SlideShare a Scribd company logo
Wildman Harrold | 225 West Wacker Drive | Chicago, IL 60606 | (312) 201-2000 | wildman.com
© 2010 Wildman, Harrold, Allen & Dixon LLP.
International Adoption and
Cross Jurisdiction Issues in
eSignatures and eRecords
Thomas J. Smedinghoff
Wildman, Harrold, Allen & Dixon, LLP
Chicago
2© 2010 Wildman, Harrold, Allen & Dixon LLP.
International eSignature Models
• Approximately 100 countries have e-signature legislation of some
form; approaches include –
• Minimalist approach -- technology neutral signature model
• E.g., U.S., Australia, UNCITRAL Model Law
• Technology-specific approach (PKI)
• E.g., Utah (repealed), Washington, Malaysia, Egypt, Colombia, Korea,
etc.
• Dual signature approach
• U.S. states (Arizona, Illinois, Iowa*, South Carolina*) – secure electronic
signature
• EU – Electronic Signatures Directive – advanced electronic signature
• E.g., Canada, China, New Zealand, Singapore, Thailand, Vietnam, etc.
3© 2010 Wildman, Harrold, Allen & Dixon LLP.
General Approach to eSignatures
• Form of signature + Attributes
• Form of signature = the data object that represents the
signature
• Attributes = the qualities that must be present to validate
the form of signature as a legally binding signature (may or
may not be qualities of the form of signature)
• Other signature requirements typically added by
evidentiary law – e.g., identity of signer and integrity
of signed record
(From both E-SIGN and UETA)
4© 2010 Wildman, Harrold, Allen & Dixon LLP.
U.S Approach to eSignatures
• Form of signature = any sound, symbol, or process
• Clicking “I Agree” button
• Digital signature (PKI)
• Digitized imaged of handwritten signature
• PIN, password
• Typed name
• Voice signature
• Attributes
• Form of signature must be attached to, or logically associated
with, the record being signed
• Form of signature must be executed or adopted with the intent
to sign
5© 2010 Wildman, Harrold, Allen & Dixon LLP.
Washington State Approach to
Digital Signatures
• Form of signature = a transformation of a message
using an asymmetric cryptosystem such that -
• Attributes
• a person having the initial message and the signer’s public key
can accurately determine –
• Whether the transformation was created using the private key that
corresponds to the signer’s public key; and
• Whether the initial message has been altered since the
transformation was made
(NOTE: This statute is likely preempted by E-SIGN)
6© 2010 Wildman, Harrold, Allen & Dixon LLP.
Canadian Approach to
eSignatures
• Form of signature = one or more letters, characters,
numbers or other symbols in digital form
• Attributes
• Form of signature must be incorporated in, attached to or
associated with an electronic document
• Form of signature must be executed or adopted with the intent to
sign (implied?)
7© 2010 Wildman, Harrold, Allen & Dixon LLP.
Canadian Approach to
“Secure” eSignatures
• Form of signature = one or more letters, characters,
numbers or other symbols in digital form
• Attributes
• Form of signature must be incorporated in, attached to or
associated with an electronic document
• Form of signature must be executed or adopted with the intent to
sign (implied?)
• Form of signature must be –
• Unique to the signer
• Created by technology under the sole control of the signer
• Created by technology that can be used to identify the signer
• linked to the document in such a manner that it can be used to
determine whether the document was changed after it was signed;
8© 2010 Wildman, Harrold, Allen & Dixon LLP.
EU Approach to
“Basic” eSignatures
• Form of signature = any data in electronic form
• Attributes
• Form of signature must be attached to, or logically
associated with, other electronic data
• Form of signature must serve as a method of authentication
9© 2010 Wildman, Harrold, Allen & Dixon LLP.
EU Approach to
“Advanced” eSignatures
• Form of signature = any data in electronic form
• Attributes
• Form of signature must be attached to, or logically
associated with, other electronic data
• Form of signature must serve as a method of authentication
• Form of signature must be –
• uniquely linked to the signer
• capable of identifying the signer
• created using means that the signatory can maintain under his
sole control, and
• linked to the data to which it relates in such a manner that any
subsequent change of the data is detectable;
10© 2010 Wildman, Harrold, Allen & Dixon LLP.
UN Convention – Promoting
Cross-Border Interoperability
• UN Convention on the Use of Electronic
Communications in International contracts
• International treaty designed to remove barriers to
international e-commerce
• Primary focus is on requirements of writing, signature, and original
• History
• Negotiated by UNCITRAL 2001 – 2005
• Approved by United Nations General Assembly 2005
• Signed by 18 countries
• Ratified by 2 countries so far (Honduras and Singapore)
• U.S. working on ratification process – expected in 2011
11© 2010 Wildman, Harrold, Allen & Dixon LLP.
UN Convention
Approach to eSignatures
• New, more flexible approach to electronic signatures
• Focuses on a “method” rather than data as the form
of signature
• Focuses on reliability of attributes as appropriate for
the purpose
12© 2010 Wildman, Harrold, Allen & Dixon LLP.
UN Convention
Approach to eSignatures
• Form of signature = a method
• Attributes
• Method must identify the signatory
• Method must indicate the signatory’s intention
• Method must be either –
• As reliable as appropriate for the purpose of the transaction,
or
• Proven in fact to identify the signatory and indicate the
signatory’s intent
13© 2010 Wildman, Harrold, Allen & Dixon LLP.
Significance of
UN Convention Approach
• “Method” allows for multi-step process
• The Form of Signature itself does not need to possess all
of the attributes
• So long as the overall process does
• Approach recognizes that security of process is a
relative concept
• Requirements vary with the transaction
• Includes a safe harbor allowing proponents to prove up the
required attributes
• At end of the day, virtually identical to U.S.
requirements

More Related Content

What's hot

Trademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital ageTrademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital age
Judy Yen
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
Frederick Lane
 
An introduction to electronic data management
An introduction to electronic data managementAn introduction to electronic data management
An introduction to electronic data management
Jamez Lee S. Hunter
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
home based
 
judy's legal employment resume
judy's legal employment resumejudy's legal employment resume
judy's legal employment resumejudith hickman
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
HHSome
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?
walescva
 
Privacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinPrivacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinBoyle_Fredrickson
 
Cyber Laws
Cyber LawsCyber Laws
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
Wisnu Dewobroto
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
Ujjwal Joshi
 
Fulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftFulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity Theft
Steve Meek
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miismcgilla
 
EIM Presentation.13 07.2011
EIM Presentation.13 07.2011EIM Presentation.13 07.2011
EIM Presentation.13 07.2011
Pod Legal
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
London School of Cyber Security
 

What's hot (20)

Trademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital ageTrademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital age
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
An introduction to electronic data management
An introduction to electronic data managementAn introduction to electronic data management
An introduction to electronic data management
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
judy's legal employment resume
judy's legal employment resumejudy's legal employment resume
judy's legal employment resume
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?
 
Privacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinPrivacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in Wisconsin
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
Pls 780 week 5
Pls 780 week 5Pls 780 week 5
Pls 780 week 5
 
Pls 780 week_6
Pls 780 week_6Pls 780 week_6
Pls 780 week_6
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Fulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftFulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity Theft
 
Plss780 week 10
Plss780 week 10Plss780 week 10
Plss780 week 10
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
 
Pls780 week 2
Pls780 week 2Pls780 week 2
Pls780 week 2
 
EIM Presentation.13 07.2011
EIM Presentation.13 07.2011EIM Presentation.13 07.2011
EIM Presentation.13 07.2011
 
Pls 780 week 8
Pls 780 week 8Pls 780 week 8
Pls 780 week 8
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 

Viewers also liked

Leadership Niagara 2015
Leadership Niagara 2015Leadership Niagara 2015
Leadership Niagara 2015
Paul Copcutt
 
Maksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rusMaksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rusMaksim Yurlov
 
Best Practices for E-Signature Adoption By Independent Agents
Best Practices for E-Signature Adoption By Independent AgentsBest Practices for E-Signature Adoption By Independent Agents
Best Practices for E-Signature Adoption By Independent Agents
eSignLive by VASCO
 
Felix Global 2015
Felix Global 2015Felix Global 2015
Felix Global 2015
Paul Copcutt
 
Fanshawe 2016
Fanshawe 2016Fanshawe 2016
Fanshawe 2016
Paul Copcutt
 
Niagara Region 2015
Niagara Region 2015Niagara Region 2015
Niagara Region 2015
Paul Copcutt
 
McMaster Social Science - Career Countdown Conference
McMaster Social Science - Career Countdown ConferenceMcMaster Social Science - Career Countdown Conference
McMaster Social Science - Career Countdown Conference
Paul Copcutt
 
Seguridad Operaciones de Protección de Personas.
Seguridad Operaciones de Protección de Personas.Seguridad Operaciones de Protección de Personas.
Seguridad Operaciones de Protección de Personas.
oswaldo chomba
 

Viewers also liked (10)

Student Lending
Student LendingStudent Lending
Student Lending
 
Leadership Niagara 2015
Leadership Niagara 2015Leadership Niagara 2015
Leadership Niagara 2015
 
Legal Framework for Electronic Records in LATAM and Spain
Legal Framework for Electronic Records in LATAM and SpainLegal Framework for Electronic Records in LATAM and Spain
Legal Framework for Electronic Records in LATAM and Spain
 
Maksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rusMaksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rus
 
Best Practices for E-Signature Adoption By Independent Agents
Best Practices for E-Signature Adoption By Independent AgentsBest Practices for E-Signature Adoption By Independent Agents
Best Practices for E-Signature Adoption By Independent Agents
 
Felix Global 2015
Felix Global 2015Felix Global 2015
Felix Global 2015
 
Fanshawe 2016
Fanshawe 2016Fanshawe 2016
Fanshawe 2016
 
Niagara Region 2015
Niagara Region 2015Niagara Region 2015
Niagara Region 2015
 
McMaster Social Science - Career Countdown Conference
McMaster Social Science - Career Countdown ConferenceMcMaster Social Science - Career Countdown Conference
McMaster Social Science - Career Countdown Conference
 
Seguridad Operaciones de Protección de Personas.
Seguridad Operaciones de Protección de Personas.Seguridad Operaciones de Protección de Personas.
Seguridad Operaciones de Protección de Personas.
 

Similar to Smedinghoff: International Adoption

The Cloud and e-Signatures - Illinois License Law
The Cloud and e-Signatures - Illinois License LawThe Cloud and e-Signatures - Illinois License Law
The Cloud and e-Signatures - Illinois License Law
Carrie Bey-Little
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
Dr. Prashant Vats
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
itnewsafrica
 
Read These 9 Tips For E-Commerce Business | Power Seller Center
Read These 9 Tips For E-Commerce Business | Power Seller CenterRead These 9 Tips For E-Commerce Business | Power Seller Center
Read These 9 Tips For E-Commerce Business | Power Seller Center
power sellers center
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptx
shrutiganpule74
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
Mahmoud Ezzat
 
E signature-signyourdoc
E signature-signyourdocE signature-signyourdoc
E signature-signyourdoc
Kishankant Yadav
 
Electronic Signatures in Commercial Practice
Electronic Signatures in Commercial PracticeElectronic Signatures in Commercial Practice
Electronic Signatures in Commercial Practice
Gregg Oldring
 
Security and trust in e payment
Security and trust in e  paymentSecurity and trust in e  payment
Security and trust in e payment
حمد الشلوي
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesTania Fuchs
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signatures
CoSign by ARX
 
e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.
4Point Solutions
 
E lock digital signatures
E lock digital signaturesE lock digital signatures
E lock digital signatures
E-Lock digital signatures
 
Carrie Peter
Carrie Peter Carrie Peter
Carrie Peter
itnewsafrica
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
Swaleh Ahmed
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
Delmer Gerald Calderon
 
eSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for DigitisationeSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for Digitisation
itnewsafrica
 
Cryptography
CryptographyCryptography
Cryptography
TanviGogri
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
sadaf tst
 

Similar to Smedinghoff: International Adoption (20)

The Cloud and e-Signatures - Illinois License Law
The Cloud and e-Signatures - Illinois License LawThe Cloud and e-Signatures - Illinois License Law
The Cloud and e-Signatures - Illinois License Law
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Read These 9 Tips For E-Commerce Business | Power Seller Center
Read These 9 Tips For E-Commerce Business | Power Seller CenterRead These 9 Tips For E-Commerce Business | Power Seller Center
Read These 9 Tips For E-Commerce Business | Power Seller Center
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptx
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
E signature-signyourdoc
E signature-signyourdocE signature-signyourdoc
E signature-signyourdoc
 
Electronic Signatures in Commercial Practice
Electronic Signatures in Commercial PracticeElectronic Signatures in Commercial Practice
Electronic Signatures in Commercial Practice
 
Security and trust in e payment
Security and trust in e  paymentSecurity and trust in e  payment
Security and trust in e payment
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signatures
 
e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.
 
E lock digital signatures
E lock digital signaturesE lock digital signatures
E lock digital signatures
 
Carrie Peter
Carrie Peter Carrie Peter
Carrie Peter
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
 
eSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for DigitisationeSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for Digitisation
 
Cryptography
CryptographyCryptography
Cryptography
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 

More from Electronic Signature & Records Association

Smedinghoff Identity Management: Who's Signing?
Smedinghoff Identity Management: Who's Signing?Smedinghoff Identity Management: Who's Signing?
Smedinghoff Identity Management: Who's Signing?
Electronic Signature & Records Association
 
ESRA Update 2011
ESRA Update 2011ESRA Update 2011
Legal & Regulatory Update SPeRS 2.0
Legal & Regulatory Update SPeRS 2.0Legal & Regulatory Update SPeRS 2.0
Legal & Regulatory Update SPeRS 2.0
Electronic Signature & Records Association
 
Taking Transactions Mobile
Taking Transactions MobileTaking Transactions Mobile
Taking Transactions Mobile
Electronic Signature & Records Association
 

More from Electronic Signature & Records Association (15)

MISMO / eMortgage Update
MISMO / eMortgage UpdateMISMO / eMortgage Update
MISMO / eMortgage Update
 
FTC Dot.com Disclosures 2.0
FTC Dot.com Disclosures 2.0FTC Dot.com Disclosures 2.0
FTC Dot.com Disclosures 2.0
 
Smedinghoff Identity Management: Who's Signing?
Smedinghoff Identity Management: Who's Signing?Smedinghoff Identity Management: Who's Signing?
Smedinghoff Identity Management: Who's Signing?
 
Sabett: ESRA Identity Management 11-09-10
Sabett:  ESRA Identity Management 11-09-10Sabett:  ESRA Identity Management 11-09-10
Sabett: ESRA Identity Management 11-09-10
 
Patrick Hartford: eMortgages eDisclosures and eClosings
Patrick Hartford: eMortgages eDisclosures and eClosingsPatrick Hartford: eMortgages eDisclosures and eClosings
Patrick Hartford: eMortgages eDisclosures and eClosings
 
Patfry: Revised Uniform Law on Notarial Acts
Patfry: Revised Uniform Law on Notarial ActsPatfry: Revised Uniform Law on Notarial Acts
Patfry: Revised Uniform Law on Notarial Acts
 
Margo Tank: Legal and Regulatory Update
Margo Tank: Legal and Regulatory UpdateMargo Tank: Legal and Regulatory Update
Margo Tank: Legal and Regulatory Update
 
IRS Expansion of e-Signature Applications
IRS Expansion of e-Signature ApplicationsIRS Expansion of e-Signature Applications
IRS Expansion of e-Signature Applications
 
Harry Gardner: eWarehouse Lending
Harry Gardner: eWarehouse LendingHarry Gardner: eWarehouse Lending
Harry Gardner: eWarehouse Lending
 
David Whitaker: Managing Your Vendors
David Whitaker: Managing Your VendorsDavid Whitaker: Managing Your Vendors
David Whitaker: Managing Your Vendors
 
Edward O'Sheehan: Electronic Signatures: The Wave of the Future
Edward O'Sheehan: Electronic Signatures: The Wave of the FutureEdward O'Sheehan: Electronic Signatures: The Wave of the Future
Edward O'Sheehan: Electronic Signatures: The Wave of the Future
 
ESRA Update 2011
ESRA Update 2011ESRA Update 2011
ESRA Update 2011
 
Legal & Regulatory Update SPeRS 2.0
Legal & Regulatory Update SPeRS 2.0Legal & Regulatory Update SPeRS 2.0
Legal & Regulatory Update SPeRS 2.0
 
Taking Transactions Mobile
Taking Transactions MobileTaking Transactions Mobile
Taking Transactions Mobile
 
IRS Alternative Signatures
IRS Alternative SignaturesIRS Alternative Signatures
IRS Alternative Signatures
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Smedinghoff: International Adoption

  • 1. Wildman Harrold | 225 West Wacker Drive | Chicago, IL 60606 | (312) 201-2000 | wildman.com © 2010 Wildman, Harrold, Allen & Dixon LLP. International Adoption and Cross Jurisdiction Issues in eSignatures and eRecords Thomas J. Smedinghoff Wildman, Harrold, Allen & Dixon, LLP Chicago
  • 2. 2© 2010 Wildman, Harrold, Allen & Dixon LLP. International eSignature Models • Approximately 100 countries have e-signature legislation of some form; approaches include – • Minimalist approach -- technology neutral signature model • E.g., U.S., Australia, UNCITRAL Model Law • Technology-specific approach (PKI) • E.g., Utah (repealed), Washington, Malaysia, Egypt, Colombia, Korea, etc. • Dual signature approach • U.S. states (Arizona, Illinois, Iowa*, South Carolina*) – secure electronic signature • EU – Electronic Signatures Directive – advanced electronic signature • E.g., Canada, China, New Zealand, Singapore, Thailand, Vietnam, etc.
  • 3. 3© 2010 Wildman, Harrold, Allen & Dixon LLP. General Approach to eSignatures • Form of signature + Attributes • Form of signature = the data object that represents the signature • Attributes = the qualities that must be present to validate the form of signature as a legally binding signature (may or may not be qualities of the form of signature) • Other signature requirements typically added by evidentiary law – e.g., identity of signer and integrity of signed record (From both E-SIGN and UETA)
  • 4. 4© 2010 Wildman, Harrold, Allen & Dixon LLP. U.S Approach to eSignatures • Form of signature = any sound, symbol, or process • Clicking “I Agree” button • Digital signature (PKI) • Digitized imaged of handwritten signature • PIN, password • Typed name • Voice signature • Attributes • Form of signature must be attached to, or logically associated with, the record being signed • Form of signature must be executed or adopted with the intent to sign
  • 5. 5© 2010 Wildman, Harrold, Allen & Dixon LLP. Washington State Approach to Digital Signatures • Form of signature = a transformation of a message using an asymmetric cryptosystem such that - • Attributes • a person having the initial message and the signer’s public key can accurately determine – • Whether the transformation was created using the private key that corresponds to the signer’s public key; and • Whether the initial message has been altered since the transformation was made (NOTE: This statute is likely preempted by E-SIGN)
  • 6. 6© 2010 Wildman, Harrold, Allen & Dixon LLP. Canadian Approach to eSignatures • Form of signature = one or more letters, characters, numbers or other symbols in digital form • Attributes • Form of signature must be incorporated in, attached to or associated with an electronic document • Form of signature must be executed or adopted with the intent to sign (implied?)
  • 7. 7© 2010 Wildman, Harrold, Allen & Dixon LLP. Canadian Approach to “Secure” eSignatures • Form of signature = one or more letters, characters, numbers or other symbols in digital form • Attributes • Form of signature must be incorporated in, attached to or associated with an electronic document • Form of signature must be executed or adopted with the intent to sign (implied?) • Form of signature must be – • Unique to the signer • Created by technology under the sole control of the signer • Created by technology that can be used to identify the signer • linked to the document in such a manner that it can be used to determine whether the document was changed after it was signed;
  • 8. 8© 2010 Wildman, Harrold, Allen & Dixon LLP. EU Approach to “Basic” eSignatures • Form of signature = any data in electronic form • Attributes • Form of signature must be attached to, or logically associated with, other electronic data • Form of signature must serve as a method of authentication
  • 9. 9© 2010 Wildman, Harrold, Allen & Dixon LLP. EU Approach to “Advanced” eSignatures • Form of signature = any data in electronic form • Attributes • Form of signature must be attached to, or logically associated with, other electronic data • Form of signature must serve as a method of authentication • Form of signature must be – • uniquely linked to the signer • capable of identifying the signer • created using means that the signatory can maintain under his sole control, and • linked to the data to which it relates in such a manner that any subsequent change of the data is detectable;
  • 10. 10© 2010 Wildman, Harrold, Allen & Dixon LLP. UN Convention – Promoting Cross-Border Interoperability • UN Convention on the Use of Electronic Communications in International contracts • International treaty designed to remove barriers to international e-commerce • Primary focus is on requirements of writing, signature, and original • History • Negotiated by UNCITRAL 2001 – 2005 • Approved by United Nations General Assembly 2005 • Signed by 18 countries • Ratified by 2 countries so far (Honduras and Singapore) • U.S. working on ratification process – expected in 2011
  • 11. 11© 2010 Wildman, Harrold, Allen & Dixon LLP. UN Convention Approach to eSignatures • New, more flexible approach to electronic signatures • Focuses on a “method” rather than data as the form of signature • Focuses on reliability of attributes as appropriate for the purpose
  • 12. 12© 2010 Wildman, Harrold, Allen & Dixon LLP. UN Convention Approach to eSignatures • Form of signature = a method • Attributes • Method must identify the signatory • Method must indicate the signatory’s intention • Method must be either – • As reliable as appropriate for the purpose of the transaction, or • Proven in fact to identify the signatory and indicate the signatory’s intent
  • 13. 13© 2010 Wildman, Harrold, Allen & Dixon LLP. Significance of UN Convention Approach • “Method” allows for multi-step process • The Form of Signature itself does not need to possess all of the attributes • So long as the overall process does • Approach recognizes that security of process is a relative concept • Requirements vary with the transaction • Includes a safe harbor allowing proponents to prove up the required attributes • At end of the day, virtually identical to U.S. requirements