3
(20) Secret key: key known to the sender and recipient used to cipher and decrypt messages
using the symmetric cipher mechanism;
(21) Source code: all technical specifications, with no restrictions on access or
implementation of a software or communication protocol, interconnection, interchange, or
data format;
(22) Audiovisual communication: public communication by television and radio
broadcasting services;
(23) Electronic communication: electromagnetic emission, transmission or reception of
signs, signals, writings, images or sounds;
(24) Confidentiality: maintenance of the confidentiality of information and transactions to
prevent unauthorized disclosure of information to non-recipients enabling the reading,
listening, intentional or accidental, illegal copying during storage, processing or transfer;
(25) Content: all information relating to data belonging to individuals or legal entities,
transmitted or received through electronic communication networks and information systems;
(26) Illegal content: content that infringes on human dignity, privacy, honour or national
security;
(27) Electronic mail: message in the form of text, voice, sound or image transmitted through
a public communication network, stored in a network server or the recipient’s terminal
equipment until he retrieves it;
(28) Encryption: use of codes or signals to convert information to be transmitted in the form
of signals that are not understood by others;
(29) Cryptanalysis: all resources used to analyze initially encrypted information to be
decrypted;
(30) Encrypted text: encrypted or encoded message;
(31) Cryptography: use of mathematical algorithm to encrypt information in an attempt to
make it unintelligible to those who are not authorized to access it;
(32) Cybercriminality: infraction of the law carried out through cyberspace using means
other than those habitually used to commit conventional crimes;
(33) Cybersecurity: technical, organizational, legal, financial, human, procedural measures
for prevention and deterrence and other actions carried out to attain set security objectives
through electronic communication networks and information systems, and to protect privacy;
(34) Certification practice statement: practices (organization, operational procedures,
technical and human resources) that the competent certification authority applies within the
framework of the provision of this service in accordance with the certification of a policy or
policies it undertook to comply with;

Select target paragraph3