02886aam 2200433I 450 991071118020332120151105023937.0GOVPUB-C13-c2058897311221041d74beeb1af94d13(CKB)5470000002480206(OCoLC)927737338(EXLCZ)99547000000248020620151105d1993 ua 0engrdacontentrdamediardacarrierGood security practices for electronic commerce, including electronic data interchange /Roy G. SaltmanGaithersburg, MD :U.S. Dept. of Commerce, National Institute of Standards and Technology,1993.1 online resourceNIST special publication ;800-91993.Contributed record: Metadata reviewed, not verified. Some fields updated by batch processes.Title from PDF title page.Withdrawn.Includes bibliographical references.Electronic commerce (EC) is the use of documents in electronic form, rather than paper, for carrying out functions of business or government that require interchange of information, obligations, or monetary value between organizations. Electronic data interchange (EDI) is the computer-to-computer transmission of strictly formatted messages that represent documents; EDI is an essential component of EC. With EC, human participation in routine transaction processing is limited or non-existent. Transactions are processed and decisions are made more rapidly, leaving much less time to detect and correct errors. This report presents security procedures and techniques (which encompass internal controls and checks) that constitute good practices in the design, development, testing and operation of EC systems. Principles of risk management and definition of parameters for quantitative risk assessments are provided. The content of the trading partner agreement is discussed, and the components of EC, including the network(s) connecting the partners, are described. Some security techniques considered include audit trails, contingency planning, use of acknowledgments, electronic document management, activities of supporting networks, user access controls to systems and networks, and cryptographic techniques for authentication and confidentiality.Computer securityData interchangeElectronic commerceSaltman Roy G1207356Saltman Roy G1207356National Institute of Standards and Technology (U.S.).Computer Security Division.NBSNBSGPOBOOK9910711180203321Good security practices for electronic commerce, including electronic data interchange3460011UNINA01481nam 2200421 450 991071490910332120230613161249.0(CKB)4100000011134474(NjHacI)994100000011134474(OCoLC)1202622746(EXLCZ)99410000001113447420230613d2020 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierFrom clickwrap to RAP sheet criminal liability under the Computer Fraud and Abuse Act for terms of service violations /Peter G. Berris[Library of Congress public edition].Washington, D.C. :Congressional Research Service,2020.1 online resourceLegal sidebarThe CRS web page provides access to all versions published since 2018 in accordance with P.L. 115-141.Legal sidebar.From Clickwrap to RAP SheetCriminal liabilityUnited StatesInternetLaw and legislationUnited StatesCriminal liabilityInternetLaw and legislation345.7304Berris Peter G.1361585Library of Congress.Congressional Research Service,NjHacINjHaclBOOK9910714909103321From clickwrap to RAP sheet3380196UNINA