search


keyboard_tab EIDAS 2014/0910 EN

BG CS DA DE EL EN ES ET FI FR GA HR HU IT LV LT MT NL PL PT RO SK SL SV print pdf

2014/0910 EN cercato: 'compromised' . Output generated live by software developed by IusOnDemand srl


just index compromised:


whereas compromised:


definitions:


cloud tag: and the number of total unique words without stopwords is: 177

 

Article 9

Notification

1.   The notifying Member State shall notify to the Commission the following information and, without undue delay, any subsequent changes thereto:

(a)

a description of the electronic_identification scheme, including its assurance levels and the issuer or issuers of electronic_identification means under the scheme;

(b)

the applicable supervisory regime and information on the liability regime with respect to the following:

(i)

the party issuing the electronic_identification means; and

(ii)

the party operating the authentication procedure;

(c)

the authority or authorities responsible for the electronic_identification scheme;

(d)

information on the entity or entities which manage the registration of the unique person_identification_data;

(e)

a description of how the requirements set out in the implementing acts referred to in Article 12(8) are met;

(f)

a description of the authentication referred to in point (f) of Article 7;

(g)

arrangements for suspension or revocation of either the notified electronic_identification scheme or authentication or the compromised parts concerned.

2.   One year from the date of application of the implementing acts referred to in Articles 8(3) and 12(8), the Commission shall publish in the Official Journal of the European Union a list of the electronic_identification schemes which were notified pursuant to paragraph 1 of this Article and the basic information thereon.

3.   If the Commission receives a notification after the expiry of the period referred to in paragraph 2, it shall publish in the Official Journal of the European Union the amendments to the list referred to in paragraph 2 within two months from the date of receipt of that notification.

4.   A Member State may submit to the Commission a request to remove an electronic_identification scheme notified by that Member State from the list referred to in paragraph 2. The Commission shall publish in the Official Journal of the European Union the corresponding amendments to the list within one month from the date of receipt of the Member State’s request.

5.   The Commission may, by means of implementing acts, define the circumstances, formats and procedures of notifications under paragraph 1. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 48(2).

Article 10

Security breach

1.   Where either the electronic_identification scheme notified pursuant to Article 9(1) or the authentication referred to in point (f) of Article 7 is breached or partly compromised in a manner that affects the reliability of the cross-border authentication of that scheme, the notifying Member State shall, without delay, suspend or revoke that cross-border authentication or the compromised parts concerned, and shall inform other Member States and the Commission.

2.   When the breach or compromise referred to in paragraph 1 is remedied, the notifying Member State shall re-establish the cross-border authentication and shall inform other Member States and the Commission without undue delay.

3.   If the breach or compromise referred to in paragraph 1 is not remedied within three months of the suspension or revocation, the notifying Member State shall notify other Member States and the Commission of the withdrawal of the electronic_identification scheme.

The Commission shall publish in the Official Journal of the European Union the corresponding amendments to the list referred to in Article 9(2) without undue delay.

Article 32

Requirements for the validation of qualified electronic_signatures

1.   The process for the validation of a qualified electronic_signature shall confirm the validity of a qualified electronic_signature provided that:

(a)

the certificate that supports the signature was, at the time of signing, a qualified certificate for electronic_signature complying with Annex I;

(b)

the qualified certificate was issued by a qualified trust_service provider and was valid at the time of signing;

(c)

the signature validation_data corresponds to the data provided to the relying_party;

(d)

the unique set of data representing the signatory in the certificate is correctly provided to the relying_party;

(e)

the use of any pseudonym is clearly indicated to the relying_party if a pseudonym was used at the time of signing;

(f)

the electronic_signature was created by a qualified electronic_signature creation device;

(g)

the integrity of the signed data has not been compromised;

(h)

the requirements provided for in Article 26 were met at the time of signing.

2.   The system used for validating the qualified electronic_signature shall provide to the relying_party the correct result of the validation process and shall allow the relying_party to detect any security relevant issues.

3.   The Commission may, by means of implementing acts, establish reference numbers of standards for the validation of qualified electronic_signatures. Compliance with the requirements laid down in paragraph 1 shall be presumed where the validation of qualified electronic_signatures meets those standards. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 48(2).


whereas









keyboard_arrow_down