Search /
Docfinder:
Advanced search  |  Help  |  Site map
RESEARCH CENTERS
SITE RESOURCES
Click for Layer 8! No, really, click NOW!
Networking for Small Business
TODAY'S NEWS
While Heartbleed distracts, hackers hit US universities
How Apple's billion dollar sapphire bet will pay off
US to vote on sharp increase in broadband subsidies
iPhone 6 rumor rollup for the week ending April 18
NSA spying revelations have tired out China's Huawei
Arista co-founder may have switch maker by its jewels
Apple kicks off public OS X beta testing
Open source pitfalls – and how to avoid them
AT&T's expanded 1 Gbps fiber rollout could go head to head with Google
BlackBerry Releases BES 10 Security Update to Address 'Heartbleed' Flaw
Verizon: Web apps are the security punching bag of the Internet
Cisco announces security service linked with new operations centers
Dell launches virtual storage accelerator, aims to boost SAN performance
Free OS X Mavericks now powers half of all Macs
Even the most secure cloud storage may not be so secure, study finds  
3D printing will transform these five industries
Most but not all sites have fixed Heartbleed flaw
NEC launches face-recognition protection for PCs
Hundreds of medical professionals targeted in multi-state tax scam
Super-high frequencies could one day deliver your mobile video
Americans cool with lab-grown organs, but not designer babies
IT Departments Not Losing Ground to Managed Service Providers (Yet)
Where's my gigabit Internet, anyway?
IE6: Retired but not dead yet
Enterprise who? Google says little about Apps, business cloud services in Q1 report
/

The pen is mightier than the electronic signature


It's not often that you can get Internet legislation passed nearly unanimously in both Congress and the Senate, then signed with a flourish by the president. To some people, such a law must seem a truly wonderful thing, sure to bring peace and harmony and increased profits through e-commerce. To the rest of us, it's a sure sign the law doesn't do anything useful. Such is the fate of the new Electronic Signatures in Global and National Commerce, dubbed the E-Sign law.

The first tip-off to security experts that this law might be less than it seems is in the title. Notice that it uses the word "electronic" instead of "digital." A quick review of the law shows that, in fact, the new signatures do not have any security associated with them. This means that when you sign a document, you have no assurance that what you are signing is in fact what you think you are signing. Furthermore, the person receiving the signed document has no assurance that it was in fact you who signed the document.

In other words, a contract that is "signed" with an electronic signature is worth less than one on paper. It is approximately as valuable as an oral contract, where either party can later claim to have heard or said something different than what the other party says. If you sign a document by clicking on a button in a Web form, or even by sending e-mail, the receiving party can easily claim that what you clicked on or sent is different than the copy you kept on your hard drive.

Unfortunately, the E-Sign law is probably just another FEFL (full employment for lawyers) action by Congress. They could have easily done the right thing by saying that only digitally signed agreements, using the kind of security Network World readers have been using for many years, were legally binding. Crafting such a law isn't easy, but it's not impossible, either. It is certainly too soon to say "all digital signatures must use Secure Multi-purpose Internet Mail Extensions" or "all digital signatures must use Pretty Good Privacy," but a reasonable law could simply state "all digital signatures must use industry-standard formats and best practice security policies."

The general state of glee among those passing the bill was probably due to the promises of the lobbyists supporting the bill that this will be "good for e-commerce." That's not likely, given that the result will surely be less-than-scrupulous e-commerce sites starting to claim that users "signed" contracts that the users don't remember signing. Of course, these sites will have copies of the Web pages that the user clicked "OK" on, but nothing other than logs to prove the signature. This will end up in the newspapers, and maybe even the courts, and the result will probably be that most of the less-savvy users will trust e-commerce less than they do today.

RELATED LINKS

Hoffman is director of the Internet Mail Consortium and the VPN Consortium. He can be reached at phoffman@imc.org.

Hoffman is director of the Internet Mail Consortium and the VPN Consortium. He can be reached at phoffman@imc.org.

In the Works archive


NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.