{"id":558,"date":"2004-09-01T00:00:00","date_gmt":"2004-09-01T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/09\/01\/china-legalizes-electronic-signatures-to-promote-e-commerce\/"},"modified":"2021-12-30T11:37:40","modified_gmt":"2021-12-30T11:37:40","slug":"china-legalizes-electronic-signatures-to-promote-e-commerce","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/09\/01\/china-legalizes-electronic-signatures-to-promote-e-commerce\/","title":{"rendered":"China Legalizes Electronic Signatures To Promote E-Commerce"},"content":{"rendered":"<p>China&#8217;s parliament has legalized electronic signatures in an effort to boost its small but growing online commerce industry.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The law gives such signatures the legal status of handwritten signatures and allows the creation of companies to verify the identity of participants in an online transaction, the official Xinhua News Agency reported.<\/p>\n<p>In China, 87 million people use the Internet.  But E-commerce has grown slowly, held back by a low rate of credit-card use and a lack of other online payment options and legal structures.<\/p>\n<p>http:\/\/www.internetweek.com\/breakingNews\/showArticle.jhtml?articleID=46200171<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-558","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=558"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/558\/revisions"}],"predecessor-version":[{"id":3045,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/558\/revisions\/3045"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}