Archivo del Autor: inza

Avatar de Desconocido

Acerca de inza

Presidente de EAD TRUST, Prestador Cualificado de Servicios Electrónicos de Confianza EIDAS del Grupo Garrigues. Director del Laboratorio de Identidad Digital del Observatorio Legaltech y Newlaw Garrigues - ICADE. Miembro del Grupo de Expertos ENISA Ad Hoc Working Group on EU Digital Identity Wallets Cybersecurity Certification, Presidente de la Comisión Blockchain de AMETIC. Colaboró con la DGTDAJ y el CTEAJE (Justicia) a través de Procesia. Fue Auditor Jefe en TCAB, organismo de Evaluación de Conformidad EIDAS. Pionero de la certificación digital y de la banca electrónica. Fue Vicepresidente de Mobipay (entidad de pagos móviles de BBVA), Director General de Camerfirma y de FESTE (CA de los Notarios) y Director de Redes Distribuidas en Banesto EFT y en Banesto. Fue el primer presidente de AECODI, Asociación del Sector de los Servicios de Confianza Digital.

Regulation on electronic identification and trust services for electronic transactions in the internal market


Hace unos dias se ha publicado el Reglamento de Identificación Electrónica y Servicios de Confianza en el Mercado Interior, de lo que di cuenta en un post anterior.

Lo transcribo como recordatorio futuro, porque frecuenteemente, una vez pulicada una norma dejan de estar accesibles los borradores.

EUROPEAN COMMISSION

Brussels, XXX
COM(2012) 238/2

Proposal for a  REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL  on electronic identification and trust services for electronic transactions in the internal  market

(Text with EEA relevance)

{SWD(2012) 135}
{SWD(2012) 136}

 EXPLANATORY MEMORANDUM

1. CONTEXT OF THE PROPOSAL

This memorandum explains a proposed legal framework designed to enhance trust in electronic transactions in the internal market.

Building trust in the online environment is key to economic development. Lack of trust makes  consumers, businesses and administrations hesitate to carry out transactions electronically and to adopt new services.

The Digital Agenda for Europe identifies existing barriers to Europe’s digital development  and proposes legislation on e-signatures (Key Action 3) and the mutual recognition of e- identification and authentication (Key Action 16), establishing a clear legal framework so as  to eliminate fragmentation and the lack of interoperability, enhance digital citizenship and  prevent cybercrime. Legislation ensuring the mutual recognition of electronic identification  and authentication across the EU and review the Directive on Electronic Signatures is also a  key action in the Single Market Act2, for the realisation of the digital single market. The  Roadmap for Stability and Growth3 underlines the key role for the development of the digital  economy of the future common legal framework for the mutual recognition and acceptance of  electronic identification and authentication across borders.

The proposed legal framework, consisting of a ‘Regulation of the European Parliament and  of the Council on electronic identification and trust services for electronic transactions in the  internal market’, seeks to enable secure and seamless electronic interactions between  businesses, citizens and public authorities, thereby increasing the effectiveness of public and  private online services, e-business and electronic commerce in the EU.

The existing EU legislation, namely Directive 1999/93/EC on a ‘Community framework for  electronic signatures’ , essentially covers electronic signatures only. There is no  comprehensive EU cross-border and cross-sector framework for secure, trustworthy and easy- to-use electronic transactions that encompasses electronic identification, authentication and  signatures.

The aim is to enhance existing legislation and to expand it to cover the mutual recognition and  acceptance at EU level of notified electronic identification schemes and other essential related  electronic trust services.

2. RESULTS OF CONSULTATIONS WITH INTERESTED PARTIES AND  IMPACT ASSESSMENTS

This initiative is the result of extensive consultations on a review of the current legal  framework on electronic signatures in the course of which the Commission gathered feedback   from Member States, the European Parliament and other stakeholders . An online public  consultation was complemented by an ‘SME Test Panel’ to identify the specific views and  needs of SMEs; and other targeted consultations with stakeholders6,7. The Commission also  launched a number of studies in relation to electronic identification, authentication, signature  and related trust services (eIAS).

The consultations made clear that a large majority of stakeholders agreed on the need to  review the current framework to fill the gaps left by the electronic signature Directive. It was  felt that this would better respond to challenges posed by the rapid development of new  technologies (particularly online and mobile access) and by increased globalisation, while
maintaining the technological neutrality of the legal framework.

In line with its ‘Better Regulation’ policy, the Commission conducted an impact assessment  of policy alternatives. Three sets of policy options were assessed, dealing respectively with  (1) the scope of the new framework, (2) the legal instrument and (3) the level of supervision   required . The preferred policy option proved to be enhancing legal certainty, boosting  coordination of national supervision, ensuring mutual recognition and acceptance of electronic identification schemes and incorporating essential related trust services. The impact  assessment concluded that doing this would lead to considerable improvements to legal  certainty, security and trust in terms of cross-border electronic transactions, resulting in less  fragmentation of the market.

 3. LEGAL ELEMENTS OF THE PROPOSAL

3.1 Legal Basis

This proposal is based on Article 114 TFEU, which concerns the adoption of rules to remove  existing barriers to the functioning of the internal market. Citizens, businesses and  administrations will be able to benefit from the mutual recognition and acceptance of  electronic identification, authentication, signatures and other trust services across borders  when needed for the access and completion of electronic procedures or transactions.

A Regulation is considered to be the most appropriate legal instrument. The direct  applicability of a Regulation pursuant to Article 288 TFEU will reduce legal fragmentation  and provide greater legal certainty by introducing a harmonised set of core rules contributing  to the functioning of the internal market.

3.2 Subsidiarity and proportionality

In order for EU action to be justified, the subsidiarity principle must be respected:

a) Transnational nature of the problem (necessity test)

The transnational nature of eIAS requires EU action. Domestic (i.e. national) action alone  would not suffice to meet the objectives, nor achieve the targets set out in the Europe 2020   Strategy . Conversely, experience has shown that national measures have de facto created  barriers to the EU-wide interoperability of electronic signatures, and that they are currently  having the same effect on electronic identification, electronic authentication and related trust  services. It is therefore necessary for the EU to create an enabling framework to address  cross-border interoperability and to improve the coordination of national supervision schemes.

 However, electronic identification cannot be addressed in the proposed Regulation in the  same generic manner as the other trust electronic services because issuing means of  identification is a national prerogative. The proposal therefore focuses strictly on cross-border  aspects of electronic identification.

The proposed Regulation creates a level playing field for businesses providing trust services  where the currently existing differences in national legislation often lead to legal uncertainty  and additional burden. Legal certainty is significantly increased through clear acceptance  obligations by Member States of qualified trust services which will create additional incentive  for businesses to go abroad. For example a company will be able to participate electronically to a public call for tenders launched by the administration of a different Member State without  its electronic signature being blocked due to specific national requirements and  interoperability problems. Similarly, a company will have the opportunity to sign contracts  electronically with a counterpart based in a different Member State without fearing different  legal requirements for trust services such as electronic seals, electronic documents or time  stamping. Finally, a notice of default will be delivered from one Member State to another with  the certainty of its legal validity in both Member States. Finally, online commerce will be  more trustworthy when shoppers will have the means to verify that they indeed access the  website of the merchant of their choice instead of a possibly fake website.

Mutually recognised electronic identification means and widely accepted electronic signatures  will facilitate cross-border provision of numerous services in the internal market and enable  businesses to go cross-border without facing obstacles in interactions with public authorities.

 In practice this will mean significant efficiency improvements both for businesses and citizens  when complying with the administrative formalities. For example, giving the opportunity to a  student to enrol electronically in a university abroad, to a citizen to submit tax declaration  online to another Member State or to a patient to access his or her health data online. If there  is no such mutually recognised electronic identification means, a doctor will not be able to  access the patient medical data needed to treat him or her and the medical and laboratory tests  that the patient has already undertaken will have to be repeated.

b) Added value (effectiveness test)

The objectives outlined above are currently not being achieved by voluntary coordination  among Member States, nor is this reasonably likely to happen in the future. This leads to  duplication of efforts, setting different standards, transnational characteristics of the spill- overs generated by ICT, and administrative complexity of establishing such coordination by  way of bilateral and multilateral agreements.

In addition, the need to overcome such problems, as (a) an absence of legal certainty due to  heterogeneous national provisions stemming from divergent interpretations of the electronic  signature Directive and (b) a lack of interoperability of the electronic signature systems set up  at national level due to the non-uniformly application of technical standards, requires the kind  of coordination across EU Member States which can be done more effectively at the EU level.

3.3 Detailed explanation of the proposal

 3.3.1 CHAPTER I – GENERAL PROVISIONS

Article 1 defines the subject matter of the Regulation.

Article 2 defines the material scope of the Regulation.

Article 3 contains definitions of the terms used in the Regulation. While some definitions are  taken over from Directive 1999/93/EC, others are clarified, complemented with additional  elements, or newly introduced.

Article 4 determines the internal market principles with regard to the territorial application of  the Regulation. Explicit mention is made of the imposition of no restrictions on the freedom  to provide services and the free circulation of products.

3.3.2 CHAPTER II – ELECTRONIC IDENTIFICATION

Article 5 provides for the mutual recognition and acceptance of electronic identification  means falling under a scheme which will be notified to the Commission on the conditions laid  down in the Regulation. Most EU Member States have introduced some form of electronic  identification system. However, they differ in many aspects. The lack of a common legal basis  requiring each Member State to recognise and accept electronic identification means issued in  other Member States to access online services, along with the inadequate cross-border  interoperability of national electronic identifications, creates barriers which prevent citizens  and businesses from benefiting fully from the digital single market. The mutual recognition  and acceptance of any electronic identification means falling under a notified scheme under  this Regulation removes these legal barriers.

The Regulation does not oblige Member States to introduce or notify electronic identification  schemes, but to recognise and accept notified electronic identifications for those online  services where electronic identification is required to get access at national level. The  potential increase of economies of scale created through the cross-border use of notified electronic identification means and authentication systems may stimulate Member States to  notify to their electronic identification schemes.Article 6 sets out the five conditions for the  notification of electronic identification schemes:

Member States can notify the electronic identification schemes that they accept under their  jurisdiction where electronic identification is required for public services. A further  requirement is that the respective electronic identification means must be issued by, on behalf  of or at least under the responsibility of the Member State notifying a scheme.

Member States must ensure an unambiguous link between the electronic identification data  and the person concerned. This obligation does not mean that a person cannot have multiple  electronic identification means, but they must all link to the same person.

The reliability of an electronic identification depends on the availability of means of  authentication (i.e. the possibility to check the validity of the electronic identification data).  The Regulation obliges the notifying Member States to provide online authentication free of charge vis-à-vis third parties. The authentication possibility must be available without  interruption. No specific technical requirements, such as hardware or software can be imposed  on the parties relying on such authentication. This provision does not apply to any  requirements vis-à-vis the users (holders) of the electronic identification means that are  technically necessary for the use of the electronic identification means, such as card readers.

Member States must accept liability for the unambiguity of the link (i.e. that the identification  data attributed to the person are not linked to any other person) and the authentication  possibility (i.e. the possibility to check the validity of the electronic identification data). The  liability of Member States does not cover other aspects of the identification process or any  transaction that requires identification.

Article 7 contains rules on notifying the Commission of electronic identification schemes.

Article 8 aims to ensure the technical interoperability of the notified identification schemes  through a coordination approach, including delegated acts.

 3.3.3 CHAPTER III – TRUST SERVICES

3.3.3.1 Section 1 – General provisions

Article 9 sets out the principles relating to the liability of both non-qualified and qualified  trust service providers. It builds on Article 6 of Directive 1999/93/EC and extends entitlement  to compensation of damage caused by any negligent trust service provider for failure to  comply with security good practices which result in a security breach which has a significant  impact on the service.

Article 10 describes the mechanism for the recognition and acceptance of qualified trust  services provided by a provider established in a third country. It builds on Article 7 of  Directive 1999/93/EC but retains only the sole practically feasible option which is to allow  such recognition under an international agreement between the European Union and third  countries or international organisations.

Article 11 sets out the principles of data protection and minimisation. It builds on Article 8 of  Directive 1999/93/EC.

Article 12 makes trust services accessible to disabled people.

3.3.3.2 Section 2 – Supervision

Article 13 obliges Member States to establish supervisory bodies, based on Article 3(3) of Directive 1999/93/EC, clarifying and enlarging their remit with regard to both trust service providers and qualified trust service providers.

Article 14 introduces an explicit mechanism of mutual assistance between supervisory bodies in Member States to facilitate the cross-border supervision of trust service providers. It introduces rules on joint operations and supervisory authorities’ right to participate in such operations.

Article 15 introduces an obligation for both qualified and non-qualified trust service providers to implement appropriate technical and organisational measures for the security of their activities. Furthermore, the competent supervisory bodies and other relevant authorities must be informed of any security breaches. If appropriate, they will in turn inform other Member States’ supervisory bodies and will, directly or via the trust service provider concerned, inform the public.

Article 16 sets out the conditions for the supervision of qualified trust service providers and qualified trust services provided by them. It obliges qualified trust service providers to be audited on a yearly basis by a recognised independent body to confirm to the supervisory body that they fulfil the obligations laid down in the Regulation. Moreover, Article 16(2) gives the supervisory body the right to carry out on-the-spot audits of the qualified trust service providers at any time. The supervisory body is also empowered to issue binding instructions to qualified trust service providers to remedy, in a proportionate manner, any failure to meet an obligation revealed by a security audit.

Article 17 concerns the activity carried out by the supervisory body at the request of a trust service provider wishing to initiate a qualified trust service.

Article 18 provides for the establishment of trusted lists10 containing information on qualified trust service providers who are subject to supervision and to the qualified services they offer.

This information must be made publicly available through a common template in order to facilitate its automated use and ensure an appropriate level of detail.

Article 19 sets out the requirements the qualified trust service providers must meet in order to be recognised as such. It draws on Annex II of Directive 1999/93/EC.

3.3.3.3 Section 3 – Electronic signature

Article 20 enshrines the rules related to the legal effect of natural persons’ electronic signatures. It clarifies and expands Article 5 of Directive 1999/93/EC introducing an explicit obligation to give to qualified electronic signatures the same legal effect as handwritten signatures. Moreover, Member States must ensure the cross-border acceptance of qualified electronic signatures, in the context of the provision of public services, and they must not introduce any additional requirements which might result in barriers to the use of such signatures.

Article 21 sets out the requirements for qualified signature certificates. It clarifies Annex I of Directive 1999/93/EC and removes provisions which did not work in practice (e.g. limitations on transactions value).

Article 22 sets out the requirements for qualified electronic signature creation devices. It clarifies the requirements for secure signature creation devices laid down in Article 3(5) of Directive 1999/93/EC, which now have to be considered as qualified signature creation devices under this Regulation. It also makes it clear that the scope of a signature creation
device can be much wider than just something containing signature creation data. The Commission may also establish a list of reference numbers of standards for security requirements on devices.

Article 23, building on Article 3(4) of Directive 1999/93/EC, introduces the concept of certification of qualified electronic signature devices to determine their conformity with the security requirements laid down in Annex II. These devices must be recognised by all Member States as matching the requirements when a certification procedure is conducted by a certification body designated by a Member State. The Commission will publish a positive list of such certified devices according to Article 24. The Commission may also establish a list of reference numbers of standards for the security assessment of information technology products referenced in Article 23(1).

Article 24 concerns publication of a list of qualified electronic signature creation devices by the Commission after notification of conformity by the Member States.

Article 25 builds on the recommendations of Annex IV of Directive 1999/93/EC to lay down binding requirements for the validation of qualified electronic signatures with a view to increasing the legal certainty of such a validation.

Article 26 sets out the conditions for qualified validation services.

Article 27 sets out the condition for the long-term preservation of qualified electronic signatures. This is possible due to the use of procedures and technologies capable of extending the trustworthiness of the qualified electronic signature validation data beyond the time of their technological validity when forgery may become easy to do for cyber criminals.

3.3.3.4 Section 4 – Electronic seals

Article 28 concerns the legal effect of electronic seals of legal persons. A specific legal presumption is bestowed on a qualified electronic seal which guarantees the origin and integrity of electronic documents to which it is linked.

Article 29 sets out the requirements for qualified certificates for electronic seals.

Article 30 sets out the requirements for and certification and publication of list for the qualified electronic seal creation devices.

Article 31 sets out the condition of validation and preservation of qualified electronic seals.

3.3.3.5 Section 5 – Electronic time stamp

Article 32 concerns the legal effect of electronic time stamps. A specific legal presumption is bestowed on qualified electronic time stamps with regard to the certainty of the time.

Article 33 sets out the requirements for qualified electronic time stamps.

3.3.3.6 Section 6 – Electronic documents

Article 34 is related to the legal effects and the conditions of acceptance of electronic
documents. There is a specific legal presumption of the authenticity and integrity of any electronic document signed with a qualified electronic signature or bearing a qualified electronic seal. With regard to the acceptance of electronic documents, when an original document or a certified copy is required for the provision of a public service, at least electronic documents issued by the persons who are competent to issue the relevant documents and that are considered to be originals or certified copies in accordance with national law of the Member State of origin, shall be accepted in other Member States without additional requirements.

3.3.3.7 Section 7 – Electronic delivery services

Article 35 concerns the legal effect of data sent or received using an electronic delivery service. A specific legal presumption regarding the integrity of data which are sent or received and the accuracy of the time on which the data are sent or received is guaranteed for qualified electronic delivery services. It also ensures the mutual recognition of qualified electronic delivery services at EU level.

Article 36 sets out the requirements for qualified electronic delivery services.

3.3.3.8 Section 8 – Website authentication

This section is intended to ensure that the authenticity of a website with respect to the owner of the site will be guaranteed.

Article 37 sets out the requirements for qualified certificates for website authentication, which can be used to guarantee the authenticity of a website. A qualified certificate for website authentication will provide a minimal set of trustworthy information on the website and on the legal existence of its owner.

3.3.4 CHAPTER IV – DELEGATED ACTS

Article 38 contains the standard provisions for exercising the delegations in line with Article 290 TFEU (delegated acts). This allows the legislator to delegate to the Commission the power to adopt non-legislative acts of general application to supplement or amend certain non-essential elements of a legislative act.

3.3.5 CHAPTER V – IMPLEMENTING ACTS

Article 39 contains the provision covering the Committee procedure needed to confer implementing powers on the Commission wherever, in accordance with Article 291 TFEU, uniform conditions for implementing legally binding acts of the Union are needed. The examination procedure applies.

3.3.6 CHAPTER VI – FINAL PROVISIONS

Article 40 obliges the Commission to evaluate the Regulation and report on its findings.

Article 41 repeals Directive 1999/93/EC and provides for the smooth transition of the existing electronic signature infrastructure to the new requirements of the Regulation.

Article 42 sets out the date of the entry into force of the Regulation.

4. BUDGETARY IMPLICATIONS

The specific budgetary implications of the proposal relate to the tasks allocated to the European Commission as specified in the legislative financial statements accompanying this proposal.

The proposal has no implications on operational expenditure.

The legislative financial statement accompanying this proposal for a Regulation covers the budgetary impacts for the Regulation itself.

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL  on electronic identification and trust services for electronic transactions in the internal  market

(Text with EEA relevance)

THE EUROPEAN PARLIAMENT AND THE COUNCIL OF THE EUROPEAN UNION,

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 114 thereof,

Having regard to the proposal from the European Commission,

After transmission of the draft legislative act to the national Parliaments,

Having regard to the opinion of the European Economic and Social Committee11,

After consulting the European Data Protection Supervisor12,

Acting in accordance with the ordinary legislative procedure,

Whereas:

(1) Building trust in the online environment is key to economic development. Lack of trust makes consumers, businesses and administrations hesitate to carry out transactions electronically and to adopt new services.

(2) This Regulation seeks to enhance trust in electronic transactions in the internal market by enabling secure and seamless electronic interactions to take place between businesses, citizens and public authorities, thereby increasing the effectiveness of public and private online services, electronic business and electronic commerce in the Union.

(3) Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures13, essentially covered electronic signatures without delivering a comprehensive cross-border and cross-sector framework for secure, trustworthy and easy-to-use electronic transactions. This Regulation enhances and expands the acquis of the Directive.

(4) The Commission’s Digital Agenda for Europe14 identified the fragmentation of the digital market, the lack of interoperability and the rise in cybercrime as major obstacles to the virtuous cycle of the digital economy. In its Citizenship Report 2010 the Commission further highlighted the need to solve the main problems which prevent European citizens from enjoying the benefits of a digital single market and cross-border digital services15.

(5) The European Council invited the Commission to create a digital single market by 2015 to make rapid progress in key areas of the digital economy and to promote a fully integrated digital single market17 by facilitating the cross-border use of online services, with particular attention to facilitating secure electronic identification and authentication.

(6) The Council invited the Commission to contribute to the digital single market by creating appropriate conditions for the mutual recognition of key enablers across borders, such as electronic identification, electronic documents, electronic signatures and electronic delivery services, and for interoperable eGovernment services across
the European Union.

(7) The European Parliament stressed the importance of the security of electronic services, especially of electronic signatures, and of the need to create a public key infrastructure at pan-European level, and called on the Commission to set up a European validation authorities gateway to ensure the cross-border interoperability of electronic signatures and to increase the security of transactions carried out using the internet.

(8) Directive 2006/123/EC of the European Parliament and of the Council of 12 December 2006 on services in the internal market20 requests Member States to establish ‘points of single contact’ (PSC) to ensure that all procedures and formalities relating to access to a service activity and to the exercise thereof can be easily completed, at a distance and by electronic means, through the appropriate point of single contact and with the appropriate authorities. Many online services accessible through PSCs require electronic identification, authentication and signature.

(9) In most cases service providers from another Member State cannot use their electronic identification to access these services because the national electronic identification schemes in their country are not recognised and accepted in other Member States. This electronic barrier excludes service providers from enjoying the full benefits of the internal market. Mutually recognized and accepted electronic identification means will facilitate cross-border provision of numerous services in the Internal Market and enable businesses to go cross-border without facing many obstacles in interactions
with public authorities

(10) Directive 2011/24/EU of the European Parliament and of the Council of 9 March 2011 on the application of patients’ rights in cross-border healthcare21 sets up a network of

national authorities responsible for eHealth. To enhance safety and the continuity of cross-border healthcare, the network is required to produce guidelines on cross-border access to electronic health data and services, including by supporting ‘common identification and authentication measures tofacilitate transferabili ty of data in cross-border healthcare’. Mutual recognition and acceptance of electronic identification and authentication is key to make cross border healthcare for European citizens a reality. When people travel for treatment, their medical data needs to be accessible in the country of treatment. This requires a solid, safe and trusted electronic identification framework.

(11) One of the objectives of this Regulation is to remove existing barriers to the cross-border use of electronic identification means used in the Member States to access at least public services. This Regulation does not aim at intervening on electronic identity management systems and related infrastructures established in the Member
States. The aim of this Regulation is to ensure that for the access to cross-border online services offered by the Member States, secure electronic identification and authentication is possible.

(12) Member States should remain free to use or introduce means, for electronic identification purposes, for accessing online services. They should also be able to decide whether to involve the private sector in the provision of these means. Member States should not be obliged to notify their electronic identification schemes. The choice to either notify all, some or none of the electronic identification schemes used at national level to access at least public online services or specific services is up to the Member States.

(13) Some conditions need to be set in the Regulation with regard to which electronic identification means have to be accepted and how the schemes should be notified. These should help Member States to build the necessary trust in each other’s electronic identification schemes and to mutually recognise and accept electronic identification means falling under their notified schemes. The principle of mutual recognition and acceptance should apply if the notifying Member State meets the conditions of notification and the notification was published in the Official Journal of the European Union. However, the access to these online services and their final delivery to the applicant should be closely linked to the right to receive such services under the conditions set by national legislation.

(14) Member States should be able to decide to involve the private sector in the issuance of electronic identification means and to allow the private sector the use of electronic identification means under a notified scheme for identification purposes when needed for online services or electronic transactions. The possibility to use such electronic identification means would enable the private sector to rely on electronic identification and authentication already largely used in many Member States at least for public services and to make it easier for businesses and citizens to access their online services across borders. In order to facilitate the use of such electronic identification means across borders by the private sector, the authentication possibility provided by the Member States should be available to relying parties without discriminating between public or private sector.

(15) The cross border use of electronic identification means under a notified scheme requires Member States to cooperate in providing technical interoperability. This rules out any specific national technical rules requiring non-national parties for instance to obtain specific hardware or software to verify and validate the notified electronic
identification. Technical requirements on users, on the other hand, stemming from the inherent specifications of whatever token is used (e.g. smartcards) are inevitable.

(16) Cooperation of Member States should serve the technical interoperability of the notified electronic identification schemes with a view to foster a high level of trust and security appropriate to the degree of risk. The exchange of information and the sharing of best practices between Member States with a view to their mutual recognition
should help such cooperation.

(17) This Regulation should also establish a general legal framework for the use of electronic trust services. However, it should not create a general obligation to use them. In particular, it should not cover the provision of services based on voluntary agreements under private law. Neither should it cover aspects related to the conclusion and validity of contracts or other legal obligations where there are requirements as regards form prescribed by national or Union law.

(18) In order to contribute to the general cross-border use of electronic trust services, it should be possible to use them as evidence in legal proceedings in all Member States.

(19) Member States should remain free to define other types of trust services in addition to those making part of the closed list of trust services provided for in this Regulation, for the purpose of recognition at national level as qualified trust services.

(20) Because of the pace of technological change, this Regulation should adopt an approach which is open to innovations.

(21) This Regulation should be technology-neutral. The legal effects it grants should be achievable by any technical means provided that the requirements of this Regulation are met.

(22) To enhance people’s trust in the internal market and to promote the use of trust services and products, the notions of qualified trust services and qualified trust service provider should be introduced with a view to indicating requirements and obligations to ensure high-level security of whatever qualified trust services and products are used
or provided.

(23) In line with the obligations under the UN Convention on the Rights of Persons with Disabilities that has entered into force in the EU, persons with disabilities should be able to use trust services and end user products used in the provision of those services on equal bases with other consumers.

(24) A trust service provider is a controller of personal data and therefore has to comply with the obligations set out in Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data22. In particular the collection of data should be minimised as much as possible taking into account the purpose of the service provided.

(25) Supervisory bodies should cooperate and exchange information with data protection authorities to ensure proper implementation of data protection legislation by service providers. The exchange of information should in particular cover security incidents and personal data breaches.

(26) It should be incumbent on all trust service providers to apply good security practice appropriate to the risks related to their activities so as to boost users’ trust in the single market.

(27) Provisions on the use of pseudonyms in certificates should not prevent Member States from requiring identification of persons pursuant to Union or national law.

(28) All Member States should follow common essential supervision requirements to ensure a comparable security level of qualified trust services. To ease the consistent application of these requirements across the Union, Member States should adopt comparable procedures and should exchange information on their supervision activities and best practices in the field.

(29) Notification of security breaches and security risk assessments is essential with a view to providing adequate information to concerned parties in the event of a breach of security or loss of integrity.

(30) To enable the Commission and the Member States to assess the effectiveness of the breach notification mechanism introduced by this Regulation, supervisory bodies should be requested to provide summary information to the Commission and to European Network and Information Security Agency (ENISA).

(31) To enable the Commission and the Member States to assess the impact of this Regulation, supervisory bodies should be requested to provide statistics on and the use of qualified trust services.

(32) To enable the Commission and the Member States to assess the effectiveness of the enhanced supervision mechanism introduced by this Regulation, supervisory bodies should be requested to report on their activities. This would be instrumental in facilitating the exchange of good practices between supervisory bodies and would ensure the verification that essential supervision requirements are implemented consistently and efficiently in all Member States.

(33) To ensure sustainability and durability of qualified trust services and to boost users’ confidence in the continuity of qualified trust services, supervisory bodies should ensure that the data of qualified trust service providers are preserved and kept accessible for an appropriate period of time even if a qualified trust service provider ceases to exist.

(34) To facilitate the supervision of qualified trust services providers, for example when a provider is providing its services in the territory of another Member State and is not subject to supervision there, or when the computers of a provider are located in the territory of another Member State than the one where it is established, a mutual assistance system between supervisory bodies in the Member States should be set up.

(35) It is the responsibility of trust service providers to meet the requirements set out in this Regulation for the provisioning of trust services, in particular for qualified trust services. Supervisory bodies have the responsibility to supervise how trust service providers meet these requirements.

(36) In order to allow an efficient initiation process, which should lead to the inclusion of qualified trust service providers and the qualified trust services they provide into trusted lists, preliminary interactions between prospective qualified trust service providers and the competent supervisory body should be encouraged with the view of facilitating the due diligence leading to the provisioning of qualified trust services.

(37) Trusted lists are essential elements to build trust among market operators as they indicate the qualified status of the service provider at the time of supervision, on the other hand they are not a prerequisite for achieving the qualified status and providing qualified trust services which results from respecting the requirements of this Regulation.

(38) Once it has been subject to a notification, a qualified trust service cannot be refused for the fulfilment of an administrative procedure or formality by the concerned public sector body, for not being included in the trusted lists established by the Member States. For the present purpose a public sector body refers to any public authority or
other entity entrusted with the provision of eGovernment services such as online tax declaration, request for birth certificates, participation to electronic public procurement procedures, etc.

(39) While a high level of security is needed to ensure mutual recognition of electronic signatures, in specific cases, such as in the context of Commission Decision 2009/767/EC of 16 October 2009 setting out measures facilitating the use of
procedures by electronic means through the ‘points of single contact’ under Directive 2006/123/EC of the European Parliament and of the Council on services in the internal market23, electronic signatures with a lower security assurance should also be accepted.

(40) It should be possible to entrust qualified electronic signature creation devices to the care of a third party by the signatory, provided that appropriate mechanisms and procedures are implemented to ensure that the signatory has sole control over the use of his electronic signature creation data, and the qualified signature requirements are met by the use of the device.

(41) To ensure legal certainty on the validity of the signature it is essential to detail which components of a qualified electronic signature must be assessed by the relying party carrying out the validation. Moreover, defining the requirements of qualified trust service providers that can provide a qualified validation service to relying parties not
willing or unable to carry out themselves the validation of qualified electronic signatures, should stimulate the private or public sector to invest in such services. Both elements should make qualified electronic signature validation easy and convenient for all parties at Union level.

(42) When a transaction requires a qualified electronic seal from a legal person, a qualified electronic signature from the authorised representative of the legal person should be equally acceptable.

(43) Electronic seals should serve as evidence that an electronic document was issued by a legal person, ensuring certainty of the document’s origin and integrity.

(44) This Regulation should ensure the long-term preservation of information, i.e. the legal validity of electronic signature and electronic seals over extended periods of time, guaranteeing that they can be validated irrespective of future technological change.

(45) In order to enhance the cross-border use of electronic documents this Regulation should provide for the legal effect of electronic documents which should be considered as equal to paper documents dependent on the risk assessment and provided the authenticity and integrity of the documents are ensured. It also important for further development of cross-border electronic transactions in the internal market that original electronic documents or certified copies issued by relevant competent bodies in a Member State under their national law are accepted as such also in other Member States. This Regulation should not affect Member States’ right to determine what constitutes an original or a copy at a national level but ensures that these can be used as such also across borders.

(46) As competent authorities in the Member States currently use different formats of advanced electronic signatures to sign their documents electronically, it is necessary to ensure that at least a number of advanced electronic signature formats can be technically supported by Member States when they receive documents signed electronically. Similarly, when competent authorities in the Member States use advanced electronic seals, it would be necessary to ensure that they support at least a number of advanced electronic seal formats.

(47) In addition to authenticating the document issued by the legal person, electronic seals can be used to authenticate any digital asset of the legal person, e.g. software code, servers.

(48) Making it possible to authenticate websites and the person owning them would make it harder to falsify websites and thus reduce fraud.

(49) In order to complement certain detailed technical aspects of this Regulation in a flexible and rapid manner, the power to adopt acts in accordance with Article 290 of the Treaty on the Functioning of the European Union should be delegated to the Commission in respect of interoperability of electronic identification; security measures required of trust service providers; recognised independent bodies responsible for auditing the service providers; trusted lists; requirements related to the security levels of electronic signatures; requirements of qualified certificates for electronic signatures their validation and their preservation; the bodies responsible for the certification of qualified electronic signature creation devices; and the requirements related to the security levels of electronic seals and to qualified certificates for electronic seals; the interoperability between delivery services. It is of particular importance that the Commission carry out appropriate consultations during its preparatory work, including at expert level.

(50) The Commission, when preparing and drawing up delegated acts, should ensure a simultaneous, timely and appropriate transmission of relevant documents to the European Parliament and to the Council.

(51) In order to ensure uniform conditions for the implementation of this Regulation, implementing powers should be conferred on the Commission, in particular for specifying reference numbers of standards which use would give a presumption of compliance with certain requirements laid down in this Regulation or defined in delegated acts. Those powers should be exercised in accordance with Regulation (EU) No 182/2011 of the European Parliament and of the Council of 16 February 2011 laying down the rules and general principles concerning mechanisms for control by the Member States of the Commission’s exercise of implementing powers24.

(52) For reasons of legal certainty and clarity, Directive 1999/93/EC should be repealed.

(53) To ensure legal certainty to the market operators already using qualified certificates issued in compliance with Directive 1999/93/EC, it is necessary to provide for a sufficient period of time for transitional purposes. It is also necessary to provide the Commission with the means to adopt the implementing acts and delegated acts before that date.

(54) Since the objectives of this Regulation cannot be sufficiently achieved by the Member States and can therefore, by reason of the scale of the action, be better achieved at Union level, the Union may adopt measures, in accordance with the principle of subsidiarity as set out in Article 5 of the Treaty on European Union. In accordance with the principle of proportionality, as set out in that Article, this Regulation does not go beyond what is necessary in order to achieve that objective, especially regarding the Commission’s role as coordinator of national activities,

HAVE ADOPTED THIS REGULATION:

 CHAPTER I

 GENERAL PROVISIONS

 Article 1

Subject matter

1. This Regulation lays down rules for electronic identification and electronic trust services for electronic transactions with a view to ensuring the proper functioning of the internal market.

2. This Regulation lays down the conditions under which Member States shall recognise and accept electronic identification means of natural and legal persons falling under a notified electronic identification scheme of another Member State.

3. This Regulation establishes a legal framework for electronic signatures, electronic seals, electronic time stamps, electronic documents, electronic delivery services and website authentication.

4. This Regulation ensures that trust services and products which comply with this Regulation are permitted to circulate freely in the internal market.

Article 2

Scope

1. This Regulation applies to electronic identification provided by, on behalf or under the responsibility of Member States and to trust service providers established in the Union.

2. This Regulation does not apply to the provision of electronic trust services based on voluntary agreements under private law.

3. This Regulation does not apply to aspects related to the conclusion and validity of contracts or other legal obligations where there are requirements as regards form prescribed by national or Union law.

Article 3

Definitions

For the purposes of this Regulation, the following definitions shall apply:

(1) ‘electronic identification’ means the process of using person identification data in electronic form unambiguously representing a natural or legal person;

(2) ‘electronic identification means’ means a material or immaterial unit containing data as referred to in point 1 of this Article, and which is used to access services online as referred to in Article 5;

(3) ‘electronic identification scheme’ means a system for electronic identification under which electronic identification means are issued to persons as referred to in point 1 of this Article;

(4) ‘authentication’ means an electronic process that allows the validation of the electronic identification of a natural or legal person; or of the origin and integrity of an electronic data;

(5) ‘signatory’ means a natural person who creates an electronic signature;

(6) ‘electronic signature’ means data in electronic form which are attached to or logically associated with other electronic data and which are used by the signatory to sign;

(7) ‘advanced electronic signature’ means an electronic signature which meets the following requirements:

(a) it is uniquely linked to the signatory;

(b) it is capable of identifying the signatory;

(c) it is created using electronic signature creation data that the signatory can, with high level of confidence, use under his sole control; and

(d) it is linked to the data to which it relates in such a way that any subsequent change in the data is detectable;

(8) ‘qualified electronic signature’ means an advanced electronic signature which is created by a qualified electronic signature creation device, and which is based on a qualified certificate for electronic signatures;

(9) ‘electronic signature creation data’ means unique data which are used by the signatory to create an electronic signature;

(10) ‘certificate’ means an electronic attestation which links electronic signature or seal validation data of a natural or a legal person respectively to the certificate and confirms those data of that person;

(11) ‘qualified certificate for electronic signature’ means an attestation which is used to support electronic signatures, is issued by a qualified trust service provider and meet the requirements laid down in Annex I;

(12) ‘trust service’ means any electronic service consisting in the creation, verification, validation, handling and preservation of electronic signatures, electronic seals, electronic time stamps, electronic documents, electronic delivery services, website authentication, and electronic certificates, including certificates for electronic signature and for electronic seals;

(13) ‘qualified trust service’ means a trust service that meets the applicable requirements provided for in this Regulation;

(14) ‘trust service provider’ means a natural or a legal person who provides one or more trust services;

(15) ‘qualified trust service provider’ means a trust service provider who meets the requirements laid down in this Regulation;

(16) ‘product’ means hardware or software, or relevant components thereof, which are intended to be used for the provision of trust services;

(17) ‘electronic signature creation device’ means configured software or hardware used to create an electronic signature;

(18) ‘qualified electronic signature creation device’ means an electronic signature creation device which meets the requirements laid down in Annex II;

(19) ‘creator of a seal’ means a legal person who creates an electronic seal;

(20) ‘electronic seal’ means data in electronic form which are attached to or logically associated with other electronic data to ensure the origin and the integrity of the associated data;

(21) ‘advanced electronic seal’ means an electronic seal which meets the following requirements:

(a) it is uniquely linked to the creator of the seal;

(b) it is capable of identifying the creator of the seal;

(c) it is created using electronic seal creation data that the creator of the seal can, with a high level of confidence under its control, use for electronic seal creation; and

(d) it is linked to the data to which it relates in such a way that any subsequent change in the data is detectable;

(22) ‘qualified electronic seal’ means an advanced electronic seal which is created by a qualified electronic seal creation device, and which is based on a qualified certificate for electronic seal;

(23) ‘electronic seal creation data’ means unique data which are used by the creator of the electronic seal to create an electronic seal;

(24) ‘qualified certificate for electronic seal’ means an attestation which is used to support an electronic seal, is issued by a qualified trust service provider and meet the requirements laid down in Annex III;

(25) ‘electronic time stamp’ means data in electronic form which binds other electronic data to a particular time establishing evidence that these data existed at that time;

(26) ‘qualified electronic time stamp’ means an electronic time stamp which meets the requirements laid down in Article 33;

(27) ‘electronic document’ means a document in any electronic format;

(28) ‘electronic delivery service’ means a service that makes it possible to transmit data by electronic means and provides evidence relating to the handling of the transmitted data, including proof of sending or receiving the data, and which protects transmitted data against the risk of loss, theft, damage or any unauthorised alterations;

(29) ‘qualified electronic delivery service’ means an electronic delivery service which meets the requirements laid down in Article 36;

(30) ‘qualified certificate for website authentication’ means an attestation which makes it possible to authenticate a website and links the website to the person to whom the certificate is issued, which is issued by a qualified trust service provider and meets the requirements laid down in Annex IV;

(31) ‘validation data’ means data which are used to validate an electronic signature or an electronic seal.

Article 4

Internal market principle

1. There shall be no restriction on the provision of trust services in the territory of a Member State by a trust service provider established in another Member States for reasons which fall within the fields covered by this Regulation.

2. Products which comply with this Regulation shall be permitted to circulate freely in the
internal market.

CHAPTER II

ELECTRONIC IDENTIFICATION

Article 5

Mutual recognition and acceptance

When an electronic identification using an electronic identification means and authentication is required under national legislation or administrative practice to access a service online, any electronic identification means issued in another Member State falling under a scheme included in the list published by the Commission pursuant to the procedure referred to in Article 7 shall be recognised and accepted for the purposes of accessing this service.

Article 6

Conditions of notification of electronic identification schemes

1. Electronic identification schemes shall be eligible for notification pursuant to Article 7 if all the following conditions are met:

(a) the electronic identification means are issued by, on behalf of or under the responsibility of the notifying Member State;

(b) the electronic identification means can be used to access at least public services requiring electronic identification in the notifying Member State;

(c) the notifying Member State ensures that the person identification data are attributed unambiguously to the natural or legal person referred to in Article 3 point1;

(d) the notifying Member State ensures the availability of an authentication possibility online, at any time and free of charge so that any relying party can validate the person identification data received in electronic form. Member States shall not impose any specific technical requirements on relying parties established outside of their territory intending to carry out such authentication. When either the notified identification scheme or authentication possibility is breached or partly compromised, Member States shall suspend or revoke without delay the notified  identification scheme or authentication possibility or the compromised parts concerned and inform the other Member States and the Commission pursuant to Article 7;

(e) the notifying Member State takes liability for:

– (i) the unambiguous attribution of the person identification data referred to in point (c), and

– (ii) the authentication possibility specified in point (d).

2. Point (e) of paragraph 1 is without prejudice to the liability of parties to a transaction in which electronic identification means falling under the notified scheme are used.

Article 7

Notification

1. Member States which notify an electronic identification scheme shall forward to the Commission the following information and without undue delay, any subsequent changes thereof:

(a) a description of the notified electronic identification scheme;

(b) the authorities responsible for the notified electronic identification scheme;

(c) information on by whom the registration of the unambiguous person identifiers is managed;

(d) a description of the authentication possibility;

(e) arrangements for suspension or revocation of either the notified identification scheme or authentication possibility or the compromised parts concerned.

2. Six months after the entry into force of the Regulation, the Commission shall publish in the Official Journal of the European Union the list of the electronic identification schemes which were notified pursuant to paragraph 1 and the basic information thereon.

3. If the Commission receives a notification after the period referred to in paragraph 2 expired, it shall amend the list within three months.

4. The Commission may, by means of implementing acts, define the circumstances, formats and procedures of the notification referred to in paragraphs 1 and 3. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2).

Article 8

Coordination

1. Member States shall cooperate in order to ensure the interoperability of electronic identification means falling under a notified scheme and to enhance their security.

2. The Commission shall, by means of implementing acts, establish the necessary modalities to facilitate the cooperation between the Member States referred to in paragraph 1 with a view to fostering a high level of trust and security appropriate to the degree of risk. Those implementing acts shall concern, in particular, the exchange of information, experiences and good practice on electronic identification schemes, the peer review of notified electronic identification schemes and the examination of relevant developments arising in the electronic identification sector by the competent authorities of the Member States. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2).

3. The Commission shall be empowered to adopt delegated acts in accordance with Article 38 concerning the facilitation of cross border interoperability of electronic identification means by setting of minimum technical requirements.

CHAPTER III

TRUST SERVICES

Section 1

General provisions

Article 9

Liability

1. A trust service provider shall be liable for any direct damage caused to any natural or legal person due to failure to comply with the obligations laid down in Article 15(1), unless the trust service provider can prove that he has not acted negligently.

2. A qualified trust service provider shall be liable for any direct damage caused to any natural or legal person due to failure to meet the requirements laid down in this Regulation, in particular in Article 19, unless the qualified trust service provider can prove that he has not acted negligently.

Article 10

Trust services providers from third countries

1. Qualified trust services and qualified certificates provided by qualified trust service providers established in a third country shall be accepted as qualified trust services and qualified certificates provided by a qualified trust service providers established in the territory of the Union if the qualified trust services or qualified certificates originating from the third country are recognised under an agreement between the Union and third countries or international organisations in accordance with Article 218 TFUE.

2. With reference to paragraph 1, such agreements shall ensure that the requirements applicable to qualified trust services and qualified certificates provided by qualified trust service providers established in the territory of the Union are met by the trust service providers in the third countries or international organisations, especially with regard to the
protection of personal data, security and supervision.

Article 11

Data processing and protection

1. Trust service providers and supervisory bodies shall ensure fair and lawful processing in accordance with Directive 95/46/EC when processing personal data.

2. Trust service providers shall process personal data according to Directive 95/46/EC. Such processing shall be strictly limited to the minimum data needed to issue and maintain a certificate or to provide a trust service.

3. Trust service providers shall guarantee the confidentiality and integrity of data related to a person to whom the trust service is provided.

4. Without prejudice to the legal effect given to pseudonyms under national law, Member States shall not prevent trust service providers indicating in electronic signature certificates a pseudonym instead of the signatory’s name.

Article 12

Accessibility for persons with disabilities

Trust services provided and end user products used in the provision of those services shall be made accessible for persons with disabilities whenever possible.

Section 2

Supervision

Article 13

Supervisory body

1. Member States shall designate an appropriate body established in their territory or, upon mutual agreement, in another Member State under the responsibility of the designating Member State. Supervisory bodies shall be given all supervisory and investigatory powers that are necessary for the exercise of their tasks.

2. The supervisory body shall be responsible for the performance of the following tasks:

(a) monitoring trust service providers established in the territory of the designating Member State to ensure that they fulfil the requirements laid down in Article 15;

(b) undertaking supervision of qualified trust service providers established in the territory of the designating Member State and of the qualified trust services they provide in order to ensure that they and the qualified trust services provided by them meet the applicable requirements laid down in this Regulation;

(c) ensuring that relevant information and data referred to in point (g) of Article 19(2), and recorded by qualified trust service providers are preserved and kept accessible after the activities of a qualified trust service provider have ceased, for an appropriate time with a view to guaranteeing continuity of the service.

3. Each supervisory body shall submit a yearly report on the last calendar year’s supervisory activities to the Commission and Member States by the end of the first quarter of the following year. It shall include at least:

(a) information on its supervisory activities;

(b) a summary of breach notifications received from trust service providers in accordance with Article 15(2);

(c) statistics on the market and usage of qualified trust services, including information on qualified trust service providers themselves, the qualified trust services they provide, the products they use and the general description of their customers.

4. Member States shall notify to the Commission and other Member States the names and the addresses of their respective designated supervisory bodies.

5. The Commission shall be empowered to adopt delegated acts, in accordance with Article 38, concerning the definition of procedures applicable to the tasks referred to in paragraph 2.

6. The Commission may, by means of implementing acts, define the circumstances, formats and procedures for the report referred to in paragraph 3. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2).

Article 14

Mutual assistance

1. Supervisory bodies shall cooperate with a view to exchange good practice and provide each other, within the shortest possible time, with relevant information and mutual assistance so that activities can be carried out in a consistent manner. Mutual assistance shall cover, in particular, information requests and supervisory measures, such as requests to carry out inspections related to the security audits as referred to in Articles 15, 16 and 17.

2. A supervisory body to which a request for assistance is addressed may not refuse to comply with it unless:

(a) it is not competent to deal with the request; or

(b) compliance with the request would be incompatible with this Regulation.

3. Where appropriate, supervisory bodies may carry out joint investigations in which staff from other Member States’ supervisory bodies is involved.

The supervisory body of the Member State where the investigation is to take place, in compliance with its own national law, may devolve investigative tasks to the assisted supervisory body’s staff. Such powers may be exercised only under the guidance and in the presence of staff from the host supervisory body. The assisted supervisory body’s staff shall be subject to the host supervisory body’s national law. The host supervisory body shall assume responsibility for the assisted supervisory body staff’s actions.

4. The Commission may, by means of implementing acts, specify the formats and procedures for the mutual assistance provided for in this Article. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2).

Article 15

Security requirements applicable to trust service providers

1. Trust service providers who are established in the territory of the Union shall take appropriate technical and organisational measures to manage the risks posed to the security of the trust services they provide. Having regard to state of the art, these measures shall ensure that the level of security is appropriate to the degree of risk. In particular, measures shall be taken to prevent and minimise the impact of security incidents and inform stakeholders of adverse effects of any incidents.

Without prejudice to Article 16(1), any trust service provider may submit the report of a security audit carried out by a recognised independent body to the supervisory body to confirm that appropriate security measures have been taken.

2. Trust service providers shall, without undue delay and where feasible not later than 24 hours after having become aware of it, notify the competent supervisory body, the competent national body for information security and other relevant third parties such as data protection authorities of any breach of security or loss of integrity that has a significant impact on the trust service provided and on the personal data maintained therein.

Where appropriate, in particular if a breach of security or loss of integrity concerns two or more Member States, the supervisory body concerned shall inform supervisory bodies in other Member States and the European Network and Information Security Agency (ENISA).

The supervisory body concerned may also inform the public or require the trust service provider to do so, where it determines that disclosure of the breach is in the public interest.

3. The supervisory body shall provide to ENISA and to the Commission once a year with a summary of breach notifications received from trust service providers.

4. In order to implement paragraphs 1 and 2, the competent supervisory body shall have the power to issue binding instructions to trust service providers.

5. The Commission shall be empowered to adopt delegated acts, in accordance with Article 38, concerning the further specification of the measures referred to in paragraph 1.

6. The Commission may, by means of implementing acts, define the circumstances, formats and procedures, including deadlines, applicable for the purpose of paragraphs 1 to 3. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2).

Article 16

Supervision of qualified trust service providers

1. Qualified trust service providers shall be audited by a recognised independent body once a year to confirm that they and the qualified trust services provided by them fulfil the requirements set out in this Regulation, and shall submit the resulting security audit report to the supervisory body.

2. Without prejudice to paragraph 1, the supervisory body may at any time audit the qualified trust service providers to confirm that they and the qualified trust services provided by them still meet the conditions set out in this Regulation, either on its own initiative or in response to a request from the Commission. The supervisory body shall inform the data protection authorities of the results of its audits, in case personal data protection rules appear to have been breached.

3. The supervisory body shall have the power to issue binding instructions to qualified trust service providers to remedy any failure to fulfil the requirements indicated in the security audit report.

4. With reference to paragraph 3, if the qualified trust service provider does not remedy any such failure within a time limit set by the supervisory body, it shall lose its qualified status and be informed by the supervisory body that its status will be changed accordingly in the trusted lists referred to in Article 18.

5. The Commission shall be empowered to adopt delegated acts in accordance with Article 38 concerning the specification of the conditions under which the independent body carrying out the audit referred to in paragraph 1 of this Article and in Article 15(1) and in Article 17(1) shall be recognised.

6. The Commission may, by means of implementing acts, define the circumstances, procedures and formats applicable for the purpose of paragraphs 1, 2 and 4. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2).

Article 17

Initiation of a qualified trust service

1. Qualified trust service providers shall notify the supervisory body of their intention to start providing a qualified trust service and shall submit to the supervisory body a security audit report carried out by a recognised independent body, as provided for in Article 16(1). Qualified trust service providers may start to provide the qualified trust service after they have submitted the notification and security audit report to the supervisory body.

2. Once the relevant documents are submitted to the supervisory body according to paragraph 1, the qualified service providers shall be included in the trusted lists referred to in Article 18 indicating that the notification has been submitted.

3. The supervisory body shall verify the compliance of the qualified trust service provider and of the qualified trust services provided by it with the requirements of the Regulation.

The supervisory body shall indicate the qualified status of the qualified service providers and the qualified trust services they provide in the trusted lists after the positive conclusion of the verification, not later than one month after the notification has been done in accordance with paragraph 1.

If the verification is not concluded within one month, the supervisory body shall inform the qualified trust service provider specifying the reasons of the delay and the period by which the verification shall be concluded.

4. A qualified trust service which has been subject to the notification referred to in paragraph 1 cannot be refused for the fulfilment of an administrative procedure or formality by the concerned public sector body for not being included in the lists referred to in paragraph 3.

5. The Commission may, by means of implementing acts, define the circumstances, formats and procedures for the purpose of paragraphs 1, 2 and.3 Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2).

Article 18

Trusted lists

1. Each Member State shall establish, maintain and publish trusted lists with information related to the qualified trust service providers for which it is competent together with information related to the qualified trust services provided by them.

2. Member States shall establish, maintain and publish, in a secure manner, electronically signed or sealed trusted lists provided for in paragraph 1 in a form suitable for automated processing.

3. Member States shall notify to the Commission, without undue delay, information on the body responsible for establishing, maintaining and publishing national trusted lists, and details of where such lists are published, the certificate used to sign or seal the trusted lists and any changes thereto.

4. The Commission shall make available to the public, through a secure channel, the information, referred to in paragraph 3 in electronically signed or sealed form suitable for automated processing.

5. The Commission shall be empowered to adopt delegated acts in accordance with Article 38 concerning the definition of the information referred to in paragraph 1.

6. The Commission may, by means of implementing acts, define the technical specifications and formats for trusted lists applicable for the purposes of paragraphs 1 to 4. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2).

Article 19

Requirements for qualified trust service providers

1. When issuing a qualified certificate, a qualified trust service provider shall verify, by appropriate means and in accordance with national law, the identity and, if applicable, any specific attributes of the natural or legal person to whom a qualified certificate is issued.

Such information shall be verified by the qualified service provider or by an authorised third party acting under the responsibility of the qualified service provider:

(a) by a physical appearance of the natural person or of an authorised representative of the legal person, or

(b) remotely, using electronic identification means under a notified scheme issued in compliance with point (a).

2. Qualified trust service providers providing qualified trust services shall:

(a) employ staff who possess the necessary expertise, experience, and qualifications and apply administrative and management procedures which correspond to European or international standards and have received appropriate training regarding security and personal data protection rules;

(b) bear the risk of liability for damages by maintaining sufficient financial resources or by an appropriate liability insurance scheme;

(c) before entering into a contractual relationship, inform any person seeking to use a qualified trust service of the precise terms and conditions regarding the use of that service;

(d) use trustworthy systems and products which are protected against modification and guarantee the technical security and reliability of the process supported by them;

(e) use trustworthy systems to store data provided to them, in a verifiable form so that:

– they are publicly available for retrieval only where the consent of the person to whom the data has been issued has been obtained,

– only authorised persons can make entries and changes,

– information can be checked for authenticity;

(f) take measures against forgery and theft of data;

(g) record for an appropriate period of time all relevant information concerning data issued and received by the qualified trust service provider, in particular for the purpose of providing evidence in legal proceedings. Such recording may be done electronically;

(h) have an up-to-date termination plan to ensure continuity of service in accordance with arrangements issued by the supervisory body under point (c) of Article 13(2);

(i) ensure lawful processing of personal data in accordance with Article 11.

3. Qualified trust service providers issuing qualified certificates shall register in their certificate database the revocation of the certificate within ten minutes after such revocation has taken effect.

4. With regard to paragraph 3, qualified trust service providers issuing qualified certificates shall provide to any relying party information on the validity or revocation status of qualified certificates issued by them. This information shall be made available at any time at least on a certificate basis in an automated manner which is reliable, free of charge and efficient.

5. The Commission may, by means of implementing acts, establish reference numbers of standards for trustworthy systems and products. Compliance with the requirements laid down in Article 19 shall be presumed where trustworthy systems and products meet those standards. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2). The Commission shall publish those acts in the Official Journal of the European Union.

Section 3

Electronic signature

Article 20

Legal effects and acceptance of electronic signatures

1. An electronic signature shall not be denied legal effect and admissibility as evidence in legal proceedings solely on the grounds that it is in an electronic form.

2. A qualified electronic signature shall have the equivalent legal effect of a handwritten signature.

3. Qualified electronic signatures shall be recognised and accepted in all Member States.

4. If an electronic signature with a security assurance level below qualified electronic signature is required, in particular by a Member State for accessing a service online offered by a public sector body on the basis of an appropriate assessment of the risks involved in such a service, all electronic signatures matching at least the same security assurance level shall be recognised and accepted.

5. Member States shall not request for cross-border access to a service online offered by a public sector body an electronic signature at a higher security assurance level than qualified electronic signature.

6. The Commission shall be empowered to adopt delegated acts in accordance with Article 38 concerning the definition of the different security levels of electronic signature referred to in paragraph 4.

7. The Commission may, by means of implementing acts, establish reference numbers of standards for the security levels of electronic signature. Compliance with the security level defined in a delegated act adopted pursuant to paragraph 6 shall be presumed when an electronic signature meets those standards. Those implementing acts shall be adopted in
accordance with the examination procedure referred to in Article 39(2). The Commission shall publish those acts in the Official Journal of the European Union.

Article 21

Qualified certificates for electronic signature

1. Qualified certificates for electronic signature shall meet the requirements laid down in Annex I.

2. Qualified certificates for electronic signature shall not be subject to any mandatory requirement exceeding the requirements laid down in Annex I.

3. If a qualified certificate for electronic signature has been revoked after initial activation, it shall lose its validity, and its status shall not in any circumstances be reverted by renewing its validity.

4. The Commission shall be empowered to adopt delegated acts in accordance with Article 38 concerning the further specification of the requirements laid down in Annex I.

5. The Commission may, by means of implementing acts, establish reference numbers of standards for qualified certificates for electronic signature. Compliance with the requirements laid down in Annex I shall be presumed where a qualified certificate for electronic signature meets those standards. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2). The Commission shall publish those acts in the Official Journal of the European Union.

Article 22

Requirements for qualified electronic signature creation devices

1. Qualified electronic signature creation devices shall meet the requirements laid down in Annex II.

2. The Commission may, by means of implementing acts, establish reference numbers of standards for qualified electronic signature creation devices. Compliance with the requirements laid down in Annex II shall be presumed where a qualified electronic signature creation device meets those standards. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2). The Commission shall publish those acts in the Official Journal of the European Union.

Article 23

Certification of qualified electronic signature creation devices

1. Qualified electronic signature creation devices may be certified by appropriate public or private bodies designated by Member States provided that they have been submitted to a security evaluation process carried out in accordance with one of the standards for the security assessment of information technology products included in a list that shall be established by the Commission by means of implementing acts. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2). The Commission shall publish those acts in the Official Journal of the European Union.

2. Member States shall notify to the Commission and other Member States the names and addresses of the public or private body designated by them as referred to in paragraph 1.

3. The Commission shall be empowered to adopt delegated acts in accordance with Article 38 concerning the establishment of specific criteria to be met by the designated bodies referred to in paragraph 1.

Article 24

Publication of a list of certified qualified electronic signature creation devices

1. Member States shall notify to the Commission without undue delay, information on qualified electronic signature creation devices which have been certified by the bodies referred to in Article 23. They shall also notify to the Commission, without undue delay, information on electronic signature creation devices that would no longer be certified.

2. On the basis of the information received, the Commission shall establish, publish and maintain a list of certified qualified electronic signature creation devices.

3. The Commission may, by means of implementing acts, define circumstances, formats and procedures applicable for the purpose of paragraph 1. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2).

Article 25

Requirements for the validation of qualified electronic signatures

1. A qualified electronic signature shall be considered as valid provided that it can be established with a high level of certainty, that at the time of signing:

(a) the certificate, that supports the signature, is a qualified electronic signature certificate complying with the provisions laid down in Annex I;

(b) the qualified certificate required is authentic and valid;

(c) the signature validation data correspond to the data provided to the relying party;

(d) the set of data unambiguously representing the signatory is correctly provided to the relying party;

(e) the use of any pseudonym is clearly indicated to the relying party if a pseudonym is used;

(f) the electronic signature was created by a qualified electronic signature creation device;

(g) the integrity of the signed data has not been compromised;

(h) the requirements provided for in Article 3 point7 are met;

(i) the system used for validating the signature provides to the relying party the correct result of the validation process and allows the relying party to detect any security relevant issues.

2. The Commission shall be empowered to adopt delegated acts in accordance with Article 38 concerning the further specification of the requirements laid in down in paragraph 1.

3. The Commission may, by means of implementing acts, establish reference numbers of standards for the validation of qualified electronic signatures. Compliance with the requirements laid down in paragraph 1 shall be presumed where the validation of qualified electronic signatures meets those standards. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2). The Commission shall publish those acts in the Official Journal of the European Union.

Article 26

Qualified validation service for qualified electronic signatures

1. A qualified validation service for qualified electronic signatures shall be provided by a qualified trust service provider who:

(a) provides validation in compliance with Article 25(1), and

(b) allows relying parties to receive the result of the validation process in an automated manner which is reliable, efficient and bearing the advanced electronic signature or advanced electronic seal of the provider of the qualified validation service.

2. The Commission may, by means of implementing acts, establish reference numbers of standards for qualified validation service referred to in paragraph 1. Compliance with the requirements laid down in point (b) of paragraph 1 shall be presumed where the validation service for qualified electronic signature meets those standards. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2). The Commission shall publish those acts in the Official Journal of the European Union.

Article 27

Preservation of qualified electronic signatures

1. A qualified electronic signature preservation service shall be provided by a qualified trust service provider who uses procedures and technologies capable of extending the trustworthiness of the qualified electronic signature validation data beyond the technological validity period.

2. The Commission shall be empowered to adopt delegated acts in accordance with Article 38 concerning the further specification of the requirements laid down in paragraph 1.

3. The Commission may, by means of implementing acts, establish reference numbers of standards for the preservation of qualified electronic signatures. Compliance with the requirements laid down in paragraph 1 shall be presumed where the arrangements for the preservation of qualified electronic signatures meet those standards. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2). The Commission shall publish those acts in the Official Journal of the European Union.

Section 4

Electronic seals

Article 28

Legal effects of electronic seal

1. An electronic seal shall not be denied legal effect and admissibility as evidence in legal proceedings solely on the grounds that it is in electronic form.

2. A qualified electronic seal shall enjoy the legal presumption of ensuring the origin and integrity of the data to which it is linked.

3. A qualified electronic seal shall be recognised and accepted in all Member States.

4. If an electronic seal security assurance level below the qualified electronic seal is required, in particular by a Member State for accessing a service online offered by a public sector body on the basis of an appropriate assessment of the risks involved in such a service, all electronic seals matching at a minimum the same security assurance level shall be accepted.

5. Member States shall not request for accessing a service online offered by a public sector body an electronic seal with higher security assurance level than qualified electronic seals.

6. The Commission shall be empowered to adopt delegated acts in accordance with Article 38 concerning the definition of different security assurance levels of electronic seals referred to in paragraph 4.

7. The Commission may, by means of implementing acts, establish reference numbers of standards for the security assurance levels of electronic seals. Compliance with the security assurance level defined in a delegated act adopted pursuant to paragraph 6 shall be presumed when an electronic seal meets those standards. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2). The Commission shall publish those acts in the Official Journal of the European Union.

Article 29

Requirements for qualified certificates for electronic seal

1. Qualified certificates for electronic seal shall meet the requirements laid down in Annex III.

2. Qualified certificates for electronic seal shall not be subject to any mandatory requirements exceeding the requirements laid down in Annex III.

3. If a qualified certificate for an electronic seal has been revoked after initial activation, it shall lose its validity, and its status shall not in any circumstances be reverted by renewing its validity.

4. The Commission shall be empowered to adopt delegated acts in accordance with Article 38 concerning the further specification of the requirements laid down in Annex III.

5. The Commission may, by means of implementing acts, establish reference numbers of standards for qualified certificates for electronic seal. Compliance with the requirements laid down in Annex III shall be presumed where a qualified certificate for electronic seal meet those standards. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2). The Commission shall publish those acts in the Official Journal of the European Union.

Article 30

Qualified electronic seal creation devices

1. Article 22 shall apply mutatis mutandis to requirements for qualified electronic seal creation devices.

2. Article 23 shall apply mutatis mutandis to the certification of qualified electronic seal creation devices.

3. Article 24 shall apply mutatis mutandis to the publication of a list of certified qualified electronic seal creation devices.

Article 31

Validation and preservation of qualified electronic seals

Articles 25, 26 and 27 shall apply mutatis mutandis to the validation and preservation of qualified electronic seals.

Section 5

Electronic time stamp

Article 32

Legal effect of electronic time stamps

1. An electronic time stamp shall not be denied legal effect and admissibility as evidence in legal proceedings solely on the grounds that it is in electronic form.

2. Qualified electronic time stamp shall enjoy a legal presumption of ensuring the time it indicates and the integrity of the data to which the time is bound.

3. A qualified electronic time stamp shall be recognised and accepted in all Member States.

Article 33

Requirements for qualified electronic time stamps

1. A qualified electronic time stamp shall meet the following requirements:

(a) it is accurately linked to Coordinated Universal Time (UTC) in such a manner as to preclude any possibility of the data being changed undetectably;

(b) it is based on an accurate time source;

(c) it is issued by a qualified trust service provider;

(d) it is signed using an advanced electronic signature or an advanced electronic seal of the qualified trust service provider, or by some equivalent method.

2. The Commission may, by means of implementing acts, establish reference numbers of standards for the accurate linkage of time to data and an accurate time source. Compliance with the requirements laid down in paragraph 1 shall be presumed where an accurate linkage of time to data and an accurate time source meets those standards. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2). The Commission shall publish those acts in the Official Journal of the European Union.

Section 6

Electronic documents

Article 34

Legal effects and acceptance of the electronic documents

1. An electronic document shall be considered as equivalent to a paper document and admissible as evidence in legal proceedings, having regard to its assurance level of authenticity and integrity.

2. A document bearing a qualified electronic signature or a qualified electronic seal of the person who is competent to issue the relevant document, shall enjoy legal presumption of its authenticity and integrity provided the document does not contain any dynamic features capable of automatically changing the document.

3. When an original document or a certified copy is required for the provision of a service online offered by a public sector body, at least electronic documents issued by the persons who are competent to issue the relevant documents and that are considered to be originals or certified copies in accordance with national law of the Member State of origin, shall be accepted in other Member States without additional requirements.

4. The Commission may, by means of implementing acts, define formats of electronic signatures and seals that shall be accepted whenever a signed or sealed document is requested by a Member State for the provision of a service online offered by a public sector body referred to in paragraph 2. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2).

Section 7

Qualified electronic delivery service

Article 35

Legal effect of an electronic delivery service

1. Data sent or received using an electronic delivery service shall be admissible as evidence in legal proceedings with regard to the integrity of the data and the certainty of the date and time at which the data were sent to or received by a specified addressee.

2. Data sent or received using a qualified electronic delivery service shall enjoy legal presumption of the integrity of the data and the accuracy of the date and time of sending or receiving the data indicated by the qualified electronic delivery system.

3. The Commission shall be empowered to adopt delegated acts in accordance with Article 38 concerning the specification of mechanisms for sending or receiving data using electronic delivery services, which shall be used with a view to fostering interoperability between electronic delivery services.

Article 36

Requirements for qualified electronic delivery services

1. Qualified electronic delivery services shall meet the following requirements:

(a) they must be provided by one or more qualified trust service provider(s);

(b) they must allow the unambiguous identification of the sender and if appropriate, the addressee;

(c) the process of sending or receiving of data must be secured by an advanced electronic signature or an advanced electronic seal of qualified trust service provider in such a manner as to preclude the possibility of the data being changed undetectably;

(d) any change of the data needed for the purpose of sending or receiving the data must be clearly indicated to the sender and addressee of the data;

(e) the date of sending, receipt and any change of data must be indicated by a qualified electronic time stamp;

(f) in the event of the data being transferred between two or more qualified trust service providers, the requirements in points (a) to (e) shall apply to all the qualified trust service providers.

2. The Commission may, by means of implementing acts, establish reference numbers of standards for processes for sending and receiving data. Compliance with the requirements laid down in paragraph 1 shall be presumed where the process for sending and receiving data meets those standards. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2). The Commission shall publish those acts in the Official Journal of the European Union.

Section 8

Website authentication

Article 37

Requirements for qualified certificates for website authentication

1. Qualified certificates for website authentication shall meet the requirements laid down in Annex IV.

2. Qualified certificates for website authentication shall be recognised and accepted in all Member States.

3. The Commission shall be empowered to adopt delegated acts in accordance with Article 38 concerning the further specification of the requirements laid down in Annex IV.

4. The Commission may, by means of implementing acts, establish reference numbers of standards for qualified certificates for website authentication. Compliance with the requirements laid down in Annex IV shall be presumed where a qualified certificate for website authentication meets those standards. Those implementing acts shall be adopted in accordance with the examination procedure referred to in Article 39(2). The Commission shall publish those acts in the Official Journal of the European Union.

CHAPTER IV

DELEGATED ACTS

Article 38

Exercise of the delegation

1. The power to adopt delegated acts is conferred on the Commission subject to the conditions laid down in this Article.

2. The power to adopt delegated acts referred to in Articles 8(3), 13(5), 15(5), 16(5), 18(5), 20(6), 21(4), 23(3), 25(2), 27(2), 28(6), 29(4), 30(2), 31, 35(3) and 37(3) shall be conferred on the Commission for an indeterminate period of time from the entry into force of this Regulation.

3. The delegation of power referred to in Articles 8(3), 13(5), 15(5), 16(5), 18(5), 20(6), 21(4), 23(3), 25(2), 27(2), 28(6), 29(4), 30(2), 31, 35(3) and 37(3) may be revoked at any time by the European Parliament or by the Council. A decision to revoke shall put an end to the delegation of the power specified in that decision. It shall take effect the day following the publication of the decision in the Official Journal of the European Union or at a later date specified therein. It shall not affect the validity of any delegated acts already in force.

4. As soon as it adopts a delegated act, the Commission shall notify it simultaneously to the European Parliament and to the Council.

5. A delegated act adopted pursuant to Articles 8(3), 13(5), 15(5), 16(5), 18(5), 20(6), 21(4), 23(3), 25(2), 27(2), 28(6), 29(4), 30(2), 31, 35(3) and 37(3) shall enter into force only if no objection has been expressed either by the European Parliament or the Council within a period of two months of notification of that act to the European Parliament and the Council or if, before the expiry of that period, the European Parliament and the Council have both informed the Commission that they will not object. That period shall be extended by two months at the initiative of the European Parliament or of the Council.

CHAPTER V

IMPLEMENTING ACTS

Article 39

Committee procedure

1. The Commission shall be assisted by a committee. That committee shall be a committee within the meaning of Regulation (EU) No 182/2011.

2. Where reference is made to this paragraph, Article 5 of Regulation 182/2011 shall apply.

CHAPTER VI

FINAL PROVISIONS

Article 40

Report

The Commission shall report to the European Parliament and to the Council on the application of this Regulation. The first report shall be submitted no later than four years after the entry into force of this Regulation. Subsequent reports shall be submitted every four years thereafter.

Article 41

Repeal

1. Directive 1999/93/EC is repealed.

2. References to the repealed Directive shall be construed as references to this Regulation.

3. Secure signature creation devices of which the conformity has been determined in accordance with Article 3(4) of Directive 1999/93/EC shall be considered as qualified signature creation devices under this Regulation.

4. Qualified certificates issued under Directive 1999/93/EC shall be considered as qualified certificates for electronic signatures under this Regulation until they expire, but for no more than five years from the entry into force of this Regulation.

Article 42

Entry into force

This Regulation shall enter into force on the twentieth day following that of its publication in the Official Journal of the European Union.

This Regulation shall be binding in its entirety and directly applicable in all Member States.

Done at Brussels,

For the European Parliament For the Council
The President The President

ANNEX I

Requirements for qualified certificates for electronic signatures

Qualified certificates for electronic signatures shall contain:

(a) an indication, at least in a form suitable for automated processing, that the certificate has been issued as a qualified certificate for electronic signature;

(b) a set of data unambiguously representing the qualified trust service provider issuing the qualified certificates including at least, the Member State in which that provider is established and

– for a legal person: the name and registration number as stated in the official records,

– for a natural person: the person’s name;

(c) a set of data unambiguously representing the signatory to whom the certificate is issued including at least the name of the signatory or a pseudonym, which shall be identified as such;

(d) electronic signature validation data which correspond to the electronic signature creation data;

(e) details of the beginning and end of the certificate’s period of validity;

(f) the certificate identity code which must be unique for the qualified trust service provider;

(g) the advanced electronic signature or advanced electronic seal of the issuing qualified trust service provider;

(h) the location where the certificate supporting the advanced electronic signature or advanced electronic seal referred to in point (g) is available free of charge;

(i) the location of the certificate validity status services that can be used to enquire about the validity status of the qualified certificate;

(j) where the electronic signature creation data related to the electronic signature validation data are located in a qualified electronic signature creation device, an appropriate indication of this, at least in a form suitable for automated processing.

 ANNEX II

 Requirements for qualified signature creation devices

1. Qualified electronic signature creation devices shall ensure, by appropriate technical and procedural means, that at least:

(a) the secrecy of the electronic signature creation data used for electronic signature generation is assured;

(b) the electronic signature creation data used for electronic signature generation can occur only once;

(c) the electronic signature creation data used for electronic signature generation cannot, with reasonable assurance, be derived and the electronic signature is protected against forgery using currently available technology;

(d) the electronic signature creation data used for electronic signature generation can be reliably protected by the legitimate signatory against use by others.

2. Qualified electronic signature creation devices shall not alter the data to be signed or prevent such data from being presented to the signatory prior to signing.

3. Generating or managing electronic signature creation data on behalf of the signatory shall be done by a qualified trust service provider.

4. Qualified trust service providers managing electronic signature creation data on behalf of the signatory may duplicate the electronic signature creation data for back-up purposes provided the following requirements are met:

(a) the security of the duplicated datasets must be at the same level as for the original datasets;

(b) the number of duplicated datasets shall not exceed the minimum needed to ensure continuity of the service.

ANNEX III

Requirements for qualified certificates for electronic seals

Qualified certificates for electronic seals shall contain:

(a) an indication, at least in a form suitable for automated processing, that the certificate has been issued as a qualified certificate for electronic seal;

(b) a set of data unambiguously representing the qualified trust service provider issuing the qualified certificates including at least the Member State in which that provider is established and

– for a legal person: the name and registration number as stated in the official records,

– for a natural person: person’s name;

(c) a set of data unambiguously representing the legal person to whom the certificate is issued, including at least name and registration number as stated in the official records;

(d) electronic seal validation data which correspond to the electronic seal creation data;

(e) details of the beginning and end of the certificate’s period of validity;

(f) the certificate identity code which must be unique for the qualified trust service provider;

(g) the advanced electronic signature or advanced electronic seal of the issuing qualified trust service provider;

(h) the location where the certificate supporting the advanced electronic signature or advanced electronic seal referred to in point (g) is available free of charge;

(i) the location of the certificate validity status services that can be used to enquire the validity status of the qualified certificate;

(j) where the electronic seal creation data related to the electronic seal validation data are located in a qualified electronic seal creation device, an appropriate indication of this, at least in a form suitable for automated processing.

ANNEX IV

Requirements for qualified certificates for website authentication

Qualified certificates for website authentication shall contain:

(a) an indication, at least in a form suitable for automated processing, that the certificate has been issued as a qualified certificate for website authentication;

(b) a set of data unambiguously representing the qualified trust service provider issuing the qualified certificates including at least the Member State in which that provider is established and

– for a legal person: the name and registration number as stated in the official records,

– for a natural person: person’s name;

(c) a set of data unambiguously representing the legal person to whom the certificate is issued, including at least name and registration number as stated in the official records;

(d) elements of the address, including at least city and Member State, of the legal person to whom the certificate is issued as stated in the official records;

(e) the domain name(s) operated by the legal person to whom the certificate is issued;

(f) details of the beginning and end of the certificate’s period of validity;

(g) the certificate identity code which must be unique for the qualified trust service provider;

(h) the advanced electronic signature or advanced electronic seal of the issuing qualified trust service provider;

(i) the location where the certificate supporting the advanced electronic signature or advanced electronic seal referred to in point (h) is available free of charge;

(j) the location of the certificate validity status services that can be used to enquire the validity status of the qualified certificate.

Burofax electrónico por e-mail


Frecuentemente se habla de “Burofax online” o “Burofax electrónico” al querer hacer referencia a un sistema de comunicación fehaciente por via electrónica, gracias a que el servicio Burofax de correos (de entrega en domicilio) se ha consolidado como uno de los pocos servicios del mundo físico que certifican el contenido de una comunicación, y a que la penetracion del mundo de internet hace presumir que existen servicios equivalentes en el mundo “on-line“.

EADTrust, prestador de servicios de certficación del que soy socio inversor, está impulsando un servicio alternativo denominado Noticeman (Notice Manager) que aporta la prueba (o evidencia electrónica) de la recepción y la certificación del contenido a los mensajes enviados a direcciones de correo electrónico.

En general, una comunicación fehaciente es aquella de la cual es posible demostrar en todo momento que se ha llevado a cabo, así como cual ha sido su contenido, por haber utilizado  un medio que pemita demostrarlo. Existen diversas posibilidades de conseguir este efecto como por ejemplo la realizda por conducto notarial.

Por supuesto, si se desea que el mensaje se entregue en una dirección física, están disponibles los clásicos servicios de Correos: el  Telegrama y el Burofax, que permiten certificar la entrega y el contenido (asumiendo costes adicionales). Y a día de hoy es posible usar estos servicios sin desplazarse a la oficina de correos, a través de su página web. También existen servicios alternativos de prestadores diferentes a Correos, ya que el servicio Burofax no está incluido entre los básicos del Prestador del Servicio Postal Universal.

Contra lo que fecuentemente  se supone, no es una comunicación fehaciente el envío de una carta certificada con acuse de recibo, ya que el acuse de recibo sólo acredita la recepción, y el certificado sólo acredita el hecho de que se ha realizado un envío, pero ni uno ni otro sirven para demostrar cuál es el contenido de la comunicación.

Sin embargo, las comunicaciones fehacientes verdaderamente “on-line” son aquellas que se entregan en la dirección “on-line” del destinatario, como por ejemplo su dirección de correo electrónico.

En este contexto destaca Noticeman, sistema de comunicación fehaciente desplegado por EADTrust, prestador de servicios de certificación que actúa como “tercero de confianza”. Se trata de una notificación certificada sobre la que se puede demostrar el intento de notificación, la recepción por el destinatario, el contenido, y, de existir, la reacción del destinatario (por ejemplo, en caso de contratos, su aceptación).

Y por tan solo 3,5 euros (o menos, si se adquieren paquetes de notificaciones). Mucho más económico que el equivalente en papel.

Una jueza de Málaga dice que pagar con tarjeta ajena en internet no es delito


Aunque la noticia es antigua (de 2006), la traigo a colación porque es una muestra de que es necesario cambiar la legislación asociada al comercio electrónico, para que no pueda dar lugar a estos atropellos.

La he recogido de: Comprar en Internet con tarjeta ajena no es delito

Una inesperada sentencia judicial que podría poner en serios problemas al comercio electrónico de nuestro país.
La Magistrada Juez del Juzgado de Lo Penal número 3 de Málaga ha absuelto a dos acusados de fraude por realizar una compra con tarjeta de crédito ajena a través de Internet.

La compra había sido llevada a cabo sin el consentimiento ni autorización de su titular.

La Magistrada considera que los hechos no suponen una estafa, ya que ni se han ocultado ni manipulado datos.

La responsabilidad recae en la tienda por no haber llevado a cabo ningún tipo de comprobación sobre la identidad real del titular.

Una sentencia polémica sin duda…

SENTENCIA

Málaga, a 19 de diciembre del año dos mil cinco

Visto, por la Magistrada -Juez del Juzgado de Lo Penal número 3 de esta Provincia, Dª Maria  Luisa de la Hera Ruiz-Berdejo, el juicio celebrado en el procedimiento abreviado número 59/05 seguido contra don J. I. A. L. , nacido en Ceuta , hijo de F. J. y A.M. , con D.N.I……………..representado por el Procurador Sr. B. G., asistido por el Letrado Sr. S. A. ; contra don D. G. R. , nacido en Málaga, hijo de C. y T. , con D.N……………, representado por el Procurador Sr. P. S., asistido por el Letrado Sr. J. G.; y contra D. R. R. , nacido en Teba (Málaga), hijo de D. y E. , co D.N.I. n° ……….., representado por el Procurador Sr. P. S., asistido por el Letrado Sr. J. G.

Acusados de cometer delito de estafa. Interviene el Ministerio Fiscal
ANTECEDENTES DE HECHO
lº- La causa es iniciada, ante denuncia presentada en la Comisaría General de Policía Judicial en Madrid 6 de abril del 2001. por el Juzgado de Instrucción número 5 de Málaga, como diligencias previas número 6543/01, luego procedimiento abreviado.
Seguida en sus trámites, previo reparto, la recibimos en este juzgado el día 23 de febrero del 2005, admitiendo pruebas propuestas por las partes, tenidas por pertinentes, y señalando fecha para el juicio con auto del día 4 de abril del 2005.
2º- La vista del juicio fue celebrada el pasado día 12 de este mes con la presencia de los acusados.
En ella el Ministerio Fiscal califica definitivamente los hechos como constitutivos de un delito de estafa, sancionados en los articulo 248.2° y 249 del Código Penal , estimando autores del mismo a1 acusado, sin la concurrencia de circunstancias modificativas de la responsabilidad penal y pide les sean impuesta pena de 1 año de prisión con accesoria de inhabilitación especial para el ejercicio del derecho de sufragio pasivo durante ese tiempo, costa y que indemnicen a R.F.S.L. en la suma de 438 euros. Las defensas piden la absolución.
3°- El acusado J. I. A. ha estado privado de libertad el día 1 de agosto del 2001; no tiene antecedentes penales y no consta su solvencia. D. G. R. ha estado privado de libertad el día 22 de mayo del 2001 ; no tiene antecedentes penales y no consta su solvencia. D. R. R. ha estado privado de libertad el día 22 de mayo del 2001 ; no tiene antecedentes penales y no consta su solvencia
 HECHOS PROBADOS
1°- Apreciadas en conciencia las pruebas practicadas resulta probado y así se declara que los acusados puesto previamente de común acuerdo en fecha 28 de noviembre del 2000 a través de la página www………com de la empresa R.F.S.L. realizaron el pedido de un reproductor de DVD marca Pionneer modelo 530/535 con precio de venta 438 euros a nombre de D. R. R. , designando como lugar de entrega de la mercancía el domicilio del mismo sito en esta capital C/…….. y realizando el pago con la tarjeta VISA Nº ……………., de la que era titular un tercero ajeno a los hechos, quien no había autorizado a los acusados a utilizarla.
El aparato adquirido en la forma antes descrita fue entregado en el domicilio del acusado D. R. quien lo entregó a J. I. A. quien había realizado dicho pedido a través de internet.
Una vez VISA comprobó que dicha compra no había sido efectuada por el legítimo titular de la tarjeta antes citada realizó un cargo en la cuenta de R.F.S.L. por la suma de 375,92E .
FUNDAMENTOS DERECHO
1º- A la relación de hechos probados se ha llegado partiendo de la presunción de inocencia consagrada en el art.24 -2° de la C.E. y la consiguiente necesidad de un mínimo de actividad probatoria en el acto del juicio oral ,y tras apreciar en conciencia las pruebas practicadas en el acto del juicio oral conforme establece el art. 741 de la L.E.Crim. conectado a la garantías prescritas en el art. 120 de la C.E. Fundamentalmente se han tenido en cuenta la documentación obrante en autos así como las declaraciones de los representantes de R.F.S.L. y de los acusados D. G. y D. R. que reconocen haber recibido la mercancía sí bien manifiestan que ellos no hicieron el pedido sino que lo realizó J. I. A. quien les solicita reciban la mercancía y que ignora como se abonó el precio de la misma.
El Ministerio Fiscal considera que los hechos declarados probados son constitutivos de un delito de estafa descrito en el art. 248-2° del Código Penal (» También se consideran reos de estafa los que ,con ánimo de lucro, y valiéndose de alguna manipulación informática o artificio semejante consigan la transferencia no consentida de cualquier activo patrimonial en perjuicio de tercero ,,) y sancionado en el art.249 (‘Los reos de estafa serán castigados con la pena de prisión de seis meses a tres años, si la cuantía de lo defraudado excediere de 400 euros .Para la fijación de la pena se tendrá en cuenta el importe de lo defraudado, el quebranto económico causado al perjudicado, las relaciones entre éste y el defraudador, los medios empleados por éste y cuantas otras circunstancias sirvan para valorar la gravedad de la infracción.») ambos del Código Penal. Respecto de dicho precepto la Jurisprudencia , en concreto al Audiencia provincial de Barcelona en su sentencia de 6 de octubre del 2003 señala que «Descartado, por el propio tenor literal del precepto y por el principio de ultima ratio que obliga a una interpretación restrictiva de los tipos penales, que cualquier tipo de operación en un sistema informático constituya una manipulación y afirmado que la expresión «artificio semejante»» solo puede ir referida a modos o medios semejantes de intervención en el sistema informático …semejante a la manipulación sino la utilización de dicho sistema a un fin ilícito), tal concepto y, por tanto la aplicación del tipo penal previsto en el articulo 248.2 debe restringirse a efectos penales a » las acciones que supongan intervenir en el sistema informático alterando, modificando u ocultando los datos que deban ser tratados automáticamente o modificando las instrucciones del programa, con el fin de alterar el resultado debido de un tratamiento informático y con el ánimo de obtener una ventaja patrimonial».
La estafa o fraude informático hace referencia clara, pues, a dos tipos de conductas: a) la alteración, supresión u ocultación de datos existentes en el sistema manipulando o incidiendo en el mismo directamente o empleando artificio semejante, con lo cual aunque el funcionamiento correcto del programa no se altera, se llega a un resultado no deseado, bien omitiendo la realización de operaciones procedentes (por ejemplo, no descontando un cargo), bien realizando otras improcedentes (por ejemplo dando por realizada una operación o aumentando o disminuyendo su importe real.). …
b) Las manipulaciones efectuadas no en los datos sino en la configuración del programa incidiendo en el mismo directamente o empleando artificio semejante, lo que constituye una verdadera manipulación informática que ocasiona que el programa realice operaciones en modo diferente al establecido, aun pon datos correcto, ejecutando por ejemplo un cálculo erróneo como puede ser aumentar el importe de la nómina de un empleado, desviar partidas hacia cuentas ficticias, modificar el tratamiento de cuentas corrientes para aumentar los saldos o hacer posible la autorización de pagos, transferencias, etc. » Huelga decir que ninguna de esta conductas fue llevada a cabo por los acusados los cuales compran a través de una página web un reproductor de DVD y para el pago del precio designan un número de tarjeta VISA de la que es titular otra persona totalmente ajena a los hechos. Por ello no cabe incluir la conducta de los acusados en el párrafo segundo del art. 248 del C.Penal pues los mismos no manipularon sistema o programa informático alguno sino ,cuando se les solicita el número de una tarjeta bancaria para cargar en la cuenta asociada a la misma el importe de la compra efectuada designan el n° de una tarjeta de la que no es titular ninguno de los acusados y es en la creencia de que todos loS datos introducidos en la página web al hacer el pedido del reproductor de DVD son correctos por lo que la empresa R.F.S.L. procede a hacer la entrega de dicho aparato en el domicilio indicado al hacer el pedido.
Cabe plantearse si dichos hechos pueden subsumirse en el párrafo primero del art- 248 del Código Penal («Cometen estafa los que , con ánimo de lucro, utilizaren engaño bastante para producir error en otro ,induciéndolo a realizar un acto de disposición en perjuicio propio o ajeno .») Los elementos del delito de estafa conforme a la doctrina jurisprudencial son :a)acción engañosa, precedente o concurrente que viene a constituir la ratio essendi de la estafa, realizada por el sujeto activo del delito con el fin de enriquecerse el mismo o un tercero,;que tal acción sea adecuada ,eficaz y suficiente para provocar un error esencial en el sujeto pasivo que en virtud de ese error el sujeto pasivo realice un acto de disposición o desplazamiento patrimonial que cause un perjuicio a él mismo o a un tercero; y que por consiguiente exista una relación de causalidad entre el engaño ,por una parte ,y el acto dispositivo y perjuicio por otra.(S. TS. 25-3-85,12-11-86,26-5-88 y 12-11-90 entre otras)  ;b)en cuanto a la antijuridicidad ,la transmisión económica realizada ha de implicar el ‘quebranto o violación de las normas que la rigen; c)en cuento a la culpabilidad es preciso que se ponga de manifiesto la conciencia y voluntad del acto realizado ,y además que el engaño ,como elemento subjetivo, consista en cierto artificio o maquinación incidiosa con operatividad de producir en el sujeto pasivo una equivocación o error que le induce a realizar la transmisión del objeto delictivo con beneficio lucrativo para el agente de la acción ,lo que origina el ánimo de lucro consistente en cualquier tipo de provecho ,utilidad o beneficio.(ST .S 8-3-85,31-1-90,2-4-93). Respecto a las operaciones con tarjetas de crédito el Tribunal Supremo viene señalando que «En el caso de las tarjetas de crédito la posibilidad de exigir la identificación documental de su poseedor no convierte necesariamente en inidóneo el acto engañoso de su posesión y exhibición en el interior de un comercio, sino que habrá que distinguir en cada supuesto. En efecto la buena fe y las relaciones de confianza presiden de ordinario los actos de venta en los comercios. Es un hecho notorio de la realidad que no siempre se exige la identificación documental de quien paga con tarjeta, por ser -como reconocen las recurrentes en su recurso- «poco comercial». La valoración de ese hábito dependerá en cada caso: cuando las circunstancias objetivas y personales concurrentes no justifiquen razonablemente el mantenimiento de la relación de confianza y aconsejen por el contrario comprobar la identificación del poseedor, podrá entenderse que no es un engaño idóneo la mera posesión y exhibición por sí misma del documento en manos de quien nada permite suponer que sea su verdadero titular .En tal caso la falta de comprobación de la  identidad por el comerciante si podrá valorarse como la verdadera causa del error sufrido, sin que pueda atribuirse a un engaño del sujeto activo, que merezca la calificación de idóneo o suficiente.» (S.T.S 4 -lt2001) En el presente supuesto no cabe hablar de engaño bastante por parte de los acusados por cuanto que nos encontramos ante una compra realizada no en un comercio abierto al público donde pueda existir una relación de confianza entre las partes compradora y vendedora que lleve a ésta a no comprobar si quien realiza la compra es realmente titular de la tarjeta usada como medio de pago, sino que se trata de una compra-venta realizada a través de una página web remitiendo la mercancía R.F.S.L. sin realizar la más mínima comprobación para cerciorarse de quien realizaba el pedido era realmente el titular de la tarjeta a la que había que cargar el importe de la venta y no otra persona que usase ese número fraudulentamente como realmente sucedió que el perjuicio patrimonial no es consecuencia directa del engaño empleado por los acusados sino de la falta de diligencia por parte de la empresa vendedora. Por lo cual al ser inidóneo el engaño no cabe hablar de delito de estafa.
2°-las costas procesales han de declarase de oficio en el caso de sentencia absolutoria. (art. 123 del C.Penal y art. 240 L.E.Crilm.)
FALLO
Que debo absolver y absuelvo a don J. I. A. L. , don D. G. R. y don D. R. R. del delito de estafa de que se les viene acusando por el Ministerio Fiscal, declarando de oficio las costas del juicio.
Notifiquesé informando que contra lo aquí resuelto puede recurrirse en apelación ante la Audiencia Provincial de Má1aga, interponiendo y sustanciando el recurso mediante escrito a presentar en este juzgado en el plazo de 10 días.
Deposítese en Secretaría previo testimonio en la causa.
Así lo acuerdo y firmo.

Publicado el borrador de reglamento comunitario para hacer posible la firma electrónica transfronteriza


La Comisión Europea prepara nuevas normas para facilitar las transacciones electrónicas transfronterizas seguras en Europa. El Reglamento cuyo borrador acaba de publicar, garantizará que las personas y las empresas puedan usar sus propios sistemas de identificación electrónica nacionales en otros países de la UE en que exista la identificación electrónica. También crea un mercado único de la firma electrónica y los servicios de confianza en línea afines más allá de las fronteras, asegurando que esos servicios funcionan a través de las fronteras y gozan del mismo estatuto jurídico que los trámites tradicionales en papel.

Así se dará pleno efecto a los posibles ahorros propiciados por la contratación electrónica. La propuesta respeta totalmente los sistemas de identificación nacionales, así como las preferencias de los Estados miembros que no tienen sistemas nacionales de identificación. Permite a los países con sistemas de identificación electrónica optar por quedar fuera del sistema paneuropeo. Si un Estado miembro notifica que desea sumarse a este sistema paneuropeo, debe ofrecer el mismo acceso a los servicios públicos mediante la identificación electrónica que a sus propios ciudadanos.

Neelie Kroes, Vicepresidenta de la Comisión Europea, ha declarado lo siguiente:

«Las personas y las empresas deberían poder realizar transacciones dentro de un mercado único digital sin fronteras, lo que constituye el valor de Internet. La seguridad jurídica y la confianza son esenciales, por lo que resultan necesarios un Reglamento sobre la firma electrónica y la identificación electrónica más amplio. Esta propuesta supondrá que se podrá aprovechar mejor la identificación electrónica de cada uno, si se tiene. Gracias al reconocimiento recíproco de las identificaciones electrónicas nacionales y a unas normas comunes sobre los servicios de confianza y la firma electrónica, podremos prevenir unas divisorias nacionales de Internet y de los servicios públicos en línea y facilitar la vida a millones de empresas y a un número aún mayor de ciudadanos».

El Reglamento propuesto:

  • No obligará a los Estados miembros de la UE a introducir documentos nacionales de identidad, tarjetas de identidad electrónicas u otras soluciones de identificación electrónica, ni tampoco a los particulares a obtenerlos
  • No introducirá una identificación electrónica europea ni ninguna clase de base de datos europea
  • No facilitará ni exigirá compartir información personal con otras partes.

Los principales beneficiarios de los diversos aspectos del Reglamento serán los siguientes:

  • Los estudiantes, que podrán matricularse en una universidad extranjera en línea, sin tener que viajar fuera para cumplimentar los papeles en persona.
  • Los ciudadanos que preparen su mudanza a otro país de la UE, una boda en el extranjero o múltiples declaraciones fiscales.
  • Los pacientes que requieran asistencia médica en el extranjero podrán controlar o autorizar de forma segura a un médico para que acceda a su historial médico en línea.
  • Las empresas podrán presentar ofertas en línea para contratos públicos en línea en cualquier lugar de la UE. Podrán firmar y sellar sus ofertas, además de indicar su fecha y hora, por vía electrónica en lugar de imprimir y enviar múltiples copias en papel de las ofertas mediante servicios de mensajería.
  • Las personas que deseen hacer negocios en otro país de la UE podrán crear empresas a través de Internet y presentar informes anuales en línea, todo ello con facilidad.
  • Las administraciones podrán reducir las cargas administrativas y aumentar la eficiencia, con lo que ofrecerán un mejor servicio a sus ciudadanos y ahorrarán dinero a los contribuyentes.

Antecedentes

Los dos elementos del Reglamento (la identificación electrónica y la firma electrónica) darán lugar a un entorno regulador previsible al efecto de unas interacciones electrónicas seguras y sin soluciones de continuidad entre las empresas, los ciudadanos y los poderes públicos. Esto aumentará la eficacia de los servicios en línea tanto del sector público como del privado, el negocio electrónico y el comercio electrónico en la UE.

El planteamiento sobre la firma electrónica, que se basa en que la Directiva sobre la firma electrónica vigente (Directiva 1999/93/CE), ha propiciado cierto grado de armonización de las prácticas en Europa, aunque no el suficiente.

Todos los países de la UE tienen marcos jurídicos en materia de firma electrónica, aunque esos marcos son distintos y hacen imposible en la práctica realizar transacciones electrónicas transfronterizas. Lo mismo puede decirse de servicios de confianza como lo sellos de tiempo,  los sellos electrónicos de empresa y la autenticación de sitios de Internet, que carecen de interoperabilidad europea. Por lo tanto, este Reglamento propone unas normas y prácticas comunes para esos servicios.

CEOE teme que las provisiones de la banca sequen más el crédito a pymes


La patronal de la pequeña y mediana empresa de CEOE (Cepyme) advirtió el pasado 17 de mayo de 2012 que las exigencias de recapitalización del sector bancario podrían suponer nuevas restricciones crediticias para las pymes. Su presidente, Jesús María Terciado, también urgió a un nuevo ajuste del sistema de pensiones.

Artículo de Raquel Pascual – Madrid – 18/05/2012 – 07:00 en Cinco Días

La situación es tal que ahora vas a pedir un crédito y no te lo dan aunque seas el sobrino del director del banco», aseguró ayer el presidente de la patronal de la pequeña y mediana empresa (Cepyme) adscrita a CEOE, Jesús María Terciado. Es más, manifestó sus temores acerca de que la nuevas provisiones exigidas a la banca por la reforma financiera del Gobierno -que calificó de «estratosféricas»- lleven a las entidades a cerrar aún más el grifo de la financiación a las pymes; sobre todo «con la no renovación de créditos ya concedidos», dijo tras su intervención en el Fórum Europa.

«Cuando una empresa acude a pedir un crédito ya no importa que sea solvente o insolvente, sino que el problema es que la mayor parte del sistema es insolvente», criticó al sector financiero.

Así apuntó a las «cuatro o cinco» entidades que aún están siendo evaluadas, confiando en que no haga falta su nacionalización, sino que el problema se solvente con fusiones o adquisiciones. «El resto (de entidades) deberán cumplir con los requisitos de la reforma financiera; y, mientras la prima de riesgo este así y les impida financiarse con normalidad, podrían retirar créditos a las pymes, el futuro y el que ya tienen, no renovándoselos», insistió. Ante este posible problema, el presidente de Cepyme instó a las pymes a «buscar alternativas a la bancarización» que consideró «excesiva» debido a que el crédito «ha sido demasiado abundante y barato». Entre estas alternativas, sugirió al Gobierno a que incluya en su Ley de Emprendedores -que podría aprobarse en junio- «incentivos fiscales en el tratamiento de las sociedades de capital riesgo»; así como otros estímulos a las sociedades de capital semilla o business angels.

El reto del tamaño

En cuestión de política económica, añadió que «no sería descabellado» pensar en acometer otra reforma del sistema de pensiones, que recorte más su gasto. «En este último año y medio, desde la anterior reforma, han cambiado mucho las cosas» y se han deteriorado gravemente los ingresos «mientras no dejan de subir las pensiones». Por ello, apostó más por medidas como «ampliar el periodo de cálculo de la pensión a toda la vida laboral».

Por su parte, la presidenta del Círculo de Empresarios, Mónica de Oriol, encargada ayer de presentar a Terciado, arremetió contra el regulador por la excesiva burocracia que existe para crear empresas.

Opinión del Bloguero

En mi opinión, (Julián Inza)  las exigencias de provisiones a la banca son profecías autocumplibles: cuanto más se provisiona, menos dinero queda para prestar, y por lo tanto, más probable es el escenario de impagos, por lo que más necesario es provisionar.

Algunas de las propuestas de provisón son ridículas: provisionar por los créditos «malos» más un porcentaje de los créditos «buenos», considerando que ese el porcentaje de los que se pueden «perjudicar». Es decir, se provisiona 2 veces por lo mismo. Si se provisiona un porcentaje de los créditos buenos, ua no hay que provisionar en los créditos malos más que las cuotas impagadas, no el crédito completo.

Además los escenarios de provisiones no tienen en cuenta la exposición real de cada entidad a sus propios riesgos, sino valores genéricos en la linea de ser «más papistas que el papa», sin valorar de forma adecuada las llamadas «provisiones anticíclicas»

Por cierto, el concepto de provisiones anticíclicas, que se aplica en España desde hace bastantes años, refleja el principio de los sueños del Faraón:  siete años de vacas godas y siete años de vacas flacas. Hay que ahorrar en los años de vacas gordas y gastar (con tino) en los de vacas flacas. Eso es lo que no se está haciendo.

Las provisiones anticíclicas implican que en los tiempos acuales se deben relajar las necesidades de provisiones genéricas para liberalizar el crédito.

Manuscripta@CSIC – Fondos digitalizados del CSIC


En un número reciente de Novática, editada por ATI, se presenta un artículo sobre Manuscipta@CSIC – Fondos digitalizados del CSIC.

El portal Manuscript@CSIC presenta las colecciones de manuscritos en hebreo, árabe, aljamiado, persa y turco conservados en las bibliotecas del CSIC, incorporando tanto su catalogación como su digitalización.

Se trata de una acción conjunta entre el Instituto de Lenguas y Culturas del Mediterráneo y Oriente Próximo, la Escuela de Estudios Árabes de Granada y la Unidad de de Recursos de Información Científica para la Investigación del CSIC, realizada con el fin de dar a conocer las colecciones de manuscritos en lenguas orientales conservados en sus bibliotecas: Biblioteca Tomás Navarro Tomás del Centro de Ciencias Humanas y Sociales y la Biblioteca de la Escuela de Estudios Árabes.

Presentación del número 91 de la revista Telos, dedicada a la identidad digital


El próximo Jueves 31 de mayo de 2012 se celebra en Madrid, en el Círculo de Bellas Artes, la presentación del número 91 de la revista Telos, de la Fundación Telefónica,  dedicada a la identidad digital.

En este número siete expertos de primera línea analizan algunas de las transformaciones radicales que se han producido en el concepto de identidad individual y social en diferentes planos en los que se mueven las personas.

El acto consistirá en un debate sobre las implicaciones de la identidad digital en la era de Internet, tema que se desarrolla en el dossier central del número 91 de TELOS, correspondiente a abril-junio de este año.

En este número, siete expertos de  primera línea analizan algunas de las transformaciones radicales que se han producido en el concepto de identidad individual y social en diferentes planos en los que se mueven las personas: familia, trabajo y amigos. La identidad se  construye  ya no sólo a partir de lo que somos sino también de lo que hacemos y de cómo nos relacionamos.

En esta ocasión participarán en el encuentro:

  • Borja Adsuara, director de Red.es.
  • Miguel Pérez Subías, presidente de la Asociación de Usuarios de Internet y coordinador del dossier central de la revista.
  • Genís Roca, socio director de RocaSalvatella
  • Jaime García Cantero, profesor de la Escuela de Organización Industrial.

El acto será presentado por José Fernández Beaumont, editor adjunto de Telos y moderará el debate Enrique Bustamante, coordinador de contenidos de la revista.

Información:
Fecha: Jueves 31 de mayo.
Hora: 18:30 h,
Lugar: Sala María Zambrano del Círculo de Bellas Artes (c/ Alcalá, 42. Entrada por c/ Marqués de Casa Riera, 2. Madrid).

La presentación será transmitida en directo por Internet en http://www.fundacion.telefonica.com  y contará con interpretación en lenguaje de signos.

Al final  del acto, se entregará a los asistentes el número 91 de la revista y se servirá un vino español.

Spanish banks: the world’s most competitive banking market


Interesante artículo de The Economist

BETWEEN A RANGE of arid hills and the encroaching metropolis of Madrid stands an oasis with hundreds of ancient olive trees dotted all over it. A cluster of bright, modern buildings sits alongside a green golf course in a valley. Overlooking all this is a building one floor taller than the others, with a bright silver dome under which the chairman has his office. This serene campus is home to Santander, and in some ways the Googleplex of banking. Two huge data centres—low and built like nuclear-bomb shelters—provide some of the computer networks to support a far-flung banking empire (“Brazil’s on this one, Britain on the other,” says a guide). The idea behind them is that competitive advantage in banking comes from rigorously standardising computer systems and procedures around the world and relentlessly driving down costs. “Our business model is extremely consistent everywhere,” says Mr Sáenz, Santander’s boss. “We have the same systems everywhere. Exactly the same systems.”

Spain’s two biggest banks, Santander and BBVA, have been expanding their retail operations abroad rapidly in recent decades, and have managed to do so profitably even though their own country’s economy is melting down around them. Santander, which a few decades ago was just a small regional bank, now has substantial businesses in ten countries around the world. Almost 90% of its profits are made outside Spain. BBVA, its biggest Spanish rival, has also expanded vigorously outside Spain. Between them the two banks manage more than 20,000 bank branches, most of them outside Spain. “Spain’s biggest export is the management of bank branches,” quips one Spanish banker.

Spain is arguably the world’s most competitive banking market. Thanks to its fiercely independent regions, it has a remarkable number of banks for its size. Even more remarkable is the number of branches, some 43,000, which works out at one branch for every 1,000 people, or about six times the number in Britain and more than twice as many as in France and America. “With too many players you end up overbanked because every bank wants to be everywhere,” says Pedro Rodeia at McKinsey. This keen competition pushed some smaller banks to lend recklessly, causing a banking crisis that blew up the economy. Yet it also forced banks to squeeze out costs, which at Santander and BBVA account for less than 50 cents of every euro they earn, despite their huge branch networks. Most large retail banks in other countries would be happy with anything below 60 cents.

Spanish banks embraced modernisation relatively late. Having been trapped in a bubble for many years during the fascist dictatorship, once they were freed they were able to leapfrog rivals in more developed markets. The most important innovation was the rapid and almost universal adoption by bank customers of electronic bill payments. Spain’s banks have a huge advantage in not having to process cheques or handle transactions in their branches. They have invested diligently in installing the latest and most effective computer systems, making their banks enviably efficient. Their rapid growth and the economic troubles at home raise some question marks. Even so, they have developed an innovative model of banking that is being exported around the world. It may also hold some clues about what banks elsewhere may soon be doing.

Joined-up banking

In a branch in downtown Madrid of Banesto, a bank that is owned by Santander, a branch manager pulls up a series of screens on her computer. One shows all the balances of a customer at the branch. At a glance she can see whether the customer is profitable, which of her staff is responsible for looking after him and what other banking services he might need. To non-bankers, it seems inconceivable that banks may not have a complete overview of the business they are doing with each of their customers. Yet only a handful of the world’s big banks are able to see instantly that a customer asking for a credit card may already have a savings account with them.

Spain’s banks go a step further. With another few clicks of a mouse, the branch manager can see whether the branch itself is profitable. She assembles her staff each morning to discuss which customers may need to be contacted, perhaps because they have missed a loan repayment or received an unusually large deposit.

The Spanish model is not just about using technology to drive down costs and push up employees’ productivity. It also allows very small branches to offer sophisticated advice and customer service.

Across town, Bankinter, a small but tech-savvy bank, takes this idea a step further. Just inside the bank’s entrance is a large computer screen with a camera and a phone. If customers need specialist advice on a mortgage, say, and no one can see them, they are connected by video call with a free adviser in another branch. “As customers use more channels they become more loyal, buy more products and are more satisfied—and that makes good business,” notes Accenture, a consulting firm. “With a cross-sell ratio ahead of many of their Spanish peers, Bankinter’s customer relationships are also more profitable.”

The final element of the Spanish banks’ formula is to concentrate on markets where they can achieve a significant share. They would rather be deep in a few markets than thinly spread over many. BBVA, for instance, tried its hand in Brazil but found it could not reach critical mass. Santander sold its first investments in the United States to raise the capital to bulk up in Brazil, although it has since returned. The Spanish model has been as much about banks being local in their main markets as about being international. Yet technology is changing the economies of scale involved in banking, particularly as banks try to profit from the vast amounts of data they collect on their customers.

Presentación de 19 proyectos en la 9ª edición del Foro de Inversión MADRI+D


El próximo 17 de mayo, a partir de las 9:30, tendrá lugar la novena edición del Foro de inversión madri+d en el salón de actos de Promomadrid, c/ Suero de Quiñones, 34, con la presentación a inversores (Business angels y firmas de capital riesgo-venture capital) de una veintena de iniciativas empresariales tecnológicas con necesidades de financiación.

En el Foro se presentarán los siguientes proyectos:

  • SocialERP. Revolucionario ERP «en la nube» que ofrece una plataforma de negocios virtual para facilitar oportunidades de negocio entre sus usuarios.
  • BuyFresco.com. Supermercado online de artículos de consumo doméstico.
  • Jobssy. Plataforma de inteligencia artificial orientada al análisis y recomendación de personas encontradas en Redes Sociales o en Bases de datos propietarias.
  • Azur Systems. Supermercado 24 horas automatizado.
  • Enbex. Explotación de infraestructuras inalámbricas para redes metropolitanas, centros de negocio, comunidades de vecinos, centros de logística y distribución, transporte público y privado, unidades móviles de prensa y comunicación, eventos y congresos, y poder dar respuesta a desastres.
  • Innowater. Fabricación y comercialización de tecnología de electrocloración innovadora para el tratamiento del agua.
  • Veove. plataforma para encontrar a esa persona a la que has visto (en el metro, el autobús, en un local…) a la que no conoces pero a la que te gustaría ver otra vez.
  • Krilum. Diseño, fabricación y venta de sistemas de iluminación LED con tecnología propia.
  • TouristEye. Guía de viajes web y móvil que aprende del usuario para ofrecerle recomendaciones personalizadas de a dónde viajar y qué hacer durante su viaje.
  • comprarunidos.com. reúne compradores de una misma promoción inmobiliaria para negociar con el promotor/banco y bajar el precio.
  • Floqq. Donde se pueden encontrar píldoras de formación práctica en las habilidades
  • que las empresas necesitan en un preciso momento.
  • Invoost. Juego de negociación, donde los usuarios compiten en torneos uno contra el otro con dinero virtual para tener la oportunidad de ganar dinero real.
  • WIPBI. Plataforma Cloud que genera relaciones empresariales fiables entre clientes y proveedores.
  • Besuit. Plataforma de internet en la que los usuarios conectan directamente con las discotecas sin intermediarios.
  • Holística Servicios Ecosistémicos. Restauración de espacios degradados por actividades industriales.
  • SKYbubb. Red social y sistema de campañas de marketing online multilenguaje para Smartphones basada en la realidad aumentada y la geolocalización.
  • Aupa Producciones. Aplicación que es capaz de recoger diferentes contenidos de fuentes multimedia, reconocer lo que está ocurriendo y montar un vídeo de forma automática y sin supervisión en el momento.
  • The Watch Registry. Primer registro digital, independiente, de relojes de lujo a nivel mundial.
  • EAD Trust. Ofrece servicios en modelo SaaS alrededor de la firma electrónica (XadES and PadES) y certificados electrónicos, pero en esta ocasión presenta su servicio Noticeman

La red de inversores BAN madri+d, con el apoyo del Ministerio de Industria, Energía y Turismo, CEIM y la APD facilita el contacto entre inversores privados y empresas de base tecnológica de la Comunidad de Madrid de muy reciente creación.

Si deseas asistir o transmitir esta información, la agenda preliminar y el formulario de registro pincha sobre el siguiente enlace.

Descarga el informe El Venture Capital en España 2011, con las cifras y el detalle de 246 operaciones. Accede también al informe de VC 2010.