Skip to main content Accessibility help
×
Hostname: page-component-586b7cd67f-t7fkt Total loading time: 0 Render date: 2024-11-25T08:30:53.378Z Has data issue: false hasContentIssue false
This chapter is part of a book that is no longer available to purchase from Cambridge Core

10 - Data protection

Stephen Mason
Affiliation:
Chambers of Stephen Mason
Get access

Summary

Electronic signatures come in various forms, and to illustrate a simple but disturbing way in which documents are used, one can look to the activities of some local councils in England. When a person applies for planning permission, they are required to submit a planning application, and their manuscript signature is affixed to the document. The documents that accompany a planning application are open to the public to view. However, some local authorities scan the applications and put them into pdf format before uploading the entire document onto a website, thus exposing a number of manuscript signatures to being viewed by the entire world. This action enables would-be thieves to obtain a perfect specimen of a manuscript signature that could be used for nefarious purposes in the future. This is just one of the problems that affect electronic signatures and the application of the principles of data protection, although it is recognized that a scanned signature in itself will not constitute personal data. This state of affairs in England illustrates that rules put into place to provide for openness in pre-digital times are not always appropriate in the digital age. In this instance, the application of a rule requiring openness at a time when paper was paramount has been uncritically transposed into the digital age without thought to the wider repercussions.

Organisation for Economic Co-operation and Development

In the international context, the Organisation for Economic Co-operation and Development developed a set of guidelines, part of which included the need to consider the issues relating to the protection of personal data. Principle 5, ‘Protection of privacy and personal data’, sets out the expectation:

The fundamental rights of individuals to privacy, including secrecy of communications and protection of personal data, should be respected in national cryptography policies and in the implementation and use of cryptographic methods.

In discussing the issues relating to privacy, the guidelines expressly note the difference between cryptographic keys used for confidentiality and those used for authentication. Any user that intends to use a private key for the purposes of authentication must be made aware of the difference, and undertake to ensure only the relevant algorithms are used for the purpose of generating a private key. Failure so to do may enable malicious individuals to use the private key not only to impersonate an individual, but also to send incriminating material electronically that can be associated with the innocent holder of the private key.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2012

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

2002
Schellekens, M. H. M.Electronic Signatures: Authentication Technology from a Legal PerspectiveThe HagueTMC Asser Press 2004CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Data protection
  • Stephen Mason
  • Book: Electronic Signatures in Law
  • Online publication: 05 March 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511998058.011
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Data protection
  • Stephen Mason
  • Book: Electronic Signatures in Law
  • Online publication: 05 March 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511998058.011
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Data protection
  • Stephen Mason
  • Book: Electronic Signatures in Law
  • Online publication: 05 March 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511998058.011
Available formats
×