Feeds

Disclaimers could make emails into contracts

England's 400 year-old cyber signature law

Top three mobile application threats

The High Court in Manchester has ruled that an email cannot be recognised as a legal written offer if it does not contain a signature or name within the body of the mail. The inclusion of a user name in the message header is not enough.

Judge Pelling ruled that the automatic inclusion of an email address is not enough to count as a signature.

The dispute was between JPF, a Portuguese bed maker, and Bedcare (UK) Ltd and its director Nilesh Metha.

According to court documents, JPF applied for a winding up order because Bedcare owed it money. Metha sent an email, or got one of his staff to, offering a personal guarantee to JPF if they would withdraw the winding up order. Mr Metha did not sign the email but the header read "nelmetha@aol.com".

JPF phoned and accepted the offer made - the hearing for the winding up order was adjourned for two weeks. Bedcare subsequently did go out of business. Metha claimed that the email was not enough to qualify as a signature under the requirements of the 1677 Statute of Frauds, and therefore he was not liable for the personal guarantee.

Judge Pelling said: "In my judgment the inclusion of an e-mail address in such circumstances is a clear example of the inclusion of a name which is incidental in the sense identified by Lord Westbury in the absence of evidence of a contrary intention.... I conclude that the e-mail ... did not bear a signature sufficient to satisfy the requirements of Section 4."

Full judgement available from Bailii here.

The end result of this could be that people who include a signature and disclaimer at the bottom of their emails might actually be making themselves more liable than people who just send one line emails. More details from Reckon here.®

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.