This website uses cookies to ensure you have the best experience. Learn more

Overview Of Data Encryption And Legal Issues

2185 words - 9 pages

Overview of Data Encryption and Legal Issues

What is encryption and why do we need it?

The concept of encrypting information has been popular for hundreds of years. Revolutionaries, scientists, political activists and lovers have utilized this technique to maintain privacy and confidentiality in their communications. As kids, we would take our secret messages and shift the letters of the alphabet by a specific number to create an encrypted message. For example, by shifting the letters of the alphabet by three we could change the word cyberlaw to fbehuodz. In encryption, a message is referred to as plaintext before changing it in any way. Data encryption is the process whereby plaintext data is converted to ciphertext data. Ciphertext data can only be read by a party with a secret decryption key. A method for encrypting text is referred to as a cryptosystem. There are many uses for encryption today, particularly, with the widespread use of the Internet. Encryption is used to verify messages, validate and authenticate users and authorize transactions.

Banks use encryption to secure customer identification numbers at ATM machines.

All U.S. electronic funds transfer messages are encrypted. Online vendors depend upon the security of credit card transactions in conducting business. Many political groups use cryptography to protect the identity of online users. Internet users want electronic privacy; freedom from observance by the government or other parties. Anonymity is vital to both privacy and freedom of speech.

Potential Abuses of Encryption:

The U.S. Government is concerned with the abuse of this technology at the hands of criminals, terrorists and hostile foreign governments. Encryption could impede their efforts to gather information and monitor the communications related to illegal enterprises.

It is believed that unbreakable cryptography could seriously hinder the efforts of law enforcement and threaten public safety.

Export Controls:

In 1988, The U.S. initiated export controls of encryption source code. The Arms Export Control Act regulates the exports of defense articles and services to promote world peace and security. Congress authorized the President to designate a list of defense articles to be restricted from export. The U.S. State Department included cryptographic systems, equipment, assemblies, modules integrated circuits, components or software capable of maintaining secrecy or confidentiality of information or information systems as defense articles. This has restricted distribution of dangerous technologies to assure that encryption programs are not available to criminals and governments overseas.

Keys:

The key to a cryptosystem is a specific value that converts the plaintext to ciphertext and allows the ciphertext to be transformed back into plaintext. Popular techniques depend upon both the sender and receiver having knowledge of the secret key. This technique is known as secret key or...

Find Another Essay On Overview of Data Encryption and Legal Issues

International Legal and Ethical Issues Essay

1381 words - 6 pages also followed. Legal and ethical issues may arise while conducting business in other countries. The importance of knowing what the issues are and how to resolve them will produce affective international businesses and relationships.ReferencesCheeseman, H. (2007). The Legal Environment of Environment of Business OnlineCommerce. Prentice HallUniversity of Phoenix. (2009). Week three overview. Retrieved May 16, 2009from University of Phoenix, Week Three, rEsource. BUS415-Addressing International and Ethical Issues Simulation.

Ethical, Legal, And Regulatory Issues Essay

1173 words - 5 pages , ask yourself if this is the proper way to handle business. Businesses have been guilty of shortsightedness themselves for decades. Every company needs to deal with ethical and legal issues every day in normal business activities. There is a whole new set of issues that are emerging with so much business being conducted online. This paper will attempt to show how ethical, legal, and regulatory issues differ in comparison with B2C and B2B.B2C Ethics

International Legal and Ethical Issues

769 words - 3 pages Upon completion of the University of Phoenix simulation "Addressing International Legal and Ethical Issues," we as a team have outlined below several concerns that must be addressed prior to entering into any legally binding business contracts with international organizations.Addressing International Legal and Ethical Issues.Prior to entering into international contractual business agreements it is important to take into consideration the rules

Work Environment and Legal Issues

2119 words - 8 pages organization. Previous researched study show employees spend hours surfing the Internet and sending non-work related emails to co-workers, family, and friends. With millions of employees having access to their employer’s Internet, companies are seeing an increase in Internet usage causing potential legal issues and billions of wasted dollars. These issues have also caused loss in productivity and network crashes. To combat these major issues, employers

Ethical, Legal, and Regulatory Issues

1059 words - 4 pages for office and owners - that any business faces" (p. 284). Whether the business caters to other businesses or consumers, there is usually a transaction or sale of a product or service. Since the Internet helps to thrust businesses into the worldwide market, businesses need to be mindful of the different legal, ethical, and regulatory issues in order to remain competitive and to avoid potential legal liability.Ethical ConcernsEthics is an important

Privacy and Security Issues in Data Mining

2342 words - 10 pages should stand at a neutral point that helps us understand the advantages and disadvantages and choose the right way to use data mining techniques [1]. Works Cited [1] L. Wel, L. Royakkers. Ethical issues in web data mining. Ethics and Information Technology 6: 129 – 140, Netherlands, 2004. [2] K. Wahlstrom, J. Roddick, R. Sarre, V. Estivill-Castro, D. deVries. On the Ethical and Legal Implications of Data Mining. Technical Report SIE-06-001

Chevron: company overview-role of government regulations for oil company and issues and opportunities companies face

1616 words - 6 pages leading composite energy companies, Chevron is seeking to increase diversify through development of alternative energy sources. By Chevron voluntarily creating a sound energy strategy, will be in a better position to combat controversial issues of environmental health and safety, while dominating the domestic and global marketplace. This competitive advantage will continue to shape the framework of regulatory policy by teaching others to use

Ethical and Legal issues in ICT

919 words - 4 pages Ethical and Legal issues in ICT • Introduction The consistent use of information and communication technology (ICT) in modern world enables us for countless opportunities for individuals, institutions, business organisations and scientists, but it also raises difficult ethical and legal problems. In particular, ICT helped to make societies more complex and thus even harder to understand. The use of ICT has led to changes in concepts: ownership

Legal and Ethical Issues in School Counseling

1735 words - 7 pages The topic of this paper focuses on the battles school counselors face as the law and ethical standards collide. School counselors face a number of legal and ethical issues and recognizing a clear decision isn’t always easy. School counselors have to work with a large number of students, parents, and administrators while conforming to ethical codes, state laws, and school board guidelines. This topic is of great relevance to me as I will be

Legal and Geographic Issues on the Internet

2086 words - 8 pages Legal and Geographic Issues on the Internet   Abstract    Many states and nations have conflicting laws regarding what type of digital content is legal.  When content is legal at its place of origin but illegal where it is downloaded the laws become unenforceable because no single jurisdiction applies.  International cooperation and Internet fragmentation are potential solutions, but neither is currently viable.  This paper discusses how

Business: International Legal and Ethical Issues

1326 words - 5 pages International Legal and Ethical Issues When businesses deal globally to expand their markets they may face dilemmas which must be dealt with to avoid conflict. The types of issues many companies encounter deal with legal, ethical and cultural encounters. From our example we see the legal issues in settling disputes for international transactions can become very complex. Ethical issues concerning the workers, the culture, and the environment

Similar Essays

Disadvantages And Advantages Of Encryption Essay

834 words - 4 pages Everyday information gets into the wrong hands. This can lead up to millions of dollars lost for a company and its reputation in this global environment. It only by knowing the different encryption methods you hope to protect your reputation and assets. I will discuss a possible solution to protect your information and explain the advantages and disadvantages of asymmetric or symmetric keys. Everyone is worried about data protection these days

Euthanasia And Legal Issues Essay

1067 words - 4 pages least try to delay it as long as possible. But if the patient is hopelessly ill, and would prefer to die, the doctor may consult the hospital ethics committee, and take him or her off of life support. When taken to court in these issues, the doctors defend themselves in saying, "I didn't kill him, I let him die." This is illegal in India but it still is a common occurrence.The second type, "passive voluntary euthanasia," is done when a terminally

Access Control And Data Updation With At Pre: Attribute Time Based Proxy Re Encryption

700 words - 3 pages requires higher level of trust in CSP. Therefore many approaches have been proposed for storing the encrypted data in the cloud and to provide efficient access control [4, 5, 6, 7]. 1) Symmetric key Encryption: The work in reference [8] adopts traditional symmetric key cryptographic system to encrypt data. Before outsourcing, the data owner will first classify data with similar access control lists (ACLs) into a file-group, and then encrypt each file

Access Control And Data Updation With At Pre: Attribute Time Based Proxy Re Encryption For Shared Data In Cloud

2111 words - 9 pages uploads the data to cloud. Before sending this Ciphertext to the users the CSP re-encrypt it by using re-encryption algorithm which is attribute based. If the user needs to access the data means they need to decrypt the data twice. Data owner issues the encryption key to users with write permission. They can perform updation or deletion of data if their attributes satisfy the access structure and their access time is within effective time period