National Register of Associations. Number CIF G

Size: px
Start display at page:

Download "National Register of Associations. Number 171.443. CIF G-63287510."

Transcription

1 Certificate Policy for Secure Server (SSL), Extended Validation (EV) SSL, Electronic Office and Extended Validation (EV) Electronic Office Certificates National Register of Associations. Number CIF G ANF Autoridad de Certificación Paseo de la Castellana, Madrid (Spain) Teléfono: (calls from Spain) (International) Fax: Web:

2 Security Level Public Document Important Notice This document is property of ANF Autoridad de Certificación Distribution and reproduction prohibited without authorization by ANF Autoridad de Certificación Copyright ANF Autoridad de Certificación 2015 Dirección: Paseo de la Castellana, Madrid (España) Teléfono: (llamadas desde España) (Internacional) Fax: Web: 2

3 Index 1 Introduction Certificates description... Error! Marcador no definido. 1.2 Identification Storage types Users Community Certification Authorities Registration Authorities Recognized Registration Authority Collaborating Registration Authority Issuance Reports Manager End entities Certificate Subscriber Certificate Applicant Certificate responsible Relying third parties Usage field Allowed usage Limits of certificate usage Prohibited usage Certification Entity contact details Definitions and acronyms Information publication and repositories Repositories Information publication Uptades frequency Access controls on repositories Identification and Authentication Name registration... Error! Marcador no definido Types of names Need for names to be meaningful Anonymous or pseudonyms Rules for interpreting various name forms Uniqueness of names Names and brands conflicts solution Initial identity validation Method to prove possession of private key

4 3.2.2 Authentication of applicant, certificate responsible and subscriber identity Re-key Revocation requests Operational requirements Certificate application Processing procedure Identification authentication Applicant Subscriber Legal persons Natural persons Certificate responsible Approval or rejection of certificate applications SSL Certificates Headquarters Certificates SSL EV y and Headquarters EV Certificates Time to process certificate issuance Certificate issuance CA actions during certificate issuance process Notification to subscriber Certificate acceptance Acceptance Certificate Return Tracing Certificate publication Notification of certificate issuance to third parties Rejection Certificates renewal Valid Certificates Persons authorized for requesting the renewal Identificaton and authentication of the routine renewal applications Certificate renewal with rekeying Certificate renewal without rekeying Approval or rejection of applications for renewal Notification of certificate renewal Acceptance of the certificate renewal Publication of the renewal certificate Notification of certificate renewal

5 4.6.9 Identification and authentication of key renewal applications after revocation (non-compromised key) Certificate modification Certificates revocation and suspension Circumstances for revocation Revocation application identification and authentication Procedure for revocation request Revocation request grace period Time within which CA must process the revocation request CRL lists checking requirement CRL issuance frequency On-line revocation checking availability On-line revocation checking requirements Certificate suspension Suspension requests identification and authentication Key storage and recovery Good practices Facilities, physical security, management and operational controls Physical security controls Procedural controls Personnel controls Technical security controls Key pair generation and installation Private Key Protection Other aspects of key pair management Activation data Computer security controls Life cycle technical controls Network security controls Time-stamping Cryptographic Module Security Controls Certificate profiles and revoked certificates lists Certificate profiles Common fields and extensions Specific fields according to the signature algorithm Specific fields according to key length Specific Fields by type of certificate SSL Secure Server Certificate (with SHA-1)

6 SSL Secure Server Certificate (with SHA-256) SSL EV Secure Server Certificate (with SHA-1) SSL EV Secure Server Certificate (with SHA-256) Electronic Office Medium Level Certificate (with SHA-1) Electronic Office Medium Level Certificate (with SHA-256) Electronic Office High Level Certificate (with SHA-1) Electronic Office High Level Certificate (with SHA-256) Medium Level Certificate (with SHA-1) Medium Level Certificate (with SHA-256) High Level Certificate (with SHA-1) High Level Certificate (with SHA-256) CRL profile OCSP profile Compliance audit Each entity compliance controls frequency Identity of personnel in charge of the audit Auditor relationship to audited entity Topics covered by audit Actions taken as a result of lack of compliance Audit reports treatment General regulations Fees Financial responsibility Confidentiality of information Privacy of personal information Intellectual property rights Obligations and guarranties Disclaimers of guarranties Limitations of liability Interpretation and execution... Error! Marcador no definido CP management Appendix I Certificate Application Form Appendix II Contract for the Provision of Electronic Certification Services Special Conditions

7 Appendix III Act of Authorization and Acceptance of Responsibility in the Certificate Use Appendix IV Certificate Renewal Application Letter Appendix V Certificate Revocation Application Form Appendix VI Act of Certificate Reception and Acceptance Appendix VII Identity Statement

8 1 Introduction ANF Certification Authority (henceforth, ANF AC) is a corporate entity, constituted under Basic Law 1/2002 of the 22nd of March, and written in the Ministry of the Interior with national number and company tax code G ANF AC has been assigned the SMI Network Management Private Enterprise Code by the international organisation IANA - Internet Assigned Numbers Authority - under the branch iso.org.dod.internet.private.enterprise ( IANA Registered Private Enterprise-). This document is the Certification Policy (CP) corresponding to Secure Server (SSL), Extended Validation (EV) SSL, Electronic Office and Extended Validation (EV) Electronic Office Certificates issued by ANF AC. This documentation contains the regulations to which the uses of certificates defined in this policy are subjected, and defines the directives that ANF AC uses to their issuance, management, renovation, revocation and any other process that affects their life cycle. The roles, responsibilities and relationships between the end-user and ANF AC, such as application rules, renewal and revocation that have to be attended are described. This Certification Policy only one of several documents governing the PKI of ANF AC, and it details and supplements the definitions in the Certification Practice Statement and its addendum. ANF AC oversees and supervises this PC is compatible and consistent with the other documents produced. All documentation is freely available to users and relying parties at In accordance with the IETF RFC 3647 PKIX framework, this Certification Policy is divided in nine sections that allow security controls, practices and procedures for certification or time stamping services in the PKI of ANF AC. To preserve the recommended template in document RFC 3647, the titles of each section have been respected. Not applicable is added in case they do not apply to this PKI, and As defined in, is included in case the section is defined in another ANF AC document. This document indicates the policies ANF AC employs to meet the requirements of the "Guidelines for the Issuance and Management of Extended Validation Certificates" published by the CA/Browser Forum. ANF AC always conforms to the latest version of the EV Guidelines published by the CA/Browser Forum in In case of incompatibility, the Guidelines override this document. The Timestamping processes employeed conform to standards IETF RFC 5816, ANSI X9.95, ETSI , and ETSI This Certification Policy assumes a series of commitments that are in accordance with the recommendations published by Mozilla at about controversial CA Practices. ANF AC is certified by the WebTrust service under their Principles and Criteria for Extended Validation Certificates guidelines and the CA / Browser Forum Guidelines for the Issuance and Management of Extended Validation Certificates. These guidelines indicate the minimum requirements to apply for certification authorities to issue SSL-EV certificates with the aim of providing reliability in the identification and control of the identity of the services accessed. This Certification Policy assumes that the reader knows and understands PKI, certificate and electronic signature concepts. If this is not the case, the reader is recommended to be trained in those concepts before continuing to read this document. 8

9 1.1 Certificates description ANF AC, in the framework of its Electronic Certification Service, issues: Secure Server SSL The purpose of this certificate is to establish data communications through TLS / SSL protocols in services and applications, especially for: - The identification of the organization holding the domain (DNS) to provide reasonable assurance to the user of a web browser that the website being accessed is owned by the organization identified in the certificate through its name and address. - Encryption of communications between the user and the website, facilitating the exchange of encryption keys necessary for encryption of information through Internet. The maximum validity of these certificates is 2 years. Extended Validation (EV) Secure Server SSL Certificates In addition to the utilities provided by the SSL certificate, Extended Validation (EV) aims to provide a better level of authentication for organizations, to secure transactions on their websites. The purpose of EV SSL Certificates is their use in TLS / SSL protocols, in order to ensure the validity of the constitution of the organization identified in the certificate, and therefore avoiding phishing or other cases of online identity fraud. ANF AC meets the guidelines stated by the CA / Browser Forum and published on its website including the acceptance of audit programs specified therein. The maximum validity of these certificates is 2 years. Electronic Office The purpose of this certificate is to establish data communications through TLS / SSL in services and applications, especially for: - The identification of the public administration, administrative body or entity that owns the domain. - Encryption of communications between the user and the website, facilitating the exchange of encryption keys necessary for encryption of information through Internet. This is a certificate issued as qualified, which identifies the public administration, administrative body or administrative entity owner of the office. The maximum validity of these certificates is 2 years. 9

10 In addition to the utilities provided by the Electronic Office certificate, Extended Validation (EV) aims to provide a better level of authentication for Public Administration, body or administrative entity to secure transactions on their websites avoiding phishing cases or any other online identity fraud. In addition, ANF AC meets the guidelines stated by the CA / Browser Forum and published on its website including the acceptance of audit programs specified therein. The maximum validity of these certificates is 2 years. 1.2 Identification Document name Certificate Policy for Secure Server (SSL), Extended Validation (EV) SSL, Electronic Office and Extended Validation (EV) Electronic Office Version 1.9 Policy status APPROVED Document reference / Publication date December 31 th, 2014 Expiration date Related CPS Location Not applicable Certification Practice Statement (CPS) of ANF AC In order to identify the certificates, ANF AC has assigned the following object identifiers (OID): Certificado Secure Server SSL With SHA-1 algorithm and 2048-bit key length Secure Server SSL With SHA-256 algorithm and 2048-bit key length Secure Server SSL EV With SHA-1 algorithm and 2048-bit key length EV SSL Secure Server With SHA-256 algorithm and length 2048 bits Middle Level With SHA-1 algorithm and length 2048 bits Middle Level With SHA-256 algorithm and length 2048 bits EV High Level Electronic Office With SHA-1 algorithm and length 2048 bits EV High Level Electronic Office With SHA-256 algorithm and length 2048 bits OID

11 Middle Level Electronic Office With SHA-1 algorithm and 2048-bit key length Electronic Office Medium Level With SHA-256 algorithm and 2048-bit key length Electronic Office High Level With SHA-1 algorithm and 2048-bit key length Electronic Office High Level With SHA-256 algorithm and 2048-bit key length Storage types Secure Server (SSL), Extended Validation (EV) SSL, Electronic Office and Extended Validation (EV) Electronic Office are issued in three types of containers, depending on where the key pair is made and stored: Cryptographic software token. The signature creation data are contained in a cryptographic token in PKCS#15 format. This token is built in the 1.1 version of PKCS#15. Tokens authorized by ANF AC are only those published on the website. Cryptographic hardware storage. Stored in a signature creation device. Cryptographic hardware with biometric data capture storage. Stored in a signature creation device. This policy, in relation of Electronic Office certificates, follows the definition of assurance levels for electronic certificates profiles, collected in the Anexo II: Perfiles de certificados electrónicos ("Appendix II: Profiles of electronic certificates") document, approved by the Spanish Council for Electronic Administration on May 30, Two different levels of assurance are defined: a. Medium level: This level corresponds to a configuration of security mechanisms suitable for most applications. The expected risk for this level (following the recommendations of the OECD) is: - Security breach (e.g. identity theft). - May cause moderate economic losses. - Loss of sensitive or critical information. - Refutation of a transaction with significant economic impact. Besides, the expected risk for this level corresponds to level 3 warranty provided in Basic Authentication IDABC Policy * 1. 11

12 Acceptable security mechanisms include X.509 software certificates. In the case of certificates issued to people, they correspond with a "qualified certificate as defined in Spanish Law 59/2003 on electronic signature, about advanced electronic signatures, with no signature creation device. b. High level: This level corresponds to a configuration of security mechanisms suitable for applications that require additional measures, according to the risk analysis performed. The expected risk for this level (following the recommendations of the OECD) is: - Security breach. - May cause important economic losses. - Loss of highly sensitive or critical information. - Refutation of a transaction with highly significant economic impact. Besides, the expected risk for this level corresponds to level 4 warranty provided in Basic Authentication IDABC Policy * 1. Acceptable security mechanisms include X.509 software certificates. In the case of certificates issued to people, they correspond with a "recognized electronic signature, as defined in Spanish Law 59/2003 on electronic signature. The support needs to be approved by ANF Certification Authority. According to these specifications, keys of medium level certificates are created and stored in software support. ANF AC has a time stamping service as determined by the ETSI TS , according to ANF Time Stamping Authority OID CPS. When the subscriber choses software storage, systems that store private keys must meet a number of requirements for physical and logical security. ANF AC may, at its discretion, ask the subscriber evidences of the mechanisms used for the hardening of such systems. In reviews carried out on these systems, ANF AC shall follow the recommendations published by the NCC (National Cryptologic Centre) of Spain, in its CCN-STIC series, geared specifically to ensure the safety of the systems of information technology and communications. 12

13 * 1 Decision 2004/387/EC of the European Parliament and of the Council of 21 April 2004 on the interoperable delivery of pan-european egovernment services to public administrations, businesses and citizens (IDABC). [L144 of Official Diary] 1.4 Users community Certification Authorities As defined in the Certification Practice Statement (CPS) of ANF AC. These are the entities which issue electronic certificates which link a public key with the subscriber identity. They act as a trusted third party between the Subscriber and relying Third parties Registration Authorities These are entities that perform registration procedures of applicants for end entity certificates. They perform the identification and authentication of individuals involved in the application, and they have the ability to initiate or assist in the procedures for revocation and renewal of certificates. These entities may belong to the organization of the certification, or may be external partners, in which case ANF AC defines two types: Recognized Registration Authority Collaborating Registration Authority Issuance Reports Manager End entities Certificate subscriber The subscriber is the natural or legal person that is the certificate holder. Natural persons must be of legal age; in the case of legal entities applying for the issuance of an EV SSL certificate, these must be older than two years Certificate applicant The certificate must be requested by an adult, in his/her own behalf or, if acting on behalf of a third party, with legal capacity to assume the representation of the subscriber. His/her identity will be included in the certificate as a legal representative. 13

14 Certificate responsible The certificate responsible holds the signature creation device and is responsible for its use and custody. This must be an adult with full capacity to act and registering their consent for this responsibility. The certificate responsible must have express authorization from the applicant, and his/her identity shall be included in the certificate. The certificate responsible must be a legal age physical person, with total ability for acting and has to state his/her constent to assume this responsibility Relying third parties 1.5 Usage field Allowed usage Certificates issued under this Policy shall be used with the following purposes: DNS Identification. Certificates issued under this Policy allow to identify and link a determined DNS (Domain Name System) domain to the entity owning that domain, which is the certificate subscriber. Encryption of communications between the user and the website, facilitating the exchange of encryption keys necessary for encryption of information through Internet Limits of certificate usage Prohibited usage No other uses than the ones stated in this Policy and the CPS of ANF AC are allowed. 1.6 Certification Entity contact details 1.7 Definitions and acronyms 14

15 2 Publication and repository responsibilities 2.1 Repositories 2.2 Information publication 2.3 Updates frequency 2.4 Access controls on repositories 15

16 16

17 3 Identification and Authentication 3.1 Name registration Types of names All certificates require a Distinguished Name (DN) under the X.500 standard. Personal circumstances and attributes of the persons and organizations identified in the certificates are included in attributes predefined in regulations and generally recognized technical specifications Need for names to be meaningful All SSL and SSL EV certificates contain a distinguished name (DN) that identifies the DNS domain and the holder person or organization that holds it, according with provision of the ITU-T X.501 reccomendation, and contained in the Subject field, including a Common Name. The CN (Common Name) of the DN must refer to the DNS domain name Anonymous or pseudonyms This is not allowed Rules for interpreting various name forms In any case, standard X.500 (referred in the ISO/IEC 9594) name will be attended Uniqueness of names The certificate will be issued with the full name of the service that will be provided with SSL features. This name must be unique in the network. Partial names will not be accepted Conflicts related to names and brands resolution Applicants for certificates shall not include names in applications that may involve breach of third party trademark rights by the subscriber. ANF AC reserves the right to refuse a certificate request because of name conflict. ANF AC shall check if the requested domain name may be misleading under another existing name exists in the network, and if available, will determine in its sole discretion on whether to issue or refuse to issue the requested certificate. 17

18 3.2 Initial identity validation Method to prove possession of private key Authentication of individual identity Certificates issued under this Certification Policy will identify the subscriber under whose name a DNS domain has been registered. They will also indentify the certificate subscriber (if a legal representative has processed the application in the subscriber name) and the certificate responsible (if any other person who is not the subscriber or applicant). The Issuance Reports Manager will use appropriate means to ensure the accuracy of the information contained in the certificate. These means include external registry databases and the ability to require information or documents to the subscriber. The fiscal identification of the applicant and subscriber and device owner will be incorporated into the certificate. Types of documentation, processing modality, authentication and validation procedures are specified in the following sections. 3.3 Re-key requests In the course of re-key, ANF AC shall inform the subscriber about the changes that have occurred in the terms and conditions with respect to the previous issue. A new certificate may be issued to maintain the previous public key, as long as it is considered cryptographically secure. 3.4 Revocation requests All cancellation requests must be authenticated. ANF AC checks the applicant's ability to handle this requirement. 18

19 19

20 4 Operational Requirements 4.1 Certificate application ANF AC only accepts requests with a proper name or third party name, completed by adults with the capacity to work by their own free will. Applicants must complete the Application Form of the certificate by taking responsibility for the accuracy of the information listed, and submit it to ANF AC using any of the following means: a) Electronically: the website includes an application form that should be filled and electronically signed with a qualified certificate, according to Electronic Signature Law 59/2003, December 19th. The certificate used must have been issued by a CA approved by ANF AC. b) In person: the applicant may appear before a Recognized Registration Authority, and shall duly complete and sign the application form. c) By mail: the applicant may submit the application form to the offices of ANF AC certificate, having duly completed and authenticated his signature before a Collaborating Registration Authority. ANF AC does not generate the keys of its users. The applicant must generate his/her own key pair and certificate request in PKCS#10 /CSR format, using in this process a device approved by ANF AC, together with the certificate Application Form. 4.2 Processing procedure Identity authentication Applicant Apart from the SSL certificates, when the processing is done in person before a Registration Authority, the applicant must prove his/her identity and submit, in effect, original or certified copy of the following documents: a) Physical Address and other contact data. If deemed necessary by the Registration Authority or the Issuance Reports Manager, additional documents may be included to check the reliability of the information, such as recent utility bills or bank statements. In case the RRA or the IRM know the applicant personally, they should personally issue and sign a Declaration of Identity * 1. b) The RRA, as proof of attendance and in order to preclude the repudiation of the procedure done, can get a set of biometric evidence: photography and / or fingerprints. c) ID card or Passport in case of nationals, whose photograph allows verifying the identity of the person. In case of low sharpness of the picture, another official document with picture may be requested (e.g. driver s license). d) In case of foreign nationals, the following will be required: 20

21 I. To European Union members or European Economic Area members: National Identity Card (or local equivalent) or passport with photograph that allows to verify the identity of the person appearing. In case of low sharpness of the picture, another official document with picture may be requested (e.g. driver s license). Certificate issued by the Register of the Citizen Members of the Union. II. To non-eu citizens: Passport, residence permit and work permit with photograph that allows comparing the identity of the person appearing. In case of low sharpness of the picture, another official document with picture may be requested (e.g. driver s license). In case of acting in the name and representation of a third part, the following will be required: Enough representation power. In addition to administrators and legal representatives, voluntary representatives shall be accepted when they demonstrate sufficient power to carry out acts of administration or concluding contracts on behalf of the entity. The applicant may be waived of appearing before the Registration Authority in any of the following cases: 1. If the appropriate forms have been properly completed, and the subscriber s signature has been legitimized in the presence of attorney, by attaching certified copies of identity, authorization and legal representation documents. For public entities, the figure of attorney may be replaced by the presence of an officer with powers of a public notary, according to local legal effect. 2. Electronic processing. The website includes an application form that should be filled and electronically sign with a qualified certificate, according to Electronic Signature Law 59/2003, December 19th. The certificate used must has been issued by a CA approved by ANF AC Subscribers Legal persons The following data and documentation are required: Physical address and other contact details of the entity. If the RRA or the IRM deem it necessary, additional documents, such as recent utility bills or bank statements, may be requested in order to check the reliability of the information. If the RRA or the IRM known the subscriber personally, they shall issue and sign a Declaration of Identity * 1. Tax identification (CIF) of the entity. According to legal form: Corporations or other legal persons whose registration is required under the Commercial Register, shall prove their valid constitution by providing: 21

22 - For SSL certificates applications, simple registry note on constitution data and current management of the entity. - For SSL EV certificates applications, original or certified copy of the Register data on current constitution and management of the entity. Associations, foundations and cooperatives shall prove their valid constitution by providing original or certified copy of a certificate of public record in which they are inscribed on its constitution. Civil societies and other legal persons, shall provide original or certified copy of the public document attesting to their constitution in a reliable way. Public Administrations and public sector entities: - Entities whose enrollment is mandatory in a register, shall prove their valid constitution by providing original or certified copy of a certificate of incorporation data and legal personality. - Entities created by rule, shall provide reference to the creation norm Natural persons Same procedure as in section Applicant Certificate responsible In the application form, the applicant must identify and expressly authorize the device owner and responsible of the certificate. This authorization must be perfected with a voluntary and express acceptance by the person who will be responsible for the certificate. This must appear before the Registration Authority and present proof of identity, effective, original or certified copy of the following documents: a) Physical Address and other contact data. If deemed necessary by the Registration Authority or the Issuance Reports Manager, additional documents may be included to check the reliability of the information, such as recent utility bills or bank statements. In case the RRA or the IRM know the applicant personally, they should personally issue and sign a Declaration of Identity * 1. b) The RRA, as proof of attendance and in order to preclude the repudiation of the procedure done, can get a set of biometric evidence: photography and / or fingerprints. c) ID card or Passport in case of nationals, whose photograph allows to verify the identity of the person. In case of low sharpness of the picture, another official document with picture may be requested (e.g. driver s license). d) In case of foreign nationals, the following will be required: I. To European Union members or European Economic Area members: National Identity Card (or local equivalent) or passport with photograph that allows to verify the identity of the person appearing. In case of low sharpness of the picture, 22

23 another official document with picture may be requested (e.g. driver s license). Certificate issued by the Register of the Citizen Members of the Union. II. To non-eu citizens: e) Passport, residence permit and work permit with photograph that allows comparing the identity of the person appearing. In case of low sharpness of the picture, another official document with picture may be requested (e.g. driver s license). * 1 Declaration of Identity It consists of a formal declaration under oath, in which the respondent says he knows personally and directly a particular individual or a legal entity. Besides, it notes, up to their direct knowledge, that the address, telephone and outlined in the application form are true. The Declaration of Identity incorporates the identity of the declarant, his ID card number, the data verified, the date and time of verification, the signature of the declarant and the appropriate legal warnings in case of perjury Approval or rejection of certificate applications The Issuance Reports Manager (IRM) assumes the final response assumes the ultimate responsibility to verify the information contained in the Application Form, and to assess the adequacy of the documents provided and of the application, in accordance with the provisions of this Certification Policy. Moreover, he/she will determine: That the subscriber has access to the terms and conditions relating to the use of the certificate, as well as to the issuance fees. That the subscriber has had access and has permanent access to all documents relating to the duties and responsibilities of the CA, the subscriber, applicant, those responsible for the certificate and relying parties, especially the CPS and Certification Policies. Besides, he/she shall monitor compliance with any requirements imposed by the legislation on data protection, as established in the security document included in the CPS, the purpose of the LOPD as provided in Article 19.3 of Spanish Electronic Signature Law 59/2003, December 19th. The process of issuing the certificate shall not start as long as the Issuance Reports Manager has not issued the corresponding compliance report. The deadline set for the issuance of the report is 15 days. After that period without issuing the mandatory report, the applicant may immediately cancel the order and receive the fees paid. The IRM may require additional information or documentation from the applicant, which will have 15 days to deliver it. After this period, without having completed the requirement, the IRM will issue a report denying the issuance. Should the applicant meet the requirement, the IRM will have 7 days to issue the final report. In case the IRM verifies that the information provided by the applicant is not true, he/she will deny the issuance of the certificate, and will generate an incident report to the Security Coordinator, to determine whether or not to include the applicant in the blacklist of individuals and entities with OID

24 The validation procedure by type of certificate is the following: SSL Certificates The IRM shall check the documentation by consulting the whois database, verifying that the domain is registered, by consulting valid registrars. A copy of the whois query is attached to the validation act Electronic Office Certificates The IRM shall check the norm of Office creation and its holder SSL EV y and Certificates The IRM shall check the documentation provided by the applicant and the Registration Authority. The validation process will be supported by the Legal Department and the Technical Department, which will review and technically validate the certificate request PKCS#10. In the process of verification of the information and documentation received, the following means may be used: Consultation to official public records in which the entity must be registered in order to check availability, effect of charges and other legal issues such as activity and date of establishment. Official Journals of national or regional public bodies belonging to public bodies and enterprises. With regard to Internet addresses and domains, ANF AC consult recorders attached only by ICANN / IANA domain names and addresses associated with the certificate. In this query, it is verified verify: - That the holder (registrant) agrees with the subscriber. - People and contact information associated with that domain registration. One of the contact persons listed in the whois query shall be reached in order to verify compliance of the certificate issuance request associated with that domain. Verification of the subscriber, applicant and device owner contact details: o Telephone: - Subscriber: a landline (not mobile) shall be used. This shall be checked in yellow pages, AEPD (Spanish Data Protection Agency), and by personal call. - Applicant and device owner: through personal call. o Postal Address: it shall be checked in Yellow Pages, AEPD or Informa service. 24

25 o it shall be verified by sending an requesting confirmation of receipt. It is verified that none of the individuals associated with the request are recorded in the blacklist of individuals and entities with OID or is operating in a place where the CA policies forbids the certificate issuance (document with OID ). It is verified that the domain is not included as suspicious in the Anti Phishing Workgroup website or similar ones. It is verified that none of the individuals associated with the request is listed as a criminal in public records. ANF AC regularly updates its database with all persons appearing on search and seizure, and links this control blacklist certificate request. Also, for domain names associated with relying third parties: In case of confusión of identity of activity the certificate issuance will not be authorized, (eg. where the subscriber's activity does not correspond to that of a financial institution). In case of relevant trademarks, the Spanish Patent and Trademark Office shall be checked. When the domain name associated with a brand of relevance and public awareness, it will be verified if the owner of the trademark is related to the subscriber. In negative case, the IRM shall ask clarification and authorization to the subscriber. No person may issue this certificate when the name is associated with a relevant brand whose domain is not owned by the subscriber, or has permission form the owner of the mark, since it may cause confusion to third parties (eg etc.). In cases where validation cannot be performed on the terms and sources defined above, this will be noted in the verification act issued by the IRM, and the alternative source used shall be included Time to process certificate applications The issuance of a certificate means the complete and final approval of an application by the Issuance Reports Manager. The issuance of certificate must be made within 48 hours, once issued the report of the IRM, as defined in the CPS of ANF AC. 4.3 Certificate issuance ANF AC will avoid generating certificates that expire after the CA that issued them Certification Entity actions during certificate issuance ANF AC will deliver the certificate, by signed electronic mail, to the Technical Responsible that is stated in the Issuance Application Form. 25

26 4.3.2 Notification to subscriber ANF AC notifies the subscriber via , the certificate issuance and publication. 4.4 Certificate acceptance Acceptance After the delivery of the certificate, the subscriber shall have a period of seven calendar days to verify the certificate and to determine whether it is appropriate and whether the data are consistent with the required information. The subscriber has a period of 15 days to sign the Act of Reception and Acceptance of the received Certificate. Through the Act of Reception and Acceptance, the subscriber confirms receipt of the certificate, acceptance to the issuance made, the correct functionality of the product, its ability to use it to sign the minutes with this certificate; reaffirms its submission to the ANF AC CPS and Policies, to use it in accordance with the limitations in the use and purpose for which it was issued, the responsibility to maintain the confidentiality of the private key, and the commitment to cease use after the loss of force, either by expiration or revocation Certificate return The subscriber has a period of 7 days from the delivery of the certificate, to verify its proper operation. In case of malfunction or due to technical errors in the data contained in the certificate, the applicant or those responsible for the certificate can send an electronically signed to ANF AC, reporting the reason for the return. ANF AC shall verify the causes of removal revoke the certificate issued and issue a new certificate within 72 hours Tracing ANF AC is not responsible for the monitoring, investigation or confirmation of the accuracy of the information contained in the certificate after issuance. For information on the inaccuracy or no current applicability of the information contained in the certificate, it can be revoked Certificate publication The certificate is published in the repositories of ANF AC, within a maximum period of 24 hours since its emission has occurred Notification of certificate issuance to third parties No notification is made to third parties. 26

27 4.5 Rejection 4.6 Certificate renewal Generally, as defined in the CPS of ANF AC Valid certificates ANF AC notifies the subscriber and the certificate expiration applicant by , submitting the application form, in order to proceed with its renovation. These notifications are sent at 90, 30 and 15 days prior to the expiration date of the certificate. Only valid certificates can be renewed Persons authorized to request the renewal The renewal application form must be signed by the same applicant, whether that is the actual subscriber or the legal representative who processed the certificate request. The personal circumstances of the applicant should not have changed, especially its capacity for legal representation Routine renewal requests authentication and identification The process for reference / renewal is the same as for new issuance. The documentation to be provided by the applicant and the validation steps, issuance and delivery of certificates are the same as for the issuance of a new certificate. Two ways of renewal are considered: Certificate renewal with rekeying As defined in ANF AC CPS Certificate renewal without rekeying As defined in ANF AC CPS Approval or rejection of renewal applications Same procedure as that performed in the issuance process specified herein Notification of certificate renewal Same procedure as that performed in the issuance process specified herein. 27

28 4.6.6 Certificate renewal acceptance Same procedure as that performed in the issuance process specified herein Publication of the renew certificate Same procedure as that performed in the issuance process specified herein Notification of certificate renewal Same procedure as that specified in the section Notification of certificate issuance to third parties Identification and authentication of key renewal applications after revocation (uncommitted key) The renewal of expired or revoked certificates is not authorized. 4.7 Certificate modification Not applicable. 4.8 Certificate revocation and suspension As generally defined in the CPS of ANF AC Circumstances for revocation Besides those defined in the CPS, ANF AC shall: Provide instructions and legal support for reporting complaints or suspected compromise of the private key, of certificate misuse or about any type of fraud or misconduct. The instructions are published and permanently updated in: You may file directly your suspicion or complaint in: Anyone who sets out technical instructions or legal support in this field, can make your consultations for free by one of the following procedures: o Via telephone call in office hours: (calls from Spain) (monday to friday from 9 h. to 18 h.) (International) o Online procedure. The applicant must fill the form published in the website: 28

29 o Sending an to: ANF AC will investigate incidents of which it has knowledge, within twenty four hours of receipt. The Security Manager, based on inquiries and verifications, shall issue a report to the Issuance Reports Manager, which will determine if the corresponding revocation founded by Act, which shall include: - Nature of the incident. - Received information. - Legal rules and regulation on which the revocation order is based. Every applicant can open an incident through any of the following procedures:: o Via telephone call in office hours: (calls from Spain) (monday to friday from 9 h. to 18 h.) (International) o Online procedure. The applicant must open an incident in the Webservice: Revocation applications identification and authentication Revocation of a certificate can be requested by: The subscriber of a certificate. The applicant. The device owner and responsible for the certificate usage. ANF AC. The Recognized Registration Authority. The identification policy for revocation requests accepts the following methods of identification: Electronically: by electronic signature of the revocation request by the applicant of the certificate or of the operator at the time of the revocation request. By telephone: by replying to questions from the telephone support service available at the number (calls from Spain) or (International). In person: appearing the subscriber or the legal representative of the certificate holder in any of the offices of ANF AC published at the web address proving their identity through original documentation, and manually signing the appropriate form. 29

30 ANF AC, or any of the Recognized Registration Authorities that compose its National Proximity Network, may request revocation of a certificate if they knew or suspected compromise of the private key associated with the certificate, or any other fact to recommend take such action. ANF AC must authenticate requests and reports relating to revocation of a certificate, verifying that they come from an authorized person. Such requests and reports will be confirmed following the procedures set out in the Certification Practice Statement Procedure for revocation request Any entity which needs to revoke a certificate must apply to ANF AC or the Registry Authority which issued the certificate. In the event of revocation made by , it shall be sent to the address info@anf.es. Any revocation application is to contain at least the following information: Revocation request date. Identity of subscriber. Reason given for the revocation request. Name and title of the person requesting revocation. Contact information of the person requesting revocation. The revocation application will be processed upon receipt. The request must be authenticated in agreement with the requirements established in the corresponding section of this policy before proceeding with the revocation. Once the request is authenticated, ANF AC may directly revoke the certificate and inform the subscriber and, where appropriate, those responsible for the certificate on the certificate's change of status Revocation request grace period Revocation requests shall be processed immediately when reasonably aware of the cause of revocation and the applicant has been authenticated and verified its capacity to act Time within which CA must process the revocation request The revocation request will be processed in the shortest possible time, always following the procedure of verification and authentication of the request, which is the Issuance Reports Manager s responsibility CRL lists verification requirements The relying parties must check the status of certificates which will rely. For this intent, they can check the latest CRL issued within the period of validity of the certificate of interest. 30

31 4.8.7 CRL issuance frequency Revocation online verification availability ANF AC offers relying third parties an on-line revocation checking service, which is available 24 hours a day, 7 days a week Revocation online verification requirements Trusted third parties must check the status of those certificates they wish to be entrusted to through website. The consultation system requires prior knowledge of some parameters of the certificate of interest. As this procedure prevents massive data collection. This service meets the requirements in terms of protection of personal data and only copies of these certificates provided to third parties duly authorized. Access to this system is free Certificate suspension Not applicable Suspension requests authentication and identification Certificate suspension is not allowed. 4.9 Key storage and recovery ANF AC does not store or has the ability to store the private key of the subscribers, and therefore offers no key recovery service Good practices a) Private keys stored in PKCS#12 files. Some issuers generate the key pair for their subscribers, and then deliver the validated SSL certificate in a PKCS #12 file. This is considered an unsafe practice and, as outlined in this CP, this CA does not generate the keys of subscribers. The subscriber is the one that generates his own key pair, in any of the software or hardware forms. ANF AC does not have in any case access to the private key of its users. 31

Gandi CA Certification Practice Statement

Gandi CA Certification Practice Statement Gandi CA Certification Practice Statement Gandi SAS 15 Place de la Nation Paris 75011 France Version 1.0 TABLE OF CONTENTS 1.INTRODUCTION...10 1.1.Overview...10 1.2.Document Name and Identification...10

More information

CERTIFICATION PRACTICE STATEMENT UPDATE

CERTIFICATION PRACTICE STATEMENT UPDATE CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.

More information

THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Published By: RSA Security Inc.

THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Published By: RSA Security Inc. THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Last Revision Date: June 28, 2007 Version: 3.0 Published By: RSA Security Inc. Copyright 2002-2007 by

More information

Globe Hosting Certification Authority Globe Hosting, Inc. 501 Silverside Road, Suite 105, Wilmington, DE 19809, County of New Castle, United States

Globe Hosting Certification Authority Globe Hosting, Inc. 501 Silverside Road, Suite 105, Wilmington, DE 19809, County of New Castle, United States Globe Hosting Certification Authority Globe Hosting, Inc. 501 Silverside Road, Suite 105, Wilmington, DE 19809, County of New Castle, United States www.globessl.com TABLE OF CONTENTS 1. INTRODUCTION...

More information

EuropeanSSL Secure Certification Practice Statement

EuropeanSSL Secure Certification Practice Statement EuropeanSSL Secure Certification Practice Statement Eunetic GmbH Version 1.0 14 July 2008 Wagnerstrasse 25 76448 Durmersheim Tel: +49 (0) 180 / 386 384 2 Fax: +49 (0) 180 / 329 329 329 www.eunetic.eu TABLE

More information

Equens Certificate Policy

Equens Certificate Policy Equens Certificate Policy WebServices and Connectivity Final H.C. van der Wijck 11 March 2015 Classification: Open Version 3.0 Version history Version no. Version date Status Edited by Most important edit(s)

More information

SSL.com Certification Practice Statement

SSL.com Certification Practice Statement SSL.com Certification Practice Statement SSL.com Version 1.0 February 15, 2012 2260 W Holcombe Blvd Ste 700 Houston, Texas, 77019 US Tel: +1 SSL-CERTIFICATE (+1-775-237-8434) Fax: +1 832-201-7706 www.ssl.com

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

CERTIFICATE POLICY (CP) (For SSL, EV SSL, OSC and similar electronic certificates)

CERTIFICATE POLICY (CP) (For SSL, EV SSL, OSC and similar electronic certificates) (CP) (For SSL, EV SSL, OSC and similar electronic certificates) VERSION : 09 DATE : 01.12.2014 1. INTRODUCTION... 10 1.1. Overview... 10 1.2. Document Name and Identification... 11 1.3. Participants...

More information

TeliaSonera Server Certificate Policy and Certification Practice Statement

TeliaSonera Server Certificate Policy and Certification Practice Statement TeliaSonera Server Certificate Policy and Certification Practice Statement v.1.4 TeliaSonera Server Certificate Policy and Certification Practice Statement CA name Validation OID TeliaSonera Server CA

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

Registration Practices Statement. Grid Registration Authority Approved December, 2011 Version 1.00

Registration Practices Statement. Grid Registration Authority Approved December, 2011 Version 1.00 Registration Practices Statement Grid Registration Authority Approved December, 2011 Version 1.00 i TABLE OF CONTENTS 1. Introduction... 1 1.1. Overview... 1 1.2. Document name and Identification... 1

More information

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc. Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.8 Effective Date: June 11, 2012 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2.

More information

Danske Bank Group Certificate Policy

Danske Bank Group Certificate Policy Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

VeriSign Trust Network Certificate Policies

VeriSign Trust Network Certificate Policies VeriSign Trust Network Certificate Policies Version 2.8.1 Effective Date: February 1, 2009 VeriSign, Inc. 487 E. Middlefield Road Mountain View, CA 94043 USA +1 650.961.7500 http//:www.verisign.com - 1-

More information

Ford Motor Company CA Certification Practice Statement

Ford Motor Company CA Certification Practice Statement Certification Practice Statement Date: February 21, 2008 Version: 1.0.1 Table of Contents Document History... 1 Acknowledgments... 1 1. Introduction... 2 1.1 Overview... 3 1.2 Ford Motor Company Certificate

More information

Symantec Trust Network (STN) Certificate Policy

Symantec Trust Network (STN) Certificate Policy Symantec Trust Network (STN) Certificate Policy Version 2.8.5 Effective Date: September 8, 2011 Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA +1 650.527.8000 http//:www.symantec.com

More information

L@Wtrust Class 3 Registration Authority Charter

L@Wtrust Class 3 Registration Authority Charter Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12

More information

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

TR-GRID CERTIFICATION AUTHORITY

TR-GRID CERTIFICATION AUTHORITY TR-GRID CERTIFICATION AUTHORITY CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT Version 2.3 May 15, 2014 Table of Contents TABLE OF CONTENTS:... 2 1. INTRODUCTION... 7 1.1 OVERVIEW... 7 1.2 DOCUMENT

More information

Certification Practice Statement of CERTUM s Certification Services

Certification Practice Statement of CERTUM s Certification Services Certification Practice Statement of CERTUM s Certification Services Appendix 3: Guidelines for the issuance and management of Extended Validation SSL certificates Version 3.2 Date: 9 th of February, 2011

More information

Public Certification Authority Certification Practice Statement of Chunghwa Telecom (PublicCA CPS) Version 1.5

Public Certification Authority Certification Practice Statement of Chunghwa Telecom (PublicCA CPS) Version 1.5 Public Certification Authority Certification Practice Statement of Chunghwa Telecom (PublicCA CPS) Version 1.5 Chunghwa Telecom Co., Ltd. August 21, 2015 Contents 1. INTRODUCTION... 1 1.1 OVERVIEW... 1

More information

Certification Practice Statement for Extended Validation Certificates

Certification Practice Statement for Extended Validation Certificates DigiCert Certification Practice Statement for Extended Validation Certificates DigiCert, Inc. Version 1.0.4 May 29, 2009 Suite 200 Canopy Building II 355 South 520 West Lindon, UT 84042 USA Tel: 1-801-877-2100

More information

DigiCert. Certificate Policy. DigiCert, Inc. Version 4.03 May 3, 2011

DigiCert. Certificate Policy. DigiCert, Inc. Version 4.03 May 3, 2011 DigiCert Certificate Policy DigiCert, Inc. Version 4.03 May 3, 2011 Suite 200 Canopy Building II 355 South 520 West Lindon, UT 84042 USA Tel: 1 801 877 2100 Fax: 1 801 705 0481 www.digicert.com TABLE OF

More information

epki Root Certification Authority Certification Practice Statement Version 1.2

epki Root Certification Authority Certification Practice Statement Version 1.2 epki Root Certification Authority Certification Practice Statement Version 1.2 Chunghwa Telecom Co., Ltd. August 21, 2015 Contents 1. INTRODUCTION... 1 1.1 OVERVIEW... 1 1.1.1 Certification Practice Statement...

More information

TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE

TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE TERMS OF USE FOR PUBLIC LAW CORPORATION PERSONAL CERTIFICATES FOR QUALIFIED DIGITAL SIGNATURE Prior to the verification of the electronic certificate, or to access or use the certificate status information

More information

Ericsson Group Certificate Value Statement - 2013

Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...

More information

e-tuğra CERTIFICATE POLICY E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş. Version: 3.1 Validity Date: September, 2013 Update Date: 30/08/2013

e-tuğra CERTIFICATE POLICY E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş. Version: 3.1 Validity Date: September, 2013 Update Date: 30/08/2013 e-tuğra CERTIFICATE POLICY E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş. Version: 3.1 Validity Date: September, 2013 Update Date: 30/08/2013 Ceyhun Atıf Kansu Cad. 130/58 Balgat / ANKARA TURKEY

More information

Advantage Security Certification Practice Statement

Advantage Security Certification Practice Statement Advantage Security Certification Practice Statement Version 3.8.5 Effective Date: 01/01/2012 Advantage Security S. de R.L. de C.V. Prol. Paseo de la Reforma # 625 Int 402, Col Paseo de las Lomas. Del Alvaro

More information

QUOVADIS ROOT CERTIFICATION AUTHORITY CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT. OIDs: 1.3.6.1.4.1.8024.0.1 1.3.6.1.4.1.8024.0.

QUOVADIS ROOT CERTIFICATION AUTHORITY CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT. OIDs: 1.3.6.1.4.1.8024.0.1 1.3.6.1.4.1.8024.0. QUOVADIS ROOT CERTIFICATION AUTHORITY CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT OIDs: 1.3.6.1.4.1.8024.0.1 1.3.6.1.4.1.8024.0.3 Effective Date: 20 April 2009 Version: 4.6 Copyright QuoVadis

More information

PostSignum CA Certification Policy applicable to qualified personal certificates

PostSignum CA Certification Policy applicable to qualified personal certificates PostSignum CA Certification Policy applicable to qualified personal certificates Version 3.0 7565 Page 1/60 TABLE OF CONTENTS 1 Introduction... 5 1.1 Review... 5 1.2 Name and clear specification of a document...

More information

TR-GRID CERTIFICATION AUTHORITY

TR-GRID CERTIFICATION AUTHORITY TR-GRID CERTIFICATION AUTHORITY CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT Version 2.1 January, 2009 Table of Contents: TABLE OF CONTENTS:...2 1. INTRODUCTION...7 1.1 OVERVIEW...7 1.2 DOCUMENT

More information

TREND MICRO SSL CERTIFICATION PRACTICE STATEMENT. Version 2.0

TREND MICRO SSL CERTIFICATION PRACTICE STATEMENT. Version 2.0 TREND MICRO SSL CERTIFICATION PRACTICE STATEMENT Version 2.0 Effective Date: 14 April 2015 TABLE OF CONTENTS 1. INTRODUCTION 1.1 Overview 1.2 Document name and identification 1.3 PKI participants 1.3.1

More information

Certificate Policy and Certification Practice Statement

Certificate Policy and Certification Practice Statement DigiCert Certificate Policy and Certification Practice Statement DigiCert, Inc. Version 3.03 March 15, 2007 333 South 520 West Lindon, UT 84042 USA Tel: 1-801-805-1620 Fax: 1-801-705-0481 www.digicert.com

More information

REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A.

REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. REGISTRATION AUTHORITY (RA) POLICY Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. INDEX Contenido 1. LEGAL FRAMEWORK... 4 1.1. Legal Base...

More information

phicert Direct Certificate Policy and Certification Practices Statement

phicert Direct Certificate Policy and Certification Practices Statement phicert Direct Certificate Policy and Certification Practices Statement Version 1. 1 Effective Date: March 31, 2014 Copyright 2013-2014 EMR Direct. All rights reserved. [Trademark Notices] phicert is a

More information

KIBS Certification Practice Statement for non-qualified Certificates

KIBS Certification Practice Statement for non-qualified Certificates KIBS Certification Practice Statement for non-qualified Certificates Version 1.0 Effective Date: September, 2012 KIBS AD Skopje Kuzman Josifovski Pitu 1 1000, Skopje, Republic of Macedonia Phone number:

More information

StartCom Certification Authority

StartCom Certification Authority StartCom Certification Authority Intermediate Certification Authority Policy Appendix Version: 1.5 Status: Final Updated: 05/04/11 Copyright: Start Commercial (StartCom) Ltd. Author: Eddy Nigg Introduction

More information

APPLICATION FOR DIGITAL CERTIFICATE

APPLICATION FOR DIGITAL CERTIFICATE Application ID Number (For Official Use only) APPLICATION FOR DIGITAL CERTIFICATE Instructions: 1. Please fill the form in BLOCK LETTERS ONLY. 2. All fields are mandatory. 3. Present one (1) copy and the

More information

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN Title INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456 Customer Aristotle University of Thessaloniki PKI (www.pki.auth.gr) To WHOM IT MAY CONCERN Date 18 March 2011 Independent Audit

More information

HKUST CA. Certification Practice Statement

HKUST CA. Certification Practice Statement HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of

More information

Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document:

Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document: Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement In this document: Company refers to the hospital, hospital group, or other entity that has been pre- registered by

More information

QUOVADIS ROOT CERTIFICATION AUTHORITY CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT. OIDs: 1.3.6.1.4.1.8024.0.1 1.3.6.1.4.1.8024.0.

QUOVADIS ROOT CERTIFICATION AUTHORITY CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT. OIDs: 1.3.6.1.4.1.8024.0.1 1.3.6.1.4.1.8024.0. QUOVADIS ROOT CERTIFICATION AUTHORITY CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT OIDs: 1.3.6.1.4.1.8024.0.1 1.3.6.1.4.1.8024.0.3 Effective Date: 03 April 2007 Version: 4.3 Copyright QuoVadis

More information

ENTRUST CERTIFICATE SERVICES

ENTRUST CERTIFICATE SERVICES ENTRUST CERTIFICATE SERVICES Certification Practice Statement for Extended Validation (EV) SSL Certificates Version: 1.3 February 28, 2011 2011 Entrust Limited. All rights reserved. Revision History Issue

More information

SSL CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT

SSL CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT SSL CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT Kamu Sertifikasyon Merkezi TÜBİTAK Yerleşkesi, P.K. 74 Gebze 41470 Kocaeli, TURKEY Tel: +90 (0) 262 648 18 18 Fax: +90 (0) 262 648 18 00 www.kamusm.gov.tr

More information

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities Version 5.1 May 2014 Notice to all parties seeking to rely Reliance

More information

TC TrustCenter GmbH. Certification Practice Statement

TC TrustCenter GmbH. Certification Practice Statement TC TrustCenter GmbH Certification Practice Statement NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This Certification Practice Statement is published in conformance

More information

Transnet Registration Authority Charter

Transnet Registration Authority Charter Registration Authority Charter Version 3.0 is applicable from Effective Date Inyanda House 21 Wellington Road Parktown, 2193 Phone +27 (0)11 544 9368 Fax +27 (0)11 544 9599 Website: http://www.transnet.co.za/

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

thawte Certification Practice Statement

thawte Certification Practice Statement thawte Certification Practice Statement Version 3.7.5 Effective Date: 4 June, 2012 (All CA/Browser Forum-specific requirements are effective on July 1, 2012) thawte Certification Practice Statement 2012

More information

Land Registry. Version 4.0 10/09/2009. Certificate Policy

Land Registry. Version 4.0 10/09/2009. Certificate Policy Land Registry Version 4.0 10/09/2009 Certificate Policy Contents 1 Background 5 2 Scope 6 3 References 6 4 Definitions 7 5 General approach policy and contract responsibilities 9 5.1 Background 9 5.2

More information

TERMS OF USE FOR NOTARIAL PERSONAL REPRESENTATION CERTIFICATES FOR AUTHENTICATION

TERMS OF USE FOR NOTARIAL PERSONAL REPRESENTATION CERTIFICATES FOR AUTHENTICATION TERMS OF USE FOR NOTARIAL PERSONAL REPRESENTATION CERTIFICATES FOR AUTHENTICATION Prior to the verification of the electronic certificate, or to access or use the certificate status information and other

More information

ETSI TR 103 123 V1.1.1 (2012-11)

ETSI TR 103 123 V1.1.1 (2012-11) TR 103 123 V1.1.1 (2012-11) Technical Report Electronic Signatures and Infrastructures (ESI); Guidance for Auditors and CSPs on TS 102 042 for Issuing Publicly-Trusted TLS/SSL Certificates 2 TR 103 123

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 6 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

PKI NBP Certification Policy for ESCB Signature Certificates. OID: 1.3.6.1.4.1.31995.1.2.2.1 version 1.5

PKI NBP Certification Policy for ESCB Signature Certificates. OID: 1.3.6.1.4.1.31995.1.2.2.1 version 1.5 PKI NBP Certification Policy for ESCB Signature Certificates OID: 1.3.6.1.4.1.31995.1.2.2.1 version 1.5 Security Department NBP Warsaw, 2015 Table of Contents 1. Introduction 1 1.1 Overview 1 1.2 Document

More information

Internet Security Research Group (ISRG)

Internet Security Research Group (ISRG) Internet Security Research Group (ISRG) Certificate Policy Version 1.0 Updated May 5, 2015 Approved by ISRG Policy Management Authority ISRG Web Site: https://letsencrypt.org Page 1 of 83 Copyright Notice

More information

SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates

SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates Version March 2004 Version 2004-03 SwissSign Gold CP/CPS Page 1 of 66 Table of Contents 1. INTRODUCTION...9 1.1 Overview...

More information

SPECIFIC CERTIFICATION POLICIES AND PRACTICES APPLICABLE TO

SPECIFIC CERTIFICATION POLICIES AND PRACTICES APPLICABLE TO SPECIFIC CERTIFICATION POLICIES AND PRACTICES APPLICABLE TO ELECTRONIC CERTIFICATION AND SIGNATURE SERVICES FOR PUBLIC ORGANIZATIONS AND ADMINISTRATIONS, THEIR BODIES AND ATTACHED OR DEPENDENT ENTITIES

More information

TELSTRA RSS CA Subscriber Agreement (SA)

TELSTRA RSS CA Subscriber Agreement (SA) TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this

More information

TERMS OF USE TITLE CERTIFICATES FOR ELECTRONIC SIGNATURE

TERMS OF USE TITLE CERTIFICATES FOR ELECTRONIC SIGNATURE TERMS OF USE FOR TITLE CERTIFICATES FOR ELECTRONIC SIGNATURE Prior to the verification of the electronic certificate, or to access or use the certificate status information and other information contained

More information

Certum QCA PKI Disclosure Statement

Certum QCA PKI Disclosure Statement CERTUM QCA PKI Disclosure Statement v1.1 1 Certum QCA PKI Disclosure Statement Version 1.1 Effective date: 1 st of April, 2016 Status: valid Asseco Data Systems S.A. ul. Żwirki i Wigury 15 81-387 Gdynia

More information

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright 2006-2011, The Walt Disney Company

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright 2006-2011, The Walt Disney Company THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY July 2011 Version 2.0 Copyright 2006-2011, The Walt Disney Company Version Control Version Revision Date Revision Description Revised

More information

Getronics Certification Certificate of Authentic Trustworthy

Getronics Certification Certificate of Authentic Trustworthy Getronics Version 3.0 Effective Date: 15 october, 2008 Getronics Nederland B.V. Fauststraat 1 P.O. Box 9105 7300 HN Apeldoorn The Netherlands Phone: +31 (0)20 570 4511 http://www.pki.getronicspinkroccade.nl

More information

Certification Practice Statement. Internet Security Research Group (ISRG)

Certification Practice Statement. Internet Security Research Group (ISRG) Certification Practice Statement Internet Security Research Group (ISRG) Version 1.0 Updated May 5, 2015 Approved by ISRG Policy Management Authority Web Site: https://letsencrypt.org Page 1 of 11 Copyright

More information

CERTIFICATE POLICY KEYNECTIS SSL CA

CERTIFICATE POLICY KEYNECTIS SSL CA CERTIFICATE POLICY KEYNECTIS SSL CA Date: 05/02/2009 KEYNECTIS SSL CA CERTIFICATE POLICY Subject: KEYNECTIS SSL CA Certificate Policy Version number: 1.1 Number of pages: 49 Status of the Project Final

More information

Eskom Registration Authority Charter

Eskom Registration Authority Charter REGISTRATION WWW..CO.ZA Eskom Registration Authority Charter Version 2.0 applicable from 20 November 2009 Megawatt Park Maxwell Drive Sunninghill, SOUTH AFRICA, 2157 Phone +27 (0)11 800 8111 Fax +27 (0)11

More information

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION I. DEFINITIONS For the purpose of this Service Description, capitalized terms have the meaning defined herein. All other capitalized

More information

CMS Illinois Department of Central Management Services

CMS Illinois Department of Central Management Services CMS Illinois Department of Central Management Services State of Illinois Public Key Infrastructure Certification Practices Statement For Digital Signature And Encryption Applications Version 3.3 (IETF

More information

ENTRUST CERTIFICATE SERVICES

ENTRUST CERTIFICATE SERVICES ENTRUST CERTIFICATE SERVICES Certification Practice Statement Version: 2.13 February 12, 2016 2016 Entrust Limited. All rights reserved. Revision History Issue Date Changes in this Revision 1.0 May 26,

More information

CERTIFICATION POLICY QUEBEC CERTIFICATION CENTRE. 2015 Notarius Inc.

CERTIFICATION POLICY QUEBEC CERTIFICATION CENTRE. 2015 Notarius Inc. CERTIFICATION POLICY QUEBEC CERTIFICATION CENTRE 2015 Notarius Inc. Document Version: 4.5 OID: 2.16.124.113550 Effective Date: July 17, 2015 TABLE OF CONTENTS 1. GENERAL PROVISIONS...8 1.1 PURPOSE...8

More information

ING Public Key Infrastructure Certificate Practice Statement. Version 5.3 - June 2015

ING Public Key Infrastructure Certificate Practice Statement. Version 5.3 - June 2015 ING Public Key Infrastructure Certificate Practice Statement Version 5.3 - June 2015 Colophon Commissioned by Additional copies ING Corporate PKI Policy Approval Authority Additional copies of this document

More information

CERTIFICATE POLICIES (CP) Legal Person Certificate ICE SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. CP

CERTIFICATE POLICIES (CP) Legal Person Certificate ICE SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. CP CERTIFICATE POLICIES (CP) Certificate ICE SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. CP Certificate INDEX 1. LEGAL FRAMEWORK... 5 1.1. Legal Base... 5 1.2. Validation... 5 1.3. Legal Support...

More information

Certificate Policy KEYNECTIS SSL CA CP. Emmanuel Montacutelli 12/11/2014 DMS_CP_KEYNECTIS SSL CA CP_1.2

Certificate Policy KEYNECTIS SSL CA CP. Emmanuel Montacutelli 12/11/2014 DMS_CP_KEYNECTIS SSL CA CP_1.2 Certificate Policy KEYNECTIS SSL CA CP Emmanuel Montacutelli 12/11/2014 DMS_CP_KEYNECTIS SSL CA CP_1.2 KEYNECTIS SSL CA CP Version 1.2 Pages 51 Status Draft Final Author Emmanuel Montacutelli OpenTrust

More information

TeliaSonera Public Root CA. Certification Practice Statement. Revision Date: 2006-11-17. Version: Rev A. Published by: TeliaSonera Sverige AB

TeliaSonera Public Root CA. Certification Practice Statement. Revision Date: 2006-11-17. Version: Rev A. Published by: TeliaSonera Sverige AB Document no 1/011 01-AZDA 102 213 TeliaSonera Sverige AB Certification Practice Statement Rev A TeliaSonera Public Root CA Certification Practice Statement Revision Date: 2006-11-17 Version: Rev A Published

More information

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0 ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0 June 30, 2004 Table of Contents Table of Contents...2 1 Introduction...3 1.1 Overview...3 1.1.1 General Definitions...4

More information

GlobalSign Subscriber Agreement for DocumentSign Digital ID for Adobe Certified Document Services (CDS)

GlobalSign Subscriber Agreement for DocumentSign Digital ID for Adobe Certified Document Services (CDS) GlobalSign Subscriber Agreement for DocumentSign Digital ID for Adobe Certified Document Services (CDS) Version 1.1 PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE DIGITAL CERTIFICATE ISSUED TO YOU

More information

E-TUGRA INFORMATIC TECHNOLOGIES AND SERVICES CORP (E-TUGRA)

E-TUGRA INFORMATIC TECHNOLOGIES AND SERVICES CORP (E-TUGRA) E-TUGRA INFORMATIC TECHNOLOGIES AND SERVICES CORP (E-TUGRA) QUALIFIED CERTIFICATE POLICY AND PRACTICE STATEMENT (CP-CPS) VERSION 1.0 DATE OF ENTRY INTO FORCE : JUNE, 2008 OID 2.16.792.3.0.4.1.1.2 E-TUGRA

More information

RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0

RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0 Forum RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0 Copyright 2007-2014, The CA / Browser Forum, all rights reserved. Verbatim copying and distribution

More information

Fraunhofer Corporate PKI. Certification Practice Statement

Fraunhofer Corporate PKI. Certification Practice Statement Fraunhofer Corporate PKI Certification Practice Statement Version 1.1 Published in June 2012 Object Identifier of this Document: 1.3.6.1.4.1.778.80.3.2.1 Contact: Fraunhofer Competence Center PKI Fraunhofer

More information

Certification Practice Statement

Certification Practice Statement Certification Practice Statement Revision R1 2013-01-09 1 Copyright Printed: January 9, 2013 This work is the intellectual property of Salzburger Banken Software. Reproduction and distribution require

More information

Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr

Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr Version 0.3 August 2002 Online : http://www.urec.cnrs.fr/igc/doc/datagrid-fr.policy.pdf Old versions Version 0.2 :

More information

Certipost Trust Services. Certificate Policy. for Lightweight Certificates for EUROCONTROL. Version 1.2. Effective date 03 May 2012

Certipost Trust Services. Certificate Policy. for Lightweight Certificates for EUROCONTROL. Version 1.2. Effective date 03 May 2012 Certipost Trust Services Version 1.2 Effective date 03 May 2012 Certipost NV ALL RIGHTS RESERVED. 2 13 Definitions : Activation Data Certificate Certificate Holder Certificate Public Registry Certificate

More information

Trusted Certificate Service

Trusted Certificate Service TCS Server and Code Signing Personal CA CPS Version 2.0 (rev 15) Page 1/40 Trusted Certificate Service TCS Server CAs, escience Server CA, and Code Signing CA Certificate Practice Statement Version 2.0

More information

WebTrust SM/TM for Certification Authorities WebTrust Principles and Criteria for Certification Authorities Extended Validation Code Signing

WebTrust SM/TM for Certification Authorities WebTrust Principles and Criteria for Certification Authorities Extended Validation Code Signing WebTrust SM/TM for Certification Authorities WebTrust Principles and Criteria for Certification Authorities Extended Validation Code Signing Based on: CA/Browser Forum Guidelines for the Issuance and Management

More information

Microsoft Trusted Root Certificate: Program Requirements

Microsoft Trusted Root Certificate: Program Requirements Microsoft Trusted Root Certificate: Program Requirements 1. Introduction The Microsoft Root Certificate Program supports the distribution of root certificates, enabling customers to trust Windows products.

More information

PKI NBP Certification Policy for ESCB Encryption Certificates. OID: 1.3.6.1.4.1.31995.1.2.3.1 version 1.2

PKI NBP Certification Policy for ESCB Encryption Certificates. OID: 1.3.6.1.4.1.31995.1.2.3.1 version 1.2 PKI NBP Certification Policy for ESCB Encryption Certificates OID: 1.3.6.1.4.1.31995.1.2.3.1 version 1.2 Security Department NBP Warsaw, 2015 Table of Contents 1. Introduction 1 1.1 Overview 1 1.2 Document

More information

Certificate Policy of the. Public Key Infrastructure in the. Deutsche Forschungsnetz. - Grid -

Certificate Policy of the. Public Key Infrastructure in the. Deutsche Forschungsnetz. - Grid - Certificate Policy of the Public Key Infrastructure in the Deutsche Forschungsnetz - Grid - DFN-Verein Grid-CP V1.4, May 2008 This document and all parts thereof are copyrighted. Distribution or reproduction

More information

TREND MICRO SSL CERTIFICATION PRACTICE STATEMENT. Version 1.5

TREND MICRO SSL CERTIFICATION PRACTICE STATEMENT. Version 1.5 TREND MICRO SSL CERTIFICATION PRACTICE STATEMENT Version 1.5 Effective Date: 13 August 2012 TREND MICRO SSL CERTIFICATION PRACTICE STATEMENT TABLE of CONTENTS 1. INTRODUCTION VERSION 1.5 EFFECTIVE DATE:

More information

Swiss Government Root CA II. Document OID: 2.16.756.1.17.3.21.1

Swiss Government Root CA II. Document OID: 2.16.756.1.17.3.21.1 Swiss Government Root CA II CP/CPS End-user Certificates Swiss Government PKI - Root CA II Certificate Policy and Certification Practice Statement (CP/CPS) Document OID: 2.16.756.1.17.3.21.1 Project Name:

More information

CERTIFICATION PRACTICE STATEMENT (CPS) SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. Version 2.0

CERTIFICATION PRACTICE STATEMENT (CPS) SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. Version 2.0 CERTIFICATION PRACTICE STATEMENT (CPS) OF SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. Version.0 (CPS) INDEX 1. LEGAL FRAMEWORK... 10 1.1. Legal Base... 10 1.. Validation... 10 1.. Legal Support...

More information

Comodo Certification Practice Statement

Comodo Certification Practice Statement Comodo Certification Practice Statement Notice: This CPS should be read in conjunction with the following documents:- * LiteSSL addendum to the Certificate Practice Statement * Proposed Amendments to the

More information

CERTIFICATE POLICIES (CP) Natural Person Certificate ICE SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. CP

CERTIFICATE POLICIES (CP) Natural Person Certificate ICE SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. CP CERTIFICATE POLICIES (CP) Natural Person Certificate ICE SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. CP INDEX 1. LEGAL FRAMEWORK... 5 1.1. Legal Base... 5 1.2. Validation... 5 1.3. Legal Support...

More information

Amazon Web Services Certificate Policy. Version 1.0.1

Amazon Web Services Certificate Policy. Version 1.0.1 Amazon Web Services Certificate Policy Version 1.0.1 1 Contents Contents 1 INTRODUCTION 1.1 Overview 1.1.1 Compliance 1.1.2 Types of Certificates 1.1.2.1 CA Certificates 1.1.2.1.1 Self-signed CA Certificates

More information

BUYPASS CLASS 3 SSL CERTIFICATES Effective date: 11.06.2013

BUYPASS CLASS 3 SSL CERTIFICATES Effective date: 11.06.2013 CERTIFICATE POLICY BUYPASS CLASS 3 SSL CERTIFICATES Effective date: 11.06.2013 PUBLIC Version: 2.0 Document date: 11.05.2013 Buypass AS Nydalsveien 30A, PO Box 4364 Nydalen Tel.: +47 23 14 59 00 E-mail:

More information

CERTIFICATE POLICIES (CP) Public Functionary Certificate ICE SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. CP

CERTIFICATE POLICIES (CP) Public Functionary Certificate ICE SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. CP CERTIFICATE POLICIES (CP) ICE SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. CP INDEX 1. LEGAL FRAMEWORK... 5 1.1. Legal Base... 5 1.2. Validation... 5 1.3. Legal Support... 5 2. INTRODUCTION...

More information

SAUDI NATIONAL ROOT-CA CERTIFICATE POLICY

SAUDI NATIONAL ROOT-CA CERTIFICATE POLICY SAUDI NATIONAL ROOT-CA CERTIFICATE POLICY Document Classification: Public Version Number: 2.5 Issue Date: June 25, 2015 National Center for Digital Certification Policies and Regulations Department Digitally

More information

SPECIFIC DOCUMENTATION FOR WEBSITE CERTIFICATES

SPECIFIC DOCUMENTATION FOR WEBSITE CERTIFICATES SPECIFIC DOCUMENTATION FOR WEBSITE CERTIFICATES IZENPE 2015 This document is the property of IZENPE and may only be reproduced in its entirety. 1 Introduction This document includes the Specific Documentation

More information

California Independent System Operator Certification Practice Statement for Basic Assurance Certification Authority. Version 3.

California Independent System Operator Certification Practice Statement for Basic Assurance Certification Authority. Version 3. California Independent System Operator Certification Practice Statement for Basic Assurance Certification Authority Version 3.4 April 2015 Table of Contents 1.0 INTRODUCTION... 8 1.1 OVERVIEW... 8 1.2

More information

ACT. of 15 March 2002

ACT. of 15 March 2002 215 ACT of 15 March 2002 on electronic signature and on the amendment and supplementing of certain acts as amended by Act No. 679/2004 Coll., Act No. 25/2006 Coll., Act No. 275/2006 Coll., Act No. 214/2008

More information