««« |
»»» |
[76] TECHNICAL STANDARDS, CRITERIA AND PROTOCOLS FOR THE INTEROPERABILITY OF CRYPTOGRAPHIC METHODS SHOULD BE DEVELOPED AND PROMULGATED AT THE NATIONAL AND INTERNATIONAL LEVEL. [77] National standards for cryptographic methods should be consistent with international standards to facilitate global interoperability. [78] Recognised standards-making bodies, governments and business should share information and collaborate to develop and promulgate interoperable technical standards, criteria and protocols for cryptographic methods.
[79] Mechanisms to evaluate conformity to technical standards, criteria and protocols for interoperability should be developed. [80] (5) PROTECTION OF PRIVACY AND PERSONAL DATA
[81] THE FUNDAMENTAL RIGHTS OF INDIVIDUALS TO PRIVACY AND TO THE PROTECTION AND CONFIDENTIALITY OF THEIR DATA, INCLUDING THEIR TRANSACTIONAL DATA, SHOULD BE TAKEN INTO ACCOUNT IN DEVELOPMENT, IMPLEMENTATION AND POLICYMAKING REGARDING CRYPTOGRAPHIC METHODS AND THE INFRASTRUCTURES UPON WHICH THEY DEPEND. [82] The functions of authentication and non-repudiation which cryptography makes possible provide a powerful tool for tracking [surveillance] of all manner of transactions. While attractive for fraud prevention for business records, and for establishing a knowledge base about customer behaviour and preferences this new capability [alters the balance of power between the individual and the state, and between the individual and the marketplace, and] could be misused.
[83] Since many forms of communication for which there is a high expectation of privacy are migrating to networks, there is a need for data confidentiality in order to maintain the ability of the citizen to conduct a personal life in private The requirements of government agencies to conduct investigations, access communications, and gather plaintext evidence must be balanced against the rights of the citizenry to private communications Where practicable, and consistent with these requirements, provision should be made for anonymous transactions.
It was also questioned whether the need for law enforcement investigative activities should be the only qualifier for restricting anonymity: for instance, cases involving civil liability for non-criminal activities may also apply. | |
««back to main forward »» |