electronic communication (s 1 of the
ECT Act).
• ‘Electronic communication’ means a communication by means of data messages (s
1 of the ECT Act).
• ‘Data message’ means data generated, sent, received or stored by electronic
means (s 1 of the ECT Act).
• ‘Data’ means electronic representations of information in any form (s 1 of the ECT
Act).
• ‘Computer programme’ means a set of instructions fixed or stored in any manner
and which, when used directly or indirectly in a computer, directs its operation to
bring about a result (s 1 of the Copyright Act). Computer programmes are also
referred to as ‘software’.
Further, the ECT Act provides:
• ‘Information is not without legal force and effect merely on the grounds that it is
wholly or partly in the form of a data message (s 11(1)).
• A requirement in law that a document or information must be in writing is met if the
document or information is in the form of a data message and is accessible in a
manner usable for subsequent reference (s 12).
• Where a law requires information to be presented or retained in its original form,
that requirement is met by a data message if certain requirements are met (s 14(1)).
Signatures, electronic signatures and advanced electronic signatures
3. ‘Signature’ is defined as: ‘A person’s name written in a distinctive way as a form of
identification in authorising a … document’
(http://oxforddictionaries.com/definition/english/signature?q=signature, accessed 21-
9-2012). In law, this is not the only way a document can be signed: ‘Any mark on a
document made by a person for the purpose of attesting the document, or identifying
it as his act, … is his signature thereto’ (Putter v Provincial Insurance Co Ltd and
Another 1963 (3) SA 145 (W) at 148E).
An ‘electronic signature’ is data attached to, incorporated in or logically associated
with other data and which is intended by the user to serve as a signature (s 1 of ECT
Act). An ‘advanced electronic signature’ is an electronic signature that results from a
process that has been accredited by the Accreditation Authority (ss 1 and 37 of the
ECT Act).
Electronic signatures must be distinguished from advanced electronic signatures.
The important factor is whether the signature is required by law. While the ECT Act
recognises other forms of electronic signatures used between parties in an electronic
transaction (eg a private agreement), these will not be recognised if the signature is
required by law (eg signatures required in terms of the Companies Act 71 of 2008).
In this regard, the ECT Act provides:
• An electronic signature is not without legal force and effect merely on the grounds
that it is in electronic form, and may be used by the parties to an electronic
transaction (s 13(2) and (3) read with the definition of ‘transaction’ in s 1 of the ECT
Act).
• Where the signature of a person is required by law and such law does not specify
the type of signature, that requirement in relation to a data message is met only if an
advanced electronic signature is used (s 13(1) of the ECT Act).
4. To belabour the point: While an advanced electronic signature is an electronic
signature, an electronic signature is not necessarily an advanced electronic
signature; the differentiator being whether or not there is accreditation by the
Accreditation Authority of the authentication products and services used to create the
electronic signature (s 13(2) and (3) of the ECT Act, read with the definition of
‘advanced electronic signature’ in s 1).
Digital certificates and public key infrastructure
Public key infrastructure (PKI) is a broad term that refers to public and private
key cryptography; the hardware, software, people, processes and policies
collectively implemented and used to manage risk when transacting electronically
(eg online or by e-mail). PKI includes the use of digital certificates to identify the
persons behind an electronic transaction (see ISO 21188:2006, Public key
infrastructure for financial services – practices and policy framework, published
by the International Organization for Standardisation
(www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=35
707, accessed 21-9-2012), adherence thereto is required by the Accreditation
Authority in a s 37 of the ECT Act accreditation exercise).
Digital certificates are typically issued by certification service providers (note:
While the ECT Act refers to certification service providers, in the digital
certificate/encryption services industry these entities are generally known as
certificate/certification authorities or CAs).
5. Besides being used as a means of online access control (eg conveyancers logging
on to receive bond registration instructions from banks), a digital certificate can
also be used to create an electronic signature. If the digital certificate used to
create such electronic signature was issued by a certification service provider that
has had its authentication products and services accredited in terms of s 37 of the
ECT Act, the resultant electronic signature of the individual identified in the digital
certificate also qualifies as an advanced electronic signature (s 37 of the ECT Act,
read with the definition of ‘advanced electronic signature’ in s 1).
The reasons for supporting the use of digital certificates originate from a
commercial perspective. The issues that arise when transacting online usually
have to do with how to create enforceable electronic contracts for the sale of
goods and services, or how to ensure that an electronic transaction will at least
be as legally enforceable and binding as a traditional paper-based transaction.
Usernames and passwords have been common means of seeking to achieve
this. However, there are instances when requiring the use of a username and a
password is simply too risky as these can be compromised by numerous means,
for example by wiretapping (covert monitoring of electronic communications),
phishing (masquerading as a trustworthy entity to obtain sensitive information),
keystroke logging (covert tracking of keys pressed on a computer keyboard),
social engineering (obtaining confidential data by manipulating and/or deceiving
people), dumpster diving (sifting through commercial data records), side-channel
attacks (exploiting data security weaknesses) and other software vulnerabilities.
6. Digital certificates, in a well-implemented PKI, go a long way towards managing risk
when communicating or transacting online, such as those presented by false
identity, fraud, unauthorised access, snooping/observation, message alteration and
transaction repudiation. A properly issued digital certificate is strong evidence in
support of proving the function of a signature in an electronic transaction, namely
the conveyance of an attestation by the person signing of his approval and authority
for what is contained in the document, and that it emanates from him (Jurgens and
Others v Volkskas Bank Ltd 1993 (1) SA 214 (A) at 220E – F).
A certification service provider plays an important role in a PKI in that it –
• issues digital certificates;
• sets policy (as stated in its certification practice statement (CPS), a statement
issued by a certification service provider to specify the practices that it employs in
generating and issuing digital certificates) on what identification a person must
produce in order to obtain a digital certificate; and
• in order to maintain security, indicates in a published certificate revocation list
those digital certificates that are no longer valid (eg revoked, expired or
suspended).
A digital certificate is an electronic form of identification, much like an identity
document, passport or driver’s licence. Technically, it is –
• a strong method of authentication, which is likened to a ‘cryptographic handshake’
as opposed to a shared secret like a username and a password;
• immune to phishing scams, keystroke loggers and the like;
• the method of choice in web services development, as seen in computer
programming languages like SAML and XML; and
• a roadmap for further use; that is, signing to preserve integrity of data messages,
transactions, e-mail, Adobe PDF, Microsoft Word and Excel documents; based on
the widely accepted X.509v3 format (an international telecommunications
standard), which means system and programme interoperability is almost
guaranteed.
7. Digital certificates and the Companies Act
Section 6(12)(a) of the Companies Act provides: ‘If a provision of this Act requires
a document to be signed or initialled –
(a) by or on behalf of a person, that signing or initialling may be effected in any
manner provided for in the ECT Act …’.
Consider this in line with s 13(1) of the ECT Act. Also note that s 14 of the ECT Act
provides for originals to be in electronic form if certain integrity requirements are met.
The cryptography behind an advanced electronic signature makes it mathematically
infeasible to tamper with the document without showing evidence of tampering, for
example by sending a warning.
Section 51(1)(b) read with s 51(2) of the Act provides that a certificate evidencing
any certificated securities of a company may be signed by electronic means by
two persons authorised by the company’s board (ie, electronic share certificates).
Also consider s 12(5): Signing reservation of name notice; s13(1): Signing a
memorandum of incorporation; s 30(3)(c): Signing annual financial statements; s
58(2)(a): Signing a proxy appointment; s 61(3): Signed demand for a shareholder
meeting (eg electronically signed e-mail using an issued digital certificate); s
73(8): Signed minutes of a board meeting; s 77(3)(a) and (d): Director liability as
a consequence of signing anything on behalf of a company; and s 101(5): Signed
offers.
Digital certificates and the magistrates’ courts rules
The updated magistrates’ courts rules provide in r 1 for ‘signature’ to include
an advanced electronic signature as defined in the ECT Act, and provides
that this also applies to ‘sign’, ‘signing’ and ‘signed.’
8. Other legislation
Other legislation also requires signatures and, in such instances, it is worth
considering the applicability of the ECT Act and the use of advanced electronic
signatures.
However, there are instances when, in law, the use of an advanced electronic
signature is not permitted. The ECT Act envisages this and only allows the use of
advanced electronic signatures when the law does not specify the type of
signature required (s 13(1) of the ECT Act). For example, s 2 of the Wills Act 7 of
1953 provides that no executed will is valid unless signed at the end thereof by
the testator. ‘Sign’ is defined in s 1 of the Wills Act to include the making of
initials and, only in the case of the testator, the making of a mark, and ‘signature’
has a corresponding meaning. (For information on other exclusions, see S Snail
‘Electronic contracting in South Africa e-contracts’ in S Papadopoulos & S Snail
(eds) Cyberlaw @ SA III: The law of the internet in South Africa (Pretoria: Van
Schaik 2012) at 51 – Editor.)
Electronic notarisation, acknowledgment and certification under the ECT
Act
Where a law requires a signature, statement or document to be notarised,
acknowledged, verified or made under oath, that requirement is met if the
advanced electronic signature of the person authorised to perform those acts is
attached to, incorporated in or logically associated with the electronic signature or
data message (s 18(1) of the ECT Act). This is relevant for admitted attorneys,
who are ex officio commissioners of oaths.
Where a law requires or permits a person to provide a certified copy of a
document and the document exists in paper or other physical form, that
requirement is met if an electronic copy of the document is certified to be a true
9. copy thereof and the certification is confirmed by the use of an advanced
electronic signature (s 18(3) of the ECT Act).
Transacting online
As stated above, most computer systems require some form of access control. Most
common is the username and password combination, which can be too risky when
business risks are high. Take for example conveyancing online, namely the
electronic communication of bond information (eg instruction, re-instruction, not taken
up (NTU), acknowledgment, milestone status, payment advice and rating files)
between the home loan divisions of banks and their panels of conveyancing
attorneys. In a conveyancing transaction one cannot run the very real risk of allowing
fraud to be committed as a result of unauthorised data access, data manipulation and
leakage, and misuse of access by unknown persons. The companies involved need
to know with a degree of certainty who is accessing their computer systems online,
and need for those persons to take responsibility for that which they do online with
them. It should also provide those companies with a level of confidence that only
personnel authorised to communicate electronically on the company’s behalf can in
fact do so. Standard components of a sound security solution include authentication
that makes use of encryption technologies; that is, digital certificates. (Examples of
other components not dealt with here, but which are also important, include firewalls,
anti-virus scanners, content security management, intrusion-prevention systems,
virtual private networks and security-incident and event-manager tools).
Public and private key cryptography
10. Digital certificates, as already stated, make use of public and private key
cryptography. This means using standard Microsoft computer programme
functionality: Two data keys are generated on the digital certificate holder’s
computer. These keys are mathematically related to each other (sometimes
referred to as asymmetric encryption). One data key is called the private key and
the other the public key. It is mathematically infeasible, using the best computing
power available today, to break the algorithms used to create these keys. The
private key is required to be kept private and is not to be shared with anyone and
is usually stored in the browser of a computer or on a cryptographic memory stick.
The digital certificate is simply a piece of data that lists the public key and identifies
the individual holding the corresponding private key, and also identifies the
certification services provider that issued the digital certificate in the first place;
effectively vouching for the identity of the individual identified in the digital
certificate based on the identity verification criteria set out in its CPS; compliance
against which is audited from time to time by the Accreditation Authority.
When an electronic signature is created, it is only the public key and the digital
certificate that become ‘embedded’ in the electronic document being signed, but
these can only be ‘embedded’ if the corresponding private key is used. Therefore,
the recipient of an electronic document (eg e-mail message or PDF document) that
contains the author’s public key and digital certificate should be assured that the
author of the document, (ie, the only person who exercises control over the
corresponding private key) is the same person identified in the digital certificate.
The document is then said to contain the author’s electronic signature or advanced
electronic signature, as the case may be.
11. Problems arise if the private key becomes compromised as a stranger exercising
control over the private key of another can impersonate the person identified in the
corresponding digital certificate. It is therefore important to be diligent in retaining
control of the private key associated to the public key listed in the digital certificate,
including retaining control of any pass-phrase, pin or token used to activate the
private key and to prevent disclosure to any person not authorised to create one’s
electronic signature.
Applying for a digital certificate
To be issued with a digital certificate that can be used to sign electronic documents
with an advanced electronic signature (and which can also be used to access
computer systems over the internet), a person needs to register his details with a
certification services provider that has been accredited by the Accreditation
Authority. This is an enrolment process that can be frustrating at times, but is
ultimately worth it when the risks sought to be addressed are properly mitigated.
An applicant (also referred to as a subscriber) typically needs to –
• complete a personal digital certificate application form;
• sign a subscriber agreement; and
• present the original and one copy of his identity document
(there might be other criteria that need to be adhered to, depending on which
certification services provider is selected).
In my experience, after verifying the applicant’s identity and completing certain
internal checks and controls, the certification services provider will issue a digital
certificate. The applicant will then be notified and directed as to how to download
the digital certificate and commence using it to access computer systems online.
Using a digital certificate
12. At present, in my experience, the Adobe Acrobat Professional computer programme
appears to have the most user-friendly functionality to sign an electronic document. It
is also possible to sign a Microsoft Word document. Once a document is ready for
signature, it is to be converted/saved to the Adobe PDF format. The step-by-step
functionality to signing the document is fairly easy to follow. This electronically signed
document can then be attached to an e-mail and forwarded to the intended recipient.
It can be encrypted as well if need be.
There are also online signing services, such as Signing Hub
(www.signinghub.com), that do away with the need to incur the cost of obtaining
an Adobe Acrobat Professional licence and which enable the uploading, sharing
and signature (using digital certificates) of documents, and which also assist in
managing costs of printing, faxing, couriers, postage, scanning, storage and
searching.
A word of caution
Digital certificates and the functionality to use digital certificates to create electronic
signatures have been around for years. It is important for the recipient of a signed
electronic document to carefully scrutinise the digital certificate to confirm whether
the signature created with that digital certificate qualifies as an advanced electronic
signature or is merely an electronic signature.
To do this, two important things must be verified –
• that the certification services provider that issued the digital certificate is in fact
accredited by the Accreditation Authority in terms of s 37 of the ECT Act
(accreditation confirmation can be viewed on the Accreditation Authority’s website
at www.saaa.gov.za/accreditation_ProductsServices.htm or confirmed
telephonically on (012) 427 8070/8000); and
• that the digital certificate makes reference to an advanced electronic signature.
13. Conclusion
As practitioners, it is imperative to keep pace with technological developments,
especially those that facilitate business transactions in an increasingly global
economy, without sacrificing the integrity of the process and the documents
involved. The advent of advanced electronic signatures and digital certificates,
together with other electronic security enhancements, enable both to the
advantage of the client.
• See also 2005 (Dec) DR 24.
Grant Christianson BA LLB (UKZN) LLM (UJ) MAP (Wits) Post Grad Dip (UJ)
is group legal adviser and company secretary at Law Holdings (Pty) Ltd in
Johannesburg.