Verified Document

Digital Signatures In E-Commerce Term Paper

¶ … electronic signatures as is used for the purposes of e-commerce. The writer explores their use, their problems and some of the legislature for their use. The primary focus is on the differences and similarities in three states regarding electronic signatures. There were three sources used to complete this paper. With the advent of the internet came the ability to sign for things electronically. Electronic signatures have become a topic of debate as people are able to purchase things online, sign contracts online and perform banking functions online. The problem stems from two main areas. The first problem is the fact that electronic signatures are easily "forged" while the second problem revolves around the fact that different states mandate different laws when it comes to the care, use and legality of using electronic signatures.

There has been talk of mandating electronic signatures from a federal level but thus far it is still a joint responsibility (Thibodeau, 1999).

The Electronic Signature in Global and National Commerce Act, or E- Sign bill, sponsored by House Commerce Committee Chairman Tom Bliley (R-Va.), would set a national standard for electronic signatures and put them on legal par with written signatures. Businesses say they need a consistent national standard to conduct transactions across state lines. But the E-Sign bill has raised concerns...

They said the bill would authorize businesses to replace paper records, such as warranties, with electronic records, regardless of whether the consumer has a computer (Thibodeau, 1999)."
Currently the federal government and the state governments are sharing the responsibility for regulating electronic signatures.

Responsibility for the regulation of commerce in the United States is split between the federal government and the states. The U.S. Constitution gives to the United States Congress the power to legislate the regulation of commerce with foreign nations, among the several states, and with the Indian tribes. However, the right to regulate all other commerce remains with the individual states.

An electronic signature is defined as being:

an electronic sound, symbol or process attached to or logically associated with a contract or other record and executed or adopted by a person with the intent to sign the record (United States - Electronic Signatures (http://www.ladas.com/BULLETINS/2002/0202Bulletin/USElectronicSignature.html)."

Different states have different mandates when it comes to electronic signatures.

California mandates that the electronic signature must be give through the use of technology currently accepted by the state of…

Sources used in this document:
References

Patrick Thibodeau, E-Signature Standards Battles Are Looming., Computerworld, 11-01-1999, pp 12.

California Digital Signature Regulations http://www.ss.ca.gov/digsig/regulations.htm

United States - Electronic Signatures

http://www.ladas.com/BULLETINS/2002/0202Bulletin/USElectronicSignature.html
Nebraska Electronic Signatures http://www.bmck.com/ecommerce/nebraska-t.htm#lb924
http://www.bmck.com/ecommerce/tennessee-t.htm
Cite this Document:
Copy Bibliography Citation

Related Documents

E-Commerce Security Measures the Internet Has Positively
Words: 908 Length: 2 Document Type: Essay

E-Commerce Security Measures The Internet has positively created new life in business commerce, through website development. It has also opened up a new way for criminals to steal secret data of businesses and information regarding clients' banks details and contacts. This has made customers to becoming rapidly more aware of the websites they visit and where they input their personal information to avoid fraud cases (Corr S. Pondent, 2009). However, e-commerce security

Promoting Trust in E-Commerce: An
Words: 3480 Length: 12 Document Type: Term Paper

All these aspects of a B2B transaction, when consistently executed on, create a level of trust that becomes one of the strongest and most unassailable differentiators there are in a market. Companies occupying the second highest layer, Collaborating, are using portals and other Internet-based tools to maximize information sharing and co-development of strategies and the co-sharing of communications tools and ultimately platforms. Security, DRM and digital signature strategies all aimed

Marketing Plan for Digital Camera
Words: 4433 Length: 13 Document Type: Assessment

The approach Sony continues to take is one of concentrating on continual process improvement to become more agile and resilient in the face of environmental factors (Olenick, 2010) while at the same time seeking to comply with national requirements for sustainability and green initiatives including supply chain compliance (Svensson, 2009). Legal Factors -- Sony has a culture that embraces learning as a virtue, and continually strives to gain insights from

Public and Private Keys
Words: 580 Length: 2 Document Type: Essay

digital signatures that it ensures authentication. Explain how and why it does that. A digital signature is a unique and verifiable "signature" that allows for the reliable and proper determination of whether a file or message is form the person that is otherwise displayed and represented in the message. It is done because it can prove in a definitive way that the sender is who they say they are. What is

Information Technology in Peru
Words: 2566 Length: 8 Document Type: Term Paper

Information Technology in Peru The current environment in Peru is not conducive for huge IT investments The IT revolution has encouraged people to look for opportunities in different countries, particularly the third world countries which have been successful in providing the basic amenities at a cost lesser when compared to developed nations. This study is an effort to rank Peru as a possible IT destination for businesses that are planning to

Public Key Infrastructure Email Communication Has Strongly
Words: 1007 Length: 4 Document Type: Case Study

Public Key Infrastructure Email communication has strongly increased in the last couple of years and its still growing. It's hard to find a company which doesn't use email to run its business processes both within the company and with external business partners and clients. Therefore, the eminent security threat to the company's network infrastructure and content of the company products should be priories. The use of Public Key Infrastructure (PKI) would

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now