««« |
»»» |
[84] Only necessary transactional information should be gathered, and it must be destroyed when no longer needed to perform the function.
[85] The use of personal identification mechanisms in concert with cryptographic systems may be limited by national data protection legislation and in accordance with domestic and international human rights law. [86] The OECD Guidelines for the Protection of Personal Data provide general guidance concerning the collection and management of personal information, which should be applied in concert with relevant national law when implementing cryptographic methods, particulary in establishing procedures for certification authorities and key management systems.
[87] (6) LAWFUL ACCESS [88] CRYPTOGRAPHIC METHODS, WHICH CAN BE DESIGNED TO ALLOW USERS TO RECOVER ENCRYPTED DATA, SHOULD ALSO ALLOW FOR TIMELY LAWFUL ACCESS TO PLAINTEXT OF ENCRYPTED DATA OR, IF APPROPRIATE, TO CRYPTOGRAPHIC KEYS, SO THAT PUBLIC SAFETY, NATIONAL SECURITY AND OTHER INTERESTS CAN BE PROTECTED.
The following alternative text has been suggested for the main statement of this principle: CRYPTOGRAPHIC POLICIES SHOULD ALLOW FOR TIMELY LAWFUL ACCESS TO PLAINTEXT OF ENCRYPTED DATA OR, IF APPROPRIATE. TO CRYPTOGRAPHIC KEYS. [89] Where access to the plaintext of encrypted data or to a cryptographic key is requested under lawful process, the individual or entity requesting access must have a legal right to possession of the plaintext, and once obtained the data should only be used for lawful purposes.
[90] Where access to the plaintext of encrypted data is lawfully requested, such access should be granted within time limits appropriate to the circumstances.
| |
««back to main forward »» |