Information and Communication Technology - C.2.4. Security and Authentication for International Agreements
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Security and authentication are critical features for systems implementing international social security agreements. First, given the interorganizational and cross-border nature of these systems, institutions have to apply security and data protection policies and regulations. Second, the ICT-based implementation has to provide the means to validate the authenticity of the operations and to replace the handwritten signature.
This section includes guidelines addressing these issues and providing recommendations to define an authentication framework at the international level as well as implementation measures at institutional level.
This content is available for ISSA members only.
Please login to your My ISSA to access this page.
Login