e-invoicing Fundamental Concepts
|
|
- Willis Smith
- 7 years ago
- Views:
Transcription
1 e-invoicing Fundamental Concepts and Introduction to e-signatures Beograd, 9. Oktobar, 2015 Belgrade, October 9th, 2015
2 e-invoicing, What is it?
3 Invoicing" or Billing e-invoicing, What is it? It is a concept, a term that traditionally describes the processes and the steps needed to complete a transaction between a byer and a seller, but in a formal or "official manner, ie. registered. That means that the transaction is documented, can be demonstrated, while in the same time provides real evident that both parties of the transaction are actually involved in that transaction (transfer of ownership of goods or provision of services). Usually the term Invoicing determines that the transaction took place between two professionals or businesses, ie. between two natural persons or legal entities, who perform some kind of "official, professional or commercial activity. As the "official" professional or commercial activity means that this activity has been (or has to be) reported / recorded to the appropriate governmental or financial services. The main (the official ) document of a transaction is the Invoice. Can you see the difference between the term e-invoicing and the term Invoice?
4 e-invoicing" or e-billing e-invoicing, What is it? Electronic invoicing ( e-invoicing ) is the immaterial, the paperless version of the Invoicing/Billing. This means that all (or most) of the processes and steps included in the traditional" paper-based Invoicing, now is made using electronic devices, i.e computers, smart mobile devices, etc. To that sense, we have to think about e-invoicing as an essential part of the e-commerce and e-business. The main (the official ) document of a transaction is the e-invoice What do you understand as e-invoice?
5 Why e-invoicing?
6 Why e-invoicing? SAVINGS : Less expenditures to businesses! Serbian Government Policy : Serbia to adopt e-invoicing in Public Sector by E-Invoicing will be mandatory for all businesses selling to public sector EU official Policy : e-invoicing should be the nominated way for invoicing by 2020.
7 Savings (just few examples) Why e-invoicing? According to estimates in France, a paper based Invoice costs around 13,8 while the electronic one, only 4! (French Chamber of Commerce) In the UK, the government could save more than 3 billion per year on the costs of invoicing by making the process automated and electronic. (Esa Tihilä CEO, Basware Corporation) Austrian government counts to save approximately 7 Million every year, and overall 15 Million savings are expected in the Austrian economy. All this by saving 70% on the cost of the single invoice compared to the paper format. (WKÖ - Austrian Chamber of Commerce) It is estimated that the average user has been able to reduce processing costs by 50-75%, with a return on investment (ROI) of over 60% p.a. (EU Multi-Stakeholder Forum on e-invoicing)
8 Legal Environment
9 Legal Environment EU legal framework relevant to e-invoicing VAT Directive 2010/45/EU: the e-invoicing processes are less dependent on mastering a specific technology. i.e. e-signs, EDI are not mandatory any more. VAT Directive 2014/55/EU on electronic invoicing in public procurement aims to harmonize and standardize public procurement systems among European member states. From year 2018 the use of electronic invoicing in Public Procurement will be mandatory. Regulation 910/2014 (eidas Regulation) on electronic identification and trust services for electronic transactions will enable secure and seamless electronic interactions between businesses, and public authorities at national and international level.
10 Legal Environment Serbian legal framework relevant to e-invoicing Law on Value-Added-Tax : the minimum content of an invoice (article 42), certification of record-bookkeeping system (article nr 38), etc. Law on Trade : defines dispatch notes (invoice also) they can be either in paper or electronic form (article 35) Law on conditions for trading goods, providing services in the goods circulation and on inspection surveillance : Articles 12, 16, 20, 35 are all potentially relevant to invoices Rulebook on records of the goods and services circulation : Content of dispatch notes, including invoices (article 6)
11 Legal Environment Some examples of legal requirements, for re-thinking The Serbian Law on VAT requires that a bill (an invoice) should be issued at least in two copies (article 42). This requirement could be quite obvious for paper based bills and invoices, however it should be reconsidered when it comes to e-bills and e-invoicing The Serbian Law on VAT states that the recordkeeping system (software application) being used by a taxpayer, should be certified by tax authorities (article 38). It should be reexamined in the future, in order to be compliant to the contemporary interconnected infrastructures and modern cloud based value added services to enterprises, such SaaS, AaaS The Law on Trade, defines the place in which the trader is obliged to keep his/her sales records (article 37). It should be appropriately adjusted in the future in order to be compliant with the modern cloud services for electronic storage and archiving
12 e-invoicing, how it works
13 Seller e-invoicing, how it works The issuer of the e-invoice is (generally) the Seller who is then responsible to send it to the Byer (or to make it available to him). Buyer This is the simplest way of e-invoicing. We will see more ways later
14 Main steps of a typical e-invoicing procedure e-invoicing, how it works e-order Placement e-invoice issuance e-order receiving and registration Electronic transmission of the e-invoice Electronic process of e-order Internal business preparation for dispatch Delivery of goods/services and (e)confirmation of delivery Electronic delivery of e-invoice, process verification, approval and (e)confirmation e-invoice storage and data archiving e-payment of e-invoice
15 e-invoicing, how it works a typical e-invoicing procedure, includes : e-invoice issuance Electronic transmission of the e-invoice Electronic delivery of e-invoice, which in turn, includes: o verification process, approval o e-confirmation and o e-invoice acceptance e-invoice storage and data archiving
16 e-invoicing: Business Models e-invoicing, how it works 1. Direct model, bilateral, peer-to-peer or 2-corner model Seller Byer 2. 3-corner model Seller E-Invoicing Service Provider Byer 3. 4-corner model Seller «Χ» E- Invoicing Service Provider «Υ» E- Invoicing Service Provider Byer
17 e-invoicing, how it works E-Invoicing related Services (via Service Providers) Articles code matching / mapping (standards) e-invoice issuance on behalf of sellers Authenticity and integrity services e-signatures, e-signs Time stamps Transmission of the e-invoice Storage and data archiving Reporting (to TAX authorities, Statistics, etc.) Financial services (factoring, dyn. discounts)
18 e-invoicing, how it works e-invoicing main stakeholders Seller Buyer Service Providers (SaaS) Forwarders (transporters, couriers, etc.) Governmental authorities TAX authorities Treasury / Procurement Statistics
19 Structured e-invoices
20 Structured e-invoices Structured e-invoices Structured e-invoices EDI, XML and standardization Coding and ISO standards
21 Structured e-invoices Structured Invoice: Creation of a structured invoice document consists of the compilation of the required data into an agreed e-invoice message in electronic form with a known structure, format and content. This means that contrary to the case with a paper document, where the receiver may well be unfamiliar with the format, with a structured invoice message the format is pre-defined and known to the parties involved. Structured: Unstructured : organized text, like database (tables, fields), identifiable information like bitmap image and sound files, MS Word and.pdf files Benefits No data re-entrance, no-keying, less mistakes Automation, fast process rapid accounting records update Reuse of data - interoperability Rapid Statistics Standardization of business processes Savings Transparency, no human (or less) intervention
22 EDI and XML EDI: Electronic Data Interchange XML: extended Markup Language Structured e-invoices EDI, is the computer-to-computer data exchange between two companies of standard business documents in electronic format. The exchange of documents takes place in a standardized format. It exists since early 1980s. Now EDI is a term that can refer to any standardized format, including the widely accepted XML format. It is a markup language created by internet bodies W3C in It defines a set of rules for encoding documents in a format which is both human-readable and machinereadable is a markup language much like HTML (used by all web browsers like IE, Firefox, etc.) was designed to store and transport data was designed to be self-descriptive
23 Structured e-invoices XML: how it looks like, a simplified example : <invoices search-terms= database+design > <invoice_header> <seller_name>toplicki VINOGRADI</seller_name> <invoice_number>ab </invoice_number> <Issue_Date> </Issue_Date> <Sellers_VAT_Nr> </Issue_Date> <total_ammount>13/03/2003</total_ammount> <currency>serbian Dinnar</currency> <currency_code>rsd</currency_code> </invoice_header> <invoice_items> <invoice_item> <item_id>123456</item_id> <item_name>epigenia</item_name> <item_descr>red Wine</item_descr> <item_unit_price> 1, </item_unit_price > <invoice_item>.. <invoice_items>. </invoices>
24 the most common standards which are using for standardization of details of an e-invoice Structured e-invoices Coding and ISO standards look-up tables Language Coding according to ISO Codes for the Representation of Names of Languages Currency Coding according to ISO 4217: 3-character Alphabetic Code for currency designators Business activity Coding according to (ΕC) 1893/ (CPA 2008) Country Coding according to ISO alpha-2-2 letters of Latin alphabet, or ISO alpha-3 3 letters code and ISO numeric-3 3 decimal digits Banking ids BIC - Bank Identifier Code - SWIFT - Society for Worldwide Interbank Financial Telecommunication ΙΒΑΝ - International Bank Account Number according to ISO 13616:1997 CPV CPV: Common Procurement Vocabulary (last version 2007 ( Regulation EC 2195/2002 (as it has been amended by Regulation EC 596/2009) Customs Tariff code - TARIC (for cross-border invoices) TARIC (6 ή 8-digit code) according to Regulation EC 2658/87 Quantity measurement unit According to units based on SI - Système International d'unités, SI National ZIP (Post) Code Coding according to. Standard: a document that sets out requirements for a specific item, material, component, system or service, or describes in detail a particular method or procedure
25 Introduction to e-signatures
26 Intro to e-signatures Intro to e-signatures Encryption (Cryptography) Short Intro e-signatures and PKI Certification and qualified e-signatures
27 Intro to e-signatures Basic Concepts and Terms Encryption (Cryptography) is the transformation of data (text, messages, information, etc) into a not comprehensible encrypted form. The text or other information can be changed to such a form that it would be meaningless and/or impossible to be read by somebody who does not have the corresponding unencryption (decipherment) algorithm and "key" or code Aim of Cryptography The aim of encryption is to secure the privacy of information by maintaining the secrecy of sensitive data from those that have no authorization to see or use them even if they have right to access to them. Basic Methods Two basic types (methods) of encryption based on encryption algorithms and keys: Methods of Symmetric Encryption (with one, secret key) and Methods of Asymmetric Encryption (with a public and a private - secret key). also known as Public Key Algorithms e-signatures are based on Cryptography
28 Intro to e-signatures Sending an e-invoice via encryption Brief Description sender recipient A simplified process of encryption for the transmission of an e-invoice (XML text - message) could be briefly described as follows: a) the sender creates the initial e-invoice (XML text) and b) using a specific encryption algorithm as well as using a "private encryption key", encrypts the e-invoice text and sends it to the recipient c) the recipient in his turn, uses the un-encryption algorithm and key and unencrypts the message.
29 Intro to e-signatures More Basic Concepts and Terms Public & Private Keys You can think them as a pair of codes (like passwords). One code is the secret (private) key and the second is a code that is publicly available (to be used by anyone) Digital Envelop The. Session key (or "Symmetric Session Key") This is the code that is being used for the real e-invoice text encryption (symmetric: means that this is the same for both sender and recipient. The "symmetric session key" certainly needs also to be encrypted and this is done using the asymmetric public key of the recipient Hash Functions Hash Functions are mathematical unidirectional (one-way), i.e. it is impossible to recover the original text (or message) from the string created after hashing by applying any type of mathematical calculations to the string. (example: SHA-1 Secure Hash Algorithm 1 from NIST) Hash value or synopsis This is the Digital Finger Print of a specific text (i.e. e-invoice. Any change in the original text will result in an absolutely different synopsis (hash value). It is impossible to recover the original text (i.e. e-invoice) from the string created after hashing by applying any type of mathematical calculations to the string.
30 Intro to e-signatures and more Basic Concepts and Terms e-signature or Digital Signature (i.e. of an e-invoice in XML text) This is the encrypted hash value. This, consists of letters and numbers, it is of a specific size (has a fixed length) and it characterizes in an absolute and non-disputable way the e-invoice message (the text / data of e-invoice) from which it results Advanced Digital Signature is nothing else but the coded encrypted hash value of a message (e-invoice) using the private key of the sender advanced electronic signature is the electronic signature that fulfills the following requirements: 1. It is related one-to-one with the signer - uniquely linked to him 2. It is capable of uniquely identifying the signer 3. It is created by means that signer can maintain under his sole & exclusive control 4. It is related to the data to which it refers in a way that allows the detection of a later alteration of the given data Qualified e-signatures They are Advanced Electronic Signatures that are issued on the basis of a Qualified Certificate [see next]
31 Intro to e-signatures and even more Basic Concepts and Terms Digital Certificates They are actually in a digital form (electronic files). A digital Certificate provides : Determination of Identity: it relates or "links" a public key to an individual, an organization, a company, a specific company position, or some other specific entity. Determination of Authorizations: it determines or delimits the actions or the possible activities the holder of a specific certificate can and cannot perform. Guarantee of Confidential Information, e.g. of the encryption of the symmetric session key for the confidentiality of the related data. Typically, a Qualified certificate would contain the following information: a public key a name a Date of Start and/or a Date of Expiration the name of the authority that issued the certificate a Serial Number that uniquely identifies the certificate Standard: Most of the certificates used today have adapted the X.509 standard model any relative policies describing how the certificate was published and/or how it can be used, the digital signature of the certificate provider and perhaps other information
32 and even more Basic Concepts and Terms Intro to e-signatures Public Key Infrastructure (PKI) This is a network of entities (i.e. public or private companies) having the appropriate infrastructure for public & private keys creation. They are certified by competent authorities and they are all linked together and in an opposite tree structure. The root authority is in the top of certification process. In Serbia the competent top authority is MTTT. Other Certification providers are Post Service (Pošta Srbije - ) and MoI (Police). Certification Service Provider (CSP) and the role of CSPs They are 3 rd trusted parties (=Certified entities, businesses, organizations). They provide their infrastructure to authenticate, register and then to create and assign private and public keys to anyone who is interesting in or obliged to use e-signatures (physical persons or legal entities). They authenticate them and they also maintain lists with registered persons. Finally they provide publicly the public keys (and the corresponding Certificates) of the registered persons or entities.
33 Intro to e-signatures Sender s Private Key Asymmetric Encryption Algorithm Digital Signature Original Sender s e- Invoice Hash Algorithm - Hash Function (SHA-1) Digital Envelop Session Key (Symmetric) Symmetric Encryption Algorithm Encrypted Sender s Message For Transmission Recipient s Public Key Asymmetric Encryption Algorithm Encrypted Session Key e-signatures homework : Try to describe the schema above Promise: I will send back the description to all those who will send me an with any possible answer
34 Summary
35 Summary What is e-invoicing Why is being used (benefits, savings) Reference to Legal Environment (Serbian and EU) How e-invoicing works Service Providers & other key stakeholders Structured e-invoices and reference to structured formats like XML and other ISO standards Short Introduction to e-signatures (complexity?)
36 Хвала на пажњи и стрпљењу! Panos Zafeiropoulos Project Key-Expert 2 EU - funded Project 'E-Business Development Resavska 21, Belgrade Tel: p.zafeiropoulos@eposlovanje.biz
Code of Practice on Electronic Invoicing in the EU
CEN/WS einvoicing Phase 3 Date: 2011-11 CEN Workshop AgreementTC WI Secretariat: NEN Code of Practice on Electronic Invoicing in the EU Status: for public review (23 November 2011-23 January 2012) ICS:
More informationUnderstanding Digital Signature And Public Key Infrastructure
Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where
More informationFebruary 2015. Are You Ready for E-invoicing?
February 2015 Are You Ready for E-invoicing? CONTENT Introduction... 3 1. SME Pain Points...4 2. E-invoicing Market... 5 2.1 European e-invoicing market...5 2.2 U.S. e-invoicing market... 6 3. E-invoicing
More informationOB10 - Digital Signing and Verification
Global Headquarters 90 Fetter Lane London EC4A 1EN Tel: +44 (0) 870 165 7410 Fax: +44 (0) 207 240 2696 OB10 - Digital Signing and Verification www.ob10.com Version 2.4 March 2013 Summary In order to comply
More informationFramework of e-commerce
Framework of e-commerce Alka Arora Lecturer, Department of CSE/IT, Amritsar College of Engg.& Tech,Amritsar.143 001, Punjab, India, E-mail :alka_411 @rediffmail.com. Abstract This paper provides a detailed
More informationConcept of Electronic Approvals
E-Lock Technologies Contact info@elock.com Table of Contents 1 INTRODUCTION 3 2 WHAT ARE ELECTRONIC APPROVALS? 3 3 HOW DO INDIVIDUALS IDENTIFY THEMSELVES IN THE ELECTRONIC WORLD? 3 4 WHAT IS THE TECHNOLOGY
More informationBusiness Issues in the implementation of Digital signatures
Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous
More informationDigital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
More informationEntrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
More informationThe Business Value of e-invoicing
STERLING COMMERCE WHITE PAPER The Business Value of e-invoicing A new look at the challenges, trends and opportunities in the global marketplace Table of Contents 3 Executive summary 4 Situation overview
More informationEricsson Group Certificate Value Statement - 2013
COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...
More informationSSLPost Electronic Document Signing
SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that
More informationThis Information Sheet explains the changes to VAT invoicing from 1 January 2004.
VAT Information Sheet 16/03 November 2003 VAT Invoicing Changes This Information Sheet explains the changes to VAT invoicing from 1 January 2004. Contents 1. Introduction 2. Summary of changes 3. VAT Invoice
More informationDigital Signatures in the Legal Market:
The Digital Signature Company Digital Signatures in the Legal Market: How to Select the Right Solution for Your Firm or Legal Department Introduction A shift is taking place in the relationship between
More information10 Tips for Selecting the Best Digital Signature Solution
10 Tips for Selecting the Best Digital Signature Solution Avoid the Pitfalls when transitioning from paper-based to electronic signatures Sept 2007 1 Introduction As the traditional paper-based world gives
More informationChapter 10. e-payments
Chapter 10 e-payments AIS 360Prentice Hall, 2003 1 Learning Objectives Understand the crucial factors determining the success of e-payment methods Describe the key elements in securing an e-payment Discuss
More informationW H I T E P A P E R O N C F D I
WHITE PAPER ON CFDI I N D E X 1. What is the CFDI? 2. How does it work? 3. Who has to issue CFDIs? 4. What are the benefits of CFDI? 5. What is the difference between CFD and CFDI? 6. Steps to follow to
More informationesign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
More informationA mixed e-invoice format (PDF + a set of few datas): the best compromise between suppliers and buyers for a fast adoption of e-invoicing
the best compromise between suppliers and buyers for a fast adoption of e-invoicing Build some intermediate floors and stairs in the e-invoicing House in order to create a path to the roof and enjoy the
More informationAn introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Mar.2010
An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Mar.2010 Understanding the information security Technology of Encryption and Electronic signature
More informationGuidelines for the use of electronic signature
Republic of Albania National Authority for Electronic Certification Guidelines for the use of electronic signature Guide Nr. 001 September 2011 Version 1.3 Guidelines for the use of electronic signature
More informationElectronic and Digital Signatures
Summary The advent of e-government and e-services has changed the way state agencies and local government offices do business. As a result, electronic systems and processes have become as important as
More informationBrocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1
PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority
More informationdocuments Supplier handbook - Introduction to Digital Signature - Rome, January 2012
Digital signature on received/sent documents Supplier handbook - Introduction to Digital Signature - Rome, January 2012 Digital signature - overview Digital signature is defined as an attestation system
More informationSecuring your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
More informationStudy on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile
Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile This report / paper was prepared for the IDABC programme by: Coordinated by: Hans Graux (time.lex), Brigitte
More informationCoSign Digital Signatures and Alfresco at ERT. VP, EMEA Sales CoSign by ARX
CoSign Digital Signatures and Alfresco at ERT Raanan Dahari VP, EMEA Sales CoSign by ARX Aingaran Pillai CEO Zaizi Agenda Introduction to Digital Signatures and CoSign ERT Case study CoSign benefits Q&A
More informationeidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
More informationConnected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
More informationSecuring your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
More informationPOLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE FDA 21 CFR 11 ALPHATRUST PRONTO ENTERPRISE PLATFORM
W H I T E P A P E R POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE FDA 21 CFR 11 ALPHATRUST PRONTO ENTERPRISE PLATFORM This white paper is written for senior executives
More informationCode of Practice on Electronic Invoicing in Europe
Code of Practice on Electronic Invoicing in Europe 24 th March 2009 Version 0.17 Approved by Expert Group Plenary on 24 th March 2009 This Code of Practice on Electronic Invoicing in Europe is recommended
More informationCode of Practice on Electronic Invoicing in Europe
Code of Practice on Electronic Invoicing in Europe 24 th March 2009 Version 0.17 Approved by Expert Group Plenary on 24 th March 2009 This Code of Practice on Electronic Invoicing in Europe is recommended
More informationExpert Reference Series of White Papers. Fundamentals of the PKI Infrastructure
Expert Reference Series of White Papers Fundamentals of the PKI Infrastructure 1-800-COURSES www.globalknowledge.com Fundamentals of the PKI Infrastructure Boris Gigovic, Global Knowledge Instructor, CEI,
More informationController of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
More informationBest prac*ces in Cer*fying and Signing PDFs
over 10 years of securing identities, web sites & transactions Best prac*ces in Cer*fying and Signing PDFs Paul van Brouwershaven Business Development Director EMEA, GlobalSign @vanbroup on TwiEer INTERNATIONAL
More informationA GUIDE FOR CREATING Tax-COMPLIANT ELECTRONIC INVOICES. How Ariba Invoice and the Ariba Supplier Network can facilitate e-invoicing
A GUIDE FOR CREATING Tax-COMPLIANT ELECTRONIC INVOICES How Ariba Invoice and the Ariba Supplier Network can facilitate e-invoicing COMPLIANT ELECTRONIC INVOICES 1 INTRODUCTION...4 1.1 Legislative Overview
More informationLong-term archiving of electronically signed documents in Hungary
Long-term archiving of electronically signed documents in Hungary Dr. István Zsolt BERTA, PhD, MBA, CISA Microsec Ltd. HUNGARY istvan.berta@microsec.hu www.e-szigno.hu http://www.e-szigno.hu Microsec Ltd.
More informatione-invoicing PwC November 2010 João Rodrigues Frade, Global e-invoicing and e-archiving Network November 2010 PricewaterhouseCoopers
e-invoicing João Rodrigues Frade, Global e-invoicing and e-archiving Network PwC Short Biography Portuguese national, living in Belgium, working with - Advisory Master in Information Systems and Technology
More informationElectronic And Digital Signatures
Electronic And Digital Signatures Summary The advent of e-government and e-services is changing the way we do business. Traditionally, we created records on paper and we authenticated a record by signing
More informationUnderstanding digital certificates
Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH mickobrien137@hotmail.co.uk, george.weir@cis.strath.ac.uk
More informatione-invoicing for Law Firms
Blue Car Technologies Limited e-invoicing for Law Firms Cloud-based invoice automation Blue Car Technologies Ltd Soane Point 6-8 Market Place Reading Berkshire RG1 4EG E:info@bluecartechnologies.co.uk
More informationELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
More informationA MODEL FOR E-ORDERING AND E-INVOICING
A MODEL FOR E-ORDERING AND E-INVOICING Kiril Kiroski Institute of Informatics, Faculty of Natural Sciences and Mathematics Skopje, Macedonia Marjan Gusev Institute of Informatics, Faculty of Natural Sciences
More informationipayment Gateway API (IPG API)
ipayment Gateway API (IPG API) Accepting e-commerce payments for merchants Version 3.2 Intercard Finance AD 2007 2015 Table of Contents Version control... 4 Introduction... 5 Security and availability...
More information5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES
5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 141 PURPOSE (CT-IM-112; 07-30-2010) (Office of Origin: IRM/OPS/ITI/SI/IIB) The purpose of this FAM chapter is to enable the Department to
More informationEncryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1
Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can
More informationNeutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
More informationOverview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
More informationE-payment. Service description
E-payment Service description Page 2 (15) Content 1 E-payment... 3 1.1 General description... 3 1.2 Advantages... 3 1.3 Availability... 3 1.4 Security... 3 2 Service agreement, instructions and start-up...
More informationInternational Compliance
YOUR FREE COPY - NEW - Additional countries outside European Union LEGAL WHITE PAPER International Compliance Legal requirements international einvoicing European Union & Selected Countries Worldwide International
More informationE-commerce Shopping Carts Digital Cert. Merchants
E-commerce Shopping Carts Digital Cert. Merchants What is E-commerce? In its simplest form ecommerce is the buying and selling of products and services by businesses and consumers over the Internet. People
More informationCoSign for 21CFR Part 11 Compliance
CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed
More informationLegalesign Service Definition Electronic signature and contract management service
Legalesign Service Definition Electronic signature and contract management service Legalesign Limited UN House, 4 Hunter Square, Edinburgh, EH1 1QW Tel: 0131 463 9099 Email: email@legalesign.com Overview
More informationCertification Practice Statement
Certification Practice Statement Revision R1 2013-01-09 1 Copyright Printed: January 9, 2013 This work is the intellectual property of Salzburger Banken Software. Reproduction and distribution require
More informationUnderstanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
More informationE-Invoicing / E-Billing. International Market Overview & Forecast. Bruno Koch February 2011
E-Invoicing / E-Billing International Market Overview & Forecast Bruno Koch February 2011 Global overview page 2 International E-Invoicing Market 2011 B2B, B2G, G2B and B2C Leaders Average Developing Laggards
More informationThe role of E-Invoicing standards in France. Conference EXPP SUMMIT September 25 th
The role of E-Invoicing standards in France Conference EXPP SUMMIT September 25 th GS1, an original approach since 1977 Standardization organization Cooperation place Neutral and non-profit making Equally
More informationE-invoices. What they are. Different types. Best practices for implementation. R E A D S O F T W H I T E P A P E R
R E A D S O F T W H I T E P A P E R E-invoices What they are. Different types. Best practices for implementation. This whitepaper describes different types of e-invoices, discusses what the differences
More informationSECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS
MULTIPLE-CHOICE QUESTIONS Each question has only one correct answer, which ought to be clearly pointed out with an 'X'. Each question incorrectly answered will be evaluated as minus one third of the mark
More informationApplying best practices for secure, automated electronic invoicing
White Paper Applying best practices for secure, automated electronic invoicing Using Intelligent to support compliant einvoicing solutions Table of contents 1 The importance of einvoicing 1 The European
More informationSecurity Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
More informationUnderstanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
More informationTieto Business Information exchange Portal
Tieto Business Information exchange Portal E-invoicing Issuer Web Application Guide 2.0 page 1/28 Table of Contents 1 Introduction... 3 2 Invoice Issuer web application registration... 3 3 Tieto E-invoicing
More informationEfficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
More informationCoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
More informationCRS Report for Congress Received through the CRS Web
Order Code RS20344 Updated January 19, 2001 CRS Report for Congress Received through the CRS Web Summary Electronic Signatures: Technology Developments and Legislative Issues Richard M. Nunno Analyst in
More informationThe IdenTrust Rule Set: Providing Secure Identities While Protecting Privacy
The IdenTrust Rule Set: Providing Secure Identities While Protecting Privacy IdenTrust accepted in 172 countries Bank-Issued Identities All You Need is One. Enabling an eco-friendly digital world. White
More informationState of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions
More informationReport to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
More informationWakefield Council Secure email and file transfer User guide for customers, partners and agencies
Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive
More informationAlphaTrust PRONTO Enterprise Platform Product Overview
AlphaTrust PRONTO Enterprise Platform Product Overview AlphaTrust PRONTO Enterprise Platform is server-based software that automates the creation of legally enforceable, permanent business records that
More informationThe DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
More informationAppRiver Secure E-Signature
The AppRiver secure e-signature feature is the first truly secure way to easily and quickly sign and exchange digitally approved documents without relying on complex deployments. Electronic-signature functionality
More informationCERTIFICATION PRACTICE STATEMENT UPDATE
CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.
More informationUNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures
Introduction to the law of electronic signatures Luca Castellani Head, Regional Centre for Asia and the Pacific UNCITRAL Secretariat Incheon, Republic of Korea Outline 1. Methods and technologies for electronic
More informationMobile Driver s License Solution
Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity
More informationSavitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
More informationAuthentication & Digital Signatures in E- Law and Security. A Guide for Legislators and Managers
Authentication & Digital Signatures in E- Law and Security A Guide for Legislators and Managers December 2004 This document was prepared for the Procurement Harmonization Project of The Asian Development
More informationS.2.2 CHARACTER SETS AND SERVICE STRING ADVICE: THE UNA SEGMENT
S.2 STRUCTURE OF AN EDIFACT TRANSMISSION This section is substantially based on the ISO 9735 document: EDIFACT application level syntax rules, first released on 1988-07-15, amended and reprinted on 1990-11-01,
More informationNearly all countries award
#1. Reverse Tax Burden-of-Proof E-Signatures Guaranteed certainty through legally recognized security technology Nearly all countries award exceptional evidence status to high-quality electronic signatures.
More informationSecurity & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
More informationComputer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
More informationUsing etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
More informationA Noval Approach for S/MIME
Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Noval Approach for S/MIME K.Suganya
More informationA simple tscheme guide to securing electronic transactions
A simple tscheme guide to securing electronic transactions 1 A simple tscheme guide to securing electronic transactions Electronic Transactions An electronic transaction is best thought of as a type of
More informationThis Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
More informationWhen Data Loss Prevention Is Not Enough:
Email Encryption When Data Loss Prevention Is Not Enough: Secure Business Communications with Email Encryption Technical Brief WatchGuard Technologies, Inc. Need for Email Encryption Is at Its Peak Based
More informationSecurity Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
More informationKey & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
More informationKey Management and Distribution
Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
More informationUnit- IV. SYLLABUS: Electronic Data Interchange, EDI Applications in Business, EDI implementation, MIME, and value added networks.
Unit- IV SYLLABUS: Electronic Data Interchange, EDI Applications in Business, EDI implementation, MIME, and value added networks. Electronic Data Interchange Electronic Data Interchange (EDI) - interposes
More informationVAT: Changes to VAT invoice rules. Summary of Responses 17 December 2012
VAT: Changes to VAT invoice rules Summary of Responses 17 December 2012 Contents 1 Introduction 3 2 2.1 2.2 2.3 2.4 2.5 2.6 Responses to the technical note on changes to the VAT invoicing rules Simplifying
More informationSecured Signing for Documents
Signing Documents in the Cloud Moving Local Government Forward ALGIM 2011 Annual Conference Mike Eyal TME Consulting Ltd, MD Current Signing Process Agenda Why Sign Documents Online? DS Solutions for Local
More informationAccount Management System Guide
Account Management System Guide Version 2.2 March 2015 Table of Contents Introduction...5 What is the Account Management System?...5 Accessing the Account Management System...5 Forgotten Password...5 Account
More informationTTP.NL Scheme. for management system certification. of Trust Service Providers issuing. Qualified Certificates for Electronic Signatures,
TTP.NL Scheme for management system certification of Trust Service Providers issuing Qualified Certificates for Electronic Signatures, Public Key Certificates, Website Certificates and / or Time-stamp
More informationE-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing
E-Commerce Web Sites E-commerce Revision Companies create Web sites for very different reasons: simple proof-of concept sites Intranets (internal information) information-only sites for customers business-to-business
More informationAutomation for Electronic Forms, Documents and Business Records (NA)
Automation for Electronic Forms, Documents and Business Records (NA) White Paper Learn more. www.alphatrust.com Automation for Electronic Forms, Documents and Business Records (NA) White Paper About AlphaTrust
More informationNetwork Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
More informationWhat is a digital certificate, why do I need one, and how do I get it?
PKI FAQ s What is a digital signature and how do you get one? You can t buy a digital signature. It s not like a handwritten one. A digital signature is different every time it is made, and is related
More information