75
Electronic Document & Signatures Joint International Doctoral degree in Law, Science and Technology http://www.last-jd.eu Michele Martoni Contract Professor at the University of Bologna Ph.D. in IT Law | Lawyer December 10, 2012, Bologna

Electronic Document & Electronic Signatures

Embed Size (px)

DESCRIPTION

Joint International Doctoral degree in Law, Science and Technology http://www.last-jd.eu

Citation preview

Page 1: Electronic Document & Electronic Signatures

Electronic Document & Electronic Document &

Signatures

Joint International Doctoral degree in

Law, Science and Technology

http://www.last-jd.eu

Michele Martoni

Contract Professor at the University of Bologna

Ph.D. in IT Law | Lawyer

December 10, 2012, Bologna

Page 2: Electronic Document & Electronic Signatures

0. Roadmap

1) Electronic Identification

2) Identity theft and Data Value (Social 2) Identity theft and Data Value (Social Engineering, OSINT, Phishing, Uncorrected

sharing of personal data - email, social network, cloud computing services, etc.)

3) Technical Introduction

4) Document and Signing

slide 2

4) Document and Signing

5-6) Regulatory Framework (UE and Italian)

Page 3: Electronic Document & Electronic Signatures

1. Electronic Identification

• Is there a way for remote certification of our identity ? Yes !identity ? Yes !

• Is there a way to certify the integrity of an

electronic document ? Yes !

• We have technologies. We have norms. But we need to be aware of the correct use !

• the risk is to use and to share our

slide 3

• the risk is to use and to share our

informations in a way that allow the “abuse”

of these by third person

Page 4: Electronic Document & Electronic Signatures

2. Identity theft & Identity fraud

• Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming someone's identity in which someone pretends to be someone else by assuming that person's identity.

• Identity theft is not always detectable by the individual victims, according to a report done for the FTC. Identity fraud is often but not necessarily the consequence of identity theft.

slide 4

theft.

(1) http://en.wikipedia.org/wiki/Identity_theft(2) Federal Trade Commission, 2006, Identity Theft Survey Report

Page 5: Electronic Document & Electronic Signatures

2.1. Social Engineering

• Social engineering, in the context of security, is understood to mean the art of manipulating people into performing actions or divulging confidential understood to mean the art of manipulating people into performing actions or divulging confidential information (also personal).

• All social engineering techniques are based on specific attributes of human decision-making known as cognitive biases. These biases, sometimes called bugs in the human hardware, are exploited in various combinations to create attack techniques.

slide 5

various combinations to create attack techniques.

(1) http://en.wikipedia.org/wiki/Social_engineering_(security)

Page 6: Electronic Document & Electronic Signatures

2.2. Phishing

• Phishing is a technique of fraudulently obtaining private information.private information.

• Typically, the phisher sends an e-mail that appears to come from a legitimate business—a bank, or credit card company—requesting "verification" of information and warning of some dire consequence if it is not provided.

• The e-mail usually contains a link to a fraudulent web page that seems legitimate—with company

slide 6

web page that seems legitimate—with company logos and content—and has a form requesting everything from a home address to an ATM card’s PIN code.

Page 7: Electronic Document & Electronic Signatures

2.3. Personal data sharing

Ex. Facebook’s Statement of Rights and Responsabilities

Art. 2. Sharing Your Content and InformationArt. 2. Sharing Your Content and Information

You own all of the content and information you post on Facebook, and you can control how it is shared through your privacy and application setting. In addition:

For content that is covered by intellectual property rights, like photos and videos (IP content), you specifically give us the following permission, subject to your privacy and application settings: you grant us a non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP content that you post on or in connection with Facebook (IP License). This IP License ends when

slide 7

connection with Facebook (IP License). This IP License ends when you delete your IP content or your account unless your content has been shared with others, and they have not deleted it.

(1) http://www.facebook.com/legal/terms

Page 8: Electronic Document & Electronic Signatures

3. Technical Introduction

• The correct classification of the

electronic signatures institute requires electronic signatures institute requires to start its examination from the

essence of this technology.

• Electronic signatures could be

complex and modern applications of

slide 8

complex and modern applications of cryptography

Page 9: Electronic Document & Electronic Signatures

3. Technical Introduction

• We can distinguish:– Cryptography– Cryptography

– Cryptanalysis

• The run between cryptography and cryptanalysis has led to the development of increasingly sophisticated techniques.

• We can distinguish:

slide 9

• We can distinguish:– Steganography

– Cryptography

Page 10: Electronic Document & Electronic Signatures

3.1. Steganography

• physical occultation of the message• physical occultation of the message

• the message is physically “invisible”

• high risk of prejudice in case of interception

slide 10

Page 11: Electronic Document & Electronic Signatures

3.2. Cryptography

• semantic occultation of the content of • semantic occultation of the content of the message

• the message is “visible” but not

“understandable”

• key management become a priority

slide 11

• key management become a priority

Page 12: Electronic Document & Electronic Signatures

3.3. Symmetric cryptography

• The symmetric cryptography, also known as private key encryption or known as private key encryption or secret key, is that particular

cryptographic technique that involves

the use of a single key for the encryption operation and for the

slide 12

encryption operation and for the

deciphering

Page 13: Electronic Document & Electronic Signatures

3.3. Symmetric cryptography

• Ex. Transpositional method

slide 13

Page 14: Electronic Document & Electronic Signatures

3.3.1. Key Exchange

slide 14

Diffie, Hellman, Merkle (Stanford, 1976)

Page 15: Electronic Document & Electronic Signatures

3.4. RSA Algorithm

slide 15

Shamir, Rivest, Adleman (Boston, MIT, 1977)

Page 16: Electronic Document & Electronic Signatures

3.4.1. Asymmetric cryptography

• The asymmetric encryption (public-key cryptography) instead contemplates cryptography) instead contemplates the use of a pair of keys, a public key

and a private key. The principle of this

technique requires that what is encrypted with one key can only be

slide 16

encrypted with one key can only be

decrypted with the other key of the pair

Page 17: Electronic Document & Electronic Signatures

3.4.2. Cryptographic keys

• One key (Kpriv) to encrypt

• One other key (Kpub) to decrypt• One other key (Kpub) to decrypt

• Two different key but interconnected

• Private key (Kpriv) known only by holder

slide 17

holder

• Public key (Kpub) known by everyone

Page 18: Electronic Document & Electronic Signatures

3.4.3. Chypertext

( K Bob)Alice Bob

(KPUBAlice) ( KPUBBob)

(KPRIVAlice) ( KPRIVBob)

( KPUBBob)

slide 18

• Secrecy of content yes

• Authentication no

Page 19: Electronic Document & Electronic Signatures

3.4.4. Signed text

( KPRIVAlice)

Dear Bob,

I love you …

Alice Bob

(KPUBAlice) ( KPUBBob)

(KPRIVAlice) ( KPRIVBob)

( KPRIVAlice)

slide 19

Alice

(KPRIVAlice) ( KPRIVBob)

• Secrecy of content no

• Authentication yes

Page 20: Electronic Document & Electronic Signatures

3.4.5. Signed Cyphertext

( KPRIVAlice)

Dear Bob,

I love you …

( KPRIVAlice)

( KPUBBob)

Alice Bob(KPUBAlice) ( KPUBBob)

(KPRIVAlice) ( KPRIVBob)

slide 20

Alice

• Secrecy of content yes

• Authentication yes

Page 21: Electronic Document & Electronic Signatures

3.4.6. Hash Function

• The problem of encryption by public

key infrastructure is the time necessary key infrastructure is the time necessary for mathematic operations of

encryptions

• Hash Function is an algorithm that turns

a variable-sized amount of text into a

slide 21

a variable-sized amount of text into a fixed-sized output (hash value or

digest).

Page 22: Electronic Document & Electronic Signatures

4. Document and Signing

• Original concept of document• Original concept of document

• Original concept of signing

slide 22

(1) Martoni M., in Cyber Law, Suppl. 17 (december 2008), Italy, p. 138,

Kluwer Law International

Page 23: Electronic Document & Electronic Signatures

slide 23

Page 24: Electronic Document & Electronic Signatures

5. U.E. Regulatory Framework

• Directive 1999/93/EC of the European Parliament and of the Council of 13 Parliament and of the Council of 13 December 1999 on a Community

framework for electronic signatures

http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31999L0093:en:HTML

slide 24

Page 25: Electronic Document & Electronic Signatures

5.1. Directive Scope

• to facilitate the use of electronic

signaturessignatures

• to contribute to their legal recognition

• to ensure the proper functioning of the

internal market

• It does not cover aspects related to

slide 25

• It does not cover aspects related to the conclusion and validity of

contracts or other legal obligations

Page 26: Electronic Document & Electronic Signatures

5.2. Definitions|Electronic Signatures

• data in electronic form which are

attached to or logically associated attached to or logically associated with other electronic data and which

serve as a method of authentication

slide 26

Page 27: Electronic Document & Electronic Signatures

5.2. Definitions|Advanced E.S.

• an electronic signature which meets the

following requirements:following requirements:

– (a) it is uniquely linked to the signatory;

– (b) it is capable of identifying the signatory;

– (c) it is created using means that the signatory

can maintain under his sole control; and

– (d) it is linked to the data to which it relates in

slide 27

– (d) it is linked to the data to which it relates in

such a manner that any subsequent change of

the data is detectable

Page 28: Electronic Document & Electronic Signatures

5.2. Definitions|Signatory

• a person who holds a signature-

creation device and acts either on his creation device and acts either on his own behalf or on behalf of the natural

or legal person or entity he represents

slide 28

Page 29: Electronic Document & Electronic Signatures

5.2. Definitions|Sign.-creation data

• unique data, such as codes or private

cryptographic keys, which are used by cryptographic keys, which are used by the signatory to create an electronic

signature

slide 29

Page 30: Electronic Document & Electronic Signatures

5.2. Definitions|Sign.-creation device

• means configured software or

hardware used to implement the hardware used to implement the signature-creation data

slide 30

Page 31: Electronic Document & Electronic Signatures

5.2. Definitions|Secure ... device

• a signature-creation device which

meets the requirements laid down in meets the requirements laid down in Annex III

slide 31

Page 32: Electronic Document & Electronic Signatures

5.2. Definitions|Secure ... device

Annex III1. Secure signature-creation devices must, by appropriate

technical and procedural means, ensure at the least that:(a) the signature-creation-data used for signature generation(a) the signature-creation-data used for signature generation

can practically occur only once, and that their secrecy isreasonably assured;

(b) the signature-creation-data used for signature generationcannot, with reasonable assurance, be derived and thesignature is protected against forgery using currently availabletechnology;

(c) the signature-creation-data used for signature generationcan be reliably protected by the legitimate signatory againstthe use of others.

slide 32

the use of others.2. Secure signature-creation devices must not alter the data to

be signed or prevent such data from being presented to thesignatory prior to the signature process.

Page 33: Electronic Document & Electronic Signatures

5.2. Definitions|Certificate

• an electronic attestation which links

signature-verification data to a person signature-verification data to a person and confirms the identity of that

person

slide 33

Page 34: Electronic Document & Electronic Signatures

5.2. Definitions|Qualified Certificate

• a certificate which meets the

requirements laid down in Annex I and requirements laid down in Annex I and is provided by a certification-service-

provider who fulfils the requirements

laid down in Annex II

slide 34

Page 35: Electronic Document & Electronic Signatures

5.2. Definitions|Annex I

Qualified certificatesmust contain:

(a) an indication that the certificate is issued as a (a) an indication that the certificate is issued as a qualified certificate;

(b) the identification of the certification-service-provider and the State in which it is established;

(c) the name of the signatory or a pseudonym, which shall be identified as such;

(d) provision for a specific attribute of the signatory to be included if relevant, depending on the purpose

slide 35

be included if relevant, depending on the purpose for which the certificate is intended;

Page 36: Electronic Document & Electronic Signatures

5.2. Definitions|Annex I

(e) signature-verification data which correspond to signature-creation data under the control of the signatory;signature-creation data under the control of the signatory;

(f) an indication of the beginning and end of the period of validity of the certificate;

(g) the identity code of the certificate;

(h) the advanced electronic signature of the certification-service-provider issuing it;

(i) limitations on the scope of use of the certificate, if

slide 36

(i) limitations on the scope of use of the certificate, if applicable; and

(j) limits on the value of transactions for which the certificate can be used, if applicable.

Page 37: Electronic Document & Electronic Signatures

5.2. Definitions|Annex II

Certification-service-providers must:

(a) demonstrate the reliability necessary (a) demonstrate the reliability necessary for providing certification services;

(b) ensure the operation of a prompt and secure directory and a secure and immediate revocation service;

(c) ensure that the date and time when

slide 37

(c) ensure that the date and time when a certificate is issued or revoked can be determined precisely;

Page 38: Electronic Document & Electronic Signatures

5.2. Definitions|Annex II

(d) verify, by appropriate means in accordance with national law, the identity and, if applicable, any specific attributes of the person to which a qualified national law, the identity and, if applicable, any specific attributes of the person to which a qualified certificate is issued;

(e) employ personnel who possess the expert knowledge, experience, and qualifications necessary for the services provided, in particular competence at managerial level, expertise in electronic signature techology and familiarity with

slide 38

electronic signature techology and familiarity with proper security procedures; they must also apply administrative and management procedures which are adequate and correspond to recognised standards;

Page 39: Electronic Document & Electronic Signatures

5.2. Definitions|Annex II

(f) use trustworthy systems and products which

are protected against modification and are protected against modification and ensure the technical and cryptographic

security of the process supported by them;

(g) take measures against forgery of certificates, and, in cases where the

certification-service-provider generates

slide 39

certification-service-provider generates signature-creation data, guarantee

confidentiality during the process of generating such data;

Page 40: Electronic Document & Electronic Signatures

5.2. Definitions|Annex II

(h) maintain sufficient financial resources to operate in conformity with the requirements laid down in the Directive, in particular to bear the risk of liability for damages, for example, by obtaining appropriate insurance;risk of liability for damages, for example, by obtaining appropriate insurance;

(i) record all relevant information concerning a qualified certificate for an appropriate period of time, in particular for the purpose of providing evidence of certification for the purposes of legal proceedings. Such recording may be done electronically;

(j) not store or copy signature-creation data of the person to whom the certification-service-provider provided key management services;

(k) before entering into a contractual relationship with a person seeking a certificate to support his electronic signature inform that person by a durable means of communication of the precise terms and

slide 40

a durable means of communication of the precise terms and conditions regarding the use of the certificate, including any limitations on its use, the existence of a voluntary accreditation scheme and procedures for complaints and dispute settlement. Such information, which may be transmitted electronically, must be in writing and in redily understandable language. Relevant parts of this information must also be made available on request to third-parties relying on the certificate;

Page 41: Electronic Document & Electronic Signatures

5.2. Definitions|Annex II

(l) use trustworthy systems to store certificates in a verifiable form so that:in a verifiable form so that:

- only authorised persons can make entries and changes,

- information can be checked for authenticity,

- certificates are publicly available for retrieval in only those cases for which the certificate-holder's consent has been obtained, and

slide 41

holder's consent has been obtained, and

- any technical changes compromising these security requirements are apparent to the operator.

Page 42: Electronic Document & Electronic Signatures

5.2. Definitions|Annex IV

Recommendations for secure signature verification

During the signature-verification process it should be ensured with reasonable certainty that:

(a) the data used for verifying the signature correspond to the data displayed to the verifier;

(b) the signature is reliably verified and the result of that verification is correctly displayed;

slide 42

Page 43: Electronic Document & Electronic Signatures

5.2. Definitions|Annex IV

(c) the verifier can, as necessary, reliably establish the contents of the signed data;establish the contents of the signed data;

(d) the authenticity and validity of the certificate required at the time of signature verification are reliably verified;

(e) the result of verification and the signatory's identity are correctly displayed;

(f) the use of a pseudonym is clearly indicated; and

slide 43

(f) the use of a pseudonym is clearly indicated; and

(g) any security-relevant changes can be detected.

Page 44: Electronic Document & Electronic Signatures

Summary

SignatureElectronic Advanced

SignatureElectronic

Signature

Advanced

Electronic Signature

DeviceSignature

Creation Device

Secure Signature

Creation Device

slide 44

Certificate CertificateQualified

Certificate

Page 45: Electronic Document & Electronic Signatures

5.3. Market Access

1. Member States shall not make the

provision of certification services provision of certification services subject to prior authorisation.

slide 45

Page 46: Electronic Document & Electronic Signatures

5.3. Market Access

2. Without prejudice to the provisions of paragraph 1, Member States may introduce or maintain voluntary accreditation schemes aiming at enhanced levels accreditation schemes aiming at enhanced levels of certification-service provision. All conditions related to such schemes must be objective, transparent, proportionate and non-discriminatory. Member States may not limit the number of accredited certification-service-providers for reasons which fall within the scope of this Directive.

3. Each Member State shall ensure the establishment

slide 46

3. Each Member State shall ensure the establishment of an appropriate system that allows for supervision of certification-service-providers which are established on its territory and issue qualified certificates to the public.

Page 47: Electronic Document & Electronic Signatures

5.3. Market Access

[...]

7. Member States may make the use of 7. Member States may make the use of electronic signatures in the public sector subject to possible additional requirements. Such requirements shall be objective, transparent, proportionate and non-discriminatory and shall relate only to the specific characteristics of the application

slide 47

specific characteristics of the application concerned. Such requirements may not constitute an obstacle to cross-border services for citizens.

Page 48: Electronic Document & Electronic Signatures

5.4. Legal Effects

1. Member States shall ensure that advanced electronic signatures which are based on a electronic signatures which are based on a qualified certificate and which are created by a secure-signature-creation device:

(a) satisfy the legal requirements of a signature in relation to data in electronic form in the same manner as a handwrittensignature satisfies those requirements in

slide 48

signature satisfies those requirements in relation to paper-based data; and

(b) are admissible as evidence in legal proceedings.

Page 49: Electronic Document & Electronic Signatures

5.4. Legal Effects

2. Member States shall ensure that an electronic signature is not denied legal effectiveness and admissibility as evidence in legal proceedingssignature is not denied legal effectiveness and admissibility as evidence in legal proceedingssolely on the grounds that it is:

- in electronic form, or

- not based upon a qualified certificate, or

- not based upon a qualified certificate issued by an accredited certification-service-provider, or

- not created by a secure signature-creation device.

slide 49

- not created by a secure signature-creation device.

Page 50: Electronic Document & Electronic Signatures

5.5. Liability

1. As a minimum, Member States shall ensure that by issuing a certificate as a qualified certificate to the public or by guaranteeing such a certificate to the public a certification-service-provider is liable for damage caused to any entity or legal or natural person who certificate to the public a certification-service-provider is liable for damage caused to any entity or legal or natural person who reasonably relies on that certificate:

(a) as regards the accuracy at the time of issuance of all information contained in the qualified certificate and as regards the fact that the certificate contains all the details prescribed for a qualified certificate;

(b) for assurance that at the time of the issuance of the certificate, the signatory identified in the qualified certificate held the signature-creation data corresponding to the signature-verification data given or identified in the certificate;

slide 50

or identified in the certificate;

(c) for assurance that the signature-creation data and the signature-verification data can be used in a complementary manner in cases where the certification-service-provider generates them both;

(d) unless the certification-service-provider proves that he has not acted negligently.

Page 51: Electronic Document & Electronic Signatures

5.5. Liability

2. As a minimum Member States shall ensure that a certification-service-provider who has issued a certificate as a qualified certificate to the public is liable for damage caused to any entity or legal or natural person who reasonably relies on the certificate for failure to register public is liable for damage caused to any entity or legal or natural person who reasonably relies on the certificate for failure to register revocation of the certificate unless the certification-service-provider proves that he has not acted negligently.

3. Member States shall ensure that a certification-service-provider may indicate in a qualified certificate limitations on the use of that certificate. provided that the limitations are recognisable to third parties. The certification-service-provider shall not be liable for damage arising from use of a qualified certificate which exceeds the limitations placed on it.

4. Member States shall ensure that a certification-service-provider may indicate in the qualified certificate a limit on the value of transactions

slide 51

4. Member States shall ensure that a certification-service-provider may indicate in the qualified certificate a limit on the value of transactions for which the certificate can be used, provided that the limit is recognisable to third parties.

The certification-service-provider shall not be liable for damage resulting from this maximum limit being exceeded.

Page 52: Electronic Document & Electronic Signatures

5.6. International Aspects

1. Member States shall ensure that certificates which are issued as certificates which are issued as qualified certificates to the public by a certification-service-provider established in a third country are recognised as legally equivalent to certificates issued by a certification-

slide 52

certificates issued by a certification-service-provider established within the Community if some conditions are realized.

Page 53: Electronic Document & Electronic Signatures

6. Italian Regulatory Framework

• D.Lgs. 82/2005, Codice dell’Amministrazione Digitale (CAD)dell’Amministrazione Digitale (CAD)http://www.digitpa.gov.it/cad

• D.P.C.M. 30/03/2009, Regole tecniche

in materia di generazione, apposizione e verifica delle firme digitali e

validazione temporale dei documenti

slide 53

validazione temporale dei documenti informaticihttp://www.digitpa.gov.it/sites/default/files/normativa/DPCM_30-mar-09_0.pdf

Page 54: Electronic Document & Electronic Signatures

6.1. Definitions|Electronic Document

• The informatics representation of acts,

fact or data, legally relevantfact or data, legally relevant

• i.e. file

slide 54

Page 55: Electronic Document & Electronic Signatures

6.2. Definitions|Analogical Document

• The “non” informatics representation of

acts, fact or data, legally relevantacts, fact or data, legally relevant

• i.e. paper document

slide 55

Page 56: Electronic Document & Electronic Signatures

6.3. Definitions|Copy and Duplicate

1. informatics copy of analogical document: the electronic document document: the electronic document with contents identical to the

analogical document that inspired

• for example transcription with word

processor of paper (hand-written)

slide 56

processor of paper (hand-written) notes or oral notes

Page 57: Electronic Document & Electronic Signatures

6.3. Definitions|Copy and Duplicate

2. informatics copy image of analogical document: the electronic document document: the electronic document with contents and forms identical to

the analogical document that

inspired

• for example scan of paper

slide 57

• for example scan of paper document

Page 58: Electronic Document & Electronic Signatures

6.3. Definitions|Copy and Duplicate

3. informatics copy of electronic documents: the electronic document documents: the electronic document with content identical to that of the

document from which it is drawn on

computer with different sequence of binary values

slide 58

binary values

• for example file translated in a

different format (from .doc to .pdf)

Page 59: Electronic Document & Electronic Signatures

6.3. Definitions|Copy and Duplicate

4. duplicate: the electronic document obtained by storing, on the same obtained by storing, on the same device or on different devices, the same sequence of binary values of

the original document

• for example “cut & paste”

slide 59

• for example “cut & paste”

Page 60: Electronic Document & Electronic Signatures

6.4. Definitions|Electronic Signature

• l'insieme dei dati in forma elettronica, allegati oppure connessi tramite associazione logica ad altri oppure connessi tramite associazione logica ad altri dati elettronici, utilizzati come metodo di identificazione informatica

• the set of data in electronic form attached to or logically associated

with other electronic data, used as a

slide 60

with other electronic data, used as a method of informatics identification

(authentication)

Page 61: Electronic Document & Electronic Signatures

6.5. Definitions|Advanced E.S.

• insieme di dati in forma elettronica allegati oppure connessi a un documento informatico che consentono l’identificazione del firmatario del documento e garantiscono la connessione univoca al firmatario, creati con mezzi sui quali il firmatario può conservare un firmatario del documento e garantiscono la connessione univoca al firmatario, creati con mezzi sui quali il firmatario può conservare un controllo esclusivo, collegati ai dati ai quali detta firma si riferisce in modo da consentire di rilevare se i dati stessi siano stati successivamente modificati

• set of data in electronic form attached to or associated with an electronic document that enable identification of the signatory of the document and provide the unique connection to the signatory, created using means that the

slide 61

the signatory, created using means that the signatory can maintain exclusive control, linked to the data to which that signature refers to allow to detect whether the data have been subsequently modified

Page 62: Electronic Document & Electronic Signatures

6.6. Definitions|Qualified E.S.

• un particolare tipo di firma elettronica avanzata che sia basata su un certificato qualificato e che sia basata su un certificato qualificato e realizzata mediante un dispositivo sicuro per la creazione della firma

• a particular type of advancedelectronic signature that is based on a

qualified certificate and created by a

slide 62

qualified certificate and created by a secure device for the creation of

signature

Page 63: Electronic Document & Electronic Signatures

6.6.1. Certification Authority

• The digital signature technology ensure that in the process of sign was used the private key connected to the public key used for verification.process of sign was used the private key connected to the public key used for verification.

• The certification of the key has the different function to connect the public key to an identified person.

• The certification, in the case of the digital signature, is the result of the informatics procedure, applied to the public key and detectable by the validation systems, that ensures the correspondence between

slide 63

systems, that ensures the correspondence between public key and subject holder to whom it belongs, it identifies the period of validity of that key and the expiry date of the certificate

Page 64: Electronic Document & Electronic Signatures

6.6.1. Certification Authority

• Simple C.A.

• Qualified C.A.• Qualified C.A.

• Accredited C.A.

– Different qualities

– Different procedures to become C.A.

slide 64

– Different procedures to become C.A.

– Different level of the certification services

Page 65: Electronic Document & Electronic Signatures

6.6.2. Electronic Certificate

• Electronic Certificates– electronic certificates are now defined such as – electronic certificates are now defined such as electronic certificates that connect the identity of the holder to the data used to verify electronic signatures

• Qualified Certificates– qualified certificates are electronic certificates

slide 65

– qualified certificates are electronic certificates comply with the requirements envisaged in Annex I of the Directive and issued by certification meets the requirements provided in Annex II of the Directive

Page 66: Electronic Document & Electronic Signatures

6.6.3. Signature Device

• Signature Device

• Secure Signature Device• Secure Signature Device

slide 66

Page 67: Electronic Document & Electronic Signatures

6.7. Definitions|Digital Signature

• un particolare tipo di firma elettronica avanzata basata su un certificato qualificato e su un sistema di chiavi crittografiche, una pubblica e una privata, correlate tra loro, che consente al titolare tramite la chiave privata e al destinatario tramite la chiave pubblica, rispettivamente, di rendere privata, correlate tra loro, che consente al titolare tramite la chiave privata e al destinatario tramite la chiave pubblica, rispettivamente, di rendere manifesta e di verificare la provenienza e l'integrità di un documento informatico o di un insieme di documenti informatici

• a particular type of advanced electronic signature based on a qualified certificate and a system of cryptographic keys, one public and one private, related to each other, which allows the holder using the private key and the recipient using the public

slide 67

the private key and the recipient using the public key, respectively, to make manifest and verify the origin and integrity of an electronic document or a set of electronic documents

Page 68: Electronic Document & Electronic Signatures

Summary

• Electronic Signature– Electronic Signature

• Advanced Electronic Signature• Advanced Electronic Signature– Qualified Electronic Signature

» Digital Signature

» [other]– [other]

• [other]

• Electronic Certificate– Electronic Certificate– Electronic Qualified Certificate

– Certification Authority

• Signature Device– Signature Device

slide 68

– Signature Device

– Secure Signature Device

• Certification Authority– Certification Authority– Qualified Certification Authority

– Accredited Certification Authority

Page 69: Electronic Document & Electronic Signatures

Summary

slide 69

Page 70: Electronic Document & Electronic Signatures

6.8. Legal Effects

• Art. 20.1 bis CAD– L'idoneità del documento informatico a

soddisfare il requisito della forma scritta e il suo – L'idoneità del documento informatico a

soddisfare il requisito della forma scritta e il suo valore probatorio sono liberamente valutabili in giudizio, tenuto conto delle sue caratteristiche oggettive di qualità, sicurezza, integrità ed immodificabilità, fermo restando quanto disposto dall’articolo 21.

– The suitability of the electronic document to satisfy the requirement of written form and its

slide 70

satisfy the requirement of written form and its probative value can be freely evaluated in judgment, in view of its objective characteristics of quality, safety, integrity and immutability, subject to the provisions of Article 21.

Page 71: Electronic Document & Electronic Signatures

6.8. Legal Effects

• Art. 21.1 CAD

– Il documento informatico, cui è apposta una – Il documento informatico, cui è apposta una firma elettronica, sul piano probatorio è liberamente valutabile in giudizio, tenuto conto delle sue caratteristiche oggettive di qualità , sicurezza, integrità e immodificabilità.

– The electronic document, which is signed with a

electronic signature, in terms of evidence is freely

slide 71

electronic signature, in terms of evidence is freely

estimated in judgment, in view of its objective

characteristics of quality, safety, integrity and

immutability.

Page 72: Electronic Document & Electronic Signatures

6.8. Legal Effects

• Art. 21.2 CAD– Il documento informatico sottoscritto con firma elettronica

avanzata, qualificata o digitale, formato nel rispetto delle avanzata, qualificata o digitale, formato nel rispetto delle regole tecniche di cui all'articolo 20, comma 3, che garantiscano l'identificabilità dell'autore, l'integrità e l'immodificabilità del documento, ha l'efficacia prevista dall'articolo 2702 del codice civile. L'utilizzo del dispositivo di firma si presume riconducibile al titolare, salvo che questi dia prova contraria.

– The electronic document signed with an advanced electronic signature, qualified or digital, format in compliance with the technical rules [...], to ensure the

slide 72

compliance with the technical rules [...], to ensure the identification of the author, integrity and immutability of the paper, has the effectiveness of Article 2702 of the Italian Civil Code. The use of the signature device is assumed due to the owner, unless he proves otherwise.

Page 73: Electronic Document & Electronic Signatures

6.8. Legal Effects

• Art. 21.2 bis CAD– Salvo quanto previsto dall’articolo 25, le scritture

private di cui all’articolo 1350, primo comma, – Salvo quanto previsto dall’articolo 25, le scritture

private di cui all’articolo 1350, primo comma, numeri da 1 a 12, del codice civile, se fatte con documento informatico, sono sottoscritte, a pena di nullità, con firma elettronica qualificata o con firma digitale.

– Except as provided in Article 25, the private documents referred to in Article 1350, first paragraph numbers from 1 to 12, of the Civil

slide 73

paragraph numbers from 1 to 12, of the Civil Code, if done with electronic documents are signed, under penalty of nullity, with qualified electronic signature or with digital signature.

Page 74: Electronic Document & Electronic Signatures

6.9. Time Stamping

• The result of the informatics procedure which is attributed to one or more electronic documents, a date and a time enforceable against third partiesattributed to one or more electronic documents, a date and a time enforceable against third parties

• The timestamp has another important function. It allows to extend the value of the certificate of digital signature beyond the normal period of validity. This is on condition that the signature is associated with a timestamp, enforceable against third parties, at an earlier time than the suspension,

slide 74

third parties, at an earlier time than the suspension, expiration or revocation of the certificate.

Page 75: Electronic Document & Electronic Signatures

Thank you

Michele MartoniContract Professor at the University of BolognaPh.D. In IT Law

Lawyer

[email protected] | www.unibo.it

Thank you

[email protected] | www.unibo.it

www.michelemartoni.it