1 TC TrustCenter Certificate Policy Definitions Version of January 22 nd, 2010 TC TrustCenter GmbH January 22nd, 2010 Page 1 of 22
2 1 INTRODUCTION IMPORTANT NOTES CHANGES TO OLDER VERSIONS CHANGES TO THE VERSION OF OCTOBER 1 ST, CHANGES TO THE VERSION OF JUNE 12 TH, CHANGES TO THE VERSION OF JULY 15 TH, CHANGES TO THE VERSION OF OCTOBER 23 RD, CERTIFICATE CLASSES CLASS 0 CERTIFICATES CLASS 1 CERTIFICATES CLASS 2 CERTIFICATES Verification of statements about natural persons Verification of statements about organizations Verification of statements about the relationship of a natural person to an organization CLASS 3 CERTIFICATES Verification of statements about natural persons Verification of statements regarding organizations Verification of statements regarding the relationship of natural person to organizations NAMING CONVENTIONS CHARACTER SET AND RULES FOR CONVERSION Conversion of Characters X.509 CERTIFICATES VERIFICATION OF CERTIFICATE INFORMATION CERTIFICATE REVOCATION HOW TO REVOKE REASONS FOR REVOCATION TC TrustCenter GmbH January 22nd, 2010 Page 2 of 22
3 1 Introduction This document describes TC TrustCenter s Certificate Policy Definitions. The purpose of this document is to allow an estimation of the trustworthiness of the certificates issued by TC TrustCenter. A certificate is an electronic document which assigns a public cryptographic key to a person or to an organisation and which confirms the identity of that person or organisation. Thus a certificate binds a person or organisation to a cryptographic key Each certificate is only as trustworthy as the procedures followed for its issuance. For that purpose TC TrustCenter groups the certificates into certificate classes. The higher the certificate class, the more extensive identification verifications are being used as the basis for the issuance of the certificate. The certificates themselves contain information regarding the class of the certificate for anyone who wishes to rely on the certificate. The verification procedures being followed for each certificate class are explained in this Certificate Policy Definitions. These Certificate Policy Definitions describe the processes used by TC TrustCenter as a certification service provider (Certification Authority) when identifying a certificate holder. This document explains the classification of certificates in the certificate classes for applicants respectively certificate holders as well as for third parties. This enables a decision as to whether the presented certificate is sufficient for the used application. Both parties, often referred to as Subscribing Customer (certificate holder) and Relying Customer (the party relying on the trustworthiness of a certificate), are also referred to as participants. Within the context of classification into certificate classes a distinction is made between natural persons and organizations. Certificates for persons who do not provide information about their affiliation to an organization do not contain statements about an organization which the certificate holder belongs to. Contrary to the foregoing, organizational certificates always contain a statement regarding an organization. These certificates may either be attributed to an organization (such as server certificates which cannot be attributed to natural persons) or they may be attributed to a member of an organization, such as an employee of a company for example. Information about an organization must be entered into all organizational certificates. Parallel with the description of the classification of certificates into classes (Section 4), the personal identification is explained in detail. The personal identification is necessary for some certificate classes to increase the reliance in the strength of the bond between the certificate and the certificate holder. Naming conventions for certificates are explained next (Section 5). A certificate often contains only the subscriber s full name and his address. Sometimes an organization and the location of its headquarters (or the subscriber s place of residence) is specified as well. The description of these guidelines in section 5 is followed by a couple of examples that demonstrate proper (certificate) names. Section 6 describes how TC TrustCenter verifies the correctness of the data contained in a certificate. Depending on the certificate class not necessarily all the data in a certificate must have been confirmed. A table (page 18) is provided from which a relying party can deduce, for any given certificate policy supported by TC TrustCenter, exactly what type of information is checked, and how. Finally, information about when and how a certificate is to be revoked is given in Section 7. Information about products and services is available on our Web site. TC TrustCenter GmbH January 22nd, 2010 Page 3 of 22
4 It is essential to read the following section, 2 Important notes. Contact information: TC TrustCenter GmbH WWW: Sonninstrasse Hamburg Phone: +49 (0) Germany Fax: +49 (0) Adjustment due to market necessities: Due to constantly changing market needs it is inevitable to adjust the services of a certification authority to the concrete needs of customers. The Certificate Policy Definitions are therefore adjusted regularly. German edition prevails: Some documents and the website are available both in the German and the English edition. In cases of doubt, the German edition shall prevail. Errors and omissions excepted: Errors on statements made in this document are expressly excepted, especially with regard to technical descriptions or procedures explained herein. Copyright notice: This document is protected by intellectual property rights. No information or images, fully or partially, in any form or by any means, may be reproduced, copied, duplicated, published or used in electronic systems or translations without the prior written consent of TC TrustCenter. This represents a crime, excluding printing and duplicating for one s own use. All information in this document is compiled with great care. Neither TC TrustCenter nor the author are liable for any damages or disservice, that are in connection with the use of this document. TC TrustCenter, the TC TrustCenter logo, Ident Point, TC PKI and TC Info Line are registered trademarks of the TC TrustCenter GmbH. All brands, product names and trademarks used in this document, but not listed above, are trademarks or service marks of the respective owners. Copyright 2010 TC TrustCenter GmbH, Sonninstrasse 24 28, Hamburg, Germany. All rights reserved. TC TrustCenter GmbH January 22nd, 2010 Page 4 of 22
5 2 Important notes Issuance of certificates according to the current Certificate Policy Definitions: All certificates issued by TC TrustCenter are issued based on the Certificate Policy Definitions being valid at the time of the issuance of the certificate. A later modification of the Certificate Policy Definitions has no influence on already issued certificates. The higher the certificate class, the higher the level of trust: All certificates issued by TC TrustCenter belong to one of several level of trust certificate classes, each one indicating which information contained in a certificate has been verified, and how personal identification is done. This enables a relying party to assess the trustworthiness of the contents of a certificate: The higher the certificate class, the higher the trustworthiness. The certificate classes do not affect the security of the encryption and the confidentiality of secure communication. No verification of creditworthiness: TC TrustCenter confirms the identity of a certificate applicant as described in this document. This does not include verification of liquidity, creditworthiness or anything of that nature. A certificate provides a certain level of assurance that the certificate belongs to the entity named therein. It gives no indication whatsoever about the trustworthiness of the entity itself. No verification of harmlessness of software: TC TrustCenter issues, among others, special certificates for organizations and natural persons that can be used to sign programming code. It has to be taken into account that TC TrustCenter does not certify the programming code itself, its harmlessness, its algorithmical correctness, or its applicability. Certificates issued in this context are intended to enable the user to detect manipulations of the software distributed by the manufacturer. Next to this, the origin of the software can be deduced by such certificates. No assurance of up-to-date certificate data: TC TrustCenter verifies the information contained in a certificate request only within the scope and during registration at the time of issuance of a certificate. TC TrustCenter accordingly does not provide any assurance that this data is up-to-date after registration. When renewing a certificate, the data contained therein will not be verified again. Every certificate holder is obliged to revoke its certificate if data contained therein is not accurate any more. The end user must determine whether a given certificate is adequate: TC TrustCenter issues certificates under different certificate policies, which describe the level of trust that may be placed in their authenticity. Any participant of the certification service must decide for himself whether a given certificate policy, which is represented by a certificate class as described in this document, meets the security needs for the application in question. Participant s obligation to inform himself: It is essential for any end user participating in TC TrustCenter s certification services to acquire sufficient knowledge about the use of digital signatures, certificates, and public key algorithms. Subscriber s duties to take good care and to cooperate: The subscriber has to contribute to the security of certificates and digital signatures. Therefore, it is essential to follow the guidelines as set out in this document. TC TrustCenter reserves its right to revoke certificates: If cryptographic algorithms or associated parameters become unsafe due to technical progress or new developments in cryptology, TC TrustCenter reserves its right to revoke certificates that are based on such algorithms and parameters. Certificates may also be revoked if the certificate holder provided false information, if certificates are misused or are used for criminal purposes, or if TC TrustCenter has obtained knowledge that data in the certificate do no longer comply with the facts. TC TrustCenter GmbH January 22nd, 2010 Page 5 of 22
6 3 Changes to Older Versions 3.1 Changes to the version of October 1 st, 1999 TC TrustCenter also issues certificates for WAP-Gateways (WTLS). The requirements of Class 3 for organizations are more customer friendly in comparison to the previous version: The personal identification of an authorized representative as stated in the certificate of commercial registration (or an equivalent document) is no longer necessary. Instead, an authorized representative of the organization may appoint a person (PKI-administrator), who is responsible for the administration of the certificates related to the organization. This person then must be personally identified. The identification based on the personal (physical) presence of the certificate holder for a Class 3 certificate is always necessary. The identification may be carried out either by a TC TrustCenter IdentPoint, by using the Post Ident procedure or in an authorized IdentPoint, utilizing the guidelines for identification of TC TrustCenter. In addition to the verification of data based on a (notarized) extract of a competent official register, it is now possible to verify data using trustworthy third party identity proofing services or databases. Only such data bases are used that comply with TC TrustCenter s requirements. Within the process of reorganization of the certificate class structure, the issuance of Class 4 certificates has been ceased. Class 4 certificates issued before the date of publication of these Certificate Policy Definitions comply with the Certificate Policy Definitions valid on the day of their issuance. 3.2 Changes to the version of June 12 th, 2002 For Class 2 certificates, fax copies will be accepted. Sending documents by mail, in particular international, often causes undesirable delay. In order to enable customers to acquire class 2 certificates more rapidly TC TrustCenter accepts documents sent by fax. This means that whenever the Certificate Policy Definitions require the presentation of a copy of a document it is admissible to send a fax. Extracts from registers are grouped into three classes depending on their age. Extracts being not older than 9 month are accepted as up to date. For extracts, which have been issued between 9 and 36 months ago an additional, signed by an authorized member of the organisation, must by presented. This must state that the name, and the legal form of the organisation are still valid. TC TrustCenter does not accept register extracts, which are older than 36 months. TC TrustCenter now issues Team Certificates and Function Certificates. A Team Certificate can be used by a group of persons (e.g. a department of an organisation). For formal reasons it is assigned to the person who is responsible for that group (e.g. head of department). Function Certificates are dedicated to computers or applications in order to serve special purposes, for instance signing of bills. The computer or application can use the certificate to generate a multitude of signatures automatically. The production of PGP certificates has been ceased. TC TrustCenter GmbH January 22nd, 2010 Page 6 of 22
7 3.3 Changes to the version of July 15 th, 2004 TC TrustCenter now issues wildcard certificates. Instead of the of a webserver s hostname a wildcard certificate contains the symbol *, which serves as a placeholder for several hostnames. Thus, a wildcard certificate is able to protect more than one website. Organizations owning a single domain but running several webservers in that domain can use a wildcard certificate as an efficient solution because protecting more than one website requires the administration of one certificate only. TC TrustCenter reserves the right to revoke certificates which have been misused and/or are used for criminal purposes. 3.4 Changes to the version of October 23 rd, 2006 TC TrustCenter now issues Publisher IDs. A Publisher ID is a certificate which can be used by software developers for authentication purposes (e.g. at the web-portal of a hardware or operating system manufacturer) or for signing self-developed code. A Publisher ID s Common Name field is populated with the name of an organization or with the developer s individual name. The previously offered CodeSigning certificates are comprised in the product Publisher ID. The production of WTLS certificates has been ceased. TC TrustCenter GmbH January 22nd, 2010 Page 7 of 22
8 4 Certificate classes The trustworthiness of certificates depends on the procedures used for their issuance. Every certificate issued by TC TrustCenter belongs to a defined class of Level of Trust. The class of a certificate describes the general measures taken by TC TrustCenter in order to confirm a certificate s contents and the identity of the certificate holder. The higher the certificate class, the more comprehensive is the validation of the applicant s identity. The security of the encryption, and consequently, the level of protection against unauthorized access to the transmitted data, depends on the cryptographic algorithms and parameters. It is not affected by the chosen certificate class. The level of protection when using a Class 1 certificate is exactly the same as when using a Class 2 or a Class 3 certificate, as long as the same key length is used. The certificate itself contains information about the certificate class for all those who intend to rely on the certificate. This enables a relying party to assess the trustworthiness of the data contained in a certificate. What verification measures are being taken for which certificate class is presented in these Certificate Policy Definitions. The following sections contain explanations about the verification procedures. All explanations only refer to data contained in certificates. In addition to the verifications confirming the certificate s content TC TrustCenter performs additional checks if certificates are issued for organizations. These checks are to prove that the organization has authorized the certificate application, and that the person submitting the certificate application on behalf of the organization is authorized to do so. This proof (application ) must be signed by an authorized entity in the organization and can be sent to TC TrustCenter by mail, , or by fax. Alternatively TC TrustCenter may verify the authorization to apply for a certificate by phone. 4.1 Class 0 certificates TC TrustCenter issues, on request, certificates for testing and demonstration purposes. These are valid for a short period of time only. Data contained in a Class 0 certificate is not verified by TC TrustCenter in any way! 4.2 Class 1 certificates Class 1 certificates always contain an address. Class 1 certificates confirm that the e- mail address stated in the certificate existed at the time of application and that the owner of the private key had access to this address. Class 1 certificates provide very little evidence of the identity of the certificate holder. Except from the existence and the accessibility of the address, no data contained in the certificate is being checked. 4.3 Class 2 certificates Verification of statements about natural persons Statements made in a Class 2 certificate regarding natural persons, if such are included, are verified in the following way: TC TrustCenter GmbH January 22nd, 2010 Page 8 of 22
9 - if the certificate contains an address, its correctness is verified by an access test. Alternatively, for members of organizations a responsible person in that organization may confirm the correctness of the address. - Statements about a natural person s name are verified by a) of an accredited third party regarding the correctness and the completeness or by b) of the information by presentation of a copy of an official photo ID document with signature Verification of statements about organizations Statements made in Class 2 certificates about organizations are verified in the following way: - Name and registered office of an organization are verified. This verification may be carried out by a presentation of a copy of a document, which proves the existence of the organization (current extract of a competent official register in which the organization is listed or a comparable document). Extracts being not older than 9 months are accepted as up to date. For extracts, which have been issued between 9 and 36 months ago, an additional must be presented. This must state that the name and the legal form of the organization are still valid. If TC TrustCenter is already in possession of a copy of an extract of an official register it need not be sent again. The must be presented on a paper with the official letterhead of the organization. It must be signed by an authorized person. The may be sent by fax or . An must be signed with a certificate which fulfils at least the requirements of a TC class 2 certificate. TC TrustCenter does not accept register extracts which are older than 36 months The existence and correct denomination of governmental or administrative authorities must be confirmed by a competent authority (e.g. a superior authority) with official letterhead, stamped with an official stamp or seal, and signed by an authorized officer. All vetting may also be carried out utilizing data provided by trustworthy third parties. If an applicant requires more than one certificate but does not want them to be issued at the same time, TC TrustCenter may perform a pre-vetting at the time of registration or later. The actual application for the certificate is then sent later, but the results of the vetting are already present. When a certificate is issued the pre-vetting must not be more than thirteen months ago. - The correctness of an address of an organization or a member of an organization (if such is stated in the certificate) may be confirmed by a responsible person of the organization, an access test is then optional. - Additional data in the certificate are verified to the greatest possible extent. For SSL or device certificates it is checked whether the domain name in the certificate is registered to the organization applying for the certificate, if the domain is registrable. - The term device is used for real objects (e.g. physically existent web-servers, mailgateways, printers, smart phones etc.) as well as for logical objects which do not physically exist (e.g. virtual machines). TC TrustCenter GmbH January 22nd, 2010 Page 9 of 22
10 - If a domain can not be registered with an official domain registrar an authorized person must confirm that a device with the name in question exists in the internal network, and that a certificate for this device shall be issued. Because the assignment of names to devices must be unique, TC TrustCenter reserves the right to reject applications with internal domain names which have previously been assigned to another organization. Certificates intended for an organization s internal use containing a non-registrable domain name, e.g. domain.local or domain.internal, must provide additional information in the domain name to allow for a unique assignment to exactly one organization. A certificate for client-1.intranet.example does not allow an adequate correlation between the certificate s subject and the organization. Therefore, such a name is not permitted. A certificate issued to client-1.stonehillbaker-intranet.local or to client-1.shbintranet.example allows a unique assignment to an organization; therefore such a name is permitted. TC TrustCenter takes care that certificates with identical internal names are never issued to different organizations. Once a certificate has been issued to an organization (e.g. Stonehillbaker) with a specific internal name (e.g. shb-intranet.example) no other organization can obtain certificates with this internal domain name. - A domain registration may be checked in advance. When the certificate is issued the domain check must not be more than thirteen months ago. - A Team Certificate may be used by a group of persons (e.g. a department of an organization); nevertheless, it is formally assigned to a single person, who is responsible for the group (e.g. head of department). This person is responsible for the proper use of the Team Certificate, and this person must be identified in compliance with the rules for class 2 certificates (or higher) of these CPD. - Function Certificates are certificates, which are selected for a special purpose (e.g. automatic signature of outgoing mail). Usually they are bound to a fixed computer or application. The computer or application can use the certificate and automatically produce a multitude of signatures. Formally, such a certificate is assigned to a person who is responsible for the proper use of the certificate, and this person must be identified in compliance with the rules for class 2 certificates (or higher) of these CPD Verification of statements about the relationship of a natural person to an organization The affiliation of a person named in a certificate to a stated organization, where applicable also the affiliation to a department of the organization, must be confirmed by an authorized member of that organization. This must have a handwritten signature and a stamp of the organization (for governmental agencies an official seal is needed) or it must be digitally signed. The may be sent by fax or . The certificate used for the digital signature must fulfil at least the requirements of a TC TrustCenter Class 2 certificate (with a verification of the statements in accordance with b) above). Alternatively, the affiliation of a person named in a certificate to an organization may be verified by phone. 4.4 Class 3 certificates Verification of statements about natural persons The verification of statements about a natural person covers the following points: TC TrustCenter GmbH January 22nd, 2010 Page 10 of 22
11 - If an address is contained in the certificate, its correctness is verified by an access test. If statements about an organization are made in the certificate, the organization itself may confirm the correctness of the address. - If a natural person is named in a Class 3 certificate, the personal appearance and the presentation of a valid official photo ID is necessary. The verification of the identity of the certificate holder may either take place in a branch office of the German Post utilizing the Post Ident procedure, in a TC TrustCenter IdentPoint (an authorized IdentPoint of the organization), or with another representative of TC TrustCenter, authorized to perform the identity verification. A notary public is also eligible. - Only official ID documents that contain a photo and a handwritten signature of the ID holder are accepted for verification purposes. In the Federal Republic of Germany such documents are among others the personal identity card (Personalausweis) and the passport (Reisepass). In any case such documents must fulfill the requirements set out by 1 section 2 of the Identity Card Act (Gesetz über Personalausweise) respectively 4 section 1 of the Passport Act (Passgesetz). Internationally TC TrustCenter accepts ID documents which - are issued in the particular country by governmental authorities and - are recognized in international legal relations as ID documents Verification of statements regarding organizations For organizational certificates the following verifications are performed: - Name and registered office of the organization. For Class 3 certificates it is, depending on the organization, necessary to present an extract of the competent official register or respectively a comparable document. It is important that the document states that the organization currently exists. The document presented should be up to date and notarized or be original. Extracts being not older than 9 month are accepted as up to date. For extracts, which have been issued between 9 and 36 months ago an additional, signed by an authorized member of the organization, must by presented. This must state that the name and the legal form of the organization are still valid. If TC TrustCenter is already in possession of a copy of an extract of an official register it must not be sent again. The must be presented on a paper with the official letterhead of the organization. It must be signed by an authorized person. The may be sent by fax or . An must be signed with a certificate which fulfils at least the requirements of a TC class 2 certificate. TC TrustCenter does not accept register extracts, which are older than 36 months The existence and correct denomination of authorities is verified in the same manner as with Class 2 certificates. All vetting may also be carried out utilizing data provided by trustworthy third parties. - Additional data in the certificate are verified as far as possible. For server certificates it is checked if the domain name in the certificate is registered to the organization applying for the certificate. TC TrustCenter GmbH January 22nd, 2010 Page 11 of 22
12 - If a domain can not be registered with an official domain registrar an authorized person must confirm that a device with the name in question exists in the internal network, and that a certificate for this device shall be issued. Because the assignment of names to devices must be unique, TC TrustCenter reserves the right to reject applications with internal domain names which have previously been assigned to another organization. Certificates intended for an organization s internal use containing a non-registrable domain name, e.g. domain.local or domain.internal, must provide additional information in the domain name to allow for a unique assignment to exactly one organization. A certificate for client-1.intranet.example does not allow an adequate correlation between the certificate s subject and the organization. Therefore, such a name is not permitted. A certificate issued to client-1.stonehillbaker-intranet.local or to client-1.shbintranet.example allows a unique assignment to an organization; therefore such a name is permitted. TC TrustCenter takes care that certificates with identical internal names are never issued to different organizations. Once a certificate has been issued to an organization (e.g. Stonehillbaker) with a specific internal name (e.g. shb-intranet.example) no other organization can obtain certificates with this internal domain name. - An automatic verification of the existence on an organizational unit (which can be stated in the OU field of the certificate) is usually not possible. - A Team Certificate may be used by a group of persons (e.g. a department of an organization); nevertheless it is formally assigned to a single person, who is responsible for the group (e.g. head of department). This person is responsible for the proper use of the Team Certificate, and this person must be identified in compliance with the rules for class 3 certificates of this CPD. - Function Certificates are certificates, which are selected for a special purpose (e.g. automatic signature of outgoing mail). Usually they are bound to a fixed computer or application. The computer or application can use the certificate and automatically produce a multitude of signatures. Formally such a certificate is assigned to a person who is responsible for the proper use of the certificate, and this person must be identified in compliance with the rules for class 3 certificates of this CPD Verification of statements regarding the relationship of natural person to organizations - The affiliation of a person named in a certificate to an organization, where applicable also the affiliation to a department of the organization, must be confirmed by an authorized member of that organization. This must have a handwritten signature and a stamp of the organization (for governmental agencies an official seal is needed) or it must be digitally signed. The certificate used for the digital signature must be a TC TrustCenter Class 3 certificate or a certificate in compliance with the German Signature Act. TC TrustCenter GmbH January 22nd, 2010 Page 12 of 22
13 5 Naming conventions TC TrustCenter issues certificates in accordance with the X.509 standard. X.509 certificates are, among other things, used by Web servers, clients, and Web browsers to ensure secure Internet communication or to enable an authentication of the user by the web server as well as to establish a virtual private network (VPN) on public data interfaces. X.509 certificates can also be utilized to use the encryption and signing standard S/MIME, supported by many browsers or popular applications. This section provides guidelines on entering the appropriate information in the data fields that make up X.509 certificates In certain projects and after consultation with TC TrustCenter, deviation from the contents of the certificate fields stated in the following is possible. 5.1 Character Set and Rules for Conversion The X.509 compliant certificates contain in the designated fields as defined in RFC 3280 Internet X.509 Public Key Infrastructure, Certificate and Certificate Revocation List (CRL) Profile the Distinguished Names of the issuer and of the certificate holder. The following character set is supported: Upper-case characters A.. Z Lower-case characters a.. z Digits Apostrophe Left parenthesis ( Right parenthesis ) Plus + Comma, Hyphen - Dot. Slash / Colon : Equal = Question mark? Space This character set contains a limited number of characters. However, TC TrustCenter s certification policies require data in certificates to be spelled exactly as they are spelled in the ID document or register extract. Consequently, there must exist rules for the conversion of non-presentable characters. TC TrustCenter recommends adherence to the following conversion rules. Otherwise the proper functioning of the certificates in connection with other components can not be assured. For example it can not be excluded that some components in a PKI, e.g. older browsers, are not capable of interpreting umlauts correctly Conversion of Characters Umlauts (Ä, Ö, Ü, ä, ö, ü) are replaced by the respective non-diacritical strings (Ae, Oe, Ue, ae, oe, ue), thereby respecting capitalization and use of lower-case characters. Examples: Original Müller Überstorf Converted Mueller Ueberstorf TC TrustCenter GmbH January 22nd, 2010 Page 13 of 22
14 Characters and symbols not being part of the supported character set must be assigned to corresponding characters. Beispiele: Original René François Converted Rene Francois Special characters not contained in the supported character set should either be spelled out or be replaced by corresponding equivalent characters. Examples: Original Meier & Meier Ltd. Meier & Meier Ltd. Meier & Meier Ltd. Konvertiert Meier and Meier Ltd. Meier a. Meier Ltd. Meier + Meier Ltd. 5.2 X.509 certificates X.509 certificates usually consist of the data fields mentioned in the following table, and these are explained in detail and illustrated by examples below. Field C SP L O OU CN Meaning Country State / Province Locality Organization Organizational Unit Common Name C (Country): This field contains the two-letter county code as set out in ISO Persons not affiliated to an organization state the country of their residence; organizations state the country where their registered office is located. For SSL certificates that have to be generated with server software, the subscriber must enter the correct ISO code, e. g. US for the USA or FR for France. SP (State/Province): This field is intended for providing the state. We recommend leaving this field blank. L (Locality): This field is used for the location of a company s registered office. If the O-field is not populated this field usually contains the location of the certificate holder s residence as stated in the official ID document (or official statement of residence). The postal code must not be stated. O (Organization): This field is used for the name of the organization as is it stated in the documents presented for verification or as stated in the data bases of third parties. Usually, this is the name under which the organization is doing business or as stated on its official TC TrustCenter GmbH January 22nd, 2010 Page 14 of 22
15 letterhead. It is recommended to identify the organization with its full name and legal form, e.g. TC TrustCenter GmbH instead of TC TrustCenter or TCTC AG. OU (Organizational Unit): This field may be used for specifying the department within the organization that the certificate is attributed to. In code signing certificates TC TrustCenter will automatically enter the name of the software used for generating the signature. CN (Common Name): The CN field is usually used to specify the name of the natural person the certificate is assigned to. The name shall be entered as stated in the official ID document. Titles or doctoral degrees may be included provided that this data is also present in the official ID document or verified through equivalent documents. Doctoral degrees or comparable parts of names shall precede the name. CN = <Name of Person> In this case the certificate is assigned to the person named in th CN-Field. Since it is possible that more than one person share the same name, TC TrustCenter may optionally add consecutive numbers to the name in the CN-Field in order to avoid ambiguities. For individuals acting as software developers it is possible to include an indication according to this fact (e.g. Individual Software Publisher ) to identify this certificate as a Publisher ID. Furthermore, instead of the name of a person, the CN data field may contain other data. Even if in such cases no individual is named in the certificate, the certificate is always assigned to a person being responsible for the proper use of the certificate. This responsible person acts as a sponsor for the certificate and has been identified according to the underlying certificate class. Typical examples for certificates without individual person named in the certificate are: CN = <fully qualified hostname or complete IP address> In this case the certificate is a (SSL) device certificate, assigned to a technical device, in most cases a webserver or client. Examples are or client- 1.intranet.example. CN = *.<domainname> In this case the certificate is a wildcard certificarte. Wildcard certificates are a special kind of device certificates. They contain the symbol * instead of a server s name (e.g. *.stonehillbaker.com). Several servers in the same domain can be equipped with the same certificate. A certificate issued for *.stonehillbaker com can thus be used for example for mail.stonehillbaker.com, or server.stonehillbaker.com. Apart from that, wildcard certificates are treated in the same way as device certificates. CN = <indication of a function> If the CN-field contains the description of a function (e.g. Automatic Mail Signature ) the certificate is used for that designated purpose. If the purpose or function of the certificate is not already clearly specified in the CN-field TC TrustCenter provides on request information on the designated purpose of the certificate. TC TrustCenter GmbH January 22nd, 2010 Page 15 of 22
16 In order to be able to provide information about the usage of a function certificate, and as the denomination needs to be meaningful, the name of the function, i.e. the content of the CN-field, must be approved by TC TrustCenter before the certificate is issued. Formally a function certificate is assigned to a person. This person is responsible for the proper use of the certificate, and this person is identified according to the particular certificate class of the Function Certificate. CN = <content of OU-field> Team-Certificate If the text in the CN-field ends with Team-Certificate the certificate is used by a group of persons or a department of an organization. Which group or department the certificate is assigned to is stated in the OU-field. Formally a function certificate is assigned to a person. This person is responsible for the proper use of the certificate, and this person is identified according to the particular certificate class of the Team Certificate. CN = <name on an organization> If the CN-field consists of an organization s name the certificate is a Publisher ID. A Publisher ID is a certificate which can be used by software developers for authentication purposes (e.g. at the web-portal of a hardware or operating system manufacturer) or for signing developed code. The organization s name in the Common Name field is identical to the name in the O-field. CN = <number or arbitrary other character string> :PN If the CN-field contains only a number or other string followed by the suffix :PN the certificate is a pseudonym-certificate where the true personal name of the certificate holder is not contained in the certificate. TC TrustCenter reserves the right to reject misleading, illegal, or otherwise undesired pseudonyms and to revoke the affected certificates. If populated this field must contain a valid address. Many Web server applications, however, will not allow an address to be specified, because Web servers generally do not have addresses. If the server software supports an address, it is recommended to use the webmaster s address, e.g. or It is not recommended to include a personal address in a server certificate. In contrast to that certificates issued to individuals should contain the certificate holder s e- mail address. Common addresses like should be avoided in certificates issued to individuals. Extensions: In many cases it is desired that an object can be addressed by more than one name. For that purpose certificates allow for extensions. If a certificate contains extensions, e.g. the SubjectAlternativeName contains additional information about DNS names or addresses, TC TrustCenter verified this data for correctness as described in chapters 4 and 6. TC TrustCenter GmbH January 22nd, 2010 Page 16 of 22
17 Examples for X.509 Distinguished Names The collection of the seven data fields listed above is commonly referred to as the Distinguished Name (DN). See the following example for construction of a DN: /C=DE/L=Hamburg/O=Stonehillbaker Deutschland The same DN must not be assigned to different entities, while the same entity may have several certificates all bearing the same DN. C SP L O OU CN DE Natural Person Hamburg Dr. John Freeman Natural Person DE (commercial) Organization DE Hamburg Hamburg Dr. John Freeman Stonehillbaker Deutschland GmbH Purchase Dr. John Freeman Dr. John Freeman Server DE Hamburg Stonehillbaker Deutschland GmbH Internet Services Wildcard Server DE Hamburg Stonehillbaker Deutschland GmbH Internet Services *.stonehillbaker.com Publisher ID DE Hamburg Stonehillbaker Deutschland GmbH Development Stonehillbaker Deutschland GmbH Function DE Hamburg Stonehillbaker Deutschland GmbH Sales Invoice Signing Team- Certificate DE Hamburg Stonehillbaker Deutschland GmbH Post Administration Mailroom Team- Certificate TC TrustCenter GmbH January 22nd, 2010 Page 17 of 22
18 6 Verification of certificate information TC TrustCenter verifies the contents of the X.509 certificate data fields as specified in the following table. The entries used in the table are described below. Class C SP L O OU CN Class 0 No check No No check No check No No check No check check check Class 1 No check No No check Empty Empty No check Access test check Class 2 organization RegA or ADB or CDB No check RegA or ADB RegA or ADB Written Written, Domain if applicable Access test or written Class 2 Publisher ID Class 2 Natural Person with Affiliation Class 2 Function or Team Class 3 Organization Class 3 Publisher ID Class 3 Natural Person with Affiliation Class 3 Function or Team Table 1 RegA or ADB or CDB RegA or ADB or CDB RegA or ADB or CDB Notarized RegA or CDB Notarized RegA or ADB Notarized RegA or CDB Notarized RegA or CDB No check No check No check No check No check No check No check RegA or ADB RegA or ADB RegA or ADB Notarized RegA Notarized RegA or ADB Notarized RegA Notarized RegA RegA or ADB RegA or ADB RegA or ADB Notarized RegA Notarized RegA or ADB Notarized RegA Notarized RegA Written Written Written Written Written Written Written RegA or ADB or CDB Written or by phone Written Ident, Domain if applicable RegA or ADB or CDB Ident Written with Ident of the responsible person Access test or written Access test or written Access test or written Access test or written Access test or written Access test or written Access test or written No check: TC TrustCenter does not verify the content of this data field. Empty: This field must be empty. Access test: If the certificate contains an address, this address will be checked. Class 1 certificates always contain an address. In order to verify the validity of an address and the subscriber s access to this address, TC TrustCenter sends an to the address contained in the certificate request (exception: For Class 2 and Class 3 certificates for organizations it can be waived to send this , as long as the correctness of this address has been confirmed by a responsible person. This includes information that must be sent back to TC TrustCenter for the identification of the applicant to be completed. RegA: Information in this field is verified by checking an extract of the competent register or comparable documents. It is important that the document states that the organization exists in fact. Depending on the legal form of the organization and on the country, there are different competent authorities. For privately organized companies this is usually the commercial register. For governmental organizations (such as governmental agencies, ministries or state owned organizations) there are usually no registers. In such cases the existence of the or- TC TrustCenter GmbH January 22nd, 2010 Page 18 of 22
19 ganization is to be confirmed by the agency holding the official seal or the competent supervisory authority. ADB: The statements in this field are verified based on data bases of third parties (e.g. credit card companies, Post). Statements that are based on inquiries of the person that is to be certified will not be accepted. CDB: The statements in this field are verified based on company data bases of third parties. The notarization of the statements is not necessary. The commercial data bases will be contacted by TC TrustCenter directly or on behalf of TC TrustCenter. Statements that are based on inquiries of the organization that is to be certified will not be accepted. Written : Data entered in this field must be confirmed in writing by a responsible person. This should be done in conjunction with an application, naming the employees who shall obtain a certificate, and the department they work for and, if applicable also the address, the function name, or the domain name. This does not have to be submitted for every single certificate, but could also be submitted for large amounts of certificates. Example: Certificates for employees of a company or a department of a company. Confirmation by Phone: The correctness of these data must be confirmed by an authorized person of the organization. TC TrustCenter (or an authorized representative) telephonically contacts the organization and inquires a) if the person named in the certificate is known in the organization and b) if this person it authorized to apply for a certificate. Ident: The verification of such data is being conducted by comparison of the presented official ID card and the application form, which is being sent to TC TrustCenter in the process of the identification. Domain: For server certificates, it is verified that the domain name or IP address given in the CN field is registered to the organization named in the certificate by using Internet domain registration services. If O contains Stonehillbaker and CN is (or *.stonehillbaker.com in case of a Wildcard certificate), it will be verified that stonehillbaker.com is registered to the organization named in O. If this is not the case, the applicant must provide an authorization of the owner of the domain for the use of the domain name by the certificate holder. TC TrustCenter GmbH January 22nd, 2010 Page 19 of 22
20 7 Certificate Revocation 7.1 How to Revoke For certain products a revocation can be initiated at TC TrustCenter s website <http://www.trustcenter.de/sperren> by authentication with the certificate to be revoked. Only this kind or revocation is executed automatically. All other revocation requests submitted to TC TrustCenter using one of the following ways are handled individually; revocation is not automated. A revocation request may be submitted by digitally signed to Furthermore, revocation requests in written form can be sent to: TC TrustCenter, -Revocation-, Sonninstraße 24-28, D Hamburg, Germany. It is also possible to request revocation of a certificate by phone. Revocation can be requested at +49 (0) 40 / ; the requester must provide the proper revocation password as a proof of authority to revoke the certificate. All addresses and phone numbers mentioned above are reserved exclusively for revocation purposes; these addresses and phone numbers do not provide technical support, TC Trust- Center confirms the execution of a revocation by signed Reasons for Revocation The reasons for revocation can be classified into the rights and the obligations to request a revocation. An obligation to revoke a certificate must be obeyed, whereas the decision whether to exercise the right to revoke a certificate is left to the certificate holder or authorized third parties. Authorized to request revocations are three different persons resp. organizations: the certificate holder, TC TrustCenter as the responsible CA, and third parties. All these parties have their own rights and obligations for revocation. a) Certificate Holder s Obligations - A certificate holder is obliged to revoke his/her certificate if certificate data becomes invalid (e. g. after changing the address), does no longer concur with the facts, or does no longer concur with the information provided when the certificate was issued. - A certificate holder is obliged to revoke his/her certificate if the storage medium containing the private key is no longer needed. - A certificate holder is obliged to revoke his/her certificate if the private key associated with the certificate has been lost. - A certificate holder is obliged to revoke his/her certificate if it is suspected that unauthorized persons have access to the private key or are able to manipulate it. - A certificate holder is obliged to revoke his/her certificate if it is suspected that the private key has been compromised or is used by unauthorized persons TC TrustCenter GmbH January 22nd, 2010 Page 20 of 22
HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of
TC TrustCenter Certificate Policy Definitions for EV Certificates Version of February 28 th, 2012 TC TrustCenter GmbH February 28th, 2012 Page 1 of 32 1 INTRODUCTION... 3 2 IMPORTANT NOTES... 4 2.1 REMARKS
215 ACT of 15 March 2002 on electronic signature and on the amendment and supplementing of certain acts as amended by Act No. 679/2004 Coll., Act No. 25/2006 Coll., Act No. 275/2006 Coll., Act No. 214/2008
Trustwave Subscriber Agreement for Digital Certificates Ver. 11JUL14 PLEASE READ THIS AGREEMENT AND THE TRUSTWAVE CERTIFICATION PRACTICES STATEMENTS ( CPS ) CAREFULLY BEFORE USING THE CERTIFICATE ISSUED
HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 1.1 Date : 3 March 2000 Prepared by : Information Technology Services Center Hong Kong University of Science
A. Certification Services 1 Certification 1.1 Certification of Public Keys 1.1.1 Symantec carries out the certification of public keys in accordance with the current certification guidelines of the respective
COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...
Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages
Certification Practice Statement Date: February 21, 2008 Version: 1.0.1 Table of Contents Document History... 1 Acknowledgments... 1 1. Introduction... 2 1.1 Overview... 3 1.2 Ford Motor Company Certificate
TC TrustCenter GmbH Certification Practice Statement NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This Certification Practice Statement is published in conformance
QUICKSSL PREMIUM(tm) SUBSCRIBER AGREEMENT Please read the following agreement carefully. By submitting an application to obtain a QuickSSL Premium(tm) Certificate and accepting and using such certificate,
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
Subscriber Agreement for Certificates PLEASE READ THIS AGREEMENT AND MICROS CERTIFICATION PRACTICES STATEMENTS ("CPS") CAREFULLY BEFORE USING THE CERTIFICATE ISSUED TO YOUR ORGANIZATION. BY USING THE CERTIFICATE,
GlobalSign Subscriber Agreement for DocumentSign Digital ID for Adobe Certified Document Services (CDS) Version 1.1 PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE DIGITAL CERTIFICATE ISSUED TO YOU
A. Certification Services 1 Scope of Services 1.1 These General Terms and Conditions on TC QSign cover the providing of all products and services by the, hereinafter called Symantec. Signature cards are
CERTUM QCA PKI Disclosure Statement v1.1 1 Certum QCA PKI Disclosure Statement Version 1.1 Effective date: 1 st of April, 2016 Status: valid Asseco Data Systems S.A. ul. Żwirki i Wigury 15 81-387 Gdynia
Rules of Domain Name Registration in ENUM Valid from October 1, 2007 1. INITIAL PROVISIONS 1.1. This document specifies Rules of Registration and delegation of second and lower level Domain Names under
SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION I. DEFINITIONS For the purpose of this Service Description, capitalized terms have the meaning defined herein. All other capitalized
Entrust Certificate Services Standard and Advantage SSL Certificate Enrollment Guide Software release: 11.7 Date of Issue: July 2015 Document issue: 1.0 Copyright 2008-2015 Entrust. All rights Reserved.
The following Enrollment Guide is designed to assist customers in the certificate enrollment process by explaining the necessary steps that must be followed when applying for an Entrust SSL Certificate.
HydrantID SSL Certificate Services Agreement HYDRANTID SSL CERTIFICATE SERVICES AGREEMENT THIS HYDRANTID CERTIFICATE SERVICES AGREEMENT ( AGREEMENT ) IS ENTERED INTO BETWEEN HYDRANTID AND THE ENTITY YOU
ODETTE CA Subscriber Agreement for Certificates ODETTE Subscriber Agreement for Certificates 3 Table of Contents 1 ODETTE CA Subscriber Agreement for Certificates... 5 2 Definitions... 5 2.1 Digital Certificate...
Certification Practice Statement 1.0 INTRODUCTION 1.1 OVERVIEW The Federal Reserve Banks ( FRBs ), utilizing Public Key Infrastructure ( PKI ) technology and operating as a Certification Authority ( FR-CA
Title INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456 Customer Aristotle University of Thessaloniki PKI (www.pki.auth.gr) To WHOM IT MAY CONCERN Date 18 March 2011 Independent Audit
SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates Version March 2004 Version 2004-03 SwissSign Gold CP/CPS Page 1 of 66 Table of Contents 1. INTRODUCTION...9 1.1 Overview...
Gandi CA Certification Practice Statement Gandi SAS 15 Place de la Nation Paris 75011 France Version 1.0 TABLE OF CONTENTS 1.INTRODUCTION...10 1.1.Overview...10 1.2.Document Name and Identification...10
Certification Practice Statement for TC TrustCenter Adobe Certified Document Services Certificates Version 1.0.1 June 22 th, 2010 TC TrustCenter GmbH June 22th, 2010 Page 1 of 27 Table of Contents I. INTRODUCTION
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
Version 1.1 dated May 13th, 2016 GANDI SSL Contract (optional service that is accessory to the domain name registration service at Gandi) You acknowledge that the subscription and utilization of Our Gandi
LAW OF MONGOLIA ON ELECTRONIC SIGNATURE December 15, 2011 Ulaanbaatar CHAPTER ONE GENERAL PROVISIONS Article 1. Purpose of the law 1.1 The purpose of this Law is to determine the legal base of using electronic
GENERAL* POLICY OF AKKY S DOMAIN NAMES. Policy to be enforced as from May 5 th, 2012. 1. DEFINITIONS. 2. GENERAL PROVISIONS. 3. REGARDING THE DOMAIN NAMES. 4. USERS AND CONTACTS FACULTIES AND OBLIGATIONS.
GlobalSign Subscriber Agreement for DomainSSL Certificates Version 1.3 PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE DIGITAL CERTIFICATE ISSUED TO YOU OR YOUR ORGANISATION. BY USING THE DIGITAL
Qualified Electronic Signatures Act (SFS 2000:832) The following is hereby enacted 1 Introductory provision 1 The purpose of this Act is to facilitate the use of electronic signatures, through provisions
RapidSSL(tm) Subscriber Agreement Please read the following agreement carefully. By submitting an enrollment form to obtain a RapidSSL Digital Certificate (the Certificate ) and accepting and using such
Equens Certificate Policy WebServices and Connectivity Final H.C. van der Wijck 11 March 2015 Classification: Open Version 3.0 Version history Version no. Version date Status Edited by Most important edit(s)
Entrust Cloud EV Multi-Domain Certificate Enrollment Guide Software release: 11.8 Date of Issue: December 2015 EV Multi-Domain Certificate 11.8 Enrollment Guide Copyright 2015 Entrust. All rights reserved.
1 / 5 Terms and Conditions of Use of the Mediastore / Data Asset Management Platform of Konica Minolta Business Solutions Europe GmbH Last modified: 16 th December 2015 PREAMBLE These Terms and Conditions
Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is
SPECIFIC CERTIFICATION POLICIES AND PRACTICES APPLICABLE TO ELECTRONIC CERTIFICATION AND SIGNATURE SERVICES FOR PUBLIC ORGANIZATIONS AND ADMINISTRATIONS, THEIR BODIES AND ATTACHED OR DEPENDENT ENTITIES
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
Certification Practice Statement Version 2.0 Effective Date: October 1, 2006 Continovation Services Inc. (CSI) Certification Practice Statement 2006 Continovation Services Inc. All rights reserved. Trademark
Certification Practice Statement of CERTUM s Certification Services Appendix 3: Guidelines for the issuance and management of Extended Validation SSL certificates Version 3.2 Date: 9 th of February, 2011
Globe Hosting Certification Authority Globe Hosting, Inc. 501 Silverside Road, Suite 105, Wilmington, DE 19809, County of New Castle, United States www.globessl.com TABLE OF CONTENTS 1. INTRODUCTION...
BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank
TREND MICRO SSL CERTIFICATION PRACTICE STATEMENT Version 1.5 Effective Date: 13 August 2012 TREND MICRO SSL CERTIFICATION PRACTICE STATEMENT TABLE of CONTENTS 1. INTRODUCTION VERSION 1.5 EFFECTIVE DATE:
ComSign Ltd. Certification Practice Statement (CPS) Procedures relating to issuing electronic certificates that comply with provisions of the Electronic Signature Law and its regulations. Version 3. 1.1.
FREESSL SUBSCRIBER AGREEMENT PLEASE READ THE FOLLOWING AGREEMENT CAREFULLY. BY SUBMITTING AN ENROLLMENT FORM TO OBTAIN A FREESSL DIGITAL CERTIFICATE (THE CERTIFICATE ) AND ACCEPTING AND USING SUCH CERTIFICATE,
Certipost Trust Services Version 1.2 Effective date 03 May 2012 Certipost NV ALL RIGHTS RESERVED. 2 13 Definitions : Activation Data Certificate Certificate Holder Certificate Public Registry Certificate
A. Certification Services 1 Certification 1.1 Certification of Public Keys 1.1.1 Symantec carries out the certification of public keys in accordance with the current certification guidelines of the respective
Application ID Number (For Official Use only) APPLICATION FOR DIGITAL CERTIFICATE Instructions: 1. Please fill the form in BLOCK LETTERS ONLY. 2. All fields are mandatory. 3. Present one (1) copy and the
IPInfoDB Web Service Agreement PLEASE READ THIS WEB SERVICE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING IPINFODB SERVICES. BY CHECKING THE I HAVE READ, UNDERSTAND AND AGREE WITH THE SERVICE
LAW no. 455 on July 18, 2001 on electronic signature The Parliament of Romania adopts this law. CHAPTER I: General Provisions SECTION 1: General Principles Art. 1. This law regulates the legal status of
PostSignum CA Certification Policy applicable to qualified personal certificates Version 3.0 7565 Page 1/60 TABLE OF CONTENTS 1 Introduction... 5 1.1 Review... 5 1.2 Name and clear specification of a document...
Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12
GlobalSign Subscriber Agreement for PersonalSign and DocumentSign for Adobe CDS Certificates Combined Agreement for epki (US) Version 1.1 PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE DIGITAL CERTIFICATE
NCDC GOVERNMENT-CA PKI DISCLOSURE STATEMENT Document Classification: Public Version Number: 1.5 Issue Date: June 11, 2015 Copyright 2015 National Center for Digital Certification, Kingdom of Saudi Arabia.
General Terms & Conditions for the Registration of.vg Domain Names April 14, 2014 KSregistry GmbH (operating under the trade name Nic.VG) administers and operates the registry for internet Domain Names
227/2000 Coll. ACT of 29 th June 2000 on Electronic Signature and change to some other laws (Electronic Signature Act) Amendment: 226/2002 Coll. Amendment: 517/2002 Coll. Amendment :440/2004 Coll. Amendment:
Federal Reserve Certification Authority (FR-CA) Certification Practice Statement for United States Treasury Auctions 1.0 INTRODUCTION 1.1 OVERVIEW The Federal Reserve Bank of New York ( FRBNY ) acts as
LAW OF GEORGIA ON ELECTRONIC SIGNATURES AND ELECTRONIC DOCUMENTS Article 1 - Purpose and scope of the law 1. This Law establishes a legal framework for electronic document flow systems and the use of electronic
CERTIMETIERSARTISANAT and C@RTEUROPE ELECTRONIC SIGNATURE SERVICE SUBSCRIPTION CONTRACT SPECIFIC TERMS AND CONDITIONS Please fill in the form using BLOCK CAPITALS. All fields are mandatory. 1 1. SUBSCRIBER
Advantage Security Certification Practice Statement Version 3.8.5 Effective Date: 01/01/2012 Advantage Security S. de R.L. de C.V. Prol. Paseo de la Reforma # 625 Int 402, Col Paseo de las Lomas. Del Alvaro
ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0 June 30, 2004 Table of Contents Table of Contents...2 1 Introduction...3 1.1 Overview...3 1.1.1 General Definitions...4
TERMS AND CONDITIONS INFLUENCERS AT WORK These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, Ltd. ( InfluencerAtWork ) and you, or if you represent a company or other
1. INTRODUCTION App Terms and Conditions Thank you for purchasing the App or Apps herein now referred to collectively or individually as (the App ). The App is published by or on behalf of Complexus (Pty)
GmbH NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This document may not be copied, distributed, used, stored or transmitted in any form or by any means, whether
REGISTRATION AUTHORITY (RA) POLICY Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. INDEX Contenido 1. LEGAL FRAMEWORK... 4 1.1. Legal Base...
CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.
THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Last Revision Date: June 28, 2007 Version: 3.0 Published By: RSA Security Inc. Copyright 2002-2007 by
GEOSURE PROTECTION PLAN I. SCOPE/INTRODUCTION The GeoSure Protection Plan is designed to provide protection against economic loss resulting from specific types of risks associated with certain SSL Certificates
NETIM - GENERAL TERMS AND CONDITIONS OF DOMAIN NAMES CG-ND version 2.1-15 th November 2015 NETIM, limited liability company under french law, with head office located 165 avenue de bretagne 59000 LILLE
ComSign Ltd. Certification Practice Statement (CPS) Procedures relating to issuing electronic certificates that comply with provisions of the Electronic Signature Law and its regulations. Version 3.1.1
VeriSign Trust Network Certificate Policies Version 2.8.1 Effective Date: February 1, 2009 VeriSign, Inc. 487 E. Middlefield Road Mountain View, CA 94043 USA +1 650.961.7500 http//:www.verisign.com - 1-