Feeds

Disclaimers could make emails into contracts

England's 400 year-old cyber signature law

The Power of One Infographic

The High Court in Manchester has ruled that an email cannot be recognised as a legal written offer if it does not contain a signature or name within the body of the mail. The inclusion of a user name in the message header is not enough.

Judge Pelling ruled that the automatic inclusion of an email address is not enough to count as a signature.

The dispute was between JPF, a Portuguese bed maker, and Bedcare (UK) Ltd and its director Nilesh Metha.

According to court documents, JPF applied for a winding up order because Bedcare owed it money. Metha sent an email, or got one of his staff to, offering a personal guarantee to JPF if they would withdraw the winding up order. Mr Metha did not sign the email but the header read "nelmetha@aol.com".

JPF phoned and accepted the offer made - the hearing for the winding up order was adjourned for two weeks. Bedcare subsequently did go out of business. Metha claimed that the email was not enough to qualify as a signature under the requirements of the 1677 Statute of Frauds, and therefore he was not liable for the personal guarantee.

Judge Pelling said: "In my judgment the inclusion of an e-mail address in such circumstances is a clear example of the inclusion of a name which is incidental in the sense identified by Lord Westbury in the absence of evidence of a contrary intention.... I conclude that the e-mail ... did not bear a signature sufficient to satisfy the requirements of Section 4."

Full judgement available from Bailii here.

The end result of this could be that people who include a signature and disclaimer at the bottom of their emails might actually be making themselves more liable than people who just send one line emails. More details from Reckon here.®

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.