SecurityElectronic signatures in practiceMarch 2006 Stephen Mason explains the various forms an electronic signature can take, and indicates the weaknesses, illustrating that no form of esignature is totally secure.
Br J Healthcare Comput Info Manage 2006; 23(2): 22–4. Before the digital age, successive judges in England and Wales, as well as in other countries where part of the law derives from custom and from judges’ rulings, considered that the form a manuscript signature takes is not relevant, providing the function the signature performs is clear from the evidence. This pragmatic view of the imperfections of human behaviour has enabled judges to widen the concept of what is meant by a signature. Various methods have been accepted to prove the intent to sign a document: the mark of a cross, the use of a pseudonym, initials, a surname, a trade name, a partial signature, words other than a name, an identifying phrase and an abbreviation of a name. Forms of electronic signatureElectronic signatures did not require the passing of an Act of Parliament. The Chairman of an Industrial Tribunal decided the first case of this nature in 1997, before the Electronic Communications Act 2000, which in turn was passed as a result of the EU Directive on electronic signatures. Electronic signatures take a variety of forms, all of which can demonstrate the intent of the signing party to authenticate the document. The different types are:
One other form of electronic signature is the so-called ‘advanced electronic signature’, which is an invention of the EU Directive. The elements that make up an advanced electronic signature are as follows:
Advanced electronic signatures are not special, nor any more secure or advanced than any other form of electronic signature. The important issue to bear in mind is proving the sender was the person that affixed the signature to the message, not the type of signature that was used. Correcting an assumptionThe technical community thinks it has a solution to the problem of linking the use of an electronic signature to the person whose signature it is. The term non-repudiation is used, which has, in turn, become part of the vocabulary of digital signatures. When this term is used in an engineering sense, it can mean that there is a high (and specifiable) degree of probability that it can be proved that an email, with a digital signature attached, was sent from a specific computer. The technical community, therefore, argue that if it can be shown that an email was sent from a specific computer with a digital signature attached, then it was the owner of that computer who sent it. This logic is flawed anybody with access to the computer in question could send a message. Perhaps the computer has a number of Trojan horses on it that the owner is not aware of, and one or more of these malicious items of software could enable a hacker to enter the computer without authority and to send emails at will, as well as affixing a digital signature to them. The case of R v Caffrey (Southwark Crown Court, October 2003) illustrates this point. The defendant was charged with causing unauthorised modification of computer material under s3(1) of the Computer Misuse Act 1990. The prosecution alleged that the defendant sent a deluge of electronic data from his computer to a computer server operated in the Port of Houston, Texas, the effect of which was to cause the computer at the Port to shut down. His defence was that unknown hackers obtained control of his computer and then launched a number of programs to attack the computer at Houston. The forensic examiner for the prosecution could not find any evidence of a Trojan horse on his computer. The defence claimed that it was impossible for every file to have been tested, and that the Trojan horse file might have destroyed itself, leaving no trace. The forensic examiner for the prosecution stated that a Trojan horse would leave a trace on the computer. The jury nevertheless acquitted Mr Caffrey. Just because an individual has a private key on his computer for use as a digital signature, it does not follow that he is responsible for sending all the messages from that machine. Concluding remarksFor lawyers, where the use of an electronic signature is at issue, the problem is how to prove the connection between the application of the signature, whatever form it takes, and the person whose signature it purports to be. To the author's knowledge, there has only been one case, in Germany, where this was at issue. A seller of items on an auction website tried to enforce a contract against three individuals. The seller claimed they entered into a contract by email to buy goods. The goods were never paid for, and the seller took legal action against the three buyers. The purported buyers claimed they did not send the emails, nor sign the emails. The seller relied on the signatures in the emails, and the rule of law is that the person relying on the signature must prove it is genuine. In this instance, the seller could not prove the buyers sent or
typed their names into the emails. As a result, the seller lost the
case. This case demonstrates that from a practical point of view,
the recipient needs to be confident that the signature is from the
person it claims to be, and that he/she actually used the signature
in question. Stephen Mason is the author of Electronic signatures in law (LexisNexis Butterworths, 2003); Networked communications and compliance with the law (xpl publishing, 5th edition, 2005); and the electronic and digital signatures editor and author of Chapter VI Electronic and digital signatures for the practitioner loose-leaf textbook by Michéle T Rennie, International Computer and Internet Contracts and Law (Sweet & Maxwell). He is also Director of the Digital Evidence Research Programme,
British Institute of International and Comparative Law; General
Editor, e-Signature Law Journal; and Associate Senior Research
Fellow, Institute of Advanced Legal Studies. Copyright Stephen Mason, 2006. |
|
||
|
|
|||