IX. ELECTRONIC COMMERCE ACT (R.A. No. 8792) Flashcards

1
Q

IX. ELECTRONIC COMMERCE ACT (R.A. No. 8792)

A. Legal Recognition of Electronic Data Messages, Documents, and Signatures
(Sections 6-11)

-Edoc > CUV
-Esig > meth

A

Key Points on Electronic Data and Signatures Recognition:

These rules establish a legal framework for electronic documents, messages, and signatures, making them enforceable in most situations.

1) Validity of Electronic Documents (Section 6 & 7):** Information in electronic form (emails, contracts) is legally valid and enforceable, just like paper documents.
Example:
An electronically signed contract can be used as evidence in court.

2) Conditions for Electronic Documents (Section 7):** The electronic document must be

complete, unaltered, and verifiable

for later reference.
Example:
An email with a missing page or corrupted attachment wouldn’t meet these criteria.

3) Electronic Signatures (Section 8):** E-signatures are legally equivalent to handwritten signatures if they meet specific requirements.

These include methods
to identify the signer,
ensure their intent to sign,
and
allow verification by the other party.

Example:
A secure online document signing platform that uses encryption and verification steps would create a valid e-signature.

4) Presumption of Validity (Section 9):** An e-signature is presumed to be valid unless there’s evidence of problems or the relying party acted unreasonably. Example: If you receive an email with a suspicious e-signature from an unknown sender, you wouldn’t be expected to rely on it.

5) Original Documents (Section 10):** Electronic documents can satisfy requirements for “original documents”

if their integrity and display ability
can be proven.
Example:
An electronically stored invoice with a verifiable audit trail could be considered an original for tax purposes.

6) Authentication Methods (Section 11):** The specific methods for authenticating electronic documents and messages are left open, but they should demonstrate

the identity of the sender
and
the integrity of the information.

This could involve encryption, digital certificates, or other secure methods.
Example:
A digitally signed and encrypted email with a verifiable sender certificate would be a strong form of authentication.

7) Burden of Proof (Section 11):**

The party introducing an electronic document in legal proceedings

has the burden of proving its authenticity.
Example:
If you want to use an email as evidence in court, you need to show it hasn’t been tampered with.

8) Presumption of System Integrity (Section 11):** The integrity of the system

where the electronic data is stored
can be presumed unless there’s evidence to the contrary.
Example:
If a document is stored on a secure server with a good reputation, its integrity might be presumed.

These are the general principles. The specific requirements and procedures may vary depending on the jurisdiction and the type of document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IX. ELECTRONIC COMMERCE ACT (R.A. No. 8792)

B. Obligation of Confidentiality (Section 32)

A

Key Points of Confidentiality Rule for Electronic Data:

This rule emphasizes the privacy and confidentiality of electronic information accessed under the Electronic Commerce Act. Here’s a breakdown:

1) Scope:** The rule applies to anyone who gains access to electronic data through the powers granted by this Act. This could include government officials, investigators, or authorized service providers.

2) Protected Information:** The rule protects a broad range of electronic information, including:
* Electronic keys (used for encryption/decryption)
* Electronic messages (emails, text messages)
* Electronic documents (contracts, reports)
* Any other digital information obtained under the Act’s authority

3) Confidentiality Requirement:** The information obtained cannot be shared with anyone else “except for the purposes authorized under this Act.”
* This means the information can only be used for the specific reason it was accessed, as defined by the Act (e.g., investigating a cybercrime).

Examples of Breaches:** Here’s how someone could violate this rule:
* A law enforcement officer investigating a hacking case shares confidential emails with a reporter.
* A service provider tasked with maintaining a government database leaks user information to a third party.

Overall, this rule aims to prevent unauthorized disclosure of sensitive electronic information obtained through legal means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Challenging Multiple Choice Questions on Electronic Data and Signatures Recognition:

Question 1:

A company requires all contracts to be signed in writing. You negotiate a contract with them electronically and both parties use a secure online signing platform with encryption and verification. Later, there’s a dispute and the company claims the electronic contract isn’t valid because it wasn’t signed in writing. Can they successfully argue this based on Section 7?

(a) Yes, because the law still requires a physical signature for contracts.
(b) No, because Section 7 recognizes electronic documents with secure signatures as legally equivalent to written documents.
(c) Maybe, it depends on the specific wording of the company’s contract regarding signatures.

A

Answer: (b) No, because Section 7 recognizes electronic documents with secure signatures as legally equivalent to written documents.

Reasoning: Section 7(a) states that electronic documents with maintained integrity and reliable authentication can satisfy the requirement of a “written” document. The secure online signing platform with encryption and verification likely meets these criteria for authentication as described in Section 8. While the company might have preferred a physical signature, the law doesn’t necessarily require it under these circumstances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question 2:

John receives an email with an attached invoice for consulting services. The email claims to be from a company John has worked with before, but the signature appears to be a simple typed name at the bottom. John isn’t sure if the invoice is legitimate. Based on Section 9, can John assume the invoice is valid because it has a signature?

(a) Yes, Section 9 creates a presumption that any electronic signature is valid.
(b) No, Section 9 allows John to question the validity of the signature if he has doubts.
(c) Maybe, it depends on the specific content of the email and John’s prior communication with the company.

A

Answer: (b) No, Section 9 allows John to question the validity of the signature if he has doubts.

Reasoning: Section 9 establishes a presumption of validity for electronic signatures, but with an important caveat. If John has reason to doubt the authenticity of the signature (e.g., unusual email address, lack of secure verification), he can challenge it. A simple typed name wouldn’t necessarily meet the criteria for a reliable electronic signature under Section 8. Here, the specific context of the email and John’s prior communication would be crucial in determining the legitimacy of the invoice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Challenging Multiple Choice Questions on Confidentiality Obligation:

Question 1:

A police officer is investigating a case of online fraud. During the investigation, they obtain a court order to access the suspect’s email account, revealing messages containing financial information about the victim. Later, the victim contacts the officer seeking details about the case. Can the officer share the specific contents of the emails with the victim under the confidentiality rule?

(a) Yes, because the victim is directly involved in the case.
(b) No, the information can only be shared for purposes authorized by the Electronic Commerce Act, and informing the victim might not be explicitly mentioned.
(c) Maybe, it depends on the severity of the fraud and the potential harm to the victim.

A

Answer: (b) No, the information can only be shared for purposes authorized by the Electronic Commerce Act, and informing the victim might not be explicitly mentioned.

Reasoning: The confidentiality rule restricts sharing information obtained under the Act to purposes explicitly authorized by the Act itself. While informing the victim might seem reasonable, the Act might not explicitly mention it as an authorized purpose. To share the specific email content, the officer might need to seek further legal guidance or authorization based on the specific provisions of the Electronic Commerce Act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question 2:

A company is required by law to submit electronic reports on its financial transactions to a government agency. An employee working for the agency accesses these reports but also uses the same login credentials to access the company’s internal communications database, which is not required for their reporting duties. Has the employee violated the confidentiality rule?

(a) No, because the employee has authorized access to the agency’s system.
(b) Yes, because the employee accessed information beyond what their duties require.
(c) Maybe, it depends on whether the internal communications contain sensitive information.

A

Answer: (b) Yes, because the employee accessed information beyond what their duties require.

Reasoning: The confidentiality rule applies to anyone who obtains access to electronic information “pursuant to any powers conferred under this Act.” While the employee has authorized access to the system for specific purposes (financial reports), they violated the rule by accessing information outside their authorized scope (internal communications). This constitutes exceeding the limitations of their access and potentially exposing confidential data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly