««« |
»»» |
[91] The process through which lawful access is obtained should be recorded, so that disclosure of cryptographic keys or data can be audited in accordance with national law. [92] The conditions of lawful access should be stated clearly, published, and apparent to all users, keyholders and providers of cryptographic methods. [93] Lawful access to cryptographic keys, or the plaintext of encrypted data, across national borders may be achieved through international agreements and co-operation.
A suggestion for alternative wording is: National governments may endeavour to ensure by means of international agreements and cooperation that the supply of cryptographic keys or plaintext of encrypted data can be legally achieved across national borders. Another suggestion is that the following text could be added: [*] Preference should be given to development and use of technical solutions that permit national key management infrastructures while allowing international communications. SECRETARIAT NOTE: Former paragraphs [72] and [73] have been deleted at the suggestion of several delegations. Part of the substance of these former paragraphs is included in the current draft under the Integration Section. [94] Governments which impose a system for legally authorised government access to cryptographic keys or plaintext of encrypted data for purposes of public safety, law enforcement and national security should also support cryptographic methods that strongly protect privacy and confidentiality of data. [95] When developing policies on cryptographic methods that provide for lawful access, governments should weigh carefully the risks of fraud, the expense of any supporting infrastructure, and other costs, against the benefits, including benefits for public safety, law enforcement and national security.
[96] Lawful access to cryptographic keys should recognise the distinction between keys which can be used to protect confidentiality, and keys which can be used for authentication purposes only. [A cryptographic key that can be used for authentication purposes only should not be made available without the consent of the individual or entity in lawful possession of that key.]
[97] This Principle should not be interpreted as asking governments to enact legislation that would allow lawful access to encrypted data. | |
««back to main forward »» |