««« |
»»» |
[64] It is expected that a variety of cryptographic methods may be needed to fulfil different data security requirements. [65] Users of cryptography should be free to determine the type and level of data security needed, and to select and implement appropriate cryptographic methods [, subject to lawful constraints]. [66] Individuals or entities who own, control, access, use or store data may have a responsibility to protect the confidentiality of such data, and may therefore be responsible for using appropriate cryptographic methods.
[67] Users should be free to adopt a key management system that suits their needs [, subject to lawful constraints which may include provisions for lawful access to plaintext or cryptographic keys]. [68] Government controls on cryptographic methods should be no more than are essential to the discharge of government responsibilities.
Cryptographic methods may be subject to government controls compatible with government responsibilities to protect privacy, promote commerce, and provide for public safety, law enforcement and national security. [69] (3) DEMAND-DRIVEN DEVELOPMENT OF CRYPTOGRAPHY
[70] CRYPTOGRAPHIC METHODS SHOULD BE FREELY DEVELOPED IN RESPONSE TO THE NEEDS AND DEMANDS OF INDIVIDUALS, BUSINESSES AND GOVERNMENTS.
Cryptographic methods and products should be freely developed in the marketplace in response to the needs and demands of individuals, businesses and government. | |
««back to main forward »» |