SlideShare a Scribd company logo
1 of 2
Download to read offline
eCommerce Act (2000) and relevance to
                                              Financial Advisors
                                            (Electronic Signatures)

Under the Electronic Commerce Act 2000 of Ireland, electronic communications are equally valid with
paper-based communications. Electronic signatures are valid if the receiving party consents to the
use of an electronic signature. The definition of an electronic signature in this legislation is very
broad: "electronic signature, an advanced electronic signature, an electronic signature based on a
qualified certificate, an electronic signature created by a secure signature creation device or other
technological requirements relating to an electronic signature"

There is however one caveat - where there is a legal obligation to retain original documentation e.g.
Financial Advisor needs to keep client instructions for 7 years, the electronic record can meet this
requirement, provided that:

        there exists a reliable assurance as to the integrity of the information from the time when it
         was first generated in its final form, whether as an electronic communication or otherwise,
        where it is required or permitted that the information be presented— if the information is
         capable of being displayed in intelligible form to a person or public body to whom it is to be
         presented,
        if, at the time the information was generated in its final form, it was reasonable to expect that
         it would be readily accessible so as to be useable for subsequent reference,
        where the information is required or permitted to be presented to or retained for a public body
         or for a person acting on behalf of a public body, and the public body consents to the
         information being presented or retained in electronic form, whether as an electronic
         communication or otherwise, but requires that it be presented or retained in accordance with
         particular information technology and procedural requirements— if the public body's
         requirements have been met and those requirements have been made public and are
         objective, transparent, proportionate and non-discriminatory, and
        where the information is required or permitted to be presented to or retained for a person who
         is neither a public body nor acting on behalf of a public body— if the person to whom the
         information is required or permitted to be presented or for whom it is required or permitted to
         be retained consents to the information being presented or retained in that form.

However Digiproving does have the following real advantages:

    1. When added to electronically signed document at the same time the document is signed, it
         meets any statutory obligation in relation to retention of original documents
    2.   Offers an irrefutable assurance that the document has not been altered either accidentally or
         deliberately since its creation
    3.   Offers an irrefutable timestamp certifying the time of creation of the document (And location
         information if it is available on the device)
    4.   It meets the requirements for retention of records (In digital format), thus creating less
         dependence on paper records.

Items 2 & 3 are important because not only do they provide comfort to the receiving party (who must
after all consent to the use of e-communications) of the integrity of the document, they remove all
reasonable doubt (whether in a court case or otherwise) that a document could have been
altered. Other safeguards such as archiving and time stamping logs may be circumvented by any
software engineer or gifted amateur, or indeed by malicious design.

Finally the legislation describes an "advanced electronic signature based on a qualified certificate". I
am pretty certain this means what is usually referred to as a Digital Signature, based on PKI using
CAs such as Verisign (such as what is implemented in Adobe and there are many examples like this I
think An Post have something as well). This has one particular legal advantage in that it is
recognised as a witnessed signature, and appears to be a requirement in applying signatures to
documents that require witnessing. Cryptographically it is a very secure solution. However it comes
with a major overhead - everyone who signs has to have a Digital ID (or digital certificate) from a



DP-Performance 0-1                            ©Digiprove                                        Oct 2011
eCommerce Act (2000) and relevance to
                                           Financial Advisors
                                         (Electronic Signatures)
recognised CA. There is (as you would expect) a whole process involved in proving your identity to
the CA, and of course an annual cost. Despite massive promotion by companies like RSA and
Baltimore in the late 90s this technology did not succeed.




DP-Performance 0-1                         ©Digiprove                                     Oct 2011

More Related Content

What's hot

e-Signatures Summit for Insurance Executives
e-Signatures Summit for Insurance Executivese-Signatures Summit for Insurance Executives
e-Signatures Summit for Insurance ExecutiveseSignLive by VASCO
 
Cyber laws - Ritu Gautam
Cyber laws - Ritu GautamCyber laws - Ritu Gautam
Cyber laws - Ritu GautamRitu Gautam
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Adv Prashant Mali
 
Introduction to Blockchains - Blockchain and its use in the society
Introduction to Blockchains - Blockchain and its use in the societyIntroduction to Blockchains - Blockchain and its use in the society
Introduction to Blockchains - Blockchain and its use in the societyHossein Baharmand
 
Country without borders
Country without bordersCountry without borders
Country without bordersAndres Kütt
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature Mahmoud Ezzat
 
2014-04-04 PaperFree Web•Tech•Law presentation
2014-04-04 PaperFree Web•Tech•Law presentation2014-04-04 PaperFree Web•Tech•Law presentation
2014-04-04 PaperFree Web•Tech•Law presentationPaul Jacobson
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityGareth Niblett
 
17 alessia frisina legal
17 alessia frisina legal17 alessia frisina legal
17 alessia frisina legalCCR-interactive
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsSuryakanta Rout
 
Cloud computing - cooperating with law enforcement
Cloud computing - cooperating with law enforcementCloud computing - cooperating with law enforcement
Cloud computing - cooperating with law enforcementCloud Legal Project
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!Process Fusion Inc
 
How do you secure an electronic signature?
How do you secure an electronic signature?How do you secure an electronic signature?
How do you secure an electronic signature?XeniT Solutions nv
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the PhilippinesRaiaR
 
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)DocuSign
 

What's hot (20)

E-Signature in Document Management - Megan Smale
E-Signature in Document Management - Megan SmaleE-Signature in Document Management - Megan Smale
E-Signature in Document Management - Megan Smale
 
e-Signatures Summit for Insurance Executives
e-Signatures Summit for Insurance Executivese-Signatures Summit for Insurance Executives
e-Signatures Summit for Insurance Executives
 
Cyber
CyberCyber
Cyber
 
Cyber laws - Ritu Gautam
Cyber laws - Ritu GautamCyber laws - Ritu Gautam
Cyber laws - Ritu Gautam
 
It act,2000
It act,2000It act,2000
It act,2000
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
 
Introduction to Blockchains - Blockchain and its use in the society
Introduction to Blockchains - Blockchain and its use in the societyIntroduction to Blockchains - Blockchain and its use in the society
Introduction to Blockchains - Blockchain and its use in the society
 
Country without borders
Country without bordersCountry without borders
Country without borders
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
2014-04-04 PaperFree Web•Tech•Law presentation
2014-04-04 PaperFree Web•Tech•Law presentation2014-04-04 PaperFree Web•Tech•Law presentation
2014-04-04 PaperFree Web•Tech•Law presentation
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 
Blockchain in government sept2021
Blockchain in government sept2021Blockchain in government sept2021
Blockchain in government sept2021
 
17 alessia frisina legal
17 alessia frisina legal17 alessia frisina legal
17 alessia frisina legal
 
Cyber Crimeand Cyber Laws
Cyber Crimeand Cyber LawsCyber Crimeand Cyber Laws
Cyber Crimeand Cyber Laws
 
Cloud computing - cooperating with law enforcement
Cloud computing - cooperating with law enforcementCloud computing - cooperating with law enforcement
Cloud computing - cooperating with law enforcement
 
Apt 510 slideshare
Apt 510 slideshareApt 510 slideshare
Apt 510 slideshare
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!
 
How do you secure an electronic signature?
How do you secure an electronic signature?How do you secure an electronic signature?
How do you secure an electronic signature?
 
E-commerce Law in the Philippines
E-commerce Law in the PhilippinesE-commerce Law in the Philippines
E-commerce Law in the Philippines
 
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
Reaching Agreement: eSignature API strategies (API Days Paris 2016-12-13)
 

Similar to Compliance & Value of Digital Signatures

Electronic commerce act of 2000
Electronic commerce act of 2000Electronic commerce act of 2000
Electronic commerce act of 2000Justine Casilana
 
Advanced Electronic Signatures
Advanced Electronic SignaturesAdvanced Electronic Signatures
Advanced Electronic SignaturesClaire Webber
 
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...Rohan Nyayadhish
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in indiaatuljaybhaye
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptshahulgk
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptSuvabrataSamanta
 
20130911 oid dumortier_draft regulation
20130911 oid dumortier_draft regulation20130911 oid dumortier_draft regulation
20130911 oid dumortier_draft regulationJos Dumortier
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Suryadev Maity
 
How to know if your esignature is invalid
How to know if your esignature is invalidHow to know if your esignature is invalid
How to know if your esignature is invalidDeftPDF
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An OverviewAnubhav
 
Whitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature LawWhitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature LawDocuSign
 
Enhancing System Security Using PKI
Enhancing System Security Using PKIEnhancing System Security Using PKI
Enhancing System Security Using PKIChin Wan Lim
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signaturesCoSign by ARX
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesTania Fuchs
 

Similar to Compliance & Value of Digital Signatures (20)

Electronic commerce act of 2000
Electronic commerce act of 2000Electronic commerce act of 2000
Electronic commerce act of 2000
 
Advanced Electronic Signatures
Advanced Electronic SignaturesAdvanced Electronic Signatures
Advanced Electronic Signatures
 
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
Digital Task Force’s Digital Magazine on Electronic Evidence and Hash Value -...
 
Cupa pres a_2
Cupa pres a_2Cupa pres a_2
Cupa pres a_2
 
E contracting in india
E contracting in indiaE contracting in india
E contracting in india
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
20130911 oid dumortier_draft regulation
20130911 oid dumortier_draft regulation20130911 oid dumortier_draft regulation
20130911 oid dumortier_draft regulation
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
How to know if your esignature is invalid
How to know if your esignature is invalidHow to know if your esignature is invalid
How to know if your esignature is invalid
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
 
Class it act
Class it actClass it act
Class it act
 
Whitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature LawWhitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature Law
 
Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
Enhancing System Security Using PKI
Enhancing System Security Using PKIEnhancing System Security Using PKI
Enhancing System Security Using PKI
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signatures
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
 

More from Strategic Business & IT Services

Unitary Developmental Theory Elaborated for all human systems
Unitary Developmental Theory Elaborated for all human systemsUnitary Developmental Theory Elaborated for all human systems
Unitary Developmental Theory Elaborated for all human systemsStrategic Business & IT Services
 
Introduction to Unitary Developmental Theory & Application
Introduction to Unitary Developmental Theory & ApplicationIntroduction to Unitary Developmental Theory & Application
Introduction to Unitary Developmental Theory & ApplicationStrategic Business & IT Services
 
Transformation, Chanhe and Improvement Newsletter July 2021
Transformation, Chanhe and Improvement Newsletter July 2021Transformation, Chanhe and Improvement Newsletter July 2021
Transformation, Chanhe and Improvement Newsletter July 2021Strategic Business & IT Services
 
What are capability maturity models & why are they Important?
What are capability maturity models & why are they Important?What are capability maturity models & why are they Important?
What are capability maturity models & why are they Important?Strategic Business & IT Services
 
The new world of work securing the crisis gains & adapting
The new world of work securing the crisis gains & adaptingThe new world of work securing the crisis gains & adapting
The new world of work securing the crisis gains & adaptingStrategic Business & IT Services
 
How digital can enable continuous innovation 2nd edition 130520
How digital can enable continuous innovation 2nd edition 130520How digital can enable continuous innovation 2nd edition 130520
How digital can enable continuous innovation 2nd edition 130520Strategic Business & IT Services
 
Achieving the best possible organisation crisis outcome (New Normal)
Achieving the best possible organisation crisis outcome (New Normal)Achieving the best possible organisation crisis outcome (New Normal)
Achieving the best possible organisation crisis outcome (New Normal)Strategic Business & IT Services
 

More from Strategic Business & IT Services (20)

Unitary Developmental Theory Elaborated for all human systems
Unitary Developmental Theory Elaborated for all human systemsUnitary Developmental Theory Elaborated for all human systems
Unitary Developmental Theory Elaborated for all human systems
 
Digital Transformation & Improvement Pocketbook
Digital Transformation & Improvement PocketbookDigital Transformation & Improvement Pocketbook
Digital Transformation & Improvement Pocketbook
 
Introduction to Unitary Developmental Theory & Application
Introduction to Unitary Developmental Theory & ApplicationIntroduction to Unitary Developmental Theory & Application
Introduction to Unitary Developmental Theory & Application
 
Overview of The Organization Maturity Index
Overview of The Organization Maturity IndexOverview of The Organization Maturity Index
Overview of The Organization Maturity Index
 
Introduction to UDT and its application 061222.pdf
Introduction to UDT and its application 061222.pdfIntroduction to UDT and its application 061222.pdf
Introduction to UDT and its application 061222.pdf
 
Transformation, Chanhe and Improvement Newsletter July 2021
Transformation, Chanhe and Improvement Newsletter July 2021Transformation, Chanhe and Improvement Newsletter July 2021
Transformation, Chanhe and Improvement Newsletter July 2021
 
Building intrinsic organisation resilience 2021
Building intrinsic organisation resilience 2021Building intrinsic organisation resilience 2021
Building intrinsic organisation resilience 2021
 
Organisation Resilience in times of disruption study 2021
Organisation Resilience in times of disruption study 2021Organisation Resilience in times of disruption study 2021
Organisation Resilience in times of disruption study 2021
 
Transformation, Change & Improvement Newsletter Q1-2021
Transformation, Change & Improvement Newsletter Q1-2021Transformation, Change & Improvement Newsletter Q1-2021
Transformation, Change & Improvement Newsletter Q1-2021
 
Situational Leadership, Organisation Maturity & Culture
Situational Leadership, Organisation Maturity & CultureSituational Leadership, Organisation Maturity & Culture
Situational Leadership, Organisation Maturity & Culture
 
What are capability maturity models & why are they Important?
What are capability maturity models & why are they Important?What are capability maturity models & why are they Important?
What are capability maturity models & why are they Important?
 
Organisation, Team & Digital Assessment process
Organisation, Team & Digital Assessment process Organisation, Team & Digital Assessment process
Organisation, Team & Digital Assessment process
 
Odti newsletter dec 2020 release
Odti newsletter dec 2020 release Odti newsletter dec 2020 release
Odti newsletter dec 2020 release
 
Organisation change readiness assessment paper
Organisation change readiness assessment paper Organisation change readiness assessment paper
Organisation change readiness assessment paper
 
ODTI newsletter oct 2020
ODTI newsletter oct 2020 ODTI newsletter oct 2020
ODTI newsletter oct 2020
 
The new world of work securing the crisis gains & adapting
The new world of work securing the crisis gains & adaptingThe new world of work securing the crisis gains & adapting
The new world of work securing the crisis gains & adapting
 
How digital can enable continuous innovation 2nd edition 130520
How digital can enable continuous innovation 2nd edition 130520How digital can enable continuous innovation 2nd edition 130520
How digital can enable continuous innovation 2nd edition 130520
 
Achieving the best possible organisation crisis outcome (New Normal)
Achieving the best possible organisation crisis outcome (New Normal)Achieving the best possible organisation crisis outcome (New Normal)
Achieving the best possible organisation crisis outcome (New Normal)
 
Organisation Culture Change Masterclass
Organisation Culture Change MasterclassOrganisation Culture Change Masterclass
Organisation Culture Change Masterclass
 
Organisation Culture Change Masterclass
Organisation Culture Change MasterclassOrganisation Culture Change Masterclass
Organisation Culture Change Masterclass
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

Compliance & Value of Digital Signatures

  • 1. eCommerce Act (2000) and relevance to Financial Advisors (Electronic Signatures) Under the Electronic Commerce Act 2000 of Ireland, electronic communications are equally valid with paper-based communications. Electronic signatures are valid if the receiving party consents to the use of an electronic signature. The definition of an electronic signature in this legislation is very broad: "electronic signature, an advanced electronic signature, an electronic signature based on a qualified certificate, an electronic signature created by a secure signature creation device or other technological requirements relating to an electronic signature" There is however one caveat - where there is a legal obligation to retain original documentation e.g. Financial Advisor needs to keep client instructions for 7 years, the electronic record can meet this requirement, provided that:  there exists a reliable assurance as to the integrity of the information from the time when it was first generated in its final form, whether as an electronic communication or otherwise,  where it is required or permitted that the information be presented— if the information is capable of being displayed in intelligible form to a person or public body to whom it is to be presented,  if, at the time the information was generated in its final form, it was reasonable to expect that it would be readily accessible so as to be useable for subsequent reference,  where the information is required or permitted to be presented to or retained for a public body or for a person acting on behalf of a public body, and the public body consents to the information being presented or retained in electronic form, whether as an electronic communication or otherwise, but requires that it be presented or retained in accordance with particular information technology and procedural requirements— if the public body's requirements have been met and those requirements have been made public and are objective, transparent, proportionate and non-discriminatory, and  where the information is required or permitted to be presented to or retained for a person who is neither a public body nor acting on behalf of a public body— if the person to whom the information is required or permitted to be presented or for whom it is required or permitted to be retained consents to the information being presented or retained in that form. However Digiproving does have the following real advantages: 1. When added to electronically signed document at the same time the document is signed, it meets any statutory obligation in relation to retention of original documents 2. Offers an irrefutable assurance that the document has not been altered either accidentally or deliberately since its creation 3. Offers an irrefutable timestamp certifying the time of creation of the document (And location information if it is available on the device) 4. It meets the requirements for retention of records (In digital format), thus creating less dependence on paper records. Items 2 & 3 are important because not only do they provide comfort to the receiving party (who must after all consent to the use of e-communications) of the integrity of the document, they remove all reasonable doubt (whether in a court case or otherwise) that a document could have been altered. Other safeguards such as archiving and time stamping logs may be circumvented by any software engineer or gifted amateur, or indeed by malicious design. Finally the legislation describes an "advanced electronic signature based on a qualified certificate". I am pretty certain this means what is usually referred to as a Digital Signature, based on PKI using CAs such as Verisign (such as what is implemented in Adobe and there are many examples like this I think An Post have something as well). This has one particular legal advantage in that it is recognised as a witnessed signature, and appears to be a requirement in applying signatures to documents that require witnessing. Cryptographically it is a very secure solution. However it comes with a major overhead - everyone who signs has to have a Digital ID (or digital certificate) from a DP-Performance 0-1 ©Digiprove Oct 2011
  • 2. eCommerce Act (2000) and relevance to Financial Advisors (Electronic Signatures) recognised CA. There is (as you would expect) a whole process involved in proving your identity to the CA, and of course an annual cost. Despite massive promotion by companies like RSA and Baltimore in the late 90s this technology did not succeed. DP-Performance 0-1 ©Digiprove Oct 2011