Secured Information System in Electronic Commerce Law

Authors

Abstract

According to the Electronic Commerce Law, one of the essential elements of secure electronic evidence is a secure information system. It is defined as a system that emerged, saved or telecommunicated the data message so that it is available whenever is needed… and is organized so that fulfill integrity and confident of electronic evidence.
The electronic devices are dynamic so that any unique technique have not been defined as a secure information system by law but functions of such systems have been provided. Therefore any system that can fulfill these functions is considered as the secure information system.
In this paper, the criteria of the secure information system in electronic commerce law are studied.

Keywords


  1. 1. سهیل سرمدسعیدی و وحیدرضا میرابی، تجارت الکترونیکی، کیمیا،1383.

    2. سیامک قاجار، ادله اثبات در محیط­های دیجیتال، دبیرخانه شورای عالی انفورماتیک، چاپ محدود، 1374.

    3. محسن شجاعی و احمد ملکی زاده، تجارت الکترونیکی، انتشارات پرتونگار،1383.

    4. محبوبه عبدالهی، دلیل الکترونیکی در دعوای حقوقی، پایان­نامه کارشناسی ارشد حقوق خصوصی، دانشگاه تربیت مدرس، 1387

    5. هیأت مؤلفان انتشارات میکروسافت، فرهنگ تشریحی اصطلاحات کامپیوتری میکروسافت، ترجمه فرهاد قلی­زاده نوری، چ4، انتشارات آذرباد، 1379.

    1. Federal Financial Institution Examination Council, information security, aa:http://www.ffiec.gov/ffiecinfobase/booklets/information_security/information_security.pdf,2006.
    2. Henry Wolfe," Forensics and the Emerging Importance Evidence Gathering",aa:http://nzcs.org.nz/sITE-Default/x-files/4915pdf, 2001.
    3. Sudhanshu Kairab, A Practical Guide to Security Assessments, CRC Press Company, London , 2004.
    4. United National, Convention On The Use Of Electronic Communications In International Contract 2007, www.uncitral.org.
    5. United National, UNCITRAL Model Law on Electronic Commerce with Guide to Enactment, 1996, United National. www.Uncitral.org/pdf/English/texts/electoms/ml-e common.html.
    6. University of California Business and Finance Bulletin,"IS-3 Electronic Information Security", 2008. http://people.seas.harvard.edu/~tmoore/science-econ.pdf