How does a company authenticate customers, employees, and third-party service providers when they seek Internet access to the company's computer networks and systems? For most companies, the standard approach is
Online Access to Corporate Information
How does a company authenticate customers, employees, and third-party service providers when they seek Internet access to the company's computer networks and systems? For most companies, the standard approach is to use a user ID and password. But that approach may no longer be legally adequate. In the United States, regulators in the financial sector have now become the first to formally state that reliance solely on a user ID and password ' so-called single-factor authentication ' is now considered 'to be inadequate' at least in the case of high-risk transactions.
This premium content is locked for LawJournalNewsletters subscribers only
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN LawJournalNewsletters
- Stay current on the latest information, rulings, regulations, and trends
- Includes practical, must-have information on copyrights, royalties, AI, and more
- Tap into expert guidance from top entertainment lawyers and experts
Already have an account? Sign In Now
For enterprise-wide or corporate access, please contact Customer Service at [email protected] or call 1-877-256-2473.






