Follow Us

Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Cybersecurity Technology Media and Telecom

Cryptography’s Legal Landscape

The same applications, and the same cryptographic protocols, don’t function in the exact same ways when appearing in ‘the same software’ utilized in different control devices. What, if any, are the legal ramifications of differing delivery mechanisms for the same cryptographic functions that may or may not perform the same?

X

Thank you for sharing!

Your article was successfully shared with the contacts you provided.

Since the passage of UETA and ESIGN in 1999/2000, I have been fascinated as to exactly how the legal terminology of these and other “digital security” statutes equates to actual cryptographic methods. When someone writes a piece of software that “meets and/or exceeds these requirements,” and are “warranted for compliance” under these acts, how do contracting officers, lawyers, judges and everyone involved understand? It isn’t quite like a set of map directions: it’s difficult to draw a straight line from act to software function. As the digital landscape continues to grow and expand in scope, how does the legal profession keep up?

This premium content is locked for Cybersecurity Law & Strategy subscribers only

Continue reading by getting
started with a subscription.

ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN CYBERSECURITY, PRIVACY, INFORMATION GOVERNANCE, LEGAL TECHNOLOGY AND E-DISCOVERY.
  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on cyber threats, data breaches, and legal technology
  • Tap into expert guidance from top legal tech lawyers and experts

SUBSCRIBE NOW

Subscribe Now For Unlimited Access

Read These Next