««« |
»»» |
[54] (1) TRUST IN CRYPTOGRAPHY [53] CRYPTOGRAPHIC METHODS TO PROTECT DATA SHOULD VALIDLY GENERATE TRUST IN THE USE OF INFORMATION SYSTEMS. [56] In order to achieve the full potential of the GII/GIS, it is fundamentally important that the users of information technology have trust in the security of information and telecommunications systems, and the confidentiality and integrity of data on those systems. [57] Users must have access to cryptography that meets their needs, so that they will trust in the security of information and telecommunications systems, and the confidentiality and integrity of data on those systems. [58] Cryptographic methods and services should be trustworthy so that the users of cryptography can have confidence in them; there are a number of mechanisms which could build user trust in cryptographic methods, including government regulation, licensing and market mechanisms. [59] Evaluation of products, services and systems against certified or market-accepted criteria and methods could provide quality control mechanisms to encourage trust in cryptography. [60] Another way to instil confidence in cryptographic methods as a means for achieving data security might be for governments themselves to utilise commercially available cryptographic methods for appropriate government information security purposes.
[61] Cryptography is only one of many tools in an information security system; there are other security tools and measures which can be utilised to protect data adequately. The quality of information protection afforded by cryptography depends not only on the selected technical means, but also on good managerial, organisational and operational procedures. [62] (2) VOLUNTARY CHOICE OF CRYPTOGRAPHIC METHODS
[63] USERS SHOULD HAVE A RIGHT TO CHOOSE ANY CRYPTOGRAPHIC METHOD TO PROTECT DATA.
1. a strong statement of national sovereignty is made in the beginning of the document and applied to the entire document: and 2. the issue of precedence, or ranking of Principles. is addressed clearly in the Integration section or elsewhere, and applied to the entire document. Both of these elements are present in the current draft. This draft does not include references to lawful constraints/national sovereignty in the main statement of each Principle. However, such references are included in bracketed text at appropriate places within the explanatory text. | |
««back to main forward »» |