Demonstrating authenticity of electronic records is becoming as important as capturing and maintaining electronic content. Questions have been arising in lawsuits and criminal prosecutions about whether electronic records are reliable and trustworthy. 232 more words
Tags » Authentication
Why do system designers insist on bugging us to logon every time we want to do anything?
In this blog, I’d like to pivot on the “IDAM/ICAM Industry” core premise that establishing the Identity of the person/non-person and Authentication are the objectives of most online systems. 315 more words