LEGALLY ENFORCEABLE ELECTRONIC SIGNATURES: Old Myths and New Realities &/OR New Myths and Old Realities.

Slides:



Advertisements
Similar presentations
Electronic Service of Process
Advertisements

Contract Management Kimberley Heitman, B.Juris, Llb, AACS Director of Legal Services, University of Western Australia
Public Key Infrastructure and Applications
XKI Atomic Signatures John H. Messing, Esq. Law-on-Line, Inc. © JHM 2007 This presentation is informational only and not intended as a contribution to.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
How To Read A US Court Decision ….or not. U.S. v. Kilbride, (9th Cir. Oct. 28, 2009)
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Identity Management: Some Basics Mark Crase, California State University Office of the Chancellor CENIC - March 9, 2011.
Trusted Electronic Transactions.  Why conduct transactions electronically?  Three Characteristics that ensure trust in electronic transactions  How.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
NIH-EDUCAUSE Interoperability Project, Phase 3: Fulfilling the Promise Dartmouth PKI Implementation Workshop Peter Alterman, Ph.D. Assistant CIO for E-Authentication.
Brooks Evans – CISSP-ISSEP, Security+ IT Security Officer Arkansas Department of Human Services.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Electronic and Digital Signatures
ESIGN 101 Ken Moyle Margo Tank David Whitaker Chief Legal Officer
© 2009 Cengage Learning. All Rights Reserved. Electronic Health Records.
1. INDEX 2 A signature is a handwritten depiction of someone’s name or nickname that a person writes on documents as proof of identity and intent. Signature.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Electronic Signatures and A Need for Digital Evidence John H. Messing, Esq. Law-on-Line,Inc E. Broadway Blvd., Suite 1600 Tucson, AZ (520)
What Will My Records Retention Schedule Look Like ?
ELECTRONIC SIGNATURES in Law and Practice John D. Gregory October 5, 2009.
LEARN COLLECT EXCEL RPost ® Registered ® Used Daily by Leading US & International Law, Insurance & Government Organizations for Legal Proof ® of.
COPYRIGHT GRANTS AND THE E-SIGN ACT Jeanne M. Hamburg Norris, McLaughlin & Marcus, P.A. 875 Third Avenue New York, New York (212)
Commonwealth Office of Technology Finance and Administration Cabinet Electronic Signature Overview Name:Chris Clark Date: October 28, 2004.
e-Notarization and the Law John H. Messing, Esq. Law-on-Line,Inc E. Broadway Blvd., Suite 1600 Tucson, AZ (520)
NYSAIS | Webinar | May 11, 2011 Electronic Signatures and Red Flag Rules Presented by: Donald J. Mosher Partner Schulte Roth & Zabel LLP
Risks of data manipulation and theft Gateway Average route travelled by an sent via the Internet from A to B Washington DC A's provider Paris A.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Document Digital Signature (DSG) Document Digital Signature (DSG) Gila Pyke / Lori Reed-Fourquet Smart Systems for Health Agency / Identrus IHE ITI Technical.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Introduction to Implementing XML web services authentication John Messing Law-on-Line, Inc. Prepared for Maricopa County ICJIS May 17, 2006.
Identity Assurance: When it Matters David L. Wasley Internet2 / InCommon.
Higher Education PKI Summit Meeting August 8, 2001 The ABA PAG Rodney J. Petersen, J.D. Director, Policy and Planning Office of Information Technology.
Author(s): David A. Wallace and Margaret Hedstrom, 2009 License: Unless otherwise noted, this material is made available under the terms of the Creative.
Lifecycle Metadata for Digital Objects October 18, 2004 Transfer / Authenticity Metadata.
Paperless Government and the Law John D. Gregory Ministry of the Attorney General June 5, 2009.
Evolving Issues in Electronic Data Collection Workshop Interoperability Russ Savage Electronic Transactions Liaison Arizona Secretary of State Office.
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
DIGITAL SIGNATURE.
United States v. Safavian United States District Court District of Columbia November 29, 2010 Jonathan Weiner.
ENotarization The Premise, The Promise, The Reality, The Future A presentation at the 2012 Annual Conference of the Electronic Signature and Records Association.
Implementing Electronic Signature Solutions 11/10/2015.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
Electronic Signatures CTO Workshop January 6, 2005 System Computing Services.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
1 CS 5339 Web-Based Systems Contract Law. 2 General Contracting Principles Mixture of common law and code law Uniform Commercial Code (model law) Many.
Points to Consider When Using Digital Signatures in GxP Environments Pat Miller EDMS/ Doc Management SIAC August 2013 San Diego, CA.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
& UETAESIGN COMPLIANCE. CHANGING LANDSCAPE As contract management transitions into a paperless world, documents must remain compliant with government.
7 FAQ’s About Signing Documents Online
How the ESign Act Makes Esignatures Work
Legality of Electronic Signatures
The Changing Face of Digital Identity
Digital Signature.
Using eSignature for Signing IBM Contracts
CS 5339 Web-Based Systems Contract Law
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Dashboard eHealth services: actual mockup
Meganet Corporation VME Sign 2004
DIGITAL LEGAL DOCUMENTS:
Reiniger LLC.
Presentation transcript:

LEGALLY ENFORCEABLE ELECTRONIC SIGNATURES: Old Myths and New Realities &/OR New Myths and Old Realities

ENABLED BY LAW EULA (clickwrap) Federal EFILINGS (password) Patent and trademark office (s-sigs) GROCER CHECK OUT (graphic) Public Key infrastructure Atomic signatures EULA (clickwrap) Federal EFILINGS (password) Patent and trademark office (s-sigs) GROCER CHECK OUT (graphic) Public Key infrastructure Atomic signatures

CHOSEN EXTRINSICALLY Ueta & E-Sign Agreement of parties Ueta & E-Sign Agreement of parties

BASIS OF ALL ESIGS: logical association between identity and Undertaking (content) logical association between identity and Undertaking (content)

LOCI OF ASSOCIATIONS: 1.repository 2.Crypto Combos 1.repository 2.Crypto Combos

THE PURPOSE pointer to MORAL RESPONSIBILITY (intent): AUTHORSHIP REPRESENTATION PROMISE pointer to MORAL RESPONSIBILITY (intent): AUTHORSHIP REPRESENTATION PROMISE

NON-REPUDIATION -- TECHNOLOGIST: ANTI-LIES LAWYER: NON-WHAT? TECHNOLOGIST: ANTI-LIES LAWYER: NON-WHAT?

TRIAL BY FURY CREDIBILE WITNESSES NOT COOL TECHNOLOGIES CREDIBILE WITNESSES NOT COOL TECHNOLOGIES

DIGITAL EVIDENCE Absent specific laws or agency regulations, no particular technology, including Data integrity, need apply (YET)

UNITED STATES V. SAFAVIAN (2006) 260 unsigned s admissible as evidence against a criminal defendant

AUTHENTICATIONAUTHENTICATION The threshold for the Courts determination of authenticity is not high. … Court need not find that the evidence is necessarily what the proponent claims, but only that there is sufficient evidence that the jury ultimately might do so. The threshold for the Courts determination of authenticity is not high. … Court need not find that the evidence is necessarily what the proponent claims, but only that there is sufficient evidence that the jury ultimately might do so.

UNITED STATES V. SIDDIQUI (2000) DefendantS s Reliable Logical association Felony CONVICTION AFFIRMED DefendantS s Reliable Logical association Felony CONVICTION AFFIRMED

INTENT OF THE PARTIES EXPRESS AGREEMENTS IMPLICIT UNDERTAKINGS EXPRESS AGREEMENTS IMPLICIT UNDERTAKINGS

IDENTIFY RELYING PARTIES BEARERS of transaction Risks with List of DOS & DONTS BEARERS of transaction Risks with List of DOS & DONTS

TECHNOLOGY CONSIDERATIONS EASE OF USE RISK elimination COST SAVINGS Scalability COMPLEXITY OF PROOF Obsolescence risks EASE OF USE RISK elimination COST SAVINGS Scalability COMPLEXITY OF PROOF Obsolescence risks

INTEROPERABILITY, NOT HEGEMONY ONE SIZE NEED NOT FIT ALL WORKFLOW CONSIDERATIONS –MULTIPLE SIGNERS –SEVERAL STAGES –INTERNET TRANSMISSIONS –Core Application support ONE SIZE NEED NOT FIT ALL WORKFLOW CONSIDERATIONS –MULTIPLE SIGNERS –SEVERAL STAGES –INTERNET TRANSMISSIONS –Core Application support

SIGNATURE PROFILES ORIGINS –ABA eTrust subcommittee –Oasis legalxml CONCEPTS SELECTIONS ORIGINS –ABA eTrust subcommittee –Oasis legalxml CONCEPTS SELECTIONS

5 SIGNATURE PROFILES Null PKI Entity seal Application specific symmetric Null PKI Entity seal Application specific symmetric

RELYING PARTY APPRAISAL 1. DATA SOURCES

RELYING PARTY APPRAISAL 1. DATA SOURCES CORE APPLICATION: APPRAISING VALUE HUMAN APPRAISER DATA SOURCES AUTOMATED MEANS LOAN COLLATERAL HUMAN APPRAISER DATA SOURCES AUTOMATED MEANS LOAN COLLATERAL

RELYING PARTY APPRAISAL 1. DATA SOURCES RISK ANALYSIS APPRAISER COLLUSION IDENTITY THEFT CORRECT DATA USED FALSIFIED REPORT APPRAISER COLLUSION IDENTITY THEFT CORRECT DATA USED FALSIFIED REPORT

RELYING PARTY APPRAISAL 1. DATA SOURCES TECHNOLOGY CHOICES SOUND LOGICAL ASSOCIATIONS FACTORED AUTHENTICATION SECURE AUDIT TRAIL ROBUST CRYPTO SOUND LOGICAL ASSOCIATIONS FACTORED AUTHENTICATION SECURE AUDIT TRAIL ROBUST CRYPTO

RELYING PARTY APPRAISAL 1. DATA SOURCES SIGNATURESSIGNATURES ZILLOW.COM /S JOHN DOE / Form co.

CONCLUSIONSCONCLUSIONS LAW DOES NOT limit esign METHODs Selection left TO THE PARTIES RELYING PARTY HAS GREATEST STAKE A TRANSACTION may need SEVERAL esigs Signature Profiles provide choices Signature Support for core applications LAW DOES NOT limit esign METHODs Selection left TO THE PARTIES RELYING PARTY HAS GREATEST STAKE A TRANSACTION may need SEVERAL esigs Signature Profiles provide choices Signature Support for core applications

FINFIN JOHN H. MESSING, ESQ. LAW-ON-LINE, INC E. BROADWAY BLVD., SUITE 1600 TUCSON, AZ TEL. (520) LOGICAL ASSOCIATION: JOHN H. MESSING, ESQ. LAW-ON-LINE, INC E. BROADWAY BLVD., SUITE 1600 TUCSON, AZ TEL. (520) LOGICAL ASSOCIATION: This presentation is informational only and not intended as a contribution to a MISMO standard or as legal advice © JHM 2007