[*] Staff Attorney, Joint Committee on Information Technology Resources, Florida Legislature. B.A., University of Alabama, 1981; M.B.A., University of Alabama, 1983; J.D., Stetson University, 1990. As the staff attorney for the Joint Committee on Information Technology Resources, Mr. Wyrough studied the topic of this Article and prepared a report based upon his findings. Those findings are the basis for this Article, and the authors have excerpted portions of the report into the Article. The views expressed in this Article are those of the authors and are not intended to reflect the opinion of the Florida Senate, the Florida House of Representatives, or the Joint Committee on Information Technology Resources. Return to text.

[**] Dem., Boca Raton, Florida Senate. B.A., The Ohio State University, 1979; J.D., Case Western Reserve University, 1982. Senator Klein is the former chair of the Joint Committee on Information Technology Resources. Return to text.

[1] See L.A. Lorek, Internet Helps PC Users Become Well Connected, FT. LAUD. SUN SENT., May 16, 1994, at B7. Return to text.

[2] See id. Return to text.

[3] See Bruce Caldwell, Bank Shot: Microsoft and Intuit Want to Help Banks Create the New World of Electronic Commerce, INTERNET WORLD, Dec. 18, 1995, at 14, 14. Return to text.

[4] See id. Return to text.

[5] See id. Return to text.

[6] See OFF. OF TECH. ASSESSMENT, U.S. CONGRESS, INFORMATION SECURITY AND PRIVACY IN NETWORK ENVIRONMENTS 20-21 (1994). Return to text.

[7] See id. at 71-74 (arguing that the Uniform Commercial Code should be revised to include electronic signatures in the definition of "signed"). Return to text.

[8] See FLA. LEGIS. JT. COMM. INFO. TECH. RESOURCES, ELECTRONIC SIGNATURES: A KEY TO UNLOCKING ELECTRONIC COMMERCE IN FLORIDA 1 (1996) [hereinafter ELECTRONIC SIGNATURES]. Return to text.

[9] Ch. 96-224, 1996 Fla. Laws 837. Return to text.

[10] See Brian Miller, How to Sign on the Digital Line, GOV'T TECH., June 1995, at 14, 14. Return to text.

[11] See id. Return to text.

[12] See id. Return to text.

[13] See Bob Lynch, Electronic Data Interchange: How to Begin, GOV'T TECH., June 1995, at 40, 40. Return to text.

[14] See id. Return to text.

[15] See id. Return to text.

[16] See Blake Harris, Electronic UCC Filing Faster and Cheaper, GOV'T TECH., June 1995, at 1, 54. Return to text.

[17] See id. at 56. Return to text.

[18] See id. at 54. Return to text.

[19] See, e.g., id. at 1 (claiming that electronic UCC filing will save time, paperwork, and money). Return to text.

[20] See Roy E. Slagle & Paul A. Schaffman, CFA Promotes EDI Tech., THE SECURED LENDER, Oct. 1994, at 18, 21. Return to text.

[21] See id. Return to text.

[22] See President's Memorandum to the Heads of Executive Departments and Agencies on Streamlining Procurement Through Electronic Commerce, 29 WEEKLY COMP. PRES. DOC. 2174 (Nov. 1, 1993). Return to text.

[23] See id. Return to text.

[24] See id. Return to text.

[25] See id. Return to text.

[26] See id. at 2175. Return to text.

[27] See ELECTRONIC SIGNATURES, supra note 8, at 22. Return to text.

[28] Ch. 92-98, 1992 Fla. Laws 870. Return to text.

[29] See FLA. STAT. 282.004 (1995). Return to text.

[30] See id. Return to text.

[31] See id. Return to text.

[32] See Information Resources Management and Paperwork Reduction Act, ch. 92-98, 2, 1992 Fla. Laws 870, 871 ("The state should minimize the paperwork burden associated with the collection and dissemination of government information for individuals, small businesses, educational institutions, state agencies, and local governments."). Return to text.

[33] See Fla. Exec. Order No. 95-215 (June 19, 1995). Return to text.

[34] See ELECTRONIC SIGNATURES, supra note 8, at 23. Return to text.

[35] See id. Return to text.

[36] See id. at 24; see also discussion infra Part V. Return to text.

[37] See ELECTRONIC SIGNATURES, supra note 8, at 24. Return to text.

[38] See id. Return to text.

[39] See id. Return to text.

[40] Id. Return to text.

[41] See id. Return to text.

[42] See id. Return to text.

[43] See id. at 24-25. Return to text.

[44] See id. at 25. Return to text.

[45] See id. Return to text.

[46] See FLA. ST. UNIV. ADMIN. INFO. SYS., GENERAL REQUISITION ELECTRONIC ENTRY & TRACKING (GREETS VERSION 2.1) USERS GUIDE (1995). Return to text.

[47] See id. at 1. Return to text.

[48] See id. Return to text.

[49] See id. at 15. Return to text.

[50] Memorandum from Les Pearson, Chief, Fla. Bureau of Auditing, Office of the Comptroller, Dep't of Bank. & Fin. (Nov. 6, 1995) (on file with Fla. Legis. Jt. Comm. Info. Tech. Resources). Return to text.

[51] See FLA. STAT. 17.076(6) (1995). Return to text.

[52] See ELECTRONIC SIGNATURES, supra note 8, at 27. Return to text.

[53] Repub., Osprey. Return to text.

[54] Repub., Sarasota. Return to text.

[55] Fla. HB 711 (1995). Return to text.

[56] Fla. SB 1770 (1995). Return to text.

[57] See FLA. STAT. 117.05(3)(a) (1995). Return to text.

[58] See ELECTRONIC SIGNATURES, supra note 8, at 27. Return to text.

[59] See id. at 27-28. Return to text.

[60] See id. at 28. Return to text.

[61] See id. Return to text.

[62] See id. Return to text.

[63] See id. Return to text.

[64] See id. Return to text.

[65] See OFF. OF TECH. ASSESSMENT, U.S. CONGRESS, ISSUE UPDATE ON INFORMATION SECURITY AND PRIVACY IN NETWORK ENVIRONMENTS 1-5 (1995) [hereinafter OTA UPDATE]. Return to text.

[66] See, e.g., John Markoff, Discovery of Internet Flaws Is Setback for On-Line Trade, N.Y. TIMES, Oct. 11, 1995, at A1 (stating that flaws in the Internet could allow easy access to confidential documents). Return to text.

[67] See id. Return to text.

[68] See id. at C3. Return to text.

[69] See, e.g., id. at A1 (arguing that flaws in the Internet could allow an eavesdropper or criminal to divert many documents). Return to text.

[70] See Lou Latham, Network Security, Part 4: The Science of Encryption, INSIDE GARTNER GROUP THIS WK., May 17, 1995, at 16, 18-19. Return to text.

[71] See id. Return to text.

[72] See id. at 18. Return to text.

[73] Edward Yonkers, Electronic Commerce on the Internet, INSIDE GARTNER GROUP THIS WK., July 26, 1995, at 1, 6. Return to text.

[74] See id. Return to text.

[75] See Markoff, supra note 66, at C3. Return to text.

[76] See id. Return to text.

[77] See Lou Latham, Network Security, Part 3: Firewalls Bar the Door, INSIDE GARTNER GROUP THIS WK., May 10, 1995, at 11-12. Return to text.

[78] See id. Return to text.

[79] See id. Return to text.

[80] See id. Return to text.

[81] See OTA UPDATE, supra note 65, at 5. Return to text.

[82] See id. Return to text.

[83] See id. Return to text.

[84] See id. Return to text.

[85] See Edward J. Radio, Legal Issues in Cryptography, COMPUTER LAW., May 1996, at 1, 2. Return to text.

[86] See A. Michael Froomkin, The Metaphor Is the Key: Cryptography, the Clipper Chip, and the Constitution, 143 U. PA. L. REV. 709, 769 n.241 (1995). Prior to the adoption of the Escrowed Encryption Standard, see discussion infra Part II.B.4.b, federal agencies were required to use DES for sensitive, nonclassified data unless they procured a waiver. See Froomkin, supra, at 769 n.241. Return to text.

[87] See ELECTRONIC SIGNATURES, supra note 8, at 33. Return to text.

[88] See Karen E. Gegner & Stacy B. Veeder, Standards Setting and Federal Information Policy: The Escrowed Encryption Standard (EES), 11 GOV'T INFO. Q. 407, 407 (1994). Return to text.

[89] See ELECTRONIC SIGNATURES, supra note 8, at 33-34. Return to text.

[90] See Encryption Plan Ripped, INFO. WK., Sept. 25, 1995, at 102. Return to text.

[91] See id. Return to text.

[92] See id. Return to text.

[93] See id. Return to text.

[94] See Kevin Power, Council Tells Administration to Back off Its Encryption Policy, GOV'T COMPUTER NEWS, June 10, 1996, at 3. Return to text.

[95] See id. Return to text.

[96] See id. Return to text.

[97] See ELECTRONIC SIGNATURES, supra note 8, at 34. Return to text.

[98] See Willie Schatz, The Secret to Encryption: RSA Created a Security Code So Tough to Break, Leading Vendors Use It in Their Products, INFO. WK., May 15, 1995, at 74. Return to text.

[99] See id. Return to text.

[100] See id. Return to text.

[101] See id. at 76. Return to text.

[102] 22 U.S.C. 2778 (1994). Return to text.

[103] See Schatz, supra note 98, at 74. Return to text.

[104] See id. Return to text.

[105] See ELECTRONIC SIGNATURES, supra note 8, at 35. Return to text.

[106] See Esther C. Roditti & Anne Fontaine, Student Challenges Ban on Export of Encryption, COMPUTER LAW & TAX REP., Apr. 1994, at 4-6. In addition, several bills are pending in Congress to change the current federal policies on encryption. See, e.g., Encrypted Communications Privacy Act, S. 1587, 104th Cong. (1996). Return to text.

[107] INFO. SECURITY COMM., ABA SCI. & TECH. SEC., DIGITAL SIGNATURE GUIDELINES 4-5 (1996) [hereinafter ABA GUIDELINES]. Return to text.

[108] See id. at 31. Return to text.

[109] See id. at 82-84. Return to text.

[110] See FLA. STAT. 672.201(1) (1995). Return to text.

[111] See Williams v. Dewey, 178 N.E.2d 808, 809 (Ohio 1961). Return to text.

[112] See ELECTRONIC SIGNATURES, supra note 8, at 14 (noting that a handwriting expert can be called upon to give an opinion on the authenticity of a given signature). Return to text.

[113] See Benjamin Wright, Contracts Without Paper, TECH. REV., July 1992, at 57-58. Return to text.

[114] See ELECTRONIC SIGNATURES, supra note 8, at 14-15. Return to text.

[115] U.C.C. 2-201(1). Return to text.

[116] Id. 1-201(46). Return to text.

[117] See NAT'L CONF. OF COMM'RS ON UNIF. ST. LAWS, U.C.C. ART. 2B, LICENSES (draft of Sept. 4, 1996). Return to text.

[118] See id. Return to text.

[119] Id. Return to text.

[120] "The word 'writing' includes handwriting, printing, typewriting, and all other methods and means of forming letters and characters upon paper, stone, wood, or other materials." FLA. STAT. 1.01(4) (1995). Return to text.

[121] Id. 671.201(39). Return to text.

[122] See UCC 1-201 official cmt. 39. Return to text.

[123] Id. Return to text.

[124] Id. Return to text.

[125] See, e.g., State v. Hickman, 189 So. 2d 254, 258 (Fla. 2d DCA 1966). Return to text.

[126] See 80 C.J.S. Signatures 1(a) (1953). Return to text.

[127] See Hickman, 189 So. 2d at 258. Return to text.

[128] See id. Return to text.

[129] See Gendzier v. Bielecki, 97 So. 2d 604, 607 (Fla. 1957). Return to text.

[130] See Hickman, 189 So. 2d. at 258. Return to text.

[131] See State v. Morris, 223 So. 2d 743, 745 (Fla. 4th DCA 1969). Return to text.

[132] See 80 C.J.S. Signatures 1(c) (1953). Return to text.

[133] Cf. ABA GUIDELINES, supra note 107, at 5 (suggesting that documents are written on paper today merely to satisfy the need for a legally recognized form). Return to text.

[134] FLA. STAT. 15.16(4) (1995). Return to text.

[135] Id. 116.34(3). Return to text.

[136] See id. Return to text.

[137] See ABA GUIDELINES, supra note 107, at 35. Return to text.

[138] Cf. id. (stating that electronic signatures include digitized images of paper-based signatures). Return to text.

[139] See id. Return to text.

[140] See id. Return to text.

[141] See id. Return to text.

[142] See discussion infra part IV.B.1. Return to text.

[143] See ABA GUIDELINES, supra note 107, at 7. Return to text.

[144] See id. Return to text.

[145] See Benjamin Wright, Eggs in Baskets: Distributing the Risks of Electronic Signatures, electronic copy available for purchase at < http://infohaus.com/access/by-seller/Benjamin_Wright> (on file with Fla. Legis. Jt. Comm. Info. Tech. Resources); Cynthia Morgan, Act of Signing Becomes Security Key, GOV'T COMPUTER NEWS, May 1, 1995, at 8. Return to text.

[146] See ABA GUIDELINES, supra note 107, at 16-17. Return to text.

[147] See, e.g., Parma Tile Mosaic & Marble Co. v. Estate of Short, 663 N.E.2d 633 (N.Y. 1996). Return to text.

[148] See, e.g., id. at 635 & n.1 (noting that the court will look to the intent of the parties and accept a fax document as sufficient to constitute a writing). Return to text.

[149] See SIMON GARFINKEL, PGP: PRETTY GOOD PRIVACY 52-53 (1995). Return to text.

[150] See id. at 42. Return to text.

[151] See id. Return to text.

[152] See id. Return to text.

[153] See id. Return to text.

[154] See Latham, supra note 70, at 17. Return to text.

[155] See, e.g., GARFINKEL, supra note 149, at 43. Return to text.

[156] See id. at 45. Return to text.

[157] See OTA UPDATE, supra note 65, at 6. Return to text.

[158] See id. Return to text.

[159] See GARFINKEL, supra note 149, at 42, 45-46. Return to text.

[160] See id. at 46. Return to text.

[161] See id. at 55. Return to text.

[162] See id. Return to text.

[163] See id. at 49. Return to text.

[164] See id. at 48. Return to text.

[165] See id. Return to text.

[166] See id. Return to text.

[167] See id. Return to text.

[168] See id. Return to text.

[169] See id. Return to text.

[170] Latham, supra note 70, at 17. Return to text.

[171] ABA GUIDELINES, supra note 107, at 35. Return to text.

[172] See GARFINKEL, supra note 149, at 12. Return to text.

[173] See Latham, supra note 70, at 18. Return to text.

[174] See id. Return to text.

[175] See id. Return to text.

[176] See id. Return to text.

[177] See id. at 18. Return to text.

[178] See id. Return to text.

[179] See id. Return to text.

[180] See GARFINKEL, supra note 149, at 39. Return to text.

[181] See id. at 39-42. Return to text.

[182] Cf. id. (explaining that cryptography cannot protect against stolen encryption keys). Return to text.

[183] See id. Return to text.

[184] Cf. id. (explaining that any attacker who can steal or purchase your keys can decrypt your files and messages). Return to text.

[185] See ABA GUIDELINES, supra note 107, at 7. Return to text.

[186] See GARFINKEL, supra note 149, at 53. Return to text.

[187] See id. at 53, 379. PGP can be obtained by filling out a required form at PGP Distribution Authorization Form (visited Dec. 24, 1996) < http://bs.mit.edu:8001/pgp-form.html>. Return to text.

[188] See id. at 233. Return to text.

[189] See id. Return to text.

[190] See id. at 235-36. Return to text.

[191] See id. Return to text.

[192] See id. Return to text.

[193] See ABA GUIDELINES, supra note 107, at 14-16. Return to text.

[194] See id. at 14. Return to text.

[195] See id. at 16. Return to text.

[196] See id. Return to text.

[197] See id. Return to text.

[198] See id. at 14-16. Return to text.

[199] See id. at 15. Return to text.

[200] See id. Return to text.

[201] See id. Return to text.

[202] See id. Return to text.

[203] See id. at 31. Return to text.

[204] Cf. id. at 60 (explaining that public policy or legislation may limit the extent to which the certification authority and subscriber may create enforceable agreements that are inconsistent with the fundamental principles of the Guidelines). Return to text.

[205] See ELECTRONIC SIGNATURES, supra note 8, at 43. Return to text.

[206] See id. Return to text.

[207] See id. at 45. Return to text.

[208] See id. Return to text.

[209] See id. Return to text.

[210] See id. at 20. Return to text.

[211] See GARFINKEL, supra note 149, at 138. Return to text.

[212] See Approval of Federal Information Processing Standards Publication 186, Digital Signature Standard (DSS), 59 Fed. Reg. 26,208, 26,208-09 (1994). Return to text.

[213] See GARFINKEL, supra note 149, at 138. Return to text.

[214] See id. at 138-39. Return to text.

[215] See id. at 57-58. Return to text.

[216] See Gary H. Anthes, Why You Didn't Cyberfile, COMPUTER WORLD, May 13, 1996, at 28, 28. Return to text.

[217] See id. Return to text.

[218] See James M. Smith, Mail No One Can Steam Open: Postal Service Will Lock Messages in Electronic Envelopes for Security, GOV'T COMPUTER NEWS, July 31, 1995, at 90, 90. Return to text.

[219] See William Jackson, Postal Service Gives Digital Signatures a Dry Run In-House, GOV'T COMPUTER NEWS, Aug. 21, 1995, at 8, 8; Jill Gambon, An On-line Post Office: Technology to Help Postal Service Get into Electronic Commerce, INFO. WK., May 1, 1995, at 28, 28. Return to text.

[220] See Kevin Power, Digital Signatures: GSA Tosses a Hot Potato Back to NIST Lab, GOV'T COMPUTER NEWS, Oct. 2, 1995, at 1, 1. Return to text.

[221] See id. at 71. Return to text.

[222] See ELECTRONIC SIGNATURES, supra note 8, at 47. Return to text.

[223] See GARFINKEL, supra note 149, at 138. Return to text.

[224] See Ellis Booker, Authentication Authority Formed to Check Digital IDs, COMPUTER WORLD, June 26, 1995, at 12, 12. Return to text.

[225] See id. Return to text.

[226] See Andrew Kantor & Tristan Louis, The Internet: You Can Bank on It, INTERNET WORLD, Sept. 1995, at 12, 12. Return to text.

[227] See id. Return to text.

[228] See id. Return to text.

[229] See id. Return to text.

[230] See id. Return to text.

[231] See id. Return to text.

[232] The ABA guidelines also offer a framework for digital signature laws. See discussion infra part IV.D.4. Return to text.

[233] See Digital Signatures Act, ch. 61, 1995 Utah Laws (WESTLAW) (codified as amended at UTAH CODE ANN. 46-3-101 to -504 (Michie 1996)); Act of Sept. 5, 1995, ch. 594, 1995 Cal. Legis. Serv. (West, WESTLAW) (codified at CAL. GOV'T CODE 16.5 (West 1995)); Act of Mar. 14, 1996, ch. 20, 1996 Wyo. Sess. Laws (WESTLAW) (to be codified at WYO. STAT. ANN. 9-1-306); Act of Mar. 29, 1996, ch. 250, 1996 Wash. Legis. Serv. (West, WESTLAW). Return to text.

[234] See Kevin Power, Short of Cash, NIST Hands Off Its Digital Signature Program, GOV'T COMPUTER NEWS, May 1, 1995, at 1, 1. Return to text.

[235] See Digital Signatures Act, ch. 61, 1995 Utah Laws (WESTLAW) (repealed and reenacted 1996). Return to text.

[236] See Digital Signatures Act, ch. 205, 1996 Utah Laws (WESTLAW). Return to text.

[237] UTAH CODE ANN. 46-3-102 (Michie 1996). Return to text.

[238] See id. 46-3-103(11), -3-201. Return to text.

[239] See id. 46-3-201. Return to text.

[240] See id. 46-3-301. Return to text.

[241] See id. 46-3-103(3). Return to text.

[242] Id. Return to text.

[243] See id. 46-3-401. Return to text.

[244] See id. 46-3-401(1)(a). Return to text.

[245] See Benjamin Wright, The Verdict on Plaintext Signatures: They're Legal, available for on-line purchase at < http://infohaus.com/access/by-seller/Benjamin_Wright> (on file with Fla. Legis. Jt. Comm. Info. Tech. Resources). Return to text.

[246] See id. Return to text.

[247] See UTAH CODE ANN. 46-3-302 (Michie 1996). Return to text.

[248] See id. 46-3-201. Return to text.

[249] See id. 46-3-301. Return to text.

[250] See id. 46-3-309. Return to text.

[251] See id. 46-3-309(1) Return to text.

[252] See id. 46-3-309(2). Return to text.

[253] See Act of Sept. 5, 1995, ch. 594, 1995 Cal. Legis. Serv. (West, WESTLAW) (codified at CAL. GOV'T CODE 16.5 (West 1995)). Return to text.

[254] See CAL. GOV'T CODE 16.5(a) (West 1995). Return to text.

[255] See id. Return to text.

[256] See id. Return to text.

[257] See id. 16.5(a)(5). Return to text.

[258] See id. Return to text.

[259] Id. 16.5(d). Return to text.

[260] See id. Return to text.

[261] See id. Return to text.

[262] Act of Feb. 23, 1995, ch. 125, 1995 Wyo. Sess. Laws (WESTLAW) (codified as amended at WYO. STAT. ANN. 9-1-306 (Michie 1996)). Return to text.

[263] Act of Mar. 14, 1996, ch. 20, 1996 Wyo. Sess. Laws (WESTLAW) (codified at WYO. STAT. ANN. 9-1-306 (Michie 1996)) Return to text.

[264] See WYO. STAT. ANN. 9-1-306 (Michie 1996). Return to text.

[265] See id. 9-1-306(a)- (b). Return to text.

[266] Id. 9-1-306(b)(v). Return to text.

[267] Id. 9-1-306(b)(vi). Return to text.

[268] See id. 9-1-306(d). Return to text.

[269] Ch. 250, 1996 Wash. Legis. Serv. (West, WESTLAW). Return to text.

[270] See generally id. Return to text.

[271] See id. 602. Return to text.

[272] See ABA GUIDELINES, supra note 107. Return to text.

[273] See id. Return to text.

[274] See DIV. OF CORP. AND COM. CODE, UTAH DEP'T OF COM., UTAH DIGITAL SIGNATURE LAW 1 (1995). Return to text.

[275] See 80 C.J.S. Signatures 1(c) (1953). Return to text.

[276] See ELECTRONIC SIGNATURES, supra note 8, at 52 (citing FLA. STAT. 1.01(4) (1995)). Return to text.

[277] Id. Return to text.

[278] See id. Return to text.

[279] See id. Return to text.

[280] See id. Return to text.

[281] See id. Return to text.

[282] See id. at 53. Return to text.

[283] See id. Return to text.

[284] See id. Return to text.

[285] See id. Return to text.

[286] See id. Return to text.

[287] See id. Return to text.

[288] See id. Return to text.

[289] See id. at 53-54. Return to text.

[290] See id. at 54. Return to text.

[291] See id. Return to text.

[292] See id. Return to text.

[293] See id. Return to text.

[294] See id. Return to text.

[295] See id. Return to text.

[296] See id. Return to text.

[297] See id. at 54-55. Return to text.

[298] Fla. SB 942 (1996). Return to text.

[299] Repub., Seminole. Return to text.

[300] Fla. HB 1023 (1996). Return to text.

[301] Dem., Boca Raton. Return to text.

[302] Electronic Signature Act of 1996, ch. 96-224, 1996 Fla. Laws 837. Return to text.

[303] See id. 2, 1996 Fla. Laws at 837. Return to text.

[304] See id. Return to text.

[305] See id. 2(1)-(2). Return to text.

[306] Id. 3, 1996 Fla. Laws at 837 (amending FLA. STAT. 101(4) (1995)). Return to text.

[307] Id. 4, 1996 Fla. Laws at 837-38 (codified at FLA. STAT. 282.72 (Supp. 1996)). Return to text.

[308] Id. 4(4), 1996 Fla. Laws at 838 (codified at FLA STAT. 282.72(4) (Supp. 1996)). Return to text.

[309] Id. Return to text.

[310] See id. 4(1)-(3) (codified at FLA. STAT. 282.72(1)-(3) (Supp. 1996)). Return to text.

[311] See id. 5, 1996 Fla. Laws at 838 (codified at FLA. STAT. 282.73 (Supp. 1996)). Return to text.

[312] See discussion supra Part IV.D.3. Return to text.

[313] Electronic Signature Act 4(4), 1996 Fla. Laws at 838 (codified at FLA. STAT. 282.72(4) (Supp. 1996)). Return to text.

[314] See id. 5, 1996 Fla. Laws at 838 (codified at FLA. STAT. 282.73 (Supp. 1996)). Return to text.

[315] See id. Return to text.

[316] See id. 6, 1996 Fla. Laws at 838 (codified at FLA. STAT. 282.74 (Supp. 1996)). Return to text.

[317] See id. Return to text.

[318] See id. Return to text.

[319] See id. Return to text.

[320] "Nothing in this section shall be construed to compel any public or private entity to participate in the Secretary of State's certification program, as authorized in this section, in order to verify digital signatures." Id. Return to text.

[321] Id. 7, 1996 Fla. Laws at 838 (codified at FLA. STAT. 282.75 (Supp. 1996)). Return to text.

[322] Id. Return to text.

[323] See id. 8, 1996 Fla. Laws at 838-39 . Return to text.

[324] See id. Return to text.

[325] See id. Return to text.

[326] See id. Return to text.