Analysis of the act on electronic signatures



Similar documents
Merchants and Trade - Act No 28/2001 on electronic signatures

Guidelines for the use of electronic signature

LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE

LAW. ON ELECTRONIC SIGNATURE (Official Gazette of the Republic of Montenegro 55/03 and 31/05)

Electronic Documents Law

LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE. Chapter two. ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE

Qualified Electronic Signatures Act (SFS 2000:832)

Federal Electronic Signature Law. (Signature Law - SigG)

ELECTRONIC COMMERCE AND ELECTRONIC SIGNATURE ACT (ZEPEP-UPB1) (Official consolidated text)

ELECTRONIC SIGNATURE LAW. (Published in the Official Journal No 25355, ) CHAPTER ONE Purpose, Scope and Definitions

The potential legal consequences of a personal data breach

LAW OF MONGOLIA ON ELECTRONIC SIGNATURE

ELECTRONIC SIGNATURE LAW

ACT. of 15 March 2002

REPUBLIC OF LITHUANIA. LAW ON ELECTRONIC SIGNATURE

Electronic Signature Law,

UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures

CROATIAN PARLIAMENT 242

LAW ON ELECTRONIC TRANSACTIONS

Act 7 Electronic Signatures Act 2011

LOCAL LAW BE ENACTED BY THE BOARD OF TRUSTEES OF THE VILLAGE OF MAMARONECK AS FOLLOWS:

on Electronic Signature and change to some other laws (Electronic Signature Act) The Parliament has hereby agreed on this Act of the Czech Republic:

Regulation for Establishing the Internal Control System of an Investment Management Company

STANDARD TERMS AND CONDITIONS FOR PROVISION OF MEDICAL REPORTING SERVICES BY MEDICAL PRACTITIONERS

SWEDBANK AS TERMS AND CONDITIONS FOR PAYMENT CARDS SERVICING Valid from

Law Governing Framework Conditions for Electronic Signatures and Amending Other Regulations

ELECTRONIC SIGNATURE LAW

Land Registry. Version /09/2009. Certificate Policy

Law Concerning Electronic Signatures and Certification Services (Unofficial Translation)

(1) regulate the storage, retention, transmission, and security measures for credit card, debit card, and other payment-related data;

TERMS OF USE FOR NOTARIAL PERSONAL REPRESENTATION CERTIFICATES FOR AUTHENTICATION

4. Laying of orders and regulations before Houses of Oireachtas.

Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013

Electronic Commerce ELECTRONIC COMMERCE ACT Act. No Commencement LN. 2001/ Assent

Decree Law No. ( ) of 2011 on Electronic Transactions Law

APPENDIX E. Summary of the Texas Physician Assistant Licensing Act. University of Texas Southwestern Medical Center June 2001

Identity Cards Act 2006

Electronic Signature Law of the People s Republic of China

Federal law on certification services in the area of the electronic signature

THE LAW OF THE AZERBAIJAN REPUBLIC ON DIGITAL ELECTRONIC SIGNATURE

CROATIAN PARLIAMENT 1364

Memorandum of Principle and Rationale of [Draft] National Cybersecurity Act B.E. Principle To legislate on the maintenance of national Cybersecurity.

TERMS AND CONDITIONS FOR PAYMENT CARDS SERVICING

(type A2) (hereinafter: Agreement )

Federal Act on Data Protection (FADP) Aim, Scope and Definitions

THE ELECTRONIC TRANSACTIONS LAW,

ELECTRONIC SIGNATURES AND ASSOCIATED LEGISLATION

The Law on the Return of Unlawfully Removed Objects of Cultural Heritage

MUTHOOT COMMODITIES LIMITED V0LUNTARY AGREEMENT FOR INTERNET TRADING - MCX/NCDEX/NMCE

GENERAL TERMS AND CONDITIONS OF USING ELECTRONIC BANKING SERVICES

CONTINUING CONSOLIDATION POLICE ALARM BY- LAW NO. 5985/22/92

Not an Official Translation On Procedure of Coming into Effect of the Law of Ukraine On State Regulation of the Securities Market in Ukraine

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 114 thereof,

Trading Rules of the Georgian Stock Exchange

TERMS OF USE TITLE CERTIFICATES FOR ELECTRONIC SIGNATURE

Swedbank, AB payment services provision conditions

ELECTRONIC TRADING FACILITIES SUPPLEMENTAL TERMS AND CONDITIONS OF TRADING

Mexico. Rodolfo Trampe, Jorge Díaz, José Palomar and Carlos López. Von Wobeser y Sierra, S.C.

Purpose and intent of rule Scope and application Employer's Duties and Responsibilities

CONSUMER PROTECTION LAW OF MONGOLIA. 24 June, 1991 Ulaanbaatar. Chapter One. General Provisions

DELEGATED REGULATION (EU)

2. Our Conditions 2.1 When They Apply 2.2 Deposit 2.3 Your Account and On Line Sign Up 2.4 Minimum Period of Service 2.

EUROPEAN PARLIAMENT AND COUNCIL DIRECTIVE. on a common framework for electronic signatures

User Manual Internet Access. for the public key. certification service

UnityLink Online Money Transfer Terms and Conditions

Payment Partner (Online Bill Pay) Terms and Conditions

Symantec Limited Ballycoolin Business Park, Blanchardstown Dublin 15 Ireland Phone: Fax

Resources Based, Manufacturing and Consumer Goods Industries Chemicals Industry

Data protection issues on an EU outsourcing

DOCUMENT. General Purchase Conditions

Family Day Care Services

GRTGAZ NETWORK TRANSMISSION CONTRACT

LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT

Ericsson Group Certificate Value Statement

A7-0365/133

Terms and Conditions of Use of the Mediastore / Data Asset Management Platform of Konica Minolta Business Solutions Europe GmbH

Financial Services Act 2010

TERMS AND CONDITIONS GOVERNING THE USE OF NBADS ONLINE TRADING

CERTIFICATION POLICY OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES

CERTIFICATION PRACTICE STATEMENT UPDATE

DECISIONS ON CONTROLLED SUBSTANCE LICENCES

HKUST CA. Certification Practice Statement

TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE

Certification Practice Statement

Transcription:

Analysis of the act on electronic signatures Erika Fülöp Szilágyi and Péter Sasvári Department of Entrepreneurship, Institute of Business Sciences, University of Miskolc Introduction On the turn of the new millenium, with the vast spreading of electronic message-sending, a demand arose to be able to send messages in electronic way that can produce a legal effect. For that it is inevitable that parties be able to state authentically who the message is from and whether its content has been unchanged since posting. This function could be fulfilled by electronic signature if suitable technology and legal background are given. As a result of this study it can be stated that the act is in compliance with EU directives and a good basis for introducing digital signatures, but there are still several technological questions open that can basically influence the security of the system and can lead to legal and tecnological loopholes. Recognising the development trend the Hungarian National Assembly passed the Act XXXV of 2001 on electronic signatures to create the legal framework for the provision of certified electronic communication, data transmission in business contacts. The range of notions related to electronic signatures, the basic principles, the services and their conditions, the requirements that service providers should meet, their responsibilities and their supervision (by the Communication Authority) have been regulated, as well as breach of contract cases and of course possible fines to be imposed. Outline of legal regulation a) Why is the act on electronic signatures needed? The two contracting parties could agree on acceptance of contracts in electronic form, but they were required to make a traditionally-certified written contract in advance. This worked without any particular legal regulation. With the legislation these bilateral agreements have become simpler, although there is still a possibility of divergence from the provisions of the act. However, the legislation gives the opportunity to introduce electronic documents in fields where the use of them was not possible earlier.(company procedures, tax authority, public administration). The aim of the present law is to introduce the usage of electronic signatures into several state controlled areas. The essential condition for that is amending the related laws. b) EU directives The fact that there are laws and regulations concerning electronic commerce and electronic signatures all over the world was the other important factor that promoted legislation procedure. Nowadays technical development requires applicability of electronic communications and documents in official areas as well. The European Parliament and Council issued a directive in January 2000 in connection with electronic signatures in which defined the basic principles concerning electronic signatures, and ordered all the member countries to establish their own regulatory systems based on the common principles. Among other things it is written in EU directives that electronic signatures have to be accepted as equal in all respects to traditional signatures and the member countries of the European Community must mutually accept one another s electronic signatures and 1

certificates and encourage other countries in the region to join the system. The harmonization of laws and of course the technological background is essential for the functioning of such a system that includes several countries. Several international organizations deal with the standardization of elements of Public Key Infrastucture. Unfortunately the standards and recommendations made so far do not form a homogeneous, coherent system, while there are overlaps as well. Outline of the Hungarian act a) Outline While forming the Hungarian regulation the fundamental point of view was to comply with the EU principles entirely. In addition, the prevailing Hungarian laws had to be taken into consideration. There is a textual proposal in the closing stipulations of the present act to amend the laws closely related to the issue, creating the basic case for the use of electronic signature and electronic documents. The law regulates three important ranges of areas:[3] -the validity of the law, which at the same time defines the opportunities of employment (we do not deal with this part at all); -regulations of services related to electronic signatures; -regulations concerning the activity of the Communication Authority (hereinafter called the Authority). In the enactment another essential principle was that legal regulation should be independent from technologies. In the used legal terminology well-known technical terms are named after their functions. The act defines the following notions: - a signature in electronic form, an advanced electronic signature, a qualified electronic signature - an electronic document, electronic document data, an electronic instrument - signature creation data (private key), signature (public key) - a signature creation device, a secure signature creation device (typically a chip card or smart card) - a certificate, a qualified certificate - a time marker - a verifying electronic signature, placing an electronic signature - a signatory, qualified certification service provider b) Structure of operation defined by the act The following services related to electronic signature are regulated by the act: - an electronic signature certification service (for issuing and registering electronic certificates) - a time-marker service - placement of signature creation data on the signature creating device The above mentioned services have to be notified to the Authority. It registers the service provider and continuously controls its activity in respect of complying with the laws and regulations and the general contract conditions. In case of any irregularity it can take immediate measures, impose a fine or even suspend the service with immediate effect. Issuing a qualified certificate or placing signature creation data on the signature creation device can be done only by qualified certification service providers. Qualification is carried 2

out by the Authority. In order to become qualified the applicant has to meet requirements: (no criminal record, proper qualifications, liability insurance, sufficient financial recources, use of secure electronic signature products, etc.). The Authority conducts a comprehensive on-site inspection at least once a year. If the service provider does not comply with the regulations, and the measures taken are not sufficient, the Authority can revoke the qualification. The certification service provider issues electronic certificates. It has to identify the claimant. If it is successful the claimant s signature, other data used for identification and data related to the issue and use of certificate (name of service provider, limits on use, indication of the beginning and end of the period of validity, etc.) have to be recorded in a certificate and signed by the service provider s own signature creation data. The service provider keeps a register of the issued certificates and all the data they are based on. It also receives data related to changes, keeps a record of the current status of certificates, their suspension and revocation. This status record together with the regulations and signature have to be made available to the public via telecommunications network systems. Analysis A complicated system of many factors involves several dangers. Irregular behaviour of one person endangers the other persons in the system. Mapping these dangers, estimating the strength of existing defensive methods, and defining further effective defensive methods in view of the complexity of the system is a demanding task. In the following section we examine the system created by the act with the help of a safety hazard analysis. According to the generally accepted methodology of risk analysis there are three applicable defences in order to eliminate possible dangers: preventive, detective and corrective solutions. A good system employs all the three defences against dangers. In case of a given risk the lack of one of the solutions can be acceptable if the other defences are strong enough and compensate for the missing control. In the table below we list the risks endangering the different parties, and the risks imposed by the irregular behaviour of participants. In each case we examined the defensive strategies proposed by the act to a given danger, their deficiencies, and the defences that could be effectively employed. Table 1. Dangers and control measures in various cases [1] 3

Protection of signatory Danger Loss of signature creation data (non-authorized person can sign) Deciphering signature creation data (nonauthorized person can sign) Control measures Preventive Detective Corrective Chip card storage Detection of theft, loss The user initiates PIN code, identification revocation of the certificate with a password at the service Taking legal action Application of cryptography that is hard to decipher - Revocation of certificate; Liability of service Insurance Somebody else (nonauthorized Suitable identification Notification of the owner Reinforcement; person) suspends the certificate about the suspension Compensation; insurance Blackmail, compulsion (Other laws are relevant) - (Other laws are relevant) The signatory discloses his/her signature creation data to another person to create two certificates with the same signature at different registered signature certification service providers Use of forged certificate Application of cryptography that is difficult to decipher registered signature issued certificates Voidable in court Liability of service Insurance Use of revoked certificate Recording the date of signing and revocation Manipulation of signature of service provider Manipulation of signature of service provider!!!! Continuous observation of revocation list Authority should issue attested certificates to service providers Court presumes the authenticity of qualified signature Imprint of signature of the Authority should be 4

Protection of certification service provider (CSP) Compromising signature creation data of the certification service provider[csp] Strong physical defence [security measures against burglary] Signature of the Authority should be accessible Burglary is always detectible accessible Revocation list about signature creation data of service providers; Fact of revocation has to be published announcement); Insurance (official False suspension (based on false report) Lack of legal remedy against the Authority Notification Employees Clean criminal record Inner control Court trial Registered expert; Keeping strict records of Insurance Definition of inner activities RISK proceedings at the service National security screening; Public servant oath Blackmail Deciphering signature creation data of service provider and forging its signature Other laws are relevant (technological defence: quiet alarm) By applying strong cryptography this danger can practically be eliminated Signature creation data has to be in accordance with technological developments Lack of opportunity to appeal against the Authority s decision - Other laws are relevant; Revocation - Notification of users; Insurance Protection against Certification service Certification service Suspicious signs; Court trial; 5

certification provider (CSP) service provider(csp) issues fake certificate Certification service provider(csp) revokes certificate suddenly (before time or without cause) CSP closes down or made to end and certificates issued revoked provider(csp) should be qualified by the Authority; Continuous checking by the Authority; INSUFFICIENT DEFENCE Regular report needed about the issued certificates Choosing reliable service Qualification of service provider Choosing reliable service Qualification of service provider Central database needed for registered signature SP should send the owner a notification about the revocation Revocation list should be checked continuously SP should send owner a notification about the revocation Revocation list should be checked continuously Authority calls certification service provider(csp) to account; Revocation of certificate; Compensation Court trial Court trial CSP issues certificate to another person with the same signature verification data CSP does not keep or publish the certificate revocation list CSP withholds issued certificates Choosing reliable service Qualification of service provider registered signature Central database needed about the issued certificates Global Cracking RSA Elaboration of alternative cryptographic algorithm Suspicious signs; registered signature INSUFFICIENT DEFENCE Revocation of certificate; Court trial; Compensation (CSP is liable according to the act) Authority control Calling to account INSUFFICIENT DEFENCE - Crisis management 6

Summary The draft bill does not deal properly with the problems of handling time and validity. The date of signing has to appear in the electronic signature, it would be practical to put this down in writing in the regulations as well. The revocation time of a given certificate also has to be put down in writing, and this requirement is missing from the act. As for the time-marker service, the bill does not make separate statements (it simply makes an analogy between the time-marker service and signature verification service) and thus does not deal with the problem, that the exact date of an event can be defined only by two time stamps. The bill contains excessive limitations on issuing time markers: according to it a time marker is the common digital signature of the date put on the electronic document by the service provider. It excludes cases when the time marker service provider signs only the date (which is the practice in elaborated protocols). The shared (different) registers of the revocation list and certificates means a relatively big vulnerability. It is essential to create a central database for certificates and revocation lists, otherwise it would be difficult to check service providers, and calling them to account would be hopeless. The system lacks a reliable and effective signature verification service. In a debated case the person who wants to verify a signature can do nothing but start a court proceeding, which is costly and inefficient. In addition, the control over verification service providers may turn out to be insufficient. The profit gained from abuses is a lot more than the invested costs. The appearance of organised crime behind verification service providers cannot be exluded in the present system. At some points of the law there is a confusion of ideas (e.g. Art. 9 (3): the verification service provider identifies the requesting person and then attests his/her electronic signature). It may also cause trouble that there are differences between word processing softwares (eg. different versions of (Microsoft Word) so it may occur that the signed, intact document signed by the user may look different on another computer. (in an extreme case hidden text may appear which was not seen at the time of signing ) An electronic document may contain only text. But what do we mean by this exactly? Can only Rich Text Format, or Word Document be considered texts? (in an extreme case it may contain macros ) It may occur that several people have to sign a document or that different parts of the document are signed by different people. Even a case may occur when somebody from the signatories wants to sign the document in the traditional way (this is not excluded by the law). The formal requirements in such cases have to be put down in the law. As a result of this investigation it can be stated that the draft bill is in compliance with EU directives and a good basis for introducing digital signatures, but there are still several technological questions open that can basically influence the security of the system and can lead to legal and technological loopholes. In the present act the goverment is authorised to regulate some unfinished rules (e.g. detailed requirements of services related to electronic signatures and service providers). The elaboration of the enacting clauses still lies ahead. During this careful elaboration process the above mentioned dangers can still be eliminated. 7

Bibliography 1. ENDRŐDI Csilla - HORNÁK Zoltán: Az elektronikus aláírásról szóló törvény elemzése 2. Community framework for electronic signatures 3. Az 1999/93/EK direktíva összefoglalója 4. Elektronikus aláírás: jogszabályi és szabványosítási kérdések 5. http://www.euroastra.com/mime/cikkek/torvterv.html (European Electronic Signature Standardization Initiative (EESSI) honlapja) 6. http://europa.eu.int/scadplus/leg/en/lvb/l24118.htm 7. http://www.ict.etsi.org/ 8