SlideShare a Scribd company logo
1 of 27
Download to read offline
‫أكاديمية الحكومة اإللكترونية الفلسطينية‬
         The Palestinian eGovernment Academy
                     www.egovacademy.ps




Tutorial 6: The Legal Framework of New Technologies

                        Session6
  Digital Signature & e-evidence
     Dr. Samer Najjar             Dr. Feras Milhem



                         PalGov © 2011                       1
About

This tutorial is part of the PalGov project, funded by the TEMPUS IV program of the
Commission of the European Communities, grant agreement 511159-TEMPUS-1-
2010-1-PS-TEMPUS-JPHES. The project website: www.egovacademy.ps
Project Consortium:
             Birzeit University, Palestine
                                                           University of Trento, Italy
             (Coordinator )


             Palestine Polytechnic University, Palestine   Vrije Universiteit Brussel, Belgium


             Palestine Technical University, Palestine
                                                           Université de Savoie, France

             Ministry of Telecom and IT, Palestine
                                                           University of Namur, Belgium
             Ministry of Interior, Palestine
                                                           TrueTrust, UK
             Ministry of Local Government, Palestine


Coordinator:
Dr. Mustafa Jarrar
Birzeit University, P.O.Box 14- Birzeit, Palestine
Telfax:+972 2 2982935 mjarrar@birzeit.eduPalGov © 2011
                                                                                                 2
© Copyright Notes
Everyone is encouraged to use this material, or part of it, but should properly
cite the project (logo and website), and the author of that part.


No part of this tutorial may be reproduced or modified in any form or by any
means, without prior written permission from the project, who have the full
copyrights on the material.




                   Attribution-NonCommercial-ShareAlike
                                CC-BY-NC-SA

This license lets others remix, tweak, and build upon your work non-
commercially, as long as they credit you and license their new creations
under the identical terms.

                                    PalGov © 2011                                 3
ILOs


• Introduce students with the rules of e-
  evidence as well as digital signature in
  Palestine.
 ً‫• مقدمة عن قواعد األثبات القانونً والتوقٌع األلكترونً ف‬
                                                  ‫فلسطٌن‬
• Explain the importance of e-evidence and
  digital signature in general and for the e-
  government in particular
   ً‫• بٌان أهمٌة قواعد االثبات القانونً والتوقٌع األلكترون‬
          .‫بشكل عام، وللحكومة األلكترونٌة بشكل خاص‬

                    PalGov © 2011                      4
e-evidence
‫اإلثبات القانوني‬

   – Digital evidence or electronic evidence is any
     probative information stored or transmitted in
     digital form that a party to a court case may
     use at trial.
   – Before accepting digital evidence a court will
     determine if the evidence is relevant, whether
     it is authentic, if it is hearsay and whether a
     copy is acceptable or the original is required.
 ‫– األدلة الرقمٌة أو اإللكترونٌة األدلة الثبوتٌة أٌة معلومات مخزنة‬
         .‫أو منقولة فً شكل رقمً التً قد تستخدم فً المحاكمة‬
 ‫– قبل قبول األدلة الرقمٌة سوف تقوم المحكمة بتحدٌد ما إذا كانت‬
                                                  .‫األدلة مقبولة‬

                      PalGov © 2011                            5
e-evidence Found in
‫موجود في‬
  –   e-mails
  –   digital photographs
  –   ATM transaction logs
  –   word processing documents
  –   instant message histories
  –   files saved from accounting programs
  –   spreadsheets
  –   internet browser histories
  –   databases
  –   Contents of computer memory
  –   Computer backups
  –   Computer printouts
  –   Global Positioning System tracks
  –   Logs from a hotel’s electronic door locks
  –   Digital video or audio files


                      PalGov © 2011               6
Legal foundation of e-evidence
‫اإلطار القانوني‬

  - Absence of such a special law.
                          .‫- غٌاب إطار قانونً خاص‬
  - No case law available from Palestinian
    courts
             ‫- غٌاب سوابق قضائٌة من محاكم فلسطٌنٌة‬
  - No any regulation of technologies to
    approve authentications such as digital
    signature
   )ً‫- ال ٌوجد قانون ٌنظم التوثٌق (التصدٌق االلكترون‬

                 PalGov © 2011                       7
Evidence law 2001
2001 ‫قانون البينات‬
- No substantive rules to govern e-evidence
                         ً‫- ال توجد قواعد جوهرٌة تنظم االثبات القانون‬

- Only scattered rules: ‫فقط قواعد مبعثرة وغٌر كافٌة‬

• Article 19: Correspondence and telegrams, telex, fax and
   e-mail, have the force of evidence if it originally filed in
   the Office of Export, signed by the sender. The cables
   are identical to the origin until proven to the contrary.
 ‫• تكون للبرقٌات ومكاتبات التلكس والفاكس والبرٌد اإللكترونً هذه القوة أٌضا إذا‬
 ‫كان اصلها المودع فً مكتب التصدٌر موقعا ً علٌها من مرسلها، وتعتبر البرقٌات‬
                                .‫مطابقة ألصلها حتى ٌقوم الدلٌل على عكس ذلك‬




                           PalGov © 2011                                  8
Evidence law 2001
2001 ‫قانون البينات‬
- Chapter 3 of the law stipulates that the
  accounting records of merchants
  constitute a proof against them
  whether these records are on paper or
  digital.
‫- إعتبر الجزء الثالث من القانون أن الدفاتر التجارٌة حجة‬
 ‫على أصحابها سواء كانت ورقٌة أو رقمٌة. ولٌس على‬
                                                .‫الغٌر‬


                   PalGov © 2011                    9
‫4002 ‪The Law of Securities No. 12 of‬‬
‫قانون األوراق المالية4002‬

‫‪- The Law legally acknowledged the‬‬
  ‫‪digital evidences in Securities related‬‬
  ‫)101 ‪disputes (article‬‬

    ‫- على الرغم مما ورد فً أي تشرٌع آخر، فإنه ٌجوز‬
‫اإلثبات بقضاٌا األوراق المالٌة والمعامالت التً تتم لدى‬
‫الهٌئة والسوق بواسطة البٌانات اإللكترونٌة أو الصادرة‬
    ‫عن الحاسوب وتسجٌالت الهاتف ومراسالت أجهزة‬
                    ‫التلكس والفاكسمٌلً. (مادة 101)‬
                  ‫1102 © ‪PalGov‬‬                    ‫01‬
What is needed to be done
‫ما يمكن عمله‬


• In some countries, a special law is
  adopted, eg., Canadian E-evidence
  Law.
        ‫• فً بعض الدول، تم تبنً قانون خاص باألثبات‬
                                             .ً‫القانون‬
• Some countries included scattered
  rules in relative legislation. Eg. E-
  commerce law or e-transaction law.
  ‫• فً دول أخرى تم تضمٌن نصوص فً قوانٌن مختلفة‬
          ‫مثل قوانٌن التجارة أو المعامالت االلكترونٌة‬
                  PalGov © 2011                    11
What is needed to be done
‫ما يمكن عمله‬


• UNCITRAL assigned some rules on e-
  evidence and suggestions to assure
  authentication and overcome security
  difficulties

(This will be discussed later under e-
  commerce section)



                PalGov © 2011            12
Some thing to think about


• Can the Palestinian courts weight an
  email as a proof in a court litigation.

   ‫• هل تستطٌع المحاكم الفلسطٌنٌة اإلعتماد على رسالة‬
         .‫إلكترونٌة كدلٌل إثبات فً قضٌة أمام المحاكم‬




                 PalGov © 2011                   13
Summary


• Palestine lacks the legal foundation of
  E-evidence, amendments to exiting
  laws or a harmonized law should be
  adopted.
.ً‫• تفتقر فلسطٌن إلى إطار قانونً ناظم للتوقٌع األلكترون‬
 ‫ٌجب تبنً إما تعدٌالت على قوانٌن قائمة أو تبنً قانون‬
                                               .‫شامل‬



                   PalGov © 2011                    14
References


•   Palestinian Law on Evidence of 2001.
•   Palestinian Law on Securities Law 2004.
•   Palestinian Draft e-transactions law.
•  CRIDS, University of Namur, PowerPoint
  Presentation on E-evidence, 2011.
• Interview with Dr. Amin Dawas, Arab-
  American University of Jenin 5 Oct. 2011.
• http://www.uncitral.org/pdf/english/texts/el
  ectcom/05-89450_Ebook.pdf

                PalGov © 2011               15
Digital Signature             ‫التوقيع الرقمي‬




• Dr. Samer Najjar




                     PalGov © 2011               16
Digital Signature, what is it?

• A digital signature is an electronic
  signature produced by a code (software)
  that can be used to authenticate the
  identity of the sender of a message or the
  signer of a document.
      ‫• التوقٌع الرقمً هو توقٌع الكترونً ناتج عن استعمال‬
  ‫برنامج خاص، وٌمكن استخدامه للتأكد من هوٌة المرسل‬
    ِ
                      ‫لرسالة او لمن وقع وثٌقة الكترونٌة‬


                     PalGov © 2011                   17
Digital Signature, what is it?

• It can be used to ensure that the
  original content of the message or
  document that has been sent is
  unchanged.
  ‫• كذلك ٌمكن استخدامه للتاكد من ان محتوى الرسالة او‬
             ‫الوثٌقة االصلٌة المرسلة الكترونٌا لم ٌتغٌر‬




                   PalGov © 2011                    18
Digital Signature


• A digital signature can be used with any
    kind of message, whether it is encrypted
    or not, simply so that the receiver can be
    sure of the sender's identity and that the
    message arrived intact. *
 ً
 ‫• التوقٌع الرقمً ٌمكن استخدامه ألي نوع من الرسائل سواء‬
   ‫كانت مشفرة ام ال، وٌستعمل حتى ٌتأكد المستلم ان السالة‬
                             ‫المستلمة لم ٌحدث لها اي تغٌٌر‬

* Global e-securirty:4th International conference, ICGe, 2008, edited by Hamid Jahankhani,
     Kenneth Revett, Dominic Palmer-Brown - 2008 - Business & Economics - 310 pages.




                                PalGov © 2011                                                19
Digital Signature


• A digital certificate contains the digital
  signature of the certificate-issuing
  authority so that anyone can verify that
  the certificate is real.*
      ‫• الشهادة الرقمٌة تحتوي على التوقٌع الرقمً للجهة‬
  ‫المصدرة بحٌث ٌستطٌع اٌا كان التحقق من ان الشهادة‬
                                              ‫اصلٌة‬
* Ran Canetti: Universally Composable Signature, Certification, and
   Authentication




                         PalGov © 2011                                20
Digital Certificate

  Digital Certificate:
Digital Certificate provides a means of proving one’s
  identity in electronic transactions.
A Digital Certificate is issued by a Certification Authority
  (CA) and signed with the CA's private key.
Normally it contains:
• Owner's public key
• Owner's name
• Expiration date of the public key
• Name of the issuer (the CA that issued the Digital
  Certificate)
• Serial number of the Digital Certificate
• Digital signature of the issuer
                         PalGov © 2011                    21
Digital Signature


• Digital signatures:                     ‫التوقيعات الرقمية‬

-   Cannot be sent by itself         ‫الٌمكن ارساله لوحده‬
-   Identifies the signatory            ‫تحدد هوٌة المرسل‬
-   Easily transportable,                ‫ٌمكن نقله بسهولة‬
-    Cannot be forged,                    ‫ال ٌمكن تزوٌره‬
-   Can be automatically time-stamped.
                 ً‫ٌمكن اعطاؤه خاتما للزمن بشكل اوتوماتٌك‬
                          PalGov © 2011                       22
How it works


• Send a document from A to B by e-mail:
- “A” writes document in his email
- By using special software, “A”, gets a
  message hash, which can be thought of
  as message summary
- “A”, uses private key to encrypt the hash
- This encrypted hash is the digital
  signature of this document

                PalGov © 2011             23
How it works


• Send a document from A to B by e-mail:
- “B” receives the document by his email
- “B”, makes a hash of the message
- “B”, uses the public key provided to him by
  “A” to decrypt the hash
- If the hashes match the message and
  identity of “A” are verified


                   PalGov © 2011           24
Digital Signature Standard (DSS)


• Digital Signature Standard (DSS):*
- is a digital signature algorithm (DSA), that
  calculates two large numbers within
  parameters to authenticate e-documents
- Developed by U.S. National Security
  Agency (NSA) in 1994
- It has become the US government standard
  for authentication of electronic documents.
* Recommendation for Key Management -- Part 1: general, NIST Special Publication 800-57, p. 62–63




                                           PalGov © 2011                                            25
References

•   Recommendation for Key Management -- Part 1: general, NIST
    Special Publication 800-57, p. 62–63
•   Ran Canetti: Universally Composable Signature, Certification, and
    Authentication




                              PalGov © 2011                             26
Session End



    PalGov © 2011   27

More Related Content

What's hot

Internet Service Provider Liability
Internet Service Provider LiabilityInternet Service Provider Liability
Internet Service Provider LiabilityAndres Guadamuz
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAnuj Khandelwal
 
My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011Prof. (Dr.) Tabrez Ahmad
 
Regulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International LawRegulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International LawJon Garon
 
International Cybercrime (Part 3)
International Cybercrime (Part 3)International Cybercrime (Part 3)
International Cybercrime (Part 3)GrittyCC
 
Recording conversations without consent
Recording conversations without consentRecording conversations without consent
Recording conversations without consentAlexandria Bishop
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesKislaychd
 
Electronic Contracting Presentation
Electronic Contracting PresentationElectronic Contracting Presentation
Electronic Contracting PresentationEndcode_org
 
UK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementUK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementLilian Edwards
 
Glover ccil internet_jurisdiction_slides.ppt
Glover ccil internet_jurisdiction_slides.pptGlover ccil internet_jurisdiction_slides.ppt
Glover ccil internet_jurisdiction_slides.pptbsookman
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issuesatuljaybhaye
 

What's hot (15)

Internet Service Provider Liability
Internet Service Provider LiabilityInternet Service Provider Liability
Internet Service Provider Liability
 
An Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a NewbieAn Introduction to Cyber World to a Newbie
An Introduction to Cyber World to a Newbie
 
My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011
 
Regulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International LawRegulating Data: The Implications of Informatics on International Law
Regulating Data: The Implications of Informatics on International Law
 
International Cybercrime (Part 3)
International Cybercrime (Part 3)International Cybercrime (Part 3)
International Cybercrime (Part 3)
 
Recording conversations without consent
Recording conversations without consentRecording conversations without consent
Recording conversations without consent
 
Cyber space: its legal jurisdiction
Cyber space: its legal jurisdictionCyber space: its legal jurisdiction
Cyber space: its legal jurisdiction
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering Techniques
 
Law x IT
Law x ITLaw x IT
Law x IT
 
Theory Cyberspace
Theory CyberspaceTheory Cyberspace
Theory Cyberspace
 
An overview of cyberimes
An overview of cyberimesAn overview of cyberimes
An overview of cyberimes
 
Electronic Contracting Presentation
Electronic Contracting PresentationElectronic Contracting Presentation
Electronic Contracting Presentation
 
UK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcementUK copyright, online intermediaries and enforcement
UK copyright, online intermediaries and enforcement
 
Glover ccil internet_jurisdiction_slides.ppt
Glover ccil internet_jurisdiction_slides.pptGlover ccil internet_jurisdiction_slides.ppt
Glover ccil internet_jurisdiction_slides.ppt
 
Cyber law & Intellectual property issues
Cyber law & Intellectual property issuesCyber law & Intellectual property issues
Cyber law & Intellectual property issues
 

Viewers also liked

Angel slideshow4
Angel slideshow4Angel slideshow4
Angel slideshow4yukiyagami1
 
Pal gov.tutorial6.session4.intellectual property
Pal gov.tutorial6.session4.intellectual propertyPal gov.tutorial6.session4.intellectual property
Pal gov.tutorial6.session4.intellectual propertyMustafa Jarrar
 
Pal gov.tutorial6.session11.case studies
Pal gov.tutorial6.session11.case studiesPal gov.tutorial6.session11.case studies
Pal gov.tutorial6.session11.case studiesMustafa Jarrar
 
Team_ XBOX
Team_ XBOXTeam_ XBOX
Team_ XBOXTeam_LTD
 
Pal gov.tutorial1.session13 14
Pal gov.tutorial1.session13 14Pal gov.tutorial1.session13 14
Pal gov.tutorial1.session13 14Mustafa Jarrar
 

Viewers also liked (7)

Pechakucha base file
Pechakucha base filePechakucha base file
Pechakucha base file
 
Angel slideshow4
Angel slideshow4Angel slideshow4
Angel slideshow4
 
Pal gov.tutorial6.session4.intellectual property
Pal gov.tutorial6.session4.intellectual propertyPal gov.tutorial6.session4.intellectual property
Pal gov.tutorial6.session4.intellectual property
 
Pal gov.tutorial6.session11.case studies
Pal gov.tutorial6.session11.case studiesPal gov.tutorial6.session11.case studies
Pal gov.tutorial6.session11.case studies
 
NoTube project poster, 1st version
NoTube project poster, 1st versionNoTube project poster, 1st version
NoTube project poster, 1st version
 
Team_ XBOX
Team_ XBOXTeam_ XBOX
Team_ XBOX
 
Pal gov.tutorial1.session13 14
Pal gov.tutorial1.session13 14Pal gov.tutorial1.session13 14
Pal gov.tutorial1.session13 14
 

Similar to Pal gov.tutorial6.session6.digital signature & e evidence

Pal gov.tutorial6.session10.e archiving
Pal gov.tutorial6.session10.e archivingPal gov.tutorial6.session10.e archiving
Pal gov.tutorial6.session10.e archivingMustafa Jarrar
 
Pal gov.tutorial6.session9.cybercrime
Pal gov.tutorial6.session9.cybercrimePal gov.tutorial6.session9.cybercrime
Pal gov.tutorial6.session9.cybercrimeMustafa Jarrar
 
E gov security_tut_session_5
E gov security_tut_session_5E gov security_tut_session_5
E gov security_tut_session_5Mustafa Jarrar
 
Pal gov.tutorial6.session3.introduction to ict and e government
Pal gov.tutorial6.session3.introduction to ict and e governmentPal gov.tutorial6.session3.introduction to ict and e government
Pal gov.tutorial6.session3.introduction to ict and e governmentMustafa Jarrar
 
Pal gov.tutorial6.session7.it contract
Pal gov.tutorial6.session7.it contractPal gov.tutorial6.session7.it contract
Pal gov.tutorial6.session7.it contractMustafa Jarrar
 
Pal gov.tutorial6.session0.outline
Pal gov.tutorial6.session0.outlinePal gov.tutorial6.session0.outline
Pal gov.tutorial6.session0.outlineMustafa Jarrar
 
E gov security_tut_session_9
E gov security_tut_session_9E gov security_tut_session_9
E gov security_tut_session_9Mustafa Jarrar
 
The Legality of Electronic Signatures
The Legality of Electronic SignaturesThe Legality of Electronic Signatures
The Legality of Electronic SignaturesDocuSign
 
Rabelani dagada electronic records management chetty law 2011
Rabelani dagada electronic records management   chetty law 2011Rabelani dagada electronic records management   chetty law 2011
Rabelani dagada electronic records management chetty law 2011Rabelani Dagada
 
Enhancing System Security Using PKI
Enhancing System Security Using PKIEnhancing System Security Using PKI
Enhancing System Security Using PKIChin Wan Lim
 
Litigation newsletter kubor v. dickson
Litigation newsletter  kubor v. dicksonLitigation newsletter  kubor v. dickson
Litigation newsletter kubor v. dicksonAcas Media
 
E gov security_tut_session_1
E gov security_tut_session_1E gov security_tut_session_1
E gov security_tut_session_1Mustafa Jarrar
 
The Development of E-Commerce in Nigeria - Olushola Abiloye
The Development of E-Commerce in Nigeria - Olushola AbiloyeThe Development of E-Commerce in Nigeria - Olushola Abiloye
The Development of E-Commerce in Nigeria - Olushola AbiloyeAcas Media
 
E-Signature Webcast for Financial Services Legal Counsel (Slides)
E-Signature Webcast for Financial Services Legal Counsel (Slides)E-Signature Webcast for Financial Services Legal Counsel (Slides)
E-Signature Webcast for Financial Services Legal Counsel (Slides)eSignLive by VASCO
 
security lecture and final powepoint presentation
security lecture and final powepoint presentationsecurity lecture and final powepoint presentation
security lecture and final powepoint presentationsrajece
 
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018Talwant Singh
 
Fantom ecosystem analysis
Fantom ecosystem analysisFantom ecosystem analysis
Fantom ecosystem analysisTrade Coin Asia
 
Pal gov.tutorial6.session5.privacy and data protection
Pal gov.tutorial6.session5.privacy and data protectionPal gov.tutorial6.session5.privacy and data protection
Pal gov.tutorial6.session5.privacy and data protectionMustafa Jarrar
 
Pal gov.tutorial4.session10.zinnar
Pal gov.tutorial4.session10.zinnarPal gov.tutorial4.session10.zinnar
Pal gov.tutorial4.session10.zinnarMustafa Jarrar
 

Similar to Pal gov.tutorial6.session6.digital signature & e evidence (20)

Pal gov.tutorial6.session10.e archiving
Pal gov.tutorial6.session10.e archivingPal gov.tutorial6.session10.e archiving
Pal gov.tutorial6.session10.e archiving
 
Compliance & Value of Digital Signatures
Compliance & Value of Digital SignaturesCompliance & Value of Digital Signatures
Compliance & Value of Digital Signatures
 
Pal gov.tutorial6.session9.cybercrime
Pal gov.tutorial6.session9.cybercrimePal gov.tutorial6.session9.cybercrime
Pal gov.tutorial6.session9.cybercrime
 
E gov security_tut_session_5
E gov security_tut_session_5E gov security_tut_session_5
E gov security_tut_session_5
 
Pal gov.tutorial6.session3.introduction to ict and e government
Pal gov.tutorial6.session3.introduction to ict and e governmentPal gov.tutorial6.session3.introduction to ict and e government
Pal gov.tutorial6.session3.introduction to ict and e government
 
Pal gov.tutorial6.session7.it contract
Pal gov.tutorial6.session7.it contractPal gov.tutorial6.session7.it contract
Pal gov.tutorial6.session7.it contract
 
Pal gov.tutorial6.session0.outline
Pal gov.tutorial6.session0.outlinePal gov.tutorial6.session0.outline
Pal gov.tutorial6.session0.outline
 
E gov security_tut_session_9
E gov security_tut_session_9E gov security_tut_session_9
E gov security_tut_session_9
 
The Legality of Electronic Signatures
The Legality of Electronic SignaturesThe Legality of Electronic Signatures
The Legality of Electronic Signatures
 
Rabelani dagada electronic records management chetty law 2011
Rabelani dagada electronic records management   chetty law 2011Rabelani dagada electronic records management   chetty law 2011
Rabelani dagada electronic records management chetty law 2011
 
Enhancing System Security Using PKI
Enhancing System Security Using PKIEnhancing System Security Using PKI
Enhancing System Security Using PKI
 
Litigation newsletter kubor v. dickson
Litigation newsletter  kubor v. dicksonLitigation newsletter  kubor v. dickson
Litigation newsletter kubor v. dickson
 
E gov security_tut_session_1
E gov security_tut_session_1E gov security_tut_session_1
E gov security_tut_session_1
 
The Development of E-Commerce in Nigeria - Olushola Abiloye
The Development of E-Commerce in Nigeria - Olushola AbiloyeThe Development of E-Commerce in Nigeria - Olushola Abiloye
The Development of E-Commerce in Nigeria - Olushola Abiloye
 
E-Signature Webcast for Financial Services Legal Counsel (Slides)
E-Signature Webcast for Financial Services Legal Counsel (Slides)E-Signature Webcast for Financial Services Legal Counsel (Slides)
E-Signature Webcast for Financial Services Legal Counsel (Slides)
 
security lecture and final powepoint presentation
security lecture and final powepoint presentationsecurity lecture and final powepoint presentation
security lecture and final powepoint presentation
 
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
 
Fantom ecosystem analysis
Fantom ecosystem analysisFantom ecosystem analysis
Fantom ecosystem analysis
 
Pal gov.tutorial6.session5.privacy and data protection
Pal gov.tutorial6.session5.privacy and data protectionPal gov.tutorial6.session5.privacy and data protection
Pal gov.tutorial6.session5.privacy and data protection
 
Pal gov.tutorial4.session10.zinnar
Pal gov.tutorial4.session10.zinnarPal gov.tutorial4.session10.zinnar
Pal gov.tutorial4.session10.zinnar
 

More from Mustafa Jarrar

Clustering Arabic Tweets for Sentiment Analysis
Clustering Arabic Tweets for Sentiment AnalysisClustering Arabic Tweets for Sentiment Analysis
Clustering Arabic Tweets for Sentiment AnalysisMustafa Jarrar
 
Classifying Processes and Basic Formal Ontology
Classifying Processes  and Basic Formal OntologyClassifying Processes  and Basic Formal Ontology
Classifying Processes and Basic Formal OntologyMustafa Jarrar
 
Discrete Mathematics Course Outline
Discrete Mathematics Course OutlineDiscrete Mathematics Course Outline
Discrete Mathematics Course OutlineMustafa Jarrar
 
Business Process Implementation
Business Process ImplementationBusiness Process Implementation
Business Process ImplementationMustafa Jarrar
 
Business Process Design and Re-engineering
Business Process Design and Re-engineeringBusiness Process Design and Re-engineering
Business Process Design and Re-engineeringMustafa Jarrar
 
BPMN 2.0 Analytical Constructs
BPMN 2.0 Analytical ConstructsBPMN 2.0 Analytical Constructs
BPMN 2.0 Analytical ConstructsMustafa Jarrar
 
BPMN 2.0 Descriptive Constructs
BPMN 2.0 Descriptive Constructs  BPMN 2.0 Descriptive Constructs
BPMN 2.0 Descriptive Constructs Mustafa Jarrar
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process ManagementMustafa Jarrar
 
Customer Complaint Ontology
Customer Complaint Ontology Customer Complaint Ontology
Customer Complaint Ontology Mustafa Jarrar
 
Subset, Equality, and Exclusion Rules
Subset, Equality, and Exclusion RulesSubset, Equality, and Exclusion Rules
Subset, Equality, and Exclusion RulesMustafa Jarrar
 
Schema Modularization in ORM
Schema Modularization in ORMSchema Modularization in ORM
Schema Modularization in ORMMustafa Jarrar
 
On Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in PalestineOn Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in PalestineMustafa Jarrar
 
Lessons from Class Recording & Publishing of Eight Online Courses
Lessons from Class Recording & Publishing of Eight Online CoursesLessons from Class Recording & Publishing of Eight Online Courses
Lessons from Class Recording & Publishing of Eight Online CoursesMustafa Jarrar
 
Presentation curras paper-emnlp2014-final
Presentation curras paper-emnlp2014-finalPresentation curras paper-emnlp2014-final
Presentation curras paper-emnlp2014-finalMustafa Jarrar
 
Jarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsJarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsMustafa Jarrar
 
Habash: Arabic Natural Language Processing
Habash: Arabic Natural Language ProcessingHabash: Arabic Natural Language Processing
Habash: Arabic Natural Language ProcessingMustafa Jarrar
 
Adnan: Introduction to Natural Language Processing
Adnan: Introduction to Natural Language Processing Adnan: Introduction to Natural Language Processing
Adnan: Introduction to Natural Language Processing Mustafa Jarrar
 
Riestra: How to Design and engineer Competitive Horizon 2020 Proposals
Riestra: How to Design and engineer Competitive Horizon 2020 ProposalsRiestra: How to Design and engineer Competitive Horizon 2020 Proposals
Riestra: How to Design and engineer Competitive Horizon 2020 ProposalsMustafa Jarrar
 
Bouquet: SIERA Workshop on The Pillars of Horizon2020
Bouquet: SIERA Workshop on The Pillars of Horizon2020Bouquet: SIERA Workshop on The Pillars of Horizon2020
Bouquet: SIERA Workshop on The Pillars of Horizon2020Mustafa Jarrar
 
Jarrar: Sparql Project
Jarrar: Sparql ProjectJarrar: Sparql Project
Jarrar: Sparql ProjectMustafa Jarrar
 

More from Mustafa Jarrar (20)

Clustering Arabic Tweets for Sentiment Analysis
Clustering Arabic Tweets for Sentiment AnalysisClustering Arabic Tweets for Sentiment Analysis
Clustering Arabic Tweets for Sentiment Analysis
 
Classifying Processes and Basic Formal Ontology
Classifying Processes  and Basic Formal OntologyClassifying Processes  and Basic Formal Ontology
Classifying Processes and Basic Formal Ontology
 
Discrete Mathematics Course Outline
Discrete Mathematics Course OutlineDiscrete Mathematics Course Outline
Discrete Mathematics Course Outline
 
Business Process Implementation
Business Process ImplementationBusiness Process Implementation
Business Process Implementation
 
Business Process Design and Re-engineering
Business Process Design and Re-engineeringBusiness Process Design and Re-engineering
Business Process Design and Re-engineering
 
BPMN 2.0 Analytical Constructs
BPMN 2.0 Analytical ConstructsBPMN 2.0 Analytical Constructs
BPMN 2.0 Analytical Constructs
 
BPMN 2.0 Descriptive Constructs
BPMN 2.0 Descriptive Constructs  BPMN 2.0 Descriptive Constructs
BPMN 2.0 Descriptive Constructs
 
Introduction to Business Process Management
Introduction to Business Process ManagementIntroduction to Business Process Management
Introduction to Business Process Management
 
Customer Complaint Ontology
Customer Complaint Ontology Customer Complaint Ontology
Customer Complaint Ontology
 
Subset, Equality, and Exclusion Rules
Subset, Equality, and Exclusion RulesSubset, Equality, and Exclusion Rules
Subset, Equality, and Exclusion Rules
 
Schema Modularization in ORM
Schema Modularization in ORMSchema Modularization in ORM
Schema Modularization in ORM
 
On Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in PalestineOn Computer Science Trends and Priorities in Palestine
On Computer Science Trends and Priorities in Palestine
 
Lessons from Class Recording & Publishing of Eight Online Courses
Lessons from Class Recording & Publishing of Eight Online CoursesLessons from Class Recording & Publishing of Eight Online Courses
Lessons from Class Recording & Publishing of Eight Online Courses
 
Presentation curras paper-emnlp2014-final
Presentation curras paper-emnlp2014-finalPresentation curras paper-emnlp2014-final
Presentation curras paper-emnlp2014-final
 
Jarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsJarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 Calls
 
Habash: Arabic Natural Language Processing
Habash: Arabic Natural Language ProcessingHabash: Arabic Natural Language Processing
Habash: Arabic Natural Language Processing
 
Adnan: Introduction to Natural Language Processing
Adnan: Introduction to Natural Language Processing Adnan: Introduction to Natural Language Processing
Adnan: Introduction to Natural Language Processing
 
Riestra: How to Design and engineer Competitive Horizon 2020 Proposals
Riestra: How to Design and engineer Competitive Horizon 2020 ProposalsRiestra: How to Design and engineer Competitive Horizon 2020 Proposals
Riestra: How to Design and engineer Competitive Horizon 2020 Proposals
 
Bouquet: SIERA Workshop on The Pillars of Horizon2020
Bouquet: SIERA Workshop on The Pillars of Horizon2020Bouquet: SIERA Workshop on The Pillars of Horizon2020
Bouquet: SIERA Workshop on The Pillars of Horizon2020
 
Jarrar: Sparql Project
Jarrar: Sparql ProjectJarrar: Sparql Project
Jarrar: Sparql Project
 

Recently uploaded

Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...narsireddynannuri1
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Krish109503
 
23042024_First India Newspaper Jaipur.pdf
23042024_First India Newspaper Jaipur.pdf23042024_First India Newspaper Jaipur.pdf
23042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docxkfjstone13
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxjohnandrewcarlos
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victoryanjanibaddipudi1
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书Fi L
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerOmarCabrera39
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfLorenzo Lemes
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docxkfjstone13
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxlorenzodemidio01
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxAwaiskhalid96
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemenkfjstone13
 
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service KolhapurCollege Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service KolhapurCall girls in Ahmedabad High profile
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...Ismail Fahmi
 
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsVashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsPooja Nehwal
 

Recently uploaded (20)

Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!
 
23042024_First India Newspaper Jaipur.pdf
23042024_First India Newspaper Jaipur.pdf23042024_First India Newspaper Jaipur.pdf
23042024_First India Newspaper Jaipur.pdf
 
26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf26042024_First India Newspaper Jaipur.pdf
26042024_First India Newspaper Jaipur.pdf
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
2024 04 03 AZ GOP LD4 Gen Meeting Minutes FINAL.docx
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
 
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
如何办理(BU学位证书)美国贝翰文大学毕业证学位证书
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert Oppenheimer
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
2024 02 15 AZ GOP LD4 Gen Meeting Minutes_FINAL_20240228.docx
 
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptxLorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
Lorenzo D'Emidio_Lavoro sullaNorth Korea .pptx
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptx
 
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct CommiteemenRoberts Rules Cheat Sheet for LD4 Precinct Commiteemen
Roberts Rules Cheat Sheet for LD4 Precinct Commiteemen
 
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service KolhapurCollege Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
College Call Girls Kolhapur Aanya 8617697112 Independent Escort Service Kolhapur
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
HARNESSING AI FOR ENHANCED MEDIA ANALYSIS A CASE STUDY ON CHATGPT AT DRONE EM...
 
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call GirlsVashi Escorts, {Pooja 09892124323}, Vashi Call Girls
Vashi Escorts, {Pooja 09892124323}, Vashi Call Girls
 

Pal gov.tutorial6.session6.digital signature & e evidence

  • 1. ‫أكاديمية الحكومة اإللكترونية الفلسطينية‬ The Palestinian eGovernment Academy www.egovacademy.ps Tutorial 6: The Legal Framework of New Technologies Session6 Digital Signature & e-evidence Dr. Samer Najjar Dr. Feras Milhem PalGov © 2011 1
  • 2. About This tutorial is part of the PalGov project, funded by the TEMPUS IV program of the Commission of the European Communities, grant agreement 511159-TEMPUS-1- 2010-1-PS-TEMPUS-JPHES. The project website: www.egovacademy.ps Project Consortium: Birzeit University, Palestine University of Trento, Italy (Coordinator ) Palestine Polytechnic University, Palestine Vrije Universiteit Brussel, Belgium Palestine Technical University, Palestine Université de Savoie, France Ministry of Telecom and IT, Palestine University of Namur, Belgium Ministry of Interior, Palestine TrueTrust, UK Ministry of Local Government, Palestine Coordinator: Dr. Mustafa Jarrar Birzeit University, P.O.Box 14- Birzeit, Palestine Telfax:+972 2 2982935 mjarrar@birzeit.eduPalGov © 2011 2
  • 3. © Copyright Notes Everyone is encouraged to use this material, or part of it, but should properly cite the project (logo and website), and the author of that part. No part of this tutorial may be reproduced or modified in any form or by any means, without prior written permission from the project, who have the full copyrights on the material. Attribution-NonCommercial-ShareAlike CC-BY-NC-SA This license lets others remix, tweak, and build upon your work non- commercially, as long as they credit you and license their new creations under the identical terms. PalGov © 2011 3
  • 4. ILOs • Introduce students with the rules of e- evidence as well as digital signature in Palestine. ً‫• مقدمة عن قواعد األثبات القانونً والتوقٌع األلكترونً ف‬ ‫فلسطٌن‬ • Explain the importance of e-evidence and digital signature in general and for the e- government in particular ً‫• بٌان أهمٌة قواعد االثبات القانونً والتوقٌع األلكترون‬ .‫بشكل عام، وللحكومة األلكترونٌة بشكل خاص‬ PalGov © 2011 4
  • 5. e-evidence ‫اإلثبات القانوني‬ – Digital evidence or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial. – Before accepting digital evidence a court will determine if the evidence is relevant, whether it is authentic, if it is hearsay and whether a copy is acceptable or the original is required. ‫– األدلة الرقمٌة أو اإللكترونٌة األدلة الثبوتٌة أٌة معلومات مخزنة‬ .‫أو منقولة فً شكل رقمً التً قد تستخدم فً المحاكمة‬ ‫– قبل قبول األدلة الرقمٌة سوف تقوم المحكمة بتحدٌد ما إذا كانت‬ .‫األدلة مقبولة‬ PalGov © 2011 5
  • 6. e-evidence Found in ‫موجود في‬ – e-mails – digital photographs – ATM transaction logs – word processing documents – instant message histories – files saved from accounting programs – spreadsheets – internet browser histories – databases – Contents of computer memory – Computer backups – Computer printouts – Global Positioning System tracks – Logs from a hotel’s electronic door locks – Digital video or audio files PalGov © 2011 6
  • 7. Legal foundation of e-evidence ‫اإلطار القانوني‬ - Absence of such a special law. .‫- غٌاب إطار قانونً خاص‬ - No case law available from Palestinian courts ‫- غٌاب سوابق قضائٌة من محاكم فلسطٌنٌة‬ - No any regulation of technologies to approve authentications such as digital signature )ً‫- ال ٌوجد قانون ٌنظم التوثٌق (التصدٌق االلكترون‬ PalGov © 2011 7
  • 8. Evidence law 2001 2001 ‫قانون البينات‬ - No substantive rules to govern e-evidence ً‫- ال توجد قواعد جوهرٌة تنظم االثبات القانون‬ - Only scattered rules: ‫فقط قواعد مبعثرة وغٌر كافٌة‬ • Article 19: Correspondence and telegrams, telex, fax and e-mail, have the force of evidence if it originally filed in the Office of Export, signed by the sender. The cables are identical to the origin until proven to the contrary. ‫• تكون للبرقٌات ومكاتبات التلكس والفاكس والبرٌد اإللكترونً هذه القوة أٌضا إذا‬ ‫كان اصلها المودع فً مكتب التصدٌر موقعا ً علٌها من مرسلها، وتعتبر البرقٌات‬ .‫مطابقة ألصلها حتى ٌقوم الدلٌل على عكس ذلك‬ PalGov © 2011 8
  • 9. Evidence law 2001 2001 ‫قانون البينات‬ - Chapter 3 of the law stipulates that the accounting records of merchants constitute a proof against them whether these records are on paper or digital. ‫- إعتبر الجزء الثالث من القانون أن الدفاتر التجارٌة حجة‬ ‫على أصحابها سواء كانت ورقٌة أو رقمٌة. ولٌس على‬ .‫الغٌر‬ PalGov © 2011 9
  • 10. ‫4002 ‪The Law of Securities No. 12 of‬‬ ‫قانون األوراق المالية4002‬ ‫‪- The Law legally acknowledged the‬‬ ‫‪digital evidences in Securities related‬‬ ‫)101 ‪disputes (article‬‬ ‫- على الرغم مما ورد فً أي تشرٌع آخر، فإنه ٌجوز‬ ‫اإلثبات بقضاٌا األوراق المالٌة والمعامالت التً تتم لدى‬ ‫الهٌئة والسوق بواسطة البٌانات اإللكترونٌة أو الصادرة‬ ‫عن الحاسوب وتسجٌالت الهاتف ومراسالت أجهزة‬ ‫التلكس والفاكسمٌلً. (مادة 101)‬ ‫1102 © ‪PalGov‬‬ ‫01‬
  • 11. What is needed to be done ‫ما يمكن عمله‬ • In some countries, a special law is adopted, eg., Canadian E-evidence Law. ‫• فً بعض الدول، تم تبنً قانون خاص باألثبات‬ .ً‫القانون‬ • Some countries included scattered rules in relative legislation. Eg. E- commerce law or e-transaction law. ‫• فً دول أخرى تم تضمٌن نصوص فً قوانٌن مختلفة‬ ‫مثل قوانٌن التجارة أو المعامالت االلكترونٌة‬ PalGov © 2011 11
  • 12. What is needed to be done ‫ما يمكن عمله‬ • UNCITRAL assigned some rules on e- evidence and suggestions to assure authentication and overcome security difficulties (This will be discussed later under e- commerce section) PalGov © 2011 12
  • 13. Some thing to think about • Can the Palestinian courts weight an email as a proof in a court litigation. ‫• هل تستطٌع المحاكم الفلسطٌنٌة اإلعتماد على رسالة‬ .‫إلكترونٌة كدلٌل إثبات فً قضٌة أمام المحاكم‬ PalGov © 2011 13
  • 14. Summary • Palestine lacks the legal foundation of E-evidence, amendments to exiting laws or a harmonized law should be adopted. .ً‫• تفتقر فلسطٌن إلى إطار قانونً ناظم للتوقٌع األلكترون‬ ‫ٌجب تبنً إما تعدٌالت على قوانٌن قائمة أو تبنً قانون‬ .‫شامل‬ PalGov © 2011 14
  • 15. References • Palestinian Law on Evidence of 2001. • Palestinian Law on Securities Law 2004. • Palestinian Draft e-transactions law. • CRIDS, University of Namur, PowerPoint Presentation on E-evidence, 2011. • Interview with Dr. Amin Dawas, Arab- American University of Jenin 5 Oct. 2011. • http://www.uncitral.org/pdf/english/texts/el ectcom/05-89450_Ebook.pdf PalGov © 2011 15
  • 16. Digital Signature ‫التوقيع الرقمي‬ • Dr. Samer Najjar PalGov © 2011 16
  • 17. Digital Signature, what is it? • A digital signature is an electronic signature produced by a code (software) that can be used to authenticate the identity of the sender of a message or the signer of a document. ‫• التوقٌع الرقمً هو توقٌع الكترونً ناتج عن استعمال‬ ‫برنامج خاص، وٌمكن استخدامه للتأكد من هوٌة المرسل‬ ِ ‫لرسالة او لمن وقع وثٌقة الكترونٌة‬ PalGov © 2011 17
  • 18. Digital Signature, what is it? • It can be used to ensure that the original content of the message or document that has been sent is unchanged. ‫• كذلك ٌمكن استخدامه للتاكد من ان محتوى الرسالة او‬ ‫الوثٌقة االصلٌة المرسلة الكترونٌا لم ٌتغٌر‬ PalGov © 2011 18
  • 19. Digital Signature • A digital signature can be used with any kind of message, whether it is encrypted or not, simply so that the receiver can be sure of the sender's identity and that the message arrived intact. * ً ‫• التوقٌع الرقمً ٌمكن استخدامه ألي نوع من الرسائل سواء‬ ‫كانت مشفرة ام ال، وٌستعمل حتى ٌتأكد المستلم ان السالة‬ ‫المستلمة لم ٌحدث لها اي تغٌٌر‬ * Global e-securirty:4th International conference, ICGe, 2008, edited by Hamid Jahankhani, Kenneth Revett, Dominic Palmer-Brown - 2008 - Business & Economics - 310 pages. PalGov © 2011 19
  • 20. Digital Signature • A digital certificate contains the digital signature of the certificate-issuing authority so that anyone can verify that the certificate is real.* ‫• الشهادة الرقمٌة تحتوي على التوقٌع الرقمً للجهة‬ ‫المصدرة بحٌث ٌستطٌع اٌا كان التحقق من ان الشهادة‬ ‫اصلٌة‬ * Ran Canetti: Universally Composable Signature, Certification, and Authentication PalGov © 2011 20
  • 21. Digital Certificate Digital Certificate: Digital Certificate provides a means of proving one’s identity in electronic transactions. A Digital Certificate is issued by a Certification Authority (CA) and signed with the CA's private key. Normally it contains: • Owner's public key • Owner's name • Expiration date of the public key • Name of the issuer (the CA that issued the Digital Certificate) • Serial number of the Digital Certificate • Digital signature of the issuer PalGov © 2011 21
  • 22. Digital Signature • Digital signatures: ‫التوقيعات الرقمية‬ - Cannot be sent by itself ‫الٌمكن ارساله لوحده‬ - Identifies the signatory ‫تحدد هوٌة المرسل‬ - Easily transportable, ‫ٌمكن نقله بسهولة‬ - Cannot be forged, ‫ال ٌمكن تزوٌره‬ - Can be automatically time-stamped. ً‫ٌمكن اعطاؤه خاتما للزمن بشكل اوتوماتٌك‬ PalGov © 2011 22
  • 23. How it works • Send a document from A to B by e-mail: - “A” writes document in his email - By using special software, “A”, gets a message hash, which can be thought of as message summary - “A”, uses private key to encrypt the hash - This encrypted hash is the digital signature of this document PalGov © 2011 23
  • 24. How it works • Send a document from A to B by e-mail: - “B” receives the document by his email - “B”, makes a hash of the message - “B”, uses the public key provided to him by “A” to decrypt the hash - If the hashes match the message and identity of “A” are verified PalGov © 2011 24
  • 25. Digital Signature Standard (DSS) • Digital Signature Standard (DSS):* - is a digital signature algorithm (DSA), that calculates two large numbers within parameters to authenticate e-documents - Developed by U.S. National Security Agency (NSA) in 1994 - It has become the US government standard for authentication of electronic documents. * Recommendation for Key Management -- Part 1: general, NIST Special Publication 800-57, p. 62–63 PalGov © 2011 25
  • 26. References • Recommendation for Key Management -- Part 1: general, NIST Special Publication 800-57, p. 62–63 • Ran Canetti: Universally Composable Signature, Certification, and Authentication PalGov © 2011 26
  • 27. Session End PalGov © 2011 27