Contracting, Reporting and Other Legal Issues

Lecture Notes:

Contracts

Business is usually carried out under contracts where seller and buyers fix the conditions of a specific transaction. The conditions can specify the quality and quantity of the product, delivery, payment, follow up (warranty, service).

There are three cases, when no written contract is needed about the quality of the product:

Usually, delivery conditions depend on the quantity or volume of the product, as well as payment and further relations. The above notes can apply to some of the cases.

A contract is reached by:

Contracts range from "simple" (e.g. purchase of a small quantity of low value product) to complex (e.g. "cover" contract for a long period of time fixing the conditions of acquisition of certain types of goods or services). In the simple cases usually no negotiation take place and no written contract is signed. The standards and more general legislation is applied.

EC services applicable to the Legal Activities in a Business Transaction:

Types of activities:

Data Requirements

Network Security and Privacy

Complex issues of security, authentication, and privacy traverses modern networks. Confidence, reliability, and protection of the information against security threats is a critical prerequisite for the functioning of electronic commerce, especially during contracting and settlement activities.

See the Flash Demo

Types of security:

See the Flash Demos:
Security techniques
Crypting and encrypting | Simple crypting | Crypting with public key

Security techniques:

Reporting

Business transactions take place within particular regulatory frameworks dictated by Public Authorities. The objectives of this regulation are:

All trading parties (sellers, buyers, mediators) need to communicate with Public Authorities in order to:

In most of the cases, Public Authorities require paper based documentation. In 70s in the USA the "Paper Reduction Act" specifies that Government agencies can accept certain documents in electronic format. This Act creates opportunities for using paper-less technologies in such areas as accounting and clean the way of electronic commerce. Currently many countries developed laws regulating use of reporting data presented in electronic format, or accept such documents, because the existing law does not specify precisely the type of the document. E.g. in many standards was written that a certain document must be prepared using typewriter, because the only alternative was hand-written document. Authorities are ready to accept even printed documents as an exception. There are generally two ways to overcome this problem: to change every document regulated procedures and formats of reporting, or accept a single document that specifies the type of cases, which allow electronic format of document.

Digital signatures, Copyright, Online Publishing

The possibility for unique identification of the person, sending a message over the net, formed the idea of digital signature. The very existence of digital signatures is now in the root of performing electronic negotiations and business contracts, validating on-line documents and using digital money.

See the Flash demo

A digital signature is a number, encrypted by two keys: one is used by the author and the other - by the receiver. The first key is private, the second can be public. The public key can decode only signatures, encrypted by the private key. This permits the receiver of the signed message to be sure who signed it.

Digital signatures are not simply codes like those used in the guarding systems. They are encrypted in connection with the text of the signed documents and are different for different documents, so only the keys can decode them.

Mathematical methods for encryption, used today, proved to be reliable enough to save digital signatures from forging. When using Internet for preparing and signing a contract with a business partner, encryption algorithm ties the full text to the digital signatures. Changing one letter only in the contract destroys the signatures.

The legislation in European countries has not solved in full the problem of accepting digital signatures as real signatures. There is not enough evidence how the courts decide cases for denying or challenging such signatures. But using of digital signatures undoubtedly will be an important part of any Internet business and an element of the Information society. We still cannot evaluate the scope of the digital money in future, but the methods of introducing them in next decade provide using digital money together with digital signatures.

Another legal problem is the copyright on the Internet. All European countries protect the copyright. Yet due to specific presentation of the information on the net there are many cases of braking the copyright laws.

There are two main reasons to explain the growth of such crimes. The first one is technical. Any kind of information on the net - software, databases, multimedia, electronic books and newspapers, business data, stored information materials, etc., is easy to be reached, printed, copied and illegally sold or reused in the same or slightly changed form. The other reason is the belief among many users that the information on the net should be free. This belief is supported by some software and information producers who suggest free software and data on the Internet to attract users and later on continue with paid products. Many users react with attempts to steal them, some succeed.

Two categories of companies are the main victims of copyright crimes on Internet: software vendors and online publishers.

The software on the net is protected by the law as well as the off-line software. The legal protection of the software in USA was imposed in 1980 by the Software Copyright Act. Most countries in the world have such laws, but the categories of copyrightable software is different.

Online publishing (in the broad sense) includes everything put on the net for observation and use (free or paid): texts and hypertexts, multimedia works, data of any kind. All of them are protected by the law, but many materials are objects of crime regardless of copyright.

Online publishing includes all web-pages of companies and institutions (free but copyright protected), public materials, directories, research and study results, business information (both free and paid), digital books and journals (many of them paid) and so on. A large number of companies make their money publishing on Internet and they are most interested of strong online publishing copyright protection.

Some online materials are specially protected - e-mail messages, bulletin boards, individual messages of all kinds. For them the copyright laws to be imposed are to be joined with the constitutional human rights of free correspondence and privacy and corresponding legislation.

Law on the Internet

For several years the use of Internet was not object of any restrictions concerning the content of information sent on the mail. Gradually, a number of cases showing the use of the tremendous possibilities of Internet for criminal and dangerous goals brought to considering the problem of controlling the information spread on the Internet.

In the USA on June 15, 1995 the Senate passed the Communications Decency Act (CDA), restricting the kinds of information which can be put on Internet. CDA extended the existing law of telephone usage, prohibiting obscene or harassing phone calls mainly to protect children of access to such materials on the net. The problems of Internet use, of course, are much more difficult due to the incomparable possibilities of Internet to handle written information, video and voice together. But even the restrictions of CDA caused many protests in the USA of people being afraid that such Act restricts their freedom of speech, guaranteed by the Constitution. In the Supreme Court of the United States in a case of American Civil Liberties Union the CDA was named "unconstitutional as a flat ban on protected speech". The CDA was said to represent a unique censorship scheme that demands strict juridical scrutiny.

In Europe the problem of illegal and harmful content on the Internet was also examined as a major problem. The European Commission prepared a Communication to the European parliament, the Council, the Economic and Social Committee and the Committee of the regions. In this document the following areas of potential harmful or illegal contents which can be misused for criminal activities were shown: