e-invoicing Fundamental Concepts

Size: px
Start display at page:

Download "e-invoicing Fundamental Concepts"

Transcription

1 e-invoicing Fundamental Concepts and Introduction to e-signatures Beograd, 9. Oktobar, 2015 Belgrade, October 9th, 2015

2 e-invoicing, What is it?

3 Invoicing" or Billing e-invoicing, What is it? It is a concept, a term that traditionally describes the processes and the steps needed to complete a transaction between a byer and a seller, but in a formal or "official manner, ie. registered. That means that the transaction is documented, can be demonstrated, while in the same time provides real evident that both parties of the transaction are actually involved in that transaction (transfer of ownership of goods or provision of services). Usually the term Invoicing determines that the transaction took place between two professionals or businesses, ie. between two natural persons or legal entities, who perform some kind of "official, professional or commercial activity. As the "official" professional or commercial activity means that this activity has been (or has to be) reported / recorded to the appropriate governmental or financial services. The main (the official ) document of a transaction is the Invoice. Can you see the difference between the term e-invoicing and the term Invoice?

4 e-invoicing" or e-billing e-invoicing, What is it? Electronic invoicing ( e-invoicing ) is the immaterial, the paperless version of the Invoicing/Billing. This means that all (or most) of the processes and steps included in the traditional" paper-based Invoicing, now is made using electronic devices, i.e computers, smart mobile devices, etc. To that sense, we have to think about e-invoicing as an essential part of the e-commerce and e-business. The main (the official ) document of a transaction is the e-invoice What do you understand as e-invoice?

5 Why e-invoicing?

6 Why e-invoicing? SAVINGS : Less expenditures to businesses! Serbian Government Policy : Serbia to adopt e-invoicing in Public Sector by E-Invoicing will be mandatory for all businesses selling to public sector EU official Policy : e-invoicing should be the nominated way for invoicing by 2020.

7 Savings (just few examples) Why e-invoicing? According to estimates in France, a paper based Invoice costs around 13,8 while the electronic one, only 4! (French Chamber of Commerce) In the UK, the government could save more than 3 billion per year on the costs of invoicing by making the process automated and electronic. (Esa Tihilä CEO, Basware Corporation) Austrian government counts to save approximately 7 Million every year, and overall 15 Million savings are expected in the Austrian economy. All this by saving 70% on the cost of the single invoice compared to the paper format. (WKÖ - Austrian Chamber of Commerce) It is estimated that the average user has been able to reduce processing costs by 50-75%, with a return on investment (ROI) of over 60% p.a. (EU Multi-Stakeholder Forum on e-invoicing)

8 Legal Environment

9 Legal Environment EU legal framework relevant to e-invoicing VAT Directive 2010/45/EU: the e-invoicing processes are less dependent on mastering a specific technology. i.e. e-signs, EDI are not mandatory any more. VAT Directive 2014/55/EU on electronic invoicing in public procurement aims to harmonize and standardize public procurement systems among European member states. From year 2018 the use of electronic invoicing in Public Procurement will be mandatory. Regulation 910/2014 (eidas Regulation) on electronic identification and trust services for electronic transactions will enable secure and seamless electronic interactions between businesses, and public authorities at national and international level.

10 Legal Environment Serbian legal framework relevant to e-invoicing Law on Value-Added-Tax : the minimum content of an invoice (article 42), certification of record-bookkeeping system (article nr 38), etc. Law on Trade : defines dispatch notes (invoice also) they can be either in paper or electronic form (article 35) Law on conditions for trading goods, providing services in the goods circulation and on inspection surveillance : Articles 12, 16, 20, 35 are all potentially relevant to invoices Rulebook on records of the goods and services circulation : Content of dispatch notes, including invoices (article 6)

11 Legal Environment Some examples of legal requirements, for re-thinking The Serbian Law on VAT requires that a bill (an invoice) should be issued at least in two copies (article 42). This requirement could be quite obvious for paper based bills and invoices, however it should be reconsidered when it comes to e-bills and e-invoicing The Serbian Law on VAT states that the recordkeeping system (software application) being used by a taxpayer, should be certified by tax authorities (article 38). It should be reexamined in the future, in order to be compliant to the contemporary interconnected infrastructures and modern cloud based value added services to enterprises, such SaaS, AaaS The Law on Trade, defines the place in which the trader is obliged to keep his/her sales records (article 37). It should be appropriately adjusted in the future in order to be compliant with the modern cloud services for electronic storage and archiving

12 e-invoicing, how it works

13 Seller e-invoicing, how it works The issuer of the e-invoice is (generally) the Seller who is then responsible to send it to the Byer (or to make it available to him). Buyer This is the simplest way of e-invoicing. We will see more ways later

14 Main steps of a typical e-invoicing procedure e-invoicing, how it works e-order Placement e-invoice issuance e-order receiving and registration Electronic transmission of the e-invoice Electronic process of e-order Internal business preparation for dispatch Delivery of goods/services and (e)confirmation of delivery Electronic delivery of e-invoice, process verification, approval and (e)confirmation e-invoice storage and data archiving e-payment of e-invoice

15 e-invoicing, how it works a typical e-invoicing procedure, includes : e-invoice issuance Electronic transmission of the e-invoice Electronic delivery of e-invoice, which in turn, includes: o verification process, approval o e-confirmation and o e-invoice acceptance e-invoice storage and data archiving

16 e-invoicing: Business Models e-invoicing, how it works 1. Direct model, bilateral, peer-to-peer or 2-corner model Seller Byer 2. 3-corner model Seller E-Invoicing Service Provider Byer 3. 4-corner model Seller «Χ» E- Invoicing Service Provider «Υ» E- Invoicing Service Provider Byer

17 e-invoicing, how it works E-Invoicing related Services (via Service Providers) Articles code matching / mapping (standards) e-invoice issuance on behalf of sellers Authenticity and integrity services e-signatures, e-signs Time stamps Transmission of the e-invoice Storage and data archiving Reporting (to TAX authorities, Statistics, etc.) Financial services (factoring, dyn. discounts)

18 e-invoicing, how it works e-invoicing main stakeholders Seller Buyer Service Providers (SaaS) Forwarders (transporters, couriers, etc.) Governmental authorities TAX authorities Treasury / Procurement Statistics

19 Structured e-invoices

20 Structured e-invoices Structured e-invoices Structured e-invoices EDI, XML and standardization Coding and ISO standards

21 Structured e-invoices Structured Invoice: Creation of a structured invoice document consists of the compilation of the required data into an agreed e-invoice message in electronic form with a known structure, format and content. This means that contrary to the case with a paper document, where the receiver may well be unfamiliar with the format, with a structured invoice message the format is pre-defined and known to the parties involved. Structured: Unstructured : organized text, like database (tables, fields), identifiable information like bitmap image and sound files, MS Word and.pdf files Benefits No data re-entrance, no-keying, less mistakes Automation, fast process rapid accounting records update Reuse of data - interoperability Rapid Statistics Standardization of business processes Savings Transparency, no human (or less) intervention

22 EDI and XML EDI: Electronic Data Interchange XML: extended Markup Language Structured e-invoices EDI, is the computer-to-computer data exchange between two companies of standard business documents in electronic format. The exchange of documents takes place in a standardized format. It exists since early 1980s. Now EDI is a term that can refer to any standardized format, including the widely accepted XML format. It is a markup language created by internet bodies W3C in It defines a set of rules for encoding documents in a format which is both human-readable and machinereadable is a markup language much like HTML (used by all web browsers like IE, Firefox, etc.) was designed to store and transport data was designed to be self-descriptive

23 Structured e-invoices XML: how it looks like, a simplified example : <invoices search-terms= database+design > <invoice_header> <seller_name>toplicki VINOGRADI</seller_name> <invoice_number>ab </invoice_number> <Issue_Date> </Issue_Date> <Sellers_VAT_Nr> </Issue_Date> <total_ammount>13/03/2003</total_ammount> <currency>serbian Dinnar</currency> <currency_code>rsd</currency_code> </invoice_header> <invoice_items> <invoice_item> <item_id>123456</item_id> <item_name>epigenia</item_name> <item_descr>red Wine</item_descr> <item_unit_price> 1, </item_unit_price > <invoice_item>.. <invoice_items>. </invoices>

24 the most common standards which are using for standardization of details of an e-invoice Structured e-invoices Coding and ISO standards look-up tables Language Coding according to ISO Codes for the Representation of Names of Languages Currency Coding according to ISO 4217: 3-character Alphabetic Code for currency designators Business activity Coding according to (ΕC) 1893/ (CPA 2008) Country Coding according to ISO alpha-2-2 letters of Latin alphabet, or ISO alpha-3 3 letters code and ISO numeric-3 3 decimal digits Banking ids BIC - Bank Identifier Code - SWIFT - Society for Worldwide Interbank Financial Telecommunication ΙΒΑΝ - International Bank Account Number according to ISO 13616:1997 CPV CPV: Common Procurement Vocabulary (last version 2007 ( Regulation EC 2195/2002 (as it has been amended by Regulation EC 596/2009) Customs Tariff code - TARIC (for cross-border invoices) TARIC (6 ή 8-digit code) according to Regulation EC 2658/87 Quantity measurement unit According to units based on SI - Système International d'unités, SI National ZIP (Post) Code Coding according to. Standard: a document that sets out requirements for a specific item, material, component, system or service, or describes in detail a particular method or procedure

25 Introduction to e-signatures

26 Intro to e-signatures Intro to e-signatures Encryption (Cryptography) Short Intro e-signatures and PKI Certification and qualified e-signatures

27 Intro to e-signatures Basic Concepts and Terms Encryption (Cryptography) is the transformation of data (text, messages, information, etc) into a not comprehensible encrypted form. The text or other information can be changed to such a form that it would be meaningless and/or impossible to be read by somebody who does not have the corresponding unencryption (decipherment) algorithm and "key" or code Aim of Cryptography The aim of encryption is to secure the privacy of information by maintaining the secrecy of sensitive data from those that have no authorization to see or use them even if they have right to access to them. Basic Methods Two basic types (methods) of encryption based on encryption algorithms and keys: Methods of Symmetric Encryption (with one, secret key) and Methods of Asymmetric Encryption (with a public and a private - secret key). also known as Public Key Algorithms e-signatures are based on Cryptography

28 Intro to e-signatures Sending an e-invoice via encryption Brief Description sender recipient A simplified process of encryption for the transmission of an e-invoice (XML text - message) could be briefly described as follows: a) the sender creates the initial e-invoice (XML text) and b) using a specific encryption algorithm as well as using a "private encryption key", encrypts the e-invoice text and sends it to the recipient c) the recipient in his turn, uses the un-encryption algorithm and key and unencrypts the message.

29 Intro to e-signatures More Basic Concepts and Terms Public & Private Keys You can think them as a pair of codes (like passwords). One code is the secret (private) key and the second is a code that is publicly available (to be used by anyone) Digital Envelop The. Session key (or "Symmetric Session Key") This is the code that is being used for the real e-invoice text encryption (symmetric: means that this is the same for both sender and recipient. The "symmetric session key" certainly needs also to be encrypted and this is done using the asymmetric public key of the recipient Hash Functions Hash Functions are mathematical unidirectional (one-way), i.e. it is impossible to recover the original text (or message) from the string created after hashing by applying any type of mathematical calculations to the string. (example: SHA-1 Secure Hash Algorithm 1 from NIST) Hash value or synopsis This is the Digital Finger Print of a specific text (i.e. e-invoice. Any change in the original text will result in an absolutely different synopsis (hash value). It is impossible to recover the original text (i.e. e-invoice) from the string created after hashing by applying any type of mathematical calculations to the string.

30 Intro to e-signatures and more Basic Concepts and Terms e-signature or Digital Signature (i.e. of an e-invoice in XML text) This is the encrypted hash value. This, consists of letters and numbers, it is of a specific size (has a fixed length) and it characterizes in an absolute and non-disputable way the e-invoice message (the text / data of e-invoice) from which it results Advanced Digital Signature is nothing else but the coded encrypted hash value of a message (e-invoice) using the private key of the sender advanced electronic signature is the electronic signature that fulfills the following requirements: 1. It is related one-to-one with the signer - uniquely linked to him 2. It is capable of uniquely identifying the signer 3. It is created by means that signer can maintain under his sole & exclusive control 4. It is related to the data to which it refers in a way that allows the detection of a later alteration of the given data Qualified e-signatures They are Advanced Electronic Signatures that are issued on the basis of a Qualified Certificate [see next]

31 Intro to e-signatures and even more Basic Concepts and Terms Digital Certificates They are actually in a digital form (electronic files). A digital Certificate provides : Determination of Identity: it relates or "links" a public key to an individual, an organization, a company, a specific company position, or some other specific entity. Determination of Authorizations: it determines or delimits the actions or the possible activities the holder of a specific certificate can and cannot perform. Guarantee of Confidential Information, e.g. of the encryption of the symmetric session key for the confidentiality of the related data. Typically, a Qualified certificate would contain the following information: a public key a name a Date of Start and/or a Date of Expiration the name of the authority that issued the certificate a Serial Number that uniquely identifies the certificate Standard: Most of the certificates used today have adapted the X.509 standard model any relative policies describing how the certificate was published and/or how it can be used, the digital signature of the certificate provider and perhaps other information

32 and even more Basic Concepts and Terms Intro to e-signatures Public Key Infrastructure (PKI) This is a network of entities (i.e. public or private companies) having the appropriate infrastructure for public & private keys creation. They are certified by competent authorities and they are all linked together and in an opposite tree structure. The root authority is in the top of certification process. In Serbia the competent top authority is MTTT. Other Certification providers are Post Service (Pošta Srbije - ) and MoI (Police). Certification Service Provider (CSP) and the role of CSPs They are 3 rd trusted parties (=Certified entities, businesses, organizations). They provide their infrastructure to authenticate, register and then to create and assign private and public keys to anyone who is interesting in or obliged to use e-signatures (physical persons or legal entities). They authenticate them and they also maintain lists with registered persons. Finally they provide publicly the public keys (and the corresponding Certificates) of the registered persons or entities.

33 Intro to e-signatures Sender s Private Key Asymmetric Encryption Algorithm Digital Signature Original Sender s e- Invoice Hash Algorithm - Hash Function (SHA-1) Digital Envelop Session Key (Symmetric) Symmetric Encryption Algorithm Encrypted Sender s Message For Transmission Recipient s Public Key Asymmetric Encryption Algorithm Encrypted Session Key e-signatures homework : Try to describe the schema above Promise: I will send back the description to all those who will send me an with any possible answer

34 Summary

35 Summary What is e-invoicing Why is being used (benefits, savings) Reference to Legal Environment (Serbian and EU) How e-invoicing works Service Providers & other key stakeholders Structured e-invoices and reference to structured formats like XML and other ISO standards Short Introduction to e-signatures (complexity?)

36 Хвала на пажњи и стрпљењу! Panos Zafeiropoulos Project Key-Expert 2 EU - funded Project 'E-Business Development Resavska 21, Belgrade Tel: p.zafeiropoulos@eposlovanje.biz

Code of Practice on Electronic Invoicing in the EU

Code of Practice on Electronic Invoicing in the EU CEN/WS einvoicing Phase 3 Date: 2011-11 CEN Workshop AgreementTC WI Secretariat: NEN Code of Practice on Electronic Invoicing in the EU Status: for public review (23 November 2011-23 January 2012) ICS:

More information

Understanding Digital Signature And Public Key Infrastructure

Understanding Digital Signature And Public Key Infrastructure Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where

More information

February 2015. Are You Ready for E-invoicing?

February 2015. Are You Ready for E-invoicing? February 2015 Are You Ready for E-invoicing? CONTENT Introduction... 3 1. SME Pain Points...4 2. E-invoicing Market... 5 2.1 European e-invoicing market...5 2.2 U.S. e-invoicing market... 6 3. E-invoicing

More information

OB10 - Digital Signing and Verification

OB10 - Digital Signing and Verification Global Headquarters 90 Fetter Lane London EC4A 1EN Tel: +44 (0) 870 165 7410 Fax: +44 (0) 207 240 2696 OB10 - Digital Signing and Verification www.ob10.com Version 2.4 March 2013 Summary In order to comply

More information

Framework of e-commerce

Framework of e-commerce Framework of e-commerce Alka Arora Lecturer, Department of CSE/IT, Amritsar College of Engg.& Tech,Amritsar.143 001, Punjab, India, E-mail :alka_411 @rediffmail.com. Abstract This paper provides a detailed

More information

Concept of Electronic Approvals

Concept of Electronic Approvals E-Lock Technologies Contact info@elock.com Table of Contents 1 INTRODUCTION 3 2 WHAT ARE ELECTRONIC APPROVALS? 3 3 HOW DO INDIVIDUALS IDENTIFY THEMSELVES IN THE ELECTRONIC WORLD? 3 4 WHAT IS THE TECHNOLOGY

More information

Business Issues in the implementation of Digital signatures

Business Issues in the implementation of Digital signatures Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

The Business Value of e-invoicing

The Business Value of e-invoicing STERLING COMMERCE WHITE PAPER The Business Value of e-invoicing A new look at the challenges, trends and opportunities in the global marketplace Table of Contents 3 Executive summary 4 Situation overview

More information

Ericsson Group Certificate Value Statement - 2013

Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...

More information

SSLPost Electronic Document Signing

SSLPost Electronic Document Signing SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that

More information

This Information Sheet explains the changes to VAT invoicing from 1 January 2004.

This Information Sheet explains the changes to VAT invoicing from 1 January 2004. VAT Information Sheet 16/03 November 2003 VAT Invoicing Changes This Information Sheet explains the changes to VAT invoicing from 1 January 2004. Contents 1. Introduction 2. Summary of changes 3. VAT Invoice

More information

Digital Signatures in the Legal Market:

Digital Signatures in the Legal Market: The Digital Signature Company Digital Signatures in the Legal Market: How to Select the Right Solution for Your Firm or Legal Department Introduction A shift is taking place in the relationship between

More information

10 Tips for Selecting the Best Digital Signature Solution

10 Tips for Selecting the Best Digital Signature Solution 10 Tips for Selecting the Best Digital Signature Solution Avoid the Pitfalls when transitioning from paper-based to electronic signatures Sept 2007 1 Introduction As the traditional paper-based world gives

More information

Chapter 10. e-payments

Chapter 10. e-payments Chapter 10 e-payments AIS 360Prentice Hall, 2003 1 Learning Objectives Understand the crucial factors determining the success of e-payment methods Describe the key elements in securing an e-payment Discuss

More information

W H I T E P A P E R O N C F D I

W H I T E P A P E R O N C F D I WHITE PAPER ON CFDI I N D E X 1. What is the CFDI? 2. How does it work? 3. Who has to issue CFDIs? 4. What are the benefits of CFDI? 5. What is the difference between CFD and CFDI? 6. Steps to follow to

More information

esign Online Digital Signature Service

esign Online Digital Signature Service esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities

More information

A mixed e-invoice format (PDF + a set of few datas): the best compromise between suppliers and buyers for a fast adoption of e-invoicing

A mixed e-invoice format (PDF + a set of few datas): the best compromise between suppliers and buyers for a fast adoption of e-invoicing the best compromise between suppliers and buyers for a fast adoption of e-invoicing Build some intermediate floors and stairs in the e-invoicing House in order to create a path to the roof and enjoy the

More information

An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Mar.2010

An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Mar.2010 An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Mar.2010 Understanding the information security Technology of Encryption and Electronic signature

More information

Guidelines for the use of electronic signature

Guidelines for the use of electronic signature Republic of Albania National Authority for Electronic Certification Guidelines for the use of electronic signature Guide Nr. 001 September 2011 Version 1.3 Guidelines for the use of electronic signature

More information

Electronic and Digital Signatures

Electronic and Digital Signatures Summary The advent of e-government and e-services has changed the way state agencies and local government offices do business. As a result, electronic systems and processes have become as important as

More information

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1 PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority

More information

documents Supplier handbook - Introduction to Digital Signature - Rome, January 2012

documents Supplier handbook - Introduction to Digital Signature - Rome, January 2012 Digital signature on received/sent documents Supplier handbook - Introduction to Digital Signature - Rome, January 2012 Digital signature - overview Digital signature is defined as an attestation system

More information

Securing your Online Data Transfer with SSL

Securing your Online Data Transfer with SSL Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does

More information

Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile

Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile Study on Mutual Recognition of esignatures: update of Country Profiles Icelandic country profile This report / paper was prepared for the IDABC programme by: Coordinated by: Hans Graux (time.lex), Brigitte

More information

CoSign Digital Signatures and Alfresco at ERT. VP, EMEA Sales CoSign by ARX

CoSign Digital Signatures and Alfresco at ERT. VP, EMEA Sales CoSign by ARX CoSign Digital Signatures and Alfresco at ERT Raanan Dahari VP, EMEA Sales CoSign by ARX Aingaran Pillai CEO Zaizi Agenda Introduction to Digital Signatures and CoSign ERT Case study CoSign benefits Q&A

More information

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.

More information

POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE FDA 21 CFR 11 ALPHATRUST PRONTO ENTERPRISE PLATFORM

POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE FDA 21 CFR 11 ALPHATRUST PRONTO ENTERPRISE PLATFORM W H I T E P A P E R POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE FDA 21 CFR 11 ALPHATRUST PRONTO ENTERPRISE PLATFORM This white paper is written for senior executives

More information

Code of Practice on Electronic Invoicing in Europe

Code of Practice on Electronic Invoicing in Europe Code of Practice on Electronic Invoicing in Europe 24 th March 2009 Version 0.17 Approved by Expert Group Plenary on 24 th March 2009 This Code of Practice on Electronic Invoicing in Europe is recommended

More information

Code of Practice on Electronic Invoicing in Europe

Code of Practice on Electronic Invoicing in Europe Code of Practice on Electronic Invoicing in Europe 24 th March 2009 Version 0.17 Approved by Expert Group Plenary on 24 th March 2009 This Code of Practice on Electronic Invoicing in Europe is recommended

More information

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure Expert Reference Series of White Papers Fundamentals of the PKI Infrastructure 1-800-COURSES www.globalknowledge.com Fundamentals of the PKI Infrastructure Boris Gigovic, Global Knowledge Instructor, CEI,

More information

Controller of Certification Authorities of Mauritius

Controller of Certification Authorities of Mauritius Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)

More information

Best prac*ces in Cer*fying and Signing PDFs

Best prac*ces in Cer*fying and Signing PDFs over 10 years of securing identities, web sites & transactions Best prac*ces in Cer*fying and Signing PDFs Paul van Brouwershaven Business Development Director EMEA, GlobalSign @vanbroup on TwiEer INTERNATIONAL

More information

A GUIDE FOR CREATING Tax-COMPLIANT ELECTRONIC INVOICES. How Ariba Invoice and the Ariba Supplier Network can facilitate e-invoicing

A GUIDE FOR CREATING Tax-COMPLIANT ELECTRONIC INVOICES. How Ariba Invoice and the Ariba Supplier Network can facilitate e-invoicing A GUIDE FOR CREATING Tax-COMPLIANT ELECTRONIC INVOICES How Ariba Invoice and the Ariba Supplier Network can facilitate e-invoicing COMPLIANT ELECTRONIC INVOICES 1 INTRODUCTION...4 1.1 Legislative Overview

More information

Long-term archiving of electronically signed documents in Hungary

Long-term archiving of electronically signed documents in Hungary Long-term archiving of electronically signed documents in Hungary Dr. István Zsolt BERTA, PhD, MBA, CISA Microsec Ltd. HUNGARY istvan.berta@microsec.hu www.e-szigno.hu http://www.e-szigno.hu Microsec Ltd.

More information

e-invoicing PwC November 2010 João Rodrigues Frade, Global e-invoicing and e-archiving Network November 2010 PricewaterhouseCoopers

e-invoicing PwC November 2010 João Rodrigues Frade, Global e-invoicing and e-archiving Network November 2010 PricewaterhouseCoopers e-invoicing João Rodrigues Frade, Global e-invoicing and e-archiving Network PwC Short Biography Portuguese national, living in Belgium, working with - Advisory Master in Information Systems and Technology

More information

Electronic And Digital Signatures

Electronic And Digital Signatures Electronic And Digital Signatures Summary The advent of e-government and e-services is changing the way we do business. Traditionally, we created records on paper and we authenticated a record by signing

More information

Understanding digital certificates

Understanding digital certificates Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH mickobrien137@hotmail.co.uk, george.weir@cis.strath.ac.uk

More information

e-invoicing for Law Firms

e-invoicing for Law Firms Blue Car Technologies Limited e-invoicing for Law Firms Cloud-based invoice automation Blue Car Technologies Ltd Soane Point 6-8 Market Place Reading Berkshire RG1 4EG E:info@bluecartechnologies.co.uk

More information

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module

More information

A MODEL FOR E-ORDERING AND E-INVOICING

A MODEL FOR E-ORDERING AND E-INVOICING A MODEL FOR E-ORDERING AND E-INVOICING Kiril Kiroski Institute of Informatics, Faculty of Natural Sciences and Mathematics Skopje, Macedonia Marjan Gusev Institute of Informatics, Faculty of Natural Sciences

More information

ipayment Gateway API (IPG API)

ipayment Gateway API (IPG API) ipayment Gateway API (IPG API) Accepting e-commerce payments for merchants Version 3.2 Intercard Finance AD 2007 2015 Table of Contents Version control... 4 Introduction... 5 Security and availability...

More information

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 141 PURPOSE (CT-IM-112; 07-30-2010) (Office of Origin: IRM/OPS/ITI/SI/IIB) The purpose of this FAM chapter is to enable the Department to

More information

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1 Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

E-payment. Service description

E-payment. Service description E-payment Service description Page 2 (15) Content 1 E-payment... 3 1.1 General description... 3 1.2 Advantages... 3 1.3 Availability... 3 1.4 Security... 3 2 Service agreement, instructions and start-up...

More information

International Compliance

International Compliance YOUR FREE COPY - NEW - Additional countries outside European Union LEGAL WHITE PAPER International Compliance Legal requirements international einvoicing European Union & Selected Countries Worldwide International

More information

E-commerce Shopping Carts Digital Cert. Merchants

E-commerce Shopping Carts Digital Cert. Merchants E-commerce Shopping Carts Digital Cert. Merchants What is E-commerce? In its simplest form ecommerce is the buying and selling of products and services by businesses and consumers over the Internet. People

More information

CoSign for 21CFR Part 11 Compliance

CoSign for 21CFR Part 11 Compliance CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed

More information

Legalesign Service Definition Electronic signature and contract management service

Legalesign Service Definition Electronic signature and contract management service Legalesign Service Definition Electronic signature and contract management service Legalesign Limited UN House, 4 Hunter Square, Edinburgh, EH1 1QW Tel: 0131 463 9099 Email: email@legalesign.com Overview

More information

Certification Practice Statement

Certification Practice Statement Certification Practice Statement Revision R1 2013-01-09 1 Copyright Printed: January 9, 2013 This work is the intellectual property of Salzburger Banken Software. Reproduction and distribution require

More information

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Understanding Digital Certificates and Secure Sockets Layer (SSL) Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?

More information

E-Invoicing / E-Billing. International Market Overview & Forecast. Bruno Koch February 2011

E-Invoicing / E-Billing. International Market Overview & Forecast. Bruno Koch February 2011 E-Invoicing / E-Billing International Market Overview & Forecast Bruno Koch February 2011 Global overview page 2 International E-Invoicing Market 2011 B2B, B2G, G2B and B2C Leaders Average Developing Laggards

More information

The role of E-Invoicing standards in France. Conference EXPP SUMMIT September 25 th

The role of E-Invoicing standards in France. Conference EXPP SUMMIT September 25 th The role of E-Invoicing standards in France Conference EXPP SUMMIT September 25 th GS1, an original approach since 1977 Standardization organization Cooperation place Neutral and non-profit making Equally

More information

E-invoices. What they are. Different types. Best practices for implementation. R E A D S O F T W H I T E P A P E R

E-invoices. What they are. Different types. Best practices for implementation. R E A D S O F T W H I T E P A P E R R E A D S O F T W H I T E P A P E R E-invoices What they are. Different types. Best practices for implementation. This whitepaper describes different types of e-invoices, discusses what the differences

More information

SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS

SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS MULTIPLE-CHOICE QUESTIONS Each question has only one correct answer, which ought to be clearly pointed out with an 'X'. Each question incorrectly answered will be evaluated as minus one third of the mark

More information

Applying best practices for secure, automated electronic invoicing

Applying best practices for secure, automated electronic invoicing White Paper Applying best practices for secure, automated electronic invoicing Using Intelligent to support compliant einvoicing solutions Table of contents 1 The importance of einvoicing 1 The European

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,

More information

Tieto Business Information exchange Portal

Tieto Business Information exchange Portal Tieto Business Information exchange Portal E-invoicing Issuer Web Application Guide 2.0 page 1/28 Table of Contents 1 Introduction... 3 2 Invoice Issuer web application registration... 3 3 Tieto E-invoicing

More information

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms

Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,

More information

CoSign by ARX for PIV Cards

CoSign by ARX for PIV Cards The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response

More information

CRS Report for Congress Received through the CRS Web

CRS Report for Congress Received through the CRS Web Order Code RS20344 Updated January 19, 2001 CRS Report for Congress Received through the CRS Web Summary Electronic Signatures: Technology Developments and Legislative Issues Richard M. Nunno Analyst in

More information

The IdenTrust Rule Set: Providing Secure Identities While Protecting Privacy

The IdenTrust Rule Set: Providing Secure Identities While Protecting Privacy The IdenTrust Rule Set: Providing Secure Identities While Protecting Privacy IdenTrust accepted in 172 countries Bank-Issued Identities All You Need is One. Enabling an eco-friendly digital world. White

More information

State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008

State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions

More information

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999 Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks

More information

Wakefield Council Secure email and file transfer User guide for customers, partners and agencies

Wakefield Council Secure email and file transfer User guide for customers, partners and agencies Wakefield Council Secure email and file transfer User guide for customers, partners and agencies The nature of the work the council carries out means that we often deal with information that is sensitive

More information

AlphaTrust PRONTO Enterprise Platform Product Overview

AlphaTrust PRONTO Enterprise Platform Product Overview AlphaTrust PRONTO Enterprise Platform Product Overview AlphaTrust PRONTO Enterprise Platform is server-based software that automates the creation of legally enforceable, permanent business records that

More information

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a

More information

AppRiver Secure E-Signature

AppRiver Secure E-Signature The AppRiver secure e-signature feature is the first truly secure way to easily and quickly sign and exchange digitally approved documents without relying on complex deployments. Electronic-signature functionality

More information

CERTIFICATION PRACTICE STATEMENT UPDATE

CERTIFICATION PRACTICE STATEMENT UPDATE CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.

More information

UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures

UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures Introduction to the law of electronic signatures Luca Castellani Head, Regional Centre for Asia and the Pacific UNCITRAL Secretariat Incheon, Republic of Korea Outline 1. Methods and technologies for electronic

More information

Mobile Driver s License Solution

Mobile Driver s License Solution Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity

More information

Savitribai Phule Pune University

Savitribai Phule Pune University Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter

More information

Authentication & Digital Signatures in E- Law and Security. A Guide for Legislators and Managers

Authentication & Digital Signatures in E- Law and Security. A Guide for Legislators and Managers Authentication & Digital Signatures in E- Law and Security A Guide for Legislators and Managers December 2004 This document was prepared for the Procurement Harmonization Project of The Asian Development

More information

S.2.2 CHARACTER SETS AND SERVICE STRING ADVICE: THE UNA SEGMENT

S.2.2 CHARACTER SETS AND SERVICE STRING ADVICE: THE UNA SEGMENT S.2 STRUCTURE OF AN EDIFACT TRANSMISSION This section is substantially based on the ISO 9735 document: EDIFACT application level syntax rules, first released on 1988-07-15, amended and reprinted on 1990-11-01,

More information

Nearly all countries award

Nearly all countries award #1. Reverse Tax Burden-of-Proof E-Signatures Guaranteed certainty through legally recognized security technology Nearly all countries award exceptional evidence status to high-quality electronic signatures.

More information

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173 Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

A Noval Approach for S/MIME

A Noval Approach for S/MIME Volume 1, Issue 7, December 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Noval Approach for S/MIME K.Suganya

More information

A simple tscheme guide to securing electronic transactions

A simple tscheme guide to securing electronic transactions A simple tscheme guide to securing electronic transactions 1 A simple tscheme guide to securing electronic transactions Electronic Transactions An electronic transaction is best thought of as a type of

More information

This Working Paper provides an introduction to the web services security standards.

This Working Paper provides an introduction to the web services security standards. International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand

More information

When Data Loss Prevention Is Not Enough:

When Data Loss Prevention Is Not Enough: Email Encryption When Data Loss Prevention Is Not Enough: Secure Business Communications with Email Encryption Technical Brief WatchGuard Technologies, Inc. Need for Email Encryption Is at Its Peak Based

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

Key & Data Storage on Mobile Devices

Key & Data Storage on Mobile Devices Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography

More information

Key Management and Distribution

Key Management and Distribution Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/

More information

Unit- IV. SYLLABUS: Electronic Data Interchange, EDI Applications in Business, EDI implementation, MIME, and value added networks.

Unit- IV. SYLLABUS: Electronic Data Interchange, EDI Applications in Business, EDI implementation, MIME, and value added networks. Unit- IV SYLLABUS: Electronic Data Interchange, EDI Applications in Business, EDI implementation, MIME, and value added networks. Electronic Data Interchange Electronic Data Interchange (EDI) - interposes

More information

VAT: Changes to VAT invoice rules. Summary of Responses 17 December 2012

VAT: Changes to VAT invoice rules. Summary of Responses 17 December 2012 VAT: Changes to VAT invoice rules Summary of Responses 17 December 2012 Contents 1 Introduction 3 2 2.1 2.2 2.3 2.4 2.5 2.6 Responses to the technical note on changes to the VAT invoicing rules Simplifying

More information

Secured Signing for Documents

Secured Signing for Documents Signing Documents in the Cloud Moving Local Government Forward ALGIM 2011 Annual Conference Mike Eyal TME Consulting Ltd, MD Current Signing Process Agenda Why Sign Documents Online? DS Solutions for Local

More information

Account Management System Guide

Account Management System Guide Account Management System Guide Version 2.2 March 2015 Table of Contents Introduction...5 What is the Account Management System?...5 Accessing the Account Management System...5 Forgotten Password...5 Account

More information

TTP.NL Scheme. for management system certification. of Trust Service Providers issuing. Qualified Certificates for Electronic Signatures,

TTP.NL Scheme. for management system certification. of Trust Service Providers issuing. Qualified Certificates for Electronic Signatures, TTP.NL Scheme for management system certification of Trust Service Providers issuing Qualified Certificates for Electronic Signatures, Public Key Certificates, Website Certificates and / or Time-stamp

More information

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing E-Commerce Web Sites E-commerce Revision Companies create Web sites for very different reasons: simple proof-of concept sites Intranets (internal information) information-only sites for customers business-to-business

More information

Automation for Electronic Forms, Documents and Business Records (NA)

Automation for Electronic Forms, Documents and Business Records (NA) Automation for Electronic Forms, Documents and Business Records (NA) White Paper Learn more. www.alphatrust.com Automation for Electronic Forms, Documents and Business Records (NA) White Paper About AlphaTrust

More information

Network Security Protocols

Network Security Protocols Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination

More information

What is a digital certificate, why do I need one, and how do I get it?

What is a digital certificate, why do I need one, and how do I get it? PKI FAQ s What is a digital signature and how do you get one? You can t buy a digital signature. It s not like a handwritten one. A digital signature is different every time it is made, and is related

More information