Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Online Access to Corporate Information

By Thomas J. Smedinghoff
May 15, 2006

How does a company authenticate customers, employees, and third-party service providers when they seek Internet access to the company's computer networks and systems? For most companies, the standard approach is to use a user ID and password. But that approach may no longer be legally adequate. In the United States, regulators in the financial sector have now become the first to formally state that reliance solely on a user ID and password ' so-called single-factor authentication ' is now considered 'to be inadequate' at least in the case of high-risk transactions.

This new view of online authentication came in an Oct. 12, 2005 document issued by the Federal Financial Institutions Examinations Counsel ('FFIEC') titled 'Authentication in an Internet Banking Environment' ('FFIEC Guidance') (available at www.ffiec.gov/pdf/authentica tion_guidance.pdf). The FFIEC is a group of U.S. federal regulatory agencies, which include the Board of Governors of the Federal Reserve System, Federal Deposit Insurance Corporation, the National Credit Union Administration, the Office of the Comptroller of the Currency, and the Office of Thrift Supervision. While the FFIEC Guidance technically applies only to the financial sector, it is clearly in line with the developing law of security, and thus may well become legal best practice for all companies, especially where access to personal information is involved. (See, e.g., Thomas J. Smedinghoff, 'Defining the U.S. Legal Standard for Information Security,' World Internet Law Report, April 2005.)

Read These Next
Why So Many Great Lawyers Stink at Business Development and What Law Firms Are Doing About It Image

Why is it that those who are best skilled at advocating for others are ill-equipped at advocating for their own skills and what to do about it?

Bankruptcy Sales: Finding a Diamond In the Rough Image

There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.

The DOJ's Corporate Enforcement Policy: One Year Later Image

The DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.

A Lawyer's System for Active Reading Image

Active reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.

Blockchain Domains: New Developments for Brand Owners Image

Blockchain domain names offer decentralized alternatives to traditional DNS-based domain names, promising enhanced security, privacy and censorship resistance. However, these benefits come with significant challenges, particularly for brand owners seeking to protect their trademarks in these new digital spaces.