SlideShare ist ein Scribd-Unternehmen logo
1 von 74
Downloaden Sie, um offline zu lesen
Electronic Signature 3.0
The future is now
Breakfast Meeting
of 29 January 2014
29/01/2014 Copyright Lexing 2014 ® Company Confidential 1
Introduction
Background – Deployment
Stakes – New forms of signature
Challenge – Compliance
29/01/2014 2Copyright Lexing 2014 ® Company Confidential
Extract from LesEchos.fr – 28 01 2014
29/01/2014 3Copyright Lexing 2014 ® Company Confidential
Widespread Use of
Electronic Signature:
- Mutual banks are increasingly
using it in their bank branches
- Objective: streamline the sale of
products via multiple channels
OUTLINE
1. State of Play,
by Dimitri Mouton, Demaeter 
2. Choose the right signature …
if possible 
3. Deploy without risk …
subject to the discretionary
assessment of courts 
29/01/2014 4Copyright Lexing 2014 ® Company Confidential
1. State of Play - Dimitri Mouton, Demaeter
1. A dreadful mess…
2. Digital signature 101
3. Trends
29/01/2014 5Copyright Lexing 2014 ® Company Confidential
1.1 A DREADFUL MESS…
29/01/2014 6Copyright Lexing 2014 ® Company Confidential
PKI
Electronic signature
Authentication
Private key
Public key
Commitment
IGC
RSA
2048 bits
RGS
Certificate
CA
3+ class
2 stars
Presumption of reliability
Tablet
Secured signature
Advanced signature
Qualified certificate
Agreement on evidence
PIN code
Strong authentication
SMS
Identity theft
CRL
Timestamp
OCSP
X.509 V3
Registration authority
CSP
PSCO
RFC 3161
COFRAC
ANSSI
Electronic Signature Policy
PAdES
PDF/A
XAdES
PKCS#7
PKCS#12
French Act of 13 March 2000
French Decree of 30 March 2001
EU Regulation
CMS
Detached signature
java applet
Specific to signatory
Sole control
SSCD
Revocation
SHA256
Delegation
Signature management system
On the fly
OTP
Integrity
Non-repudiation
Guarantee of origin
Traceability
Qualified provider
Probative value
Alice and Bob
29/01/2014 7Copyright Lexing 2014 ® Company Confidential
AND A VARIETY OF USES …
29/01/2014 8Copyright Lexing 2014 ® Company Confidential
Public procurements
B-to-B contracts
Registrations
Social security declarations
Electronic commerce
Consumer agreements in branch
Notary deeds
Electronic minutes
Certificate of conformity
Diplomas
Deeds – Legality control
Deliberations
Public accounting (“Hélios”)
Building work notification
Network and pipelines
Online banking
Administrative formalities
Réseau Privé Virtuel des Avocats
Réseau Privé Virtuel de la Justice
Electronic commercial court
Official deeds
Chartered accountancyTachograph
Employment contracts
Attendance sheets
Electronic claim form
Invoices
Bank POA
Electronic certified mail
Electronic voting
29/01/2014 9Copyright Lexing 2014 ® Company Confidential
Types…
Scanned signature
Handwritten signature
on tablets
Electronic signature
“on the fly”
Electronic signature
With or
without
accreditation
With or without
legal opinion
With or
without stars
29/01/2014 10Copyright Lexing 2014 ® Company Confidential
Components of a digital service
Including electronic signature
29/01/2014 11Copyright Lexing 2014 ® Company Confidential
1.2 Electronic signature 101
29/01/2014 12Copyright Lexing 2014 ® Company Confidential
Electronic signature: hands-on definition
An electronic signature is a signature…
… covering an electronic document.
Ink marks paper  Cryptography guarantees a link between the signatory and the document
29/01/2014 13Copyright Lexing 2014 ® Company Confidential
Certificate: What is it for?
• A certificate is an “ID card” issued
by a “Certification Authority” (CA) or
a “CertificateServiceProvider”(CSP)
• It can serve as a tool to:
– authenticate (control access)
– sign (electronic signature, seal, timestamp)
– encrypt (confidentiality)
29/01/2014 14Copyright Lexing 2014 ® Company Confidential
PKI
• PKI (Public Key Infrastructure), also known in French as “Infrastructure
à clef publique” (ICP) or “Infrastructure de Gestion de Clefs” (IGC) is a:
Set of technical and human means
implemented to issue certificates
• Certification Authority (CA): in charge of the PKI
– Establishes rules (Certification Policy)
– Is responsible for their compliance
• Registration Authority (RA): registers holders
• Certification Operator (CO): operates machines
• Revocation Authority, Validation Authority: perform additional roles.
29/01/2014 15Copyright Lexing 2014 ® Company Confidential
Certificate lifecycle
29/01/2014 16Copyright Lexing 2014 ® Company Confidential
• Technical generation:
– Fingerprint (hash) of the document
– Sealing by private key
• Additional elements:
– Signatory certificate and related certification chain
– Time-stamping token
– Proof of certificate validity (CRL or OCSP)
Signature process
29/01/2014 17Copyright Lexing 2014 ® Company Confidential
Verification process
• Technical generation:
– Fingerprint of the document
– Fingerprint initially sealed
– Comparison between the two values
29/01/2014 18Copyright Lexing 2014 ® Company Confidential
Validity of the certificate
The document has been signed by the certificate holder…
But who is he?
• Check the technical validity of the certificate.
– If invalid  WARNING!
• Review the certificate holder:
– If I don’t trust this CA  WARNING!
– If I trust this CA:
• Compare the signature date with the certificate validity date
• Check the Certificate Revocation List
• Everything is OK if: the name on the certificate is the same as the signatory name.
But
Was the signatory empowered to sign?
Is the document signed correct regarding its form? its substance?
 Next step after technical verification: legal verification!
29/01/2014 19Copyright Lexing 2014 ® Company Confidential
Example: Adobe Reader signature
29/01/2014 20Copyright Lexing 2014 ® Company Confidential
Signature formats
• AdES = Advanced Electronic Signature
• 3 formats:
– PAdES = PDF format
– CAdES = CMS / PKCS#7 format
– XAdES = XML format
• Choice is to be made according to the constraints of the project
• All allow to include the same elements
29/01/2014 21Copyright Lexing 2014 ® Company Confidential
Various levels of certificates
• The level of security offered by a certificate depends on:
– the registration procedures
– the token holding the private key (physical/software)
– the commitments of the Certification Authority
• The different levels set by the French General Security Reference
System (RGS) correspond to legal realities:
* Remote Registration
Software token
“Simple” electronic signature
** Face-to face registration
Physical token
“Secure” electronic signature
*** Face-to face registration
Secure physical token
Qualified certificate
“Presumed reliable” electronic signature
29/01/2014 22Copyright Lexing 2014 ® Company Confidential
Trust rules
• Trust means you feel secure
• But trust does not mean you don’t need to be careful!
Weak Chain of Trust Strong Chain of Trust
29/01/2014 23Copyright Lexing 2014 ® Company Confidential
1.3 TRENDS
29/01/2014 24Copyright Lexing 2014 ® Company Confidential
“Autonomous” electronic signature
• The signatory
purchased a certificate
from a CA
• He possesses an
electronic signature tool
on his workstation
• He autonomously signs
on his workstation
29/01/2014 25Copyright Lexing 2014 ® Company Confidential
Electronic signature by applet
• The signatory
purchased a certificate
from a CA
• The signature tool is
included in the service
• The signatory signs
on his workstation
when using the service
29/01/2014 26Copyright Lexing 2014 ® Company Confidential
Server
“On the fly” electronic signature (1/4)
• The signatory has
no certificate and
no e-signature tool
• The server displays
the contracts and
he gives his agreement
29/01/2014 27Copyright Lexing 2014 ® Company Confidential
Server
• The server
checks the identity
of the signatory
by sending him a
challenge by SMS
“On the fly” electronic signature (2/4)
29/01/2014 28Copyright Lexing 2014 ® Company Confidential
Server
“On the fly” electronic signature (3/4)
• The server generates a
dual signature key
• It generates a
certificate in the name
of the signatory
• It uses the private key
to sign the document
• Then it destroys the
private key
29/01/2014 29Copyright Lexing 2014 ® Company Confidential
Server
“On the fly” electronic signature (4/4)
• Document is signed
on the server!
• For the next signature,
a new certificate
will be generated
29/01/2014 30Copyright Lexing 2014 ® Company Confidential
Server
Virtual smart card (1/3)
• The signatory
does not need an
electronic signature tool
• His certificate is stored
on the server in a
secure area (HSM)
• The server displays the
contract and he gives
his agreement
29/01/2014 31Copyright Lexing 2014 ® Company Confidential
Server
• The server
checks the identity
of the signatory
by sending him a
challenge by SMS
Virtual smart card (2/3)
29/01/2014 32Copyright Lexing 2014 ® Company Confidential
Server
Virtual smart card (3/3)
• Document is signed
on the server!
• For the next signature,
the same certificate
will be used
29/01/2014 33Copyright Lexing 2014 ® Company Confidential
Server
Signature on a tablet
• Clients see the contract
when in the bank branch
or in store
• They affix their
handwritten signature on
the tablet
• An electronic signature is
generated “on the fly” in
addition to the
handwritten signature
29/01/2014 34Copyright Lexing 2014 ® Company Confidential
Server
Electronic seal
• Documents are produced
via an automated process
and sent to the server
• The server has
a certificate in the name
of the legal entity
• The electronic seal is an
“electronic signature” of
the legal entity
• It can be affixed
automatically
29/01/2014 35Copyright Lexing 2014 ® Company Confidential
Server
THE Trend …: “rematerialization”
First name Last Name
Address
Invoice
From XYZ
amounting to a proof of domicile
Services……………… €123
“First name Last name Address XYZ €123”
29/01/2014 36Copyright Lexing 2014 ® Company Confidential
First name Last Name
Address
Invoice
From XYZ
amounting to a proof of domicile
Services……………… €123
Exploitation of 2D-DOC code
“First name Last name Address XYZ €123”
Technical verification
Visual verification
29/01/2014 37Copyright Lexing 2014 ® Company Confidential
2. How to choose the electronic signature?
1. Regulation on Digital
process
1. Absence of choice
2. Choice
29/01/2014 38Copyright Lexing 2014 ® Company Confidential
2.1 REGULATION ON DIGITAL PROCESS
29/01/2014 39Copyright Lexing 2014 ® Company Confidential
Prerequisites: Regulation
Le papier sauf …Electronic law
Paper required
unless...
agreement on
evidence
Obligation to
process electronic
documents
Right to
create electronic
documents
Law of 13 March 2000
(e-signature/e-evidence)
Before 2000 Law of 21 June 2004
(LCEN)
Law of 4 August 2008
(modernization of economy)
Agreement on
evidence
ad
probationem
French State
required to receive
electronic invoices
ad
validitatem
Order of 8 December 2005
(e-government)
29/01/2014 40Copyright Lexing 2014 ® Company Confidential
Yes, it is possible, but … 3 scenarios
Prefilled
e.g.: pay slip or declaration of interest
Imposed
e.g.: electronic certified mail
Free
… for the moment
4129/01/2014 Copyright Lexing 2014 ® Company Confidential
And even if it is possible …
“Art. 1316-4 of Civil Code is not everything…”
“Whereas the employer complains that the judgment found that the dismissal was unfair, whereas
according to the ground of appeal, if a party contests the authenticity of an email, it is up to the judge
to determine whether the conditions laid down in articles 1316-1 and 1316-4 of the Civil Code for the
validity of an electronic document or signature are met;
Whereas by asserting that the manager of AGL Finances “is the author and the sender" of an email
whose authenticity was contested, on the grounds that the employer [did] not prove that the sender’s
address mentioned on the email is wrong or that the company mailbox has been hacked" and that “in
any event, such a hacking could not be attributed to Ms. X...”, without checking, as it was required to
do, whether that email had been established and maintained in conditions that guarantee its integrity
and whether it contained an electronic signature resulting from the use of a reliable identification
process, the Court of Appeals decision has no legal basis under Articles 287 of the Code of Civil
Procedure , 1316-1 and 1316-4 of the Civil Code;
But the provisions invoked by the ground of appeal are not applicable to an email produced to prove a
fact, as its existence can be established by any means of evidence, which are assessed at their
discretion by the trial judges; accordingly the ground of appeal is unfounded.”
French Cour de Cassation, social chamber, 25 Sept. 2013
4229/01/2014 Copyright Lexing 2014 ® Company Confidential
First Thing First…
• Do you need to prove a right or a fact?
• Free proof or imposed proof
– Imposed = civil matters
– Free … more or less everything else
• criminal, administrative, employment matters
29/01/2014 43Copyright Lexing 2014 ® Company Confidential
The question is therefore…
1. Do I need it?
(investment management)
2. If you can move mountains, you can move molehills…
(risk management)
29/01/2014 Copyright Lexing 2014 ® Company Confidential 44
2.2 ABSENCE OF CHOICE…
29/01/2014 Copyright Lexing 2014 ® Company Confidential 45
Example of a “no choice” scenario
To be presumed reliable within the meaning of above-mentioned
Article 2 of Decree of 30 March 2001, the electronic signature
procedures available to judges, registry officers and persons
authorized under Article R. 123-14 of the Code of Judicial
Organization must meet the three stars (***) level of the
General Security Reference System (RGS). In addition, the
signature must be secure and be created by a secure process
certified in accordance with the conditions laid down in Article 3
of said Decree. The procedure for filing and registration of the
identification and credentials data of these persons is subject to
the initiative and responsibility of the Ministry of Justice.
French Order of 18 October 2013 on electronic signature of court decisions issued in civil matters by
the Cour de cassation
4629/01/2014 Copyright Lexing 2014 ® Company Confidential
Another example… with less legalese 
• “The documents of administrative authorities may be subject to an electronic
signature. The latter is validly applied only by use of a method, compliant with
the rules of general security framework referred to in Article 9 point I, which
allows identification of the signatory, guarantees the link of the signature with
the document to which it is attached and ensures the integrity of said
document.”
• “The electronic certificates issued to administrative authorities and their agents
in order to ensure their identification in the context of an information system are
subject to a validation by the State under conditions laid down by decree.”
Ordinance 2005-1516 du 8-12-2005 on the electronic exchanges between citizens and administrative
authorities (Art. 8)
4729/01/2014 Copyright Lexing 2014 ® Company Confidential
2.3 TIME TO CHOOSE!
4829/01/2014 Copyright Lexing 2014 ® Company Confidential
A complex reality
• 4 legal concepts (Decree of 30 March 2001)
– Simple
– Secured + Digital
– Presumed reliable
• Geographical approach:
– Advanced (Dir. 1999/93/EC of 13 December 1999)
Secure (Decree of 30 March 2001)
– Digital signature / Electronic signature
• At least 3 technical realities:
– RGS: one star (*)
– RGS: two stars (**)
– RGS: three stars (***)
RGS = General Security Reference System
3 DEGREES OF RELIABILITY
=
3 SIGNATURES
29/01/2014 49Copyright Lexing 2014 ® Company Confidential
Where choice is possible …
Click
Electronic signature
Secured electronic signature
Digital signature
Electronic signature presumed reliable
5029/01/2014 Copyright Lexing 2014 ® Company Confidential
Basic method
Create
evidence
• One signatory / Several signatories
• One document / a series of documents
• One channel/ Multi-channel
• Geographic distance
Administer
evidence
• Produce it in urgency (summary procedure)
• Produce it in specific conditions (criminal; supervising entities)
Manage
dispute
• Electronic signature presumed reliable – High risk for evidence to be contested
• Amount is high and risk for situation to be deadlocked
• Amount is not the essential element (high risk for low value contracts to be contested)
• Be careful of false hopes - Technical expertise ahead
29/01/2014 51Copyright Lexing 2014 ® Company Confidential
Legal
prerequisites
Contractual
commitments
Legalprovisions
( “LCEN” Act)
Public/Private
sector
29/01/2014 52Copyright Lexing 2014 ® Company Confidential
Choosing a solution means choosing…a provider
Choosing a solution means choosing…a provider
Decision
Legal &
technical
prerequisites
Contractual
commitments
Maintenance
of standards
and
certifications
Insurance
coverage
29/01/2014 53Copyright Lexing 2014 ® Company Confidential
3. Legal security
1. Backbone
2. Upstream security
3. Downstream security
29/01/2014 54Copyright Lexing 2014 ® Company Confidential
3.1 BACKBONE:
AGREEMENT ON EVIDENCE
29/01/2014 55Copyright Lexing 2014 ® Company Confidential
Legal approach
• “Where a statute has not fixed other principles,
and failing a valid agreement to the contrary
between the parties, the judge shall regulate the
conflicts in matters of documentary evidence by
determining by every means the most credible
instrument, whatever its medium may be.”
French Civil Code, Art. 1316-2
29/01/2014 56Copyright Lexing 2014 ® Company Confidential
Escalation of “powers”
Law
Agreement
Judge
29/01/2014 57Copyright Lexing 2014 ® Company Confidential
Concept of “validity”
Substance
Enforceability
Access
B to C
B to B
A to C
29/01/2014 58Copyright Lexing 2014 ® Company Confidential
A real organization …
Agreement on evidence
Traceability
Policy
Time Stamping
Policy
Security
Policy
Certification
Policy
Archives
Policy
XXX
Policy
29/01/2014 59Copyright Lexing 2014 ® Company Confidential
Another question...
Clause? Contract?
29/01/2014 60Copyright Lexing 2014 ® Company Confidential
Organizing an agreement on evidence
Recitals
Article 1 Definitions
Article 2 Effect – Enforceability
Article 3 Term – Limitation periods
Article 4 Purpose
Article 5 Scope
Article 6 Identification
Article 7 Authentication
Article 8 Integrity
Article 9 Durability
Article 10 Storage
Article 11 Time Stamping
Article 12 Traceability
Article 13 Signature
Article 14 Liability
Article 15 …
29/01/2014 61Copyright Lexing 2014 ® Company Confidential
Having an agreement on evidence is not enough;
Need to organize evidence and access to evidence
Evidence record
Evidence trial
Agreement on
evidence
Vision of
the situation
Technical
justification
Legal basis Basis
Organization
of evidence
Access to
evidence
29/01/2014 62Copyright Lexing 2014 ® Company Confidential
3.2 LEGAL BUILD
(UPSTREAM SECURITY)
29/01/2014 63Copyright Lexing 2014 ® Company Confidential
Feasibility study
(Yes or No)
Legal impact study
(Go or No Go)
Legal basis
(public sector –
e-government)
Compliance review
(legal opinion)
Electronic
document
management
policy
Platform
terms of access
(on line)
Employee
information
Data Protection
Authority
(CNIL)
Insurance
29/01/2014 64Copyright Lexing 2014 ® Company Confidential
Risk of “legal bug”
Do not get confused…
Agreement
related to
evidence
Agreement
related to
digital process
29/01/2014 65Copyright Lexing 2014 ® Company Confidential
3.3 LEGAL RUN
(DOWNSTREAM SECURITY)
29/01/2014 66Copyright Lexing 2014 ® Company Confidential
Delegation of
electronic
signature
Terms of use
of e-signature
book
IS Policy
(adaptation)
Internal Audit
(reliable audit trail)
Provider
governance
Provider
audit
Legal watch
Right of access
unit
Crisis
management
29/01/2014 67Copyright Lexing 2014 ® Company Confidential
4. BUT IS IT ENOUGH?
29/01/2014 68Copyright Lexing 2014 ® Company Confidential
Security aspects of digital process
Electronic
Signature
Identity
management
Certificates
Confidentiality
Archiving
Traceability
TimeStamping
29/01/2014 69Copyright Lexing 2014 ® Company Confidential
Security is everybody’s business
• Application developers must take account of security…
• But a global vision is needed!
• Involvement and responsible attitude from each stakeholders is essential for
technical and legal security measures to be fully efficient.
29/01/2014 70Copyright Lexing 2014 ® Company Confidential
Find out more…
29/01/2014 71Copyright Lexing 2014 ® Company Confidential
Next Breakfast Meeting
Mayors and MPs:
How to protect your e-reputation & name
February 12, 2014
Speakers:
Virginie Bensoussan-Brulé & Claudine Salomon
29/01/2014 72Copyright Lexing 2014 ® Company Confidential
29/01/2014 73Copyright Lexing 2014 ® Company Confidential
Contact
Photos & Illustrations Credits
Networking©Scott Maxwell-Fotolia.com informatique data room réunion
binary stream©Mike Kiev-Fotolia.com
Emblème France©illustrez-vous-Fotolia.com
Road to Success - Up Arrow©iQoncept-Fotolia.com
Businessman entering the labyrinth©Scanrail-Fotolia.com
Dessins tirés de Sécurité de la dématérialisation © Stéphane Torossian – http://graphiste-free-lance-sato.jimdo.com
Lexing is a registered trademark of Alain Bensoussan Selas
Demaeter is a registered trademark of Demaeter Sarl
Me Eric Barbry
Head of the Digital Law Practice Group
Tel +33 (0)6 13 28 91 28
eric-barbry@alain-bensoussan.com
Me Polyanna Bigle
Head of ISS & Electronic Documents Department
Tel +33 (0)6 42 32 16 09
polyanna-bigle@alain-bensoussan.com
Mr. Dimitri Mouton – Demaeter
Consultant expert in dematerialisation & security
Tel +33 (0)6 59 10 99 37
dimitri.mouton@demaeter.fr – www.demaeter.fr
29/01/2014 74Copyright Lexing 2014 ® Company Confidential

Weitere ähnliche Inhalte

Andere mochten auch

Electronic Document Workflow Enovatio
Electronic Document Workflow EnovatioElectronic Document Workflow Enovatio
Electronic Document Workflow EnovatioEnovatio Sp. z o.o.
 
General presentation for electronic document management systems (ProNet)
General presentation for electronic document management systems (ProNet)General presentation for electronic document management systems (ProNet)
General presentation for electronic document management systems (ProNet)Natasha Zaverukha
 
Шерінгова економіка і приклади в Україні
Шерінгова економіка і приклади в УкраїніШерінгова економіка і приклади в Україні
Шерінгова економіка і приклади в УкраїніNatasha Zaverukha
 
Documento informatico: profili giuridici
Documento informatico: profili giuridiciDocumento informatico: profili giuridici
Documento informatico: profili giuridiciMichele Martoni
 
Electronic Document & Electronic Signatures
Electronic Document & Electronic SignaturesElectronic Document & Electronic Signatures
Electronic Document & Electronic SignaturesMichele Martoni
 
SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers Verbella CMG
 
Electronic data interchange
Electronic data interchangeElectronic data interchange
Electronic data interchangeRohit Kumar
 
What is documentation and its techniques
What is documentation and its techniquesWhat is documentation and its techniques
What is documentation and its techniquesSohail Sangi
 
Document Management System
Document Management SystemDocument Management System
Document Management SystemSidhartha Sahoo
 
Document Management With Workflow Presentation
Document Management With Workflow PresentationDocument Management With Workflow Presentation
Document Management With Workflow PresentationJohn Street
 
Principles of Documentation
Principles of  DocumentationPrinciples of  Documentation
Principles of DocumentationJEENA AEJY
 
Document Management System (DMS)
Document Management System (DMS)Document Management System (DMS)
Document Management System (DMS)Hiran Wickramainghe
 
Electronic document management perspectives
Electronic document management perspectivesElectronic document management perspectives
Electronic document management perspectivesSociusPartner
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Good documentation practice
Good documentation practiceGood documentation practice
Good documentation practicePharmaceutical
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017LinkedIn
 

Andere mochten auch (18)

Electronic Document Workflow Enovatio
Electronic Document Workflow EnovatioElectronic Document Workflow Enovatio
Electronic Document Workflow Enovatio
 
General presentation for electronic document management systems (ProNet)
General presentation for electronic document management systems (ProNet)General presentation for electronic document management systems (ProNet)
General presentation for electronic document management systems (ProNet)
 
Шерінгова економіка і приклади в Україні
Шерінгова економіка і приклади в УкраїніШерінгова економіка і приклади в Україні
Шерінгова економіка і приклади в Україні
 
Documento informatico: profili giuridici
Documento informatico: profili giuridiciDocumento informatico: profili giuridici
Documento informatico: profili giuridici
 
Electronic Signature
Electronic SignatureElectronic Signature
Electronic Signature
 
Electronic Document & Electronic Signatures
Electronic Document & Electronic SignaturesElectronic Document & Electronic Signatures
Electronic Document & Electronic Signatures
 
SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers SAP Document Management System Integration with Content Servers
SAP Document Management System Integration with Content Servers
 
Electronic data interchange
Electronic data interchangeElectronic data interchange
Electronic data interchange
 
What is documentation and its techniques
What is documentation and its techniquesWhat is documentation and its techniques
What is documentation and its techniques
 
Documentation Types
Documentation TypesDocumentation Types
Documentation Types
 
Document Management System
Document Management SystemDocument Management System
Document Management System
 
Document Management With Workflow Presentation
Document Management With Workflow PresentationDocument Management With Workflow Presentation
Document Management With Workflow Presentation
 
Principles of Documentation
Principles of  DocumentationPrinciples of  Documentation
Principles of Documentation
 
Document Management System (DMS)
Document Management System (DMS)Document Management System (DMS)
Document Management System (DMS)
 
Electronic document management perspectives
Electronic document management perspectivesElectronic document management perspectives
Electronic document management perspectives
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Good documentation practice
Good documentation practiceGood documentation practice
Good documentation practice
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
 

Ähnlich wie ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation made on January 29 2014

How to know if your esignature is invalid
How to know if your esignature is invalidHow to know if your esignature is invalid
How to know if your esignature is invalidDeftPDF
 
e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.4Point Solutions
 
The Canadian Perspective: Legal Best Practices for E-Signatures in Insurance
The Canadian Perspective: Legal Best Practices for E-Signatures in InsuranceThe Canadian Perspective: Legal Best Practices for E-Signatures in Insurance
The Canadian Perspective: Legal Best Practices for E-Signatures in Insurancee-SignLive by Silanis
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfMehediHasanShaon1
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature pptRavi Ranjan
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!Process Fusion Inc
 
VIC_contracts_brochure
VIC_contracts_brochureVIC_contracts_brochure
VIC_contracts_brochureClaire James
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2Lucas Gritziotis
 
Whitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature LawWhitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature LawDocuSign
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesVivaka Nand
 
Proof of existence Market Research
Proof of existence Market ResearchProof of existence Market Research
Proof of existence Market ResearchTetsuyuki Oishi
 
Connective Digital Signatures
Connective Digital SignaturesConnective Digital Signatures
Connective Digital SignaturesOlivier Libert
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
Difference Between Digital Signature and Electronic Signature.pdf
Difference Between Digital Signature and Electronic Signature.pdfDifference Between Digital Signature and Electronic Signature.pdf
Difference Between Digital Signature and Electronic Signature.pdfCA Divya
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Market Engel SAS
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signaturesCoSign by ARX
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesTania Fuchs
 
To Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPTo Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPSachi Sawamura
 

Ähnlich wie ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation made on January 29 2014 (20)

How to know if your esignature is invalid
How to know if your esignature is invalidHow to know if your esignature is invalid
How to know if your esignature is invalid
 
e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.e-Signatures: What they are and how can they be used.
e-Signatures: What they are and how can they be used.
 
The Canadian Perspective: Legal Best Practices for E-Signatures in Insurance
The Canadian Perspective: Legal Best Practices for E-Signatures in InsuranceThe Canadian Perspective: Legal Best Practices for E-Signatures in Insurance
The Canadian Perspective: Legal Best Practices for E-Signatures in Insurance
 
csedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdfcsedigitalsignatureppt-170420041737.pdf
csedigitalsignatureppt-170420041737.pdf
 
Seminar presentation on digital signature ppt
Seminar presentation on digital signature pptSeminar presentation on digital signature ppt
Seminar presentation on digital signature ppt
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!
 
VIC_contracts_brochure
VIC_contracts_brochureVIC_contracts_brochure
VIC_contracts_brochure
 
DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2DS-Entrust-SSL-Document-Signing-APR16-WEB2
DS-Entrust-SSL-Document-Signing-APR16-WEB2
 
Whitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature LawWhitepaper: What You Should Know About eSignature Law
Whitepaper: What You Should Know About eSignature Law
 
Presentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificatesPresentation on digital signatures & digital certificates
Presentation on digital signatures & digital certificates
 
Proof of existence Market Research
Proof of existence Market ResearchProof of existence Market Research
Proof of existence Market Research
 
Connective Digital Signatures
Connective Digital SignaturesConnective Digital Signatures
Connective Digital Signatures
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Difference Between Digital Signature and Electronic Signature.pdf
Difference Between Digital Signature and Electronic Signature.pdfDifference Between Digital Signature and Electronic Signature.pdf
Difference Between Digital Signature and Electronic Signature.pdf
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 
The ultimate guide to digital signatures
The ultimate guide to digital signaturesThe ultimate guide to digital signatures
The ultimate guide to digital signatures
 
The Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital SignaturesThe Ultimate Guide to Digital Signatures
The Ultimate Guide to Digital Signatures
 
To Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WPTo Increase Downloads, Instill Trust First WP
To Increase Downloads, Instill Trust First WP
 
Dsc ppt
Dsc  pptDsc  ppt
Dsc ppt
 

Mehr von Market Engel SAS

MODI Vision Health Station
MODI Vision Health StationMODI Vision Health Station
MODI Vision Health StationMarket Engel SAS
 
About aevatar french version
About aevatar french versionAbout aevatar french version
About aevatar french versionMarket Engel SAS
 
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...Market Engel SAS
 
Iot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptIot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptMarket Engel SAS
 
Internet of-things-world-preview-program
Internet of-things-world-preview-programInternet of-things-world-preview-program
Internet of-things-world-preview-programMarket Engel SAS
 
GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014Market Engel SAS
 
Le baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZLe baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZMarket Engel SAS
 
Today's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's surveyToday's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's surveyMarket Engel SAS
 
Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013Market Engel SAS
 
KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux Market Engel SAS
 
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...Market Engel SAS
 

Mehr von Market Engel SAS (20)

MODI Vision Health Station
MODI Vision Health StationMODI Vision Health Station
MODI Vision Health Station
 
About aevatar french version
About aevatar french versionAbout aevatar french version
About aevatar french version
 
About Aevatar
About Aevatar About Aevatar
About Aevatar
 
_ 公司_ Aevatar_Chinese
_ 公司_ Aevatar_Chinese_ 公司_ Aevatar_Chinese
_ 公司_ Aevatar_Chinese
 
Happy new year mmxvi
Happy new year mmxviHappy new year mmxvi
Happy new year mmxvi
 
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
1er Baromètre de la_transformation_digitale_CSC_2015_Les secrets des super he...
 
Iot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrptIot report federal trade commission_150127iotrpt
Iot report federal trade commission_150127iotrpt
 
Internet of-things-world-preview-program
Internet of-things-world-preview-programInternet of-things-world-preview-program
Internet of-things-world-preview-program
 
Happy new year 2015 !
Happy new year 2015 !Happy new year 2015 !
Happy new year 2015 !
 
Sigfox whitepaper
Sigfox whitepaperSigfox whitepaper
Sigfox whitepaper
 
AuditMyApps_English
AuditMyApps_EnglishAuditMyApps_English
AuditMyApps_English
 
GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014GSMA_mobile-economy-report_2014
GSMA_mobile-economy-report_2014
 
Le baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZLe baromètre de la dématerialisation en 2014_YOOZ
Le baromètre de la dématerialisation en 2014_YOOZ
 
Today's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's surveyToday's employees most wanted tools_Ricoh's survey
Today's employees most wanted tools_Ricoh's survey
 
Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013Electronic Signature markets and vendors_Forrester Wave_Q2_2013
Electronic Signature markets and vendors_Forrester Wave_Q2_2013
 
KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux KPMG cree un pole dedie a l’activite Franchise et Reseaux
KPMG cree un pole dedie a l’activite Franchise et Reseaux
 
Gamers in the UK
Gamers in the UKGamers in the UK
Gamers in the UK
 
Gamers in holland
Gamers in hollandGamers in holland
Gamers in holland
 
Gamers in france
Gamers in franceGamers in france
Gamers in france
 
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
BigMat_Une nouvelle maniere de penser le numerique au service des pros_Dossie...
 

Kürzlich hochgeladen

Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandSharisaBethune
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 

Kürzlich hochgeladen (20)

Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
PB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal BrandPB Project 1: Exploring Your Personal Brand
PB Project 1: Exploring Your Personal Brand
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 

ELECTRONIC SIGNATURE_THE FUTURE IS NOW_ALAIN BENSOUSSAN LAW FIRM_presentation made on January 29 2014

  • 1. Electronic Signature 3.0 The future is now Breakfast Meeting of 29 January 2014 29/01/2014 Copyright Lexing 2014 ® Company Confidential 1
  • 2. Introduction Background – Deployment Stakes – New forms of signature Challenge – Compliance 29/01/2014 2Copyright Lexing 2014 ® Company Confidential
  • 3. Extract from LesEchos.fr – 28 01 2014 29/01/2014 3Copyright Lexing 2014 ® Company Confidential Widespread Use of Electronic Signature: - Mutual banks are increasingly using it in their bank branches - Objective: streamline the sale of products via multiple channels
  • 4. OUTLINE 1. State of Play, by Dimitri Mouton, Demaeter  2. Choose the right signature … if possible  3. Deploy without risk … subject to the discretionary assessment of courts  29/01/2014 4Copyright Lexing 2014 ® Company Confidential
  • 5. 1. State of Play - Dimitri Mouton, Demaeter 1. A dreadful mess… 2. Digital signature 101 3. Trends 29/01/2014 5Copyright Lexing 2014 ® Company Confidential
  • 6. 1.1 A DREADFUL MESS… 29/01/2014 6Copyright Lexing 2014 ® Company Confidential
  • 7. PKI Electronic signature Authentication Private key Public key Commitment IGC RSA 2048 bits RGS Certificate CA 3+ class 2 stars Presumption of reliability Tablet Secured signature Advanced signature Qualified certificate Agreement on evidence PIN code Strong authentication SMS Identity theft CRL Timestamp OCSP X.509 V3 Registration authority CSP PSCO RFC 3161 COFRAC ANSSI Electronic Signature Policy PAdES PDF/A XAdES PKCS#7 PKCS#12 French Act of 13 March 2000 French Decree of 30 March 2001 EU Regulation CMS Detached signature java applet Specific to signatory Sole control SSCD Revocation SHA256 Delegation Signature management system On the fly OTP Integrity Non-repudiation Guarantee of origin Traceability Qualified provider Probative value Alice and Bob 29/01/2014 7Copyright Lexing 2014 ® Company Confidential
  • 8. AND A VARIETY OF USES … 29/01/2014 8Copyright Lexing 2014 ® Company Confidential
  • 9. Public procurements B-to-B contracts Registrations Social security declarations Electronic commerce Consumer agreements in branch Notary deeds Electronic minutes Certificate of conformity Diplomas Deeds – Legality control Deliberations Public accounting (“Hélios”) Building work notification Network and pipelines Online banking Administrative formalities Réseau Privé Virtuel des Avocats Réseau Privé Virtuel de la Justice Electronic commercial court Official deeds Chartered accountancyTachograph Employment contracts Attendance sheets Electronic claim form Invoices Bank POA Electronic certified mail Electronic voting 29/01/2014 9Copyright Lexing 2014 ® Company Confidential
  • 10. Types… Scanned signature Handwritten signature on tablets Electronic signature “on the fly” Electronic signature With or without accreditation With or without legal opinion With or without stars 29/01/2014 10Copyright Lexing 2014 ® Company Confidential
  • 11. Components of a digital service Including electronic signature 29/01/2014 11Copyright Lexing 2014 ® Company Confidential
  • 12. 1.2 Electronic signature 101 29/01/2014 12Copyright Lexing 2014 ® Company Confidential
  • 13. Electronic signature: hands-on definition An electronic signature is a signature… … covering an electronic document. Ink marks paper  Cryptography guarantees a link between the signatory and the document 29/01/2014 13Copyright Lexing 2014 ® Company Confidential
  • 14. Certificate: What is it for? • A certificate is an “ID card” issued by a “Certification Authority” (CA) or a “CertificateServiceProvider”(CSP) • It can serve as a tool to: – authenticate (control access) – sign (electronic signature, seal, timestamp) – encrypt (confidentiality) 29/01/2014 14Copyright Lexing 2014 ® Company Confidential
  • 15. PKI • PKI (Public Key Infrastructure), also known in French as “Infrastructure à clef publique” (ICP) or “Infrastructure de Gestion de Clefs” (IGC) is a: Set of technical and human means implemented to issue certificates • Certification Authority (CA): in charge of the PKI – Establishes rules (Certification Policy) – Is responsible for their compliance • Registration Authority (RA): registers holders • Certification Operator (CO): operates machines • Revocation Authority, Validation Authority: perform additional roles. 29/01/2014 15Copyright Lexing 2014 ® Company Confidential
  • 16. Certificate lifecycle 29/01/2014 16Copyright Lexing 2014 ® Company Confidential
  • 17. • Technical generation: – Fingerprint (hash) of the document – Sealing by private key • Additional elements: – Signatory certificate and related certification chain – Time-stamping token – Proof of certificate validity (CRL or OCSP) Signature process 29/01/2014 17Copyright Lexing 2014 ® Company Confidential
  • 18. Verification process • Technical generation: – Fingerprint of the document – Fingerprint initially sealed – Comparison between the two values 29/01/2014 18Copyright Lexing 2014 ® Company Confidential
  • 19. Validity of the certificate The document has been signed by the certificate holder… But who is he? • Check the technical validity of the certificate. – If invalid  WARNING! • Review the certificate holder: – If I don’t trust this CA  WARNING! – If I trust this CA: • Compare the signature date with the certificate validity date • Check the Certificate Revocation List • Everything is OK if: the name on the certificate is the same as the signatory name. But Was the signatory empowered to sign? Is the document signed correct regarding its form? its substance?  Next step after technical verification: legal verification! 29/01/2014 19Copyright Lexing 2014 ® Company Confidential
  • 20. Example: Adobe Reader signature 29/01/2014 20Copyright Lexing 2014 ® Company Confidential
  • 21. Signature formats • AdES = Advanced Electronic Signature • 3 formats: – PAdES = PDF format – CAdES = CMS / PKCS#7 format – XAdES = XML format • Choice is to be made according to the constraints of the project • All allow to include the same elements 29/01/2014 21Copyright Lexing 2014 ® Company Confidential
  • 22. Various levels of certificates • The level of security offered by a certificate depends on: – the registration procedures – the token holding the private key (physical/software) – the commitments of the Certification Authority • The different levels set by the French General Security Reference System (RGS) correspond to legal realities: * Remote Registration Software token “Simple” electronic signature ** Face-to face registration Physical token “Secure” electronic signature *** Face-to face registration Secure physical token Qualified certificate “Presumed reliable” electronic signature 29/01/2014 22Copyright Lexing 2014 ® Company Confidential
  • 23. Trust rules • Trust means you feel secure • But trust does not mean you don’t need to be careful! Weak Chain of Trust Strong Chain of Trust 29/01/2014 23Copyright Lexing 2014 ® Company Confidential
  • 24. 1.3 TRENDS 29/01/2014 24Copyright Lexing 2014 ® Company Confidential
  • 25. “Autonomous” electronic signature • The signatory purchased a certificate from a CA • He possesses an electronic signature tool on his workstation • He autonomously signs on his workstation 29/01/2014 25Copyright Lexing 2014 ® Company Confidential
  • 26. Electronic signature by applet • The signatory purchased a certificate from a CA • The signature tool is included in the service • The signatory signs on his workstation when using the service 29/01/2014 26Copyright Lexing 2014 ® Company Confidential Server
  • 27. “On the fly” electronic signature (1/4) • The signatory has no certificate and no e-signature tool • The server displays the contracts and he gives his agreement 29/01/2014 27Copyright Lexing 2014 ® Company Confidential Server
  • 28. • The server checks the identity of the signatory by sending him a challenge by SMS “On the fly” electronic signature (2/4) 29/01/2014 28Copyright Lexing 2014 ® Company Confidential Server
  • 29. “On the fly” electronic signature (3/4) • The server generates a dual signature key • It generates a certificate in the name of the signatory • It uses the private key to sign the document • Then it destroys the private key 29/01/2014 29Copyright Lexing 2014 ® Company Confidential Server
  • 30. “On the fly” electronic signature (4/4) • Document is signed on the server! • For the next signature, a new certificate will be generated 29/01/2014 30Copyright Lexing 2014 ® Company Confidential Server
  • 31. Virtual smart card (1/3) • The signatory does not need an electronic signature tool • His certificate is stored on the server in a secure area (HSM) • The server displays the contract and he gives his agreement 29/01/2014 31Copyright Lexing 2014 ® Company Confidential Server
  • 32. • The server checks the identity of the signatory by sending him a challenge by SMS Virtual smart card (2/3) 29/01/2014 32Copyright Lexing 2014 ® Company Confidential Server
  • 33. Virtual smart card (3/3) • Document is signed on the server! • For the next signature, the same certificate will be used 29/01/2014 33Copyright Lexing 2014 ® Company Confidential Server
  • 34. Signature on a tablet • Clients see the contract when in the bank branch or in store • They affix their handwritten signature on the tablet • An electronic signature is generated “on the fly” in addition to the handwritten signature 29/01/2014 34Copyright Lexing 2014 ® Company Confidential Server
  • 35. Electronic seal • Documents are produced via an automated process and sent to the server • The server has a certificate in the name of the legal entity • The electronic seal is an “electronic signature” of the legal entity • It can be affixed automatically 29/01/2014 35Copyright Lexing 2014 ® Company Confidential Server
  • 36. THE Trend …: “rematerialization” First name Last Name Address Invoice From XYZ amounting to a proof of domicile Services……………… €123 “First name Last name Address XYZ €123” 29/01/2014 36Copyright Lexing 2014 ® Company Confidential
  • 37. First name Last Name Address Invoice From XYZ amounting to a proof of domicile Services……………… €123 Exploitation of 2D-DOC code “First name Last name Address XYZ €123” Technical verification Visual verification 29/01/2014 37Copyright Lexing 2014 ® Company Confidential
  • 38. 2. How to choose the electronic signature? 1. Regulation on Digital process 1. Absence of choice 2. Choice 29/01/2014 38Copyright Lexing 2014 ® Company Confidential
  • 39. 2.1 REGULATION ON DIGITAL PROCESS 29/01/2014 39Copyright Lexing 2014 ® Company Confidential
  • 40. Prerequisites: Regulation Le papier sauf …Electronic law Paper required unless... agreement on evidence Obligation to process electronic documents Right to create electronic documents Law of 13 March 2000 (e-signature/e-evidence) Before 2000 Law of 21 June 2004 (LCEN) Law of 4 August 2008 (modernization of economy) Agreement on evidence ad probationem French State required to receive electronic invoices ad validitatem Order of 8 December 2005 (e-government) 29/01/2014 40Copyright Lexing 2014 ® Company Confidential
  • 41. Yes, it is possible, but … 3 scenarios Prefilled e.g.: pay slip or declaration of interest Imposed e.g.: electronic certified mail Free … for the moment 4129/01/2014 Copyright Lexing 2014 ® Company Confidential
  • 42. And even if it is possible … “Art. 1316-4 of Civil Code is not everything…” “Whereas the employer complains that the judgment found that the dismissal was unfair, whereas according to the ground of appeal, if a party contests the authenticity of an email, it is up to the judge to determine whether the conditions laid down in articles 1316-1 and 1316-4 of the Civil Code for the validity of an electronic document or signature are met; Whereas by asserting that the manager of AGL Finances “is the author and the sender" of an email whose authenticity was contested, on the grounds that the employer [did] not prove that the sender’s address mentioned on the email is wrong or that the company mailbox has been hacked" and that “in any event, such a hacking could not be attributed to Ms. X...”, without checking, as it was required to do, whether that email had been established and maintained in conditions that guarantee its integrity and whether it contained an electronic signature resulting from the use of a reliable identification process, the Court of Appeals decision has no legal basis under Articles 287 of the Code of Civil Procedure , 1316-1 and 1316-4 of the Civil Code; But the provisions invoked by the ground of appeal are not applicable to an email produced to prove a fact, as its existence can be established by any means of evidence, which are assessed at their discretion by the trial judges; accordingly the ground of appeal is unfounded.” French Cour de Cassation, social chamber, 25 Sept. 2013 4229/01/2014 Copyright Lexing 2014 ® Company Confidential
  • 43. First Thing First… • Do you need to prove a right or a fact? • Free proof or imposed proof – Imposed = civil matters – Free … more or less everything else • criminal, administrative, employment matters 29/01/2014 43Copyright Lexing 2014 ® Company Confidential
  • 44. The question is therefore… 1. Do I need it? (investment management) 2. If you can move mountains, you can move molehills… (risk management) 29/01/2014 Copyright Lexing 2014 ® Company Confidential 44
  • 45. 2.2 ABSENCE OF CHOICE… 29/01/2014 Copyright Lexing 2014 ® Company Confidential 45
  • 46. Example of a “no choice” scenario To be presumed reliable within the meaning of above-mentioned Article 2 of Decree of 30 March 2001, the electronic signature procedures available to judges, registry officers and persons authorized under Article R. 123-14 of the Code of Judicial Organization must meet the three stars (***) level of the General Security Reference System (RGS). In addition, the signature must be secure and be created by a secure process certified in accordance with the conditions laid down in Article 3 of said Decree. The procedure for filing and registration of the identification and credentials data of these persons is subject to the initiative and responsibility of the Ministry of Justice. French Order of 18 October 2013 on electronic signature of court decisions issued in civil matters by the Cour de cassation 4629/01/2014 Copyright Lexing 2014 ® Company Confidential
  • 47. Another example… with less legalese  • “The documents of administrative authorities may be subject to an electronic signature. The latter is validly applied only by use of a method, compliant with the rules of general security framework referred to in Article 9 point I, which allows identification of the signatory, guarantees the link of the signature with the document to which it is attached and ensures the integrity of said document.” • “The electronic certificates issued to administrative authorities and their agents in order to ensure their identification in the context of an information system are subject to a validation by the State under conditions laid down by decree.” Ordinance 2005-1516 du 8-12-2005 on the electronic exchanges between citizens and administrative authorities (Art. 8) 4729/01/2014 Copyright Lexing 2014 ® Company Confidential
  • 48. 2.3 TIME TO CHOOSE! 4829/01/2014 Copyright Lexing 2014 ® Company Confidential
  • 49. A complex reality • 4 legal concepts (Decree of 30 March 2001) – Simple – Secured + Digital – Presumed reliable • Geographical approach: – Advanced (Dir. 1999/93/EC of 13 December 1999) Secure (Decree of 30 March 2001) – Digital signature / Electronic signature • At least 3 technical realities: – RGS: one star (*) – RGS: two stars (**) – RGS: three stars (***) RGS = General Security Reference System 3 DEGREES OF RELIABILITY = 3 SIGNATURES 29/01/2014 49Copyright Lexing 2014 ® Company Confidential
  • 50. Where choice is possible … Click Electronic signature Secured electronic signature Digital signature Electronic signature presumed reliable 5029/01/2014 Copyright Lexing 2014 ® Company Confidential
  • 51. Basic method Create evidence • One signatory / Several signatories • One document / a series of documents • One channel/ Multi-channel • Geographic distance Administer evidence • Produce it in urgency (summary procedure) • Produce it in specific conditions (criminal; supervising entities) Manage dispute • Electronic signature presumed reliable – High risk for evidence to be contested • Amount is high and risk for situation to be deadlocked • Amount is not the essential element (high risk for low value contracts to be contested) • Be careful of false hopes - Technical expertise ahead 29/01/2014 51Copyright Lexing 2014 ® Company Confidential
  • 52. Legal prerequisites Contractual commitments Legalprovisions ( “LCEN” Act) Public/Private sector 29/01/2014 52Copyright Lexing 2014 ® Company Confidential Choosing a solution means choosing…a provider
  • 53. Choosing a solution means choosing…a provider Decision Legal & technical prerequisites Contractual commitments Maintenance of standards and certifications Insurance coverage 29/01/2014 53Copyright Lexing 2014 ® Company Confidential
  • 54. 3. Legal security 1. Backbone 2. Upstream security 3. Downstream security 29/01/2014 54Copyright Lexing 2014 ® Company Confidential
  • 55. 3.1 BACKBONE: AGREEMENT ON EVIDENCE 29/01/2014 55Copyright Lexing 2014 ® Company Confidential
  • 56. Legal approach • “Where a statute has not fixed other principles, and failing a valid agreement to the contrary between the parties, the judge shall regulate the conflicts in matters of documentary evidence by determining by every means the most credible instrument, whatever its medium may be.” French Civil Code, Art. 1316-2 29/01/2014 56Copyright Lexing 2014 ® Company Confidential
  • 57. Escalation of “powers” Law Agreement Judge 29/01/2014 57Copyright Lexing 2014 ® Company Confidential
  • 58. Concept of “validity” Substance Enforceability Access B to C B to B A to C 29/01/2014 58Copyright Lexing 2014 ® Company Confidential
  • 59. A real organization … Agreement on evidence Traceability Policy Time Stamping Policy Security Policy Certification Policy Archives Policy XXX Policy 29/01/2014 59Copyright Lexing 2014 ® Company Confidential
  • 60. Another question... Clause? Contract? 29/01/2014 60Copyright Lexing 2014 ® Company Confidential
  • 61. Organizing an agreement on evidence Recitals Article 1 Definitions Article 2 Effect – Enforceability Article 3 Term – Limitation periods Article 4 Purpose Article 5 Scope Article 6 Identification Article 7 Authentication Article 8 Integrity Article 9 Durability Article 10 Storage Article 11 Time Stamping Article 12 Traceability Article 13 Signature Article 14 Liability Article 15 … 29/01/2014 61Copyright Lexing 2014 ® Company Confidential
  • 62. Having an agreement on evidence is not enough; Need to organize evidence and access to evidence Evidence record Evidence trial Agreement on evidence Vision of the situation Technical justification Legal basis Basis Organization of evidence Access to evidence 29/01/2014 62Copyright Lexing 2014 ® Company Confidential
  • 63. 3.2 LEGAL BUILD (UPSTREAM SECURITY) 29/01/2014 63Copyright Lexing 2014 ® Company Confidential
  • 64. Feasibility study (Yes or No) Legal impact study (Go or No Go) Legal basis (public sector – e-government) Compliance review (legal opinion) Electronic document management policy Platform terms of access (on line) Employee information Data Protection Authority (CNIL) Insurance 29/01/2014 64Copyright Lexing 2014 ® Company Confidential
  • 65. Risk of “legal bug” Do not get confused… Agreement related to evidence Agreement related to digital process 29/01/2014 65Copyright Lexing 2014 ® Company Confidential
  • 66. 3.3 LEGAL RUN (DOWNSTREAM SECURITY) 29/01/2014 66Copyright Lexing 2014 ® Company Confidential
  • 67. Delegation of electronic signature Terms of use of e-signature book IS Policy (adaptation) Internal Audit (reliable audit trail) Provider governance Provider audit Legal watch Right of access unit Crisis management 29/01/2014 67Copyright Lexing 2014 ® Company Confidential
  • 68. 4. BUT IS IT ENOUGH? 29/01/2014 68Copyright Lexing 2014 ® Company Confidential
  • 69. Security aspects of digital process Electronic Signature Identity management Certificates Confidentiality Archiving Traceability TimeStamping 29/01/2014 69Copyright Lexing 2014 ® Company Confidential
  • 70. Security is everybody’s business • Application developers must take account of security… • But a global vision is needed! • Involvement and responsible attitude from each stakeholders is essential for technical and legal security measures to be fully efficient. 29/01/2014 70Copyright Lexing 2014 ® Company Confidential
  • 71. Find out more… 29/01/2014 71Copyright Lexing 2014 ® Company Confidential
  • 72. Next Breakfast Meeting Mayors and MPs: How to protect your e-reputation & name February 12, 2014 Speakers: Virginie Bensoussan-Brulé & Claudine Salomon 29/01/2014 72Copyright Lexing 2014 ® Company Confidential
  • 73. 29/01/2014 73Copyright Lexing 2014 ® Company Confidential
  • 74. Contact Photos & Illustrations Credits Networking©Scott Maxwell-Fotolia.com informatique data room réunion binary stream©Mike Kiev-Fotolia.com Emblème France©illustrez-vous-Fotolia.com Road to Success - Up Arrow©iQoncept-Fotolia.com Businessman entering the labyrinth©Scanrail-Fotolia.com Dessins tirés de Sécurité de la dématérialisation © Stéphane Torossian – http://graphiste-free-lance-sato.jimdo.com Lexing is a registered trademark of Alain Bensoussan Selas Demaeter is a registered trademark of Demaeter Sarl Me Eric Barbry Head of the Digital Law Practice Group Tel +33 (0)6 13 28 91 28 eric-barbry@alain-bensoussan.com Me Polyanna Bigle Head of ISS & Electronic Documents Department Tel +33 (0)6 42 32 16 09 polyanna-bigle@alain-bensoussan.com Mr. Dimitri Mouton – Demaeter Consultant expert in dematerialisation & security Tel +33 (0)6 59 10 99 37 dimitri.mouton@demaeter.fr – www.demaeter.fr 29/01/2014 74Copyright Lexing 2014 ® Company Confidential