SSI Eidas Legal Report

Total Page:16

File Type:pdf, Size:1020Kb

SSI Eidas Legal Report SSI eIDAS Legal Report How eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market Dr. Ignacio Alamillo Domingo April – 2020 Blockchain / DLT Technologies EUROPEAN COMMISSION European Commission B-1049 Brussels 2020 SSI eIDAS Legal Report How eIDAS can legally support digital identity and trustworthy DLT-based transactions in the Digital Single Market INTERNAL IDENTIFICATION Specific contracts 003604 and 003491 under Framework Contract DI/07445-00 (STIS IV) DISCLAIMER This document has been prepared for the European Commission, however, it reflects the views only of the authors, and the Commission cannot be held responsible for any use, which may be made of the information contained therein. The work was co-funded by the ISA2 programme, as part of the Innovative Public Services action, and the CEF Digital programme, in the context of the European Blockchain Services Infrastructure building block. The H2020 EU Project OLYMPUS, under Grant 786725, supported part of this work. The author is Dr. Ignacio Alamillo Domingo (Astrea La Infopista Jurídica), Lawyer, CISA, CISM, researcher at iDerTec (University of Murcia). More information on the European Union is available on the Internet (http://www.europa.eu). 2020 2020 SSI eIDAS Legal Report 1 Table of contents TABLE OF CONTENTS ................................................................................................................................... 1 TABLE OF FIGURES ...................................................................................................................................... 3 GLOSSARY OF TERMS AND ACRONYMS ...................................................................................................... 4 PART 1. AN INTRODUCTION TO SELF-SOVEREIGN IDENTITY ........................................................................ 8 1. THE TRANSFORMATION OF DIGITAL IDENTITY ................................................................................... 8 2. SELF-SOVEREIGN IDENTITY .............................................................................................................. 12 3. SSI AND TRUST GOVERNANCE ......................................................................................................... 21 PART 2. THE EIDAS REGULATION............................................................................................................... 23 4. THE LEGAL REGIME OF ELECTRONIC IDENTIFICATION MEANS FOR CROSS-BORDER TRANSACTIONS 25 4.1. LEGAL CONCEPT OF ELECTRONIC IDENTIFICATION (EID) .............................................................................. 26 4.2. THE SCOPE OF THE EIDAS REGULATION AND ITS RELATIONSHIP WITH NATIONAL LAW ....................................... 30 4.3. ELIGIBILITY CRITERIA FOR THE NOTIFICATION OF ELECTRONIC IDENTIFICATION SCHEMES ..................................... 33 4.4. THE LEGAL EFFECT OF NOTIFIED ELECTRONIC IDENTIFICATION MEANS ............................................................ 55 5. THE LEGAL REGIME OF ELECTRONIC SIGNATURES AND ELECTRONIC SEALS ..................................... 60 5.1. ELECTRONIC SIGNATURES AND SEALS ...................................................................................................... 60 5.2. ADVANCED ELECTRONIC SIGNATURES AND SEALS ....................................................................................... 63 5.3. QUALIFIED ELECTRONIC SIGNATURES AND SEALS ....................................................................................... 66 5.4. THE LEGAL EFFECT OF ELECTRONIC SIGNATURES AND SEALS ......................................................................... 71 6. THE LEGAL REGIME OF TRUST SERVICES .......................................................................................... 79 6.1. THE EIDAS CHARACTERISATION OF TRUST SERVICES................................................................................... 79 6.2. THE EIDAS REGULATORY MODEL FOR TRUST SERVICES ............................................................................... 84 6.3. ISSUANCE OF ELECTRONIC SIGNATURE/SEAL/WEBSITE DIGITAL CERTIFICATES ................................................... 86 PART 3. LEGAL SCENARIOS RELATED TO SSI & EIDAS................................................................................. 90 7. GENERAL LEGAL CONSIDERATIONS .................................................................................................. 91 7.1. REGARDING THE LEGAL VALUE OF VERIFIABLE CREDENTIALS AND THEIR PRESENTATIONS .................................... 91 7.2. LEGAL ASSESSMENT OF DIDS, DID DOCUMENTS AND DID CONTROL KEYS ..................................................... 93 8. LEGAL ASSESSMENT OF VERY SHORT-TERM SCENARIOS .................................................................. 95 8.1. USE OF NOTIFIED EIDAS EID MEANS AND QUALIFIED CERTIFICATES TO ISSUE VERIFIABLE CREDENTIALS ................. 95 8.2. EIDAS BRIDGE: INCREASING VERIFIABLE CREDENTIALS’ LEGAL VALUE AND CROSS-BORDER RECOGNITION ............101 8.3. USE CURRENT EID NODES TO ISSUE A SAML ASSERTION BASED IN VERIFIABLE CREDENTIALS/PRESENTATIONS .....104 9. LEGAL ASSESSMENT OF SHORT-TERM SCENARIOS ......................................................................... 106 9.1. USE OF VERIFIABLE IDS AS EIDAS ELECTRONIC IDENTIFICATION MEANS .......................................................106 9.2. ISSUANCE OF QUALIFIED CERTIFICATES BASED ON A SPECIFIC DID METHOD AND VERIFIABLE CREDENTIAL ............112 10. LEGAL ASSESSMENT OF MID- TO LONG-TERM SCENARIOS ............................................................. 118 10.1. EXTEND THE EIDAS NOTIFICATION MECHANISM TO VERIFIABLE ATTESTATIONS: ENHANCED TRUSTED ISSUERS MANAGEMENT ...............................................................................................................................................118 10.2. REGULATE THE ISSUANCE OF VERIFIABLE ATTESTATIONS AS A TRUST SERVICE ................................................124 10.3. REGULATE THE ACTIVITY OF IDENTITY HUBS AS A TRUST SERVICE, IN SUPPORT OF SSI-BASED ONCE ONLY PRINCIPLE 126 10.4. REGULATE DELEGATED KEY MANAGEMENT AS AN INDEPENDENT TRUST SERVICE, IN SUPPORT OF REMOTE WALLETS 130 10.5. REGULATE A SPECIFIC TYPE OF DLT NODE AS A TRUST SERVICE ...................................................................134 2 SSI eIDAS Legal Report REFERENCES ............................................................................................................................................ 138 SSI eIDAS Legal Report 3 Table of figures Figure 1. Relationships between DID, DID document and subject (Reed & Sabadello, 2020) ........................ 15 Figure 2. Verifiable Credentials and Presentations conceptual map (Alamillo Domingo, 2019b). .................. 16 Figure 3. Self-Sovereign Identity Management Model in Blockchain (Bernal Bernabé et al, 2019) ............... 17 Figure 4. Identity management methods evolution over time, according to privacy preservation capabilities (Bernal Bernabé et al, 2019) ................................................................................................................... 17 Figure 5. Proposed taxonomy of crypto-assets (Arslanian & Fischer, 2019) ................................................... 19 Figure 6. Use cases and actors for identity management (Kuperberg, 2019) ................................................... 20 Figure 7. Compliance and liability criteria (Kuperberg, 2019)......................................................................... 20 Figure 8. SSI trust relationship (Mühle et al, 2018) ......................................................................................... 21 Figure 9. Electronic identification conceptual map (Alamillo Domingo, 2016) .............................................. 29 Figure 10. Risk matrix considered in IDABC .................................................................................................. 38 Figure 11. The need to define common authentication assurance levels in STORK ........................................ 39 Figure 12. Relevant factors for QAA levels in STORK ................................................................................... 40 Figure 13. Authentication assurance levels mapping in STORK ..................................................................... 40 Figure 14. eIDAS Regulatory model conceptual map (Alamillo Domingo, 2019a)......................................... 85 Figure 15. Use current eID nodes to issue a SAML assertion based in verifiable credentials/presentations . 105 Figure 16. Use of Verifiable IDs as eIDAS electronic identification means .................................................. 107 Figure 17. Choose your Bitcoin Wallet. ......................................................................................................... 133 Figure 18. DLT System roles and sub-roles (ISO/CD 23257.3) ..................................................................... 135 Figure 19. System view of functional components of a DLT system (ISO/CD 23257.3) .............................. 136 4 SSI eIDAS Legal Report Glossary of terms and acronyms Authoritative Any source irrespective of its form that can be relied upon to source provide accurate data, information and/or evidence that can be used to prove identity (eIDAS Security Regulation). Consumer rights Directive 2011/83/EU of the European Parliament and of the Directive Council of 25 October 2011 on consumer rights, amending Council
Recommended publications
  • Trustedx Eidas Platform Remote Signing for Individuals
    TrustedX eIDAS Platform Remote signing for individuals eIDAS-compliant digital signatures from any device TrustedX eIDAS is an on-premises solution for the deployment of a legally-compliant cloud-based signing service, easily accessible through a Web API. Signing keys are centrally protected within an HSM, and document signatures are approved remotely by users from their device, without the need for a hardware or software token. BENEFITS Provide advanced and qualified signatures as defined by eIDAS TrustedX eIDAS performs signing operations on a Qualified Signature Creation Device (QSCD). When managed by a Qualified Trust Service Provider (QTSP) issuing qualified digital signing certificates, the service can provide advanced and qualified signatures compliant with the eIDAS regulation. Globally accepted signing standards TrustedX eIDAS is based on the ETSI and CEN standards, which guarantee a very high level of trust and broad interoperability with the industry products that require digital signatures, regardless of whether your organization operates in Europe or not. Remove the key management burden from your users The TrustedX eIDAS service was built with user experience in mind. The onboarding and signing process is transparent, does not require specific knowledge, and can be done from any device. The signing service operates in your premises with keys securely stored in an HSM, and users authorize each signature request from their computer or device. Ensure adequate authentication for each type of digital signature User authentication can be done with your existing service, ensuring that access is managed via an Identity Provider (IdP) that you control. When a signature is required, TrustedX can raise the authentication assurance level by sending an additional challenge such as an SMS/email OTP, or via TrustedX Mobile ID app notifications.
    [Show full text]
  • A Guide on Eidas 910/2014 Namirial DTM Solution for Legally Compliant E-Signatures
    A guide on eIDAS 910/2014 Namirial DTM solution for legally compliant e-signatures NAMIRIAL GmbH Legal Office: Seilerstätte 16, 1010 Wien, Austria Main Office: Haider Straße 23, 4025 Ansfelden | Phone: +43-7229-88060 | www.xyzmo.com Fiscalnumber 09 258/9720 | VAT-ID: ATU70125036 Table of Contents 1 What is eIDAS? ............................................................................................................. 3 2 Electronic identification .................................................................................................. 3 3 Electronic signatures and seals ..................................................................................... 4 3.1 Advanced Electronic Signature ............................................................................... 4 3.2 Qualified Electronic Signature................................................................................. 5 4 Time stamping ............................................................................................................... 6 5 Electronic registered delivery service ............................................................................ 7 6 Qualified preservation service ....................................................................................... 7 7 Technologies to implement e-signatures ....................................................................... 7 7.1 PAdES Standard ..................................................................................................... 8 7.1.1 Basic Profile (based on ISO 32000-1)
    [Show full text]
  • E-Szignó Certificate Authority Eidas Conform Qualified Long-Term
    e-Szignó Certificate Authority eIDAS conform Qualified Long-Term Preservation Service Preservation Disclosure Statement ver. 2.19 Date of effect: 2020-12-28 AK-MIN-EN 2.19 OID 1.3.6.1.4.1.21528.2.1.1.198.2.19 Version 2.19 First version date of effect 2016-07-01 Security classification PUBLIC Approved by Gergely Vanczák Date of approval 2020-12-11 Date of effect 2020-12-28 Microsec Micro Software Engineering & Consulting Private Company Limited by Shares Hungary, H-1033 Budapest, Ángel Sanz Briz str. 13. 2 AK-MIN-EN 2.19 Version Effect date Description 2.0 2016-07-01 New, eIDAS conform preservation policy. 2.1 2016-09-05 Changes according to the NMHH comments. 2.2 2016-10-30 Changes according to the auditor comments. 2.3 2017-04-30 Changes according to the NMHH comments. 2.4 2017-09-30 Yearly revision. 2.6 2018-03-24 Global revision. Smaller improvements. 2.7 2018-09-15 Yearly revision. 2.8 2018-12-14 Changes based on the suggestions of the auditor. 2.11 2019-09-25 Yearly revision. 2.13 2020-03-05 Effect. HSM requirements. Smaller improvements of wording. 2.14 2020-05-26 Smaller improvements. 2.17 2020-10-28 Rewriting according to the requirements of ETSI TS 119 511. | Improvements according to the auditor’s and the supervisory body’s findings. | Smaller improvements. 2.19 2020-12-28 Smaller improvements. c 2020, Microsec ltd. All rights reserved. 3 TABLE OF CONTENTS AK-MIN-EN 2.19 Table of Contents 1 Introduction 5 1.1 DocumentNameandIdentification .
    [Show full text]
  • Eidas and E-SIGNATURE a LEGAL PERSPECTIVE: ELECTRONIC SIGNATURES in the EUROPEAN UNION
    eIDAS AND E-SIGNATURE A LEGAL PERSPECTIVE: ELECTRONIC SIGNATURES IN THE EUROPEAN UNION WHITE PAPER TABLE OF CONTENTS Part 1: Introduction 3 Key Highlights of the eIDAS Regulation 4 Legal Effect of Different Types of Signatures 6 Regulation of Trust Services 7 Legal Best Practices 8 Part 2: Compliance With the Regulation 9 Advanced Electronic Signatures 9 Qualified Electronic Signatures 10 Format Standards 12 Additional Evidence 12 Conclusion 13 E-Signature Solution Checklist 14 About the Authors This paper is a collaboration between Lorna Brazell of Osborne Clarke LLP and OneSpan. In part one, Osborne Clarke provides a legal opinion on the legal validity of electronic signature in the European Union. Part two has been prepared by OneSpan, and summarizes best practices recommendations for legal compliance when implementing e-signatures. eIDAS & E-SIGNATURE: A LEGAL PERSPECTIVE FOLLOW US 2 PART 1 Introduction The 2014 Regulation on Electronic Identification and Trust Services for Electronic Transaction in the Internal Market1 (“eIDAS”) went into effect throughout the European Union (“EU”) on 1 July 2016, replacing the 1999 Directive on electronic signatures2 (“the Directive”). Although the Directive had not been the subject of any disputes in its 16-year history, neither had it been a success. Its objective, to enable the widespread use of electronic signatures to conduct business across borders within the EU, was not met. There Are Three Key Reasons for This: I. Most EU Member States’ laws do not specify any form of signature for commercial contracts other than guarantees or contracts assigning real property. II. Many people mistakenly believed that the Directive mandated the use of advanced electronic signatures supported by a qualified certificate3 in order for an electronic signature to be legally effective.
    [Show full text]
  • Eidas Regulation Questions & Answers
    eIDAS Regulation Questions & Answers on rules applicable to Trust Services as of 1 July 2016 The eIDAS Regulation (Regulation (EU) N°910/2014) on electronic identification and trust services for electronic transactions in the internal market (eIDAS Regulation) adopted by the co-legislators on 23 July 2014 is a milestone as it provides a predictable regulatory environment for electronic identification and trust services, including electronic signatures, seals, time stamps, registered delivery and website authentication. As of 1 July 2016, the provisions applicable to trust services apply directly in the 28 Member States. This means that trust services under eIDAS are no longer regulated by national laws. As a result, the qualified trust services are recognised independently of the Member State where the Qualified Trust Service Provider is established or where the specific qualified trust service is offered. What’s new? What changes with regard to the former eSignature Directive? What must be done at national level? How does it impact market operators? How does it benefit the users (citizens, businesses and public administrations)? What has the Commission done to facilitate the switchover? These questions and many others have been asked along the road since the adoption. We have compiled this Q&A document to help those of you who need to fully understand the new legal framework in order to implement it or reap the benefits of electronic transactions, as well as those of you who are curious about the Regulation’s various implications. I. What is new? How will the legal effect of electronic signature change under eIDAS (compared to the regime under the eSignature Directive) as from 1 July 2016? Since 1 July 2016, when the trust services’ provisions under the eIDAS Regulation entered into application, an electronic signature can only be used by a natural person to “sign”, i.e.
    [Show full text]
  • Managed QES Service with Internationally Recognized Legal and Privacy Assurances Selected Signing Service - Powered by Cryptomathic and Swisscom Trust Services
    Solution Brief Managed QES Service with Internationally Recognized Legal and Privacy Assurances Selected Signing Service - Powered by Cryptomathic and Swisscom Trust Services Qualified remote signing and Solution benefits WYSIWYS service The best way to deliver Qualified Electronic Signature ü Offer Advanced or Qualified Electronic (QES) services across different channels is to use Signatures compliant with the Swiss remote signing technology. It integrates smoothly signature law, ZertES, and the EU eIDAS with any web application and does not require any regulation on trust services. software install, plug in or additional components and ü Extend the use of Qualified Electronic can be used anywhere, at any time, from any device Signatures outside EU and Switzerland with browsing capacity. Qualified remote signing by using a Third Party CA. The private provides the highest legal value and international signature keys are kept securely in acceptance, while What You See Is What You Sign Switzerland and signing is done in Swiss (WYSIWYS) technology delivers a seamless user Data Centers on behalf of Third Party experience with strong non-repudiation. Combining Certificates. QES with WYSIWYS is a strong enabler for businesses ü to provide ultimate security, trust and convenience Improve the users’ signing experience with online transactions. This is exactly what the joint for all channels including web portals, Selected Signing Service offers, namely the possibility desktop applications, mobile & tablet to offer Advanced or Qualified Electronic Signatures platforms. using a zero-footprint remote signing hosted service, ü Demonstrate unrivalled non- featuring WYSIWYS functionality. repudiation with WYSIWYS funcionality. ü Solve data privacy problems as the Non-repudiation and convenience document remains in the domain of the Non-repudiation is critical for maintaining security application provider.
    [Show full text]
  • OVERVIEW of STANDARDS Specifying Formats of Advanced Electronic Signatures and Seals
    OVERVIEW OF STANDARDS Specifying formats of advanced electronic signatures and seals DECEMBER 2019 OVERVIEW OF STANDARDS December 2019 ABOUT ENISA The mission of the European Union Agency for Cybersecurity (ENISA) is to achieve a high common level of cybersecurity across the Union, by actively supporting Member States, Union institutions, bodies, offices and agencies in improving cybersecurity. We contribute to policy development and implementation, support capacity building and preparedness, facilitate operational cooperation at Union level, enhance the trustworthiness of ICT products, services and processes by rolling out cybersecurity certification schemes, enable knowledge sharing, research, innovation and awareness building, whilst developing cross-border communities. Our goal is to strengthen trust in the connected economy, boost resilience of the Union’s infrastructure and services and keep our society cyber secure. More information about ENISA and its work can be found at www.enisa.europa.eu. CONTACT For contacting the authors please use [email protected] For media enquiries about this paper, please use [email protected] LEGAL NOTICE Notice must be taken that this publication represents the views and interpretations of ENISA, unless stated otherwise. This publication should not be construed to be a legal action of ENISA or the ENISA bodies unless adopted pursuant to the Regulation (EU) No 2019/881. This publication does not necessarily represent state-of the-art and ENISA may update it from time to time. Third-party sources are quoted as appropriate. ENISA is not responsible for the content of the external sources including external websites referenced in this publication. This publication is intended for information purposes only.
    [Show full text]
  • What You Need to Know About PSD2 Certificate Compliance
    PSD2 certificate compliance What you need to know about PSD2 certificate compliance A new regulatory standard in the EU mandates additional security measures for banks and Payment Service Providers, including the use of special Qualified digital certificates. PSD2 certificate compliance What is the revised Payment Services Directive (PSD2)? As part of a long-time effort to increase the security, digital certificates, the validation of their holders’ privacy and reliability of electronic payments crossing identity, and the operation of the Qualified Trust Service the borders of EU nations, the European Commission Providers (TSPs) that issue them. developed the revised Payment Services Directive (EU Directive 2015/2366, also known as PSD2) which came Certificates issued by Qualified TSPs in accordance into effect in January 2018. with eIDAS standards are known as “Qualified Certificates,” and provide special status in certain legal The directive is intended to… and regulatory contexts across the EU. • Contribute to a more integrated and efficient European Why do I need Qualified payments market certificates for PSD2? • Create a level playing field for Payment Service Under PSD2 digital certificates are used to identify Providers (PSPs) across the EU banks and PSPs, to verify the roles for which they are licensed, to encrypt communications, and, in • Make electronic payments more secure some cases, to provide tamperproof seals on data or transactions. • Provide more consistent consumer protection Due to the sensitivity of financial services transactions, the PSD2 Regulatory Technical Standards (RTS) specify PSD2 covers many facets of the electronic payments that only eIDAS certificates issued by a Qualified market, but notably introduces enhanced privacy and Trust Service Provider (TSP) may be used for the online security measures that must be implemented by identification of PSPs.
    [Show full text]
  • As a Leading Trust Service Provider in Europe, We Enable the Most Innovative Digital Business Models
    As a leading trust service provider in Europe, we enable the most innovative digital business models. Swisscom Trust Services makes Mobile ID internationally available with the app version and expands the signature portfolio Mobile ID enables digital expressions of intent using two-factor authentication // Fully integrated signature solution shortens go-to-market from several months to 2-3 weeks Frankfurt, 20th April 2020 - Swisscom Trust Services, the only European provider of a qualified electronic signature in accordance with eIDAS and ZertES, is now offering its Mobile ID authentication solution not only in Switzerland but also internationally in the form of a smartphone app. In contrast to the Swiss market, the Mobile ID app is independent of the SIM card and the mobile network and uses either the biometric functions of the smartphone or the device PIN for authentication if the biometric cap- ture does not work or is not supported by the device. Swisscom Trust Services thus of- fers all components for a qualified electronic signature in accordance with eIDAS from a single source, which in many cases is legally equivalent to a manual signature. "With the expansion of Mobile ID beyond Switzerland, we now offer a complete pack- age for the electronic signature internationally. This enables companies and partners to integrate a complete signature solution into their processes in two to three weeks and thus to digitise themselves more quickly," says Marco Schmid, Head of Interna- tional Expansion Strategy at Swisscom Trust Services. "At the same time, our offer is flexible enough to integrate proprietary identification or authentication solutions ret- rospectively.
    [Show full text]
  • Qualified Electronic Signature / Seal Creation Devices
    Prime minister Agence nationale de la sécurité des systèmes d’information Qualified electronic signature / seal creation devices Criteria for assessing compliance with the eIDAS regulation Based on French version 1.0 of 16 November 2017 VERSION HISTORY DATE VERSION DOCUMENT CHANGES EDITOR 20/06/2016 0.9 Working version for comments. ANSSI Version for application on 16 November 2017. Amendments: 16/11/2017 - Addition of contact details of ANSSI; ANSSI 1.0 - Details on certification maintenance ; - Definitions of the sponsor certification commitments Comments on this document should be sent to: Agence nationale de la sécurité des systèmes d’information SGDSN/ANSSI 51 boulevard de La Tour-Maubourg 75700 Paris 07 SP [email protected] Creation devices for qualified electronic signatures and seals – Criteria for assessing compliance with the eIDAS regulation Version Date Circulation criterion Page 1.0 16/11/2017 PUBLIC 2/14 CONTENTS I. Introduction ........................................................................................................................................................ 4 I.1. Subject ........................................................................................................................................................ 4 I.2. Legal framework ......................................................................................................................................... 4 I.3. Updating ....................................................................................................................................................
    [Show full text]
  • Adopt Digital Signatures to Achieve End-To-End Digital Banking
    Bridge the gap: adopt legally - binding digital signatures to achieve e n d -to-end digital banking. A fully digital customer experience thanks to the Swiss and European Union compliant signing solution - making the digital agreement process seamless and user-friendly © AdNovum Informatique SA. All rights reserved. Tapping the last mile in the customer's digital journey An AdNovum IT Consulting white paper About AdNovum IT Consulting AdNovum has been designing, implementing and maintaining high-quality software solutions for companies and authorities for almost 25 years. We impart the knowledge and experience gained from our projects to our customers in the form of advice. We provide manufacturer-independent and product-independent support for complex IT projects. Our range of services includes all solution levels, from technical questions to process design to IT strategy consultation. Mobile Computing is one of the core areas of IT consulting services provided by AdNovum. http://www.adnovum.ch/ About the author Leo Bolshanin joined AdNovum in 2017 after leaving the Security company he founded. He offers 15 years of proven track record in Cybersecurity and possesses solid experience in security consultancy, technology leadership, team and project management. Version 1.0, May 2012 2/8 Tapping the last mile in the customer's digital journey An AdNovum IT Consulting white paper Highlights In addition to conventional communication with their Relationship Manager, customers look for a fully digital experience from their bank. When using client facing digital apps, they remain very sensitive to information security, but at the same time, they expect ease of use and quick execution.
    [Show full text]
  • Adobe Sign and Eidas Compliance
    ADOBE SIGN Compliance with European electronic signatures legislation December 2016 TABLE OF CONTENTS 1 Introduction _____________________________________________________________________ 1 2 Regulatory framework _____________________________________________________________ 1 2.1 eIDAS Regulation __________________________________________________________________ 1 2.1.1 Standard electronic signatures ___________________________________________________ 2 2.1.2 Advanced electronic signatures __________________________________________________ 3 2.1.3 Qualified electronic signatures ___________________________________________________ 4 2.2 Validity and enforceability of electronic agreements ________________________________________ 5 3 Compliance assessment of Adobe Sign _______________________________________________ 6 3.1 Description of Adobe Sign ____________________________________________________________ 6 3.2 How Adobe Sign can support eIDAS compliance __________________________________________ 9 3.2.1 Adobe Sign meets the European requirements of standard electronic signatures ____________ 9 3.2.2 Adobe Sign and advanced electronic signatures ____________________________________ 10 3.2.3 Adobe Sign and qualified electronic signatures _____________________________________ 12 4 Conclusion _____________________________________________________________________ 14 5 About the Author ________________________________________________________________ 16 ADOBE SIGN December 2016 DLA Piper 1 INTRODUCTION This white paper assesses the legal effectiveness
    [Show full text]