Electronic Communication Act 2000 and the Paperless Office (General Summary)

The general thoughts are that the E.C.A act has had an overall impact on the development of the paperless system and the paperless office , as this was it’s intension to do so, not in the last two areas but certainly to help and to make a more secure system, that we can all benefit form.

This only can have a rebound effect to the paperless systems and Paperless office systems. We are seeing at the moment that securing file and documents within the business environment is slowly becoming second nature to any small or large business, not only that due to the technology which is available this is slowly becoming a cheaper option.

You will read articles that the act was just a small stepping stone, that has opened a very large wound, and you will be correct to assume that, the overall thought of encrypting or making things more secure and also to make a measurable impact of the various ways of making this happen within the ever increasing technology race.

One of most measurable area is that of recognition of the electronic signature that could be used in the court of law, id I do believe is a big step in the right directs, we must remember that the act is 10 years old, so a lot will have happened since then.

Will the main thought process of Cryptography make any major radical changes to what we use today, I think to the every day person who users the internet of any paperless system, this will not have a major change it will help to simonize the process of security, but behind close doors things have changed and I believe they will for many years to come.

We must remember that there are many examples of cryptography; security of information is never one hundred percent perfect. Even though more complex encryption methods are always being created, sophisticated hackers can learn to adapt and find a way to crack these systems and in all cases we just need to try and be one step ahead of the game.

Just to confirm that the difference between cryptography and encryption terms are Cryptography is the study and methods used for the security of messages and other important information, while encryption is the specific techniques that make these methods possible.

What are the differences of Digital Signatures and Email Encryption methods?

Encryption use asymmetrical keys, the goal of a digital signature and that of email encryption are entirely different. A digital signature is used to verify that a particular electronic document was created by a particular individual and has not been altered in the transmission process. The process is used to authenticate the author and the contents of the document beyond a shadow of doubt.

Email encryption, on the other hand, is used to maintain the privacy of the contents of an email. Generally, information that should not be privy to everyone is subject to email encryption.

When implementing digital signatures, the public key is used for decryption while its corresponding private key is used for encryption. The process for email encryption is exactly the opposite.

Email encryption and digital signatures are certainly not mutually exclusive, even though they have differences. There are occasions where establishing the identity of an e-mail’s author is equally as important as maintaining the security of its contents.

This is a scenario where both technologies would be used in conjunction with each other.

I think that a general understanding of this act plays a major role when looking at the concept of the paperless system and in years to come will certainly assist the general development of a paperless system.


About martin smith

A degree in Engineering Management ,who is just trying to make life a bit easier, for anyone who wishes to read these articles. View all posts by martin smith

3 responses to “Electronic Communication Act 2000 and the Paperless Office (General Summary)

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: