How to verify the contracting person through electronic means

Document Type : Original Article

Author

Minia University Faculty of Law

Abstract

 
Abstract:
     In spite of the ease in dealing with electronic dealings and its widespread availability, especially in previous years, the topic increased its importance after the emergence of the new Crohn virus, which highlighted the effective role for electronic transactions in the entire international community, and it is worth noting that the risks of epidemics and diseases have raised many problems during The last twenty years, the most important of which are problems of a legal nature, passing through the SARS epidemic in 2003, then the HINI epidemic in 2009, or the EPOLA epidemic in 2014, and finally the CORONA epidemic, which is the most widespread as it represents a global crisis.
      Which made electronic transactions not a entertainment or even an optional method, but it is the only available means under the current circumstances, and one of the most important problems raised by the contract is how to verify the personality of the contractor, which does not raise any problem in the traditional dealings due to the physical presence of the parties, which we lack in dealing with Then, so that transactions can be carried out in a safe and effective manner that guarantees the seriousness and sincerity of transactions, away from any fraud or fraud.
     So we will review the most important points that ensure the verification of the personality of the contractors, which is summarized in privacy via the Internet, including images of the attack on personal data, then we are exposed to the sources that threaten the privacy of personal data, and through the efforts and means used to protect that data, whether in international or Arab legislation, and finally the effects Liability resulting from the assault on personal data.
This study aims to several objectives, as shown below:
1-    A brief presentation on the meaning of the right to privacy and exposure to the most important images of the violation of the right to privacy that affects contracting through social media.
2-    What data requires legal protection?
3-    The sources that threaten the privacy of personal data, so that each contractor through these means can protect its data from plagiarism and theft.
4-    The methods used to protect personal data.
A-  In documents or in international legislation.
B-   In Arab legislation and constitutions.
 
Study methodology:
This study is mainly based on the analytical approach and the comparative approach.

Keywords