Electronic Markets and Security Requirements - The Legal Basis
نویسنده
چکیده
responsibilities of the parties involved. This paper concentrates on the legal situation in Switzerland. However, the security aspects will also be valid from the international point of view. Especially in a crossborder situation, where there are no more physical borders and where data flows freely, security measures cannot target on an isolated and clearly defined environment anymore. In IS security, controls are more than just technical and organizational measures to secure availability , integrity and confidentiality. Control encompasses the policies, procedures , practices and organizational structures that assure the adequacy of information asset management and the consistency and reliability of IS activities. The integration of classic EDP techniques with telecommunications (telematics) increases the demand for controls, where more than just technical aspects are considered. This paper will treat the legal framework and the associated technical questions. Most of the recent developments of information interchange, like electronic signatures and EDI, are not yet represented in most of the European laws. A stable legal framework under public law has to be established to assure a trusted legal environment. In the meantime, there will be an urgent need for well defined contractual relations. The private agreements are limited, they can only be legally binding for the contracting party, thus automatically limiting the chances of open markets in todays legal framework. The simplified situation in figure 1 is showing the typical relations between public and private law: Although there are countries like Germany where the relations between the PTT are nowadays stipulated under private law, most of the key points, like the liability rules, are still based on public law and there is only narrow margin for private arrangements. Some laws are already directly affecting electronic Data Privacy Law (DSG) According to Art. 7 DSG personal data has to be protected by the use of appropriate and proportional security measures. A more detailed description can be found in Art. 9 VDSG. The responsibility lies with the data owner. In cases, where personal data will be processed outside the owners facilities, e.g. transmitting and storing data, the owner has to make sure that the mandatory will treat the data the same way he is allowed to (Art. 11 DSG). The supplier of enhanced services who is processing personal data is subject to the Privacy law, which means that he might be obliged to notify his data processing activities (Art. 11 DSG). Security measures According to …
منابع مشابه
Information Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملReview on Passive Defense Legal Requirements in Territorial Planning
Nowadays, given different definitions and conceptions on development, territorial planning lends to for various economic, social and geographical aspects, however its defensive and security perspectives have been taken into account to less extent. The present research is aimed to specify passive defense legal requirements in Territorial planning through outlining the most important rules on pas...
متن کاملReview on Passive Defense Legal Requirements in Territorial Planning
Nowadays, given different definitions and conceptions on development, territorial planning lends to for various economic, social and geographical aspects, however its defensive and security perspectives have been taken into account to less extent. The present research is aimed to specify passive defense legal requirements in Territorial planning through outlining the most important rules on pas...
متن کاملModelling Secure and Fair Electronic Commerce
Security and fairness in business transactions are basic requirements demanded by any participant in electronic markets. In this paper we propose COPS as an infrastructure for building adaptable electronic markets with main focus on security and fairness and MOSS as a methodology for analysing and modelling the security semantics of business transactions. Both are necessary to control the risks...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Electronic Markets
دوره 4 شماره
صفحات -
تاریخ انتشار 1994