L R E S: Egal Ecognition of Lectronic Ignatures
L R E S: Egal Ecognition of Lectronic Ignatures
L R E S: Egal Ecognition of Lectronic Ignatures
Section 12. Solemn Contracts. - No provision of the Act shall apply to vary any and all
requirements of existing laws and relevant judicial pronouncements respecting formalities
required in the execution of documents for their validity. Hence, when the law requires that a
contract be in some form in order that it may be valid or enforceable, or that a contract is proved
in a certain way, that requirement is absolute and indispensable.
MODES OF AUTHENTICATION
Section 15. Method of Authenticating Electronic Documents, Electronic Data Messages, and
Electronic Signatures. - Electronic documents, electronic data messages and electronic
signatures, shall be authenticated by demonstrating, substantiating and validating a claimed
identity of a user, device, or another entity in an information or communication system.
Until the Supreme Court, by appropriate rules, shall have so provided, electronic
documents, electronic data messages and electronic signatures, shall be authenticated, among
other ways, in the following manner:
a. The electronic signature shall be authenticated by proof that a letter, character, number
or other symbol in electronic form representing the persons named in and attached to or
logically associated with an electronic data message, electronic document, or that the
appropriate methodology or security procedures, when applicable, were employed or
adopted by a person and executed or adopted by such person, with the intention of
authenticating or approving an electronic data message or electronic document;
b. The electronic data message or electronic document shall be authenticated by proof that
an appropriate security procedure, when applicable was adopted and employed for the
purpose of verifying the originator of an electronic data message or electronic document,
or detecting error or alteration in the communication, content or storage of an electronic
document or electronic data message from a specific point, which, using algorithm or
codes, identifying words or numbers, encryptions, answers back or acknowledgement
procedures, or similar security devices.
Section 16. Burden of Authenticating Electronic Documents or Electronic Data Messages. - The
person seeking to introduce an electronic document or electronic data message in any legal
proceeding has the burden of proving its authenticity by evidence capable of supporting a finding
that the electronic data message or electronic document is what the person claims it to be.
Section 17. Method of Establishing the Integrity of an Electronic Document or Electronic Data
Message. In the absence of evidence to the contrary, the integrity of the information and
communication system in which an electronic data message or electronic document is recorded
or stored may be established in any legal proceeding, among other methods
a. By evidence that at all material times the information and communication system or other
similar device was operating in a manner that did not affect the integrity of the electronic
document or electronic data message, and there are no other reasonable grounds to doubt
the integrity of the information and communication system;
b. By showing that the electronic document or electronic data message was recorded or
stored by a party to the proceedings who is adverse in interest to the party using it; or
c. By showing that the electronic document or electronic data message was recorded or
stored in the usual and ordinary course of business by a person who is not a party to the
proceedings and who did not act under the control of the party using the record.