Certification Practice Statement. esfirma

Size: px
Start display at page:

Download "Certification Practice Statement. esfirma"

Transcription

1 Certification Practice Statement esfirma

2 General information Documentary checks Security classification: Public Target entity: ESFIRMA Version: 1.1 Date of Edition: 02/06/2016 File: esfirma DPC v1r1.docx Format: Office 2016 Authors: BC-NA-FA Formal State Prepared by: Reviewed by: Approved by: Name: BC-GA-FA Date: 09/03/2016 Name: NA Date: 29/04/2016 Name: Date: Version control Version Parts that change Description of change Author of change Date of change 1.0 Original Creation of the esfirma 29/04/2016 document 1.1 esfirma 02/06/2016

3 Index 1. INTRODUCTION PRESENTATION NAME OF THE DOCUMENT AND IDENTIFICATION Identifiers of certificates PARTICIPANTS IN THE CERTIFICATION SERVICES Provider of certification services Registrars End Entities USE OF CERTIFICATES Uses permitted for certificates Limits and prohibitions of use of certificates ADMINISTRATION OF THE POLICY Organizationization administering the document Contact details for the Organizationization Document management procedure PUBLICATION OF INFORMATION AND CERTIFICATE S REPOSITORY CERTIFICATE S REPOSITORY PUBLICATION OF INFORMATION OF THE CERTIFICATION SERVICE PROVIDER FREQUENCY OF PUBLICATION ACCESS CONTROL IDENTIFICATION AND AUTHENTICATION INITIAL REGISTRATION Types of names Meaning of names Use of anonymous and user IDs Interpretation of names formats Uniqueness of names Resolution of conflicts related to names INITIAL IDENTITY VALIDATION Proof of possession of private key Authentication of the identity of the Subscriber acting through a representative Authentication of the identity of a natural person Non verified subscriber information IDENTIFICATION AND AUTHENTICATION OF RENEWAL APPLICATIONS Validation for the routine of certificate renewal... 38

4 identification and authentication of the request for renewal after revocation prior IDENTIFICATION AND AUTHENTICATION FOR REVOCATION REQUEST AUTHENTICATION OF A REQUEST FOR SUSPENSION OPERATION OF THE LIFECYCLE OF THE CERTIFICATES REQUIREMENTS ISSUE OF CERTIFICATE REQUEST Authority to request the issuance Procedure of discharge and responsibilities PROCESSING OF THE APPLICATION FOR CERTIFICATION Implementation of the identification and authentication functions Approval or rejection of the application Deadline to resolve the request ISSUANCE OF THE CERTIFICATE Shares of the CA during the issuance process Notification of the issuance to Subscriber DELIVERY AND ACCEPTANCE OF THE CERTIFICATE CA responsibilities Conduct constituting acceptance of the certificate Certificate Publication Notification of the issuance to third parties USE OF THE PAIR OF KEYS AND CERTIFICATE Use by the Subscriber or signer Use by the Subscriber Use by the third party who relies on certificates CERTIFICATE RENEWAL RENEWAL OF KEYS AND CERTIFICATES Causes of renewal of keys and certificates procedure of renewal certificate wherever required new identification Notification of the issuance of the certificate renewed Conduct constituting acceptance of the certificate Publication of the certificate Notification of the issuance to third parties MODIFICATION OF CERTIFICATES REVOCATION AND SUSPENSION OF CERTIFICATES Causes of certificate revocation Authority to request revocation Revocation request procedures Revocation request Request processing Certificate revocation information query Frequency of issue of certificates (CRL) revocation lists Maximum period of publication of CRL Availability of services of checking online certificate status Check certificate status services... 55

5 Other forms of certificate revocation information Requirements in the event of a compromise of the private key Causes of suspension of certificates Request for suspension Procedures for suspension request Maximum suspension period COMPLETION OF THE SUBSCRIPTION CHECK CERTIFICATE STATUS SERVICES Operational services features Availability of services DEPOSIT AND KEY RECOVERY Policy and practices of deposit and key recovery Policy and practices of encapsulation and recovery of session keys PHYSICAL SECURITY, MANAGEMENT AND OPERATIONAL CONTROLS PHYSICAL SECURITY CONTROLS Location and construction of the facilities Physical access Electricity and air conditioning Exposure to water Prevention and fire protection Media storage Waste treatment Off site backup CONTROL PROCEDURES Reliable features Number of people per task Identification and authentication for each role Roles requiring separation of tasks PKI management system PERSONAL CONTROLS History, qualifications, experience and authorization requirements History investigation procedures Training requirements Requirements and frequency of training update Job rotation frequency and sequence Sanctions for unauthorized actions Recruitment of professional requirements Provision of documentation to the personnel SECURITY AUDIT PROCEDURES Types of reported events Frequency of treatment of audit records Lifetime of audit records Protection of audit logs... 69

6 Backup procedures Localization of the system of accumulation of audit records Audit event notification to the originator of the event Analysis of vulnerabilities INFORMATION FILES Types of archived records Period of recordkeeping Protection of archive Backup procedures Requirements for date and time-stamping Location of the file system Procedures for obtaining and verifying file information RENEWAL OF KEYS COMMITMENT TO KEY AND DISASTER RECOVERY Procedures for managing incidents and commitments Resources, applications, or data corruption Compromise of the private key of the entity Continuity of the business after a disaster ,7.5. Management of reversals TERMINATION OF SERVICE TECHNICAL SECURITY CONTROLS GENERATION AND INSTALLATION KEY PAIR Generation of key pair Sending the signer private key Shipping of the issuer of the certificate public key Distribution of the public key from the provider of certification services Key sizes Public key parameters generation Checking quality of public key parameters Key generation in computer applications or equipment Key usage purposes THE PRIVATE KEY PROTECTION Standards for cryptographic modules Control by more than one person (m n) on the private key The private key deposit Backup of the private key The private key file Introduction of the cryptographic module private key Method of activating private key Method of deactivating private key Method of destroying private key Classification of cryptographic modules Classification of cryptographic modules... 81

7 6.3. OTHER ASPECTS OF KEY PAIR MANAGEMENT The public key file Periods of use of public and private keys ACTIVATION DATA Generation and installation of activation data Activation data protection COMPUTER SECURITY CONTROLS Specific computer security technical requirements Evaluation of the level of computer security LIFE CYCLE TECHNICAL CONTROLS System development controls Security management controls NETWORK SECURITY CONTROLS CRYPTOGRAPHIC MODULE ENGINEERING CONTROLS TIME SOURCES PROFILES OF CERTIFICATES AND CERTIFICATE REVOCATION LISTS CERTIFICATE PROFILE Version number Certificate extensions Identifiers (OID) object of the algorithms Format names The name constraint Identifier (OID) object of the types of certificates THE CERTIFICATE REVOCATION LIST PROFILE Version number OCSP profile COMPLIANCE AUDIT THE COMPLIANCE AUDIT FREQUENCY IDENTIFICATION AND QUALIFICATION OF AUDITOR THE AUDITOR WITH THE AUDITED ENTITY RELATIONSHIP LIST OF ITEMS SUBJECT TO AUDIT ACTIONS TO UNDERTAKE AS A RESULT OF A LACK OF CONFORMITY TREATMENT OF AUDIT REPORTS COMMERCIAL AND LEGAL REQUIREMENTS RATES Rate of issuance or renewal of certificates Rate of access to certificates Rate of access to certificate status information Rates for other services Reinstatement policy FINANCIAL CAPACITY Insurance coverage... 93

8 Other assets Insurance coverage for subscribers and third parties relying on certificates CONFIDENTIALITY Confidential information Non-confidential information Disclosure of information of suspension and revocation Legal information disclosure Disclosure of information at the request of its holder Other circumstances of disclosure of information PROTECTION OF PERSONAL DATA INTELLECTUAL PROPERTY RIGHTS Property of the certificates and revocation information Property of the certification practice statement Information concerning names property Keys property OBLIGATIONS AND LIABILITY Obligations of the certification authority "esfirma" Guarantees offered to subscribers and third parties relying on certificates Rejection of other warranties Limitation of liability inch. Indemnity clauses Unforeseen circumstances and force majeure Applicable law Severability, survival, entire agreement and notice clauses Competent jurisdiction clause Conflict resolution

9 1. Introduction 1.1. Presentation This document states the certification of electronic signature of esfirma practices. The issued certificates are the following: Organization seal Organization seal medium level Organization seal high level Public employee Public employee medium level Public employee high level 1.2. Name of the document and identification This document is the "Declaration of practice of certification of esfirma" Identifiers of certificates OID number Certificate policies Public employee Public Employee - high level

10 Public Employee - medium level Body seal Organization seal - high level Organization seal- medium level In case of contradiction between this statement of certification practices and other practices and procedures documents, will prevail in this statement of practices Participants in the certification services Provider of certification services The certification services provider is the person, whether natural or legal, that issues and manages certificates for end-entities, using a certification body, or provides other services related to electronic signatures. AULOCE S.A.U., residing at Calle Bari 39 (Bldg. Binary Building), C.P , Zaragoza, CIF A , registered in the Registro Mercantil de Zaragoza to volume, Folio 215, sheet Z-28722, and operates under the name commercial EsFIRMA, trade name which will be used throughout this document to designate it, it's a provider of certification services that acts in accordance with the provisions in law 59/ December, electronic signature, and the ETSI standards applicable to the issuance and management of recognized certificates, mainly ETSI TS , at and , in order to facilitate the fulfilment of the legal requirements and international recognition of its services. For the provision of certification services, esfirma has established a hierarchy of certification authorities:

11 ESFIRMA AC RAIZ ESFIRMA AC AAPP AC EsFIRMA root He is the certification authority root of the hierarchy that issues certificates to other certificate authorities, and whose public key certificate has been self-signed. Identification data: CN: ESFIRMA AC RAIZ Fingerprint: c d e7 d4 4b b2 faith 53 fc 34 af 47 Valid from: :54:33 UTC Valid until: :54:33 UTC RSA key length: 4,096 bits EsFIRMA AC AAPP It is the certification body within the hierarchy that issues certificates to end entities, and whose public key certificate has been digitally signed by "esfirma AC RAIZ". Identification data: CN: Fingerprint: Valid from: Valid until: ESFIRMA AC AAPP 24 f1 9b 61 8b f3 DC AC 7e b7 0e 07 f :05:14 UTC :05:14 UTC

12 RSA key length: 4,096 bits Registrars In general, the certification service provider acts as a Registrar of the identity of the subscribers of certificates. They are also registrars certificates subject to this certification practices statement, due to their status as corporate certificates, units designated for this function by the subscribers of the certificates, as the Secretary of the Corporation or the Department of administration staff, since they have authentic records about the linking of the signatories with the Subscriber. Subscribers register functions are performed by delegation and in accordance with the instructions of the provider of certification services, under the terms of article 13.5 of the law 59/2003, of 19 December, electronic signature, and under the full responsibility of the provider of third-party certification services End Entities The end-entities are individuals and Organizationizations benefit from the services of issuance, management, and use of digital certificates for identification and electronic signature applications. End-entities of the esfirma certification services will be as follows: 1. Subscribers. 2. Signatories. 3. Users Subscribers Certification service subscribers are public administrations that take them to esfirma for use in your corporate or Organizationizational level, and are identified on certificates.

13 Certification service subscriber acquires a license of use of the certificate, for its own use - electronic stamp certificates-, or to facilitate the certification of the identity of a specific individual duly authorized for various performances in the Organizationizational field of Subscriber - electronic signature certificates. In the latter case, this person is identified in the certificate, as provided under the next heading. The Subscriber of the service of certification is, therefore, the customer of the provider of services of certification, according to the commercial law, and has the rights and obligations which are defined by the service provider of certification, which are additional and are understood without prejudice to the rights and obligations of the signatories, as it is authorized and regulated in the European technical standards applicable to the issue of recognized digital certificates (in special ETSI TS , section 4.4, maintained in its later versions, and currently, ETSI in , sections and e) Signatories The undersigned are individuals who possess exclusively the signature key digital for identification and electronic signature Advanced or recognized; being typically holders or members of the administrative bodies, in Organization electronic signature certificates, or persons in the service of the public administrations, in public employee certificates. The signatories are duly authorized by the Subscriber and duly identified in the certificate using its name, and tax identification number valid in the jurisdiction of issuance of the certificate, without its being possible, in general, the use of pseudonyms. Given the existence of certificates for different uses of electronic signatures, such as the identification, is also used the more general term of "individual identified in the certificate", always with full respect to the compliance of the legislation of electronic signature in relation to the rights and obligations of the signatory Users Party users are people and Organizationizations receiving digital signatures and digital certificates.

14 Parties as a prelude to trust certificates, users should verify them, as set out in this statement of certification practices and instructions available on the web site of the certification body Use of certificates This section lists the applications for which each type of certificate can be used, establishes limitations on certain applications, and prohibits certain uses of certificates Uses permitted for certificates Should take into account the permitted uses indicated in the various fields of certificates, visible in the web profiles High level public employee certificates This certificate provides the OID for identification and signature. High level public employee certificates are certificates recognized in accordance with in article 11(1), the content prescribed by article 11.2 and issued to fulfilling the obligations of articles 12, 13, and 17 to 20 of law 59/2003, of 19 December, esignature. These certificates are issued to public servants to identify them as persons in the service of the Administration, agency, or entity of public law, linking them with this, fulfilling the requirements laid down in law 11/2007, of 22 June, of electronic access of citizens to public services and its implementing regulations. High level public employee certificates work with device secure signature creation, in accordance with article 24.3 of the law 59/2003, of 19 December, signature, and give compliance provisions of the regulations by the European Telecommunications Standards Institute, technical identified with TS reference. In addition, certificates of individual high level public employees are issued in accordance with the

15 scheme of identification and electronic signature of public administrations in their upto-date version to date of this document. These certificates guarantee the identity of the Subscriber and the signer, and they allow the generation of the "recognized electronic signature"; i.e., the advanced electronic signature based on a qualified certificate and which has been generated using a secure device, which in accordance with the provisions of article 3 of law 59/2003, of December 19, equates signed written by legal effect, without any other additional requirement. They can also be used in applications that do not require the electronic signature equivalent to the written signature, like the applications listed below: a) Safe . b) Other digital signature applications. EsFIRMA does not offer backup and key recovery services. Therefore, esfirma is not liable under any circumstances for loss of encrypted information that can not be recovered. Applications in the profile of certificate information indicates the following: a) The "key usage" field is activated, and therefore allows to perform the following functions: to. Digital signature (Digital Signature to perform the authentication function) b. Commitment to content (Content commintment, to perform the function of electronic signature) b) "Qualified Certificate Statements" field contains the following statement: to. QcCompliance ( ), which advises that the certificate is issued as recognized.

16 b. QcSSCD ( ), which advises that the certificate is used exclusively in conjunction with a secure signature-creation device Mediumlevel public employee certificates This certificate provides the OID for identification and signature. Mediumlevel public employee certificates are certificates recognized in accordance with in article 11(1), the content prescribed by article 11.2 and issued to fulfilling the obligations of articles 12, 13, and 17 to 20 of law 59/2003, of 19 December, esignature. These certificates are issued to public servants to identify them as persons in the service of the Administration, agency, or entity of public law, linking them with this, fulfilling the requirements laid down in law 11/2007, of 22 June, of electronic access of citizens to public services and its implementing regulations. Mediumlevel public employee certificates cannot guarantee its operation with secure creation devices, referred to in article 24.3 of the law 59/2003, of 19 December. Mediumlevel public employee certificates are issued in accordance with the scheme of identification and electronic signature of public administrations in their up-to-date version to date of this document. These certificates guarantee the identity of the subscriber and the person named in the certificate, and allow the generation of the "advanced electronic signature based on a qualified electronic certificate". They can also be used in applications that do not require the electronic signature equivalent to the written signature, like the applications listed below: a) Safe . b) Other digital signature applications.

17 EsFIRMA does not offer backup and key recovery services. Therefore, esfirma is not liable under any circumstances for loss of encrypted information that can not be recovered. Applications in the profile of certificate information indicates the following: a) The "key usage" field is activated, and therefore allows us to perform the following functions: a. Digital signature (Digital Signature to perform the authentication function) b. Commitment to content (Content commintment, to perform the function of electronic signature) b) "Qualified Certificate Statements" field contains the following statement: a. qccompliance ( ), stating that the certificate is issued as recognized High level organization seal certificates This certificate provides the OID High level organization seal certificates are certificates recognized in accordance in article 11(1), the content prescribed by article 11.2 and issued to fulfilling the obligations of articles 12, 13, and 17 to 20 of law 59/2003, of 19 December, esignature. These certificates are issued for identification and authentication of the exercise of jurisdiction in administrative performance in accordance with article 18.1 of the law 11/2007, of 22 June, automated electronic access of citizens to public services. High level organization seal certificates are issued in accordance with the scheme of identification and electronic signature of public administrations in their up-to-date version to date of this document.

18 These certificates guarantee the identity of the Subscriber, of the public body and, where appropriate, of the titular person of the Organization, which is included in the certificate. EsFIRMA does not offer backup and key recovery services. Therefore, esfirma is not liable under any circumstances for loss of encrypted information that can not be recovered. Applications in the profile of certificate information indicates the following: a) The "key usage" field is activated, and therefore allows us to perform the following functions: a. Digital signature (Digital Signature to perform the authentication function) b. Commitment to content (Content commintment, to perform the function of electronic signature) b) "Qualified Certificate Statements" field contains the following statement: a. QcCompliance ( ), which advises that the certificate is issued as recognized. b. QcSSCD ( ), which advises that the certificate is used exclusively in conjunction with a secure signature-creation device Medium level organization seal certificates This certificate provides the OID

19 Medium level organization seal certificates are certificates recognized in accordance in article 11(1), the content prescribed by article 11.2 and issued to fulfilling the obligations of articles 12, 13, and 17 to 20 of law 59/2003, of 19 December, esignature. These certificates are issued for identification and authentication of the exercise of jurisdiction in administrative performance in accordance with article 18.1 of the law 11/2007, of 22 June, automated electronic access of citizens to public services. Medium level organization seal certificates are issued in accordance with the scheme of identification and electronic signature of public administrations in their up-to-date version to date of this document. These certificates guarantee the identity of the Subscriber, of the public body and, where appropriate, of the titular person of the Organization, which is included in the certificate. EsFIRMA does not offer backup and key recovery services. Therefore, esfirma is not liable under any circumstances for loss of encrypted information that can not be recovered. Applications in the profile of certificate information indicates the following: a) The "key usage" field is activated, and therefore allows us to perform the following functions: a. Digital signature (Digital Signature to perform the authentication function) b. Commitment to content (Content commintment, to perform the function of electronic signature) b) "Qualified Certificate Statements" field contains the following statement: a. QcCompliance ( ), which advises that the certificate is issued as recognized.

20

21

22

23 Limits and prohibitions of use of certificates Certificates are used to its own function and purpose established, unless they can be used in other functions and for other purposes. Similarly, certificates must be used only in accordance with applicable law, especially taking into account restrictions on import and export existing at all times. Certificates cannot be used to sign petitions for issuance, renewal, suspension or revocation of certificates, or to sign any public key certificates, or to sign lists of revoked certificates (CRL). Certificates are not designed, do not they can allocate and does not authorize its use or resale as control equipment in hazardous situations or for applications that require actions to be judgment proof, as the operation of nuclear facilities, navigation systems or air communications systems of arms control, where a failure could directly lead to the death, personal injury, or severe environmental damage. Should take into account the limits indicated in the various fields of the certificate profiles, visible on the web ( The use of digital certificates in a way that is a default this DPC and other applicable documentation, especially the contract with the Subscriber and the texts of disclosure, or PDS, has consideration of abuse to the opportune legal effects, and relieve esfirma of any responsibility by this abuse, either the signer or any third party. EsFIRMA does not have authorized access and legal obligation to supervise the data upon which the use of a certified key can be applied. Therefore, and as result of this technical impossibility of access to the contents of the message, is not possible by esfirma rating any content the above, assuming therefore the Subscriber, the signatory or the person responsible for the custody, any resulting liability of content coupled with the use of a certificate.

24 You will also be attributable to the Subscriber, the signatory or the person responsible for the custody, any liability that might arise from the use of the same outside the limits and conditions of use contained in this DPC, binding each certified legal documents, or contracts or agreements with entities registry or with your subscribers, as well as of any other improper use of the same derivative of this section or which can be interpreted as such in function of the legislation in force Administration of the policy Organizationization administering the document AULOCE S.A.U. (esfirma) CALLE BARI 39 (Bldg. Binary Building) ZARAGOZA (+ 34) Identification registry Registro Mercantil de Zaragoza Tomo 2649 Folio 215 Sheet Z CIF A Contact details for the Organizationization AULOCE S.A.U. (esfirma) CALLE BARI 39 (Bldg. Binary Building) ZARAGOZA (+ 34)

25 Document management procedure Documentary and esfirma Organizationization system guarantees, through the existence and application of the relevant procedures, the correct maintenance of this document and the specifications of service related to the same.

26 2. Publication of information and certificate s repository 2.1. Certificate s repository EsFIRMA has a repository of certificates, which publishes information concerning the certification services. This service is available 24 hours 7 days a week and, in case of failure of the system beyond control of esfirma, this will make its best effort so that the service will be available again in the period specified in section this certification practice statement 2.2. Publication of information of the certification service provider EsFIRMA publishes the following information in your deposit: The certificates issued, if consent of the person identified in the certificate was obtained. Lists of revoked certificates and other certificates revocation status information. Applicable certificate policies. The certification practice statement. The texts of disclosure (PKI Disclosure Statements - PDS), at least in Spanish and in English language Frequency of publication Information from the provider of certification services, including policies and certification practices statement, is published as soon as it is available. Changes in the certification practice statement is governed by the provisions of section 1.5 of this document.

27 Status of certificate revocation information is published in accordance with the provisions of sections and of this statement of certification practices Access control EsFIRMA does not limit read access to the information set out in section 2.2, but establishes controls to prevent unauthorized persons can add, modify, or delete records from the tank, to protect the integrity and authenticity of the information, especially the revocation status information. EsFIRMA employs reliable systems for deposit, in such a way that: Only authorized persons can make entries and changes. The authenticity of the information can be checked. Certificates are only available for consultation if the person identified in the certificate has lent his consent. Any technical changes affecting the safety requirements can be detected.

28 3. Identification and authentication 3.1. Initial registration Types of names All certificates contain a distinct name X.501 in the field Subject, including a component Common Name (CN =), the identity of the Subscriber and the individual identified in the certificate, as well as various additional identity information in the SubjectAlternativeName field. The names contained in the certificates are as follows Certificate of high level public employee Country (C) Organizationization (O) Surname Given Name Serial Number Title Common Name (CN) ID number of the person responsible for OID: Number of personal authentication OID: First name OID: "IS" ("Official" name) name of administration, agency or entity of public law certificate subscriber, which is linked employee First and second name, in accordance with document of identity (passport) Name, in accordance with document of identity (passport) ID number of the employee Post or by the physical person, which links you with administration, agency, or entity of public law certificate subscriber. Name surname1 surname2 - NIF of the employee DNI or NIE of the responsible NRP or the person in charge of the Subscriber of the certificate pin Name of the person responsible for the certificate

29 First surname OID: Second surname OID: OID: First name of the person responsible for the certificate Maiden name of the person responsible for the certificate address of the person responsible for the certificate Certificate of mid-level public employee Country (C) Organizationization (O) Surname Given Name Serial Number Title Common Name (CN) "IS" ("Official" name) name of administration, agency or entity of public law certificate subscriber, which is linked employee First and second name, in accordance with document of identity (passport) Name, in accordance with document of identity (passport) ID number of the employee Post or by the physical person, which links you with administration, agency, or entity of public law certificate subscriber. Name surname1 surname2 - NIF of the employee ID number of the responsibility OID: Number of personal authentication OID: First name OID: First surname OID: Second surname OID: OID: DNI or NIE of the responsible NRP or the person in charge of the Subscriber of the certificate pin Name of the person responsible for the certificate First name of the person responsible for the certificate Maiden name of the person responsible for the certificate address of the person responsible for the certificate

30 Certificate of seal body, high level Country (C) Organizationization (O) Surname Given Name Serial Number Common Name (CN) ID number of the person responsible for OID: First name OID: First surname OID: Second surname OID: OID: "IS" The Subscriber name ("official" name of the Organizationization) Name of the responsible creator of seals Name of the responsible creator of seals ID number of the subscribing Organizationization Name of system or application of automatic process. DNI or NIE of the head of the seal Name of the person in charge of the seal First name of the person in charge of the seal Maiden name of the person in charge of the seal of the person in charge of the seal Seal body, medium level certificate Country (C) Organizationization (O) Surname Given Name Serial Number Common Name (CN) ID number of the person responsible for OID: "IS" The Subscriber name ("official" name of the Organizationization) Name of the responsible creator of seals Name of the responsible creator of seals ID number of the subscribing Organizationization Name of system or application of automatic process. DNI or NIE of the head of the seal

31 First name OID: First surname OID: Second surname OID: OID: Name of the person in charge of the seal First name of the person in charge of the seal Maiden name of the person in charge of the seal of the person in charge of the seal

32 Meaning of names The names contained in the SubjectAlternativeName of certificates and SubjectName fields are understandable in natural language, as specified in the previous section Use of anonymous and user IDs Any user IDs can be used to identify an entity/company/organizationization, anonymous certificates, nor a signatory, and in any case are issued to except that, for reasons of public security, electronic signature systems can refer only to the professional public employee identification number Interpretation of names formats The formats of names shall be interpreted in accordance with the law of the country of establishment of the Subscriber, on their own terms. The "country" field will always be Spain by be issued exclusively to Spanish public administrations. The certificate shows the relationship between an individual and the Administration, agency or entity of public law with which it is linked, regardless of the nationality of the individual. This derives from the corporate nature of the certificate, which is Subscriber Corporation, and the individual linked the person authorized to use.

33 The certificates issued to Spanish subscribers, the "serial number" field should include the NIF of the signer, the effect of the admission of the certificate for the completion of formalities with the Spanish authorities Uniqueness of names The names of the subscribers of certificates will be unique for each certificate of esfirma policy. You can assign a name of Subscriber that has already been used, a different subscriber, which in principle is not be given, thanks to the presence of the number of tax identification, or equivalent, in the naming scheme. A Subscriber can request more than one certificate provided that the combination of the following values in the application was different from a valid certificate: Identification number Fiscal (NIF) or other legally valid identifier of the physical person. Identification number Fiscal (NIF) or other legally valid identifier of the Subscriber. Certificate type (field description of the certificate) Resolution of conflicts related to names The requesters shall not include names in applications that may involve a violation, by the future subscriber, of third party rights. EsFIRMA shall not be obliged to first determine that a certificate applicant has intellectual property rights over the name that appears in a certificate request, but in principle proceed to certify it. Likewise, it will not act as arbitrator or mediator, nor in any way it must resolve dispute relating to ownership of names of people or Organizationizations, domain names, trade marks or trade names. However, if you receive a notification regarding a conflict of names, in accordance with the legislation of the country of the Subscriber, may undertake actions relevant to block or withdraw the certificate issued.

34 In any case, the certification service provider reserves the right to reject an application for certificate due to naming conflict. Any dispute or conflict resulting from this document, will be resolved definitively through arbitration of right to an umpire, in the framework of the Spanish Court of arbitration, in accordance with its regulations and statutes, to which is entrusted the administration of the arbitration and the designation of the arbitrator or arbitral tribunal. The parts made to record their commitment to comply with the award rendered in the contractual document that formalizes the service Initial identity validation The identity of the subscribers of certificates is fixed at the time of the signing of the contract between the Subscriber and esfirma, time in which verifies the existence of the Subscriber, and provided supporting documentation of their identity and the charge or condition in which signs, in accordance with stated in the rules of administrative law that applies. The identity of the individuals identified in the certificate subscriber certificates is validated through corporate records management, agency, or entity of public law. The Subscriber, using administrative certification issued by the Secretary of the Town Hall, will produce a certification of the necessary data, and may refer to esfirma, by media that this enabled, for the registration of the identity of the signers. When the Subscriber does not have secretarial, this certification will be issued by the head of the designated certification service. The files of personal data of each administration, agency, or entity of public law must be registered in the protection data agency corresponding, for each of them, being their responsibility, and not that of esfirma, which acts as a processor, as described in section 9.4 of this DPC Proof of possession of private key Possession of the private key is shown under the reliable procedure of delivery and acceptance of the certificate for the signer.

35 Authentication of the identity of the Subscriber acting through a representative Natural persons with capacity to act on behalf of an administration, agency, or entity of public law subscriber certificates, may act as representatives of the same in relation to provisions of this DPC, provided there is a prior legal or voluntary representation between the physical person and the Administration, agency or entity of public law subscriber certificates, which requires its recognition by esfirma, which will be made by the following person: 1 subscriber representative will meet in person with an authorized representative of esfirma, where you will have a form of authentication. Alternatively, the representative of Subscriber product review esfirma form upon completion. 2 representatives shall complete the form with the following information and which will accompany the following documents: or Their identification, as representative data: Name and surname Place and date of birth Document: NIF of the representative or The identification data of the Subscriber that represents: Name of the Administration, agency, or entity of public law. Information about the extent and term of the powers of representation of the applicant. Document: NIF of administration, agency, or entity of public law. Document: Documents that serve to demonstrate the extremes cited in an irrefutable manner in accordance with stated in the rules of administrative law which is application, and its registration in the corresponding public if so log is required. or The data relating to the representation or the ability to act that holds:

36 The validity of the representation or the power to Act (start and end date). The scope and the limits, if any, of the representation and the ability to act: TOTAL. Representation or total capacity. PARTIAL. Representation or partial capacity. 3 completed and signed the form, it will be signed and given to esfirma along with the supporting documentation indicated. 4 esfirma staff will verify the identity of the representative upon presentation of ID, as well as the content of the representation with the documentation. 5 esfirma staff will deliver a proof of authentication and will return the documentation provided. 6 Alternatively, in accordance with article 13(1) of the law 59/2003, of 19 December, you can legitimize notary signing the form, and be sent to esfirma by certified postal mail, in which case the steps 3 to 5 above will not be accurate Authentication of the identity of a natural person This section describes the methods of verification of the identity of an individual identified in a certificate In the certificates The identifying information of individuals identified in the certificate is valid by comparing the information from the request of the Administration, agency, or entity of public law subscriber certificates, records of administration, agency, or entity of public law to which it is linked, generated as indicated in point 3.2, 2nd paragraph of this DPC, ensuring the correctness of the information certify Need for personal presence

37 Certificate request For the request of certificates is not required direct physical presence due to the relationship already accredited between the physical person and Administration, agency, or entity of public law to which it is linked, and that this request is made by an operator authorized by the Subscriber in the contract. Direct physical presence of the signer is not required to accept the certificate that cases in which a subject already previously identified under its relationship with the Administration, agency, or entity of public law concerned, sign the acceptance through its electronic ID. When using electronic ID signature is not possible, the signer must print document sheet of acceptance for his signature before the person in charge of ID, which must check the identity of the natural person identified in the certificate by its physical presence. During this process is irrefutably confirmed the identity of the natural person identified in the certificate. For this reason, it is only necessary to verify the identity of the physical person signing in the case where is not possible signature acceptance using his electronic identity card in person. Certificate renewal If any of the information of the individual identified in the certificate has changed, will be necessary to properly record the new information and there will be an authentication completes, by personal identification before the operator authorized by the Subscriber, which must check the identity of the natural person Bonding of the individual The documentary justification of tying an individual identified in a certificate with the Administration, agency, or entity of public law to which it is linked is given by their perseverance in the administration of personnel records, agency or entity of public law to which the individual is linked.

38 Non verified subscriber information EsFIRMA does not include any subscriber information unverified on the certificates Identification and authentication of renewal applications Validation for the routine of certificate renewal Before you renew a certificate, esfirma checks that the information used to verify the identity and the remaining data of the Subscriber and the individual identified in the certificate remain valid. Acceptable methods for this check are: The use of a "verification of identity phrase", or other methods of personal authentication, which consists of information that only knows the individual identified in the certificate, and that allows you to automatically renew your certificate, provided that the legally established deadline not expired. The use of the certificate valid for its renewal, provided that in the case of a certificate issued by esfirma and it is not over the maximum legally established for this possibility. The use of the electronic ID by the signer. If any of the information of the individual identified in the certificate has changed, will be necessary to properly record the new information and authentication will be complete, in accordance with section identification and authentication of the request for renewal after revocation prior Before generating a certificate to a Subscriber whose certificate was revoked, esfirma will verify that the information used in your day to verify the identity and the remaining data of the Subscriber and the individual identified in the certificate remains valid, in which case applies the provisions of the previous section. The renewal of certificates after the revocation will not be possible in the following cases:

39 The certificate was revoked by erroneous issuance to a person other than the one identified in the certificate. The certificate was revoked by issuing unauthorized by the individual identified in the certificate. The revoked certificate may contain erroneous or false information. If any information of the Subscriber or the person identified in the certificate has changed, the new information is properly recorded and occurs a complete authentication, as specified in the section Identification and authentication for revocation request EsFIRMA authenticates requests and reports relating to the revocation of a certificate, verifying that they come from an authorized person. Acceptable methods for this test are the following: The sending of a request for revocation by part of the Subscriber or the person identified in the certificate, signed electronically. The use of the "verification of identity phrase", or other methods of personal authentication, which consists of information that only knows the individual identified in the certificate, and that allows you to revoke your certificate automatically. The physical representation in an office of the entity Subscriber. Other means of communication, like the telephone, when there is reasonable assurance of the identity of the applicant for revocation, in the view of esfirma Authentication of a request for suspension Suspension request will be made by the Administration, agency, or entity of public law subscriber in 24 x 7 hours.

40 When during office hours the subscriber wishes to initiate a request for revocation and there are doubts for identification, your certificate becomes suspension status.

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Index INDEX... 2 1. DISCLOSURE TEXT APPLICABLE TO NATURAL PERSON CERTIFICATES ISSUED ON QSCD...

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

CORPME TRUST SERVICE PROVIDER

CORPME TRUST SERVICE PROVIDER CORPME TRUST SERVICE PROVIDER QUALIFIED CERTIFICATE OF ADMINISTRATIVE POSITION USE LICENSE In..,.. 20... Mr/Mrs/Ms/Miss.........., with DNI/NIF/National Passport nº., e-mail........., phone number....,

More information

ACGISS Public Employee Certificates

ACGISS Public Employee Certificates ACGISS Public Employee Certificates Certification policy V 2.0.1 (February 2017) Social Security IT Department c/ Doctor Tolosa Latour s/n 28041 Madrid Change control Version Observations Date 1.0 Original

More information

SSL Certificates Certificate Policy (CP)

SSL Certificates Certificate Policy (CP) SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full

More information

QUICKSIGN Registration Policy

QUICKSIGN Registration Policy QUICKSIGN Registration Policy Amendment to DOCUSIGN FRANCE s Certificate Policy for using the QUICKSIGN platform as a registration service to identify Subscribers September 27, 2016 QUICKSIGN_Registration_Policy_V1.0

More information

Digital Signatures Act 1

Digital Signatures Act 1 Issuer: Riigikogu Type: act In force from: 01.07.2014 In force until: 25.10.2016 Translation published: 08.07.2014 Digital Signatures Act 1 Amended by the following acts Passed 08.03.2000 RT I 2000, 26,

More information

DIGITALSIGN - CERTIFICADORA DIGITAL, SA.

DIGITALSIGN - CERTIFICADORA DIGITAL, SA. DIGITALSIGN - CERTIFICADORA DIGITAL, SA. TIMESTAMP POLICY VERSION 1.1 21/12/2017 Page 1 / 18 VERSION HISTORY Date Edition n.º Content 10/04/2013 1.0 Initial drafting 21/12/2017 1.1 Revision AUTHORIZATIONS

More information

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate  Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 1.0 Effective Date: March 12, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

SPECIFIC CERTIFICATION PRACTICES AND POLICY OF

SPECIFIC CERTIFICATION PRACTICES AND POLICY OF SPECIFIC CERTIFICATION PRACTICES AND POLICY OF CERTIFICATES OF REPRESENTATIVES OF LEGAL ENTITIES AND OF INSTITUTIONS WITH NO LEGAL ENTITY FROM THE AC REPRESENTACIÓN NAME DATE Prepared by: FNMT-RCM / v1.5

More information

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages

More information

Signe Certification Authority. Certification Policy Degree Certificates

Signe Certification Authority. Certification Policy Degree Certificates Signe Certification Authority Certification Policy Degree Certificates Versión 1.0 Fecha: 2/11/2010 Table of contents 1 FOREWORD 1.1 GENERAL DESCRIPTION 1.2 DOCUMENT NAME AND IDENTIFICATION 2 PARTICIPATING

More information

Apple Inc. Certification Authority Certification Practice Statement. Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA

Apple Inc. Certification Authority Certification Practice Statement. Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Version 4.0 Effective Date: September 18, 2013 Table of Contents

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013 Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013 Table of Contents 1. Introduction... 5 1.1. Trademarks... 5

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective

More information

Certification Practice Statement

Certification Practice Statement SWIFT SWIFT Qualified Certificates Certification Practice Statement This document applies to SWIFT Qualified Certificates issued by SWIFT. This document is effective from 1 July 2016. 17 June 2016 SWIFT

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.3 Effective

More information

ING Public Key Infrastructure Technical Certificate Policy

ING Public Key Infrastructure Technical Certificate Policy ING Public Key Infrastructure Technical Certificate Policy Version 5.4 - November 2015 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Document version General Of this document

More information

ACCV Certification Practice Statement (CPS)

ACCV Certification Practice Statement (CPS) (CPS) Date: 20/05/2017 Version: 4.0.1 Estado: APPROVED No. of pages: 56 OID: 1.3.6.1.4.1.8149.2.4.0 Classification: PUBLIC File: ACCV-CPS-V4.0-EN-2017.doc Prepared by: Agencia de Tecnología y Certificación

More information

DECISION OF THE EUROPEAN CENTRAL BANK

DECISION OF THE EUROPEAN CENTRAL BANK L 74/30 Official Journal of the European Union 16.3.2013 DECISIONS DECISION OF THE EUROPEAN CENTRAL BANK of 11 January 2013 laying down the framework for a public key infrastructure for the European System

More information

OpenADR Alliance Certificate Policy. OpenADR-CP-I

OpenADR Alliance Certificate Policy. OpenADR-CP-I Notice This document is a cooperative effort undertaken at the direction of the OpenADR Alliance and NetworkFX, Inc. for the benefit of the OpenADR Alliance. Neither party is responsible for any liability

More information

CERTIFICATION PRACTICE STATEMENT OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES

CERTIFICATION PRACTICE STATEMENT OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES Krajowa Izba Rozliczeniowa S.A. CERTIFICATION PRACTICE STATEMENT OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES Version 1.6 Document history Version number Status Date of issue 1.0 Document approved by

More information

TeliaSonera Gateway Certificate Policy and Certification Practice Statement

TeliaSonera Gateway Certificate Policy and Certification Practice Statement TeliaSonera Gateway Certificate Policy and Certification Practice Statement v. 1.2 TeliaSonera Gateway Certificate Policy and Certification Practice Statement TeliaSonera Gateway CA v1 OID 1.3.6.1.4.1.271.2.3.1.1.16

More information

X.509 Certificate Policy for the New Zealand Government PKI RSA Individual - Software Certificates (Medium Assurance)

X.509 Certificate Policy for the New Zealand Government PKI RSA Individual - Software Certificates (Medium Assurance) X.509 Certificate Policy for the New Zealand Government PKI RSA Individual - Software Certificates (Medium Assurance) Version 0.7 Mar-17 Notice to all parties seeking to rely Reliance on a Certificate

More information

Afilias DNSSEC Practice Statement (DPS) Version

Afilias DNSSEC Practice Statement (DPS) Version Afilias DNSSEC Practice Statement (DPS) Version 1.07 2018-02-26 Page 1 of 8 1. INTRODUCTION 1.1. Overview This document was created using the template provided under the current practicing documentation.

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.18 Effective Date: August 16, 2017 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

ZETES TSP QUALIFIED CA

ZETES TSP QUALIFIED CA ZETES TSP QUALIFIED CA Certification Practice Statement for the ZETES TSP Qualified CA Publication date : 17/05/2017 Effective date : 22/05/2017 Document OID : 1.3.6.1.4.1.47718.2.1.1.2 Version : 1.2 21/04/2017

More information

ING Corporate PKI G3 Internal Certificate Policy

ING Corporate PKI G3 Internal Certificate Policy ING Corporate PKI G3 Internal Certificate Policy Version 1.0 March 2018 ING Corporate PKI Service Centre Final Version 1.0 Document information Commissioned by Additional copies of this document ING Corporate

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

OISTE-WISeKey Global Trust Model

OISTE-WISeKey Global Trust Model OISTE-WISeKey Global Trust Model Certification Practices Statement (CPS) Date: 18/04/2018 Version: 2.10 Status: FINAL No. of Pages: 103 OID: 2.16.756.5.14.7.1 Classification: PUBLIC File: WKPKI.DE001 -

More information

September OID: Public Document

September OID: Public Document THE UNITED KINGDOM S NATIONAL CERTIFICATE POLICY for Extended Access Control Infrastructure for machine readable travel documents and biometric residence permits issued and read within the UK September

More information

PostSignum CA Certification Policy applicable to qualified certificates for electronic signature

PostSignum CA Certification Policy applicable to qualified certificates for electronic signature PostSignum CA Certification Policy applicable to qualified certificates for electronic signature Version 1.1 7565 Page 1/61 TABLE OF CONTENTS 1 Introduction... 5 1.1 Overview... 5 1.2 Document Name and

More information

Digi-Sign Certification Services Limited Certification Practice Statement (OID: )

Digi-Sign Certification Services Limited Certification Practice Statement (OID: ) Digi-Sign Certification Services Limited Certification Practice Statement (OID: 1.3.6.1.4.1.8420.1.3.6) In support of Digi-Sign CA as a Recognized Certification Authority December 2015 Copyright and Patent

More information

Electronic signature framework

Electronic signature framework R E P U B L I C O F S E R B I A Negotation Team for the Accession of Republic of Serbia to the European Union Working Group for Chapter 10 Information society and media Electronic signature framework Contents

More information

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. November 2015 Version 4.0. Copyright , The Walt Disney Company

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. November 2015 Version 4.0. Copyright , The Walt Disney Company THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY November 2015 Version 4.0 Copyright 2006-2015, The Walt Disney Company Version Control Version Revision Date Revision Description Revised

More information

Certificate Policy (ETSI EN ) Version 1.1

Certificate Policy (ETSI EN ) Version 1.1 Certificate Policy (ETSI EN 319 411-2) Version 1.1 IDnow GmbH Auenstr. 100 80469 Munich 09.06.2017 IDnow Certificate Policy (ETSI EN 319 411-2) Version 1.1 Date 09.06.2017 Author Armin Bauer, IDnow GmbH

More information

Trust Services Practice Statement

Trust Services Practice Statement Trust Services Practice Statement TrustWeaver AB V. 1.2 PUBLIC Page 1 IMPORTANT LEGAL NOTICE Copyright 2016, TrustWeaver AB. All rights reserved. This document contains TrustWeaver AB proprietary information,

More information

SAFE-BioPharma RAS Privacy Policy

SAFE-BioPharma RAS Privacy Policy SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what

More information

Smart Meters Programme Schedule 2.1

Smart Meters Programme Schedule 2.1 Smart Meters Programme Schedule 2.1 (DCC Requirements) (SMKI version) V1.2 1 Schedule 2.1 (DCC Requirements) This Schedule 2.1 (DCC Requirements) is formed of the following parts: Part A Introduction...3

More information

Symantec Gatekeeper General Category Certificate Policy

Symantec Gatekeeper General Category Certificate Policy Symantec Gatekeeper General Category Certificate Policy General Category Business and Individual Certificates and General Supplementary Device Certificates Version 2.0 25 September 2013 Symantec Gatekeeper

More information

Certification Practice Statement

Certification Practice Statement Contents 1. Outline 1 Certification Practice Statement Ver. 1.6 Dec 2013 1.1 Background & Purpose 1 1.1.1 Electronic Signature Certification System 1 1.1.2 Certification Practice Statement 1 1.1.3 Introduction

More information

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10 GDPR AMC SAAS AND HOSTED MODULES UK version AMC Consult A/S June 26, 2018 Version 1.10 INDEX 1 Signatures...3 2 General...4 3 Definitions...5 4 Scoping...6 4.1 In scope...6 5 Responsibilities of the data

More information

CERN. CERN Certification Authority Certificate Policy and Certificate Practice Statement DRAFT. Emmanuel Ormancey, Paolo Tedesco, Alexey Tselishchev

CERN. CERN Certification Authority Certificate Policy and Certificate Practice Statement DRAFT. Emmanuel Ormancey, Paolo Tedesco, Alexey Tselishchev CERN European Organization for Nuclear Research Category: CP/CPS Status: published Document: CERN Certification Authority CP- CPS.docxpdf Editors: Emmanuel Ormancey, Paolo Tedesco, Alexey Tselishchev Date

More information

United States Department of Defense External Certification Authority X.509 Certificate Policy

United States Department of Defense External Certification Authority X.509 Certificate Policy United States Department of Defense External Certification Authority X.509 Certificate Policy Version 4.3 4 January 2012 THIS PAGE INTENTIONALLY LEFT BLANK ii TABLE OF CONTENTS 1 Introduction...1 1.1 Overview...1

More information

Richemont DNS Inc. DNS Practice Statement for the PANERAI Zone. Version 0.2

Richemont DNS Inc. DNS Practice Statement for the PANERAI Zone. Version 0.2 Richemont DNS Inc. DNS Practice Statement for the PANERAI Zone Version 0.2 1 Table of contents 1 INTRODUCTION...6 1.1 Overview... 6 1.2 Document Name and Identification... 6 1.3 Community and Applicability...

More information

Taiwan-CA Inc Global Certification Authority Certification Practices Statement (CPS) (Version1.3) Effective Date:2017/09/26

Taiwan-CA Inc Global Certification Authority Certification Practices Statement (CPS) (Version1.3) Effective Date:2017/09/26 Taiwan-CA Inc Global Certification Authority Certification Practices Statement (CPS) (Version1.3) Effective Date:2017/09/26 Revision Record: Version Effective Released Remarks 1.0 102/01/22 TWCA First

More information

Certification Practice Statement. for OV SSL. Version 1.2. Date: 6 September 2017

Certification Practice Statement. for OV SSL. Version 1.2. Date: 6 September 2017 Certification Practice Statement certsign Web CA for OV SSL Version 1.2 Date: 6 September 2017 1 Important Notice This document is property of CERTSIGN SA Distribution and reproduction prohibited without

More information

AlphaSSL Certification Practice Statement

AlphaSSL Certification Practice Statement AlphaSSL Certification Practice Statement Date: December 16th 2008 Version: v1.2 Table of Contents DOCUMENT HISTORY... 3 ACKNOWLEDGMENTS... 3 1.0 INTRODUCTION... 4 1.1 OVERVIEW... 4 1.2 ALPHASSL CERTIFICATE

More information

CAEDICOM - Certification Practices Statement Drafted according to specification RFC 3647 and ETSI EN (V1.2.0)

CAEDICOM - Certification Practices Statement Drafted according to specification RFC 3647 and ETSI EN (V1.2.0) Drafted according to specification RFC 3647 and ETSI EN 319 411-2 (V1.2.0) Title CAEDICOM - Certification Practices Statement File name CAEDICOM01_CPS_CertificationPracticeStatement.odt Version: 1.2 Status:

More information

EXBO e-signing Automated for scanned invoices

EXBO e-signing Automated for scanned invoices EXBO e-signing Automated for scanned invoices Signature Policy Document OID: 0.3.2062.7.2.1.12.1.0 Approval Status: Approved Version: 1.0 Page #: 1 of 13 1. Introduction 1.1. Scope This document covers

More information

VeriSign Trust Network European Directive Supplemental Policies

VeriSign Trust Network European Directive Supplemental Policies VeriSign Trust Network European Directive Supplemental Policies Version 1.0 Effective Date: September 19, 2001 VeriSign, Inc. 487 East Middlefield Road Mountain View, CA 94043 USA +1 650.961.7500 http//:www.verisign.com

More information

Belgian Certificate Policy & Practice Statement for eid PKI infrastructure Foreigner CA

Belgian Certificate Policy & Practice Statement for eid PKI infrastructure Foreigner CA Belgian Certificate Policy & Practice Statement for eid PKI infrastructure Foreigner CA OID: 2.16.56.1.1.1.7 2.16.56.9.1.1.7 2.16.56.10.1.1.7 2.16.56.12.1.1.7 Company: Certipost Version: 3.0 Status : FINAL

More information

Avira Certification Authority Policy

Avira Certification Authority Policy Avira Certification Authority Policy Version: 1.0 Status: Draft Updated: 2010-03-09 Copyright: Avira GmbH Author: omas Merkel Introduction is document describes the Certification Policy (CP) of Avira Certification

More information

LAW OF THE REPUBLIC OF KAZAKSTAN «ON CERTIFICATION»

LAW OF THE REPUBLIC OF KAZAKSTAN «ON CERTIFICATION» April 27\ 99 Draft LAW OF THE REPUBLIC OF KAZAKSTAN «ON CERTIFICATION» This Law shall establish legal basis of certification of products, quality systems and production, (further processes), works and

More information

Data Processor Agreement

Data Processor Agreement Data Processor Agreement Data Controller: Customer located within the EU (the Data Controller ) and Data Processor: European Representative Company: ONE.COM (B-one FZ-LLC) One.com A/S Reg.no. Reg.no. 19.958

More information

Rules for LNE Certification of Management Systems

Rules for LNE Certification of Management Systems Rules for LNE Certification of Management Systems Application date: March 10 th, 2017 Rev. 040716 RULES FOR LNE CERTIFICATION OF MANAGEMENT SYSTEMS CONTENTS 1. PURPOSE... 3 2. SCOPE... 3 3. DEFINITION

More information

END USER LICENSE AGREEMENT PANDA ANTIVIRUS 2007 / PANDA ANTIVIRUS + FIREWALL 2007 / PANDA INTERNET SECURITY 2007

END USER LICENSE AGREEMENT PANDA ANTIVIRUS 2007 / PANDA ANTIVIRUS + FIREWALL 2007 / PANDA INTERNET SECURITY 2007 END USER LICENSE AGREEMENT PANDA ANTIVIRUS 2007 / PANDA ANTIVIRUS + FIREWALL 2007 / PANDA INTERNET SECURITY 2007 Please read the following license agreement carefully before using this program. By accepting

More information

As set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above.

As set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above. As set out in the Hong Kong ID card, or any relevant identification document referred to in 1(g) above. B (1)B (2) * In the case of a non-hong Kong ID cardholder, state the passport number or any identification

More information

WISeKey SA ADVANCED SERVICES ISSUING CERTIFICATION AUTHORITY CERTIFICATION PRACTICE STATEMENT

WISeKey SA ADVANCED SERVICES ISSUING CERTIFICATION AUTHORITY CERTIFICATION PRACTICE STATEMENT WISeKey SA ADVANCED SERVICES ISSUING CERTIFICATION AUTHORITY CERTIFICATION PRACTICE STATEMENT Version 1.1 Effective Date: 05 December 2008 WISeKey S.A. 2000-2008 WISeKey hereby grants non-exclusive permission

More information

National Identity Exchange Federation. Trustmark Signing Certificate Policy. Version 1.0. Published October 3, 2014 Revised March 30, 2016

National Identity Exchange Federation. Trustmark Signing Certificate Policy. Version 1.0. Published October 3, 2014 Revised March 30, 2016 National Identity Exchange Federation Trustmark Signing Certificate Policy Version 1.0 Published October 3, 2014 Revised March 30, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents

More information

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

HF Markets SA (Pty) Ltd Protection of Personal Information Policy Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and

More information

PPR TOKENS SALE PRIVACY POLICY. Last updated:

PPR TOKENS SALE PRIVACY POLICY. Last updated: PPR TOKENS SALE PRIVACY POLICY Last updated: 05.03.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant

More information

Rules for Commissioned Processing. (DDV Declaration of Conformity)

Rules for Commissioned Processing. (DDV Declaration of Conformity) Rules for Commissioned Processing (DDV Declaration of Conformity) Service provider (in the following Service Provider) Representative Street name and number Postal code, place E-mail address Website Version:

More information

Minimum Requirements For The Operation of Management System Certification Bodies

Minimum Requirements For The Operation of Management System Certification Bodies ETHIOPIAN NATIONAL ACCREDITATION OFFICE Minimum Requirements For The Operation of Management System Certification Bodies April 2011 Page 1 of 11 No. Content Page 1. Introduction 2 2. Scope 2 3. Definitions

More information

TELIA MOBILE ID CERTIFICATE

TELIA MOBILE ID CERTIFICATE Telia Mobile ID Certificate CPS v2.3 1 (56) TELIA MOBILE ID CERTIFICATE CERTIFICATION PRACTICE STATEMENT (Translation from official Finnish version) Version 2.3 Valid from June 30, 2017 Telia Mobile ID

More information

Entrust SSL Web Server Certificate Subscription Agreement

Entrust SSL Web Server Certificate Subscription Agreement Entrust SSL Web Server Certificate Subscription Agreement ATTENTION - READ CAREFULLY: THIS SUBSCRIPTION AGREEMENT (THIS "AGREEMENT") IS A LEGAL CONTRACT BETWEEN THE PERSON, ENTITY, OR ORGANIZATION NAMED

More information

thawte Certification Practice Statement Version 3.4

thawte Certification Practice Statement Version 3.4 thawte Certification Practice Statement Version 3.4 Effective Date: July, 2007 thawte Certification Practice Statement 2006 thawte, Inc. All rights reserved. Printed in the United States of America. Revision

More information

Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary. Version 3.3.

Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary. Version 3.3. Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary Version 3.3.2 May 30, 2007 Copyright 2007, Operational Research Consultants,

More information

Data Processing Agreement

Data Processing Agreement Data Processing Agreement Merchant (the "Data Controller") and Nets (the "Data Processor") (separately referred to as a Party and collectively the Parties ) have concluded this DATA PROCESSING AGREEMENT

More information

EIDAS-2016 CHAMBERS OF COMMERCE ROOT and GLOBAL CHAMBERSIGN ROOT Version 1.2.3

EIDAS-2016 CHAMBERS OF COMMERCE ROOT and GLOBAL CHAMBERSIGN ROOT Version 1.2.3 CERTIFICATION PRACTICES STATEMENT DIGITAL CERTIFICATES AC CAMERFIRMA SA EIDAS-2016 CHAMBERS OF COMMERCE ROOT - 2016 and GLOBAL CHAMBERSIGN ROOT - 2016. Version 1.2.3 Author: Juan Ángel Martín: PKI Area.

More information

Symantec Trust Network (STN) Certificate Policy

Symantec Trust Network (STN) Certificate Policy Symantec Trust Network (STN) Certificate Policy Version 2.8.24 September 8, 2017 Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA +1 650.527.8000 www.symantec.com - i - - ii - Symantec

More information

UNCONTROLLED IF PRINTED

UNCONTROLLED IF PRINTED 161Thorn Hill Road Warrendale, PA 15086-7527 1. Scope 2. Definitions PROGRAM DOCUMENT PD 1000 Issue Date: 19-Apr-2015 Revision Date: 26-May-2015 INDUSTRY MANAGED ACCREDITATION PROGRAM DOCUMENT Table of

More information

Starfield Technologies, LLC. Certificate Policy and Certification Practice Statement (CP/CPS)

Starfield Technologies, LLC. Certificate Policy and Certification Practice Statement (CP/CPS) Starfield Technologies, LLC Certificate Policy and Certification Practice Statement (CP/CPS) Version 3.0 January 28, 2013 i Starfield CP-CPS V3.0 Table of Contents 1 Introduction...1 1.1 Overview...1 1.2

More information

FPKIPA CPWG Antecedent, In-Person Task Group

FPKIPA CPWG Antecedent, In-Person Task Group FBCA Supplementary Antecedent, In-Person Definition This supplement provides clarification on the trust relationship between the Trusted Agent and the applicant, which is based on an in-person antecedent

More information

Technical Trust Policy

Technical Trust Policy Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality

More information

APPLICATION FORM FOR DELETION, TRANSFER AND/OR CHANGE OF DOMAIN NAME DETAILS

APPLICATION FORM FOR DELETION, TRANSFER AND/OR CHANGE OF DOMAIN NAME DETAILS APPLICATION FORM FOR DELETION, TRANSFER AND/OR CHANGE OF DOMAIN NAME DETAILS As the owner of the domain name or his representative, I have the powers to commit the company, in accordance with the provisions

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

Data Processing Agreement

Data Processing Agreement In accordance with the European Parliament- and Council s Directive (EU) 2016/679 of 27th April 2016 (hereinafter GDPR) on the protection of physical persons in connection with the processing of personal

More information

CHAPTER 10 - ELECTRONIC COMMERCE SECTION SECTION GENERAL ADMINISTRATION

CHAPTER 10 - ELECTRONIC COMMERCE SECTION SECTION GENERAL ADMINISTRATION CHAPTER 10 - ELECTRONIC COMMERCE SECTION SECTION.0100 - GENERAL ADMINISTRATION 18 NCAC 10.0101 HOW TO CONTACT THE ELECTRONIC COMMERCE SECTION (a) The Electronic Commerce Section may be contacted by the

More information

Emsi Privacy Shield Policy

Emsi Privacy Shield Policy Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (

More information

Certificate Policy for the Chunghwa Telecom ecommerce Public Key Infrastructure. Version 1.5

Certificate Policy for the Chunghwa Telecom ecommerce Public Key Infrastructure. Version 1.5 Certificate Policy for the Chunghwa Telecom ecommerce Public Key Infrastructure Version 1.5 Chunghwa Telecom Co., Ltd. December 1, 2017 Contents 1. INTRODUCTION... 1 1.1 OVERVIEW... 3 1.1.1 Certificate

More information

Section I. GENERAL PROVISIONS

Section I. GENERAL PROVISIONS LAW OF THE RUSSIAN FEDERATION NO. 5151-1 OF JUNE 10, 1993 ON CERTIFICATION OF PRODUCTS AND SERVICES (with the Additions and Amendments of December 27, 1995, March 2, July 31, 1998) Federal Law No. 154-FZ

More information

Lockheed Martin Enterprise Public Key Infrastructure Certificate Policy (CP)

Lockheed Martin Enterprise Public Key Infrastructure Certificate Policy (CP) Lockheed Martin Enterprise Public Key Infrastructure Certificate Policy (CP) Version 8.12 May 2017 Copyright, Lockheed Martin, 2017 Questions or comments regarding the Lockheed Martin epki Certification

More information

Certification Practice Statement certsign SSL EV CA Class 3. for SSL EV Certificates. Version 1.0. Date: 31 January 2018

Certification Practice Statement certsign SSL EV CA Class 3. for SSL EV Certificates. Version 1.0. Date: 31 January 2018 Certification Practice Statement certsign SSL EV CA Class 3 for SSL EV Certificates Version 1.0 Date: 31 January 2018 1 Important Notice This document is property of CERTSIGN SA Distribution and reproduction

More information

Certipost E-Trust Services. Certificate Policy. for Normalized E-Trust Physical and Legal Persons. Version 1.1. Effective date 12 January 2011

Certipost E-Trust Services. Certificate Policy. for Normalized E-Trust Physical and Legal Persons. Version 1.1. Effective date 12 January 2011 Certipost E-Trust Services Version 1.1 Effective date 12 January 2011 Object Identification Number (OID) 0.3.2062.7.1.1.200.1 Certipost NV ALL RIGHTS RESERVED. 2 17 for Normalised E-Trust Certificates

More information

Recruitment Privacy Notice

Recruitment Privacy Notice Rev. A May 22, 2018 Contents 1. About Us... 2 2. Collection... 2 3. Use of Personal Data... 3 4. Legal Basis... 3 5. Sharing of Personal Data... 4 5.1 Within Jacobs... 4 5.2 With Third Parties... 4 6.

More information

Certificados Empleado Público

Certificados Empleado Público Registro Nacional de Asociaciones. Número 171.443. CIF G-63287510 ANF Autoridad de Certificación Gran vía de les Corts Catalanes 996. 08018 Barcelona (Spain) Telephone: +34 902 902 172 Fax: +34 933 031

More information

CertDigital Certification Services Policy

CertDigital Certification Services Policy CertDigital Certification Services Policy Page: 2 ISSUED BY : DEPARTAMENT NAME DATE ELECTRONIC SERVICES COMPARTMENT COMPARTMENT CHIEF 19.03.2011 APPROVED BY : DEPARTMENT NAME DATE MANAGEMENT OF POLICIES

More information

Entrust WAP Server Certificate Relying Party Agreement

Entrust WAP Server Certificate Relying Party Agreement Entrust WAP Server Certificate Relying Party Agreement The WAP/WTLS specification v1.1 does not provide a means for certificate revocation checking. The following Relying Party Agreement" provides further

More information

DATA PROCESSING AGREEMENT

DATA PROCESSING AGREEMENT DATA PROCESSING AGREEMENT This Data Processing Agreement ( DPA ) is entered into between: A. The company stated in the Subscription Agreement (as defined below) ( Data Controller ) and B. Umbraco A/S Haubergsvej

More information

Checklist According to ISO IEC 17065:2012 for bodies certifying products, process and services

Checklist According to ISO IEC 17065:2012 for bodies certifying products, process and services Name of Certifying Body Address of Certifying Body Case number Date of assessment With several locations Yes No Assessed locations: (Name)/Address: (Name)/Address: (Name)/Address: Assessed area (technical

More information

SSL.com Certificate Policy and Certification Practice Statement SSL.COM CP/CPS VERSION 1.4

SSL.com Certificate Policy and Certification Practice Statement SSL.COM CP/CPS VERSION 1.4 2018 SSL.com Certificate Policy and Certification Practice Statement SSL.COM CP/CPS VERSION 1.4 Table of Contents 1 INTRODUCTION... 1 1.1 Overview - The SSL.com CP/CPS... 1 1.2 Identification Number and

More information

Privacy Policy: itsme APP

Privacy Policy: itsme APP Privacy Policy: itsme APP This privacy policy applies to the itsme Application (hereafter the itsme App or the App) developed by Belgian Mobile ID SA/NV (the Privacy Policy). The itsme App (the App) allows

More information

The user can print and digitally store all these documents. You can easily access to them by different links available at the bottom of the Website.

The user can print and digitally store all these documents. You can easily access to them by different links available at the bottom of the Website. PRIVACY AND DATA PROTECTION POLICY SITE WEB WWW.CANARYSHUTTLE.COM. Last version. Version number: 2. Date version published: 12/01/2017. 1. CONTENT AND COMPLIANCE. This is configured as the Privacy and

More information

LAWtrust AeSign CA Certification Practice Statement (LAWtrust AeSign CA CPS)

LAWtrust AeSign CA Certification Practice Statement (LAWtrust AeSign CA CPS) INFORMATION SECURITY POLICY ISSUE SPECIFIC POLICY VERSION: V003 2017-05-11 EFFECTIVE DATE: 2017-05-11 LAWtrust AeSign CA Certification Practice Statement (LAWtrust AeSign CA CPS) Law Trusted Third Party

More information

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy Raytheon Company Public Key Infrastructure (PKI) Certificate Policy Version 1.17 April 7, 2017 1 03/08/2016 Signature Page Jeffrey C. Brown Digitally signed by Jeffrey C. Brown DN: dc=com, dc=raytheon,

More information

Agreement on High Security Locks

Agreement on High Security Locks Agreement on High Security Locks Participants: Certification Body Signatory CNPP VdS Schadenverhütung Svensk Brand- och Säkerhetscertifiering AB (SBSC) Associated Testing Laboratories Signatory CNPP VdS

More information

Unisys Corporation April 28, 2017

Unisys Corporation April 28, 2017 Unisys Internal PKI v1 14.docx Unisys Internal PKI Unisys Corporation April 28, 2017 Page 1 of 79 Content: Name: Version / Last Revision: Classification: Unisys Internal PKI v1 14.docx This document contains

More information

Individual Agreement. commissioned processing

Individual Agreement. commissioned processing Individual Agreement commissioned processing (in the following: AGREEMENT) Between 1. - Address owner / Controller - and 2. - Service provider / Processor - As of: 09/2017, Page 2 of 12 The following provisions

More information

Mohammed Ahmed Al Amer Chairman of the Board of Directors. Issued on: 16 Rabi' al-awwal 1437 (Arabic calendar) Corresponding to: 27 December 2015

Mohammed Ahmed Al Amer Chairman of the Board of Directors. Issued on: 16 Rabi' al-awwal 1437 (Arabic calendar) Corresponding to: 27 December 2015 The Telecommunications Regulatory Authority s Board of Directors Resolution No. (13) of 2015 Promulgating the SIM-Card Enabled Telecommunications Services Registration Regulation Chairman of the Telecommunications

More information