Information Rights Management & Electronic Signatures Under the Law

Information Rights Management and Electronic Signatures
Protecting Email Signatures

Can my email signature be forged? How about using an electronic signature on legally recognized documents? Both issues were recently presented to me by our senior equity partner at the law firm. My answers, yes & yes, but let me explain. It boils down to understanding Information Rights Management (IRM) and meeting the statutory requirements for using a legally recognized electronic signature.

Issue #1 Information Rights Management

When it comes to preventing email signatures from being altered, copied, or forwarded without authorization, an IRM policy must be implemented. Assuming we’re using an email client such as Outlook 2010 or newer, additional third party Microsoft credentials are required. Here’s how it works.

Information Rights Management (IRM) allows you to specify access permissions to email messages. IRM helps prevent sensitive information from being read, printed, forwarded, or copied by unauthorized people. After permission for a message is restricted by using IRM, the access and usage restrictions are enforced regardless of where the message goes, because the permissions to access an email message are stored in the message file itself.

IRM is generally implemented at the server level using Microsoft Exchange software. Alternatively, IRM is hosted on Microsoft servers by Microsoft for free, but requires a Microsoft Live ID (@hotmail.com email) to use. In order to utilize IRM internally, for example, a law firm would need one of the following: (1) running their own Microsoft Exchange server and managing it in-house, or (2) use a new or existing Microsoft Live ID (@hotmail.com ID) in conjunction with a firms existing hosted email to take advantage of IRM hosted for free on Microsoft servers. Clearly the latter is the most cost effective; however it would require several additional steps in sending an IRM equipped email.

Information rights management and electronic signatures
Legally Recognized Electronic Signatures

Issue #2 Using Electronic Signature

Here in Arizona, under Arizona Revised Statutes, an electronic signature is defined as an electronic process that is attached to or logically associated with a record that is executed or adopted by an individual with the intent to sign the record. A.R.S § 44-7002
Furthermore, a signature is considered secure if, at the time it was made, and applied through a security procedure it is; (1) unique to the person using it, (2) capable of verification (3) under the sole control of the person using it, and (4) linked to the electronic record to which it relates in such a manner that if the record were changed the electronic signature would be invalidated. A.R.S § 44-7003

Generally speaking, an electronic signature can be any electronic means of indicating that a person adopts the contents of an electronic message. However, under A.R.S. § 44-7003, to qualify as a secure electronic signature, the operative requirement is element (4), the necessity to have ones identity validated through a third-party security certificate service. Such services are seemingly analogous to credit reporting agencies however solely for electronic identity. Currently, there are seven credentialing services customarily used throughout the industry. Those seven services include ARX CoSign, Avoco secure2trust, ChosenSecurity, Comodo, GlobalSign, My Credential, and VeriSign.

If your firm decides to implement a secure electronic signature digital ID, it is recommended you use a platform you may already be using. For instance, at our firm, we use Norton for anti-virus protection. It just so happens Norton is who issues VeriSign electronic signatures. A yearly subscription is required however, with a digital ID, a possessor would not only be able to securely sign electronic documents, but also send digitally signed emails which, in and of itself, constitutes a secure verified document. The process is fairly simple; a YouTube video explaining the process can be viewed here.

Conclusion

In conclusion, to protect email signatures from alteration, unauthorized copying and forwarding, a law firm has the option to implement Microsoft IRM services through the use of Microsoft Live ID accounts in lieu of costly in-house Exchange server management. Furthermore, secure electronic signatures pursuant to A.R.S § 44-7031, can be achieved through the use of digital ID’s validated through third-party security certificate services.

37 thoughts on “Information Rights Management & Electronic Signatures Under the Law

  1. Traveling north from Ouarzazate, the Dades Valley, generally known as
    “The Valley of the Thousand Kasbahs,” features many beautiful painted, crenulated Kasbahs which are the stuff of fantasies made
    for great exploration to a family event adventure travel.

    In 1984, a portrait showing the issues of population in Imlil appeared inside the “Westview Press” by James Miller.
    Water Lilies are aquatic plants and serve as religious
    symbols in several cultures and symbolize fortune, peace and enlightenment.

  2. I just like the helpful info you provide to your articles. I’ll bookmark your blog and take a look at once more here frequently. I am somewhat certain I’ll be informed lots of new stuff right right here! Good luck for the next!

  3. I am extremely impressed with your writing skills as well as with the layout on your weblog. Is this a paid theme or did you modify it yourself? Either way keep up the excellent quality writing, it is rare to see a great blog like this one these days..

  4. When I originally commented I clicked the “Notify me when new comments are added” checkbox and now each time a comment is added I get four e-mails with the same comment. Is there any way you can remove people from that service? Thanks!

  5. I actually came right here from another page about showbox free download and considered I may as well look into this. I really like what I see thus now I am following you. Getting excited about checking out the blog all over again.

  6. Hey there! This is my very first reply on your website so I simply wanted to give a fast shout out and tell you I really enjoy reading through your blog posts. Can you suggest any other sites which go over affiliate marketing? I am likewise very hooked on this! Thanks for your time!

  7. Nice post. I understand some thing much more challenging on different blogs everyday. It will normally be stimulating to read content material from other writers and practice a little one thing from their store. I’d prefer to use some with the content material on my blog no matter whether you do not mind. Natually I’ll offer you a link in your net blog.

  8. Our LGV (Large Goods Vehicle) HGV training is based in East London, and our LGV/ HGV courses are taught by qualified DVSA LGV & HGV trainers. LGV was formerly known as HGV, where it used to be referred to as HGV Class 2 (now called LGV Category C) and HGV class 1 (Now called LGV Category C+E).

  9. I definitely adore your blog and find nearly all of your posts to be exactly what I’m searching for. Do you offer people to write information for you? I would not mind creating a piece of text about movies online or maybe on a number of the things you write about on this site. Nice blog!

  10. Hey there, I am so grateful I came across this webpage, I really discovered you by mistake, when I was searching on Bing for ethereum to bitcoin converter. Nonetheless I’m here right now and would simply love to say thanks a lot for a incredible article and the all round interesting website (I likewise like the theme/design), I don’t have sufficient time to look over it all at the moment however I have saved it and even added in the RSS feeds, so whenever I have enough time I’ll be returning to go through a great deal more. Please do keep up the amazing job.

  11. Pingback: Google
  12. Pingback: هاست
  13. Pingback: himedia

Leave a Reply