Regulatory Framework August 27, 2001. 2 An allowance not a mandate !

Slides:



Advertisements
Similar presentations
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Electronic Contracts- eSign & UETA Copyright, Peter S. Vogel,
© 2009 by SAP AG. All rights reserved. / SAP University Alliances Page 1 Primary Learning Objectives Use the SAP system to experience the steps in a typical.
 A public-key infrastructure ( PKI ) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store,
Public Key Management and X.509 Certificates
U.S. Department of Justice Drug Enforcement Administration Office of Diversion Control Electronic Prescriptions for Controlled Substances Michelle Ferritto,
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
PKI Records Management and Archive Issues October 10, 2002 Phoenix, AZ Charles Dollar Dollar Consulting ECURE 2002.
E-Procurement: Digital Signatures and Role of Certifying Authorities Jagdeep S. Kochar CEO, (n)Code Solutions.
Is a Controlled Substance Ordering System (CSOS) right for you? An overview of CSOS background, compliance, benefits and available solutions. Disclaimer:
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
UN Economic Commission for Europe 23rd UN/CEFACT FORUM 7-11 April rd UN/CEFACT FORUM – Geneva Tahseen A. Khan Project Proposal : Trusted Third Party.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
November 2009 Secure Data Transmission May 2014 What are Secure Methods of Transmission? Encrypted Services Encrypted Memory Sticks Fax Secure.
CROMERR Applied to Industrial Pretreatment Linko Data Systems, Inc. PretreatmentPretreatment & Fats Oil and Grease SoftwareFats Oil and Grease Software.
National Smartcard Project Work Package 8 – Security Issues Report.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Bob can sign a message using a digital signature generation algorithm
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
DRAFT Guidance for Industry: Providing Regulatory Submissions in Electronic Format – Drug Establishment Registration and Drug Listing Denise Sánchez, J.D.,
“HVUT” Federal Heavy Vehicle Use Tax Update August 24, 2006.
1 DEA e-222 Working Group Meeting October 28, 2003.
May 28, 2002Mårten Trolin1 Protocols for e-commerce Traditional credit cards SET SPA/UCAF 3D-Secure Temporary card numbers Direct Payments.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
U.S. Department of Justice Drug Enforcement Administration Office of Diversion Control Electronic Prescriptions for Controlled Substances June 1, 2010.
Secure Electronic Transaction (SET)
The Systems House, Inc. 06/11/12. Setup Drug Types, Pharma Records Pedigree Printing Options Pedigree How it Works Updating Reporting ARCOS Reporting.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
DEVELOPING WEB TRANSACTIONAL CAPABILITIES IN ATF ATF’s E Filing Strategies.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
Federal Acquisition Service U.S. General Services Administration eOffer/eMod Training eOffer/eMod Training Keonia Cobbins Systems Development Office of.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
By Umair Ali. Dec 2004Version 1 -PKI - a security architecture – over the internet. -Provides an increased level of confidence for exchanging information.
Institutional Student Information Record (ISIR) Update Teri Hunt Sherlene McIntosh Session 16.
EESSI June 2000Slide 1 European Electronic Signature Standardization Hans Nilsson, iD2 Technologies, Sweden.
DIGITAL SIGNATURE.
Chapter 4 - X.509 Authentication TE-405 Network Security and Management Fall Dr. Faisal Kakar
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Digital Tachograph Workshop on Tachograph Cards issuing INFRA Speaker: Anne Worth.
PKI Services for CYPRUS STOCK EXCHANGE Kostas Nousias.
TAG Presentation 18th May 2004 Paul Butler
Overview eSignature Features: Field Type vs Record Locking Regulations
Training for developers of X-Road interfaces
Unit 3 Section 6.4: Internet Security
Invoicing: Enter a PO-Based Invoice
TAG Presentation 18th May 2004 Paul Butler
Electronic Prescriptions for Controlled Substances
Pooja programmer,cse department
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
Digital Certificates and X.509
PKI (Public Key Infrastructure)
INVOICE Downloaded from
Electronic Payment Security Technologies
Tablet Press & Capsule Filling Machine Transaction Regulations (March 2019)
Presentation transcript:

Regulatory Framework August 27, 2001

2 An allowance not a mandate !

3 Elements of Electronic Orders (1) The name of the supplier from which the controlled substances are being ordered. Only one supplier may be listed on an order. (2) The street address of the supplier. (3) City and state of the supplier. (4) The date the order is submitted to the supplier. (5) The number of packages or containers of each item ordered.

4 Elements of Electronic Orders (6) The quantity in a single package. (7) The name of the controlled substance product. (8) The supplier’s DEA registration number (purchaser or supplier may complete this item). (9) The National Drug Code (purchaser or the supplier may complete this item). (10) Number of packages shipped (completed by the supplier).

5 Elements of Electronic Orders (11) Date shipped (completed by the supplier). (12) Number of packages received (purchaser completes on receipt of order). (13) Date received (purchaser completes on receipt of order). (14) The purchaser’s DEA registration number. (15) The schedules the purchaser is authorized to handle.

6 Elements of Electronic Orders (16) The purchaser’s DEA registration business activity classification. (17) A unique number the purchaser generates to track the order. (18) The purchaser’s name and address as they appear on the DEA Certificate of Registration. The data fields for the purchaser’s DEA registration number, schedules, business activity, and name and address must conform to the data in the Digital Certificate issued by DEA to the signer. These fields are the same fields that exist on the Form 222.

7 Order Transmission User authentication/activation –Control private key activation, –Ten-minute inactivity time period –Clear plain text private key from memory after use Digitally sign the order Digital transmission (fax is not acceptable) Archive (readily retrievable) 10 item order limit is eliminated

8 Order Receipt/Validation Verify that… –Certificate is not expired –Order has not been altered (signature) –Certificate has not been revoked –Extension data matches Archive must include purchaser’s certificate Daily reporting (individual transactions or summary report)

9 Technical Specifications National Institute of Standards and Technologies develops FIPS Standards –Federal Information Processing Standards –FIPS 140-1, Cryptography –186-2 Digital Signature –180-1 Hash Validated modules may be used without alteration

10 Audits Third party audit must be performed to ensure that signing/validation obligations are being met Ensuring that the audit is performed is the responsibility of the registrant When supplier develops system, audit is supplier’s responsibility Follow-up audits only required when signing/validation functionality is changed

11 Questions …