1 / 20

Electronic Contracts- eSign & UETA

Electronic Contracts- eSign & UETA. Copyright, Peter S. Vogel, 2004-2008. Federal e-Sign Act (2000). S. 761 -Electronic Signatures in Global and National Commerce Act Effective October 2000 Permits the use of digital signature for authentication of transactions

tilly
Download Presentation

Electronic Contracts- eSign & UETA

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Electronic Contracts-eSign & UETA Copyright, Peter S. Vogel, 2004-2008

  2. Federale-SignAct(2000) • S. 761 -Electronic Signatures in Global and National Commerce Act • Effective October 2000 • Permits the use of digital signature for authentication of transactions • Empowers the use of online contracting and provision of notices

  3. TexasUETA • SB 393 -Uniform Electronic Transactions Act • Effective January 1, 2002 • Applies only to transactions between parties each of which has agreed to conduct transactions by electronic means. • Whether the parties agree to conduct a transaction by electronic means is determined from the context and surrounding circumstances, including the parties' conduct.

  4. Chapter 43 – Texas Business & Commerce Code

  5. TexasOnline

  6. http://www.dir.state.tx.us/standards/UETA_Guideline.htm

  7. http://www.dir.state.tx.us/standards/srrpub13.htm

  8. http://www.dir.state.tx.us/standards/srrpub13-approved-list-of-CAs.htmhttp://www.dir.state.tx.us/standards/srrpub13-approved-list-of-CAs.htm

  9. Entrust.com

  10. Entrust- Terms and Conditions of Use

  11. Verisign

  12. ABA 1996

  13. The Figure below describes the process of digital signature creation. To sign a document or any other item of information, the signer first delimits precisely the borders of what is to be signed. The delimited information to be signed is termed the ‘message’ in these Guidelines. Then a hash function in the signer’s software computes a hash result unique (for all practical purposes) to the message. The signer’s software then transforms the hash result into a digital signature using the signer’s private key. The resulting digital signature is thus unique to both the message and the private key used to create it. Digital signature verification

  14. Verification of a digital signature Verification of a digital signature, as illustrated in below, is accomplished by computing a new hash result of the original message by means of the same hash function used to create the digital signature. Then, using the public key and the new hash result, the verifier checks: (1) whether the digital signature was created using the corresponding private key; and (2) whether the newly computed hash result matches the original hash result which was transformed into the digital signature during the signing process. The verification software will confirm the digital signature as “verified” if: (1) the signer’s private key was used to digitally sign the message, which is known to be the case if the signer’s public key was used to verify the signature because the signer's public key will verify only a digital signature created with the signer's private key; and (2) the message was unaltered, which is known to be the case if the hash result computed by the verifier is identical to the hash result extracted

  15. Judicial Committee on Information Technology (JCIT)

More Related