The electronic signature - technical and legal implications

AuthorAdrian Constantin Manea
PositionPhD. Student on Computer and Information Technology, Transilvania University of Brasov
Pages225-234
Bulletin of the Transilvania University of Braşov
Series VII: Social Sciences • Law • Vol. 7 (56) No. 2 - 2014
THE ELECTRONIC SIGNATURE -
TECHNICAL AND LEGAL
IMPLICATIONS
Adrian Constantin MANEA1
Abstract: The end of the twentieth century, known as the Internet bubble
period or the dot-com boom was marked by the adoption of regulations
regarding the electronic signature and its use i n electronic transactions both
at the European Union level as well as that of other structures. From the
technical point of view, the application of the electronic signature on the
documents transmitted online is solved, with the necessary technologies
implemented, in terms of practice, the steps taken are small - we are still in
an early stage of implementation of the electronic signature on tax returns.
Key words: electronic signature, extended electronic signature (advanced),
certificate, provider of certification services, non-repudiation.
1 PhD. Student on Computer and Information Technology, Transilvania University of Braşov.
1. Introduction
In the context of technological
development and the involvement of the
information society in day to day life,
considering that networks play a growing
role in the economic and social life of
individuals, transporting increasingly more
sensitive data and important economic
information, information security has
become a priority and a challenge against
the attacks that take different forms.
The rapid development of modern
information and communication
technologies - a prerequisite to building an
information society - had a major impact
on the society as a whole, marking true
mutations in the operating philosophy of
economics, politics and the cultural field,
but also on the everyday life of the
individual, so that currently, the use of
internet and computer networks is
omnipresent in our lives, in any daily
activity, from job-related duties,
programming our vacations and leisure
time, from making daily or luxury
purchases, to the enrolment in education
and attending courses on online platforms,
from communicating with those who are
far from us via social networks or the
internet, to organizing onli ne conferences
and events even broadcast online.
The interception of electronic
communications and copying the data sent,
even changing them and generating
material damage (e.g. stealing passwords
or bank card details by third parties,
unauthorised by the cardholder) or the
moral damage by affecting the right to
privacy and personal data of network
users, up to the infliction of security
incidents due to natural disasters or
disasters affecting communication
networks, all are threats to networks and

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT