Preview
Preview

Essay about Security and Privacy on SAT´s (IRS) Electronic Signature

:: 11 Works Cited
Length: 1916 words (5.5 double-spaced pages)
Rating: Aqua      
Open Document
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Introduction
New information technologies change the way society lives. This is why the tax authorities cannot remain outside such changes. Since the year 2005 the Tax Administration System (SAT Servico de Administracion Tributaria), which is the Mexican IRS, has been introducing and applying new information technologies with the objective of a better, faster and safer way of fulfilling its obligations with taxpayers.
One of the most controversial tools the SAT started using is the Electronic Signature (FIEL Firma Electronica). Since the year 2000 it is an authentication system that allows the taxpayer to access, through the SAT website, to his tax record, to fill tax forms, and in general to perform any action or modification regarding its tax record.
What makes the electronic signature so controversial is that it has the same value as a hand written signature. An electronic file signed with the electronic signature, legally, is as good as a document signed by hand. Also, another characteristic is that it uses biometrics recognition. It is a powerful tool, that when misused, can cause a lot of trouble. Naturally a couple questions come to mind: How safe is to use the electronic signature? Is my privacy kept?

Privacy, security and biometrics
There are two main fields of study regarding the use of electronic signature. The technological and the legal aspects are fusion together, and both have several challenges. Both sides will be covered in this paper and how do they are managed together.
Security and privacy have been important research areas in computing for a long time. Data needs to be protected. That is why methods and techniques have been developed to protect it from attacks. Security and privacy considerations have increa...


... middle of paper ...


...ernational, 151-161.
Prabhakar, S. P. (2003). Biometric recognition: Security and privacy concerns. Security & Privacy, IEEE, 1(2), 33-42.
Prandini, M., & Ramilli, M. (2012). A Model for E-voting Systems Evaluation Based on International Standards: Definition and Experimental Validation. e-Service Journal, Vol. 8, No. 3 (Summer 2012), 42-72.
Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM systems journal, 40(3), 614-634.
Rice, S. B. (1920). The Right of Privacy. University of Pennsylvania Law Review and American Law Register, Vol. 68, No. 3 (March), 284-287.
Rodríguez Sánchez, R. R. (2009, August). Uso de los Medios Electrónicos en el Cumplimiento de Obligaciones Fiscales Federales. MONOGRAFÍA. Xalapa, Veracruz, Mexico: UNIVERSIDAD VERACRUZANA Facultad de Contaduría y Administración.



Click the button above to view the complete essay, speech, term paper, or research paper








This essay is 100% guaranteed.


Title Length Color Rating  
Business Writing on Electronic Signature Technology Essay - Business Writing on Electronic Signature Technology During our February 3 meeting, upper level management expressed concerns about not being able to deal with customer accounts online. We discussed some of the problems they encounter when trying to process transactions online. We agreed some changes needed to be made and that new technology needs to be researched for our online business transactions. The use of electronic signatures was at the top of our list. Many of our competitors have already built-in e-signature verification within their systems for online business and for handling their financial records....   [tags: Papers] 1683 words
(4.8 pages)
Better Essays [preview]
Essay about The world of Biometric Security - The world of Biometric Security Biometrics is methods of recognizing a person based on a physiological or behavioral characteristic. Some of the features measured in biometrics identification that I will include in this paper are: fingerprints, retina, face, signature, and voice scans. Biometric technologies are quickly becoming the foundation for a large array of highly secure identification and personal verification techniques. As the level of security and transaction fraud increases, the need for more secure identification and personal verification technologies also increases....   [tags: Biometric Security Surveillance Papers]
:: 8 Works Cited
1827 words
(5.2 pages)
Powerful Essays [preview]
Online Commerce and Consumer Protection Essay - Electronic commerce, more commonly abbreviated as e-commerce, is the action of buying and selling products or services through the medium of electronic information systems such as computer networks - the most common of which being the World Wide Web, or internet (Dorogovtsev & Mendes, 2003). A variety of technologies are used to facilitate e-commerce including electronic funds transfer (EFT) which facilitates the electronic exchange of money, online transaction processing (OTP) which handles the data entry and retrieval for transaction processing and electronic data interchange (EDI) which is responsible for processing orders, warehouse stock control and order tracking (Turban, et al., 2009...   [tags: e-commerce, signature]
:: 35 Works Cited
2132 words
(6.1 pages)
Term Papers [preview]
Biometric Security Technology Essay - Biometric Security Technology You have seen biometric technology in the films Mission: Impossible and Gattaca. The technology has also graced the covers of many weekly news magazines. But many people, even though the technology has been widely talked about for the last half decade, are still surprisingly unaware of what biometrics are and why the technology is so important for computer security and personal identification. Biometrics are automated methods of recognizing a person based on a physical or behavioral characteristic (2001)....   [tags: Technological Computers Essays]
:: 6 Works Cited
1393 words
(4 pages)
Powerful Essays [preview]
Indiviual Privacy vs National Security Essay - James Madison once said “Knowledge will forever govern ignorance; and a people who mean to be their own governors must arm themselves with the power which knowledge gives.” To gain a better understanding of a society, one must gain knowledge of the needs and wants the citizens’ demand from the country’s representatives. In every country the needed to protect its citizens is the same. In some nations, security is a higher priority which causes sacrifices to be made to obtain an indefinite protection against all rivals....   [tags: Privacy vs Security ]
:: 2 Works Cited
1175 words
(3.4 pages)
Strong Essays [preview]
Privacy vs. Security Essay - Ever since day one, people have been developing and creating all sorts of new methods and machines to help better everyday life in one way or another. Who can forget the invention of the ever-wondrous telephone. And we can’t forget how innovative and life-changing computers have been. However, while all machines have their positive uses, there can also be many negatives depending on how one uses said machines, wiretapping in on phone conversations, using spyware to quietly survey every keystroke and click one makes, and many other methods of unwanted snooping have arisen....   [tags: Privacy, Security]
:: 2 Works Cited
1260 words
(3.6 pages)
Better Essays [preview]
Electronic Monitoring And Workplace Privacy Essay - Electronic Monitoring and Workplace Privacy Workplace privacy is one of the biggest issues facing businesses today. Do you feel like you are being watched all the time, all your e-mails being read, and every key stroke is being monitored by your boss. Some people feel this way and that is why privacy in the workplace is a problem with many businesses today. Employees feel like they are not being trusted, or feel the company invades on their personal privacy, or violates their fourth amendment rights....   [tags: Business Work Place Privacy] 1727 words
(4.9 pages)
Strong Essays [preview]
Essay on National Security vs. the Right to Privacy - "Security is mostly a superstition. It does not exist in nature. Life is either a daring adventure or nothing." -- Helen Keller Security has been a common topic of controversy since the terrorist attacks of September 11, 2001, and even before then it was a constant subject. The image of buildings collapsing and billowing smoke has been engraved into the minds of Americans and will remain there for years to come. Security is an issue that we encounter everyday. Whether it is driving down the freeway or walking into the grocery store; we are cautious of what is going on around us....   [tags: Security vs Privacy]
:: 10 Works Cited
2936 words
(8.4 pages)
Powerful Essays [preview]
National Security vs. the Right to Privacy Essay examples -       Abstract: Electronic mail is quickly becoming the most prevalent method of communication in the world. However, e-mail systems in corporate, institutional, and commercial environments are all potential targets of monitoring, surveillance and ultimately, censorship.             Electronic mail is a phenomenon that has begun to pervade all aspects of our lives today. We use e-mail in our personal lives, at our schools, at our jobs, and everywhere in between. However, very few of us consider the fact that even though our e-mail is composed by the sender, and is intended to be read only by  the recipient, it actually passes through many hands in between....   [tags: Security vs Privacy]
:: 8 Works Cited
1764 words
(5 pages)
Powerful Essays [preview]
National Security vs. the Right to Privacy Essay - When the Challenger space shuttle blew up. Students gathered in the student lounge for hours, watching in disbelief. In a way, it was more existential than September 11. We watched the same ten seconds of the shuttle explosion over and over again, without there being a trace of the Shuttle anywhere in the world. That day was a technological disaster, a mechanical disaster that Americans, in our inimical fashion, could quickly fix. What students watched on September 11, 2001 was a social and political disaster....   [tags: Security vs Privacy] 796 words
(2.3 pages)
Better Essays [preview]