The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.

Slides:



Advertisements
Similar presentations
HCQ P MEDICARES HEALTH CARE QUALITY IMPROVEMENT PROGRAM QualityNet Exchange Dennis Stricker Director, Information Systems Group Office of Clinical Standards.
Advertisements

Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
Security Vulnerabilities and Conflicts of Interest in the Provider-Clearinghouse*-Payer Model Andy Podgurski and Bret Kiraly EECS Department & Sharona.
Westbrook Technologies from Document Management’s Role in HIPAA.
Public Key Infrastructure (PKI) Hosting Services.
CHAPTER Current Future Contract Law for E-Commerce Current Future Contract Law for E-Commerce 9.
Welcome to the World of Cloud SMSF Auditing To Revolutionize your Business.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Security Controls – What Works
EUropean Best Information through Regional Outcomes in Diabetes Privacy and Disease Registries Technical Aspects Peter Beck JOANNEUM RESEARCH, Austria.
Trusted Electronic Transactions.  Why conduct transactions electronically?  Three Characteristics that ensure trust in electronic transactions  How.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
CROMERR Applied to Industrial Pretreatment Linko Data Systems, Inc. PretreatmentPretreatment & Fats Oil and Grease SoftwareFats Oil and Grease Software.
Legislation, Regulation, Guidelines
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Compliance and Regulation for Mobile Solutions Amanda J. Smith Messick & Lauer, P.C. May 16, 2013.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
Business Law for the Entrepreneur and Manager
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Other Laws (Primarily for E-Government) COEN 351.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Copyright © 2000 Internet Document Security Alan Weintraub Research Director March 9, 2000.
Internet Security for Small & Medium Business Week 6
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Establishing a Digital Identity Martin Roe - Director of Technology, Royal Mail ViaCode.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
U.S. General Services Administration Federal Technology Service November 9, 1999 Judith Spencer Director, Center for Governmentwide Security Office of.
Dimensions of E – Commerce Security
Electronic Signatures in the SFA Loan Programs Electronic P-Notes Presented by Jeff Baker & Kay Jacks.
1 UNECE Capacity Building Workshop on Trade Facilitation Implementation: October 2004 Electronic PostMark (EPM) Security & Authentication for eTrade Documents.
FDA Public Meeting on Electronic Records and Signatures June 11, 2004 Presentation of the Industry Coalition on 21CFR Part 11 Alan Goldhammer, PhD Chair.
Higher Education PKI Summit Meeting August 8, 2001 The ABA PAG Rodney J. Petersen, J.D. Director, Policy and Planning Office of Information Technology.
Meganet Corporation VME Sign Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Electronic PostMark (EPM) Project Overview May, 2003 Copyright Postal Technology Centre.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
DIGITAL SIGNATURE.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
Session 52-1 Session 52 E-Signature: Implications of the E-SIGN Legislation for Student Aid 1.
Digital Signatures and Digital Certificates Monil Adhikari.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
& UETAESIGN COMPLIANCE. CHANGING LANDSCAPE As contract management transitions into a paperless world, documents must remain compliant with government.
222 About RPost Leader in security since 2000 Endorsed by more than 20 major bar/law associations Used by U.S. Government Used by insurance carriers.
Clouding with Microsoft Azure
Legality of Electronic Signatures
Chapter 10 Cyberlaw, Social Media, and Privacy
E&O Risk Management: Meeting the Challenge of Change
- POSITIONING PAPER IN DIGITAL WORLD -
S/MIME T ANANDHAN.
Digital Signature.
Using eSignature for Signing IBM Contracts
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Ease your workload, speed up your processes and minimize risks
Legislation, Regulation, Guidelines
Employee Privacy and Privacy of Employee Information
Some Basic Advantages Cloud-Based Auditing
Meganet Corporation VME Sign 2004
Reiniger LLC.
Presentation transcript:

The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman

USPS Electronic Postmark (USPS EPM) Add service (easy integration) Verify trust and add legal strength to electronic content Web-based content authenticity online Protect against tampering ESIGN compliant Store evidence of content with USPS Minimize likelihood that electronic content can be denied or repudiated

Legal Value Non-repudiation Legal/technical concept - sufficient evidence to prevent parties to transactions from falsely denying them in a court of law ESIGN (Electronic Signatures in Global and National Commerce Act 2000) Enables business and government to sign contracts, letters and agreements electronically with the same legal relevance as their paper counterparts USPS Brand As a USPS operation, the USPS EPM service applies federal statutes (ex. wire fraud) to electronic transactions, similar to physical mail world

US Federal Electronic Legislation  Government Paperwork Elimination Act (GPEA) 1998 Efficient government service delivery - ensure standards for electronic signatures across federal agencies  Health Insurance Portability and Accountability Act (HIPAA) 1996 Improve portability and continuity of health insurance coverage to combat waste, fraud, and abuse within health insurance and health care delivery  Gramm-Leach-Bliley Act (GLBA) 1999 Proper collection and distribution of a consumer’s personal information in securities, insurance, and banking industries  Electronic Signatures in Global and National Commerce Act (E-SIGN) 2000 Promote e-commerce with performance-based guidelines to eliminate legal barriers to conducting business online, while protecting consumers  Sarbanes-Oxley Act 2002 Sweeping reform legislation intended to protect investors by improving the accuracy and reliability of corporate disclosures made pursuant to the securities laws

Deterrence Value Legal strength, enforcement capabilities of US Postal Inspection Service Enforcement capability ensures electronic data protection from fraud Should USPS EPM tampering be detected, the matter may be referred to Postal Inspection Service for possible review and action consistent with federal statutes Supported by federal laws –18 U.S.C 2701 Electronic Communications Privacy Act (ECPA) –18 U.S.C 1343 Wire Fraud –18 U.S.C 2510 regarding electronic communications –18 U.S.C 1028, Fraud and related activity in connection with identification documents and information

Content is hashed. (PKI) Hash signed by user/server digital certificate. Signed hash received, certificate used to sign hash checked for validity. Time stamp (NIST) obtained and signed by USPS digital certificate. Signed hash sent via SSL to USPS EPM Data Center. Content created from application. Internet USPS signed time stamp applied to signed hash of electronic file to produce USPS EPM. Transaction stored in USPS EPM data center for 7 years. Technology

USPS EPM Enabled Tools Software development kit (COM, Java) Web signer toolkit Applications –Microsoft Word Extension (Office 2000, XP, 2003) –Adobe Extension

COMPLIANCE IN ACTION USPS Extension for Microsoft Word DEMO

Customer Benefits Protect against identity fraud in electronic transactions Protect electronic content authenticity Provide legal relevance to electronic content Increase efficiencies (streamline and accelerate workflow processes) Reduce costs (labor, paper, overhead, storage) Reduce risks (audit trails for compliance) Create trust in faceless electronic transactions

Customer Benefits Add strong content authentication technology to online forms Add USPS brand –Federal legal strength (e.g. wire fraud statute) –Enforcement (US Postal Inspection Service) Reduce risks (audit trails for compliance) Competitive advantage – ease of use and brand trust recognition

THANK YOU Q & A