64
drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university of montreal university of montreal chair in e-Security and e-Business law www.gau trais.com

Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

Embed Size (px)

Citation preview

Page 1: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

drt 6455 eCommerce Lawlesson 2 – Legal Security

MangementExample of An Act to Establish a Legal Framework for IT

associate professorfaculty of law

university of montrealuniversity of montreal chair

in e-Security and e-Business law www.gautrais.com

Page 2: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

2

An Act to establish a legal framework for information technology (Quebec)

(L.R.Q. c-1.1)

Page 3: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

3

Know your Law : Guide Respecting the Management of Technology-based documents - An Act to establish a legal framework

for information technology (R.S.Q., C-1.1) (11/2005)

Afin d’y voir clairGuide relatif à la gestion des documents technologiques

Page 4: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

4

plan

1 – Legal change, new legislation … a guide

2 – Guiding Principles of the Act

3 – Managing technology-based documents in a secure manner

4 – Use of technology-based documents as evidence

5 – Legal Management of Digital Signature

Page 5: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

5

1

Page 6: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

6

2.1 illustrations of innovation

• New risks

• New technologies

•New advantages

•New inconvenients

•New objectives

• New words

• New laws

Page 7: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

7

2.1.A new risks• Ignorance• Immateriality • Habits • Obscurity • Internationality • Identification of document attributes

–Confidentiality –Authentification –Non-repudiation –Disponibility–Integrity

Page 8: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

8

2.1.B new technologies

• technology-based document

• Email = technology-based address

• Internet

• « Log »

• Identifier

• etc.

Page 9: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

9

2.1.C new advantages

• Quick

• Efficient

• Transportable

• Immaterial

Page 10: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

10

2.1.D new inconvenients

• Quick • Immaterial • New• Habit • Multiplicity • Effectivity

–Law is not clear (EX: 34) –34. « Where the information contained in a document

is declared by law to be confidential, confidentiality must be protected by means appropriate to the mode of transmission, including on a communication network. »

–Law is difficult to apply

Page 11: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

11

2.1.E new objectives

• Remove barriers to eCommerce–EX: writing–EX: signature –EX: original

• Precise security–EX: email / SMS–EX: what’s means to be secure?

• protect people –EX: 29 AELFIT

Page 12: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

12

identifier

etc…

transfer

documentation

certification

document

technology-based document

Life cycle

2.1.F new words

Page 13: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

13

2.1.G new laws

• New

• Processual –EX: SOX

• Section 404 and Internal control

–EX: PIPEDA • Schedule 1

–EX: AELFIT

Page 14: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

14

2

Page 15: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

15

2-2-A Technological neutrality

• Law doesn’t favor one technology in particular –EX: Utah, Singapore, Italy, Portugal, Germany, etc. –EX: certification

• But law need to be a little prescriptive –Neutre doesn’t mean silence–Silence in laws

• EX: What’s the meaning of « Integrity »? • EX: 34 AELFIT

Page 16: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

16

2-2-A Technological neutrality

• United Nations Convention on the Use of Electronic Communications in International Contracts (2005)

–8.1. A communication or a contract shall not be denied validity or enforceability on the sole ground that it is in the form of an electronic communication.

–9.1 Nothing in this Convention requires a communication or a contract to be made or evidenced in any particular form.

• AELFIT–5. The legal value of a document, particularly its capacity to produce

legal effects and its admissibility as evidence, is neither increased nor diminished solely because of the medium or technology chosen.

• Chinese Law–Article 7  The use of a data message as evidence may not be refused

solely on the grounds of its creation, transmission, receipt or storage in electronic, optical, magnetic or other similar fo

Page 17: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

17

2-2-B Functional equivalent

• What are functions of paper and transpose them to electronic

–Document finding a criteria –writing transposable –Signature at each concept–Original –Copy

Page 18: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

18

2-2-C integrity

• Main criteria which give some « Legal Value » to a document

–Evidence • Admissibility • Probative force

–But what it is?

Page 19: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

19

writing

• AELFIT (L.R.Q. c. C-1.1) art. 5

• (2) A document whose integrity is ensured has the same legal value whether it is a paper document or a document in any other medium, insofar as, in the case of a technology-based document, it otherwise complies with the legal rules applicable to paper documents.

• (…)

• Where the law requires the use of a document, the requirement may be met by a technology-based document whose integrity is ensured.

Page 20: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

20

2839.  The integrity of a document is ensured if it is possible to verify that the information it contains has not been altered and has been

maintained in its entirety, and that the medium used provides stability and the required

perennity to the information.

2839 CCQ

Page 21: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

21

2-2-D writing

• Examples of laws requiring a writing form–13 (4) Copyright Act –19 Consumer Protection Act (Ontario)–Consumer Protection Act (Quebec)

• What are writing functions (see UNCITRAL eCommerce Model Law with Guide to Enactment (1996))

Page 22: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

22

writing48. In the preparation of the Model Law, particular attention was paid to the

functions traditionally performed by various kinds of “writings” in a paper-based environment. For example, the following nonexhaustive list indicates reasons why national laws require the use of “writings”: (1) to ensure that there would be tangible evidence of the existence and nature of the intent of the parties to bind themselves; (2) to help the parties be aware of the consequences of their entering into a contract; (3) to provide that a document would be legible by all; (4) to provide that a document would remain unaltered over time and provide a permanent record of a transaction; (5) to allow for the reproduction of a document so that each party would hold a copy of the same data; (6) to allow for the authentication of data by means of a signature; (7) to provide that a document would be in a form acceptable to public authorities and courts; (8) to finalize the intent of the author of the “writing” and provide a record of that intent; (9) to allow for the easy storage of data in a tangible form; (10) to facilitate control and sub-sequent audit for accounting, tax or regulatory purposes; and (11) to bring legal rights and obligations into existence in those cases where a “writing” was required for validity purposes.

Page 23: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

23

writing

• UNCITRAL Model Law criteria: article 6usable for subsequent reference

• As in Ontario • And in REC (est of Canada) • As in United Nations Convention on the Use of

Electronic Communications in International Contracts (2005)– 9.2. Where the law requires that a communication or a contract

should be in writing, or provides consequences for the absence of a writing, that requirement is met by an electronic communication if the information contained therein is accessible so as to be usable for subsequent reference.

Page 24: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

24

writing

French Law (March 12th, 2000)

http://www.legifrance.gouv.fr/citoyen/jorf_nor.ow?numjo=JUSX9900020L

Art. 1316-1. - L'écrit sous forme électronique est admis en preuve au même titre que l'écrit sur support papier, sous réserve que puisse être dûment identifiée la personne dont il émane et qu'il soit établi et conservé dans des conditions de nature à en garantir l'intégrité.

Page 25: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

25

writing• Problem with usable for subsequent reference Criteria

–EX: arbitration clause (2640 CCQ)–EX: CPA–No way to be aware (criteria number 2)

• Problem with integrity criteria too • Problem with distinct criterias. de critères distincts

–Integrity–Usable for subsequent reference–Visible Form (UK)–Record (UETA)

Page 26: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

26

2-2-E signature

• 2827 CCQ: A signature is the affixing by a person, to a writing, of his name or the distinctive mark which he regularly uses to signify his intention. .

• Limitations concerning biometry usage in AELFIT ART. 44

- No obligation - Finality - Destruction - Transparence to the Information Access Commission (CAI) - Etc

Page 27: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

27

signature

Electronic signature: is it reliable ?

Is it legal ?

Page 28: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

28

signature

Difficult to say

because definition is not so clear

because contract decline every liability 2

1

Page 29: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

29

signature

liability is a legal concept

Page 30: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

30

signature

signature is too …

Page 31: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

31

signature

1) Identity of signatory

2) Intention to sign

Page 32: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

32

signature

United Nations Convention on the Use of Electronic Communications in International Contracts (2005)

9. 3. Where the law requires that a communication or a contract should be signed by a party, or provides consequences for the absence of a signature, that requirement is met in relation to an electronic communication if:

• (a) A method is used to identify the party and to indicate that party’s

• intention in respect of the information contained in the electronic communication;

Page 33: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

33

signature

• Same in Quebec and Civil Code of Quebec (1994) (2827 CCQ)

• Ontario et Electronic Commerce Act (2000)• British Columbia et Electronic Transaction Act (2001) • China

– Article 2  All references to an "electronic signature" in this law are to electronic data that are contained in or attached to a data message and are used to identify the signatory and indicate its endorsement of the contents of such data message.

But there’s an other criteria

Page 34: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

34

signature

United Nations Convention on the Use of Electronic Communications in International Contracts (2005)

9. 3. and(…) (b) The method used is (…) :(i) As reliable as appropriate for the purpose for which the electronic communication was generated or communicated, in the light of all the circumstances, including any relevant agreement;

Page 35: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

35

signature

Ontario and Electronic Commerce Act

(…) • (a) the electronic signature is reliable for the

purpose of identifying the person; and• (b) the association of the electronic signature

with the relevant electronic document is reliable.

Page 36: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

36

signature

British Columbia and Electronic Transaction Act

(…) • 21 (d) prescribing records or classes of records for which

a requirement under law for the signature of a person must be satisfied by an electronic signature and proof that, in view of all the circumstances including any relevant agreement and the time the electronic signature was made,

• (i)  the electronic signature is reliable for the purpose of identifying the person, and

Page 37: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

37

signature

Uniform Electronic Transaction Act (USA)

“the use of security procedures is simply one method for proving the source or content of an electronic record or signature. A security procedure may be technologically very sophisticated, such as an asymetric cryptographic system. At the other extreme the security procedure may be as simple as a telephone call to confirm the identity of the sender through another channel of communication. It may include the use of a mother's maiden name or a personal identification number (PIN). Each of these examples is a method for confirming the identity of a person or accuracy of a message.”

Page 38: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

38

signature

Reliability ?

security procedure ?

Page 39: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

39

signature

contract decline its liability

Page 40: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

40

Page 41: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

41

signature

information = oxygen

Page 42: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

42

signature

If no liability = no security

Page 43: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

43

2-2-F original• AELFIT (L.R.Q. c. C-1.1) ART. 12

12.  A technology-based document may fulfil the functions of an original. To that end, the integrity of the document must be ensured and, where the desired function is to establish

1) that the document is the source document from which copies are made, the components of the source document must be retained so that they may subsequently be used as a reference ;

 2) that the document is unique, its components or its medium must be structured by a process that makes it possible to verify that the document is unique, in particular through the inclusion of an exclusive or distinctive component or the exclusion of any form of reproduction ;

 3) that the document is the first form of a document linked to a person, its components or its medium must be structured by a process that makes it possible to verify that the document is unique, to identify the person with whom the document is linked and to maintain the link throughout the life cycle of the document.

Page 44: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

44

original

a) source document = integrity

Signed contract

Page 45: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

45

original

b) Single document = integrity + application

Bill of lading

Page 46: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

46

original

c) First form of a document linked to a person = integrity + application

Will

Page 47: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

47

3

Page 48: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

48

2-3 Managing Technology-based document in a secure manner

• Transfert

• Retention

• Accessibility

• Transmission

Page 49: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

49

transfert

• Definition: to change a technology-based document from one medium to an other. • Example: an enterprise numerize sums of papers on a couple of CD.

• Legal conditions: –1) documentation with WHO – WHAT – HOW; –2) ensure integrity.

Page 50: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

50

Retention

•Definition: to store documents so that they can be found later. • Examples:

–a consumer buys a product online. –For administrative or taxation reasons, an entreprise need to retain

large number of documents, something for 3 or 6 or 10 years. • Legal Conditions :

–1) Désignate an assigned person, within the organization, for security matters or sub-contract to a trird-party service.

–2) Ensure that documents kept are:• Complete • Available throughout the time thay are retained.

–3) Ensure that the assigned person who modifies a retained document, and thus knowingly, compromise the integrity of the document, explains in the document itself:

• WHO• WHAT • HOW • WHEN

Page 51: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

51

consultation • Definition: To make a document presented in intelligible form to the authorized persons. • Examples:

–PIPEDA / all Privacy protection acts–Securities Act

• Legal Conditions : –intelligible, legible. –Freedom to choice paper or electronic –Organization of confidential documents access

• Limiting access• Identifying an assigned person;• Ensuring it is impossible to do an extensive search;• Setting up a secure system;• Respecting conditions about confidential document.

Page 52: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

52

transmission • Definition: To send a document from one person to an other. • Example:

–Email –EDI–SMS

• Legal Conditions: For a sent document to have the same validity as the received document:

–Ensure integrity + documentation –Assume that a technology-based document is sent when the sender has

no more control on it. (For example, with a transmission slip) –Assume that a technology-based document is received when it is

available to the recipient. (For example, with a acknowledgement of receipt) –Ensure that a technology-based document with confidential information

• Used an appropriate method• Transmission is documented

Page 53: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

53

4

Page 54: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

54

2-4 evidence

evidence = integrity + identity

2 presumptions1) Environment

2) Document from entreprise and State

Page 55: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

55

evidence

• Is an email admissible?

Page 56: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

56

• Not sure…

–  Bélanger c. Future Électronique, 2005 QCCRT 0570

–  Citadelle, Cie d’assurance générale c. Montréal (Ville), 2005 IIJCan 24709 (QC C.S.)

–  Vandal c. Salvas [2005] IIJCan 40771 QC. C.Q.

AELFIT

Page 57: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

57

• Regulation help

–  articles 63 and f…

63. A multidisciplinary committee shall be formed to promote the harmonization, both at the national and international levels, of the technical processes, systems, norms and standards established for the purposes of this Act. To that end, the Government shall, after consultation with the Bureau de normalisation du Québec, call upon persons from the business community, the information technology industry and the scientific and technical community, persons from the public, parapublic and municipal sectors and persons belonging to the professional orders, all of whom must have expertise in the field of information technology

AELFIT

Page 58: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

58

conclusion

Page 59: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

59

principle 1: documentation

transmission

confidential documents

retention

transfert

improve evidence

Page 60: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

60

2.5 Legal Management of Digital Signature

Image available at

pst.libre.lu/mssi-luxmbg/p1/data-enc.gif

Page 61: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

61

2.5 Legal Management of Digital Signature

• 3 main legislative attitude – Minimalist

• UK– Prescriptive

• Singapore• Portugal • Hungary• Hong Kong• Malaysia • Italy • Germany

– Hybrid • Quebec• France • Etc.

Page 62: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

62

2.5 Legal Management of Digital Signature

• Substantives elements – Certificate – Documentation

• Policy• CPS (Certification Practice Statement)

– Participants • Signatory • Relying Party • Certification authority • And others (as auditor / accreditator / etc.)

– Liability

Page 63: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

63

2.5 Legal Management of Digital Signature

• Procedural elements– Entities Responsible for Controlling the

Certification Process• Auditor • Accreditator • Certificator • Etc.

– Documentation • External Assessment Documentation • Internal Assessment Documentation

Page 64: Drt 6455 eCommerce Law lesson 2 – Legal Security Mangement Example of An Act to Establish a Legal Framework for IT associate professor faculty of law university

64

ex. of complexity