Faygo: The Rise of Detroit's Iconic Soda Brand
-
Faygo Beverages, Inc., originally known as Feigenson Brothers Bottling
Works, was founded in Detroit, Michigan, in 1907 by Russian immigrant
bakers Ben and...
In the emerging economy there is a new infrastructure, based on the internet, that is causing us to scrutinies most of our assumptions about the business. As a skin of networks - growing in ubiquity, robustness, bandwidth, and function - covers the skin of the planet, new models of how wealth is created are emerging.
Tuesday, January 15, 2013
Identification and Authentication of the Parties
Identification and Authentication of the Parties
One of the major problems that contracting on the Net faces is the difficulty of establishing the identity of the party who is on the other side of the transaction.
The exchange of valuables which is at the heart of contract law losses meaning if the parties exchanging them do not exactly know that there is somebody at the other side who is what she claims to be.
This is not necessarily because of any need to know the other person’s particulars or in view of future business prospects, but to be sure that if anything goes wrong the party claiming redress knows how to get to or communicate with that other party.
In contract law terms, the innocent party should have sufficient information about the party in default or alleged breach of the contract so as to pursue her claims against that party successfully.
The problem of not being able to establish the identity of a person transacting on the Net readily is made worse by the use of ‘remailers’ nor ‘anonymizers.’
These are software programs which can cloak the identity of a contracting party by either removing or replacing the actual address from which a party is sending messages so that it becomes impossible to trace that party.
From a practical angle, where such software is used the party that pays for goods in the Net but does not received the goods will not be able to establish of the seller is real or a phantom or whether she is residing at the specified origin of the electronic communication of acceptance or notice of delivery.
Another way on which a party may be prevented from establishing the identity of the other side is “spoofing,” that is use by the latter party of identity or account of another person to masquerade as that other person.
This is done not only by faking the identity of another party, but also by altering or falsifying e-mails so that the identity of a non-transacting party is assumed.
There are several spy programs that monitor the keystrokes of people to imitate their identity and misrepresent them.
It is therefore vital for contracting parties to know, and have confidence that the other parity is genuine and fits the description that she has supplied about herself during the transaction.
The common use of passwords as a means of identity authentication has been found to be deficient, open as it is to deliberate or inadvertent disclosure, backing or some other means of intervention or eavesdropping.
Among the more reliable emerging forms of authentication of parties employing electronics means of transactions is the use of digital signature technology.
Biometric techniques (such as fingerprinting, handwriting or voice recognition, retinal, or hand geometry scanning) are still in a process of development or immensely expensive to adopt at the moment.
Identification and Authentication of the Parties
The most popular articles
-
Software Suites and Integrated Packages Software suite is the popular general-purpose application software. That’s because the most widely u...
-
The essential E-commerce process is required for the successful operation and management of E-commerce activities. One of the processes is a...
-
First Generation of Computer and ENIAC “Generation” in computer talk is a step in technology. It provides a framework for the growth of the ...
-
Companies involved in e-commerce as ether buyer s or sellers rely on Internet based technologies, and E-commerce applications and service to...
-
The unauthorized use of computer systems and networks can be called time and resource theft. A common example is unauthorized use of company...
My Blog List
-
-
ADP: A Central Molecule in Cellular Energy and Function - Adenosine diphosphate (ADP) is a key molecule in cellular energy regulation, consisting of adenosine and two phosphate groups. It is central to the cell's ...
-
The Battle of Orchomenus: Sulla’s Decisive Victory in the First Mithridatic War - The Battle of Orchomenus, fought in 85 BCE, was a decisive encounter during the First Mithridatic War, pitting the Roman Republic under Lucius Cornelius Su...