By Andrew J. Pincus, General Counsel,
U.S. Department of Commerce
President Bill Clinton and Vice President Al Gore, in issuing a Framework for Global Electronic Commerce in July 1997, noted that "many businesses and consumers are still wary of conducting extensive business over the Internet because of the lack of a predictable legal environment governing transactions." As part of the Clinton administration's efforts on e-commerce issues, President Clinton directed Commerce Secretary William Daley to "work with the private sector, state and local governments, and foreign governments to support the development, both domestically and internationally, of a uniform commercial legal framework that recognizes, facilitates, and enforces electronic transactions worldwide."
The Framework identified several key principles to guide the drafting of applicable legal rules in this area:
Parties should be free to order the contractual relationship between themselves as they see fit.
Rules should be technology-neutral (i.e., they should neither require nor assume a particular technology) and forward looking (i.e., they should not hinder the use or development of technology in the future).
Existing rules should be modified and new rules should be adopted only as necessary or substantially desirable to support the use of electronic technologies.
The process should involve the high-tech commercial sector as well as businesses that have not yet moved online.
Based on these key principles, and in light of extensive study and experience on these issues, the administration has identified four basic steps that every country can take to ensure that its commercial legal framework is ready for global electronic transactions. Most governments are interested in taking these steps because they facilitate the participation of domestic industries in cross-border electronic transactions. Moreover, the widespread adoption of these four basic elements into domestic law will help establish a uniform and global commercial legal framework that promotes electronic transactions.
STEP 1: ELIMINATE PAPER-BASED LEGAL BARRIERS TO ELECTRONIC TRANSACTIONS BY IMPLEMENTING RELEVANT PROVISIONS OF THE 1996 UNCITRAL MODEL LAW
In 1996, the United Nations Commission on International Trade Law (UNCITRAL) adopted a Model Law on Electronic Commerce. The Model Law reflects a broad international consensus that communication of legally significant data in electronic form is often hindered by legal obstacles to the use of such data or by uncertainty as to their legal effect or validity. For example, many legal systems have requirements for "writings," "originals," and other similar paper documentation. To the extent that these requirements cannot, or might not, be satisfied by electronic records and documentation, they are real obstacles to the growth of electronic transactions and are referred to as "paper-based legal barriers" to electronic commerce. The enabling provisions of the Model Law, especially Articles 5 through 11, contain guidance for revising these paper-based legal barriers to commercial electronic transactions.
In the United States, the legal rules governing contracts and commercial transactions have traditionally been established by the state governments, working through an organization of legal experts called the National Conference of Commissioners on Uniform State Laws (NCCUSL). In July 1999, NCCUSL approved the Uniform Electronic Transactions Act (UETA) and sent it to the state governments for adoption. This measure, the product of several years' consideration by NCCUSL, builds on the international consensus established by the Model Law and contains specific provisions that the states can use to remove paper-based barriers to electronic transactions. UETA can serve as a strong model for any country seeking to implement the enabling provisions in the Model Law.
There are at least several noteworthy features of the UETA. First, it is a minimalist law that provides for the legal recognition of electronic records, electronic signatures, and other electronic documentation, but does not establish any benefits for certain kinds of technologies or methods. As a result of this and other factors, the UETA will likely remain a flexible, durable and appropriate framework for electronic transactions for a significant period of time.
Also, because of public policy reasons, NCCUSL decided that the UETA should not apply to wills, trusts, and other similar documents. Further, NCCUSL included a provision in the UETA that encourages states to consider whether to exclude other laws that bear on important public policy issues, such as laws relating to real estate transactions, powers of attorney (including durable and health care powers of attorney), and certain consumer protection requirements. These provisions demonstrate that governments should revise paper-based barriers in a careful and deliberate manner, so as to avoid creating any unintended public policy and consumer protection problems.
Enactment of UETA by all 50 U.S. states will take several years under the most optimistic projections. In order to eliminate uncertainty about the legal status of electronic transactions during that period, the administration has supported federal legislation that would ensure the legal enforceability of contracts and signatures in electronic form. A similar measure passed by the House of Representatives contains, in addition, provisions permitting parties to a transaction to provide legally required notices and disclosures in electronic form and to satisfy record keeping requirements with electronic records. The administration believes that it is important to revise laws requiring paper documents so that they do not prevent transactions from moving online, but that these revisions must ensure equivalent protection of the public interest in the online environment. The administration is working with Congress to craft legislation that meets that test.
STEP 2: REAFFIRM THE RIGHTS OF PARTIES TO DETERMINE APPROPRIATE TECHNOLOGICAL MEANS OF AUTHENTICATING THEIR TRANSACTIONS
The remaining three steps that a country can take to prepare its commercial legal framework for electronic transactions relate primarily to the issue of electronic authentication. Electronic authentication refers to the means by which a party to an electronic transaction can indicate his or her agreement to the terms of the contract, evidence his identity, and/or perform related functions.
There is a variety of electronic authentication techniques available and in use today. For example, a party could type his name at the end of an e-mail message containing the terms of the agreement. He could end a message with a previously agreed code-word or with an electronic facsimile of his written signature created by his personal use of an electronic stylus. He might also "sign" the message using some digital signature technology or some biometric technology. These authentication models and methods are evolving rapidly, and further methods will doubtless be created.
Actual Business Practices: When electronic commerce was first beginning, some observers imagined a world in which everyone would have a unique digital identifier in a universally recognized format that would be used to authenticate his or her electronic transactions. Each person could surf the Internet and enter into transactions with anyone he encountered, confident that the other party's digital identifier provided a legally valid means of identifying that party in the event the transaction ended up in court. Although the future may see both the market and the infrastructure necessary for this kind of comprehensive, real-time authentication system, such a system does not exist now and will not likely be in operation very soon.
Instead, most electronic authentication today occurs in "closed systems." These are arrangements in which parties are already related to each other in some way, and they conduct electronic transactions under a mutually agreed authentication system. Sophisticated versions of this model are found in sectors ranging from manufacturing to banking and financial services, where commercial parties establish the technological approach they will rely on as well as their rules for operating, assigning risk, and settling disputes. In the manufacturing sector, for example, the three major U.S. auto makers are developing a global system to tie product development to more than 15,000 suppliers operating around the world.
Two Different Legal Models: At least two different legal models regarding electronic authentication are developing internationally. The first, represented by the UETA and the UNCITRAL Model Law, eliminates barriers to electronic agreements and electronic signatures without granting special legal status to any particular type of authentication.
The second model involves a greater degree of government regulation. Under that model, a government creates a preference for one or more particular types of electronic authentication by establishing specific technical requirements for electronic signatures -- often providing a legal presumption that electronic contracts signed using the stated methodology are binding. Our experience has been that it is unnecessary to enact these detailed laws, since most authentication is conducted in closed systems. Moreover, it can even be harmful to enact these laws if they create doubt as to the legal validity and acceptability of closed systems that operate using different technologies or methods.
The Critical Step -- Recognize and Enforce Closed Systems: Given the dominance of closed systems in the global market today, a critical step governments should take at this time to unlock cross-border transactions is simply to ensure that their commercial legal frameworks will recognize and enforce closed systems. Countries that adopt minimalist laws similar to the UETA most likely will not need to adopt separate, additional provisions to accomplish this task. In contrast, countries that adopt detailed laws conferring legal benefits on certain methods should enact separate provisions that expressly recognize and enforce closed systems. Otherwise, those detailed laws might create doubt as to the validity of any closed systems which do not operate using the particular method established in the law.
STEP 3: ENSURE ANY PARTY THE OPPORTUNITY TO DEFEND AN AUTHENTICATION SYSTEM IN COURT
Many jurisdictions have rules governing the admission of evidence into court. These are often entirely separate sets of rules from those governing the formation and validity of contracts. It is important for countries to review these evidentiary rules to ensure that a party to a closed system has the opportunity to prove in court that his or her closed system actually created a legally binding agreement. Otherwise, even if the system is valid under general contract law, it might as a practical matter be ineffective since it could be "barred at the courthouse door."
STEP 4: TREAT TECHNOLOGIES AND PROVIDERS OF AUTHENTICATION SERVICES FROM OTHER COUNTRIES IN A NONDISCRIMINATORY MANNER.
Most countries would agree that legal regimes governing electronic authentication should not discriminate against or among foreign authentication service providers. For countries that adopt a minimalist framework along the lines of the UETA and the Model Law, this likely will not be an issue. On the other hand, countries that adopt detailed laws need to be careful to avoid structuring legal regimes that favor domestic or certain foreign service suppliers. Among other things, such laws could have the unintended effect of preventing domestic users of authentication from participating fully in cross-border transactions.
INTERNATIONAL SUPPORT FOR THESE PRINCIPLES
The approach articulated in this article has been adopted and approved in a variety of multilateral and bilateral contexts. In October 1998, the ministers of the Organization for Economic Cooperation and Development approved a Declaration on Authentication for Electronic Commerce affirming these principles. Further, the Global Business Dialogue on Electronic Commerce (GBDe), a global private sector initiative, recently issued a recommendation to governments that strongly embraces this approach. In addition, the administration entered joint statements affirming these principles with several important trading partners, including France, Japan, Korea, Ireland, Australia, Chile, Egypt, and the United Kingdom.
The approach outlined in this article represents the best means forward for unlocking commercial legal barriers to global electronic transactions, and we look forward to continuing to work with all countries to develop and implement a uniform commercial legal framework that recognizes, facilitates, and enforces global electronic transactions.