|“||Online transactions are secure if the implementation mechanisms meet their predefined security objectives of correctly authenticating the parties to the transaction, prevent unauthorized access and release of data, assure availability, faithfully conduct and record any negotiation, and preserve confidentiality and integrity of information. Pre-defined security objectives vary widely depending on the need.||”|
- ↑ National Strategy for Trusted Identities in Cyberspace, at 34.
- ↑ I. Trotter Hardy, Project Looking Forward: Sketching the Future of Copyright in a Networked World 61 (May 1998).
Community content is available under CC-BY-SA unless otherwise noted.