Electronic Signatures in Law

Electronic signatures are ubiquitous. Anyone sending an e-mail or using a credit card uses one. They can have a bearing on all areas of law, and no lawyer is immune from having to advise clients about their legal consequences. This third edition provides an exhaustive discussion of what constitutes...

Full description

Saved in:
Bibliographic Details
Main Author: Mason, Stephen
Format: eBook
Language:English
Published: Cambridge Cambridge University Press 26.01.2012
Edition:3
Series:Law Practitioner Series
Subjects:
ISBN:9781107012295, 1107012295
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Cover -- Electronic Signatures in Law -- Title -- Copyright -- Epigraph -- Contents -- Preface -- Acknowledgements -- Table of cases -- 1: The signature -- The purpose of a signature -- Dictionary definitions -- The manuscript signature -- Writing -- Statutory definition of signature -- The functions of a signature -- The primary evidential function -- Secondary evidential functions -- Cautionary function -- Protective function -- Channelling function -- Record-keeping function -- Disputing a manuscript signature -- Defences -- Evidence of the manuscript signature -- The identity of the person affixing the manuscript signature -- Intention to authenticate and adopt the document -- Methods of authentication before manuscript signatures -- Objects as a means of authentication -- The sign of the cross -- The seal and chirograph -- Witnesses and scribes -- The format of the signature -- Manuscript -- A mark -- Bills of exchange -- An interest in real property -- Wills -- United States of America -- Illegible writing -- Assisted signature or mark -- Wills -- A name without a signature -- Mistake as to the name -- Variations of a name -- The use of initials -- The use of a surname -- The use of a trade name -- A partial signature -- Words other than a name -- An identifying phrase -- Abbreviation of a name -- Impression of a mark -- A seal imprint -- The use of a fingerprint -- The use of a printed name -- The use of a lithographed name -- The use of a rubber stamp -- Mechanical marks by human action -- Typewriting -- Telegram -- Telex -- Facsimile -- The writing material -- The absence of a signature -- 2: International initiatives -- United Nations Commission on International Trade (UNCITRAL) -- Model Law on Electronic Commerce -- Legal recognition of data messages -- Writing -- Signature -- Model Law on Electronic Signatures -- Consumer protection
  • Reliability of certifying certificates -- The burden of proof - UNCITRAL -- Model Law on Electronic Commerce -- Model Law on Electronic Signatures -- The burden of proof -- The recipient's procedural and due diligence burden -- Sending party: the burden of proof of security and integrity -- The persuasive and evidential burden of demonstrating weaknesses in the infrastructure -- Burden of proof - the Jitsuin -- Mitomein -- The Jitsuin -- Burden of proof - standards -- Burden of proof - summary -- Presumptions -- Jurisdiction -- 10: Data protection -- The legal framework -- Organisation for Economic Co-operation and Development -- Guidelines -- PKI Assessment Guidelines -- CARAT guidelines -- Australia -- Practical issues8 -- Generating the private key -- Storage of the private key -- Revocation of private keys -- Data required for the certificate -- Biodynamic versions of a manuscript signature -- Index
  • Definitions -- The requirement for a signature -- International Chamber of Commerce -- United Nations Convention on the Use of Electronic Communications in International Contracts -- Signature provisions -- 3: European Union Directive on electronic signatures -- The Directive -- The aim -- The legal recognition of electronic signatures -- The hierarchy of electronic signatures -- The electronic signature -- The advanced electronic signature -- Uniquely linked to the signatory -- Capable of identifying the signatory -- Created using means that the signatory can maintain under his sole control -- Creation and storage of signature-creation data -- Sole control -- Linked to the data to which it relates in such a manner that any subsequent change of the data is detectable -- Qualified certificate -- Certification-service-provider -- Qualified electronic signature -- Regulation and supervision of certification service providers -- Liability -- Relying party -- Review of the Directive -- The take-up of advanced electronic signatures -- 4: England and Wales, Northern Ireland and Scotland -- The Electronic Communications Act 2000 -- The international context -- The definition of an electronic signature -- The elements of an electronic signature -- So much of anything in electronic form -- Incorporation or logical association -- For the purpose of establishing authenticity or integrity -- The legal presumption of an electronic signature -- Advanced electronic signature and qualified electronic signature -- The power to modify legislation -- Limitation of powers -- Purposes for which modification can be made -- The provisions a Minister may make -- Regulation of Investigatory Powers -- Possession of a key -- Exclusion of electronic signatures -- 5: International comparison of electronic signature laws -- Approaches to legislation -- The prescriptive approach
  • The minimalist approach -- The two-tier approach -- Digital signature presumptions -- Default form of signature -- Validity of the signature -- Integrity of the digital signature -- Presumption the user affixed the digital signature -- Presumption of ownership -- Certification authorities -- Licensed certification authorities -- Voluntary licensing -- Recognition of foreign certificates -- Liability -- Liability of the certification authority -- Liability of the sender -- Liability of the recipient -- 6: The form of an electronic signature -- Digital documents -- Information relating to the carrier -- The nature of a document in digital format -- Forms of electronic signature -- Electronic sound -- Typing a name in an electronic document -- Interest in property -- Loan of money -- Employment -- Contract -- Assignment of a guarantee -- Insurance -- Public administration and judiciary -- Statute of Frauds -- Wills -- Evidence -- Amending boilerplate contractual terms -- The 'click' method of indicating intent -- The 'browse wrap' method of indicating knowledge -- Personal identification number (PIN) and password -- The name in an e-mail address -- Limitation Act -- Statute of Frauds -- Civil procedure -- Legal fees arrangement -- Summary proceedings -- Civil Law Act -- Means of authentication -- A manuscript signature that has been scanned -- Mortgage redemption -- Writing -- Employment -- Biodynamic version of a manuscript signature -- Electoral register -- A digital signature -- 7: Digital signatures -- Technical overview of digital signatures -- Algorithms and keys -- Control of the key -- Disguising the message -- An individual creates and controls their own public key -- Authenticating a signature using public key cryptography -- Public key infrastructure -- Difficulties with public key infrastructure -- Authenticating the sender
  • The ideal attributes of a signature in electronic format -- Methods of authentication -- Authentication using secret codes -- Authentication using biometric measurements -- Types of infrastructure for asymmetric cryptographic systems -- Pretty Good Privacy -- Types of public key infrastructure -- Management of the key and certificate -- Identifying an applicant -- The certificate -- The generation of the key pair belonging to the subscribing party -- Validating the public key -- Distributing the certificate -- Distributing certification authority keys -- Revocation of a certificate -- Expiry of keys -- The duties of a user -- Internal management -- Barriers to the use of the public key infrastructure -- What a public key infrastructure can and cannot do -- What a digital signature is capable of doing -- What no form of electronic signature is capable of doing -- The weakest link -- The burden of managing the private key -- Bypassing passwords -- Case law relating to digital signatures -- Judicial use -- Administrative proceedings -- Banking -- Submission of electronic applications to court -- Contract -- Signing health records -- 8: Liability -- Liability: links in the chain -- A biodynamic version of a manuscript signature -- A scanned manuscript signature -- A typed name -- Participants in the public key infrastructure -- Digital signatures - public key infrastructure -- How liability can be incurred -- Types of loss -- Assumptions in public key infrastructure -- Risks associated with the use of digital signatures11 -- 9: Evidence -- The evidence forming a digital signature -- Chain of evidence forming a digital signature -- Verifying the integrity of a certificate -- Verify the certificate path -- Other validation requirements -- Assertions can differ -- Assessment of evidence -- 'Non-repudiation' -- Rejecting electronic signatures