1996-02-22 - Digital Signature Legislation (fwd)

Header Data

From: Jack Keith <jkeith@panix.com>
To: sea-list@panix.com
Message Hash: 2c501496163a49a7bbc77038b7cdfe8abc4ed251397f4b5a8027b08ce043fc4f
Message ID: <Pine.SUN.3.91.960222080845.5326A-100000@panix.com>
Reply To: N/A
UTC Datetime: 1996-02-22 15:59:55 UTC
Raw Date: Thu, 22 Feb 1996 23:59:55 +0800

Raw message

From: Jack Keith <jkeith@panix.com>
Date: Thu, 22 Feb 1996 23:59:55 +0800
To: sea-list@panix.com
Subject: Digital Signature Legislation (fwd)
Message-ID: <Pine.SUN.3.91.960222080845.5326A-100000@panix.com>
MIME-Version: 1.0
Content-Type: text/plain




---------- Forwarded message ----------
Date: Wed, 21 Feb 1996 10:25:39 -0800 (PST)
From: Phil Agre <pagre@weber.ucsd.edu>
To: rre@weber.ucsd.edu
Subject: Digital Signature Legislation

[This message includes some interesting information about significant
consumer and privacy issues in state-level "digital signature" legislation
that is being modeled on Utah's law -- http://www.state.ut.us/ccjj/digsig/
It is also an example of a trend I'd like to encourage: academics using the
Internet to propagate ideas in concise, useful form while getting feedback
from a broad public before their work gets frozen forever in journals.]

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
This message was forwarded through the Red Rock Eater News Service (RRE).
Send any replies to the original author, listed in the From: field below.
You are welcome to send the message along to others but please do not use
the "redirect" command.  For information on RRE, including instructions
for (un)subscribing, send an empty message to  rre-help@weber.ucsd.edu
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

Date: Tue, 20 Feb 1996 20:54:03 -0800 (PST)
From: C. Bradford Biddle <biddle@pwa.acusd.edu>
To: ca-digsig@commerce.net
Subject: Digital Signature Legislation


DIGITAL SIGNATURE LEGISLATION: SOME REASONS FOR CONCERN

by Brad Biddle <biddle@acusd.edu>
February 20, 1996

[Copyright 1996 by Brad Biddle; permission granted for non-commercial 
electronic redistribution]

A recent flurry of state digital signature legislation should provoke some
concern among consumer activists, privacy advocates, and others interested
in the evolving legal landscape of cyberspace. 

At least ten states are developing or have already implemented digital
signature legislation. Much of this legislation is based on the pioneering
Utah Digital Signature Act, passed in 1995 (and currently in the process
of being amended). States which have introduced legislation based on the
Utah Act include Arizona, Georgia, Hawaii, Oregon, and Washington.
California has passed a different form of digital signature legislation,
and a bill is pending in Illinois which is similar to the California
approach. Florida and Virginia have formal resolutions pending which call
for legislative investigation into digital signature laws. 

The American Bar Association's Information Security Committee (a
sub-committee of the Section of Science and Technology) released its
Digital Signature Guidelines in October of 1995. These Guidelines are
"general, abstract statements of principle" and are not intended as model
legislation. The Information Security Committee intended to release model
digital signature legislation in June of 1995, but this effort has been,
as one report describes it, "stymied by bureaucratic maneuvering."
(Information Law Alert, 10/13/95). In the absence of this model
legislation, the Utah Act has become a de facto model act. 

The intent of this message (distributed to the "ca-digsig" mailing list
and to some other folks via direct e-mail) is to raise some concerns about
the Utah Digital Signature Act and its progeny. The author of this message
is a second-year law student at the University of San Diego School of Law,
and is writing an article on this topic for the San Diego Law Review.
Feedback and criticism are very welcome, and will likely be incorporated
into the developing article. 

THE UTAH DIGITAL SIGNATURE ACT 
[Sec. 46-3-101 et seq., Utah Code Annotated 1953]

No attempt will be made here to explain or summarize the complex and
detailed provisions of the Act. Generally, the Act envisions an
infrastructure in which computer users utilize state-licensed
certification authorities, online databases called repositories, and
public-key encryption technology in order to "sign"  electronic documents
in a legally binding fashion. The Utah Act sets out an ambitious legal and
regulatory framework intended to implement a public key infrastructure. 
It also carves out a place for digital signatures in the broader legal
landscape.  That is, it provides digital signatures with legal status as
valid signatures and addresses a variety of issues relating to the place
of electronic documents in contract and evidence law. 

Much of what the Utah Act accomplishes is laudable, and demonstrates how
legislation can effectively solve unsettled issues in the novel arena of
cyberspace. However, several aspects of the Act are troubling. The
potential problem areas can be categorized generally as liability,
privacy, and costs. A very brief discussion of each of these problem areas
follows. 

LIABILITY

The Utah Act makes two policy choices concerning liability allocation
which are potentially troubling. First, consumers who participate in the
infrastructure developed under the Utah Act subject themselves to a far
greater risk of extensive liability than they face in other electronic
transactions, such as credit card or debit card transactions. Most
electronic transactions made by consumers are subject the Electronic Funds
Transfer Act (EFTA) which limits consumer liability in the event of fraud
to (in most cases) $50. Even if a consumer is negligent, liability is
still capped at a rather low fixed amount. Critics of this scheme argue
that it is paternalistic and ultimately drives up costs for other
consumers who are careful to avoid exposing themselves to fraud.
Supporters argue that if consumers were exposed to potential unlimited
liability when engaging in electronic transactions they would not
participate in these transactions at all, and the potential benefits of
electronic transactions would not be achieved. Also, supporters say,
consumers are often unable to prevent fraud, and forcing consumers to
prove they were not negligent anytime fraud occurs would be an
unreasonable burden. 

Under the Utah Act, consumers are held to a negligence standard in
guarding their private encryption key. Thus, if a criminal obtains a
consumer's private key and commits fraud, the consumer is financially
responsible for that fraud unless the consumer can prove that the consumer
used reasonable care in guarding the private key. If the consumer cannot
prove this in court, or if the consumer was in fact negligent, then the
consumer will bear all losses resulting from the fraud. The arguments in
support of the EFTA may be applicable here. Will consumers participate in
a system which subjects them to unlimited liability? Is it sensible to
make consumers prove the absence of negligence? 

(Two related points are worth noting. First, drafters of the Utah Act
initially advocated a strict liability standard, rather than negligence,
for the security of private keys -- even "worse" for consumers -- and the
drafters continue to advocate strict liability as an alternative for other
state legislators considering digital signature laws. Second, a plausible
argument can be made that the federal EFTA should preempt the state
digital signature legislation on this issue -- this question is
unsettled.)

There is a second troubling policy choice relating to liability. The Utah
Act limits the potential liability of one actor in the infrastructure --
the certification authority -- to a fixed amount (termed a "suitable
guarantee" and determined by a complex formula or by administrative rule).
This amount may be less than the actual damages a certification authority
can cause. This policy decision, designed to create certainty for an
entrepreneur contemplating a certification authority business and foster
development of a certification authority industry, may have unintended
consequences. It is easy to envision a scenario in which a certification
authority's private key is compromised -- by brute force cryptanalysis,
bribery, or incompetence, for example. A criminal with a certification
authority's private key could cause an immense amount of financial damage,
imposing huge losses on a number of innocent parties. These innocent
parties would be unable to recover their full losses from the
certification authority if the total of these losses was greater than the
amount of the "suitable guarantee" -- even if the certification authority
was totally at fault in creating the circumstances that led to the losses. 
Because the certification authority would not have to bear the full costs
of any losses resulting from a compromised private key, they may not have
the incentive to take expensive precautions to protect against that
occurrence. 


PRIVACY

The system contemplated by the Utah Act also raises several different
types of privacy-related concerns. At a broad level, one commentator has
pronounced the general type of system embodied in the Utah Act a "cultural
misfit"  because every merchant and consumer potentially must register
with an outside authority in order to acquire the basic capacity to
transact commerce. In light of the more limited scope of the Utah Act and
the current state of electronic commerce, however, this argument is not
particularly persuasive. 

More significantly, under the Utah Act's approach certain entities -- the
online databases of public encryption keys termed "recognized
repositories" -- will have unrestricted access to valuable
transaction-generated information that could expose sensitive
relationships among individuals or businesses. If Company A sends a
digitally signed message to Company B, Company B must verify the digital
signature by connecting to a state-recognized privately-managed database,
verifying the digital signature and making sure that Company A's
certificate is not on a certificate revocation list. This process, of
course, will leave electronic footprints. Could the owner of the
recognized repository disclose the fact that A and B were corresponding?
What if A and B were discussing a possible merger, or other transaction
with significant consequences in the securities markets?  Similarly, could
the owner of the repository disclose to Joe Whistleblower's
defense-contractor employer that Whistleblower was verifying digital
signatures of a reporter from the New York Times? The Utah Act is totally
silent on this issue. 

Additionally, the public databases contemplated by the Act could expose
financial data, information about affiliations, and other private
information to public scrutiny -- and put this information into the direct
marketing universe. Publicly-accessible certificates will contain the name
of subscribers and a "recommended reliance limit," a dollar figure that
may be a good indication of general financial standing. Certificates may
also indicate an individual's affiliation with a company or other
organization. There is no provision for anonymous or pseudonymous
certificates. Proponents of the Utah Act point out that participation in
the system established by the Act is voluntary, and that non-licensed
certification authorities will be available for individuals who object to
the requirements of the Act. However, in light of the advantages the Act
gives to licensed certification authorities (liability limitations,
presumptions concerning the legality of digital signatures, and the like)
this may not in fact turn out to be true. Additionally, some individuals
may be forced to use certificates in the course of their employment. Would
an employee who did not want to be listed in an easily searchable database
(perhaps because they were being harassed) be forced to quit his or her
job? 


Finally, a very important privacy-related issue that is purposefully not
addressed in the Utah Act concerns whether the infrastructure contemplated
by the Act will support confidentiality of messages as well as legally
binding digital signatures (a technically feasible proposition, but a
politically sensitive one). The Utah Act empowers an administrative agency
to determine which public key encryption algorithms are appropriate. A
public key algorithm like RSA can be used both for encryption and digital
signatures. A public key algorithm like DSA (implemented in DSS) can only
be used for digital signatures -- it cannot be used to encrypt messages.
Should such a fundamental policy decision be made in the obscurity of an
administrative agency's rulemaking process? 

COSTS

The Utah Digital Signature Act also raises several issues relating to
costs. The institutional overhead associated with creating and maintaining
the Act's infrastructure will be passed along to participants, and
participants must have access to expensive computer hardware and software
in order to participate in the system. One issue not addressed by the Utah
Act is whether citizens who are unable to afford these costs should be
provided with subsidized or reduced-cost access to th infrastructure. A
prominent commentator has noted that, in the long term, the type of system
embodied in the Utah Act is "anticipated to become indispensable for
conducting government, business, and even private affairs." 

Another cost-related issue concerns the costs associated with legislative
endorsement of one particular technology (public-key encryption
technology, or more narrowly, specific implementations of this technology)
and whether this endorsement will affect the development of alternative
solutions to the problems posed by communications over open computer
networks. An advocate of a particular biometric technology has argued that
the type of infrastructure contemplated by the Utah Act is costly
overkill, and is far more complex and expensive than is necessary. Even if
one accepts the appropriateness of a public-key approach, note that costs
could vary widely depending upon which particular proprietary encryption
algorithms are licensed. 

As originally passed, the Utah Act limited the role of certification
authority to Utah-licensed attorneys, financial institutions, title
companies, and government agencies. This sort of oligopolistic arrangement
is, of course, anathema to a vibrant, competitive market which would drive
down costs for consumers. The pending amendments to the Utah Act eliminate
this requirement. Some of the states which are following the Utah Act as a
model have retained this limitation, however. 

CONCLUSION

Legislative activity concerning digital signatures is generally
appropriate and potentially helpful. The Utah Digital Signature Act,
particularly its provisions establishing the legal status of digital
signatures, is a step in the right direction. However, lawmakers
contemplating digital signature legislation should reconsider some of the
policy choices made by the Utah Act. 

-------------------------------------------------


Brad Biddle, Legal Intern <biddle@acusd.edu>
Privacy Rights Clearinghouse, Ctr for Public Interest Law
http://pwa.acusd.edu/~prc

[The views expressed in this article are not necessarily those of the 
Privacy Rights Clearinghouse or the Center for Public Interest Law.]








Thread