Frequently Asked Questions |
|
A contract is an agreement between two or more parties which is enforceable by law. Therefore it is generally said that "all contracts are agreements but all agreements are not contracts". The law regards contracts as collections of obligations. Contracts form the foundation of any enterprise by representing most business relationships throughout their lifecycle, for instance, from procurement to sales; employment to partnerships and real estate. |
|
Q: What are LexEcon Contracts™ ?
LexEcon Contracts™ are contract models and templates (in PDF) drafted by experienced legal consultants based on standard agreement clauses and subject-specific technical terms. These templates cover corporate contracting requirements on a broad range of subjects and industries. LexEcon Contracts are popularly used by clients from many common and civil law countries as an effective tool in the contract creation process that requires Attorney assistance only to check for local legal compliance. Can be used for both eContracting and traditional paper-based contract formation. |
|
Electronic contracting (e-Contracting) simply means contracting in the electronic medium. An e-contracting process basically includes two stages: contract establishment (formation) and contract enactment (contract fulfillment or performance). E-contracting activities such as identifying, checking and validation of contractual parties, negotiation and validation contract, are included in the stage of contract establishment. Contract enactment is further separated into two phases: performance and post-contractual activities. Monitoring of contract performance and compensation activities belongs to the contract performance phase while contract enforcement may be involved in both the contract performance and post-contractual activities. Benefits of eContracting:
|
|
Q: What are Electronic Signatures ? Electronic signature is a broader term that refers to any electronic data that carries the intent of a signature. National legislation worldwide provides for the legal significance and validity of a variety of electronic signatures. Such legislation generally does not impose limitations on the technology used for creating or signing an electronic document. For instance, the Federal Electronic Signatures in Global and National Commerce Act of USA (E-SIGN) passed in 2000 provides that a signature in an electronic agreement can be "an electronic sound, symbol, or process attached to or logically associated with an electronic record and executed or adopted by a person with the intent to sign the electronic record". An electronic signature does not necessarily have to involve the name (handwritten or otherwise) of the signer. Electronic signing can take several different forms:
|
|
Q: What are Digital Signatures ? Digital signature is a subset of electronic signatures. It is the most technologically advanced type of electronic signature. Digital signatures are often used to implement electronic signatures, but not all electronic signatures use digital signatures. A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit (tamper-proof). Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery and tampering. |
|
Q: How do Digital Signatures work ? The security and privacy of the data that is being exchanged via Internet, especially when you are sending sensitive information through it, is a major concern. Among many ways of securing data, encrypting the sensitive data is the most popular and effective way to have data security. Encryption is translation of data into a secret code called a cipher text. Decryption is the process of decoding data that has been encrypted into a secret format - this requires a secret code or password. Computer encryption uses the science of cryptography. Most of the encryption systems belong to one of following two categories. 1. Symmetric-key encryption: In this technique, a single key is used to encrypt and decrypt the message.2. Asymmetric or Public-key encryption: This technique uses one key (private key) to encrypt (i.e. lock) a message while another key (public key) to decrypt (i.e. unlock) the message. Public-key encryption uses the combination of a private key and a public key. The private key is kept secret and is only known to the person who encrypts the message, while the public key is freely disseminated which helps to verify the message. To decode an encrypted message, the receiver uses the public key of the sender.Encryption/Decryption is advisable while carrying out any kind of sensitive transaction, such as a online purchases or the communication of a company sensitive documents between different departments in the organization etc. |
|
Q: How to digitally sign and authenticate documents ? Creating a digital signature requires a Digital Certificate, which is issued by an agency called a Certificate Authority (CA). This method of signing also requires a pair of numeric keys. The first is the private key, which is known only to the signer and must be kept absolutely secret for the entire system to work properly. The second key, the public key, is freely available to anyone who wants it, and is part of the public information in the signer's published digital certificate. Because of the mathematical nature of these two keys, only documents that are locked (encrypted) by one key can be unlocked (decrypted) by the other. The final requirement is a digital document, ready to be signed. Digital signature technology capitalizes on the fact that digital documents are (at their lowest level) just numbers, and mathematical operations can be performed on them. One such operation is the hash function by which a document's numerical content is processed in order to create a numeric "fingerprint" of that document. This signer's private key is used to encrypt the document fingerprint, resulting in a digital signature. The digital signature is embedded within the original document, creating a digitally signed document. Authentication:
|
|
Q: What are the benefits of Digital Signatures ? For efficiency concerns, when organizations move away from paper documents and ink signatures or stamps, digital signatures can provide added assurances of the evidence to provenance, identity, and status of an electronic document as well as acknowledging informed consent and approval by a signatory. Digital signatures are equivalent to traditional handwritten signatures in many respects; properly implemented digital signatures are more difficult to forge than the handwritten type. Authentication: Although messages may often include information about the entity sending a message, that information may not be accurate. Digital signatures can be used to authenticate the source of messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user. The importance of high confidence in sender authenticity is especially obvious in a financial context. For example, suppose a bank's branch office sends instructions to the central office requesting a change in the balance of an account. If the central office is not convinced that such a message is truly sent from an authorized source, acting on such a request could be a grave mistake. Data Integrity: In many scenarios, the sender and receiver of a message may have a need for confidence that the message has not been altered during transmission. Although encryption hides the contents of a message, it may be possible to change an encrypted message without understanding it. (Some encryption algorithms, known as nonmalleable ones, prevent this, but others do not.) However, if a message is digitally signed, any change in the message after signature will invalidate the signature. Furthermore, there is no efficient way to modify a message and its signature to produce a new message with a valid signature, because this is still considered to be computationally infeasible by most cryptographic hash functions. Non-repudiation: Digital signatures can also provide non-repudiation, meaning that the signer cannot successfully claim s/he did not sign a message, while also claiming their private key remains secret. Further, some non-repudiation schemes offer a time stamp for the digital signature, so that even if the private key is exposed, the signature is valid nonetheless. Digital signature schemes in the sense used here are cryptographically based, and must be implemented properly to be effective. |
|
Q: Who uses electronic & digital signatures ? Digital/ Electronic signatures are mostly used by:
To mention a few institutions out of many across the globe:
|
|
Q: What are the countries where electronic signatures are legally recognized ?
Visit Wikipedia - Digital signatures and law http://en.wikipedia.org/wiki/Digital_signatures_and_law |
|
Q: Are electronic and digital signatures legally binding? In recent years, many countries worldwide have adopted legislation and regulations that recognize the legality of a digital signature (standard electronic signatures) and deem it a binding signature. In these countries electronic and digital signatures are just as binding as traditional pen and ink signatures as long as they are executed through a process that clearly establishes intent to sign and ensures all legal elements of proof. For instance, electronic signatures obtained through DocuSign are compliant with the federal Electronic Signatures in Global and National Commerce Act of 2000 (ESIGN) and the Uniform Electronic Transactions Act (UETA) which have been adopted in most states. As a result, they are legally binding and backed by a comprehensive audit trail. |
|
Q: Can my business lower costs using electronic signatures? Both the private and public sector use e-signatures to lower costs. The most common use is to sign legally binding contracts or agreements electronically, thereby lowering the costs associated with records management and mailing. In addition, many organizations are also using e-signatures to speed up transactions and lower the costs for internal processes. For instance, you can use electronic signatures to get sign-offs on internal reviews and approvals—particularly valuable for organizations with geographically-dispersed teams. |
|
Q: What return on investment can I expect from deploying an e-signature management solution? It might surprise you to realize just how high the cost savings of an electronic signature management system can be and how quickly you can realize your return on investment. According to some published ROI estimates, organizations have saved up to 90 percent of the cost associated with a paper-based system. You'll be able to save on employee time, postage, and overnight courier services. It's a much greener solution as well, which can help you substantially reduce the amount of ink, paper, and copier supplies. |
|
Q: What is Contract Management ? Contact management is concerned with managing the lifecycle of a contract from negotiation and authoring through performance monitoring, making amendments and the end or renewal of it. Contract management helps companies/ entrepreneurs enhance profits by minimizing the probability of legal and regulatory risk. |