R e a c t i o n s t o t h e e - I n v o i c i n g r e p o r t o f t h e EU- E x p e r t g r o u p

Size: px
Start display at page:

Download "R e a c t i o n s t o t h e e - I n v o i c i n g r e p o r t o f t h e EU- E x p e r t g r o u p"

Transcription

1 Seite 1 von 6 Re: R e a c t i o n s t o t h e e - I n v o i c i n g r e p o r t o f t h e EU- E x p e r t g r o u p General assessment 1. Do you agree with the report s assessment, conclusions and recommendations? No. Especially we do not agree with the suggested legal and regulatory changes as described within the report (chapter 4). The suggested legal and regulatory changes (especially substituting electronic signatures by unspecified internal controls ) will increase individual national regulations, contradicting EU s commitment of reducing the burden of bureaucracy and avoiding European-wide standardized e-invoicing process implementations. The suggested legal and regulatory changes will result in increased bureaucracy, more complex EU wide implementations, higher risks and substantially increased costs for companies, using electronic invoicing. This applies especially for SMEs. Substituting existing proof of authenticity & integrity by electronic signatures through (unspecified, national) internal controls will result in following disadvantages: a. Substitution of proven standards with individual internal controls. Today s existing, proven, reliable and standardized framework around for e-invoicing processing would be replaced by a set of intransparent, national and rather not harmonized regulations. Effectively, this will result in a step back for everyone except auditor firms, who would be more than happy to define and audit individually thousands of companies following to new internal controls company by company, nation by nation. b. Increased e-invoicing costs; especially for SMEs. Internal controls, as proposed by the Expert Group, will cause numerous different e-invoicing process policies, guidelines and regulations. Companies and organizations would be forced to install different e-invoicing processes to comply with each national subset of internal controls in each EU-country. c. Increased investment risks. If there would be no EU-wide standardized, proven, reliable and compliant proof of authenticity and integrity for e-

2 Seite 2 von 6 Invoicing processes, i.e. the electronic signature, companies may run again into the risk, that their electronic invoices will not be compliant or accepted in specific European countries. d. Complexity re-opens window for increased VAT tax fraud. The electronic signature is a reliable, proven technology to provide a legal proof of integrity and authenticity of any electronic data. The complexity of national variations of internal controls throughout EU may open the window again for a substantial increase in misuse and VAT tax fraud. e. Relatively higher disadvantage for SME. The resulting increase in costs, complexity and uncertainty will have a higher impact on SMEs, as SME typically have substantially less resources available to support different national variations of internal control requirements than larger or global corporations. f. Increased risk and effort for external service providers. Today, e- Invoicing processing may be easily outsourced or processed by external service providers. Suggested implementation of internal controls would increase substantially operating costs and risk of service providers. This will result in higher costs for service provider clients and therefore rather delay further market penetration of electronic invoicing. g. Loosing trust regarding EU wide regulations. All companies benefiting today from e-invoicing will be extremely disappointed about EU regulations and their sustainability. This would not help in further harmonising business processes throughout EU. 2. What other suggestions/recommendations would you have? We suggest harmonising the proof of authenticity and integrity on electronic invoices using proven, reliable and secure electronic signatures, which had been standardised globally for years. In Austria advanced electronic signatures are used for many years to secure electronic invoice processes. Many companies (large corporations as well as SMEs) are using this technology day after day for millions of electronic invoices. Same technology is used for international e-invoicing processing. Today s major advantage for companies regardless of its size is that the electronic signature for e-invoicing stands up legally throughout EU and many other countries beyond. Today companies rely on standardized e-invoicing tools. There are only minor white spaces enabling high trustworthiness any reduced operating risks. E-Invoices with electronic signatures are accepted for VAT deductions, without a new and complex set of internal controls. We suggest reducing complexity of EU wide e-invoicing processes by a secure, standardised, globally proven and simple approach. Electronic signatures have been proven to satisfy all requirements and are accepted today in many European countries. Harmonising the electronic signature for all EU member

3 Seite 3 von 6 countries will provide a secure, reliable and globally accepted proof of the authenticity and integrity of e-invoices. Business requirements 3. Is there an important aspect for the successful uptake on e-invoicing missing in the list of defined business requirements, especially to facilitate mass adoption by SMEs? Yes - as listed in our answer regarding question 1. SMEs require an accepted, proven, standardized and easy to use tool to implement secure and legally compliant e-invoicing processes. Individual, national variations of internal controls throughout the EU would be a substantial inhibitor for mass adoption of e-invoicing at SME. A reliable, proven tool, i.e. the electronic signature has been proven as an internationally standardized technology and will help to accelerate mass adoption of e-invoicing at SMEs. Legal and regulatory aspects 4. Is the Code of Practice proposed by the Expert Group suited to complement future VAT legislation? If not, how could it be improved? The code of practice, as proposed by the Expert Group, is not suited to complement future VAT legislation. The code of practice would be a step backward regarding e-invoicing EU wide standardization and harmonization. Vague, individual national variations of internal controls are not suited to complement future VAT-legislation. Only a clear defined and international standardized tool (i.e. electronic signature) will be suitable for mass implementation throughout EU. Therefore the electronic signature will be the perfect tool for secure e-invoicing processing. The Code of Practice, proposed by the Expert Group, do not contain a clear defined, internationally accepted and standardized tool-set. This will result in companies would have to take the risk, that their electronic invoices may will not be accepted in each EU-country. Additionally, these companies will have to

4 Seite 4 von 6 comply to many potential variations of internal controls This would cause substantial additional costs and increase complexity of international e-invoicing processing. 5. Do you agree with the 11 core principles set out in the Code of Practice in Annex 3 of the report? Is any important element missing? No, we do not agree with the 11 core principles. A European-wide standardized e-invoicing process, suitable for mass roll-out and all companies, regardless of their size may only be achieved using a clear defined, reliable, internationally accepted set of tools and definitions. Defining only principles, while avoiding clear definitions of the tools to be used to ensure international standardization and compatibility, will slow down mass roll-out, legal acceptance and increase the risk of EU wide practicability. 6. Beyond VAT legislation are there any other significant regulatory barriers which prevent the uptake of e-invoicing? VAT is currently regarded as the most significant barrier preventing the uptake of e-invoicing. Aside from legal barriers, there are issues about international standardized e- Invoicing data formats. The daily complexity of thousands of different data formats regarding electronic purchase orders, electronic invoices and other structured communication among companies slows down significantly any mass roll out of e-invoicing processes. Interoperability 7. Is the eco-system described in the report a valid target environment? Does it reflect all requirements for an open and interoperable level playing field? This depends on the design and implementation of the eco-system. First, defining and implementing an EU wide eco-system, containing each and every definition of interoperability requirements, will take a very, very long time to set up and will bear the risk that a common set of rules and requirements may never be agreed on in each and every EU member country preventing to provide an open and interoperable level playing field.

5 Seite 5 von 6 Secondly, the effort of maintaining various national interpretations of the eco-system requirements and their internal-controls will put an additional burden on European companies, resulting in more bureaucracy and substantial disadvantages in comparison to other areas outside of EU. Content standards 8. Is the proposed target data model (UN/CEFACT CII v.2) meeting user requirement? N.A. / No feedback regarding this item. Implementation of the Framework 9. Do you agree with the proposed implementation bodies and the tasks assigned to them in the report? No, we suggest adding further implementation bodies to the report. While using electronic signatures to provide an international accepted proof of authenticity and integrity trustworthy certificate service providers are required to provide trustworthy digital certificates for generating digital signatures. Trustworthiness of the certificate providers will be guaranteed through existing national supervising bodies, supervising certificate service providers in each EU member state. 10. Do you see other implementation tasks which can not be entirely left to the market alone? The most important implementation tasks which can not be entirely left to the market alone are. 1. International trustworthiness of the total e-invoicing process. 2. Guaranteed legal acceptance of electronic invoices in all EU countries if companies have fulfilled predefined regulations. 3. Ease of use and fast implementation of the required solution (tools) to be used within the e-invoicing process throughout all EU countries.

6 Seite 6 von Do you see other bodies or organizations which could play an important role in implementing the framework? Yes, the following organizations shall be included: Governmentally accredited or supervised certification service providers, issuing digital certificates, used for generating digital signatures National governmental supervising bodies, responsible for accreditation and supervising certificate service providers Specific aspects for SMEs and e-invoicing 12. Do you believe that SMEs needs are sufficiently covered in the report? Are there any other means to promote the adoption of e-invoicing by SMEs? No, SMEs are not sufficiently covered in the report. With reference to question 3, SMEs do require a standardized, pre-defined, well proven and accepted tool for secure and legally compliant e-invoicing processing. The electronic signature has been proven as an internationally standardized tool, perfectly suitable for any company, regardless of its size or geography. 13. Are the guidelines for SMEs in Annex 3 comprehensive enough? Would you suggest any additional content? Yes, we suggest further, more detailed content in the means of clear, precise definitions of tools which can be used throughout EU member states. SMEs need reliable, precise definitions and methods, which will be accepted for electronic invoices in each EU-member states same way and without any room for (mis-)interpretation.

Cybersecurity. Quality. security LED-Modul. basis. Comments by the electrical industry on the EU Cybersecurity Act. manufacturer s declaration

Cybersecurity. Quality. security LED-Modul. basis. Comments by the electrical industry on the EU Cybersecurity Act. manufacturer s declaration Statement Comments by the electrical industry on the EU Cybersecurity Act manufacturer s declaration industrial security Cybersecurity Quality basis security LED-Modul Statement P January 2018 German Electrical

More information

Protocol on the Mutual Acceptance of the Results of Conformity Assessment

Protocol on the Mutual Acceptance of the Results of Conformity Assessment Protocol on the Mutual Acceptance of the Results of Conformity Assessment 1 Presentation Overview Overview of the Conformity Assessment (CA) Protocol Implementation and Next Steps Cooperation Agreement

More information

EDPB Certification Guidelines

EDPB Certification Guidelines EDPB Certification Guidelines Public Consultation: Comments submitted by SCOPE Europe bvba/sprl Published and Submitted: 10. July 2018 1 About SCOPE Europe sprl SCOPE Europe is a subsidiary of Selbstregulierung

More information

eidas Regulation (EU) 910/2014 eidas implementation State of Play

eidas Regulation (EU) 910/2014 eidas implementation State of Play eidas Regulation (EU) 910/2014 eidas implementation State of Play CA-Day 19 September 2016 Elena Alampi DG CONNECT, European Commission elena.alampi@ec.europa.eu eidas The Regulation in a nutshell 2 MAIN

More information

ETSI European CA DAY TRUST SERVICE PROVIDER (TSP) CONFORMITY ASSESSMENT FRAMEWORK. Presented by Nick Pope, ETSI STF 427 Leader

ETSI European CA DAY TRUST SERVICE PROVIDER (TSP) CONFORMITY ASSESSMENT FRAMEWORK. Presented by Nick Pope, ETSI STF 427 Leader ETSI European CA DAY TRUST SERVICE PROVIDER (TSP) CONFORMITY ASSESSMENT FRAMEWORK Presented by Nick Pope, ETSI STF 427 Leader ETSI 2012 All rights reserved Topics Background ETSI Activities / Link to Mandate

More information

21 CFR PART 11 FREQUENTLY ASKED QUESTIONS (FAQS)

21 CFR PART 11 FREQUENTLY ASKED QUESTIONS (FAQS) 21 CFR PART 11 FREQUENTLY ASKED QUESTIONS (S) The United States Food and Drug Administration (FDA) defines the criteria under which electronic records and electronic signatures are considered trustworthy,

More information

GUIDELINE. of the European Committee for Welding of Railway Vehicles (ECWRV) ( ) PART 1

GUIDELINE. of the European Committee for Welding of Railway Vehicles (ECWRV) ( ) PART 1 GUIDELINE of the European Committee for Welding of Railway Vehicles (ECWRV) (2016-05-10) PART 1 Procedure for the application of EN 15085 and certification of welding manufacturers for welding railway

More information

Response to the. ESMA Consultation Paper:

Response to the. ESMA Consultation Paper: Response to the ESMA Consultation Paper: Draft technical standards on access to data and aggregation and comparison of data across TR under Article 81 of EMIR Delivered to ESMA by Tahoe Blue Ltd January

More information

Technical guidelines implementing eidas

Technical guidelines implementing eidas Technical guidelines implementing eidas Sławek Górniak CA/Day Berlin 19 th September 2016 European Union Agency for Network and Information Security About ENISA 2 Positioning ENISA activities 3 ENISA and

More information

Cybersecurity eit. Software. Certification. Industrial Security Embedded System

Cybersecurity eit. Software. Certification. Industrial Security Embedded System Statement Benefits and limitations of certifications and labels in the context of cyber security Arguments for a balance between customer information and industrial suitability Industrial Security Embedded

More information

ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS

ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS Accreditation is continuously gaining recognition as an important technical tool in the delivery of objectives across an increasing range of policy

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 27006 Second edition 2011-12-01 Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems

More information

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act'' CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

More information

Memorandum of Understanding

Memorandum of Understanding Memorandum of Understanding between the European Commission, the European Union Agency for Railways and the European rail sector associations (CER, EIM, EPTTOLA, ERFA, the ERTMS Users Group, GSM-R Industry

More information

Standardization for DRR: Opportunities or barriers?

Standardization for DRR: Opportunities or barriers? Standardization for DRR: Opportunities or barriers? 4 June, 2018 Stefan Tangen, stefan.tangen@msb.se Swedish Civil Contingencies Agency (MSB) IFAFRI ISO/TC 292 Security and resilience Example on cargo

More information

AUDITOR / LEAD AUDITOR PHARMACEUTICAL AND MEDICAL DEVICE INDUSTRY

AUDITOR / LEAD AUDITOR PHARMACEUTICAL AND MEDICAL DEVICE INDUSTRY Requirement specification Certification of individuals: AUDITOR / LEAD AUDITOR PHARMACEUTICAL AND MEDICAL DEVICE INDUSTRY Requirement specification Auditor Lead Auditor rev 5.docx Page 1 1 Introduction

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a

More information

Guidelines 4/2018 on the accreditation of certification bodies under Article 43 of the General Data Protection Regulation (2016/679)

Guidelines 4/2018 on the accreditation of certification bodies under Article 43 of the General Data Protection Regulation (2016/679) Guidelines 4/2018 on the accreditation of certification bodies under Article 43 of the General Data Protection Regulation (2016/679) Adopted on 4 December 2018 Adopted 1 Contents 1 Introduction... 3 2

More information

ARTICLE 29 DATA PROTECTION WORKING PARTY

ARTICLE 29 DATA PROTECTION WORKING PARTY ARTICLE 29 DATA PROTECTION WORKING PARTY 18/EN WP261 Article 29 Working Party Draft Guidelines on the accreditation of certification bodies under Regulation (EU) 2016/679 Adopted on 6 february 2018 1 THE

More information

General Data Protection Regulation. May 25, 2018 DON T PANIC! PLAN!

General Data Protection Regulation. May 25, 2018 DON T PANIC! PLAN! General Data Protection Regulation May 25, 2018 DON T PANIC! PLAN! Protect the human behind the data record. On May 25, 2018 the General Data Protection Regulation (GDPR) is entering into force. It requires

More information

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,

More information

UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION. The National Quality Infrastructure Project for Nigeria (NQIP) Project ID

UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION. The National Quality Infrastructure Project for Nigeria (NQIP) Project ID UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION The National Quality Infrastructure Project for Nigeria (NQIP) Project ID 130220 Terms of Reference for the Lead Auditor/ Training of Trainers (ToT) Courses

More information

ETSI TR V1.1.1 ( )

ETSI TR V1.1.1 ( ) TR 119 400 V1.1.1 (2016-03) TECHNICAL REPORT Electronic Signatures and Infrastructures (ESI); Guidance on the use of standards for trust service providers supporting digital signatures and related services

More information

The current status of Esi TC and the future of electronic signatures

The current status of Esi TC and the future of electronic signatures SG&A ETSI FUTURE WORKSHOP Sophia Antipolis, 16th January 2006 The current status of Esi TC and the future of electronic signatures Riccardo Genghini, Chairman of Etsi Esi TC riccardo.genghini@sng.it The

More information

ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability. Session 2: Conformity Assessment Principles

ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability. Session 2: Conformity Assessment Principles ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability Session 2: Conformity Assessment Principles 12-16 October 2015 Beijing, China Keith Mainwaring ITU Expert Agenda 1. Context

More information

Standardization and Regulations in the EU/EFTA

Standardization and Regulations in the EU/EFTA Standardization and Regulations in the EU/EFTA UNECE Working Party on Regulatory Cooperation and Standardization Policies Geneva, 26 November 2014 CEN-CENELEC Content Basic facts about CEN and CENELEC

More information

Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition

Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition 1 Soshi Hamaguchi, 1 Toshiyuki Kinoshita, 2 Satoru Tezuka 1 Tokyo University of Technology, Tokyo, Japan,

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions ISO 15189 Accreditation Program cap.org Contents ISO and the International Organization for Standardization What does ISO stand for? (page 3) What is the International Organization

More information

13543/17 PhL/at 1 DG G 3 B

13543/17 PhL/at 1 DG G 3 B Council of the European Union Brussels, 24 October 2017 (OR. en) 13543/17 UD 239 NOTE From: To: General Secretariat of the Council Permanent Representatives Committee/Council No. prev. doc.: ST 12287/5/17

More information

Exam Questions IIA-CGAP

Exam Questions IIA-CGAP Exam Questions IIA-CGAP Certified Government Auditing Professional https://www.2passeasy.com/dumps/iia-cgap/ 1. Help define the role and responsibilities of auditors to internal and external entities.

More information

1. Publishable Summary

1. Publishable Summary 1. Publishable Summary 1.1Project objectives and context Identity management (IdM) has emerged as a promising technology to distribute identity information across security domains. In e-business scenarios,

More information

Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems

Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO/IEC 27006 Third edition 2015-10-01 Information technology Security techniques Requirements for bodies providing audit and certification of information

More information

E-invoicing Standard Solution

E-invoicing Standard Solution E-invoicing Standard Solution Service overview page 1/6 Corporation Table of Contents 1 Introduction...3 2 E-invoicing Service overview...3 3 Common features...5 3.1 customers...5 3.2 Interchange network...5

More information

BIOEVENTS PRIVACY POLICY

BIOEVENTS PRIVACY POLICY BIOEVENTS PRIVACY POLICY At Bioevents, your privacy is important. Below you will find our privacy policy, which covers all personally identifiable data shared through Bioevents websites. Our privacy policy

More information

IIA EXAM - IIA-CGAP. Certified Government Auditing Professional. Buy Full Product.

IIA EXAM - IIA-CGAP. Certified Government Auditing Professional. Buy Full Product. IIA EXAM - IIA-CGAP Certified Government Auditing Professional Buy Full Product http://www.examskey.com/iia-cgap.html Examskey IIA IIA-CGAP exam demo product is here for you to test the quality of the

More information

MUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan

MUTUAL RECOGNITION MECHANISMS. Tahseen Ahmad Khan MUTUAL RECOGNITION MECHANISMS Tahseen Ahmad Khan TABLE OF CONTENTS Background: Why Mutual Recognition is important? Electronic Data and its inherent nature Scope of mutual recognition, need to go beyond

More information

Twinning Project Strengthening the metrology system in Azerbaijan Twinning ref. AZ/15/ENP/TR/36

Twinning Project Strengthening the metrology system in Azerbaijan Twinning ref. AZ/15/ENP/TR/36 INTRODUCTORY REMARKS Dear readers, With this second newsletter, we would like to provide brief information about the Twinning Project implemented within the State Committee for Standardization, Metrology

More information

Internet copy. EasyGo security policy. Annex 1.3 to Joint Venture Agreement Toll Service Provider Agreement

Internet copy.  EasyGo security policy. Annex 1.3 to Joint Venture Agreement Toll Service Provider Agreement EasyGo security policy Annex 1.3 to Joint Venture Agreement Toll Service Provider Agreement This copy of the document was published on and is for information purposes only. It may change without further

More information

Resilience, Responsibility, Responsiveness Towards a Future-oriented, Sustainable World Economy. B20 Recommendations on Digital Trade

Resilience, Responsibility, Responsiveness Towards a Future-oriented, Sustainable World Economy. B20 Recommendations on Digital Trade Resilience, Responsibility, Responsiveness Towards a Future-oriented, Sustainable World Economy B20 Recommendations on Digital Trade Dr. Stormy-Annika Mildner, B20 Sherpa April 25, 2017 B20 Structure Members

More information

ETSI ESI and Signature Validation Services

ETSI ESI and Signature Validation Services ETSI ESI and Signature Validation Services Presented by: Andrea Röck For: Universign and ETSI STF 524 expert 24.10.2018 CA day ETSI 2018 Agenda Update on standardisation under eidas Signature validation

More information

FOR QTSPs BASED ON STANDARDS

FOR QTSPs BASED ON STANDARDS THE EU CYBER SECURITY AGENCY FOR QTSPs BASED ON STANDARDS Technical guidelines on trust services DECEMBER 2017 About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre

More information

ILNAS/PSCQ/Pr004 Qualification of technical assessors

ILNAS/PSCQ/Pr004 Qualification of technical assessors Version 1.1 21.6.2016 Page 1 of 6 ILNAS/PSCQ/Pr004 Qualification of technical assessors Modifications: review of the document 1, avenue du Swing L-4367 Belvaux Tél.: (+352) 247 743-53 Fax: (+352) 247 943-50

More information

A80F300e Description of the SA8000:2014 certification procedure

A80F300e Description of the SA8000:2014 certification procedure The certification of a management system based on standard SA8000:2014 consists of the offer and contract phase, the audit preparation, performance of the Stage 1 audit with evaluation of the management

More information

PPR TOKENS SALE PRIVACY POLICY. Last updated:

PPR TOKENS SALE PRIVACY POLICY. Last updated: PPR TOKENS SALE PRIVACY POLICY Last updated: 05.03.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant

More information

European Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the EU internal market

European Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the EU internal market European Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the EU internal market Gérard GALLER Policy Officer European Commission -

More information

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 21 October /13 LIMITE CO EUR-PREP 37. NOTE General Secretariat of the Council

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 21 October /13 LIMITE CO EUR-PREP 37. NOTE General Secretariat of the Council COUNCIL OF THE EUROPEAN UNION Brussels, 21 October 2013 12397/13 LIMITE CO EUR-PREP 37 NOTE from: To: General Secretariat of the Council Council Subject: European Council (24-25 October 2013) - Draft conclusions

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

Governmental acceptance supported by accredited certification. Presentation to the GLOBALG.A.P SUMMIT 2012

Governmental acceptance supported by accredited certification. Presentation to the GLOBALG.A.P SUMMIT 2012 Governmental acceptance supported by accredited certification Presentation to the GLOBALG.A.P SUMMIT 2012 Thomas Facklam INTERNATIONAL ACCREDITATION FORUM, INC. Certified once-accepted everywhere 1 Content

More information

EISAS Enhanced Roadmap 2012

EISAS Enhanced Roadmap 2012 [Deliverable November 2012] I About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its Member States, the private

More information

EWRN European WEEE Registers Network

EWRN European WEEE Registers Network EWRN Comments Concerning Article 16 subparagraph 3 of the WEEE Directive Recast July 13 th, 2010 email: info@ewrn.org web: www.ewrn.org Page 1 (EWRN) EWRN is an independent network of 10 National Registers

More information

Protecting your data. EY s approach to data privacy and information security

Protecting your data. EY s approach to data privacy and information security Protecting your data EY s approach to data privacy and information security Digital networks are a key enabler in the globalization of business. They dramatically enhance our ability to communicate, share

More information

International Accreditation Forum, Inc. User Advisory Committee UAC

International Accreditation Forum, Inc. User Advisory Committee UAC International Accreditation Forum, Inc. User Advisory Committee UAC UAC Position Paper UAC- N018 Users Expectations of Accreditation, of the Multilateral Recognition Arrangement (MLA) between Accreditation

More information

The MovingLife Project

The MovingLife Project The MovingLife Project MObile ehealth for the VINdication of Global LIFEstyle change and disease management solutions Stakeholders Conference The MovingLife Roadmaps Brussels 18 April 2013 Alessio Gugliotta

More information

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL New Approach Industries, Tourism and CSR Construction, Pressure Equipment, Metrology Brussels, 21 st December 2009 M/457 EN Standardisation

More information

CRITERIA FOR CERTIFICATION BODY ACCREDITATION IN THE FIELD OF RISK BASED INSPECTION MANAGEMENT SYSTEMS

CRITERIA FOR CERTIFICATION BODY ACCREDITATION IN THE FIELD OF RISK BASED INSPECTION MANAGEMENT SYSTEMS CRITERIA FOR CERTIFICATION BODY ACCREDITATION IN THE FIELD OF RISK BASED INSPECTION MANAGEMENT SYSTEMS Approved By: Executive: Accreditation: Mpho Phaloane Revised By: RBI STC Working Group Members Date

More information

Data Processing Clauses

Data Processing Clauses Data Processing Clauses The examples of processing clauses below are proposed pending the adoption of standard contractual clauses within the meaning of Article 28.8 of general data protection regulation.

More information

EuroCloud Europe. Key success factors for trustworthy Cloud Adoption in the EU. 16-JUNE-2015 Riga Andreas Weiss. Trust in Cloud

EuroCloud Europe. Key success factors for trustworthy Cloud Adoption in the EU. 16-JUNE-2015 Riga Andreas Weiss. Trust in Cloud EuroCloud Europe a.s.b.l EuroCloud Deutschland_eco e.v. EuroCloud Europe Key success factors for trustworthy Cloud Adoption in the EU 16-JUNE-2015 Riga Andreas Weiss European Activities Expert Groups in

More information

Base Standard Program ISO Trustworthy Digital Repositories MS CB Application for Accreditation

Base Standard Program ISO Trustworthy Digital Repositories MS CB Application for Accreditation Base Standard Program ISO 16363 Trustworthy Digital Repositories MS CB Application for Accreditation FA 5041 Authority: Accreditation Manager Effective: 2017/08/25 Section 1: CB Name, Contact Information,

More information

Guidance for Requirements for qualified trust service providers: trustworthy systems and products

Guidance for Requirements for qualified trust service providers: trustworthy systems and products Guidance for Requirements for qualified trust service providers: trustworthy systems and products Note on using the guidance: examples are used throughout they are not normative or exclusive, but there

More information

Conformity assessment

Conformity assessment Training Course on Conformity and Interoperability, Tunis-Tunisia, from 22 to 26 May 2017 Conformity assessment Presented by: Karim Loukil & Kaïs Siala Page 1 Today s Objectives Present basic information

More information

ehaction Joint Action to Support the ehealth Network

ehaction Joint Action to Support the ehealth Network Stakeholder Engagement - Consultation (22 August 2017) ehaction Joint Action to Support the ehealth Network 3 rd Joint Action to Support the ehealth Network Open Consultation 1 Participants of the 3 rd

More information

Choosing the Right Solution for Strategic Deployment of Encryption

Choosing the Right Solution for Strategic Deployment of  Encryption Choosing the Right Solution for Strategic Deployment of Email Encryption White Paper: Enterprise Email Encryption Email Protection Buyer s Guide Choosing the Right Solution for Strategic Deployment of

More information

SEPA goes Mobile Dr. Marijke De Soete ETSI Security Workshop January 2011 Sophia Antipolis, France

SEPA goes Mobile Dr. Marijke De Soete ETSI Security Workshop January 2011 Sophia Antipolis, France www.europeanpaymentscouncil.eu SEPA goes Mobile Dr. Marijke De Soete ETSI Security Workshop 2011 19-20 January 2011 Sophia Antipolis, France Global mobile subscribers (millions) Mobile phone: some statistics

More information

International Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement. global trust. Testing Calibration Inspection

International Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement. global trust. Testing Calibration Inspection International Laboratory Accreditation Cooperation The ILAC Mutual Recognition Arrangement Enhancing the acceptance of products and services across national borders Removing barriers to global trade Accreditation

More information

Toward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization

Toward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization Toward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization www.jrc.ec.europa.eu Serving society Stimulating innovation Supporting legislation The Mission of the Joint Research

More information

Cybersecurity Policy in the EU: Security Directive - Security for the data in the cloud

Cybersecurity Policy in the EU: Security Directive - Security for the data in the cloud Cybersecurity Policy in the EU: The Network and Information Security Directive - Security for the data in the cloud Microsoft Commitment to Cybersecurity Security at the heart of our products and services

More information

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders

More information

Trust Services for Electronic Transactions

Trust Services for Electronic Transactions Trust Services for Electronic Transactions ROUMEN TRIFONOV Faculty of Computer Systems and Control Technical University of Sofia 8 st. Kliment Ohridski bul., 1000 Sofia BULGARIA r_trifonov@tu-sofia.bg

More information

LL-C (Certification) Services Overview

LL-C (Certification) Services Overview LL-C (Certification) Services Overview Who is LL-C (Certification)? LL-C (Certification) is an international certification body operating in more than 40 countries with experience in the field. Provides

More information

ISO 27001:2013 certification

ISO 27001:2013 certification www.pwc.ch/cybersecurity ISO 27001:2013 certification Building confidence in your digital future Our approach to certification PwC offers a four-phase approach to help with your ISO 27001 project, using

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 27006 First edition 2007-03-01 Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems

More information

ISO/IEC INTERNATIONAL STANDARD. Conformity assessment Supplier's declaration of conformity Part 1: General requirements

ISO/IEC INTERNATIONAL STANDARD. Conformity assessment Supplier's declaration of conformity Part 1: General requirements INTERNATIONAL STANDARD ISO/IEC 17050-1 First edition 2004-10-01 Conformity assessment Supplier's declaration of conformity Part 1: General requirements Évaluation de la conformité Déclaration de conformité

More information

Cooperation with other Certification Systems

Cooperation with other Certification Systems ISCC 254 Cooperation with other Certification Systems Cooperation with other Certification Systems ISCC 11-01-14 V 1.16 11-01-14 Copyright notice ISCC 2010 This ISCC document is protected by copyright.

More information

Trust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014)

Trust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014) Trust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014) This document has been developed by representatives of Apple, Google, Microsoft, and Mozilla. Document History

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

FEDERAL GOVERNMENT ICT SUSTAINABILITY PLAN MID-TERM REVIEW

FEDERAL GOVERNMENT ICT SUSTAINABILITY PLAN MID-TERM REVIEW FEDERAL GOVERNMENT ICT SUSTAINABILITY PLAN MID-TERM REVIEW Comments Provided AIIA Response 1 February 2013 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body

More information

Handwritten signatures are EOL Panos Vassiliadis

Handwritten signatures are EOL Panos Vassiliadis Handwritten signatures are EOL Panos Vassiliadis Managing Director The use of paper would be reduced and maybe eliminated in offices by 1995 and all documents would be on computer and electronic due to

More information

Committee on the Internal Market and Consumer Protection

Committee on the Internal Market and Consumer Protection European Parliament 2014-2019 AMDMTS: 12 Regulation on ISA, the "EU Cybersecurity Agency", and repealing Regulation (EU) s created with Go to http://www.at4am.ep.parl.union.eu \000000.doc United in diversity

More information

Accreditation Process. Trusted Digital Identity Framework February 2018, version 1.0

Accreditation Process. Trusted Digital Identity Framework February 2018, version 1.0 Accreditation Process Trusted Digital Identity Framework February 2018, version 1.0 Digital Transformation Agency This work is copyright. Apart from any use as permitted under the Copyright Act 1968 and

More information

Magento GDPR Frequently Asked Questions

Magento GDPR Frequently Asked Questions Magento GDPR Frequently Asked Questions Whom does GDPR impact? Does this only impact European Union (EU) based companies? The new regulation provides rules that govern how companies may collect and handle

More information

Alternatives for mission-critical services in public mobile networks in Norway. May 2018

Alternatives for mission-critical services in public mobile networks in Norway. May 2018 Alternatives for mission-critical services in public mobile networks in Norway May 2018 TABLE OF CONTENTS 1 Background 3 2 NGN expectations 3 3 Solution concepts proposed by operators 3 4 Level of governmental

More information

SERVICE DESCRIPTION ISO Lex. Certifications

SERVICE DESCRIPTION ISO Lex. Certifications SERVICE DESCRIPTION Lex ISO/IEC 20000-1 INFORMATION TECHNOLOGY - SERVICE MANAGEMENT SYSTEM Companies of any size rely on effective IT service management. No matter where you re based or what you do, your

More information

ALC ONLINE COMPLIANCE TOOL REASONABLE ENQUIRY USER GUIDE

ALC ONLINE COMPLIANCE TOOL REASONABLE ENQUIRY USER GUIDE ALC ONLINE COMPLIANCE TOOL REASONABLE ENQUIRY USER GUIDE Document Version: v3 Oct 2015 TABLE OF CONTENTS Introduction...3 Software Requirements...4 Reasonable Enquiries...6 Creating a Reasonable Enquiry...7

More information

National Accreditation Board for Certification Bodies

National Accreditation Board for Certification Bodies BCB 160-Dec 2016 Accreditation Criteria For Trustworthy Digital Repository Certification Bodies BCB 160 Dec 2016 Date Effective - 1 Jan 2017 Accreditation Criteria for TDRCBs (BCB 160 Dec 2016) Page 1

More information

SSL/TSL EV Certificates

SSL/TSL EV Certificates SSL/TSL EV Certificates CA/Browser Forum Exploratory seminar on e-signatures for e-business in the South Mediterranean region 11-12 November 2013, Amman, Jordan Moudrick DADASHOW CEO, Skaitmeninio Sertifikavimo

More information

SAP SMS 365 SAP Messaging Proxy 365 Product Description August 2016 Version 1.0

SAP SMS 365 SAP Messaging Proxy 365 Product Description August 2016 Version 1.0 SAP SMS 365 SAP Messaging Proxy 365 Product Description August 2016 Version 1.0 TABLE OF CONTENTS 1 INTRODUCTION...3 2 BENEFITS...4 3 FUNCTIONAL DESCRIPTION...5 4 MESSAGE CLASSIFICATION...6 5 ARCHITECTURE...7

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

Sándor Szőke, Dr. Microsec Ltd. Migration of national PKI Services to eidas conformant Trust Services case study in Hungary

Sándor Szőke, Dr. Microsec Ltd. Migration of national PKI Services to eidas conformant Trust Services case study in Hungary Sándor Szőke, Dr. Microsec Ltd. Migration of national PKI Services to eidas conformant Trust Services case study in Hungary Introduction Private Hungarian IT company since 1984 Custom specific IT system

More information

Call for Expressions of Interest

Call for Expressions of Interest Call for Expressions of Interest ENISA M/CEI/17/T01 Experts for assisting in the implementation of the annual ENISA Work Programme TECHNICAL DESCRIPTION CONTENTS TECHNICAL DESCRIPTION... 3 1. INTRODUCTION...

More information

BUZCOIN TOKENS SALE PRIVACY POLICY. Last updated:

BUZCOIN TOKENS SALE PRIVACY POLICY. Last updated: BUZCOIN TOKENS SALE PRIVACY POLICY Last updated: 20.10.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant

More information

WLA Certification : Preparation and Management

WLA Certification : Preparation and Management WLA Certification : Preparation and Management Australia 27-30 April 2015 By Driss HAMDOUNE MDJS Secretary General & WLA Security & Risk Management Committee Member What kinds of risk is our business activity

More information

GDPR: A QUICK OVERVIEW

GDPR: A QUICK OVERVIEW GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance

More information

ehealth action in the EU

ehealth action in the EU ehealth action in the EU ehealth for smart and inclusive growth 13 February 2014 Jerome Boehm DG SANCO ehealth and Health Technology Assessment General Health Objectives of the EU cooperation on ehealth

More information

Efficient, broad-based solution for a Swiss digital ID

Efficient, broad-based solution for a Swiss digital ID Press release November 21, 2017 Government and private sector produce joint solution Efficient, broad-based solution for a Swiss digital ID The people of this country should have a simple, secure and unambiguous

More information

CFS v2.0. Procedures. Valid since: 26. May 2008

CFS v2.0. Procedures. Valid since: 26. May 2008 Procedures Valid since: 26. May 2008 Content 1. Process to become Validated...4 1.1. Creation of Login... 4 1.2. Preparation and upload of Documents... 4 1.3. Submission of Documents... 4 1.4. Validation...

More information

Summary of Expert Working Group on gtld Directory Services June 2014 Final Report

Summary of Expert Working Group on gtld Directory Services June 2014 Final Report Summary of Expert Working Group on gtld Directory Services June 2014 Final Report 1) Overview/Purpose ICANN formed an Expert Working Group (EWG) on gtld Directory Services to discuss how to replace the

More information

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Plan a Pragmatic Approach to the new EU Data Privacy Regulation AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General

More information

Issues in Assessing Commercial Certification Service Trust

Issues in Assessing Commercial Certification Service Trust The Open Group Security Program Group Building Trust on the Net ---- San Diego -- April 30, 1998 Issues in Assessing Commercial Certification Service Trust Michael S. Baum, J.D., M.B.A. VP, Practices &

More information

eidas Regulation eid and assurance levels Outcome of eias study

eidas Regulation eid and assurance levels Outcome of eias study eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification

More information