Skip to main content
Log in

Croatia’s computer laws: promotion of growth in E-commerce via greater cyber-security

  • Published:
European Journal of Law and Economics Aims and scope Submit manuscript

Abstract

Croatia’s Electronic Signature Act (“ESA”) was enacted in 2002. The ESA is third-generation and provides for legal recognition of all types of E-signatures, but gives preferred status to the digital signature. The ESA provides for regulation of Certification Authorities (“CA”), who may voluntarily elect to become accredited if they are able to comply with stringent financial and technical requirements. The principal duties of CA’s are to: issue certificates to successful applicants; confirm the authenticity and integrity of E-signatures to relying third parties; maintain a repository of certificates which may be accessed by the public; and cancel a certificate if any information contained therein is discovered to be inaccurate. The ESA covers legal liability of CA’s and punitive measures which may be taken against them if they violate the ESA. The Electronic Document Act (“EDA”) was enacted in 2005. The EDA specifies how an E-document can be used to comply with a statutory requirement for production of a paper document or an original document. The EDA also creates a legal presumption of admissibility of evidence in electronic form, and contains rules pertinent to assumed time/place of transmission/receipt of an E-message. The EDA covers liability of Internet service providers and specifies several computer crimes. The Electronic Commerce Act (“ECA”) was enacted in 2003. The ECA provides for basic E-contract rules, basic regulation of E-commerce sellers, and basic consumer protections of E-commerce buyers. Although it was a satisfactory first-step, the ECA needs to be fine-tuned with the following modifications: (1) add E-contract attribution rules; (2) improve the E-contract acknowledgement-of-receipt rules; (3) add E-contract rules for carriage contracts; (4) strengthen the consumer protections of E-commerce buyers; (5) establish information technology courts for resolution of E-commerce disputes; (6) add cybersuite provisions; and (7) add explicit long-arm jurisdiction over foreign E-commerce sellers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. U.S. Central Intelligence Agency (“CIA”), THE WORLD FACTBOOK, “Croatia,” 20 March 2008, p. 1; http://www.cia.gov/library/publications/the-world-factbook/print/hr.html.

  2. Id. at 5–6.

  3. Id. at 6.

  4. Id. at 7.

  5. Id. at 6.

  6. Id. at 10.

  7. Id. at 6, and note 79 infra.

  8. Id. at 8.

  9. Id. at 2 and 8.

  10. See United States of America (1998).

  11. Smedinghoff (1999).

  12. European Union, E-SIGNATURES DIRECTIVE, note 80 infra, art. 2(1). Under Croatian law, an electronic signature is defined as “a set of data in electronic form which are associated or logically connected with other data in electronic form and which serve to identify the signatory and the authenticity of the signed electronic document.” ESA, note 140 infra, art. 2(1). An electronic document is defined in Croatia as “a complete set of data which is electronically generated, sent, received or stored on electronic, magnetic, optical or other media”. The content of an electronic document shall encompass all forms of written or other text, data, images and drawings, maps, sound, music, speech and computer databases. ESA, note 140 infra, art. 2(4).

  13. Tang (1999).

  14. Dessent (2002).

  15. Stern (2001).

  16. Id.

  17. In the highly successful Hong Kong Identity Card, the two thumb prints are used as a biometric identifier. See Rina (2003).

  18. Note 15 supra at 395–96; and CYBER-SIGN.

  19. Id.

  20. Pun et al. (2002).

  21. Id. at 257.

  22. Id. However, one of the experts in computer law and technology—Benjamin Wright—is a notable exception. Wright contends that biometrics is a more preferable authentication method in the case of the general public, although he concedes that digital signatures using PKI (covered infra) are preferable for complex financial deals carried out by sophisticated persons. In PKI, control of the person’s “private key” becomes all-important. The person must protect the private key; all of the “eggs” are placed in that one basket, and the person carries a great deal of responsibility and risk. With biometric methods, the member of the general public would be sharing the risk with other parties involved in the transaction, and the need to protect the “private key” is not so compelling. See Wright (2001).

  23. Note 17 supra.

  24. The Hong Kong E-commerce law typically defines a digital signature as follows: “an electronic signature of the signer generated by the transformation of the electronic record using an asymmetric cryptosystem and a hash function such that a person having the initial untransformed electronic record and the signer’s public key can determine: (a) whether the transformation was generated using the private key that corresponds to the signer’s public key; and (b) whether the initial electronic record has been altered since the transformation was generated.” Hong Kong Special Autonomous Region (2000).

  25. Note 11 supra at 146.

  26. Poggi (2000).

  27. Fischer (2001).

  28. Under Croatian law, the private key is considered to be part of the “electronic signature development data,” which is defined as “the unique data, such as the codes or the private encryption key which the signatory uses to generate the electronic signature.” ESA, Note 140 infra, art. 2(5).

  29. American Bar Association (2001). Under Croatian law, the sender is the person signing the electronic document; that person is labeled a “signatory.” A signatory is defined as “a person who possesses the means to generate the electronic signature and to sign therewith, and who acts either on his or her own behalf or on behalf of the natural or legal person that he or she represents.” ESA, Note 140 infra, art. 2(3).

  30. Under Croatian law, the public key is considered to be one of the “signature verification data,” defined as “data such as codes or public encryption keys which are used for the purpose of verifying electronic signatures.” ESA, Note 140 infra, art. 2(8).

  31. Note 13 supra at 305.

  32. Note 26 supra at 249.

  33. American Bar Association, Section of Science & Technology, Information Security Committee (1995, 1996).

  34. Zaremba (2003).

  35. Note 26 supra at 250.

  36. Id.

  37. Note 26 supra at 243.

  38. Note 26 supra at 252.

  39. Note 26 supra at 253.

  40. Under Croatian law, a certificate is defined as a “confirmation in electronic form which links the data for authentication of the electronic signature with a specific person and confirms the identity of such person.” ESA, note 140 infra, art. 2(10).

  41. Under Croatian law, a CA is defined as “a legal or natural person who issues certificates or provides other services pertaining to electronic signatures.” ESA, note 140 infra, art. 2(12). CA, the term used in Croatia and in this article, is used in most of the world’s jurisdictions with the exception of the European Union, which uses “certification service provider.” ESD, note 140 infra, art. 3.

  42. Note 26 supra at 253.

  43. Hogan (2000).

  44. Froomkin (1996).

  45. Note 43 supra at 425–426.

  46. Note 11 supra at 149.

  47. Note 11 supra at 150.

  48. Note 43 supra at 426–427.

  49. Osty and Pulcanio (1999).

  50. See Berman (2001); and Maurushat (2005) arguing that multi-lateral recognition of CA’s among China, Hong Kong and Singapore should only occur after their PKI legislation has been harmonized and each of them provides sufficient privacy protections for personal data.

  51. Hallerman (1999).

  52. State of Utah (1999).

  53. Id.

  54. Blythe (2006a).

  55. Blythe (2008).

  56. Note 27 supra at 234–237.

  57. It is debatable as to whether technological-neutrality or technological-specificity is the correct road to take. See Roland (2001).

  58. For concise coverage of American and British law, see Blythe (2005a).

  59. Note 27 supra at 234–237.

  60. United Nations (1996). See Blythe, Note 58 supra.

  61. Republic of Singapore (1998). Although granting legal recognition to most types of electronic signatures, the Singapore statute implicitly makes a strong suggestion to users—in two ways—that they should use the digital signature because it is more reliable and more secure than the other types of electronic signatures: (1) digital signatures are given more respect under rules of evidence in a court of law than other forms of electronic signatures, and electronic documents signed with them carry a legal presumption of reliability and security—these presumptions are not given to other forms of electronic signatures; and (2) although all forms of electronic signatures are allowed to be used in Singapore, its electronic signature law established comprehensive rules for the licensing and regulation of Certification Authorities, whose critical role is to verify the of authenticity and integrity of electronic messages affixed to electronic signatures. Id. See Blythe (2007a).

  62. Blythe (2007b).

  63. Blythe (2007c).

  64. Note 32 supra at 234–37.

  65. Blythe (2007d).

  66. Blythe (2007e).

  67. Note 17 supra. See Blythe, Note 63 supra.

  68. Before amending its original digital signature law, Hong Kong only recognized digital signatures and was therefore a member of the First Wave. After amendments were made, Hong Kong joined the Third Wave. See Blythe (2005b).

  69. Blythe (2007f).

  70. Blythe (2006b).

  71. Blythe (2006c).

  72. Blythe (2007g).

  73. Blythe (2006d).

  74. Blythe (2006e).

  75. Blythe (2006f).

  76. Blythe (2006g).

  77. Blythe (2006h).

  78. Wikipedia. “European Union—Member States”.

  79. For general information about the European Union, see U.S. Central Intelligence Agency (“CIA”), THE WORLD FACTBOOK, “European Union,” 20 March 2008; https://www.cia.gov/library/publications/the-world-factbook/geos/ee.html.

  80. European Union (1999).

  81. ESD art. 1.

  82. ESD preamble 17 and art. 1.

  83. It is: “data in electronic form which are attached to or logically associated with other electronic data and which serve as a method of authentication.” ESD art. 2(1).

  84. It is an E-signature which complies with these requirements: “(a) it is uniquely linked to the signatory; (b) it is capable of identifying the signatory; (c) it is created using means that the signatory can maintain under his sole control; and (d) it is linked to the data to which it relates in such a manner that any subsequent change of the data is detectable.” ESD art. 2(2).

  85. It is: “an entity or a legal or natural person who issues certificates or provides other services related to electronic signatures.” ESD art. 2(11). “Other services” include: registration services; time-stamping services; directory services; computing services; and consultancy services pertinent to E-signatures. ESD preamble 9.

  86. It is: “an electronic attestation which links signature-verification data to a person and confirms the identity of that person.” ESD art. 2(9). Furthermore, a “qualified” certificate is one which meets more stringent requirements and which has been issued by a CSP with greater qualifications. ESD art. 2(10).

  87. ESD art. 5(1)(a).

  88. ESD art. 5(1)(b).

  89. ESD art. 5(2). Accordingly, even a simple, non-advanced E-signature (e.g., a signed E-mail) is admissible evidence in the European Union. See Arias (2007).

  90. As previously mentioned in note 41, the Croatian ESA uses the term “certification authority” instead of certification service provider. However, a CA and a CSP perform equivalent duties.

  91. ESD art. 3(1). However, a Member State may adopt a voluntary accreditation program in order to recognize those CSP’s with greater qualifications who are able to provide a higher standard of service. ESD art. 3(2). If adopted, such programs must be “objective, transparent, proportionate and non-discriminatory.” Id. The number of accredited CSP’s may not be limited. Id.

  92. ESD preamble 12.

  93. ESD art. 3(3). A qualified certificate must contain: designation of qualified status; name of CSP and State of creation; advanced E-signature of the CSP; name of subscriber (or pseudonym); a specific attribute of the subscriber, if essential to carry out the purpose of the certificate; a public key which corresponds to the private key; period of validity; identification number; and any limitations on purpose or value. ESD Annex I.

  94. Those qualifications are: reliability; maintenance of a secure directory and revocation service; ability to record the date and hour of issuance and revocation of a certificate; ability to confirm the identity and any special attributes of the subscriber; employ personnel with sufficient knowledge, experience and skill; possess and use trustworthy and secure computer systems and products; ability to guard against forgery of certificates and compromise of security of signature creation data; possession of sufficient financial resources and liability insurance; ability to securely store certificate-related information for the required period of time; prevention of retention or copying of signature creation data; and ability to provide written information to the subscriber before entering into a contract with him. ESD Annex II.

  95. A secure signature-creation device must utilize a technology and procedures which ensure: the data contained therein is reasonably secure and can be used only once; the data cannot be mathematically derived; the data can be protected by the subscriber from use by others; and the data will not be modified or given to the subscriber before the desired date of execution. ESD Annex III. Determination of the standards for these devices must be developed by “appropriate public or private bodies designated by Member States.” ESD art. 3(4). The standards developed in each Member State must be recogized in all Member States. Id.

  96. Measures should be taken to ensure that: the data used to verify are the same as those displayed to the verifier; the E-signature is confirmed and that fact is indicated; the verifier can determine the contents of the data which is signed; there is a confirmation of the authenticity and validity of the certificate at the time the E-signature is verified; there is proper display of the verification and the subscriber’s name (or pseudonym, if any); and any changes to the data are detectable. ESD Annex IV. Member States are charged to work with the EU Commission to develop and use secure signature-verification devices. ESD art. 3(6).

  97. ESD art. 4(1).

  98. ESD art. 6(1). A CSP may also be liable for a relying third party’s damages caused by the CSP’s failure to give proper notice that a certificate has been revoked. ESD art. 6(2). However, a CSP may avoid liability if: he is able to prove he was not negligent; or the certificate’s express limitations on purpose or value of the transaction have not been complied with. ESD art. 6(1), 6(3) and 6(4).

  99. ESD art. 8.

  100. ESD art. 7(1). In order to promote legal recognition of E-signatures generated outside the EU, the EU Commission will make proposals for implementation of standards and international agreements pertinent to certification services. ESD art. 7(2). If the EU Community encounters problems with market access in non-EU nations, the EU Commission may make proposals for negotiation of comparable rights for EU Member States in those nations. ESD art. 7(3).

  101. ESD art. 9. If a Member State has met these standards, it may presume it has complied with standards mentioned in ESD Annex II(f) and Annex III. ESD art. 3(5).

  102. ESD art. 10. E-signature products in compliance with the ESD’s requirements must be allowed to circulate freely within the EU. ESD art. 4(2).

  103. ESD art. 3(7). Any additional requirements must be “objective, transparenent, proportionate and non-discriminatory,” and must not be an impediment to “cross-border services for citizens.” Id.

  104. ESD preamble 19.

  105. ESD art. 11.

  106. ESD art. 13(1).

  107. ESD art. 12.

  108. European Union (2000).

  109. ECD art. 1(1).

  110. ECD art. 1(2).

  111. ECD preamble 11, 12, and 16; ECD art. 1(3)–(6).

  112. These are defined as “services within the meaning of Article 1(2) of Directive 98/34/EC as amended by Directive 98/48/EC.” ECD art. 2(a).

  113. A service provider is defined as “any natural or legal person providing an information society service.” ECD art. 2(b). However, the ECD distinguishes an ordinary service provider from an established service provider, defined as “a service provider who effectively pursues an economic activity using a fixed establishment for an indefinite period.” The mere possession of the technical ability and technology necessary for provision of the service do not constitute establishment. ECD art. 2(c).

  114. This is defined as “any natural or legal person who, for professional ends or otherwise, uses an information society service, in particular for the purposes of seeking information or making it accessible.” ECD art. 2(d).

  115. This is defined as “any natural person who is acting for purposes which are outside his or her trade, business or profession.” ECD art. 2(e).

  116. ECD art. 2(h). The coordinated field encompasses: service providers’ qualification requirements which are a prerequisite to commencement of E-commerce activities; and rules regarding quality of service, E-contracts, advertising, and service providers’ liability. ECD art. 2(h)(i). However, the coordinated field does not include: requirements concerning specific types of goods; delivery of goods; and rules concerning services provided non-electronically. ECD art. 2(h)(ii).

  117. ECD art. 3(1).

  118. ECD art. 3(2). However, a Member State does have the right to restrict activities of other Member States’ service providers if this is necessary for: criminal law enforcement (especially laws pertinent to protection of minors, hate crimes, and protection of human dignity) maintenance of public health; national security and defense; and consumer protection (including investors). Before restriction is begun, the affected Member State must ask the other Member State (the one in which the service provider is established) to take action, and of its intention to restrict; if the other Member State refuses to take action, or takes inadequate action, the affected Member State may proceed with restriction, and the Commission must be informed. ECD art. 3(4). In an emergency, the affected Member State may restrict before giving notice to the other Member State and to the Commission, but they must be informed as soon as practicable of the action taken and the justification for it. ECD art. 3(5). Whereupon, the Commission will hold an inquiry as to the suitability of the affected Member State’s action; if found to be “incompatible with Community law,” the Commission will request the affected Member State from carrying out the restriction, or ending it expeditiously. ECD art. 3(6).

  119. ECD preamble 10 and art. 3(3). Those situations are: copyright; neighbouring rights; rights referred to in Directive 87/54/EEC and Directive 96/9/EC; industrial property rights; electronic money as referenced in art. 8(1) of Directive 2000/46/EC; article 44(2) of Directive 85/611/EEC; art. 30 and Title IV of Directive 92/49/EEC; Title IV of Directive 92/96/EEC; art. 7 and 8 of Directive 88/357/EEC; art. 4 of Directive 90/619/EEC; the freedom of contracting parties to choose the controlling law; contract rights pertient to consumer contacts; the validity of contracts which create or transfer rights in real estate where those contracts must comply with the law of the Member State in which the real estate is located; and the issue of whether unsolicited E-mail advertising is permitted. ECD Annex.

  120. ECD art. 4(1). However, this is inapplicable to authorization rules which: are applied to all businesses (including those not engaged in E-commerce activities); or are applied pursuant to Directive 97/13/EC (relating to licenses of telecommunications services). ECD art. 4(2).

  121. ECD art. 5(1). The information is: name, address and contact information (including E-mail address) of service provider; name of trade register in which service provider is listed, and the trade register identification number (if applicable); the supervisory authority; professional license or designation, name of professional regulatory body, and reference to professional rules (if applicable); value-added-tax identification number (if applicable); and prices of services (and whether the price is inclusive of delivery expenses). ECD art. 5(1)–(2).

  122. ECD art. 6. The information is: designation that it is a commercial message; identification of the sender; identification of any discounts, premiums or gifts that are available (and clear explanation of how to qualify for them); and promotional competitions or games that are available (and the conditions for participation in them). Id.

  123. ECD art. 7. The advertisement: must be clearly identified as such; and must be capable of being opted-out of by the recipient (and the opt-out, if made, must be complied with by the service provider). Id.

  124. ECD preamble 32; ECD art. 8(1). Professional organizations are encouraged to adopt an EU code of conduct concerning the types of information allowed to be conveyed electronically. ECD art. 8(2). These codes of conduct will be taken into account by the Commission as they draft further rules pertinent to EU E-commerce. ECD art. 8(3). The ECD applies in addition to other EU Directives relating to professions. ECD art. 8(4).

  125. ECD preamble 34; ECD art. 9(1). However, a Member State may elect not to apply this provision to contracts concerning: creation or transfer of rights in real estate; a legal requirement for participation by the “courts, public authorities or professions exercising public authority;” granted suretyship, or “collateral securities furnished by persons acting for purposes outside their trade, business or profession;” or family law, or law of succession; ECD art. 9(2). If it elects not to apply the provision to one or more of those categories, it must so inform the Commission of the categories in question; furthermore, every 5 years the Member State must justify to the Commission why it is necessary to maintain those exceptions. ECD art. 9(3).

  126. ECD art. 10(1). The types of information to be provided are: how to consummate an E-contract; filing of the E-contact by the seller and its accessibility by the customer; how to correct input errors before the order is placed; the languages available; and any codes of conduct the seller has subscribed to (and how to get access to an electronic copy of them). ECD art. 10(1)–(2). These requirements are inapplicable to contracts consummated entirely by E-mail or by “equivalent individual communications.” ECD art. 10(4). However, in all E-contracts, the seller must provide general contract terms and conditions to the buyer, and they must be capable of being stored and reproduced by him. ECD art. 10(3).

  127. ECD art. 11(1). A customer must be informed how to identify and correct input errors before the order is placed. ECD art. 11(2). The aforementioned requirements are inapplicable if the contract is consummated entirely by E-mail or by “equivalent individual communications.” ECA art. 11(3). The order and acknowledgement of receipt are considered to have been received when they first become accessible. ECA art. 11(1).

  128. ECD art. 12.

  129. ECD art. 13.

  130. ECD art. 14.

  131. ECD preamble 40–48; ECD art. 15. However, if the intermediary acquires knowledge that the information is illegal or offensive, there is an obligation to remove or disable access to the information. ECD art. 13(1)(e) and 14(1)(b).

  132. ECD preamble 49; ECD art. 16(1)(a) and 16(2).

  133. ECD preamble 51; ECD art. 17(1). Procedural safeguards for consumers should be established. ECD preamble 53; ECD art. 17(2). Bodies in the Member States responsible for out-of-court settlement of disputes should keep the Commission informed of significant decisions made, and should also inform the Commission of any “other information on the practices, usages or customs relating to electronic commerce.” ECD art. 17(3).

  134. ECD art. 18(1).

  135. ECD art. 19(2). Member States should keep the Commission informed of any “significant or administrative judicial decisions” taken pertinent to implementation of the ECD, and the Commission should disseminate these to all Member States. ECD art. 19(5). Furthermore, Member States should cooperate with non-Member States in the development of compatible world E-commerce laws. ECD preamble 61.

  136. ECD art. 22(1).

  137. ECD art. 20. The sanctions must be “effective, proportionate and dissuasive.” Id.

  138. ECD preamble 63.

  139. ECD art. 20.

  140. Republic of Croatia (2002).

  141. ESA art. 7 and 36.

  142. ESA art. 42–44.

  143. The former is “a set of data in electronic form which are associated or logically connected with other data in electronic form and which serve to identify the signatory and the authenticity of the signed electronic document.” ESA art. 2(1) and 3. The latter is an E-signature “which fully guarantees the identity of the signatory and which complies with the requirements stipulated in Article 4” of the ESA. ESA art. 2(2). Article 4 mandates that an advanced E-signature: be linked to the subscriber and no one else; conclusively indicate the subscriber; be generated with a tool under the exclusive control of the subscriber; and have a relationship with the attached so that any subsequent modification of the data is detectable. An advanced E-signature must be created with an advanced E-signature development tool possessing the most stringent security attributes. ESA art. 8 and 9.

  144. ESA art. 5. Ordinarily, an E-signature may not be contested merely because of its electronic form. However, there are exceptions; the following types of documents are mandated to be in paper form to be valid: real estate; probate; prenuptial agreements; encumberment of assets when a social welfare center must grant approval; living wills and ordinary wills; those requiring certification by a Notary Public; and others designated by another statute or regulations. ESA art. 6.

  145. A CA is required to have personnel with sufficient expertise, a sophisticated computer system, and other qualifications. ESA art. 12 and 17. These requirements must be reported to the Minister, along with its standard operating procedures. ESA art. 15. It is not compulsory for a CA to be licensed. ESA art. 14. However, all CA’s must be “registered,” i.e., the Minister must be informed of the qualifications if a CA plans to open a business; if qualified, the Minister will list the CA in its Directory of Registered CA’s. ESA art. 16 and 21. Furthermore, if a CA desires accreditation by the Minister, it may apply for a license to be issued by the Minister verifying same; licensed CA’s are referred to as “Qualified” CA’s and are listed in the Minister’s Directory of Qualified CA’s. ESA art. 18 and 19. The Minister is empowered to conduct regular inspections of CA’s. ESA art. 37 and 38.

  146. A certificate must contain specific types of information, including: the E-signature of the CA; the public key; and personal information of the subscriber. ESA art. 11.

  147. ESA art. 10 and 24.

  148. ESA art. 25–28.

  149. The CA’s register of certificates should be shared with other CA’s. ESA art. 34.

  150. ESA art. 29 and 32. CA’s must promptly revoke a certificate at the request of the subscriber, and for other reasons. ESA art. 30. Certificates and supporting documentation must be stored for at least ten years after the issuance date.

  151. ESA art. 33.

  152. ESA art. 35.

  153. ESA art. 39–41. The first two may be punished with a fine in the range of 2,000–10,000 HRK, and the last may be punished with a fine in the range of 5,000–100,000 HRK. Id.

  154. Republic of Croatia (2003). The statute is inapplicable to: data protection; taxation; Notaries Public; legal representation of a client in the court system; and to gambling. ECA art. 1(2). The ECA and other pertinent Croatian statutes apply to E-commerce firms located in Croatia, but are inapplicable to E-commerce firms located in other EU member states even if they intend to sell products via E-commerce in Croatia (except for transactions affecting copyright, E-money, real estate, insurance firms, consumer advertising, freedom of choice of law to govern a contract, and medical products. ECA art. 3 and 4.

  155. ECA art. 5. A specific list of information must be supplied by the E-commerce seller during registration. ECA art. 6.

  156. ECA art. 7 and 8.

  157. ECA art. 2(6).

  158. ECA art. 9(1)–(3). However, an E-contract cannot be used in these situations: prenuptial agreements; property agreements requiring authorization of a social welfare center; living wills and ordinary wills; donations; real estate transfers; Notaries Public; if another statute mandates the presence of a handwritten signature or certification of it; and surety agreements. ECA art. 9(4). A party’s E-signature must be in compliance with the ESA. ECA art. 11.

  159. ECA art. 12. The E-contract generated must be capable of being printed, stored and retrieved by the buyer. ECA art. 13.

  160. ECA art. 16–21. The limitations concern caching, provision of links and dissemination of other party’s materials over the internet. Id.

  161. ECA art. 23. The normal punishment is a fine in the range of 1,000 to 100,000 HRK; however, repeated or serious violations must result in a court order prohibiting the E-commerce activity for a period of 3–6 months. Id.

  162. Republic of Croatia (2005).

  163. An E-document is defined as “the unambiguously connected integral set of data that have been electronically formed (prepared with the help of computers and other electronic devices), sent, received or stored on electronic, magnetic, optical or other medium, containing characteristics that determine the source (creator) and the authenticity of the contents and prove the integrity of contents in time,” and their contents “include all forms of text in writing, data, pictures and drawings, maps, sound, music, speech.” EDA art. 4(1). An E-document must be signed whenever it is transmitted and stored. EDA art. 15(2). The E-signature attached to an E-document must be an advanced E-signature as defined in the ESA. EDA art. 4(3).

  164. EDA art. 1 and 3. If the private parties or the government has agreed to use E-documents, they have the same legal validity as paper documents if all security requirements have been complied with. EDA art. 2 and 5.

  165. The computer system used with an E-document must use stringent security procedures. EDA art. 13(4).

  166. EDA art. 6 and 19(1). An E-document has two parts: the contents (with recipient’s name) and the subscriber’s E-signature with date and hour of generation. EDA art. 7. The internal and external form of an E-document must also be proper. EDA art. 8.

  167. EDA art. 20(1). However, appropriate security procedures must be in place to ensure that the document remains unaltered. EDA art. 20(2)-(3). Furthermore, the storage of the E-document may be entrusted to an agent if it uses appropriate security procedures. EDA art. 21–23.

  168. EDA art. 9. Verification of a paper printout of an E-document is to be done by a public authority within his scope of statutory authority; in all other cases, such verification must be performed by a Notary Public. EDA art. 10(2). Verified paper copies of an E-document have the same legal validity as the E-document. EDA art. 11(1).

  169. EDA art. 12(1). The amount of weight given the evidence depends on details pertinent to the E-document’s “preparation, storage, transfer, safekeeping, authenticity and lack of change…” EDA art. 12(2).

  170. EDA art. 16.

  171. EDA art. 17–18.

  172. The maximum punishment is a fine of 60,000 HRK if the offense is committed on behalf of a legal entity. EDA art. 26(1). Additionally, a fine of 10,000 HRK or imprisonment for 15 days may be imposed upon a natural person responsible for the legal entity’s action. EDA art. 26(2).

  173. The previous three crimes have a maximum punishment of 40,000 HRK if they are committed on behalf of a legal entity. EDA art. 27(1). Additionally, a fine of 5,000 HRK may be imposed upon a natural person responsible for the legal entity’s action. EDA art. 27(2).

  174. The previous four crimes have a maximum punishment of 20,000 HRK if they are committed on behalf of a legal entity. EDA art. 28(1). Additionally, a fine of 3,000 HRK may be imposed upon a natural person responsible for the legal entity’s action. EDA art. 28(2).

  175. Barbados (2001). See Blythe, Note 63 supra.

  176. Colombia’s statute contains rules regarding these and other aspects of a carriage contract: (1) detailed description of the goods; (2) issuance of receipt; (3) confirmation of shipment; (4) notification of terms of the contract; (5) instructions to be conveyed to the transporter; (6) request of delivery of the goods; (7) authorization to deliver the goods; (7) buyer’s notification of loss or damage of goods during transit; (8) seller’s promise to deliver the goods to buyer or her agent; and (9) acquisition, waiver or transfer of rights in the agreement. In Colombia, E-documents may be used in the creation or implementation of carriage contracts, notwithstanding the fact that another statute may mandate the utilization of paper documents. This applies regardless of whether the statute creates a legal requirement, or provides for detrimental consequences if paper documents are not used. However, in order for E-documents to be used in the transfer of a right or obligation under a carriage contract, a “reliable method” must be employed to ensure the security and integrity of the message. Once data messages have begun to be used, paper documents are no longer valid. A party cannot revert to the use of paper documents until the other party has been informed that, henceforth, paper documents are to be used instead of data messages. Reversion to paper documents will not affect the rights of the parties which were created with E-documents. If a legal regulation exists in reference to paper documents relating to a carriage contract, that regulation will also be applied to a digital message used in lieu of paper documents. Republic of Colombia (1999).

  177. Uniform Law Conference of Canada (1999).

  178. Republic of Tunisia (2000). See Stephen E. Blythe, Note 76 supra.

  179. Korea is one of the few nations that may offer better consumer protections than Tunisia. That country has enacted a separate statute specifically for E-commerce consumer protections—the E-Commerce Transactions Consumer Protection Act. See Republic of South Korea. Korean Legislation Research Institute, Act on the Consumer Protection in the Electronic Commerce Transactions (hereinafter “CPA”). Originally enacted by Law No. 6687 (30 March 2002), and amended by Act Nos. 7315 and 7344 of 31 December 2004 and 27 January 2005, respectively. Furthermore, the CPA recently underwent a major overhaul with substantial amendments in Act No. 7487 of 31 March 2005; these amendments became effective on 1 April 2006. For a thorough analysis of the CPA, see Stephen E. Blythe, Note 74 supra. Iran also provides good consumer protections, including a window of opportunity to withdraw from an E-transaction previously entered into; however, the window in Iran is only seven days, as opposed to Tunisia’s ten days. See Stephen E. Blythe, Note 70 supra.

  180. Kingdom of Nepal (2005). See Stephen E. Blythe, Note 55 supra.

  181. Republic of Vanuatu (2000). For a discussion of the E-Business Act by the Prime Minister of Vanuatu—the person who introduced the bill in Parliament—see Maautamate (Hon. Prime Minister) (2000). See also Stephen E. Blythe, Note 77 supra.

  182. LOWTAX, p. 1.

  183. The Republic of Tonga is an example of a nation that has claimed long-arm jurisdiction over E-commerce parties, and its statute may be used as a model. See Stephen E. Blythe, Note 77 supra.

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stephen E. Blythe.

Additional information

Stephen E. Blythe is a Professor of Law and Accounting, New York Institute of Technology, CERT Technology Park, Abu Dhabi, United Arab Emirates. Ph.D. Candidate (Int’l E-Commerce Law), The University of Hong Kong (China); Ph.D. (Business Administration), University of Arkansas, 1979; J.D. cum laude, Texas Southern University, 1986; LL.M. (Int’l Bus. Law) University of Houston, 1992; LL.M. (Info. Tech. Law) with distinction, University of Strathclyde (Scotland), 2005. Attorney at Law, Texas and Oklahoma; C.P.A., Texas. He practiced solo (employment-discrimination litigation) in Houston, Texas, was affiliated with the Cheek Law Firm (insurance-defense litigation) in Oklahoma City, and was a management consultant for the city of Haikou, China. Additionally, he has taught law, accounting, management, economics and international business at 15 universities located in the United States, Africa and the Middle East.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Blythe, S.E. Croatia’s computer laws: promotion of growth in E-commerce via greater cyber-security. Eur J Law Econ 26, 75–103 (2008). https://doi.org/10.1007/s10657-008-9053-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10657-008-9053-y

Keywords

JEL Classification

Navigation