Countdown to eidas. Date: 19/04/2016 Auteur: CTIE Révision: 1.0 Ref: EIDAS_CTIE_4 Page 1

Size: px
Start display at page:

Download "Countdown to eidas. Date: 19/04/2016 Auteur: CTIE Révision: 1.0 Ref: EIDAS_CTIE_4 Page 1"

Transcription

1 Countdown to eidas Date: 19/04/2016 Auteur: CTIE Révision: 1.0 Ref: EIDAS_CTIE_4 Page 1

2 About CTIE (Centre des Technologies de l'information de l'etat) Provides centralised IT services for all public administrations Total annual budget > 100 Meuros Full-time staff > 300 agents Speaker Head of Internal audit Luxembourg eidas EU Commission eid, e-signatures, e-participation, Page 2

3 Agenda 1. Motivations 2. Overview 3. eid 4. Trust services 5. Conclusions Page 3

4 Agenda 1. Motivations 2. Overview 3. eid 4. Trust services 5. Conclusions Page 4

5 EU digital market 315 million Europeans use the Internet every day 21,6 million of SMEs in the EU, of which more than 40% have cross-border activities Potential contribution to European GDP of a fully functioning DSM has been estimated at EUR 415 billion/year Over 14 million EU citizens are resident in another Member State Between 2001 and 2011, digitalisation accounted for 30% of GDP growth in the EU e-commerce is growing rapidly in the EU at an average annual growth rate of 22%, surpassing EUR 200 billion in 2014 In % of retail travel and tourism sales were made online for a volume close to EUR 70 billion Page 5 Source: European Commission

6 EU Digital market Page 6 Source: European Commission

7 Before eidas Electronic signatures (esignature Directive (1999), Services Directive (2006)) However: Different interpretations of SSCDs Appropriate supervision of TSPs No distinction between natural and legal persons Outdated technical standards Authentication? Technical PoCs (STORK, ) and many national solutions Other Trust Services? No common legal basis Page 7

8 eidas principles Goal: strengthen EU Single Market by boosting trust and convenience in secure and seamless cross-border electronic transactions. Too small Extended scope to cover eid and all relevant trust services Too Weak Regulation directly enforceable in all MS (+ optional IAs) Some "gray areas" have been clarified (Supervision, QES, QSCD, ) Too old New use-cases and technologies have been taken into account Technology-neutral and outcome-based approach Page 8

9 Agenda 1. Motivations 2. Overview 3. eid 4. Trust services 5. Conclusions Page 9

10 eidas scope eidas Regulation eid Trust services Mutual recognition Levels of Assurance esignatures eseals Time stamp Website authentication Electronic registered delivery esig/eseals validation and preservation Notification process Interoperability framework Trusted lists QSCD Trust mark Liability TSP supervision Breach notification Page 10 + electronic documents

11 Page 11 eidas usage scenario

12 eidas impact Some past (or ongoing) large-scale EU pilot projects which have lead to eidas: Education: STORK, STORK2 Banking and financial services: STORK2 Public Services for Businesses: SPOCS, STORK2 Health: epsos, e-sens Procurement: PEPPOL, e-sens Justice: e-codex, e-sens Agriculture: e-sens Page 12

13 Legal framework Legal act Réf. In force eidas regulation (EU) 910/ /09/2014 IA on cooperation (EU) 2015/296 17/03/2015 IA on interoperability framework (EU) 2015/ /09/2015 eid IA on levels of assurance (EU) 2015/ /09/2015 IA on EU trust mark (EU) 2015/806 12/06/2015 IA on trusted lists (EU) 2015/ /09/2015 IA on esignatures / eseals formats (EU) 2015/ /09/2015 Trust services IA on notification (EU) 2015/ /11/2015 IA on standards for QSCDs? 04/2016? More optional implementing acts are foreseen by eidas Page 13

14 Planning 17/09/2014 entry in force of eidas regulation eid 29/09/ /09/2018 Voluntary recognition Mandatory recognition 01/07/2016 Trust services esignature Directive regime Transition period (QES TSPs) eidas regime Page 14

15 Planning What will happen with electronic signatures? Currently: esignatures Directive is still in effect National esignature/trust service laws are in effect On July 1 st 2016: esignature Directive is invalidated all conflicting national rules are repealed and replaced references to the Directive references to eidas all existing e-signatures keep their value Transitional measures: SSCD and QCs keep their status QTSPs must submit an assessment by 1 July 2017 Page 15

16 Agenda Motivations Overview eid Trust services Conclusions Page 16

17 eid eidas key Principles for eid: The goal is mutual recognition, not harmonisation. Voluntary notification of electronic identification schemes by Member States. Mandatory cross-border recognition only to access public services. Private sector has full autonomy. Notified schemes must allow access to at least one public service, free of charge. Page 17

18 The interoperability challenge 28+3 Countries 500+ million people Dozens of eids (used in several countries) Thousands of online public & private services Page 18

19 The interoperability challenge eidas nodes Connector Service MS specific eidas interoperability framework MS specific Page 19

20 eid interoperability framework Implementing regulation (EU) 2015/1501: Minimum data sets ISO certification of eidas nodes Liabilities in MW scenario -> SLA in preparation eidas Technical Specifications (v 1.0): Based on STORK1, but not compatible Covers architecture, SAML message format and attribute profiles, cryptographic requirements CEF eid example implementation (v 1.0): Open source code by DIGIT available on Joinup Page 20

21 eid Levels of Assurance (LoA) Enrolment eid means management Authenti cation Management and organisation Application and registration Identity proofing and verification (natural person) Electronic identification means characteristics and design Issuance, delivery and activation Authentication mechanism General provisions Published notices and user information Identity proofing and verification (legal person) Binding between the eid means of natural and legal persons Suspension, revocation and reactivation Renewal and replacement Information security management Record keeping Implementing regulation (EU) 2015/1502: 3 levels : low, substantial, high The scheme's LoA level is the lowest of 16 sub-loa levels in 4 categories Facilities and staff Compliance and audits Technical controls Page 21

22 eid example workflow (proxy-proxy scenario) Online service Please go here eidas Connector Sure, how do you want to authenticate? 1 I want to use your service eidas! Page 22

23 eid example workflow (proxy-proxy scenario) Online service Where did you get your eid? eidas Connector Please go here eidas Proxy Service 2 Luxembourg Page 23

24 eid example workflow (proxy-proxy scenario) Online service eidas Connector eidas Proxy Service Identity / Attribute provider RNRPP 3 i. Select eid ii. Authenticate PIN:****** iii. Consent Page 24

25 eid example workflow (proxy-proxy scenario) Online service data eidas Connector data eidas Proxy Service data Identity / Attribute provider RNRPP Access granted Page 25

26 Agenda Motivations for eidas Overview eid Trust services Conclusions Page 26

27 Trust Services eidas key Principles for Trust Services: Non-discrimination in Courts of electronic trust services vis-à-vis their paper equivalent Specific legal effects associated to qualified trust services Non-mandatory technical standards ensuring presumption of compliance Technological neutrality Harmonization of national supervision and strengthening of data protection Page 27

28 Trust services Qualified trust services covered by eidas: electronic signatures (Art.28) electronic seals (Art.38) website authentication (Art.45) preservation service for QESig/ QESeal (Art.34 / Art.40) electronic time stamps (Art.42) electronic registered delivery service (Art.44) But: Recital (25): Member States should remain free to define other types of trust services in addition to those making part of the closed list of trust services provided for in this Regulation, for the purpose of recognition at national level as qualified trust services. Page 28

29 Trusted lists Official journal of the EU Trusted Lists have a constitutive effect for qualified trust services List of the lists (LotL) National trusted lists Page 29

30 Trust mark Implementing Regulation (EU) 2015/806: After a TSP has been added to the Trusted List, it may use the EU trust mark to indicate its status of qualified TSP. A TSP using the trust mark must: include a link to the relevant trusted list clearly indicate which qualified services the trust mark refers to Page 30

31 esignature / eseal esignature: Creator: natural person (pseudonym allowed) Legal value: all: non-deniable legal effect in court qualified: equivalent to handwritten signature in all EU eseal: Creator: legal person Legal value: all: non-deniable legal effect in court qualified: presumption of integrity of the data and of correctness of the origin of that data to which the seal is linked. Recital 65: electronic seals can be used to authenticate any digital asset of the legal person, such as software code or servers. Page 31

32 esignature / eseal Implementing decision (EU) 2015/1506: Member States requiring AdES or AdES(QC) must recognise: Format Conformance level ETSI standard XAdES baseline profile B, T, LT TS v CAdES baseline profile B, T, LT TS v PAdES baseline profile B, T, LT TS v ASiC baseline profile all TS v Other formats must also be accepted if a validation service is provided by the MS implementing this format. Page 32

33 esignature / eseal preservation Definitions (Art. 34 (1) and 40): A qualified preservation service for qualified electronic signatures (resp. qualified seal) may only be provided by a qualified trust service provider that uses procedures and technologies capable of extending the trustworthiness of the qualified electronic signature (resp. qualified seal) beyond the technological validity period. Recital (61) clarifies the idea:... ensure the legal validity of electronic signatures and electronic seals over extended periods of time and guarantee that they can be validated irrespective of future technological changes. Technical standards: Long-term archival forms of PAdES/CAdES/XAdES/ASiC formats exist, but they are excluded from the scope of (EU) 2015/1506 Decision. Other formats are being investigated, such as ERS (Evidence Record Syntax, see RFC 6283). Page 33

34 Timestamps Definition (Art. 3 (33)): data in electronic form which binds other data in electronic form to a particular time establishing evidence that the latter data existed at that time. Legal effects: TST: non-deniable legal value in court QTST: presumption of time accuracy and integrity of data Requirements for QTST: 1. detectability of changes in time stamped data 2. based on an accurate time source linked to Coordinated Universal Time 3. signed or sealed by QTSP s AdESig or AdESeal, or by equivalent method Optional implementing act Page 34

35 Website authentication Goal: " a visitor to a website can be assured that there is a genuine and legitimate entity standing behind the website." Optional implementing act is undecided, but EN v defines a QCP-w policy for website authentication based on a qualified certificate: QCP-w = EV + QTSP (legal persons) = better protection for the users CA/Browser Forum : "Guidelines for The Issuance and Management of Extended Validation Certificates". eidas regulation: Supervision by a national SB Regular audits by an accredited CAB Breach notification duties Under the EU data protection regulatory framework Liability w/ reverse burden of proof Page 35

36 Website authentication The SSL ecosystem is changing: Browser vendors have taken over Internet PKI governance New technical solutions are being pushed: CT, HPKP, HSTS, CAA, etc. Free DV SSL offers Browser vendors are considering dropping support for EV SSL but still no coordination amongst browser vendors about Trust and UI Qualified Website Authentication Certificates (QWACs) need: Support from browsers: - Usage of Trusted Lists for QWAC validation - QWAC support in their SSL indicators Support from CAs: - Offer QWACs as new business solution Discussions are ongoing between Member States, EU Commission, browsers, CAs, ETSI, CA/B Forum, etc. Page 36

37 Electronic registered delivery services Definition (Art. 3 (36)): service that makes it possible to transmit data between third parties by electronic means and provides evidence relating to the handling of the transmitted data, including proof of sending and receiving the data, and that protects transmitted data against the risk of loss, theft, damage or any unauthorised alterations. Legal effects: erds: non-deniable legal value in court QeRDS: data sent and received shall enjoy the presumption of the integrity of the data, the sending of that data by the identified sender, its receipt by the identified addressee and the accuracy of the date and time of sending and receipt indicated by the qualified electronic registered delivery service Page 37

38 Hybrid mail is an example of erds trust service: Electronic registered delivery services Idea: send a physical letter to an addressee in another country directly from your PC. Process: digital information sent to the postal operator of the destination country, which prints, envelops and delivers the paper version to the addressee. Pilot project from FR-DE-AT-IT-EE post operators. Page 38

39 TSP supervision Supervisory body: (Art. 17) Are designated by each Member State to supervise : - non qualified TSPs: ex-post - qualified TSPs: ex-ante and ex-post Can initiate audits (internals or from a CAB) of QTSPs (ad-hoc and at least every 24 months) at their own cost. Must cooperate with national data protection authorities and other supervisory bodies. Must report yearly to COM/ENISA about its activities and breach incidents (ENISA reporting tool in development). Page 39

40 TSP supervision Trust Service Providers: (Art. 19) Must notify their SB (and potentially others) of security breaches within 24h. Must submit audit reports from CABs to their SB within 3 days (QTSPs). Must remedy to any failure pointed out by the SB within the time limit set by the SB (QTSPs). Conformity Assessment bodies: 09/2015: Publication of EN Requirements for conformity assessment bodies assessing Trust Service Providers Page 40

41 Agenda Motivations for eidas Overview eid Trust services Conclusions Page 41

42 Conclusions 1. The eidas regulation regulates electronic identification and several trust services (esignatures, eseals, etimestamps, QWACs, erds) is directly enforceable in all MS and will repeal all conflicting national rules enables cross-border interoperability of electronic identification means enables cross-border legal value of qualified trust services eidas can be a game changer for online security in the EU Page 42

43 Conclusions 2. eidas offers many opportunities to the private sector: New (and old) trust service providers Conformity Assessment Bodies Consumers of trust services with cross-borders legal value New solutions using the eidas TS building blocks Online service providers can become accessible from all EU eid solution providers can access many EU online services eidas is not just about public sector and trust service providers Page 43

44 Thank you DG CONNECT: www: FAQs: CEF: www: Contact me: Page 44

European Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the EU internal market

European Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the EU internal market European Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the EU internal market Gérard GALLER Policy Officer European Commission -

More information

eidas & e-delivery CE Midsummer Conference "The role of policy decisions in the postal & delivery industry", Copenhagen (DK), 12 June 2017

eidas & e-delivery CE Midsummer Conference The role of policy decisions in the postal & delivery industry, Copenhagen (DK), 12 June 2017 eidas & e-delivery CE Midsummer Conference "The role of policy decisions in the postal & delivery industry", Copenhagen (DK), 12 June 2017 Andrea Servida DG CONNECT, European Commission Unit "egovernment

More information

eidas Regulation eid and assurance levels Outcome of eias study

eidas Regulation eid and assurance levels Outcome of eias study eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification

More information

IAS2. Electronic signatures & electronic seals Up-dates - feedbacks from :

IAS2. Electronic signatures & electronic seals Up-dates - feedbacks from : IAS2 Study to support the implementation of a pan-european framework on electronic identification and trust services for electronic transactions in the internal market Electronic signatures & electronic

More information

eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal?

eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal? eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal? public 1 AGENDA 1. eidas Strategic View 2. Website Certificates 3. Electronic Seals

More information

eidas Regulation (EU) 910/2014 eidas implementation State of Play

eidas Regulation (EU) 910/2014 eidas implementation State of Play eidas Regulation (EU) 910/2014 eidas implementation State of Play CA-Day 19 September 2016 Elena Alampi DG CONNECT, European Commission elena.alampi@ec.europa.eu eidas The Regulation in a nutshell 2 MAIN

More information

ILNAS/PSCQ/Pr004 Qualification of technical assessors

ILNAS/PSCQ/Pr004 Qualification of technical assessors Version 1.1 21.6.2016 Page 1 of 6 ILNAS/PSCQ/Pr004 Qualification of technical assessors Modifications: review of the document 1, avenue du Swing L-4367 Belvaux Tél.: (+352) 247 743-53 Fax: (+352) 247 943-50

More information

FOR QTSPs BASED ON STANDARDS

FOR QTSPs BASED ON STANDARDS THE EU CYBER SECURITY AGENCY FOR QTSPs BASED ON STANDARDS Technical guidelines on trust services DECEMBER 2017 About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre

More information

ETSI ESI and Signature Validation Services

ETSI ESI and Signature Validation Services ETSI ESI and Signature Validation Services Presented by: Andrea Röck For: Universign and ETSI STF 524 expert 24.10.2018 CA day ETSI 2018 Agenda Update on standardisation under eidas Signature validation

More information

ETSI European CA DAY TRUST SERVICE PROVIDER (TSP) CONFORMITY ASSESSMENT FRAMEWORK. Presented by Nick Pope, ETSI STF 427 Leader

ETSI European CA DAY TRUST SERVICE PROVIDER (TSP) CONFORMITY ASSESSMENT FRAMEWORK. Presented by Nick Pope, ETSI STF 427 Leader ETSI European CA DAY TRUST SERVICE PROVIDER (TSP) CONFORMITY ASSESSMENT FRAMEWORK Presented by Nick Pope, ETSI STF 427 Leader ETSI 2012 All rights reserved Topics Background ETSI Activities / Link to Mandate

More information

Electronic registered delivery services (ERDS) in light of the eidas regulation. Warsaw Common Sign Conference 2015

Electronic registered delivery services (ERDS) in light of the eidas regulation. Warsaw Common Sign Conference 2015 Electronic registered delivery services (ERDS) in light of the eidas regulation Warsaw Common Sign Conference 2015 ! 1. e-delivery and the eidas regulation - EU legislative framework - French legislative

More information

SSL/TSL EV Certificates

SSL/TSL EV Certificates SSL/TSL EV Certificates CA/Browser Forum Exploratory seminar on e-signatures for e-business in the South Mediterranean region 11-12 November 2013, Amman, Jordan Moudrick DADASHOW CEO, Skaitmeninio Sertifikavimo

More information

eias Study on an electronic identification, authentication and signature policy SUPERVISION Presentation on status

eias Study on an electronic identification, authentication and signature policy SUPERVISION Presentation on status eias Study on an electronic identification, authentication and signature policy SUPERVISION Presentation on status in the context of COM(2012) 238 Proposal for a Regulation on electronic identification

More information

UPDATE ON CEN & ETSI STANDARDISATION ON SIGNATURES

UPDATE ON CEN & ETSI STANDARDISATION ON SIGNATURES UPDATE ON CEN & ETSI STANDARDISATION ON SIGNATURES Workshop eidas Trust Services: 6 months on after the switch-over 19 December 2016 Riccardo Genghini, TC ESI chairman Topics eidas Standards Status ETSI

More information

eidas Workshop Return on Experience from Conformity Assessment Bodies - EY June 13, 2016 Contacts: Arvid Vermote

eidas Workshop Return on Experience from Conformity Assessment Bodies - EY June 13, 2016 Contacts: Arvid Vermote eidas Workshop Return on Experience from Conformity Assessment Bodies - EY June 13, 2016 Contacts: Arvid Vermote arvid.vermote@be.ey.com EY eidas Certification scheme Scheme EY CertifyPoint B.V. is currently

More information

Trust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014)

Trust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014) Trust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014) This document has been developed by representatives of Apple, Google, Microsoft, and Mozilla. Document History

More information

Sándor Szőke, Dr. Microsec Ltd. Migration of national PKI Services to eidas conformant Trust Services case study in Hungary

Sándor Szőke, Dr. Microsec Ltd. Migration of national PKI Services to eidas conformant Trust Services case study in Hungary Sándor Szőke, Dr. Microsec Ltd. Migration of national PKI Services to eidas conformant Trust Services case study in Hungary Introduction Private Hungarian IT company since 1984 Custom specific IT system

More information

ETSI Electronic Signatures and Infrastructures (ESI) TC

ETSI Electronic Signatures and Infrastructures (ESI) TC ETSI Electronic Signatures and Infrastructures (ESI) TC Presented by Andrea Caccia, ETSI/ESI liaison to ISO SC27 ( a.caccia @ kworks.it ) ETSI 2011. All rights reserved ETSI TC ESI - Electronic Signatures

More information

ETSI TR V1.1.1 ( )

ETSI TR V1.1.1 ( ) TR 119 400 V1.1.1 (2016-03) TECHNICAL REPORT Electronic Signatures and Infrastructures (ESI); Guidance on the use of standards for trust service providers supporting digital signatures and related services

More information

eidas-compliant signing of PDF

eidas-compliant signing of PDF PDF Days Europe 2018 eidas-compliant signing of PDF Technical implications of eidas conformance in PDF processing Bernd Wild intarsys AG, Member of the Board of A Presentation 2018 by!11 72% of EU individuals

More information

Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition

Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition 1 Soshi Hamaguchi, 1 Toshiyuki Kinoshita, 2 Satoru Tezuka 1 Tokyo University of Technology, Tokyo, Japan,

More information

Technical guidelines implementing eidas

Technical guidelines implementing eidas Technical guidelines implementing eidas Sławek Górniak CA/Day Berlin 19 th September 2016 European Union Agency for Network and Information Security About ENISA 2 Positioning ENISA activities 3 ENISA and

More information

Electronic signature framework

Electronic signature framework R E P U B L I C O F S E R B I A Negotation Team for the Accession of Republic of Serbia to the European Union Working Group for Chapter 10 Information society and media Electronic signature framework Contents

More information

Security guidelines on the appropriate use of qualified electronic seals Guidance for users

Security guidelines on the appropriate use of qualified electronic seals Guidance for users Security guidelines on the appropriate use of qualified electronic seals Guidance for users VERSION 2.0 FINAL DECEMBER 2016 www.enisa.europa.eu European Union Agency For Network And Information Security

More information

Cosmos POFESSIONALS OF SAFETY ENGINEERING

Cosmos POFESSIONALS OF SAFETY ENGINEERING Japan-Europe Comparison of Legal Frameworks for Electronic Signatures July 4 th, 2017@Japan-Europe Internet Trust Symposium Soshi Hamaguchi, Corporation eidas Regulation and e-signature Act Definition

More information

Security guidelines on the appropriate use of qualified electronic registered delivery services Guidance for users

Security guidelines on the appropriate use of qualified electronic registered delivery services Guidance for users Security guidelines on the appropriate use of qualified electronic registered delivery services Guidance for users VERSION 2.0 FINAL DECEMBER 2016 www.enisa.europa.eu European Union Agency For Network

More information

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Index INDEX... 2 1. DISCLOSURE TEXT APPLICABLE TO NATURAL PERSON CERTIFICATES ISSUED ON QSCD...

More information

eidas Regulation (EU) 910/2014 and the Connecting Europe Facility Boosting trust & security in the Digital Single Market

eidas Regulation (EU) 910/2014 and the Connecting Europe Facility Boosting trust & security in the Digital Single Market eidas Regulation (EU) 910/2014 and the Connecting Europe Facility Boosting trust & security in the Digital Single Market Food Chain in the Digital Single Market 9 November 2016, Brussels Elena Alampi DG

More information

SAT for eid [EIRA extension]

SAT for eid [EIRA extension] SAT for eid [EIRA extension] eid Solution Architecture Template (SAT) v1.0.0 ISA² Action 2.1 - European Interoperability Architecture Page 1 of 1 Change control Modification Details Version 1.0.0 Migration

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

ETSI TC ESI WORK ON ELECTRONIC REGISTERED DELIVERY SERVICES AND REGISTERED ELECTRONIC MAIL

ETSI TC ESI WORK ON ELECTRONIC REGISTERED DELIVERY SERVICES AND REGISTERED ELECTRONIC MAIL ETSI TC ESI WORK ON ELECTRONIC REGISTERED DELIVERY SERVICES AND REGISTERED ELECTRONIC MAIL Luca Boldrin, Juan Carlos Cruellas, Santino Foti, Paloma Llaneza, Kornél Réti Agenda STF 523 concept and context

More information

Trust Services Practice Statement

Trust Services Practice Statement Trust Services Practice Statement TrustWeaver AB V. 1.2 PUBLIC Page 1 IMPORTANT LEGAL NOTICE Copyright 2016, TrustWeaver AB. All rights reserved. This document contains TrustWeaver AB proprietary information,

More information

Test Signature Policy Version 1.0

Test Signature Policy Version 1.0 Test Signature Policy Version 1.0 This document describes the policy requirements for the creation of test signatures. 04-10-2018 Name COMPL_POL_TestSignaturePolicy OID 1.3.6.1.4.1.49274.1.1.5.1.0 Applicable

More information

2017 ANNUAL TRUST SERVICES SECURITY INCIDENTS ANALYSIS. ENISA Article 19 Team

2017 ANNUAL TRUST SERVICES SECURITY INCIDENTS ANALYSIS. ENISA Article 19 Team 2017 ANNUAL TRUST SERVICES SECURITY INCIDENTS ANALYSIS ENISA Article 19 Team 23 10 2018 GENERAL MODEL SECURITY SUPERVISION Market operators/providers assess security risks, take appropriate measures, and

More information

QUICKSIGN Registration Policy

QUICKSIGN Registration Policy QUICKSIGN Registration Policy Amendment to DOCUSIGN FRANCE s Certificate Policy for using the QUICKSIGN platform as a registration service to identify Subscribers September 27, 2016 QUICKSIGN_Registration_Policy_V1.0

More information

PAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1

PAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1 PAA PKI Mutual Recognition Framework Copyright PAA, 2009. All Rights Reserved 1 Agenda Overview of the Framework Components of the Framework How It Works Other Considerations Questions and Answers Copyright

More information

Security Aspects of Trust Services Providers

Security Aspects of Trust Services Providers Security Aspects of Trust Services Providers Please replace background with image European Union Agency for Network and Information Security 24 th September 2013 www.enisa.europa.eu Today s agenda 09:30-10:00

More information

eid building block Introduction to the Connecting Europe Facility DIGIT Directorate-General for Informatics

eid building block Introduction to the Connecting Europe Facility DIGIT Directorate-General for Informatics Introduction to the Connecting Europe Facility eid building block DIGIT Directorate-General for Informatics DG CONNECT Directorate-General for Communications Networks, Content and Technology March 2016

More information

CHAPTER 13 ELECTRONIC COMMERCE

CHAPTER 13 ELECTRONIC COMMERCE CHAPTER 13 ELECTRONIC COMMERCE Article 13.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial

More information

SECURITY FRAMEWORK F TRUST SERVICE PROVIDERS

SECURITY FRAMEWORK F TRUST SERVICE PROVIDERS THE EU CYBER SECURITY AGENCY SECURITY FRAMEWORK F TRUST SERVICE PROVIDERS Technical guidelines on trust services DECEMBER 2017 About ENISA The European Union Agency for Network and Information Security

More information

The Role of the Data Protection Officer

The Role of the Data Protection Officer The Role of the Data Protection Officer Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 28 July 2016 www.itgovernance.co.uk Introduction Adrian Ross GRC consultant Infrastructure services

More information

Identity Documents Personalisation Centre. Conformity Assessment Report: Conformity Certificate and Summary. T-Systems

Identity Documents Personalisation Centre. Conformity Assessment Report: Conformity Certificate and Summary. T-Systems Conformity Assessment Report: Conformity Certificate and Summary T-Systems.031.0258.05.2017 Trust Service Provider: Identity Documents Personalisation Centre Conformity Certificate T-Systems.031.0258.05.2017

More information

Live Webinar Electronic Registered Delivery Service (ERDS) and the eidas Regulation. 12 September 2016

Live Webinar Electronic Registered Delivery Service (ERDS) and the eidas Regulation. 12 September 2016 Live Webinar Electronic Registered Delivery Service (ERDS) and the eidas Regulation 12 September 2016 Agenda 15 00 Introduction Thomas Fillis DIGIT 15 10 Introduction to eidas Electronic Registered Delivery

More information

CERTIFICATE OF CONFORMITY. The certification body LSTI. declares LUXTRUST SA IVY BUILDING L-8308 CAPELLEN - LUXEMBOURG

CERTIFICATE OF CONFORMITY. The certification body LSTI. declares LUXTRUST SA IVY BUILDING L-8308 CAPELLEN - LUXEMBOURG Conformity Assessment Body Trust Service Providers ISO 27001 LA ISO 27001 LI ISO 27001 RM ISO 27005 CERTIFICATE OF CONFORMITY The certification body LSTI declares LUXTRUST SA IVY BUILDING L-8308 CAPELLEN

More information

ZETES TSP QUALIFIED CA

ZETES TSP QUALIFIED CA ZETES TSP QUALIFIED CA Certification Practice Statement for the ZETES TSP Qualified CA Publication date : 17/05/2017 Effective date : 22/05/2017 Document OID : 1.3.6.1.4.1.47718.2.1.1.2 Version : 1.2 21/04/2017

More information

Trust Services for Electronic Transactions

Trust Services for Electronic Transactions Trust Services for Electronic Transactions ROUMEN TRIFONOV Faculty of Computer Systems and Control Technical University of Sofia 8 st. Kliment Ohridski bul., 1000 Sofia BULGARIA r_trifonov@tu-sofia.bg

More information

CEN & ETSI standards & eidas Compliance

CEN & ETSI standards & eidas Compliance CEN & ETSI standards & eidas Compliance Nick Pope - Thales Vice Chair, ETSI TC Electronic Signature & Infrastructures Jan Ulrik Kjærsgaard Cryptomathic Editor CEN EN 419 241-2 (Remote Signing) eidas and

More information

ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS

ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS Accreditation is continuously gaining recognition as an important technical tool in the delivery of objectives across an increasing range of policy

More information

EIDAS-2016 CHAMBERS OF COMMERCE ROOT and GLOBAL CHAMBERSIGN ROOT Version 1.2.3

EIDAS-2016 CHAMBERS OF COMMERCE ROOT and GLOBAL CHAMBERSIGN ROOT Version 1.2.3 CERTIFICATION PRACTICES STATEMENT DIGITAL CERTIFICATES AC CAMERFIRMA SA EIDAS-2016 CHAMBERS OF COMMERCE ROOT - 2016 and GLOBAL CHAMBERSIGN ROOT - 2016. Version 1.2.3 Author: Juan Ángel Martín: PKI Area.

More information

ING Public Key Infrastructure Technical Certificate Policy

ING Public Key Infrastructure Technical Certificate Policy ING Public Key Infrastructure Technical Certificate Policy Version 5.4 - November 2015 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Document version General Of this document

More information

Digital Signatures: How Close Is Europe to Truly Interoperable Solutions?

Digital Signatures: How Close Is Europe to Truly Interoperable Solutions? Digital Signatures: How Close Is Europe to Truly Interoperable Solutions? Konstantinos Rantos Kavala Institute of Technology, Kavala GR-65404, Greece krantos@teikav.edu.gr Abstract. Digital signatures

More information

Session 1. esignature and eseal validation landscape. Presented by Sylvie Lacroix esignature and eseal validation workshop, Jan

Session 1. esignature and eseal validation landscape. Presented by Sylvie Lacroix esignature and eseal validation workshop, Jan Session 1 e and eseal validation landscape Presented by Sylvie Lacroix e and eseal validation workshop, Jan 10 2018 Legal Framework: eidas Regulation and e Validation as a (qualified) Trust Service (link

More information

The GDPR and NIS Directive: Risk-based security measures and incident notification requirements

The GDPR and NIS Directive: Risk-based security measures and incident notification requirements The GDPR and NIS Directive: Risk-based security measures and incident notification requirements Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 4 May 2017 Introduction Adrian Ross GRC consultant

More information

Gateway Certification Authority pilot project

Gateway Certification Authority pilot project Results of the IDABC Bridge / Gateway Certification Authority pilot project Gzim Ocakoglu Commission Enterprise and Industry Directorate General ITAPA Congress Bratislava, 22 November 2005 1 Outline Introduction

More information

Trust Services: building blocks for secondary legislation

Trust Services: building blocks for secondary legislation eias Study on an electronic identification, authentication and signature policy Trust Services: building blocks for secondary legislation Riccardo Genghini (SG&A, ewitness), Chairman ETSI TC-ESI in the

More information

Digital Signatures Act 1

Digital Signatures Act 1 Issuer: Riigikogu Type: act In force from: 01.07.2014 In force until: 25.10.2016 Translation published: 08.07.2014 Digital Signatures Act 1 Amended by the following acts Passed 08.03.2000 RT I 2000, 26,

More information

Guidance for Requirements for qualified trust service providers: trustworthy systems and products

Guidance for Requirements for qualified trust service providers: trustworthy systems and products Guidance for Requirements for qualified trust service providers: trustworthy systems and products Note on using the guidance: examples are used throughout they are not normative or exclusive, but there

More information

FAQ about the General Data Protection Regulation (GDPR)

FAQ about the General Data Protection Regulation (GDPR) FAQ about the General Data Protection Regulation (GDPR) 1. When does the GDPR come into force? The GDPR was promulgated 25 May 2016 and comes into effect 25 May 2018. 2. Is there a transition period? We

More information

Certificate Policy (ETSI EN ) Version 1.1

Certificate Policy (ETSI EN ) Version 1.1 Certificate Policy (ETSI EN 319 411-2) Version 1.1 IDnow GmbH Auenstr. 100 80469 Munich 09.06.2017 IDnow Certificate Policy (ETSI EN 319 411-2) Version 1.1 Date 09.06.2017 Author Armin Bauer, IDnow GmbH

More information

Certification Practice Statement

Certification Practice Statement SWIFT SWIFT Qualified Certificates Certification Practice Statement This document applies to SWIFT Qualified Certificates issued by SWIFT. This document is effective from 1 July 2016. 17 June 2016 SWIFT

More information

(1) Jisc (Company Registration Number ) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and

(1) Jisc (Company Registration Number ) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and SUB-LRA AGREEMENT BETWEEN: (1) Jisc (Company Registration Number 05747339) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and (2) You, the Organisation using the Jisc

More information

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready? European Union (EU) General Data Protection Regulation (GDPR) Do you handle EU residents personal data? The GDPR update is coming May 25, 2018. Are you ready? What do you need to do? Governance and Accountability

More information

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679 Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679 Adopted on 25 May 2018 Contents 1. Introduction... 2 1.1. Scope

More information

CORPME TRUST SERVICE PROVIDER

CORPME TRUST SERVICE PROVIDER CORPME TRUST SERVICE PROVIDER QUALIFIED CERTIFICATE OF ADMINISTRATIVE POSITION USE LICENSE In..,.. 20... Mr/Mrs/Ms/Miss.........., with DNI/NIF/National Passport nº., e-mail........., phone number....,

More information

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017 in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017 European Union Agency for Network and Information Security Positioning ENISA activities CAPACITY Hands on activities POLICY Support MS & COM

More information

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) July 2013 Executive Summary ETNO supports the European Commission s global approach to cyber-security

More information

edelivery Tutorial How can CEF help you set-up your edelivery infrastructure? November 2016

edelivery Tutorial How can CEF help you set-up your edelivery infrastructure? November 2016 edelivery Tutorial How can CEF help you set-up your edelivery infrastructure? November 2016 Version Control Version Date Created by Description V1.2 November 2016 CEF Project & Architecture Office Final

More information

EXBO e-signing Automated for scanned invoices

EXBO e-signing Automated for scanned invoices EXBO e-signing Automated for scanned invoices Signature Policy Document OID: 0.3.2062.7.2.1.12.1.0 Approval Status: Approved Version: 1.0 Page #: 1 of 13 1. Introduction 1.1. Scope This document covers

More information

e-sens Electronic Simple European Networked Services

e-sens Electronic Simple European Networked Services e-sens Electronic Simple European Networked Services Herbert Leitold, A-SIT 2 nd SSEDIC International Identity Initiatives Conference (SIIIC) Rome, July 8 th 2013 Presentation Overview esens - LSP Relation

More information

Digitalisation and electronic signatures

Digitalisation and electronic signatures Digitalisation and electronic signatures eidas - a game changer Cryptomathic 2017 - All rights reserved Agenda Digitalisation - a global trend Key challenges in the implementation of digital Signatures

More information

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679 Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679 Adopted on 23 January 2019 1 Table of contents 1.1 Scope of the

More information

SIGNATURE VALIDATION POLICY AND SIGNATURE VALIDATION PRACTICE STATEMENT OF B-TRUST QUALIFIED VALIDATION SERVICE PROVIDED BY BORICA AD.

SIGNATURE VALIDATION POLICY AND SIGNATURE VALIDATION PRACTICE STATEMENT OF B-TRUST QUALIFIED VALIDATION SERVICE PROVIDED BY BORICA AD. SIGNATURE VALIDATION POLICY OF B-TRUST QUALIFIED VALIDATION SERVICE PROVIDED BY BORICA AD (B-Trust QSVS) Version 1.0 Effective: July 1, 2018 Document history Version Author(s) Date Status Comment 1.0 Dimitar

More information

eidas Interoperability Architecture Version November 2015

eidas Interoperability Architecture Version November 2015 eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability

More information

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes: Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information

More information

SSL Certificates Certificate Policy (CP)

SSL Certificates Certificate Policy (CP) SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full

More information

September OID: Public Document

September OID: Public Document THE UNITED KINGDOM S NATIONAL CERTIFICATE POLICY for Extended Access Control Infrastructure for machine readable travel documents and biometric residence permits issued and read within the UK September

More information

EUROPEAN ACCREDITATION LEGAL FRAMEWORK

EUROPEAN ACCREDITATION LEGAL FRAMEWORK EUROPEAN ACCREDITATION LEGAL FRAMEWORK ECIBC Plenary 2016 Ed Wieles 24 November 2016 CONTENTS European model on Accreditation Requirements for Accreditation bodies Harmonised standards for accreditation

More information

CEF eid SMO The use of eid in ehealth. ehealth Network meeting 7 June 2016 Amsterdam

CEF eid SMO The use of eid in ehealth. ehealth Network meeting 7 June 2016 Amsterdam CEF eid SMO The use of eid in ehealth ehealth Network meeting 7 June 2016 Amsterdam Agenda Introduction to the study Introduction to eidas Regulation and CEF eid Identification/ authentication for ehealth

More information

CERTIFICATE OF CONFORMITY. The certification body LSTI. declares BALTSTAMP HEADQUARTER : DARIAUS IR GIRENO STR. 40, LT VILNIUS - LITHUANIA

CERTIFICATE OF CONFORMITY. The certification body LSTI. declares BALTSTAMP HEADQUARTER : DARIAUS IR GIRENO STR. 40, LT VILNIUS - LITHUANIA CERTIFICATE OF CONFORMITY The certification body LSTI declares BALTSTAMP HEADQUARTER : DARIAUS IR GIRENO STR. 40, LT-02189 VILNIUS - LITHUANIA Provides trust electronic services 1 that comply with Regulation

More information

Guidelines 4/2018 on the accreditation of certification bodies under Article 43 of the General Data Protection Regulation (2016/679)

Guidelines 4/2018 on the accreditation of certification bodies under Article 43 of the General Data Protection Regulation (2016/679) Guidelines 4/2018 on the accreditation of certification bodies under Article 43 of the General Data Protection Regulation (2016/679) Adopted on 4 December 2018 Adopted 1 Contents 1 Introduction... 3 2

More information

Cross border eservices STORK 2.0

Cross border eservices STORK 2.0 Cross border eservices STORK 2.0 Frank LEYMAN EEMA / BCS Thought Leadership Seminar December 2nd, 2014, London Stork 2.0 is an EU co funded project INFSO ICT PSP 297263 STORK Phase 1 Key facts Project

More information

EVROTRUST TECHNOLOGIES AD

EVROTRUST TECHNOLOGIES AD CERTIFICATE OF CONFORMITY The certification body LSTI declares EVROTRUST TECHNOLOGIES AD SIEGE : 2 NIKOLAI HAITOV STR., ENTR.D, FL.2 1113 SOFIA - BULGARIA Provides trust electronic services 1 that comply

More information

Belgian Certificate Policy & Practice Statement for eid PKI infrastructure Foreigner CA

Belgian Certificate Policy & Practice Statement for eid PKI infrastructure Foreigner CA Belgian Certificate Policy & Practice Statement for eid PKI infrastructure Foreigner CA OID: 2.16.56.1.1.1.7 2.16.56.9.1.1.7 2.16.56.10.1.1.7 2.16.56.12.1.1.7 Company: Certipost Version: 3.0 Status : FINAL

More information

PSD2/EIDAS DEMONSTRATIONS

PSD2/EIDAS DEMONSTRATIONS PSD2/EIDAS DEMONSTRATIONS Chris Kong, Azadian Kornél Réti, Microsec Luigi Rizzo, InfoCert All rights reserved Overview for this Presentation As previously reported and reviewed at ERPB, with ECB and EC,

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

ARTICLE 29 DATA PROTECTION WORKING PARTY

ARTICLE 29 DATA PROTECTION WORKING PARTY ARTICLE 29 DATA PROTECTION WORKING PARTY 18/EN WP261 Article 29 Working Party Draft Guidelines on the accreditation of certification bodies under Regulation (EU) 2016/679 Adopted on 6 february 2018 1 THE

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

ISO/IEC TR Information technology Security techniques Guidelines for the use and management of Trusted Third Party services

ISO/IEC TR Information technology Security techniques Guidelines for the use and management of Trusted Third Party services This is a preview - click here to buy the full publication TECHNICAL REPORT ISO/IEC TR 14516 First edition 2002-06-15 Information technology Security techniques Guidelines for the use and management of

More information

Conformity Assessment Report: Conformity Certificate and Summary. T-Systems Trust Service Provider: Connect Solutions

Conformity Assessment Report: Conformity Certificate and Summary. T-Systems Trust Service Provider: Connect Solutions Conformity Assessment Report: Conformity Certificate and Summary T-Systems.031.0262.12.2017 Trust Service Provider: Connect Solutions Conformity Certificate T-Systems.031.0262.12.2017 pursuant to Article

More information

LuxTrust Global Root CA - Certificate specifications

LuxTrust Global Root CA - Certificate specifications LuxTrust Global Root CA - Certificate specifications Version number: 1.24 Publication Date: 15/06/2017 Effective Date: 01/07/2017 Copyright 2017 All rights reserved Document Information Document title:

More information

EVROTRUST TECHNOLOGIES JSC

EVROTRUST TECHNOLOGIES JSC CERTIFICATE OF CONFORMITY The certification body LSTI declares EVROTRUST TECHNOLOGIES JSC HEADQUARTER: #101 TSARIGRADSKO SHAUSSE BLVD., BUSINESS CENTER ACTIVE, FLOOR 6, SOFIA 1113, REPUBLIC OF BULGARIA

More information

Sparta Systems Stratas Solution

Sparta Systems Stratas Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

eidas compliant Trust Services with Utimaco HSMs

eidas compliant Trust Services with Utimaco HSMs eidas compliant Trust Services with Utimaco HSMs March 15, 2018 Dieter Bong Product Manager Utimaco HSM Business Unit Aachen, Germany 2018 eidas-compliant Trust Services with Utimaco HSMs Page 1 eidas

More information

EU Code of Conduct on Data Centre Energy Efficiency

EU Code of Conduct on Data Centre Energy Efficiency EUROPEAN COMMISSION DIRECTORATE-GENERAL JRC JOINT RESEARCH CENTRE Institute for Energy Renew able and Energy Efficiency Unit EU Code of Conduct on Data Centre Energy Efficiency Introductory guide for all

More information

EUROPEAN STANDARD Electronic Signatures and Infrastructures (ESI); Certificate Profiles; Part 5: QCStatements

EUROPEAN STANDARD Electronic Signatures and Infrastructures (ESI); Certificate Profiles; Part 5: QCStatements EN 319 412-5 V2.1.1 (2016-02) EUROPEAN STANDARD Electronic Signatures and Infrastructures (ESI); Certificate Profiles; Part 5: QCStatements 2 EN 319 412-5 V2.1.1 (2016-02) Reference REN/ESI-0019412-5v211

More information

CERTIFICATE OF CONFORMITY. The certification body LSTI. declares ALEAT HEADQUARTER : SH.P.K RRUGA: XHANFIZE KEKO - TIRANA-ALBANIA

CERTIFICATE OF CONFORMITY. The certification body LSTI. declares ALEAT HEADQUARTER : SH.P.K RRUGA: XHANFIZE KEKO - TIRANA-ALBANIA CERTIFICATE OF CONFORMITY The certification body LSTI declares ALEAT HEADQUARTER : SH.P.K RRUGA: XHANFIZE KEKO - TIRANA-ALBANIA Provides trust electronic services 1 that comply with Regulation (EU) No.

More information

ING Corporate PKI G3 Internal Certificate Policy

ING Corporate PKI G3 Internal Certificate Policy ING Corporate PKI G3 Internal Certificate Policy Version 1.0 March 2018 ING Corporate PKI Service Centre Final Version 1.0 Document information Commissioned by Additional copies of this document ING Corporate

More information

General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR) BCD Travel s Response to the EU General Data Protection Regulation (GDPR) November 2017 Page 1 Response to the EU GDPR Copyright 2017 by BCD Travel N.V. All rights reserved. November 2017 Copyright 2017

More information

SWAMID Person-Proofed Multi-Factor Profile

SWAMID Person-Proofed Multi-Factor Profile Document SWAMID Person-Proofed Multi-Factor Profile Identifier http://www.swamid.se/policy/assurance/al2mfa Version V1.0 Last modified 2018-09-12 Pages 10 Status FINAL License Creative Commons BY-SA 3.0

More information

The current status of Esi TC and the future of electronic signatures

The current status of Esi TC and the future of electronic signatures SG&A ETSI FUTURE WORKSHOP Sophia Antipolis, 16th January 2006 The current status of Esi TC and the future of electronic signatures Riccardo Genghini, Chairman of Etsi Esi TC riccardo.genghini@sng.it The

More information