Electronic Contracts and E-Signatures: Complying With ESIGN and the UETA, Interplay With the UCC Navigating Issues of Enforceability, Authentication and Admissibility Today’s faculty features: 1pm Eastern | 12pm Central | 11am Mountain | 10am Pacific The audio portion of the conference may be accessed via the telephone or by using your computer's speakers. Please refer to the instructions emailed to registrants for additional information. If you have any questions, please contact Customer Service at 1-800-926-7926 ext. 1. TUESDAY, MAY 28, 2019 Presenting a live 90-minute webinar with interactive Q&A Patrick J. Hatfield, Partner, Locke Lord, Austin, Texas Elizabeth B. Shirley, Partner, Burr & Forman, Birmingham, Ala. Ed Snow, Partner, Burr & Forman, Atlanta
117
Embed
Electronic Contracts and E-Signatures: Complying With ...media.straffordpub.com/products/electronic-contracts-and-e-signatures... · Electronic Contracts and E-Signatures: Complying
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Electronic Contracts and E-Signatures:
Complying With ESIGN and the UETA,
Interplay With the UCCNavigating Issues of Enforceability, Authentication and Admissibility
The audio portion of the conference may be accessed via the telephone or by using your computer's speakers. Please refer to the instructions emailed to registrants for additional information. If you have any questions, please contact Customer Service at 1-800-926-7926 ext. 1.
TUESDAY, MAY 28, 2019
Presenting a live 90-minute webinar with interactive Q&A
Patrick J. Hatfield, Partner, Locke Lord, Austin, Texas
Elizabeth B. Shirley, Partner, Burr & Forman, Birmingham, Ala.
Ed Snow, Partner, Burr & Forman, Atlanta
Tips for Optimal Quality
Sound Quality
If you are listening via your computer speakers, please note that the quality
of your sound will vary depending on the speed and quality of your internet
connection.
If the sound quality is not satisfactory, you may listen via the phone: dial
1-866-961-8499 and enter your PIN when prompted. Otherwise, please
send us a chat or e-mail [email protected] immediately so we can address
the problem.
If you dialed in and have any difficulties during the call, press *0 for assistance.
Viewing Quality
To maximize your screen, press the F11 key on your keyboard. To exit full screen,
press the F11 key again.
FOR LIVE EVENT ONLY
Continuing Education Credits
In order for us to process your continuing education credit, you must confirm your
participation in this webinar by completing and submitting the Attendance
Affirmation/Evaluation after the webinar.
A link to the Attendance Affirmation/Evaluation will be in the thank you email
that you will receive immediately following the program.
For additional information about continuing education, call us at 1-800-926-7926
ext. 2.
FOR LIVE EVENT ONLY
Program Materials
If you have not printed the conference materials for this program, please
complete the following steps:
• Click on the ^ symbol next to “Conference Materials” in the middle of the left-
hand column on your screen.
• Click on the tab labeled “Handouts” that appears, and there you will see a
PDF of the slides for today's program.
• Double click on the PDF and a separate page will open.
• Print the slides by clicking on the printer icon.
FOR LIVE EVENT ONLY
Electronic Contracts and E-Signatures: Complying With ESIGN and UETA and Interplay With the UCC.
Navigating Issues of Enforceability, Authentication and Admissibility.
55
I. Electronic Signatures/Contracts--What Are They?
II. Interplay of ESIGN, UETA and the UCC.
III. E-Delivery of Consumer Disclosures
IV. Remote Online Notary
V. 6-Part Risk Framework
VI. E-Sign Vendor Assurences
VII. Regulatory Developments and Relevant Case Law.
VIII.Relevant Case Law Concerning Provisions and Practices to Ensure Validity of Electronic Signatures/Contracts.
IX. Enforceability, Authentication and Admissibility Challenges with Electronic Signatures/Contracts.
6
What We Will Cover Today
I. Electronic Signatures/Contracts--What Are
They? (Ed Snow)
• Some states (NY, IL, and WA) insisted on their own laws rather than follow NCCUSL.
• Concerned that state e-commerce law was not going to be uniform enough, the federal government enacted in 2000 the Electronic Signatures in Global and National Commerce Act (“ESIGN”)
• ESIGN pre-empted state e-commerce laws that varied in certain ways from UETA.
1. A record or signature may not be denied legal effect or enforceability solely because it is in electronic form.
2. A contract may not be denied legal effect or enforceability solely because an electronic record was used in its formation.
3. If a law requires a record to be in writing, an electronic record satisfies the law.
4. If a law requires a signature, an electronic signature satisfies the law.
5. In a proceeding, evidence of a record or signature may not be excluded solely because it is in electronic form.
8
ESIGN and UETA Key Points
UETA and ESIGN do not change contract law.
•UETA and ESIGN simply supplement contract law, to permit parties to transact business electronically.
•As supplemented by UETA and ESIGN, the law of contract formation, the basic elements of validity and verification of signatures continue in the electronic signature realm, albeit with some additional considerations.
•Accordingly, pre-ESIGN and UETA signature law continues to apply, other than to the medium.
9
Pre-ESIGN and UETA law of signatures.
• Per the statute of frauds, certain contracts are enforceable only if there is a written memorandum of the contract signed by or on behalf of the party to be charged
• Key issue is intent, not the form the signature takes.
• A signature may be any symbol made or adopted with an intention, actual or apparent, to authenticate the writing as that of the signer.
• A signature stamp or machine, if authorized, is a signature.
10
Pre-ESIGN and UETA cases.
•Griffith v. Bonawitz, 103 N.W. 327 (Neb. 1905). “A 'signature' is whatever mark, symbol, or device one may choose to employ as representative of himself.”
•Parma Tile Mosaic & Marble Co., Inc. v. Estate of Short, 87 NY2d 524 (Ct. App. NY 1996). Fax transmission of a guaranty (with no manual signature) with a name page header at the top of each page not “subscribed” for purposes of the Statute of Frauds.
Again, the key issue is intent, not the form the signature takes.
11
ESIGN/UETA Application and Scope
UETA/ESIGN
•Apply only to “electronic records and electronic signatures relating to a transaction.”
•“Transaction” means “an action or set of actions occurring between two or more persons relating to the conduct of business, commercial, or governmental affairs.”
•Applies “only to transactions between parties each of which has agreed to conduct transactions by electronic means.”
12
Exclusions under ESIGN and UETA
• The UCC, except Section 1-107 (Waiver of Renunciation of Claim or Right After Breach), Section 1-206 (Statute of Frauds for Kinds of Personal Property Not Otherwise Covered), Article 2 (Sales), and Article 2A (Leases).
• Laws regarding wills, codicils, and testamentary trusts.
• Other laws (e.g., notice of the cancellation or termination of utility services; certain notices of default, etc., in consumer transactions; notice of the cancellation or termination of health or life insurance benefits; and notice of the recall of a product, or material failure of a product, that risks endangering health or safety, among others).
13
Electronic Signatures: Key Definitions
What is “electronic”?
• Relating to technology having electrical, digital, magnetic, wireless, optical, electromagnetic, or similar capabilities.
What is an “electronic signature”?
• An electronic sound, symbol, or process attached to or logically associated with a record and executed or adopted by a person with the intent to sign the record. It includes a digital signature.
14
Electronic v. Digital Signatures
A digital signature is like a “fingerprint” that is digitally inserted into an electronic record to identify a signer, not merely a cut and paste of the image of a manual signature.
In order to use a digital signature, the signer would possess certificate-based digital identification that associates the signer and the electronic record.
15
Electronic v. Digital Signatures
A digital certificate is similar to a physical form of identification, such as a passport or driver’s license.
Digital certificates are issued by certification authorities who provide users with dual digital keys: a private key and a public key. The format for this is called, simply enough, a "public key infrastructure" (or PKI) and provides the highest level of security for an electronic signature.
16
Electronic v. Digital Signatures
UETA is not a digital signature statute, and nothing in UETA requires the use of a digital signature or any security procedure. It is technologically neutral.
Parties may use the most up-to-date digital signature technology, or even less sophisticated security procedures such as PIN numbers. Whatever parties use for attribution or assuring message integrity may be offered into evidence, unless validly contested.
17
Electronic Transactions and Records
What is a “transaction”?
• An action or set of actions occurring between two or more persons relating to the conduct of business, commercial, or governmental affairs.
What is a “record”?
• Information that is inscribed on a tangible medium or that is stored in an electronic or other medium and is retrievable in perceivable form.
18
Electronic Transactions and Records
What is an “electronic record”?
•A record created, generated, sent, communicated, received, or stored by electronic means.
Comment 6 to UETA Section 2:
“Information processing systems, computer equipment and programs, electronic data interchange, electronic mail, voice mail, facsimile, telex, telecopying, scanning, and similar technologies all qualify as electronic under this Act.”
19
II. Interplay of ESIGN, UETA and the UCC (Ed Snow)
ESIGN/UETA exclude the UCC, except:
•Section 1-107 (Waiver of Renunciation of Claim or Right After Breach),
•Section 1-206 (Statute of Frauds for Kinds of Personal Property Not Otherwise Covered),
•Article 2 (Sales), and
•Article 2A (Leases).
20
Therefore, for instance, security agreements under UCC Article 9 and negotiable instruments under UCC Article 3 are excluded.
BUT agreements for the sale of goods under UCC Article 2 (unless disguised security agreements under Article 9) and leases of goods under UCC Article 2A (unless disguised security agreements under Article 9) are included.
21
UCC Article 9 “Electronic Record” Provisions.
A security agreement is governed by UCC Article 9 which has its own provisions--if less explicit than those set forth in UETA--supporting the creation of an "electronic security agreement" as a functional security agreement.
22
UCC Article 9 “Electronic Record” Provisions.
UCC 9-102(a)(7) includes the term "authenticate" which is used with respect to the execution and delivery of a security agreement and includes both a written signature and a digital or electronic signature.
“Authenticate” means: (A) to sign; or (B) with present intent to adopt or accept a record, to attach to or logically associate with the record an electronic sound, symbol of process. This language mirrors ESIGN/UETA.
23
UCC Article 9 “Electronic Record” Provisions.
A "record" includes a security agreement and is defined under UCC 9-102(a)(70) as follows, also mirroring comparable language used for "electronic record" in UETA: “information that is inscribed on a tangible medium or which is stored in an electronic or other medium and is retrievable in perceivable form.”
24
UCC Article 9 “Electronic Record” Provisions.
A security interest may attach to personal property when a security agreement becomes effective, that is, when, under UCC 9-203(b)(3)(A): “The debtor has authenticated a security agreement that provides a description of the collateral ….”
Under Article 9 the parties to a security agreement do not have to agree to conduct transactions by electronic means, but rather the execution and delivery of a security agreement itself is an agreement, solely with respect to the security agreement, to conduct that transaction by electronic means.
25
Transferable Records: A Quasi Exception to the UCC Article 3 Exclusion
The term "electronic record" includes as a subset thereof called a "transferable record" which is defined in UETA Section 16(a) as "an electronic record that:
1. would be a note under [Article 3 of the Uniform Commercial Code] or a document under [Article 7 of the Uniform Commercial Code] if the electronic record were in writing; and
2. the issuer of the electronic record expressly has agreed is a transferable record."
26
A party has "control" over a transferable record--granting such party with many of the rights of a holder in due course under UCC Article 3--if the conditions of UETA Sections 16(b) or (c) are met:
(b) [General rule: control of transferable record.] A person has control of a transferable record if a system employed for evidencing the transfer of interests in the transferable record reliably establishes that person as the person to which the transferable record was issued or transferred.
27
(c) [Safe harbor rule: control of transferable record.] A … person is deemed to have control of a transferable record, if the transferable record is created, stored, and assigned in such a manner that:
(1) a single authoritative copy of the transferable record exists which is unique, identifiable [with exceptions below];
(2) the authoritative copy identifies the person asserting control …;
(3) the authoritative copy is communicated to and maintained by the person asserting control or its designated custodian;
28
(4) copies or revisions that add or change an identified assignee of the authoritative copy can be made only with the consent of the person asserting control;
(5) each copy of the authoritative copy and any copy of a copy is readily identifiable as a copy that is not the authoritative copy; and
(6) any revision of the authoritative copy is readily identifiable as authorized or unauthorized.
29
Transferable Record—Perfection v. Control
Official Comment 6 to UETA Section 16:
•“A transferable record under Section 16 … would be an ‘account,’ ‘general intangible,’ or ‘payment intangible’ under Article 9 of the Uniform Commercial Code.”
•“Therefore, reading the UCC and UETA together it is clear that under UCC Article 9 a secured party may perfect against electronic records (including transferable records) by filing under UCC Section 9-312(a).”
30
Transferable Record—Issuance
An "electronic promissory note" that is intended to have the benefits of being a transferable record (with many of the rights of a holder in due course under UCC Article 3) rather than just merely an electronic record can only be created if the maker expressly agrees within the terms of such "electronic promissory note" that the same is issued as a transferable record.
31
An Example of Interplay: Commercial Loan Closings?
• While the law has permitted electronic commercial loanclosings since the late 1990s in most cases, commerciallenders have yet to fully embrace electronic closings, withtoday’s “dual track closings” with emailed PDFs to fundfollowed by wet signatures embracing the new law solong as it is backstopped by older law.
• Some possible reasons for not closing commercial loanssolely by electronic means:
3232
UETA, ESIGN, UCC and Commercial Loan Closings?
• Some lenders won’t fund without an inked promissorynote (even if UCC Article 3 is irrelevant).
• Some lenders must physically pledge an inked note to afunding source as collateral.
• Electronic record system long-term preservation andintegrity capabilities/cybersecurity issues.
• Fear that courts will not find electronic signaturesattributable to the party to be charged.
33
UETA, ESIGN, UCC and Commercial Loan Documents
Loan Documents Covered by UETA (so long as the parties thereto have agreed to conduct business by electronic means):
34
UETA, ESIGN, UCC and Commercial Loan Documents
Loan Agreement:
A customary commercial loan agreement, even if it contains a promise to pay the loans advanced under and governed by its terms, is highly unlikely to be a negotiable instrument under UCC Article 3, and, is therefore an ordinary contract that is not excluded under the terms of UETA.
35
UETA, ESIGN, UCC and Commercial Loan Documents
Promissory Note:
• Excluded if negotiable (i.e., covered by UCC Article 3).
• If non-negotiable (i.e., not covered by UCC Article 3), then it is NOT excluded under UETA and may constitute an electronic record (or a transferrable record, if not scanned).
• In other words, if issued electronically, it is not a negotiable instrument and may constitute an electronic record (or a transferrable record, if UETA Section 16 is satisfied).
36
UETA, ESIGN, UCC and Commercial Loan Documents
Promissory Note:
Care must be taken in drafting a promissory note that is manually signed in ink and then scanned and relied upon as an electronic record because the destruction or loss of the manually-signed-in-ink version might inadvertently result in either:
•The deemed discharge of the debt evidenced by such note under UCC Section 3-604, or
•The inability to enforce the same as a "lost" note under UCC Section 3-309.
37
UETA, ESIGN, UCC and Commercial Loan Documents
Promissory Note continued:
Synovus v. Paczko
• Bank sued on a line of credit agreement introducing into evidence an electronic copy thereof. Borrower claimed the debt evidenced by such line of credit “note” had been discharged because the paper version was destroyed.
• Result? Bank won because the “note” said bank could destroy the paper version and retain an electronic copy, and such retention procedure did not limit or affect bank's right of enforcement.
38
UETA, ESIGN, UCC and Commercial Loan Documents
Guaranty:
Like a loan agreement, a customary guaranty of payment, even if it contains a “primary obligor" promise to pay the loans advanced to the borrower, is not a negotiable instrument under UCC Article 3, and, is therefore an ordinary contract that is not excluded under the terms of UETA.
39
UETA, ESIGN, UCC and Commercial Loan Documents
Mortgage:
• A mortgage is treated the same under UETA as a loan agreement. However, to be enforceable against third parties, including a trustee in bankruptcy, it must be properly recorded in the applicable land records, which requires a writing unless such jurisdiction allows electronic filings.
• UETA considered excluding mortgages and other real estate documents from its scope, but then declined to do so.
40
UETA, ESIGN, UCC and Commercial Loan Documents
Security Agreement
• As noted above, a security agreement is governed by UCC Article 9 and is therefore excluded from coverage under UETA.
• However, UCC Article 9 has its own provisions--if less explicit than those set forth in UETA--supporting the creation of an "electronic security agreement" as a functional security agreement.
Preliminary Comments • A reasonably well-designed process, supported by solid
technology, can actually reduce risk, relative to traditional process.
• In particular, a reasonably well-designed e-process can provide a company with better evidence to enforce its contracts.
• It’s more about process and workflow than it is about technology, but technology plays important role.
44
Preliminary Comments (con’t) • A mistake commonly made by companies building their own
e-process is to overlook how they will enforce the e-signed or e-delivered documents.
• For most companies, the 3-part litmus test for an e-process is:
– Will our e-signed contracts be as enforceable as our paper contracts?
– Will our e-process give the right disclosures at the right time/sequence?
– Is our e-process friendlier than our paper process?
45
Consumer Disclosures• Can be given via e-delivery
• May require special consents– state law disclosures– federal law disclosures– states that have included special provision: AK, AL, CO, CT, GA, MD,
MA, NH, NV, NC, NJ, OR, SC, TN, VT, WV, and WI
• Determine whether any underlying law, such as the applicable insurance code, requires a disclosure to be “in writing” to determine if the e-process needs to involve this specific consent step.
• Explain process for e-delivery
46
Remote Online Notary (RON) Laws
• I believe it is early to get too excited, but momentum is gaining.• So far, 11 states have enacted a RON law: IN, MI, MN, MT, NV, OH, TN, TX,
UT, VT and VA• There is the NCCUSL (the same folks who lead push other uniform laws,
such as UCC and UETA) – that has published the Revised Uniform Law on Notarial Acts – 2018.
• The industry groups Mortgage Bankers Association with the American Land and Title Association are also pushing for states to adopt an appropriate RON.
• these are the groups very interested in having electronic records done right in the area of real property transfers including the recording of
deeds and liens/ mortgages on real property.
47
RON (con’t)
• What is the remote online referencing here?• the notary laws that require the person signing for the notary to “appear before”
or “personally appear” or “in the presence of” the notary all contemplate that the person signing would be physically close, in a line of eyesight unaided by video or audio equipment (ok, maybe a hearing aid).
• the RON laws are about expressly recognizing that the person signing is in the virtual presence of the notary, where the notary hears and sees the person signing with the aid of real time audio and video equipment.
• a sound video of a notary sitting next to the person signing, where that person signs an electronic record using an electronic signature and the notary then follows with the notary signing that electronic record using an electronic signature is currently supported in ESIGN the federal law and UETA, as enacted in 47 states. This is NOT the scenario the RON laws are addressing.
48
RON (con’t)
• The RON scenario is where the notary and the person signing are not in the same room, but they can see and hear each other.
• The focus of the RON laws is to make sure that the notary does in fact verify or authenticate the identity of the person signing and that the evidence of the
process is sufficient and retained to be available later if needed.
49
RON (con’t):Specific Elements
• Specific elements of the RON laws or RON process:
1. Should the notarial certificate expressly state that a RON process was used, as opposed to traditional in-person process?
2. Are there minimum standards for multi-factor methods for authenticating the true identity of the person signing, such as verified government issued, photo id, a shared secret and or bio-metric method? This is also referred to as “identify proofing”.
3. Is there a requirement that an audio and video recording of the notarial ceremony be captured, secured and retained for a period of time?
50
RON (con’t):Specific Elements
4. To what extent is a state official (such as the State’s Secretary of State) authorized or instructed to issue additional regulations for the RON process, such as the use of recognized third parties to verify the identity of persons, or the minimum requirements to covert an e-record that has been e-notarized to a paper copy to be filed?
5. Must the notary and the person signing be in the same state at the time of the notarization? For example, what is the status of a signature where the person signing is physically in a state that does not recognize RON, but the notary is in a state that recognizes RON? Does it make a difference of the contract being signed is governed by yet another law?
6. Often, records to be notarized are to be filed with the land transfer county government, such as the Country Recorder’s Office. It is hard to believe, but there are some states that permit only paper filings of deed transfers. The RON laws are addressing how the parties to a contract with e-notarized signatures create a paper copy of that e-original notarized, so that paper can then be recognized and filed by the Country Recorder.
51
RON (con’t)
• These are some of the issues and for the 11 states so far, there is plenty of variation on just these issues.
• Not to suggest that the notary process is not important, it has served a valuable role in commerce to verify the identity of the persons signing and also be available to testify if someone claimed the person signing was under duress or incompetent.
• The requirements under the emerging RON laws raise the bar considerably
and impose far greater burdens relative to the traditional paper process.
52
RON (con’t)
• I’ve seen a couple of demos from credible solution providers who appear to have the technology and process approach to meet the requirements for the remote online notary process. So yes, it can be done and as we have said for nearly 20 years now on the e-contracting processes, it’s more about workflow and process and less about underlying technology.
• Finally, how companies find a way to meet the lowest common denominator for a RON Process as more and more states enact a RON law will be interesting to watch.
• Stay tuned; we are.
53
6-Point Risk Framework
54
6-Point Framework
• Developed over time from risks identified by clients and attendees at sessions like this
• Framework helps distinguish the types of risk, so you can follow your process to manage the right risk to acceptable level
• Helps multi-disciplinary team get on the same page
55
6-Point Framework con’t1. Authentication Risk (which includes attributing a
signature to the person signing)
2. Repudiation Risk
3. Admissibility Risk
4. Compliance Risk
5. Adoption Risk
6. Relative Risk
56
6-Point Risk Framework
Risk – “That’s not my signature” on that record
Mitigant – Use “shared secrets” or other ways to affirm identity
■ Critically evaluate this risk. Many worry too much about this.
■ Consider what would motivate the counterparty to claim forgery.
1. Authentication
57
6-Point Risk Framework
Risk – “That’s not what I signed”
Mitigant – Tamper seal each document and tamper seal the audit trail
■ Easy to solve, huge mistake with serious downside if overlooked.
2. Repudiation
58
6-Point Risk Framework
2. Repudiation con’t
• Tamper sealing a record creates evidence that the document was not altered in any way after it was tamper sealed.
• Having an audit trail creates evidence of each significant step in the e-process, including:
– That the person’s identity was verified– The IP address of person signing or receiving records– Each record that was presented and/or signed, such as consent to e-delivery and
receipt of key disclosures
• An e-process, unlike traditional paper process, creates the record of what actually happened, rather than just the “he said, she said” evidence
59
6-Point Risk Framework
Risk – “Objection, your honor!”
Mitigant – Determine who is able and willing to testify upfront (Read Markel)
■ Who among you will testify under oath?
3. Admissibility
60
6-Point Risk Framework
3. Admissibility con’t
• Two essential elements of an e-process: – Records signed are tamper sealed immediately after
signed by the signing parties, and – The audit trail is created and tamper sealed.
• This evidence (the tamper seal process, the tamper sealed record(s) and the tamper sealed audit trail) arms a company’s testifying records custodian to state, under oath, specifically what happened at each step.
61
6-Point Risk Framework
3. Admissibility con’t
• The records custodian can testify as to:– how we know the identity of the person receiving and signing the records, and – that what was signed was not altered after the record was signed.
• Other extrinsic evidence will also be available, such as ongoing payments, failure to object, etc.
• Consider the credibility of the testifying records custodian.
• For transferrable records, the custodian will also need to discuss the process to maintain the “authoritative copy.”
62
6-Point Risk Framework
Risk – “I never saw that disclosure!”
Mitigant – Varies
■ Pay close attention to timing and sequence of disclosures.
4. Compliance
63
6-Point Risk Framework
4. Compliance con’t• The audit trail should include a reference to each record provided during
the e-process.
• For transactions, such as applications for insurance, mortgage, or bank account, which have statutorily-required disclosures to be given in writing, the audit trail should include entries for:• the consent to e-delivery by the consumer, and • the delivery of each such statutorily- required disclosure
• The audit trail with those entries allows the company to explain in litigation, settlement conferences and exams by regulators how the company is sure that it complied with the statutory disclosure obligations.
64
6-Point Risk Framework
Risk – “Am I done yet?”
Mitigant – Test, adjust, test, repeat
■ WARNING: be careful not to overly complicate the process. If it’s not friendlier and quicker than paper process, re-think the process.
5. Adoption
65
6-Point Risk Framework
Risk – “How does each category of risk for the e-process compare to that in the traditional process?”
■ Apply the relative risk to each previous point■ Authentication■ Repudiation■ Admissibility■ Compliance■ Adoption
6. Relative
66
6-Point Risk Framework
6. Relative con’t
• An automated e-process can wring out human error risk due to deviating from the approved (compliant and defensible) process.
• An automated e-process can make the contracting process: – Consistently correct; or – Consistently wrong if there are defects in the process.
• The tamper sealing process, the audit trail, automating the process, and careful review of the process can result in better evidence of what actually happened than relying on testimony of individuals with faded memories.
67
What Assurances Should You Get From Your e-Sign Vendor or Internal IT Shop?
6868
Assurances from e-Sign Vendors/IT
• Avoid surprises – ask now who will be there to testify on critical points:– System creates an Audit Trail
– Audit Trail is securely archived
– What is generated and available as evidence
69
Assurances from e-Sign Vendors/IT con’t
• One credible source reports significantly improved settlement conferences
• Audit Trail and each document/record presented, including each that was signed, are unaltered without detection
• Who will testify as to the above?
• Consider obtaining, upfront, certification / affidavit from e-sign solution vendor on key functions and features, e.g., audit trail and tamper seal.
70
Assurances from e-Sign Vendors/IT con’t
• In sum, ask for full sample of what would be generated to prove:– To a judge, how the company is sure the application
with the misrepresentations is in fact what the customer signed;
– To a regulator, how you are so sure that each and every required disclosure was in fact provided to each person; and
– Prepare Form Affidavit to be signed by your custodian, include screen shots.
71
The Bottom Line?
• e-Signatures can be legal
• Authentication and repudiation risks are manageable
• Evaluating these risks must be done in context
• More work flow and process than technology –don’t overly complicate it
• Courts have enforced shrinkwrap license agreements, clickwrap agreements,
and browsewrap licenses.
• Shrinkwrap license agreements evolved from the early practice of
displaying the terms of the license through the plastic wrapping
(shrinkwrap) concerning the delivery of software on a CD-ROM or other
physical media.
― The first paragraph of the shrinkwrap agreement typically states that
the opening of the package indicates acceptance of the license
terms. Contractual formation was based on the user opening the
shrinkwrap plastic and using the software. See Mark A. Lemley,
Intellectual Property and Shrinkwrap Licenses, 68 S. CAL. L. REV.
1239, 1241 n. 5 (1995).
76
• Additionally, courts have enforced clickwrap agreements,where the terms of the clickwrap license are displayedelectronically, and the user indicates acceptance by clickingthe "I accept" button.
• Courts generally will enforce these clickwrap agreements aslong as the terms are clear and acceptance is unambiguous,regardless of whether the user actually reads them. SeeRealPage, Inc. v. EPS, Inc., 560 F. Supp. 2d 539, 541 n. 1 (E.D.Tex. 2007); Shlomo Bar-Ayal v. Time Warner Cable, Inc., 2006WL 2990032 (S.D.N.Y. Oct. 16, 2006) (J. Wood) (upholdingenforceability of clickwrap agreement concerning self-installation CD-ROM concerning Time Warner).
Relevant case law
77
• More recently evolved is the browsewrap agreement, which provides that
internet users may not use a website unless they agree to the site's terms of
service.
• See Ronald J. Mann & Travis Siebeneicher, Just One Click: The Reality of
Internet Retail Contracting, 108 COLUM. L. REV. 984, 990 (2008).
Relevant case law
78
Relevant case law
• Many courts have found that typing your name at the end of an email is a valid
signature.
• Types of Electronic Signatures, INTERNATIONAL ENCYCLOPEDIA OF LAWS: CYBER
LAW, 2013 WL 4299218.
• An exchange of emails between opposing counsel has been held by courts to
form a binding settlement agreement between parties. See Hansen v. Rhode
Island’s Only 24 Hour Truck & Auto Plaza, Inc., 863 F. Supp. 2d 122 (D. Mass.
2012).
79
Relevant case law
• A.C. Furniture, Inc. v. Arby’s Restaurant Group, Inc., No. 4:14–cv–00029, 2014
WL 4961055, at *3-4 (W.D. Va. 2014).
• The court denied the defendant’s argument that an email failed to
represent a contract between the parties because there was no signed
writing, no exact quantity term listed in the email, and no “meeting of
the minds” or “intention to be bound.”
• The Court ultimately held that the email looked enough like a contract to