Workshop on registered electronic mail policies and implementations (ETT 57074) Ankara, 16.3. – 17.3. 2015.

Slides:



Advertisements
Similar presentations
1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
Advertisements

Research and Innovation Participant Portal Concept for electronic-only grant management in Horizon 2020 Peter HÄRTWICH
International forum on eNotarization and eApostilles The impact of e-technology on notarial acts: legal and technical possibilities and limits -relevance.
The data retention directive: data protection aspects Frank Robben General manager Crossroads Bank for Social Security Sint-Pieterssteenweg 375 B-1040.
AFACT eCOO WG interim meeting - Conference Call 1st March of 2011 Mahmood Zargar eCOO Experiences and Standards.
Workshop on registered electronic mail policies and implementations Ankara, March 2015 Davide Mula The use of electronic signatures.
KSTCD Branch/HRD Section/TrainForTrade & STICT Branch/ ICT Analysis Section1 Module 2 Legal validity of data messages.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Dematerialization of Organisations’ Key Business Processes Security and e-Invoicing ATHENEE PALACE HILTON, Bucuresti September 21 st 2004 Genovel Iovu.
Naklo, A.Komšo 1 eInvoices and Tax Regulation Andja Komšo Tax Administration.
INFORMATION TECHNOLOGY LAW LECTURE 3- ELECTRONIC SIGNATURE Dr. Kadir Bas.
Implementation of Electronic Signature Law Kęstutis Andrijauskas Information Society Development Committee under the Government of the Republic.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Implementation of the Regulation (EU) No 910/2014 on electronic identification and trust services for electronic transactions in the internal market.
Legal Issues on PKI & qualified electronic certificates. THIBAULT VERBIEST Attorney-at-law at the Brussels and Paris Bar Professor at the Universities.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
DIGITAL SIGNATURE AND ELECTRONIC DOCUMENTS IN ITALY Prof. Pierluigi Ridolfi AIPA Authority for Information Technology in the Public Administration V. Solferino,
Trusted Electronic Transactions.  Why conduct transactions electronically?  Three Characteristics that ensure trust in electronic transactions  How.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Workshop Ankara, –  Introduction  Legal background in Slovenia  Usage areas  Accreditations and supervision  REM service.
Workshop on registered electronic mail policies and implementation Ankara, March 2015 Davide Mula REM country practice in legal infrastructure,
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
| | Seite 1 Basic Principles of Insurance Supervision Duties and Operation of a Supervisory Authority under Coordinated European Legislation.
1. 2 ECRF survey - Electronic signature Mr Yves Gonner Luxembourg, June 12, 2009.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Ministry of Transport, Information Technology and Communications Technological base: Interoperability Tsvetanka Kirilova Ministry of TITC Bulgaria.
UN Economic Commission for Europe 23rd UN/CEFACT FORUM 7-11 April rd UN/CEFACT FORUM – Geneva Tahseen A. Khan Project Proposal : Trusted Third Party.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Lawyer at the Brussels Bar Lecturer at the University of Strasbourg Assistant at the University of Brussels Data Protection & Electronic Communications.
Dr. Diganta Biswas School of Law Christ University, Bangalore.
National Smartcard Project Work Package 8 – Security Issues Report.
E-Invoicing & Legal Aspects RA42 Presentation Michael Uebber, LH SIS – Simplified Interline Settlement.
E-commerce Law Electronic signatures and security.
Foreigner as a healthcare professional in the territory of Slovak Republic in the context of the Directive of the European Parliament and of the Council.
16. POLISH INTERNATIONAL INSOLVENCY LAW PROVISIONS APPLICABLE IN NON-EU CASES DR MAREK PORZYCKI International Insolvency Law.
THE EUROPEAN FOUNDATION PROPOSAL An effective, efficient and feasible solution for tax issues related to cross border charitable giving and fundraising?
EService Process Descriptions. COSCA/NACM Standards for Electronic Filing Processes Technical and Business Approaches Section 1.2A Court rules may provide.
Data Protection Compliance Professor Ian Walden Institute of Computer and Communications Law, Centre for Commercial Law Studies, Queen Mary, University.
Dimensions of E – Commerce Security
End Use and User of Ammunition AT05 Slide 1. Types of End Use Documents  End User Certificate (EUC)  Delivery Verification Certificate (DVC) AT05 Slide.
1 Ensuring the protection of bidders’ rights.  The Federal Law of № 94-FZ "On placing orders for goods, works and services for state and municipal.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
INTEGRATION OF MAIN STATE REGISTERS - LITHUANIAN EXPERIENCE
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
INTERNATIONAL E-DISCOVERY: WHEN CULTURES COLLIDE Alvin F. Lindsay Hogan & Hartson LLP.
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
DIGITAL SIGNATURE.
Supervision SICOR Securities, Inc.. Why? NASD 3110 requires the firm to “…establish and maintain a system to supervise the activities of each registered.
© UPU 2010 – All rights reserved International e-services Farah Abdallah E-Postal Services Programme UPU.
TEAM MEMBERS : NAMEMATRIX NO. AMAI A/P EH POO SAYNIE PHONGSWAT A/P E TENG SITI SARAH BINTI ABDUL MUSAWIL THAANIALAKSHMI RAVINDRAN
eIDAS: current state of play and the Luxembourgish approach
1  Only 370 million of world’s 6 billion population know English as native language  70% content on web is in English but more than 50% of current internet.
Agencija za zaštitu ličnih/osobnih podataka u Bosni i Hercegovini Агенција за заштиту личних података у Босни и Херцеговини Personal Data Protection Agency.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
Chisinau, Republic of Moldova 2017
Nassau Association of School Technologists
Electronic Transactions & Authentication
SPECIALISED E-SERVICES FOR MUNICIPALITIES
General Data Protection Regulation
SPOCS : Simple Procedures Online for Crossborder Services
Draft ETSI TS Annex C Presented by Michał Tabor for PSD2 Workshop
Digital Signatures and Forms
Pooja programmer,cse department
TRACES Trade Control and Expert System Electronic sanitary certificates using qualified electronic signature Brussels 15th September 2016.
Dashboard eHealth services: actual mockup
Website authentication E-registered delivery
Presentation transcript:

Workshop on registered electronic mail policies and implementations (ETT 57074) Ankara, –

1. Introduction 2. REM- Electronic delivery of electronic documents 3. Rules in the eIDAS Regulation 4. Legal framework

 Importance of electronic mail is growing in private and business communication  is one of the major tools for electronic business and administration.  Especially in business can be used for sending contracts, invoices, proposals, applications, large files and any other documents.  In comparison with physical mail, is very efficient: ◦ fast (delivery in a very short period) ◦ cheap (no postage, without almost any costs ) ◦ environmental friendly (no printing of documents required)

 But sending standard is like sending a postcard written in pencil: ◦ can be easily read by the others (encryption?) ◦ its content can easily be changed (what was the true content?) ◦ Delivery/reception is uncertain (sometimes s are lost, SPAMed…) and can not be proved (the recipient claiming that he/she haven't received it) ◦ was it really the sender who send it to me (authentication?)  Although very efficient, in most cases can not be proof of a transaction nor it would be valid as an evidience in the court.

 Solution: „Authentication by third party of who send what to whom and when by .”  This can be further combined by security guarantees (encryption), -> guaranteeing that the content has not been compromised during the delivery.  Providers can be private or public entities:

 Rules need to be put in place to provide a legal framework  Legal aspects which should to be addressed: ◦ Standards/conditions for providing such service ◦ Liability of provider(s) ◦ Personal data protection ◦ legal nature of service (does it have the same effect as a physical registered mail mail?) ◦ Cross-border effect (recognition in foreign countries)

 REM is part of trusted services as defined in art. 3 (16) of e IDAS Regulation: “trust service’ means an electronic service normally provided for remuneration which consists of: electronic registered delivery services (a) the creation, verification, and validation of electronic signatures, electronic seals or electronic time stamps, electronic registered delivery services and certificates related to those services, or (b) the creation, verification and validation of certificates for website authentication; or (c)the preservation of electronic signatures, seals or certificates related to those services;

 Rules from eIDAS Regulation on trusted services are applicable to REM: Section 1: General provisions (art ) Liability of TSPs and burden of proof, Conditions for the recognition and acceptance of qualified trust services and qualified certificates provided by providers established in a third country. Accessibility of disabled people to TS. Authorizes MS to lay down the rules on penalties for violators of the regulation.

Section 2: Supervision (17-19) Obligation of MS to appoint a supervisory body with necessary powers and adequate resources. Powers are: ex ante and ex post supervision activities on qualified TSPs and ex post actions in case of non-qualified TSPs obligation of mutual assistance of supervisory bodies (exchange of information, execution of supervisory measures, joint investigations…). It defines the security requirements for all TSP (qualified and non-qualified)

Section 3: Qualified trust services (art ): The terms and conditions to start providing qualified TS and supervision of qTSPs It sets out the general requirements for qTSP (verification of clients, financial, HRM, organizational, security& privacy issues) Obligation of MS to establish trusted lists and to notify EC on such lists Determines EU trust mark for qTS

 Special provisions regarding REM are set out in art. 43 and 44.  Legal effect of an electronic registered delivery services (art. 43): 1. Data sent and received using an electronic registered delivery service shall not be denied legal effect and admissibility as evidence in legal proceedings solely on the grounds that it is in an electronic form or that it does not meet the requirements of the qualified electronic registered delivery service. 2. Data sent and received using a qualified electronic registered delivery service shall enjoy the presumption of the integrity of the data, the sending of that data by the identified sender, its receipt by the identified addressee and the accuracy of the date and time of sending and receipt indicated by the qualified electronic registered delivery service.

 Requirements for qualified electronic registered delivery services (art. 44): Qualified electronic registered delivery services shall meet the following requirements: (a)they are provided by one or more qualified trust service provider(s); (b)they ensure with a high level of confidence the identification of the sender; (c)they ensure the identification of the addressee before the delivery of the data; (d)the sending and receiving of data is secured by an advanced electronic signature or an advanced electronic seal of a qualified trust service provider in such a manner as to preclude the possibility of the data being changed undetectably; (e)any change of the data needed for the purpose of sending or receiving the data is clearly indicated to the sender and addressee of the data; (f)the date and time of sending, receiving and any change of data are indicated by a qualified electronic time stamp. In the event of the data being transferred between two or more qualified trust service providers, the requirements in points (a) to (f) shall apply to all the qualified trust service providers.

Thank You !