Вы находитесь на странице: 1из 3

Feature

Electronic Documents Information


Haris Hamidovic, Ph.D., CIA,
ISMS IA, is chief information
security officer at Microcredit
Foundation EKI, Sarajevo,
Bosnia and Herzegovina. Prior
Security Compliance
to his current assignment, The increased use of technologies that allow Prevention verification of authenticity and
Hamidovic served as IT electronic document storage and electronic integrity of electronic documents
specialist in the North American communication with clients by governments Archiving of electronic documents in such form
Treaty Organization (NATO)-led and enterprises has led lawmakers and courts in and with such technologies and procedures
Stabilization Force in Bosnia many jurisdictions around the world to consider that do not provide a reasonable guarantee of
and Herzegovina. Hamidovic is the legal status of such information and the legal their authenticity and integrity for the entire
a certified IT expert appointed effect of that communication. Legislators across storage time
by the Federal Ministry the globe recognized the need for new laws to Application of information systems with
of Justice of Bosnia and permit and ensure the admissibility of electronic inadequate protection of personal data in
Herzegovina and the Federal information as evidence and, more so, to enable accordance with the provisions of the law
Ministry of Physical Planning of contracts to be concluded and administrative governing the protection of personal data
Bosnia and Herzegovina. submissions and requests to be made in
electronic form. Perhaps the most important COMPLIANCE
Amra Hamidovic is a legal of these is the United Nations Commission To demonstrate compliance with legal
advisor with extensive on International Trade (UNCITRAL) Model requirements relating to the preservation of the
experience in the Organization Law on Electronic Commerce.1 In one form or authenticity and integrity of electronic documents
for Security and Co-operation another, this law has been enacted in at least throughout the entire electronic document
in Europe (OSCE). She closely 31 countries.2 Other countries have adopted life cycle, organizations should establish a
follows the developments digital signature legislation, generally modeled documented risk-based information security
of jurisprudence before on the UNCITRAL Model Law on Electronic management system (ISMS) and maintain
the domestic courts on the Signatures, which also impacts use of electronic records to confirm compliance. To ensure good
protection of private data and documents to establish business relationships and record-keeping practices are followed to avoid
use of electronic document perform interactions with other entities problems with records acceptance in the event
legislation in Bosnia and and individuals.3 of litigation, an organization should periodically
Herzegovina. Certain legal requirements and obligations assess its practices and procedures.7
of institutions and legal entities need to Consistent use of a risk management strategy
Do you have be fulfilled to ensure the admissibility and and assessment process will show outside
something reliability of electronic documents. According assessors (and courts of law) that due diligence
to say about
to the UNCITRAL Model Law on Electronic was completed and justification for any specific
this article?
Commerce, in assessing the evidential weight direction in technology implementation was
Visit the Journal of a electronic document regard shall be had documented. Will it resolve all liability and risk?
pages of the ISACA
to the reliability of the manner in which the No, of course not. Will it show due diligence and
web site (www.isaca.
electronic document was generated, stored or risk analysis? Absolutely.8
org/journal), find the
article, and choose communicated, to the reliability of the manner
the Comments tab to in which the integrity of the information was Protection of Vital Electronic Records
share your thoughts. maintained, to the manner in which its originator Each organization must analyze its own operations
was identified, and to any other relevant factor.4 and records to determine what information is vital
Go directly to the article: Failure to take appropriate information to its continued existence. Once vital electronic
security measures regarding electronic documents records have been identified, the remaining records
might constitute a violation of legal obligations can then be classified as important or useful.
in some countries and result in fines. So, for Identified vital records and information require
example, under the Bosnia and Herzegovina Law special protection from potential loss. Typically,
on Electronic Documents,5 breaches, subject to only 3-7 percent of an organizations electronic
fines of up to 7,500, include:6 records would be classified as vital.9

2014 ISACA. All rights reserved. www.isaca.org ISACA JOURNAL VOLUME 3, 2014 1
The record types listed in figure 1 are examples of what fundamental in establishing the authenticity and, therefore,
might be considered in each classification. It is the responsibility the evidentiary weight of the stored records.
of each organization to determine the classification of the
records and information for that organization.10 CONCLUSION
The laws pertaining to electronic documents in most
Audit Trail countries are not sector-specific. The enactment of these laws
When preparing electronic records for use as evidence, it is means that all organizations will have to take appropriate
often necessary to detail the storage date of the information, measures to protect document integrity while using electronic
the movement of the information from one medium to another documents in their ordinary course of business. Failure to take
and the evidence of the controlled operation of the records these measures is no longer just lack of due professional care,
management system (RMS). These details are known as audit but constitutes a violation of legal obligations and can result
trail information. The audit trail consists of a historical record of in fines.
all significant events associated with the RMS.11 Application of such laws requires knowledge from various
Procedures for audit trails and any changes to the accepted fields, including familiarity with a number of regulations that
procedures must be documented in an RMS procedures manual. are directly or indirectly related to its provisions. Additionally,
Audit trails must contain sufficient and necessary management of IT and information security is a prerequisite
information to provide evidence of the authenticity of stored for their proper utilization.
records. The audit trail of an RMS shall consist of system- Electronic records processing systems designed and
generated and operator-generated logs containing data about implemented in a fashion to ensure that records cannot be
changes to the stored records. If the authenticity of stored altered or modified without audit trails and/or history logging
records is questioned, the integrity of the audit trail may be can produce accurate results. Such systems must follow a

Figure 1Sample Records Classification


Class Definition Example Example Protection Method
Vital These records contain information Current accounts payable and Backup tape stored offsite
essential to the continuation or survival accounts receivable Backup tape and backup microfilm
of an organization during or immediately Current customer or client files stored offsite
following a crisis. Such records are Research documentation Backup files from imaging server sent
necessary to continue operations without Current contracts and agreements by electronic transmission to a remote
delay under abnormal conditions. Unaudited financial records electronic vault
They contain information necessary to Ledgers and transaction
re-create an organizations legal and documentation stored in a standard
financial status and to preserve the record vault
rights and obligations of stakeholders, Original records transferred to offsite
including employees, customers, protective storage and surrogate
investors and citizens. Vital status should copies used for reference
be assigned only for as long as records
fulfill the stated requirements. Once they
have fulfilled this role, they should be
reclassified.
Important These records are necessary to the Ownership records for land, facilities, Backup of imaging media stored offsite
continued life of the business. They equipment and vehicles Routine and planned dispersal
can be replaced or reproduced only at Tax records
considerable cost in time and money.
Useful These records are useful to the Bank statements Routine dispersal
uninterrupted operation of the business. Correspondence
They are replaceable, but their loss could
cause temporary inconvenience.

2 ISACA JOURNAL VOLUME 3, 2014 2014 ISACA. All rights reserved. www.isaca.org
well-documented business process demonstrating that the
process used to create, store and access the records is reliable
and contains appropriate levels of security for users and
system administrators, preventing unauthorized access and/or Read COBIT 5: Enabling Information.
records deletion/modification. www.isaca.org/cobit
No matter how strong its data security policies and
controls are, an organization will not really know the Collaborate on and discuss cloud computing
adequacy of its defenses unless it continually verifies that and information security management in the
its defenses are sound, uncompromised and applied in a Knowledge Center.
consistent manner. To achieve such assurance, internal
www.isaca.org/knowledgecenter
audit has to play a far more substantial role in evaluating
information security practices or implementation than is often
the case today. 6 O
 fficial Gazette of the Federation of Bosnia and
Herzegovina, Law on Electronic Documents, no. 55,
ENDNOTES 17 July 2013
1 The United Nations Commission on International 7 AIIM International, AIIM TR31-2004, Legal
Trade Law (UNCITRAL), Model Law on Electronic Acceptance of Records Produced by Information
Commerce, 1996 Technology Systems, 2004
2 Montana, John C.; John R. Kain; Kathleen Nolan, 8 Tester, Darlene; Is the TJ Hooper Case Relevant for
Legal Obstacles to E-Mail Message Destruction, Todays Information Security Environment?, ISACA
ARMA International Educational Foundation, Journal, vol. 2, 2013
19 October 2003 Hilliard, Mary; Vital Records, ARMA Austin RIM 101,
9

3 The United Nations Commission on International 15 June 2010, http://austin.arma.org/docs/


Trade Law (UNCITRAL), Model Law on Electronic publications/2011/08/09/20100616_Vital_Records_
Signatures, 2001 Workshop.pdf

4
Op cit, UNCITRAL, 1996 ARMA International, ANSI/ARMA 5-2010, Vital Records
10

5 This act established a legal basis for administrative bodies, Programs: Identifying, Managing, and Recovering
local authorities, business enterprises and individuals to Business-Critical Records, 2010
accept and use electronic documents in their work and Canadian General Standards Board, CAN/CGSB-72.34-
11

daily operations. The act is fully harmonized with related 2005, Electronic Records as Documentary Evidence, 2005
European Union (EU) legislation and current global best
practice. Its adoption is in line with the directives of the
European Union, under which Bosnia and Herzegovina
must create all preconditions for electronic access to
information and e-commerce.

2014 ISACA. All rights reserved. www.isaca.org ISACA JOURNAL VOLUME 3, 2014 3

Вам также может понравиться