AITSF Position Paper. PKI Governance in Australia

Size: px
Start display at page:

Download "AITSF Position Paper. PKI Governance in Australia"

Transcription

1 AITSF Position Paper PKI Governance in Australia Prepared by Stephen Wilson, SecureNet V 1.0 April 2003

2 AITSF Position Paper on PKI Governance in Australia April 2003 Page 2/5 Abstract This paper presents the position of the Australian IT Security Forum (AITSF) for input to the current deliberations on a National Authentication Framework in Australia, in the particular area of PKI. The AITSF, through consultation with its members, and open dialogue with government, has arrived at a set of considerations and recommendations aimed at streamlining the usage and evaluation of PKI in appropriate applications, and enhancing the commercial predictability of the evaluation process, without in any way compromising the proper strong levels of security that have been standardised by Project Gatekeeper. Underlying assumptions in current PKI governance Current PKI governance models tend to be based on several general assumptions which date back many years, many of which should be updated in line with experience of PKI in practice. Assumption (a) Digital signatures may be used to authenticate stranger-to-stranger transactions, where the principal parties the Subscriber, the Relying Party and the CA1 have not met before and have no legal relationship. (b) In a digitally signed transaction, there might be no context other than the digital signature and certificate with which to decide whether to accept or reject the transaction. (c) The digital certificate may be general purpose and may serve to identify the Subject in a relatively wide range of transaction types. Experience Stranger-to-stranger e-commerce remains rare and complex to support. In most digital certificate applications today, the subscriber, RP and CA are all closely related. Most digital signature applications today are integrated with business applications, rich in context, such as government form submission. Most digital certificates issued today are used in a relatively limited range of applications. Experience of PKI in practice To date, PKI has not generally been deployed successfully in retail e-commerce settings, such as Internet banking and shopping. Instead, PKI has been more dominant in B2G and some B2B applications, such as: 1 This paper, in common with the two NEAC reports on legal liability in PKI, does not separate the Registration Authority (RA) function from the Certification Authority. We use the term CA to include both the RA and the backend CA.

3 AITSF Position Paper on PKI Governance in Australia April 2003 Page 3/5 corporate taxation reporting personal income tax returns e-health customs reporting patent applications (US). Practical experience in Australia leads to some simplification of the above assumptions: (a) Digital signatures are most often used to authenticate parties who have an existing legal relationship. (b) PKI applications tend to have a relatively rich context, including special purpose application software, web-sites and so on. (c) A digital certificate is often issued by the entity which is also providing the service which will use the certificates in a relatively narrow range of transactions. Digital certificates in practice are most often used to automate electronic dealing between types of parties who are already dealing with one another off-line. Certificates are therefore usually used in a specific context where existing rules apply. Implications The main implications of practical experience and the simplification of the assumptions underlying the governance model include the following: Certificate usage can be better automated by application software. Since the context of most PKI-enabled applications is rich, software can probably select and invoke the appropriate certificate automatically, without user intervention. This can make the user s experience of PKI and key management more seamless. Certificate registration can be streamlined. Because most PKI applications occur within existing business contexts and are governed by existing rules, users should not need to be re-identified from scratch in order to be registered for digital certificates. PKI evaluation and accreditation can be streamlined. If PKI accreditation was to explicitly factor in the intended application as part of the target of evaluation, then existing contractual arrangements, liability provisions and regulations are applicable could be taken into account, to streamline the legal review and reduce the overall accreditation overhead. Objectives In formulating an Authentication framework in general (and PKI evaluation rules in particular), the AITSF believes that the following objectives should be included:

4 AITSF Position Paper on PKI Governance in Australia April 2003 Page 4/5 Maintain high standards for CA operations at present internationally accepted levels (equivalent to Highly Protected certified backend processes and personnel, and EAL4+ certified CA/RA technologies). Facilitate the appropriate usage of digital certificate technology in e-business, to improve risk management, reduce paper costs, and enable new types of services to be delivered on-line. Provide for light touch governance, minimising unnecessary government involvement and maximising the flexibility of business to deploy the technology. Allow for fitness for purpose, to allow streamlined deployment of PKI technologies, leveraging existing relationships between parties. Enhance the commercial predictability of the accreditation process, so that service providers undergoing accreditation can better plan for the outcomes and in turn provide better certainty to all users (we suggest that commercial predictability of accreditation is more important than cost per se). Shorten accreditation times, but without compromising quality. Support a recognition framework that focuses on the fitness for purpose of certificates issued in different domains, facilitating cross border trading. Exemplars The following systems and processes provide useful precedents and benchmarks to inform PKI governance models: The AISEP (Australasian Information Security Evaluation Program) is a highly respected product certification process for cryptographic technologies, managed by the DSD (Defence Signals Directorate). It uses commercial test houses which are accredited by NATA (National Association of Testing Authorities, Australia) and licensed by the DSD. Gatekeeper Accreditation CA shows how the formerly controversial idea of a root CA can be modified, with the focused objective of facilitating interoperability, and without changing liability arrangements of the scheme. Mutual Recognition Arrangements (MRAs) amongst APEC economies show how technically complex testing and assurance processes can be recognised across borders. The International Laboratory Accreditation Cooperation (ILAC), the Asia Pacific Laboratory Accreditation Cooperation (APLAC) and the International Accreditation Forum (IAF) are non-government bodies that facilitate the validity of evaluations across different jurisdictions. tscheme is a light touch European accreditation process for PKI. Considerations / Recommendations The AITSF submits that the government should consider the following, in evolving the pioneering Gatekeeper PKI programme:

5 AITSF Position Paper on PKI Governance in Australia April 2003 Page 5/5 Examine whether Gatekeeper accreditation can be streamlined by taking account of the intended usage of a given CA s certificates and any associated legal relationships between the intended parties which serve to control liabilities and facilitate registration. Allow for Evidence of Identity rules to be varied in order to streamline registration for certain types of certificates, in keeping with the intended usage of those certificates and existing business rules which would govern such usage. Consider the application of AISEP principles in order to help outsource parts of the accreditation process. This might be facilitated through a partnership between government authorities (such as NOIE and DSD) and a not-for-profit accreditor such as JAS- ANZ (established under a treaty between the Governments of Australia and New Zealand) or NATA (a non-government, not-for-profit, government-recognized accreditor of organisations in which technical competence is a key requirement).

Gatekeeper PKI Framework. Archived. February 2009. Gatekeeper Public Key Infrastructure Framework. Gatekeeper PKI Framework.

Gatekeeper PKI Framework. Archived. February 2009. Gatekeeper Public Key Infrastructure Framework. Gatekeeper PKI Framework. Gatekeeper Public Key Infrastructure Framework 1 October 2007 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright.

More information

E-Signature Issues in Cross-Border Single Window: A comparative analysis of Australia, the UK and China

E-Signature Issues in Cross-Border Single Window: A comparative analysis of Australia, the UK and China E-Signature Issues in Cross-Border Single Window: A comparative analysis of Australia, the UK and China Ms. Hemali Shah Department of Business Law and Taxation Monash University Australia Import-Export

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Certification Report Certificate Number: 2009/58 17 September 2009 Version 1.0 Commonwealth of Australia 2009. Reproduction is authorised provided that

More information

UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures

UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures Introduction to the law of electronic signatures Luca Castellani Head, Regional Centre for Asia and the Pacific UNCITRAL Secretariat Incheon, Republic of Korea Outline 1. Methods and technologies for electronic

More information

Draft WGIG Issues Paper on E-Commerce

Draft WGIG Issues Paper on E-Commerce Draft WGIG Issues Paper on E-Commerce This paper is a 'draft working paper' reflecting the preliminary findings of the drafting team. It has been subject to review by all WGIG members, but it does not

More information

ROLE OF THE APEC SPECIALIST REGIONAL BODIES

ROLE OF THE APEC SPECIALIST REGIONAL BODIES ROLE OF THE APEC SPECIALIST REGIONAL BODIES ND A S ARD URE D N STA TRUCT E H F T FRAS O S NT NCE IN E M ELE FORMA CON Why is the Standards and Conformance Infrastructure important? ~ Improves everyday

More information

GLOSSARY. In these documents, the following capitalised words and phrases have the following meanings unless a contrary intention is evident:

GLOSSARY. In these documents, the following capitalised words and phrases have the following meanings unless a contrary intention is evident: GLOSSARY The Glossary applies to the following documents: 1. VeriSign Gatekeeper ABN-DSC CP 2. VeriSign Gatekeeper Individual CP 3. VeriSign Gatekeeper Non-Individual CP 4. VeriSign Gatekeeper CPS 5. VeriSign

More information

Council of Australian Governments Business Advisory Forum Canberra, 6 December 2012 Communiqué

Council of Australian Governments Business Advisory Forum Canberra, 6 December 2012 Communiqué Council of Australian Governments Business Advisory Forum Canberra, 6 December 2012 Communiqué The second meeting of the Business Advisory Forum to the Council of Australian Governments (COAG), convened

More information

Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities

Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities Luca Castellani Secretary, Working Group IV (Electronic Commerce)

More information

OECD Digital Identity Management Workshop, May 2007. Audit requirements and the application of Digital Signatures in Oil and Gas Industry

OECD Digital Identity Management Workshop, May 2007. Audit requirements and the application of Digital Signatures in Oil and Gas Industry OECD Digital Identity Management Workshop, May 2007 07-May-2007 File Title Copyright: Shell Exploration & Production Ltd. Audit requirements and the application of Digital Signatures in Oil and Gas Industry

More information

Australian Business Number Digital Signature Certificate (ABN-DSC)

Australian Business Number Digital Signature Certificate (ABN-DSC) Australian Business Number Digital Signature Certificate (ABN-DSC) Broad Specification Version 3.6 September 2003 This work is copyright. The Commonwealth grants a royalty-free, irrevocable, world-wide,

More information

PKI Disclosure Statement

PKI Disclosure Statement Land Registry Version 2.0 23/07/2008 PKI Disclosure Statement 1. Introduction Land Registry has created an e-security platform for its customers to facilitate role-based access, authentication and electronic

More information

GATEKEEPER COMPLIANCE AUDIT PROGRAM

GATEKEEPER COMPLIANCE AUDIT PROGRAM GATEKEEPER COMPLIANCE AUDIT PROGRAM NOVEMBER 2011 Commonwealth of Australia 2011 All material presented in this publication is provided under a Creative Commons Attribution 3.0 Australia (http://creativecommons.org/licenses/by/3.0/au/deed.en)

More information

from PKI to Identity Assurance

from PKI to Identity Assurance from PKI to Identity Assurance Richard Trevorah Technical Manager tscheme Ltd Tel: +44 (0)7818 094728 richard.trevorah@tscheme.org What is tscheme? tscheme is a not-for-profit membership organisation chartered

More information

L@Wtrust Class 3 Registration Authority Charter

L@Wtrust Class 3 Registration Authority Charter Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12

More information

Radio Spectrum and Technical Standards Advisory Committee

Radio Spectrum and Technical Standards Advisory Committee Radio Spectrum and Technical Standards Advisory Committee SSAC Paper 7/2015 for information Update on Testing and Certification of Telecommunications Equipment Office of the Communications Authority 15

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

Operating a CSP in Switzerland or Playing in the champions league of IT Security

Operating a CSP in Switzerland or Playing in the champions league of IT Security Operating a CSP in Switzerland or Playing in the champions league of IT Security Agenda SwissSign Technology Products and Processes Legal Aspects and Standards Business Model Future Developments 2 SwissSign

More information

Sincerely yours, Kathryn Hurford Associate Director, Policy

Sincerely yours, Kathryn Hurford Associate Director, Policy 8 July 2005 Malaysia FTA Taskforce Department of Foreign Affairs and Trade R. G. Casey Building, John McEwen Crescent BARTON ACT 0221 Dear Sir/Madam, Engineers Australia is the peak body for engineering

More information

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM(2012 238 final) {SWD(2012) 135 final} {SWD(2012) 136 final} Andrea SERVIDA

More information

The United Nations Convention on the Use of Electronic Communications in International Contracts: policy goals

The United Nations Convention on the Use of Electronic Communications in International Contracts: policy goals The United Nations Convention on the Use of Electronic Communications in International Contracts: policy goals Luca Castellani Legal Officer UNCITRAL Secretariat Vienna, Austria Why a new international

More information

Smart Open Services for European Patients Open ehealth initiative for a European large scale pilot of patient summary and electronic prescription

Smart Open Services for European Patients Open ehealth initiative for a European large scale pilot of patient summary and electronic prescription Smart Open Services for European Patients Open ehealth initiative for a European large scale pilot of patient summary and electronic prescription Deliverable: Work Package Document WP3.7 D.3.7.2. FINAL

More information

GlobalSign CA Certificate Policy

GlobalSign CA Certificate Policy GlobalSign CA Certificate Policy Date: December 17 th 2007 Version: v.3.0 Table of Contents Document History...1 Acknowledgments...2 1. Introduction...3 1.1 Overview...4 1.1.1 GlobalSign Rootsign...5 1.1.2

More information

LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION

LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION Aušra Kumetaitienė Head of Information Society Development Division Tomas Jakimavičius Telecommunications and

More information

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015.

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015. Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 eidas Regulation By Alessandra Sbordoni Legal Officer, eidas Task Force

More information

TTP.NL Scheme. for management system certification. of Trust Service Providers issuing. Qualified Certificates for Electronic Signatures,

TTP.NL Scheme. for management system certification. of Trust Service Providers issuing. Qualified Certificates for Electronic Signatures, TTP.NL Scheme for management system certification of Trust Service Providers issuing Qualified Certificates for Electronic Signatures, Public Key Certificates, Website Certificates and / or Time-stamp

More information

The Importance of PKI Today

The Importance of PKI Today The Importance of PKI Today Stephen Wilson Managing Director, Lockstep Consulting Pty Limited, Australia ABSTRACT Public Key Infrastructure around the world has had mixed success over the past ten years.

More information

trust and confidence "draw me a sheep" POLICY AND REGULATION FOR EUROPE

trust and confidence draw me a sheep POLICY AND REGULATION FOR EUROPE trust and confidence "draw me a sheep" POLICY AND REGULATION FOR EUROPE new regulation eidas... "...told him that she was the only one of her kind in all the universe" POLICY AND REGULATION FOR EUROPE

More information

Information Communication Technology

Information Communication Technology Information Communication Technology Strategic Plan 2011 15 BTS11/00102 Commonwealth of Australia 2011 This work is copyright. You may download, display, print and reproduce this material in unaltered

More information

NASH PKI Certificate for Healthcare Provider Organisations renewal confirmation

NASH PKI Certificate for Healthcare Provider Organisations renewal confirmation NASH PKI Certificate for Healthcare Provider Organisations renewal confirmation Please send your completed renewal confirmation to: Department of Human Services Fax number: 1800 890 698 Number of pages

More information

ARTL PKI. Certificate Policy PKI Disclosure Statement

ARTL PKI. Certificate Policy PKI Disclosure Statement ARTL PKI Certificate Policy PKI Disclosure Statement Important Notice: This document (PKI Disclosure Statement, PDS) does not by itself constitute the Certificate Policy under which Certificates governed

More information

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,

More information

Microsoft appreciates the opportunity to respond to the Cloud Computing Consumer Protocol: ACS Discussion Paper July 2013 (the protocol).

Microsoft appreciates the opportunity to respond to the Cloud Computing Consumer Protocol: ACS Discussion Paper July 2013 (the protocol). Microsoft Submission to ACS Cloud Protocol Discussion Paper General Comments Microsoft appreciates the opportunity to respond to the Cloud Computing Consumer Protocol: ACS Discussion Paper July 2013 (the

More information

How much do you pay for your PKI solution?

How much do you pay for your PKI solution? Information Paper Understand the total cost of your PKI How much do you pay for your PKI? A closer look into the real costs associated with building and running your own Public Key Infrastructure and 3SKey.

More information

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market [COM(2012) 238 final] {SWD(2012) 135 final} {SWD(2012) 136 final} Andrea SERVIDA

More information

National Certification Authority Framework in Sri Lanka

National Certification Authority Framework in Sri Lanka National Certification Authority Framework in Sri Lanka By Rohana Palliyaguru Manager Operations & Principal Information Security Engineer What is digital Signature? According to UNCITRAL Text 25. Digital

More information

ASEAN Central Banks Working Committee on Payment and Settlement Systems (WC-PSS) Strategic Report to the ASEAN Central Bank Governors Meeting

ASEAN Central Banks Working Committee on Payment and Settlement Systems (WC-PSS) Strategic Report to the ASEAN Central Bank Governors Meeting ASEAN Central Banks Working Committee on Payment and Settlement Systems (WC-PSS) Strategic Report to the ASEAN Central Bank Governors Meeting Introduction April 2011 1. The WC-PSS was endorsed at the ASEAN

More information

ENERGY MARKET REFORM

ENERGY MARKET REFORM C A S E S T U D Y O F A S U C C E S S F U L A U S T R A L I A N N A T I O N A L E N E R G Y P R O G R A M M E / S T R A T E G Y ENERGY MARKET REFORM 1. The problem or issue addressed: Efficient and effective

More information

The National Internship Framework - Newsletter 2

The National Internship Framework - Newsletter 2 The National Internship Framework - Newsletter 2 The purpose of this Newsletter is to provide an update on the implementation of the National Internship Framework. The first newsletter released on 29 May

More information

Fujitsu Australia and New Zealand Provides Cost-effective and Flexible Cloud Services with CA Technologies Solutions

Fujitsu Australia and New Zealand Provides Cost-effective and Flexible Cloud Services with CA Technologies Solutions CUSTOMER SUCCESS STORY February 2013 Fujitsu Australia and New Zealand Provides Cost-effective and Flexible Cloud Services with CA Technologies Solutions CLIENT PROFILE Industry: IT Services Company: Fujitsu

More information

HMG Public Key Infrastructure - Overview. Version 1.0 December 2002

HMG Public Key Infrastructure - Overview. Version 1.0 December 2002 HMG Public Key Infrastructure - Overview Version 1.0 December 2002 Executive Summary A high proportion of business within government is carried out electronically, exploiting, amongst other things, email

More information

The Changing Nature of SANAS Accreditation

The Changing Nature of SANAS Accreditation The Changing Nature of SANAS Accreditation Test and Measurement 2013 Conference Misty Hills Conference Hotel, October 2013 Ron Josias South African National Accreditation System (SANAS) Introduction An

More information

Finance and Accounting outsourcing e-commerce solutions. Financial Solutions

Finance and Accounting outsourcing e-commerce solutions. Financial Solutions Finance and Accounting outsourcing e-commerce solutions Financial Solutions Supporting the future of e-commerce: success strategies for the trading world of tomorrow SOLUTIONS FOR YOUR INDUSTRY arvato

More information

UKAS Guidance for bodies operating certification of Trust Service Providers seeking approval under tscheme

UKAS Guidance for bodies operating certification of Trust Service Providers seeking approval under tscheme CIS 3 EDITION 2 February 2014 UKAS Guidance for bodies operating certification of Trust Service Providers seeking approval under tscheme CONTENTS SECTION PAGE 1 Introduction 2 2 Requirements for Certification

More information

How To Respect The Agreement On Trade In Cyberspace

How To Respect The Agreement On Trade In Cyberspace CHAPTER 14 ELECTRONIC COMMERCE Article 14.1: Definitions For the purposes of this Chapter: computing facilities means computer servers and storage devices for processing or storing information for commercial

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Certification Report Certificate Number: 2010/70 23 November 2010 Version 1.0 Commonwealth of Australia 2010. Reproduction is authorised provided that

More information

Which Root Certification Authority can you trust? Australia can show you the way.

Which Root Certification Authority can you trust? Australia can show you the way. Which Root Certification Authority can you trust? Australia can show you the way. By Simon R Grant LLB LLM, Senior Legal Officer, Crown Law Queensland & Mediator and Steve Mathew, FIMC CMC, Director ArticSoft

More information

Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide

Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide V2.0 NOVEMBER 2014 Information Security Registered Assessors Program - Gatekeeper PKI Framework Guide V 2.0 NOVEMBER

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Certification Report Certificate Number: 2010/71 10 Dec 2010 Version 1.0 Commonwealth of Australia 2010. Reproduction is authorised provided that the

More information

Assessment Methodologies - Achieving Accreditation

Assessment Methodologies - Achieving Accreditation 1 Assessment Methodologies - Achieving Accreditation Dr Stephen Clark Group Chief Executive Officer Australian General Practice Accreditation Limited (AGPAL) and Quality Innovation Performance (QIP) 2

More information

PREQUALIFICATION INFORMATION

PREQUALIFICATION INFORMATION Department of Planning, Transport and Infrastructure Building and Construction Project Prequalification System (Edition 2012) PREQUALIFICATION INFORMATION General Building Contractor Residential Building

More information

THINKING BUSINESS SOLUTIONS INTERNATIONAL E-BUSINESS

THINKING BUSINESS SOLUTIONS INTERNATIONAL E-BUSINESS THINKING BUSINESS SOLUTIONS B U S I N E S S INTERNATIONAL E-BUSINESS OVERVIEW E-commerce is a relatively new way to transact over the web and is considered a far more efficient way to shop and establish

More information

Australia-wide accreditation of programs for the professional preparation of teachers. A consultation paper

Australia-wide accreditation of programs for the professional preparation of teachers. A consultation paper Australia-wide accreditation of programs for the professional preparation of teachers A consultation paper was established as the national body for the teaching profession with funding provided by the

More information

Transaction Security. Advisory Services

Transaction Security. Advisory Services Transaction Security Advisory Services Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.

More information

Thai Digital ID Co.,Ltd.

Thai Digital ID Co.,Ltd. Thai Digital ID Co.,Ltd. Building Trusted National Root CA - Thailand s Experience ISO27001 Enabling Trust and Security for Reliability of your Business TDID & CA Service Standard PKI Environment CA Hosting

More information

Submission to the Department of Environment Regulation s Draft Guidance Statement on Regulatory Principles December 2014

Submission to the Department of Environment Regulation s Draft Guidance Statement on Regulatory Principles December 2014 Submission to the Department of Environment Regulation s Draft Guidance Statement on Regulatory Principles December 2014 Chamber of Commerce and Industry of Western Australia (Inc) About CCI The Chamber

More information

Gatekeeper. Public Key Infrastructure Framework

Gatekeeper. Public Key Infrastructure Framework Gatekeeper Public Key Infrastructure Framework V 3.0 NOVEMBER 2014 Gatekeeper Public Key Infrastructure Framework V 3.0 DECEMBER 2014 Foreword Information and Communication Technologies (ICT) are transforming

More information

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities

X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities Version 5.1 May 2014 Notice to all parties seeking to rely Reliance

More information

Compliance Guide: ASD ISM OVERVIEW

Compliance Guide: ASD ISM OVERVIEW Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework

More information

Application of Public Key Infrastructure in E-Business

Application of Public Key Infrastructure in E-Business Application of Public Key Infrastructure in E-Business A. Kazerooni, M. Adlband, O. Mahdiyar Department of Electrical Engineering, Kazerun Branch, Islamic Azad University IRAN A.kazerooni@kau.ac.ir Abstract:

More information

Legal issues relevant for paperless trade facilitation and electronic single window facilities

Legal issues relevant for paperless trade facilitation and electronic single window facilities Legal issues relevant for paperless trade facilitation and electronic single window facilities Luca Castellani UNCITRAL Secretariat subtitle Trade facilitation and paperless trade Trade facilitation aims

More information

An Alternative Method for Maintaining ISO 9001/2/3 Certification / Registration

An Alternative Method for Maintaining ISO 9001/2/3 Certification / Registration International Accreditation Forum, Inc. An Alternative Method for Maintaining ISO 9001/2/3 Certification / Registration A Discussion Paper The International Accreditation Forum, Inc. (IAF) operates a program

More information

Information Governance

Information Governance WHITE PAPER Information Governance Irrelevant, overhead or central to survival? Setting the information governance agenda Table of Contents Introduction... 1 Defining the importance of information governance...

More information

ehealth in support of safety, quality and continuity of care within and across borders

ehealth in support of safety, quality and continuity of care within and across borders ehealth in support of safety, quality and continuity of care within and across borders Gerard Comyn Acting Director Information Society & Media DG European Commission http://europa.eu.int/information_society/activities/health/index_en.htm

More information

Improving Customer Service in the Global Supply Chain

Improving Customer Service in the Global Supply Chain Improving Customer Service in the Global Supply Chain GXS Trading Grid for BizTalk Server GXS Overview 40 Years Supply Chain Experience World s Largest B2B Integration Services Provider 40% of Business

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Certification Report Certificate Number: 2009/54 2 June 2009 Version 1.0 Commonwealth of Australia 2009. Reproduction is authorised provided that the

More information

THE AMBA DEVELOPMENT NETWORK (ADN)

THE AMBA DEVELOPMENT NETWORK (ADN) THE AMBA DEVELOPMENT NETWORK (ADN) 1 THE AMBA DEVELOPMENT NETWORK (ADN) For High Potential Business Schools & MBA Programmes 2 THE AMBA DEVELOPMENT NETWORK (ADN) JOIN THE WORLD S PREMIER MBA NETWORK! Join

More information

Equens Certificate Policy

Equens Certificate Policy Equens Certificate Policy WebServices and Connectivity Final H.C. van der Wijck 11 March 2015 Classification: Open Version 3.0 Version history Version no. Version date Status Edited by Most important edit(s)

More information

ABET s Global Engagement *

ABET s Global Engagement * UDC 378.141.214 ABET s Global Engagement * ABET (Accreditation Board for Engineering and Technology), USA M.K.J. Milligan, D. Iacona, J.L. Sussman This paper will discuss ABET s global activities in detail,

More information

For personal use only

For personal use only Covata Limited Investor presentation November 2014 Investment case Significant time and resources spent developing the Covata Platform which has a number of significant competitive advantages in the IT

More information

Enterprise SSL FEATURES & BENEFITS

Enterprise SSL FEATURES & BENEFITS Enterprise SSL FEATURES & BENEFITS What s included: - Powerful 1024-bit signed RSA certificates - Centralised, web-based administrative portal for certificate management - Dynamically-generated site seal

More information

Strengthening economic relations between Australia and New Zealand A joint study May 2012

Strengthening economic relations between Australia and New Zealand A joint study May 2012 Strengthening economic relations between Australia and New Zealand A joint study May 2012 ANZ Submission to the Australian and New Zealand Productivity Commissions 2 EXECUTIVE SUMMARY ANZ welcomes the

More information

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from

More information

Submission by. Tatts Lotteries. to the. Productivity Commission s Inquiry into Australia s Gambling Industries. March 2009

Submission by. Tatts Lotteries. to the. Productivity Commission s Inquiry into Australia s Gambling Industries. March 2009 Submission by Tatts Lotteries to the Productivity Commission s Inquiry into Australia s Gambling Industries March 2009 Tatts Lotteries is a business unit of Tatts Group Limited and this submission is related

More information

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European

More information

Strategies for the implementation of a Public Key Authentication Framework (PKAF) in Australia

Strategies for the implementation of a Public Key Authentication Framework (PKAF) in Australia Miscellaneous Publication Strategies for the implementation of a Public Key Authentication Framework (PKAF) in Australia SAA MP75 1996 STRATEGIES FOR THE IMPLEMENTATION OF A PUBLIC KEY AUTHENTICATION FRAMEWORK

More information

FAQs about AQuA at July 1 2013

FAQs about AQuA at July 1 2013 FAQs about AQuA at July 1 2013 With the renaming of Unified Testing Initiative to App Quality Alliance (AQuA), the arrival of the Quality App Directory, and the new AQuA membership opportunites, we ve

More information

Genesis Energy delivers IT projects faster with standardised processes and CA Clarity PPM.

Genesis Energy delivers IT projects faster with standardised processes and CA Clarity PPM. CUSTOMER TECHNICAL BRIEF: CREATING A CENTRALISED MATURITY MODEL FOR PROJECT AND RESOURCE MANAGEMENT Genesis Energy delivers IT projects faster with standardised processes and CA Clarity PPM. Table of Contents

More information

Teaching Qualifications - Full, Provisional and Non-Practising Registration

Teaching Qualifications - Full, Provisional and Non-Practising Registration TRBWA Teaching Qualifications - Full, Provisional and Non-Practising Registration 1. Purpose This policy outlines the teaching qualification requirements for registration in the categories of Full, Provisional

More information

National Certificate in Business Administration and Computing (Level 3)

National Certificate in Business Administration and Computing (Level 3) NQF Ref 0633 Version 3 Page 1 of 6 National Certificate in Business Administration and Computing (Level 3) Level 3 Credits 60 Purpose This national certificate is designed to: recognise a broad range of

More information

Danske Bank Group Certificate Policy

Danske Bank Group Certificate Policy Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...

More information

National VET Provider Collection Data Requirements Policy

National VET Provider Collection Data Requirements Policy National VET Provider Collection Data Requirements Policy Introduction Australian, state and territory governments are pursuing a number of reforms to support better information about vocational education

More information

Technology Strategy April 2014

Technology Strategy April 2014 Technology Strategy April 2014 Contents Overview 1 Our environment 1 Why change? 2 Our vision for technology what success looks like 3 Our approach 7 Transformation shifts how will we know we have been

More information

The Importance of International Services Standardisation in Australia

The Importance of International Services Standardisation in Australia 15 May 2015 Australian Services Exports Productivity Commission Locked Bag 2, Collins Street Melbourne VIC 8003 Productivity Commission Study into Barriers to Growth in Australian Services Exports Standards

More information

Legal issues in Cross-border Paperless Trade and E-commerce: Experience from China

Legal issues in Cross-border Paperless Trade and E-commerce: Experience from China Legal issues in Cross-border Paperless Trade and E-commerce: Experience from China Prof. Dr. Hong Xue Director of Beijing Normal University Institute for Internet Policy & Law Workshop on Cross-border

More information

esign Online Digital Signature Service

esign Online Digital Signature Service esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities

More information

Scoping Cross-Border e-id Management and Facilitating International e-trade

Scoping Cross-Border e-id Management and Facilitating International e-trade Scoping Cross-Border e-id Management and Facilitating International e-trade Prof. dr. HONG XUE Director of Beijing Normal University Institute for Internet Policy & Law UNCITRAL Colloquium on Identity

More information

Commonwealth Department of Family and Community Services. Submission to the Joint Committee of Public Accounts and Audit (JCPAA)

Commonwealth Department of Family and Community Services. Submission to the Joint Committee of Public Accounts and Audit (JCPAA) Commonwealth Department of Family and Community Services Submission to the Joint Committee of Public Accounts and Audit (JCPAA) Inquiry into the Management and Integrity of Electronic Information in the

More information

How To Use Ncr Aptra Clear

How To Use Ncr Aptra Clear NCR APTRA CLEAR National payment hub for clearing and settlement Shifting payment dynamics: The international scope Every country has some form of unique payment system based on its own financial practices,

More information

Baltimore UniCERT. www.baltimore.com. the world s leading PKI. global e security

Baltimore UniCERT. www.baltimore.com. the world s leading PKI. global e security TM the world s leading PKI www.baltimore.com global e security Bringing Real Business On-Line The Internet is now forming a key part of organizations operating strategy. Although most companies accept

More information

Transaction Security. Training Academy

Transaction Security. Training Academy Transaction Security Training Academy Your independent, trusted partner for transaction security technology Welcome to UL UL is a world leader in advancing safety with over a hundred years of history.

More information

The Scottish Wide Area Network Programme

The Scottish Wide Area Network Programme The Scottish Wide Area Network Release: Issued Version: 1.0 Date: 16/03/2015 Author: Andy Williamson Manager Owner: Anne Moises SRO Client: Board Version: Issued 1.0 Page 1 of 8 16/04/2015 Document Location

More information

SUMMARY PRINCIPLES, RECOMMENDATIONS & IMPLEMENTATION GUIDELINES

SUMMARY PRINCIPLES, RECOMMENDATIONS & IMPLEMENTATION GUIDELINES SUMMARY PRINCIPLES, RECOMMENDATIONS & IMPLEMENTATION GUIDELINES 1. This section sets out, in table form, the set of Principles, proposed Policy Recommendations and Guidelines that the Committee has derived

More information

Australasian Information Security Evaluation Program

Australasian Information Security Evaluation Program Australasian Information Security Evaluation Program Certification Report Certificate Number: 2008/50 16 Dec 2008 Version 1.0 Commonwealth of Australia 2008. Reproduction is authorised provided that the

More information

International Laboratory Accreditation Cooperation. Laboratory Accreditation or ISO 9001 Certification? global trust. Testing Calibration Inspection

International Laboratory Accreditation Cooperation. Laboratory Accreditation or ISO 9001 Certification? global trust. Testing Calibration Inspection International Laboratory Accreditation Cooperation Laboratory Accreditation or ISO 9001 Certification? Laboratory Accreditation or ISO 9001 Certification? When selecting a supplier to fulfill your testing,

More information

Helping our clients win in the changing world of work:

Helping our clients win in the changing world of work: Helping our clients win in the changing world of work: Recruitment Process: Why Outsource? A Manpower Insights Paper The future of RPO looks strong despite or perhaps aided by the current global recession.

More information

Meeting Summary. Trusted Trader Industry Advisory Group 1:00pm 4:00pm Thursday, 29 January 2015 Melbourne

Meeting Summary. Trusted Trader Industry Advisory Group 1:00pm 4:00pm Thursday, 29 January 2015 Melbourne Meeting Summary Trusted Trader Industry Advisory Group 1:00pm 4:00pm Thursday, 29 January 2015 Melbourne Purpose: The purpose of this document is to provide a summary of the Industry Advisory Group (IAG)

More information

Authentication Scenarios India. Ramachandran

Authentication Scenarios India. Ramachandran Authentication Scenarios India Ramachandran India 1.2 billion residents -640,000 villages -~800 million mobile, ~200-300 mn migrant workers Authentication Scenarios Government e-praman authentication framework

More information

Overview of GFSI and Accredited Certification

Overview of GFSI and Accredited Certification Overview of GFSI and Accredited Certification Overview of GFSI and Accredited Certification Introduction Global food trade is expanding and providing consumers with access to a wider variety of foods all

More information

TELSTRA RSS CA Subscriber Agreement (SA)

TELSTRA RSS CA Subscriber Agreement (SA) TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this

More information