SlideShare une entreprise Scribd logo
1  sur  13
Wildman Harrold | 225 West Wacker Drive | Chicago, IL 60606 | (312) 201-2000 | wildman.com
© 2010 Wildman, Harrold, Allen & Dixon LLP.
International Adoption and
Cross Jurisdiction Issues in
eSignatures and eRecords
Thomas J. Smedinghoff
Wildman, Harrold, Allen & Dixon, LLP
Chicago
2© 2010 Wildman, Harrold, Allen & Dixon LLP.
International eSignature Models
• Approximately 100 countries have e-signature legislation of some
form; approaches include –
• Minimalist approach -- technology neutral signature model
• E.g., U.S., Australia, UNCITRAL Model Law
• Technology-specific approach (PKI)
• E.g., Utah (repealed), Washington, Malaysia, Egypt, Colombia, Korea,
etc.
• Dual signature approach
• U.S. states (Arizona, Illinois, Iowa*, South Carolina*) – secure electronic
signature
• EU – Electronic Signatures Directive – advanced electronic signature
• E.g., Canada, China, New Zealand, Singapore, Thailand, Vietnam, etc.
3© 2010 Wildman, Harrold, Allen & Dixon LLP.
General Approach to eSignatures
• Form of signature + Attributes
• Form of signature = the data object that represents the
signature
• Attributes = the qualities that must be present to validate
the form of signature as a legally binding signature (may or
may not be qualities of the form of signature)
• Other signature requirements typically added by
evidentiary law – e.g., identity of signer and integrity
of signed record
(From both E-SIGN and UETA)
4© 2010 Wildman, Harrold, Allen & Dixon LLP.
U.S Approach to eSignatures
• Form of signature = any sound, symbol, or process
• Clicking “I Agree” button
• Digital signature (PKI)
• Digitized imaged of handwritten signature
• PIN, password
• Typed name
• Voice signature
• Attributes
• Form of signature must be attached to, or logically associated
with, the record being signed
• Form of signature must be executed or adopted with the intent
to sign
5© 2010 Wildman, Harrold, Allen & Dixon LLP.
Washington State Approach to
Digital Signatures
• Form of signature = a transformation of a message
using an asymmetric cryptosystem such that -
• Attributes
• a person having the initial message and the signer’s public key
can accurately determine –
• Whether the transformation was created using the private key that
corresponds to the signer’s public key; and
• Whether the initial message has been altered since the
transformation was made
(NOTE: This statute is likely preempted by E-SIGN)
6© 2010 Wildman, Harrold, Allen & Dixon LLP.
Canadian Approach to
eSignatures
• Form of signature = one or more letters, characters,
numbers or other symbols in digital form
• Attributes
• Form of signature must be incorporated in, attached to or
associated with an electronic document
• Form of signature must be executed or adopted with the intent to
sign (implied?)
7© 2010 Wildman, Harrold, Allen & Dixon LLP.
Canadian Approach to
“Secure” eSignatures
• Form of signature = one or more letters, characters,
numbers or other symbols in digital form
• Attributes
• Form of signature must be incorporated in, attached to or
associated with an electronic document
• Form of signature must be executed or adopted with the intent to
sign (implied?)
• Form of signature must be –
• Unique to the signer
• Created by technology under the sole control of the signer
• Created by technology that can be used to identify the signer
• linked to the document in such a manner that it can be used to
determine whether the document was changed after it was signed;
8© 2010 Wildman, Harrold, Allen & Dixon LLP.
EU Approach to
“Basic” eSignatures
• Form of signature = any data in electronic form
• Attributes
• Form of signature must be attached to, or logically
associated with, other electronic data
• Form of signature must serve as a method of authentication
9© 2010 Wildman, Harrold, Allen & Dixon LLP.
EU Approach to
“Advanced” eSignatures
• Form of signature = any data in electronic form
• Attributes
• Form of signature must be attached to, or logically
associated with, other electronic data
• Form of signature must serve as a method of authentication
• Form of signature must be –
• uniquely linked to the signer
• capable of identifying the signer
• created using means that the signatory can maintain under his
sole control, and
• linked to the data to which it relates in such a manner that any
subsequent change of the data is detectable;
10© 2010 Wildman, Harrold, Allen & Dixon LLP.
UN Convention – Promoting
Cross-Border Interoperability
• UN Convention on the Use of Electronic
Communications in International contracts
• International treaty designed to remove barriers to
international e-commerce
• Primary focus is on requirements of writing, signature, and original
• History
• Negotiated by UNCITRAL 2001 – 2005
• Approved by United Nations General Assembly 2005
• Signed by 18 countries
• Ratified by 2 countries so far (Honduras and Singapore)
• U.S. working on ratification process – expected in 2011
11© 2010 Wildman, Harrold, Allen & Dixon LLP.
UN Convention
Approach to eSignatures
• New, more flexible approach to electronic signatures
• Focuses on a “method” rather than data as the form
of signature
• Focuses on reliability of attributes as appropriate for
the purpose
12© 2010 Wildman, Harrold, Allen & Dixon LLP.
UN Convention
Approach to eSignatures
• Form of signature = a method
• Attributes
• Method must identify the signatory
• Method must indicate the signatory’s intention
• Method must be either –
• As reliable as appropriate for the purpose of the transaction,
or
• Proven in fact to identify the signatory and indicate the
signatory’s intent
13© 2010 Wildman, Harrold, Allen & Dixon LLP.
Significance of
UN Convention Approach
• “Method” allows for multi-step process
• The Form of Signature itself does not need to possess all
of the attributes
• So long as the overall process does
• Approach recognizes that security of process is a
relative concept
• Requirements vary with the transaction
• Includes a safe harbor allowing proponents to prove up the
required attributes
• At end of the day, virtually identical to U.S.
requirements

Contenu connexe

Tendances

Trademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital ageTrademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital ageJudy Yen
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital EraFrederick Lane
 
An introduction to electronic data management
An introduction to electronic data managementAn introduction to electronic data management
An introduction to electronic data managementJamez Lee S. Hunter
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
judy's legal employment resume
judy's legal employment resumejudy's legal employment resume
judy's legal employment resumejudith hickman
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?walescva
 
Privacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinPrivacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinBoyle_Fredrickson
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerceWisnu Dewobroto
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerceUjjwal Joshi
 
Fulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftFulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftSteve Meek
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miismcgilla
 
EIM Presentation.13 07.2011
EIM Presentation.13 07.2011EIM Presentation.13 07.2011
EIM Presentation.13 07.2011Pod Legal
 

Tendances (20)

Trademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital ageTrademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital age
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
An introduction to electronic data management
An introduction to electronic data managementAn introduction to electronic data management
An introduction to electronic data management
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
judy's legal employment resume
judy's legal employment resumejudy's legal employment resume
judy's legal employment resume
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?
 
Privacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinPrivacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in Wisconsin
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
Pls 780 week 5
Pls 780 week 5Pls 780 week 5
Pls 780 week 5
 
Pls 780 week_6
Pls 780 week_6Pls 780 week_6
Pls 780 week_6
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Fulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftFulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity Theft
 
Plss780 week 10
Plss780 week 10Plss780 week 10
Plss780 week 10
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
 
Pls780 week 2
Pls780 week 2Pls780 week 2
Pls780 week 2
 
EIM Presentation.13 07.2011
EIM Presentation.13 07.2011EIM Presentation.13 07.2011
EIM Presentation.13 07.2011
 
Pls 780 week 8
Pls 780 week 8Pls 780 week 8
Pls 780 week 8
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 

En vedette

Leadership Niagara 2015
Leadership Niagara 2015Leadership Niagara 2015
Leadership Niagara 2015Paul Copcutt
 
Maksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rusMaksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rusMaksim Yurlov
 
Best Practices for E-Signature Adoption By Independent Agents
Best Practices for E-Signature Adoption By Independent AgentsBest Practices for E-Signature Adoption By Independent Agents
Best Practices for E-Signature Adoption By Independent AgentseSignLive by VASCO
 
Niagara Region 2015
Niagara Region 2015Niagara Region 2015
Niagara Region 2015Paul Copcutt
 
McMaster Social Science - Career Countdown Conference
McMaster Social Science - Career Countdown ConferenceMcMaster Social Science - Career Countdown Conference
McMaster Social Science - Career Countdown ConferencePaul Copcutt
 
Seguridad Operaciones de Protección de Personas.
Seguridad Operaciones de Protección de Personas.Seguridad Operaciones de Protección de Personas.
Seguridad Operaciones de Protección de Personas.oswaldo chomba
 

En vedette (10)

Student Lending
Student LendingStudent Lending
Student Lending
 
Leadership Niagara 2015
Leadership Niagara 2015Leadership Niagara 2015
Leadership Niagara 2015
 
Legal Framework for Electronic Records in LATAM and Spain
Legal Framework for Electronic Records in LATAM and SpainLegal Framework for Electronic Records in LATAM and Spain
Legal Framework for Electronic Records in LATAM and Spain
 
Maksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rusMaksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rus
 
Best Practices for E-Signature Adoption By Independent Agents
Best Practices for E-Signature Adoption By Independent AgentsBest Practices for E-Signature Adoption By Independent Agents
Best Practices for E-Signature Adoption By Independent Agents
 
Felix Global 2015
Felix Global 2015Felix Global 2015
Felix Global 2015
 
Fanshawe 2016
Fanshawe 2016Fanshawe 2016
Fanshawe 2016
 
Niagara Region 2015
Niagara Region 2015Niagara Region 2015
Niagara Region 2015
 
McMaster Social Science - Career Countdown Conference
McMaster Social Science - Career Countdown ConferenceMcMaster Social Science - Career Countdown Conference
McMaster Social Science - Career Countdown Conference
 
Seguridad Operaciones de Protección de Personas.
Seguridad Operaciones de Protección de Personas.Seguridad Operaciones de Protección de Personas.
Seguridad Operaciones de Protección de Personas.
 

Similaire à Smedinghoff: International Adoption

The Cloud and e-Signatures - Illinois License Law
The Cloud and e-Signatures - Illinois License LawThe Cloud and e-Signatures - Illinois License Law
The Cloud and e-Signatures - Illinois License LawCarrie Bey-Little
 
Read These 9 Tips For E-Commerce Business | Power Seller Center
Read These 9 Tips For E-Commerce Business | Power Seller CenterRead These 9 Tips For E-Commerce Business | Power Seller Center
Read These 9 Tips For E-Commerce Business | Power Seller Centerpower sellers center
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptxshrutiganpule74
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature Mahmoud Ezzat
 
Electronic Signatures in Commercial Practice
Electronic Signatures in Commercial PracticeElectronic Signatures in Commercial Practice
Electronic Signatures in Commercial PracticeGregg Oldring
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesTania Fuchs
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signaturesCoSign by ARX
 
e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.4Point Solutions
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?Swaleh Ahmed
 
eSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for DigitisationeSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for Digitisationitnewsafrica
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commercesadaf tst
 

Similaire à Smedinghoff: International Adoption (20)

The Cloud and e-Signatures - Illinois License Law
The Cloud and e-Signatures - Illinois License LawThe Cloud and e-Signatures - Illinois License Law
The Cloud and e-Signatures - Illinois License Law
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Read These 9 Tips For E-Commerce Business | Power Seller Center
Read These 9 Tips For E-Commerce Business | Power Seller CenterRead These 9 Tips For E-Commerce Business | Power Seller Center
Read These 9 Tips For E-Commerce Business | Power Seller Center
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptx
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
E signature-signyourdoc
E signature-signyourdocE signature-signyourdoc
E signature-signyourdoc
 
Electronic Signatures in Commercial Practice
Electronic Signatures in Commercial PracticeElectronic Signatures in Commercial Practice
Electronic Signatures in Commercial Practice
 
Security and trust in e payment
Security and trust in e  paymentSecurity and trust in e  payment
Security and trust in e payment
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signatures
 
e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.
 
E lock digital signatures
E lock digital signaturesE lock digital signatures
E lock digital signatures
 
Carrie Peter
Carrie Peter Carrie Peter
Carrie Peter
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Online privacy
Online privacyOnline privacy
Online privacy
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
 
eSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for DigitisationeSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for Digitisation
 
Cryptography
CryptographyCryptography
Cryptography
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 

Plus de Electronic Signature & Records Association

Plus de Electronic Signature & Records Association (15)

MISMO / eMortgage Update
MISMO / eMortgage UpdateMISMO / eMortgage Update
MISMO / eMortgage Update
 
FTC Dot.com Disclosures 2.0
FTC Dot.com Disclosures 2.0FTC Dot.com Disclosures 2.0
FTC Dot.com Disclosures 2.0
 
Smedinghoff Identity Management: Who's Signing?
Smedinghoff Identity Management: Who's Signing?Smedinghoff Identity Management: Who's Signing?
Smedinghoff Identity Management: Who's Signing?
 
Sabett: ESRA Identity Management 11-09-10
Sabett:  ESRA Identity Management 11-09-10Sabett:  ESRA Identity Management 11-09-10
Sabett: ESRA Identity Management 11-09-10
 
Patrick Hartford: eMortgages eDisclosures and eClosings
Patrick Hartford: eMortgages eDisclosures and eClosingsPatrick Hartford: eMortgages eDisclosures and eClosings
Patrick Hartford: eMortgages eDisclosures and eClosings
 
Patfry: Revised Uniform Law on Notarial Acts
Patfry: Revised Uniform Law on Notarial ActsPatfry: Revised Uniform Law on Notarial Acts
Patfry: Revised Uniform Law on Notarial Acts
 
Margo Tank: Legal and Regulatory Update
Margo Tank: Legal and Regulatory UpdateMargo Tank: Legal and Regulatory Update
Margo Tank: Legal and Regulatory Update
 
IRS Expansion of e-Signature Applications
IRS Expansion of e-Signature ApplicationsIRS Expansion of e-Signature Applications
IRS Expansion of e-Signature Applications
 
Harry Gardner: eWarehouse Lending
Harry Gardner: eWarehouse LendingHarry Gardner: eWarehouse Lending
Harry Gardner: eWarehouse Lending
 
David Whitaker: Managing Your Vendors
David Whitaker: Managing Your VendorsDavid Whitaker: Managing Your Vendors
David Whitaker: Managing Your Vendors
 
Edward O'Sheehan: Electronic Signatures: The Wave of the Future
Edward O'Sheehan: Electronic Signatures: The Wave of the FutureEdward O'Sheehan: Electronic Signatures: The Wave of the Future
Edward O'Sheehan: Electronic Signatures: The Wave of the Future
 
ESRA Update 2011
ESRA Update 2011ESRA Update 2011
ESRA Update 2011
 
Legal & Regulatory Update SPeRS 2.0
Legal & Regulatory Update SPeRS 2.0Legal & Regulatory Update SPeRS 2.0
Legal & Regulatory Update SPeRS 2.0
 
Taking Transactions Mobile
Taking Transactions MobileTaking Transactions Mobile
Taking Transactions Mobile
 
IRS Alternative Signatures
IRS Alternative SignaturesIRS Alternative Signatures
IRS Alternative Signatures
 

Dernier

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Smedinghoff: International Adoption

  • 1. Wildman Harrold | 225 West Wacker Drive | Chicago, IL 60606 | (312) 201-2000 | wildman.com © 2010 Wildman, Harrold, Allen & Dixon LLP. International Adoption and Cross Jurisdiction Issues in eSignatures and eRecords Thomas J. Smedinghoff Wildman, Harrold, Allen & Dixon, LLP Chicago
  • 2. 2© 2010 Wildman, Harrold, Allen & Dixon LLP. International eSignature Models • Approximately 100 countries have e-signature legislation of some form; approaches include – • Minimalist approach -- technology neutral signature model • E.g., U.S., Australia, UNCITRAL Model Law • Technology-specific approach (PKI) • E.g., Utah (repealed), Washington, Malaysia, Egypt, Colombia, Korea, etc. • Dual signature approach • U.S. states (Arizona, Illinois, Iowa*, South Carolina*) – secure electronic signature • EU – Electronic Signatures Directive – advanced electronic signature • E.g., Canada, China, New Zealand, Singapore, Thailand, Vietnam, etc.
  • 3. 3© 2010 Wildman, Harrold, Allen & Dixon LLP. General Approach to eSignatures • Form of signature + Attributes • Form of signature = the data object that represents the signature • Attributes = the qualities that must be present to validate the form of signature as a legally binding signature (may or may not be qualities of the form of signature) • Other signature requirements typically added by evidentiary law – e.g., identity of signer and integrity of signed record (From both E-SIGN and UETA)
  • 4. 4© 2010 Wildman, Harrold, Allen & Dixon LLP. U.S Approach to eSignatures • Form of signature = any sound, symbol, or process • Clicking “I Agree” button • Digital signature (PKI) • Digitized imaged of handwritten signature • PIN, password • Typed name • Voice signature • Attributes • Form of signature must be attached to, or logically associated with, the record being signed • Form of signature must be executed or adopted with the intent to sign
  • 5. 5© 2010 Wildman, Harrold, Allen & Dixon LLP. Washington State Approach to Digital Signatures • Form of signature = a transformation of a message using an asymmetric cryptosystem such that - • Attributes • a person having the initial message and the signer’s public key can accurately determine – • Whether the transformation was created using the private key that corresponds to the signer’s public key; and • Whether the initial message has been altered since the transformation was made (NOTE: This statute is likely preempted by E-SIGN)
  • 6. 6© 2010 Wildman, Harrold, Allen & Dixon LLP. Canadian Approach to eSignatures • Form of signature = one or more letters, characters, numbers or other symbols in digital form • Attributes • Form of signature must be incorporated in, attached to or associated with an electronic document • Form of signature must be executed or adopted with the intent to sign (implied?)
  • 7. 7© 2010 Wildman, Harrold, Allen & Dixon LLP. Canadian Approach to “Secure” eSignatures • Form of signature = one or more letters, characters, numbers or other symbols in digital form • Attributes • Form of signature must be incorporated in, attached to or associated with an electronic document • Form of signature must be executed or adopted with the intent to sign (implied?) • Form of signature must be – • Unique to the signer • Created by technology under the sole control of the signer • Created by technology that can be used to identify the signer • linked to the document in such a manner that it can be used to determine whether the document was changed after it was signed;
  • 8. 8© 2010 Wildman, Harrold, Allen & Dixon LLP. EU Approach to “Basic” eSignatures • Form of signature = any data in electronic form • Attributes • Form of signature must be attached to, or logically associated with, other electronic data • Form of signature must serve as a method of authentication
  • 9. 9© 2010 Wildman, Harrold, Allen & Dixon LLP. EU Approach to “Advanced” eSignatures • Form of signature = any data in electronic form • Attributes • Form of signature must be attached to, or logically associated with, other electronic data • Form of signature must serve as a method of authentication • Form of signature must be – • uniquely linked to the signer • capable of identifying the signer • created using means that the signatory can maintain under his sole control, and • linked to the data to which it relates in such a manner that any subsequent change of the data is detectable;
  • 10. 10© 2010 Wildman, Harrold, Allen & Dixon LLP. UN Convention – Promoting Cross-Border Interoperability • UN Convention on the Use of Electronic Communications in International contracts • International treaty designed to remove barriers to international e-commerce • Primary focus is on requirements of writing, signature, and original • History • Negotiated by UNCITRAL 2001 – 2005 • Approved by United Nations General Assembly 2005 • Signed by 18 countries • Ratified by 2 countries so far (Honduras and Singapore) • U.S. working on ratification process – expected in 2011
  • 11. 11© 2010 Wildman, Harrold, Allen & Dixon LLP. UN Convention Approach to eSignatures • New, more flexible approach to electronic signatures • Focuses on a “method” rather than data as the form of signature • Focuses on reliability of attributes as appropriate for the purpose
  • 12. 12© 2010 Wildman, Harrold, Allen & Dixon LLP. UN Convention Approach to eSignatures • Form of signature = a method • Attributes • Method must identify the signatory • Method must indicate the signatory’s intention • Method must be either – • As reliable as appropriate for the purpose of the transaction, or • Proven in fact to identify the signatory and indicate the signatory’s intent
  • 13. 13© 2010 Wildman, Harrold, Allen & Dixon LLP. Significance of UN Convention Approach • “Method” allows for multi-step process • The Form of Signature itself does not need to possess all of the attributes • So long as the overall process does • Approach recognizes that security of process is a relative concept • Requirements vary with the transaction • Includes a safe harbor allowing proponents to prove up the required attributes • At end of the day, virtually identical to U.S. requirements