PKI (digital ID security services) extension of RESPONSE ON CONSULTATION DOCUMENT ON THE FINAL REPORT OF THE EXPERT GROUP ON E-INVOICING

Size: px
Start display at page:

Download "PKI (digital ID security services) extension of RESPONSE ON CONSULTATION DOCUMENT ON THE FINAL REPORT OF THE EXPERT GROUP ON E-INVOICING"

Transcription

1 Datum: (6). Commission européenne Internal Market and Services DG BE-1049 Bruxelles PKI (digital ID security services) extension of RESPONSE ON CONSULTATION DOCUMENT ON THE FINAL REPORT OF THE EXPERT GROUP ON E-INVOICING Alphabet AB has been answering the EC questionnaire based on the final report of the expert group on einvoicing. Alphabet would like to extend this response with a special topic, PKI digital certificates, ID-cards. A total absence of security systems and solutions available for SMEs and private persons. PKI means encrypted business protection administration and is a developed security technology that would make a big difference in security and efficiency in electronic invoicing and business. The main problem is to make it work in all member countries of the EU, set up a market available for all and to reasonable costs. However it would be much more efficient if the EC organise a hierarchical PKI strategy and service system serving ell the member states of the union. Digital identities is not a national related issue, and is better made in a common process. The EC report on einvoicing, only mention this topic very brief and it is a strategic implementation topic. Alphabet highlight it as a future fundamental base technology of the EU electronic invoicing strategy. Because of this Alphabet AB suggest the EC to start a study on this topic of PKI and digital as well as human physical IDs (including the Schengen aspects) should be available for all parties on an equal bases. This in the interest of the common free trade in Europe, including the electronic invoicing and electronic business administration task, Alphabet AB suggest the EC to create a single EU PKI and ID strategy covering all needs and all possible users including SMEs, private and legal person trustee needs. Enhancing over internet as transport protocol of electronic invoicing should be included in the strategy. PKI, encryption and protection systems of data, data transfer and systems The last years the PKI technology has been developed in to commercial product systems and trustee relations and could turn into infrastructure. This technology is very interesting in securing information, in closed user groups. And matters like System access security are much needed. We are talking about business relations, like clients and consultants relations, like the accountant/audit consultants where they would be able to create secure relations zones with its clients. But also where the consultant is able to live in secure professional zones together with their Alphabet AB, SE Adress: Internet: Telefon: S:t Eriksgatan 48 jan.bergstrom@alphabet.se Stockholm, Sweden

2 2 special interest organisations or information providers support. Zones of certified customers and suppliers and in procurement relations. It is something that is very attractive to every party and every type of user companies. It is something that is also related to electronic invoicing. There are two main problems with this technology: o The introduction, installation and maintenance processes are complicated and need in-house expert staff to run it and consultant experts to install it. We need standard SW products. o Local trust capabilities of closed user groups are in general made non -available by the issuer of the trust security systems, the main issuing CAs. General public digital IDs CAs has switched off the ability to allow local lower level CAs to operate. Levels like small user, customer, client, interest groups and smaller companies system access security needs. It means the entire PKI technology is only available for large companies and organisations, due to that they pay for huge project implementations, like implementations for a hospital or a police organisation. For the large it is more expensive than necessarily, due to this structure. It means SMEs are only allowed into it as customers (of banks, tax authorities etc). So PKI is not available for SMEs in electronic invoicing, and in fact a really wanted feature for all. This topic should be in the attention of the EC regarding electronic invoicing. It would even be possible to think of cases where a family, likes to have their own trusted closed user group of the computers and data, if it would be available easy and cheap. The market is not free and it will not appear without decisions and most likely political initiatives are needed Noticeable is that the last versions of for instance Windows (after Windows Me) do not even have any single users encryption features. Users would like to have one physical ID-card that they can use as a digital ID-card attaching it to a reader, doing all kind of login services with computers as well as other encryption or identification needs. National or private CAs Some of the EU member states governments have built up national trustee systems based on governmental CAs. In such cases often the same authority is the issuer of physical ID cards. These countries like Finland and Estonia has much better service to SMEs and private users than countries that hasn t national governmental CAs. But far from everything is available even there, for the small. However users in countries with only private CAs are completely restricted to the issuer s policies. Often banks or joint PKI-groups of banks do have private CAs services available. But most of these actors have switched off this ability of lower CAs to issue extra certificates. Manly due to the fact nobody pays for the support and it is not in the issuing party s interest to make local lower level CAs operations available on their main ID-carrying media (ID-cards and PKI-SW). There is a slight difference in basic interest in national or huge private companies acting as CAs. But in general the needs of the SMEs are often not understood by even governments and the solutions stay poor. An EC based CA hierarchy could be a solution to make PKI available for every level and business of the society of the EU The basic problem is in the top of the CA hierarchy is not seeing any need or commercial possibilities of creating room for lower level CAs. Some governments in the EU might get a full understanding of SME and even private persons need for PKI. But the problem is that it is very unlikely all governments of the EU would understand the issue.

3 3 It is unlikely national PKI solutions would integrate into one market, and PKI isn t restricted to states or national interests. The EU with its EC Internal Market and Services DG has interests in a well working common business environment. It could very well set up a CA policy and operate a CA hierarchy for all its member states, all business and citizens. The EC Internal Market and Services DG could have the political statement to secure PKI availability in every level of business of the society in all its member states and common for all the union. Organisation of a CA hierarchy The EC Internal Market and Services DG could create a sub-division organisational body, as a top-ca. From it, a hierarchy of sub-cas operating according to a specified EC structure and regulation, doing all the service for every level and business of the society of all the EU. The sub-cas could be banks, authorities for their own needs. But for SME, member organisation, their clients, families and even private persons needs special sub-cas or CA agents. Sub-CAs or CA agents providing this services, that could be like ISPs or web-hotels doing domain services for customers. A Sub-CA setting up the small closed user groups and security systems, based on the basic digital identity. The PKI service agents like internet web-hotel providers would do this service as a part of their services they offer their customers. They have the skill being able performing it after instructions and education. The problem of legal persons certificates In Sweden we have a problem with legal persons digital certificates, there are none. The electronic VAT reporting is a typical example. The VAT administration of the tax authority introduced eskd, an electronic reporting service of VAT declaration. The tax authority supports a number of PKI systems allowing users with such digital ID to access this VAT reporting service. It meant that the tax client managing director was able to get a digital ID from the bank, digitally report VAT and sign it to the tax authority. However the volumes did not come. The problem was identified as who the people signing the manual VAT reports really were. Often, they were not as the law prescribes, the managing director. It was the wife, the accounting consultant, the economy manger etc signing it. In many cases the managing director did commanded them, to do it. This lead to a change in the law allowing delegation of the signing responsibility to someone else, like the wife, the accounting consultant, the economy manger etc to do it. They filled in a form, and it was OK, This in turn lead to the problem that the employees of the accounting consultant companies started to make objection arguments, It is not me, but the accounting firm that in fact is the trusted party, by the customer!. There is also a problem when people stop working for a trusted party, having the rights still a long time after quitting. And it takes a long time for the new employed to get the rights. Having to run to the customers getting the forms signed again. In fact the problem is that it is a legal person and not a physical person, really is the trustee. The em ployees also complained they did not want their private SW certificates be installed on their employers computers. HW human ID cards are much better in this respect, everything personal is carried with the user. With a physical ID-cards, such is not lent out to others. This means that an ID security system must be able to handle legal persons trustee rights. One person representing the legal person must be able to tell (as a kind of sub-ca) who belongs to the trustee group of the legal person, and it must work with the tax authorities trustee system. Today this is not possible in Sweden and very annoying.

4 The media, a standardised EU ID-card? The other side of this topic is the issuing media, the physical ID cards carrying the digital ID-data for ID-card readers to read, also need to be organised in the same project. It is very important to have physical human ID-cards available and all parties wants them the same as the carrying card of the digital ID. Digital IDs are useful and could solve many problems with physical IDs today. In the Schengen system the ID-cards are a central topic. This issuing process of physical ID-cards could also be organised in a hierarchy by the EC Internal Market and Services DG certified physical ID-card issuing parties.. Such certified physical ID-card issuing parties could be authorities but also private companies like banks or trusted specialised Id-card issuing companies in a free market of competition. Driving licences all over Europe could be integrated, and really a digital ID quality of the card. The problems of national physical ID-cards The Schengen agreement forces the members from 1990 to issue IDcards according to the agreement creating the pass free travel zone. However the Schengen ID-card regulations demands some extra data like nationality and place of birth. Something that as soon as the Schengen agreement was signed by Sweden, a law stating information of place of birth and nationality to be intruding the private integrity. So Sweden refuses to issue ID-cards with the full Schengen regulations. Almost nobody cares but some is a huge security risk In practice this means that no Swedish ID-card is valid for Schengen travel, but almost nobody cares. Showing a Swedish driving licence (the same issuing technology as Swedish private ID-cards) is completely acceptable for all airlines, except Ryan air, Norwegian and Baltic air. Most likely acting on the instructions from the Swedish government, stating Swedish ID-cards are not valid for Schengen travel. Other flight companies act most likely from other countries instructions. The German customs, the French gendarmerie and the Greek police certainly find these Swedish ID-cards OK. I tried. Many thinks that the Swedish government want to lock in their citizens involved in special legal cases, this way. Passports can legally be withdrawn, and travel restrictions announced, but ID-cards can not be taken from the user. There is a long tradition of taking the passports for people considered in risk of leaving the country facing legal charges. The Schengen agreement threatens to wreck this tradition because in practice it is impossible to keep people in the country the Schengen way. In anyway this has caused a situation where the third party the EU and Schengen citizens of Sweden are in doubts of their Schengen rights are valid, if the flight companies will make troubles at the airport or not showing the ID-card. This is not the standard, the Schengen agreement is meant to be and this uncertainty is limiting the free trade of Europe and Swedish business. Standardised EC ID-cards? There could very well be other countries making the same kind of fuzz to their citizens trying to invoke past rights signed off with the signing of the Schengen agreement. This is something the EC Internal Market and Services DG should not support and actively try to find good solutions for all the citizens of the EU according to the Schengen agreement. ID cards should be seen as private security, not state security. Making standard Schengen ID-cards with both physical and digital IDs makes such information printed on the cards like place of birth 4

5 5 and citizenship obsolete. It can be removed from the Schengen ID-card specifications. A standard handheld reader IP-communicating over mobile phones in the pocket over Bluetooth could make any standard equipped officer of any authority able to read the digital content and connect to the ID-service database of the Schengen agreemen t. Standardised ID-cards are much easier to read and is safer for all. It should be stated it is illegal to take an ID card from a person. The ID card should both be a personal object and seen as the users private integrity. It should be seen as the key to rights, not to be governed. Something that could by the EU be established as human personal rights with the UN and in international agreements between governments. It would also with ID-cards with digital data telling it, solve a huge problem for refugees not being approved refugee status yet. Private specialist companies issuing ID-cards? By tradition ID-cards in Sweden has been privately issued by the post, the banks, the authority the user serves under or private employers. Usually performed by ID-card issuers like ID-kort and Rollfilm. The governmental issuing of Swedish national ID-cards of Schengen has wrecked the structures of private issuers of ID-cards to a very large extent. And ID-card security availability in Sweden is today much lower than before the EU and Schengen membership. The private issuer aspect of the past in Sweden is very much in line of the common market and free competition idea. The moving the issuing to the police and the tax authority, has increased the customers costs at least five times without any obvious increase in production costs or security services. The increased price is just a matter of market or authoritarian price setting. Cards were issued by any post or bank office. The police and the tax authority has one office each, in a county. So there are good reasons to organise an issuing policy of physical IDcards with digital ID card carrying facilities from an EC based trust. A trust that could be decentralised to certified private com panies and authorities in competition. Giving good service and good pricing for a good standardised security service for all use for all parties in the EU. Together with a structure of a hierarchy of PKI CAs or agents it will give the users the right tools for trade, business and private travel and security needs of all cases. It will make it possible to solve this security issue for electronic business and administration like einvoicing. An international service A service hub set up by the EC (most likely in a sub-organisation) could very well supply this service world wide, on the same basis as for their EU member state citizens. Many countries outside the EU has no capabilities of performing such systems for their own countries and we have seen the local national fuzz with present regulations in the EU. In fact the IDs are not related to states and nationalities but to human individuals, so configurations of trusted groups of users. Something that is important available for all, even SMEs and private persons as a part of the free trade of Europe. It would benefit Europe s trade relations with other countries all using the same ID system. So there is no reason not issuing rights to hierarchies stretching out of the borders of the EU, on the same basis as inside the EU/Schengen area. The digital data in the card has different context for different users. Standard computer solutions providers Another problem is supply of HW and SW solutions. Card readers are cheap today and in many cases available built into PC notebooks.

6 But the SW packages and the installations of the PKI systems are huge fuzz. Systems are usually indeed SW OS dependent proprietary solutions and takes a day or two to install by a specialist consultant. There is because of this a need of much better standardised technical SW solutions and a need for PKI service providers. SW solutions possible to be bought standard packages and a funding of mainly open source solutions development for any OS are wanted. The PKI service providers could very well be the web-hotel providers putting up PKI servers supplying their customers with these special PKI solutions. The present PKI system suppliers in Sweden are busy and can t expand fast enough, to take care of all customer needs. 6 Suggestion Certainly I am not the man to tell exactly how, but the EC could very well start an expert group solving these practical tasks. Alphabet AB suggest the EC commission to take up a study of how to solve the PKI and ID topics in general and all its side tracks to solutions equal available for all, all of our business and private society. I like to highlight this issue and I hope you see our points of this topic. Another security topic related to einvoicing security track ability It is not possible to get volumes of einvoicing based on leased https based services of einvoice exchange service providers. Systems like the internet bank and other companies supplying this kind of service. The reason is that a majority of the companies in the EU would never pay the fees or buy the technical solutions of these systems, voluntarily. The second reason is that this einvoicing market must include private users and SMEs only having an reader to receive einvoices and treat them as physical invoices, only receiving them in digital form. Volumes of electronic invoicing would not be developed if we do allow such technical restrictions. Not being service minded enough the PDFs over , could also win the competition and the entire project goes bust. And we need a solution possible to grow with, XML with XSL (or something). We need an based transport standard of einvoices. As the report of the expert group notes the protocol gives in the transport protocol itself, no security in the content of the invoices themselves. There are however two factors that are important to notice: o If a PKI solution covering all citizens of the EU in all levels of business and private use is developed, such security is possible. o The major problem with the SMTP and POP server protocols are that the issuer is not traceable and leaves an open space for spam and fraud. A new generation server protocols handling traceable s and readers notifying the user if it is, would make a difference. Very likely, soon many users would switch and only receive and read traceable s, getting protection against spam mail, this way. This view makes the protocol, the security and traceability topics very interesting to have investigated and solutions presented. Alphabet AB is suggesting the EC to start such a study. Jan Bergström / Alphabet AB There is also a special sidetrack and that is supply of standardised PKI solutions for data transfer like between mainframe systems of data files, where no persons are directly involved, but regular batch jobs.

Data Protection and Information Security. Presented by Emma Hawksworth Slater and Gordon

Data Protection and Information Security. Presented by Emma Hawksworth Slater and Gordon Data Protection and Information Security Webinar Presented by Emma Hawksworth Slater and Gordon 1 3 ways to participate Ask questions link below this presentation Answer the polls link below this presentation

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

Pay as you go Terms and Charges

Pay as you go Terms and Charges Pay as you go Terms and Charges Would you prefer this information in large print, on disk, or in Braille? Call our specialist accessibility team on 03333 043 222 or email disability.access@vodafone.co.uk

More information

Probably the best PKI in the world

Probably the best PKI in the world Probably the best PKI in the world PrimeKey At A Glance Solutions and Professional Services within Applied PrimeKey Group Cryptography with focus on PKI (what's PKI?) PrimeKey Solutions AB Main customers

More information

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

A Strategy for a secure Information Society Dialogue, Partnership and empowerment A Strategy for a secure Information Society Dialogue, Partnership and empowerment Gerard.Galler@ec.europa.eu European Commission DG Information Society & Media Unit INFSO/A3: Internet; Network & Information

More information

г. Moscow, 89, Krasnobogatyrskaya, bld.1 +7 (495) (495) TECHNOLOGIES OF ENGINEERING

г. Moscow, 89, Krasnobogatyrskaya, bld.1 +7 (495) (495) TECHNOLOGIES OF ENGINEERING 107076 г. Moscow, 89, Krasnobogatyrskaya, bld.1 info@amd-tech.ru +7 (495) 984-41-05 +7 (495) 963-92-11 TECHNOLOGIES OF ENGINEERING 3 01 ABOUT COMPANY A small company with a few members some years ago,

More information

SAFE-BioPharma RAS Privacy Policy

SAFE-BioPharma RAS Privacy Policy SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what

More information

Subject Access Request Form

Subject Access Request Form Subject Access Request Form The General Data Protection Regulations (GDPR) provides you, the data subject, with a right to receive a copy of the data /information we hold about you or to authorise someone

More information

Trusted National Identity Schemes. Coralie MESNARD

Trusted National Identity Schemes. Coralie MESNARD Trusted National Identity Schemes Coralie MESNARD Worldwide digital transactions are booming Digitization The number of G2C digital transactions is said to grow 30% by 2020 Privacy - Convenience Citizens

More information

Questionnaire for data source identification. Introduction

Questionnaire for data source identification. Introduction Introduction EFBWW Trade Union Guide on Asbestos Registries - a project to compile a guide on asbestos data sources in all 28 Member States including practical information on a) how to request / access

More information

COMPUTERIZATION. Bilateral Screening Chapter 29 Customs Union Presentation by the Republic of Serbia Brussels, 3-4 June 2014

COMPUTERIZATION. Bilateral Screening Chapter 29 Customs Union Presentation by the Republic of Serbia Brussels, 3-4 June 2014 COMPUTERIZATION Bilateral Screening Chapter 29 Customs Union Presentation by the Republic of Serbia Brussels, 3-4 June 2014 CONTENT 1) Legal Framework 2) Strategic documents 3) Short historical overview

More information

«SINGLE MARKET MONITOR SURVEY»

«SINGLE MARKET MONITOR SURVEY» FLASH EUROBAROMETER 106 (SPECIAL TARGETS) «SINGLE MARKET MONITOR SURVEY» SEPTEMBER 2001 Survey managed and organised by: the European Commission - DG Press & Communication (Unit B/1) Conducted for : Conducted

More information

Why you MUST protect your customer data

Why you MUST protect your customer data Why you MUST protect your customer data If you think you re exempt from compliance with customer data security and privacy laws because you re a small business, think again. Businesses of all sizes are

More information

Privacy and Cookies Policy EH Hotel 2018 Ltd

Privacy and Cookies Policy EH Hotel 2018 Ltd Privacy and Cookies Policy EH Hotel 2018 Ltd Version Control Approved By Version 1.0 Policy became operational on: Next Review Date TBC TBC Privacy and Cookies At EH Hotel 2018 Ltd we take your privacy

More information

TRUSTIS FPS. Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate

TRUSTIS FPS. Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate TRUSTIS FPS Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate Important Notice: The information here is guidance on the minimum requirements of Enrolment

More information

BOROUGH MARKET (SOUTHWARK) TRUST DATA SUBJECT REQUEST FORM

BOROUGH MARKET (SOUTHWARK) TRUST DATA SUBJECT REQUEST FORM BOROUGH MARKET (SOUTHWARK) TRUST DATA SUBJECT REQUEST FORM Your rights Under the General Data Protection Regulation (GDPR) you, the data subject, have the right to: 1. Receive a copy of the information

More information

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a

More information

In a well set-up office, the equipment, systems and environment all contribute to making you and your business more efficient.

In a well set-up office, the equipment, systems and environment all contribute to making you and your business more efficient. Guide from CLEAR HOUSE ACCOUNTANTS Tel: 0207 117 2639 Email: info@chacc.co.uk www.chacc.co.uk Setting up an office In a well set-up office, the equipment, systems and environment all contribute to making

More information

ASIS EXAM - PSP. Physical Security Professional. Buy Full Product.

ASIS EXAM - PSP. Physical Security Professional. Buy Full Product. ASIS EXAM - PSP Physical Security Professional Buy Full Product http://www.examskey.com/psp.html Examskey ASIS PSP exam demo product is here for you to test the quality of the product. This ASIS PSP demo

More information

Package of initiatives on Cybersecurity

Package of initiatives on Cybersecurity Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating

More information

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 21 October /13 LIMITE CO EUR-PREP 37. NOTE General Secretariat of the Council

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 21 October /13 LIMITE CO EUR-PREP 37. NOTE General Secretariat of the Council COUNCIL OF THE EUROPEAN UNION Brussels, 21 October 2013 12397/13 LIMITE CO EUR-PREP 37 NOTE from: To: General Secretariat of the Council Council Subject: European Council (24-25 October 2013) - Draft conclusions

More information

Privacy Notice - Stora Enso s Supplier and Stakeholder Register. 1 Purpose

Privacy Notice - Stora Enso s Supplier and Stakeholder Register. 1 Purpose Privacy Notice - Stora Enso s Supplier and Stakeholder Register Date 29.1.2018 1 Purpose Purpose of this privacy notice is to provide the persons communicating with Stora Enso in the role of a supplier

More information

Privacy & Cookie Statement

Privacy & Cookie Statement Privacy & Cookie Statement Version: 8 May 2018 Since day 1, WeTransfer has cared a great deal about privacy and respecting our users. We have always had a lean data policy: no sign up, no install, no retargeting.

More information

FAQ of BIPT for the attention of the consumers relating to the compulsory identification of prepaid card users. Contents

FAQ of BIPT for the attention of the consumers relating to the compulsory identification of prepaid card users. Contents FAQ of BIPT for the attention of the consumers relating to the compulsory identification of prepaid card users Contents 1. What does the new regulation relate to?... 3 1.1. What will change?... 3 1.2.

More information

Privacy Policy GENERAL

Privacy Policy GENERAL Privacy Policy GENERAL This document sets out what information Springhill Care Group Ltd collects from visitors, how it uses the information, how it protects the information and your rights. Springhill

More information

Newcomer Finances Toolkit. Fraud. Worksheets

Newcomer Finances Toolkit. Fraud. Worksheets Newcomer Finances Toolkit Fraud Worksheets Ottawa Community Loan Fund Fonds d emprunt Communautaire d Ottawa 22 O Meara St., Causeway Work Centre, Ottawa, ON K1Y 4N6 Tel: 613-594-3535 Fax: 613-594-8118

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS

ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS Accreditation is continuously gaining recognition as an important technical tool in the delivery of objectives across an increasing range of policy

More information

UUEAS Privacy policy - Members

UUEAS Privacy policy - Members UUEAS Privacy policy - Members The Union of UEA Students (The Union) is an independent charity, whose primary goal is to represent the students at the University of East Anglia. Every student at UEA is

More information

Privacy Notice. Lonsdale & Marsh Privacy Notice Version July

Privacy Notice. Lonsdale & Marsh Privacy Notice Version July Privacy Notice Lonsdale & Marsh understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of all of our clients and will

More information

Saving costs through maximising peering relationships

Saving costs through maximising peering relationships Saving costs through maximising peering relationships RIPE NCC Regional Meeting Moscow June 16 th 2004 Vanessa Evans - LINX Serge Radovcic - Euro-IX 1 Introduction Purpose of the presentation Discuss our

More information

Within the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ):

Within the meanings of applicable data protection law (in particular EU Regulation 2016/679, the GDPR ): Privacy Policy Introduction Ikano S.A. ( Ikano ) respects your privacy and is committed to protect your Personal Data by being compliant with this privacy policy ( Policy ). In addition to Ikano, this

More information

COMMENTS BY THE CONFEDERATION OF SWEDISH ENTERPRISE ON:

COMMENTS BY THE CONFEDERATION OF SWEDISH ENTERPRISE ON: 31 March 2017 COMMENTS BY THE CONFEDERATION OF SWEDISH ENTERPRISE ON: Proposal for a Regulation of the European Parliament and of the Council introducing a European services e-card and related administrative

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

FIRESOFT CONSULTING Privacy Policy

FIRESOFT CONSULTING Privacy Policy FIRESOFT CONSULTING Privacy Policy FIRESOFT CONSULTING abides by the Australian Privacy Principles ( APPs ), which provides relative information to businesses in relation to the collection, disclosure,

More information

The EuroHPC strategic initiative

The EuroHPC strategic initiative Amsterdam, 12 December 2017 The EuroHPC strategic initiative Thomas Skordas Director, DG CONNECT-C, European Commission The European HPC strategy in Horizon 2020 Infrastructure Capacity of acquiring leadership-class

More information

PCO Data Protection and Privacy Policy

PCO Data Protection and Privacy Policy PCO Data Protection and Privacy Policy [MCI Group Holding SA, 9, Rue du Pré-Bouvier, 1242 Satigny, Geneva, Switzerlandor relevant MCI entity] ( MCI ) is an event and association management company with

More information

REAL RENTS PROPERTY MANAGEMENT LTD PRIVACY NOTICE

REAL RENTS PROPERTY MANAGEMENT LTD PRIVACY NOTICE REAL RENTS PROPERTY MANAGEMENT LTD PRIVACY NOTICE BACKGROUND: understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy

More information

Polemic is a business involved in the collection of personal data in the course of its business activities and on behalf of its clients.

Polemic is a business involved in the collection of personal data in the course of its business activities and on behalf of its clients. Privacy policy 1 Background This document sets out the policy of Polemic Forensic ABN 60 392 752 759 ( Polemic ) relating to the protection of the privacy of personal information. Polemic is a business

More information

Policy Objectives (the Association) Privacy Act APPs Policy Application ACTU The Police Association Website

Policy Objectives (the Association) Privacy Act APPs Policy Application ACTU The Police Association Website Privacy Policy 1. Policy Objectives 1.1 The Police Association Victoria (the Association) is the organisation representing sworn police officers at all ranks, protective services officers, police reservists

More information

egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO

egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO egov & PKI By: Alaa Eldin Mahmoud Aly YOUR LOGO e-government Survey 2014 United Nations Page 2 EGDI: E-Government Development Index National ID & Digital Signature Estonian Prime Minister Andrus Ansip

More information

AGM. User Manual. Date: 22/03/2017 Version: 1.2 Software version: V1.38.3

AGM. User Manual. Date: 22/03/2017 Version: 1.2 Software version: V1.38.3 AGM User Manual Date: 22/03/2017 Version: 1.2 Software version: V1.38.3 Table of Contents 1. Introduction... 3 1.1. Definition... 3 1.2. Disclaimer... 3 1.3. Using EU Login authentication... 3 2. Roles

More information

WHAT DOES INFRASTRUCTURE MEAN?

WHAT DOES INFRASTRUCTURE MEAN? WHAT DOES INFRASTRUCTURE MEAN? Lars-Johan Liman Sr. Systems Specialist Netnod Internet Exchange, Stockholm, Sweden, v1.6 Infrastructure The installations that form the basis for any operation or system.

More information

A Ready Business rises above infrastructure limitations. Vodacom Power to you

A Ready Business rises above infrastructure limitations. Vodacom Power to you A Ready Business rises above infrastructure limitations Vodacom Power to you Vodacom Business Nigeria Managed Hosted Services Get Ready to free up your business. To succeed in today s world of dramatic

More information

Identity management. Tuomas Aura T Information security technology. Aalto University, autumn 2011

Identity management. Tuomas Aura T Information security technology. Aalto University, autumn 2011 Identity management Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Outline 1. Single sign-on 2. OpenId 3. SAML and Shibboleth 4. Corporate IAM 5. Strong identity 2

More information

It s still very important that you take some steps to help keep up security when you re online:

It s still very important that you take some steps to help keep up security when you re online: PRIVACY & SECURITY The protection and privacy of your personal information is a priority to us. Privacy & Security The protection and privacy of your personal information is a priority to us. This means

More information

GlobalSign Privacy Policy Statement Version 1.4

GlobalSign Privacy Policy Statement Version 1.4 GlobalSign Privacy Policy Statement Version 1.4 1 In support of GlobalSign s Public Certification Services Version 1.4 1999-2007, GlobalSign Important Notice: You must read the GlobalSign Certification

More information

Depending on the Services or information you request from us, we may ask you to provide the following personal information:

Depending on the Services or information you request from us, we may ask you to provide the following personal information: LINK HUNGARY PRIVACY POLICY PROTECTING YOUR DATA 1. Who are Link Asset Services and Link Hungary? Link Asset Services ( Link ) is a trading name of companies which offer a range of services, principally

More information

NIPPON VALUE INVESTORS DATA PROTECTION POLICY

NIPPON VALUE INVESTORS DATA PROTECTION POLICY NIPPON VALUE INVESTORS DATA PROTECTION POLICY INTRODUCTION Nippon Value Investors KK and Nippon Value Investors, Inc. (together NVI ) are committed to protecting the privacy of individuals whose data they

More information

PRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings:

PRIVACY POLICY. 1. Definitions and Interpretation In this Policy the following terms shall have the following meanings: PRIVACY POLICY BACKGROUND: Leaman Mattei Limited (LM) understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of everyone

More information

2017 RIMS CYBER SURVEY

2017 RIMS CYBER SURVEY 2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the

More information

Recruitment Guide for External Applicants

Recruitment Guide for External Applicants Directorate General Human Resources, Budget and Organisation ECB-PUBLIC Recruitment Guide for External Applicants 19 June 2012 Page 1 Table of Contents 1. Getting Started with SAP e-recruiting 3 1.1 Searching

More information

LL-C (Certification) Services Overview

LL-C (Certification) Services Overview LL-C (Certification) Services Overview Who is LL-C (Certification)? LL-C (Certification) is an international certification body operating in more than 40 countries with experience in the field. Provides

More information

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity & Digital Privacy in the Energy sector ENERGY INFO DAYS Brussels, 25 October 2017 Cybersecurity & Digital Privacy in the Energy sector CNECT.H1 Cybersecurity & Digital Privacy, DG CNECT ENER.B3 - Retail markets; coal & oil, DG ENER European

More information

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number

In this policy, whenever you see the words we, us, our, it refers to Ashby Concert Band Registered Charity Number ASHBY CONCERT BAND PRIVACY POLICY The privacy and security of your personal information is extremely important to us. This privacy policy explains how and why we use your personal data. We will keep this

More information

09 June 2011 Affärskollegan - Your Business Partner 2

09 June 2011 Affärskollegan - Your Business Partner 2 Improving Health Care and Advancing Health Innovations with Public Procurement Sven-Eric Hargeskog Public Procurement & Innovation Expert Affärskollegan Your Business Partner What is public procurement?

More information

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department.

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department. Application for the post of the Executive Director of the European Network and Information Security Agency (ENISA) Udo Helmbrecht Presentation to the ENISA Management Board in Brussels on April 3 rd 2009

More information

Data Subject Access Request

Data Subject Access Request Data Subject Access Request DATA PROTECTION ACT 1998 Version: 10.0 Approval Status: Approved Document Owner: Graham Feek Classification: Internal Review Date: 03/07/2017 Effective from: 1 July 2015 Table

More information

Travel Information Security November 2015

Travel Information Security November 2015 Travel Information Security November 2015 Important Note: Disclaimer The price of your house may go down as well as up This presentation contains the results of a short research exercise into travel information

More information

DIGITAL CENTRAL ASIA SOUTH ASIA (CASA) PROGRAM. Transport and ICT Global Practice World Bank

DIGITAL CENTRAL ASIA SOUTH ASIA (CASA) PROGRAM. Transport and ICT Global Practice World Bank DIGITAL CENTRAL ASIA SOUTH ASIA (CASA) PROGRAM Rajendra Singh, Senior Regulatory Specialist ICT Sector Unit November 1 2, 2017 Sixth session of the Asia Pacific Information Superhighway (AP IS) Steering

More information

Introductory Speech to the Ramboll Event on the future of ENISA. Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht

Introductory Speech to the Ramboll Event on the future of ENISA. Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht Introductory Speech to the Ramboll Event on the future of ENISA Speech by ENISA s Executive Director, Prof. Dr. Udo Helmbrecht BRUSSELS 22 ND MARCH 2017 www.enisa.europa.eu European Union Agency For Network

More information

Jefferies EMEA Privacy Notice

Jefferies EMEA Privacy Notice Jefferies International Limited Vintners Place 68 Upper Thames St London United Kingdom Jefferies EMEA Privacy Notice 1. Introduction This Privacy Notice explains what we do with your personal data. It

More information

PADOR HELP GUIDE FOR CO-APPLICANTS

PADOR HELP GUIDE FOR CO-APPLICANTS PADOR HELP GUIDE FOR CO-APPLICANTS WHAT IS PADOR?... 1 WHO CAN REGISTER IN PADOR?... 1 WHY register my organisation in PADOR? Is registration obligatory?... 2 WHEN to register? When to update an account?...

More information

AFC Compliance Careers

AFC Compliance Careers AFC Compliance Careers ACAMS Education Program Date : December 6 th 2017 Donna Bucci Ireland Account Manager ACAMS ACAMS is a global community ACAMS is the world s largest international membership organisation

More information

Applicant Manager Guidance Notes

Applicant Manager Guidance Notes Applicant Manager Guidance Notes DBS Online Disclosure Guide (ebulkplus) Page 1 Contents Applicant Manager Guidance Notes... 1 Logging onto the System... 2-5 How to complete ID & Section Y... 6-10 Tracking

More information

PREPARING FOR THE GDPR AT THE UNIVERSITY OF HELSINKI

PREPARING FOR THE GDPR AT THE UNIVERSITY OF HELSINKI PREPARING FOR THE GDPR AT THE UNIVERSITY OF HELSINKI Jarkko Reittu Data Protection Officer and Legal Counsel University of Helsinki, Administrative Services jarkko.reittu@helsinki.fi 1 MY BACKGROUND JARKKO

More information

Identity Management Systems An Overview. IST Event 2004 /

Identity Management Systems An Overview. IST Event 2004 / IST Event 2004 / 15.11.2004 Marit Hansen / Henry Krasemann Unabhängiges Landeszentrum für Datenschutz // Independent Centre for Privacy Protection Schleswig-Holstein, Germany Overview Identity Management

More information

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME FACULTY OF LAW DEPARTEMENT: CIVIL LAW MASTER STUDY THEME: CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME Mentor: Prof. Ass. Dr. Xhemajl Ademaj Candidate: Abdurrahim Gashi Pristinë, 2015 Key words List

More information

Secure Societies Work Programme Call

Secure Societies Work Programme Call Secure Societies Work Programme 2018-2020 2019 Call Andrea DE CANDIDO Deputy Head of Unit Innovation and Industry for Security European Commission andrea.de-candido@ec.europa.eu Outline 1. Policy context

More information

Concur Registration Create a new Account and Profile Tips

Concur Registration Create a new Account and Profile Tips Concur Registration Create a new Account and Profile Tips Activating Your Account and Travel Profile Creation 2 New Users - Online Booking and Profile To complete a travel profile and / or book travel

More information

Economic impact Dutch Data Centers

Economic impact Dutch Data Centers 2017 Economic impact Dutch Data Centers THE ECONOMIC IMPACT OF MULTI-TENANT DATA CENTERS IN THE NETHERLANDS Over the last decade we have seen strong growth coming from the total of Dutch multitenant data

More information

Enforcing building codes for new and existing buildings. Dr. Zoran Morvaj

Enforcing building codes for new and existing buildings. Dr. Zoran Morvaj Enforcing building codes for new and existing buildings Dr. Zoran Morvaj New Delhi, 29 November 1 2016 AGENDA 1. Building codes enforcement for NEW commercial buildings EU practices 3. Programs for EE

More information

spam goes mobile Comverse User Forum 29th June 2005, Marbella (Spain)

spam goes mobile Comverse User Forum 29th June 2005, Marbella (Spain) spam goes mobile Comverse User Forum 29th June 2005, Marbella (Spain) Lara Srivastava Project Director- ITU New Initiatives Programme Strategy and Policy Unit, ITU Note: The views expressed in this presentation

More information

EXAMPLE AUDIO OR VIDEO SCRIPTS

EXAMPLE AUDIO OR VIDEO SCRIPTS Contact: Arlee Colman The Florida Bar Legal Specialization & Education Department (850) 561-5805 Florida Bar Board Certification 651 East Jefferson Street Tallahassee, FL 32399-2300 FloridaBar.org/certification

More information

Concur Travel QuickStart Guide

Concur Travel QuickStart Guide Concur Travel QuickStart Guide Concur Technologies Version 1.3 As of: June 2016 Contact Us Procurement Card and Travel Services Office pcardandtravelsvcs@southalabama.edu http://www.southalabama.edu/departments/financialaffairs/travelandprocurement/

More information

Privacy Notice - Stora Enso s Customer and Sales Register. 1 Controller

Privacy Notice - Stora Enso s Customer and Sales Register. 1 Controller Privacy Notice - Stora Enso s Customer and Sales Register Date 29.1.2018 1 2 Purpose of this privacy notice is to provide the persons communicating with Stora Enso or otherwise registered in Stora Enso

More information

Public consultation on the revision of the Recommendation on relevant markets

Public consultation on the revision of the Recommendation on relevant markets PER E-MAIL cnect-relevant-markets@ec.europa.eu EUROPEAN COMMISSION DG Communications Networks, Content & Technology Regulatory Coordination and Markets Unit (B3) BU33 6/26 CM Groep Konijnenberg 30 4825

More information

Efficient e Government Through Mass Solutions Provided by Banks Nordic lessions. Erkki Poutiainen 14 September 2006

Efficient e Government Through Mass Solutions Provided by Banks Nordic lessions. Erkki Poutiainen 14 September 2006 Efficient e Government Through Mass Solutions Provided by Banks Nordic lessions Erkki Poutiainen 14 September 2006 Vision Efficiency in The Networked Economy 1. The framework the transition in the economy

More information

VISTRA MONACO PRIVACY NOTICE

VISTRA MONACO PRIVACY NOTICE Effective Date: from 25 May 2018 VISTRA MONACO PRIVACY NOTICE This Privacy Notice explains how particular companies in the Vistra Group collect, use and disclose your personal data, and your rights in

More information

Call for Expressions of Interest

Call for Expressions of Interest Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...

More information

Online Digital Transformation Courses COB Certified E-Commerce & E-Business Manager E-Learning Options

Online Digital Transformation Courses COB Certified E-Commerce & E-Business Manager E-Learning Options Online Digital Transformation Courses COB Certified E-Commerce & E-Business Manager E-Learning Options Course Information GBP Edition The Institute for Business Advancement www.iba.insitute August 2017

More information

European Open Science Cloud Implementation roadmap: translating the vision into practice. September 2018

European Open Science Cloud Implementation roadmap: translating the vision into practice. September 2018 European Open Science Cloud Implementation roadmap: translating the vision into practice September 2018 European Commission, Directorate General Research & Innovation (DG RTD) Unit A2 Open Data Policy

More information

Concur Expense QuickStart Guide

Concur Expense QuickStart Guide Concur Expense QuickStart Guide Concur Technologies Version 1.3 As of: May 2016 Contact Us Procurement Card and Travel Services Office pcardandtravelsvcs@southalabama.edu http://www.southalabama.edu/departments/financialaffairs/travelandprocurement/

More information

REGISTRATION GUIDE Term

REGISTRATION GUIDE Term REGISTRATION GUIDE Term 3 2018-19 The Language Centre INTRODUCTION 02 Overview Registration is the formal process of becoming a student at the University of Leeds. It enables you to attend lectures and

More information

ehealth in Europe: at the convergence of technology, medicine, law and society

ehealth in Europe: at the convergence of technology, medicine, law and society ehealth in Europe: at the convergence of technology, medicine, law and society Pēteris Zilgalvis, J.D. Head of Unit, ICT for Health DG Information Society and Media, European Commission IPTS Spring Meeting,

More information

Getting it right. Fiona Duncan Head of Prepaid Centre of Excellence Visa Europe. Information Classification as Needed

Getting it right. Fiona Duncan Head of Prepaid Centre of Excellence Visa Europe. Information Classification as Needed Getting it right Fiona Duncan Head of Prepaid Centre of Excellence Visa Europe For Visa Member Use Only This information is not intended, and should not be construed, as an offer to sell, or as a solicitation

More information

H2020 & THE FRENCH SECURITY RESEARCH

H2020 & THE FRENCH SECURITY RESEARCH H2020 & THE FRENCH SECURITY RESEARCH JANUARY 22, 2013 WISG 2013 / TROYES LUIGI REBUFFI CEO EUROPEAN ORGANISATION FOR SECURITY WWW.EOS EU.COM PRESIDENT CSOSG STEERING COMMITTEE European Organisation for

More information

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK GAIN RECOGNITION AS AN APPROVED PROVIDER UNDER ISO/IEC 17024 AND JOIN OUR NETWORK OF TRUSTED PROVIDERS THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER

More information

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES Kristina Doda & Aleksandar Vanchoski Budapest, CEPOL conference 2017 New technologies - new social interactions and economic development - need

More information

Latvian Metal Industry at Offshore Technology Days 2015

Latvian Metal Industry at Offshore Technology Days 2015 Latvian Metal Industry at Offshore Technology Days 2015 Toms Grinfelds Executive Director MASOC Stavanger, 21.10.2015 MASOC Association of Mechanical Engineering and Established in 1994 as informative

More information

General Data Protection Regulation (GDPR) The impact of doing business in Asia

General Data Protection Regulation (GDPR) The impact of doing business in Asia SESSION ID: GPS-R09 General Data Protection Regulation (GDPR) The impact of doing business in Asia Ilias Chantzos Senior Director EMEA & APJ Government Affairs Symantec Corporation @ichantzos Typical Customer

More information

ORC ECA Subscriber Instructions for Individual Identity and Encryption Certificates

ORC ECA Subscriber Instructions for Individual Identity and Encryption Certificates ORC ECA Subscriber Instructions for Individual Identity and Encryption Certificates Getting Prepared Print these instructions for easy reference. (Note: this is a good test to see that you are able to

More information

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning.

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning. AIPM Association for International PMOs Expert Practitioner Foundation www.pmolearning.co.uk PMO The Leading Standard and Certification for PMO Professionals Today Understand the Value of High-Performing

More information

Identity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014

Identity management. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2014 Identity management Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline 1. Single sign-on 2. SAML and Shibboleth 3. OpenId 4. OAuth 5. (Corporate IAM) 6. Strong identity 2

More information

IFEA Risk Management and Cybercrime

IFEA Risk Management and Cybercrime IFEA Risk Management and Cybercrime Digital information technology is becoming ever more deeply and rapidly entrenched in our society. It won t be long before everyone is permanently connected to each

More information

(Extract from Web-forms for Intrastat, Eurostat, March 2000)

(Extract from Web-forms for Intrastat, Eurostat, March 2000) (Extract from Web-forms for Intrastat, Eurostat, March 2000) In France, two different systems are being implemented which use web-forms for the collection of Intrastat declarations: "DEB sur le Web" (Intrastat

More information

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning.

Association for International PMOs. Expert. Practitioner. Foundation PMO. Learning. AIPMO Association for International PMOs Expert Practitioner Foundation www.pmolearning.co.uk PMO Learning The Leading Standard and Certification for People Working in PMO Today Understand the Value of

More information

Public consultation on Counterfeit and Piracy Watch-List

Public consultation on Counterfeit and Piracy Watch-List Public consultation on Counterfeit and Piracy Watch-List Fields marked with * are mandatory. Public consultation on Counterfeit and Piracy Watch-List Purpose and context of the consultation IPR infringements,

More information

INDEPENDENT REGISTERED REPRESENTATIVE ANNUAL CERTIFICATION

INDEPENDENT REGISTERED REPRESENTATIVE ANNUAL CERTIFICATION IMS Securities, Inc. Member FINRA/SIPC IMS Financial Advisors, Inc. INDEPENDENT REGISTERED REPRESENTATIVE ANNUAL CERTIFICATION The Firm and you are subject to a multitude of laws and regulations governing

More information

Helping shape your future

Helping shape your future www.pwc.com/pwcacademyme Helping shape your future Project Management Professional (PMP ) PwC s Academy 2016-2017 Contents Welcome to PwC s Academy 1 About Project Management Professional (PMP ) 2 Getting

More information