home *** CD-ROM | disk | FTP | other *** search
- Message-Id: <9111181449.AA19182@cert.sei.cmu.edu>
- Date: 18 Nov 91 09:07:00 EST
- From: "zmudzinski, thomas" <ZMUDZINSKIT@imo-uvax.dca.mil>
- Subject: In-Re: Legal Status of digital signatures [Risks 12.61]
-
-
- D E F E N S E I N F O R M A T I O N S Y S T E M S A G E N C Y
-
- Date: 18-Nov-1991 08:50 EST
- From: Thomas Zmudzinski
- ZMUDZINSKIT
- Dept: DNSO/DISM
- Tel No: 703 285 5459 (VON) 356
-
-
- Subject: In-Re: Legal Status of digital signatures [Risks 12.61]
-
- Precis: The U.S. Comptroller General has given a formal opinion
- (B-238449, Sbj: Electronic Contracting, dtd 19 Jun 91) that Federal
- Agencies can use Electronic Data Interchange (EDI) technologies to
- create valid contractual obligations consistent with current
- statutory and case law.
-
- Full text follows below.
-
- /z/
-
- Disclaimer: I am not a lawyer (my parents are married).
-
-
-
-
- <FF>
-
- United States General Accounting Office [Comptroller General]
-
- MEMORANDUM
-
- DATE: June 19, 1991
-
- TO: Assistant Director, AFMD/ASA - John C. Martin
-
- FROM: Assistant General Counsel, OCG/AFMD -
- Thomas H. Armstrong
-
-
- Subject: Electronic Contracting (B-238449)
-
- This responds to your request for our opinion regarding
- whether agencies can use Electronic Data Interchange (EDI)
- technologies to create valid contractual obligations that can
- be recorded consistent with 31 U.S.C. (s) 1501 (section 1501).
- For the reasons stated below, we conclude that they can.
-
- BACKGROUND
-
- EDI is the electronic exchange of business information between
- parties, usually via a computer, using an agreed upon format.
- EDI is being used to transmit shipping notices, invoices, bid
- requests, bid quotes and other messages. Electronic
- contracting is the use of EDI technologies to create
- contractual obligations. EDI allows the parties to examine
- the contract, usually on video monitors, but sometimes on
- paper facsimiles, store it electronically (for example on
- magnetic tapes, on discs or in special memory chips), and
- recall it from storage to review it on video monitors,
- reproduce it on paper or even mail it via electronic means.
- Using EDI technologies, it is possible for an agency to
- contract in a fraction of the time that it now takes. The
- "paperless" nature of the technology, however, has raised the
- question of whether electronic contracts constitute
- obligations which may be recorded against the government.
-
- DISCUSSION
-
- Section 1501 establishes the criteria for recording
- obligations against the government. The statute provides, in
- pertinent part, as follows:
-
- <FF>
-
- "(a) An amount shall be recorded as an obligation of
- the United States Government only when supported by
- documentary evidence of--
-
- (1) a binding agreement between an agency
- and another person (including an agency)
- that is--
-
- (A) in writing, in a way and
- form, and for a purpose
- authorized by law. . . ."
-
- 31 U.S.C. (s) 1501(a)(1)(A).
-
- Under this provision, two requirements must be satisfied:
- first, the agreement must bind both the agency and the party
- with whom the agency contracts; second, the agreement must be
- in writing.
-
- Binding Agreement
-
- The primary purpose of section 1501(a)(1) is "to require that
- there be an _offer_ and an _acceptance_ imposing liability on both
- parties." 39 Comp. Gen. 829,831 (1960) (emphasis in
- original). Hence the government may record an obligation
- under section 1501 only upon evidence that both parties to the
- contract willfully express the intent to be bound.
-
- A signature traditionally has provided such evidence.
- _See_ _generally_ 65 Comp. Gen. 806, 810 (1986). Because of its
- uniqueness, the handwritten signature is probably the most
- universally accepted evidence of an agreement to be bound by
- the terms of a contract. _See_ 65 Comp. Gen. at 810. Courts,
- however, have demonstrated a willingness to accept other
- notations, not necessarily written by hand. _See_, _e.g._,
- _Ohl_&_Co._v._Smith_Iron_Works_, 288 U.S. 170, 176 (1932)
- (initials); _Zacharie_v._Franklin_, 37 U.S. (12 Pet.) 151,
- 161-62 (1838) (a mark); _Benedict_v._Lebowitz_, 346 F.2d 120
- (2nd Cir. 1965) (typed name); _Tabas_v._Emergency_Fleet_
- _Corporation_, 9 F.2d 648, 649 (E.D. Penn. 1926) (typed, printed
- or stamped signatures); _Berryman_v._Childs_, 98 Neb. 450,
- 153 N.W. 486, 488 (1915) (a real estate brokerage used
- personalized listing contracts which had the names of its
- brokers printed on the bottom of the contract in the space
- where a handwritten signature usually appears).
-
- As early as 1951, we recognized that a signature does not have
- to be handwritten and that "any symbol adopted as one's
- signature when affixed with his knowledge and consent is a
- binding and legal signature." B-104590, Sept. 12, 1951.
- Under this theory, we approved the use of various signature
- machines ranging from rubber stamps to electronics encryption
-
- 2 B-238449
-
- <FF>
-
- devices. _See_ 33 Comp. Gen. 297 (1954); B-216035,
- Sept. 20, 1984. For example, we held that a certifying
- officer may adopt and use an electronic symbol generated by an
- electronic encryption device to sign vouchers certifying
- payments. B-216035, _supra_. The electronic symbol proposed
- for use by certifying officers, we concluded, embodied all of
- the attributes of a valid, acceptable signature: it was
- unique to the certifying official, capable of verification, and
- under his sole control such that one might presume from its
- use that the certifying officer, just as if had written his
- name in his own hand, intended to be bound.
-
- EDI technology offers other evidence of intent to be bound
- with the same attributes as a signature--for example, a
- "message authentication code," like that required by the
- National Institute of Standards and Technology (NIST) for the
- electronic transmission of data._1_/ In our opinion, this form
- of evidence is acceptable under section 1501.
-
- A message authentication code is a method designed to ensure
- the authenticity of the data transmitted; it is a series of
- characters that identifies the particular message being
- transmitted and accompanies no other message. As envisioned
- by NIST's Federal Information Processing Standard (FIPS)
- 113,_2_/ a message authentication code could be generated when
- the sender inserts something known as a "smart card"_3_/ into a
- system and inputs the data he wants to transmit. Encoded on a
- circuit chip located on the smart card is the sender's key.
-
- ____________________
-
- _1_/ The Congress has mandated that NIST (formerly the National
- Bureau of Standards) establish minimum acceptable practices
- for the security and privacy of sensitive information in
- federal computer systems. Computer Security Act of 1987,
- Pub. L. No. 100-235, (s) 2, 101 Stat. 1724 (1988).
-
- _2_/ FIPS 113 adopts American National Standards Institute
- (ANSI) standard X9.9 for message authentication. It outlines
- the criteria for the cryptographic authentication of
- electronically transmitted data and for the detection of
- inadvertent and/or intentional modifications of the data.
- By adopting the ANSI standard, FIPS 113 encourages private
- sector applications of cryptographic authentication; the same
- standard is being adopted by many financial institutions for
- authenticating financial transactions.
-
- _3_/ A smart card is the size of a credit card. It contains
- one or more integrated circuit chips which function as a
- computer.
-
- 3 B-238449
-
- <FF>
-
- The key is a secret sequence of numbers or characters which
- identifies the sender, and is constant regardless of the
- transmission. The message authentication code is a function
- of the sender's key and the data just loaded into the system.
- After loading his data into the system, the sender notifies
- the system that he wants to "sign" his transmission.
- The system sends the data first to the chip on the smart card;
- the chip then generates the message authentication code by
- applying a mathematical procedure known as a cryptographic
- algorithm. The card returns the data along with the just-
- generated message authentication code to the system, which
- will transmit the data and code to the recipient.
-
- When a contracting officer notifies the system that he wants
- to sign a contract being transmitted to a contractor, he is
- initiating the procedure for generating a message
- authentication code with the intention of binding his agency
- to the terms of the contract. The message authentication code
- evidences that intention, as would a handwritten or other form
- of signature. The code, incorporating the sender's key, is
- unique to the sender; and, the sender controls access to and
- use of his "smart card," where his key is stored. It is also
- verifiable. When the recipient receives the contract, either a
- notation identifying the message authentication code and the
- sender, usually by name. The recipient can verify its
- authenticity by putting the data that he just received into
- his system and asking his system to generate a message
- authentication code. That code should match the one
- annotating the message received._4_/
-
- Writing
-
- To constitute a valid obligation under section 1501(a)(1)(A),
- a contract must be supported by documentary evidence
- "in writing." Some have questioned whether EDI, because of
- the paperless nature of the technology, fulfills this
- requirement. We conclude that it does.
-
- Prior to the enactment of section 1501, in the Supplemental
- Appropriations Act of 1955,_5_/ the was no "clean cut
- definition of obligations." H.R. Rep. No. 2266, 83rd Cong.,
- 2d Sess. 50 (1954). Some agencies had recorded questionable
- obligations, including obligations based on oral contracts, in
-
- ____________________
-
- _4_/ For the sake of simplicity, this example does not describe
- the complicated system of controls used to ensure that no
- human knows the keys that are used to generate message
- authentication codes.
-
- _5_/ Pub. L. No. 663, 68 Stat. 800, 830 (1954)
-
- 4 B-238449
-
- <FF>
-
- order to avoid withdrawal and reversion of appropriate funds.
- _See_ 51 Comp. Gen. 631, 633 (1972). Section 1501 was enacted
- not to restrict agencies to paper and ink in the formation of
- contracts, but because, as one court noted, "Congress was
- by asserting oral contracts." _United_States_v._American_
- _Renaissance_Lines_, 494 F.2d 1059, 1062 (D.C. Cir.), _cert_.
- _denied_, 419 U.S. 1020 (1974). The purpose of section 1501 was
- to require that agencies submit evidence that affords a high
- degree of certainty and lessens the possibility of abuse.
- _See_ H.R. Rep. No. 2266 at 50.
-
- While "paper and ink" offers a substantial degree of
- integrity, it is not the only such evidence. Some courts,
- applying commercial law (and the Uniform Commercial Code in
- particular), have recognized audio tape recordings, for
- example, as sufficient to create contracts. _See_, _e.g._,
- _Ellis_Canning_Company_v._Bernstein_, 348 F. Supp. 1212
- (D. Colo. 1972). The court, citing a Colorado statute, stated
- that the tape recording of the terms of a contract is
- acceptable because it is a "reduc[tion] to tangible form."_6_/
- _Id_. at 1228. In a subsequent case, the United States Court of
- Appeals held that an audio tape recording of an agreement
- between the Gainesville City Commission and a real estate
- developer was sufficient to bind the Commission.
- _Londono_v._City_of_Gainesville_, 768 F.2d 1223 (11th Cir.
- 1985). The court held that the tape recording constituted a
- "signed writing." _Id_. at 1228.
-
- In our opinion, EDI technology, which allows the contract
- terms to be examined in human readable form, as on a monitor,
- stored on electronic media, recalled from storage and reviewed
- in human readable form, has an integrity that is greater than
- an audio tape recording and equal to that of a paper and ink
- contract. Just as with paper and ink, EDI technology provides
- a recitation of the precise terms of the contract and avoids
- the risk of error inherent in oral testimony which is based on
-
- ____________________
-
- _6_/ Some courts, interpreting the laws of other states, have
- held that a tape recording is not acceptable. _See_Roos_v._
- _Aloi_, 487 N.Y.S. 2d 637 (N.Y. Sup. Ct. 1985), _aff'd_,
- 489 N.Y.S. 2d 551 (N.Y. App. Div.); _Sonders_v._Roosevelt_,
- 476 N.Y.S. 2d 331 (N.Y. App. Div. 1984).
-
- 5 B-238449
-
- <FF>
-
- human memory._7_/ Indeed, courts, under an implied-in-fact
- contract theory, have enforced contracts on far less
- documentation than would be available for electronic
- contracts. _See_ _Clark_v._United_States_, 95 U.S. 539 (1877).
- _See_ _also_ _Narva_Harris_Construction_Corp._v._United_States_,
-
- For the purpose of interpreting federal statutes, "writing" is
- defined to include "printing and typewriting and _reproductions_
- _of_visual_symbols_ by photographing, multigraphing,
- mimeographing, manifolding, or _otherwise_." 1 U.S.C. (s) 1
- (emphasis added). Although the terms of contracts formed
- using EDI are stored in a different manner than those of paper
- and ink contracts, they ultimately take the form of
- visual symbols. We believe that it is sensible to interpret
- federal law in a manner to accommodate technological
- advancements unless the law by its own terms expressly
- precludes such an interpretation, or sound policy reasons
- exist to do otherwise. It is evident that EDI technology had
- not been conceived nor, probably, was even anticipated at the
- times section 1501 and the statutory definition of "writing"
- were enacted. Nevertheless, we believe that, given the
- legislative history of section 1501 and the expansive
- definition of writing, section 1501 and 1 U.S.C. (s) 1 encompass
- EDI technology.
-
- cc: Mr. F. Jackson
-
- ____________________
-
- _7_/ Of course, just as with any contact or other official
- document, an agency must take appropriate steps to ensure the
- security of the document, for example, to prevent fraudulent
- modification of the terms. Agencies should refer to NIST
- standards in this regard. _See_, _e.g._, FIPS 113 _supra_
- (regarding message authentication codes). In addition,
- agencies should refer to the GSA regulations regarding the
- maintenance of electronic records. _See_ 41 C.F.R. (s) 201-45.2.
-
- 6 B-238449
-
- <FF>
-
-
-
-