2. GENERAL PROVISIONS

2.1. Obligations

2.1.1. CA obligations

2.1.1.1. Compliance

The CESNET CA MUST publish a CPS describing the practices employed in issuing the digital certificates. The CA MUST operate in accordance with its CPS, and the law of the Czech Republic.

2.1.1.2. Assurance of cross certification compliance

The CESNET CA MUST verify that any CA with which it cross-certifies complies with the mutually recognized CPs.

2.1.1.3. Certificate requests

The CA is obliged to handle certificate requests and issue new certificates:

  • accept certification requests from entities requesting a certificate according to the agreed procedures contained in this CPS and in the relevant CP

  • authenticate entities requesting a certificate, possibly by the help of separately designated RAs

  • issue certificates based on requests from authenticated entities

  • send notification of issued certificate to requesters

  • make issued certificates publicly available

2.1.1.4. Certificate revocation

The CA is obliged to handle certificate revocation requests and certificate revocation:

  • accept revocation requests from entities requesting a certificate to be revoked according to the agreed procedures contained in this CPS and the relevant CP

  • authenticate entities requesting a certificate to be revoked

  • issue a CRL

  • make CRLs publicly available

2.1.1.5. Data privacy

The CA is authorized to collect the information related to personal data that is necessary to perform its services. These personal data can only be used in the context of the certification services provision. The subscriber has the right to access and request correction of these data.

2.1.1.6. Protection of issuing CA's private key

The CA is obliged to protect its private key in accordance with this CPS.

2.1.1.7. Restriction on issuing CA's private key use

The CA's private key used for issuing certificates in accordance with this CPS may be used only for signing certificates and CRLs, and other adequate information consistent with the certificate issuance.

2.1.2. RA obligations

An RA is obliged to operate RA service. This includes:

2.1.2.1. Compliance

The RA MUST operate in accordance with its CPS and the law of the Czech Republic.

2.1.2.2. Authentication of the subject's identity

The RA is obliged to authenticate the identity of the subject to be certified using procedures specified in Section 3.1.

2.1.2.3. Validation of the connection between a public key and the requester identity

The RA is obliged to verify that the requester is in possession of the private key corresponding to the public key contained in the certificate request using procedures specified in Section 3.1.7.

2.1.2.4. Maintain certificate application information

The RA is obliged to keep supporting evidence for any certificate request made to a CA (e. g., certificate request forms) in accordance with this CPS.

2.1.2.5. Protection of RA's private key

The RA is obliged to protect its private key in accordance with this CPS.

2.1.2.6. Restriction on RA private key use

The private key used by a RA for signing certificate signing requests (CSRs), certificate suspensions, and certificate revocations as part of its RA function must not be used for any other purpose. Separate certificates will be issued to facilitate routine secure communication by the RA.

2.1.3. Subscriber obligations

2.1.3.1. Accuracy of representations in certificate applications

Subscribers MUST accurately represent the information required of them in a certificate request process.

2.1.3.2. Key pair generation

Subscribers MUST generate their public key pair using a trustworthy method.

2.1.3.3. Protection of entity's private key

Subscribers MUST properly protect their private key at all times, against loss, disclosure to any other party, modification and unauthorized use, in accordance with this CPS and the relevant CP. From the creation of their private and public key pair, subscribers are personally and solely responsible of the confidentiality and integrity of their private keys. Every usage of their private key is assumed to be the act of its owner.

2.1.3.4. Notification of CA upon private key compromise

Upon suspicion that their private keys are compromised subscribers MUST notify the CA that issued their certificates by sending a certificate revocation request.

2.1.3.5. Notification of CA upon any change in their certificate content

Upon any change in the content of their certificates subscribers MUST notify the CA that issued their certificates by sending a certificate revocation request.

2.1.3.6. Restrictions on private key and certificate use

Subscribers MUST use the keys and certificates only for the purposes authorized by the CA.

2.1.3.7. Personal data

By submitting a certificate request, the subscriber authorizes the CESNET CA to treat and conservate their personal data in compliance with this CPS.

2.1.4. Relying party obligations

2.1.4.1. CPS

A relying party MUST be familiar with the CPS and the relevant CP before drawing any conclusion on how much trust he can put in the use of a certificate issued from the CA.

2.1.4.2. Purposes for which certificate is used

The relying party MUST only use the certificate for the proscribed applications and MUST NOT use the certificates for forbidden applications

2.1.4.3. Digital signature verification responsibilities

Relying parties MUST verify the digital signature of a received digitally signed message and to verify the digital signature of the CA who issued the certificate used for the verification purpose.

2.1.4.4. Revocation and suspension checking responsibilities

When validating a certificate a relying party MUST check it for its validity, revocation, or suspension.

2.1.5. Repository obligations

The CESNET CA SHALL use a publicly accessible repository to store certificates and Certificate Revocation Lists (CRLs). The repository SHALL be available as much as practically possible.

2.2. Liability

2.2.1. CA liability

The CESNET CA warrants that all certificates issued were issued in accordance with this CPS and the relevant CP.

2.2.2. RA liability

RA warrants that subscriber's identity has been verified and that the identities in the certificate were valid at the time of issuance.

2.3. Financial responsibility

No financial responsibility is accepted for certificates issued under this CPS.

2.3.1. Indemnification by relying parties

The CESNET CA assumes no financial responsibility for improperly used certificates.

2.3.2. Fiduciary relationships

Issuance of certificates in accordance with this CPS and the corresponding CP does not make the CESNET CA, or any RA within the CESNET CA infrastructure an agent, fiduciary, trustee, or other representative of subscribers or relying parties.

2.3.3. Administrative processes

Not applicable.

2.4. Interpretation and Enforcement

2.4.1. Governing law

This CPS is governed by the law of the Czech Republic.

2.4.2. Severability, survival, merger, notice

Should it be determined that one section of this CPS is incorrect or invalid, the other sections shall remain in effect until the CPS is updated as indicated in Chapter 8

2.4.3. Dispute resolution procedures

In case of a dispute based on the contents of this CPS, the Director of CESNET a. l. e. will be the sole person responsible for resolution of the problem. The complainer cannot take legal action against CESNET a. l. e. or any of the CESNET a. l. e. partners.

If arbitration proves impossible, the parties can take legal actions.

2.5. Fees

2.5.1. Certificate issuance or renewal fees

No fees are charged for issuing certificates.

2.5.2. Certificate access fees

Access to certificates on the CESNET CA Certificate Registry is free of charge.

2.5.3. Revocation or status information access fees

Access to Certificate Revocation Lists on the CESNET CA Certificate Registry is free of charge.

2.5.4. Fees for other services such as policy information

No fees are charged for allowing policy and CPS information access.

2.5.5. Refund policy

Not applicable.

2.6. Publication and Repository

2.6.1. Publication of CA information

The CESNET CA MUST make publicly available, in its repositories:

  1. The CESNET CA Certificate Practice Statement in http://www.cesnet.cz/pki/CPS.html
  2. The applicable Certificate Policies in http://www.cesnet.cz/pki/CP/.
  3. All issued certificates including CA-certificates in ldap://ldap.cesnet-ca.cz/.
  4. Signed Certificate Revocation Lists in http://www.cesnet.cz/pki/crl/.

2.6.2. Frequency of publication

CRL publication must be in accordance with Section 4.4.9 of this CPS.

CPS publication must be in accordance with Chapter 8 of this CPS.

2.6.3. Access controls

There is no access control on reading the CP or the CPS.

There is no access control on reading the certificates.

The certificates, CRLs, CPs and CPS in the electronic repository are protected against any unauthorized modification.

2.6.4. Repositories

Chosen electronic repository must comply to this CPS. See Section 2.1.5.

2.7. Compliance audit

The CESNET CA declares that their practices fully comply with this CPS.

2.7.1. Frequency of entity compliance audit

No stipulation

2.7.2. Identity/qualifications of auditor

No stipulation

2.7.3. Auditor's relationship to audited party

No stipulation

2.7.4. Topics covered by audit

No stipulation

2.7.5. Actions taken as a result of deficiency

No stipulation

2.7.6. Communication of results

No stipulation

2.8. Confidentiality

The CA collects personal information about the subscribers (e. g. full name, organization, and e-mail address). These data MUST be processed in a way that ensures privacy protection according to the law of the Czech Republic.

2.8.1. Types of information to be kept confidential

All subscribers' information that is not present in the certificate and CRL issued by the CESNET CA is considered confidential and SHALL not be released outside without explicit subscriber's authorization.

2.8.2. Types of information not considered confidential

Information included in public certificates and CRLs issued by the CESNET CA are not considered confidential.

2.8.3. Disclosure of certificate revocation/suspension information

When a certificate is revoked, a reason code MAY be included in the CRL entry for the action. This reason code is not considered confidential and may be shared with all other users and relying parties. However, no other details concerning the revocation are normally disclosed.

2.8.4. Release to law enforcement officials

The CESNET CA MUST NOT disclose confidential information to any third party, except when required by law enforcement officials that exhibit regular warrant.

2.8.5. Release as part of civil discovery

The CESNET CA MUST NOT disclose confidential information to any third party, except when required by law enforcement officials that exhibit regular warrant.

2.8.6. Disclosure upon owner's request

The CA will release information if authorized by the subscriber.

2.8.7. Other information release circumstances

Not applicable

2.9. Intellectual Property Rights

The CESNET CA claims no intellectual property rights on issued certificates.