RA 8792 Electronic Commerce Act 2024 Flashcards

sec. 6-11 & 32

1
Q

What is the primary purpose of the “Legal Recognition of Electronic Signatures” section in RA 8792?
a) Legal recognition of data messages
b) Authentication of electronic signatures
c) Legal recognition of electronic documents
d) Legal recognition of electronic signatures

A

Answer: b) Authentication of electronic signatures

Explanation: The “Legal Recognition of Electronic Signatures” section specifically deals with the authentication of electronic signatures, outlining the procedures and criteria for establishing their authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In the “Legal Recognition of Electronic Documents” section, what conditions must be met for an electronic document to be considered reliable?
a) It must be widely accepted
b) It must be encrypted
c) It must maintain integrity and reliability
d) It must have a digital watermark

A

Answer: c) It must maintain integrity and reliability

Explanation: The “Legal Recognition of Electronic Documents” section requires that electronic documents maintain their integrity and reliability to be considered legally effective, valid, and enforceable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Under the “Authentication of Electronic Data Messages and Electronic Documents” section, what does the criteria for assessing integrity involve?
a) Use of encryption methods
b) Completeness and unaltered status
c) Acceptance by a majority of users
d) Compliance with industry standards

A

Answer: b) Completeness and unaltered status

Explanation: The criteria for assessing integrity in the “Authentication of Electronic Data Messages and Electronic Documents” section involve whether the information has remained complete and unaltered, apart from specific authorized changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

According to the “Legal Recognition of Electronic Writing and Documents” section, what does “functional equivalent” mean in the context of electronic documents?
a) Physically identical
b) Legally comparable
c) Technologically superior
d) Socially accepted

A

Answer: b) Legally comparable

Explanation: “Functional equivalent” in the “Legal Recognition of Electronic Writing and Documents” section means that, for evidentiary purposes, an electronic document is considered legally comparable to a written document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the “Authentication of Electronic Data Messages and Electronic Documents” section, what authority is granted to the Supreme Court regarding authentication procedures?
a) The power to appoint electronic notaries
b) The power to establish rules for authentication
c) The power to approve digital signatures
d) The power to regulate encryption methods

A

Answer: b) The power to establish rules for authentication

Explanation: The “Authentication of Electronic Data Messages and Electronic Documents” section grants the Supreme Court the authority to adopt authentication procedures and establish rules for authenticating electronic data messages and electronic documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary purpose of the “Legal Recognition of Electronic Writing and Documents” section in RA 8792?

a) Legal recognition of data messages
b) Authentication of electronic signatures
c) Legal recognition of electronic documents
d) Legal recognition of electronic signatures

A

Answer: c) Legal recognition of electronic writing and documents

Explanation: The “Legal Recognition of Electronic Writing and Documents” section primarily addresses the legal recognition of electronic writing and documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. According to the “Legal Recognition of Electronic Signatures” section, when is an electronic signature considered equivalent to a handwritten signature?a) If it is widely accepted
    b) If it is encrypted
    c) If a reliable and appropriate method is used
    d) If it has a digital watermark
A

Answer:

c) If a reliable and appropriate method is used

Explanation: The “Legal Recognition of Electronic Signatures” section specifies that an electronic signature is equivalent to a handwritten signature if a reliable and appropriate method is used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. True or False: Does RA 8792 modify statutory rules relating to the admissibility of electronic data messages?
A

-False

Explanation: RA 8792 does not modify statutory rules relating to the admissibility of electronic data messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. True or False: Does Section 10 of RA 8792 apply only to obligations and not to consequences for information not presented in its original form?
A

False

Explanation: Section 10 of RA 8792 applies both to obligations and consequences for information not presented in its original form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. According to Section 11, what authority is granted to the Supreme Court regarding authentication procedures?a) The power to appoint electronic notaries
    b) The power to establish rules for authentication
    c) The power to approve digital signatures
    d) The power to regulate encryption methods
A

b) The power to establish rules for authentication

Explanation: Section 11 grants the Supreme Court the authority to establish rules for authentication procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Section 32: Obligation of Confidentiality
6.
According to the “Obligation of Confidentiality” section, who is obligated to maintain confidentiality of electronic keys and data messages?

A

a) Any person

Explanation: The “Obligation of Confidentiality” section imposes the obligation on any person to maintain confidentiality of electronic keys and data messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. What is the consequence of violating the obligation of confidentiality under the “Obligation of Confidentiality” section?
A

b) Monetary fine

Explanation: Violating the obligation of confidentiality may result in a monetary fine according to the “Obligation of Confidentiality” section.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: Does the “Obligation of Confidentiality” section allow the sharing of electronic information obtained under the Electronic Commerce Act for educational purposes?

A

False

Explanation: The “Obligation of Confidentiality” section does not allow the sharing of electronic information obtained under the Electronic Commerce Act for educational purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. True or False: Does the obligation of confidentiality in the “Obligation of Confidentiality” section apply only to electronic keys and not data messages?
A

False

Explanation: The obligation of confidentiality in the “Obligation of Confidentiality” section applies to both electronic keys and data messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Any person who obtained access to electronic keys or data messages under the Electronic Commerce Act shall not convey or share the same with any other person, except for the purposes ______________ under this Act.

A

authorized

Explanation: The “Obligation of Confidentiality” section specifies that sharing is allowed only for authorized purposes under the Electronic Commerce Act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. The obligation of confidentiality under the “Obligation of Confidentiality” section applies to electronic data messages, books, registers, correspondence, and other material obtained under the powers conferred in the Electronic Commerce Act, without the ______________ of the owner.
A

knowledge

Explanation: The “Obligation of Confidentiality” section applies without the knowledge of the owner of the electronic data messages, books, registers, etc.

17
Q
  1. Discuss the rationale behind imposing an obligation of confidentiality in electronic transactions as outlined in the “Obligation of Confidentiality” section of RA 8792.
A

The rationale is to safeguard electronic keys, data messages, and other material obtained under the Electronic Commerce Act, ensuring that individuals with access do not share or convey such information except for authorized purposes, protecting the integrity of electronic transactions.

18
Q
  1. Provide examples of situations where the obligation of confidentiality under the “Obligation of Confidentiality” section may be crucial for protecting individuals and organizations involved in electronic transactions.
A

Examples may include protecting sensitive business information, trade secrets, or personal data from unauthorized disclosure, ensuring the secure and confidential nature of electronic transactions.

19
Q

What is the coverage of RA 8792?

A

Republic Act No. 8792, also known as the Electronic Commerce Act of 2000, has a broad scope of coverage in terms of electronic writing, documents, and data messages. The law aims to facilitate electronic transactions, recognize the legal validity of electronic documents and signatures, and promote the use of electronic data interchange. Here are key aspects of the scope of coverage along with examples:

  1. Electronic Documents:
    • Scope: RA 8792 provides for the legal recognition of electronic documents, treating them with the same legal effect, validity, and enforceability as traditional paper-based documents.
    • Examples:
      • Contracts executed electronically.
      • Invoices and receipts generated in digital formats.
      • Electronic letters of credit in international trade.
  2. Data Messages:
    • Scope: The law recognizes the legal effect, validity, and enforceability of data messages, which include any information generated, sent, received, or stored by electronic, optical, or similar means.
    • Examples:
      • Email communications.
      • Text messages and chat exchanges.
      • Electronic notices or announcements.
  3. Electronic Signatures:
    • Scope: RA 8792 acknowledges the legal equivalence of electronic signatures to handwritten signatures, provided certain conditions are met.
    • Examples:
      • Digitally signed contracts.
      • Authenticated electronic approval of documents.
      • Secure electronic signatures used in online transactions.
  4. Authentication of Electronic Data Messages and Documents:
    • Scope: The law addresses the authentication of electronic data messages and documents, ensuring their validity and origin.
    • Examples:
      • Digital certificates used to verify the identity of parties.
      • Security procedures employed to authenticate electronic documents.
      • Cryptographic methods for ensuring data integrity.
  5. Presumption Relating to Electronic Signatures:
    • Scope: RA 8792 establishes a presumption that an electronic signature is the signature of the person to whom it correlates and was affixed with the intention of signing or approving the electronic document.
    • Examples:
      • Presumption that an electronically signed contract is valid.
      • Assumption that an electronic signature on an approval document is genuine.
  6. Original Documents:
    • Scope: The law addresses the acceptability of electronic data messages or documents as meeting the requirements for originality in legal proceedings.
    • Examples:
      • Electronically stored contracts presented as original documents in court.
      • Digital copies of official records used as original documents.
  7. Legal Recognition of Electronic Documents:
    • Scope: RA 8792 ensures that electronic documents have the same legal effect, validity, and enforceability as traditional paper-based documents.
    • Examples:
      • Electronic agreements recognized in legal disputes.
      • Electronically signed contracts deemed valid in court.
  8. Legal Recognition of Data Messages:
    • Scope: The law recognizes data messages for legal effect, validity, and enforceability.
    • Examples:
      • Legal acceptance of business communications via email.
      • Data messages serving as evidence in legal proceedings.
  9. Authentication Procedures:
    • Scope: RA 8792 empowers the Supreme Court to adopt authentication procedures, including the use of electronic notarization systems.
    • Examples:
      • Supreme Court-approved electronic notarization systems.
      • Certificates of authentication for printed copies of electronic documents.
  10. Admissibility of Electronic Data Messages or Electronic Documents:
    - Scope: The law does not modify statutory rules relating to the admissibility of electronic data messages or documents, except for rules relating to authentication and best evidence.
    - Examples:
    • Rules regarding the admissibility of electronically stored evidence in court.
    • Criteria for the admission of electronic records as evidence.

In summary, RA 8792 covers a wide range of electronic transactions, documents, and signatures, providing a legal framework to support the use of electronic means in commerce and communication. The examples provided illustrate how the law applies to various scenarios involving electronic writing, documents, and data messages.