Qualified and Advanced Electronic Signatures)

Total Page:16

File Type:pdf, Size:1020Kb

Qualified and Advanced Electronic Signatures) R Terms and Conditions of Use Swisscom certification service (Qualified and advanced Electronic Signatures) Terms and Conditions of Use for the use of the Swisscom qualified certificate is permitted in connection with the use certification service with qualified and advanced certificates of the trust service in accordance with these Terms and Con- for qualified and advanced electronic signatures (Swisscom ditions of Use ("limitation of use"). certificate class "Saphir and Diamant") 2.2 Identity verification process and retention of the infor- mation Swisscom or the registration authority appointed by 1 Scope of these Terms and Conditions of Use Swisscom checks your identity in the identity verification pro- These Terms and Conditions of Use shall apply in the rela- cess. For qualified electronic signatures, this is done by tionship between you and Swisscom (Schweiz) AG, Alte means of your passport or an identity card allowing travel to Tiefenaustrasse 6, Worblaufen, Switzerland, company ID Switzerland. Depending in each case on the actual organisa- CHE-101.654.423 (hereinafter "Swisscom") for your use of tion of the identity verification process, you may be re- the Swisscom certification service with qualified and ad- quested in the verification process for advanced electronic vanced certificates for qualified and advanced electronic sig- signatures to also submit other documents than those re- natures. quired for qualified electronic signatures. 2 Swisscom’s Services Based on your identify verification process for qualified elec- tronic signatures, you may also create advanced electronic 2.1 Certification service in general signatures in accordance with these Terms and Conditions of For your certification services with qualified certificates, Use where the subscriber application used by you offers dif- Swisscom is an accredited certification services provider in ferent types of signatures. However, not every identity verifi- Switzerland pursuant to the Swiss Federal Act concerning cer- cation process for advanced electroniac signatures can also tification services in the area of electronic signature (Elec- be used for the superior grade signature level of the qualified tronic Signature Act, ZertES; SR 943.03) and is audited and electronic signature. supervised by the ZertES accreditation agency. For your certi- fication services with advanced certificates, Swisscom pro- Swisscom registers and files the personal information about vides certification services in accordance with internationally you which is collected in the identity verification process in recognised technical standards. accordance with the applicable regulations. The handling of your data is described in section 6 of these Terms and Condi- In general, the certification service is provided in accordance tions of Use. with the Swisscom certificate policy in its then current ver- sion. This certificate policy – Certificate Policy (CP/CPS) for 2.3 Issuance of certificate and keys, creation of signature the issuance of "Diamant" (Diamond) class certificates (quali- Swisscom creates the qualified or advanced certificate and fied) and "Saphir" (Sapphire) class certificates (advanced) – the cryptographic pair of keys for the signing process on a form an integral part of these Terms and Conditions of Use. special server (Hardware Security Module, HSM). The quali- You can view and download the document online at fied or advanced certificate is a certificate which assigns to http://www.swissdigicert.ch/download_docs (in the “CH” you the public key of the asymmetrical cryptographic pair of section). keys. You alone have the activation data which allows you to use the private key by deploying your mobile phone (e.g. Mo- As part of the certification service, Swisscom creates a digital bile ID or SMS authentication process, see also in this regard certificate which includes personal information about you. sections 3 and 4 of these Terms and Conditions of Use). As Swisscom links this digital certificate with the file which you soon as you enter the activation data after being requested sign electronically (e.g. a PDF document of your bank). The to do so, Swisscom creates the qualified or advanced elec- electronic signature on the document is thereby assigned to tronic signature for you. you as an individual, just as if it were signed in your own hand, where the writing of the name on the document is as- For each signing process Swisscom creates a new digital cer- signed to the individual signing it. The result is that third par- tificate (with a short validity period of 10 minutes) with a ties can also rely on the electronic signature and on the infor- new pair of keys. mation contained in the digital certificate. 2.4 Verification of the electronic signature In each case, depending on the type of signature offered by The Swisscom certification service allows the validity of the the subscriber application (see section 3 in this regard), a electronic signature to be validated. Third parties also (often qualified electronic signature is created pursuant to Article 2 referred to as the "relying party") can validate the validity of letter e of the Electronic Signature Act (ZertES; SR 943.03) or your electronic signature (e.g. for qualified electronic signa- an advanced signature is created. No other type of use of the tures on the website www.validator.ch or generally with the Swisscom (Schweiz) AG September 2018 Page 1 of 5 R Terms and Conditions of Use Swisscom certification service (Qualified and advanced Electronic Signatures) Adobe Systems Incorporated Adobe Acrobat programme). and separate from your mobile phone or encrypted and must The information provided in section 5 of these Terms and be protected from access by third parties. Conditions of Use must be noted concerning the legal effects If you do not use the mobile ID and use a password and a of the different electronic signatures. one-time password sent by SMS, you shall ensure that this is 2.5 Availability always entered on input screens of Swisscom systems. Fur- Swisscom shall endeavour to provide the certification service ther information about this can be found in this document. continuously. Swisscom shall not, however, be liable for en- You undertake to immediately stop creating signatures and suring that the signing service is constantly available. where necessary to change the access data (e.g. mobile ID Swisscom may limit the availability temporarily if this is nec- PIN or password) if your mobile ID PIN and/or the personal essary, for example, with regard to capacity limits, or the password which you have to provide in the SMS authentica- safety or integrity of the servers, or to perform technical tion process has been stolen or if you know or suspect that maintenance or repairs and this is for the purpose of provid- another person has acquired knowledge of it (compromise). ing the services properly or improving them (maintenance work). Swisscom shall endeavour in this process to take ac- In the event of the loss or theft of the SIM card or the end count of the interests of the users of the certification service. device including the SIM card, you undertake to have the SIM card blocked immediately. 3 Preconditions of use As soon as there are any changes to your mobile phone num- You have an adequate understanding of digital certificates ber, the SIM card used or the identity data, you shall inform and of qualified and advanced electronic signatures. your registration authority or Swisscom directly of these You use a device and log in to an internet portal or an appli- changes. cation which allow the Swisscom certification service to be You undertake to take every reasonable and readily available used (so-called “subscriber application”). For example, it may opportunity to protect your device and your mobile phone be your employer's accounting software or your bank's or in- from attacks and malware ("viruses", "worms", "Trojan surance company's internet portal. The terms and conditions horses" and the like), particularly through using software of the subscriber application used by you may result in limita- from an official source that is continually updated. tions in the use of the certification service. In particular, the subscriber application used by you determines whether you You undertake to check the electronic signatures after they can create qualified or advanced electronic signatures. The have been created in accordance with section 2.4 of these linking of the subscriber application to the Swisscom certifi- Terms and Conditions of Use and to promptly report any dis- cation service is the subject of a separate agreement (All-in crepancies in the digital certificate to Swisscom. Signing Service Agreement). You have a mobile phone for the multi-factor authentication when the signing process is triggered, e.g. SMS or Mobile ID can be used as authentication methods. The actual signature authorisation results from the connection of the subscriber application used by you. If the signature is authorised through Mobile ID, you must have a Mobile ID with a Swiss Mobile ID provider (e.g. Swisscom) in order to use the certification service. 4 Your cooperation obligations You undertake as part of the identity verification process to provide Swisscom and/or the registration authority with complete and true information. You undertake not to use any data relating to your personal information (date of birth etc.) for the secret number se- quence (PIN) for your mobile ID or for your personal pass- word when using the SMS signature approval process. Any records of the mobile ID PIN and/or personal password must not be disclosed to any other person, must be kept securely Swisscom (Schweiz) AG September 2018 Page 2 of 5 R Terms and Conditions of Use Swisscom certification service (Qualified and advanced Electronic Signatures) 5 Legal effects of the electronic signature the law of a country other than Switzerland and that require- ments as to form (such as the written form requirement) The certification service in accordance with these Terms and might not be met.
Recommended publications
  • Office of State Controller, and the North Carolina Department of The
    Office of State Controller, and the North Carolina Department of the Secretary of State, and North Carolina Department of Cultural Resources, Division of Archives and Records Digital Signature Policy Guidelines Version 1.1 March 2014 Contains corrected links to documents Table of Contents 1 Introduction ........................................................................................................................... 3 1.1 Purpose of Guideline ........................................................................................................ 3 1.2 Scope ............................................................................................................................... 3 2 Electronic Signature Background ........................................................................................ 3 2.1 Legislation ........................................................................................................................ 3 2.2 Definitions ......................................................................................................................... 4 2.3 Definition of an Electronic Signature* ................................................................................ 5 2.4 Electronic Signature versus Digital Signature ................................................................... 6 3 Expectations for Electronic Signatures ............................................................................... 7 3.1 Intended Goals ................................................................................................................
    [Show full text]
  • Enhance Qualified Electronic Signatures with What You See Is What You Sign QES and WYSIWYS Service - Powered by Cryptomathic and Swisscom
    Solution Brief Enhance Qualified Electronic Signatures with What You See Is What You Sign QES and WYSIWYS Service - Powered by Cryptomathic and Swisscom Qualified remote signing and Solution benefits WYSIWYS - hosted eID services The best way to deliver Qualified Electronic Signature ü Offer Advanced or Qualified (QES) services across different channels is to use Electronic Signatures compliant with remote signing technology. It integrates smoothly the Swiss signature law, ZertES, and the with any web application and does not require any EU eIDAS regulation on trust services. software install, plug in or additional components and can be used anywhere, at any time, from any device ü Improve the users’ signing with browsing capacity. Qualified remote signing experience for all channels incl. web provides the highest legal value and international portals, desktop applications, mobile & acceptance, while What You See Is What You Sign tablet platforms (WYSIWYS) technology delivers a seamless user experience with strong non-repudiation. Combining ü Demonstrate unrivalled non- QES with WYSIWYS is a strong enabler for businesses repudiation with WYSIWYS to provide ultimate security, trust and convenience funcionality with online transactions. This is exactly what the Cryptomathic – Swisscom solution offers, namely the ü Eliminate smartcards, card readers possibility to offer Advanced or Qualified Electronic and local software install Signatures using a zero-footprint remote signing hosted service, featuring WYSIWYS functionality. ü Solve data
    [Show full text]
  • Global Guide to Electronic Signature
    Global Guide to Electronic Signature Law: Country by country summaries of law and enforceability Table of contents Introduction 3 Germany 9 Republic of Korea 15 Definition of terms 4 Greece 9 Romania 9 Recommended practices for Hong Kong 10 Russian Federation 16 electronic agreements 4 Hungary 9 Singapore 16 India 10 Slovakia 9 Country summaries of Indonesia 11 Slovenia 9 electronic signature law Ireland 9 South Africa 17 Argentina 5 Israel 11 Spain 9 Australia 5 Italy 9 Sweden 9 Austria 9 Japan 12 Switzerland 17 Belgium 9 Latvia 9 Taiwan 18 Bermuda 6 Lithuania 9 Thailand 18 Brazil 6 Luxembourg 9 Turkey 19 Bulgaria 9 Malaysia 12 United Kingdom 9 Canada 7 Malta 9 United States 19 Chile 7 Mexico 13 Uruguay 20 China 8 Netherlands 9 Colombia 8 New Zealand 13 Croatia 9 Norway 14 Czech Republic 9 Peru 14 Denmark 9 Philippines 15 Estonia 9 Poland 9 European Union 9 Portugal 9 Finland 9 Republic of Cyprus 9 France 9 © Adobe Systems Incorporated 2016. This information is intended to help businesses understand the legal framework of electronic signatures. 2 However, Adobe cannot provide legal advice. This guide is not intended as legal advice and should not serve as a substitute for professional legal advice. You should consult an attorney regarding your specific legal questions. Introduction Electronic and digital signatures represent a tremendous opportunity for organizations to get documents signed and close deals faster. When rolling out e-signatures globally, you need to be aware of the variety of electronic signature laws across the globe. This guide gives you a great place to start.
    [Show full text]
  • Eidas and E-SIGNATURE a LEGAL PERSPECTIVE: ELECTRONIC SIGNATURES in the EUROPEAN UNION
    eIDAS AND E-SIGNATURE A LEGAL PERSPECTIVE: ELECTRONIC SIGNATURES IN THE EUROPEAN UNION WHITE PAPER TABLE OF CONTENTS Part 1: Introduction 3 Key Highlights of the eIDAS Regulation 4 Legal Effect of Different Types of Signatures 6 Regulation of Trust Services 7 Legal Best Practices 8 Part 2: Compliance With the Regulation 9 Advanced Electronic Signatures 9 Qualified Electronic Signatures 10 Format Standards 12 Additional Evidence 12 Conclusion 13 E-Signature Solution Checklist 14 About the Authors This paper is a collaboration between Lorna Brazell of Osborne Clarke LLP and OneSpan. In part one, Osborne Clarke provides a legal opinion on the legal validity of electronic signature in the European Union. Part two has been prepared by OneSpan, and summarizes best practices recommendations for legal compliance when implementing e-signatures. eIDAS & E-SIGNATURE: A LEGAL PERSPECTIVE FOLLOW US 2 PART 1 Introduction The 2014 Regulation on Electronic Identification and Trust Services for Electronic Transaction in the Internal Market1 (“eIDAS”) went into effect throughout the European Union (“EU”) on 1 July 2016, replacing the 1999 Directive on electronic signatures2 (“the Directive”). Although the Directive had not been the subject of any disputes in its 16-year history, neither had it been a success. Its objective, to enable the widespread use of electronic signatures to conduct business across borders within the EU, was not met. There Are Three Key Reasons for This: I. Most EU Member States’ laws do not specify any form of signature for commercial contracts other than guarantees or contracts assigning real property. II. Many people mistakenly believed that the Directive mandated the use of advanced electronic signatures supported by a qualified certificate3 in order for an electronic signature to be legally effective.
    [Show full text]
  • Eidas Regulation Questions & Answers
    eIDAS Regulation Questions & Answers on rules applicable to Trust Services as of 1 July 2016 The eIDAS Regulation (Regulation (EU) N°910/2014) on electronic identification and trust services for electronic transactions in the internal market (eIDAS Regulation) adopted by the co-legislators on 23 July 2014 is a milestone as it provides a predictable regulatory environment for electronic identification and trust services, including electronic signatures, seals, time stamps, registered delivery and website authentication. As of 1 July 2016, the provisions applicable to trust services apply directly in the 28 Member States. This means that trust services under eIDAS are no longer regulated by national laws. As a result, the qualified trust services are recognised independently of the Member State where the Qualified Trust Service Provider is established or where the specific qualified trust service is offered. What’s new? What changes with regard to the former eSignature Directive? What must be done at national level? How does it impact market operators? How does it benefit the users (citizens, businesses and public administrations)? What has the Commission done to facilitate the switchover? These questions and many others have been asked along the road since the adoption. We have compiled this Q&A document to help those of you who need to fully understand the new legal framework in order to implement it or reap the benefits of electronic transactions, as well as those of you who are curious about the Regulation’s various implications. I. What is new? How will the legal effect of electronic signature change under eIDAS (compared to the regime under the eSignature Directive) as from 1 July 2016? Since 1 July 2016, when the trust services’ provisions under the eIDAS Regulation entered into application, an electronic signature can only be used by a natural person to “sign”, i.e.
    [Show full text]
  • Esign Law Explained
    Electronic Signature Article ESIGN Electronic Commerce and Electronic Signature Law Clarified Copyright © Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. ESIGN Law Clarified Table of Contents Overview ................................................................................................................................... 3 Abstract .................................................................................................................................... 3 Requirements for Legal Contract Enforcement .................................................................... 3 Digital Signature Technologies .............................................................................................. 4 PKI Digital Signatures ........................................................................................................................ 4 Handwritten Electronic Digitized Signatures ....................................................................................... 5 Email, Fax, and Other Simplistic Approaches ..................................................................................... 5 Digital Signature Technology in Open and Closed System Environments ........................ 6 Closed System and PKI ..................................................................................................................... 6 Closed System and Digitized Electronic Signatures ..........................................................................
    [Show full text]
  • The Ultimate Guide to Digital Signatures Comprehensive Answers to the 20 Most Important Questions
    The Digital Signature Company The Ultimate Guide to Digital Signatures Comprehensive Answers to the 20 Most Important Questions DocuSign | 855 Folsom St. Suite 939, San Francisco, CA 94107 | Tel. (415) 839-8161 | www.docusign.com Introduction As organizations increasingly adopt paperless processes and automate their document workflows, the “wet ink” signature is rapidly becoming an anachronism in our digital world. Companies and government organizations around the world have invested huge sums in automating their business workflows, yet they still find themselves printing paper for the purpose of obtaining signature approvals. Projects can be held up for days and costs are accrued while documents are mailed between offices, partners, suppliers or customers in order to collect signatures. Professionals often share the concerns voiced by compliance officers over how to ensure the integrity and accountability of electronic documents and records, and by CIOs over how to best secure them. Meanwhile, COOs are concerned with avoiding project delays and CFOs are seeking ways to cut costs associated with paper handling. Digital signatures address each and every one of these concerns. Document Document Hash Private Key Public Key Digital Signature X Signed Document DocuSign | 855 Folsom St. Suite 939, San Francisco, CA 94107 | Tel. (415) 839-8161 | www.docusign.com 1. What are Digital Signatures? Digital signatures, which are often referred to as advanced or standard electronic signatures, take the concept of traditional paper-based signing and turn it into electronic “fingerprints”, or coded messages, which are unique to both the document and the signer and binds the two together. They are based on international standards that guarantee their secure implementation.
    [Show full text]
  • Electronic Signature Algorithms Standard
    Electronic Signature Algorithms Standard Version: 1.0 Author: Qatar Public Key Infrastructure Section Document Classification: PUBLIC Published Date: June 2018 Electronic Signature Algorithms Standard Version: 1.0 Page 1 of 13 Classification: Public Document Information Date Version Reviewed By 04/06/2018 1.0 Qatar National PKI Team Electronic Signature Algorithms Standard Version: 1.0 Page 2 of 13 Classification: Public Content 1. Overview ......................................................................................................................................... 4 2. Introduction .................................................................................................................................... 4 1. Objective of the document ......................................................................................................... 4 2. Audience ..................................................................................................................................... 4 3. Security properties of electronic signature .................................................................................... 4 4. Hash algorithms .............................................................................................................................. 4 1. Hash functions ............................................................................................................................ 4 2. Hash function properties ...........................................................................................................
    [Show full text]
  • Etsi Ts 119 312 V1.2.1 (2017-05)
    ETSI TS 119 312 V1.2.1 (2017-05) TECHNICAL SPECIFICATION Electronic Signatures and Infrastructures (ESI); Cryptographic Suites 2 ETSI TS 119 312 V1.2.1 (2017-05) Reference RTS/ESI-0019312v121 Keywords e-commerce, electronic signature, security, trust services ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]
  • Electronic Signature Formats
    ETSI TS 101 733 V1.3.1 (2002-02) Technical Specification Electronic signature formats 2 ETSI TS 101 733 V1.3.1 (2002-02) Reference RTS/SEC-004009 Keywords IP, electronic signature, security ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, send your comment to: [email protected] Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. © European Telecommunications Standards Institute 2002. All rights reserved. ETSI 3 ETSI TS 101 733 V1.3.1 (2002-02) Contents Intellectual Property
    [Show full text]
  • The Digital Signature Dilemma Le Dilemme De La Signature Numérique
    Pour publication dans Annales des Télécommunications, Mai/Juin 2006. © Jean-François Blanchette The digital signature dilemma Le dilemme de la signature numérique Jean-François Blanchette* Abstract The last ten years have seen an enormous amount of legal, regulatory, and technological activity aimed at designing a proper electronic equivalent to handwritten signatures. One such design, that of cryptology-based (or digital) signatures, has succeeded over other solutions to the point where, in certain legal systems, such as those of the Member States of the European Union, electronic signatures are almost exclusively understood to be based on public-key cryptography. Yet, several archival institutions (including the National Archives of Canada, Australia and the US) have expressed ambivalence at the prospect of preserving digitally signed records. This paper argues that discrepancies between technical, legal and archival responses to the problem of long-term preservation of digitally signed documents are founded on diverging understandings — physical vs. contextual — of electronic authenticity. Keywords: digital signatures, evidence law, electronic records, archivage, cryptography. Résumé Depuis dix ans, d’énormes efforts ont étés déployés sur le plan juridique, technologique et législatif dans le but d’élaborer un équivalent électronique à la signature manuscrite. Un des mécanismes proposé à cet effet est celui de la ‘signature numérique’, fondé sur les technologies de cryptographie à clé publique. Dans certain systèmes juridiques (p.ex., ceux des États Membres de l’Union Européenne), l’approche cryptographique a rencontré un tel succès auprès des législateurs que la signature électronique s’y comprend presque exclusivement en termes de cette méthode. Néanmoins, plusieurs institutions archivistiques (entre autres, les Archives Nationales du Canada, de l’Australie et des Etats Unis) ont exprimé une certaine ambivalence à l’idée de préserver des documents d’archives signés numériquement.
    [Show full text]
  • 8100.S01 CSU Electronic and Digital Signature Standards and Procedures
    CSU Electronic and Digital Signature Standards and Procedures, 8100.S01 Last Revised: 08/12/16 FINAL CSU Electronic and Digital Signature Standards and Procedures Final REVISION CONTROL Document Title: CSU Digital Signature Standards and Procedures Author: Information Security and Identity Access Management File Reference: CSU Electronic and Digital Signature Standards.docx Revision History Revision Date Revised By Summary of Revisions Section(s) Revised N/A Sheryl Okuno Original Document - LA N/A 08/16/2011 Michael Trullinger Release of New Document Multiple 09/26/2011 Javier Torner Multiple 09/27/2011 Mark Hendricks Multiple 09/29/2011 Michael Trullinger Review – No Significant Additions Multiple 11/04/2011 Mark Hendricks Multiple 11/09/2011 Working Group Multiple 11/09/2011 Michael Trullinger Multiple 11/10/2011 Michael Trullinger & Corrections and Revision Multiple Mark Hendricks 12/14/2011 Michael Trullinger Included feedback from ISAC Multiple 04/27/2012 Michael Trullinger Feedback from OGC, Risk Management, HRM, Audit Multiple 05/21/2012 Michael Trullinger Minor Corrections – 1.0 Release Multiple 07/14/2015 Teresa Macklin 6.0 updated with additional risk assessment criteria Multiple 8.0 updated with additional granularity for Electronic Signatures (Electronic Acknowledgement and Electronic Approval) 04/25/16 Andru Luvisi Minor corrections to section 14.4, 14.5 and Appendix B 5/10/16 5/10/16 William Perry, CISO Reviewed – see comments 8/8/16 Andru Luvisi Reviewed ITAC comments 13.4 Review / Approval History Review Date Reviewed By Action (Reviewed, Recommended or Approved) 4/25/16 William Perry, CISO Reviewed 6/15/16 William Perry, CISO Reviewed: Submitted to ITAC/ISAC Review Timeframe: 06/15/16 until 07/15/16.
    [Show full text]