Examples of using To a data message in English and their translations into Arabic
{-}
-
Colloquial
-
Political
-
Ecclesiastic
-
Ecclesiastic
-
Computer
(1) Where, in relation to a data message,[a method][an electronic signature] is used which.
(1) Where the law requires a signature of a person,that requirement is met in relation to a data message if.
(1) With respect to a data message authenticated by means of a secure electronic signature, it is rebuttably presumed that.
(1) Where the law requires a signature of a person,that requirement is met in relation to a data message if.
(1) Where, in relation to a data message, an enhanced electronic signature is used, it is presumed that the data message is signed.
(1) Where the law requires a signature of a person,that requirement is met in relation to a data message if.
This Law applies to a data message as defined in paragraph(1) of article 2 where thedata message relates to international commerce.".
(c)‘Signature holder' means a person by whom, or on whose behalf,an enhanced electronic signature can be created and affixed to a data message.
When applied to a data message, those mathematical procedures operate a transformation of the message such that a person having the initial message and the originator ' s public key can accurately determine.
Where the law requires that a contract to which this Convention applies should be signed,that requirement is met in relation to a data message if.
Thus, according to paragraph 3(a), the necessary additions to a data message, such as endorsement and notarization, do not affect the originality of the data message, as long as the information contained in the message remains complete and unaltered.
(3) Where the law requires a signature of a person,that requirement is met in relation to a data message if an enhanced electronic signature is used.
(1) Where a rule of law requires a signature, or provides for certain consequences in the absence of a signature,that rule shall be satisfied in relation to a data message if.
(2) With respect to a data message authenticated by means of an electronic signature other than a secure electronic signature, nothing in these Rules affects existing legal or evidentiary rules regarding the burden of proving the authenticity and integrity of a data message or an electronic signature.
All but the first transfer would be fraudulent, however,if the paragraph was interpreted as referring to a data message or transfer of a unique kind.
(1) Where the law requires a signature of a person,that requirement is met in relation to a data message if a method is used which is as reliable as was appropriate for the purpose for which the data message was generated or communicated, in the light of all the circumstances, including any relevant agreement.
The handwritten signature would then be analyzed by the computer and stored as a set of numerical values,which could be appended to a data message and displayed by the relying party for authentication purposes.
(e) ASignature holder@ [device holder] [key holder][subscriber] [signature device holder][signer][signatory] means a person by whom, or on whose behalf,an enhanced electronic signature can be created and affixed to a data message;
The hand-written signature would then be analysed by the computer and stored as a set of numerical values,which could be appended to a data message and displayed by the relying party for authentication purposes.
Where the law requires a signature of a person,that requirement is met in relation to a data message if an electronic signature is used that is as reliable as was appropriate for the purpose for which the data message was generated or communicated, in the light of all the circumstances, including any relevant agreement.
Alternatively, it was suggested that, in order to reflect the idea that certificates might fulfil various functions,the definition would need to be amended to refer to a data message“which purports to verify the identity or other significant characteristic of a person”.
Variant B“(a)‘digital signature' means a numerical value,which is affixed to a data message and which, using a known mathematical procedure associated with the originator ' s private cryptographic key, makes it possible to determine that this numerical value has only been obtained with the originator ' s private key;
Where the law requires that a contract or any other communication, declaration, demand, notice or request that the parties are required to make or choose to make in connection with a contract should be signed, or provides consequences for the absence of a signature,that requirement is met in relation to a data message if.
(2) Where the law requires a signature of a person,that requirement is met in relation to a data message if an electronic signature is used which is as reliable as was appropriate for the purpose for which the data message was generated or communicated, in the light of all the circumstances, including any relevant agreement.
(1) Where, in relation to a data message,[an enhanced electronic signature is used][an electronic signature[a method]is used which provides a reliable assurance as to the integrity of the information from the time when it was first generated in its final form, as a data message or otherwise], it is presumed that the data message is an original.
(1) With respect to a data message authenticated by means of an electronic signature[other than a secure electronic signature], the electronic signature satisfies any legal requirement for a signature if the electronic signature is as reliable as appropriate for the purpose for which the electronic signature was used, in the light of all the circumstances, including any relevant agreement.
Where the law requires that a contract to which this Convention applies should be signed, or provides consequences for the absence of a signature,that requirement is met in relation to a data message if an electronic signature is used which is as reliable as was appropriate for the purpose for which the data message was generated or communicated, in the light of all the circumstances, including any relevant agreement.
(1) With respect to a data message authenticated by means of an electronic signature[other than a secure electronic signature], the electronic signature meets any requirement of law or evidence for a signature if the method used to apply the electronic signature is as reliable as was appropriate for the purpose for which the data message was generated or communicated, in the light of all the circumstances, including any relevant agreement.”.