ECA Trusted Agent Handbook

Size: px
Start display at page:

Download "ECA Trusted Agent Handbook"

Transcription

1 Revision 8.0 September 4, 2015

2 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for Symantec External Certificate Authority (ECA) digital certificates. Symantec is a U.S. Government-approved Certification Authority (CA) authorized to issue ECA certificates to entities needing to conduct business with government organizations. Subscribers of ECA certificates include government (federal, state and local) contractors, government (state and local) employees and other entities doing electronic transactions with government agencies. ECA certificates enable secure electronic communication and transactions with government entities and departments. Symantec ECA certificates can be used for authentication at government Web sites and to digitally sign and encrypt , documents, and electronic forms. A digital certificate is an electronic credential that uses public key cryptography. Each holder of a digital certificate has a public/private key pair. The private key, which is held securely by the holder, is used for creating digital signatures. The public key, which may be widely distributed, is used to enable other users to encrypt messages to the holder of the private key. In order to rely on a public key, it is necessary that it be certified by an entity called a CA. The CA binds a user s public key to their identity, certifies the public key, and creates the electronic credential called a digital certificate. Government policy requires that before an individual can be issued an ECA certificate, the subscriber s identity must be verified by appearing before a notary, a Trusted Agent, a U.S. consular officer or an authorized DoD employee. For verification purposes, government policy permits the use of an authorized Trusted Agent to perform in-person identity verification of your organization s certificate subscribers. As a Trusted Agent for your organization, you will be performing a key role in the validation of the identity of subscribers enrolling for Symantec ECA certificates. Your responsibilities include: Verifying subscriber identity and country of citizenship Electronically submitting enrollment, revocation, and key recovery requests to Symantec Archiving subscriber enrollment, revocation, and key recovery forms 2

3 Enrolling as a Trusted Agent The following instructions define the procedures and policies for becoming a Trusted Agent and executing the duties of a Trusted Agent. To become a Trusted Agent (repeat for each new Trusted Agent in your organization): 1) Complete the Trusted Agent Authorization Form The Trusted Agent Authorization From (found in Exhibit 1 at the end of this handbook) identifies you to Symantec as a designated representative of your organization. It verifies that you are authorized to perform the role of Trusted Agent for certificate subscribers at your organization. 2) Enroll for your own Symantec ECA Certificate Enroll for an ECA Certificate at For the Enrollment Method, select Subscriber Enrollment Using Notary. Note: When you enroll for your ECA Certificate, you are required to appear before a notary to verify your identity. After you become a Trusted Agent, you are authorized to perform the function of the notary for your organization s ECA Certificate subscribers. 3) Send the completed forms to Symantec Mail the Trusted Agent Authorization Form, the Subscriber Enrollment Form, and your company documentation (if applicable) to Symantec at the address specified on the Subscriber Enrollment Form. Note: If you already have an ECA Certificate, you only need to fax the Trusted Agent Authorization Form to the authentication team of Symantec at ) Install your ECA Certificate and configure your client After Symantec approves your application, you will receive an with instructions for downloading and installing your ECA Certificate. Install your ECA Certificate and set up your client (for example, Microsoft Outlook) to sign and encrypt messages. You are now ready to function as your organization s Trusted Agent. Note: For details on configuring your client to sign and encrypt messages with your ECA Certificate, go to 3

4 Trusted Agent Procedures 1) Send the ECA Certificate enrollment instructions to each subscriber Before you can validate a subscriber s identity, the subscriber must enroll on the Symantec ECA Web site and select Subscriber Enrollment Using Trusted Agent. Provide your subscribers with the following enrollment information: ECA enrollment and installation instructions Follow the forms found on ECA enrollment form Your Symantec ECA Sales Order Number If you do not have your ECA sales order number, contact Symantec at eca_sales@symantec.com or (option 3). Also ensure your subscribers know your organization s legal name, exactly as it should be entered in the enrollment form. All subscribers must have their identity verified in person, either by appearing before a Trusted Agent (preferred method), a notary, or a U.S. consular officer. 2) Verify the subscriber s identity Your responsibilities include ensuring that the subscriber s identity is verified according to the ECA policy. You can meet directly with the subscriber or review the subscriber s notarized documentation: 2.1) If you meet face-to-face with the subscriber: a) The subscriber must present the enrollment form generated and printed during certificate enrollment. Review the form and make sure the form contains the subscriber s name, address, and your organization name. Section 1, Subscriber Information, must not contain any changes or modifications. b) Examine the following forms of identification presented by the subscriber. Acceptable forms of identification are: One government-issued photograph ID for proof of identity, such as a driver's license or military ID. One document for proof of citizenship, such as a passport, certified birth certificate, or certificate of naturalization or citizenship. **One document for proof of organizational affiliation, such as an employee ID that includes a photograph and which identifies the organization name. **Important: If the subscriber does not present an employee ID, you are responsible for verifying that the subscriber is a current member of the organization. Make sure there are no signs of forgery or modification of the IDs. c) On the Subscriber Enrollment Form, record the type, serial number, and expiration date for each ID presented by the subscriber. d) Have the subscriber sign the Subscriber Enrollment Form in Section 1, acknowledging 4

5 that he or she has read the Symantec ECA Subscriber Agreement and understands and accepts the responsibilities, including protection of the private key and using the ECA Certificate according to the terms and conditions set forth in the External Certificate Authority Certificate Practices Statement (CPS). e) Complete and sign Section 2 of the Subscriber Enrollment Form. f) Make a copy of the Subscriber Enrollment Form for the subscriber. g) File the original Subscriber Enrollment Form. h) Advise the subscriber that the encryption key will be escrowed at Symantec and may be recovered by the organization or a duly authorized law enforcement agent. 2.2) If you do not meet face-to-face with the subscriber: a) The subscriber must visit a public notary or a U.S. consular officer to present all forms of identification (as described above in section 2.1, step b), and have the Subscriber Enrollment Form notarized. b) The subscriber then sends you the notarized form he or she presented to the public notary or U.S. consular officer. c) Carefully examine the Subscriber Enrollment Form for accuracy, completeness, and to ensure that the form was properly signed and notarized. Make sure there are no signs of forgery or modification of the IDs. Important: If the subscriber does not use an employee ID for the second form of identification, you are responsible for ensuring the subscriber is a current member of the organization. 3) Enter subscriber enrollment information in the Bulk Enrollment Data Form Upon the approval of your application for enrolling as a Trusted Agent, you should have received the Bulk Enrollment Form Excel workbook. If you do not have this document, contact Symantec at eca-authentication@symantec.com. The Bulk Enrollment Form is an Excel workbook used to submit your subscribers enrollment data to Symantec. It includes the Bulk Enrollment Data Form and the Bulk Transmittal Form. The Bulk Enrollment Data Form contains one line for each subscriber. Insert additional lines as necessary for the total number of subscribers you are entering in the form. Important: Carefully enter the first name, last name, address, and country of citizenship for each subscriber exactly as shown on the Subscriber Enrollment Form. It is very important that this data is correct and current, as it will be used to approve the subscriber s ECA Certificate. 4) Complete the Bulk Transmittal Form The Bulk Transmittal Form is also located in the Bulk Enrollment Form Excel workbook. It contains the Trusted Agent (submitter) information, your corporate information, and your Sales Order Number. If you do not have your Sales Order Number, get it from your purchasing department or contact Symantec at eca_sales@symantec.com or , option 3. You must include your Dun and Bradstreet (D&B) number, as Symantec is required to verify the legitimacy of your organization. Also read the submitter acknowledgement to confirm that you have followed the required procedures for the Bulk Enrollment Form. 5

6 5) Securely send the Bulk Enrollment Form to Symantec Compose an and send the Bulk Enrollment Form Excel workbook to Digitally sign and encrypt this to protect the privacy of the subscriber data and enable Symantec to verify that the form was submitted by an authorized Trusted Agent (you). Important: Symantec will not open or respond to an that has not been signed and encrypted. If you send an unsigned, unencrypted , you will need to re-submit the form. Therefore, we recommend that you send a test before submitting actual subscriber data for the first time. To test the security of the bulk submittal process: a) Access the Symantec ECA repository at search.htm to download the encryption certificate for. i. In the Search by address section, enter ecatrustedagent@symantec.com and click Search. ii. Click the link for ECA TRUSTED AGENT (Valid). The Digital ID Information page appears. iii. Click Download. The Select Format page appears. iv. For ID Format, select Someone Else s ID for Microsoft IE/Outlook Express/Outlook and click Submit. The File Download window appears. v. Click Save. b) Create an entry in your mail client address book or contacts list for Symantec ECA using for the address. Associate the public key certificate with this entry. c) Compose a message with the subject Test ECA Submission. d) Address the message to. e) In the Bulk Enrollment Form, complete the Bulk Transmittal Sheet, but do not enter any subscriber data in the Bulk Enrollment Data Form. f) Attach a Bulk Enrollment Form to the . g) Select the options to sign and encrypt the message. If you have multiple certificates on your computer, make sure you use your ECA Certificate. h) Send the message and wait for an reply from Symantec indicating that the message was received. i) After you have successfully processed a test message, submit the actual Bulk Enrollment Form. 6) Archive the Subscriber Enrollment Forms For each subscriber entered on the Bulk Enrollment Form, archive the original copy of the completed Subscriber Enrollment Form, signed either by the pubic notary, U.S. consular officer, or you. You may need to reference these forms in the event of a problem with subscriber enrollment data. Also, ECA policy requires that these forms are archived and retrievable upon request for a period of at least ten years and six months. 7) Revoke a Subscriber s ECA Certificate Send the Revocation Notice Forms to your HR Department 6

7 Complete the Revocation Notice Forms and send them to the appropriate Human Resource Department(s) (or equivalent) in your organization to ensure that Symantec is notified of events requiring certificate revocation, such as termination of a subscriber from your organization. Revoke an ECA Certificate Important: You must immediately notify Symantec and request that a certificate be revoked if: (1) any information or fact material to the reliability of the certificate is no longer accurate, current, complete, or becomes misleading; or (2) you or your organization suspects any loss, disclosure, or other compromise of the subscriber's private key; or (3) the subscriber is no longer employed by, associated with, authorized by, or affiliated with the organization. To request revocation of a subscriber certificate, send a digitally signed and encrypted with the subject Certificate Revocation Request by TA to. The must contain the first and last name and address of the subscriber whose certificate is to be revoked. The must also indicate the reason for the revocation request. 8) Recover a Subscriber s Encryption Key A copy of the private key associated with the subscriber s ECA Encryption Certificate is securely escrowed at Symantec. If a subscriber loses access to the encryption private key, he or she can request the recovery of the escrowed copy of the key. Other than the subscriber, only an organization s legal officer, security officer, or human resources representative, or a law enforcement official (with a court-authorized order) may request recovery. The person requesting the key recovery (Key Requestor) must complete the Key Recovery Request Form and sign it in the presence of a notary or the Trusted Agent. If you cannot meet face-to-face with the Key Requestor (because the person works at a different facility or branch office), you can instruct the requestor to complete the Key Recovery Request Form, gather the necessary documentation, and go to a notary public to have the form notarized. The Key Requestor should send you the notarized form. After you verify that the previous steps have been completed successfully, send a digitally signed and encrypted with the subject Key Recovery Request by TA to ecatrustedagent@symantec.com. The must contain: The first and last name and address of the subscriber whose key is to be recovered. The reason for the recovery request. The Requestor Information as entered in Section A of the Key Recovery Request Form. When Symantec processes the key recovery request, the original ECA Certificate key pair will be revoked. Symantec then s the encrypted private key, and faxes the password needed to decrypt it, to the Key Requestor. 7

8 Exhibit 1 Trusted Agent Authorization Form I,, am an employee, partner, member, agent, or other associate [Insert Name} of ( Organization ) and I am authorized by the Organization [Insert Organization Name] to act as a Trusted Agent to validate the identity of employees and other authorized representatives of Organization ( Subscribers ) who are eligible to receive ECA digital certificates ( Certificates ) in accordance with the ECA Certificate Policy and Symantec s ECA Certificate Practices Statement. I acknowledge and agree that: (a) I am authorized to act on behalf of the Organization to perform the responsibilities as set forth in the Symantec ; (b) I have reviewed and I am familiar with the, the Symantec ECA CPS, and can carry out the responsibilities of a Trusted Agent accordingly; (c) All information I provide to Symantec will be accurate, current, complete, and not misleading, and Symantec is authorized to rely on the information submitted by me in identifying Subscribers as being employed, associated, affiliated with and/or authorized by Organization to receive Certificates; (d) I will immediately notify Symantec and request that a Subscriber(s) Certificate be revoked if: (1) any information or fact material to the reliability of the Certificate becomes misleading or is no longer accurate, current, or complete, (2) I, or the Organization, suspects any loss, disclosure, or other compromise of a Subscriber's Private Key, or (3) a Subscriber is no longer employed by, associated with, authorized by, or affiliated with the Organization. (e) I will immediately notify Symantec and request that a Subscriber(s) Encryption Private Key be recovered if: (1) the Subscriber formally acknowledge he/she lost access to his/her Encryption Private Key (2) or an authorized Organization official (other than me) or Law Enforcement Agent with Court Order requests the recovery of a Subscriber's Private Key (Signature) (Printed Name) (Title) (Date) 8

9 Exhibit 2 Revocation Notice Form (PUT IN EMPLOYEE S HR FILE) Employee s Name: The employee named in this file is a Subscriber of a Symantec ECA Certificate. This certificate was authorized by your organization and as such it may be revoked at the organization s sole discretion at any time and for any reason. In the event that this Subscriber is no longer employed, associated, affiliated with, or authorized by this organization to hold this certificate, the certificate should be revoked. Symantec, the issuer of the certificate, will revoke the Certificate promptly upon confirming that the person making the revocation request is authorized to do so or upon otherwise determining that the Certificate should be revoked To revoke the certificate, contact the subscriber s ECA Trusted Agent at your organization: Trusted Agent: Phone Number: In the event that the Trusted Agent is no longer available, contact Symantec promptly by sending a notice on company letterhead identifying the name and address of the employee whose certificate is to be revoked and the reason for the revocation request. Please FAX the revocation request to Symantec ECA Authentication at

10 Instructions to Requestor: Exhibit 3 ECA Key Recovery Request Form 1. Print out this form. 2. Complete Sections A & B of the form. Do not sign the form yet. This form can only be signed by the certificate Subscriber or the company representative (e.g. organization s legal officer, security officer, or human resources representative) in the presence of your corporate notary or other notary public. You are responsible for all fees (if any) charged by the notary. 3. Bring two forms of identification with you to the notary as follows: One widely recognized, government-issued Photo ID such as a Driver s License or Passport; and, One other type of identification (photo not required) such as a valid national credit card, an employee ID, a utility or tax bill, or insurance card. 4. Instruct the notary to read the instructions below and complete the Acknowledgement. 5. Sign your name (section A) in the presence of the notary. 6. Make and retain a copy of this form and the Subscriber Agreement for your records. 7. Provide the fee: The price of a key recovery is $ In the case that the requestor is also the subscriber, it is possible to request a replacement ECA certificate pair for no additional charge (as indicated in section A below). The fee is payable by check or your organization's valid sales order number (if applicable). If paying by check, indicate "ECA Key Recovery" in the Memo section of your check and mail payment separately to: ECA Key Recovery Processing & Fulfillment Symantec Corporation PO Box Dallas, TX Send the completed (original) notarized form along with a copy of the Photo ID presented to the notary by First Class Postal Mail, Federal Express, or other equivalent means to: Symantec Corporation Attn: Symantec ECA Authentication Support 350 Ellis Street Mountain View, California A. Requestor Information: Fields with a * must match the information in the ECA subscriber certificate. Ensure that the entries in these fields are accurate and legible. Check the appropriate box below: I am the subscriber of an ECA certificate associated with the encryption private key to be recovered. I want to revoke my existing ECA certificate pair and get a new ECA certificate pair as part of the recovery process. recovery process. OR I do not want a new ECA certificate pair as part of the I am not the subscriber of an ECA certificate to be recovered [Note: Other than the Subscriber, only an organization s legal officer, security officer, or human resources representative, or a law enforcement official (with a Court authorized order) may request recovery] B. Information about the ECA Certificate associated with the encryption key being recovered: - *First Name - *Last Name 10

11 - * Address - Valid From - Valid To - Serial Number - Status (Valid, Revoked, Expired) Payment Information: (select payment type): Check: Name on check Check # Organization s Valid Sales Order: Sales Order Number: Payment Amount: C. Declaration (to be signed in the presence of a notary) I do hereby make oath and/or affirm that all the information contained in this document is true and correct and that I am duly authorized to recover the encryption key for the certificate described in Section B. As a condition of receiving the recovered key, I hereby agree to comply with all laws and the subscriber s organization policies relating to protection and release of the recovered key. Your signature, made in the presence of a notary - First Name - Last Name - Organization - Postal Address - Address - Phone Number - Fax Number - Job Title Instructions to Notary: The document you are notarizing is part of the Key Recovery Request process for a Symantec Digital ID used in conjunction with programs authorized by the U.S. Department of Defense (DoD). The DoD requires that the personal identity of the applicant be validated. If you would like more information about Digital IDs or the enrollment process, visit Symantec at or contact Symantec Sales at , option Modify this form where necessary to assure compliance with the laws of your jurisdiction. Use the back side of this form if necessary. 2. Complete the Acknowledgement below. 3. Request and examine at least two pieces of Subscriber identification as follows: One government-issued photograph ID such as a driver s license, passport, or military ID, One valid employee ID that must include a photograph and identify organizational affiliation. 4. You must check the Subscriber s forms of identification even if you are acquainted with the Subscriber. C. Acknowledgement This section is to be completed by Notary Public State/Commonwealth/Province of ), County of ), Country ) 11

12 On (date), before me, (notary) personally appeared (subscriber), and proved to me on the basis of the presentation of the two forms of identification listed below, to be the person whose name is subscribed to the instrument, and acknowledged to me that he/she executed the same, and that by his/her signature on the instrument the person executed the instrument in my presence. ID# Type of ID Identifying Number Expiration Date 1* 2 * ID #1 must be accompanied by photo. - Notary Phone - Notary Address (optional) - My Commission Expires on 12

13 Instructions for Installing the Renewed ECA Trusted Agent Encryption Certificate In order to continue submitting bulk enrollments once the encryption certificate expires or upon notification from ECA Support, you will need to follow these steps. Step 1: Download the new Trusted Agent Certificate 1. Go to and enter in the address. 2. Select the Valid checkbox and click Search. 3. The search results will return two (1) certificates. Click the link for ECA TRUSTED AGENT On the next page, click Download at the bottom of the page. 5. In the ID Format list, select Someone Else s ID for Microsoft IE/Outlook Express/Outlook. If you are not using Microsoft Office Outlook, select the appropriate format for your application. Click the green Submit button. 6. A dialog box appears asking you if you want to open or safe this file. Select Save and save the certificate to your desktop (we recommend renaming it if you have any other certificates stored to your desktop). Step 2: Install the new Trusted Agent Certificate 1. Open Microsoft Office Outlook. 2. Select Go and click Contacts from the menu bar. 3. Double-click on the mail account for the ECA Trusted Agent. 4. Click the Certificates tab. 5. Click the Import button. 6. Select the new certificate you downloaded to your desktop and click on the Open button. A message will appear to confirm that you have successfully imported the certificate. 7. In the list, you will have two certificates listed. To set the new certificate you just imported as your default, select the new certificate and then click the Set as Default b utton. 8. Click Save and Close to save your changes 9. You can now submit your bulk enrollment requests encrypted to ecatrustedagent@symantec.com as you have done so in the past. 13

ORC ECA Subscriber Instructions for Individual Identity and Encryption Certificates

ORC ECA Subscriber Instructions for Individual Identity and Encryption Certificates ORC ECA Subscriber Instructions for Individual Identity and Encryption Certificates Getting Prepared Print these instructions for easy reference. (Note: this is a good test to see that you are able to

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective

More information

ORC ACES Subscriber Instructions. Component/Server Certificates

ORC ACES Subscriber Instructions. Component/Server Certificates ORC ACES Subscriber Instructions Component/Server Certificates 1 Getting Prepared What do I need to have on hand in order to complete the certifi cate process? Print these instruction for easy reference.

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.3 Effective

More information

SAFE-BioPharma RAS Privacy Policy

SAFE-BioPharma RAS Privacy Policy SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what

More information

VeriSign External Certification Authority Certification Practice Statement

VeriSign External Certification Authority Certification Practice Statement VeriSign External Certification Authority Certification Practice Statement Version 1.2 (Portions of this document have been redacted in accordance with the ECA Certificate Policy) 21 December 2007 1 VeriSign

More information

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate  Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 1.0 Effective Date: March 12, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

Apple Inc. Certification Authority Certification Practice Statement. Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA

Apple Inc. Certification Authority Certification Practice Statement. Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Version 4.0 Effective Date: September 18, 2013 Table of Contents

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

Escapees Temporary Mail Service Agreement 101 Rainbow Drive, Livingston, TX

Escapees Temporary Mail Service Agreement 101 Rainbow Drive, Livingston, TX Escapees Temporary Mail Service Agreement 101 Rainbow Drive, Livingston, TX 77399-9330 936-327-8873 888-757-2582 mailservice@escapees.com Date processed: PMB #: Member name(s): SKP #: Send packet to: Permanent

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.18 Effective Date: August 16, 2017 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

dataedge CA Certificate Issuance Policy

dataedge CA Certificate Issuance Policy Classification of Digital Certificate Digital Certificates are classified upon the purpose for which each class is used and the verification methods underlying the issuance of the certificate. Classification

More information

Privacy Policy. How we handle your information you provide to us. Updated: 14 March 2016

Privacy Policy. How we handle your information you provide to us. Updated: 14 March 2016 Privacy Policy How we handle your information you provide to us Updated: 14 March 2016 Overview Enteronline (Pty) Ltd and its affiliated companies and subsidiaries (collectively, Entrytime Enteronline,

More information

CCST Examination Application

CCST Examination Application 1. APPLICANT INFORMATION (Please print or type.) Prefix: Mr. Mrs. Ms. Miss Other Last name First name MI (you must provide your name as it appears on your photo identification) Membership IBEW UA Member

More information

ETSY.COM - PRIVACY POLICY

ETSY.COM - PRIVACY POLICY At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,

More information

Special requirements for CITSS users who have been approved by other jurisdictions and are representing a participant in Nova Scotia

Special requirements for CITSS users who have been approved by other jurisdictions and are representing a participant in Nova Scotia Guidance Document: User Registration in CITSS The first step in the process is user registration. To apply, you cannot have been: Convicted of a criminal offence in the last 5 years, unless a pardon has

More information

PPR TOKENS SALE PRIVACY POLICY. Last updated:

PPR TOKENS SALE PRIVACY POLICY. Last updated: PPR TOKENS SALE PRIVACY POLICY Last updated: 05.03.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant

More information

APPLICATION DEADLINE Postmarked by January 12, 2018

APPLICATION DEADLINE Postmarked by January 12, 2018 APPLICATION DEADLINE Postmarked by January 12, 2018 Dear Marketplace Vendor Applicant: The Grapevine Convention & Visitors Bureau invites you to apply to participate in the 34 th Annual Main Street Fest

More information

ID Theft Information Form - Instructions

ID Theft Information Form - Instructions ID Theft Information Form - Instructions Identity Theft may occur when someone uses your personally identifiable information such as your name or social security number (SSN) to obtain services from Charter

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013 Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013 Table of Contents 1. Introduction... 5 1.1. Trademarks... 5

More information

Recognition as an Account Agent (User Registration) in the Compliance Instrument Tracking System Service (CITSS)

Recognition as an Account Agent (User Registration) in the Compliance Instrument Tracking System Service (CITSS) Ontario s Cap and Trade Program How to Participate: Recognition as an Account Agent (User Registration) in the Compliance Instrument Tracking System Service (CITSS) ontario.ca/capandtrade Table of contents

More information

Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client

Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client Client s Responsibility Easy Time Clock, Inc. ( ETC ) is a client-led time and attendance program. The Client is solely responsible

More information

SSL Certificates Certificate Policy (CP)

SSL Certificates Certificate Policy (CP) SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full

More information

QNB Bank-ONLINE AGREEMENT

QNB Bank-ONLINE AGREEMENT This is an Agreement between you and QNB Bank ("QNB"). It explains the rules of your electronic access to your accounts through QNB Online. By using QNB-Online, you accept all the terms and conditions

More information

Emsi Privacy Shield Policy

Emsi Privacy Shield Policy Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (

More information

Electronic Authentication Steps for Accessing EvaluationWeb

Electronic Authentication Steps for Accessing EvaluationWeb Electronic Authentication Steps for Accessing EvaluationWeb Before EvaluationWeb access is granted, all persons requesting access must be e-authenticated (identity proofed) via the CDC s Secure Access

More information

Entrust SSL Web Server Certificate Subscription Agreement

Entrust SSL Web Server Certificate Subscription Agreement Entrust SSL Web Server Certificate Subscription Agreement ATTENTION - READ CAREFULLY: THIS SUBSCRIPTION AGREEMENT (THIS "AGREEMENT") IS A LEGAL CONTRACT BETWEEN THE PERSON, ENTITY, OR ORGANIZATION NAMED

More information

APPLICATION DEADLINE Postmarked by May 4, 2018

APPLICATION DEADLINE Postmarked by May 4, 2018 APPLICATION DEADLINE Postmarked by May 4, 2018 Dear Artisan Vendor Applicant: The Grapevine Convention & Visitors Bureau invites you to apply to participate in the 32 nd Annual GrapeFest A Texas Wine Experience

More information

INSTRUCTIONS. What are the steps to apply? What is this? Who can apply? How does it work? What does the test cover?

INSTRUCTIONS. What are the steps to apply? What is this? Who can apply? How does it work? What does the test cover? INSTRUCTIONS What is this? This program has been established to enable experienced fire sprinkler fitters/installers a means to demonstrate their knowledge in the field of fire sprinkler installation.

More information

CHAPTER 10 - ELECTRONIC COMMERCE SECTION SECTION GENERAL ADMINISTRATION

CHAPTER 10 - ELECTRONIC COMMERCE SECTION SECTION GENERAL ADMINISTRATION CHAPTER 10 - ELECTRONIC COMMERCE SECTION SECTION.0100 - GENERAL ADMINISTRATION 18 NCAC 10.0101 HOW TO CONTACT THE ELECTRONIC COMMERCE SECTION (a) The Electronic Commerce Section may be contacted by the

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

TRUSTIS FPS. Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate

TRUSTIS FPS. Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate TRUSTIS FPS Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate Important Notice: The information here is guidance on the minimum requirements of Enrolment

More information

Website Privacy Policy

Website Privacy Policy Website Privacy Policy We are very sensitive to privacy issues. The purpose of this Website Privacy Policy is to let you know how Associated Underwriters Insurance, but not limited to, Associated Underwriters

More information

Copyright 2017 Exostar LLC. All rights reserved. Phone One-Time Password User Guide October 2017

Copyright 2017 Exostar LLC. All rights reserved. Phone One-Time Password User Guide October 2017 Phone One-Time Password User Guide October 2017 Table of Contents Activation Process... 2 How do I know if I need Phone OTP?... 2 Purchase Information... 2 Activation... 7 Live Video Proofing... 9 Schedule

More information

APPLICATION DEADLINE Postmarked by January 12, 2018

APPLICATION DEADLINE Postmarked by January 12, 2018 APPLICATION DEADLINE Postmarked by January 12, 2018 Dear Artisan Vendor Applicant: The Grapevine Convention & Visitors Bureau invites you to apply to participate in the 34 th Annual Main Street Fest to

More information

Change Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account

Change Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account PAYER ID: SUBMITTER ID: 1 Provider Organization Practice/ Facility Name Change Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account Provider

More information

CertDigital Certification Services Policy

CertDigital Certification Services Policy CertDigital Certification Services Policy Page: 2 ISSUED BY : DEPARTAMENT NAME DATE ELECTRONIC SERVICES COMPARTMENT COMPARTMENT CHIEF 19.03.2011 APPROVED BY : DEPARTMENT NAME DATE MANAGEMENT OF POLICIES

More information

TEXAS MEDICARE (TRAILBLAZERS) CHANGE FORM MR085

TEXAS MEDICARE (TRAILBLAZERS) CHANGE FORM MR085 TEXAS MEDICARE (TRAILBLAZERS) CHANGE FORM MR085 HOW LONG DOES PRE-ENROLLMENT TAKE? Standard processing time is 20 days WHAT PROVIDER NUMBERS DO I USE? Six digit Medicare legacy provider ID NPI Number WHAT

More information

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 1. Welcome 1.1 Welcome to the Connect Transit Card Program. The Connect Card Program makes using public transit easier

More information

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages

More information

2. What is Personal Information and Non-Personally Identifiable Information?

2. What is Personal Information and Non-Personally Identifiable Information? Privacy Notice Snipp Interactive, Inc. Last Updated: February 11, 2016 Contents: 1. Introduction 2. What is Personal Information? 3. Information we collect about you 4. Use of Your Information 5. Location

More information

3 Months 6 Months 12 Months. Step 1 Choose a mailbox size. Check the box by the box size you would like to sign up for.

3 Months 6 Months 12 Months. Step 1 Choose a mailbox size. Check the box by the box size you would like to sign up for. The UPS Store 3155 Street Address: 936 SW 1 st Ave, Miami, fl 33130 Phone: 305.858.1221 Fax: 305.858.5548 Email: store3155@theupsstore.com The UPS Store Mailbox Application Kit Thanks for your interest

More information

CAP Examination Application

CAP Examination Application CAP Examination Application DIRECTIONS: Complete all sections of the application after reading through the CAP Handbook. Exam is given in English. It is your responsibility to thoroughly review all requirements.

More information

Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary. Version 3.3.

Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary. Version 3.3. Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary Version 3.3.2 May 30, 2007 Copyright 2007, Operational Research Consultants,

More information

Identity Theft Victim s Complaint and Affidavit

Identity Theft Victim s Complaint and Affidavit Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors

More information

Website Privacy Policy

Website Privacy Policy Website Privacy Policy Last updated: May 12, 2016 This privacy policy (the Privacy Policy ) applies to this website and all services provided through this website, including any games or sweepstakes (collectively,

More information

CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement

CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement Welcome to Certified Mail Envelopes and Certified Mail Labels web sites (the Site ) a website, trademark and business name owned and operated

More information

PAYMENT FORM. Name of Cardholder: Service Selected: (please select one below) Signature: Domestic

PAYMENT FORM. Name of Cardholder: Service Selected: (please select one below) Signature: Domestic Mail forwarding services can be a critical component of the successful operation of any business. For your convenience we are offering two (2) mail forwarding options. You may select the option that best

More information

Business Banking Online application

Business Banking Online application Business Banking Online application This application will register you to Business Banking Online and allow you to: l l l Access accounts held by ONE company or business entity Process Credit Direct Entry

More information

Digital Signatures Act 1

Digital Signatures Act 1 Issuer: Riigikogu Type: act In force from: 01.07.2014 In force until: 25.10.2016 Translation published: 08.07.2014 Digital Signatures Act 1 Amended by the following acts Passed 08.03.2000 RT I 2000, 26,

More information

Important Information

Important Information Important Information Important Information Effective from 13 January 2018 1. Your information 1.1 Who we are We are Coutts & Co, of 440 Strand, London WC2R OQS. We are a member of The Royal Bank of Scotland

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement

BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN TELECOM, INC. ( BCN" or "Company") has established practices and procedures adequate to ensure compliance

More information

Requirements for NCOWCICB certification with Business Succession Exemption Please read and follow carefully.

Requirements for NCOWCICB certification with Business Succession Exemption Please read and follow carefully. Requirements for NCOWCICB certification with Business Succession Exemption Please read and follow carefully. To be exempt from taking the 18 hour introductory course, the applicant must provide the following

More information

United States Department of Defense External Certification Authority X.509 Certificate Policy

United States Department of Defense External Certification Authority X.509 Certificate Policy United States Department of Defense External Certification Authority X.509 Certificate Policy Version 4.3 4 January 2012 THIS PAGE INTENTIONALLY LEFT BLANK ii TABLE OF CONTENTS 1 Introduction...1 1.1 Overview...1

More information

We collect information from you when You register for an Traders account to use the Services or Exchange and when You use such Services. V.

We collect information from you when You register for an Traders account to use the Services or Exchange and when You use such Services. V. Privacy Policy General A. The parties involved in reference to this policy are Company and You, the User of these sites: www.bittrademarket.com A.1 Bittrade Market decentralize system is the publisher

More information

Mississippi Medicaid. Mississippi Medicaid Program Provider Enrollment P.O. Box Jackson, Mississippi Complete form and mail original to:

Mississippi Medicaid. Mississippi Medicaid Program Provider Enrollment P.O. Box Jackson, Mississippi Complete form and mail original to: Mississippi Medicaid Complete form and mail original to: Blank forms may by copied. Call LTC at 888-941-8967 if you have questions. Please complete the following Mississippi Medicaid Provider EDI Enrollment

More information

Change Healthcare ERA Provider Information Form *This form is to ensure accuracy in updating the appropriate account

Change Healthcare ERA Provider Information Form *This form is to ensure accuracy in updating the appropriate account PAYER ID: SUBMITTER ID: 1 Provider Organization Practice/ Facility Name Change Healthcare ERA Provider Information Form *This form is to ensure accuracy in updating the appropriate account Provider Name

More information

MEDICARE Texas (TRAILBLAZERS) PRE-ENROLLMENT INSTRUCTIONS 00900

MEDICARE Texas (TRAILBLAZERS) PRE-ENROLLMENT INSTRUCTIONS 00900 MEDICARE Texas (TRAILBLAZERS) PRE-ENROLLMENT INSTRUCTIONS 00900 HOW LONG DOES PRE-ENROLLMENT TAKE? Standard processing time is 5 business days after receipt. WHAT FORM(S) SHOULD I COMPLETE? EDI Provider

More information

NATIONAL REGISTRY OF CERTIFIED CHEMISTS 125 Rose Ann Lane, West Grove, PA (phone) / (fax) /

NATIONAL REGISTRY OF CERTIFIED CHEMISTS 125 Rose Ann Lane, West Grove, PA (phone) / (fax) / NATIONAL REGISTRY OF CERTIFIED CHEMISTS 125 Rose Ann Lane, West Grove, PA 19390 610-322-0657 (phone) / 800-858-6273 (fax) / rphifer@nrcc6.org (email) 1 APPLICATION FOR CERTIFICATION AS A TOXICOLOGICAL

More information

BUZCOIN TOKENS SALE PRIVACY POLICY. Last updated:

BUZCOIN TOKENS SALE PRIVACY POLICY. Last updated: BUZCOIN TOKENS SALE PRIVACY POLICY Last updated: 20.10.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant

More information

By accessing your Congressional Federal Credit Union account(s) electronically with the use of Online Banking through a personal computer or any other

By accessing your Congressional Federal Credit Union account(s) electronically with the use of Online Banking through a personal computer or any other CONGRESSIONAL FEDERAL CREDIT UNION ELECTRONIC CORRESPONDENCE DISCLOSURE & AGREEMENT Please read this information carefully and print a copy and/or retain this information electronically for your records.

More information

These rights are known as 'subject access' rights and they are limited to information held by QAA about yourself.

These rights are known as 'subject access' rights and they are limited to information held by QAA about yourself. Making a subject access request - guidance Section 7 of the Data Protection Act 1998 states that a "data subject" (the person about whom the personal data refers) is entitled, upon written request, to

More information

Optional Practical Training (OPT) STEM Extension Packet

Optional Practical Training (OPT) STEM Extension Packet Optional Practical Training (OPT) STEM Extension Packet Step 1: Print out this OPT packet and mail or e-mail copies of the required documents and all supporting materials, to the International Programs

More information

Data Subject Access Request Form (GDPR)

Data Subject Access Request Form (GDPR) Data Subject Access Request Form (GDPR) Data Subject Access Request Form Article 15 of the EU General Data Protection Regulation (Regulation (EU) 2016/679) (GDPR) grants you the right to access your personal

More information

ELECTRONIC RECORDING MEMORANDUM OF UNDERSTANDING

ELECTRONIC RECORDING MEMORANDUM OF UNDERSTANDING ELECTRONIC RECORDING MEMORANDUM OF UNDERSTANDING THIS MEMORANDUM OF UNDERSTANDING, dated, is between Caldwell County, North Carolina ( COUNTY ), and COMPANY ) with offices at. Caldwell County desires to

More information

Application and Instructions for Firms

Application and Instructions for Firms United States Environmental Protection Agency Office of Prevention Pesticides, and Toxic Substances EPA 747-B-99-001 March 2010 https://www.epa.gov/lead Application and Instructions for Firms Applying

More information

Overview. IHCP Provider Name and Address Maintenance. indianamedicaid.com

Overview. IHCP Provider Name and Address Maintenance. indianamedicaid.com Overview Form indianamedicaid.com Enrolled providers use this form to update the name and address information that is part of their Provider Profile. Four name/address types are maintained for each provider

More information

Certipost E-Trust Services. Certificate Policy. for Normalized E-Trust Physical and Legal Persons. Version 1.1. Effective date 12 January 2011

Certipost E-Trust Services. Certificate Policy. for Normalized E-Trust Physical and Legal Persons. Version 1.1. Effective date 12 January 2011 Certipost E-Trust Services Version 1.1 Effective date 12 January 2011 Object Identification Number (OID) 0.3.2062.7.1.1.200.1 Certipost NV ALL RIGHTS RESERVED. 2 17 for Normalised E-Trust Certificates

More information

SANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018

SANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018 SANMINA CORPORATION PRIVACY POLICY Effective date: May 25, 2018 This Privacy Policy (the Policy ) sets forth the privacy principles that Sanmina Corporation and its subsidiaries (collectively, Sanmina

More information

DROPBOX.COM - PRIVACY POLICY

DROPBOX.COM - PRIVACY POLICY Dropbox Privacy Policy Last Modified: October 15, 2012 This Privacy Policy provides our policies and procedures for collecting, using, and disclosing your information. Users can access the Dropbox service

More information

Appendix B: Certified Technology Specialist Design (CTS-D) - Exam Application

Appendix B: Certified Technology Specialist Design (CTS-D) - Exam Application Appendix B: Certified Technology Specialist Design (CTS-D) - Exam Application Section I: Summary of Eligibility Requirements To be eligible to take the CTS-D exam, a candidate must: Hold current certification

More information

AVMA LIFE Agency FAQ

AVMA LIFE Agency FAQ AVMA LIFE Agency FAQ 1 How do I submit an application? Applications can be submitted using one of the following methods: Fax: 866.817.9009 ATTN: Affinity Department Mail: AVMA LIFE Trust Program Administrator

More information

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary

More information

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS)

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) This document (IMPS) facilitates an organization to provide relevant information to describe how it fulfils the normative

More information

Certified Assessor. Application for COBIT Certified Assessor

Certified Assessor. Application for COBIT Certified Assessor Application for COBIT Certified Application for COBIT Certified REQUIREMENTS TO BECOME A COBIT CERTIFIED ASSESSOR There is a required US $100 Application processing fee. Payment of the COBIT Certified

More information

Online Filing Guide for Charities and Professional Fundraisers

Online Filing Guide for Charities and Professional Fundraisers South Carolina Secretary of State Online Filing Guide for Charities and Professional Fundraisers April 2010 1205 Pendleton Street, Suite 525 Columbia, South Carolina 29201 www.sos.sc.gov Charitable Organizations

More information

AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS

AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS EXHIBIT C AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS 21. NYSE DATA PRODUCTS (a) SCOPE This Exhibit C applies insofar as Customer receives, uses and redistributes NYSE Data Products

More information

DATA PROTECTION ACT 1998

DATA PROTECTION ACT 1998 DP7(12/12) DATA PROTECTION ACT 1998 Application for access to your personal data held by Warwickshire Police Section 7(1)(a) & 7(1)(b)(i) & 7(1)(c)(i) of the Data Protection Act 1998 (Subject Access) Your

More information

Technical Trust Policy

Technical Trust Policy Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality

More information

Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission

Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission 1. Scope of services (1) The Bank is available to its Customer (account

More information

Consent to Electronic Delivery of Periodic Statements, Disclosures and Notices

Consent to Electronic Delivery of Periodic Statements, Disclosures and Notices ELECTRONIC STATEMENT DISCLOSURE AGREEMENT Access via Online Banking and Mobile Banking Effective August 1, 2017 Consent to Electronic Delivery of Periodic Statements, Disclosures and Notices Your consent

More information

OKLAHOMA HORSE RACING COMMISSION 2800 N. LINCOLN BLVD., SUITE 220 OKLAHOMA CITY, OK (405)

OKLAHOMA HORSE RACING COMMISSION 2800 N. LINCOLN BLVD., SUITE 220 OKLAHOMA CITY, OK (405) OKLAHOMA HORSE RACING COMMISSION 2800 N. LINCOLN BLVD., SUITE 220 OKLAHOMA CITY, OK 73105 (405) 522-8167 CY 2019 RENEWAL APPLICATION FOR INDEPENDENT TESTING LABORATORY LICENSE The non-refundable license

More information

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures

First Federal Savings Bank of Mascoutah, IL Agreement and Disclosures Agreement and Disclosures INTERNET BANKING TERMS AND CONDITIONS AGREEMENT This Agreement describes your rights and obligations as a user of the Online Banking Service and all other services made available

More information

Appendix B: Certified Technology Specialist - Installation (CTS-I) Exam Application

Appendix B: Certified Technology Specialist - Installation (CTS-I) Exam Application Appendix B: Certified Technology Specialist - Installation (CTS-I) Exam Application Section I: Summary of Eligibility Requirements In order to be considered eligible to sit for the CTS-I certification

More information

Participant Agreement. Updated December 1, 2016 and approved by the OK-First Advisory Committee

Participant Agreement. Updated December 1, 2016 and approved by the OK-First Advisory Committee 1 Participant Agreement Updated December 1, 2016 and approved by the OK-First Advisory Committee 1. Eligibility Participation in the OK-First program is limited to Oklahoma agencies with jurisdictional

More information

Certified Hospitality Supervisor

Certified Hospitality Supervisor CHS APPLICATION FORM Certified Hospitality Supervisor Ref Code: HOW TO APPLY Complete Sections 1-5 as thoroughly and accurately as possible. Have your direct/immediate supervisor or a corporate representative

More information

GROUPON.COM - PRIVACY POLICY

GROUPON.COM - PRIVACY POLICY PRIVACY STATEMENT Last Updated: September 13, 2012 This Privacy Statement ( Privacy Statement ) explains how Groupon, Inc. ( Groupon, us, our, and we ) uses your information and applies to all who use

More information

TATA CONSULTANCY SERVICES LIMITED CERTIFYING AUTHORITY REQUEST FORM FOR CLASS-2 CERTIFICATE / / Version Class-2 Certificate (Company)

TATA CONSULTANCY SERVICES LIMITED CERTIFYING AUTHORITY REQUEST FORM FOR CLASS-2 CERTIFICATE / / Version Class-2 Certificate (Company) TATA CONSULTANCY SERVICES LIMITED CERTIFYING AUTHORITY REQUEST FORM FOR CLASS-2 CERTIFICATE Instructions: USER TYPE COMPANY 1. Please fill the form in BLOCK LETTERS 2. Items marked with * are mandatory.

More information

FinFit will request and collect information in order to determine whether you qualify for FinFit Loans*.

FinFit will request and collect information in order to determine whether you qualify for FinFit Loans*. FinFit Web Privacy Policy General: This Privacy Policy ( Policy ) describes the ways FinFit, LLC ( FinFit, we, us) collects, stores, uses and protects information we receive from you or that you may provide

More information

ecare Vault, Inc. Privacy Policy

ecare Vault, Inc. Privacy Policy ecare Vault, Inc. Privacy Policy This document was last updated on May 18, 2017. ecare Vault, Inc. owns and operates the website www.ecarevault.com ( the Site ). ecare Vault also develops, operates and

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

LightGig Communications, LLC Privacy Policy

LightGig Communications, LLC Privacy Policy LightGig Communications, LLC Privacy Policy Effective Date: December 06, 2018 1. Privacy Policy Overview LightGig Communications, LLC ( we, us, or our ) operates the website https://lightgig.com/ (the

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

Railroad Medicare Electronic Data Interchange Application

Railroad Medicare Electronic Data Interchange Application Electronic Data Interchange Application Action Requested: Add New EDI Provider(s) Change/Update Submitter Information Apply for New Submitter ID Apply for New Receiver ID Delete Date: Submitter ID: ERN

More information

Law Enforcement. Handbook

Law Enforcement. Handbook Law Enforcement Handbook May 4, 2016 Table of Contents Introduction... 3 Contact Information... 4 Subscriber Account Information... 5 1 Retention Policy... 7 Types of Legal Requests... 8 Reimbursement

More information

ONE ID Identity and Access Management System

ONE ID Identity and Access Management System ONE ID Identity and Access Management System Local Registration Authority User Guide Document Identifier: 2274 Version: 1.8 Page 1 Copyright Notice Copyright 2011, ehealth Ontario All rights reserved No

More information

HOW TO OBTAIN A QUALIFYING PARTY CERTIFICATE

HOW TO OBTAIN A QUALIFYING PARTY CERTIFICATE HOW TO OBTAIN A QUALIFYING PARTY CERTIFICATE Every license must have at least one Qualifying Party (QP) for each classification of work covered by the license. This is the person who has the requisite

More information

Add or remove a digital signature in Office files

Add or remove a digital signature in Office files Add or remove a digital signature in Office files This article explains digital signatures (also known as digital ID), what they can be used for, and how you can use digital signatures in the following

More information

Enterprise Income Verification (EIV) System User Access Authorization Form

Enterprise Income Verification (EIV) System User Access Authorization Form Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be

More information