https://azsas07c0101.sas-eprints.cdl.cosector.com/deeslr/issue/feedDigital Evidence and Electronic Signature Law Review2022-10-10T15:08:35+00:00Stephen Masonstephenmason@stephenmason.co.ukOpen Journal Systems<p>The<em> Digital Evidence and Electronic Signature Law Review</em> brings articles, legal developments and case reports to academics, practitioners and the industry in relation to digital evidence and electronic signatures from across the world. The review also seeks to include reports on technical advances and book reviews, and is issued once a year, in October/November, although we publish articles throughout the year once they are accepted for publication.</p> <p>This freely available Open Access version of<em> Digital Evidence and Electronic Signature Law Review</em> has been developed by Stephen Mason with the Institute of Advanced Legal Studies (IALS), School of Advanced Study, University of London on the SAS Open Journals System.</p>https://azsas07c0101.sas-eprints.cdl.cosector.com/deeslr/article/view/5472Editorial2022-10-10T15:00:39+00:00Stephen Masonstephenmason@stephenmason.co.uk2022-10-10T15:00:39+00:00##submission.copyrightStatement##https://azsas07c0101.sas-eprints.cdl.cosector.com/deeslr/article/view/5391Revising the Saudi Electronic Transactions Law on E-Signatures2022-10-10T15:05:55+00:00Oways Kinsarastephenmason@stephenmason.co.uk<p>Acknowledging the ever-increasing significance of the Kingdom of Saudi Arabia in the global e-commerce market, this article critically examines the e-signature regime of the 2007 Saudi Electronic Transactions Law and its implementing regulation. In doing so, it considers the evolution of the European regime on e-signatures, from Directive 1999/93/EC to Regulation (EU) No 910/2014 (the eIDAS Regulation). The article primarily concludes that the Saudi legislature’s approach to e-signatures has been overly restrictive and calls for different, permissive and careful consideration.</p> <p> </p> <p><strong>Index words: </strong>Electronic signature, e-commerce, e-transactions, Saudi Arabia, European Union, eIDAS Regulation, comparative analysis.</p>2021-12-06T00:00:00+00:00##submission.copyrightStatement##https://azsas07c0101.sas-eprints.cdl.cosector.com/deeslr/article/view/5395Scandal at the Post Office2022-10-10T15:06:32+00:00Paul Marshallstephenmason@stephenmason.co.uk<p>The Post Office Horizon scandal in the United Kingdom, possibly the most extensive miscarriage of justice in English legal history, was caused by a number of interrelated factors. These include: the legal <em>presumption</em> that computers are reliable; the unwillingness and failure of judges to order appropriate and necessary disclosure of documents by the Post Office, where required to ensure fairness at trial; the unethical conduct by the board and management of the Post Office; failure by government – the Post Office’s owner, and questionable litigation strategies adopted by the Post Office’s lawyers.</p> <p><strong>Index words</strong>: Post Office; Horizon IT system; disclosure; discovery; electronic evidence; ethics; politics</p>2022-01-11T15:40:04+00:00##submission.copyrightStatement##https://azsas07c0101.sas-eprints.cdl.cosector.com/deeslr/article/view/5423Electronic Execution of Documents Interim Report2022-10-10T15:07:17+00:00Mark Kingstephenmason@stephenmason.co.uk<p>An Industry Working Group set up by a public appointments competition has recently produced <em>Electronic Execution of Documents Interim Report</em> via the Ministry of Justice. The Law Commission dealt with this issue in 2019 in <em>Electronic execution of documents</em> (Law Com No 386, HC2624) and it was suggested that uncertainties may have influenced the degree of confidence of users. The aim of this article is to provide a critical analysis of the Interim Report and its uncritical acceptance of the suggestion.</p> <p><strong>Index words</strong>: Ministry of Justice; England & Wales; electronic execution; electronic documents; electronic signatures; recommendations</p>2022-02-28T14:37:52+00:00##submission.copyrightStatement##https://azsas07c0101.sas-eprints.cdl.cosector.com/deeslr/article/view/5425The Post Office IT scandal – why IT audit is essential for effective corporate governance2022-10-10T15:07:44+00:00James Christiestephenmason@stephenmason.co.uk<p>The Post Office Horizon scandal is possibly the most serious corporate failure in the United Kingdom in living memory, and possibly for more than a century. This is because of its disastrous consequences for hundreds (perhaps thousands) of individuals who were wrongly prosecuted by the Post Office and who lost their livelihoods, and often their homes, on the basis of incomplete and misleading evidence from its Horizon computerized accounting system. That corporate failure has given rise to the most extensive miscarriage of justice in English legal history, with an unprecedented number of wrongful convictions now in the process of being reversed.The Post Office Horizon scandal had many features and causes, but a significant contributory failure was that of corporate governance. There were many warning signs over the years, which should have been acted upon by Post Office Internal Audit and in particular, by specialist IT auditors. The evidence is clear that the Post Office failed to live up to its commitment to corporate governance, and that this failure was neither detected nor acted upon by the government, if civil servants and ministers were aware of the failure, until too late. An effective IT audit function would have contributed significantly to a prevention of the scandal.</p> <p><strong>Index words</strong>:<strong> </strong>Post Office, Horizon, Fujitsu, IT audit, internal audit, corporate governance, Three Lines of Defence, Institute of Internal Auditors, IIA, AICPA, IAASB, SSAE 16, SSAE 18, ISAE 3402, SAS 70, ISAE 3000, SOC-1, SOC-2, SOC-3, Trust Services Criteria, processing integrity, Justice for Subpostmasters Alliance, Ernst & Young</p> <p> </p>2022-03-26T00:00:00+00:00##submission.copyrightStatement##https://azsas07c0101.sas-eprints.cdl.cosector.com/deeslr/article/view/5427Assigning IACS cybersecurity responsibility conformant with the UK Network and Information Systems Regulations 20182022-05-10T16:34:01+00:00Peter Bernard Ladkinstephenmason@stephenmason.co.ukMartyn Thomasstephenmason@stephenmason.co.uk<p><span class="TextRun SCXW91804407 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW91804407 BCX0">Industrial plants </span><span class="NormalTextRun SCXW91804407 BCX0">constituting</span><span class="NormalTextRun SCXW91804407 BCX0"> a society’s critical infrastructure, for example electricity-generation and water-supply, </span><span class="NormalTextRun SCXW91804407 BCX0">contain</span><span class="NormalTextRun SCXW91804407 BCX0"> industrial automation and control systems (IACS). IACS nowadays increasingly </span><span class="NormalTextRun SCXW91804407 BCX0">contain</span><span class="NormalTextRun SCXW91804407 BCX0"> many digital-electronic components whose </span><span class="NormalTextRun SpellingErrorV2Themed SCXW91804407 BCX0">behaviour</span><span class="NormalTextRun SCXW91804407 BCX0"> is software-controlled. Amongst engineered artifacts, software and thus software-controlled systems are particularly susceptible to functional weakness (‘bugs’ and ‘vulnerabilities’). Such weakness can be exploited by nefarious parties (‘hackers’) to disrupt the critical operation of the plant; a phenomenon called cyber-insecurity </span><span class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW91804407 BCX0">whose</span><span class="NormalTextRun SCXW91804407 BCX0"> contrary, cybersecurity, refers to the resistance of the plant to such </span><span class="NormalTextRun SCXW91804407 BCX0">exploitation</span><span class="NormalTextRun SCXW91804407 BCX0">. The UK Network and Information Systems Regulations 2018 </span><span class="NormalTextRun SCXW91804407 BCX0">SI</span><span class="NormalTextRun SCXW91804407 BCX0"> 2018 No. 506 (NIS Regulations) address the cybersecurity of systems within the critical infrastructure, </span><span class="NormalTextRun SCXW91804407 BCX0">establishing</span><span class="NormalTextRun SCXW91804407 BCX0"> response and reporting requirements for cybersecurity incidents. In January 2022, Her Majesty’s Government issued a call for comments on enhancing the NIS Regulations, following a 2020 review. We derive here detailed </span><span class="NormalTextRun SCXW91804407 BCX0">organisational</span><span class="NormalTextRun SCXW91804407 BCX0"> reporting and response requirements based on a computer-scientific understanding of the engineering issues, in an environment which includes a central vulnerability-reporting </span><span class="NormalTextRun SpellingErrorV2Themed SCXW91804407 BCX0">organisation</span><span class="NormalTextRun SCXW91804407 BCX0"> (ICS-CERT, now part of US CISA (CISA, no date), or cyber security incident response team (CSIRT)) as required under the NIS Regulations.</span></span><span class="EOP SCXW91804407 BCX0" data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </span></p> <p><span class="EOP SCXW91804407 BCX0" data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"><strong><span class="TextRun SCXW179404290 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW179404290 BCX0">Index words</span></span></strong><span class="TextRun SCXW179404290 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW179404290 BCX0">:</span></span> <span class="TextRun SCXW179404290 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW179404290 BCX0">IACS, </span><span class="NormalTextRun SCXW179404290 BCX0">ICS</span><span class="NormalTextRun SCXW179404290 BCX0">, cybersecurity, responsibility, safety, software, vulnerabilities, </span><span class="NormalTextRun SCXW179404290 BCX0">organisational</span><span class="NormalTextRun SCXW179404290 BCX0"> responsibility, duties, mandate.</span></span><span class="EOP SCXW179404290 BCX0" data-ccp-props="{"201341983":0,"335559739":160,"335559740":259}"> </span></span></p>2022-05-10T16:34:00+00:00##submission.copyrightStatement##https://azsas07c0101.sas-eprints.cdl.cosector.com/deeslr/article/view/5467Implementing the electronic signature law in Tanzania – successes, challenges, and prospects2022-10-10T15:08:35+00:00Ubena Johnstephenmason@stephenmason.co.uk<p><strong><span data-contrast="auto">Abstract</span></strong><span data-ccp-props="{"201341983":0,"335559739":160,"335559740":360}"> </span></p> <p><span data-contrast="auto">In a bid to implement the Electronic Transactions Act 2015, Tanzania initiated the adoption of a National Public Key infrastructure (PKI) framework. However, the plan has not been executed as expected because of certain gaps and ambiguities in the laws. This article examines the existing laws providing for the legal validity, admissibility and enforceability of electronic signatures especially using PKI; identifies the weaknesses of the existing laws and recommends new laws relevant to PKI that should be considered, and their rationale.</span><span data-ccp-props="{"201341983":0,"335559739":160,"335559740":360}"> </span></p> <p><strong><span data-contrast="auto">Index word</span></strong><span data-contrast="auto">s:</span><span data-contrast="auto"> Tanzania, electronic signature, PKI, cryptography, certification</span></p>2022-10-10T11:48:41+00:00##submission.copyrightStatement##https://azsas07c0101.sas-eprints.cdl.cosector.com/deeslr/article/view/5473Practitioner Note2022-10-10T15:01:33+00:00Árpád Gerédstephenmason@stephenmason.co.ukAlexandra Prodanstephenmason@stephenmason.co.uk<p><span data-contrast="auto">Árpád</span><span data-contrast="auto"> Geréd and Alexandra Prodan discuss a recent case regarding the use of electronic signatures in procurement between jurisdictions. The failure to understand such details when tendering between jurisdictions almost caused a public tender worth € 3 billion to fail.</span><span data-ccp-props="{"335559738":120,"335559739":120}"> </span></p> <p><strong><span data-contrast="auto">Index words</span></strong><span data-ccp-props="{"335559685":720,"335559738":120,"335559739":120}"><strong>:</strong> </span><span data-contrast="auto">Austria; Switzerland; signature procurement requirements; qualified electronic signature</span><span data-ccp-props="{"335559685":720,"335559738":120,"335559739":120}"> </span></p>2022-10-10T15:01:33+00:00##submission.copyrightStatement##https://azsas07c0101.sas-eprints.cdl.cosector.com/deeslr/article/view/5475Electronic signature law update2022-10-10T15:02:03+00:00Avukat Özgür Eralpstephenmason@stephenmason.co.uk<p><span data-contrast="none">Avukat</span><span data-contrast="none"> Özgür </span><span data-contrast="none">Eralp</span><span data-contrast="auto"> provides an up-date to the electronic signature laws of Turkey, setting out the full history of electronic signature legislation and recent legislative developments.</span><span data-ccp-props="{"335559738":120,"335559739":120}"> </span></p> <p><strong><span data-contrast="auto">Index words: </span></strong><span data-contrast="auto">Turkey; electronic signatures; legislation; update</span><span data-ccp-props="{"335559685":720,"335559738":120,"335559739":120}"> </span></p>2022-10-10T15:02:03+00:00##submission.copyrightStatement##https://azsas07c0101.sas-eprints.cdl.cosector.com/deeslr/article/view/5476Briefing Note2022-10-10T15:02:27+00:00Nicholas Bohmstephenmason@stephenmason.co.uk<p><strong><span data-contrast="auto">Abstract</span></strong><span data-ccp-props="{"335559685":720,"335559738":120,"335559739":120}"> </span></p> <p><span data-contrast="auto">The presumption that computers are reliable in England and Wales is proved to be wrong.</span><span data-ccp-props="{"335559685":720,"335559738":120,"335559739":120}"> <span class="TextRun SCXW17683652 BCX0" lang="EN-GB" xml:lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW17683652 BCX0">Nicholas Bohm, James Christie, Peter Bernard Ladkin, Bev Littlewood, Paul Marshall, Stephen Mason, Martin Newby, Steven J. Murdoch, Harold Thimbleby and Martyn Thomas CBE</span></span></span></p> <p><strong><span data-contrast="auto">Index words: </span></strong><span data-contrast="auto">England and Wales; presumption computers are reliable; proposal to rectify</span><span data-ccp-props="{"335559685":720,"335559738":120,"335559739":120}"> </span></p>2022-10-10T15:02:27+00:00##submission.copyrightStatement##https://azsas07c0101.sas-eprints.cdl.cosector.com/deeslr/article/view/5477Book Reports2022-10-10T15:02:59+00:00Stephen Masonstephenmason@stephenmason.co.uk<p>Book Reports</p>2022-10-10T15:02:59+00:00##submission.copyrightStatement##https://azsas07c0101.sas-eprints.cdl.cosector.com/deeslr/article/view/5478General Editors and Editorial Board2022-10-10T15:03:30+00:00Stephen Masonstephenmason@stephenmason.co.uk<p>General Editors and Editorial Board</p>2022-10-10T15:03:29+00:00##submission.copyrightStatement##https://azsas07c0101.sas-eprints.cdl.cosector.com/deeslr/article/view/5479PhD Research in process2022-10-10T15:03:51+00:00Stephen Masonstephenmason@stephenmason.co.uk<p>PhD Research in process</p>2022-10-10T15:03:51+00:00##submission.copyrightStatement##https://azsas07c0101.sas-eprints.cdl.cosector.com/deeslr/article/view/5480PhD Completed2022-10-10T15:04:14+00:00Stephen Masonstephenmason@stephenmason.co.uk<p>PhD Completed</p>2022-10-10T15:04:14+00:00##submission.copyrightStatement##https://azsas07c0101.sas-eprints.cdl.cosector.com/deeslr/article/view/5482Ismay Report2022-10-10T15:04:36+00:00Stephen Masonstephenmason@stephenmason.co.uk<p>Horizon – Response to Challenges Regarding Systems Integrity (Post Office Limited, 2 August 2010)</p>2022-10-10T15:04:36+00:00##submission.copyrightStatement##