Tuesday, May 28, 2019
Overview of Data Encryption and Legal Issues Essay -- Privacy Legal Es
Overview of Data Encryption and Legal IssuesWhat is encryption and why do we need it?The concept of encrypting information has been normal for hundreds of years. Revolutionaries, scientists, political activists and lovers have utilized this technique to maintain privacy and confidentiality in their communications. As kids, we would take our secret messages and shift the letters of the alphabet by a specific number to create an encrypted message. For example, by shifting the letters of the alphabet by three we could change the word cyberlaw to fbehuodz. In encryption, a message is referred to as plaintext before changing it in any way. Data encryption is the process whereby plaintext data is converted to ciphertext data. Ciphertext data can only be read by a party with a secret decryption key. A method for encrypting text is referred to as a cryptosystem. There are many uses for encryption today, particularly, with the general use of the Internet. Encryption is used to verify messag es, validate and authenticate users and authorize legal proceeding. Banks use encryption to secure customer identification numbers at cash dispenser machines.All U.S. electronic funds transfer messages are encrypted. Online vendors depend upon the security of credit card transactions in conducting business. Many political groups use coding to protect the identity of online users. Internet users want electronic privacy freedom from observance by the government or other parties. Anonymity is vital to some(prenominal) privacy and freedom of speech.Potential Abuses of EncryptionThe U.S. Government is concerned with the abuse of this technology at the hands of criminals, terrorists and hostile foreign governments. Encryption could impede their effo... ...nternet.The availableness of encryption codes will encourage a larger population of users to encrypt communications and will provide businesses worldwide a way to conduct transactions securely. Arguments are made that the control of source code export discriminates against software distribution as opposed to encryption in print form. This greatly limits the human face of scientific ideas and thereby limits the marketplace for ideas. The ability to remain anonymous is important to free speech and our right to privacy in communications on the Internet. If limiter chips and escrow accounts become the standard, the U.S. government will be able to read private e-mail and determine the recipients. This would be a frightening departure from our proud usance of preserving privacy in our communications and encouraging the free exchange of ideas and information.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.