self-authentication

Self authentication. Statutes frequently provide that certain classes of writings shall be received in evidence "without further proof." The following fall into this category:
(1) deeds, conveyances or other instruments, which have been acknowledged by the signers before a notary public,
(2) certified copies of public records, and
(3) books of statutes which purport to be printed by public authority.
See Fed.Evid.Rule 902

Black's law dictionary. . 1990.

Look at other dictionaries:

  • self-authentication — n. The act of proving that something, usually a document, is genuine or true without the use of extrinsic evidence. For example, notarized documents and certified copies of public records are usually deemed to be self authenticating. Webster s… …   Law dictionary

  • self authentication — Self authentication. Statutes frequently provide that certain classes of writings shall be received in evidence without further proof. The following fall into this category: (1) deeds, conveyances or other instruments, which have been… …   Black's law dictionary

  • authentication — /aSentakeyshan/ In the law of evidence, the act or mode of giving authority or legal authenticity to a statute, record, or other written instrument, or a certified copy thereof, so as to render it legally admissible in evidence. Verifications of… …   Black's law dictionary

  • Self-service password reset — is defined as any process or technology that allows users who have either forgotten their password or triggered an intruder lockout to authenticate with an alternate factor, and repair their own problem, without calling the help desk. It is a… …   Wikipedia

  • Authentication (law) — Authentication, in the law of evidence, is the process by which documentary evidence and other physical evidence is proven to be genuine, and not a forgery. Generally, authentication can be shown in one of two ways. First, a witness can testify… …   Wikipedia

  • Self-certifying File System — In computing, Self certifying File System (SFS) is a global and decentralized, distributed file system for Unix like operating systems, while also providing transparent encryption of communications as well as authentication. It aims to be the… …   Wikipedia

  • Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in …   Wikipedia

  • Extensible Authentication Protocol — Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point to Point connections. It is defined in RFC 3748, which has been updated by RFC 5247. Although the EAP protocol is… …   Wikipedia

  • Internet Authentication Service — (IAS) is a component of Windows Server operating systems that provides centralized user authentication and authorization, auditing and accounting. Overview While Routing and Remote Access (RRAS) security is sufficient for small networks, larger… …   Wikipedia

  • Protected Extensible Authentication Protocol — PEAP is also an acronym for Personal Egress Air Packs. Protected Extensible Authentication Protocol, Protected EAP, or simply PEAP (pronounced peep ), is a method to securely transmit authentication information, including passwords, over wired or …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.