• 2025
  • April - 3 articles
  • March - 14 articles
  • February - 16 articles
  • January - 15 articles
  • 2024
  • December - 15 articles
  • November - 15 articles
  • October - 20 articles
  • September - 17 articles
  • August - 20 articles
  • July - 18 articles
  • June - 20 articles
  • May - 22 articles
  • April - 12 articles
  • March - 14 articles
  • February - 13 articles
  • January - 11 articles
  • 2023
  • December - 12 articles
  • November - 12 articles
  • October - 16 articles
  • September - 11 articles
  • August - 13 articles
  • July - 13 articles
  • June - 13 articles
  • May - 12 articles
  • April - 11 articles
  • March - 15 articles
  • February - 12 articles
  • January - 13 articles
  • 2022
  • December - 14 articles
  • November - 12 articles
  • October - 11 articles
  • September - 12 articles
  • August - 13 articles
  • July - 13 articles
  • June - 13 articles
  • May - 12 articles
  • April - 12 articles
  • March - 14 articles
  • February - 12 articles
  • January - 13 articles
  • 2021
  • December - 15 articles
  • November - 12 articles
  • October - 14 articles
  • September - 11 articles
  • August - 15 articles
  • July - 12 articles
  • June - 14 articles
  • May - 12 articles
  • April - 14 articles
  • March - 15 articles
  • February - 11 articles
  • January - 11 articles
  • 2020
  • December - 14 articles
  • November - 11 articles
  • October - 13 articles
  • September - 11 articles
  • August - 9 articles
  • July - 11 articles
  • June - 16 articles
  • May - 13 articles
  • April - 13 articles
  • March - 17 articles
  • February - 10 articles
  • January - 12 articles
  • 2019
  • December - 12 articles
  • November - 11 articles
  • October - 12 articles
  • September - 12 articles
  • August - 14 articles
  • July - 11 articles
  • June - 12 articles
  • May - 14 articles
  • April - 12 articles
  • March - 14 articles
  • February - 14 articles
  • January - 17 articles
  • 2018
  • December - 14 articles
  • November - 13 articles
  • October - 17 articles
  • September - 14 articles
  • August - 14 articles
  • July - 19 articles
  • June - 17 articles
  • May - 18 articles
  • April - 20 articles
  • March - 18 articles
  • February - 18 articles
  • January - 19 articles
  • 2017
  • December - 19 articles
  • November - 16 articles
  • October - 19 articles
  • September - 21 articles
  • August - 22 articles
  • July - 17 articles
  • June - 19 articles
  • May - 20 articles
  • April - 18 articles
  • March - 20 articles
  • February - 13 articles
  • January - 6 articles
  • 2016
  • December - 10 articles
  • November - 9 articles
  • October - 8 articles
  • September - 10 articles
  • August - 10 articles
  • July - 8 articles
  • June - 11 articles
  • May - 8 articles
  • April - 11 articles
  • March - 11 articles
  • February - 11 articles
  • January - 9 articles
  • 2015
  • December - 13 articles
  • November - 13 articles
  • October - 14 articles
  • September - 13 articles
  • August - 11 articles
  • July - 12 articles
  • June - 14 articles
  • May - 11 articles
  • April - 12 articles
  • March - 12 articles
  • February - 12 articles
  • January - 9 articles
  • 2014
  • December - 10 articles
  • November - 9 articles
  • October - 13 articles
  • September - 12 articles
  • August - 13 articles
  • July - 14 articles
  • June - 10 articles
  • May - 14 articles
  • April - 15 articles
  • March - 17 articles
  • February - 14 articles
  • January - 18 articles
  • 2013
  • December - 20 articles
  • November - 18 articles
  • October - 21 articles
  • September - 19 articles
  • August - 21 articles
  • July - 22 articles
  • June - 20 articles
  • May - 23 articles
  • April - 26 articles
  • March - 24 articles
  • February - 29 articles
  • January - 24 articles
  • 2012
  • December - 22 articles
  • November - 24 articles
  • October - 27 articles
  • September - 27 articles
  • August - 25 articles
  • July - 22 articles
  • June - 20 articles
  • May - 28 articles
  • April - 24 articles
  • March - 28 articles
  • February - 24 articles
  • January - 24 articles
  • 2011
  • December - 24 articles
  • November - 18 articles
  • October - 21 articles
  • September - 21 articles
  • August - 21 articles
  • July - 20 articles
  • June - 23 articles
  • May - 27 articles
  • April - 22 articles
  • March - 22 articles
  • February - 16 articles
  • January - 20 articles
  • 2010
  • December - 21 articles
  • November - 18 articles
  • October - 20 articles
  • September - 13 articles
  • August - 11 articles
  • July - 9 articles
  • June - 8 articles
  • May - 9 articles
  • April - 11 articles
  • March - 12 articles
  • February - 10 articles
  • January - 10 articles
  • 2009
  • December - 11 articles
  • November - 9 articles
  • October - 11 articles
  • September - 10 articles
  • August - 10 articles
  • July - 10 articles
  • June - 10 articles
  • May - 11 articles
  • April - 13 articles
  • March - 13 articles
  • February - 7 articles
  • January - 10 articles
  • 2008
  • December - 12 articles
  • November - 8 articles
  • October - 16 articles
  • September - 11 articles
  • August - 13 articles
  • July - 13 articles
  • June - 14 articles
  • May - 13 articles
  • April - 13 articles
  • March - 9 articles
  • February - 14 articles
  • January - 11 articles
  • 2007
  • December - 11 articles
  • November - 12 articles
  • October - 12 articles
  • September - 4 articles
  • August - 4 articles
  • July - 4 articles
  • June - 2 articles
  • May - 6 articles
  • April - 5 articles
  • March - 1 article
  • Tuesday, June 12, 2018

    Encryption debated in Washington

    Security experts are debating the Ensuring National Constitutional Rights for Your Private Telecommunications (ENCRYPT) Act, proposed legislation to create a uniform national encryption policy. Introduced June 7, 2018, by Reps. Ted Lieu, D-Calif., Mike Bishop, R-Mich., Suzan DelBene, D-Wash., and Jim Jordan, R-Ohio, the bill would enable federal agents to access “back doors” into encrypted data. It would also prevent individual states from enacting separate data access policies. ENCRYPT Act supporters call it a necessary protection against counterterrorism; opponents argue it gives too much power to federal law enforcement.

    Rep. Lieu believes the bill has received bipartisan support because it addresses conflicting encryption standards for interstate commerce, economic security and cybersecurity. “I can tell you that having 50 different mandatory state-level encryption standards is bad for security, consumers, innovation, and ultimately law enforcement,” he stated. “Encryption exists to protect us from bad actors and can’t be weakened without also putting every American in harm’s way.”

    Morgan Reed, president of the App Association, added, “On behalf of app developers and tech innovators across the country and around the world, we can attest to the value of encryption technologies to protect data and prevent crimes. The ENCRYPT Act is a necessary step to ensure Americans can use encrypted technologies to protect themselves and their data, regardless of where they live.”

    Reed further noted that encryption protects data from criminal access, but the current patchwork of conflicting state policies creates known vulnerabilities that criminals can exploit. “This legislation establishes national guidelines for the interstate use of encrypted technology and protects the data that drives our local economies and the app economy at large,” he said.

    Assigning backdoor keys

    Gabriel Gumbs, vice president of product strategy at STEALTHbits Technologies, is concerned by the ENCRYPT Act’s potential to force technology companies to implement security backdoors. “Undoubtedly any backdoor that is introduced will be available to both law enforcement and bad actors alike, collectively making us less secure,” he said.

    Anthony James, chief marketing officer at CipherCloud, also voiced concerns about granting federal law enforcement unilateral access to civilians’ encrypted data. “Despite the noble objective of nationally standardized encryption in support of law enforcement and counter-terrorist activity, the use by government of forced disclosure, whether at the state level or the federal level, can move the control of your data into someone else’s hands,” he said. “‘Back doors,’ or special APIs that access your data at various points of being used within applications, can also easily circumvent basic protection such as ‘at rest’ encryption for your databases.”

    James said the only way civilians can maintain control over their confidential data is to implement Zero Trust end-to-end encryption. This level of protection would not allow anyone to use a backdoor into a third-party-provided cloud application to access data without a user’s explicit knowledge and approval, he noted, adding that only “your decision to deliver your data encryption keys to the requesting party will expose the data.”

    Details, questions remain

    Ruston Miles, chief strategy officer, executive vice president and founder of Bluefin, pointed out that the PCI Security Standard Council's P2PE solution protects merchants and cardholders by encrypting card data immediately upon entry. "Around the world, a growing number of merchants, from multinational enterprises to local businesses, are using PCI point-to-point encryption to protect their customers’ cardholder data,” he said.

    Miles observed that more than 1,600 data breaches were reported in 2017, and nearly all involved transmitting and processing unencrypted payment card data. Additional incidents went unreported or undiscovered, he said. He described the ENCRYPT Act as a well-intentioned effort to create a national security policy but suggested that numerous details will have to be solved during implementation.

    Willy Leichter, vice president of marketing at Virsec, said having a standardized national encryption policy seems like a positive move, but it falls short of solving the basic collision of interests around encryption. “Law enforcement wants broader access, while privacy experts (and most of the security industry) don’t want to neuter the effectiveness of encryption,” he said. “This group seems to understand that encryption is a fundamental building block of most digital business, and weakening it, for whatever reasons, can be disastrous.”

    Editorial Note:

    Whether you want to upgrade your POS offerings, find a payment gateway partner, bone up on fintech regs or PCI requirements, find an upcoming trade show, read about faster payments, or discover the latest innovations in merchant acquiring, The Green Sheet is the resource for you. Since 1983, we've helped empower and connect payments professionals, starting with the merchant level salespeople who bring tailored payment acceptance and digital commerce tools, along with a host of other business services to merchants across the globe. The Green Sheet Inc. is also a proud affiliate of Bankcard Life, a premier community that provides industry-leading training and resources for payment professionals.

    Notice to readers: These are archived articles. Contact information, links and other details may be out of date. We regret any inconvenience.

    skyscraper ad