search


keyboard_tab EIDAS 2014/0910 EN

BG CS DA DE EL EN ES ET FI FR GA HR HU IT LV LT MT NL PL PT RO SK SL SV print pdf

2014/0910 EN cercato: 'empowered' . Output generated live by software developed by IusOnDemand srl


just index empowered:

    CHAPTER I
    GENERAL PROVISIONS

    CHAPTER II
    ELECTRONIC IDENTIFICATION

    CHAPTER III
    TRUST SERVICES

    SECTION 1
    General provisions

    SECTION 2
    Supervision

    SECTION 3
    Qualified trust services

    SECTION 4
    Electronic signatures
  • 1 Article 30 Certification of qualified electronic signature creation devices

  • SECTION 5
    Electronic seals

    SECTION 6
    Electronic time stamps

    SECTION 7
    Electronic registered delivery services

    SECTION 8
    Website authentication

    CHAPTER IV
    ELECTRONIC DOCUMENTS

    CHAPTER V
    DELEGATIONS OF POWER AND IMPLEMENTING PROVISIONS

    CHAPTER VI
    FINAL PROVISIONS


whereas empowered:


definitions:


cloud tag: and the number of total unique words without stopwords is: 73

 

Article 30

Certification of qualified electronic_signature creation devices

1.   Conformity of qualified electronic_signature creation devices with the requirements laid down in Annex II shall be certified by appropriate public or private bodies designated by Member States.

2.   Member States shall notify to the Commission the names and addresses of the public or private body referred to in paragraph 1. The Commission shall make that information available to Member States.

3.   The certification referred to in paragraph 1 shall be based on one of the following:

(a)

a security evaluation process carried out in accordance with one of the standards for the security assessment of information technology products included in the list established in accordance with the second subparagraph; or

(b)

a process other than the process referred to in point (a), provided that it uses comparable security levels and provided that the public or private body referred to in paragraph 1 notifies that process to the Commission. That process may be used only in the absence of standards referred to in point (a) or when a security evaluation process referred to in point (a) is ongoing.

The Commission shall, by means of implementing acts, establish a list of standards for the security assessment of information technology products referred to in point (a). Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 48(2).

4.   The Commission shall be empowered to adopt delegated acts in accordance with Article 47 concerning the establishment of specific criteria to be met by the designated bodies referred to in paragraph 1 of this Article.


whereas









keyboard_arrow_down