StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Electronic Signature and Electronic Privacy - Essay Example

Cite this document
Summary
The paper "Electronic Signature and Electronic Privacy" declares that electronic privacy implies the legal right to keep personal electronic information safe. Such privacy is protected by law and through electronic means. For example, electronic financial information can be protected through PINs…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Electronic Signature and Electronic Privacy
Read Text Preview

Extract of sample "Electronic Signature and Electronic Privacy"

Business Law Electronic Signature and Electronic Privacy An electronic signature represents all electronic ways that a person can use to adopt or ascertain ownership of any electronic content. It is mainly used as a normal signature to indicate that the signatory owns the recorded information or openly adopts the intentions that are in the record. A good example of an electronic signature is the ‘I accept’ button that is usually checked before making an online transaction. It acts as proof that the user abides by the principles and guidelines of the site. Electronic privacy implies the legal right to keep personal electronic information safe. Such privacy is protected by law and through electronic means. For example, electronic financial information can be protected through Personal Identification Numbers (PIN). 2. Foreclosure It is a process through which a mortgage lender repossess the property used as collateral for a loan. The lender usually auctions that property or retains ownership rights due to a default by the loaned. The main objective of a foreclosure is to obtain the principle amount and also the accrued interest. The process of foreclosure is legal and sanctioned by court. The borrower is given a specific grace period in which he or she can make payment and avoid foreclosure. An example of a foreclosure is when a person uses a house as collateral for a loan and defaults in payments. The lender then seeks foreclosure by selling the house to obtain the balance and other payments. 3. Franchise, franchisor and franchisee A franchise is a legal right or privilege that is officially accorded to an individual or entity to offer certain goods or services at a specific place and time. The franchise is strictly governed by guidelines that are defined under the agreement. A franchisor is usually a firm or corporation that has the ownership rights to grant franchises. The company analyses various business factors while awarding franchise rights to other entities. A franchisee is an individual or firm that is accorded the rights of a franchise and is thus officially allowed to conduct business under the terms of the franchise. An example to illustrate the terms can be sourced from the MacDonalds fast food franchise. The firm (franchisor) offers licenses or enters into trade agreements (franchises) with various entities (franchisees) around the world to offer products and services under its own name. 4. The board of directors The board of directors is a group of people who are elected to establish corporate management policies and practices in regard to the activities of the company. The board jointly runs the affairs of a company and is tasked with making decisions on major issues such as hiring terms, assessing the work of executives and shareholder dividends. The board of directors is formed by the organizations bylaws and regulated by a higher authority that has no interest in the firm to ensure the rationality of decisions. The activities of the board of directors are guided by the type, size and nature of the organization. For example, a board of directors governing multinational companies and companies trading in stocks have higher responsibilities than boards of local companies. 5. Tort liability Tort liability is the legal obligation of an entity to a victim who suffers injury or wrong due to the actions of a tortfeasor. Tort liability has various categories; Negligence represents a tort that is caused when the duty of care is breached. For Negligence tort to hold, there must be proof that the duty of care was owed. The determination of the duty of care is determined from a reasonable perspective of a non-partisan persons. An example is the death of a patient due to negligence of a doctor. Intentional torts are actions that are intentional and have a high degree of probability of causing harm to a person. Example include false evidence to impose a false imprisonment. Agent liability is a situation where the principle bears the consequences of any tort that is accrued in the activities of his agent. The tort liability lies with the principal if the agent acted within the guidelines of the principal and vice versa. 6. Religious discrimination Title IV of the US Equal Employment Opportunity Commission (EEOC) stipulates that it is illegal to consider an employee or a job applicant in a discriminative manner because of his or her religion. Religious discrimination involves treating people differently simply because of religious beliefs. The most common offenses include harassment, hardships, and firing. An example is that a person practicing a religion, example, Islam may be subjected to hostilities due to the actions of Islamists beliefs on terror. 7. Patent law Patent law guarantees an individual a right to personal material that include an invention that is made public and copyright. In the US, patent laws prohibit usage, selling, exporting and also importing of patented materials in the US and other countries. The law is meant to safeguard personal contents from unauthorized usage that may result in losses. The US patent law sets the patent term to be 20 years, starting from the date when the patent was claimed and registered. An example of patent law is that it is illegal to download films, songs or transfer the materials to a third party without the consent of the copyright owner. Such actions can result in a legal suit with a subsequent application of patent law. 8. Bailment Bailment refers to a situation where the possession of a physical property changes hands from the bailor to the bailee without changing ownership. This implies that the bailee has the right to use the property as prescribed in the bailment terms within the period stipulated. During such a period, the bailor cannot use the property until the set period expires. In bailment, both the bailee and the bailor must have an active intention to physically possess the property. An example of bailment is a situation where a carrier is contracted to deliver goods. The agreement is to deliver the goods safely within a certain period of time. The carrier has possession of the goods, but not ownership of the goods. Reference Cheeseman, H. R. (2006). Essentials of business and online commerce law: Legal, e-commerce, ethical, and global environments. Upper Saddle River, N.J: Pearson Prentice Hall. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Journal 2 Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Journal 2 Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/law/1656692-journal-2
(Journal 2 Essay Example | Topics and Well Written Essays - 1000 Words)
Journal 2 Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/law/1656692-journal-2.
“Journal 2 Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/law/1656692-journal-2.
  • Cited: 0 times

CHECK THESE SAMPLES OF Electronic Signature and Electronic Privacy

Security of Digital Signatures

we will discuss the nature, privacy, and implementation of digital signatures.... Every now and then, there is a news of a major security breach resulting in an invasion of personal privacy data such as credit card details, emails and vice versa.... The paper "Security of Digital Signatures" deals with digital signatures, as they are considered to be addressing integrity, confidentiality, and non-repudiation of data exchanged digitally, the history of cryptography as the first concept that derived digital signatures and encryption algorithms....
14 Pages (3500 words) Literature review

See assignment criteria

Law and electronic Signatures Firstname Lastname University Here Law and electronic Signatures Ever since the very beginnings of commerce, the two paramount concerns of contracting parties have always been to protect confidential information and to verify the identity of the other party.... claims that companies must implement the latest and most advanced technologies to protect client data and that the European Union's electronic signature Directive not only puts electronic signatures on equal footing with physical ones, but also assigns responsibility for the technology underpinning electronic signatures....
4 Pages (1000 words) Essay

Survey on Security in Electronic Voting Systems

The advantages of the E-Voting System: It provides secrecy and protects the privacy of the voter since the vote is cast anonymously.... It is applicable for a large-scale lection where it protects the privacy of the voter and ensures the fairness of the voting process regardless of the actions of the administrator and counter.... This paper ''Survey on Security in electronic Voting Systems'' tells that The Article on E-Voting using Double-Blind Identity-Based Encryption explains a model that uses double-blind encryption based on the user identity....
8 Pages (2000 words) Essay

Electronic Evolution in Negotiability of Negotiable Instruments

1) The United Nations Commission on International Trade Law Model Law on electronic Commerce 1996 (2)is a set of rules that provides a model for reform in this context.... It is recommended that the Model Law should be adopted to increase certainty in relation to the enforceability of electronic bills of exchange.... Before taking peer in to the impact of such electronic evolution in negotiability of Negotiable instruments, let's have deep look into the scope of Convention on international transaction with reference to Bills of exchange and Promissory notes....
12 Pages (3000 words) Essay

Implementing Digital Signature Technology

In this scenario, the internet that is a main element of this global wave has been transformed into a double-edged weapon providing a lot of opportunities, facilities, tools, and capabilities to individuals and corporations, on the other hand as well bringing with it a considerably increased information security and privacy risks (Salifu, 2008).... Additionally, they carry out most of the business activities on the internet, this process is acknowledged as electronic commerce (e-commerce)....
22 Pages (5500 words) Essay

Effect of Software Technology and Electronic Transactions

The following paper 'Effect of Software Technology and electronic Transactions' looks at electronic commerce, which is essentially global in character.... E-commerce and online transactions are made possible through the application of software technology.... ... ... ... The author states that software is a 'set of instructions made into a program' that can be 'installed or removed from the computer by the operator' and requires raw data to complete its function....
8 Pages (2000 words) Assignment

E-Commerce Law in the United Kingdom

A few of these measures are the digital signature and security devices.... As the author puts it, the buying and selling of goods and services, by means of the internet, is termed as electronic commerce or e-commerce.... In addition, computer networks were increasingly employed for transmitting documents relating to commercial transactions and this process was termed as electronic Data Interchange....
8 Pages (2000 words) Essay

Digital Signature Algorithms and Application of a Scheme of Digital Signature in Electronic Government

As a result of these multiple uses that require high security, digital signatures are used to provide the privacy of the users since these signatures can prove the source of the document and confirm its integrity.... The author of the paper "Digital Signature Algorithms and Application of a Scheme of Digital Signature in electronic Government" states that digital signatures are hard to be attacked by the intruders who tried to distort the messages hence making them popular....
13 Pages (3250 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us