Digital Signature And Electronic Authentication Law
Encyclopedia
Digital Signature And Electronic Authentication Law (SEAL) of 1998 was introduced to the United States Senate
, as S.1594, and was followed closely by H.R. 3472 which was introduced to the House of Representatives
. This Bill sought to update the Bank Protection Act of 1968 in regards to electronic authentication
techniques by financial institutions, and for other purposes.
Electronic authentication technologies are compliant with Sec 3(g)
(1) to authenticate the identity of or information associated with a sender of a document
(2) to determine that a document was not altered, changed, or modified during its transmission to a recipient, or
(3) to verify that a document received was sent by the identified party claiming to be the sender.
Section 6 of the Digital Signature And Electronic Authentication Law (SEAL) states the electronic authentication may be used if an agreement to use them was made by all parties.
United States Senate
The United States Senate is the upper house of the bicameral legislature of the United States, and together with the United States House of Representatives comprises the United States Congress. The composition and powers of the Senate are established in Article One of the U.S. Constitution. Each...
, as S.1594, and was followed closely by H.R. 3472 which was introduced to the House of Representatives
United States House of Representatives
The United States House of Representatives is one of the two Houses of the United States Congress, the bicameral legislature which also includes the Senate.The composition and powers of the House are established in Article One of the Constitution...
. This Bill sought to update the Bank Protection Act of 1968 in regards to electronic authentication
Authentication
Authentication is the act of confirming the truth of an attribute of a datum or entity...
techniques by financial institutions, and for other purposes.
Sections from the law
The definition of electronic document described in Sec 3(f) of the SEAL :- (f) DOCUMENT- The term `document' means any message, instrument, information, data, image, text, program, software, database, or the similar item, regardless of how created, if such item can be retrieved or displayed in a tangible form.
Electronic authentication technologies are compliant with Sec 3(g)
- (g) ELECTRONIC AUTHENTICATION- The term `electronic authentication' means a cryptographic or other secure electronic technique that allows the user of the technique
(1) to authenticate the identity of or information associated with a sender of a document
(2) to determine that a document was not altered, changed, or modified during its transmission to a recipient, or
(3) to verify that a document received was sent by the identified party claiming to be the sender.
Section 6 of the Digital Signature And Electronic Authentication Law (SEAL) states the electronic authentication may be used if an agreement to use them was made by all parties.
- (a) ELECTRONIC AUTHENTICATION OF DOCUMENTS, INFORMATION, AND IDENTITY-
- (1) IN GENERAL- A financial institution may use electronic authentication in the conduct of its business if it has entered into an agreement regarding the use of electronic authentication with any counterparty, or if it has established a banking, financial, or transactional system using electronic authentication.
Forms of electronic authentication
- Biometric
- ClickwrapClickwrapA clickwrap agreement is a common type of agreement often used in connection with software licenses. Such forms of agreement are mostly found on the Internet, as part of the installation process of many software packages, or in other circumstances where agreement is sought using electronic media...
- PasswordPasswordA password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource . The password should be kept secret from those not allowed access....
- Public key infrastructurePublic key infrastructurePublic Key Infrastructure is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. In cryptography, a PKI is an arrangement that binds public keys with respective user identities by means of a certificate...
(PKI) - Security tokenSecurity tokenA security token may be a physical device that an authorized user of computer services is given to ease authentication...