SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Wildman Harrold | 225 West Wacker Drive | Chicago, IL 60606 | (312) 201-2000 | wildman.com
© 2010 Wildman, Harrold, Allen & Dixon LLP.
International Adoption and
Cross Jurisdiction Issues in
eSignatures and eRecords
Thomas J. Smedinghoff
Wildman, Harrold, Allen & Dixon, LLP
Chicago
2© 2010 Wildman, Harrold, Allen & Dixon LLP.
International eSignature Models
• Approximately 100 countries have e-signature legislation of some
form; approaches include –
• Minimalist approach -- technology neutral signature model
• E.g., U.S., Australia, UNCITRAL Model Law
• Technology-specific approach (PKI)
• E.g., Utah (repealed), Washington, Malaysia, Egypt, Colombia, Korea,
etc.
• Dual signature approach
• U.S. states (Arizona, Illinois, Iowa*, South Carolina*) – secure electronic
signature
• EU – Electronic Signatures Directive – advanced electronic signature
• E.g., Canada, China, New Zealand, Singapore, Thailand, Vietnam, etc.
3© 2010 Wildman, Harrold, Allen & Dixon LLP.
General Approach to eSignatures
• Form of signature + Attributes
• Form of signature = the data object that represents the
signature
• Attributes = the qualities that must be present to validate
the form of signature as a legally binding signature (may or
may not be qualities of the form of signature)
• Other signature requirements typically added by
evidentiary law – e.g., identity of signer and integrity
of signed record
(From both E-SIGN and UETA)
4© 2010 Wildman, Harrold, Allen & Dixon LLP.
U.S Approach to eSignatures
• Form of signature = any sound, symbol, or process
• Clicking “I Agree” button
• Digital signature (PKI)
• Digitized imaged of handwritten signature
• PIN, password
• Typed name
• Voice signature
• Attributes
• Form of signature must be attached to, or logically associated
with, the record being signed
• Form of signature must be executed or adopted with the intent
to sign
5© 2010 Wildman, Harrold, Allen & Dixon LLP.
Washington State Approach to
Digital Signatures
• Form of signature = a transformation of a message
using an asymmetric cryptosystem such that -
• Attributes
• a person having the initial message and the signer’s public key
can accurately determine –
• Whether the transformation was created using the private key that
corresponds to the signer’s public key; and
• Whether the initial message has been altered since the
transformation was made
(NOTE: This statute is likely preempted by E-SIGN)
6© 2010 Wildman, Harrold, Allen & Dixon LLP.
Canadian Approach to
eSignatures
• Form of signature = one or more letters, characters,
numbers or other symbols in digital form
• Attributes
• Form of signature must be incorporated in, attached to or
associated with an electronic document
• Form of signature must be executed or adopted with the intent to
sign (implied?)
7© 2010 Wildman, Harrold, Allen & Dixon LLP.
Canadian Approach to
“Secure” eSignatures
• Form of signature = one or more letters, characters,
numbers or other symbols in digital form
• Attributes
• Form of signature must be incorporated in, attached to or
associated with an electronic document
• Form of signature must be executed or adopted with the intent to
sign (implied?)
• Form of signature must be –
• Unique to the signer
• Created by technology under the sole control of the signer
• Created by technology that can be used to identify the signer
• linked to the document in such a manner that it can be used to
determine whether the document was changed after it was signed;
8© 2010 Wildman, Harrold, Allen & Dixon LLP.
EU Approach to
“Basic” eSignatures
• Form of signature = any data in electronic form
• Attributes
• Form of signature must be attached to, or logically
associated with, other electronic data
• Form of signature must serve as a method of authentication
9© 2010 Wildman, Harrold, Allen & Dixon LLP.
EU Approach to
“Advanced” eSignatures
• Form of signature = any data in electronic form
• Attributes
• Form of signature must be attached to, or logically
associated with, other electronic data
• Form of signature must serve as a method of authentication
• Form of signature must be –
• uniquely linked to the signer
• capable of identifying the signer
• created using means that the signatory can maintain under his
sole control, and
• linked to the data to which it relates in such a manner that any
subsequent change of the data is detectable;
10© 2010 Wildman, Harrold, Allen & Dixon LLP.
UN Convention – Promoting
Cross-Border Interoperability
• UN Convention on the Use of Electronic
Communications in International contracts
• International treaty designed to remove barriers to
international e-commerce
• Primary focus is on requirements of writing, signature, and original
• History
• Negotiated by UNCITRAL 2001 – 2005
• Approved by United Nations General Assembly 2005
• Signed by 18 countries
• Ratified by 2 countries so far (Honduras and Singapore)
• U.S. working on ratification process – expected in 2011
11© 2010 Wildman, Harrold, Allen & Dixon LLP.
UN Convention
Approach to eSignatures
• New, more flexible approach to electronic signatures
• Focuses on a “method” rather than data as the form
of signature
• Focuses on reliability of attributes as appropriate for
the purpose
12© 2010 Wildman, Harrold, Allen & Dixon LLP.
UN Convention
Approach to eSignatures
• Form of signature = a method
• Attributes
• Method must identify the signatory
• Method must indicate the signatory’s intention
• Method must be either –
• As reliable as appropriate for the purpose of the transaction,
or
• Proven in fact to identify the signatory and indicate the
signatory’s intent
13© 2010 Wildman, Harrold, Allen & Dixon LLP.
Significance of
UN Convention Approach
• “Method” allows for multi-step process
• The Form of Signature itself does not need to possess all
of the attributes
• So long as the overall process does
• Approach recognizes that security of process is a
relative concept
• Requirements vary with the transaction
• Includes a safe harbor allowing proponents to prove up the
required attributes
• At end of the day, virtually identical to U.S.
requirements

Weitere ähnliche Inhalte

Was ist angesagt?

Trademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital ageTrademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital ageJudy Yen
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital EraFrederick Lane
 
An introduction to electronic data management
An introduction to electronic data managementAn introduction to electronic data management
An introduction to electronic data managementJamez Lee S. Hunter
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..home based
 
judy's legal employment resume
judy's legal employment resumejudy's legal employment resume
judy's legal employment resumejudith hickman
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?walescva
 
Privacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinPrivacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinBoyle_Fredrickson
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerceWisnu Dewobroto
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerceUjjwal Joshi
 
Fulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftFulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftSteve Meek
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miismcgilla
 
EIM Presentation.13 07.2011
EIM Presentation.13 07.2011EIM Presentation.13 07.2011
EIM Presentation.13 07.2011Pod Legal
 

Was ist angesagt? (20)

Trademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital ageTrademark Law - Brand protection in the digital age
Trademark Law - Brand protection in the digital age
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
An introduction to electronic data management
An introduction to electronic data managementAn introduction to electronic data management
An introduction to electronic data management
 
social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..social, legal and ethical issues of e-commerce..
social, legal and ethical issues of e-commerce..
 
judy's legal employment resume
judy's legal employment resumejudy's legal employment resume
judy's legal employment resume
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Websites: do you tick all the boxes?
Websites: do you tick all the boxes?Websites: do you tick all the boxes?
Websites: do you tick all the boxes?
 
Privacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in WisconsinPrivacy & publicity trade secrets in Wisconsin
Privacy & publicity trade secrets in Wisconsin
 
Cyber Laws
Cyber LawsCyber Laws
Cyber Laws
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
Pls 780 week 5
Pls 780 week 5Pls 780 week 5
Pls 780 week 5
 
Pls 780 week_6
Pls 780 week_6Pls 780 week_6
Pls 780 week_6
 
Legal instrumentation in e commerce
Legal instrumentation in e commerceLegal instrumentation in e commerce
Legal instrumentation in e commerce
 
Fulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity TheftFulcrum Rotary Club- Identity Theft
Fulcrum Rotary Club- Identity Theft
 
Plss780 week 10
Plss780 week 10Plss780 week 10
Plss780 week 10
 
Roadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miisRoadshow2013 revised 2 - miis
Roadshow2013 revised 2 - miis
 
Pls780 week 2
Pls780 week 2Pls780 week 2
Pls780 week 2
 
EIM Presentation.13 07.2011
EIM Presentation.13 07.2011EIM Presentation.13 07.2011
EIM Presentation.13 07.2011
 
Pls 780 week 8
Pls 780 week 8Pls 780 week 8
Pls 780 week 8
 
Legal Issues in Mobile Security Research
Legal Issues in Mobile Security ResearchLegal Issues in Mobile Security Research
Legal Issues in Mobile Security Research
 

Andere mochten auch

Leadership Niagara 2015
Leadership Niagara 2015Leadership Niagara 2015
Leadership Niagara 2015Paul Copcutt
 
Maksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rusMaksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rusMaksim Yurlov
 
Best Practices for E-Signature Adoption By Independent Agents
Best Practices for E-Signature Adoption By Independent AgentsBest Practices for E-Signature Adoption By Independent Agents
Best Practices for E-Signature Adoption By Independent AgentseSignLive by VASCO
 
Niagara Region 2015
Niagara Region 2015Niagara Region 2015
Niagara Region 2015Paul Copcutt
 
McMaster Social Science - Career Countdown Conference
McMaster Social Science - Career Countdown ConferenceMcMaster Social Science - Career Countdown Conference
McMaster Social Science - Career Countdown ConferencePaul Copcutt
 
Seguridad Operaciones de Protección de Personas.
Seguridad Operaciones de Protección de Personas.Seguridad Operaciones de Protección de Personas.
Seguridad Operaciones de Protección de Personas.oswaldo chomba
 

Andere mochten auch (10)

Student Lending
Student LendingStudent Lending
Student Lending
 
Leadership Niagara 2015
Leadership Niagara 2015Leadership Niagara 2015
Leadership Niagara 2015
 
Legal Framework for Electronic Records in LATAM and Spain
Legal Framework for Electronic Records in LATAM and SpainLegal Framework for Electronic Records in LATAM and Spain
Legal Framework for Electronic Records in LATAM and Spain
 
Maksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rusMaksim_Yurlov_Resume_2015_rus
Maksim_Yurlov_Resume_2015_rus
 
Best Practices for E-Signature Adoption By Independent Agents
Best Practices for E-Signature Adoption By Independent AgentsBest Practices for E-Signature Adoption By Independent Agents
Best Practices for E-Signature Adoption By Independent Agents
 
Felix Global 2015
Felix Global 2015Felix Global 2015
Felix Global 2015
 
Fanshawe 2016
Fanshawe 2016Fanshawe 2016
Fanshawe 2016
 
Niagara Region 2015
Niagara Region 2015Niagara Region 2015
Niagara Region 2015
 
McMaster Social Science - Career Countdown Conference
McMaster Social Science - Career Countdown ConferenceMcMaster Social Science - Career Countdown Conference
McMaster Social Science - Career Countdown Conference
 
Seguridad Operaciones de Protección de Personas.
Seguridad Operaciones de Protección de Personas.Seguridad Operaciones de Protección de Personas.
Seguridad Operaciones de Protección de Personas.
 

Ähnlich wie Smedinghoff: International Adoption

The Cloud and e-Signatures - Illinois License Law
The Cloud and e-Signatures - Illinois License LawThe Cloud and e-Signatures - Illinois License Law
The Cloud and e-Signatures - Illinois License LawCarrie Bey-Little
 
Read These 9 Tips For E-Commerce Business | Power Seller Center
Read These 9 Tips For E-Commerce Business | Power Seller CenterRead These 9 Tips For E-Commerce Business | Power Seller Center
Read These 9 Tips For E-Commerce Business | Power Seller Centerpower sellers center
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptxshrutiganpule74
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature Mahmoud Ezzat
 
Electronic Signatures in Commercial Practice
Electronic Signatures in Commercial PracticeElectronic Signatures in Commercial Practice
Electronic Signatures in Commercial PracticeGregg Oldring
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesTania Fuchs
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signaturesCoSign by ARX
 
e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.4Point Solutions
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?Swaleh Ahmed
 
eSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for DigitisationeSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for Digitisationitnewsafrica
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commercesadaf tst
 

Ähnlich wie Smedinghoff: International Adoption (20)

The Cloud and e-Signatures - Illinois License Law
The Cloud and e-Signatures - Illinois License LawThe Cloud and e-Signatures - Illinois License Law
The Cloud and e-Signatures - Illinois License Law
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Read These 9 Tips For E-Commerce Business | Power Seller Center
Read These 9 Tips For E-Commerce Business | Power Seller CenterRead These 9 Tips For E-Commerce Business | Power Seller Center
Read These 9 Tips For E-Commerce Business | Power Seller Center
 
E Contracts E Transactions.pptx
E Contracts  E Transactions.pptxE Contracts  E Transactions.pptx
E Contracts E Transactions.pptx
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
E signature-signyourdoc
E signature-signyourdocE signature-signyourdoc
E signature-signyourdoc
 
Electronic Signatures in Commercial Practice
Electronic Signatures in Commercial PracticeElectronic Signatures in Commercial Practice
Electronic Signatures in Commercial Practice
 
Security and trust in e payment
Security and trust in e  paymentSecurity and trust in e  payment
Security and trust in e payment
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signatures
 
e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.
 
E lock digital signatures
E lock digital signaturesE lock digital signatures
E lock digital signatures
 
Carrie Peter
Carrie Peter Carrie Peter
Carrie Peter
 
Online privacy; myth or reality?
Online privacy; myth or reality?Online privacy; myth or reality?
Online privacy; myth or reality?
 
Online privacy
Online privacyOnline privacy
Online privacy
 
E commerce(report)
E commerce(report)E commerce(report)
E commerce(report)
 
eSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for DigitisationeSignatures: The lynchpin for Digitisation
eSignatures: The lynchpin for Digitisation
 
Cryptography
CryptographyCryptography
Cryptography
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 

Mehr von Electronic Signature & Records Association

Mehr von Electronic Signature & Records Association (15)

MISMO / eMortgage Update
MISMO / eMortgage UpdateMISMO / eMortgage Update
MISMO / eMortgage Update
 
FTC Dot.com Disclosures 2.0
FTC Dot.com Disclosures 2.0FTC Dot.com Disclosures 2.0
FTC Dot.com Disclosures 2.0
 
Smedinghoff Identity Management: Who's Signing?
Smedinghoff Identity Management: Who's Signing?Smedinghoff Identity Management: Who's Signing?
Smedinghoff Identity Management: Who's Signing?
 
Sabett: ESRA Identity Management 11-09-10
Sabett:  ESRA Identity Management 11-09-10Sabett:  ESRA Identity Management 11-09-10
Sabett: ESRA Identity Management 11-09-10
 
Patrick Hartford: eMortgages eDisclosures and eClosings
Patrick Hartford: eMortgages eDisclosures and eClosingsPatrick Hartford: eMortgages eDisclosures and eClosings
Patrick Hartford: eMortgages eDisclosures and eClosings
 
Patfry: Revised Uniform Law on Notarial Acts
Patfry: Revised Uniform Law on Notarial ActsPatfry: Revised Uniform Law on Notarial Acts
Patfry: Revised Uniform Law on Notarial Acts
 
Margo Tank: Legal and Regulatory Update
Margo Tank: Legal and Regulatory UpdateMargo Tank: Legal and Regulatory Update
Margo Tank: Legal and Regulatory Update
 
IRS Expansion of e-Signature Applications
IRS Expansion of e-Signature ApplicationsIRS Expansion of e-Signature Applications
IRS Expansion of e-Signature Applications
 
Harry Gardner: eWarehouse Lending
Harry Gardner: eWarehouse LendingHarry Gardner: eWarehouse Lending
Harry Gardner: eWarehouse Lending
 
David Whitaker: Managing Your Vendors
David Whitaker: Managing Your VendorsDavid Whitaker: Managing Your Vendors
David Whitaker: Managing Your Vendors
 
Edward O'Sheehan: Electronic Signatures: The Wave of the Future
Edward O'Sheehan: Electronic Signatures: The Wave of the FutureEdward O'Sheehan: Electronic Signatures: The Wave of the Future
Edward O'Sheehan: Electronic Signatures: The Wave of the Future
 
ESRA Update 2011
ESRA Update 2011ESRA Update 2011
ESRA Update 2011
 
Legal & Regulatory Update SPeRS 2.0
Legal & Regulatory Update SPeRS 2.0Legal & Regulatory Update SPeRS 2.0
Legal & Regulatory Update SPeRS 2.0
 
Taking Transactions Mobile
Taking Transactions MobileTaking Transactions Mobile
Taking Transactions Mobile
 
IRS Alternative Signatures
IRS Alternative SignaturesIRS Alternative Signatures
IRS Alternative Signatures
 

Kürzlich hochgeladen

Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.francesco barbera
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataSafe Software
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIUdaiappa Ramachandran
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdfJamie (Taka) Wang
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 

Kürzlich hochgeladen (20)

Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
RAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AIRAG Patterns and Vector Search in Generative AI
RAG Patterns and Vector Search in Generative AI
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 

Smedinghoff: International Adoption

  • 1. Wildman Harrold | 225 West Wacker Drive | Chicago, IL 60606 | (312) 201-2000 | wildman.com © 2010 Wildman, Harrold, Allen & Dixon LLP. International Adoption and Cross Jurisdiction Issues in eSignatures and eRecords Thomas J. Smedinghoff Wildman, Harrold, Allen & Dixon, LLP Chicago
  • 2. 2© 2010 Wildman, Harrold, Allen & Dixon LLP. International eSignature Models • Approximately 100 countries have e-signature legislation of some form; approaches include – • Minimalist approach -- technology neutral signature model • E.g., U.S., Australia, UNCITRAL Model Law • Technology-specific approach (PKI) • E.g., Utah (repealed), Washington, Malaysia, Egypt, Colombia, Korea, etc. • Dual signature approach • U.S. states (Arizona, Illinois, Iowa*, South Carolina*) – secure electronic signature • EU – Electronic Signatures Directive – advanced electronic signature • E.g., Canada, China, New Zealand, Singapore, Thailand, Vietnam, etc.
  • 3. 3© 2010 Wildman, Harrold, Allen & Dixon LLP. General Approach to eSignatures • Form of signature + Attributes • Form of signature = the data object that represents the signature • Attributes = the qualities that must be present to validate the form of signature as a legally binding signature (may or may not be qualities of the form of signature) • Other signature requirements typically added by evidentiary law – e.g., identity of signer and integrity of signed record (From both E-SIGN and UETA)
  • 4. 4© 2010 Wildman, Harrold, Allen & Dixon LLP. U.S Approach to eSignatures • Form of signature = any sound, symbol, or process • Clicking “I Agree” button • Digital signature (PKI) • Digitized imaged of handwritten signature • PIN, password • Typed name • Voice signature • Attributes • Form of signature must be attached to, or logically associated with, the record being signed • Form of signature must be executed or adopted with the intent to sign
  • 5. 5© 2010 Wildman, Harrold, Allen & Dixon LLP. Washington State Approach to Digital Signatures • Form of signature = a transformation of a message using an asymmetric cryptosystem such that - • Attributes • a person having the initial message and the signer’s public key can accurately determine – • Whether the transformation was created using the private key that corresponds to the signer’s public key; and • Whether the initial message has been altered since the transformation was made (NOTE: This statute is likely preempted by E-SIGN)
  • 6. 6© 2010 Wildman, Harrold, Allen & Dixon LLP. Canadian Approach to eSignatures • Form of signature = one or more letters, characters, numbers or other symbols in digital form • Attributes • Form of signature must be incorporated in, attached to or associated with an electronic document • Form of signature must be executed or adopted with the intent to sign (implied?)
  • 7. 7© 2010 Wildman, Harrold, Allen & Dixon LLP. Canadian Approach to “Secure” eSignatures • Form of signature = one or more letters, characters, numbers or other symbols in digital form • Attributes • Form of signature must be incorporated in, attached to or associated with an electronic document • Form of signature must be executed or adopted with the intent to sign (implied?) • Form of signature must be – • Unique to the signer • Created by technology under the sole control of the signer • Created by technology that can be used to identify the signer • linked to the document in such a manner that it can be used to determine whether the document was changed after it was signed;
  • 8. 8© 2010 Wildman, Harrold, Allen & Dixon LLP. EU Approach to “Basic” eSignatures • Form of signature = any data in electronic form • Attributes • Form of signature must be attached to, or logically associated with, other electronic data • Form of signature must serve as a method of authentication
  • 9. 9© 2010 Wildman, Harrold, Allen & Dixon LLP. EU Approach to “Advanced” eSignatures • Form of signature = any data in electronic form • Attributes • Form of signature must be attached to, or logically associated with, other electronic data • Form of signature must serve as a method of authentication • Form of signature must be – • uniquely linked to the signer • capable of identifying the signer • created using means that the signatory can maintain under his sole control, and • linked to the data to which it relates in such a manner that any subsequent change of the data is detectable;
  • 10. 10© 2010 Wildman, Harrold, Allen & Dixon LLP. UN Convention – Promoting Cross-Border Interoperability • UN Convention on the Use of Electronic Communications in International contracts • International treaty designed to remove barriers to international e-commerce • Primary focus is on requirements of writing, signature, and original • History • Negotiated by UNCITRAL 2001 – 2005 • Approved by United Nations General Assembly 2005 • Signed by 18 countries • Ratified by 2 countries so far (Honduras and Singapore) • U.S. working on ratification process – expected in 2011
  • 11. 11© 2010 Wildman, Harrold, Allen & Dixon LLP. UN Convention Approach to eSignatures • New, more flexible approach to electronic signatures • Focuses on a “method” rather than data as the form of signature • Focuses on reliability of attributes as appropriate for the purpose
  • 12. 12© 2010 Wildman, Harrold, Allen & Dixon LLP. UN Convention Approach to eSignatures • Form of signature = a method • Attributes • Method must identify the signatory • Method must indicate the signatory’s intention • Method must be either – • As reliable as appropriate for the purpose of the transaction, or • Proven in fact to identify the signatory and indicate the signatory’s intent
  • 13. 13© 2010 Wildman, Harrold, Allen & Dixon LLP. Significance of UN Convention Approach • “Method” allows for multi-step process • The Form of Signature itself does not need to possess all of the attributes • So long as the overall process does • Approach recognizes that security of process is a relative concept • Requirements vary with the transaction • Includes a safe harbor allowing proponents to prove up the required attributes • At end of the day, virtually identical to U.S. requirements