• Title/Summary/Keyword: Third-party Documents

Search Result 25, Processing Time 0.022 seconds

A study on the problems of transport document as a proof of delivery on INCOTERMS 2000 (매도인(賣渡人)이 제공하는 인도증빙서류(引渡證憑書類)의 문제점(問題點)에 관한 연구(硏究) (INCOTERMS 2000을 중심(中心)으로))

  • Oh, Won-Suk
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.14
    • /
    • pp.7-35
    • /
    • 2000
  • The purpose of this paper is to examine the meanings of delivery of each trade term in INCOTERMS 2000, to investigate various kinds of transport document as a proof of delivery, and finally to find their problems. As a result of examination, following problems are considered to happen practically. First, a multimodal transport document referred in FOB term seems to be unappropriate because FOB term can be used in sea or inland waterway transport. Second, Assuming resale in transit in CFR or CIF term, non-negotiable Sea Waybill seems to be inappropriate. Third, As Sea Waybill is not a document of title, it can not be a security when the bank negotiate seller's draft. Fourth, INCOTERMS 2000 deleted the reference to charter party in CFR or CIF term. This deletion may raise any legal problems for the liabilities of carrier when the contradictions happen between the charter party B/L and charter party. Finally, if CFR or CIF means symbolic delivery, other documents besides B/L can not be a symbols of goods.

  • PDF

A Study on the Payment Mechanism of Independent Guarantee -focusing on matters that the relevant parties involved should know- (청구보증상 지급메커니즘에 따른 실무상 유의점)

  • Oh, Won-Suk;Kim, Pil-Joon;Lee, Woon-Chang
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.46
    • /
    • pp.133-158
    • /
    • 2010
  • Independent guarantee is a creation of the need from the both sides, i.e. the applicant (principal debtor) and the beneficiary (creditor). The former used to have to deposit cash in favor of the beneficiary in case of his default, which laid a burden on his liquidity while the latter still wanted to have the equivalent to cash. Independent guarantee satisfied the both parties by freeing the applicant of a deposit and maintaining the beneficiary's right at the same time. The fact that independent guarantee has three payment mechanisms is not widely known to the public. They are (i) payment on first demand, (ii) payment upon submission of third-party documents, (iii) payment upon submission of an arbitral or court decision. From the applicant's point of view, the order in his favor is (iii), followed by (ii) and (i). As there shouldn't be a case where one party is at a disadvantage against the other, useful insight is being sought for the benefit of the applicant. First, the applicant can offer his intention to provide a payment mechanism (ii) or (iii) rather than (i) if he must deliver it. Second, if the beneficiary still wants to have (i) and the applicant is in a position not to reject it, the latter should thoroughly check any provisions that may work against him later. Third, the applicant could use counterbalancing provisions in underlying contract to cope with protective clauses in the guarantees. Forth, the applicant should review the beneficiary's sincerity to prevent unfair calling risks. The applicant may use an ECA(Export Credit Agency) in his country to which he can transfer not only unfair calling risks, but also political risks. On the other hand, a bank needs to keep the following advice in mind. The foremost important thing for the bank not to forget is that it provides a guarantee as a service provider, not as a responsible party for the feasibility of the project, etc. Credit risk of the applicant should require the greatest attention when issuing a guarantee: the bank should look into the possibility that it can procure immediate reimbursement from its customers after payment to the beneficiary. Second, the applicant's ability to complete the project should be reviewed by checking its track records, techniques and reputation, etc. Third, the bank may also use an ECA to cover the beneficiary's unfair calling risks as well as political risks. In the case of Korea, as Korea Export Insurance Corporation(KEIC) can cover all the risks mentioned above, the bank could use its service called 'Export Bond Insurance.' What's better for the bank is that ECA cover can enhance the bank's asset quality by putting it zero on its risk weighted asset.

  • PDF

A Study on the Adoption of Electronic Contract Service (전자계약서비스의 문제점과 해결방안)

  • Choi, Seok-Beom;Kim, Tae-Hwan;Kim, In-Kyung;Kim, Jae-Hak;Park, Sun-Young;Yoon, Young-Rim
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.34
    • /
    • pp.157-185
    • /
    • 2007
  • The purpose of this thesis is to contribute to the activation of e-contract service for one stop e-trade by analyzing the problems and its solutions in e-contract service at home and abroad. In order to achieve the purpose of this thesis, case studies are done on e-contract service providers such as CECTRUST service of NTT DATA in Japan and HanCM.com of Haansoft in Korea and user companies such as Taisei Corporation using CECTRUST service and Hyundai Card using HanCM.com. The problems in the e-contract service are the lack of e-contract service providers, rare publicity of e-contract service, limited use of e-contract service at only home, higher pricing for e-contract service, short time management of e-contract documents by service providers, no application of newly developed security technology to e-contract service, unsatisfaction of requirements of e-contract service provider as trusted third party, absence of lower pricing e-contract service by service provider, authorizing key error in electronic signature under recognized authentication system in case of fail in renewal of digital certificate and reproduction of digital certificate. The solutions of these problems are the upbringing of e-contract service providers, broad publicity of e-contract service, development of e-contract service on a global basis, establishment of lower pricing for e-contract service, long time management of e-contract documents by service providers, application of newly developed security technology such as bio technology to e-contract service, satisfaction of requirements of e-contract service provider as trusted third party by designation of recognized e-document repository, development of lower e-contract service by way of application service provider(ASP), introduction of time stamping of e-contract document and signature key value. The limitation of this thesis is that the problems and its solutions could not meet with the broad recognition as they are conferred by intuition because of few e-contract service provider.

  • PDF

A Study on the Online Arbitration Rules in China (중국 온라인중재규칙에 관한 연구)

  • Choi, Seok-Beom
    • Journal of Arbitration Studies
    • /
    • v.21 no.2
    • /
    • pp.47-64
    • /
    • 2011
  • The China International Economic and Trade Arbitration Commission(CIETAC) released online arbitration rules which apply the resolution of disputes over electronic commerce transactions, as well as other economic and trade disputes in which the parties agree to do. The evidence submitted by the parties may be electronic evidence created, sent, received or stored by electronic, optical or magnetic means. Electronic evidence with a reliable electronic signature shall carry the same effect and probative force as a document with a hand-written signature. Where a case is tried in a tribunal, the arbitration tribunal shall conduct an online trial hearing using internet video conference or other electronic or computer communication means. Unless the parties have another agreement, summary procedure shall apply to cases where the amount in dispute exceeds RMB 100,000 but no more than RMB 1 million, or where the amount in dispute exceeds RMB 1 million and a party submits a written application for summary procedure after obtaining the written consent of the other party. Unless the parties have agreed otherwise, fast-track procedure shall apply to cases where the amount in dispute does not exceed RMB 100,000 or where the amount in dispute exceeds RMB 100,000 and a party submits a written application for fast-track procedure after obtaining the written consent of the other party. Notable features of the Online Rules are as follows; first, there is not detailed consideration for online arbitration. Second, communications between the parties and the tribunal are allowed only through the Secretariat. Third, elaborate provisions regarding the electronic submission and transmission of documents is provided for. Forth, various factors must be considered by the tribunal in deciding the evidence's reliability. Fifth, reasonable endeavours is levied on CIETAC to keep data communications secure and encrypted. Sixth, the tribunal has the right to investigate and collect relevant evidence. And finally different procedures are provided for in consideration of the various types of E-commerce.

  • PDF

The Rules of Law on Warranty Liability in Contracts for the International Sale of Goods - With Special Reference to CISG - (국제물품매매계약에 있어서 하자담보책임에 관한 법리 - CISG를 중심으로 -)

  • Hong, Sung-Kyu
    • Journal of Arbitration Studies
    • /
    • v.24 no.4
    • /
    • pp.147-175
    • /
    • 2014
  • In contracts for the international sale of goods, a seller must deliver appropriate goods and hand over relevant documents according to a contract, which will transfer the ownership of the goods to a buyer. In this case, if there are defects in the contracted goods, the warranty liability will occur. However, in the United Nations Convention on Contracts for the International Sale of Goods (CISG), a term-the conformity of the goods to the contract-is used universally instead of the warranty. According to the CISG, a seller must deliver goods in conformance with the relevant contract in terms of quantity, quality, and specifications, and they must be contained in vessels or in packages according to the specifications in the contract. In addition, a certain set of requirements for conformity will be applied implicitly except when there is a separate agreement between parties. Further, the base period of conformity concerning the defects of goods is the point when the risk is transferred to the buyer. A seller shall be obliged to deliver goods that do not belong to a third party or subject to a claim then, and such obligations shall affect the right or claim of a third party to some extent based on intellectual property rights clauses. If the goods delivered by the seller lack conformity, or incur right infringement or claim of a third party, then it shall be regarded as a default item per the obligation of the seller. Thus, the buyer can exercise diverse means of relief as specified in Chapter 2, Section 3 (Article 45-Article 52) of the CISG. However, such means of relief have been utilized in various ways for individual cases as shown in judicial precedents made until now. Contracting parties shall thus keep in mind that it is best for them to make every contract airtight and they should implement each contract thoroughly and faithfully to cope with any possible occurrence of a commercial dispute.

  • PDF

An Exploratory Study on Consumers' Perception of Personal Information Provision to the Third Party (소비자의 개인정보 제3자 정보 제공 인식에 관한 탐색적 연구)

  • Koo, Hye-Gyoung;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.187-196
    • /
    • 2014
  • Most Consumers don't pay attention the process of giving consent for the provision of personal information. The terms of giving consent of personal information provision including 3rd party provision related contents. Although personal information leakage were related 3rd party sharing, consumers can't recognize the details. Therefore, this study focused on the perception of 3rd party provision of personal information. Consumers recognized 3rd party as who are related the service offer or not. Consumers want to know the cases of personal information sharing to the 3rd party, and if the business operators got benefit to share personal information with 3rd party, consumers want to know the facts. To understand the terms easily, the format have to be revised and to be standardized. Standardization of consent forms is very important for consumers to understand the difficult documents and the development of the business system to collect and use consumer's personal information to guarantee the right to self-determination of personal information.

An Efficient and Secure Method for Managing Logs of Certified e-Document Authority Using Hash Tree (공인전자문서 보관소에서 생성되는 로그의 효율적이고 안전한 보관방법에 대한 연구)

  • Kang, Shin-Myung;Moon, Jong-Sub
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.23-32
    • /
    • 2009
  • CeDA (Certified e-Document Authority) was adopted in March 2005. It is possible to register/store/send/receive/transfer/revoke e-documents by using trusted third party, CeDA. It is important to store not only e-documents of users but also logs produced by CeDA. Thus all logs must be electronically signed using certificate of CeDA. But management of electronically signed logs is difficult. In this paper, the method which can be applicable to authenticate all logs of CeDA using "Hash Tree" is present.

  • PDF

Personal Information Leakage Prevention Scheme of Smartphone Users in the Mobile Office Environment (모바일 오피스 환경에서 스마트폰 사용자의 개인정보 유출 방지 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.205-211
    • /
    • 2015
  • Recently, a mobile communication network and the wireless terminal is suddenly develop, mobile office service is more and more the sportlight. However, the user may receive an attack from a malicious third party if the up/download the data in the remote to perform the work in a mobile office environment. In this paper, we propose scheme to manage the information lost due to theft smartphone that contain spill prevention personal information and company information from the mobile office environment (call history, incoming messages, phonebook, calendar, location information, banking information, documents, etc.). The proposed scheme using the number of triangular fuzzy information about the state of the personal information and business intelligence to implement a pair-wise comparison matrix. In particular, the proposed scheme is to prevent the value obtained by constructing a pair-wise comparison matrix for personal information and business intelligence and pair your smartphone is lost when a third party not allow access to personal information and corporate information is leaked to the outside.

The current situations and future directions of electronic marine insurance policy in Japan's trade financial EDI (일본의 무역금융EDI에 있어 국제해상보험증권의 전자화 현황과 향후과제)

  • Han, Sang-Hyun
    • International Commerce and Information Review
    • /
    • v.9 no.1
    • /
    • pp.169-186
    • /
    • 2007
  • The purpose of this study analyzes laying stress on Japan example that background of electronic issue of international meritime insurance policy is what, and is marched in some degree present. and this study presented what hereafter subject of electronic insurance plice is. The this paper is to study the current situations of trade financial EDI in Japan and problems in application of marine insurance contracts. The subject of electronic marine policy issue is as following in trade financing EDI. (1) application of electronic document in claim demand. (2) standardization of various documents and insurance plice data. (3) insurance compensation document that become Jeonjahwa in insurance accident settlement. (4) maritime Insurance policy agreement's establishment. (5) when is monopolized to third party, realization of electronic maritime insurance policy offer.

  • PDF

Expanding User Types for Utilizing Certified e-Document Authorities (공인전자문서보관소의 이용 활성화를 위한 사용자 유형 확대방안)

  • Song, Byoungho
    • The Korean Journal of Archival Studies
    • /
    • no.30
    • /
    • pp.175-204
    • /
    • 2011
  • Electronic records are generated not only in public sector but also in private sector. Records will be used across the public-private boundary. The Certified e-Document Authorities(CeDAs) may keep electronic documents in private sector for preservation and evidence, like the official Record Management Systems for Public sector. A CeDA is the Trusted Third Party (TTP) as a business to be entrusted and proof interchanging documents between parties. This CeDA system could be sustainable only if the CeDA earn the enough sales through enough uses. And yet, all the eight CeDA companies have not had enough users. How to utilize CeDAs is one of the hot issues in this area. In this paper, We analyze the threat to trustworthiness of CeDA due to payment of only one party among others, and describe the difficulty in use of CeDA for an individual user. These things make CeDAs cannot have enough users. To do address these, We expand the boundary of relevant parties for a document, present a delegate-establishing option under a joint name, show the needs of identifying and notifying minimum relevant parties, and suggest the proxy parties to help the individual users.