Information security. An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008. What ?. Understanding the information security Electronic signature and encryption Trusted third party (CSP). Information security.
An introduction to Technology and law with focus on e-signature, encryption and third party service
information security is a state of affairs where information, information processing and communication is protected against the confidentiality, integrity and availability of information and information processing. In the context of information networks this also covers reliable identification and authentication.
the obligation to take adequate measures for the purpose of safeguarding the state of affairs corresponding the required level of security, and notably the protection of rights related to informational assets
Time frame: Jan 19,2000, July 19 2001, march 15, 2006
Electronic signature : data in electronic form which are attached to or logically associated with other electronic data and which serve as a method of authentication
Advanced electronic signature: any electronic signature which meets the following requirements: uniquely linked, capable of identifying, maintain sole control, change detectable
QC (annex I) CSP (annex II) secure signature creation device (annext III)
Legal effects of the e-signature article 5 of the Directive:
The conversion of data into a secret code for transmission over a public network.
problem of PKE:
PKI Process Flow
-UNCITRAL e-sign ML, EU e-sign Directive
of responsibilities in accordance with domains under
the specific control of PKI participants
Excuse and limitation
no prior authorization (art 3.1 )
voluntary accreditation (art 3.2)
Thank you for your attention!