Introduction
New information technologies change the way society lives. This is why the tax authorities cannot remain outside such changes. Since the year 2005 the Tax Administration System (SAT Servico de Administracion Tributaria), which is the Mexican IRS, has been introducing and applying new information technologies with the objective of a better, faster and safer way of fulfilling its obligations with taxpayers.
One of the most controversial tools the SAT started using is the Electronic Signature (FIEL Firma Electronica). Since the year 2000 it is an authentication system that allows the taxpayer to access, through the SAT website, to his tax record, to fill tax forms, and in general to perform any action or modification regarding its tax record.
What makes the electronic signature so controversial is that it has the same value as a hand written signature. An electronic file signed with the electronic signature, legally, is as good as a document signed by hand. Also, another characteristic is that it uses biometrics recognition. It is a powerful tool, that when misused, can cause a lot of trouble. Naturally a couple questions come to mind: How safe is to use the electronic signature? Is my privacy kept?
Privacy, security and biometrics
There are two main fields of study regarding the use of electronic signature. The technological and the legal aspects are fusion together, and both have several challenges. Both sides will be covered in this paper and how do they are managed together.
Security and privacy have been important research areas in computing for a long time. Data needs to be protected. That is why methods and techniques have been developed to protect it from attacks. Security and privacy considerations have increa...
... middle of paper ...
...ernational, 151-161.
Prabhakar, S. P. (2003). Biometric recognition: Security and privacy concerns. Security & Privacy, IEEE, 1(2), 33-42.
Prandini, M., & Ramilli, M. (2012). A Model for E-voting Systems Evaluation Based on International Standards: Definition and Experimental Validation. e-Service Journal, Vol. 8, No. 3 (Summer 2012), 42-72.
Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM systems journal, 40(3), 614-634.
Rice, S. B. (1920). The Right of Privacy. University of Pennsylvania Law Review and American Law Register, Vol. 68, No. 3 (March), 284-287.
Rodríguez Sánchez, R. R. (2009, August). Uso de los Medios Electrónicos en el Cumplimiento de Obligaciones Fiscales Federales. MONOGRAFÍA. Xalapa, Veracruz, Mexico: UNIVERSIDAD VERACRUZANA Facultad de Contaduría y Administración.
The Right to Privacy by Robert Bork. Robert Bork's The Right to Privacy examined the landmark case Griswald v. Connecticut. Bork's "originalist" view proclaimed that Justice Douglas erroneously interpreted the right to privacy from the Constitution. The originalist view is that judges must strictly adhere to the language of the Constitution, thus people do not have a general right to privacy because it was never actually written into the Constitution. This view severely restricts judges in dealing with new issues that our forefathers could not have possibly envisioned.
PKC is the enabling technology for all Internet security and the increasing use of digital signatures, which are replacing traditional signatures in many contexts. However, RSA is better than PKC because RSA doesn’t need digital signature. As a result, the RSA algorithm turned out to be a perfect fit for the implementation of a practical public security system. In 1977, Martin Gardner first introduced the RSA system. After 5 years, company RSA used secure electronic security products. Nowadays many credit companies of all over the world use the RSA system or a similar system based on the RSA system.
A U.S. citizen's "right to privacy" was first discussed in an 1890 Harvard Law Review article in which two Boston lawyers, Louis Brandeis and Samuel Warren, defined it as "the right to be let alone." Since then, the right to privacy has provided the basis for a stream of revolutionary and controversial constitutional interpretations by courts across the United States, culminating in the U.S. Supreme Court's Roe v. Wade decision in 1973. Although decisions have come down in favor of a right to privacy, they are largely based on a broad and disputed interpretation of the Fourteenth Amendment. With the plethora of privacy issues that confront courts and policymakers in the current information age, the time for an amendment specifying the inalienable right to privacy is quickly approaching.
The word “privacy” did not grow up with us throughout history, as it was already a cultural concept by our founding fathers. This term was later solidified in the nineteenth century, when the term “privacy” became a legal lexicon as Louis Brandeis (1890), former Supreme Court justice, wrote in a law review article, that, “privacy was the right to be let alone.” As previously mentioned in the introduction, the Supreme Court is the final authority on all issues between Privacy and Security. We started with the concept of our fore fathers that privacy was an agreed upon concept that became written into our legal vernacular. It is being proven that government access to individual information can intimidate the privacy that is at the very center of the association between the government and the population. The moral in...
The fight for privacy rights are by no means a recent conflict. In fact, there was conflict even back in the days before the revolutionary war. One of the most well-known cases took place in England, ...
Biometric is a device that can recognize someone 's unique physical trait, for example fingerprints, eyeball, face, or voice and it uses them as a means of authentication to gain access to something. Hackers can never gain access to someone’s privacy who uses biometric as a means of gaining access to his/her privacy. Biometric is the surest thing that can never be compromised, if it’s being done correctly because it is attached to the natural inbuilt quality of the user. In order for hackers to use it, they must go through an extra ordinary mile which could lead to other crimes like kidnapping or
When Maxwell Smart first whipped out his shoe phone in 1965, everyone saw an act of pure movie magic. Back in the mid to late 1900s everybody had the same idea of the future. Everyone pictured the future as talking robots (Siri), computerized pocket-sized dictionaries (smart-phones), hovering devices (drones), and much more. Today, everyone thinks of these technologies as commonalities. Most of these current devices have a valuable impact, while few create debatable issues. The company NGI has a system that will revolutionize the field of biometric facial recognition. In the article titled Embracing Big Brother: How Facial Recognition Could Help Fight Crime, author Jim Stenman says, "The mission is to reduce terrorist and criminal activity by improving and expanding biometric identification as well as criminal history information s...
As said by Eric Hughes, "Privacy is the power to selectively reveal oneself to the world. " 2 As written by Supreme Court Justice Louis Brandeis in 1928, the right most valued by the American people was "the right to be left alone". " 3 Previously it took a lot of equipment to monitor a person's actions, but now with technology's development and advancement all it requires is a computer. And there are many mediums which can be monitored, such as telephones, email, voice mail, and computers.4 People's rights are protected by many laws, but in private businesses there are few laws protecting an individual's rights.
Biometrics is a preset method to recognize a person based on a physiological or behavioral attribute. The present features are face recognition, fingerprints, handwriting, hand geometry, iris, vein, voice and retinal scan. In the early years of the 21st century, we find ourselves persistently moving further away from the stipulation of physical human interface playing a major part of basic everyday tasks. Striding ever closer to an programmed society, we interact more habitually with mechanical agents, unsigned users and the electronic information sources of the World Wide Web, than with our human counterpart. It is therefore possibly sardonic that identity has become such an important issue in the 21st century. Face recognition has been related as the divine Grail of biometric recognition systems, due to a number of noteworthy advantages over other methods of identification.
Biometric technology is used for the ways humans can be identified by unique aspects of their bodies, such as fingerprints, body odor, our voices and many more. If one was to think about privacy rights, he/she would be concerned about the widespread adoption of these systems, since such systems could easily be used to develop a record of known rebellious people and/or dangerous criminals, to be used for social control purposes. Although that may seem pretty good and a positive thing for the society, one should take into account of the defects and errors of technology. Of the many biometrics technologies that are being developed and are already developed, facial recognition is one of the most threatening because it can be deployed secretly; one may not know whether or when they can be caught in a surveillance camera for such facial recognition biometrics. Additionally, tests have found that the miscalculations for facial biometrics technologies are very high. As a result, according to Privacy Rights Clearinghouse, innocent people can be erroneously identified as dangerous criminals and actual dangerous criminals and/or suspected terrorists can fail to be detected overall, allowing for a huge injustice and unfairness. Privacy rights concerned with biometrics have sparked a concern and should be dealt with; otherwise, this is just one of the
One of the largest parts of commerce is transaction. Transactions are needed anytime two parties exchange money or information. Since the Information Age has begun, transactions are more common over the Internet, where it is more imperative that transactions are secure (Klein x). Corporations have also become more widespread, which means that cryptography is needed to secu...
D'Souza, Annabelle . "Technology Advances Leading to the Diminishing of Private Rights." Georgia Law. N.p., 1 Mar. 2003. Web. 15 Apr. 2014.
Biometrics can be used as a method of identification for accessing a computer, room, or anything where identity needs to be provided to access information or equipment. Some people resist biometrics because of the concerns in which their privacy will be invaded or they think technology is getting too intrusive on people personal lives. Biometrics is not flawless and does have some privacy related issues. There are mechanism that can be put in place which could mitigate these problems and concerns. Some biometrics may not meet due to undue resistance from potential users and may be recommended to the manager to use password-based access controls instead.
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
Staff, Proquest. At Issue: Technology and Privacy. N.p.: ProQuest LLC, 2013. Web. 5 Dec. 2013. .