INTRODUCTION
Over the past decade, a “silent revolution” in payment systems has occurred with the introduction and implementation of e-payment systems. Aided by the rapid proliferation of information and technology, it has not been without inherent problems. Although e-payment systems have enhanced interoperability, convergence and competition in the payment industry (and, from a user's perspective, efficiency and flexibility), the ensuing migration to the systems has aggravated the risk of cybercrime and undermined trust and confidence in payment services and their providers.Footnote 1 Likewise, banks and other providers of e-payment services have become more susceptible to large-scale data breaches, while users face the risk of financial losses from identity theft and fraud. Therefore, effective e-payment regulation is central to building trust and confidence in electronic transactions, particularly for developing countries in their bid to bridge the digital gap and leverage the benefits of the global market.
The European Central Bank aptly defines e-payments as payments made over the internet using remote payment card transactions, online banking systems or e-payment providers with which the consumer has set up an individual account.Footnote 2 Nigeria is a good example of a developing nation that is increasingly pushing for the adoption of these systems.Footnote 3 As recent government policiesFootnote 4 demonstrate, objectives include developing internationally recognized payment systems and achieving global digital market integration. Thus, migration to card transactions and other electronic payments has increased. However, with that migration, Nigeria now faces significant challenges in securing payments. Because of its rather unsavoury reputation related to scams, advance fee fraud, identity theft and cybercrime in general, there is a shadow of suspicion over electronic transactions and communications originating from or terminating in the country.Footnote 5 Effective regulation of the relatively new e-payment systems could therefore represent a significant opportunity to build trust and control crimes in e-payment systems.
This article argues that, as presently constituted, regulation in Nigeria focuses exclusively on technology-based solutions and payment card industry data security standards (PCIDSS),Footnote 6 an industry private ordering not supported by any mandatory legal requirements. This approach is unsustainable for three reasons. First, e-payments are a multi-stakeholder environment comprising banks, as well as financial and non-financial institutions. As such, a private ordering arrangement designed for banks and other financial institutions may not be effective outside that industry unless it is recognized as applicable and binding. Secondly, the technical standards on which the system depends are inefficient because there are no laws mandating security standards or compliance with the standards. Thirdly, there are serious public interest concerns that limit the effectiveness of private ordering. In the context of e-payments, public interest concerns include controlling cybercrime and correcting market failures, as well as the need for fairness, transparency and clarity in the adjudication and administration of justice.Footnote 7
This article argues that law is crucial to engendering the efficiency and legitimacy of e-payment regulation because of its capacity to regulate multiple players in the heterogeneous e-payment market and to enforce technical standards. Law plays a central role in ensuring that public concerns in e-payment systems are adequately addressed. However, since the choice between private ordering and state regulation cannot be binary in the complex environment of the internet, Lessig's theory of modalities of regulation in cyberspace is used to highlight how the law would regulate efficiently in the context of e-payment systems and services. Lessig's model is essential to a critical understanding of the argument that private ordering is inherently weak and subject to manipulation by the payment industry. The theory also justifies the proposition that regulation through formal rules is better at securing recognition and acceptance for regulatory mechanisms and fostering compliance.
The article starts with a brief analysis of how private ordering fits into the broader debate on regulation. It then considers the threats posed to e-payment systems and how the integration and convergence of e-payment and other services undergird the inadequacy of regulation in Nigeria. The article further evaluates the efficiency of industry-mandated technical standards and PCIDSS as a private ordering mechanism. It argues that, while private ordering can be quite efficient, it is inherently limited in heterogeneous markets and seldom caters to the public interest. Therefore, to achieve the non-efficient goals of regulation, the government needs to constrain private actors. The article concludes with a proposal for a regulatory approach that models Lessig's theory of modalities of regulation in cyberspace. It reformulates Lessig's regulatory modalities of code, market, norms and law to develop a proposal that incorporates technologies, users, industry and law. It argues that a correct synthesis of these modalities leads to efficient regulation of e-payment processes, instruments and institutions, legitimizes the regulatory process and addresses public interest concerns.
REGULATION BY PRIVATE ORDERING: LEGITIMACY AND PUBLIC INTEREST CONCERNS
The meaning and scope of regulation is varied and contested. Morgan and Yeung have argued that “regulation is a phenomenon that is notoriously difficult to define with clarity and precision, as its meaning and the scope of its inquiry are unsettled and contested”.Footnote 8 However, a useful way to navigate the regulatory debate is to consider its broad and narrow meanings based on the origin or source of a regulatory framework. In a narrow sense, regulation refers to formal legal rules aimed at controlling the behaviour of entities or individuals.Footnote 9 This so-called command and control model of regulation implies regulation by law or at least by state-appointed actors with the objective of benefiting society or a section of society. In a broader sense, regulation refers to any form of behavioural control, whatever its origin.Footnote 10 This notion of regulation includes both state and non-state actors and includes all forms of social and economic influence designed to affect behaviour, whether it is state-based, from markets or comprises self-regulatory mechanisms in professions or trades.Footnote 11
Private ordering refers to rules, regulations and codes of practice developed by private actors (such as industry, firms and sectors) to influence behaviour within the firm, sector or industry.Footnote 12 Private actors often voluntarily adopt codes and observe rules without government sanction and enforcement.Footnote 13 PCIDSS is an example of private ordering in the payment industry. PCIDSS is an established global standard for cardholder account protection across all parties in the payment chain, including acquirers, third party processors and merchants.Footnote 14 Its core framework consists of 12 requirements organized under six functional goals and requires a combination of physical, technical and operational measures to protect cardholder data, whether in storage or transmission.Footnote 15 The standard was developed in response to an increasing incidence of cardholder account theft and is intended to help organizations proactively protect customer account data.Footnote 16
The purported legitimacy of private ordering comes from its ability to utilise market incentives to allocate public resources.Footnote 17 Because it can avoid the expensive rule-making and enforcement processes that accompany state regulation, the most obvious advantages of private ordering are its efficiency in cost saving and its expertise in the rule-making process.Footnote 18 Conversely, because the rule-maker ultimately expects compliance from itself and because compliance with private ordering is almost always entirely voluntary, private ordering tends to undermine the “consequences” element of regulation. Also, because private ordering mechanisms can be diffuse, in that they tend to apply to homogenous sectors and their goals can therefore be quite narrow, private ordering tends to be limited in the way it addresses broader public interest issues. In line with Ogus, if the term “regulation” is used to denote law that implements a collectivist system, then arguably it must be taken that regulation contains the idea of a superior authority, being the state. It has a directive function and compels individuals and groups to behave in particular ways, and threatens sanctions if they do not comply. As a public law, it enforces requirements that cannot be circumvented by private agreement, because the state plays a central role in its formulation. This suggests that the characteristics of sanctions are often more noticeable in state or formal regulatory regimes and that state regulation is more efficient at modifying behaviour because it carries the threat of state enforcement and sanctions. It may also explain why references to regulation in political rhetoric are seldom taken to mean non-state regulation.Footnote 19 Furthermore, as Black defines it, regulation is “the sustained and focused attempt to alter the behaviour of others to standards or goals with the intention of producing a broadly identified outcome or outcomes, which may involve mechanisms of standard setting, information gathering and behaviour modification”.Footnote 20 Therefore, even when non-state actors (such as social norms, technologies or markets) influence how regulatory systems operate, and while regulatory systems might harness these influences toward a regulatory end, they do not themselves constitute regulation.Footnote 21 Again, the suggestion here is that formal or legal rules are better at setting standards and achieving behaviour modification.
Surely, if regulation formally involves interference by a party that is not directly involved in or part of the activity involved,Footnote 22 the legitimacy of private ordering should be subject to scrutiny. However, legitimacy is arguably not necessarily tied to rules made by the legislature and also connotes recognition of the source of the rule, confidence in the rule-making process, and acceptance of the source and process through compliance with the rules, so alternative measures for any claim to legitimacy by private ordering systems must be explored.Footnote 23 Baldwin, Cave and Lodge provide a broader basis for adjudicating good regulation. According to them, although a legislative mandate (which implies that a regulatory framework derives authorization from an elected legislature) is one of the essential criteria of good regulatory regimes,Footnote 24 good regulation must also satisfy four additional criteria. These are: accountability and control, which underscores the need for regulators to be properly accountable; due process, which presupposes support for regulation because the procedures are fair, open and accessible; regulatory expertise, which denotes trusted regulator judgment based upon specialized knowledge, skills and experience; and efficiency, which implies that the legislative mandate in support of a regulatory regime is being implemented effectively.Footnote 25 In effect, while some of these criteria appear to depend on some formal monitoring or enforcement process, others (such as regulatory expertise) depend more on the industry and may arguably be attained by private ordering. Nevertheless, for a regulatory regime to be perceived as good and perhaps legitimate, it should arguably satisfy all four criteria.
More significantly, since rationalization that regulation proceeds in the “public interest” is often at the base of most regulatory instruments,Footnote 26 it is important for regulation to account for the public interest components of the regulated activity. As Mitnick argues, regulation is “the public administrative policing of a private activity with respect to a rule prescribed in the public interest”.Footnote 27 Selznik sees regulation as “a sustained and focused control exercised by a public agency over activities that are valued by a community”Footnote 28 and, in Lennes's view, the deliberateness and intentionality to bring about a regulatory end, which must be seen as a deliberate supervision of private activity in the interest of public rights, interests and welfare, is what qualifies an activity as truly regulatory in the first place.Footnote 29 These definitions underline the public interest theory of regulation, which justifies regulation as a corrective to perceived deficiencies in the operation of the market.Footnote 30 The theory underpins regulation as a restrictive activity directed toward private entities on the basis of general rules that are conducive to the public interest.Footnote 31
It is not the authors’ intention to get into extensive argument about the meaning and scope of public interest, yet it is relevant to note that public interest is a contested and nebulous concept. Public interest has been described as a vague and indeterminable concept,Footnote 32 and a catch-all phrase for the subjective interest of lawmakers or powerful interest groups.Footnote 33 According to Feintuck, although “public interest has an air of democratic propriety, the absence of identifiable normative content renders the concept insubstantial, and hopelessly vulnerable to annexation and colonization”.Footnote 34 Nevertheless, he argues, some common elements of its contents are ascertainable.Footnote 35 Further, public interest must assume or underpin the existence of some interests common to all members of society and therefore mesh with society's dominant values.Footnote 36 It underlines certain democratic values and serves to complement human rights.Footnote 37 Public interest also assumes an ideal of general welfare and the maintenance of conditions that permit an ongoing social order.Footnote 38 Therefore, the nebulous nature of public interest notwithstanding, it is certainly right to assert that, in a regulatory context, intervention into private activity is justified by reference to an economic belief in the efficacy of competitive market forces.Footnote 39 For example, if market efficiency is a public goodFootnote 40 that could arguably be achieved by private ordering or self-regulation, it would still ultimately fall on government to regulate market efficiency in order to correct market failures. This is because public goods are susceptible to free-rider problems.Footnote 41 In this sense, even if the public interest is debatable, it appears that regulation in the public interest must seek the welfare, protection and benefit of the public at large or at least of a section of society. Correspondingly, it is arguable that, if regulation ultimately controls crimes, prevents or corrects market failures and imbues transparency in adjudication, it is unequivocally in the public interest.
These definitions and characteristics of regulation suggest that there are two problems with using private ordering as a regulatory model. The first is that it raises questions about whether the private ordering is legitimate in the sense that it satisfies the criteria of good regulation. The second and more crucial problem is whether it accounts for public interest concerns in e-payment services and systems. The following sections highlight how new cybercrime threats have forced new regulations and the ways in which these create legitimacy problems.
THE THREAT LANDSCAPE: CYBERCRIME AND THE LIMITS OF BANKING AND FINANCIAL GUIDELINES
There is a profound irony at the heart of this debate. Fraud was already endemic in Nigeria, even before the widespread use of computer systems. However, it is widely acknowledged that the use of electronic systems acted as a great facilitator and made the so-called “419” or “advance-fee” e-mail frauds remarkably successful.Footnote 42 The proliferation of “419 spam” exemplifies the internet-created opportunity. By offering global accessibility,Footnote 43 the internet effectively enabled fraudsters to send spam e-mails, typically requesting assistance in transferring illegally sourced funds to bank accounts abroad.Footnote 44 Perhaps due to the limited infrastructure for electronic money transfers and the stigmatization of the Nigerian political class as highly corrupt, many perceived these e-mails as credible and the e-mails were particularly successful with victims outside the country. The scale of the problem forced PayPal, the global payment service provider, to close all Nigerian accounts in 2005.Footnote 45
Partly because of existing cybercrime threats, government policies to promote e-payments in Nigeria were unsuccessful at first. However, in 2011, the Central Bank of Nigeria (CBN) introduced the “Cashless Nigeria” project. This project significantly improved migration to e-payments, primarily by penalizing cash transactions.Footnote 46 With the increasing adoption of e-payments, the threat of cybercrime changed significantly. Targets became more domestic and schemes evolved to match the increasing online population.Footnote 47 As the CBN admitted, fraud migrated to card-not-present transactions and other web-based payment applications.Footnote 48 Due to the ubiquity of the internet and increasing payment mobility (Nigeria has about 60 million internet users), it is reasonable to assume that data breaches, identity theft and fraud will increase. Hence, the CBN has made a significant effort not only to increase awareness of cybercriminals’ tactics and how users of e-payment services can avoid victimization, but also to recommend increased resilience of the payment systems’ infrastructure and work-streams to encourage the use of e-payment systems.Footnote 49
The CBN regulates e-payment services and transactions by issuing guidelines specific to different transactions. For example, its 2001 Guidelines on Point of Sale Card Acceptance Services (POS Guidelines) deal with card systems, mobile regulations deal with mobile payments and mobile moneys, and so on.Footnote 50 The problem is not that there are different regulations but whether the regulations are applicable across the broad spectrum of e-payment services and providers. To illustrate this, the POS Guidelines stipulate that computer networks used to transmit financial data over the internet must meet the required standards specified for data confidentiality and integrity. The precise standards specified by the regulations are that all payment service providers comply with PCIDSS, as a minimum use the 3DES encryption standard, and apply a minimum of two-factor authentication to verify user access to systems and services.Footnote 51 The use of public key infrastructure (PKI) is optional, as the e-banking guidelines provide that banks may need to consider the use of PKI to authenticate users.Footnote 52
Apart from the fact that Nigerian banks are affiliated with global card service providers and are therefore obliged to comply with PCIDSS by contractual agreements with relevant card networks, the CBN mandates compliance with PCIDSS by providing that, “[a]ll industry stakeholders who process and / or store cardholder information shall ensure that their terminals, applications and processing systems comply with the minimum requirements of the following [PCIDSS] Standards and Best Practices … In addition, all terminals, applications and processing systems should also comply with the standards specified by the various card schemes”.Footnote 53
The primary concern here is whether guidelines issued by the CBN will be accepted as generally binding by non-banks and non-financial institutions within the payment chain. The national electronic identity card clearly illustrates the problem. The e-identity card is expected to offer PIN and fingerprint authentication, digital signature and payment functionalities, and it has been proposed that all Nigerians be issued a national identity number, to be used for identification and account establishment purposes.Footnote 54 The card is designed to serve as both an identity card and a bankcard. This suggests that, although banks may be leading providers of e-payment services, non-banks and non-financial institutions, including the identity management authority, are now industry stakeholders who could potentially process and / or store cardholder information. If we assume that unregulated access could compromise consumer data on the Nigerian Identity Management Commission (NIMC) database, we begin to see how the adoption of technical security standards prescribed by the CBN could become problematic. Stated differently, although the POS Guidelines mention industry stakeholders, it must be presumed that these are stakeholders within the banking industry to which banking regulations apply; institutions like NIMC may not consider themselves bound to implement 3DES encryption or apply two-factor authentication or even comply with PCIDSS. The same argument applies to mobile network providers, which are regarded as providers of infrastructure or platforms on which mobile payments may be initiated and completed, or mobile money stored.Footnote 55
Although these factors can raise questions of legitimacy in the sense that the CBN rules and standards are not generally accepted or recognized as binding, they could also suggest that the guidelines are inherently limiting. The following sections analyse the limits of technical standards mandated by the CBN and PCIDSS even within the banking and financial industry where they must apply. They also assess the constraints of PCIDSS as a specific form of private ordering. The analysis highlights areas where formal laws would produce better regulation.
THE LIMITS OF TECHNICAL STANDARDS
It was noted above that the CBN prescribes compliance with PCIDSS, the use of a 3DES encryption standard and a minimum of two-factor authentication, as well as the optional deployment of PKI. In a sense, therefore, the industry relies on technology to regulate e-payment services and systems. Although technology-based security systems are of immense importance to users because technology regulates behaviour without requiring users to change their behaviour,Footnote 56 there are constraints on technology and three clear areas that may inhibit efficient regulation in Nigeria. These are cost, the industry-centred character of technology application and the fact that no security is completely impervious to threats.
Technology is expensive
The cost of implementing mandatory technologies, particularly PCIDSS, affects the willingness of industry stakeholders to deploy them. For example, although all parties (including acquirers, third-party processors and merchants, as well as all entities that store, process or transmit cardholder data) are expected to comply with PCIDSS, the level of compliance in Nigeria is questionable.
According to one estimate, the cost of fully implementing PCIDSS for a merchant in Nigeria is about USD 20,000, which is considerably more than the total operating capital of an average merchant.Footnote 57 Thereafter, the business needs an additional USD 1,000 per year for software updates to electronic points of sale.Footnote 58 Merchants must also bear the additional cost of periodic system vulnerability and compliance scans from third-party firms appointed by PCIDSS operators to ensure full and ongoing compliance. Arguably, this prohibitive cost can only be borne by the major players in the industry, such as banks and switching companies.Footnote 59 Invariably, cost is a barrier to entry into e-payment services and may also lead to compromises in security standards. As noted in PCIDSS's own guidelines, the prohibitive cost of compliance invariably leads to compromises in consumer information, such that businesses that are unable to encrypt data because of technical constraints or business limitations adopt compensating controls designed to mitigate associated risks.Footnote 60
However, beyond identifying the likely impacts of the prohibitive cost of PCIDSS, the payment industry has offered no viable solution. In fact, the possibility that service provider organizations will not deploy PCIDSS is heightened by the lax oversight. As an example, although the PCIDSS requirements are couched in mandatory terms, compliance is primarily determined through self-assessment. Additionally, while the Security Standards Council sets PCIDSS, it has no obligation to validate or enforce any organization's compliance with the standards or impose penalties for non-compliance. Enforcement and penalties are governed by card brands and their partners, who may impose financial penalties or withdraw card acceptance services.Footnote 61 There is therefore a lack of uniformity in the implementation of the standards, because each card brand has different programmes for compliance, validation and enforcement.Footnote 62
Whether or not these drawbacks indicate a need to re-evaluate PCIDSS, the authors argue firmly in favour of the establishment of an independent legal authority to enforce the standards, on behalf of either the Security Standards Council or the card brands.Footnote 63 Alternatively and more efficiently, legislation may set legal standards for securing card transactions and other e-payment services. Indeed, with developing countries such as Nigeria, the failure to legislate the regulation of payment card transactions translates to governments effectively ceding consumer protection to private law-making by card associations and banks.Footnote 64
Technology in industry regulation: Misuse in evidential matters
Another important aspect of regulation by technology is its near-total dependence on industry for implementation. Because of its highly technical nature, the deployment of technology is better understood by industry, and this may lead to discriminatory and even abusive use. Lessig noted that, because of the self-executing and independent nature of technology (or code) regulation, the application of law or legal constraints in cyberspace is inherently limited.Footnote 65 However, the most persuasive argument made is that, because code or technology can control better and more effectively than law, it may be misused, particularly by the market. As such, code may not strike a proper balance or protect the various values prescribed by law and may become quite arbitrary in its application. In other words, technology is not always a positive regulator and does not always constrain in a manner that promotes the law. Wu makes this point more forcibly by asserting that code could be used as a mechanism of avoidance rather than protection.Footnote 66
Although there have been no cases on this point in Nigeria, some cases in England demonstrate how abusive uses of technology by the financial and payment industry can undermine the judicial process and result in injustice.Footnote 67 The claim in Job v Halifax PLC (Job)Footnote 68 was for the sum of GBP 2,100 (with interest), which the claimant argued had been wrongfully debited from his account with Halifax Bank through the fraudulent use of his debit card. The bank admitted the debit but argued that it was justified because the money was withdrawn from the claimant's account using his card and correct PIN. However, in providing evidence, the bank declined to disclose card authentication keys because they were derived from a batch and would compromise other cards in issue. It was argued on behalf of the bank that key management procedures were commercially sensitive information and an outside expert witness could not verify the authentication codes in the logs. However, the claimant argued that these pieces of evidence were essential to the bank's claim that the transactions occurred. They were also necessary to prove that the protocols were flawless and tamper-proof, and particularly that the bank maintained appropriate security controls related to key management. Notwithstanding the bank's failure to produce the evidence, the claimant failed, and judgment was entered in favour of the bank.Footnote 69
Similarly, the claimant in Rahman v Barclays Bank (Rahman)Footnote 70 sought reimbursement from his bank for money debited from his account because of the fraudulent use of his debit card by a third party. Without requiring the defendant bank to provide strict proof, the court accepted its explanation that the fraud was committed because the claimant was negligent in that he gave the thief his card and other authenticating information. Also, without proof, the court accepted the defendant's assertions about the security of its authentication process and its electronic banking system. As the court itself observed, “[t]he bank did not put before the court any detailed evidence about the security information it sought from the fraudster. It had no record of the transaction, save in general terms”.Footnote 71 An important factor in this case is that the claimant might have prejudiced his case by his alleged untruthfulness regarding the circumstances surrounding the fraud. Nevertheless, when banks can succeed in defending claims by their customers without producing crucial evidence, there is a disincentive to retain such evidence and produce it when required. Conversely, if the law rendered the production of such evidence mandatory, banks would have no choice but to retain the evidence. As Mason and Bohm argue, “[i]f [the banks’] defence fails for lack of relevant evidence, they will soon enough learn to make sure to retain and produce it. Soft cases make bad law”.Footnote 72
These cases demonstrate how technology can serve as a shield and can also be used to manipulate legal and judicial processes. Such manipulations may lead to doubt as to whether justice was served in cases involving disputed transactions between banks and their customers. The provisions of the Nigerian Evidence Act give some indication that Nigerian courts may arrive at conclusions similar to those in Job and Rahman. The Evidence Act admits electronic signatures generally.Footnote 73 Section 93(2) provides that, “[w]here a rule of evidence requires a signature or provides for certain consequences if a document is not signed, an electronic signature satisfies that rule of law or avoids those consequences”. However, regarding the nature of e-signatures or the evidential weight or standard and burden of proof, the provisions of the law are quite vague. For example, section 93(3) provides that “[a]ll electronic signatures may be proved in any manner, including by showing that a procedure existed by which it is necessary for a person, to proceed further with a transaction, to have executed a symbol or security procedure for verifying that an electronic record is that of the person”.Footnote 74
It is not clear whether the act is referring to the mere generation of an e-signature or whether it incorporates the means of verifying the correctness of the procedure for creating the signature. For evidential purposes, the fact that a signature exists is not terribly important. It is more important to be able to verify the signer and to ensure that correct security protocols were implemented in creating the signature. Therefore, the manner of proving a signature depends largely on the type of signature in question. To illustrate, in contrast to simple e-signatures, advanced e-signatures (often referred to as digital signatures) use a combination of a mathematical algorithm and a key system to create a unique digital fingerprint associated with a person or entity. Moreover, digital signatures are supported by PKI, which enables third-party certification authorities to verify the authenticity of the signer. It is therefore logical to assume that a digital signature may be proved by reference to the protocols used to create the signature and the authority verifying its authenticity. However, because the act provides that a signature can be authenticated in any manner, regarding some symbols or procedures this vagueness may allow banks and other service providers to make arguments like those in Job and Rahman cited above. Stated differently, a bank may simply have to prove that certain security protocols exist without also having to prove that such protocols were, in fact, applied or correctly implemented. It is therefore arguable that the vagueness in the Evidence Act derives from the fact that Nigeria has no digital signature law. Digital signature laws often define different forms of e-signatures and delineate procedures for the creation and verification of the signatures; courts could routinely refer to such laws to determine the type of e-signature at issue, how it is created and who bears the burden of proof, as well as the weight or evidential value to ascribe to the signature.Footnote 75
Security is never “absolute”
Secured payments often depend on authenticating technologies. However, authenticators have different degrees of reliability. PINs, passwords, tokens and access codes that are based on authentication protocols of what a person knows or has are susceptible to criminal attacks and can be forged or stolen by hackers and phishers. Additionally, encryption combined with stronger authentication technologies such as digital signatures is still susceptible to criminal attacks, such as man-in-the-middle, unless PKI is fully deployed to minimize the risks.Footnote 76
In addressing the limits of technical security measures, it is pertinent to discuss biometrics, which are now touted as the “silver bullet” in combating identity-related cybercrime in Nigeria. The CBN introduced the use of biometrics for account holder verification in February 2014. Under the tagged biometric verification number (BVN) initiative, banks are required to register their customers’ biometric information, including their fingerprints and facial image. The objective of BVN is to use biometrics for the identification and authentication of account holders across the financial industry, thereby reducing customers’ exposure to identity theft and fraud.Footnote 77 However, while it is true that, unlike PINs, passwords and tokens, biometrics are permanently linked to a person, it is also correct that biometric characteristics, whether biological or behavioural, carry the risk of false performance. That is, biometrics can generate false positives and false negatives. False negatives deny access to otherwise authentic users, while false positives grant access to fraudulent users or impostors.Footnote 78 Fingerprint readers used during the Nigerian general elections sometimes failed to identify authentic voters, highlighting the problems associated with false negatives. In e-payment transactions, e-commerce and e-banking, false negatives and false positives may have further implications for financial loss. False negatives may cause payment systems to decline otherwise authentic transactions, while false positives may grant fraudsters access to victims’ financial information or even to the databases of organizations.
More crucially, identity databases, particularly those storing biometric information, are prone to identity theft attacks because of the inherent value of the stored information. In the case of BVN, the stakes are even higher, as a compromise to the database of any bank in Nigeria could potentially endanger biometric information stored by all banks in the country. For example, if legitimate user data is replaced with false data or stored biometric templates are deleted to facilitate re-enrolment, the same information will be compromised across all payment institutions and chains because the unique biometric is identical on all systems. This susceptibility suggests the need for another law: a data protection law that would set standards of protection for personal data collected and stored in proprietary databases.Footnote 79
PCIDSS AND MARKET CONSTRAINTS: INFORMATION ASYMMETRY AND EXTERNALITIES
Although industry standard-setting is a rule-making process and has a regulatory effect, the authors maintain that, even if the industry were willing, it would be unable to regulate e-payment systems to prevent cybercrimes such as identity theft and fraud without the coercive force of law. Market economy considerations create inefficiencies that limit the effects of industry's initiatives and discourage its investment in technological solutions.
Market systems and asymmetric information
Information asymmetry exists in markets where information about goods and services is unilaterally known to one party. This may be the seller or the buyer. In any case, markets in which information asymmetry exists are characterized by low quality products and high prices, because products cannot be distinguished by their characteristics. Where, for example, sellers hold exclusive information buyers are deprived of making informed decisions about price and quality. In other words, because information about quality is known only to the sellers, prices fail to signify quality to buyers and sellers of low quality products can sell at prices comparative to those of high quality products. This information deficit has additional consequences. First, it drives the sellers of high quality products out of the market because they cannot increase the prices of their products because of buyer ignorance regarding quality. The second consequence is the proliferation of poor quality products in the marketplace, which leads to buyers’ withdrawal from the market and ultimately market failure.Footnote 80 In financial and payment services terms, asymmetric information comes into play when providers of payment services promote or disclose the strong qualities of their products, such as efficiency, while withholding the negative features, such as weak security.Footnote 81
Concerns about information asymmetry are particularly useful in assessing the risk of identity theft in e-payment systems. Since non-cash transactions involve the transfer of personal information from the consumer to the seller, the seller's standard of safeguarding information is material to the customer's evaluation of the risk of the transaction. Where there is laxity, the cost of the product should be reduced to reflect the risk of misuse. That is, less secure products should sell for less, and more secure products should sell for more. However, because information asymmetry exists, this is not the case. Both secure and insecure products and services sell at relative prices. Providers of less secure products and services “free ride” on the market and will not lower their prices because consumers associate high price with high quality, and sellers of more secure products are unable to attract customers desiring such products because of the lack of price differentials. Overall, sellers of better security products operate at a loss, while providers of less secure products are profitable. Nevertheless, because payment systems’ integrity and efficiency are public goodsFootnote 82 (in the sense that the market as a whole suffers the consequences of identity theft), sellers with less security have no incentive to provide better security. In other words, if bad security precipitates data breaches and increased incidence of identity theft, consumers associate losses with the entire market and may therefore migrate from e-payment systems, causing market failure or total collapse.Footnote 83
This discussion can be placed in the context of the Nigerian financial market, which has been described as a market where fraud information is kept top secret.Footnote 84 This lack of transparency, which is characteristic of virtually all aspects of banking and financial transactions, includes information about conditions related to the use of financial products, transaction costs, and so on. Recognizing the need to review transparency practices in the financial market, the CBN noted:
“An important component of the review exercise was the development of a minimum disclosure requirement that stipulates the information banks are required to disclose to all customers prior to the consummation of every credit transaction. … The overreaching goal … is to produce a Guide that … will accommodate the freedom of operators to charge competitive prices, while protecting consumers from arbitrary and excess charges.”Footnote 85
These observations imply that service charges in the financial industry are seldom reflective of value and may be arbitrary regardless of quality. Banking applications and implementation standards for EMV cards (cards using the global standard for chip-based debit and credit card transactions, developed by Europay, MasterCard and Visa) exemplify how asymmetric information works in e-payment systems. According to Murdoch and Anderson, not only does the security of banking apps vary across platforms and suppliers, but, because most apps are proprietary, their vulnerabilities are known only to service providers. Additionally, while acknowledging the security of the EMV protocol, they argue that the protocol has numerous vulnerabilities, which are the inevitable result of implementation choices. Banks can choose, for example, to issue relatively inexpensive cards that use public key cryptography in the card authentication step or opt for cheaper cards that merely present a certificate signed by the issuing bank. These cheaper cards, which do not use PKI, are easier to clone.Footnote 86
It is possible to argue that consumers may be completely unaware of banks and other payment service providers with lax security systems. Consequently, products, services and charges are not comparatively and competitively priced. The CBN itself recognizes the effects of asymmetric information on the financial market and has concluded that it invariably leads to distrust and market collapse. The CBN has stated that, “customers do not perceive fraud as an issue with a specific bank, but with electronic payments overall, which eventually affects the entire industry and not just the institutions that have been impacted by fraud”.Footnote 87
It is important to note that, as information asymmetry is invariably a part of traditional markets, this position is unlikely to change. Organizations expect to protect their brands and withhold adverse information from customers unless they are legally compelled to disclose it. Therefore, it is the role of government to correct transactional imbalances and impose transparency rules through legislation.Footnote 88
Market systems and negative externalities
Externalities operate to confer costs or benefits on entities other than those who should bear them. They can be positive or negative. Positive factors confer benefits on those who cannot be charged for the benefits, while negative ones confer costs on those who should not bear the cost. In markets where the externalities are negative, entities most often engage in activities that impose costs on others and less often in activities that benefit others.Footnote 89 In the context of e-payments, if the risks of weak security, data breaches, identity theft and fraud are borne by individuals, society or other organizations, rather than by the payment service providers, there is less incentive for organizations to provide better security and therefore prevent the proliferation of negative externalities.Footnote 90 Two activities in the Nigerian payment industry demonstrate how externalities operate to displace the cost of fraud. First, the liability allocation regime already places the burden of fraud on the consumer or user. Second, through law enforcement, society appears to have assumed the cost of preventing fraud on e-payment platforms, thus providing a further disincentive to the industry.
How unclear rules about liability allocation promote the operation of externalities
The transaction alert system introduced by banks in Nigeria is a good example of how unclear policies promote externalities. Under the system, card or account holders receive alerts or notifications immediately when a transaction occurs on their account or payment card. The effect is to alert the card or account holder instantly to fraudulent transactions and forestall further fraud. Customers who receive notifications of unauthorized transactions are expected to notify the service provider immediately, which then “blocks” the account or card to prevent further use by the fraudster. Invariably, because it allows at least one fraudulent transaction even if it prevents others, the system amounts to “closing the stable door after the horse has bolted.” More importantly, bank customers may still be liable for losses that occur before the transaction alert, as, even if a transaction is fraudulent, it is not certain that the customer will be reimbursed or indemnified for the loss, and the bank does not guarantee that it will even investigate the loss.
This practice is correct since the regulatory framework allows parties the flexibility to determine where fraud liability falls. Under e-banking guidelines, “agreements reached between providers and users of e-banking products and services should clearly state the responsibilities and liabilities of all parties involved in the transactions”.Footnote 91 However, the guidelines fail to provide any meaningful guidance on the allocation of liability and offer little, if any, protection for users of electronic banking and payment systems. It is arguable, for example, that, while contracts constitute important evidence of an agreement between parties, contracts envisaged by the guidelines will usually be standard form contracts containing extensive exemption of liability clauses. Information asymmetry suggests that the parties’ respective bargaining powers are likely to be unequal because of the superior knowledge of service providers about product functionalities and security defects. Ultimately, however, if consumers bear their own losses, providers of e-payment services such as banks can externalize the cost of fraud.
Perhaps in recognition of the inefficiency (and even unfairness) of the existing liability allocation structure, the CBN proposed a card arbitration framework called the E-payment Dispute Arbitration Framework. The objectives of the framework include providing speedy redress for e-payment disputes without involving the courts. The framework is also intended to facilitate the identification of the entity at fault in disputed claims and shift liability toward that entity.Footnote 92 Again however, apart from the fact that the framework has yet to become operable, some of its provisions already suggest that it would be equally problematic and is unlikely to have much effect on the status quo. For example, item 5(d) of the framework provides that, “where a Cardholder uses an EMV Payment Card on an EMV Terminal and fraud occurs, liability is on the Cardholder. However, it is the responsibility of the issuer to prove to the arbitration panel that the Payment Card issued was the Payment Card used and the Payment Card was not reported stolen” (emphasis added).
Based on their literal construction, these provisions already carry a presumption that the cardholder is liable, without requiring the production of evidence regarding the security of the service provider's systems. Contrary to the arguments demonstrating that EMV cards can be compromised, especially when issuers influence the security design, the provisions appear to suggest that the cards are completely impregnable. Some provisions of the UK's Payment Services Regulations help to highlight the point here. Regulation 60(3) provides that, “[w]here a payment service user denies having authorised an executed payment transaction, the use of a payment instrument recorded by the payment service provider is not in itself necessarily sufficient to prove either that - (a) the payment transaction was authorised by the payer; or (b) the payer acted fraudulently or failed with intent or gross negligence to comply with regulation 57.”
Regulation 57 addresses the obligations of the payer / user to provide notification to the service provider of theft, misappropriation or unauthorized use of the payment instrument in the agreed manner without undue delay after becoming aware of the fact.Footnote 93 The cumulative effect of regulations 57(2) and 60(3) is to displace the presumption of negligence and collusion, which often follows a consumer's allegation of the unauthorized use of a payment instrument. The payment service provider is required to provide strict proof, even when it appears that the actual payment instrument issued has been used to authorize a disputed transaction.
Unlike the proposed card arbitration framework, the Payment Services Regulations place the burden of proving a disputed payment on the service provider and negate presumptions of negligence and fraud on the part of the user.Footnote 94 Therefore, since it merely promotes the presumption of negligence or collusion on the part of the cardholder, Nigeria's proposed card arbitration framework may produce results similar to those in Job and Rahman. As Mason rightly contends, any resulting decisions would be “incorrect decisions based on a misunderstanding of the burden of proof, a failure to properly test the evidence, and an acceptance of unwarranted assumptions”.Footnote 95
Society's assumption of the cost of fraud as an externality
An example of how society bears the cost of fraud in Nigeria is evident from the efforts of law enforcement agents aimed at combating cybercrime. Although Nigeria only recently passed a cybercrime law,Footnote 96 law enforcement agents already appear to have developed a typology of cybercriminals. The typology characterizes cybercriminals as male, between the ages of 18 and 33, typically well-educated (in the Nigerian context this means the person has been educated up to university level), unemployed and technology savvy.Footnote 97 To confirm their classification in any of the categories, suspected cybercriminals will also usually possess laptop computers or smartphones with the ability to connect to the internet almost 24 hours a day.Footnote 98 Such “suspects” may be classified as “Yahoo! Yahoo! Boys” (named after the search engine Yahoo!), or “419ners” (named after the section of the Nigerian criminal code that criminalizes impersonation). They may also be classified as engaged in a new form of electronic payment fraud called “cashless Lagos” in mimicry of the CBN's cashless policy. Classifying a person as a cybercriminal is often accompanied by indiscriminate searches of them or of their properties or premises.
Although indiscriminate searches clearly infringe on certain fundamental human rights,Footnote 99 the more pressing question is how law enforcement activities operate to externalize the cost of fraud. On the one hand, such activity is wasteful if not futile, because, before 2015, Nigeria had no cybercrime law under which “suspects” could be prosecuted and convicted. Yet society pays for the time and resources expended in conducting searches and investigating arguably non-prosecutable crimes. On the other hand, because the activities raise the presumption that cybercrime is being controlled, whether deliberately or inadvertently, service providers may fail to consider all the costs and benefits of their actions or inactions for other parties. In other words, providers may under-invest in security on the basis that cybercrime is being addressed or that its challenges are only marginal. To ensure that service providers continue to invest in up-to-date security, the law must set minimum security standards below which providers must not fall.
PRIVATE ORDERING AND THE INDEX FOR STRONG REGULATION
This article has argued that private ordering must meet the index of strong regulation identified as legitimacy, accountability, due process, expertise and efficiency. The establishment of the Nigerian Electronic Fraud Forum (NeFF) is a telling illustration of the inefficiency of a legislative mandate. NeFF is an all-stakeholder fraud forum established to monitor electronic fraud and encourage fraud reporting, information dissemination and information sharing among stakeholders. As stated in NeFF's annual returns, the forum was born out of the need for “a holistic approach to combat the menace of fraud and restore confidence in all e-payment mechanisms in the country”.Footnote 100 The rationale for establishing the body includes recognizing that electronic fraud attempts will increase significantly as Nigeria migrates to electronic payments, and the fact that the incidence of e-fraud is negatively impacting the entire financial industry. NeFF is mandated to form cohesive and effective fraud risk management practices through information and knowledge sharing with key industry stakeholders. NeFF, in conjunction with the CBN and Nigeria Interbank Settlement Systems, has also developed a dedicated portal for fraud reporting in the e-payment industry.Footnote 101 NeFF's establishment is therefore based on the overall assumption that cybercrime control will be more effective if payment institutions share fraud information and articulate a common requirement to law enforcement agents.Footnote 102
However, while NeFF is innovative in promoting collaboration, some of its objectives underscore existing inefficiencies and overall failures on the part of financial regulators. First, the fact that NeFF is projected as an alternative forum for fraud reporting is indicative of the failure of primary fraud reporting systems. It therefore impairs the regulators’ execution of their regulatory mandate and amounts to a reinvention of the wheel. Secondly, and consequential to the first reason, NeFF's effectiveness is questionable because it is likely to be perceived merely as a regulatory watchdog. For instance, if organizations will not report fraud to the CBN as a regulator, why would they exchange fraud information with NeFF, which is an initiative of the CBN and a convergence of competitors, regulators and law enforcement? In essence, it is reasonable to expect that fraud information disclosed at the forum will eventually be passed to regulators, with possible regulatory reprisals. This would inhibit the free dissemination of fraud information, which is NeFF's primary objective. From this perspective, NeFF may invariably represent a classic example of the failure of a legislative mandate. That is, NeFF is indicative of the failure of the CBN's legislative mandate to protect e-payment systems.
Furthermore, although regulatory guidelines provide that there must be a regular and ongoing assessment of compliance with PCIDSS, there are no fully functional monitoring processes in place in Nigeria. For example, the e-banking guidelines provide that “each vendor must provide valid certificates showing compliance with these standards, and must regularly review the status of all its terminals to ensure they are still compliant as standards change. [And] there will be a continuous review and recertification on compliance with these and other global industry standards from time to time”.Footnote 103 In contrast to this requirement, organizations are only subject to an initial inspection to determine whether they meet the compliance threshold (for which they receive a certificate). Thereafter, there is no framework to ensure that organizational practices are upgraded.Footnote 104 This invariably promotes the argument that existing private ordering lacks accountability and fails to comply with due process, and that PCIDSS itself is largely ineffective.Footnote 105
It therefore appears that, applying the index of measuring strong regulation, industry expertise will be the only strength of regulation by the e-payment industry in Nigeria. However, it has been previously argued that industry can manipulate its technological expertise to serve its own purposes. As such, industry may need to be regulated even in terms of how it applies this expertise. The concluding section of this article charts the way forward. The analysis justifies the interplay between different regulatory mechanisms and explicates the overall role of law in the regulatory schema.
HOW LAW REGULATES: LESSIG‘S MODALITIES OF REGULATION IN CYBERSPACE AND THE REGULATION OF E-PAYMENTS
Perhaps because there is much debate about the regulation of the internet itself, governments have been sceptical about the best approach to regulate the activities it mediates or facilitates. For example, it has been argued that, to facilitate internet growth and ensure the protection of fundamental rights, government intervention and formal rules are both unwarranted and unwanted.Footnote 106 However, it has also been argued that an unfettered internet is not an automatic guarantor of human rights and there is a need to regulate self-evolving rules and the institutions that administer them.Footnote 107 Although the latter argument is correct in that it justifies the need for law, much of the argument in this area fails to identify how the law would operate in the complex cyberspace environment.Footnote 108 Lessig addresses this gap by proposing that legal and policy solutions to the regulatory dilemma in cyberspace are found in the interplay between different regulatory modalities.
Lessig identifies four modalities of regulation, or “things that regulate”.Footnote 109 These are law, architecture, norms and the market. These modalities, as constraints to behaviour in real space, are transposable to cyberspace. According to Lessig, law constrains objectively because it provides a set of commands and threatens punishment for disobedience. As in real space, the constraints of law in cyberspace include the threat of sanctions for violations of certain rights or punishment for certain behaviours.Footnote 110 Social norms also limit, although in a manner that differs from legal constraints. The theory is that members of a community impose normative constraints through slight and sometimes forceful sanctions rather than centralized action of the state.Footnote 111 As the third modality of regulation, the market constrains through differential pricing. This is based on the fact that prices signal the point at which a resource can be transferred from one person to another.Footnote 112 The fourth, and perhaps most important modality of regulation, is the architecture of an environment, which encompasses the way things are or the way they are made or built.Footnote 113 In the context of regulation, architecture can either enable or limit interaction with the environment but, unlike the other three constraining modalities, architecture is independent of direct human imposition and is often automatically deployed or self-executing.Footnote 114 Therefore, code constrains without subjectivity and operates regardless of whether the party being constrained is aware of it.Footnote 115 To this extent, code has regulatory potential analogous to regulation by law and, indirectly or metaphorically, “code is law”.Footnote 116 However, as an overriding regulatory modality, law can modify, alter or enforce the code of cyberspace in a way that promotes the demands of commerce, society, policy and justice.Footnote 117
Lessig's theory compels the inference that, although individually the modalities of norms, market and technology do work, whether they are effective depends on the extent to which they are regulated by law. For example, as the “most obvious self-conscious agent of regulation”,Footnote 118 law will affect the other modalities in a manner that aids their roles as tools for legal regulation.Footnote 119 The following analysis reformulates and synthesizes Lessig's four modalities to propose a workable regulatory agenda for e-payment systems and underline the primary role of formal rules.
Regulating with law, industry, technology and users
Based on the analysis, it is arguable that only two of the modalities (technology and market) are currently represented in the regulatory arrangement for e-payment systems.Footnote 120 However, this article has argued that technology (or code) can be manipulated, and market systems are self-serving in the sense that they allow industry (or the market) to pursue its own goals and therefore promote the primacy of sector interests.Footnote 121 The article has also suggested that the public interests at stake include the prevention of crimes and correction of market failures, as well as certainty and transparency in the administration of justice. Thus, the authors propose to include two additional modalities of law and “users” in the regulatory framework.
Users are proposed as the fourth modality, not only because the lines of social norms are often ill-defined but also because it is difficult to develop an agenda for an enforceable norm. For example, Lessig's proposal of regulation by norms would beg the question of how generally acceptable norms will develop in the first place. This is particularly so as the cultural specificity of norms and the relativity of individual choice, as well as the fluidity and mobility of the internet, negate the permanence of engagements needed to sustain the development of generally acceptable norms. The idea of a global norm would therefore often be unattractive, as billions of people using the internet would not agree on regulatory norms.Footnote 122 Notably, beyond proposing that “norms could be used to respond to [the] threats … [and] Norms - among commercial entities, for example - may help build trust around certain privacy-protective practices”,Footnote 123 even Lessig was unable to provide clues as to how such normative frameworks would develop.Footnote 124 Rather, he concedes that, “how people who need never meet can establish and enforce a rich set of social norms is a question that will push the theories of social norm development far”.Footnote 125 Furthermore, because the effectiveness of norms depends largely on voluntary compliance, norms are analogous to the private ordering system and give rise to the same problems. Therefore, it would be correct to assert that the threat of enforcement is still necessary to cause people to conform to norms, and state enforcement is more certain and more secure than private efforts to coerce behaviour because the state can utilize its monopoly on the official use of force.Footnote 126
As an alternative to the contested notion of a collective norm, “users” is a more specific term, which underscores the fact that the problem surrounds a group of people more likely to make individual rather than collective decisions. In the context of e-payment systems, it addresses the ability or inability of respective users to articulate their choices in view of the payment instruments, processes and providers they select. Additionally, because of their susceptibilities to social engineering, users are invariably part of the problem. Humans, unlike technology, can demonstrate extreme levels of variation in skill and do not always follow logical rules in conduct. They can be emotional actors, inevitably partial, driven by perception and emotion as much as by objective reality.Footnote 127 Indeed, users are considered the weakest link in the security chain. The Verizon data breach report noted that humans are the “the carbon layer” of information assets and are therefore notoriously susceptible to social tactics, including deception, manipulation and intimidation. Therefore, as the report concludes, while humans are the most complex creatures on earth, savvy threat agents or criminals have consistently outwitted them or otherwise leveraged them to steal data.Footnote 128 Since users are invariably part of the problem, the authors propose to make them part of the solution. Murray's observations that users are not to be considered passive recipients of regulatory initiatives support this point.Footnote 129 Again however, like technology and the market, users only operate effectively if the law intervenes and sets certain standards.
Scepticism regarding the ability of users to protect themselves ranges from the complexity of technical security to ignorance or lack of awareness. To illustrate, while certificate-based authentication may help users to verify an entity by linking its public and private keys, it is debatable whether lay users can understand why the authentication protocol is necessary or what to look for, such as the security padlock, or even how to check certificates. In Nigeria, three further reasons account for why users cannot regulate themselves or prevent cybercrime. The first is the proliferation of pirated and unlicensed software. In 2011, a global piracy study put the rate of PC software piracy in Nigeria at 82 per cent, which is almost twice the global piracy rate. The same report put the rate of unlicensed software installations at 81 per cent in 2013.Footnote 130 Since the links between cyber-security and pirated software are well documented, it is safe to assume that, if the Nigerian market is saturated with pirated software, most end-user products, including anti-virus programmes, will also be defective and unreliable. The second reason that casts doubts on users’ ability to regulate without laws is the volatile threat landscape for e-payments. In other words, cybercrime remains a challenge because the threat landscape is evolving, and it is unlikely that providers and users can keep up with criminal tactics. To illustrate, since mobile devices are increasingly used for banking and payments, criminals are bound to migrate from computers and e-mails to mobile platforms to leverage attacks. In this event, user education serves a limited purpose and may have no effect at all on the rate of victimization.
The third, perhaps most important, reason is that technology is now being developed in Nigeria to address user volatility and unpredictability in the regulatory environment. Therefore, users are more likely to be regulated by technologies embedded into payment processes, services and instruments, rather than their own choices. This approach is not particularly complex, but is controversial. Some technologies described as having lock-in effects exemplify the potential problems. Lock-in technologies modify or alter the behaviour of actors in ways that ensure compliance with law or regulation or with industry standards for protecting privacy and security. Built-in security processes embedded in privacy by design and privacy-enhancing technologies serve as good examples. Privacy by design processes embed privacy features into design specification, implementation and networked infrastructures from the outset. This entails built-in privacy requirements from the onset of a system's development and throughout its life cycle.Footnote 131
Consistent with this approach, and with the notion that technology is self-executing when it comes to constraining human behaviour, the CBN introduced the BVN into the Nigerian banking industry. This article has already discussed the features of the BVN and the implications for regulating users are significant. Although it is not entirely clear how the BVN will work, the presumption is that enrolment of individual biometrics would ensure that users are unable to access their accounts unless they are physically present at the point of sale. The BVN system therefore has the potential to create a lock-in effect, by employing technology to bypass certain user behaviours, such as the ability to share one's PIN with other people. However, precisely because of their capacity to compel obedience, “lock-in technologies” are controversial. They raise questions about legitimacy, choice and legal regulation that are fundamental to the user's role in regulation and fraud prevention in e-payment systems.
Beyond private ordering: Legitimacy, accountability and due process
Lock-in technologies, also referred to as “techno-regulation”,Footnote 132 are defined as the deliberate employment of technology to regulate human behaviour.Footnote 133 Jaap-Koops characterizes them more aptly as “technology with intentionally built-in mechanisms to influence people's behaviour”.Footnote 134 Perhaps significantly in his analysis of techno-regulation, Brownsword argues that there are moral and ethical implications of design-based technologies aimed at controlling harm-generating behaviour and technologies when they function in ways that override human choice, free will and dignity. Such a view allows for little controversy when arguing that human dignity implies that people should be able to choose not only right actions, but also wrong ones. Accordingly, because design-based technologies impose behavioural constraints on their subjects, they deprive those subjects of the opportunity to choose between right and wrong.Footnote 135
Although a distinction may be made between design-based technologies that operate directly on individuals’ decision-making processes and those that seek to restrict the exercise of individual judgment without overriding that judgment altogether, there are legitimate concerns that the technologies may generally jeopardize constitutional values. For example, they may limit the opportunity to appeal to the discretion and judgment of enforcement officials against the inappropriate or unfair application of regulatory standards.Footnote 136 Certainly, design-based technologies raise these concerns even when they are incorporated to enforce legal norms. Jaap-Koops indicated that, if technology's only use is to enforce prevailing legal norms, its acceptability should be called into question, since the transformation of “ought” or “ought not” to “can” or “cannot” threatens our human interpretation of norms that represent bedrock elements of law in practice.Footnote 137
These arguments would be correct to the extent that they identify the corrosive effects of design-based technologies on legitimacy and accountability. However, if the arguments tend to suggest that lock-in technologies reduce users to robotic recipients of industry's inventions, they would be incorrect. To support this point, it is important to note that progressive technological modifications have been used to respond to user problems in payment systems. As an example, by design, mere possession authenticated the use of credit cards, but this also created an incentive to steal the card, as any holder could use it. To correct this, subsequent ATM cards were designed with a required PIN. This means that the user must not only have the card but must also know the PIN. There is less incentive to steal this card unless the thief has access to the PIN. However, the technology also proved susceptible because users wrote PINs on their cards or kept them with the cards. To increase confidence further that the holder of the card is the authorized user, biometric technologies such as fingerprints and retinal scans were introduced. Technology is also now being advanced to integrate behavioural biometrics, including typing speed, touch pad dwell time, key selection and angle of mouse movements into mobile devices and web applications to build further confidence in authentication processes.
To summarize, the application of behaviour-modifying technology is neither new nor novel. Such technologies have evolved progressively, particularly in response to the criminal exploitation of payment instruments and user-associated problems. This position is correct even if regulatory motivations are unclear or when regulatory intentions are not clearly spelt out. It would be sensible to argue that the nature of complex regulatory environments often means that regulation has varying degrees of transparency. Whether noticeable or not, regulation is justified by the need to protect the regulated entity and others.Footnote 138 Therefore, one may view technologies that lock in or restrict user choices and preferences as a means of protecting users even from themselves, while at the same time achieving the interests of government and industry in regulating behaviour. In effect, enrolling user biometrics for account authentication, as in the case of the BVN, will not in and of itself be illegitimate. However, to ensure the effectiveness of users in the regulatory framework, the law must also ensure that providers are transparent and accountable.
As examples, while it would be quite arbitrary for the law to impose limitations on how consumers transfer their personal information, the law can set fundamental standards of behaviour sought to be locked in. Therefore, the law could define what constitutes personal information in order to identify the information that providers are obliged to protect. Additionally, legal requirements that the most effective or up-to-date technical safeguard be used may form the basis for integrating biometric technologies into payment instruments and processes, and for securing access to the biometric databases. Without such laws, the risk of fraud arising from data breaches or organizational misuse of data corresponds to the benefits provided by the lock-in technologies. In other words, consumers of the services could be locked into a false sense of security if criminals gain access to identity databases. Arguably, in such circumstances, criminals would have less need of the information that technology protects.
Furthermore, laws would be needed to set out evidential requirements to establish that correct security protocols have been implemented into payment instruments or processes that have lock-in effects. Job and Rahman highlight the need for transparent rules on evidence when security protocols are in question. The proposed Nigerian electronic identity card mentioned above also clarifies the point here. It was noted that the identity card would be embedded with payment functionalities. Conversely, one of the proposed security features of the card is the deployment of firewall technology to separate and protect the financial information on the card.Footnote 139 It is therefore possible to argue that, unless the protocols used to implement such a separation are ascertainable and verifiable, allegations of unauthorized access may be difficult to resolve.
Based on this analysis, the security for e-payments depicted in Figure 1 below shows how regulation should be framed to enable the law to affect each modality within the regulatory schema.
As shown in Figure 1, the law is at the apex of the regulatory schema. Industry follows because it can readily modify technology. Therefore, direct regulation of industry by the law would promote the development of high technical standards for security. Having derived its legitimacy from legal rules, technology can be used to constrain user behaviour. To cite a few of many possible examples, data protection law may provide that organizations use the most up-to-date, if not state-of-the-art, technology to protect personal information. Additionally, laws regulating electronic payment services may impose liability on providers in certain circumstances where authentication or authorization is contested. Digital signature laws may allocate evidential value to electronic signatures and identity management laws would ensure that all organizations, irrespective of sector, implement strong identity management standards.
There are two reasons why the regulatory modalities must operate in the order proposed above. First, the order is important to address the peculiar nature of technology and cyberspace and the inability of the law to affect users and technology directly as modalities of regulation. For example, the law has no direct impact on user behaviour, but technology does. Although technology standards may be translated into legal rules, laws cannot directly regulate technology because technology is evolving, and the volatility of technology means that security mechanisms quickly become elementary and outdated. However, since industry can readily modify technology, direct regulation of industry by legislation would promote the development of high technical standards for data security. The order therefore allows the development of specific rules that may be modified as technology evolves. Secondly, the order ensures that, in any case, the rule-making process starts with explicit efforts by the state rather than industry. Thus, while not effectively displacing private ordering such as PCIDSS, it does not also require the codification of the standards to achieve desirable security standards. In effect, while involving the state in the regulatory arrangement, the regulatory framework dispenses with the assumption that industry will ultimately write the same rules as the regulator; rather, it promotes legal standards in favour of considerable discretion of the target over internal systems. This point distinguishes the proposed framework in this article from intermediate regulation such as meta-regulation. Meta-regulation, also often referred to as “mandated self-regulation” or “enforced self-regulation”, involves efforts by governmental authorities to promote and oversee self-regulation. As demonstrated in this article, the public interests at stake undermine an assumption that industry will develop rules congruent to the state. Therefore, the main problem with meta-regulation, also demonstrated in the analysis of PCIDSS, is that, even if businesses have better information to find solutions to public interest problems, they do not necessarily have better incentives to do so.Footnote 140 The authors also argue that discretion is undermined by the industry's inability (regardless of willingness) to protect public goods or develop legal principles relating to standards of proof, fairness and transparency.
CONCLUSION
The question of whether regulation is legitimate or effective must be answered in the context of the principal characteristics of good regulation and how it meets public interest requirements underpinning regulatory activities. This article has argued that, although non-state actors now function as regulatory agents for e-payment systems, their effectiveness is limited because e-payment represents a heterogeneous market. Therefore, unless banking rules requiring compliance with industry private ordering are generally accepted and recognized, private ordering in e-payments may grapple with questions of legitimacy. Furthermore, because market constraints (such as information asymmetry and externalities) can undermine even the most effective self-regulatory regimes, it is necessary for the law to intervene in the regulatory process. The analysis of technical standards for security highlights the fact that, given the self-executing nature of technology (or code) and the industry's expertise in developing and implementing technical standards, technology could be quite effective as a regulatory mechanism. However, the effectiveness of technical standards is also limited because the standards themselves may not apply across the broad spectrum of e-payment services. What becomes clearer from a consideration of Lessig's theory of modalities of control in cyberspace are the perils of technology-based solutions. While conceding that technology plays a fundamental role in regulating activities online and admitting that “code is law”, Lessig underlines the malleability of technology to abuses and underscores the need for legal regulation of technology and the industry that produces the technology.
Therefore, because the industry has the tendency to manipulate technology and abusive use can distort perceptions of fairness and justice, laws must be developed not only to set general standards of technical security but also to build accountability, due process and even legitimacy into the regulatory process. As the article further suggests, preventing crime and correcting market failures as well as building trust and confidence in electronic transactions through transparent rules and the fair adjudication of contentious cases are public policy issues that override private ordering in e-payment systems. The government must intervene with rules, setting liability standards so that industry does not use technology either to displace the burden of proof or to avoid liability altogether. Because market efficiency is a public good, formal laws are required to correct market failures and displace externalities as broader public interest concerns, which are not necessarily the focus of private ordering systems. This article has demonstrated that legal regulation is justified, not only because the law is the most obvious self-conscious agent of regulation, but also because it infuses accountability, due process and legitimacy, as well as efficiency, into the regulatory process.
Significantly, the analyses and findings in this article suggest that the proposed regulatory framework has a wider application beyond Nigeria. For example, Kenya with its widespread adoption of M-pesa,Footnote 141 Ghana and Tanzania, which are currently developing electronic means of payment, and South Africa, which has the most developed e-payment systems on the African continent, all share similarities in demographics, security and regulatory challenges. These countries all have an increasing population migrating to e-payments with the subsequent global threat posed by cybercrime. They also have similar regulatory systems based largely on narrow finance industry-driven initiatives. The proposals in this article could therefore be applied to e-payment processes, instruments and institutions in other countries facing similar challenges. For regulatory arrangements more generally, the authors suggest that, while private ordering is not inherently inefficient, its efficiency must be examined in the context of respective activities subject to regulation. Also, when intervening in the regulation of a largely heterogeneous activity, the government needs to develop uniform rules in the form of general principles rather than specific rules. In the technology environment such principles must address the malleable and evolving nature of technology and the unpredictability of the regulatory environment.