Eggs in baskets: distributing the risks of electronic signatures
Article Abstract:
The process of authenticating paper-based signatures is imperfect, and technologies developed for capturing and authenticating electronic signatures, such as public key encryption and pen biometrics, are also imperfect. The Utah strategy for public key encryption shifts the burden of protecting the secrecy of the key, and avoiding misuse, on the private key holder, or signator. Pen biometrics, which employs both signature capture and signature verification, distributes risk very much the way that the law of traditional signatures does.
Publication Name: The John Marshall Journal of Computer & Information Law
Subject: Library and information science
ISSN: 1078-4128
Year: 1997
User Contributions:
Comment about this article or add new information about this topic:
Personal jurisdiction in cyberspace: the constitutional boundary of minimum contacts limited to a Web site
Article Abstract:
An 'additional activity' standard should be adopted to determine minimum contacts for personal jurisdiction in relation to the stream of commerce on the Internet. The suggested 'additional activity' standard was established by Justice O'Connor's opinion in Asahi v. Superior Court of California in 1987 and has since been applied to several Internet cases. This standard suggests that a passive Web site is insufficient in itself to establish minimum contracts for personal jurisdiction.
Publication Name: The John Marshall Journal of Computer & Information Law
Subject: Library and information science
ISSN: 1078-4128
Year: 1997
User Contributions:
Comment about this article or add new information about this topic:
The Federal Trade Commission's commitment to on-line consumer protection
Article Abstract:
The Federal Trade Commission (FTC) is charged with enforcement of consumer protection laws as they apply to online commerce over the Internet. Most enforcement actions so far have been concerned with egregiously fraudulent marketing, including credit repair scams, pyramid schemes, and deceptive billing practices. Non-regulatory methods, including self-regulation by industry and consumer education, are also effective ways to enhance consumer protection in the online environment
Publication Name: The John Marshall Journal of Computer & Information Law
Subject: Library and information science
ISSN: 1078-4128
Year: 1997
User Contributions:
Comment about this article or add new information about this topic:
- Abstracts: A methodology for measuring the costs of universal service obligations. The 'state' of universal service
- Abstracts: Raising rivals' costs: the entry of an upstream monopolist into downstream markets. Introduction
- Abstracts: Efficiency versus social optimality: the case of telecommunications pricing. The determinants of market share for the 'dominant firm' in telecommunications
- Abstracts: An econometric analysis of the demand for access to mobile telephone networks. Competition, universal service and telecommunications policy in developing countries
- Abstracts: On price elasticities of international telecommunication demand. The pricing of international telecommunications services by monopoly operators