Home » Articles posted by Assistant Editor (Page 2)

Author Archives: Assistant Editor

Tremors, MS, and Disease in Forgeries

I came across this article today.  I think you’ll find it fascinating.  It’s a discussion of how MS affects a prominent weather man up in New York.  It’s actually good to watch.  He has a good sense of humor, but he talks about the symptoms of shakiness in his hands…one  hand more than the other.  He can’t brush his teeth without throwing his toothbrush.  He can’t shave with his left hand.  The article, as well as other articles on the topic, discusses that handwriting is affected with MS and other neuromuscular diseases.

East Syracuse (WSYR-TV) – It’s a disease that strikes young adults, usually in their 30’s. About 400,000 Americans have multiple sclerosis, and many of them are grouped in Central New York. Among those suffering is NewsChannel 9’s Chief Meteorologist Dave Longley.

Dave first noticed his symptoms six years ago, when he was just 33 years old. “I had mentioned something to my wife. I said, ‘You know, I’m noticing just little things: my handwriting is getting worse, my right hand trembles and there’s no explanation.’  She said I should bring it up at my next annual checkup.”

After he did, Dave’s doctor sent him for an MRI. The resulting images showed white areas – lesions – on his brain. It’s a sign that his immune system is attacking his brain. “Instantly, you’re thinking, I’m going to be in a wheelchair in 10, 15, 20 years,'” he said.

If the diagnosis had come 20 years ago, Dave might have been right. There was previously no medicine for MS. Today, however, there are drugs that can slow down the disease.

Once each month Dave gets an infusion of Tysabri. The medicine has helped with his fatigue, but another symptom has worsened – his speech. “Its becoming obvious, if I could keep it hidden, I probably would just go about living my life and it’s no big deal,” he said.

Of course, Dave’s speech is just as important to his forecasts as any radar or map. “There are so many people that have MS a lot worse than I have,” he said. “I don’t want to minimize that, but I remember my wife saying, ‘Of all the things, you could have a leg that’s weak or a left arm that’s tingling, but it had to get your speech.’ And it’s tough.”

 Dave’s neurologist, Dr. Kevin Thomas, says they caught his MS early and the lesions haven’t worsened since his first MRI – a very good sign. “From my perspective, if I can catch someone early in MS, I can give them a lot of hope,” he said. “We can generally keep people in pretty good shape for a long period of time.”

Dave has displayed his bravery in fighting the disease and in sharing his experience in the hopes that he can help or inspire others. “I may have MS, but MS doesn’t have me.”

What is Multiple Sclerosis?

East Syracuse (WSYR-TV) – Central New York is one of the hot spots in the U.S. for Multiple Sclerosis, a disease in which the body’s immune system eats away at the protective sheath that covers the nerves.

There may be more people suffering in CNY and in the Minnesota/Wisconsin area than anywhere else in the U.S., according to Upstate Hospital Neurologist Dr. Burk Jubelt. Also, the National MS Society also cites Rochester as a location in which a cluster of cases was identified.

The Mayo Clinic reports that the risk of MS seems to increase with latitude. In fact, the reason for the particularly high rates of MS in CNY may be the relative lack of sunshine. Low levels of Vitamin D were linked to MS by a study in the Public Library of Science Genetics Journal.

Additionally, women are more vulnerable to the disease.  Seventy percent of MS patients are female, and they get it younger than men. The immune system starts attacking the brain at the average age of 30 in females, while men are more likely to get MS in their 40’s.

Family history is also a potential risk factor. While the normal risk is just one-tenth of one percent, someone whose parents or siblings develop MS have a 1-to-3 percent chance of developing the disease.

Additionally, certain autoimmune diseases, including thyroid disease, type 1 diabetes or inflammatory bowel disease increase the risk of developing MS.

Early symptoms include tingling and numbness in the hands, arms, legs or feet. The disease can also cause acute vision loss, causing things to look blurry or dark. There’s often a pain in the eye. Patients also report weakness on one side of the body, usually in a leg.

As the disease progresses, further symptoms include balance problems, tremors, extreme fatigue and bladder problems. Eventually, people with severe cases may lose the ability to walk or speak.

There’s no cure for multiple sclerosis. However, the National Multiple Sclerosis Society says some treatments can help treat attacks, modify the course of the disease, improve function and safety, treat symptoms and provide emotional support. In combination, these treatments enhance the quality of life for people living with the disease.

“For others, tremor may be more pronounced, causing a drink to spill when the cup is full, for example, or it can affect handwriting. For a small percentage of people, it is more severe, causing limbs to shake so that it becomes difficult or even impossible to eat, drink, or get dressed without help. Tremor can be frustrating and embarrassing whichever form it takes.”

More Articles here @ http://www.9wsyr.com

Couple Says Dealership Forged Their Signatures

You know, forgery is in the news all the time, but this article is different because it involves one of our graduates from the International School.

Wendy Carlson

Wendy Carlson was hired to analyze the handwriting of some signatures involved in a dealership scandal in the town of Littleton, Colorado where some  signatures were forged.  At least that was Wendy’s conclusion.  You might enjoy this article that came in the news on Channel 7 on their web site.

DENVER — A Littleton couple said a local Dodge dealership forged their signatures on legal documents.

Reporters with 7NEWS have learned that the Golden Police Department has launched a criminal fraud investigation.

In November of 2010, Josh and Marlina Bello purchased two cars from Christopher’s Dodge World in Golden.

“There were red flags from the very beginning,” said Marlina Bello.

Mrs. Bello said that when she went to make the first payment on the car, she was told she owed more than what was agreed upon. She said the interest rate had increased from 13 % to 18%, which raised their bill by $13 a month.

“Thirteen dollars doesn’t seem like much, but the difference in interest is almost $3,000,” said Mr. that Bello.

The Bellos said they approached the dealership and explained their signatures had been forged.

“They were totally trying to get rid of us; they kept saying, ‘What do we have to do, what do we have to do?'” 

In order to get out of what they called a fraudulent contract, the Bello’s said the dealership made them purchase two other cars in exchange for them buying back the two cars on the first contract.

“We sat down with the finance manager and the general sales manager and told them, ‘You guys really messed up; this is a forged signature. We did not sign this.”  Never once did they say “that’s your signature,'” said Marlina.

That’s the same answer 7NEWS reporter Dayle Cedars got when she called and spoke to the general manager and human resource manager at the dealership. No one ever denied forging the signatures.

Art Irwin, the human relations manager, said the salesman and sales manager involved in the transaction no longer work at Christopher’s Dodge World. Irwin said the two men were not fired and did not leave because of this incident.

Reporters with 7NEWS took the signatures to forensic expert Wendy Carlson. After reviewing the signatures as well as other signatures from Josh and Marlina Bello, Carlson said, “Someone did indeed forge Josh and Marlina’s” signatures. I am willing to testify to this fact in a court of law and I will prove to the court that my opinion is fact,” said Carlson.

Reporters with 7NEWS approached Irwin with the results from Carlson, but he refused to comment. Irwin said owner Chris Hall did not want anyone to speak to the media concerning this incident. Hall refused to talk as well.

The dealership said that as far as they are concerned, this deal is done because the suspected forged contract is now void sincee the Bellos bought two different cars to get out of it.

A spokesman for the Golden Police Department said the fraud investigation should be completed soon.

The bank that financed the original two cars the Bellos purchased has issued the couple a fraud packet in order to launch its own investigation. And the Colorado Dealers Board — which regulates auto dealerships — has also received a complaint about this case.

More Articles here : http://www.thedenverchannel.com

Lawyer commits forgery too!

I came across this article in a Las Vegas Newspaper, and it just reminds me of all the times in my career that I’ve seen notaries and attorneys involved in fraudulent documents.

This case is about an attorney who intentionally stole $200,000 from someone’s estate who trusted him to manage it  after he died.  Can you imagine trusting someone to manage your estate, and then your children have to fight the attorney who has the money to get the estate?

If you read the article, it goes on to say that this client was not the first victim. There have been 30 or  40.  In fact, before you hire an attorney, you might want to check with the state bar association.  Back in 2000 this guy had to sign an agreement not to provide legal services in divorce, personal injury, immigration and bankruptcy.  Can you believe it?  They still let him practice and handle probate cases despite the fact they knew he was probably a thief.

Disbarred lawyer Charles Radosevich of Las Vegas pleaded guilty in a criminal case charging him with forging court documents and stealing more than $200,000 from people who hired him for legal services.

Radosevich, 67, who is being held at the Clark County Detention Center on no bail, pleaded guilty to one count of theft and one count of forgery. District Judge David Barker set a date for the sentencing.

The charges, which involve the theft of $90,900 from an estate case, draw a maximum of 10 years in prison, a $10,000 fine for the theft count, four years in prison, and a $5,000 fine on the forgery.

Radosevich was charged with stealing a total of $140,000 from the estate of the mother of Darlene Lonzaga and her brother, Jimmy Montgomery. Radosevich was accused of circulating a phony court document with the forged signature of District Judge Elizabeth Gonzalez in an effort to swindle the brother and sister out of the estate money.

Ten other felony charges are being dismissed , according to the agreement .

But Radosevich agreed to pay restitution to all of his victims, including those named in the charges being dismissed.

One of those victims, Southern California real estate agent Michelle Geris, ended up being arrested blocks from her home in August 2009 after Radosevich was accused of having pocketed $53,000 she gave him to pay off a gambling debt to Green Valley Ranch Station.

Radosevich was supposed to give the money to the District Attorney’s Bad Check Unit, which planned to turn it over to Green Valley Ranch and then dismiss the criminal debt case against Geris. But when the Bad Check Unit did not receive the $53,000, it obtained a warrant for her arrest. That case is on hold as a result of Radosevich’s criminal troubles, and Geris is suing Radosevich in District Court.

Chief Deputy District Attorney Mike Staudaher said Wednesday he believes Radosevich left about 30 victims in his wake.

As part of his deal with prosecutors, Radosevich agreed to plead guilty to separate misdemeanor charges of obtaining money under false pretenses and unlawfully practicing law. He also agreed to plead guilty to two more felony theft charges and one felony count of obtaining money under false pretenses in a new case Staudaher plans to file this week.

Radosevich fled Las Vegas in September on the eve of his trial, but was captured in Phoenix after he stepped off a flight from Costa Rica and returned to Las Vegas.

Prosecutors have alleged that Radosevich, disbarred in Colorado and Nebraska, was forging documents and stealing money from clients even after being charged in his current case.

At the request of the Nevada State Bar, prosecutors filed criminal charges against Radosevich in October 2009 and added new charges in April 2010  after learning of more victims.

The State Bar has kept tabs on Radosevich since 2000, when it got him to sign an agreement promising, among other things, not to provide legal services in divorce, personal injury, immigration and bankruptcy cases.

More Article and News here : http://www.lvrj.comhttp://www.thesmokinggun.com/file/last-will-michael-joseph-jackson

Are electronic signatures valid in court? (digital signature law)

This article extremely relevant to cases involving electronic pen pads, such as visa, mastercard transactions using a stylo instead of pen and paper.

Original article found here.

http://library.findlaw.com/1999/Jan/1/241481.html
Electronic Signature Legislation

Electronic Signature Legislation

By Thomas J. Smedinghoff and Ruth Hill Bro of Baker & McKenzie LLP

This article explores some of the questions we should be asking ourselves in
using electronic signature legislation as a vehicle for advancing e-commerce.
First, we will define what we mean when we refer to electronic and digital
signatures. Second, we will examine the three fundamental legal issues raised by
online transactions that have fostered the felt need for electronic signature
legislation. Furthermore, for each issue, we will outline the underlying
concerns and examine the primary legislative approaches developed to date.
Third, we will conclude with some thoughts on legislation’s role in promoting
the growth of e-commerce by reviewing some statutes that have historically been
a positive force in promoting economic growth.

Introduction

Stimulated by the development of the American Bar Association Digital
Signature Guidelines,

[1]

electronic
signature legislation began with the Utah Digital Signature Act,

[2]

which was enacted in 1995 and focused solely
on issues raised by cryptography-based digital signatures. Soon thereafter,
legislation was introduced in several other states. Yet, the second state to
introduce such legislation, California, quickly changed its direction by
adopting a very minimalist and technology-neutral approach limited to
transactions with state government agencies.

[3]

Subsequent legislation rapidly migrated from technology-specific
statutes focused on digital signatures to technology-neutral statutes that
focused generally on all types of electronic signatures.

At last count, forty-nine states, the U.S. Federal Government, and the
governments of over fifteen countries have enacted or are currently considering
some form of electronic signature legislation.

[4]


In the U.S. alone, fifty-seven new electronic signature bills were
introduced in the state legislatures during the first two months of 1999.

[5]

In addition, the National Conference of
Commissioners on Uniform State Laws (“NCCUSL”) is completing a project to
develop a Uniform Electronic Transactions Act (“UETA”) in the U.S.;

[6]

the European Union has proposed a Directive on
a Common Framework for Electronic Signatures for the European Union;

[7]

and the United Nations Commission on
International Trade Law (“UNCITRAL”) Working Group on Electronic Commerce

[8]

completed work on its Model Law on Electronic
Commerce

[9]

in 1996, and is currently
drafting international legislation addressing digital signatures and
certification authorities.

[10]

The
Organisation for Economic Co-operation and Development (“OECD”) is also
addressing electronic signature legal issues,

[11]


as are several other public and private organizations.

[12]

Yet a quick look at the electronic signature legislation currently enacted or
under consideration

[13]


reveals that while
there is agreement on where we ultimately want to go (facilitating e-commerce),
there is little agreement on how to get there. As discussed in more detail
below, legislation ranges from a minimalist approach that simply authorizes the
use of electronic signatures in very limited circumstances, to legislation that
establishes some evidentiary presumptions and default provisions that parties
can contract out of, to a very formal and highly regulatory approach governing
the manner in which digital signatures may be used and certification authorities
may operate.

[14]

The essential question with regard to electronic signature legislation is:
How far down the road will it take us? Can the various types of legislation move
e-commerce in the right direction, or might they cause unintended detours?
Should we simply wait for disputes to arise and leave it to judges to transform
the legal landscape? Do the laws that work remarkably well and provide
predictability in the traditional, paper-based commercial world translate line
for line and serve as adequate mile markers for companies blazing trails to more
efficient commerce on the new electronic frontier? Given the explosion of
e-commerce activity, is legislation even necessary, or are there inherent limits
to the growth of e-commerce that legislation could help to overcome?

Enacting legislation designed simply to remove barriers, while an important
and worthwhile endeavor, may not move us far enough toward the ultimate goal.
Conversely, enacting laws or imposing regulations that force the market to use a
specific business model or specific technology, or that protect against
perceived problems that have not yet surfaced, might preclude the pursuit of
more promising e-commerce avenues.

Yet, if done properly, electronic signature legislation can, and perhaps
should, be designed and enacted to accomplish two goals: (1) to remove barriers
(actual and perceived) to e-commerce, and (2) to enable and promote the
desirable public policy goal of e-commerce by helping to establish the “trust”
and the “predictability” needed by parties doing business online. These two
goals might be best accomplished by enacting legislation that preserves freedom
of contract while recognizing that, because parties don’t always resolve all
issues by prior contractual agreement, limited default rules should apply when
such unresolved issues arise. Although the judiciary will certainly play a key
role in establishing the rules that will govern online transactions, we should
not automatically discount the positive contributions and early guidance that
legislation can provide. Likewise, while the goal of technology neutrality is
important from the standpoint of not stifling development or unfairly favoring
one technology over another, we must be careful as we draft electronic signature
legislation not to let neutrality become an excuse to avoid addressing
legitimate new issues raised by a unique technology, or worse, use neutrality as
a means to discriminate against the development of those technologies seen by
most as facilitating secure e-commerce. Finally, we must continually be
cognizant of the danger that the forty-nine different versions of electronic
signature legislation undertaken by the various states in this country might,
despite our best intentions, actually undermine the trust and predictability we
are seeking to establish.

II. THE CORE LEGISLATIVE CONCERN: ELECTRONIC AND DIGITAL SIGNATURES

The core concern of electronic signature legislation has been electronic
documents, sometimes referred to as “records” or “electronic records,”

[15]

and “signatures” that are created,
communicated, and stored in electronic form.

[16]


Generally, these signatures are referred to as either “electronic
signatures” or “digital signatures.” Unfortunately, these terms themselves have
created considerable confusion.

[17]

Thus,
for purposes of this article, we will define these terms as most commentators
have:

[18]

  • “Electronic signature” is a generic, technology-neutral term that refers to
    the universe of all of the various methods by which one can “sign” an electronic
    record. Although all electronic signatures are represented digitally (i.e., as a
    series of ones and zeroes), they can take many forms and can be created by many
    different technologies. Examples of electronic signatures include: a name typed
    at the end of an e-mail message by the sender; a digitized image of a
    handwritten signature that is attached to an electronic document (sometimes
    created via a biometrics-based technology called signature dynamics

    [19]

    ); a secret code or PIN (such as that used
    with ATM cards and credit cards) to identify the sender to the recipient; a code
    or “handle” that the sender of a message uses to identify himself; a unique
    biometrics-based identifier, such as a fingerprint or a retinal scan; and a
    digital signature (created through the use of public key cryptography).
  • ” Digital signature ”

    [20]

    is simply a
    term for one technology-specific type of electronic signature. It involves the
    use of public key cryptography

    [21]

    to
    “sign” a message, 

    [22]

    and is perhaps the
    one type of electronic signature that has generated the most business and
    technical efforts, as well as legislative responses.

A signature, whether electronic or on paper, is first and foremost a symbol
that signifies intent . Thus, the definition of “signed” in the Uniform
Commercial Code includes “any symbol” so long as it is “executed or adopted by a
party with present intention to authenticate a writing.”

[23]

The primary focus, of course, is on the
“intention to authenticate,” which distinguishes a signature from an autograph.
Yet, the nature of that intent will vary with the transaction, and in most cases
can be determined only by looking at the context in which the signature was
made.

[24]

A signature may, for example,
signify an intent to be bound to the terms of the contract, the approval of a
subordinate’s request for funding of a project, confirmation that a signer has
read and reviewed the contents of a memo, an indication that the signer was the
author of a document, or merely that the contents of a document have been shown
to the signer and that he or she has had an opportunity to review them.

In addition to evidencing a person’s intent, a signature can also serve two
secondary purposes. First, a signature may be used to identify the person
signing. Second, a signature may serve as some evidence of the integrity of a
document, such as when parties sign a lengthy contract on the final page and
also initial all preceding pages to guard against alterations in the integrity
of the document through a substitution of pages.

For electronic transactions, these secondary signature functions of identity
and integrity can be key. Especially to the extent that we automate electronic
transactions, and conduct them over significant distances using easily altered
digital technology, the need for a way to ensure the identity of the sender and
the integrity of the document becomes pivotal:

Unlike the world of paper-based commerce, where the requirement of a signed
writing most frequently serves the function of showing that an already
identified person made a particular promise, in the e-commerce world, a
requirement of an authenticated electronic message serves not only this
function, but the more fundamental function of identifying the person making the
promise contained in the message in the first place. This additional function is
critical in e-commerce because there are few other methods of establishing the
source of an electronic message.

[25]

Thus, while handwritten signatures in most cases serve merely to indicate the
signer’s intent, signatures in an electronic environment typically serve three
critical purposes for the parties engaged in an e-commerce transaction – i.e.,
to identify the sender,

[26]

to indicate the
sender’s intent (e.g., to be bound by the terms of a contract), and to ensure
the integrity of the document signed.

[27]

III. THE FUNDAMENTAL LEGAL ISSUES RAISED BY E-COMMERCE

Three fundamental legal issues arise when parties to a transaction use
electronic records to replace paper, employ an electronic medium as the mode of
communication, and use electronic signatures to authenticate their transactions:

  • Is it legal? Both federal and state law contain many requirements that
    transactions be documented in “writing” and be “signed.” Many are concerned that
    this requires ink on paper and, thus, that electronic communications do not meet
    appropriate legal requirements for writing and signature and will not be
    enforceable.
  • Can I trust the message? Recipients of electronic messages must have some
    basis for trusting the message (from a legal perspective), so that they can act
    in reliance upon the message, often in real time, and without the need for
    out-of-band verification. Achieving the key goals of e-commerce (including
    speed, efficiency, and economy) requires that recipients of electronic messages
    be willing to act in reliance on messages received (e.g., ship product, transfer
    funds, enter into binding contractual commitments, change position in reliance
    on messages), and to do so promptly and in many cases automatically. Yet, the
    indicia of reliability that usually accompany paper-based communications (such
    as a paper document signed with ink signatures and delivered by trusted third
    parties such as the U.S. Postal Service) are missing in electronic transactions.
    Moreover, the ease with which digital documents can be altered without detection
    increases the risk of fraud for electronic transactions.
  • What are the rules of conduct? As with all legal transactions, the parties
    should know the rules of the game. For example, what is the liability of a
    certification authority or a trusted third party for inaccurate identification?
    What is the liability of the signer of a message who loses the private key or
    other signature device used to create the message? What is required for
    cross-border recognition of electronic messages?

The most difficult question of all is what role, if any, electronic signature
legislation should play in addressing such legal issues. The following sections
will explore these three legal issues, the extent to which electronic signature
legislation addresses these issues, and the direction in which such legislation
should be moving.

A. IS IT LEGAL? REMOVING BARRIERS TO ELECTRONIC COMMERCE

1. The Issue

The first of these three issues – is e-commerce legal? – is the most
fundamental, because it involves questions regarding the enforceability of
electronic transactions. This issue raises concerns regarding whether electronic
records and electronic signatures meet legal formalities such as the writing and
signature requirements imposed by a variety of statutes and regulations; whether
an electronic record constitutes an “original” for evidentiary purposes;

[36]


whether electronic records and electronic
signatures will be denied admissibility because of their electronic form;
whether records can be maintained solely in an electronic form; and whether the
recordkeeper can establish the authenticity and integrity of such records.

Yet, the concern that has generated the most discussion, and the one that we
examine here, is whether electronically signed records meet writing and
signature requirements. In many cases, the law requires that an agreement be
both documented in “writing,”

[37]

and
“signed” by the person who is sought to be held bound, in order for that
agreement to be enforceable. The Statute of Frauds is, of course, the best
example of such a law.

[38]

Nevertheless,
thousands of other federal, state, and local statutes and regulations also
require a transaction to be documented by a writing and a signature. In
Illinois, for example, over 3,000 statutory sections contain such requirements.
Likewise, Georgia has over 5,500, and Ohio has over 8,000, such statutory
sections.

[39]

Statutes and regulations that require transactions to be “in writing” and
“signed” are generally perceived to constitute barriers to e-commerce – barriers
that must be removed if e-commerce is to flourish. Otherwise, an electronic
record might not satisfy statutory writing requirements, and an electronic
signature might not satisfy statutory signature requirements. In other words,
there is a concern that writing and signature requirements are satisfied only by
ink on paper. Interestingly, however, concerns over whether electronic records
and electronic signatures will satisfy these legal requirements may not be
warranted.

[40]

As the discussion below
indicates, the case law suggests that courts would find that electronic records
can meet the statutory writing requirements, and that electronic signatures can
meet the statutory signature requirements.

a. Writing Requirement

The traditional definition of a “writing” is not limited to ink on paper.
Rather, the essence of the requirement is that the communication be reduced to a
tangible form.

[41]


As early as 1869, a New
Hampshire court found a telegraphed contract to be a sufficient writing under
the Statute of Frauds:

It makes no difference whether that operator writes the offer or the
acceptance . . . with a steel pen an inch long attached to an ordinary
penholder, or whether his pen be a copper wire a thousand miles long. In either
case the thought is communicated to the paper by use of the finger resting upon
the pen; nor does it make any difference that in one case common record ink is
used, while in the other case a more subtle fluid, known as electricity,
performs the same office.

[42]

Courts have also found telexes, Western Union Mailgrams, and even tape
recordings to be writings under the Statute of Frauds.

[43]

Faxes have been assumed to be writings under
the Statute of Frauds.

[44]

Magnetic
recordings of data on computer disks have been held to constitute “writings” for
a variety of purposes, including under forgery statutes and copyright law.

[45]


Accordingly, it is likely that a court would
find that electronic messages recorded in a tangible medium would also satisfy
the writing requirement.

[46]

b. Signature Requirement

Generally, a signature is “any symbol executed or adopted by a party with
present intention to authenticate a writing.”

[47]

Thus, the key requirement is not ink on paper, but rather the presence
of a “symbol” coupled with the party’s “intention.”

The courts have found many symbols on a variety of media to be signatures:
names on telegrams,

[48]

names on
telexes,

[49]

typewritten names,

[50]

names on Western Union Mailgrams,

[51]

and even names on letterhead.

[52]

Faxed signatures have also been assumed to
constitute effective signatures.

[53]


Thus,
any symbol or code on an electronic record that is intended as a signature
should also meet the requirement. Even a name typed at the end of an e-mail
should qualify as a signature,

[54]

so long
as it was created with the proper intent.

Yet, concerns have lingered not only because of a few contrary court
decisions,

[55]

but also because of a lack
of specific statutory authorization. Notwithstanding the foregoing case law, a
general concern about the “legality” of electronic records and electronic
signatures has persisted, leading to numerous calls for legislation to remove
the perceived barriers to e-commerce resulting from traditional writing and
signature requirements. The benefits of predictability in the law

[56]

argue in favor of legislation that clearly
and unambiguously states that electronic signatures satisfy legal signature
requirements and that electronic records can satisfy legal writing requirements.

2. The Legislative Response

All electronic signature statutes enacted to date have a component designed
to remove these perceived barriers to e-commerce. In fact, for most electronic
signature legislation, that is the only issue that is addressed.

Unfortunately, the legislative approaches to what appears to be a simple
issue of merely removing barriers to e-commerce have been somewhat varied and
inconsistent, and may have actually made the situation worse. Specifically, in
clarifying that electronic records meet writing requirements and that electronic
signatures meet signature requirements, statutes have differed greatly regarding
two fundamental issues: (1) what qualifies as a signature; and (2) what types of
transactions can be undertaken using electronic records and electronic
signatures. The following sections discuss the variety of legislative approaches
(and inconsistencies) regarding these two issues.

a. What Qualifies as a Signature?

Perhaps the biggest issue that arises in legislation devoted to removing
barriers to e-commerce is the question of what type of electronic signature
qualifies as a signature (i.e., meets statutory and regulatory signature
requirements). Unfortunately, there is no uniform answer to this question.
Typically, legislation has taken one of three apparently inconsistent
approaches: (1) all electronic signatures satisfy legal signature requirements;
(2) electronic signatures satisfy legal signature requirements only when they
possess certain security attributes; or (3) digital signatures satisfy legal
signature requirements.

Moreover, not only is legislation inconsistent from state to state, but in
some cases inconsistent approaches have been enacted within the same state.

In the paper world, at least in the United States, anything can qualify as a
signature. The current definition of signature in the Uniform Commercial Code
(U.C.C.) includes “any symbol made with an intent to authenticate.”

[57]


Because there is no requirement as to the
nature of the mark that qualifies, courts have found that, in addition to the
traditional handwritten signature, a wide variety of marks (including a simple
“X”) will qualify.

[58]

Several states have
taken the same approach with electronic signatures – that is, any form of
electronic “symbol” on a message can qualify as a signature.

[59]

All such statutes take a technology-neutral
approach to the means by which such signatures are created (i.e., they do not
specify the technology that must be used, only the result that must be
achieved). The only requirements are, quite simply, the existence of a symbol or
security procedure, and an intent to authenticate on the part of the signer. The
proposed Uniform Electronic Transactions Act also takes this approach.

[60]

A second category of statutes, however, requires that electronic signatures
possess certain attributes or meet certain requirements before they will be
considered legally enforceable. Virtually all of these statutes take a
technology-neutral approach to these requirements.

Perhaps the most common requirements imposed by this second category of
statutes derive from a decision of the U.S. Comptroller General that was first
included in the California legislation enacted in late 1995.

[61]


Under statutes adopting this approach, an
electronic signature is legally effective as a signature only if it is: (1)
unique to the person using it; (2) capable of verification; (3) under the sole
control of the person using it; and (4) linked to the data in such a manner that
if the data is changed, the signature is invalidated. Some statutes have varied
this approach by including these four requirements in the definition of an
electronic signature (i.e., it’s not an electronic signature if it doesn’t
possess those four attributes) but also specifying that only electronic
signatures are legally effective as signatures. In either case, however, this
approach requires attributes of security as a precondition to the validity of
the signature itself, something not required for paper-based signatures.
Statutes in nearly a third of the states have adopted this approach.

[62]

The draft European Directive takes a similar
approach.

[63]

Unfortunately, the meaning of
these four requirements is not entirely clear, and such requirements may create
significant and unnecessary hurdles.

[64]

A different set of legal signature requirements is imposed by the UNCITRAL
Model Law. Specifically, the UNCITRAL Model Law requires that:

1. an electronic signature must include a method to identify the signer,

2. an electronic signature must include a method to indicate the signer’s
approval of the information contained in the message, and

3. the method used must be as reliable as was appropriate for the purpose for
which the message was generated or communicated.

[65]

A third category of legislation focuses not on the attributes an electronic
signature must possess in order to be enforceable as a signature, but rather on
the technology used to create the signature itself. Statutes falling within this
third category authorize the use of only a specific type of electronic signature
(i.e., a digital signature) and ignore the general category of electronic
signatures. Such legislation has been enacted in five states: Minnesota,
Missouri, New Hampshire, Utah, and Washington.

[66]

Yet a fourth category of enacted legislation says nothing whatsoever about
what constitutes a valid electronic signature.

[67]

These inconsistent approaches create a certain level of uncertainty for
businesses trying to do e-commerce in multiple jurisdictions, especially if such
businesses do not use electronic signatures that comply with requirements in all
jurisdictions.

b. What Types of Transactions Are Covered?

Electronic signature legislation has also taken a variety of approaches
regarding the types of transactions for which the use of electronic signatures
is authorized. Nearly 40% of the states expressly authorize the use of
electronic signatures for virtually all transactions.

[68]

Other states have statutes that authorize
the use of electronic signatures only for certain categories of transactions,
such as U.C.C. filings, medical records, or motor vehicle records.

[69]

Some states, however, condition the
authorization to use electronic signatures on the type of party involved in the
transaction. For example, some statutes authorize the use of electronic
signatures only where both parties are government agencies,

[70]


while other statutes require at least one of
the parties to be a government entity.

[71]

In yet other states, statutes authorize the use of electronic signatures only
for transactions involving a specific private entity, such as a financial
institution.

[72]

B. CAN I TRUST THE MESSAGE?

1. The Issue

The second primary concern of parties to an electronic transaction is the
issue of trust. That is, what is required before a party will act in reliance on
electronic messages in real time, and enter into commercial transactions, ship
product, extend credit, transfer funds, change the party’s position, or
otherwise enter into binding legal commitments with significant economic
consequences? The importance of trust for the success of e-commerce is widely
recognized. For example, the Commission of the European Communities noted that:

The first objective is to build trust and confidence. For e-commerce to
develop, both consumers and businesses must be confident that their transaction
will not be intercepted or modified, that the seller and the buyer are who they
say they are, and that transaction mechanisms are available, legal, and secure.
Building such trust and confidence is the prerequisite to win over businesses
and consumers to e-commerce.

[73]

Likewise, the world’s largest software industry trade association observed
that: “[t]he notion of trust in e-commerce is of critical importance and applies
to both consumers and businesses. From secure sales to the handling of personal
data to certifying transactions and individuals, trust is the underlying issue
that will determine whether e-commerce reaches its full potential.”

[74]

Trust, of course, plays a role in virtually all commercial transactions.
Regardless of whether the deal is struck in cyberspace or in the more
traditional paper-based world, transacting parties must trust the messages that
form the basis for the bargain. Trusting a message, from a legal perspective,
requires consideration of the authenticity and integrity of the message, as well
as an assessment of whether the message is nonrepudiable by the sender in the
event of a dispute.

a. Authenticity

Authenticity is concerned with the source or origin of a communication.

[75]

Who sent the message? Is it genuine or a
forgery?

A party entering into an online transaction in reliance on an electronic
message must be confident of that message. For example, when a bank receives an
electronic payment order from a customer directing that money be paid to a third
party, the bank must be able to verify the source of the request and ensure that
it is not dealing with an impostor.

[76]

Likewise, a party must also be able to establish the authenticity of its
electronic transactions should a dispute arise. That party must retain records
of all relevant communications pertaining to the transaction and keep those
records in such a way that the party can show that the records are authentic.
For example, if one party to a contract later disputes the nature of its
obligations, the other party may need to prove the terms of the contract to a
court. A court, however, will first require that the party establish the
authenticity of the record that the party retained of that communication before
the court will consider it as evidence.

[77]

b. Integrity

Integrity is concerned with the accuracy and completeness of the
communication. Is the document the recipient received the same as the document
that the sender sent? Is it complete? Has the document been altered either in
transmission or storage?

The recipient of an electronic message must be confident of a communication’s
integrity before the recipient relies and acts on the message. Integrity is
critical to e-commerce when it comes to the negotiation and formation of
contracts online, the licensing of digital content, and the making of electronic
payments, as well as to proving up these transactions using electronic records
at a later date. For example, consider the case of a building contractor who
wants to solicit bids from subcontractors and submit its proposal to the
government online. The building contractor must be able to verify that the
messages containing the bids upon which it will rely in formulating its proposal
have not been altered. Likewise, if the contractor ever needs to prove the
amount of the subcontractor’s bid, a court will first require that the
contractor establish the integrity of the record he retained of that
communication before the court will consider it as evidence in the case.

[78]

c. Nonrepudiation

Nonrepudiation is the ability to hold the sender to his communication in the
event of a dispute.

[79]

A party’s
willingness to rely on a communication, contract, or funds transfer request is
contingent upon having some level of comfort that the party can prevent the
sender from denying that he sent the communication (if, in fact, he did send
it), or claim that the contents of the communication as received are not the
same as what the sender sent (if, in fact, they are what was sent). For example,
a stockbroker who accepts buy/sell orders over the Internet would not want his
client to be able to place an order for a volatile commodity, such as a pork
bellies futures contract, and then be able to confirm the order if the market
goes up and repudiate the order if the market goes south.

[80]

With paper-based transactions, a party can rely on numerous indicators of
trust to determine whether the signature is authentic and the document has not
been altered. These include using paper (sometimes with watermarks, colored
backgrounds, or other indicia of reliability) to which the message is affixed
and not easily altered, letterhead, handwritten ink signatures, sealed envelopes
for delivery via a trusted third party (such as the U.S. Postal Service),
personal contact between the parties, and the like. With electronic
communications, however, none of these indicators of trust are present. All that
can be communicated are bits (0s and 1s) that are in all respects identical and
can be easily copied and modified.

This has two important consequences. First, it often becomes extremely
difficult to know when one can rely on the integrity and authenticity of an
electronic message. This, of course, makes difficult those decisions that
involve entering into contracts, shipping products, making payments, or
otherwise changing one’s position in reliance on an electronic message. Second,
this lack of reliability makes proving up one’s case in court virtually
impossible. For example, while a typewritten name appended at the end of an
e-mail message may qualify as a signature under applicable law, that name could
have been typed by anyone, and if the defendant denies the “signature” in a
lawsuit, it may be virtually impossible for the plaintiff to prove the
authenticity of that signature. As a result, nonrepudiation is by no means
assured in such a case, and parties thus may choose to forego e-commerce where
the risk of repudiation is too great.

In many respects, trust is a key element of the measurement of risk. And the
need for trust can vary significantly, depending on the risk involved. Selling
books on the Internet, for example, may not require a high level of trust in
each transaction, especially where a credit card number is provided and the risk
of loss from fraud is relatively low (e.g., a $20 book). On the other hand,
entering into long-term, high-dollar value contracts electronically may require
a much higher level of trust. At a minimum, the risk of a fraudulent message
must be acceptable given the nature and size of the transaction.

Thus, where the amount at issue is relatively small or the risk is otherwise
low, trust in an electronic message’s authenticity and integrity may not be a
critical issue. If e-commerce is to reach its full potential, however, parties
must be able to trust electronic communications for a wide range of
transactions, particularly ones where the size of the transaction is substantial
or the nature of the transaction is of higher risk. In such cases, a party
relying on an electronic communication will need to know, at the time of
reliance, whether the message is authentic, whether the integrity of its
contents is intact, and, equally important, whether the relying party can
establish both of those facts in court if a dispute arises (i.e.,
nonrepudiation).

2. The Legislative Response

Most electronic signature statutes simply do not address the issue of trust
at all. Those statutes that do focus on the issue take two different approaches,
although either approach requires implementation of rules or standards, or a
procedure or mechanism, for determining which technologies are capable of
creating such trustworthy signatures, and when, and under what circumstances,
that capability is considered fulfilled.

Under the first approach, a trustworthy electronic signature is a
precondition to enforceability as a signature. Statutes adopting this approach
typically require that electronic signatures possess four attributes – i.e., the
electronic signature must be: (1) unique to the person using it; (2) capable of
verification; (3) under the sole control of the person using it; and (4) linked
to the data in such a manner that if the data is changed, the signature is
invalidated.

[81]

If all of these
requirements are met, the electronic signature will be deemed to be a signature
for purposes of that state’s various statutory and regulatory signature
requirements – i.e., the electronic signature will be enforceable.

A number of other statutes have adopted a second approach. These statutes
state that almost any form of electronic signature can be enforceable and meet
legal signature requirements, while recognizing that some electronic signatures
are more trustworthy than others.

[82]

To
encourage the use of those electronic signatures deemed to be more trustworthy,
and to provide relying parties with an enhanced level of assurance at the time
of reliance regarding the authenticity and integrity of messages using such
signatures, these statutes typically provide a legal benefit in the form of an
evidentiary presumption regarding the sender’s identity and/or the integrity of
the document.

[83]

Yet, the criteria for
determining which technologies and which messages are sufficiently trustworthy
to be accorded the benefit of such legal presumptions have varied significantly
from statute to statute.

Some of these statutes take a technology-neutral approach to identifying the
class of trustworthy electronic signatures that qualify for such a legal
benefit. For example, the Illinois Electronic Commerce Security Act creates a
class of trustworthy signatures called “secure electronic signatures.”

[84]

In addition to certain requirements
regarding implementation,

[85]

a signature
qualifies as “secure” if the parties to the transaction agree on such a
characterization, or if the technology used to create the signature is certified
by the Secretary of State as capable of creating, in a trustworthy manner, an
electronic signature that:

  • is unique to the signer within the context in which it is used;
  • can be used to objectively identify the person signing the electronic
    record;
  • was reliably created by such identified person; and

    [86]
     

  • is created and is linked to the electronic record to which it relates in a
    manner such that if the record or the signature is intentionally or
    unintentionally changed after signing the electronic signature is
    invalidated.

    [87]

An electronic signature that qualifies as a secure electronic signature
enjoys a rebuttable presumption that the signature is that of the person to whom
it correlates.

[88]

Similar types of
presumptions for a technology-neutral class of secure records and secure
signatures appear in legislation that has been enacted in South Carolina and
Singapore.

[89]

Other technology-neutral
electronic signature legislation incorporating rebuttable presumptions (although
limited to certain types of transactions) has been enacted in Alabama (limited
to certain tax-related usage)

[90]

and in
Ohio (limited to certain health care usage).

[91]

Technology-specific statutes that confer similar legal presumptions have been
enacted in Minnesota, Missouri, Utah, and Washington, and all such statutes
focus solely on digital signature technology.

[92]

To ensure that the digital signature possesses a level of trust
sufficient to warrant enhanced legal recognition, these statutes impose a
regulatory structure on certification authorities who voluntarily elect to be
licensed by the State.

[93]

Based on the
apparent assumption that all certificates issued by licensed certification
authorities are trustworthy, and that a digital signature that is created using
the private key corresponding to the public key listed in such a certificate is
a trustworthy signature, the legislation has bestowed attributes of trust to
messages verifiable by such certificates.

[94]

C. WHAT ARE THE RULES OF CONDUCT?

1. The Issue

In addition to facilitating the trust necessary to encourage users of
e-commerce messages to act in reliance on them, electronic signature legislation
can provide the predictability required by businesses to engage in e-commerce
transactions. Predictability is a watchword for the growth of commerce, and law
can play a key role in providing this valuable commodity.

[99]

Predictability in e-commerce will no doubt be founded upon many sources of
relevant law: longstanding principles of freedom of contract in which parties
determine the terms that will govern their online transactions, the rich common
law tradition of judge-made precedent recognizing such contracting principles
and shedding light on statutes governing commercial transactions, and
legislation geared to e-commerce as well as statutes of more general
application. For example, as James Willard Hurst noted in his analysis of the
legal history of the lumber industry in Wisconsin between 1836 and 1915, the
relevant law for providing the reasonably assured expectations that were
essential to the growth of the industry included not only that of simple
contracts, but also “the law of more complex arrangements – of negotiable
instruments, of secured transactions (mortgage, pledge, reserved title, lien),
of business association (joint venture, partnership, corporation), and of
insurance.”

[100]

The difficult question is how predictability can best be provided to advance
e-commerce. The Internet is revolutionizing the way that companies do business,
and parties engaging in online transactions face novel legal challenges that
test the limits of existing statutory and case law. In many instances, the rules
in electronic commerce transactions will follow from the rules set forth for
paper-based transactions. For example, to be enforceable, certain contracts must
be signed by the party to be bound. Likewise, for a contract to be valid, there
must be an offer and acceptance as well as consideration for the transaction. In
other instances, however, e-commerce transactions have raised, and will continue
to raise, issues not easily answered by extensions of traditional law,
particularly regarding issues that are unique to a specific technology.

For example, while electronic signatures created through the use of a
digitized handwritten signature (or even via signature dynamics) are probably
governed by traditional rules relating to signatures, electronic signatures
created through the use of digital signatures raise a host of new legal issues.
Because digital signatures are created by using a unique and secret private key
that is associated with the signer, an issue is raised as to the liability of
the identified signer if the private key is compromised and the signature is, in
fact, created by someone else. Likewise, because digital signatures frequently
involve the use of certificates to establish identity, and because certificates
are typically issued by a trusted third party, issues are raised as to the
obligations of that third party and its potential liability in the event that
certificates are erroneously issued, improperly verified, or not revoked upon
request.

2. The Legislative Response

Most electronic signature statutes enacted to date say nothing about the
rules governing the conduct of parties using electronic signatures. A few states
have, however, enacted legislation addressing at least some of the rules
governing the conduct of the parties. This legislation generally falls into two
categories.

The first category is exemplified by the technology-specific digital
signature legislation enacted in Minnesota, Missouri, Utah, and
Washington.

[101]

These statutes address a
variety of issues raised by the use of public key technology. First, they
specify the scope of the obligations of the person obtaining a digital
certificate to:

  • make truthful representations in applying for a certificate;
  • review and accept a certificate before using it;
  • make certain representations upon acceptance of the certificate;
  • control and keep confidential the person’s private key; and
  • promptly revoke the certificate upon compromise of the underlying private
    key.

Such statutes also extensively outline the obligations of certification
authorities, that seek the benefit of the state licensing provisions (and, in
some cases, outline the obligations of all certification authorities, whether or
not licensed). Typically the statutes specify the obligations of the
certification authority to:

  • use a trustworthy system;
  • disclose its practices and procedures ;
  • properly identify a prospective applicant for a certificate;
  • publish issued certificates in a repository;
  • suspend and/or revoke certificates;
  • make warranties to the certificate applicant upon issuance of the
    certificate; and
  • make warranties to persons using the certificate to verify digitally signed
    messages.

These statutes also usually specify qualifications required to become a
licensed certification authority, including rules governing personnel, the
filing of a bond or suitable guaranty, the use of a trustworthy system, the
possession of sufficient working capital, the maintenance of an office in the
state, and the compliance with other licensing requirements established by the
state.

[102]

The statutes also permit
certification authorities to limit their liability in a variety of ways.

Some technology-neutral electronic signature statutes address issues related
to the general use of electronic signatures, including rules regarding:

  • the creation and control of signature devices used by the signers of
    electronic messages to produce a unique electronic signature;
  • instances in which signatures would be attributed to the named signer;
  • the unauthorized use of signature devices;
  • whether a party is obligated to accept an electronic signature; and
  • the circumstances under which the parties to a transaction may vary the
    provisions of the statute (i.e., party autonomy).

    [103]

In some cases, such as those involving the licensing of certification
authorities, the statute establishes a regulatory structure. In other cases,
however, the statutory rules simply address questions bound to arise sooner or
later. For example, if a private key is compromised, and an unauthorized message
is used to defraud an unsuspecting third party, we must answer the question of
which party (i.e., the defrauded third party or the person whose signature was
“forged”) should bear the resulting loss. Although numerous public policy
arguments can be made for each position, the fact remains that different
questions such as these cannot be indefinitely ignored – if they are not
addressed by a contract between the parties, they must either be answered
legislatively or, if all else fails, by a court.

Most forms of electronic signature legislation that apply to
business-to-business transactions provide few if any, provisions relating to the
rules governing the conduct of the parties using electronic signatures. Many
statutes simply specify the attributes required before an electronic signature
will be considered enforceable. Several do, however, provide that the use or
acceptance of an electronic signature is at the option of the parties to the
transaction.

[104]

A few other statutes
also provide some limited rules governing the conduct of the parties using
electronic signatures. These include, for example, Georgia, which provides a
remedy for a person whose electronic signature is used in an unauthorized
fashion;

[105]

Hawaii, which provides that
a time-stamp is prima facie evidence that the time-stamped signature took effect
as of the date and time indicated in the time-stamp;

[106]


and Illinois, which provides rules
relating to electronic recordkeeping, the creation and control of signature
devices, and the rights and responsibilities of parties using digital
signatures.

[107]

A key issue that arises when prescribing rules of conduct for the parties is
whether such rules should be mandatory or operate simply as gap-fillers (i.e.,
default rules that can be varied by contract). This issue of party autonomy
(i.e., freedom of contract) has also been critical for the United States in the
context of its international negotiations regarding electronic signatures
through the UNCITRAL Working Group on Electronic Commerce. However, those
seeking a regulatory licensing regime governing certification authority services
and the use of digital signatures, and persons seeking strong consumer
protection, have all favored legislation containing certain provisions that
cannot be varied by an agreement of the parties.

A review of existing U.S. electronic signature legislation reveals very few
statutes that address these issues. The technology-specific digital signature
statutes enacted in Minnesota, Missouri, Utah, and Washington, which provide for
the voluntary licensing of certification authorities, all contain numerous
provisions that cannot be varied by agreement of the parties. Moreover, they do
not contain a general party autonomy provision. Conversely, the electronic
signature legislation enacted in Illinois, as well as the proposed Uniform
Electronic Transactions Act, contain express provisions authorizing parties to a
transaction to vary the terms of the statute by agreement between them. Most
other legislation is simply silent on the subject of party autonomy. This
includes the legislation specifying the four conditions of trust that must be
present before an electronic signature will be considered enforceable, thereby
leaving unanswered the question of whether the contracting parties may agree
between themselves to accept an electronic signature that does not meet the
requirements of those statutes.

IV. CONCLUSION

Although it seems proper to reject the imposition of undue restrictions on
e-commerce, we must recognize that legislation can, if properly written,
encourage rather than restrict, and promote rather than disable, the desirable
public policy goal of global e-commerce. In evaluating the merits of electronic
signature legislative initiatives, we must be sure to distinguish between
regulatory legislation, which often dictates restrictive standards and
conditions, and enabling or facilitating legislation, which can be used to
support freedom of contract and increase predictability and certainty in online
transactions without inhibiting the development of new business models and
technology for authentication and message integrity. We must also keep in mind
that limiting the legislative helping hand that we extend to e-commerce is not
risk-free; benign neglect may well produce stagnation or at least slow the
development of business online. Retention of existing law during a period of
rapid technological innovation can, paradoxically, create instability and
uncertainty. Conversely, when law moves with change in business practice, law
can actually have its most stabilizing effect and facilitate economic growth.

We have seen what has already been done by the initial trailblazers in
e-commerce – companies whose businesses were already firmly rooted in electronic
media (such as the computer industry) or whose businesses translated easily to
e-commerce business models.

[147]

While
many are using the Internet to great effect for advertising and distributing
other content, many more have yet to realize the ultimate promise of this
powerful communications medium to engage in online transactions. The difficult
question is this: what role can legislation play in encouraging the exploration
of the transactional frontiers that this New World of e-commerce has to offer?

The answers to the legal issues raised in this article are far from clear.
Electronic signature legislation can and should serve as a vehicle for advancing
e-commerce, but we no doubt will need to adapt our legislative approaches as new
business models and technologies emerge and the case law develops. In
particular, we should closely monitor whether the wide diversity in the various
state laws regarding electronic signatures is hindering the development of
e-commerce, new business models, or new technologies, and whether the lack of
uniform state or federal e-commerce legislation is putting the U.S. at a
competitive disadvantage. History has shown us that Mexico’s delay in reforming
its divergent mix of secured transactions laws to provide predictability and
keep pace with the legal innovations of countries such as the U.S. and Canada
greatly inhibited the extension of credit in Mexico and thereby hindered its
economic growth. We would do well not to make the same mistake with our
electronic signature laws.

One thing is certain: great change predominates the e-commerce world, and
unless we move with change, we will become its victims.

Footnotes


[1]

Information Security Committee,
Electronic Commerce Division, Digital Signature Guidelines , 1996 A.B.A. SEC.
SCI. & TECH. [hereinafter Digital Signature Guidelines ), available at
www.abanet.org/scitech/ec/isc/dsgfree.html.Return to
Text


[2]

See UTAH CODE ANN. §§ 46-3-101 to
46-3-504 (1999).Return to
Text

 

[3]

See CAL GOV’T CODE § 16.5 (West 1999).
Return to
Text


[4]

See
Baker & McKenzie
(providing a regularly updated summary of all enacted and pending electronic and
digital signature legislation).Return to
Text


[5]


See Baker & McKenzie,
Summary of Electronic and Digital
Signature Legislation

.Return to
Text


[6]


The UETA project was completed in
Spring 1999 and will be ready for approval by NCCUSL at its annual meeting in
the Summer of 1999. Accordingly, the UETA should be ready for enactment by the
states in early 2000.Return to
Text


[7]

See European Commission, supra note 6, at
1.Return to
Text


[8]

UNCITAL: THE UNITED NATIONS COMMISSION
ON INTERNATIONAL TRADE LAW (2d ed. 1991). UNCITRAL is the body within the United
Nations primarily charged with oversight of international commercial law. It was
created in 1966 by General Assembly Resolution 2205 (XXI) in order to enable the
United Nations to play a more active role in reducing or removing legal
obstacles to the flow of international trade. A list of its completed projects
and their current status may be found at UNCITRAL’s home page
http://www.un.or.at/uncitral
.” Amelia H. Boss, Electronic Commerce and
the Symbiotic Relationship Between International and Domestic Law Reform , 72
TULANE L. REV. 1932, n.3 (1998). Return to
Text


[9]

See United Nations, UNCITRAL Model Law on
Electronic Commerce with Guide to Enactment 1996 (visited Apr. 19 1999)
www.un.or.at/uncitral/english/texts/electcom/ml-ec.htm
.Return to
Text


[10]

In 1996, UNCITRAL decided to place
the issues of digital signatures and certification authorities on its agenda.
UNCITRAL’s Working Group on Electronic Commerce was requested to examine the
desirability and feasibility of preparing uniform rules on those topics, and to
provide UNCITRAL with sufficient elements for an informed decision regarding the
scope of the uniform rules to be prepared. As to a more precise mandate for the
Working Group, it was agreed that the uniform rules should address such issues
as: the legal basis supporting certification processes, including emerging
digital authentication and certification technology; the applicability of the
certification process; the allocation of risk and liabilities of users,
providers, and third parties using certification techniques; the specific issues
of certification through the use of registries; and incorporation by reference.
See United Nations Commission On International Trade Law, Report of the Working
Group on Electronic Commerce on the Work of its Thirty-Second Session (A/CN.
9/446 Feb. 11, 1998)
http://www.un.or.at/uncitral/english/sessions/unc/unc-31/acn9-446.htm
.Return to
Text


[11]

See Organisation for Economic
Co-operation and Development, EMU – Facts, Challenges and Policies (last
modified Mar. 16, 1999) <
http://www.oecd.org
> . The OECD is an
international organization with twenty-nine member countries from North America,
Europe, and the Asia-Pacific area. Based in Paris, France, OECD is a forum
permitting governments of the industrialized democracies to study and formulate
economic and social policies. Its sole function is direct cooperation among the
governments of its member countries. Id. Return to
Text


[12]

See, e.g. , ILPF, Internet Law and
Policy Forum , (visited Apr. 9, 1999)
http://www.ilpf.org
.Return to
Text


[13]

See McBride Baker & Coles, supra
note 12 (providing a summary of all electronic and digital signature
legislation).Return to
Text


[14]

Id. Return to
Text


[15]


See, e.g., 5 ILL. COMP. STAT. 175/5-105
(effective July 1, 1999). Under Illinois law, a “record” is “information that is
inscribed, stored, or otherwise fixed on a tangible medium or that is stored in
an electronic or other medium and is retrievable in perceivable form.” Id.
Additionally, an “electronic record” is a “record generated, communicated,
retrieved, or stored by electronic means for use in an information system or for
transmission from one information system to another.” Id. See also Report of the
United Nations Commission on International Trade Law on the Work of Its
Twenty-Ninth Session, U.N. GAOR, 51st Sess., Supp. No. 17, at Annex 1, U.N. Doc.
A/51/17 (1996).Return to
Text


[16]

“Electronic” form refers generally to
a variety of formats by which information can be stored, including electrical,
digital, magnetic, optical, electromagnetic, or any other form of technology
that entails capabilities similar to the foregoing technologies. See, e.g. , 5
ILL. COMP. STAT. 175/5-105. Return to
Text


[17]

Because all forms of electronic
signatures exist in digital form, many of the electronic signature statutes
erroneously use the technology-specific term “digital signature” to refer to the
generic class of all methods by which an electronic message can be signed –
i.e., electronic signatures. Some statutes use the term “digital signature” to
refer to a public key cryptography-based signature, while other statutes use it
to refer to any type of signature in digital form (i.e., an “electronic
signature”). Statutes in this latter category include: ARIZ. REV. STAT. ANN. §
41-132 (West 1998); CAL. GOV’T CODE § 16.5 (West 1999); GA. CODE ANN. §10-12-4
(Michie 1998); 15 ILL. COMP. STAT. 405/14/01 (West 1998); MD. CODE ANN. STATE
GOV’T § 8-504 (1998); NEB. REV. STAT. ANN. § 86-170 (Michie 1999); N.H. REV.
STAT. ANN. § 294-D: 4 (1999); TEX. GOV’T CODE ANN. § 2054.060 (West 1999); TEX.
TRANSP. CODE ANN. § 201.933 (West 1999); VA. CODE ANN. §§ 59.1-467, 59.1-468,
59.1-469 (Michie 1998). See, e.g. , CAL. GOV’T CODE § 16.5 (defining a “digital
signature” as “an electronic identifier, created by computer, intended by the
party using it to have the same force and effect as the use of a manual
signature”). Cf. FLA. STAT. § 282.70 (West 1998) (defining an “electronic
signature” more appropriately as “any letters, characters, or symbols,
manifested by electronic or similar means, executed or adopted by a party with
an intent to authenticate a writing”).Return to
Text

 

[18]

Global Information Infrastructure
Commission, A Global Action Plan for Business With Governments Toward Electronic
Commerce (Sept. 9, 1998 draft) < http://www.giic.org/pubs.e biaa.pdf > . A
consensus appears to be emerging to define “electronic signature” as the process
of signing an electronic document or transaction to obtain legal equivalence
with the hand-written signature, and “digital signature” as one (but not the
only) technique to deliver the functions required of an electronic signature.
Id. Return to
Text


[19]


CAL. CODE REGS. tit. 2 §
22003(b)(1)(D) (1998). Under the California Digital Signature Regulations,
“‘Signature Dynamics’ means measuring the way a person writes his or her
signature by hand on a flat surface and binding the measurements to a message
through the use of cryptographic techniques.” Id. Return to
Text


[20]

For purposes of this article, we
assume that the reader is familiar with digital signatures and the asymmetric
(public key) cryptography used to create them. For an overview of this
technology and the process by which digital signatures are created, see THOMAS
J. SMEDINGHOFF, Ed. ONLINE LAW chs. 3, 4, 31 (1996); WARWICK FORD AND MICHAEL
BAUM, SECURE ELECTRONIC COMMERCE (1997); Digital Signature Guidelines, supra
note 8.Return to
Text


[21]

Public key cryptography employs an
algorithm using two different but mathematically related cryptographic keys. One
key for creating a digital signature or transforming data into a seemingly
unintelligible form, and the other key for verifying a digital signature or
returning the message to its original form.Return to
Text

 

[22]

In more technical terms, a digital
signature is the sequence of bits that is created by running an electronic
message through a one-way hash function to create a unique digest (or
“fingerprint”) of the message and then using public key encryption to encrypt
the resulting message digest with the sender’s private key.Return to
Text


[23]

U.C.C. Article 1, § 1-201(39) (1999).
Return to
Text


[24]

Some statutes, however, infer intent.
See, e.g. , CCA, Singapore Electronic Transactions Act 1998 , § 18(2)(b)
http://www.cca.gov.sg/eta/

[hereinafter Singapore Electronic Transactions Act ].Return to
Text


[25]

R. J. Robertson, Jr., Electronic
Commerce on the Internet and the Statute of Frauds , 49 S.C. L. Rev. 813
(1998).Return to
Text


[26]

See infra notes 60-65 and accompanying
text. In apparent recognition of this fact, the electronic signature statutes
enacted in several states (e.g., California) require that an electronic symbol
identify the signer before that symbol will qualify as an electronic signature.
Return to
Text

 

[27]

It is, of course, possible to use a
security procedure to preserve the integrity of an electronic record without
creating an electronic signature. Yet, regardless of whether an electronic
signature or an alternative security procedure are used, the issue of ensuring
the integrity of electronic documents must be addressed.Return to
Text


[36]

The requirement that a document be
“an original” occurs in a variety of contexts for a variety of reasons. In many
situations, documents must be transmitted unchanged (i.e., in their “original”
form), so that other parties may have confidence in their contents. Examples of
documents where an “original” is often required include trade documents (e.g.,
weight certificates, agricultural certificates, quality/quantity certificates,
inspection reports, insurance certificates) and non-business related documents
(e.g., birth certificates and death certificates). When these documents exist on
paper, they are usually only accepted if they are “original,” because
alterations may be difficult to detect in copies. The requirement that a
document be “an original” is also important from an evidentiary perspective. In
particular, the “best evidence rule” (sometimes referred to as the “original
document rule”) requires that: “[i]n proving the terms of a writing, where the
terms are material, the original writing must be produced unless it is shown to
be unavailable for some reasons and other than the serious fault of the
proponent.” EDWARD W. CLEARY, MCCORMICK ON EVIDENCE § 203 at 704 (3d ed. 1984).
See also 6 JACK B. WEINSTEIN’S FEDERAL EVIDENCE § 1002 (Joseph M. McLaughlin
& Matthew Bender eds, 2d ed. 1998) (defining “Requirement of Original,”
which states that “to prove the content of a writing, recording or photograph,
the original writing, recording, or photograph is required, except as otherwise
provided in these rules or by act of Congress”). Return to
Text


[37]

Requirements that agreements be “in
writing” serve a variety of purposes. These include: (1) providing tangible
evidence of the existence and nature of the intent of the parties to bind
themselves; (2) alerting parties to the consequences of entering into a
contract; (3) providing a document that is legible to all, including strangers
to the transaction; (4) providing a permanent record of the transaction that
remains unaltered over time; (5) allowing the reproduction of a document so that
each party can have a copy of the same; (6) allowing for the authentication of
the data by means of a signature; (7) providing a document that is in a form
acceptable to public authorities and courts; (8) finalizing the intent of the
author of the writing and providing a record of that intent; (9) allowing easy
storage of data in tangible form; (10) facilitating control and subsequent audit
for accounting, tax, or regulatory purposes; and (11) bringing legal rights and
obligations into existence in those cases where a “writing” is required for
validity purposes. See Commission on Electronic Commerce and Crime, Final Report
of the Commission on Electronic Commerce and Crime (May 26, 1998) available at
http://www.bakerinfo.com/ecommerce

.Return to
Text


[38]

For the Statute of Frauds and
contracts involving the sale of goods, see U.C.C. § 2-201(1) (1998); see also
U.C.C. § 1-206 (1998) (limited enforcement of unsigned, unwritten contracts for
the sale of securities for $5,000 or more). See RESTATEMENT (SECOND) OF
CONTRACTS § 110 statutory note, at 284-85 (1982) for a state-by-state listing of
state statutes of frauds.Return to
Text


[39]

See Report of the National Conference
of Commissioners on Uniform State Laws (NCCUSL), Uniform Electronic Transactions
Act, Task Force on State Law Exclusions , (Sept. 21, 1998), <<u>
http://www.webcom.com/legaled/ETAForum/docs/report4.html > .Return to
Text

 

[40]

See Letter from Business Software
Alliance to Professor Raymond T. Nimmer & Carlyle C. Ring, Jr., Article 2B
Drafting Committee (Jan. 20, 1999)
http://www.2bguide.com/docs/0199bsa.html
. According to the Business Software Alliance, “billions of dollars of business
is being successfully conducted on an assumption of nondiscrimination [against
electronic records and signatures] and there are no reported decisions that
could be fairly construed as systematically discriminating against electronic
records or signatures in the context of contract law issues.” Id. Return to
Text


[41]

The U.C.C. defines “written” or
“writing” as “printing, typewriting or any other intentional reduction to
tangible form .” U.C.C. § 1-201(46) (1998) (emphasis added).Return to
Text


[42]


Howley v. Whipple, 48 N.H. 487
(1869). One commentator has noted that “the Whipple opinion was a bit eccentric
in its metaphors, to be sure, but was not maverick in its results.” Douglas
Morrison, Note, The Statute of Frauds Online: Can a Computer Sign a Contract for
the Sale of Goods ? 14 GEO. MASON U. L. Rev. 637 (1992).Return to
Text


[43]

Joseph Denunzio Fruit Co. v. Crane,
79 F. Supp. 117 (S.D. Cal. 1948) (holding that a telex is a writing); McMillan
Ltd. v. Weimer Drilling & Eng. Co., 512 So.2d 14 (Ala. 1986) (holding that a
mailgram is a writing); Ellis Canning Co. v. Bernstein, 348 F. Supp. 1212 (D.
Colo. 1972) (holding that a tape recording is a writing). But see Roos v. Aloi,
127 Misc. 2d 864 (N.Y. Sup. Ct. 1985) (holding that a tape recording is not a
writing).Return to
Text


[44]

See Bazak International Corp. v. Mast
Industries, Inc., 535 N.E.2d 633 (N.Y. 1989) (assuming faxes to be writings
under U.C.C. 2-201). In American Multimedia Inc. v. Dalton Packaging, Inc., 143
Misc. 2d 295 (N.Y. Sup. Ct. 1989), a faxed purchase order was assumed to be a
writing for purposes of a federal arbitration statute.Return to
Text

 

[45]

People v. Avila, 770 P.2d 1330 (Colo.
Ct. App. 1988) (stating that recording on computer disk was a “writing” for
purposes of forgery statute). See also Clyburn v. Allstate, 826 F.Supp. 955
(D.S.C. 1993). Return to
Text


[46]

Some courts may have concerns about
reliability – i.e., whether magnetic media are more subject to tampering than
paper – but these concerns should not affect whether an electronic transmission
is considered a writing. Rather, they should only be relevant to the
authentication, for evidence purposes, of a particular transmission record. But
see Morrison, supra note 42, at 637 (analyzing reliability of EDI records in
determining whether to consider them “writings” under the Statute of
Frauds).Return to
Text


[47]

U.C.C. § 1-201(39) (1998). Return to
Text


[48]

Selma Savings Bank v. Webster County
Bank, 206 S.W. 870 (Ky. 1918); Hillstrom v. Gosnay, 614 P.2d 466 Mont. (1989).
Contra, Pike Industries, Inc. v. Middlebury Associates, 398 A.2d 280 (Vt. 1979);
aff’d on other grounds , 436 A.2d 725 (Vt. 1980), cert denied , 455 U.S. 947
(1992). See Morrison, supra note 42, at 637. Return to
Text

 

[49]

Joseph Denunzio Fruit Co. v. Crane,
70 F. Supp. 117; Franklin County Coop. v. MFC Services, 441 So.2d 1376 (Miss.
1983); Hideca Petroleum Corp v. Tampimac Oil Int’l Ltd., 740 S.W.2d 838 (Tex.
Ct. App. 1987). But see Miller v. Wells Fargo Bank International Corp., 406 F.
Supp. 452 (S.D.N.Y. 1975) (suggesting that there was a question as to whether
test key on telex is a signature). Return to
Text


[50]

In Watson v. Tom Growney Equip. Inc.
, 721 P.2d 1302 (N.M. 1986), a name typed on a purchase order was found to be a
sufficient signature, because the signatory had deliberately filled out other
details on the form. See In re Matter of Save-On Carpet of Arizona, Inc., 545
F.2d 1239 (9th Cir. 1976) (holding that a typewritten signature on a U.C.C.
financing statement satisfied the signature requirement of the Statute of
Frauds). But see In re Carlstrom, 3 U.C.C. Rep. Serv. 766 (Bk. D. Me. 1966). See
also A & G Const. Co. v. Reid Bros. Logging Co., 547 P.2d 1207 (Alaska 1976)
(holding that a typed name was sufficient). Return to
Text


[51]

Hesenthaler v. Farzin, 564 A.2d 990
(Pa. Super. Ct. 1989) (focusing on intent to authenticate); McMillan Ltd v.
Warrior Drilling & Eng Co., 512 So. 2d 14 (Ala. 1986).Return to
Text


[52]

In Kohlmeyer & Co. v. Bowen , 192
S.E.2d 400 (Ga. Ct. App. 1972), a securities brokerage firm’s name was printed
on a confirmation statement for the sale of securities. The court found that the
printed name was intended as authentication and met the signature requirement
under the Statute of Frauds. See also Associated Hardware Supply Co. v. Big
Wheel Distrib. Co., 355 F.2d 114 (3d Cir. 1966) (discussing printed names on
letterhead).Return to
Text


[53]

In Beatty v. First Exploration Fund
1987 and Co. Limited Partnership , 25 B.C.L.R.2d 377 (1988), a British Columbia
case, faxed signatures on proxy documents were sufficient to meet the signature
requirements under a limited partnership agreement. In Gilmore v. Lujan , 947
F.2d 1340 (9th Cir. 1991), the court upheld an agency’s determination that a fax
did not meet the regulation’s strict requirement that a document be
“holographically signed in ink,” but criticized the agency for its narrow-minded
approach. In Madden v. Hegadon , 565 A.2d 725 (N.J. Super. 1989), aff’d 571 A.2d
296 (N.J. 1989), a faxed signature was deemed effective for filing a nomination
petition. Return to
Text


[54]


See BENJAMIN WRIGHT, THE LAW OF
ELECTRONIC COMMERCE, (1994) at 102. Return to
Text


[55]

See, e.g. , Department of Trans. v.
Norris, 474 S.E.2d 216 (Ga. Ct. App. 1996), rev’d sub nom ., Norris v. Georgia
Dep’t of Transportation, 486 S.E.2d 826 (Ga. 1997) (holding that a fax
transmission was not a writing).Return to
Text


[56]

See discussion infra Section C.3.Return
to
Text

 

[57]

U.C.C. § 201(39) (1999) (emphasis
added).Return to
Text


[58]

See notes 47-56 and accompanying
text.Return to
Text


[59]

See ARIZ. REV. STAT. ANN. §
41-132(D)(4) (West 1998) (defining electronic signature an “electronic or
digital method of identification that is executed or adopted by a person with
the intent to be bound by or to authenticate a record” 47-56); FLA STAT ANN §
282.72(4) (West 1998) (“Electronic signature means any letters, characters, or
symbols, manifested by electronic or similar means, executed or adopted by a
party with an intent to authenticate a writing.”); 5 ILL. COMP. STAT. 175/5-105
(effective July 1, 1999) (“[A]ny symbol executed or adopted, or any security
procedure employed or adopted, using electronic means or otherwise, by or on
behalf of a person with intent to authenticate a record.”); IND. CODE ANN. §
5-24-2-2 (West 1998) (“[A]n electronic identifier, created by computer, executed
or adopted by the party using it with the intent to authenticate a writing.”);
MISS. CODE ANN. § 25-63-1 (1998) (“[A]ny word, group of letters, name, including
a trader-assumed name, mark, characters or symbols made manually, by device, by
machine, or manifested by electronic or similar means, executed or adopted by a
party with the intent to authenticate a writing.”); N.H. REV. STAT. ANN. § 506:8
(1999) (“Electronic signature means a digital signature, executed or adopted by
a party with an intent to authenticate a writing.”); OHIO REV. CODE ANN. §
3701.75 (“[A]ny of the following attached to or associated with an electronic
record by an individual to authenticate the record: (a) a code consisting of a
combination of letters, numbers, characters, or symbols that is adopted or
executed by an individual as that individual’s electronic signature; (b) a
computer-generated signature code created for an individual; (c) an electronic
image of an individual’s handwritten signature created by using a pen
computer.”); OR. REV. STAT. § 192.835 (1998) (“[A]ny letters, characters or
symbols, manifested by electronic or similar means, executed or adopted by a
party with an intent to authenticate a writing.”); S.C. CODE ANN. § 26-5-330
(Law. Co-op 1998) (“[A]ny identifier or authentication technique attached to or
logically associated with an electronic record that is intended by the party
using it to have the same force and effect as a manual signature.); TEX. BUS.
& COM. CODE ANN. § 2.108 (West 1998) (“[A]n electronic identifier, created
by a computer, intended by the party using it to have the same force and effect
as the use of a manual signature.”); VA. CODE ANN. §§ 59.1-467, 59.1-468,
59.1-469 (Michie 1998) (“[A]n electronic identifier, created by a computer,
intended by the party using it to have the same force and effect as the use of a
manual signature.”); W. VA. CODE § 39-5-2(e) (1998) (“[A]ny identifier or
authentication technique attached to or logically associated with an electronic
record that is intended by the person using it to have the same force and effect
as a manual signature.”); WIS. STAT. ANN. § 137.04(2) (West 1999) (“[A]ny
combination of words, letters, symbols or characters that is attached to or
logically associated with an electronic record and used by a person for the
purpose of authenticating a document that has been created in or transformed
into an electronic format.”). Return to
Text


[60]

See Uniform Electronic Transaction Act,
§ 102(8) (May 10, 1999 Interim Draft), <<u>
http://www.law.upenn.edu/library/ulc/ulc.htm#ueccta > Return to
Text

 

[61]

See U.S. Comptroller General, Matter of
National Institute of Standards and Technology” Use of Electronic Data
Interchange Technology to Create Valid Obligations , 71 Comp. Gen. 109 (1991);
(Dec. 13, 1991); CAL. GOV’T. CODE §16.5 (West 1999).Return to
Text


[62]

See ALASKA STAT. § 09.25.510 (Michie
1999) (applying generally to all communications); CAL. GOV’T CODE § 16.5
(limiting application to communications with public entities); GA. CODE ANN. §
10-12-4 (Michie 1998) (applying generally to all communications); IDAHO CODE §
67-2357 (1998) limiting application to the filing and issuing of documents by
and with state and local agencies); 15 ILL. COMP. STAT. 405/14.01 (limiting
application to communications between a state agency and the comptroller); 205
ILL. COMP. STAT. 705/5 (West 1998) (limiting application to communications
between financial institutions and their customers); IOWA CODE ANN. § 1555A.27
(West 1999) (limiting application to prescriptions); KAN. STAT. ANN. § 60-2616
(1997) (applying generally to all communications); KY. REV. STAT. ANN. § 369.020
(Banks-Baldwin 1999) (applying generally to all kinds of communications); MD.
CODE. ANN. STATE GOV’T § 8-504 (1998) (limiting application to any
communications among governmental entities); NEB. REV. STAT. § 86-1701 (1998)
(applying generally to all communications); N.H. REV. STAT. ANN. § 294-D:4
(1999) (limiting application to communications between the state and any agency
or instrumentality of the state); N.C. GEN. STAT. § 66-58.1 (1999) (limiting
application to filings with public agencies); OKLA. STAT. ANN. TIT. 15 § 965
(West 1999) (applying generally to all communications); R.I. GEN. LAWS §
42-127-4 (1998) (limiting application to transactions between public agencies).
Return to
Text


[63]

See European Commission, supra note 6.
However, the draft European Directive does not require that these elements be
present in order to create an enforceable electronic signature.Return to
Text


[64]

The four requirements generally
impose conditions not normally required to create an enforceable signature on a
paper document. They can be explained as follows: (a) Unique to the Person Using
It – The requirement that an electronic signature be “unique to the person using
it” is presumably intended to ensure that not more than one person would produce
the same electronic signature. It is likely that a digital copy of a handwritten
signature would be considered to be unique to the individual signer – i.e.,
every person presumably has a unique way of writing his or her signature.
Likewise, the requirement of uniqueness could also presumably be satisfied by a
biometric-based signature that incorporates certain attributes unique to the
signer, such as a fingerprint or a retinal scan. The requirement can also be
satisfied by a digital signature where the public-private key pair used by the
signer was randomly generated and of sufficient key length so that the
likelihood of anyone else generating the same public-private key pair would be
exceedingly remote. By contrast, however, while the name “John Smith” or the
letter “X” typed at the bottom of a paper document can qualify as a signature,
it is not unique to any person that uses this method of signature, and thus
would presumably not qualify as an electronic signature.Such an absolute
requirement of uniqueness is not necessary. If the law of signatures in the
context of paper-based transactions does not require that signatures be unique,
it may not be appropriate to impose such a requirement on electronic
transactions (in certain situations, the recipient of the message may be taking
a risk that it cannot authenticate the signature in court, but the recipient
takes a comparable risk with a paper-based transaction containing a non-unique
signature, such as an “X”). Where uniqueness is required, it seems that it
should be required only in the domain in which the signature is used, rather
than on a true worldwide basis.(b) Capable of Verification – The requirement
that a signature be capable of verification does not mean that the signature
itself must consist of or include the signer’s name. Rather, it focuses on the
ability to determine or verify the identity of the signer of the message. Thus,
verification based on reference to other sources of information is likely to be
sufficient. For example, under the California Digital Signature Regulations, a
digital signature is capable of verification if the recipient of the digitally
signed document can verify that the document was digitally signed by using the
signer’s public key to decrypt the message, and a digitized handwritten
signature created using signature dynamics is capable of verification if the
handwriting measurements can allow a handwriting and document expert to access
the authenticity of the signature. See CAL. GOV’T CODE § 22003 (West 1999).It
should be noted, however that even the conclusion of an expert in handwriting
analysis who has compared admitted signatures of the purported signer with the
signature in question is at best subjective. See, e.g. , U.S. v. Rosario, 118
F.3d 160 (3d Cir. 1997) (“Handwriting analysis is at best an inexact science,
and at worst mere speculation itself.”).(c) Under the Sole Control of the Person
Using It – The California Digital Signature Regulations provide that (1) a
digital signature is under the sole control of the person using it when the
person who holds the relevant key pair assumes a duty to exercise reasonable
care to retain control of the private key and prevent its disclosure; and (2) a
digitized handwritten signature created using signature dynamics is under the
sole control of the person using it if the signature digest captures the
handwriting measurements and cryptographically binds them to the message and
makes it computationally infeasible for the handwriting measurements to be bound
to any other message. CAL. GOV’T CODE § 22003. Yet, it is not clear whether this
is a proper interpretation of the “sole control” requirement or whether the
requirement is appropriate where another party may be “authorized” to execute a
signature on behalf of the signer, such as by operating a check writing machine
or using the signer’s private key with appropriate authorization. (d) Linkage to
the Data Signed – The final requirement is that the signature must be linked to
the data being signed in a manner such that if the data is altered after the
signature is made, the fact of such alteration is disclosed to persons relying
on the electronic record. This requirement is critical for a secure signature,
because otherwise the electronic signature of one person could be altered to
look like the electronic signature of another, or an electronic signature could
be simply excised from one electronic record and pasted onto another. See, e.g.
, Food and Drug Administration Regulations on Electronic Records and Electronic
Signatures, 21 C.F.R. § 11.70 (1999), (providing that “electronic signatures . .
. . shall be linked to their respective electronic records to ensure that the
signatures cannot be excised, copied, or otherwise transferred to falsify an
electronic record by ordinary means”). It is questionable, however, whether this
requirement should apply to “all” electronic signatures, and it surely does not
apply to paper documents. Id. Return to
Text

 

[65]

See United Nations, supra note 16, at
Article VII, subpara. 1.Return to
Text


[66]

MINN. STAT. ANN. § 325K.20 (West
1998); MO ANN. STAT. § 28.657 (West 1999); N.H. REV. STAT. ANN. § 294-D:4
(1999); UTAH CODE ANN. § 46-3-101 (1998); WASH. REV. CODE ANN. § 19.34.900 (West
1998). This legislation does not prohibit (or render unenforceable) the use of
any other form of electronic signature, it simply leaves the issue open. See,
e.g. , UTAH CODE ANN. § 46-3-101 (1998) (“[N]othing in this chapter precludes
any symbol from being valid as a signature under other applicable law such as
Utah Uniform Commercial Code Section 70A-1-201(39).”).Return to
Text


[67]

The term “electronic signature” is
used, but is not defined, in the following statutes: CONN. GEN. STAT. ANN. §§
19(a)-25(a) (West 1999); DEL. CODE ANN. tit. 29 §§ 2706(a), 5942 (1998). LA..
REV. STAT. ANN. §§ 32, 2145, 1520, 3733.1 (West 1999); MINN. STAT. ANN. §
221.173 (West 1998); NEV. REV. STAT. ANN. § 239.042 (Michie 1997); TENN. CODE
ANN. § 16-1-115 (1998); WYO. STAT. ANN. § 9-1-306 (Michie 1998) (VT. CODE R. 26
(1995). In all of these states, there appears to be no other electronic
signature legislation defining the term. Return to
Text


[68]

Statutes that authorize the use of
electronic signatures for all types of transactions include: ALASKA STAT. §
09.25.510 (Michie 1999); FLA. STAT. ANN. § 282.72 (West 1998); GA. CODE ANN. §
10-12-4 (Michie 1998); 5 ILL. COMP. STAT. 175/5-105 (effective July 1, 1999);
KAN. STAT. ANN. §60-2616 (1997); KY. REV. STATUS. ANN. §369.020 (Banks-Baldwin
1999); MINN. STAT. ANN. § 325K.20 (West 1998) (referring to digital signatures
only); MISS. CODE ANN. § 25-63-1 (1998); MO. ANN. STAT. § 28.657 (West 1999)
(referring to digital signatures only); NEB. REV. STAT. § 86-1701 (1998); N.H.
REV. STAT. ANN. § 294 D:4 (1999); OKLA. STAT. ANN. tit. 15 § 965 (West 1999);
OR. REV. STAT. § 192.835 (1998); S.C. CODE ANN. § 26-5-330 (Law. Co-op 1998);
UTAH CODE ANN. § 46-3-101 (1998) (referring to digital signatures only); VA.
CODE ANN. §§ 59.1-467, 59.1-468, 59.1-469 (Michie 1998); WASH. REV. CODE ANN. §
19/34/900 (West 1998) (referring to digital signatures only); W.VA. CODE §
39-5-2 (1999); WIS. STAT. ANN. § 137.04(2) (West 1999). Some of these statutes
do have limited exceptions, such as for wills. See, e.g. , 5 ILL. COMP. STAT.
175/5-120 (effective July 1, 1999).Return to
Text

 

[69]

A number of state electronic
signature statutes only pertain to specific types of transactions. See, e.g. ,
ALA. CODE § 40-30-5 (1998) (referring to electronic filing of tax returns and
other documents with the Department of Revenue); COLO. REV. STAT. ANN. § 4-9-413
(West 1999) (referring to electronic filing of U.C.C. Financing Statements);
CONN. GEN. STAT. ANN. § 42a-9-402 (West 1999) (referring to electronic
signatures for medical records maintained in hospitals); DEL. CODE ANN. tit. 29
§ 2706(a), 5942(a) (1998) (referring to certain state documents relating to
budget, accounting, and payroll); HAW. REV. STAT. ANN. § 231-8.5 (referring to
electronic filing of court documents); IOWA CODE ANN. § 48A.13 (referring to
voter registration forms); IOWA CODE ANN. § 155A.27 (West 1999) (referring to
prescriptions); LA. REV. STAT. ANN. § 2144 (West 1999) (referring to medical
records); ME. REV. STAT. ANN. tit. 29-A, § 1401 (West 1998) (referring to
applications under the Motor Vehicle Code); OHIO REV. CODE ANN. § 3701.75 (West
1999) (referring to health care record authorizations). The status in these
states of electronic signatures used for other types of transactions is unclear
because it has not been addressed by legislation. Return to
Text


[70]

Several statutes limit the
authorization to use electronic signatures to transactions between government
agencies. See ARIZ. REV. STAT. ANN. § 41-132 (limiting application to use by
state agencies, and for the acceptance of documents filed with the Secretary of
State); DEL. CODE ANN. tit. 29 § 2706(a), 5942(a) (1998) (limiting application
to the use of electronic signatures for certain state documents relating to
budget, accounting, and payroll); KY. REV. STAT. ANN. § 369.020 (Banks-Baldwin
1999) (limiting application to the use of electronic signatures by state
agencies in determining whether state construction contractors should be
released from performance bond); MD. CODE ANN. STATE GOV’T § 8-504 (1998)
(limiting application to communications among governmental entities); N.H. REV.
STAT. ANN. § 294-D:4 (1999) (limiting application to communications between the
state and any agency or instrumentality of the state); R.I. GEN. LAWS § 42-27-4
(1998) (limiting application to transactions between public agencies). Return to
Text


[71]

Many statutes authorize the use of
electronic signatures only for transactions where at least one of the parties is
a government entity. See ALA. CODE § 4-30-5 (1998) (referring to filing of tax
returns and other documents with the Department of Revenue); CAL. GOV’T CODE §
22003 (West 1999) (applying to communications with public entities); COLO. REV.
STAT. ANN. (West 1999) (referring to electronic filing of U.C.C. Financing
Statements); IDAHO CODE § 67-23-57 (1998) (referring to filing and issuing of
documents by and with state and local agencies); IND. CODE ANN. § 5-24-2-2 (West
1998) (referring to transactions with the state); IOWA CODE ANN. § 48A.13 (West
1998) (referring to voter registration forms); ME. REV. STAT. ANN. tit. 29-A §§
1401, 1205, and 1410 (referring to use in connection with applications under the
Motor Vehicle Code); MO. ANN. STAT. § 28.621 (West 1999) (applying to filings
with the Secretary of State for certain business organizations); MONT. CODE ANN.
§§ 2-15-401, 2-15-404 (1999) (allowing Secretary of State to implement an
electronic filing system); NEV. REV. STAT. ANN. § 239.042 (Michie 1997)
(referring to financial transactions with the state); N.M. STAT. ANN. §
14-3-15.2 (Michie 1998) (referring to public records and filings); N.C. GEN.
STAT. § 66-58.1 (1999) (limiting application to filings with public agencies);
N.D. CENT. CODE § 1-08-12 (1997) (limiting application to filings with public
agencies); TEX. GOV’T CODE ANN. § 403.027 (West 1998) (limiting application to
transactions with the state comptroller or between public agencies); WYO. STAT.
ANN. § 9-1-306 (Michie 1998) (limiting application to filings with the Secretary
of State). The status of electronic signatures used for other types of
transactions is unclear because it has not been addressed by legislation. Return
to
Text


[72]

See, e.g. , the Illinois Financial
Institutions Digital Signature Act 1999, 1997 H.B. 597 (arguably superceded by 5
ILL. COMP. STAT. 175/5-105 (effective July 1, 1999)). Return to
Text

 

[73]

Commission of the European
Communities, A European Initiative in Electronic Commerce , (COM (97) 157 final,
Apr. 16, 1997). <
http://www.cordis.lu/esprit/src/ecomcom.htm
>
.Return to
Text


[74]

Software Publishers Association
(n/k/a Software and Information Industry Association), Code, Content and
Commerce: SPA’s Vision for the Digital Future (May, 1998) <<u>
http://www.spa.org/govmnt/govnews.htm > .Return to
Text


[75]


See FED. R. EVID. 901(a) (1995).Return
to
Text


[76]

See U.C.C. §§ 4A-202, 4A-203 & cmt.
(1998). Section 4A-202 solves this problem for a bank and its customer who has
agreed to transact its banking electronically and to be subject to Article 4A.
Id. If the bank verifies the payment order by using a commercially reasonable
security procedure, the customer will be bound even if it did not in fact
authorize the payment order. § 4A-202(b). If, however, the customer can prove
that the person sending the fraudulent payment order did not obtain the
information necessary to send such an order from an agent or a source controlled
by the customer, the loss is shifted back to the bank. § 4A-203(a)(2). If the
bank does not follow the security procedure and the order is fraudulent, the
bank generally must cover the loss. § 4A-202(a). Return to
Text


[77]

See, e.g. , U.S. v. Eisenberg, 807 F.2d
1446 (8th Cir. 1986) (disputing the authenticity of letter); U.S. v. Grande, 620
F.2d 1026 (4th Cir. 1980) (disputing authenticity of invoice), cert. denied ,
449 U.S. 830, 919 (1980).Return to
Text

 

[78]

See, e.g. , Victory Med. Hosp. v. Rice,
493 N.E.2d 117 (Ill. App. Ct. 1986).Return to
Text


[79]

See Digital Signature Guidelines, supra
note 8. One definition of nonrepudiation is “[s]trong and substantial evidence
of the identity of the signer of a message and of message integrity, sufficient
to prevent a party from successfully denying the origin, submission or delivery
of the message and the integrity of its contents.” Id. at Section 1.20.Return to
Text


[80]

See generally Follow the Money — A New
Stock Market Arises on the Internet , SCI. AM. 31 (July 1995).Return to
Text


[82]

Electronic signatures, like
traditional signatures of ink on paper, come in varying degrees of security. A
handwritten signature, for example, is more trustworthy than an “X,” and a
notarized signature is more trustworthy than both. Just as the law provides
certain benefits to the more trustworthy forms (see e.g. , FED. R. EVID. 901(a)
(1995), (confirming that notarized signatures are considered
self-authenticating), these electronic signature statutes seek to define the
characteristics required for a trustworthy (or secure) signature. Return to
Text

 

[83]

Courts have recognized that the
legislature has the authority to establish legal presumptions. For Illinois
examples, see People v Rolfingsmeyer, 461 N.E. 2d 410, 412 (Ill.1984) (“[I]t is
clear that the legislature of a state has the power to prescribe new and alter
existing rules of evidence or to prescribe methods of proof.”); Heitz v. Hogan,
480 N.E. 2d 185, 189 (Ill. App. Ct. 1985). Moreover, numerous Illinois statutes
provide for a variety of different evidentiary presumptions. See, e.g. , 35 ILL.
COMP. STAT. 5/503 (West 1998) (“The fact that an individual’s name is signed to
a return or notice shall be prima facie evidence for all purposes that such
document was actually signed by such individual”); 10 ILL. COMP. STAT. 5/10-10
(West 1998) The statute states that:In the event of a State Electoral Board
hearing on objections to a petition for an amendment to Article IV of the
Constitution . . . , or to a petition for a question of public policy to be
submitted to the voters of the entire state, the certificates of the county
clerks and boards of election commissioners showing the results of the random
sample of signatures on the petition shall be prima facie valid and accurate,
and shall be presumed to establish the number of valid and invalid signatures on
the petition sheets reviewed in the random sample . . . . Id. ; 750 ILL. COMP.
STAT. 45/5 (West 1998) (providing that a man is presumed to be the natural
father of a child if certain conditions are met, and providing further that such
presumption “may be rebutted only by clear and convincing evidence”); 720 ILL.
COMP. STAT. 5/16-11 (West 1998) (stating that possession of a device that
intercepts or decodes the transmission of cable television service is prima
facie evidence of a violation of this section prohibiting the unauthorized use
of a television interception or decoding device); 725 ILL. COMP. STAT. 150/7
(West 1998) (specifying situations that give rise to a presumption that certain
property was furnished in exchange for a substance in violation of the Illinois
Controlled Substances Act, which presumptions are “rebuttable by a preponderance
of the evidence”).Return to
Text


[84]

5 ILL. COMP. STAT. 175/10-110
(effective July 1, 1999). This Act also defines a class of secure electronic
records. Id. at 175/10-110.Return to
Text


[85]

See 5 ILL. COMP. STAT. 175/10-110(a).
The electronic signature must be (1) created in a manner that was commercially
reasonable under the circumstances; (2) applied by the relying party (to verify
the signature) in a trustworthy manner; and (3) reasonably and in good faith
relied upon by the relying party. Id. Return to
Text


[86]

Id. For example, an electronic
signature might be reliably created by a specific person if some aspect of the
procedure used to create the signature involves the use of a signature device or
other means or method that is under the sole control of such person.Return to
Text

 

[87]

Id. Note that these four requirements,
while similar to the four requirements imposed by the statutes in the second
category noted above, are also different in two significant ways. Id. First,
satisfaction of these requirements is not a precondition to creating an
enforceable signature, but rather is only a precondition to qualifying as a
secure signature entitled to an additional legal benefit of an evidentiary
presumption. Id. Second, the requirements themselves differ. Id. Relative
uniqueness, rather than absolute uniqueness, is all that is required for the
first element. Id. The second element focuses on objective identification,
rather than focusing merely on being “capable of verification.” Id. The third
element rejects the “sole control” requirement and focuses instead on a reliable
assurance that the named signer actually signed or authorized the signature. Id.
Return to
Text


[88]

5 ILL. COMP. STAT. 175/10-120
(effective July 1, 1999). Return to
Text


[89]

The concepts of a “secure electronic
record” and a “secure electronic signature” were first introduced in the October
14, 1997 draft of the Illinois Electronic Commerce Security Act released for
public comment by the Illinois Commission on Electronic Commerce and Crime (copy
on file with authors). That concept was subsequently incorporated in the final
enacted version of the Illinois Electronic Commerce Security Act, as well as in
legislation enacted in South Carolina and Singapore. It has also been used in
the draft legislation being considered by UNCITRAL (which renamed the concept
“enhanced electronic signature”). See 5 ILL. COMP. STAT. 175; S.C. CODE §
26-5-330 (Law Co-op 1998); UNCITRAL, Draft Articles on Electronic Signatures
(December 15, 1998) <
http://www.un.or.at/uncitral/english/sessions/wg_ec/wp-80.htm

> ;
Singapore Electronic Transactions Act, supra note 32.Return to
Text


[90]

ALA. CODE § 40-30-5 et seq.
(1999).Return to
Text


[91]

OHIO REV. CODE ANN. § 3701.75 (West
1999).Return to
Text

 

[92]

See , MINN. STAT. ANN. § 325K.20 (West
1998); MO ANN. STAT. § 28.677 (West 1998); UTAH CODE ANN. § 46-3-101 (1998);
WASH. REV. CODE § 19/34/900 (West 1998). Return to
Text


[93]

See, e.g. , MINN. STAT. ANN. § 325K.20;
MO ANN. STAT. § 28.677; UTAH CODE ANN. § 46-3-101; WASH. REV. CODE § 19/34/100.
The digital signature legislation enacted in Germany, Italy, and Malaysia
contains a similar approach. Return to
Text


[94]

See, e.g. , UTAH CODE ANN. § 406(3).
The Utah Digital Signature Act provides that if a digital signature is verified
by the public key listed in a valid certificate issued by a licensed
certification authority, then a court of the State of Utah “shall presume that”:
(a) the digital signature is the digital signature of the subscriber listed in
that certificate, and (b) the digital signature was affixed by that subscriber
with the intention of signing the message. Id. Return to
Text


[99]

Numerous commentators have discussed
the need for predictability and the role played by the law in providing such
predictability. For example, in discussing the growth of the lumber industry in
Wisconsin in the 1800s, legal scholar James Willard Hurst noted that “[b]ecause
marketing cannot go on save in a context of reasonably assured expectations, the
legal order as a whole was, of course, indispensable to the existence of a
market.” JAMES WILLARD HURST, LAW AND ECONOMIC GROWTH: THE LEGAL HISTORY OF THE
LUMBER INDUSTRY IN WISCONSIN 1836-1915 285 (1964) [hereinafter LAW AND ECONOMIC
GROWTH]. Legal scholar Lawrence M. Friedman, in discussing American common law’s
move away from formality for its own sake over the past two centuries,
emphasized that the businessman had no need for “ceremonial formalism” but
rather valued “substantive predictability” – “[e]conomic decisions depended upon
the ability to know, within limits, what was ‘the law.'” LAWRENCE M. FRIEDMAN,
CONTRACT LAW IN AMERICA: A SOCIAL AND ECONOMIC CASE STUDY 92 (1965) [hereinafter
CONTRACT LAW IN AMERICA]. Oliver Wendell Holmes, Jr., one of this country’s
greatest jurists, observed that: People want to know under what circumstances
and how far they will run the risk of coming against what is so much stronger
than themselves, and hence it becomes a business to find out when this danger is
to be feared. The object of our study, then, is prediction, the prediction of
the incidence of the public force through the instrumentality of the courts.
RICHARD A. POSNER, THE ESSENTIAL HOLMES 160 (1992) (citing Oliver Wendell
Holmes, Jr., The Path of the Law , 10 HARV. L. REV. 457 (1897)). As UCC Art. 2
drafter and legal scholar Karl Llewellyn noted in his treatise on jurisprudence,
the true ideal is not really certainty but rather “reasonable regularity of
decision” or “a reckonability equivalent to that of a good business risk.” KARL
N. LLEWELLYN, THE COMMON LAW TRADITION: DECIDING APPEALS 216, 18 (1960).Return
to
Text

 

[100]

See LAW AND ECONOMIC GROWTH, supra
note 99, at 285.Return to
Text


[101]

See generally supra note 93.Return to
Text


[102]

See supra note 93.Return to
Text


[103]

See, e.g. , 5 ILL. COMP. STAT.
175/5-120 (effective July 1, 1999) see also Uniform Computer Information
Transactions Act (Feb. 1, 1999 draft).Return to
Text

 

[104]

See, e.g. , CAL. GOV’T CODE § 16.5
(West 1999); GA. CODE ANN. § 10-12-4 (Michie 1998); 5 ILL. COMP. STAT.
175/5-140; N.H. REV. STAT. ANN. § 294-D:4 (1999); OKLA. STAT. ANN. tit. 15 § 965
(West 1999); S.C. CODE ANN. § 26-5-330 (Law. Co-op. 1998); W. VA. CODE §
39-5-2(e) (1998). Return to
Text


[105]

GA. CODE ANN. § 10-12-4.Return to
Text


[106]

HAW. REV. STAT. ANN. § 231-8-5
(Michie 1998).Return to
Text


[107]

See 5 ILL. COMP. STAT. 715/5-105
(effective July 1, 1999). Return to
Text

 

[147]

Examples include credit card-based
sales of consumer products (i.e. amazon.com) and online stock trading.Return to
Text

2005 copyright symbol spoils $254,000 Clintonville scam

I love this story about a Clintonville woman who is now facing jail time for forgery and perjury.

It is a short article, but it reminds me of an actual true situation where I was inspecting the last will and testament of a person who had passed away.  The will was in the L.A. County Courthouse.  I was down there with my microscope and magnifying glass inspecting the will, and attached to the purported last will and testament was a notarized document with the copyright date of 2004.

It even had the website they downloaded the notary form from.  That did not jive with the fact that the signatures were all signed and notarized in 1999.  Now you don’t have to be a time traveler to understand that it’s not possible to sign a document that didn’t exist until six years later.  That’s what this article is saying.

So the moral of the story is if you’re going to forge a document, submit it to the court, and you’re going to sue somebody for $254,000 saying that they signed a promissory note, you should at least white out the copyright on the forms.

The point of the story is very simple.  As a handwriting expert you are also a document examiner.  In fact, you’re primarily a document examiner and secondly a handwriting expert.  As a document examiner you better notice the copyright, you better notice the staple holes, and you better be able to tell whether or not a document is a color photocopy or an original.  That’s your job.  Enjoy the article.

APPLETON — A Clintonville woman accused of forging documents that led to a $254,000 civil lawsuit will soon enter pleas to counts of forgery and lying while under oath.

Tammy M. Lowney, 41, waived her right to the remainder of her preliminary hearing Wednesday in Outagamie County Court on three forgery counts and two counts related to false testimony.

Attorneys started the hearing last month, but rescheduled due to time constraints.

The case stems from a 2006 Waupaca County lawsuit filed by the owners of Friendship Valley Dairy, Christopher and Mary Therese Gilling of Marion. The Gillings sued Steven and Malia Lowney, claiming the couple owed them the money as documented in 1999 and 2000 promissory notes carrying their signatures.

Appleton police Detective Neal Rabas testified last month to a copyright date of 2005 found on the forms used in creation of the notes. It didn’t jive with the contents of the contracts.

“The first note was signed in 1999,” Rabas said. “The second note was dated 2000.”

The Lowneys filed a counter suit in Outagamie County against the dairy company, the Gillings and Tammy Lowney, among others, claiming “a systematic campaign to destroy the Lowneys emotionally and to ruin them financially.”

Both civil cases have since been dismissed.

The false swearing charges against Tammy Lowney relate to testimony about the promissory notes she gave during depositions in one of the civil cases. Steven Lowney said his sister-in-law claimed the notes were authentic when she testified in the civil case.

Each of the five counts against her carries a maximum penalty of six years in prison and $10,000 in fines.

Read more: http://www.postcrescent.com/article/20110210/APC0101/102100561/Clintonville-woman-faces-multiple-forgery-charges#ixzz1EGr9YUio

More articles here: http://www.postcrescent.com

Australian Junior Rugby League loses $88,837 from forger… season must go on

An Australian woman steals $88,837.00 from a junior rugby league.

Listen, forgery happens all over the world.  It always amazes me; some people with a chance to steal money will steal money even from a bunch of kids playing rugby.

In this case, this is from the State of Queensland in Australia and the former McKay Junior Rugby League treasurer, Jody Sainsbury, was jailed and pending sentences for stealing more than $160,000.00.

She actually tendered a check and returned $88,000.00 of it, but she still faces charges, but as in good sportsmanship the game must go on.  No matter where you are in the world, their are people who forge signatures but there are also forgery experts that will help you.

JODY Sainsbury stole more than $160,000 from the Mackay Junior Rugby League and the Hastings Deering social club at Paget.

And when she faced the District Court in Mackay to be sentenced yesterday she was going to tender four allegedly-forged references.

So now she is under investigation for allegedly forging fake references.

Sainsbury pleaded guilty to two charges of dishonestly causing a loss to the Mackay Junior Rugby League and Hastings Deering between July 1, 2007, and December 1, 2008.

Crown prosecutor David Morters told the court that he had been provided on Thursday with copies of four references which Mrs Sainsbury’s barrister was going to tender in court.

One was said to be from her current employer, CQ Nurse, two were from representatives of Hastings Deering and there was another one from a representative of the Mackay State High School.

“I made some inquiries of at least one of the Hastings Deering representatives and it (the reference) was not made by the person who was purported to have made it,” Mr Morters said. “It appears there is no legitimacy for the references provided.”

Barrister Bronwyn Hartigan, for Sainsbury, tendered a bank cheque for $88,837 to repay the “balance of the amount owing” to the Mackay Junior Rugby League.

She then asked for the sentencing to be delayed.

Judge Stuart Durward, SC, remanded Sainsbury in custody for sentencing on a date to be set. Police are investigating the claims that Sainsbury’s references were forged.

During yesterday’s proceedings it was disclosed that the amount of money missing from the Hastings Deering social club was $83,707. Sainsbury was treasurer of the Mackay Junior Rugby League which held an emergency meeting in December 2009 to discuss the loss of funds from its bank accounts.

The MJRL had eight local clubs – Brothers Bulldogs, North Mackay Magpies, Proserpine, Northern Suburbs, Sarina, Southern Suburbs, Walkerston and Western Suburbs.

Despite the loss of funds, the MJRL season went ahead in 2010.

More articles @ http://www.dailymercury.com.au

Will Forger Gets One Year in Jail, Probation

When your girlfriend dies in a tragic mass murder the first thing you do is not to fake a will and take her entire estate, but that’s what Edgar Bloomfield of Santa Barbara County, California did.

Bloomfield forges the will and takes the $750,000.00 his girlfriend had and named it to him which was a very bad did.  This is unusual in the fact that when it all played out he actually spent time in jail because they decided to prosecute him on the criminal courts so he had to face two courts, the probate court, which is where the handwriting expert was called in to look at the will and testament; this is where you come in and I found that probate courts are very fair which means when they get a handwriting expert they’ll let you have access to the will and you can microscope, and  bring your magnifying glass, you can take pictures of it and can actually touch and feel the original will and  makes a good decision on that because they really do want to get it right.

And in this case, they did get it right but you’ll also notice that if you read the full article Edward Bloomfield actually had two witnesses to the crime and they actually had to plead guilty for forgery, conspiracy and perjury, because his sister, Jeannie Bloomfield, and two acquaintances, Lena Star and Heidi Hodges signed as witnesses.

So he had four people lying under oath to steal this dead woman’s money and her family had already suffered a tragic loss in a mass murder.  I tell you, when there is a big estate involved, there are no doubts to the scummy actions of unscrupulous people and as a handery expert you’ll see it all. Enjoy this article.

More than three years after he produced a forged will after his girlfriend was fatally shot,Edward Blomfield – who pled guilty to the crime – was sentenced Tuesday. He will serve one year in Santa Barbara County Jail and five years of felony probation. Judge Brian Hill also granted District Attorney Mary Barron two additional requests: that Blomfield not be allowed to act in a fiduciary capacity for anyone and that any current or future employers know of his psychiatric condition.

Authorities claim Blomfield forged the will of Beverly Graham after she was shot and killed in her apartment by Jennifer San Marcojust before San Marco went on a shooting spree at the Goleta U.S.Postal Service distribution center in January 2006, killing six others and then herself. The forged will left Graham’s entire estate, estimated to be worth $750,000, to Blomfield.

Less than a month after Graham’s death, Blomfield produced the will, which Graham’s family immediately contested in probate court. As the result of a complicated civil suit, in which a forensic examiner determined the will was forged, Blomfield was ordered to pay $340,000 in restitution to the Graham family and indicted in criminal court for burglary, financial elder abuse, forgery, conspiracy, and two counts of perjury. Blomfield pled guilty to all charges.

His final sentencing was pending almost a year, in part because Blomfield underwent a competency test, a several months-long process during which psychiatrists reviewed his mental state and determined that he was competent to be sentenced. At the request of Blomfield’s defense attorney, Steve Balash, Judge Hill exonerated the $25,000 bail and reduced Blomfield’s restitution fines from $10,000 to $1,000. Barron said she recognized that the court had already made a decision on Blomfield’s sentence but stated, “It does not seem fair or just that he should be able to buy his way out.” Although Hill granted two of Barron’s requests, he denied a third, that Blomfield not be able to serve as caretaker for the elderly or disabled, noting that this was a financial crime.

In his final comments, Hill said that although Blomfield’s crime was serious, being premeditated and done without due regard to other people in the descendant’s life and therefore deserving of a felony, it was not a horrific crime. He said Blomfield’s crime was deserving of the year in

County Jail, and the man could face up to 10 years in state prison if he violates any terms of his probation. Noting that because there was no indication Blomfield ever engaged in similar actions and had no prior criminal history, Hill said there was not a strong argument for a state prison sentence.

Blomfield’s sister, Jeanne Blomfield, as well as two acquaintances,Lenae Stahr and Heidi Hodges, signed as witnesses on the forged will and had previously pled guilty to will forgery, conspiracy, and perjury.

More news and articles @ http://www.independent.com

Woman’s Caregiver Charged With Forgery

This case is unbelievably common.  A woman’s caregiver who took care of her for the last two years of her life decided that after the woman passed away she could just steal all her material possessions, including a very sexy 1965 Mustang.

As a previous owner of a red ’65 Ford Mustang convertible, I can tell you how attractive this car makes you feel when you drive it.  But, does that really give her an excuse to commit forgery, write checks on a dead woman’s bank account and make a fake will?

The reason I want you to look at this story is that it is incredibly common for whoever is around an older person when he dies to feel ethically obligated to take all his stuff, because many  people such as caregivers and the one brother that spends the last ten years of  life really feels entitled to have everything.

Forgeries incredibly common, and if I were a police inspector I would always look at the caregiver first and whoever was around during the last few years in that person’s life.  They are normally the suspects of the crime, and these are not sophisticated forgeries.  These are very simple cases that you as a forensic document examiner will be able to help solve and get the estate back into the hands of the people that deserve it.

LAS CRUCES, N.M. — A dead woman’s caregiver was charged with forgery after Las Cruces police said she named herself to inherit a home, car, and money.

Las Cruces police detectives said in the months prior to the Aug. 2 death of Mary Fix, Maria E. Hobbs created a last will and testament naming herself as the recipient of the woman’s residence, a 1965 Ford Mustang, and the funds from the woman’s bank account.

Hobbs worked for Adult Protective Services, a division of New Mexico’s Aging and Long Term Services Department, and took care of Fix, who was suffering from advanced dementia, police said.

Detectives discovered on the day Fix died, Hobbs took a $300 check from the woman and deposited it into her own checking account. The memo on the check, apparently written by Hobbs, stated the check was for “Mary’s car title and registration.”

Detectives also learned that Hobbs forged and deposited a $70,000 check, dated June 15, from Fix into her account on Sept. 7.  A $35,000 check that was dated July 8 was deposited into Hobbs’ account on Sept. 9.  That same day, Sept. 9, Hobbs wrote out a personal check in the amount of $48,548 to purchase a mobile home from Palm Harbor Homes, detectives said.

Detectives learned that Fix established a living trust in 2004 naming Washburn University as the beneficiary of her estate upon her death. LCPD began investigating the case when a financial adviser with Prudential Financial Group contacted police after attempting to execute Fix’s trust.

Hobbs was charged with eight counts of forgery including two second-degree felony counts, five fourth-degree felonies, and one third-degree felony.

She was arrested Thursday by the U.S. Marshall’s Service and is being held at the Dona Ana County Detention Center with bond set at $55,000.

More News and articles @ http://www.kfoxtv.com/index.html

Judge slams mortgage company fraudulent note practice

This is really big news if you’re involved in the mortgage crisis in the United States.  And even if you’re not in the United States, you have to understand that the entire world economy crashed.

And part of the reason was excessive loans to people who couldn’t afford homes throughout the United States and North America.  And that the same philosophy trickled down into what they called secondary mortgages and financial crisis.

A company called MERS, and it still exists, was in the news because of a judge in Florida.

How is forgery involved in this?  Great question, so much of the real estate in America is currently in a state of foreclosure or pre‑foreclosure because of the loans that were granted in the last five to ten years that homeowners can’t afford.

Instead of getting proper paperwork to foreclose on these loans, the banks and the companies hired to assemble the foreclosures simply made up signatures.  They mocked up documents and they actually forged people’s names that no longer worked there, and they forged notaries’ names that no longer worked at the companies in order to get the documentation needed to file the foreclosure notice.

If you are a handwriting expert or you are a document examiner, this is a great opportunity for you to get paid to help somebody save their home by entering into the discussion of whether or not the paperwork in the mortgage foreclosure is correct or it’s fraudulent.  This has been a very, very popular type of case that we’ve had in our office here in Los Angeles.

All of our associates around the United States have also had paperwork like this, because fraud and forgery are so rampant in the real estate industry.  And it’s not just the last five years, but specifically in the foreclosure area you can help save somebody’s home if indeed they made a mistake.

This article is about MERS, but if you’re going to get into the real estate business, you need to understand about the mortgage and mortgage loans and how to speak to attorneys who are dealing with this sort of thing.  It’s an important article and I hope you keep up with it.

Merscorp Inc., operator of the electronic-registration system that contains about half of all U.S. home mortgages, has no right to transfer the mortgages under its membership rules, a judge said.

U.S. Bankruptcy Judge Robert E. Grossman in Central Islip, New York, in a decision he said he knew would have a “significant impact,” wrote that the membership rules of the company’s Mortgage Electronic Registration Systems, or MERS, don’t make it an agent of the banks that own the mortgages.

“MERS’s theory that it can act as a ‘common agent’ for undisclosed principals is not supported by the law,” Grossman wrote in a Feb. 10 opinion. “MERS did not have authority, as ‘nominee’ or agent, to assign the mortgage absent a showing that it was given specific written directions by its principal.”

Merscorp was created in 1995 to improve servicing after county offices couldn’t deal with the flood of mortgage transfers, Karmela Lejarde, a spokeswoman for MERS, said in an interview last year. The company tracks servicing rights and ownership interests in mortgage loans on its electronic registry, allowing banks to buy and sell the loans without having to record the transfer with the county. It played a major role in Wall Street’s ability to quickly bundle mortgages together in securitized trusts.

MERS was still reviewing Grossman’s decision and didn’t have an immediate comment, Lejarde said in an e-mail Feb. 11. Lejarde didn’t immediately respond to an e-mail seeking comment today.

Proper Status

“‘Don’t come around here no more,’ is basically the message to MERS,” said April Charney, a senior attorney with Jacksonville Area Legal Aid in Jacksonville, Florida. “The judge basically deconstructed MERS and said there’s no possible way in any case you can come in and show you have this appropriate proper status to transfer the note.”

“MERS and its partners made the decision to create and operate under a business model that was designed in large part to avoid the requirements of the traditional mortgage-recording process,” Grossman wrote. “The court does not accept the argument that because MERS may be involved with 50 percent of all residential mortgages in the country, that is reason enough for this court to turn a blind eye to the fact that this process does not comply with the law.”

Automatic Shield

In the case Grossman ruled on, Credit Suisse Group AG’s Select Portfolio Servicing, a mortgage servicer, sought to bypass the automatic shield against legal claims triggered by Ferrel L. Agard’s filing for personal bankruptcy in September.

Select Portfolio wanted permission to foreclose on Agard’s home in Westbury, New York, on behalf of U.S. Bancorp’s U.S. Bank unit, the trustee for the mortgage-backed trust the home loan was in. The house is worth about $350,000 and the mortgage amount was $536,921, according to the decision.

Grossman ruled in favor of Select Portfolio because he couldn’t overrule a November 2008 foreclosure judgment the servicer won in state court, he said. Without that state-court ruling, Select Portfolio wouldn’t have had the right to bring its motion, Grossman said.

He then addressed whether a mortgage transfer by MERS is valid, because “MERS’s role in the ownership and transfer of real-property notes and mortgages is at issue in dozens of cases before this court,” including those where “there have been no prior dispositive state-court decisions,” he wrote.

Original Lender

Select Portfolio argued in part that MERS’s February 2008 assignment of the mortgage to U.S. Bank was valid because Agard agreed that MERS would hold title to it for the original lender,Bank of America Corp.’s First Franklin, and for whichever banks it was further assigned to. First Franklin transferred the promissory note the mortgage secured to Lehman Brothers Holdings Inc.’s Aurora Bank and Aurora to U.S. Bank, according to the decision.

“An adverse ruling regarding MERS’s authority to assign mortgages or act on behalf of its member/lenders could have a significant impact on MERS and upon the lenders which do business with MERS throughout the United States,” Grossman wrote. “It is up to the legislative branch, if it chooses, to amend the current statutes to confer upon MERS the requisite authority to assign mortgages under its current business practices.”

MERS intervened in the case and argued that Agard’s mortgage, the terms of its membership agreement and New York state law gave it the authority to assign the mortgage. MERS says it holds title to mortgages for its members as both “nominee” and “mortgagee of record.”

Select Portfolio

Grossman said Select Portfolio had to show that U.S. Bank owned both the note and the mortgage, and there was no evidence that it held the note. The judge disagreed with Select Portfolio’s argument that U.S. Bank held the note because the note “follows” the mortgage, which it said U.S. Bank owned.

“By MERS’s own account, the note in this case was transferred among its members, while the mortgage remained in MERS’s name,” Grossman wrote. “MERS admits that the very foundation of its business model as described herein requires that the note and mortgage travel on divergent paths.”

The judge said that the membership agreement wasn’t enough to assign the mortgage and that to do so the lender would have to give power of attorney or similar authority to MERS.

MERS’s membership rules don’t create “an agency or nominee relationship” and don’t clearly grant MERS authority to take any action with respect to mortgages, including transferring them, Grossman wrote. Because the interests at issue concern “real property” — land and buildings — under state law, any transfer has to be in writing, which isn’t done under the MERS system, he said.

‘Nominee’ Status

“Without more, this court finds that MERS’s ‘nominee’ status and the rights bestowed upon MERS within the mortgage itself, are insufficient to empower MERS to effectuate a valid assignment of mortgage,” the judge wrote. “MERS’s position that it can be both the mortgagee and an agent of the mortgagee is absurd, at best.”

Grossman said parties coming to him to seek to lift the automatic ban on legal claims in cases involving MERS will have to show they own both the mortgage and the note.

The case is In re Agard, 10-77338, U.S. Bankruptcy Court, Eastern District of New York Central Islip).

To contact the reporter on this story: Thom Weidlich in Brooklyn, New York, federal court attweidlich@bloomberg.net.

More on this @ http://www.bloomberg.com

In Nigeria, why divorce? Army condones forgery to end marriage

Why hire an expensive divorce attorney if you are working for the Nigerian Army, just forge your own divorce papers, submit them to the Army, move out of your house and kick your wife and family to the curb.

If this sounds harsh, well it is.  This recent story is about a Nigerian Army Major alleged forged his divorce papers so he could leave his wife and take up with another woman.

It’s a long article but the bottom line is this.  If you have enough clout you can simply forge paperwork and your employer in this case the Nigerian Army, will simply look the other way and say “ahh, so what.  He didn’t like his wife; he left her, kicked his kids out on the street, but he should get the house.”  It’s a long drawn out story in a country where the law is not as just as it should be.

On a signed note I have been contacted numerous times from people in African countries to fly over to Africa to testify in a Nigerian court and other courts which quite frankly scare me.

I am also helping people get justice but I am not for flying to a third world country with a questionable justice system and ending up in an African prison because somebody in power didn’t like my opinion.  No thanks.  I’ll stick to the Western European court systems where at least there is some semblance and reasonableness and fairness.  Enjoy the article.

The forgery of court document is a criminal offence which carries a seven-year jail term. But the Nigerian Army does not seem to consider the offence such a big deal. When told how Paul Egbo, a Major in the army’s medical corps, allegedly forged divorce papers to enable him leave his wife and take up with another woman, a female army officer, an official letter from the Chief of Army staff said the offence is of no concern to the army.

In May 2006, Mr Egbo, a native of Delta State, while serving in Maiduguri, Borno State, decided he wanted out of his 12-year marriage to Uche Egbo. He called Mrs. Egbo, a house wife and mother of their three children living in their home at the Ojo military cantonment in Lagos State, and told her that the marriage is over because God had told him to marry another woman.

He then changed his salary account from which Mrs. Egbo and the children take money for their monthly upkeep. Mrs. Egbo remembers that for the next eighteen months, up till September 23, 2007, her husband and father of their children only came home once; and that was to pack his belongings.

“He came from Maiduguri to pack his things. I told him that if he takes everything how does he want us to cope, that why has he abandoned his family, that he should make arrangement for his children’s upkeep,” Mrs Egbo said, “Instead he accused me of being a criminal and got me arrested. I was taken to the guardroom and would have remained there if not for an officer who intervened. But he took everything and left us with nothing.”

Mrs. Egbo’s ordeal was not over. On May 20, 2008, Military Police personnel came to her home and handed her a Lagos State High Court order dated December 31, 2007, which declared her marriage to Mr. Egbo dissolved. On the orders of her husband, they had come to evict her with immediate effect from the house.

“It was only because the cantonment commandant, Lieutenant Colonel Apere, intervened that I was spared. He instructed Paul to come and sort things out himself because the army gave the house to him and not me,” said Mrs. Egbo, who hails from Anambra State.

Being the only child of an elderly pensioner mother, Mrs. Egbo was totally dependent on her husband. Now abandoned, she became a wreck. Unable to bear the psychological trauma any longer, she moved out of the barracks in September 2008 and began squatting with some acquaintances.

To put food on the table, she started doing menial jobs. She could not pay her children’s school fees, and they had to miss one year of school. She and her three children practically lived off handouts from sympathizers.

A case of forgery

It was in this condition that Kayode Ogunjobi, a lawyer, met Mrs. Egbo. Filled with compassion, he took up her case free of charge and ran a check on the decree nisi and the decree absolute allegedly issued by the court dissolving the marriage. The response from the Lagos State judiciary in a letter dated July 17, 2008 revealed that Mr. Egbo’s documents were fake.

“We have checked our records and we report that the document did not emanate from the High Court of Lagos State as Suit No. HD/241/2007 does not exist in our records,” wrote Mariam Emeya, then a Chief Magistrate. “Furthermore it is very obvious that the document is fake as Mr. A. Ola Dada, the ACR (Assistant Chief Registrar) Litigation who purportedly signed the letter in 2007 retired in 2005.”

Mrs. Emeya, who at the time was also the deputy chief registrar of administration in the Lagos State High Court, further observed that a decree nisi only becomes absolute after three months but Mr. Egbo’s decree absolute terminated his marriage after two months.

“In the final analysis, there is no indication of the court or judge who purportedly dissolved the said marriage. It is therefore clear that the document is fake,” concluded Mrs. Emeya.

The army didn’t care

In December 2008, Mr. Ogunjobi, through Rouq & Company Solicitors and Advocates, petitioned the Office of the Chief of Army Staff, then headed by Abdulrahaman Dambazau, a lieutenant general; and Mike Okiro, the then Inspector-General of Police. While the Police never responded, the Army through its Special Investigation Bureau (SIB) in Apapa, Lagos State, between August and September 2009, investigated Mr. Egbo’s forgery case and the abandoning of his family responsibilities.

“We were invited by the SIB and we went. The investigation was concluded and the report forwarded. They said they were sending recommendations to Defence Headquarters, and that it is an internal thing, so they will get back to us when they need us. And that is the last we have heard from them, till now,” Mr. Ogunjobi said.

By June 2010, the army had still not responded and Mr. Egbo had not rendered any financial help to his family in years. During this time, Mrs. Egbo said her husband had married another woman, a female army captain she identified as Rachael Gashua, serving in the army’s Military Police Corps in Maiduguri.

After her children were sent away from school just before their promotion exams for non-payment of school fees, Mrs. Egbo approached Project Alert, a non-governmental organisation promoting women rights. They assisted her with N35,000; and together with the National Human Rights Commission (NHRC) petitioned the present Chief of Army Staff, Onyeabo Ihejirika, over Mr. Egbo’s forgery of judicial documents and abandonment of family.

But Mr. Ihejirika’s response to the Commission was that the army would not entertain the matter. Through his staff, one Lieutenant Colonel A. A. Ali, via a letter received by the NHRC on November 22, 2010, the army chief further recommended that if Mrs. Egbo felt so aggrieved, she could lay her complaints at the law courts.

“The issues raised are purely domestic in nature and should be settle between the spouses. On the other hand, if she feels strongly about the alleged ill treatment by her husband, she may take up a legal action against him. The Nigeria Army does not have the capacity to impose a wife on a personnel,” read the letter signed by Mr. Ali “for Chief of Army Staff”.

Mr. Egbo could not be reached on his mobile telephone. When contacted, his lawyer, Jonah Daniel of KC Okolodia & Co, said the media does not have any merit in reporting the case.

“I don’t think it is safe for your paper to publish this story. Paul’s wife has reported to the Nigerian army and it’s being investigated,” Mr. Daniel said. “Also the Human Rights Commission is investigating. This matter is under investigation, so I don’t know what you want me to say.”

But when asked if he procured the fake divorce documents for Mr. Egbo, he replied: “I can’t answer that question. I won’t be part of a campaign of calumny”.

The waiting game

The head of the Directorate of Army Public Relations, Chris Olukolade, a brigadier-general, when contacted, requested that he should be left out of the matter.

Kayode Ogunsanya, a lieutenant colonel and the spokesperson for the Army’s 81 Division, which oversees Bonny Cantonment, where Mr. Egbo is said to be currently serving, promised to contact him and then get back to NEXT. Two weeks have gone by and he is yet to respond. With tears in her eyes Mrs. Egbo said all she wants is for the father of her children to live up to his parental duties. As she wakes up early every day to prepare the food she sells on a roadside, she worries about raising enough money to pay her children’s school fees, as schools resume February.

“For five years I have been struggling on my own. I have made up my mind to move on. I am not out for revenge but if Paul wants to divorce, he should do it the right way. He should also have compassion on his children and cater for them and not leave them to suffer this way,” Mrs Egbo said.

More news and articles @ http://234next.com