Following are definitions from the 1997 OECD Cryptography Principles III. DEFINITIONS For the purposes of the Guidelines: "Authentication" means a function for establishing the validity of a claimed identity of a user, device or another entity in an information or communications system. "Availability" means the property that data, information, and information and communications systems are accessible and usable on a timely basis in the required manner. "Confidentiality" means the property that data or information is not made available or disclosed to unauthorised individuals, entities, or processes. "Cryptography" means the discipline which embodies principles, means, and methods for the transformation of data in order to hide its information content, establish its authenticity, prevent its undetected modification, prevent its repudiation, and/or prevent its unauthorised use. "Cryptographic key" means a parameter used with a cryptographic algorithm to transform, validate, authenticate, encrypt or decrypt data. "Cryptographic methods" means cryptographic techniques, services, systems, products and key management systems. "Data" means the representation of information in a manner suitable for communication, interpretation, storage, or processing. "Decryption" means the inverse function of encryption. "Encryption" means the transformation of data by the use of cryptography to produce unintelligible data (encrypted data) to ensure its confidentiality. "Integrity" means the property that data or information has not been modified or altered in an unauthorised manner. "Interoperability" of cryptographic methods means the technical ability of multiple cryptographic methods to function together. "Key management system" means a system for generation, storage, distribution, revocation, deletion, archiving, certification or application of cryptographic keys. "Keyholder" means an individual or entity in possession or control of cryptographic keys. A keyholder is not necessarily a user of the key. "Law enforcement" or "enforcement of laws" refers to the enforcement of all laws, without regard to subject matter. "Lawful access" means access by third party individuals or entities, including governments, to plaintext, or cryptographic keys, of encrypted data, in accordance with law. "Mobility" of cryptographic methods only means the technical ability to function in multiple countries or information and communications infrastructures. "Non-repudiation" means a property achieved through cryptographic methods, which prevents an individual or entity from denying having performed a particular action related to data (such as mechanisms for non-rejection of authority (origin); for proof of obligation, intent, or commitment; or for proof of ownership). "Personal data" means any information relating to an identified or identifiable individual. "Plaintext" means intelligible data. "Portability" of cryptographic methods means the technical ability to be adapted and function in multiple systems. --end---