Trust Services: building blocks for secondary legislation

Size: px
Start display at page:

Download "Trust Services: building blocks for secondary legislation"

Transcription

1 eias Study on an electronic identification, authentication and signature policy Trust Services: building blocks for secondary legislation Riccardo Genghini (SG&A, ewitness), Chairman ETSI TC-ESI in the context of COM(01) 38 Proposal for a Regulation on electronic identification and trust services

2

3 Structure of the presentation! A. Electronic Trust Services: possible definitions! B. Electronic registered delivery services

4 Electronic Trust Services: definitions! A1. Relevance of the issue! A. General principles! A3 Text of complemented article(s)! A4. Possible interpretations! A5. Reality checks 5.1 technical 5. legal 5.3 economical 5.4 societal! A6. Conclusion

5 Electronic Registered Delivery Services! B1. Text of Article! B. Text of complemented article(s)! B3. Related recitals! B4. Key issues / key points! B5. Implementation ideal scenario! B6. Reality checks 6.1 technical 6. legal 6.3 economical 6.4 societal! B7. Conclusion and proposed scenario

6 Electronic Trust Services: possible definitions

7 Relevance of the issue The Regulation provides a general definition of Electronic Trust Services and Qualified Electronic Trust services (Art and 3.17) So we have expressly regulated TSs: electronic signatures, seals, time stamps, registered delivery services and certificates services for website authentication and Other TSs: that is any TS normally provided for remuneration that involve (Art. 3.16): (a) the creation, verification, and validation of electronic signatures, seals or time stamps, registered delivery services and certificates related to these services or (b) the creation, verification and validation of certificates for website authentication or (c) the preservation of electronic signatures, seals or certificates related to these services. A1.

8 Relevance of the issue European Electronic Trust Services (3.16) are an open number of services Are European Qualified Trust Services (3.17) are an open number of services? Or can only the expressly regulated Qualified Trust Services be Qualified? Can Member States create or recognis e as Qualified other Trust Services, that are not expressely regulated in the Regulation? A1.

9 General Principles Legal Effect of EU Regulation Art. 88 ff. Founding Treaty EU Subsidiarity Art. 5 Founding Treaty EU Recital 76 of the Regulation No delegated acts (Art. 90 Founding Treaty EU) A.

10 Text of Article 3.16 (TS) 3.16 'trust service' means an electronic service normally provided for remuneration which consists in: (a) the creation, verification, and validation of electronic signatures, electronic seals or electronic time stamps, electronic registered delivery services and certificates related to these services or (b) the creation, verification and validation of certificates for website authentication or (c) the preservation of electronic signatures, seals or certificates related to these services; A3.

11 Text of Article 13.1, 16.3 (a) (TS) 13.1 (1) trust service providers shall be liable for damage caused intentionally or negligently to any natural or legal person due to failure to comply with the obligations under this Regulation.The burden of proving intention or negligence of a non-qualified trust service provider shall lie with a natural or legal person claiming the damage referred to in the first subparagraph (b) The role of the supervisory body shall be the following: (b) to take action, if necessary, in relation to non-qualified trust service providers established in the territory of the designating Member State, through ex post supervisory activities, when informed that they and thetrust servicesthey provide allegedly do not meet therequirements laid down in this Regulation; A3.

12 Text of the Articles 3.17, 13.1, 16.3 (QTS)! 3.17 'qualified trust service' means a trust service that meets the applicable requirements laid down in this Regulation! 13.1 () The intention or negligence of a qualified trust service provider shall be presumed unless a qualified trust service provider proves that the damage referred to in the first subparagraph occurred without the intention or negligence of that qualified trust service provider.! 16.3 (a) The role of the supervisory body shall be the following:! (a) to supervise qualified trust service providers established in the territory of the designating Member State to ensure, through ex ante and ex post supervisory activities, that they and the qualified trust services they provide meet the requirements laid down in this Regulation A3.

13 Text of Article 18 (TS + QTS) Security requirements applicable to trust service providers 1. Qualified and non-qualified trust service providers shall take appropriate technical and organisational measures to manage the risks posed to the security of the trust services they provide. Having regard to the latest technological developments, these measures shall ensure that the level of security is commensurate to thevdegree of risk. In particular, measures shall be taken to prevent and minimise the impact of security incidents and inform stakeholders of the adverse effects of any incidents.. Qualified and non-qualified trust service providers shall, without undue delay but in any case within 4 hours after having become aware of it, notify the supervisory body and, where applicable, other relevant bodies, such as the competent national body for information security or the data protection authority, of any breach of security or loss of integrity that has a significant impact on the trust service provided or on the personal data maintained therein. When the breach of security or loss of integrity is likely to adversely affect a natural or legal person to whom the trusted service has been provided, the trust service provider shall also notify the natural or legal person of the breach or loss of integrity without undue delay. Where appropriate, in particular if a breach of security or loss of integrity concerns two or more Member States, the notified supervisory body shall inform the supervisory bodies in other Member States concerned and the European Union Agency for Network and Information Security (ENISA). The notified supervisory body shall inform the public or require the trust service provider to do so, where it determines that disclosure of the breach of security or loss of integrity is in the public interest. 3. The supervisory body shall provide ENISA once a year with a summary of breach notifications received from trust service providers. 4. The Commission may, by means of implementing acts, define :! further specification of the measures referred to in paragraph 1, and! the formats and procedures, including deadlines, applicable for the purpose of paragraph.! Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 46(). A3.

14 Text of Articles to 4 (QTS) Provide a legal framework common to all QTSs In particular Art. 4 is providing a list of requirements on QTSs, that are common to all QTSs and are substantially consistent with provisions of ISO 7000 A3.

15 Legal issues 1. TSs are evidently an open set of services. How to identify the TSP that are subjected to the Regulation, in particular 13.1, 16.3 and 18?. Are QTSs a closed number? A4.

16 Legal issues 1. TSs are evidently an open set of services. How to identify the TSP that are subjected to the Regulation, in particular 13.1, 16.1 and 18?. Possible answers: 1. if the TSP falls within the broad definition of Art. 3.16, it is automatically subjected to the legal regulation of Artt. 13.1, 16.3 and 18.. The TSP is subjected to the regulation of Artt.13.1, 16.3 and 18, only if it opts into the cathegory of European Electronic Trust Service Provider A4.

17 Legal issues 1. Are QTSs a closed number?. Possible answers: 1. No, there is a broad and clear definition of QTSs, of which the QTS expressly regulated by the Regulation are just the most egregious examples (argument by art. 4). No, a QTSP providing at least one QTS, falls within the Supervision and regulation for QTS, for all TSs provided (argument by art. 3.0 'qualified trust service provider' means a trust service provider who provides one or more qualified trust services and is granted the qualified status by the supervisory body) 3. Yes, at European level, only the QTS expressly regulated by the Regulation are considered QTSs. At national level, still the legislation can create or recognise other QTSs (application of the subsidiarity principle) 4. Yes, the only QTSs allowed are those expressly regulated by the Regulation A4.

18 Reality Checks! Reality checks 5.1 technical 5. legal 5.3 economical 5.4 societal A5.

19 Conclusions +It is preferable to allow Electronic Service Providers to opt in and to ask to be subjected to Art. 13, 16 and 18. Still, if a Court decides that an electronic service falls within the definition of Art. 3.16, the service provider will be subjected to the liability rules provided by the regulation. Separation between administratrative and civil law A.

20 Conclusions To unleash innovation in the field of TSs and QTSs, it is preferable to keep open the set of TSs that can be QTSs and claim the European Trust Mark, provided that the TSP is providing at least one QTS expressly regulated by the Regulation A.

21 Qualified e-registered delivery services

22 Requirements for qualified electronic registered delivery services, art. 4. The Commission may, by means of implementing acts, establish reference numbers of standards for processes for sending and receiving data. Compliance with the requirements laid down in paragraph 1 shall be presumed where the process for sending and receiving data meets those standards. B1.

23 Requirements for qualified electronic registered delivery services, art. 4.1 Qualified electronic registered delivery services shall meet the following requirements:! (a) they must be provided by one or more qualified trust service provider(s)! (b) they must ensure with high level of confidence the identification of the sender! (c) before the delivery of the data they must ensure the identification of the addressee B.

24 Requirements for qualified electronic registered delivery services, art. 4.1 (cont ed)! (d) sending and receiving of data must be secured by an advanced electronic signature or an advanced electronic seal of qualified trust service provider in such a manner as to preclude the possibility of the data being changed undetectably! (e) any change of the data needed for the purpose of sending or receiving the data must be clearly indicated to the sender and addressee of the data A.

25 Requirements for qualified electronic registered delivery services, art. 4.1 (cont ed)! (f) the date and time of sending, receipt and any change of data must be indicated by a qualified electronic time stamp! (g) in the event of the data being transferred between two or more qualified trust service providers, the requirements in points (a) to (e) shall apply to all the qualified trust service providers A.

26 Related recitals: Interinstitutional file 01/0146 (COD) (47a) It is essential to provide for a legal framework to facilitate cross border recognition between existing national legal systems related to electronic registered delivery service. This framework could also open new market opportunities for European Union trust service providers to offer new pan-european electronic registered delivery services. A.

27 Issues and key points! Objective of the proposed regulation achieve legal effect on the certainty of crossborder e-registered delivery establish qualified e-registered delivery services EUMS may have in force national legislation establishing legal equivalence of e-registered delivery and paper registered letter! Implementing Act s (IA) scope limited to establishing reference numbers of standards for processes for sending and receiving data process intended as structured, measured set of activities designed to produce a specified output A4.

28 Issues and key points (cont ed)! Qualified e-registered delivery simply has the legal value of a presumption that a certain delivery process has been performed scope for several different e-delivery processes, with several different features for legal procedures, banking, simple s, invoicing, etc. Each of such services requires a different identification and a different level of insurance very welcome that many different standards pop up, solving issues specific to their use environment A4.

29 Issues and key points (cont ed)! Difficult to define the exact boundaries the identity of sender/receiver the authenticity of the claimed identity and their accountability and responsibility! Therefore in the field of e-registered delivery multiplicity is unavoidable the regulation should not stifle innovation the EC must have a way that allows swift recognition of new and effective standards to solve specific issues and to propose innovative e- registered delivery services A4.

30 Issues and key points (cont ed)! Trusted e-registered delivery as the new alternative to contractual agreement, in a fully digitalised environment it cannot be regulated as an alternative to registered mail and telegrams, but should be open to embrace new paradigms A4.

31 Issues and key points (cont ed)! Potential issues w.r.t. establishing e-registered delivery standards in this field, there are several different working environments and use cases that need different authentication rules (e.g.) from UPU with just object and system identification to legal XML that provides double sender and receiver strong authentication each and every use case has its merits and relevance there is a significant difference between processes in the various different contexts such as BB, BC, CC, GC etc. A4.

32 Issues and key points (cont ed)! Potential issues w.r.t. establishing e-registered delivery standards (cont ed) a single standard will never be able to address all requirements many stakeholders with vested interests, as described later however, few if any of these can be considered open solutions that would not disturb the desired level playing field A4.

33 Implementation ideal scenario! First phase (inventory) making a long list of standard candidates for processes for sending and receiving data relevant standards from ISO, ETSI, OASIS to be included standards to be validated against requirements from public sector, particularly esens project private sector, main providers of e-registered delivery services! Second phase (selection by consensus) standards to be referenced by the IA part(ies) accountable for standard development! Finally, standard reference numbers are actually established per IA A5.

34 Reality checks: technical (existing standards landscape)! ISO SWIFT services clear case for qualified e-registered delivery consortium-made, then messages standardized by ISO cannot be a relevant standard other TCs (e.g. ISO/IEC JTC 1) standardised ICT processes (e.g. software development) not related to e-registered delivery A6.1.

35 Reality checks: technical (cont ed) (existing standards landscape)! OASIS ebxml Registry TC develops specifications for interoperable registries and repositories for submission, query and retrieval of contents ebxml Messaging Services TC develops technology delivery of business transactions transport, routing, packaging using Internet technologies LegalXML for Electronic Court Filing is using XML to create and transmit legal documents among attorneys, courts, litigants, and others legally speaking it is a standard that can be referenced minor issues on public availability and on the openness of the standardisation process A6.1.

36 Reality checks: technical (cont ed) (existing standards landscape)! UPU (Universal Postal Union) established an Electronic PostMark (EPM) published as an OASIS standard, including a profile of the OASIS Digital Signature Service! ETSI ETSI TS Registered Electronic Mail v.1.1 REM architecture (Part 1) Data structures and formats for messages and Evidences (Part ) Information Security Policy Requirements for provision of REM services (Part 3) REM Conformance requirements (Part 4) Interoperability Profiles for SMTP-based REM (Part 5) A6.1.

37 Reality checks: technical (cont ed) (existing standards landscape)! Other specifications related to XML BPMN provides a graphical notation to facilitate human communication between business users and technical users, of complex business processes XPDL provides an XML file format that can be used to interchange process models between tools! Several e-registered delivery services already in operation, in different domains as Land Registration, Insurance, public Registered (both completely electronic as well as hybrid) A6.1.

38 Reality checks: technical (cont ed) (existing standards landscape)! European e-sens Project e-sens is building on the previous Large Scale Pilot (LSP) outcomes in 3 competence clusters: e- Delivery, Semantics and e-documents, as well as e-identity and e-signatures e-delivery competence cluster addressing issues that have not been solved during cooperation of STORK (e-delivery-pilot), PEPPOL, SPOCS and e-codex A6.1.

39 Reality checks: technical (cont ed) (existing standards landscape)! European e-sens Project (cont ed) some will already be tackled by e-codex project but not all of the issues can be solved, e.g. common format for end entity addresses common format for SAML token for end entity authentication, based on STORK SML/SMP-based discovery to be used with ebms3 establishing trust (gateway authentication), e.g., through Trust Lists (TLs technically defined by the ETSI TSL specification) as used in SPOCS for e-delivery services and/or through a dedicated PKI as used in PEPPOL A6.1.

40 Reality checks: technical (cont ed) (existing standards landscape)! European e-sens Project (cont ed) the edelivery subgroup will create an extended set of open specifications (a Common Framework for e-delivery) a reference implementation (Re-usable Generic Tools) applications in new domains inside the e-sens LSP will be based on this reference implementation (i.e., on a subset of the generic tools) a migration plan will be created for the existing infrastructures of previous LSPs, and the e- Delivery subgroup will provide support for the migration of existing software A6.1.

41 Reality checks: technical (cont ed) (existing standards landscape)! Connecting Europe Facility (CEF) CEF includes the Digital Service Infrastructure (DSI) established to connect Member State players they keep freedom at national level DSI will enable cross-border delivery of services of common interest as such, e-delivery CEF-DSI is the critical layer underpinning the technical implementation of e- registered delivery services across the EU A6.1.

42 Reality checks: technical (cont ed) (existing standards landscape)! Conclusion rich space, with many actors and competing standards, with various degrees of openness Article 4.1 states: Compliance with the requirements laid down in paragraph 1 shall be presumed where the process for sending and receiving data meets those standards for e- registered delivery services provided by EU TSPs if the model of legal notifications and registered mail will be adopted in the IA, innovation will be killed on the onset; e-registered delivery services will be used only in closed users environments (SWIFT) or if made mandatory by national law (Italian PEC) A6.1.

43 Reality checks: technical (cont ed) (existing standards landscape)! Conclusion to specify processes for the functionality and interoperability of the qualified e-registered delivery services, preserving the innovation, it may be necessary to specify a prioritisation yielding a primary focus, defining on which processes to concentrate first a vocabulary to define the key characteristics of processes (name, steps, dependencies, actors, data used, input, transformations, outcome,...) a vocabulary to electronically identify and authenticate actors in the e-registered delivery process such as Sender, Receiver, Service Provider, Services, etc. A6.1.

44 Reality checks: technical (cont ed) (existing standards landscape)! Conclusion ( ) it may be necessary to specify safeguards (security mechanisms) that implement these, particularly with regard to authentication of the actors (be it IT systems, human beings or legal entities) this may in some cases involve the use of national/eu Enterprise and Citizen Registers, the use of identifiers such as VAT number, as well as quality assurance of those registers agreement on the use of and reliance on time in the processes technical formats, procedures and practices for performing interactions with end-users on both the sending and receiving sides; intra-process interactions in case multiple actors are involved (e.g. multiple e- registered delivery services, relying on different QTSPs) A6.1.

45 Reality checks: legal! Currently qualified e-registered delivery is existent only in some EU Member States and effectively used only when made mandatory private citizens do not accept such services, because they understand correctly that the possibility to enact their rights depends mainly on the proper functioning of their computers (or handheld devices) this is, in effect, too risky, particularly because the current existing e-registered delivery models mimic legal notifications and registered mail A6..

46 Reality checks: legal (cont ed)! From a legal standpoint in open environments registered e-delivery is better suited to prove that someone that has an obligation to act/inform, has duly acted according to the law only in closed environments (like legal notifications, judicial proceedings, etc.) registered (if sent and received by professionals) can be used for putting an obligation to act on the receiver the regulation properly sets the definition of (qualified) registered e-delivery, leaving to the national legislation to define its evidential value A6..

47 Reality checks: legal (cont ed)! If IA will choose a legal-mail (registered mail) model for e-registered delivery, it will be used only if required by the law and will ultimately address areas where only national legislation applies (Article. of the Regulation) the consequence would be that Articles 41 and 4 would be unable to support the creation of a (single) European market for registered e-delivery, entrenching existing incumbents in their (national) dominant role this would be against the main goal of the regulation of creating a single market of European Trust Service Providers (Recitals Nr. 4, 5 and 6) A6..

48 Reality checks: legal (cont ed)! If the regulation accepts the broader technical definition of registered e-delivery, in this case national legislator will be able to refer to the regulation and to the published standards in order to define the proof value and the usage context of registered e-delivery! Only the National legislator has the competence to define its legal/evidential value of the different registered e-delivery services, beyond what stated in Article 41 section 1 and of the Regulation A6..

49 Reality checks: economical! From an economical perspective, e-registered delivery is a broad market field. It can be argued that some of the e-registered delivery services or e-transactions executions can actually be called e-registered delivery! To grow this market, it is recommended to avoid both: any stifling of innovation; and creation of unfair competitive advantage A6.3.

50 Reality checks: economical (cont ed)! E-registered delivery can be qualified as a clear area for growth, and the creation of a fair level playing field is important in fact, all the inventors and implementers of early registered e-delivery services, have been small European companies or even individuals! A too high barrier to entrance set by the EC or by the EUMS, would stifle innovation and force innovative companies to licence to larger market players their innovative technology for e-delivery if no (adequate) guarantees are provided, to much risk is translated onto the relying parties A6.3.

51 Reality checks: societal! Attention should be paid to not introducing or enforcing a digital divide between persons/ organisations that have access to electronic processes, and those that have not! Equal attention should be given to the processing of privacy-sensitive information, particularly with regard to selling and re-selling transaction related information that might disclose behaviour or preferences A6.4.

52 Conclusion and proposed scenario! Important that e-registered delivery is and remains open to innovation! In this perspective, any future scenario should establish a mechanism that allows European and International Standard Organisations, to submit a proposal for an e-registered delivery standard to be referenced by the EU Commission A7.

53 Conclusion and proposed scenario (cont ed)! ( ) any future scenario should mandate a transparent review of the proposed standard, checking that it does not lack none of the properties required by Regulation 105/01/ EU, in particular transparent standardisation process open standardisation process accessible by everybody, either through» membership to the standardisation committee, or» a national standardisation body standard publicly available to everybody free, or or upon payment (like CEN and ISO standards) A7.

54 Conclusion and proposed scenario (cont ed)! Furthermore, consideration should be given to the fact that innovative solution must have the opportunity to become qualified services, even if they solve just specific issues and serve well defined communities A7.

55 Conclusion and proposed scenario (cont ed)! National legislation may impose restrictive conditions for registered e-delivery, like millions of Euro of minimum stock capital, or the possession of a postal license this would create national monopolies and force innovative companies to sell to incumbents their innovative solutions, instead of addressing with them directly the market EC shall ensure that a fine balance will be struck between capital requirements, insurance, living will dispositions, so that business security and continuity is ensured in the field of registered e- services and of more in general for (Q)TSPs A7.

56 Thanks for the attention! Questions?

eidas & e-delivery CE Midsummer Conference "The role of policy decisions in the postal & delivery industry", Copenhagen (DK), 12 June 2017

eidas & e-delivery CE Midsummer Conference The role of policy decisions in the postal & delivery industry, Copenhagen (DK), 12 June 2017 eidas & e-delivery CE Midsummer Conference "The role of policy decisions in the postal & delivery industry", Copenhagen (DK), 12 June 2017 Andrea Servida DG CONNECT, European Commission Unit "egovernment

More information

Electronic registered delivery services (ERDS) in light of the eidas regulation. Warsaw Common Sign Conference 2015

Electronic registered delivery services (ERDS) in light of the eidas regulation. Warsaw Common Sign Conference 2015 Electronic registered delivery services (ERDS) in light of the eidas regulation Warsaw Common Sign Conference 2015 ! 1. e-delivery and the eidas regulation - EU legislative framework - French legislative

More information

European Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the EU internal market

European Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the EU internal market European Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the EU internal market Gérard GALLER Policy Officer European Commission -

More information

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive) July 2013 Executive Summary ETNO supports the European Commission s global approach to cyber-security

More information

FOR QTSPs BASED ON STANDARDS

FOR QTSPs BASED ON STANDARDS THE EU CYBER SECURITY AGENCY FOR QTSPs BASED ON STANDARDS Technical guidelines on trust services DECEMBER 2017 About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre

More information

eidas Regulation eid and assurance levels Outcome of eias study

eidas Regulation eid and assurance levels Outcome of eias study eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification

More information

Electronic signature framework

Electronic signature framework R E P U B L I C O F S E R B I A Negotation Team for the Accession of Republic of Serbia to the European Union Working Group for Chapter 10 Information society and media Electronic signature framework Contents

More information

eidas Regulation (EU) 910/2014 eidas implementation State of Play

eidas Regulation (EU) 910/2014 eidas implementation State of Play eidas Regulation (EU) 910/2014 eidas implementation State of Play CA-Day 19 September 2016 Elena Alampi DG CONNECT, European Commission elena.alampi@ec.europa.eu eidas The Regulation in a nutshell 2 MAIN

More information

Digital Signatures Act 1

Digital Signatures Act 1 Issuer: Riigikogu Type: act In force from: 01.07.2014 In force until: 25.10.2016 Translation published: 08.07.2014 Digital Signatures Act 1 Amended by the following acts Passed 08.03.2000 RT I 2000, 26,

More information

NIS Standardisation ENISA view

NIS Standardisation ENISA view NIS Standardisation ENISA view Dr. Steve Purser Brussels, 19 th September 2017 European Union Agency for Network and Information Security Instruments For Improving Cybersecurity Policy makers have a number

More information

ENISA s Position on the NIS Directive

ENISA s Position on the NIS Directive ENISA s Position on the NIS Directive 1 Introduction This note briefly summarises ENISA s position on the NIS Directive. It provides the background to the Directive, explains its significance, provides

More information

eias Study on an electronic identification, authentication and signature policy SUPERVISION Presentation on status

eias Study on an electronic identification, authentication and signature policy SUPERVISION Presentation on status eias Study on an electronic identification, authentication and signature policy SUPERVISION Presentation on status in the context of COM(2012) 238 Proposal for a Regulation on electronic identification

More information

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act'' CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

More information

SAT for eid [EIRA extension]

SAT for eid [EIRA extension] SAT for eid [EIRA extension] eid Solution Architecture Template (SAT) v1.0.0 ISA² Action 2.1 - European Interoperability Architecture Page 1 of 1 Change control Modification Details Version 1.0.0 Migration

More information

UPDATE ON CEN & ETSI STANDARDISATION ON SIGNATURES

UPDATE ON CEN & ETSI STANDARDISATION ON SIGNATURES UPDATE ON CEN & ETSI STANDARDISATION ON SIGNATURES Workshop eidas Trust Services: 6 months on after the switch-over 19 December 2016 Riccardo Genghini, TC ESI chairman Topics eidas Standards Status ETSI

More information

Internet copy. EasyGo security policy. Annex 1.3 to Joint Venture Agreement Toll Service Provider Agreement

Internet copy.  EasyGo security policy. Annex 1.3 to Joint Venture Agreement Toll Service Provider Agreement EasyGo security policy Annex 1.3 to Joint Venture Agreement Toll Service Provider Agreement This copy of the document was published on and is for information purposes only. It may change without further

More information

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017 in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017 European Union Agency for Network and Information Security Positioning ENISA activities CAPACITY Hands on activities POLICY Support MS & COM

More information

ILNAS/PSCQ/Pr004 Qualification of technical assessors

ILNAS/PSCQ/Pr004 Qualification of technical assessors Version 1.1 21.6.2016 Page 1 of 6 ILNAS/PSCQ/Pr004 Qualification of technical assessors Modifications: review of the document 1, avenue du Swing L-4367 Belvaux Tél.: (+352) 247 743-53 Fax: (+352) 247 943-50

More information

Trust Services for Electronic Transactions

Trust Services for Electronic Transactions Trust Services for Electronic Transactions ROUMEN TRIFONOV Faculty of Computer Systems and Control Technical University of Sofia 8 st. Kliment Ohridski bul., 1000 Sofia BULGARIA r_trifonov@tu-sofia.bg

More information

eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal?

eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal? eidas Regulation in the context of Cybersecurity: Electronic seals and website certificates: Two sides of a (gold) medal? public 1 AGENDA 1. eidas Strategic View 2. Website Certificates 3. Electronic Seals

More information

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679 Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679 Adopted on 25 May 2018 Contents 1. Introduction... 2 1.1. Scope

More information

Guidance for Requirements for qualified trust service providers: trustworthy systems and products

Guidance for Requirements for qualified trust service providers: trustworthy systems and products Guidance for Requirements for qualified trust service providers: trustworthy systems and products Note on using the guidance: examples are used throughout they are not normative or exclusive, but there

More information

ETSI ESI and Signature Validation Services

ETSI ESI and Signature Validation Services ETSI ESI and Signature Validation Services Presented by: Andrea Röck For: Universign and ETSI STF 524 expert 24.10.2018 CA day ETSI 2018 Agenda Update on standardisation under eidas Signature validation

More information

DECISION OF THE EUROPEAN CENTRAL BANK

DECISION OF THE EUROPEAN CENTRAL BANK L 74/30 Official Journal of the European Union 16.3.2013 DECISIONS DECISION OF THE EUROPEAN CENTRAL BANK of 11 January 2013 laying down the framework for a public key infrastructure for the European System

More information

NEWSFLASH GDPR N 8 - New Data Protection Obligations

NEWSFLASH GDPR N 8 - New Data Protection Obligations GDPR N 8 May 2017 NEWSFLASH GDPR N 8 - New Data Protection Obligations Following the adoption of the new EU General Data Protection Regulation (GDPR) on 27 April 2016, most organisations began to re-examine

More information

Countdown to eidas. Date: 19/04/2016 Auteur: CTIE Révision: 1.0 Ref: EIDAS_CTIE_4 Page 1

Countdown to eidas. Date: 19/04/2016 Auteur: CTIE Révision: 1.0 Ref: EIDAS_CTIE_4 Page 1 Countdown to eidas Date: 19/04/2016 Auteur: CTIE Révision: 1.0 Ref: EIDAS_CTIE_4 Page 1 About CTIE (Centre des Technologies de l'information de l'etat) Provides centralised IT services for all public administrations

More information

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679

Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679 Guidelines 1/2018 on certification and identifying certification criteria in accordance with Articles 42 and 43 of the Regulation 2016/679 Adopted on 23 January 2019 1 Table of contents 1.1 Scope of the

More information

CHAPTER 13 ELECTRONIC COMMERCE

CHAPTER 13 ELECTRONIC COMMERCE CHAPTER 13 ELECTRONIC COMMERCE Article 13.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial

More information

Regulating Cyber: the UK s plans for the NIS Directive

Regulating Cyber: the UK s plans for the NIS Directive Regulating Cyber: the UK s plans for the NIS Directive September 2017 If you are a digital service provider or operate an essential service then new security and breach notification obligations may soon

More information

Technical guidelines implementing eidas

Technical guidelines implementing eidas Technical guidelines implementing eidas Sławek Górniak CA/Day Berlin 19 th September 2016 European Union Agency for Network and Information Security About ENISA 2 Positioning ENISA activities 3 ENISA and

More information

ENISA EU Threat Landscape

ENISA EU Threat Landscape ENISA EU Threat Landscape 24 th February 2015 Dr Steve Purser ENISA Head of Department European Union Agency for Network and Information Security www.enisa.europa.eu Agenda ENISA Areas of Activity Key

More information

Trust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014)

Trust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014) Trust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014) This document has been developed by representatives of Apple, Google, Microsoft, and Mozilla. Document History

More information

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready? European Union (EU) General Data Protection Regulation (GDPR) Do you handle EU residents personal data? The GDPR update is coming May 25, 2018. Are you ready? What do you need to do? Governance and Accountability

More information

The GDPR and NIS Directive: Risk-based security measures and incident notification requirements

The GDPR and NIS Directive: Risk-based security measures and incident notification requirements The GDPR and NIS Directive: Risk-based security measures and incident notification requirements Adrian Ross LLB (Hons), MBA GRC Consultant IT Governance Ltd 4 May 2017 Introduction Adrian Ross GRC consultant

More information

Data Processing Clauses

Data Processing Clauses Data Processing Clauses The examples of processing clauses below are proposed pending the adoption of standard contractual clauses within the meaning of Article 28.8 of general data protection regulation.

More information

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a

More information

ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS

ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS ACCREDITATION: A BRIEFING FOR GOVERNMENTS AND REGULATORS Accreditation is continuously gaining recognition as an important technical tool in the delivery of objectives across an increasing range of policy

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers

Data Protection. Code of Conduct for Cloud Infrastructure Service Providers Data Protection Code of Conduct for Cloud Infrastructure Service Providers 27 JANUARY 2017 Introduction... 3 1 Structure of the Code... 5 2 Purpose... 6 3 Scope... 7 4 Data Protection Requirements... 9

More information

STATEMENT OF STRATEGY

STATEMENT OF STRATEGY STATEMENT OF STRATEGY 2014-2016 OUR MISSION OUR MANDATE ANALYSIS OF OUR ENVIRONMENT Opportunities Challenges HIGH-LEVEL GOALS STRATEGIES PERFORMANCE INDICATORS Our Mission To protect the individual s right

More information

Securing Europe's Information Society

Securing Europe's Information Society Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU

More information

Live Webinar Electronic Registered Delivery Service (ERDS) and the eidas Regulation. 12 September 2016

Live Webinar Electronic Registered Delivery Service (ERDS) and the eidas Regulation. 12 September 2016 Live Webinar Electronic Registered Delivery Service (ERDS) and the eidas Regulation 12 September 2016 Agenda 15 00 Introduction Thomas Fillis DIGIT 15 10 Introduction to eidas Electronic Registered Delivery

More information

ISO/IEC TR Information technology Security techniques Guidelines for the use and management of Trusted Third Party services

ISO/IEC TR Information technology Security techniques Guidelines for the use and management of Trusted Third Party services This is a preview - click here to buy the full publication TECHNICAL REPORT ISO/IEC TR 14516 First edition 2002-06-15 Information technology Security techniques Guidelines for the use and management of

More information

Electronic Transactions and Electronic Signatures Act. Act No. [ ] of [ ]

Electronic Transactions and Electronic Signatures Act. Act No. [ ] of [ ] Electronic Transactions and Electronic Signatures Act Act No. [ ] of [ ] An Act to provide for the facilitation of the use of electronic transactions and signatures and for related matters. ENACTED by

More information

The NIS Directive and Cybersecurity in

The NIS Directive and Cybersecurity in The NIS Directive and Cybersecurity in ehealth Dr. Athanasios Drougkas Officer in NIS Belgian Hospitals Meeting on Security Brussels 13 th October European Union Agency For Network And Information Security

More information

Package of initiatives on Cybersecurity

Package of initiatives on Cybersecurity Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating

More information

ING Public Key Infrastructure Technical Certificate Policy

ING Public Key Infrastructure Technical Certificate Policy ING Public Key Infrastructure Technical Certificate Policy Version 5.4 - November 2015 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Document version General Of this document

More information

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10 GDPR AMC SAAS AND HOSTED MODULES UK version AMC Consult A/S June 26, 2018 Version 1.10 INDEX 1 Signatures...3 2 General...4 3 Definitions...5 4 Scoping...6 4.1 In scope...6 5 Responsibilities of the data

More information

Directive on Security of Network and Information Systems

Directive on Security of Network and Information Systems European Commission - Fact Sheet Directive on Security of Network and Information Systems Brussels, 6 July 2016 Questions and Answers The European Parliament's plenary adopted today the Directive on Security

More information

ETSI ESI Electronic Signature Activities

ETSI ESI Electronic Signature Activities ETSI ESI Electronic Signature Activities Cornerstone for interoperability of Digital Documents in Europe Riccardo Genghini TB ESI Chairperson ETSI 2008. All rights reserved 4th ETSI Security Workshop ETSI

More information

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU Resilience, Deterrence and Defence: Building strong cybersecurity for the EU 1 Building strong cybersecurity for the EU: Resilience, Deterrence and Defence From reactive to pro-active and cross-policy

More information

Security guidelines on the appropriate use of qualified electronic registered delivery services Guidance for users

Security guidelines on the appropriate use of qualified electronic registered delivery services Guidance for users Security guidelines on the appropriate use of qualified electronic registered delivery services Guidance for users VERSION 2.0 FINAL DECEMBER 2016 www.enisa.europa.eu European Union Agency For Network

More information

eidas Interoperability Architecture Version November 2015

eidas Interoperability Architecture Version November 2015 eidas Interoperability Architecture Version 1.00 6. November 2015 1 Introduction This document specifies the interoperability components of the eidas-network, i.e. the components necessary to achieve interoperability

More information

ING Corporate PKI G3 Internal Certificate Policy

ING Corporate PKI G3 Internal Certificate Policy ING Corporate PKI G3 Internal Certificate Policy Version 1.0 March 2018 ING Corporate PKI Service Centre Final Version 1.0 Document information Commissioned by Additional copies of this document ING Corporate

More information

IAS2. Electronic signatures & electronic seals Up-dates - feedbacks from :

IAS2. Electronic signatures & electronic seals Up-dates - feedbacks from : IAS2 Study to support the implementation of a pan-european framework on electronic identification and trust services for electronic transactions in the internal market Electronic signatures & electronic

More information

ETSI TC ESI WORK ON ELECTRONIC REGISTERED DELIVERY SERVICES AND REGISTERED ELECTRONIC MAIL

ETSI TC ESI WORK ON ELECTRONIC REGISTERED DELIVERY SERVICES AND REGISTERED ELECTRONIC MAIL ETSI TC ESI WORK ON ELECTRONIC REGISTERED DELIVERY SERVICES AND REGISTERED ELECTRONIC MAIL Luca Boldrin, Juan Carlos Cruellas, Santino Foti, Paloma Llaneza, Kornél Réti Agenda STF 523 concept and context

More information

e-sens Electronic Simple European Networked Services

e-sens Electronic Simple European Networked Services e-sens Electronic Simple European Networked Services Herbert Leitold, A-SIT 2 nd SSEDIC International Identity Initiatives Conference (SIIIC) Rome, July 8 th 2013 Presentation Overview esens - LSP Relation

More information

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document EUROPEAN COMMISSION Strasbourg, 7.2.2013 SWD(2013) 31 final COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT Accompanying the document Proposal for a Directive of the European

More information

European Union Agency for Network and Information Security

European Union Agency for Network and Information Security Critical Information Infrastructure Protection in the EU Evangelos Ouzounis Head of Secure Infrastructure and Services Regional Cybersecurity Forum Sofia, Bulgaria 29 th November 2016 European Union Agency

More information

edelivery Tutorial How can CEF help you set-up your edelivery infrastructure? November 2016

edelivery Tutorial How can CEF help you set-up your edelivery infrastructure? November 2016 edelivery Tutorial How can CEF help you set-up your edelivery infrastructure? November 2016 Version Control Version Date Created by Description V1.2 November 2016 CEF Project & Architecture Office Final

More information

eid building block Introduction to the Connecting Europe Facility DIGIT Directorate-General for Informatics

eid building block Introduction to the Connecting Europe Facility DIGIT Directorate-General for Informatics Introduction to the Connecting Europe Facility eid building block DIGIT Directorate-General for Informatics DG CONNECT Directorate-General for Communications Networks, Content and Technology March 2016

More information

The current status of Esi TC and the future of electronic signatures

The current status of Esi TC and the future of electronic signatures SG&A ETSI FUTURE WORKSHOP Sophia Antipolis, 16th January 2006 The current status of Esi TC and the future of electronic signatures Riccardo Genghini, Chairman of Etsi Esi TC riccardo.genghini@sng.it The

More information

Proposal for a model to address the General Data Protection Regulation (GDPR)

Proposal for a model to address the General Data Protection Regulation (GDPR) Proposal for a model to address the General Data Protection Regulation (GDPR) Introduction Please find the Executive Summary of the data model in Part A of this document. Part B responds to the requirements

More information

UDRP Pilot Project. 1. Simplified way of sending signed hardcopies of Complaints and/or Responses to the Provider (Par. 3(b), Par. 5(b) of the Rules)

UDRP Pilot Project. 1. Simplified way of sending signed hardcopies of Complaints and/or Responses to the Provider (Par. 3(b), Par. 5(b) of the Rules) UDRP Pilot Project The Czech Arbitration Court (CAC) proposes that it runs two pilot projects (Pilot) related to its implementation of UDRP. During the Pilot, the following proposed new UDRP-related services

More information

ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability. Session 2: Conformity Assessment Principles

ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability. Session 2: Conformity Assessment Principles ITU Asia-Pacific Centres of Excellence Training on Conformity and Interoperability Session 2: Conformity Assessment Principles 12-16 October 2015 Beijing, China Keith Mainwaring ITU Expert Agenda 1. Context

More information

Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition

Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition 1 Soshi Hamaguchi, 1 Toshiyuki Kinoshita, 2 Satoru Tezuka 1 Tokyo University of Technology, Tokyo, Japan,

More information

Security guidelines on the appropriate use of qualified electronic seals Guidance for users

Security guidelines on the appropriate use of qualified electronic seals Guidance for users Security guidelines on the appropriate use of qualified electronic seals Guidance for users VERSION 2.0 FINAL DECEMBER 2016 www.enisa.europa.eu European Union Agency For Network And Information Security

More information

ETSI TR V1.1.1 ( )

ETSI TR V1.1.1 ( ) TR 119 400 V1.1.1 (2016-03) TECHNICAL REPORT Electronic Signatures and Infrastructures (ESI); Guidance on the use of standards for trust service providers supporting digital signatures and related services

More information

Regulating Telemedicine: the

Regulating Telemedicine: the Regulating Telemedicine: the EU perspective ETSI ehealth workshop On telemedicine 6-7 May 2014 Céline Deswarte, Policy officer Unit Health and Well-Being European Commission i Table of Contents t 1) Legal

More information

ehealth action in the EU

ehealth action in the EU ehealth action in the EU ehealth for smart and inclusive growth 13 February 2014 Jerome Boehm DG SANCO ehealth and Health Technology Assessment General Health Objectives of the EU cooperation on ehealth

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

STANDARDS TO HELP COMPLY WITH EU LEGISLATION. EUROPE HAS WHAT IT TAKES INCLUDING THE WILL?

STANDARDS TO HELP COMPLY WITH EU LEGISLATION. EUROPE HAS WHAT IT TAKES INCLUDING THE WILL? ETSI SUMMIT Releasing the Flow Data Protection and Privacy in a Data-Driven Economy 19 April 2018 STANDARDS TO HELP COMPLY WITH EU LEGISLATION. EUROPE HAS WHAT IT TAKES INCLUDING THE WILL? Presented by

More information

Contributed by Djingov, Gouginski, Kyutchukov & Velichkov

Contributed by Djingov, Gouginski, Kyutchukov & Velichkov Contributed by Djingov, Gouginski, Kyutchukov & Velichkov General I Data Protection Laws National Legislation General data protection laws The Personal Data Protection Act implemented the Data Protection

More information

OPINION ON THE DEVELOPMENT OF SIS II

OPINION ON THE DEVELOPMENT OF SIS II OPINION ON THE DEVELOPMENT OF SIS II 1 Introduction In an attempt to ensure that the second-generation Schengen information system SIS II complies with the highest standards of data protection, the Joint

More information

Cybersecurity Package

Cybersecurity Package Cybersecurity Package Highlights of key initiatives Domenico Ferrara Policy officer @ DG CONNECT Brussels, 12 December 2017 1 2013-2017: Evolving threat landscape Proliferation of (poorly secured) IoT

More information

Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria

Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria Privacy Statement for Use of the Trust Service of Swisscom IT Services Finance S.E., Austria General Privacy is a matter of trust, and your trust is important to us. Handling personal data in a responsible

More information

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

A Strategy for a secure Information Society Dialogue, Partnership and empowerment A Strategy for a secure Information Society Dialogue, Partnership and empowerment Gerard.Galler@ec.europa.eu European Commission DG Information Society & Media Unit INFSO/A3: Internet; Network & Information

More information

Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know

Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know Aristotelis Tzafalias Programme Officer, Trust and Security DG Communications Networks,

More information

Interoperability Challenge of Certified Communication Systems via Internet

Interoperability Challenge of Certified Communication Systems via Internet Interoperability Challenge of Certified Communication Systems via Internet Marina Buzzi, IIT-CNR, marina.buzzi@iit.cnr.it Francesco Gennai, ISTI-CNR, francesco.gennai@isti.cnr.it Claudio Petrucci, Agid,

More information

Privacy Statement for Use of the Certification Service of Swisscom (sales name: "All-in Signing Service")

Privacy Statement for Use of the Certification Service of Swisscom (sales name: All-in Signing Service) Swisscom (sales name: "All-in Signing Service") General Privacy is a matter of trust, and your trust is important to us. Handling personal data in a responsible and legally compliant manner is a top priority

More information

EUROPEAN ACCREDITATION LEGAL FRAMEWORK

EUROPEAN ACCREDITATION LEGAL FRAMEWORK EUROPEAN ACCREDITATION LEGAL FRAMEWORK ECIBC Plenary 2016 Ed Wieles 24 November 2016 CONTENTS European model on Accreditation Requirements for Accreditation bodies Harmonised standards for accreditation

More information

Cybersecurity. Quality. security LED-Modul. basis. Comments by the electrical industry on the EU Cybersecurity Act. manufacturer s declaration

Cybersecurity. Quality. security LED-Modul. basis. Comments by the electrical industry on the EU Cybersecurity Act. manufacturer s declaration Statement Comments by the electrical industry on the EU Cybersecurity Act manufacturer s declaration industrial security Cybersecurity Quality basis security LED-Modul Statement P January 2018 German Electrical

More information

Draft ETSI EN V1.0.0 ( )

Draft ETSI EN V1.0.0 ( ) Draft EN 319 522-4-3 V1.0.0 (2018-05) Electronic Signatures and Infrastructures (ESI); Electronic Registered Delivery Services; Part 4: Bindings; Sub-part 3: Capability/requirements bindings 2 Draft EN

More information

General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of

General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of General Data Protection Regulation BT s amendments to the proposed Regulation on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General

More information

Network and Information Security Directive

Network and Information Security Directive Network and Information Security Directive Provisions + ENISA s activities Dr Evangelos Ouzounis Head of Secure Infrastructure and Services Unit, ENISA European Union Agency for Network and Information

More information

Technical Requirements of the GDPR

Technical Requirements of the GDPR Technical Requirements of the GDPR Purpose The purpose of this white paper is to list in detail all the technological requirements mandated by the new General Data Protection Regulation (GDPR) laws with

More information

e-sens Electronic Simple European Networked Services Klaus Vilstrup Pedersen WP6 Manager DIFI, Norway

e-sens Electronic Simple European Networked Services Klaus Vilstrup Pedersen WP6 Manager DIFI, Norway e-sens Electronic Simple European Networked Services Klaus Vilstrup Pedersen WP6 Manager DIFI, Norway esens BCSS call for proposal Objectives Consolidate and align work from the LSPs Create Long Term Sustainability

More information

Standardization mandate addressed to CEN, CENELEC and ETSI in the field of Information Society Standardization

Standardization mandate addressed to CEN, CENELEC and ETSI in the field of Information Society Standardization Mandate/ 290 EN Standardization mandate addressed to CEN, CENELEC and ETSI in the field of Information Society Standardization 1 Title Mandate addressed to CEN, CENELEC and ETSI in support of the European

More information

The Apple Store, Coombe Lodge, Blagdon BS40 7RG,

The Apple Store, Coombe Lodge, Blagdon BS40 7RG, 1 The General Data Protection Regulation ( GDPR ) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union ( EU ) and will be directly applicable in all EU Member

More information

DIGITIZING INDUSTRY, ICT STANDARDS TO

DIGITIZING INDUSTRY, ICT STANDARDS TO DIGITIZING INDUSTRY, ICT STANDARDS TO DELIVER ON DIGITAL SINGLE MARKET OBJECTIVES ETSI When Standards Support Policy 14 November 2016 Emilio Davila Gonzalez Unit Start ups & Innovation, EC DG Connect 72%

More information

Committee on the Internal Market and Consumer Protection

Committee on the Internal Market and Consumer Protection European Parliament 2014-2019 AMDMTS: 12 Regulation on ISA, the "EU Cybersecurity Agency", and repealing Regulation (EU) s created with Go to http://www.at4am.ep.parl.union.eu \000000.doc United in diversity

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know

EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know The General Data Protection Regulation (GDPR) The eprivacy Regulation (epr) The Network and Information Security Directive

More information

Memorandum of Understanding

Memorandum of Understanding Memorandum of Understanding between the European Commission, the European Union Agency for Railways and the European rail sector associations (CER, EIM, EPTTOLA, ERFA, the ERTMS Users Group, GSM-R Industry

More information

13967/16 MK/mj 1 DG D 2B

13967/16 MK/mj 1 DG D 2B Council of the European Union Brussels, 4 November 2016 (OR. en) 13967/16 'I/A' ITEM NOTE From: To: General Secretariat of the Council No. prev. doc.: 11911/3/16 REV 3 No. Cion doc.: 11013/16 Subject:

More information

NIS-Directive and Smart Grids

NIS-Directive and Smart Grids NIS-Directive and Smart Grids Workshop on European Smart Grid Cybersecurity: Emerging Threats and Countermeasures Marie Holzleitner Table of Content Aims & Objectives Affected Parties Selected Requirements

More information

INFORMATIVE NOTICE ON PERSONAL DATA PROCESSING

INFORMATIVE NOTICE ON PERSONAL DATA PROCESSING INFORMATIVE NOTICE ON PERSONAL DATA PROCESSING Re: Informative notice on data processing pursuant to Art. 13 of Legislative Decree 196/2003 as amended, to Art. 13 of EU Regulation 2016/679 and to Italian

More information

DIGITALSIGN - CERTIFICADORA DIGITAL, SA.

DIGITALSIGN - CERTIFICADORA DIGITAL, SA. DIGITALSIGN - CERTIFICADORA DIGITAL, SA. TIMESTAMP POLICY VERSION 1.1 21/12/2017 Page 1 / 18 VERSION HISTORY Date Edition n.º Content 10/04/2013 1.0 Initial drafting 21/12/2017 1.1 Revision AUTHORIZATIONS

More information

General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR) BCD Travel s Response to the EU General Data Protection Regulation (GDPR) November 2017 Page 1 Response to the EU GDPR Copyright 2017 by BCD Travel N.V. All rights reserved. November 2017 Copyright 2017

More information

DATA PROCESSING TERMS

DATA PROCESSING TERMS DATA PROCESSING TERMS Safetica Technologies s.r.o. These Data Processing Terms (hereinafter the Terms ) govern the rights and obligations between the Software User (hereinafter the User ) and Safetica

More information