Servidor Seguro SSL, Servidor Seguro SSL con Validación Extendida (SSL EV), Sede Electrónica, and Sede Electrónica con Validación Extendida (Sede EV)

Size: px
Start display at page:

Download "Servidor Seguro SSL, Servidor Seguro SSL con Validación Extendida (SSL EV), Sede Electrónica, and Sede Electrónica con Validación Extendida (Sede EV)"

Transcription

1 National Register of Associations. Number CIF G Servidor Seguro SSL, Servidor Seguro SSL con Validación Extendida (SSL EV), Sede Electrónica, and Sede Electrónica con Validación Extendida (Sede EV) ANF Autoridad de Certificación Gran vía de les Corts Catalanes Barcelona (Spain) Telephone: Fax: Web:

2 Security Level Public Document Important Notice This document is property of ANF Autoridad de Certificación Distribution and reproduction prohibited without authorization by ANF Autoridad de Certificación Copyright ANF Autoridad de Certificación 2013 Address: Gran vía de les Corts Catalanes Barcelona (Spain) Telephone: Fax: Web: 2

3 Index 1 Introduction Certificates description Identification Support type Users community Certification Authorities Registration Authorities Recognized Registration Authority Collaborating Registration Authority Issuance Reports Manager End entities Certificate subscriber Certificate applicant Certificate responsible Relying third parties Usage field Allowed use Limits of certificate usage Prohibited usage Certification Entity contact details Definitions and acronyms Information publication and repositories Repositories Information publication Updates frequency Access controls on repositories Identification and Authentication Name registration Types of names Need for names to be meaningful Anonymous or pseudonyms Rules for interpreting various name forms

4 3.1.5 Uniqueness of names Conflicts related to names and brands resolution Identity initial validation Method to prove possession of private key Authentication of applicant, certificate responsible and subscriber identity Re-key Revocation request Operational Requirements Certificate application Processing procedure Identity authentication Applicant Subscribers Legal persons Natural persons Certificate responsible Approval or rejection of certificate applications Certificados SSL EV and Sede EV Certificados Sede Certificados SSL EV and Sede EV Time to process certificate applications Certificate issuance Certification Entity actions during certificate issuance Notification to subscriber Certificate acceptance Acceptance Certificate return Tracing Certificate publication Notification of certificate issuance to third parties Rejection Certificate renewal Valid certificates

5 4.6.2 Persons authorized to request the renewal Routine renewal requests authentication and identification Certificate renewal with rekeying Certificate renewal without rekeying Approval or rejection of renewal applications Notification of certificate renewal Certificate renewal acceptance Publication of the renew certificate Notification of certificate renewal Identification and authentication of key renewal applications after revocation (uncommitted key) Certificate modification Certificate revocation and suspension Circumstances for revocation Revocation applications identification and authentication Procedure for revocation request Revocation request grace period Time within which CA must process the revocation request CRL lists verification requirements CRL issuance frequency Revocation online checking availability Revocation online checking requirements Certificate suspension Suspension requests authentication and identification Key storage and recovery Good practices Facilities, management and operational controls Physical security controls Procedural controls Personnel controls Technical security controls Key pair generation and installation Private Key Protection Other aspects of key pair management

6 6.4 Activation data Computer security controls Life cycle technical controls Network security controls Time-stamping Cryptographic Module Security Controls Certificates and CRLs profiles Certificates profiles Common fields and extensions Specific fields according to the signature algorithm Specific fields according to key length Specific Fields by type of certificate Certificado de Servidor Seguro SSL DV (With SHA-256) Certificado de Servidor Seguro SSL OV (With SHA-256) Certificado de Servidor Seguro SSL EV (with SHA-256) Certificado de Sede Electrónica Nivel Medio (with SHA-256) Certificado de Sede Electrónica Nivel Alto (with SHA-256) Certificado de Sede Electrónica EV Nivel Medio (with SHA-256) Certificado de Sede Electrónica EV Nivel Alto (with SHA-256) CRL profile OCSP profile Compliance audit Each entity compliance controls frequency Personnel in charge of the audit identification Auditor relationship to audited entity Topics covered by audit Actions to be taken as a result of compliance deficiency Treatment of audit reports General orders Fees Financial responsibility Confidentiality of business information Privacy of personal information

7 9.5 Intellectual property rights Obligations and guarantees Disclaimers of guarantees Limitations of liability Interpretation and execution CP administration...52 Appendix I Certificate Application Form...53 Appendix II Contract for the Provision of Electronic Certification Services...59 Appendix III Act of Authorization and Acceptance of Responsibility in the Certificate Use...66 Appendix IV Certificate Renewal Application Letter...67 Appendix V Certificate Revocation Application Form...68 Appendix VI Act of Certificate Reception and Acceptance...70 Appendix VII Identity Statement

8 1 Introduction ANF Certification Authority (henceforth, ANF AC) is a legal entity, constituted under Basic Law 1/2002 of the 22nd of March, and written in the Ministry of the Interior with national number and company tax code G The Public Key Infrastructure (PKI) of ANF AC has been designed and managed in accordance with the legal framework of the European Parliament [UE] 910/2014 Regulation, and with the 59/2003 Law on Electronic Signature of Spain. The ANF AC PKI is in accordance with the ETSI TS (Policy requirements for certification Authorities issuing qualified certificates), ETSI TS (Qualified Certificate Profile), RFC 3739 (Internet X.509 Public Key Infrastructure: Qualified Certificates Profile) rules, and in process of adaptation to the ETSI EN (Certificate Profiles) rule. ANF AC uses OID s in accordance with the standard ITU-T Rec. X.660 and the standard ISO/IEC :2005 Procedures for the Operation of OSI Registration Authorities: General Procedures and ASN.1 Object Identifier tree top arcs. ANF AC has been assigned the SMI Network Management Private Enterprise Code by the international organisation IANA - Internet Assigned Numbers Authority - under the branch iso.org.dod.internet.private.enterprise ( IANA Registered Private Enterprise-). This document is the Certification Policy (CP) corresponding to the certificates issued by ANF AC, of the type " Servidor Seguro SSL ", Servidor Seguro SSL con Validación Extendida (EV) Sede Electrónica nivel medio y nivel alto y, Sede Electrónica con Validación Extendida (EV) nivel medio y nivel alto. These certificates are issued with consideration of qualified in accordance with the provisions of Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and with consideration of recognized as defined in Law 59/2003 of electronic signature. To develop its content the IETF RFC 3647 PKIX structure has been followed, including those sections that are specific to this type of certificate. This document defines the operational and procedural requirements to which the usage of these certificates is subjected, and defines the guidelines that ANF AC uses for its issuance, management, revocation, renewal and any other process that affects the life cycle. The roles, responsibilities and relationships between the end user, ANF AC and trusted third parties are described, as well as the application, renewal and revocation rules that must be met. In the scope of the Google Certificate Transparency project (CT), the certificates issued with the EV (Extended Validation) qualification will be published in different CT Log operators, to comply with the policy defined by Google. This document is only one of the several documents governing the PKI of ANF AC, it details and supplements the definitions in the Certification Practice Statement and its addendum. ANF AC oversees and supervises that this PC is compatible and consistent with the other documents produced. All documentation is freely available to users and relying parties at 8

9 1.1 Certificates description ANF AC, in the framework of its Electronic Certification Service, issues identity certificates of the type: Servidor Seguro SSL The purpose of this certificate is to establish data communications through TLS / SSL protocols in services and applications, especially for: - The identification of the organization holding the domain (DNS) to provide reasonable assurance to the user of a web browser that the website being accessed is owned by the organization identified in the certificate through its name and address. - Encryption of communications between the user and the website, facilitating the exchange of encryption keys necessary for encryption of information through Internet. The maximum validity of these certificates is 5 years. This type of cetificates can be issued in the following modes: - DV and DV Wildcard This certificate, with the consideration of unqualified according eidas will be used for the identification of the ownership of the domain hosting the website, providing reasonable assurance to the user of an Internet browser. The DV Wildcard contains a "wild card" in the hostname (e.g.: *.frater.com). They are issued according to ETSI EN The validity of these certificates can be up to 3 years. - OV and OV Wildcard This certificate, with the consideration of unqualified according to eidas will be used for identifying ownership of the domain and accreditation of the organization, providing reasonable assurance to the user of an Internet browser that the web site being accessed is owned by the organization identified in the certificate. The OV Wildcard contains a "wild card" in the hostname (e.g.: *.frater.com). They are issued according to the policy OVCP of ETSI EN The validity of these certificates can be up to 3 years. Servidor Seguro SSL con Validación Extendida (EV) This certificate, with consideration of unqualified according to eidas will be used for identifying ownership of the domain and accreditation of the organization, providing a strong guarantee to the user of an Internet browser that the web site being accessed is owned by the organization identified in the certificate. They are issued according to the policy EV of ETSI EN The validity of these certificates can be up to 2 years. In addition to the utilities provided by the SSL certificate, Extended Validation (EV) aims to provide a better level of authentication for organizations, to secure transactions on their websites. 9

10 The purpose of EV SSL Certificates is their use in TLS / SSL protocols, in order to ensure the validity of the constitution of the organization identified in the certificate, and therefore avoiding phishing or other cases of online identity fraud. ANF AC meets the guidelines stated by the CA / Browser Forum and published on its website including the acceptance of audit programs specified therein. Sede electrónica Sede Electrónica In the field of Law Public Sector Legal Regime, ANF AC issues certificates of the type sede electrónica. They are issued according to the policy ETSI EN and the profile of the office certificate defined by the Ministry of Finance and Public Administrations. This is a certificate with the consideration of qualified according to eidas in which the owner Public Administration, administrative body or entity office is identified. The validity of these certificates is 2 years. The purpose of this certificate is to establish data communications through TLS / SSL in services and applications. Sede electrónica con Validación Extendida (EV) In addition to the utilities provided by the Electronic Office certificate, Extended Validation (EV) aims to provide a better level of authentication for Public Administration, body or administrative entity to secure transactions on their websites avoiding phishing cases or any other online identity fraud. In addition, ANF AC meets the guidelines stated by the CA / Browser Forum and published on its website including the acceptance of audit programs specified therein. 1.2 Identification Document name Certification Policy for certificados de Servidor Seguro SSL, Servidor Seguro SSL con Validación Extendida (EV), Sede Electrónica y Sede Electrónico con Validación Extendida (EV) Version 1.2 Policy status APPROVED Document reference / Publication date January 15 th 2013 Expiration date Not applicable 10

11 Related CPS Location Certification Practice Statement (CPS) of ANF AC In order to identify the certificates, ANF AC has assigned the following object identifiers (OID): Certificado Servidor Seguro SSL DV With SHA-256 algorithm and 2048-bit key length Servidor Seguro SSL OV With SHA-256 algorithm and 2048-bit key length OID Servidor Seguro SSL EV With SHA-256 algorithm and 2048-bit key length Sede Electrónica Nivel Medio With SHA-256 algorithm and 2048-bit key length Sede Electrónica EV Nivel Medio With SHA-256 algorithm and 2048-bit key length Sede Electrónica Nivel Alto With SHA-256 algorithm and 2048-bit key length Sede Electrónica EV Nivel Alto With SHA-256 algorithm and 2048-bit key length When the certificate is of the type Servidor Seguro SSL, in the extension CertificatePolicies ( ), will include at least one of the following PolicyInformation: If it is performed exclusively domain validation (Compliant with Baseline Requirements No entity identity asserted) [CA/B FORUM - SSL DV]: If the subscriber is a legal person, organization or institution (Compliant with Baseline Requirements Organization identity asserted) [CA/B FORUM - SSL OV]: If the subscriber is a natural person (Compliant with Baseline Requirements Individual identity asserted): In the case of certificates of Sede Electrónica Nivel Alto Nivel Alto, the extension CertificatePolicies ( ) will include the OID: 11

12 In the case of Sede Electrónica Nivel Medio, the extension CertificatePolicies ( ) will include the OID: All certificates meet the standard ETSI TS and ETSI requirement, in relation to certificate policies identified: Advanced Certificate Policy (Individual or Professional) Advanced Certificate Policy (Individual or Professional) issued on cryptographic device TLS/SSL Certificate Policy with Organization validation TLS/SSL Certificate Policy with Domain validation Qualified Certificate Policy 5 1 Normalized Certification Policy (NCP) in accordance with standard ETSI TS Extended Normalized Certification Policy (NCP+) in accordance with standard ETSI TS Organization validation certificates policy (OVCP) in accordance with standard ETSI TS Domain validation certificates policy (DVCP) in accordance with standard ETSI Referred to QCP+SSCD (Qualified Certificate Policy + Secure Signature Creation Device) in accordance with standard ETSI TS Moreover, in the case of including the extension Extended Validation, the extension CertificatePolicies ( ) will include the OID of SSL EV [ETSI TS EVCP]: Moreover according to [CA/B FORUM - SSL EV] will include the OID of SSL EV And, when the certificate is issued with the qualification of qualified of website according to eidas, meets the requirements of the Policy QCPW of ETSI EN , and the eidas IV annex. In the extension CertificatePolicies ( ), will include at least on of the following PolicyInformation: qcp-web ( ) 1.3 Support type These certificates can be issued in two support types: Cryptographic software token. Token HSM (hardware security module). Certified with ISO Common Criteria EAL 4+ or higher. This policy, regarding certificados Sede Electrónica, follows the definitions of the present policy, regarding certificados "Empleado Público", follows the definitions established by the Communications and 12

13 Information Technologies Management in its document "Perfiles de certificados electrónicos of April Two different levels of assurance are defined: a. Medium level: This level corresponds to a configuration of security mechanisms suitable for most applications. The expected risk for this leve is appropriate to access qualified applications in accordance with the ENS in the levels of Integrity and Authenticity as medium and low risk. Acceptable security mechanisms include X.509 software certificates. In the case of certificates issued to people, they correspond with a "qualified certificate as defined in EU Regulation 910/2014 on advanced electronic signature, without signature creation qualified device. In the case of certificates issued to legal persons, it corresponds with the "certificado sello cualificado", as defined in the EU regulation 910/2014 on advanced electronic seal, without seal creation qualified device. The use of signature hardware devices (HSM or signature creation qualified device) is also permitted. The maximum validity of these certificates is 5 years, except for certificates issued with Extended Validation, whose maximum validity period is 27 months. The expected risk for this level corresponds to level 3 guarantee provided in IDABC Authentication Basic Policy * 1. * 1 The IDABC (Interoperable Delivery of Pan-European egovernment Services to Public Administrations, Business and Citizens - Interoperable Delivery of pan- European electronic Administration services to public administrations, businesses and citizens) program. Decision 2004/387 / EC of the European Parliament and of the Council of 21 April 2004 on the Interoperable Delivery of European electronic Administration Services to public administration, businesses and citizens (IDABC) [Official Journal L 144, ] b. High level: This level corresponds to a configuration of security mechanisms suitable for applications that require additional measures, according to the risk analysis performed. The expected risk for this leve is appropriate to access qualified applications in accordance with the ENS in the levels of Integrity and Authenticity as high risk. Also, the expected risk in this level corresponds to the low and substantial security levels of electronic identification systems of the EU regulation 910/2014. Safety levels of the eidas regulations apply only to electronic identification systems. Acceptable security mechanisms include X.509 hardware certificates. In the case of certificates issued to people, they correspond with a "qualified certificate, for "qualified electronic signature", as defined in EU Regulation 910/2014. In the case of certificates issued to legal persons, it corresponds with the "certificado sello cualificado", as defined in the EU regulation 910/2014. The expected risk for this level corresponds to level 4 guarantee provided in IDABC Authentication Basic Policy. The maximum validity of these certificates is 5 years, except for certificates issued with Extended Validation, whose maximum validity period is 27 months. 13

14 1.4 Users community Certification Authorities As defined in the Certification Practice Statement (CPS) of ANF AC. These are the entities which issue electronic certificates which link a public key with the subscriber identity Registration Authorities These are entities that perform registration procedures of applicants for end entity certificates. They perform the identification and authentication of individuals involved in the application, and they have the ability to initiate or assist in the procedures for revocation and renewal of certificates. These entities may belong to the organization of the certification entity, or may be external partners, in which case ANF AC defines two types: Recognized Registration Authority Collaborating Registration Authority Issuance Reports Manager End entities Certificate subscriber The subscriber is the natural or legal person that is the certificate holder. Natural persons must be of legal age; in the case of legal entities applying for the issuance of a certificado SSL EV, these must be older than two years Certificate applicant The certificate must be requested by an adult, in his/her own behalf or, if acting on behalf of a third party, with legal capacity to assume the representation of the subscriber. His/her identity will be included in the certificate as a legal representative. 14

15 Certificate responsible The certificate responsible holds the signature creation device and is responsible for its use and custody. The certificate responsible must be a legal age physical person, with total ability for acting and has to state his/her constent to assume this responsibility. The certificate responsible must have express authorization from the applicant, and his/her identity shall be included in the certificate Relying third parties 1.5 Usage field Allowed usage Certificates issued under this Policy shall be used with the following purposes: DNS Identification. Certificates issued under this Policy allow to identify and link a determined DNS (Domain Name System) domain to the entity owning that domain, which is the certificate subscriber. Encryption of communications between the user and the website, facilitating the exchange of encryption keys necessary for encryption of information through Internet Limits of certificate usage Prohibited usage No other uses than the ones stated in this Policy and the CPS of ANF AC are allowed. 1.6 Certification Entity contact details 1.7 Definitions and acronyms 15

16 2 Information publication and repositories 2.1 Repositories 2.2 Information publication 2.3 Updates frequency 2.4 Access controls on repositories 16

17 3 Identification and Authentication 3.1 Name registration Types of names All certificates require a Distinguished Name (DN) under the X.500 standard. Personal circumstances and attributes of the persons and organizations identified in the certificates are included in attributes predefined in regulations and generally recognized technical specifications Need for names to be meaningful All the certificados Servidor Seguro SSL and Servidor Seguro SSL EV contain a distinguished name (DN) that identifies the DNS domain and the holder person or organization that holds it, according with provision of the ITU-T X.501 reccomendation, and contained in the Subject field, including a Common Name. The CN (Common Name) attribute of the DN must refer to the DNS domain name Anonymous or pseudonyms This is not allowed Rules for interpreting various name forms In any case, standard X.500 (referred in the ISO/IEC 9594 rule) name will be attended Uniqueness of names The certificate will be issued with the full name of the service that will be provided with SSL features. This name must be unique in the network. Partial names will not be accepted Conflicts related to names and brands resolution Applicants for certificates shall not include names in applications that may involve breach of third party trademark rights by the subscriber. ANF AC reserves the right to refuse a certificate request because of name conflict. ANF AC shall check if the requested domain name may be misleading under another existing name exists in the network, and if available, will determine in its sole discretion on whether to issue or refuse to issue the requested certificate. 17

18 3.2 Identity initial validation Method to prove possession of private key Authentication of applicant, certificate responsible and subscriber identity Certificates issued under this Certification Policy will identify the subscriber under whose name a DNS domain has been registered. They will also indentify the certificate subscriber (if a legal representative has processed the application in the subscriber name) and the certificate responsible (if any other person who is not the subscriber or applicant). The Issuance Reports Manager will use appropriate means to ensure the accuracy of the information contained in the certificate. These means include external registry databases and the ability to require information or documents to the subscriber. The fiscal identification of the applicant and subscriber and device owner will be incorporated into the certificate. Types of documentation, processing modality, authentication and validation procedures are specified in the following sections. 3.3 Re-key In the course of re-key, ANF AC shall inform the subscriber about the changes that have occurred in the terms and conditions with respect to the previous issue. A new certificate may be issued to maintain the previous public key, as long as it is considered cryptographically secure. 3.4 Revocation request All cancellation requests must be authenticated. ANF AC checks the applicant's ability to handle this requirement. 18

19 4 Operational Requirements 4.1 Certificate application ANF AC only accepts requests with a proper name or third party name, completed by adults with the capacity to work by their own free will and with enough legal representation. Applicants must complete the Application Form of the certificate, that will be able to be authenticated through: -Handwritten signature -Recognized electronic signature In the form will be stated that the applicant takes the responsibility of the accuracy of the information outlined. He/she will be able to submit it to ANF AC using any of the following means: a) Electronically: the website includes an application form that should be filled and electronically signed with a qualified certificate, according to Electronic Signature Law 59/2003, December 19th. The certificate used must have been issued by a CA approved by ANF AC. b) In person: the applicant may appear before a Recognized Registration Authority, and shall duly complete and sign the application form. c) By mail: the applicant may submit the application form to the offices of ANF AC certificate, having duly completed and authenticated his signature before a Collaborating Registration Authority. ANF AC does not generate the keys of its users. The applicant must generate his/her own key pair and certificate request in PKCS#10 /CSR format, delivering it to ANF AC together with the certificate Application Form. 4.2 Processing procedure Identity authentication Applicant Apart from the certificados de Servidor Seguro SSL DV, the applicant must prove his/her identity and validity of the applicant entity: a) Physical Address and other contact data. If deemed necessary by the Registration Authority or the Issuance Reports Manager, additional documents may be included to check the reliability of the information, such as recent utility bills or bank statements. In case the RRA or the IRM know the applicant personally, they should personally issue and sign a Declaration of Identity * 1. b) The RRA, as proof of attendance and in order to preclude the repudiation of the procedure done, can get a set of biometric evidence: photography and / or fingerprints. 19

20 c) ID card or Passport in case of nationals, whose photograph allows verifying the identity of the person. In case of low sharpness of the picture, another official document with picture may be requested (e.g. driver s license). d) In case of foreign nationals, the following will be required: I. To European Union members or European Economic Area members: National Identity Card (or local equivalent) or passport with photograph that allows to verify the identity of the person appearing. In case of low sharpness of the picture, another official document with picture may be requested (e.g. driver s license). Certificate issued by the Register of the Citizen Members of the Union. II. To non-eu citizens: Passport, residence permit and work permit with photograph that allows comparing the identity of the person appearing. In case of low sharpness of the picture, another official document with picture may be requested (e.g. driver s license). In case of acting in the name and representation of a third part, the following will be required: Enough representation power. In addition to administrators and legal representatives, voluntary representatives shall be accepted when they demonstrate sufficient power to carry out acts of administration or concluding contracts on behalf of the entity. The applicant may be waived of appearing before the Registration Authority in any of the following cases: 1. If the appropriate forms have been properly completed, and the subscriber s signature has been legitimized in the presence of attorney, by attaching certified copies of identity, authorization and legal representation documents. 2. Electronic processing. The website includes an application form that should be filled and electronically sign with a qualified certificate, according to Electronic Signature Law 59/2003, December 19th. The certificate used must has been issued by a CA approved by ANF AC Subscribers Legal persons Except in the case of certificados de Servidor Seguro SSL DV, it is required: Physical address and other contact details of the entity. If the RRA or the IRM deem it necessary, additional documents, such as recent utility bills or bank statements, may be requested in order to check the reliability of the information. If the RRA or the IRM known the subscriber personally, they shall issue and sign a Declaration of Identity * 1. Tax identification (CIF) of the entity. According to legal form: 20

21 Corporations or other legal persons whose registration is required under the Commercial Register, shall prove their valid constitution by providing: - For applications of certificados SSL, simple registry note on constitution data and current management of the entity. - For applications of certificados SSL EV, original or certified copy of the Register data on current constitution and management of the entity. Associations, foundations and cooperatives shall prove their valid constitution by providing original or certified copy of a certificate of public record in which they are inscribed on its constitution. Civil societies and other legal persons, shall provide original or certified copy of the public document attesting to their constitution in a reliable way. Public Administrations and public sector entities: - Entities whose enrollment is mandatory in a register, shall prove their valid constitution by providing original or certified copy of a certificate of incorporation data and legal personality. - Entities created by rule, shall provide reference to the creation norm Natural persons Same procedure as in the previous section Certificate responsible In the application form, the applicant must identify and expressly authorize the device owner and responsible of the certificate. This authorization must be perfected with a voluntary and express acceptance by the person who will be responsible for the certificate. This must appear before the Registration Authority and present proof of identity, effective, original or certified copy of the following documents: a) Physical Address and other contact data. If deemed necessary by the Registration Authority or the Issuance Reports Manager, additional documents may be included to check the reliability of the information, such as recent utility bills or bank statements. In case the RRA or the IRM know the applicant personally, they should personally issue and sign a Declaration of Identity * 1. b) The RRA, as proof of attendance and in order to preclude the repudiation of the procedure done, can get a set of biometric evidence: photography and / or fingerprints. c) ID card or Passport in case of nationals, whose photograph allows to verify the identity of the person. In case of low sharpness of the picture, another official document with picture may be requested (e.g. driver s license). d) In case of foreign nationals, the following will be required: I. To European Union members or European Economic Area members: 21

22 National Identity Card (or local equivalent) or passport with photograph that allows to verify the identity of the person appearing. In case of low sharpness of the picture, another official document with picture may be requested (e.g. driver s license). Certificate issued by the Register of the Citizen Members of the Union. II. To non-eu citizens: e) Passport, residence permit and work permit with photograph that allows comparing the identity of the person appearing. In case of low sharpness of the picture, another official document with picture may be requested (e.g. driver s license). * 1 Declaration of Identity It consists of a formal declaration under oath, in which the respondent says he knows personally and directly a particular individual or a legal entity. Besides, it notes, up to their direct knowledge, that the address, telephone and outlined in the application form are true Approval or rejection of certificate applications The Issuance Reports Manager (IRM) assumes the final response assumes the ultimate responsibility to verify the information contained in the Application Form, and to assess the adequacy of the documents provided and of the application, in accordance with the provisions of this Certification Policy. In particular, it will check the existence of the subscriber, the applicant, the existence of the domain and ownership of this to the subscriber Depending on the type of certificate: Type of certificate Procedure DV OV EV Sede Electrónica The owner must match the applicant organization. Otherwise, the applicant must prove the right of use by the subscriber. Verification that the applicant has the right to use the domain or subdomain: Dominios.es: Dominios.eu: Dominio.eus: whois.nic.eus Resto dominios: whois.icann.org Checking of the CAA in case they are registered and in any case following the guidelines of the RFC In the case of certificates SSL DV and SSL OV the wildcard in subdomains or hostnames will be allowed, but not in top-level domains (TLD) or in the domain name. The applicant entity must be able to demonstrate their legitimate control of the entire domain, otherwise the application will be rejected. For example, *.co.uk, *.local or ejemplo.* can not be issued but *.ejemplo.com can be issued to the company Ejemplo S.A. 22

23 DV OV EV Sede Electrónica Verification of identity and validity the applicant entity Checking of the competence of the applicant to use the name of the entity Checking via that the applicant is aware of the processing of the certificates. Verification of postal address in: Data Protection Agencies. Telephone operators pages. Companies Register In the case of discrepancy between the documentation provided and verification the IRM will verify that the address stated on the request corresponds to a location in which the applicant Organization operates stably. Country verification in: AGPD Yellow Pages Companies Register Checking of the denied list in ANF AC internal data bases Checking of high risk requests in Mcafee TrustedSource Sede Electrónica EV Checking of belonging of the landline number (not mobile) to the applicant entity in: Telephone operators Pages, Data Protection Agencies. Via direct call Checking of operational existence. Private entities must certify that perform banking transactions with a regulated financial institution. ANF AC performs a dual verification, intervening Technical Area and the Legal Advisory. Also in the same cases all validations are reviewed by the Head of the Technical Area Moreover, he/she will determine: That the subscriber has access to the terms and conditions relating to the use of the certificate, as well as to the issuance fees. That the subscriber has had access and has permanent access to all documents relating to the duties and responsibilities of the CA, the subscriber, applicant, those responsible for the certificate and relying parties, especially the CPS and Certification Policies. Besides, he/she shall monitor compliance with any requirements imposed by the legislation on data protection, as established in the security document included in the CPS, the purpose of the LOPD as provided in Article 19.3 of Spanish Electronic Signature Law 59/2003, December 19th. The process of issuing the certificate shall not start as long as the Issuance Reports Manager has not issued the corresponding compliance report. The deadline set for the issuance of the report is 15 days. After that period without issuing the mandatory report, the applicant may immediately cancel the order and receive the fees paid. The IRM may require additional information or documentation from the applicant, which will have 15 days to deliver it. After this period, without having completed the requirement, the IRM will issue a report denying the issuance. Should the applicant meet the requirement, the IRM will have 7 days to issue the final report. In case the IRM verifies that the information provided by the applicant is not true, he/she will deny the issuance of the certificate, and will generate an incident report to the Security Coordinator, to determine whether or not to include the applicant in the blacklist of individuals and entities with OID The validation procedure to be followed, by type of certificate, is the following: 23

24 Certificados SSL EV and Sede EV The IRM shall check the documentation given by the applicant and the Registration Authority. He/she will check, in accordance with the standards of CAB Forum, that the subscriber is not a natural person Certificados Sede The IRM shall check the norm of Office creation and its holder Certificados SSL EV and Sede EV The IRM shall check the documentation provided by the applicant and the Registration Authority. The validation process will be supported by the Legal Department and the Technical Department, which will review and technically validate the certificate request PKCS#10 / CRS. In the process of verification of the information and documentation received, the following means may be used: Consultation to official public records in which the entity must be registered in order to check availability, effect of charges and other legal issues such as activity and date of establishment. Official Journals of national or regional public bodies belonging to public bodies and enterprises. With regard to Internet addresses and domains, ANF AC consult recorders attached only by ICANN / IANA domain names and addresses associated with the certificate. In this query, it is verified verify: - That the holder (registrant) matches the subscriber. - People and contact information associated with that domain registration. One of the contact persons listed in the whois query shall be reached in order to verify compliance of the certificate issuance request associated with that domain. Verification of the subscriber, applicant and device owner contact details: o Telephone: - Subscriber: a landline (not mobile) shall be used. This shall be checked in yellow pages, AEPD (Spanish Data Protection Agency), and by personal call. - Applicant and device owner: through personal call. o Postal Address: it shall be checked in Yellow Pages, AEPD or Informa service. o it shall be verified by sending an requesting confirmation of receipt. It is verified that none of the individuals associated with the request are recorded in the blacklist of individuals and entities with OID or is operating in a place where the CA policies forbids the certificate issuance (document with OID ). 24

25 It is verified that the domain is not included as suspicious in the Anti Phishing Workgroup website or similar ones. It is verified that none of the individuals associated with the request is listed as a criminal in public records. ANF AC regularly updates its database with all persons appearing on search and seizure, and links this control blacklist certificate request. Also, for domain associated to names that may create in relying third parties by: Confusion of identity or activity. The certificate issuance will not be authorized when the domain name may create confusion about the real activity of the subscriber, (eg. where the subscriber's activity does not correspond to that of a financial institution). Specially relevant trademarks. In the case of domain associated to a specially relevant trademark, the Patent and Trademark Register shall be checked. When the domain name associated with a brand of relevance and public awareness, it will be verified if the owner of the trademark is related to the subscriber. In negative case, the IRM shall ask clarification and authorization to the subscriber. No person may issue this certificate when the name is associated with a relevant brand whose domain is not owned by the subscriber, or has permission form the owner of the mark, since it may cause confusion to third parties (eg etc.). In cases where validation cannot be performed on the terms and sources defined above, this will be noted in the verification act issued by the IRM, and the alternative source used shall be included Time to process certificate applications The issuance of a certificate means the complete and final approval of an application by the Issuance Reports Manager. The issuance of certificate must be made within 48 hours, once issued the report of the IRM, as defined in the CPS of ANF AC. 4.3 Certificate issuance ANF AC will avoid generating certificates that expire after the CA that issued them Certification Entity actions during certificate issuance ANF AC will deliver the certificate, by signed electronic mail, to the Technical Responsible that is stated in the Issuance Application Form. 25

26 4.3.2 Notification to subscriber ANF AC notifies the subscriber via , the certificate issuance and publication. 4.4 Certificate acceptance Acceptance After the delivery of the certificate, the subscriber shall have a period of seven calendar days to verify the certificate and to determine whether it is appropriate and whether the data are consistent with the required information. The subscriber has a period of 15 days to sign the Act of Reception and Acceptance of the received Certificate. Through the Act of Reception and Acceptance, the subscriber confirms receipt of the certificate, acceptance to the issuance made, the correct functionality of the product, its ability to use it to sign the minutes with this certificate; reaffirms its submission to the ANF AC CPS and Policies, to use it in accordance with the limitations in the use and purpose for which it was issued, the responsibility to maintain the confidentiality of the private key, and the commitment to cease use after the loss of force, either by expiration or revocation Certificate return The subscriber has a period of 7 days from the delivery of the certificate, to verify its proper operation. In case of malfunction or due to technical errors in the data contained in the certificate, the applicant or those responsible for the certificate can send an electronically signed to ANF AC, reporting the reason for the return. ANF AC shall verify the causes of removal revoke the certificate issued and issue a new certificate within 72 hours Tracing ANF AC is not responsible for the monitoring, investigation or confirmation of the accuracy of the information contained in the certificate after issuance. For information on the inaccuracy or no current applicability of the information contained in the certificate, it can be revoked Certificate publication The certificate is published in the repositories of ANF AC, within a maximum period of 24 hours since its emission has occurred Notification of certificate issuance to third parties No notification is made to third parties. 26

27 4.5 Rejection 4.6 Certificate renewal Generally, as defined in the CPS of ANF AC Valid certificates ANF AC notifies the subscriber and the certificate expiration applicant by , submitting the application form, in order to proceed with its renovation. These notifications are sent at 90, 30 and 15 days prior to the expiration date of the certificate. Only valid certificates can be renewed Persons authorized to request the renewal The renewal application form must be signed by the same applicant, whether that is the actual subscriber or the legal representative who processed the certificate request. The personal circumstances of the applicant should not have changed, especially its capacity for legal representation Routine renewal requests authentication and identification The process for reference / renewal is the same as for new issuance. The documentation to be provided by the applicant and the validation steps, issuance and delivery of certificates are the same as for the issuance of a new certificate. Two ways of renewal are considered: Certificate renewal with rekeying As defined in ANF AC CPS Certificate renewal without rekeying As defined in ANF AC CPS Approval or rejection of renewal applications Same procedure as that performed in the issuance process specified herein Notification of certificate renewal Same procedure as that performed in the issuance process specified herein. 27

28 4.6.6 Certificate renewal acceptance Same procedure as that performed in the issuance process specified herein Publication of the renew certificate Same procedure as that performed in the issuance process specified herein Notification of certificate renewal Same procedure as that specified in the section Notification of certificate issuance to third parties Identification and authentication of key renewal applications after revocation (uncommitted key) The renewal of expired or revoked certificates is not authorized. 4.7 Certificate modification Not applicable. 4.8 Certificate revocation and suspension As generally defined in the CPS of ANF AC Circumstances for revocation Besides those defined in the CPS, ANF AC shall: Provide instructions and legal support for reporting complaints or suspected compromise of the private key, of certificate misuse or about any type of fraud or misconduct. The instructions are published and permanently updated in: You may file directly your suspicion or complaint in: Anyone who sets out technical instructions or legal support in this field, can make your consultations for free by one of the following procedures: o Via telephone call in office hours: (calls from Spain) (monday to friday from 9 h. to 18 h.) (International) o Online procedure. The applicant must fill the form published in the website: 28

29 o Sending an to: ANF AC will investigate incidents of which it has knowledge, within twenty four hours of receipt. The Security Manager, based on inquiries and verifications, shall issue a report to the Issuance Reports Manager, which will determine if the corresponding revocation founded by Act, which shall include: - Nature of the incident. - Received information. - Legal rules and regulation on which the revocation order is based. Every applicant can open an incident through any of the following procedures:: o Via telephone call in office hours: (calls from Spain) (monday to friday from 9 h. to 18 h.) (International) o Online procedure. The applicant must open an incident in the Webservice: Revocation applications identification and authentication Revocation of a certificate can be requested by: The subscriber of a certificate. The applicant. The Responsible for the certificate usage. The Recognized Registration Authority. The identification policy for revocation requests accepts the following methods of identification: Electronically: by electronic signature of the revocation request by the applicant of the certificate or of the operator at the time of the revocation request. By telephone: by replying to questions from the telephone support service available at the number (calls from Spain) or (International). In person: appearing the subscriber or the legal representative of the certificate holder in any of the offices of ANF AC published at the web address proving their identity through original documentation, and manually signing the appropriate form. ANF AC, or any of the Recognized Registration Authorities that compose its National Proximity Network, may request revocation of a certificate if they knew or suspected compromise of the private key associated with the certificate, or any other fact to recommend take such action. 29

Servidor Seguro SSL, Servidor Seguro SSL con Validación Extendida (SSL EV), Sede Electrónica, and Sede Electrónica con Validación Extendida (Sede EV)

Servidor Seguro SSL, Servidor Seguro SSL con Validación Extendida (SSL EV), Sede Electrónica, and Sede Electrónica con Validación Extendida (Sede EV) National Register of Associations. Number 171.443. CIF G-63287510. Servidor Seguro SSL, Servidor Seguro SSL con Validación Extendida (SSL EV), Sede Electrónica, and Sede Electrónica con Validación Extendida

More information

Certificados Empleado Público

Certificados Empleado Público Registro Nacional de Asociaciones. Número 171.443. CIF G-63287510 ANF Autoridad de Certificación Gran vía de les Corts Catalanes 996. 08018 Barcelona (Spain) Telephone: +34 902 902 172 Fax: +34 933 031

More information

SPECIFIC DOCUMENTATION FOR WEBSITE CERTIFICATES

SPECIFIC DOCUMENTATION FOR WEBSITE CERTIFICATES SPECIFIC DOCUMENTATION FOR WEBSITE CERTIFICATES June 2015 Version 1.0 IZENPE This document is the property of IZENPE and may only be reproduced in its entirety. ÍNDICE 1 INTRODUCTION... 3 1.1 DESCRIPTION

More information

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Index INDEX... 2 1. DISCLOSURE TEXT APPLICABLE TO NATURAL PERSON CERTIFICATES ISSUED ON QSCD...

More information

CORPME TRUST SERVICE PROVIDER

CORPME TRUST SERVICE PROVIDER CORPME TRUST SERVICE PROVIDER QUALIFIED CERTIFICATE OF ADMINISTRATIVE POSITION USE LICENSE In..,.. 20... Mr/Mrs/Ms/Miss.........., with DNI/NIF/National Passport nº., e-mail........., phone number....,

More information

DIGITALSIGN - CERTIFICADORA DIGITAL, SA.

DIGITALSIGN - CERTIFICADORA DIGITAL, SA. DIGITALSIGN - CERTIFICADORA DIGITAL, SA. TIMESTAMP POLICY VERSION 1.1 21/12/2017 Page 1 / 18 VERSION HISTORY Date Edition n.º Content 10/04/2013 1.0 Initial drafting 21/12/2017 1.1 Revision AUTHORIZATIONS

More information

CertDigital Certification Services Policy

CertDigital Certification Services Policy CertDigital Certification Services Policy Page: 2 ISSUED BY : DEPARTAMENT NAME DATE ELECTRONIC SERVICES COMPARTMENT COMPARTMENT CHIEF 19.03.2011 APPROVED BY : DEPARTMENT NAME DATE MANAGEMENT OF POLICIES

More information

SSL Certificates Certificate Policy (CP)

SSL Certificates Certificate Policy (CP) SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full

More information

(1) Jisc (Company Registration Number ) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and

(1) Jisc (Company Registration Number ) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and SUB-LRA AGREEMENT BETWEEN: (1) Jisc (Company Registration Number 05747339) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and (2) You, the Organisation using the Jisc

More information

TeliaSonera Gateway Certificate Policy and Certification Practice Statement

TeliaSonera Gateway Certificate Policy and Certification Practice Statement TeliaSonera Gateway Certificate Policy and Certification Practice Statement v. 1.2 TeliaSonera Gateway Certificate Policy and Certification Practice Statement TeliaSonera Gateway CA v1 OID 1.3.6.1.4.1.271.2.3.1.1.16

More information

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages

More information

Certification Practice Statement

Certification Practice Statement SWIFT SWIFT Qualified Certificates Certification Practice Statement This document applies to SWIFT Qualified Certificates issued by SWIFT. This document is effective from 1 July 2016. 17 June 2016 SWIFT

More information

ING Corporate PKI G3 Internal Certificate Policy

ING Corporate PKI G3 Internal Certificate Policy ING Corporate PKI G3 Internal Certificate Policy Version 1.0 March 2018 ING Corporate PKI Service Centre Final Version 1.0 Document information Commissioned by Additional copies of this document ING Corporate

More information

DECISION OF THE EUROPEAN CENTRAL BANK

DECISION OF THE EUROPEAN CENTRAL BANK L 74/30 Official Journal of the European Union 16.3.2013 DECISIONS DECISION OF THE EUROPEAN CENTRAL BANK of 11 January 2013 laying down the framework for a public key infrastructure for the European System

More information

ACCV Certification Practice Statement (CPS)

ACCV Certification Practice Statement (CPS) (CPS) Date: 20/05/2017 Version: 4.0.1 Estado: APPROVED No. of pages: 56 OID: 1.3.6.1.4.1.8149.2.4.0 Classification: PUBLIC File: ACCV-CPS-V4.0-EN-2017.doc Prepared by: Agencia de Tecnología y Certificación

More information

ACGISS Public Employee Certificates

ACGISS Public Employee Certificates ACGISS Public Employee Certificates Certification policy V 2.0.1 (February 2017) Social Security IT Department c/ Doctor Tolosa Latour s/n 28041 Madrid Change control Version Observations Date 1.0 Original

More information

QUICKSIGN Registration Policy

QUICKSIGN Registration Policy QUICKSIGN Registration Policy Amendment to DOCUSIGN FRANCE s Certificate Policy for using the QUICKSIGN platform as a registration service to identify Subscribers September 27, 2016 QUICKSIGN_Registration_Policy_V1.0

More information

Digital Signatures Act 1

Digital Signatures Act 1 Issuer: Riigikogu Type: act In force from: 01.07.2014 In force until: 25.10.2016 Translation published: 08.07.2014 Digital Signatures Act 1 Amended by the following acts Passed 08.03.2000 RT I 2000, 26,

More information

EIDAS-2016 CHAMBERS OF COMMERCE ROOT and GLOBAL CHAMBERSIGN ROOT Version 1.2.3

EIDAS-2016 CHAMBERS OF COMMERCE ROOT and GLOBAL CHAMBERSIGN ROOT Version 1.2.3 CERTIFICATION PRACTICES STATEMENT DIGITAL CERTIFICATES AC CAMERFIRMA SA EIDAS-2016 CHAMBERS OF COMMERCE ROOT - 2016 and GLOBAL CHAMBERSIGN ROOT - 2016. Version 1.2.3 Author: Juan Ángel Martín: PKI Area.

More information

Registro Nacional de Asociaciones. Número CIF G

Registro Nacional de Asociaciones. Número CIF G Registro Nacional de Asociaciones. Número 171.443. CIF G-63287510 Certificate for Secure Server (OV), Secure Server (DV), Secure Server (EV), Electronic Headquarters and Extended Validation Electronic

More information

Electronic signature framework

Electronic signature framework R E P U B L I C O F S E R B I A Negotation Team for the Accession of Republic of Serbia to the European Union Working Group for Chapter 10 Information society and media Electronic signature framework Contents

More information

Signe Certification Authority. Certification Policy Degree Certificates

Signe Certification Authority. Certification Policy Degree Certificates Signe Certification Authority Certification Policy Degree Certificates Versión 1.0 Fecha: 2/11/2010 Table of contents 1 FOREWORD 1.1 GENERAL DESCRIPTION 1.2 DOCUMENT NAME AND IDENTIFICATION 2 PARTICIPATING

More information

ON THE PROVISION OF CERTIFICATES FOR WEBSITE AUTHENTICATION BY BORICA AD

ON THE PROVISION OF CERTIFICATES FOR WEBSITE AUTHENTICATION BY BORICA AD POLICY ON THE PROVISION OF CERTIFICATES FOR WEBSITE AUTHENTICATION BY BORICA AD (B-Trust QCP-eIDAS Web SSL) Version 1.0 Effective date: July 1, 2018 Document history Version Author (s) Date Status Comment

More information

ING Public Key Infrastructure Technical Certificate Policy

ING Public Key Infrastructure Technical Certificate Policy ING Public Key Infrastructure Technical Certificate Policy Version 5.4 - November 2015 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Document version General Of this document

More information

OISTE-WISeKey Global Trust Model

OISTE-WISeKey Global Trust Model OISTE-WISeKey Global Trust Model Certification Practices Statement (CPS) Date: 18/04/2018 Version: 2.10 Status: FINAL No. of Pages: 103 OID: 2.16.756.5.14.7.1 Classification: PUBLIC File: WKPKI.DE001 -

More information

Address: B2, Industry Street, Qormi, QRM 3000 (Malta) Telephone: (+356) Fax: (+356) Web: ANF AC MALTA, LTD

Address: B2, Industry Street, Qormi, QRM 3000 (Malta) Telephone: (+356) Fax: (+356) Web:   ANF AC MALTA, LTD Maltese Registrar of Companies Number C75870 and VAT number MT Certificate for Secure Server (OV), Secure Server (DV), Secure Server (EV), Electronic s and Extended Validation Electronic s Certificates

More information

Certification Practice Statement certsign SSL EV CA Class 3. for SSL EV Certificates. Version 1.0. Date: 31 January 2018

Certification Practice Statement certsign SSL EV CA Class 3. for SSL EV Certificates. Version 1.0. Date: 31 January 2018 Certification Practice Statement certsign SSL EV CA Class 3 for SSL EV Certificates Version 1.0 Date: 31 January 2018 1 Important Notice This document is property of CERTSIGN SA Distribution and reproduction

More information

SPECIFIC CERTIFICATION PRACTICES AND POLICY OF

SPECIFIC CERTIFICATION PRACTICES AND POLICY OF SPECIFIC CERTIFICATION PRACTICES AND POLICY OF CERTIFICATES OF REPRESENTATIVES OF LEGAL ENTITIES AND OF INSTITUTIONS WITH NO LEGAL ENTITY FROM THE AC REPRESENTACIÓN NAME DATE Prepared by: FNMT-RCM / v1.5

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.3 Effective

More information

Digi-Sign Certification Services Limited Certification Practice Statement (OID: )

Digi-Sign Certification Services Limited Certification Practice Statement (OID: ) Digi-Sign Certification Services Limited Certification Practice Statement (OID: 1.3.6.1.4.1.8420.1.3.6) In support of Digi-Sign CA as a Recognized Certification Authority December 2015 Copyright and Patent

More information

X.509 Certificate Policy for the New Zealand Government PKI RSA Individual - Software Certificates (Medium Assurance)

X.509 Certificate Policy for the New Zealand Government PKI RSA Individual - Software Certificates (Medium Assurance) X.509 Certificate Policy for the New Zealand Government PKI RSA Individual - Software Certificates (Medium Assurance) Version 0.7 Mar-17 Notice to all parties seeking to rely Reliance on a Certificate

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013 Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.10 Effective Date: June 10, 2013 Table of Contents 1. Introduction... 5 1.1. Trademarks... 5

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.18 Effective Date: August 16, 2017 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

CERTIFICATION ENTITY DOCUMENTS LIST OID s Structure Version control

CERTIFICATION ENTITY DOCUMENTS LIST OID s Structure Version control CERTIFICATION ENTITY DOCUMENTS LIST OID s Version control This specification has been prepared by ANF AC to release to third parties. SECURITY LEVEL PUBLIC DOCUMENT This document is the property of ANF

More information

Rules for LNE Certification of Management Systems

Rules for LNE Certification of Management Systems Rules for LNE Certification of Management Systems Application date: March 10 th, 2017 Rev. 040716 RULES FOR LNE CERTIFICATION OF MANAGEMENT SYSTEMS CONTENTS 1. PURPOSE... 3 2. SCOPE... 3 3. DEFINITION

More information

PRIVACY POLICY OF.LT DOMAIN

PRIVACY POLICY OF.LT DOMAIN PRIVACY POLICY OF.LT DOMAIN Status Up-to-date version Date 2018-05-25 CHAPTER I GENERAL PROVISIONS 1. Privacy policy of.lt domain (hereinafter Privacy Policy) stipulates conditions of processing, legal

More information

ETSI TR V1.1.1 ( )

ETSI TR V1.1.1 ( ) TR 119 400 V1.1.1 (2016-03) TECHNICAL REPORT Electronic Signatures and Infrastructures (ESI); Guidance on the use of standards for trust service providers supporting digital signatures and related services

More information

Certification Practice Statement. esfirma

Certification Practice Statement. esfirma Certification Practice Statement esfirma General information Documentary checks Security classification: Public Target entity: ESFIRMA Version: 1.1 Date of Edition: 02/06/2016 File: esfirma DPC v1r1.docx

More information

Apple Inc. Certification Authority Certification Practice Statement. Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA

Apple Inc. Certification Authority Certification Practice Statement. Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Version 4.0 Effective Date: September 18, 2013 Table of Contents

More information

CERTIFICATION PRACTICE STATEMENT OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES

CERTIFICATION PRACTICE STATEMENT OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES Krajowa Izba Rozliczeniowa S.A. CERTIFICATION PRACTICE STATEMENT OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES Version 1.6 Document history Version number Status Date of issue 1.0 Document approved by

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

OpenADR Alliance Certificate Policy. OpenADR-CP-I

OpenADR Alliance Certificate Policy. OpenADR-CP-I Notice This document is a cooperative effort undertaken at the direction of the OpenADR Alliance and NetworkFX, Inc. for the benefit of the OpenADR Alliance. Neither party is responsible for any liability

More information

Trust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014)

Trust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014) Trust Service Provider Technical Best Practices Considering the EU eidas Regulation (910/2014) This document has been developed by representatives of Apple, Google, Microsoft, and Mozilla. Document History

More information

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate  Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 1.0 Effective Date: March 12, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

Validation Policy r tra is g e R ANF AC MALTA, LTD

Validation Policy r tra is g e R ANF AC MALTA, LTD Maltese Registrar of Companies Number C75870 and VAT number MT ANF AC MALTA, LTD B2 Industry Street, Qormi, QRM 3000 Malta Telephone: (+356) 2299 3100 Fax:(+356) 2299 3101 Web: www.anfacmalta.com Security

More information

eidas Regulation eid and assurance levels Outcome of eias study

eidas Regulation eid and assurance levels Outcome of eias study eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification

More information

Certification Policy of CERTUM s Certification Services Version 4.0 Effective date: 11 August 2017 Status: archive

Certification Policy of CERTUM s Certification Services Version 4.0 Effective date: 11 August 2017 Status: archive Certification Policy of CERTUM s Certification Services Version 4.0 Effective date: 11 August 2017 Status: archive Asseco Data Systems S.A. Podolska Street 21 81-321 Gdynia, Poland Certum - Powszechne

More information

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-

More information

PostSignum CA Certification Policy applicable to qualified certificates for electronic signature

PostSignum CA Certification Policy applicable to qualified certificates for electronic signature PostSignum CA Certification Policy applicable to qualified certificates for electronic signature Version 1.1 7565 Page 1/61 TABLE OF CONTENTS 1 Introduction... 5 1.1 Overview... 5 1.2 Document Name and

More information

Information technology Security techniques Telebiometric authentication framework using biometric hardware security module

Information technology Security techniques Telebiometric authentication framework using biometric hardware security module INTERNATIONAL STANDARD ISO/IEC 17922 First edition 2017-09 Information technology Security techniques Telebiometric authentication framework using biometric hardware security module Technologies de l information

More information

PKI Disclosure Statement Digidentity Certificates

PKI Disclosure Statement Digidentity Certificates PKI Disclosure Statement Digidentity Certificates Title PKI Disclosure Statement Digidentity Certificates Date 25 March 2019 Author Digidentity Version 2019-v1 Classification Public Digidentity 2019 Revisions

More information

Certificate Policy for the Chunghwa Telecom ecommerce Public Key Infrastructure. Version 1.5

Certificate Policy for the Chunghwa Telecom ecommerce Public Key Infrastructure. Version 1.5 Certificate Policy for the Chunghwa Telecom ecommerce Public Key Infrastructure Version 1.5 Chunghwa Telecom Co., Ltd. December 1, 2017 Contents 1. INTRODUCTION... 1 1.1 OVERVIEW... 3 1.1.1 Certificate

More information

AlphaSSL Certification Practice Statement

AlphaSSL Certification Practice Statement AlphaSSL Certification Practice Statement Date: December 16th 2008 Version: v1.2 Table of Contents DOCUMENT HISTORY... 3 ACKNOWLEDGMENTS... 3 1.0 INTRODUCTION... 4 1.1 OVERVIEW... 4 1.2 ALPHASSL CERTIFICATE

More information

CERTIFICATE POLICY CIGNA PKI Certificates

CERTIFICATE POLICY CIGNA PKI Certificates CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...

More information

thawte Certification Practice Statement Version 3.4

thawte Certification Practice Statement Version 3.4 thawte Certification Practice Statement Version 3.4 Effective Date: July, 2007 thawte Certification Practice Statement 2006 thawte, Inc. All rights reserved. Printed in the United States of America. Revision

More information

ETSI European CA DAY TRUST SERVICE PROVIDER (TSP) CONFORMITY ASSESSMENT FRAMEWORK. Presented by Nick Pope, ETSI STF 427 Leader

ETSI European CA DAY TRUST SERVICE PROVIDER (TSP) CONFORMITY ASSESSMENT FRAMEWORK. Presented by Nick Pope, ETSI STF 427 Leader ETSI European CA DAY TRUST SERVICE PROVIDER (TSP) CONFORMITY ASSESSMENT FRAMEWORK Presented by Nick Pope, ETSI STF 427 Leader ETSI 2012 All rights reserved Topics Background ETSI Activities / Link to Mandate

More information

1. Anti-Piracy Services. 2. Brand Protection (SAAS) 3. Brand Protection Services. Data Protection and Permitted Purpose. Services

1. Anti-Piracy Services. 2. Brand Protection (SAAS) 3. Brand Protection Services. Data Protection and Permitted Purpose. Services MarkMonitor Services Our operating information for all MarkMonitor products and services is outlined below. References in this document to MarkMonitor means the Clarivate entity identified in the order

More information

Dark Matter L.L.C. DarkMatter Certification Authority

Dark Matter L.L.C. DarkMatter Certification Authority Dark Matter L.L.C. DarkMatter Certification Authority Certification Practice Statement V1.6 July 2018 1 Signature Page Chair, DarkMatter PKI Policy Authority Date 2 Document History Document Version Document

More information

VeriSign Trust Network European Directive Supplemental Policies

VeriSign Trust Network European Directive Supplemental Policies VeriSign Trust Network European Directive Supplemental Policies Version 1.0 Effective Date: September 19, 2001 VeriSign, Inc. 487 East Middlefield Road Mountain View, CA 94043 USA +1 650.961.7500 http//:www.verisign.com

More information

Trust Services Practice Statement

Trust Services Practice Statement Trust Services Practice Statement TrustWeaver AB V. 1.2 PUBLIC Page 1 IMPORTANT LEGAL NOTICE Copyright 2016, TrustWeaver AB. All rights reserved. This document contains TrustWeaver AB proprietary information,

More information

FOR QTSPs BASED ON STANDARDS

FOR QTSPs BASED ON STANDARDS THE EU CYBER SECURITY AGENCY FOR QTSPs BASED ON STANDARDS Technical guidelines on trust services DECEMBER 2017 About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre

More information

SWAMID Person-Proofed Multi-Factor Profile

SWAMID Person-Proofed Multi-Factor Profile Document SWAMID Person-Proofed Multi-Factor Profile Identifier http://www.swamid.se/policy/assurance/al2mfa Version V1.0 Last modified 2018-09-12 Pages 10 Status FINAL License Creative Commons BY-SA 3.0

More information

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1159 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (11/2014) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY

More information

Certipost E-Trust Services. Certificate Policy. for Normalized E-Trust Physical and Legal Persons. Version 1.1. Effective date 12 January 2011

Certipost E-Trust Services. Certificate Policy. for Normalized E-Trust Physical and Legal Persons. Version 1.1. Effective date 12 January 2011 Certipost E-Trust Services Version 1.1 Effective date 12 January 2011 Object Identification Number (OID) 0.3.2062.7.1.1.200.1 Certipost NV ALL RIGHTS RESERVED. 2 17 for Normalised E-Trust Certificates

More information

GlobalSign Certification Practice Statement

GlobalSign Certification Practice Statement GlobalSign Certification Practice Statement Date: May 12th 2009 Version: v.6.5 Table of Contents DOCUMENT HISTORY... 3 HISTORY... 3 ACKNOWLEDGMENTS... 4 1.0 INTRODUCTION... 5 1.1 OVERVIEW... 6 1.2 GLOBALSIGN

More information

ZETES TSP QUALIFIED CA

ZETES TSP QUALIFIED CA ZETES TSP QUALIFIED CA Certification Practice Statement for the ZETES TSP Qualified CA Publication date : 17/05/2017 Effective date : 22/05/2017 Document OID : 1.3.6.1.4.1.47718.2.1.1.2 Version : 1.2 21/04/2017

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

Symantec Trust Network (STN) Certificate Policy

Symantec Trust Network (STN) Certificate Policy Symantec Trust Network (STN) Certificate Policy Version 2.8.24 September 8, 2017 Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA +1 650.527.8000 www.symantec.com - i - - ii - Symantec

More information

Certificate Policy (ETSI EN ) Version 1.1

Certificate Policy (ETSI EN ) Version 1.1 Certificate Policy (ETSI EN 319 411-2) Version 1.1 IDnow GmbH Auenstr. 100 80469 Munich 09.06.2017 IDnow Certificate Policy (ETSI EN 319 411-2) Version 1.1 Date 09.06.2017 Author Armin Bauer, IDnow GmbH

More information

Policy for electronic signature based on certificates issued by the hierarchies of. ANF Autoridad de Certificación

Policy for electronic signature based on certificates issued by the hierarchies of. ANF Autoridad de Certificación Registro Nacional de Asociaciones. Número 171.443. CIF G-63287510 Policy for electronic signature based on certificates issued by the hierarchies of Paseo de la Castellana,79-28046 - Madrid (Spain) Telephone:

More information

Taiwan-CA Inc Global Certification Authority Certification Practices Statement (CPS) (Version1.3) Effective Date:2017/09/26

Taiwan-CA Inc Global Certification Authority Certification Practices Statement (CPS) (Version1.3) Effective Date:2017/09/26 Taiwan-CA Inc Global Certification Authority Certification Practices Statement (CPS) (Version1.3) Effective Date:2017/09/26 Revision Record: Version Effective Released Remarks 1.0 102/01/22 TWCA First

More information

EXBO e-signing Automated for scanned invoices

EXBO e-signing Automated for scanned invoices EXBO e-signing Automated for scanned invoices Signature Policy Document OID: 0.3.2062.7.2.1.12.1.0 Approval Status: Approved Version: 1.0 Page #: 1 of 13 1. Introduction 1.1. Scope This document covers

More information

September OID: Public Document

September OID: Public Document THE UNITED KINGDOM S NATIONAL CERTIFICATE POLICY for Extended Access Control Infrastructure for machine readable travel documents and biometric residence permits issued and read within the UK September

More information

Digi-CPS. Certificate Practice Statement v3.6. Certificate Practice Statement from Digi-Sign Limited.

Digi-CPS. Certificate Practice Statement v3.6. Certificate Practice Statement from Digi-Sign Limited. Certificate Practice Statement v3.6 Certificate Practice Statement from Digi-Sign Limited. Digi-CPS Version 3.6. Produced by the Legal & Technical Departments For further information, please contact: CONTACT:

More information

Northrop Grumman Enterprise Public Key Infrastructure Certificate Policy

Northrop Grumman Enterprise Public Key Infrastructure Certificate Policy Northrop Grumman Enterprise Public Key Infrastructure Certificate Policy Version 1.9 March 6, 2017 Copyright, Northrop Grumman, 2006 1-1 Document Change History NG PKI Certificate Policy VER DATE INFORMATION

More information

Technical Trust Policy

Technical Trust Policy Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality

More information

PAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1

PAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1 PAA PKI Mutual Recognition Framework Copyright PAA, 2009. All Rights Reserved 1 Agenda Overview of the Framework Components of the Framework How It Works Other Considerations Questions and Answers Copyright

More information

Scheme for accreditation, approval and authorization to Access Security-related Repair and Maintenance Information (RMI) SERMI operations group

Scheme for accreditation, approval and authorization to Access Security-related Repair and Maintenance Information (RMI) SERMI operations group Scheme for accreditation, approval and authorization to Access Security-related Repair and Maintenance Information (RMI) SERMI operations group May 2016 Table of contents 1 Scope... 4 2 Normative references...

More information

Certification Practice Statement. for OV SSL. Version 1.2. Date: 6 September 2017

Certification Practice Statement. for OV SSL. Version 1.2. Date: 6 September 2017 Certification Practice Statement certsign Web CA for OV SSL Version 1.2 Date: 6 September 2017 1 Important Notice This document is property of CERTSIGN SA Distribution and reproduction prohibited without

More information

DRAFT REVISIONS BR DOMAIN VALIDATION

DRAFT REVISIONS BR DOMAIN VALIDATION DRAFT REVISIONS BR 3.2.2.4 DOMAIN VALIDATION (Feb. 15, 2016) Summary of changes The primary purpose of this change is to replace Domain Validation item 7 "Using any other method of confirmation which has

More information

CERTIFICATE OF CONFORMITY. The certification body LSTI. declares ALEAT HEADQUARTER : SH.P.K RRUGA: XHANFIZE KEKO - TIRANA-ALBANIA

CERTIFICATE OF CONFORMITY. The certification body LSTI. declares ALEAT HEADQUARTER : SH.P.K RRUGA: XHANFIZE KEKO - TIRANA-ALBANIA CERTIFICATE OF CONFORMITY The certification body LSTI declares ALEAT HEADQUARTER : SH.P.K RRUGA: XHANFIZE KEKO - TIRANA-ALBANIA Provides trust electronic services 1 that comply with Regulation (EU) No.

More information

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. November 2015 Version 4.0. Copyright , The Walt Disney Company

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. November 2015 Version 4.0. Copyright , The Walt Disney Company THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY November 2015 Version 4.0 Copyright 2006-2015, The Walt Disney Company Version Control Version Revision Date Revision Description Revised

More information

FPKIPA CPWG Antecedent, In-Person Task Group

FPKIPA CPWG Antecedent, In-Person Task Group FBCA Supplementary Antecedent, In-Person Definition This supplement provides clarification on the trust relationship between the Trusted Agent and the applicant, which is based on an in-person antecedent

More information

POLICY ON THE PROVISION OF QUALIFIED CERTIFICATES FOR ADVANCED ELECTRONIC SIGNATURE/SEAL BY BORICA AD. (B-Trust QCP-eIDAS АES/АESeal) Version 1.

POLICY ON THE PROVISION OF QUALIFIED CERTIFICATES FOR ADVANCED ELECTRONIC SIGNATURE/SEAL BY BORICA AD. (B-Trust QCP-eIDAS АES/АESeal) Version 1. POLICY ON THE PROVISION OF QUALIFIED CERTIFICATES BY BORICA AD (B-Trust QCP-eIDAS АES/АESeal) Version 1.0 Effective: July 1, 2018 Document history Version Author(s) Date Status Comment 1.0 Dimitar Nikolov

More information

SAFE-BioPharma RAS Privacy Policy

SAFE-BioPharma RAS Privacy Policy SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what

More information

DigiCert. Certificate Policy

DigiCert. Certificate Policy DigiCert Certificate Policy DigiCert, Inc. Version 4.14 January 25, 2018 2801 N. Thanksgiving Way Suite 500 Lehi, UT 84043 USA Tel: 1 801 877 2100 Fax: 1 801 705 0481 www.digicert.com TABLE OF CONTENTS

More information

Belgian Certificate Policy & Practice Statement for eid PKI infrastructure Foreigner CA

Belgian Certificate Policy & Practice Statement for eid PKI infrastructure Foreigner CA Belgian Certificate Policy & Practice Statement for eid PKI infrastructure Foreigner CA OID: 2.16.56.1.1.1.7 2.16.56.9.1.1.7 2.16.56.10.1.1.7 2.16.56.12.1.1.7 Company: Certipost Version: 3.0 Status : FINAL

More information

Cosmos POFESSIONALS OF SAFETY ENGINEERING

Cosmos POFESSIONALS OF SAFETY ENGINEERING Japan-Europe Comparison of Legal Frameworks for Electronic Signatures July 4 th, 2017@Japan-Europe Internet Trust Symposium Soshi Hamaguchi, Corporation eidas Regulation and e-signature Act Definition

More information

CERTIFICATE POLICY ENTITY STAMP

CERTIFICATE POLICY ENTITY STAMP CERTIFICATE POLICY ENTITY STAMP Reference: Entity Stamp certificate policy Version no.: v 1.1 Date: 1 July, 2016 IZENPE 2016 This document is the property of IZENPE. This document may only be wholly reproduced

More information

DigiCert. Certificate Policy. DigiCert, Inc. Version 4.05 May 2, 2013

DigiCert. Certificate Policy. DigiCert, Inc. Version 4.05 May 2, 2013 DigiCert Certificate Policy DigiCert, Inc. Version 4.05 May 2, 2013 2600 West Executive Parkway, Suite 500 Lehi, UT 84043 USA Tel: 1 801 877 2100 Fax: 1 801 705 0481 www.digicert.com TABLE OF CONTENTS

More information

X.509 Certificate Policy. For The Federal Bridge Certification Authority (FBCA)

X.509 Certificate Policy. For The Federal Bridge Certification Authority (FBCA) X.509 Certificate Policy For The Federal Bridge Certification Authority (FBCA) September 10, 2002 Signature Page Chair, Federal Public Key Infrastructure Policy Authority DATE Table of Contents 1. INTRODUCTION...

More information

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006 PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy

More information

Certification Practice Statement of CERTUM s Certification Services Version 3.6 Date: 13 of September, 2013 Status: valid

Certification Practice Statement of CERTUM s Certification Services Version 3.6 Date: 13 of September, 2013 Status: valid Certification Practice Statement of CERTUM s Certification Services Version 3.6 Date: 13 of September, 2013 Status: valid Unizeto Technologies S.A. CERTUM Powszechne Centrum Certyfikacji Królowej Korony

More information

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy Raytheon Company Public Key Infrastructure (PKI) Certificate Policy Version 1.17 April 7, 2017 1 03/08/2016 Signature Page Jeffrey C. Brown Digitally signed by Jeffrey C. Brown DN: dc=com, dc=raytheon,

More information

HF Markets SA (Pty) Ltd Protection of Personal Information Policy

HF Markets SA (Pty) Ltd Protection of Personal Information Policy Protection of Personal Information Policy Protection of Personal Information Policy This privacy statement covers the website www.hotforex.co.za, and all its related subdomains that are registered and

More information

Smart Meters Programme Schedule 2.1

Smart Meters Programme Schedule 2.1 Smart Meters Programme Schedule 2.1 (DCC Requirements) (SMKI version) V1.2 1 Schedule 2.1 (DCC Requirements) This Schedule 2.1 (DCC Requirements) is formed of the following parts: Part A Introduction...3

More information

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10

GDPR AMC SAAS AND HOSTED MODULES. UK version. AMC Consult A/S June 26, 2018 Version 1.10 GDPR AMC SAAS AND HOSTED MODULES UK version AMC Consult A/S June 26, 2018 Version 1.10 INDEX 1 Signatures...3 2 General...4 3 Definitions...5 4 Scoping...6 4.1 In scope...6 5 Responsibilities of the data

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 15945 First edition 2002-02-01 Information technology Security techniques Specification of TTP services to support the application of digital signatures Technologies de l'information

More information

Certification Policy of Issuance Reports Manager and PKI Operator Certificates. Certificate Profile

Certification Policy of Issuance Reports Manager and PKI Operator Certificates. Certificate Profile Maltese Registrar of Companies Number C75870 and VAT number MT 23399415 and PKI Operator Certificates. Certificate Profile ANF AC MALTA, LTD B2 Industry Street, Qormi, QRM 3000 Malta Telephone: (+356)

More information