ECA Trusted Agent Handbook
|
|
- Ilene Bailey
- 5 years ago
- Views:
Transcription
1 Revision 8.0 September 4, 2015
2 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for Symantec External Certificate Authority (ECA) digital certificates. Symantec is a U.S. Government-approved Certification Authority (CA) authorized to issue ECA certificates to entities needing to conduct business with government organizations. Subscribers of ECA certificates include government (federal, state and local) contractors, government (state and local) employees and other entities doing electronic transactions with government agencies. ECA certificates enable secure electronic communication and transactions with government entities and departments. Symantec ECA certificates can be used for authentication at government Web sites and to digitally sign and encrypt , documents, and electronic forms. A digital certificate is an electronic credential that uses public key cryptography. Each holder of a digital certificate has a public/private key pair. The private key, which is held securely by the holder, is used for creating digital signatures. The public key, which may be widely distributed, is used to enable other users to encrypt messages to the holder of the private key. In order to rely on a public key, it is necessary that it be certified by an entity called a CA. The CA binds a user s public key to their identity, certifies the public key, and creates the electronic credential called a digital certificate. Government policy requires that before an individual can be issued an ECA certificate, the subscriber s identity must be verified by appearing before a notary, a Trusted Agent, a U.S. consular officer or an authorized DoD employee. For verification purposes, government policy permits the use of an authorized Trusted Agent to perform in-person identity verification of your organization s certificate subscribers. As a Trusted Agent for your organization, you will be performing a key role in the validation of the identity of subscribers enrolling for Symantec ECA certificates. Your responsibilities include: Verifying subscriber identity and country of citizenship Electronically submitting enrollment, revocation, and key recovery requests to Symantec Archiving subscriber enrollment, revocation, and key recovery forms 2
3 Enrolling as a Trusted Agent The following instructions define the procedures and policies for becoming a Trusted Agent and executing the duties of a Trusted Agent. To become a Trusted Agent (repeat for each new Trusted Agent in your organization): 1) Complete the Trusted Agent Authorization Form The Trusted Agent Authorization From (found in Exhibit 1 at the end of this handbook) identifies you to Symantec as a designated representative of your organization. It verifies that you are authorized to perform the role of Trusted Agent for certificate subscribers at your organization. 2) Enroll for your own Symantec ECA Certificate Enroll for an ECA Certificate at For the Enrollment Method, select Subscriber Enrollment Using Notary. Note: When you enroll for your ECA Certificate, you are required to appear before a notary to verify your identity. After you become a Trusted Agent, you are authorized to perform the function of the notary for your organization s ECA Certificate subscribers. 3) Send the completed forms to Symantec Mail the Trusted Agent Authorization Form, the Subscriber Enrollment Form, and your company documentation (if applicable) to Symantec at the address specified on the Subscriber Enrollment Form. Note: If you already have an ECA Certificate, you only need to fax the Trusted Agent Authorization Form to the authentication team of Symantec at ) Install your ECA Certificate and configure your client After Symantec approves your application, you will receive an with instructions for downloading and installing your ECA Certificate. Install your ECA Certificate and set up your client (for example, Microsoft Outlook) to sign and encrypt messages. You are now ready to function as your organization s Trusted Agent. Note: For details on configuring your client to sign and encrypt messages with your ECA Certificate, go to 3
4 Trusted Agent Procedures 1) Send the ECA Certificate enrollment instructions to each subscriber Before you can validate a subscriber s identity, the subscriber must enroll on the Symantec ECA Web site and select Subscriber Enrollment Using Trusted Agent. Provide your subscribers with the following enrollment information: ECA enrollment and installation instructions Follow the forms found on ECA enrollment form Your Symantec ECA Sales Order Number If you do not have your ECA sales order number, contact Symantec at eca_sales@symantec.com or (option 3). Also ensure your subscribers know your organization s legal name, exactly as it should be entered in the enrollment form. All subscribers must have their identity verified in person, either by appearing before a Trusted Agent (preferred method), a notary, or a U.S. consular officer. 2) Verify the subscriber s identity Your responsibilities include ensuring that the subscriber s identity is verified according to the ECA policy. You can meet directly with the subscriber or review the subscriber s notarized documentation: 2.1) If you meet face-to-face with the subscriber: a) The subscriber must present the enrollment form generated and printed during certificate enrollment. Review the form and make sure the form contains the subscriber s name, address, and your organization name. Section 1, Subscriber Information, must not contain any changes or modifications. b) Examine the following forms of identification presented by the subscriber. Acceptable forms of identification are: One government-issued photograph ID for proof of identity, such as a driver's license or military ID. One document for proof of citizenship, such as a passport, certified birth certificate, or certificate of naturalization or citizenship. **One document for proof of organizational affiliation, such as an employee ID that includes a photograph and which identifies the organization name. **Important: If the subscriber does not present an employee ID, you are responsible for verifying that the subscriber is a current member of the organization. Make sure there are no signs of forgery or modification of the IDs. c) On the Subscriber Enrollment Form, record the type, serial number, and expiration date for each ID presented by the subscriber. d) Have the subscriber sign the Subscriber Enrollment Form in Section 1, acknowledging 4
5 that he or she has read the Symantec ECA Subscriber Agreement and understands and accepts the responsibilities, including protection of the private key and using the ECA Certificate according to the terms and conditions set forth in the External Certificate Authority Certificate Practices Statement (CPS). e) Complete and sign Section 2 of the Subscriber Enrollment Form. f) Make a copy of the Subscriber Enrollment Form for the subscriber. g) File the original Subscriber Enrollment Form. h) Advise the subscriber that the encryption key will be escrowed at Symantec and may be recovered by the organization or a duly authorized law enforcement agent. 2.2) If you do not meet face-to-face with the subscriber: a) The subscriber must visit a public notary or a U.S. consular officer to present all forms of identification (as described above in section 2.1, step b), and have the Subscriber Enrollment Form notarized. b) The subscriber then sends you the notarized form he or she presented to the public notary or U.S. consular officer. c) Carefully examine the Subscriber Enrollment Form for accuracy, completeness, and to ensure that the form was properly signed and notarized. Make sure there are no signs of forgery or modification of the IDs. Important: If the subscriber does not use an employee ID for the second form of identification, you are responsible for ensuring the subscriber is a current member of the organization. 3) Enter subscriber enrollment information in the Bulk Enrollment Data Form Upon the approval of your application for enrolling as a Trusted Agent, you should have received the Bulk Enrollment Form Excel workbook. If you do not have this document, contact Symantec at eca-authentication@symantec.com. The Bulk Enrollment Form is an Excel workbook used to submit your subscribers enrollment data to Symantec. It includes the Bulk Enrollment Data Form and the Bulk Transmittal Form. The Bulk Enrollment Data Form contains one line for each subscriber. Insert additional lines as necessary for the total number of subscribers you are entering in the form. Important: Carefully enter the first name, last name, address, and country of citizenship for each subscriber exactly as shown on the Subscriber Enrollment Form. It is very important that this data is correct and current, as it will be used to approve the subscriber s ECA Certificate. 4) Complete the Bulk Transmittal Form The Bulk Transmittal Form is also located in the Bulk Enrollment Form Excel workbook. It contains the Trusted Agent (submitter) information, your corporate information, and your Sales Order Number. If you do not have your Sales Order Number, get it from your purchasing department or contact Symantec at eca_sales@symantec.com or , option 3. You must include your Dun and Bradstreet (D&B) number, as Symantec is required to verify the legitimacy of your organization. Also read the submitter acknowledgement to confirm that you have followed the required procedures for the Bulk Enrollment Form. 5
6 5) Securely send the Bulk Enrollment Form to Symantec Compose an and send the Bulk Enrollment Form Excel workbook to Digitally sign and encrypt this to protect the privacy of the subscriber data and enable Symantec to verify that the form was submitted by an authorized Trusted Agent (you). Important: Symantec will not open or respond to an that has not been signed and encrypted. If you send an unsigned, unencrypted , you will need to re-submit the form. Therefore, we recommend that you send a test before submitting actual subscriber data for the first time. To test the security of the bulk submittal process: a) Access the Symantec ECA repository at search.htm to download the encryption certificate for. i. In the Search by address section, enter ecatrustedagent@symantec.com and click Search. ii. Click the link for ECA TRUSTED AGENT (Valid). The Digital ID Information page appears. iii. Click Download. The Select Format page appears. iv. For ID Format, select Someone Else s ID for Microsoft IE/Outlook Express/Outlook and click Submit. The File Download window appears. v. Click Save. b) Create an entry in your mail client address book or contacts list for Symantec ECA using for the address. Associate the public key certificate with this entry. c) Compose a message with the subject Test ECA Submission. d) Address the message to. e) In the Bulk Enrollment Form, complete the Bulk Transmittal Sheet, but do not enter any subscriber data in the Bulk Enrollment Data Form. f) Attach a Bulk Enrollment Form to the . g) Select the options to sign and encrypt the message. If you have multiple certificates on your computer, make sure you use your ECA Certificate. h) Send the message and wait for an reply from Symantec indicating that the message was received. i) After you have successfully processed a test message, submit the actual Bulk Enrollment Form. 6) Archive the Subscriber Enrollment Forms For each subscriber entered on the Bulk Enrollment Form, archive the original copy of the completed Subscriber Enrollment Form, signed either by the pubic notary, U.S. consular officer, or you. You may need to reference these forms in the event of a problem with subscriber enrollment data. Also, ECA policy requires that these forms are archived and retrievable upon request for a period of at least ten years and six months. 7) Revoke a Subscriber s ECA Certificate Send the Revocation Notice Forms to your HR Department 6
7 Complete the Revocation Notice Forms and send them to the appropriate Human Resource Department(s) (or equivalent) in your organization to ensure that Symantec is notified of events requiring certificate revocation, such as termination of a subscriber from your organization. Revoke an ECA Certificate Important: You must immediately notify Symantec and request that a certificate be revoked if: (1) any information or fact material to the reliability of the certificate is no longer accurate, current, complete, or becomes misleading; or (2) you or your organization suspects any loss, disclosure, or other compromise of the subscriber's private key; or (3) the subscriber is no longer employed by, associated with, authorized by, or affiliated with the organization. To request revocation of a subscriber certificate, send a digitally signed and encrypted with the subject Certificate Revocation Request by TA to. The must contain the first and last name and address of the subscriber whose certificate is to be revoked. The must also indicate the reason for the revocation request. 8) Recover a Subscriber s Encryption Key A copy of the private key associated with the subscriber s ECA Encryption Certificate is securely escrowed at Symantec. If a subscriber loses access to the encryption private key, he or she can request the recovery of the escrowed copy of the key. Other than the subscriber, only an organization s legal officer, security officer, or human resources representative, or a law enforcement official (with a court-authorized order) may request recovery. The person requesting the key recovery (Key Requestor) must complete the Key Recovery Request Form and sign it in the presence of a notary or the Trusted Agent. If you cannot meet face-to-face with the Key Requestor (because the person works at a different facility or branch office), you can instruct the requestor to complete the Key Recovery Request Form, gather the necessary documentation, and go to a notary public to have the form notarized. The Key Requestor should send you the notarized form. After you verify that the previous steps have been completed successfully, send a digitally signed and encrypted with the subject Key Recovery Request by TA to ecatrustedagent@symantec.com. The must contain: The first and last name and address of the subscriber whose key is to be recovered. The reason for the recovery request. The Requestor Information as entered in Section A of the Key Recovery Request Form. When Symantec processes the key recovery request, the original ECA Certificate key pair will be revoked. Symantec then s the encrypted private key, and faxes the password needed to decrypt it, to the Key Requestor. 7
8 Exhibit 1 Trusted Agent Authorization Form I,, am an employee, partner, member, agent, or other associate [Insert Name} of ( Organization ) and I am authorized by the Organization [Insert Organization Name] to act as a Trusted Agent to validate the identity of employees and other authorized representatives of Organization ( Subscribers ) who are eligible to receive ECA digital certificates ( Certificates ) in accordance with the ECA Certificate Policy and Symantec s ECA Certificate Practices Statement. I acknowledge and agree that: (a) I am authorized to act on behalf of the Organization to perform the responsibilities as set forth in the Symantec ; (b) I have reviewed and I am familiar with the, the Symantec ECA CPS, and can carry out the responsibilities of a Trusted Agent accordingly; (c) All information I provide to Symantec will be accurate, current, complete, and not misleading, and Symantec is authorized to rely on the information submitted by me in identifying Subscribers as being employed, associated, affiliated with and/or authorized by Organization to receive Certificates; (d) I will immediately notify Symantec and request that a Subscriber(s) Certificate be revoked if: (1) any information or fact material to the reliability of the Certificate becomes misleading or is no longer accurate, current, or complete, (2) I, or the Organization, suspects any loss, disclosure, or other compromise of a Subscriber's Private Key, or (3) a Subscriber is no longer employed by, associated with, authorized by, or affiliated with the Organization. (e) I will immediately notify Symantec and request that a Subscriber(s) Encryption Private Key be recovered if: (1) the Subscriber formally acknowledge he/she lost access to his/her Encryption Private Key (2) or an authorized Organization official (other than me) or Law Enforcement Agent with Court Order requests the recovery of a Subscriber's Private Key (Signature) (Printed Name) (Title) (Date) 8
9 Exhibit 2 Revocation Notice Form (PUT IN EMPLOYEE S HR FILE) Employee s Name: The employee named in this file is a Subscriber of a Symantec ECA Certificate. This certificate was authorized by your organization and as such it may be revoked at the organization s sole discretion at any time and for any reason. In the event that this Subscriber is no longer employed, associated, affiliated with, or authorized by this organization to hold this certificate, the certificate should be revoked. Symantec, the issuer of the certificate, will revoke the Certificate promptly upon confirming that the person making the revocation request is authorized to do so or upon otherwise determining that the Certificate should be revoked To revoke the certificate, contact the subscriber s ECA Trusted Agent at your organization: Trusted Agent: Phone Number: In the event that the Trusted Agent is no longer available, contact Symantec promptly by sending a notice on company letterhead identifying the name and address of the employee whose certificate is to be revoked and the reason for the revocation request. Please FAX the revocation request to Symantec ECA Authentication at
10 Instructions to Requestor: Exhibit 3 ECA Key Recovery Request Form 1. Print out this form. 2. Complete Sections A & B of the form. Do not sign the form yet. This form can only be signed by the certificate Subscriber or the company representative (e.g. organization s legal officer, security officer, or human resources representative) in the presence of your corporate notary or other notary public. You are responsible for all fees (if any) charged by the notary. 3. Bring two forms of identification with you to the notary as follows: One widely recognized, government-issued Photo ID such as a Driver s License or Passport; and, One other type of identification (photo not required) such as a valid national credit card, an employee ID, a utility or tax bill, or insurance card. 4. Instruct the notary to read the instructions below and complete the Acknowledgement. 5. Sign your name (section A) in the presence of the notary. 6. Make and retain a copy of this form and the Subscriber Agreement for your records. 7. Provide the fee: The price of a key recovery is $ In the case that the requestor is also the subscriber, it is possible to request a replacement ECA certificate pair for no additional charge (as indicated in section A below). The fee is payable by check or your organization's valid sales order number (if applicable). If paying by check, indicate "ECA Key Recovery" in the Memo section of your check and mail payment separately to: ECA Key Recovery Processing & Fulfillment Symantec Corporation PO Box Dallas, TX Send the completed (original) notarized form along with a copy of the Photo ID presented to the notary by First Class Postal Mail, Federal Express, or other equivalent means to: Symantec Corporation Attn: Symantec ECA Authentication Support 350 Ellis Street Mountain View, California A. Requestor Information: Fields with a * must match the information in the ECA subscriber certificate. Ensure that the entries in these fields are accurate and legible. Check the appropriate box below: I am the subscriber of an ECA certificate associated with the encryption private key to be recovered. I want to revoke my existing ECA certificate pair and get a new ECA certificate pair as part of the recovery process. recovery process. OR I do not want a new ECA certificate pair as part of the I am not the subscriber of an ECA certificate to be recovered [Note: Other than the Subscriber, only an organization s legal officer, security officer, or human resources representative, or a law enforcement official (with a Court authorized order) may request recovery] B. Information about the ECA Certificate associated with the encryption key being recovered: - *First Name - *Last Name 10
11 - * Address - Valid From - Valid To - Serial Number - Status (Valid, Revoked, Expired) Payment Information: (select payment type): Check: Name on check Check # Organization s Valid Sales Order: Sales Order Number: Payment Amount: C. Declaration (to be signed in the presence of a notary) I do hereby make oath and/or affirm that all the information contained in this document is true and correct and that I am duly authorized to recover the encryption key for the certificate described in Section B. As a condition of receiving the recovered key, I hereby agree to comply with all laws and the subscriber s organization policies relating to protection and release of the recovered key. Your signature, made in the presence of a notary - First Name - Last Name - Organization - Postal Address - Address - Phone Number - Fax Number - Job Title Instructions to Notary: The document you are notarizing is part of the Key Recovery Request process for a Symantec Digital ID used in conjunction with programs authorized by the U.S. Department of Defense (DoD). The DoD requires that the personal identity of the applicant be validated. If you would like more information about Digital IDs or the enrollment process, visit Symantec at or contact Symantec Sales at , option Modify this form where necessary to assure compliance with the laws of your jurisdiction. Use the back side of this form if necessary. 2. Complete the Acknowledgement below. 3. Request and examine at least two pieces of Subscriber identification as follows: One government-issued photograph ID such as a driver s license, passport, or military ID, One valid employee ID that must include a photograph and identify organizational affiliation. 4. You must check the Subscriber s forms of identification even if you are acquainted with the Subscriber. C. Acknowledgement This section is to be completed by Notary Public State/Commonwealth/Province of ), County of ), Country ) 11
12 On (date), before me, (notary) personally appeared (subscriber), and proved to me on the basis of the presentation of the two forms of identification listed below, to be the person whose name is subscribed to the instrument, and acknowledged to me that he/she executed the same, and that by his/her signature on the instrument the person executed the instrument in my presence. ID# Type of ID Identifying Number Expiration Date 1* 2 * ID #1 must be accompanied by photo. - Notary Phone - Notary Address (optional) - My Commission Expires on 12
13 Instructions for Installing the Renewed ECA Trusted Agent Encryption Certificate In order to continue submitting bulk enrollments once the encryption certificate expires or upon notification from ECA Support, you will need to follow these steps. Step 1: Download the new Trusted Agent Certificate 1. Go to and enter in the address. 2. Select the Valid checkbox and click Search. 3. The search results will return two (1) certificates. Click the link for ECA TRUSTED AGENT On the next page, click Download at the bottom of the page. 5. In the ID Format list, select Someone Else s ID for Microsoft IE/Outlook Express/Outlook. If you are not using Microsoft Office Outlook, select the appropriate format for your application. Click the green Submit button. 6. A dialog box appears asking you if you want to open or safe this file. Select Save and save the certificate to your desktop (we recommend renaming it if you have any other certificates stored to your desktop). Step 2: Install the new Trusted Agent Certificate 1. Open Microsoft Office Outlook. 2. Select Go and click Contacts from the menu bar. 3. Double-click on the mail account for the ECA Trusted Agent. 4. Click the Certificates tab. 5. Click the Import button. 6. Select the new certificate you downloaded to your desktop and click on the Open button. A message will appear to confirm that you have successfully imported the certificate. 7. In the list, you will have two certificates listed. To set the new certificate you just imported as your default, select the new certificate and then click the Set as Default b utton. 8. Click Save and Close to save your changes 9. You can now submit your bulk enrollment requests encrypted to ecatrustedagent@symantec.com as you have done so in the past. 13
ORC ECA Subscriber Instructions for Individual Identity and Encryption Certificates
ORC ECA Subscriber Instructions for Individual Identity and Encryption Certificates Getting Prepared Print these instructions for easy reference. (Note: this is a good test to see that you are able to
More informationApple Inc. Certification Authority Certification Practice Statement
Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective
More informationORC ACES Subscriber Instructions. Component/Server Certificates
ORC ACES Subscriber Instructions Component/Server Certificates 1 Getting Prepared What do I need to have on hand in order to complete the certifi cate process? Print these instruction for easy reference.
More informationApple Inc. Certification Authority Certification Practice Statement
Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.3 Effective
More informationSAFE-BioPharma RAS Privacy Policy
SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what
More informationVeriSign External Certification Authority Certification Practice Statement
VeriSign External Certification Authority Certification Practice Statement Version 1.2 (Portions of this document have been redacted in accordance with the ECA Certificate Policy) 21 December 2007 1 VeriSign
More informationApple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 1.0 Effective Date: March 12, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
More informationApple Inc. Certification Authority Certification Practice Statement. Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA
Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Version 4.0 Effective Date: September 18, 2013 Table of Contents
More informationCERTIFICATE POLICY CIGNA PKI Certificates
CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...
More informationEscapees Temporary Mail Service Agreement 101 Rainbow Drive, Livingston, TX
Escapees Temporary Mail Service Agreement 101 Rainbow Drive, Livingston, TX 77399-9330 936-327-8873 888-757-2582 mailservice@escapees.com Date processed: PMB #: Member name(s): SKP #: Send packet to: Permanent
More informationApple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.18 Effective Date: August 16, 2017 Table of Contents 1. Introduction... 5 1.1. Trademarks...
More informationdataedge CA Certificate Issuance Policy
Classification of Digital Certificate Digital Certificates are classified upon the purpose for which each class is used and the verification methods underlying the issuance of the certificate. Classification
More informationPrivacy Policy. How we handle your information you provide to us. Updated: 14 March 2016
Privacy Policy How we handle your information you provide to us Updated: 14 March 2016 Overview Enteronline (Pty) Ltd and its affiliated companies and subsidiaries (collectively, Entrytime Enteronline,
More informationCCST Examination Application
1. APPLICANT INFORMATION (Please print or type.) Prefix: Mr. Mrs. Ms. Miss Other Last name First name MI (you must provide your name as it appears on your photo identification) Membership IBEW UA Member
More informationETSY.COM - PRIVACY POLICY
At Etsy, we value our community. You trust us with your information, and we re serious about that responsibility. We believe in transparency, and we re committed to being upfront about our privacy practices,
More informationSpecial requirements for CITSS users who have been approved by other jurisdictions and are representing a participant in Nova Scotia
Guidance Document: User Registration in CITSS The first step in the process is user registration. To apply, you cannot have been: Convicted of a criminal offence in the last 5 years, unless a pardon has
More informationPPR TOKENS SALE PRIVACY POLICY. Last updated:
PPR TOKENS SALE PRIVACY POLICY Last updated: 05.03.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant
More informationAPPLICATION DEADLINE Postmarked by January 12, 2018
APPLICATION DEADLINE Postmarked by January 12, 2018 Dear Marketplace Vendor Applicant: The Grapevine Convention & Visitors Bureau invites you to apply to participate in the 34 th Annual Main Street Fest
More informationID Theft Information Form - Instructions
ID Theft Information Form - Instructions Identity Theft may occur when someone uses your personally identifiable information such as your name or social security number (SSN) to obtain services from Charter
More informationApple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013 Table of Contents 1. Introduction... 5 1.1. Trademarks... 5
More informationRecognition as an Account Agent (User Registration) in the Compliance Instrument Tracking System Service (CITSS)
Ontario s Cap and Trade Program How to Participate: Recognition as an Account Agent (User Registration) in the Compliance Instrument Tracking System Service (CITSS) ontario.ca/capandtrade Table of contents
More informationTerms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client
Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client Client s Responsibility Easy Time Clock, Inc. ( ETC ) is a client-led time and attendance program. The Client is solely responsible
More informationSSL Certificates Certificate Policy (CP)
SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full
More informationQNB Bank-ONLINE AGREEMENT
This is an Agreement between you and QNB Bank ("QNB"). It explains the rules of your electronic access to your accounts through QNB Online. By using QNB-Online, you accept all the terms and conditions
More informationEmsi Privacy Shield Policy
Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (
More informationElectronic Authentication Steps for Accessing EvaluationWeb
Electronic Authentication Steps for Accessing EvaluationWeb Before EvaluationWeb access is granted, all persons requesting access must be e-authenticated (identity proofed) via the CDC s Secure Access
More informationEntrust SSL Web Server Certificate Subscription Agreement
Entrust SSL Web Server Certificate Subscription Agreement ATTENTION - READ CAREFULLY: THIS SUBSCRIPTION AGREEMENT (THIS "AGREEMENT") IS A LEGAL CONTRACT BETWEEN THE PERSON, ENTITY, OR ORGANIZATION NAMED
More informationAPPLICATION DEADLINE Postmarked by May 4, 2018
APPLICATION DEADLINE Postmarked by May 4, 2018 Dear Artisan Vendor Applicant: The Grapevine Convention & Visitors Bureau invites you to apply to participate in the 32 nd Annual GrapeFest A Texas Wine Experience
More informationINSTRUCTIONS. What are the steps to apply? What is this? Who can apply? How does it work? What does the test cover?
INSTRUCTIONS What is this? This program has been established to enable experienced fire sprinkler fitters/installers a means to demonstrate their knowledge in the field of fire sprinkler installation.
More informationCHAPTER 10 - ELECTRONIC COMMERCE SECTION SECTION GENERAL ADMINISTRATION
CHAPTER 10 - ELECTRONIC COMMERCE SECTION SECTION.0100 - GENERAL ADMINISTRATION 18 NCAC 10.0101 HOW TO CONTACT THE ELECTRONIC COMMERCE SECTION (a) The Electronic Commerce Section may be contacted by the
More informationLET S ENCRYPT SUBSCRIBER AGREEMENT
Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf
More informationTRUSTIS FPS. Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate
TRUSTIS FPS Enrolment Requirements: Acceptable Evidence in Support of an Application for a Digital Certificate Important Notice: The information here is guidance on the minimum requirements of Enrolment
More informationWebsite Privacy Policy
Website Privacy Policy We are very sensitive to privacy issues. The purpose of this Website Privacy Policy is to let you know how Associated Underwriters Insurance, but not limited to, Associated Underwriters
More informationCopyright 2017 Exostar LLC. All rights reserved. Phone One-Time Password User Guide October 2017
Phone One-Time Password User Guide October 2017 Table of Contents Activation Process... 2 How do I know if I need Phone OTP?... 2 Purchase Information... 2 Activation... 7 Live Video Proofing... 9 Schedule
More informationAPPLICATION DEADLINE Postmarked by January 12, 2018
APPLICATION DEADLINE Postmarked by January 12, 2018 Dear Artisan Vendor Applicant: The Grapevine Convention & Visitors Bureau invites you to apply to participate in the 34 th Annual Main Street Fest to
More informationChange Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account
PAYER ID: SUBMITTER ID: 1 Provider Organization Practice/ Facility Name Change Healthcare CLAIMS Provider Information Form *This form is to ensure accuracy in updating the appropriate account Provider
More informationCertDigital Certification Services Policy
CertDigital Certification Services Policy Page: 2 ISSUED BY : DEPARTAMENT NAME DATE ELECTRONIC SERVICES COMPARTMENT COMPARTMENT CHIEF 19.03.2011 APPROVED BY : DEPARTMENT NAME DATE MANAGEMENT OF POLICIES
More informationTEXAS MEDICARE (TRAILBLAZERS) CHANGE FORM MR085
TEXAS MEDICARE (TRAILBLAZERS) CHANGE FORM MR085 HOW LONG DOES PRE-ENROLLMENT TAKE? Standard processing time is 20 days WHAT PROVIDER NUMBERS DO I USE? Six digit Medicare legacy provider ID NPI Number WHAT
More informationCONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014
CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 1. Welcome 1.1 Welcome to the Connect Transit Card Program. The Connect Card Program makes using public transit easier
More informationCertification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure
Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages
More information2. What is Personal Information and Non-Personally Identifiable Information?
Privacy Notice Snipp Interactive, Inc. Last Updated: February 11, 2016 Contents: 1. Introduction 2. What is Personal Information? 3. Information we collect about you 4. Use of Your Information 5. Location
More information3 Months 6 Months 12 Months. Step 1 Choose a mailbox size. Check the box by the box size you would like to sign up for.
The UPS Store 3155 Street Address: 936 SW 1 st Ave, Miami, fl 33130 Phone: 305.858.1221 Fax: 305.858.5548 Email: store3155@theupsstore.com The UPS Store Mailbox Application Kit Thanks for your interest
More informationCAP Examination Application
CAP Examination Application DIRECTIONS: Complete all sections of the application after reading through the CAP Handbook. Exam is given in English. It is your responsibility to thoroughly review all requirements.
More informationOperational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary. Version 3.3.
Operational Research Consultants, Inc. (ORC) Access Certificates For Electronic Services (ACES) Certificate Practice Statement Summary Version 3.3.2 May 30, 2007 Copyright 2007, Operational Research Consultants,
More informationIdentity Theft Victim s Complaint and Affidavit
Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors
More informationWebsite Privacy Policy
Website Privacy Policy Last updated: May 12, 2016 This privacy policy (the Privacy Policy ) applies to this website and all services provided through this website, including any games or sweepstakes (collectively,
More informationCERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement
CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement Welcome to Certified Mail Envelopes and Certified Mail Labels web sites (the Site ) a website, trademark and business name owned and operated
More informationPAYMENT FORM. Name of Cardholder: Service Selected: (please select one below) Signature: Domestic
Mail forwarding services can be a critical component of the successful operation of any business. For your convenience we are offering two (2) mail forwarding options. You may select the option that best
More informationBusiness Banking Online application
Business Banking Online application This application will register you to Business Banking Online and allow you to: l l l Access accounts held by ONE company or business entity Process Credit Direct Entry
More informationDigital Signatures Act 1
Issuer: Riigikogu Type: act In force from: 01.07.2014 In force until: 25.10.2016 Translation published: 08.07.2014 Digital Signatures Act 1 Amended by the following acts Passed 08.03.2000 RT I 2000, 26,
More informationImportant Information
Important Information Important Information Effective from 13 January 2018 1. Your information 1.1 Who we are We are Coutts & Co, of 440 Strand, London WC2R OQS. We are a member of The Royal Bank of Scotland
More informationRed Flags/Identity Theft Prevention Policy: Purpose
Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and
More informationBCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement
BCN Telecom, Inc. Customer Proprietary Network Information Certification Accompanying Statement BCN TELECOM, INC. ( BCN" or "Company") has established practices and procedures adequate to ensure compliance
More informationRequirements for NCOWCICB certification with Business Succession Exemption Please read and follow carefully.
Requirements for NCOWCICB certification with Business Succession Exemption Please read and follow carefully. To be exempt from taking the 18 hour introductory course, the applicant must provide the following
More informationUnited States Department of Defense External Certification Authority X.509 Certificate Policy
United States Department of Defense External Certification Authority X.509 Certificate Policy Version 4.3 4 January 2012 THIS PAGE INTENTIONALLY LEFT BLANK ii TABLE OF CONTENTS 1 Introduction...1 1.1 Overview...1
More informationWe collect information from you when You register for an Traders account to use the Services or Exchange and when You use such Services. V.
Privacy Policy General A. The parties involved in reference to this policy are Company and You, the User of these sites: www.bittrademarket.com A.1 Bittrade Market decentralize system is the publisher
More informationMississippi Medicaid. Mississippi Medicaid Program Provider Enrollment P.O. Box Jackson, Mississippi Complete form and mail original to:
Mississippi Medicaid Complete form and mail original to: Blank forms may by copied. Call LTC at 888-941-8967 if you have questions. Please complete the following Mississippi Medicaid Provider EDI Enrollment
More informationChange Healthcare ERA Provider Information Form *This form is to ensure accuracy in updating the appropriate account
PAYER ID: SUBMITTER ID: 1 Provider Organization Practice/ Facility Name Change Healthcare ERA Provider Information Form *This form is to ensure accuracy in updating the appropriate account Provider Name
More informationMEDICARE Texas (TRAILBLAZERS) PRE-ENROLLMENT INSTRUCTIONS 00900
MEDICARE Texas (TRAILBLAZERS) PRE-ENROLLMENT INSTRUCTIONS 00900 HOW LONG DOES PRE-ENROLLMENT TAKE? Standard processing time is 5 business days after receipt. WHAT FORM(S) SHOULD I COMPLETE? EDI Provider
More informationNATIONAL REGISTRY OF CERTIFIED CHEMISTS 125 Rose Ann Lane, West Grove, PA (phone) / (fax) /
NATIONAL REGISTRY OF CERTIFIED CHEMISTS 125 Rose Ann Lane, West Grove, PA 19390 610-322-0657 (phone) / 800-858-6273 (fax) / rphifer@nrcc6.org (email) 1 APPLICATION FOR CERTIFICATION AS A TOXICOLOGICAL
More informationBUZCOIN TOKENS SALE PRIVACY POLICY. Last updated:
BUZCOIN TOKENS SALE PRIVACY POLICY Last updated: 20.10.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant
More informationBy accessing your Congressional Federal Credit Union account(s) electronically with the use of Online Banking through a personal computer or any other
CONGRESSIONAL FEDERAL CREDIT UNION ELECTRONIC CORRESPONDENCE DISCLOSURE & AGREEMENT Please read this information carefully and print a copy and/or retain this information electronically for your records.
More informationThese rights are known as 'subject access' rights and they are limited to information held by QAA about yourself.
Making a subject access request - guidance Section 7 of the Data Protection Act 1998 states that a "data subject" (the person about whom the personal data refers) is entitled, upon written request, to
More informationOptional Practical Training (OPT) STEM Extension Packet
Optional Practical Training (OPT) STEM Extension Packet Step 1: Print out this OPT packet and mail or e-mail copies of the required documents and all supporting materials, to the International Programs
More informationData Subject Access Request Form (GDPR)
Data Subject Access Request Form (GDPR) Data Subject Access Request Form Article 15 of the EU General Data Protection Regulation (Regulation (EU) 2016/679) (GDPR) grants you the right to access your personal
More informationELECTRONIC RECORDING MEMORANDUM OF UNDERSTANDING
ELECTRONIC RECORDING MEMORANDUM OF UNDERSTANDING THIS MEMORANDUM OF UNDERSTANDING, dated, is between Caldwell County, North Carolina ( COUNTY ), and COMPANY ) with offices at. Caldwell County desires to
More informationApplication and Instructions for Firms
United States Environmental Protection Agency Office of Prevention Pesticides, and Toxic Substances EPA 747-B-99-001 March 2010 https://www.epa.gov/lead Application and Instructions for Firms Applying
More informationOverview. IHCP Provider Name and Address Maintenance. indianamedicaid.com
Overview Form indianamedicaid.com Enrolled providers use this form to update the name and address information that is part of their Provider Profile. Four name/address types are maintained for each provider
More informationCertipost E-Trust Services. Certificate Policy. for Normalized E-Trust Physical and Legal Persons. Version 1.1. Effective date 12 January 2011
Certipost E-Trust Services Version 1.1 Effective date 12 January 2011 Object Identification Number (OID) 0.3.2062.7.1.1.200.1 Certipost NV ALL RIGHTS RESERVED. 2 17 for Normalised E-Trust Certificates
More informationSANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018
SANMINA CORPORATION PRIVACY POLICY Effective date: May 25, 2018 This Privacy Policy (the Policy ) sets forth the privacy principles that Sanmina Corporation and its subsidiaries (collectively, Sanmina
More informationDROPBOX.COM - PRIVACY POLICY
Dropbox Privacy Policy Last Modified: October 15, 2012 This Privacy Policy provides our policies and procedures for collecting, using, and disclosing your information. Users can access the Dropbox service
More informationAppendix B: Certified Technology Specialist Design (CTS-D) - Exam Application
Appendix B: Certified Technology Specialist Design (CTS-D) - Exam Application Section I: Summary of Eligibility Requirements To be eligible to take the CTS-D exam, a candidate must: Hold current certification
More informationAVMA LIFE Agency FAQ
AVMA LIFE Agency FAQ 1 How do I submit an application? Applications can be submitted using one of the following methods: Fax: 866.817.9009 ATTN: Affinity Department Mail: AVMA LIFE Trust Program Administrator
More informationUT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES
ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary
More informationHong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS)
Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) This document (IMPS) facilitates an organization to provide relevant information to describe how it fulfils the normative
More informationCertified Assessor. Application for COBIT Certified Assessor
Application for COBIT Certified Application for COBIT Certified REQUIREMENTS TO BECOME A COBIT CERTIFIED ASSESSOR There is a required US $100 Application processing fee. Payment of the COBIT Certified
More informationOnline Filing Guide for Charities and Professional Fundraisers
South Carolina Secretary of State Online Filing Guide for Charities and Professional Fundraisers April 2010 1205 Pendleton Street, Suite 525 Columbia, South Carolina 29201 www.sos.sc.gov Charitable Organizations
More informationAGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS
EXHIBIT C AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS 21. NYSE DATA PRODUCTS (a) SCOPE This Exhibit C applies insofar as Customer receives, uses and redistributes NYSE Data Products
More informationDATA PROTECTION ACT 1998
DP7(12/12) DATA PROTECTION ACT 1998 Application for access to your personal data held by Warwickshire Police Section 7(1)(a) & 7(1)(b)(i) & 7(1)(c)(i) of the Data Protection Act 1998 (Subject Access) Your
More informationTechnical Trust Policy
Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality
More informationAnnex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission
Annex 2 to the Agreement on Cooperation in the Area of Trade Finance & Cash Management Terms and Conditions for Remote Data Transmission 1. Scope of services (1) The Bank is available to its Customer (account
More informationConsent to Electronic Delivery of Periodic Statements, Disclosures and Notices
ELECTRONIC STATEMENT DISCLOSURE AGREEMENT Access via Online Banking and Mobile Banking Effective August 1, 2017 Consent to Electronic Delivery of Periodic Statements, Disclosures and Notices Your consent
More informationOKLAHOMA HORSE RACING COMMISSION 2800 N. LINCOLN BLVD., SUITE 220 OKLAHOMA CITY, OK (405)
OKLAHOMA HORSE RACING COMMISSION 2800 N. LINCOLN BLVD., SUITE 220 OKLAHOMA CITY, OK 73105 (405) 522-8167 CY 2019 RENEWAL APPLICATION FOR INDEPENDENT TESTING LABORATORY LICENSE The non-refundable license
More informationFirst Federal Savings Bank of Mascoutah, IL Agreement and Disclosures
Agreement and Disclosures INTERNET BANKING TERMS AND CONDITIONS AGREEMENT This Agreement describes your rights and obligations as a user of the Online Banking Service and all other services made available
More informationAppendix B: Certified Technology Specialist - Installation (CTS-I) Exam Application
Appendix B: Certified Technology Specialist - Installation (CTS-I) Exam Application Section I: Summary of Eligibility Requirements In order to be considered eligible to sit for the CTS-I certification
More informationParticipant Agreement. Updated December 1, 2016 and approved by the OK-First Advisory Committee
1 Participant Agreement Updated December 1, 2016 and approved by the OK-First Advisory Committee 1. Eligibility Participation in the OK-First program is limited to Oklahoma agencies with jurisdictional
More informationCertified Hospitality Supervisor
CHS APPLICATION FORM Certified Hospitality Supervisor Ref Code: HOW TO APPLY Complete Sections 1-5 as thoroughly and accurately as possible. Have your direct/immediate supervisor or a corporate representative
More informationGROUPON.COM - PRIVACY POLICY
PRIVACY STATEMENT Last Updated: September 13, 2012 This Privacy Statement ( Privacy Statement ) explains how Groupon, Inc. ( Groupon, us, our, and we ) uses your information and applies to all who use
More informationTATA CONSULTANCY SERVICES LIMITED CERTIFYING AUTHORITY REQUEST FORM FOR CLASS-2 CERTIFICATE / / Version Class-2 Certificate (Company)
TATA CONSULTANCY SERVICES LIMITED CERTIFYING AUTHORITY REQUEST FORM FOR CLASS-2 CERTIFICATE Instructions: USER TYPE COMPANY 1. Please fill the form in BLOCK LETTERS 2. Items marked with * are mandatory.
More informationFinFit will request and collect information in order to determine whether you qualify for FinFit Loans*.
FinFit Web Privacy Policy General: This Privacy Policy ( Policy ) describes the ways FinFit, LLC ( FinFit, we, us) collects, stores, uses and protects information we receive from you or that you may provide
More informationecare Vault, Inc. Privacy Policy
ecare Vault, Inc. Privacy Policy This document was last updated on May 18, 2017. ecare Vault, Inc. owns and operates the website www.ecarevault.com ( the Site ). ecare Vault also develops, operates and
More informationSecure Messaging Mobile App Privacy Policy. Privacy Policy Highlights
Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review
More informationLightGig Communications, LLC Privacy Policy
LightGig Communications, LLC Privacy Policy Effective Date: December 06, 2018 1. Privacy Policy Overview LightGig Communications, LLC ( we, us, or our ) operates the website https://lightgig.com/ (the
More informationFACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?
FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit
More informationRailroad Medicare Electronic Data Interchange Application
Electronic Data Interchange Application Action Requested: Add New EDI Provider(s) Change/Update Submitter Information Apply for New Submitter ID Apply for New Receiver ID Delete Date: Submitter ID: ERN
More informationLaw Enforcement. Handbook
Law Enforcement Handbook May 4, 2016 Table of Contents Introduction... 3 Contact Information... 4 Subscriber Account Information... 5 1 Retention Policy... 7 Types of Legal Requests... 8 Reimbursement
More informationONE ID Identity and Access Management System
ONE ID Identity and Access Management System Local Registration Authority User Guide Document Identifier: 2274 Version: 1.8 Page 1 Copyright Notice Copyright 2011, ehealth Ontario All rights reserved No
More informationHOW TO OBTAIN A QUALIFYING PARTY CERTIFICATE
HOW TO OBTAIN A QUALIFYING PARTY CERTIFICATE Every license must have at least one Qualifying Party (QP) for each classification of work covered by the license. This is the person who has the requisite
More informationAdd or remove a digital signature in Office files
Add or remove a digital signature in Office files This article explains digital signatures (also known as digital ID), what they can be used for, and how you can use digital signatures in the following
More informationEnterprise Income Verification (EIV) System User Access Authorization Form
Enterprise Income Verification (EIV) System User Access Authorization Form Date of Request: (Please Print or Type) PART I. ACCESS AUTHORIZATION * All required information must be provided in order to be
More information