Examples of using Electronic authentication in English and their translations into Russian
{-}
-
Official
-
Colloquial
Electronic Authentication.
Typologies of means of electronic authentication.
Electronic authentication legislation and regulation has taken many different forms at the international and domestic levels.
Annex B.2 Typologies of means of electronic authentication 19.
IV. Use of electronic authentication methods 8.
It should also not be discriminated merely because it is an electronic authentication method.
Typologies of electronic authentication methods 9.
Compatibility of the eTIR legal framework with national legal requirements:survey on electronic authentication methods.
Legal treatment of electronic authentication and signatures.
Several delegations stated that in addition to the electronic signature, any other form of electronic authentication should also be permitted.
OECD Recommendation on Electronic Authentication and OECD Guidance for Electronic Authentication(2007);
Promoting confidence in electronic commerce:legal issues on international use of electronic authentication and signature methods 2007.
Electronic authentication: updating the inventory of international trade and transport conventions and agreements, including references to“signature”,“writing” and“document”, Document TRADE/WP.4/R.1096.
Aspects for consideration of electronic authentication methods 10.
The Recommendation encourages efforts by OECD member States to establish compatible, technology-neutral approaches for effective domestic and cross-border electronic authentication of persons and entities.
Criteria for recognition of foreign electronic authentication and signature methods.
Nevertheless, a satisfactory solution to these issues, in an international context, would require,inter alia, a functioning system of cross-border recognition of electronic authentication methods.
Legal recognition of foreign electronic authentication and signature methods 137.
While much of the focus tended to be on the differing technological approaches, the impact of the methodology orbusiness model underlying the electronic authentication solution should not be underestimated.
A delegation had emphasized that, in addressing electronic authentication issues, the proposed convention should preserve the freedom of countries to adopt different approaches in domestic law.
In August 2004 the OECD published a report summarizing responses to asurvey of legal and policy frameworks for electronic authentication services and esignatures in OECD Member Countries.
The OECD has also developed a guidance document on electronic authentication to assist Member countries and non-Member economies in establishing oramending their approaches to electronic authentication with a view to facilitating cross-border authentication. .
Priority is, however, to be given to the review of the ECE Model Interchange Agreement, electronic authentication and other items, depending on the progress made.
The OECD provides a forum for exchange of views and developing consensus about specific policy and regulatory issues related to information and communications networks andtechnologies, including electronic authentication.
A list of considerations when choosing an electronic authentication method is proposed in Annex B.1.
Stringent requirements for electronic authentication and signature, in particular the imposition of a particular method or technology, may inadvertently cast doubt as to the validity and enforceability of a significant number of transactions that are entered into every day without the use of any particular kind of authentication or signature.
On 12 June 2007, the OECD Council adopted its Recommendation on Electronic Authentication and Guidance for Electronic authentication. .
Electronic Authentication- Defining electronic messages and their signatures: The Legal Rapporteurs noted that document TRADE/WP.4/R.1096 had initially focused on transport law and its scope should be broadened to include other international conventions dealing with definitions of writings, signatures and documents in the field of international trade law.
The electronic consignment note may also be authenticated by any other electronic authentication method permitted by the law of the State in which the electronic consignment note has been made out.
Recognizing the importance of all work items listed above,the Legal Rapporteurs mentioned that priority would be given to the review of the Model Interchange Agreement, electronic authentication as well as other items depending on progress made.