Greek Presidency of the European Union

Size: px
Start display at page:

Download "Greek Presidency of the European Union"

Transcription

1 Greek Presidency of the European Union! Introduction PKI Services in the Public Sector of the EU Member States Page 0-1 of 0-10

2 Research Team Dr. Stefanos Gritzalis, Asst. Prof. of I&C Systems Security Dept. of Information and Communication Systems Engineering, University of the Aegean, Greece Scientific Director Dr. Sokratis Katsikas, Prof. of Informatics Dept. of Information and Communication Systems Engineering, University of the Aegean, Greece Technical Director Dr. Dimitris Gritzalis, Asst. Prof. of I&CT Security Dept. of Informatics, Athens University of Economics and Business Quality Manager Dr. Lilian Mitrou, Asst. Prof. of Law Dept. of Information and Communication Systems Engineering, University of the Aegean, Greece Senior Researcher Dr. Mihalis Avgoustianakis, Asst. Prof. Of Law Dept. of Law, University of Athens, Greece Senior Researcher Dr. Yannis Stamatiu, Asst. Prof. of Cryptography Dept. of Mathematics, University of the Aegean, Greece Senior Researcher Dr. Dimitris Lekkas, Adjunct Lecturer of Informatics Dept. of Products and Systems Design Engineering, University of the Aegean, Greece Senior Researcher Mr. Yannis Marias Dept. of Informatics and Telecommunications University of Athens, Greece Researcher PKI Services in the Public Sector of the EU Member States Page 0-2 of 0-10

3 Acknowledgements We would like to express our sincere appreciation to the Greek Presidency of the European Union for giving us the opportunity to carry out this project, which we trust will contribute to the development of a secure and reliable egovernment applications framework, throughout the Member States. We are grateful to Prof. P. Georgiadis, Secretary General of the Greek Ministry of Interior, Public Administration, and Decentralization for his confidence and continuous support. We would, also, like to thank Mr. E. Panagiotopoulos, CEO of Information Society S.A. for his keen and kind support. Many thanks to the members of the Working Group on e-government of the EU Member States for their contribution to our work, and in particular to Mr. N. Saridakis and the members of the Greek delegation on egovernment for their support during our work. We trust that the academic institutions and the research community in Greece will keep on contributing towards the development of secure technologies and solutions for the benefit of the citizens, the public and the private sector. Athens, April 2003 Asst. Prof. Stefanos Gritzalis Scientific Director of the Study PKI Services in the Public Sector of the EU Member States Page 0-3 of 0-10

4 Executive Summary The underlying strategic framework of eeurope-2005 is based on two groups of actions: " The first group is the provision of services, applications and content. " The second is the assurance of broadband and secure communications. Among the key actions to support security in the Public Sector of the EU Member States is the secure communication between public services and the establishment of trust between the public services, as well as between the government and the citizen. An important aspect towards this direction is the deployment of a Public Key Infrastructure (PKI). The public sector of the EU Member States should be aware of the capabilities and timely act and ensure the wide use of PKI services, such as electronic signatures and digital certificates, towards the provision of secure e- government services to citizens and the improvement of secure and interoperable electronic communications between public services. The general objective of this study is to identify the particular requirements of the Public Sector for the exploitation and the deployment of the Public Key Infrastructure services. In specific, the following objectives are to be met: " To review the use of electronic signatures for e-government services. " To identify the technologies and standards employed for the exploitation of certification services. " To discuss digital certificates management in the public sector. " To discuss legal issues referring to the use of e-signatures. " To provide a set of good-practices on the use of certification services in the public sector. The methodology followed towards the achievement of the abovementioned objectives is based on three key actions: " Review of current situation, in respect to the state-of-practice, the legal or regulatory issues and the international standardization work on e-signatures use. " Survey of the situation and the relevant experiences in EU and non-eu countries. " Preparation of a set of good practices for the exploitation and the deployment of PKI services in the public sector of the EU Member States. In the course of the review of the state-of-practice on Certification Services, the issue of Qualified Digital Certificates is discussed in detail. A qualified certificate is distinguished due to its special characteristics, such as the obligatory unique identification of the issuer and the subject, the explicit reference of its intended purpose, the embodiment of signature-verification-data corresponding to the subject, its predefined period of validity, the electronic signature of the issuing Certification Services Provider (CSP) and the embodiment of usage limitations and case-relevant extensions. A CSP issuing qualified certificates is required to demonstrate the appropriate reliability, provide appropriate directory and revocation services, effectively verify the physical entity s identity, employ properly qualified personnel, use trustworthy and physically secure systems, strongly protect its own signature creation data, keep records relevant to qualified certificates, publish policies, practices, terms, and conditions and maintain sufficient financial resources for its operation. Some additional requirements for the Public Sector are identified, such as the performance of risk analysis and assessment, the certification according to ISO 9000 standards, the PKI Services in the Public Sector of the EU Member States Page 0-4 of 0-10

5 protection of personal data, the insurance coverage and the long-term repositories for storing signature verification data. In respect of the Legal and Regulatory Issues concerning the CSP, the survey showed that all EU- Member States have implemented the EU Directive on electronic signatures, possibly incorporating preexisting regulation and setting it within a broader framework, such as legislation on Electronic Commerce. Secondary Regulations and/or Ordinances exist in several Member States, mostly introducing provisions on supervision as well as accreditation bodies and procedures. In general there are no distinctions or differentiations concerning the legal recognition and evidentiary value of advanced electronic signatures in public sector transactions. The review of the Standardization work in the field of PKI focuses on the European initiatives and bodies, such as the European Telecommunication Standards Institute (ETSI) which provides Europe's contribution to the world-wide standardization, the Information Society Standardization System (CEN/ISSS) and the European Electronic Signature Standardisation Initiative (ICTB/ EESSI). Many technical standards in the area exist also in the international arena. ISO and ITU provide worldwide de jure standards, IETF provides important widely accepted de facto Internet standards, W3C presents many recommendations for structuring web documents and RSA proposes specific Public Key Cryptography Standards. The existing and emerging standards, which are relevant to certification services, are categorized and presented in six major fields: Cryptography, Secure hardware, Digital certificates, Certification services including digital signatures, Key management, authorization, time-stamping and notary, General support such as ICT Security, Directory access, Database management, Repositories and Interoperability and Management including IS management, Quality control, Policy composition and Audit. The deployment of PKI in non-eu countries provides valuable input for the completeness of the survey. The current situation in Canada, USA, Australia, Japan and other countries is examined and some major findings are collected. In Canada, a Policy Management Authority exists that regulates the operation of the CSP, while external non-governmental subscribers are allowed. The Canadian key management procedures have several similarities to the ones proposed by the EU Directive. In USA a Federal PKI is already fully functional and the current development of the Federal Bridge CA assures interoperability between CSP. An important issue is the provision of various assurance levels for certificates. In Australia, a Government Public Key Authority plays the role of accreditation body. The practice of various grades of certificates for individuals and non-individuals is also followed here. In Japan, the GPKI, running on the top of Kasumigasaki governmental WAN, illustrates the structure of PKI, including a Bridge CA, the Ministries CA, and Private Sector s CA. The Survey in EU Member States is performed by means of a questionnaire, which was circulated to the Member States via CIRCA. All recipients responded and the results are included explicitly in the present deliverable, while the important issues are further processed and incorporated in the good practices proposed. The questions addressed to the Member States focus on the existing e-services, the legal status of certificates, the current way of certificates exploitation in the public sector, the requirements from CSP and the use of certificates for G2G and G2C transactions. Some indicative results deriving from the questionnaire responses are: In 14 Member States there is at least 1 CSP offering qualified certificates. In 13 Member States there is one authority responsible for the accreditation of CSP. In 9 Member States the accreditation and the supervision of CSP are performed by the same entity/authority. In 7 Member States certificates have been employed in G2G transactions and 6 have relative plans. In all Member States the Public Sector obtains services from multiple CSP. 10 Member States require Risk Analysis and Assessment of CSP Information Systems and 4 require additionally ISO 9000 certification. In 6 Member States PKI Services in the Public Sector of the EU Member States Page 0-5 of 0-10

6 there exists (or is planned) a central repository, which provides each and every civil servant with a certificate. In 10 Member States smart cards are used to keep signature-creation-data. In order to facilitate the extraction of conclusions from the survey and restrict the examined area, some working assumptions are made during the composition and the process of the questionnaires. It is assumed that G2G and G2C transactions are under investigation, while C2G transactions are excluded (G stands for Government and C for Citizen). The focus is set on specific security requirements, being authentication, non-repudiation, and integrity, however the proposed good practices are subject to additional requirements imposed by specific public sectors, such as military, public transportation and finance. It was also identified that all Member States already comply with EU Directive 99/93. The good practices proposed follow the outline of the Articles 3, 5, 6 and 8 of the EU Directive 99/93, since they address the technical and operational issues for the CSP. A summary is included hereinafter: Regarding the CSP operation and specifically the operator of the CSP, the government is generally considered as the owner of its Public Key Infrastructure. The operator may be either a governmental authority, or the operation may be outsourced to the private sector. The handling of the case when a CSP ceases operation differs in Member States, however this does not apply to purely governmental-operated CSP, since they never cease. In such a case, subject to prior interoperability established, the management of certificates will be transferred to another CSP or all issued certificates are revoked. The voluntary accreditation of CSP is generally desired for qualified certificates issuance, whereas some Member States demand compulsory accreditation. Accreditation is not a requirement for the issuance of unqualified certificates. The supervision of the operation of CSP is another aspect and it is desired that the roles of supervision and accreditation are diversified. The establishment of national supervisory bodies is already done in most Member States and the supervision, in most cases, is performed by Telecom Authorities. In respect of the requirements for digital certificates in the public sector, it is concluded that the certificates can be either identity-based, only, or role-based, however role-based certificates tend to have heavy administrative cost and therefore a personal identity certificate for every civil servant is preferable. Both qualified and unqualified are needed, each for specific user domain and the average certificate lifecycle should be between 1 and 3 years. Specifically for the public sector, it is required that the signature lifetime considerably exceeds the baseline period of 30 years. It is also suggested that different keys are used for different functions (e.g. signature, authentication and encryption). Since the key management procedures are directly related to the signature creation issues (and consequently the non-repudiation issue), it is required that key generation procedures must be performed under the full control of the enduser and that no key-recovery must be possible under any circumstances. Regarding the signature creation devices, the survey indicated a common agreement on the adoption of secure hardware tokens (e.g. smart cards). However, in order to fully exploit the secure capabilities offered by the hardware tokens, the complete conformance with international standards is recommended. The number of Certification Authorities operating for the public sector must not be limited. It is recommended that each country must ensure support for multiple CA and the desired scalability is achieved by means of web of trust architecture. The trust architecture should not be limited to specific schemes. In contrary, mixed schemes may exist, being a combination of per-sector local hierarchies, local RAs, Bridge CA and Cross-certified CA. PKI Services in the Public Sector of the EU Member States Page 0-6 of 0-10

7 Multiple Registration Authorities per region or user domain should exist. Civil servants should be given a security token by their home RA, according to a standard procedure. In the fortunate case where a central identity repository exists, then a national-wide RA is also preferable. Special provisions must be taken for the dissemination of critical information to the subscribers and the relying parties. The signature creation data (if not created by the subscriber herself) must be distributed by personal correspondence, while the signature verification data must be made publicly accessible through certificate repositories. Specific provisions are needed for the distribution of self-signed CA certificates, since their validity is not assured by a third party, but by the subject itself. The maintenance and dissemination of the Certification Trust Lists (CTL) should be performed on a per-sector basis. Another critical aspect is the prompt dissemination of Certificate Status Information (CSI) and the publishing of Certificate Policies and Certification Practice Statements. Many Member States addressed the need for the provision of value-added Certification Services, such as Time-stamping, Data confidentiality, Notary services, Audit services, Non-repudiation of receipt, and Long-lasting data repositories. Since the operational regulations for a CSP are depicted in its Certification Practice Statement (CPS), it is important that a CPS is complete and accurate. It is therefore recommended that a CPS must conform with IETF RFC-2527 and it should include, at least: CA and RA obligations, subscriber and relying party obligations, the addressing community, provided certificate classes, formats, and profiles, procedures description, CSP liabilities, value-added services description, interoperability issues and information dissemination procedures. Finally, according to Article 8 of the EU Directive 99/93, a CSP should comply with Data Protection Legislation. Special care must be taken for the dissemination of personal PKI information and for the lawful access to personal data available to CSP. As a good practice on that issue, it is recommended that data protection authorities should support public authorities to monitor the CSP privacy policies. The main result of our study is an appropriately balanced Good-Practice Guidance for the exploitation of Public Key Infrastructure by the Public Sector of the EU Member States. PKI Services in the Public Sector of the EU Member States Page 0-7 of 0-10

8 1. Introduction This report discusses legal and technical issues regarding PKI, with an eye towards deriving a good-practice guidance on how a secure and efficient infrastructure can be designed and built for supporting secure and efficient electronic communication within the public sector. The report is focused on: $ Recording the framework for the exploitation of e-signatures in the establishment of secure e-government services within each EU country. $ The identification of the technologies already employed, or planned to be employed, for the exploitation of electronic signatures in the public sector. $ The investigation of the legal issues involved in the use of e-signatures. $ The investigation of certificate management practices and procedures in the public sector. $ The identification and description of good practices, which take into account the current situation in EU countries and address good practices regarding the issues above. PKI Services in the Public Sector of the EU Member States Page 0-8 of 0-10

9 2. Scope and methodology Working hypotheses I. The results of this report are focused on the following types of public sector services: $ Government-to-government (G2G services). Examples of such services include authenticated communication of civil servants through e- mail, signing official documents sent from a civil servant in one ministry to a civil servant to another ministry, protecting the contents of such documents from alterations, etc. $ Government-to-citizen (G2C services). Examples of such services include correspondence between public administration and citizens, regarding issues such as VAT registration, etc. This report and the good practice suggestions it refers to are concerned with the design, implementation and operation of a PKI in all government sectors except Ministry of Defence, Ministry of Justice, Ministry of Public Order (or Interior), and Ministry of Foreign Affairs. As far as the addressed security requirements and electronic signatures capabilities are concerned, the report is limited in scope to the following: $ Authentication, i.e. the ability to present a unanimously acceptable piece of evidence of one s identity. $ Non-repudiation, i.e. impossibility of one denying having sent a message or having signed a document. $ Integrity, i.e. safeguarding the accuracy and completeness of information and processing methods. These security requirements are the most relevant for the support of electronic signatures in the daily G2G and G2C transactions. PKI Services in the Public Sector of the EU Member States Page 0-9 of 0-10

10 Followed methodology II. The steps of the adopted methodology are the following: $ A review on the current status-of-practice in each Member State, with regard to the development of PKI in the public sector. $ A review of standards, related to PKI, which have been proposed by international standardization bodies. $ A review of the legal and regulatory issues regarding the introduction and deployment of PKI, as they emerge in compliance with the EU Directive 99/93. $ Review of relevant case studies. $ Perform of a review on current state-of-practice on these issues. Regarding the last point above, a questionnaire was prepared and distributed, via CIRCA, to the 15 EU countries. This questionnaire is composed of 27 questions divided into the following categories: $ Identification of existing e-services in each country. $ Legal status of certificates within the country s legal framework. $ Extend of use of certificates in the public sector (targeted to G2G and G2C e-government services). $ Requirements expected by Certification Service Providers. $ Use of certificates for G2G and G2C transactions, i.e. what types of services exist that require signatures and how users signatures are created and stored. A first observation derived from the answers to the questionnaires was that all EU countries either already provide or have under deployment a number of basic public information services, as well as services requiring authentication of civil servants or even the citizens. The two services, which are common to most countries, are on-line VAT declaration and income tax return and payment. Other services include applications for various licenses and certificates, submission of data to statistical offices, registration of new companies, job search services, applications for health services, etc. PKI Services in the Public Sector of the EU Member States Page 0-10 of 0-10

Towards an ISO-9000 compliant Certification Service Provider

Towards an ISO-9000 compliant Certification Service Provider Towards an ISO-9000 compliant Certification Service Provider D. Lekkas, S. Gritzalis, S. Katsikas Abstract-- In this paper we present a complete reference framework for the operation of Certification Service

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On-Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On-Premise Software Comparing Cost of Ownership: Symantec Managed PKI Service vs. On-Premise Software Who should read this paper Deploying and managing a PKI solution can be a complex undertaking. This is particularly the

More information

ACGISS Time Stamping

ACGISS Time Stamping ACGISS Time Stamping INFORMATION DOCUMENT (PUBLIC DISCLOSURE STATEMENT PDS) This document contains the essential information relating to the ACGISS time stamping service in accordance with the directives

More information

TD 0131 STUDY GROUP 17. English only Original: English TELECOMMUNICATION STANDARDIZATION SECTOR. Question(s): 11, 10/17 Geneva, April 2013

TD 0131 STUDY GROUP 17. English only Original: English TELECOMMUNICATION STANDARDIZATION SECTOR. Question(s): 11, 10/17 Geneva, April 2013 INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 17 TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2013-2016 English only Original: English Question(s): 11, 10/17 Geneva, 17-26 April 2013 Source:

More information

E-Govenment in Turkey

E-Govenment in Turkey E-Govenment in Turkey E-Government in Turkey Turkey's satellite and cable TV operator named TURKSAT defines e- Government as transformation of state services from bureaucratic systems to electronic systems.

More information

ICT co-ordination and management in the public sector

ICT co-ordination and management in the public sector ICT co-ordination and management in the public sector Preconditions for information exchange (1) Arvo Ott What is interoperability? Interoperability - the ability of ICT systems to exchange data and to

More information

FOR THE PROVIDED BY BORICA AD QUALIFIED SERVICE FOR ISSUING QUALIFIED ELECTRONIC TIME STAMPS OF B-TRUST QUALIFIED TIME STAMP AUTHORITY

FOR THE PROVIDED BY BORICA AD QUALIFIED SERVICE FOR ISSUING QUALIFIED ELECTRONIC TIME STAMPS OF B-TRUST QUALIFIED TIME STAMP AUTHORITY Security Level C1 (For general use) Policy and practice statement FOR THE PROVIDED BY BORICA AD QUALIFIED SERVICE FOR ISSUING QUALIFIED ELECTRONIC TIME STAMPS OF B-TRUST QUALIFIED Version 1.2 July 1, 2017

More information

FRCS VMS PKI - PKI Disclosure Statements Version 1.0 FRCS VMS PKI. PKI Disclosure Statements. Effective Date: 27 Dec Version: 1.0.

FRCS VMS PKI - PKI Disclosure Statements Version 1.0 FRCS VMS PKI. PKI Disclosure Statements. Effective Date: 27 Dec Version: 1.0. FRCS VMS PKI PKI Disclosure Statements Effective Date: 27 Dec 2017 Version: 1.0 Page 1 of 8 Important Note About this Document The present document is the FRCS VMS PKI public PKI Disclosure statement (PDS).

More information

Working Party on Information Security and Privacy

Working Party on Information Security and Privacy Unclassified DSTI/ICCP/REG(2001)10/FINAL DSTI/ICCP/REG(2001)10/FINAL Unclassified Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 16-Sep-2002

More information

ENTRUST CERTIFICATE SERVICES

ENTRUST CERTIFICATE SERVICES ENTRUST CERTIFICATE SERVICES Certification Practice Statement Version: 2.14 March 7, 2016 2016 Entrust Limited. All rights reserved. Revision History Issue Date Changes in this Revision 1.0 May 26, 1999

More information

UBS increases efficiency and security using Qualified Electronic Signatures.

UBS increases efficiency and security using Qualified Electronic Signatures. UBS increases efficiency and security using Qualified Electronic Signatures. As one of the world s largest banks, UBS is transforming its services through digitization by offering clients remote electronic

More information

English version. EESSI Conformity Assessment Guidance - Part 8: Timestamping Authority services and processes

English version. EESSI Conformity Assessment Guidance - Part 8: Timestamping Authority services and processes CEN WORKSHOP CWA 14172-8 March 2004 AGREEMENT ICS 35.040; 35.240.60 English version EESSI Conformity Assessment Guidance - Part 8: Timestamping Authority services and processes This CEN Workshop Agreement

More information

ENTRUST CERTIFICATE SERVICES

ENTRUST CERTIFICATE SERVICES ENTRUST CERTIFICATE SERVICES Certification Practice Statement Version: 2.8 June 25, 2012 2012 Entrust Limited. All rights reserved. Revision History Issue Date Changes in this Revision 1.0 May 26, 1999

More information

Technical Aspects of e-government in Japan. November 7, 2001 NEC Shinichi Mineo

Technical Aspects of e-government in Japan. November 7, 2001 NEC Shinichi Mineo Technical Aspects of e-government in Japan November 7, 2001 NEC Shinichi Mineo Goal Idea e-government Concept in Japan To realize a highly intelligent e-government in the early 21 st Century Improvement

More information

Electronic Voting Systems: Security Implications of the Administrative Workflow *

Electronic Voting Systems: Security Implications of the Administrative Workflow * Electronic Voting Systems: Security Implications of the Administrative Workflow * Costas LAMBRINOUDAKIS 1, Spyros KOKOLAKIS 1, Maria KARYDA 2, Vasilis TSOUMAS 2, Dimitris GRITZALIS 2, Sokratis KATSIKAS

More information

Trusted KYC Data Sharing Standards Scope and Governance Oversight

Trusted KYC Data Sharing Standards Scope and Governance Oversight November 2017 Trusted KYC Data Sharing Standards Scope and Governance Oversight Handover Document Contents Preface... 3 Overview... 5 1 Sharing Capabilities and Interoperability... 7 1.1 Data Sharing Behaviour

More information

Viky MANAILA Managing director, Trans Sped

Viky MANAILA Managing director, Trans Sped Viky MANAILA Managing director, Trans Sped viky.manaila@transsped.ro Update of civil code in 2005, legal recognition of e- Signature, use of commercial register Type of services: - e-signature N/A - e-banking

More information

Homeland Security Presidential Directive (HSPD-12) Product and Service Components

Homeland Security Presidential Directive (HSPD-12) Product and Service Components Solicitation FCIS-JB-980001-B FSC Group 70 SIN 132-62 Homeland Security Presidential Directive (HSPD-12) Product and Service Components Personal Identity Verification (PIV) Systems Infrastructure Services

More information

Overcoming Barriers in the field of Authentication and Identification

Overcoming Barriers in the field of Authentication and Identification Overcoming Barriers in the field of Authentication and Identification Dr. Sjaak Nouwt TILT Tilburg Institute for Law, Technology, and Society Tilburg University, the Netherlands j.nouwt@uvt.nl Roadmap

More information

Mobile Identity. A Regulatory Overview

Mobile Identity. A Regulatory Overview Mobile Identity A Regulatory Overview 2 Mobile Identity Introduction This paper provides an overview of the regulatory background and key policy issues associated with digital and mobile identity services.

More information

OpenBank - banking platform for e-money management based on blockchain technology (version 0.2)

OpenBank - banking platform for e-money management based on blockchain technology (version 0.2) OpenBank - banking platform for e-money management based on blockchain technology (version 0.2) Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin Abstract Traditional banking technology has multiple

More information

Oversight of payment instruments. The Banque de France s approach CONFERENCE. E-payments in Europe

Oversight of payment instruments. The Banque de France s approach CONFERENCE. E-payments in Europe E-payments in Europe Oversight of payment instruments The Banque de France s approach Carlos MARTIN Head of Division Payment Systems Department Non-cash Means of Payment Oversight Division Banque de France

More information

The Universal Postal Union (The real THE Post Office) global Postal Trust Services

The Universal Postal Union (The real THE Post Office) global Postal Trust Services The Universal Postal Union (The real THE Post Office) global Postal Trust Services Universal Postal Union, Electronic Services Martin Roe roem@postoffice.co.uk Presentation Objective To provide an understanding

More information

Trust Services. e-government Strategy Policy Framework and Guidelines. Version 3.0 September Trust Services / Version 3.0 / September

Trust Services. e-government Strategy Policy Framework and Guidelines. Version 3.0 September Trust Services / Version 3.0 / September Trust Services e-government Strategy Policy Framework and Guidelines Version 3.0 September 2002 Trust Services / Version 3.0 / September 2002 1 Contents 1. Introduction 4 1.1 Ownership and Maintenance

More information

JASTGAR evote, LLC. Alex St-Gardien Jecrois & Tom Bronack JASTGAR Electronic Registration & Voting Systems

JASTGAR evote, LLC. Alex St-Gardien Jecrois & Tom Bronack JASTGAR Electronic Registration & Voting Systems JASTGAR-eVOTE, LLC providing governments and businesses with Biometric Registration Smart Cards (Citizen, Voter, or Employee) and a paperless Electronic Voting System that eliminates Fraud and Corruption

More information

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (eidas)

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (eidas) Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (eidas) Progress of the legislative process 25.9.2013 Gérard GALLER gerard.galler@ec.europa.eu

More information

Certified Regional Partner Program Overview

Certified Regional Partner Program Overview Certified Regional Partner Program Overview Introduction... 3 Why Choose GlobalSign?... 3 Leading Innovation... 3 Industry Longevity... 3 Operational Security... 3 Why Become a Certified Regional Partner?...

More information

In this Document: EMV Payment Tokenisation Payment Account Reference (PAR) FAQ EMV Payment Tokenisation Technical FAQ

In this Document: EMV Payment Tokenisation Payment Account Reference (PAR) FAQ EMV Payment Tokenisation Technical FAQ In this Document: EMV Payment Tokenisation General FAQ EMV Payment Tokenisation Payment Account Reference (PAR) FAQ EMV Payment Tokenisation Technical FAQ EMV Payment Tokenisation General FAQ 1. What is

More information

IX. INITIATIVES FOR E-COMMERCE CAPACITY-BUILDING OF SMEs IN UZBEKISTAN

IX. INITIATIVES FOR E-COMMERCE CAPACITY-BUILDING OF SMEs IN UZBEKISTAN IX. INITIATIVES FOR E-COMMERCE CAPACITY-BUILDING OF SMEs IN UZBEKISTAN BY MR KHURSHID MIRZAKHIDOV MIRSABIROVICH HEAD OF SECRETARIAT THE COMPLEX ON THE ISSUES OF ICT DEVELOPMENT CABINET OF MINISTERS UZBEKISTAN

More information

Developing customer-centric online services in Finnish administration

Developing customer-centric online services in Finnish administration Developing customer-centric online services in Finnish administration Insight into the Development Program Brussels 23th April 2007 Ministry of Finance, Finland mira.nivala@vm.fi Topics of the presentation

More information

Tokenization. revision 2 Oct, 6, Dr. Pavel Kravchenko Vladimir Dubinin Distributed Lab

Tokenization. revision 2 Oct, 6, Dr. Pavel Kravchenko Vladimir Dubinin Distributed Lab Tokenization revision 2 Oct, 6, 2017 Dr. Pavel Kravchenko Vladimir Dubinin Distributed Lab What is tokenization? A process of transformation of asset accounting and management to represent each asset by

More information

Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview

Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview 1 2 3 4 5 6 Federal Identity, Credential, and Access Management Trust Framework Solutions 7 8 Overview 9 10 11 12 13 14 15 16 17 18 19 Version 1.0.0 DRAFT: 11/11/13 Questions? Contact the FICAM TFS Program

More information

ENTRUST CERTIFICATE SERVICES

ENTRUST CERTIFICATE SERVICES ENTRUST CERTIFICATE SERVICES Certification Practice Statement for Extended Validation (EV) SSL Certificates Version: 1.02 August 1, 2007 2007 Entrust Limited. All rights reserved. Revision History Issue

More information

Statewide POLICY P700 Rev 2.0

Statewide POLICY P700 Rev 2.0 STATE of ARIZONA Government Information Technology Statewide POLICY P700 Rev 2.0 TITLE: Enterprise Architecture Effective Date: October 31, 2007 1. AUTHORITY The Government Information Technology (GITA)

More information

COVER SHEET. Copyright 2004 (The authors) Accessed from:

COVER SHEET. Copyright 2004 (The authors) Accessed from: COVER SHEET Low, Rouhshi and Christensen, Sharon (2004) Electronic signatures and PKI Frameworks in Australia. The Digital Evidence Journal, incorporating the e-signature Law Journal 1(2):pp. 56-59. Copyright

More information

Customer Due Diligence, Using New Technology for in the CDD Customer Due Diligence PurposesProcess

Customer Due Diligence, Using New Technology for in the CDD Customer Due Diligence PurposesProcess Annex to the Financial Services Businesses Handbook Customer Due Diligence, Using New Technology for in the CDD Customer Due Diligence PurposesProcess A.1 The Application of a Risk Based Approach to Technology

More information

Secure PKI-enabled e-government infrastructures implementation: the SYZEFXIS-PKI case

Secure PKI-enabled e-government infrastructures implementation: the SYZEFXIS-PKI case Digitally signed by Thawte Freemail Member DN: cn=thawte Freemail Member, email=dkef@cn. ntua.gr Reason: I am the author of this document Location: Athens, Greece Date: 2006.08.27 17:59:55 +03'00' 420

More information

Objectives. Importance. To set Central Bank s policy for the regulation of e-money and to contribute to its development

Objectives. Importance. To set Central Bank s policy for the regulation of e-money and to contribute to its development Objectives To set Central Bank s policy for the regulation of e-money and to contribute to its development Importance Accelerated growth of e-money demand in the Republic of Armenia Willingness of,,potential

More information

General principles of digital signature verification

General principles of digital signature verification General principles of digital signature verification 7th November 2002 Contents 1 Abstract 1 2 Terms and definitions 2 3 Introduction 2 4 Establishing the time of digital signature creation by means of

More information

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market

Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market ehealth Governance Initiative eid Workshop Brussels, 11-12th February 2013 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market Gábor

More information

Developing customer-centric online services in Finnish administration

Developing customer-centric online services in Finnish administration Developing customer-centric online services in Finnish administration Insight into the Development Program Oslo 20th March 2007 Ministry of Finance, Finland mira.nivala@vm.fi Topics of the presentation

More information

ANNEX: cross border electronic transactions. The old framework the e Signature Directive of 1999 was a big step. However, the European

ANNEX: cross border electronic transactions. The old framework the e Signature Directive of 1999 was a big step. However, the European ANNEX: EU future electronic identification, authentication and signature (eias) policy (Summary of a Workshop hosted by the European Commission, Sept 5 th 2012, Brussels, based on the presentations used

More information

e-government in Lebanon: an overview and the action plan

e-government in Lebanon: an overview and the action plan e-government in Lebanon: an overview and the action plan Expert Group Meeting on ICT Indicators Adoption and Data Collection Cairo 13-15 February 2007 Presented by Tania Zaroubi ICT Project Manager Office

More information

e-goverment Services Across Borders

e-goverment Services Across Borders Environment friendly IT solutions e-goverment Services Across Borders Stane Štefančič - Slovenian approach General manager GENIS d.o.o. SLOVENIA e-id Conference Hradec Kralove,, 07.04.2009 07.04.2009 e-id

More information

EU MONITORING REPORT. EMAS voluntary tool scheme (environmental performance) and e-certis online guide (public contracts)

EU MONITORING REPORT. EMAS voluntary tool scheme (environmental performance) and e-certis online guide (public contracts) EPTDA s 32 nd EU MONITORING REPORT March 2014 EMAS voluntary tool scheme (environmental performance) and e-certis online guide (public contracts) Table Of Contents I. Introduction 2 II. EMAS The Eco-Management

More information

Regulation for Scheme Owners requesting acceptance by ACCREDIA of new Conformity Assessment Schemes and their revisions

Regulation for Scheme Owners requesting acceptance by ACCREDIA of new Conformity Assessment Schemes and their revisions Title Reference Regulation for Scheme Owners requesting acceptance by ACCREDIA of new Conformity Assessment Schemes and their revisions RG-19 Revision 00 Date 10-10-2017 NOTE: The present document represents

More information

Legal Aspects of Identity Management

Legal Aspects of Identity Management Legal Aspects of Identity Management Luca Castellani Secretary, Working Group IV (Electronic Commerce) Traditional approach to identity management Need to identify physical persons to establish trust,

More information

C-Roads Platform Terms of Reference

C-Roads Platform Terms of Reference C-Roads Platform Terms of Reference Dissemination level: C-Roads Platform internal Author: AustriaTech Status: Final Index 1 Purpose... 3 2 Governance Structure... 4 3 C-Roads Steering... 6 3.1 Tasks and

More information

e-government of Korea Best Practices

e-government of Korea Best Practices e-government of Korea Best Practices e-government of Korea Best Practices Table of Contents 4 I. e-government Best Practices 12 II. e-government Best Practices 34 III. Development Directions of e-government

More information

ENTRUST CERTIFICATE SERVICES

ENTRUST CERTIFICATE SERVICES ENTRUST CERTIFICATE SERVICES Certification Practice Statement For Private Trust Certificates Version: 1.5 September 19, 2016 2016 Entrust Limited. All rights reserved. Revision History Issue Date Changes

More information

C-Roads Platform Terms of Reference

C-Roads Platform Terms of Reference C-Roads Platform Terms of Reference Dissemination level: C-Roads Platform internal Author: AustriaTech Status: Final C-Roads Platform Coordinator AustriaTech www.austriatech.at Index 1 Purpose... 3 2 Governance

More information

Aligning Records Management with ICT/ e-government and Freedom of Information in East Africa

Aligning Records Management with ICT/ e-government and Freedom of Information in East Africa Aligning Records Management with ICT/ e-government and Freedom of Information in East Africa James Lowry and Anne Thurston, International Records Management Trust Abstract This paper provides an overview

More information

BULGARIA E-government Strategy

BULGARIA E-government Strategy BULGARIA E-government Strategy TABLE OF CONTENTS 1. INTRODUCTION...3 2. REALITIES...3 3. VISION AND STRATEGIC OBJECTIVES...5 4. GOALS...7 5. GENERAL PRINCIPLES...8 6. ORGANISATION AND MANAGEMENT...9 ANNEX

More information

Standards and accreditation. Tools for policy makers and regulators

Standards and accreditation. Tools for policy makers and regulators Standards and accreditation Tools for policy makers and regulators Introduction Standards and accreditation are market-based tools that can be used by Government policy makers and regulators to deliver

More information

Quality Mark Reliable POS Systems

Quality Mark Reliable POS Systems Declaration of Intent Quality Mark Reliable POS Systems 1. Preamble Suppliers and Manufacturers of POS Systems (hereinafter called: Market Participants, also see Annex 1 for definitions) and the Dutch

More information

IDENTIFICATION SOLUTIONS

IDENTIFICATION SOLUTIONS IDENTIFICATION SOLUTIONS IDENTIFICATION SOLUTIONS 01 INKRIPT Security at heart. Inkript delivers bespoke solutions in the fields of security printing, smartcards and trusted identification. Established

More information

OF SOLUTIONS BY THE FRENCH NATIONAL CYBERSECURITY AGENCY (ANSSI)

OF SOLUTIONS BY THE FRENCH NATIONAL CYBERSECURITY AGENCY (ANSSI) QUALIFICATION OF SOLUTIONS BY THE FRENCH NATIONAL CYBERSECURITY AGENCY (ANSSI) Security Visas provide a competitive edge for the suppliers of security solutions and a guarantee of security for users. THE

More information

"Global Gate" a letter to the importing community from the Head of Israel's Customs Directorate

Global Gate a letter to the importing community from the Head of Israel's Customs Directorate The Israeli National Federation of International Freight Forwarders and Customs Clearing Agents 84 Hahashmonaim street Tel Aviv 6713203 Tel : 972-3-5631101 Fax: 972-3-5613125 1023948 "Global Gate" a letter

More information

Reactions to the e-invoicing report of the EU-Expert group

Reactions to the e-invoicing report of the EU-Expert group European Commission Expert Group on e-invoicing SPA2 4/69 BE-1049 Brussels Reactions to the e-invoicing report of the EU-Expert group General assessment 1. Do you agree with the report s assessment, conclusions

More information

e-goverment Services Across Borders

e-goverment Services Across Borders Environment friendly IT solutions e-goverment Services Across Borders Stane Štefančič - Slovenian approach General manager GENIS d.o.o. e-id Conference SLOVENIA Hradec Kralove,, 07.04.2009 07.04.2009 e-id

More information

ISO/IEC INTERNATIONAL STANDARD. Corporate governance of information technology. Gouvernance des technologies de l'information par l'entreprise

ISO/IEC INTERNATIONAL STANDARD. Corporate governance of information technology. Gouvernance des technologies de l'information par l'entreprise INTERNATIONAL STANDARD ISO/IEC 38500 First edition 2010-06-01 Corporate governance of information technology Gouvernance des technologies de l'information par l'entreprise Reference number ISO/IEC 38500:2008(E)

More information

Greece Country Report sp

Greece Country Report   sp Greece Country Report http://gis.ermis.gov.gr/sdportal/index.j sp Contents 1 Introduction... 3 2 Availability and quality of PSC services... 5 2.1 Provision of information on the types of administrative

More information

Trust in Business-to-Business Marketplaces

Trust in Business-to-Business Marketplaces 02 pp. 183-352.qxd 2/6/01 10:04 AM Page 281 Chapter 10 Trust in Business-to-Business Marketplaces Business-to-consumer (B2C) Net marketplaces pioneered the use of the Internet as a platform to conduct

More information

A proposed Security Model for E-government Based on Primary Key Infrastructure and Fingerprints

A proposed Security Model for E-government Based on Primary Key Infrastructure and Fingerprints A proposed Security Model for E-government Based on Primary Key Infrastructure and Fingerprints Jaafar.TH.Jaafar 1, Nermin Hamza 1, Bahaa Eldin M.Hassan 2, Hesham.A. Hefny 1. 1 Department of Computer and

More information

Supporting e-government Progress in the United Arab Emirates

Supporting e-government Progress in the United Arab Emirates IBIMA Publishing Journal of E-Government Studies and Best Practices http://www.ibimapublishing.com/journals/ JEGSBP/jegsbp.html Vol. 2010 (2010), Article ID 897910, 9 pages DOI: 10.5171/2010.897910 Supporting

More information

Compendium of Japan s Approach of e-government

Compendium of Japan s Approach of e-government Compendium of Japan s Approach of e-government Project description (Background) It was in November 2000 that the Basic Law to formulate an Advanced Telecommunications Network Society (ICT Basic Law) was

More information

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document EUROPEAN COMMISSION Brussels, 4.6.2012 SWD(2012) 136 final COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT Accompanying the document Proposal for a REGULATION OF THE EUROPEAN

More information

Lawrie Brown Grigori Goldman

Lawrie Brown Grigori Goldman Periodical Payments Using X.509 Restricted Proxy Certificates Lawrie Brown Grigori Goldman January 2010 University of New South Wales @ Australian Defence Force Academy Who Am I? senior lecturer at UNSW@ADFA

More information

Measuring Instruments Directive 2014/32/EU Assessment of Notified Bodies in Charge of Type Examination Presumption of Conformity based on EN 17065

Measuring Instruments Directive 2014/32/EU Assessment of Notified Bodies in Charge of Type Examination Presumption of Conformity based on EN 17065 WELMEC 8.5, 2017 Measuring Instruments Directive 2014/32/EU Assessment of Notified Bodies in Charge of Type Examination Presumption of Conformity based on EN 17065 For information: This guide is available

More information

EPAN egovernment working group

EPAN egovernment working group Page 1/9 EPAN egovernment working group 10 th of January 2005 PREPARATORY SURVEY Interoperability of egovernment systems The identification number, data sharing and data protection issues Country Ministry

More information

Requirements for the acceptance of quality systems by the Netherlands Food and Consumer Product Safety Authority (NVWA)

Requirements for the acceptance of quality systems by the Netherlands Food and Consumer Product Safety Authority (NVWA) Requirements for the acceptance of quality systems by the Netherlands Food and Consumer Product Safety Authority (NVWA) NVWA, adopted 4 June 2014 Introduction As the government must make sure there is

More information

Departmental Disclosure Statement

Departmental Disclosure Statement Departmental Disclosure Statement Electronic Interactions Reform Bill The departmental disclosure statement for a government Bill seeks to bring together in one place a range of information to support

More information

From Introvert IT Systems to Extrovert e-services: e-government as an enabler for e-citizens and e-business A Framework of Principles

From Introvert IT Systems to Extrovert e-services: e-government as an enabler for e-citizens and e-business A Framework of Principles From Introvert IT Systems to Extrovert e-services: e-government as an enabler for e-citizens and e-business A Framework of Principles paper initially presented in the Electronic Business and Electronic

More information

Trust in Governmental e-services

Trust in Governmental e-services Trust in Governmental e-services Ph. D. Hrvoje Stancic, assoc. prof. Faculty of Humanities and Social Sciences University of Zagreb, Croatia hrvoje.stancic@zg.t-com.hr Trust in the Cloud: New Research

More information

Quality System ACCREDITATION For the Clinical Laboratories

Quality System ACCREDITATION For the Clinical Laboratories Quality System ACCREDITATION For the Clinical Laboratories A NEW PERSPECTIVE BY: Accreditation Commission For Conformity Assessment Bodies (ACCAB) 1 Objective What are Standards? Voluntary & Mandatory

More information

Structural Assistance Act

Structural Assistance Act Issuer: Riigikogu Type: act In force from: 01.09.2015 In force until: 04.12.2015 Translation published: 10.08.2015 Amended by the following acts Passed 04.06.2014 RT I, 21.06.2014, 1 Entry into force 01.07.2014

More information

Uniform law of electronic commerce: fundamentals, recent developments and opportunities to support innovation

Uniform law of electronic commerce: fundamentals, recent developments and opportunities to support innovation Uniform law of electronic commerce: fundamentals, recent developments and opportunities to support innovation Luca Castellani Secretary, Working Group IV (Electronic Commerce) The mandate of The core legal

More information

Records Management Policy

Records Management Policy Records Management Policy Responsible Officer Chief Operating Officer Approved by Vice-Chancellor Approved and commenced November 2017 Review by November, 2020 Relevant Legislation, Ordinance, Rule and/or

More information

REPUBLIC OF SERBIA RES. 68/44 - NATIONAL LEGISLATION ON TRANSFER OF ARMS, MILITARY EQUIPMENT AND DUAL-USE GOODS AND TECHNOLOGY

REPUBLIC OF SERBIA RES. 68/44 - NATIONAL LEGISLATION ON TRANSFER OF ARMS, MILITARY EQUIPMENT AND DUAL-USE GOODS AND TECHNOLOGY REPUBLIC OF SERBIA RES. 68/44 - NATIONAL LEGISLATION ON TRANSFER OF ARMS, MILITARY EQUIPMENT AND DUAL-USE GOODS AND TECHNOLOGY The Republic of Serbia continues to strengthen the export control of conventional

More information

Works cycle B Task Force TF B5. m-commerce

Works cycle B Task Force TF B5. m-commerce HELLENIC REPUBLIC MINISTRY OF DEVELOPMENT SECRETARIAT GENERAL FOR INDUSTRY MINISTRY OF ECONOMY AND FINANCE MINISTRY OF THE INTERIOR, PUBLIC ADMINISTRATION & DECENTRALIZATION OPERATIONAL PROGRAM FOR THE

More information

E-GOVERNMENT AND ADMINISTRATIVE REFORM IN SERBIA STEVAN LILIĆ * MAJA STOJANOVIĆ **

E-GOVERNMENT AND ADMINISTRATIVE REFORM IN SERBIA STEVAN LILIĆ * MAJA STOJANOVIĆ ** S.Lilić, M.Stojanović: E-Governemnt and Administrative Reform in Serbia E-GOVERNMENT AND ADMINISTRATIVE REFORM IN SERBIA by STEVAN LILIĆ * MAJA STOJANOVIĆ ** E-government is a new concept of administration

More information

e-prodat Executive Summary Best practices on e-government and Data Protection in European Regions and Cities PROJECT COFINANCED BY THE EUROPEAN UNION

e-prodat Executive Summary Best practices on e-government and Data Protection in European Regions and Cities PROJECT COFINANCED BY THE EUROPEAN UNION Executive Summary e-prodat Best practices on e-government and Data Protection in European Regions and Cities PROJECT COFINANCED BY THE EUROPEAN UNION Nord Est SUD Ouest INTERREG IIIC Background Background

More information

Companion Policy Acceptable Accounting Principles and Auditing Standards

Companion Policy Acceptable Accounting Principles and Auditing Standards Companion Policy 52-107 Acceptable Accounting Principles and Auditing Standards PART 1 INTRODUCTION AND DEFINITIONS 1.1 Introduction and Purpose 1.2 Multijurisdictional Disclosure System 1.3 Calculation

More information

Trusted KYC Data Sharing Framework Implementation

Trusted KYC Data Sharing Framework Implementation July 2017 Trusted KYC Data Sharing Framework Implementation Supporting Document Contents Preface... 3 1 Objective of this Document... 4 2 Evolving Benefits Provided by the Data Sharing Environment... 5

More information

Managed Public Key Infrastructure

Managed Public Key Infrastructure Managed Public Key Infrastructure Securing Your Business Applications Who should read this paper To operate business-critical applications over the Internet, enterprises need highlevel, certificate-based

More information

University of Murcia. Electronic Government Project

University of Murcia. Electronic Government Project University of Murcia Electronic Government Project Daniel Sánchez Martínez (danielsm@um.es) Information Technologies and Advanced Communications Area (ATICA) http://www.um.es/atica University of Murcia

More information

Digital Collaboration in Sweden. Presentation at meeting between ISA and Sweden Brussels, October 22, 2014

Digital Collaboration in Sweden. Presentation at meeting between ISA and Sweden Brussels, October 22, 2014 Digital Collaboration in Sweden Presentation at meeting between ISA and Sweden Brussels, October 22, 2014 1 Proposed Agenda Introduction The Swedish situation after the parliament election Swedish situation

More information

ATCO Gas Code of Conduct Regulation (A.R. 58/2015) Compliance Plan

ATCO Gas Code of Conduct Regulation (A.R. 58/2015) Compliance Plan ATCO Gas Code of Conduct Regulation (A.R. 58/2015) Compliance Plan Effective Date: June 27, 2017 ATCO Gas Code of Conduct Regulation Compliance Plan PURPOSE...3 PART 1 INTERPRETATION...4 1.0 DEFINITIONS...

More information

E-Government Initiatives and Case Studies

E-Government Initiatives and Case Studies E-Government Initiatives and Case Studies Tania Zaroubi Senior ICT Project Manager Office of the Minister of State for Administrative Reform Lebanon 1 Presentation Outline e-gov 2002 e-gov 2007 Case Studies

More information

Measuring e-government

Measuring e-government Chapter 6 Measuring e-government 6.1 Towards consensus on indicators 94 6.2 Assessing online services and e-participation 95 6.3 Accounting for capacity constraints 96 6.4 Conclusions 97 Reliable and relevant

More information

REPORT OF THE MEETING OF THE BSEC WORKING GROUP ON INFORMATION AND COMMUNICATION TECHNOLOGIES. (Kyiv, Ukraine, 4-5 December 2007)

REPORT OF THE MEETING OF THE BSEC WORKING GROUP ON INFORMATION AND COMMUNICATION TECHNOLOGIES. (Kyiv, Ukraine, 4-5 December 2007) Kyiv, 5 December 2007 BS/ICT/WG/R(2007)1 REPORT OF THE MEETING OF THE BSEC WORKING GROUP ON INFORMATION AND COMMUNICATION TECHNOLOGIES (Kyiv, Ukraine, 4-5 December 2007) 1. The Meeting of the BSEC Working

More information

Things are not what they used to be

Things are not what they used to be Things are not what they used to be The greatest thing that nebulasuite has given us is protection. It helps us to have a centralized control over certificates we can supervise which of them are being

More information

June 21, 2011 (Tuesday)

June 21, 2011 (Tuesday) June 21, 2011 (Tuesday) 55 th EOQ Congress KEMPINSKI HOTEL CORVINUS Erzsébet tér 7-8, Budapest V. BALLROOM Tuesday 9:00 10:30 8.1. OPENING CEREMONY 9.00 Opening Ceremony Zacharias Bilalis, European Commission,

More information

LAW ON STANDARDS AND TECHNICAL REGULATIONS

LAW ON STANDARDS AND TECHNICAL REGULATIONS For informative purposes NATIONAL ASSEMBLY ------------------------ No: /2006/PL-UBTVQH11 SOCIALIST REPUBLIC OF VIETNAM INDEPENDENCE FREEDOM - HAPPINESS LAW ON STANDARDS AND TECHNICAL REGULATIONS Pursuant

More information

Initiative Sustainable Greece 2020

Initiative Sustainable Greece 2020 THE GREEK SUSTAINABILITY CODE The Greek Sustainability Code has been developed by QualityNet Foundation (QNF) in cooperation with the German Council for Sustainable Development (RNE) in the context of

More information

Final Document. 18 September 2014

Final Document. 18 September 2014 IMDRFIMDSAP WG/N11FINAL:2014 International Medical Device Regulators Forum Final Document Title: MD SAP Assessment and Decision Process for the Recognition of an Auditing Organization Authoring Group:

More information

Council of the European Union Brussels, 25 May 2018 (OR. en)

Council of the European Union Brussels, 25 May 2018 (OR. en) Conseil UE Council of the European Union Brussels, 25 May 2018 (OR. en) Interinstitutional File: 2017/0003 (COD) 9079/18 LIMITE PUBLIC TELECOM 144 COMPET 322 MI 362 DATAPROTECT 97 CONSOM 146 JAI 438 DIGIT

More information

X Infotech Banking. Software solutions for smart card issuance

X Infotech Banking. Software solutions for smart card issuance X Infotech Banking Software solutions for smart card issuance WWW.X-INFOTECH.COM About X Infotech provides turnkey software solutions for centralized and instant issuance of financial and non-financial

More information