• First Reference
  • About us
  • Contact us
  • Blog Signup 📨

First Reference Talks

Discussions on Human Resources, Employment Law, Payroll and Internal Controls

  • Home
  • About
  • Archives
  • Resources
  • Buy Policies

authentication

By Apolone Gentles, JD, CPA,CGA, FCCA, Bsc (Hons) | 3 Minutes Read February 2, 2022

Electronic signatures and their reliability

keyboard, screen penElectronic signatures are widely accepted in Canada and many other countries. Each Canadian jurisdiction has general electronic commerce statutes that deem electronic signatures acceptable and equivalent to “wet” or handwritten ones, with certain exceptions, and if they meet stated requirements.

Article by Apolone Gentles, JD, CPA,CGA, FCCA, Bsc (Hons) / Information Technology / authentication, digital signatures, electronic commerce, Electronic signatures, electronically signed documents, Internal Controls

By Occasional Contributors | 2 Minutes Read August 29, 2017

NIST’s recommended password policy evolves

As imperfect a means of authentication as they are, “memorized secrets” like passwords, pass phrases and PINs are common, and indeed are the primary means of authentication for most computer systems. In June, the National Institute of Standards and Technology issued a new publication on digital identity management that, in part, recommends changes to password policy that has become standard in many organizations—policy requiring passwords with special characters.

Article by Occasional Contributors / Information Technology, Privacy / authentication, digital identity management, Internal Controls, IT security, National Institute of Standards and Technology, NIst, password policy, passwords, security

By Occasional Contributors | 3 Minutes Read March 3, 2017

Biometric data: What if you “lost” your fingerprint?

Biometric authentication is becoming increasingly common. Smartphones and computers use it, banks have started to use it, and recently MasterCard began rolling out "selfie pay" allowing users to authenticate online payments by using their face at the point of sale. Biometric authentication refers to the validation of a user’s identity by measuring physical or behavioral characteristics. Biometric samples may include fingerprints, retinal scans, palm scans, face and voice recognition.

Article by Occasional Contributors / Business, Information Technology, Privacy / authentication, biometric authentication, biometric data, Biometric Information Privacy Act, Biometrics, cybersecurity, fingerprint, fingerprint authentication

Footer

About us

Established in 1995, First Reference is the leading publisher of up to date, practical and authoritative HR compliance and policy databases that are essential to ensure organizations meet their due diligence and duty of care requirements.

First Reference Talks

  • Home
  • About
  • Archives
  • Resources
  • Buy Policies

Main Menu

  • About First Reference
  • Resources
  • Contact us
  • 1 800 750 8175

Stay Connected

  • Facebook
  • LinkedIn
  • Twitter
  • YouTube

We welcome your comments on our blog articles. However, we do not respond to specific legal questions in this space.
We do not provide any form of legal advice or legal opinion. Please consult a lawyer in your jurisdiction or try one of our products.


Copyright © 2009 - 2023 · First Reference Inc. · All Rights Reserved
Legal and Copyright Notices · Publisher's Disclaimer · Privacy Policy · Accessibility Policy