Legal Significance of Electronic Messages and Documents
Abstract
This article discusses the features and legal nature of legally significant electronic messages and documents. In the recent period, when the main part of business correspondence is carried out via the Internet, there is a need to ensure the legal significance and demonstrative strength of electronic documents and messages, as long as such documentation contains critical information. The main purpose of the study is to determine the legal nature of legally significant electronic messages and to determine the possibility of accepting electronic documents as evidence in court. When writing the article, the methods of collecting and studying single facts were used; generalization methods; methods of scientific abstraction; methods of cognition of regularities. The study has concluded that legally significant electronic messages (documents) are written notifications, including letters, that contain information of any legal significance for recipients and/or senders, if this is provided for in the contract, by law, by custom, committed through the Internet information and telecommunications network – electronic correspondence (e-mail), instant messages (ICQ, Skype, Jabber, WhatsApp, etc.), electronic copies of paper documents, etc. with observance of legal procedures. As a result of the analysis, a definition is given, the main features of electronic documents are highlighted, and it is suggested to use in international conventions and agreements the presumption of equalization of paper documents and electronic documents if they are drawn up in compliance with the requirements of law, contract and business practices. The proposal is to secure the provision that the e-mail address should be recognized as a simple electronic signature, and correspondence (subject to other conditions) should be recognized as the admissible evidence in court, which will simplify and systematize law enforcement practice.
References
[2] Barker, R.M., Cobb, A.T., and Karcher, J. 2009. The Legal Implications of Electronic Document Retention: Changing the Rules. Business Horizons, 52(2), 177-186.
[3] Case, A., and Richard, G.G. 2017. Memory Forensics: The Path Forward. Digital Investigation, 20, 23-33.
[4] Cristani, M., Bertolaso, A., Scannapieco, S., and Tomazzoli, C. 2018. Future Paradigms of Automated Processing of Business Documents. International Journal of Information Management, 40, 67-75.
[5] Hartig, A.J. 2016. Conceptual Blending in Legal Writing: Linking Definitions to Facts. English for Specific Purposes, 42, 66-75.
[6] James, J.I., and Gladyshev, P. 2016. A Survey of Mutual Legal Assistance Involving Digital Evidence. Digital Investigation, 18, 23-32.
[7] Julià-Barceló, R. 1999. A New Legal Framework for Electronic Contracts: The EU Electronic Commerce Proposal. Computer Law and Security Review, 15(3), 147-158.
[8] Julià-Barceló, R., and Vinje, T.C. 1998. Another Step towards a European Framework for Electronic Signatures: The Commission's Directive Proposal. Computer Law and Security Review, 14(5), 303-313.
[9] Kao, C.H., and Liu, S.T. 2013. Development of a Document. Management System for Private Cloud Environment. Procedia – Social and Behavioral Sciences, 73, 424-429.
[10] Kearsley, A.J. 1999. Legal Admissibility of Evidence Held in Digital Form. Computer Law and Security Review, 15(3), 185-187.
[11] Kirillova, E.A., et al. 2017. Legally Significant Messages with Regard to the Development of the Internet. Revista Espacios, 38(48).
[12] Leng, T.K. 2014. E-Discovery of Electronically Stored Information in Commercial Litigation. Computer Law and Security Review, 30(2), 171-178.
[13] Lindner, R., and Riehm, U. 2009. Electronic Petitions and Institutional Modernization. International parliamentary E-Petition Systems in Comparative Perspective. JeDEM-eJournal of eDemocracy and Open Government, 1(1), 1-11.
[14] Mason, S. 2013. Electronic Banking and How Courts Approach the Evidence. Computer Law and Security Review, 29(2), 144-151.
[15] Mason, S. 2014. Electronic Evidence: A Proposal to Reform the Presumption of Reliability and Hearsay. Computer Law and Security Review, 30(1), 80-84.
[16] Parcu, P.L., and Silvestri, V. 2014. Electronic Communications Regulation in Europe: An Overview of Past and Future Problems. Utilities Policy, 31, 246-255.
[17] Shipley, T.G., and Bowker, A. 2014. Chapter 5: Documenting Online Evidence. In Investigating Internet Crimes: 99-129. Syngress.
[18] Smith, A., and Clarke, R. 2000. Privacy in Electronic Media: Identification, Authentication and Anonymity in a Legal Context. Computer Law and Security Review, 16(2), 95-100.
[19] Solon, M., and Harper, P. 2004. Preparing Evidence for Court. Digital Investigation, 1(4), 279-283.
[20] Tauber, A., Kustor, P., and Karning, B. 2013. Cross-Border Certified Electronic Mailing: A European Perspective. Computer Law and Security Review, 29(1), 28-39.
[21] Veselá, L., and Radiměřský, M. 2014. The Development of Electronic Document Exchange. Procedia Economics and Finance, 12, 743-751.
[22] Wilson, J. 1997. Electronic Document Management: Electronic Documents. Computer Law and Security Review, 13(2), 124-125.
[23] Yao, Y.H., Trappey, A.J.C., and Ho, P.C. 2003. XML-Based ISO9000 Electronic Document Management System. Robotics and Computer-Integrated Manufacturing, 19(4), 355-370.
The Copyright Transfer Form to ASERS Publishing (The Publisher)
This form refers to the manuscript, which an author(s) was accepted for publication and was signed by all the authors.
The undersigned Author(s) of the above-mentioned Paper here transfer any and all copyright-rights in and to The Paper to The Publisher. The Author(s) warrants that The Paper is based on their original work and that the undersigned has the power and authority to make and execute this assignment. It is the author's responsibility to obtain written permission to quote material that has been previously published in any form. The Publisher recognizes the retained rights noted below and grants to the above authors and employers for whom the work performed royalty-free permission to reuse their materials below. Authors may reuse all or portions of the above Paper in other works, excepting the publication of the paper in the same form. Authors may reproduce or authorize others to reproduce the above Paper for the Author's personal use or for internal company use, provided that the source and The Publisher copyright notice are mentioned, that the copies are not used in any way that implies The Publisher endorsement of a product or service of an employer, and that the copies are not offered for sale as such. Authors are permitted to grant third party requests for reprinting, republishing or other types of reuse. The Authors may make limited distribution of all or portions of the above Paper prior to publication if they inform The Publisher of the nature and extent of such limited distribution prior there to. Authors retain all proprietary rights in any process, procedure, or article of manufacture described in The Paper. This agreement becomes null and void if and only if the above paper is not accepted and published by The Publisher, or is with drawn by the author(s) before acceptance by the Publisher.