This website uses cookies to ensure you have the best experience. Learn more

Security And Privacy On Sat´S (Irs) Electronic Signature

2298 words - 9 pages

Introduction
New information technologies change the way society lives. This is why the tax authorities cannot remain outside such changes. Since the year 2005 the Tax Administration System (SAT Servico de Administracion Tributaria), which is the Mexican IRS, has been introducing and applying new information technologies with the objective of a better, faster and safer way of fulfilling its obligations with taxpayers.
One of the most controversial tools the SAT started using is the Electronic Signature (FIEL Firma Electronica). Since the year 2000 it is an authentication system that allows the taxpayer to access, through the SAT website, to his tax record, to fill tax forms, and in general to perform any action or modification regarding its tax record.
What makes the electronic signature so controversial is that it has the same value as a hand written signature. An electronic file signed with the electronic signature, legally, is as good as a document signed by hand. Also, another characteristic is that it uses biometrics recognition. It is a powerful tool, that when misused, can cause a lot of trouble. Naturally a couple questions come to mind: How safe is to use the electronic signature? Is my privacy kept?

Privacy, security and biometrics
There are two main fields of study regarding the use of electronic signature. The technological and the legal aspects are fusion together, and both have several challenges. Both sides will be covered in this paper and how do they are managed together.
Security and privacy have been important research areas in computing for a long time. Data needs to be protected. That is why methods and techniques have been developed to protect it from attacks. Security and privacy considerations have increased dramatically due to open internet environment and new business practices. Traditional models and techniques for characterizing and analyzing security and privacy are ill-equipped to deal with the much higher social complexity that is implicit in this new internet-based setting. (Liu, 2003)
We live in a new Web-enable world, and reliable user authentication has become everyday more important. Insecure authentication systems can be catastrophic, especially in a corporate environment. Not to mention on the government environment. Loss of confidential information and compromised data integrity are just some examples.
Based on the need of a more secure method of authentication, biometrics gives an easy, fast and safe solution. But what is biometrics? Biometrics is an automatic personal recognition based on physiological or behavioral characteristics. The term comes from the Greek words bios (life) and metrikos (measure) (Prabhakar, 2003).
Biometrics relies on who you are to make a personal recognition and authentication. It focuses on who you are and not what you know. A biometric property is an intrinsic property of a person; it is difficult to duplicate or share. And ID card or a NIP number can be easily transfer, a...

Find Another Essay On Security and Privacy on SAT´s (IRS) Electronic Signature

Internet Privacy and Security Essay

1113 words - 5 pages Technology is great in so many ways. It has provided us with more communication access, access to knowledge at our finger tips, and so much more. Technology has overall made life easier, but maybe too easy, and has made things a lot less private. This results in us having to be extra careful with security on the internet. Internet security is important to protect our privacy, protect us from fraud, and from viruses that could destroy a piece

E-commerce: Security and Privacy Essay

2129 words - 9 pages has their advantages and limitations. E-cash is a more convenient and flexible way of handling payments than traditional money. It can be used by both, consumers and businesses. Banks that issue E-cash could find it much cheaper than handling checks and the paper records that accompany traditional money. Consumers who do business on the Internet will find some forms of electronic money offer much greater privacy than using ordinary credit cards

Electronic and Communication Privacy Act of 1986

1436 words - 6 pages following will discuss the reason for the Act, the two titles in detail, give examples on how the act works and educate the average American citizen of his/her right to privacy within electronic communications. Anytime that someone engages in private communication with another individual, they expect that their fellow citizens will respect its privacy. Not only do the customs of society enforce this expectation, statue laws have been enacted

On-line Signature Verification Based on Forward and Backward Variances of Signature

1915 words - 8 pages coefficients of the forward and backward variances between the reference and signature to be verified. It can be seen from the experimental results that the proposed features are more effective than the conventional methods. Works Cited \bibitem{jain1} A. K. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 4–20, 2004. \bibitem

The threat of internet security and its effects on electronic commerce

2078 words - 8 pages (Dierks and Allen, 1999).An alternative to the SSL/TSL approach, and one that has been developed specifically for e-commerce is the Secure Electronic Transfer (SET) standard developed by the major credit card companies. One of the most remarkable strengths of SET is its ability to be applied to any payment service. Some of the several security needs specific to e-commerce which SET addresses are: privacy and confidentiality of payment data and

Analyze Two Sites Based on the Following: Human Factors, Security, Privacy and Site Preference? Why?

905 words - 4 pages request a quote but other than that it gives you nothing more to go on. There are no overt links to legal or privacy notices. Unlike the PSAV website there are no references to career opportunities or other company information.Security and PrivacyPSAV's website has both security and privacy statements. PSAV's security statement is part of its privacy statement and it says that PSAV does take steps to protect proprietary information which one has

Threats to Internet Privacy and Security

950 words - 4 pages The Internet presents various challenges in the realms of privacy and security. Such threats originate from obvious sources such as hackers and malware, but threats come from less obvious sources as well; employees, government agencies, and even one’s self through lack of knowledge or vigilance. Privacy, as explained by Lawrence Lessig (2006), “from the perspective of law, is the set of legal restrictions on the power of others to invade a

Privacy and Security Issues in Data Mining

2342 words - 10 pages to do data mining and classifying the user into some group may result in a variety of ethical issues. In this paper, we deal with two kinds of ethical issues caused by data mining techniques: informational privacy issues in web-data mining and database security issues in data mining. We also look at these ethical issues in a societal level and a global level. Informational Privacy Issues in Web-data Mining There is a debate between the benefits

Security and Privacy in Social Media

1797 words - 8 pages track of all interactions by the users, they also own all the content, including pictures that the users upload. The social network keeps this information on the user, even if the user deactivates their account with that particular site. Most users do not have any idea that the operator of the networking service keeps this information, and has access to all pictures and tags. By not having adequate security and privacy within the social media

Lack of Internet Security and Privacy

1035 words - 4 pages Internet privacy and security has become the concern of many individuals throughout recent years. There are a very limited amount of laws that have been enacted to combat computer or cyber related crimes. This has become an issue because as the internet grows increasingly popular so does the criminal and immoral behavior that abounds on it. With these crimes gaining in impact, effectiveness, and frequency, there needs to be more repercussions

Finding the Balance Between Privacy and Security

1535 words - 6 pages struggled with this balance. What brought these laws on in the rst place was the lack of balance; security dominated privacy during the Vietnam War to an unacceptable point. While FISA, in reality, did not do much, it did set a precedent for later acts. Its wording was built on over decades, slowly evolving it into something eective. As time went on, technology expanded even more. With the creation of the Internet, and other technological

Similar Essays

Why Are Electronic Health Record's Privacy And Security An Individual Concern?

2506 words - 11 pages compute the data values. The focus on security was aimed at keeping key identifiers secure in an attempt to minimize data manipulation. Part of my research showed that the electronic health records were being heavily pushed by the industry. Many incentives were given to physicians and hospitals for switching to digital records. This indicated a need for tighter privacy and security as the transition was made. Paper health records are currently

Business Writing On Electronic Signature Technology

2022 words - 8 pages new technologies require a relevant legal basis both on national and international level. The classical regulations are based on the requirement for a paper-based document and hand-written signatures. An electronic signature is the electronic equivalent of a manual signature placed over a document; therefore the legal framework must be equal to hand-written signature laws. The electronic signature provides trust and security in e-commerce

Security And Privacy On The Internet

1470 words - 6 pages Many users are subject of Security and Privacy on the Internet issue. The term "information" now is more used when defining a special product or article of trade which could be bought, sold, exchanged, etc. Often the price of information is higher many times than the cost of the very computers and technologies where it is functioning. Naturally it raises the need of protecting information from unauthorized access, theft, destruction, and

Privacy And Security Issues On Facebook

2038 words - 8 pages Executive Summary Problem Statement: In this white paper we will address how privacy and security can be improved on Facebook. Important Points: · Background of Facebook · Privacy Problems with Facebook · Possible Security and Privacy Solutions · Summary · Works Cited Background of Facebook Facebook allows people to connect with friends across the seas with different cultures. Originally, Facebook was started in 2003 by a man named