Document Type : Research Paper
Authors
Abstract
The reliability of electronic evidence means the authenticity of electronic
data in court and playing a role in the judgments. In order to have the same
demonstrative function as traditional evidence, electronic evidence must
meet two main requirements: authentication, originality and nonrepudiation.
It is essential to keep data suitably in the seized phase to
achieve these requirements. The secure strategies for protection of the data
have been mentioned in clause (T), article 2 of the Electronic Commercial
Act and also article 40 of Cybercrimes Act, of which the most important is
biometric and encryption. The biometric technology receives and processes
the individuals’ data and allows to achieve the data only to whom his/her
data have been processed; hence, no one else can access the data. Also in
encryption, the data are protected by shuffling in a way that it can switch
such statement with only one confidential key and it remains illegible to a
person who does not access these data. In this way, the data are protected
from alternation and falsification and can be cited in such a secure way.
Keywords
- Chawki, Mohamad; AbdelWahab, Mohamad. (2005). Identity Theft in Cyber Space: Issues and Solution, George Town University Law Center, Vol. 3, pp. 8-30.
- Close Angeline Grace,Zinkhan Georg; Finney,Zachary. (2003). Cyber Identity Theft: A Conceptual Model and Implication for Public Policy,Northwestern University School of Law, No. 07-09, pp. 1-27.
- Gaur, Priyanka; Srivastava, Prabhat. (2015). Biometric Risks - How to Deal with the Challenges, Scholedge International Journal of Management & Development, Vol. 2, No. 7, pp. 16-23.
- Greenleaf, Graham; Clarke, Roger. (1997). Privacy Implications of Digital Signatures, IBC Conference on Digital Signatures (Proc.), Sydney, pp. 1 - 12.
- K.Govinda; E.Sathiyamoorth. (2011). Multilevel Cryptography Technique Using Graceful Codes, Journal of Global Research in Computer Science, Vol. 2, No. 7, pp. 1-5.
- Kerr, Orins. (2005). Digital Evidence And the New Criminal Procedure, The George Washington University Law School Public Law and Legal Theory Working Papper, No. 108, pp. 1-62.
- Kumar, Animesh. (2013). Asymmetric key Cryptography, pp. 1- 11, Available at SSRN: http://ssrn.com/abstract=2372882.
- Levy. S, Grand. (2005). Theft Identity, The American Journal of International Law, Vol. 80, No. 1, pp. 40-60.
- Mason, Stephan. (2006). Electronic Signature in Practice, Journal of High Technology Law, Vol. VI, No. 2, pp. 33-48.
- Swire, Peter; Ahmad, Kenesa. (2012). Encryption and Globalization, Columbia Science and Technology Law Review, Vol. 23, No. 157, pp. 416 - 481.
- Wang, Minyan. (2006). The Impact of Information Technology Development, Journal of Law and Technology, Vol. 15, No. 3, pp. 1-37.