Issuer: Riigikogu Type: seadus In force from: 01.07.2014 In force until: 25.10.2016 Publication notation: RT V, 08.07.2014, 7 Digital Signatures Act1 Passed 08.03.2000 RT I 2000, 26, 150 Entry into force 15.12.2000 Amended by the following acts Passed - Published - Entry into force 15.11.2000 - RT I 2000, 92, 597 - 01.01.2001 12.06.2001 - RT I 2001, 56, 338 - 07.07.2001 05.06.2002 - RT I 2002, 53, 336 - 01.07.2002 19.06.2002 - RT I 2002, 61, 375 - 01.08.2002 17.12.2003 - RT I 2003, 88, 591 - 01.01.2004 17.12.2003 - RT I 2003, 88, 594 - 08.01.2004 24.01.2007 - RT I 2007, 12, 66 - 01.01.2008 15.02.2007 - RT I 2007, 24, 127 - 01.01.2008 04.12.2008 - RT I 2009, 1, 3 - 12.01.2009 22.04.2010 - RT I 2010, 22, 108 - 01.01.2011, enters into force on the date which has been determined in the Decision of the Council of the European Union regarding the abrogation of the derogation established in respect of the Republic of Estonia on the basis provided for in Article 140 (2) of the Treaty on the Functioning of the European Union, Council Decision 2010/416/EU of 13 July 2010 (OJ L 196, 28.07.2010, pp. 24–26). 19.02.2014 - RT I, 13.03.2014, 4 - 01.07.2014 1. chapter GENERAL PROVISIONS § 1. Scope of application of Act () This Act provides the conditions necessary for using digital signatures and digital seals, and the procedure for exercising supervision over the provision of certification services and time-stamping services. [ RT I 2009 1 3 - pub. 12.01.2009] § 2. Digital signature (1) A digital signature is a data unit, created using a system of technical and organisational means, which is used by a signatory to indicate his or her link to a document. (2) A digital signature is created by using the data necessary for giving a signature contained in a secure signature creation device (hereinafter private key) to which the data needed for verification of the signature contained in a signature verification device (hereinafter public key) uniquely correspond. [ RT I 2009 1 3 - pub. 12.01.2009] (3) A digital signature and the system of using the digital signature shall: 1) enable unique identification of the person in whose name the signature is given; 2) enable determination of the time when the signature is given; 3) link the digital signature to data in such a manner as to preclude the possibility of changing the data or the meaning thereof undetectably after the signature is given. § 2^1. Digital seal (1) A digital seal is a data unit created by a system of technical and organisational means which the holder of the digital seal certificate uses to certify the integrity of a digital document and to link the certificate holder to such document. (2) A digital seal is created by a private key contained in a secure signature creation device to which the public key uniquely corresponds. (3) A digital seal and the system of using the digital seal shall: 1) enable unique identification of the certificate holder in whose name the digital seal is given; 2) enable determination of the time when the digital seal is given; 3) link the digital seal to the data in the document in such a manner as to preclude the possibility of changing the data or the meaning thereof undetectably after the seal is given. [ RT I 2009 1 3 - pub. 12.01.2009] § 3. Legal consequences of using digital signatures (1) A digital signature has the same legal consequences as a hand-written signature if these consequences are not restricted by law and if the compliance of the signature with the requirements of subsection 2 (3) of this Act is proved. (2) The compliance of a digital signature given according to the principles provided for in Chapters II–V of this Act with the requirements of subsection 2 (3) of this Act need not be proved separately if the data with the digital signature enable unique determination of the certificate containing the public key to which the private key, whereby the digital signature is given, corresponds. (3) The giving of a digital signature does not have the consequences provided for in subsection (1) of this section if it is proved that the private key was used for giving the signature without the consent of the holder of the corresponding certificate. (4) The giving of a digital signature without the consent of the holder of the corresponding certificate is deemed to be proved if the certificate holder proves the circumstances upon existence of which it may be presumed that the signature has been given without his or her consent. (5) In the cases specified in subsection (3) of this section, the certificate holder shall compensate for damage caused to another person who erroneously presumed that the signature was given by the certificate holder, if the private key was used without the consent of the certificate holder due to the intent or gross negligence of the certificate holder. § 4. Use of digital signatures and digital seals () State and local government agencies, legal persons in public law, and persons in private law performing public law functions are required to provide access through a public data communication network to information concerning the possibilities and procedure for using digital signatures and digital seals in communication with such agencies and persons. [ RT I 2009 1 3 - pub. 12.01.2009] § 4^1. Application of Administrative Procedure Act () The provisions of the Administrative Procedure Act apply to administrative procedures prescribed in this Act, taking account of the specifications provided for in this Act. [ RT I 2002 61 375 - pub. 01.08.2002] 2. chapter CERTIFICATES 1. division Certificates and Requirements for Certificates § 5. Certificates (1) For the purposes of this Act, a certificate is a document which is issued in order to enable a digital signature or digital seal to be given and verified and in which a public key is uniquely linked to the certificate holder. [ RT I 2009 1 3 - pub. 12.01.2009] (11) Several digital seal certificates may be issued to one person. [ RT I 2009 1 3 - pub. 12.01.2009] (2) A certificate shall set out: 1) the number of the certificate; 2) the name of the certificate holder; 2^1) the personal identification code or registry code of the certificate holder; [ RT I 2009 1 3 - pub. 12.01.2009] 3) the public key of the certificate holder; 4) the period of validity of the certificate; 5) the issuer and registry code of the issuer; 6) a description of the limitations on the scope of use of the certificate. (3) The issuer of a certificate shall confirm each certificate issued by it. § 6. Certificate holder () For the purposes of this Act, a certificate holder is a natural person in the case of a digital signature and either a natural or a legal person in the case of a digital seal, to whose data the public key contained in the certificate is linked in the same certificate. [ RT I 2009 1 3 - pub. 12.01.2009] 2. division Application for and Issue of Certificates § 7. Creation of private and public keys (1) A private key and a public key are created by an applicant for a certificate or, at his or her request and according to an agreement between the parties, by a certification service provider or another person or agency. (2) Persons who create private and public keys for other persons shall not create copies of the keys for themselves or for third parties. § 8. Application for certificates (1) A person wishing to obtain a certificate for giving and verifying a digital signature shall submit a written application to a certification service provider setting out: [ RT I 2009 1 3 - pub. 12.01.2009] 1) the given name and surname of the applicant for the certificate; 2) the personal identification code of the applicant for the certificate or, in the absence of a personal identification code, the day, month and year of birth of the applicant for the certificate; 3) the public key of the applicant for the certificate if it exists or an authorisation to the certification service provider for the creation of a private and public key; [ RT I 2009 1 3 - pub. 12.01.2009] 4) the contact details of the applicant for the certificate; 5) the period of validity of the certificate applied for; 6) a description of the limitations on the scope of use of the certificate; 7) other data which the applicant requests to have added to the certificate. (1^1) A person wishing to obtain a certificate for giving and verifying a digital seal shall submit a written application to a certification service provider setting out: 1) the name of the applicant for the certificate; 2) the personal identification code or the registry code and seat or residence of the applicant for the certificate; 3) the public key of the applicant for the certificate or an application for the creation of a private and public key by the certification service provider; 4) the contact details of the applicant for the certificate; 5) the period of validity of the certificate applied for; 6) other data which the applicant requests to have added to the certificate. [ RT I 2009 1 3 - pub. 12.01.2009] (2) If the public key of an applicant for a certificate is set out in an application specified in subsection (1) or (1^1 ) of this section, the applicant for the certificate shall prove that the private key corresponding to the public key is in his or her possession. [ RT I 2009 1 3 - pub. 12.01.2009] § 9. Issuer of certificates () For the purposes of this Act, an issuer of a certificate is a person or agency that issues the certificate and is responsible for the accuracy of the data contained in the certificate. § 10. Issue of certificates (1) The issuer of a certificate is required to verify that the application submitted for the certificate complies with this Act and that the data contained in the application are accurate. (1^1) The issuer of a certificate has the right to verify the validity of an identity document on the basis of which a person is identified and the right of representation of a representative of the person. [ RT I 2009 1 3 - pub. 12.01.2009] (2) A certificate is issued to a person promptly after entry of the corresponding data in the database of certificates which is maintained by the issuer of the certificate. (3) The issuer of a certificate is required to notify the applicant for the certificate of the conditions of use of the certificate, the rights and obligations of the certificate holder, and other circumstances related to the use of the certificate. 3. division Period of Validity, and Suspension and Revocation of Certificates § 11. Period of validity of certificates (1) A certificate is valid as of the beginning of the period of validity set out in the certificate but not before entry of the corresponding data in the database of certificates which is maintained by the issuer of the certificate. (2) A certificate expires upon expiry of the period of validity set out in the certificate or upon revocation of the certificate. § 12. Suspension of certificates (1) A certification service provider has the right to suspend a certificate if the certification service provider has a reasonable doubt that incorrect data have been entered in the certificate or that it is possible to use the private key corresponding to the public key contained in the certificate without the consent of the certificate holder. (2) A certification service provider is required to suspend a certificate if this is requested by: 1) the certificate holder; 2) the data protection supervision authority or the chief processor of the register of certification if there is a reasonable doubt that incorrect data have been entered in the certificate or that it is possible to use the private key corresponding to the public key contained in the certificate without the consent of the certificate holder; [ RT I 2009 1 3 - pub. 12.01.2009] 3) a court, prosecutor’s office or a pre-trial investigation authority in criminal matters in order to combat criminal offences. (3) After verification of the legality of the claim for suspension of a certificate, the certification service provider is required to promptly enter the data concerning suspension in the database of certificates which is maintained by it. (4) The certification service provider shall notify the certificate holder promptly of suspension of the certificate. (5) Certification service providers are required to maintain records of the time of and bases and applicants for suspension of certificates, and of termination of the suspension of certificates. (6) Digital signatures or digital seals given during the period when a certificate is suspended are invalid. [ RT I 2009 1 3 - pub. 12.01.2009] § 13. Termination of suspension of certificates (1) Suspension of a certificate is terminated on the basis of an application of the certificate holder or a person or agency requesting the suspension of the certificate by entry of the corresponding data in the database of certificates which is maintained by the certification service provider that issued the certificate. (2) In the cases specified in clause 12 (2) 3) of this Act, the person who initiates the suspension may terminate the suspension of a certificate. (3) A certification service provider shall notify the certificate holder promptly of termination of the suspension of the certificate. § 14. Revocation of certificates (1) The following are the bases for revocation of a certificate: 1) an application of the certificate holder; 2) an opportunity for using the private key corresponding to the public key set out in the certificate without the consent of the certificate holder; 3) divestment of the certificate holder of active legal capacity; 4) declaration of the death of the certificate holder; 5) the death of the certificate holder; 5^1) deletion from the register of the certificate holder due to dissolution or release or removal from office of a certificate holder who is a holder of office in public law; [ RT I 2009 1 3 - pub. 12.01.2009] 6) submission of false data to a certification service provider by the certificate holder in order to obtain the certificate; 7) termination of the activities of the certification service provider; 8) other cases provided by law. (2) Certificate holders or other persons have the right to request revocation of a certificate by submission of a corresponding application. (3) A certificate is revoked by a certification service provider who initiates the procedure for revocation promptly after receipt of a corresponding application or upon the existence of another basis provided for in subsection (1) of this section. § 15. Procedure for revocation of certificates (1) If the cases set out in clauses 14 (1) 3) – 8) of this Act are the reasons for revocation of a certificate, the documents which certify the basis for revocation of the certificate shall be appended to the application. (2) Certification service providers are required to verify the legality of applications and bases for revocation of certificates. (3) A certificate expires as of entry of the corresponding data in the database of certificates which is maintained by the certification service provider. (4) Certification service providers are required to preserve documents which certify the reasons for revocation of a certificate until the termination of their activities, unless another term is provided for by law. § 16. Consequences of suspension and revocation of certificates without legal basis () A person or agency that without legal basis, intentionally or due to gross negligence, causes suspension or revocation of a certificate is required to compensate for damage caused by the suspension or revocation of the certificate. 3. chapter CERTIFICATION SERVICES AND CERTIFICATION SERVICE PROVIDERS § 17. Certification services (1) The issue of certificates necessary for giving digital signatures and digital seals, the enabling of verification of digital signatures and digital seals given on the basis of such certificates, and procedures for suspension, termination of suspension and revocation of such certificates are certification services. [ RT I 2009 1 3 - pub. 12.01.2009] (2) Certification is an act as a result of which a certification service provider issues a certificate to an applicant for the certificate. § 18. Certification service providers (1) The following agencies and persons that are entered in the register of certification as service providers and that are registered in the corresponding register in Estonia may be certification service providers: [ RT I 2009 1 3 - pub. 12.01.2009] 1) public limited companies; 2) private limited companies the share capital of which exceeds 25 000 euros; [ RT I 2010 22 108 - pub. 01.01.2011] 3) legal persons in public law if this is prescribed in an Act concerning the legal person in public law; 4) state agencies determined by the Government of the Republic. (2) [Repealed] § 19. Requirements for certification service providers (1) Certification service providers shall comply with the requirements established by this Act and be capable of ensuring reliable certification services in accordance with laws and legislation issued on the basis of laws. (2) Certification service providers are required to ensure the conduct of an annual information systems audit by the date of entry in the register of certification, and to submit the results of the audit to the authorised processor of the register of certification. [ RT I 2009 1 3 - pub. 12.01.2009] (3) Certification service providers shall not have tax arrears or other arrears which compromise the provision of certification services in compliance with the principles provided for in Chapters II–V of this Act. (4) Certification service providers are required to insure their activities pursuant to the procedure provided for in § 39 of this Act. § 20. Certification principles (1) The descriptions of the organisational and technical means which comply with this Act and requirements established on the basis thereof and which are used in certification by certification service providers, and the descriptions of the requirements set for applicants for certificates by certification service providers are certification principles. (2) The certification principles of a certification service provider shall set out the following: 1) the name of the certification service provider; 2) the address of the seat of the certification service provider; 3) the procedure for proving the private key corresponding to the public key of the applicant for the certificate; 4) a description of the technical means used to provide certification services; 5) the procedure and terms for certification procedure; 6) the procedure for review of applications for certificates; 7) the procedure for issue of certificates; 8) the mechanisms for description of limitations on the scope of use of certificates; 9) the procedure for maintaining records of the issued certificates; 10) the procedure for release of information concerning the validity of certificates; 11) the procedure for generation and storage of keys and the description of the means prescribed for the storage of the personal key of the certification service provider; [ RT I 2009 1 3 - pub. 12.01.2009] 11^1) the procedure for confirmation of the issued certificates; 12) the procedure for suspension and revocation of certificates; 13) an action plan in case it is possible to imitate the certification service provider or the activities thereof upon provision of services; 14) the technical procedure for suspension, termination of suspension, and revocation of certificates issued by the certification service provider; 15) the procedure for termination of the provision of certification services; 16) other circumstances which the certification service provider deems necessary to have provided in the certification principles. (3) The certification principles of a state agency which is determined by the Government of the Republic and which provides certification services, and the cost of the services provided by the state agency shall be approved by the head of the state agency. § 21. Restrictions on employees of certification service providers () Employees of certification service providers who are involved in providing certification services shall not have a criminal record for an intentionally committed criminal offence. § 22. Duties of certification service providers () Certification service providers are required to: 1) publicise their certification principles and ensure accessibility thereto in a public data communication network; 2) ensure maintenance of the confidentiality of information not subject to disclosure which becomes known to them upon the provision of certification services; 3) maintain records of the certificates issued by them and the validity thereof; 4) accept applications for the suspension of certificates twenty-four hours a day; 5) certify, at the request of an interested person, by the digital signature of their representative the validity of a digital signature given by a private key corresponding to the public key contained in a certificate issued by them; 6) ensure that it is possible to verify the validity of certificates in a public data communication network twenty-four hours a day; 7) preserve documentation related to certification until the termination of their activities; 8) ensure the conduct of an annual information systems audit and submit the results of the audit to the authorised processor of the register of certification; [ RT I 2009 1 3 - pub. 12.01.2009] 9) publicise the conditions of compulsory insurance contracts in a public data communication network; 10) inform the authorised processor of the register of certification of any changes to a public key used for the provision of certification services. [ RT I 2009 1 3 - pub. 12.01.2009] 4. chapter TIME-STAMPING SERVICES AND TIME-STAMPING SERVICE PROVIDERS § 23. Definition of time stamp (1) A time stamp is a data unit created using a system of technical and organisational means which certifies the existence of a document at a given time. (2) A time stamp shall be linked to data in such a manner as to preclude the possibility of changing the data undetectably after obtaining the time stamp. (3) Time-stamping service providers shall confirm the time stamps issued by them. § 24. Time-stamping services (1) Time-stamping services are the issue of time stamps necessary to prove the official time and temporal order of digital signatures and digital seals and the creation of conditions for verification of issued time stamps. [ RT I 2009 1 3 - pub. 12.01.2009] (2) If it is impossible to determine the official time and temporal order of time stamps issued by different time-stamping service providers, the time stamps are deemed to have been issued simultaneously. (3) Time-stamping service providers shall ensure that it is impossible to issue a correct time stamp for a time earlier or later than application therefore or change the order in which time stamps are issued. § 25. Time-stamping service providers () The following persons and agencies that are entered in the register of certification as corresponding service providers and that are registered in the corresponding register in Estonia may be time-stamping service providers: [ RT I 2009 1 3 - pub. 12.01.2009] 1) public limited companies; 2) private limited companies the share capital of which exceeds 25 000 euros; [ RT I 2010 22 108 - pub. 01.01.2011] 3) legal persons in public law if this is prescribed in an Act concerning the legal person in public law; 4) state agencies determined by the Government of the Republic. § 26. Requirements for time-stamping service providers (1) Time-stamping service providers shall comply with the requirements established by this Act and be capable of ensuring reliable time-stamping services in accordance with Acts and legislation issued on the basis of Acts. (2) Time-stamping service providers are required to ensure the conduct of an annual information systems audit and submit the results of the audit to the authorised processor of the register of certification by the date of entry in the register of certification. [ RT I 2009 1 3 - pub. 12.01.2009] (3) Time-stamping service providers shall not have tax arrears or other arrears which compromise the provision of time-stamping services in compliance with the principles provided for in Chapters II–V of this Act. (4) Time-stamping service providers are required to insure their activities pursuant to the procedure provided for in § 39 of this Act. § 27. Time-stamping principles (1) The descriptions of operations performed in order to issue and verify time stamps and the descriptions of the technical means used by the time-stamping service providers are time-stamping principles. (2) The time-stamping principles of a time-stamping service provider shall set out the following: 1) the name of the time-stamping service provider; 2) a description of the technical means used to provide time-stamping services; 3) the procedure for obtaining and verifying time stamps; 3^1) the procedure for confirmation of the issued time stamps; 4) the procedure for maintaining records of the issued time stamps; 5) the procedure for release of information concerning the issued time stamps; 6) the procedure for termination of the provision of time-stamping services; 7) an action plan in case it is possible to imitate the time-stamping service provider or the activities thereof upon provision of services; 8) other circumstances which the time-stamping service provider deems necessary to have provided in the certification principles. § 28. Duties of time-stamping service providers () Time-stamping service providers are required to: 1) ensure correct indications of time in time stamps pursuant to the descriptions provided in the time-stamping principles; 2) maintain records of issued time stamps; 3) preserve documentation in order to verify issued time stamps; 4) [repealed – RT I 2009, 1, 3 – entry into force 12.01.2009] 5) ensure that it is possible to obtain and verify time stamps in the public data communication network; 6) ensure the conduct of an annual information systems audit and submit the results of the audit to the authorised processor of the register of certification; [ RT I 2009 1 3 - pub. 12.01.2009] 7) publicise the conditions of compulsory insurance contracts in a public data communication network; 8) inform the authorised processor of the register of certification of any changes to a public key used for the provision of time-stamping services. [ RT I 2009 1 3 - pub. 12.01.2009] § 29. Restrictions on employees of time-stamping service providers () Employees of time-stamping service providers who are involved in providing time-stamping services shall not have a criminal record for an intentionally committed criminal offence. 5. chapter TERMINATION OF PROVISION OF CERTIFICATION SERVICES AND TIME-STAMPING SERVICES § 30. Termination of provision of certification services and time-stamping services (1) The provision of certification services and time-stamping services (hereinafter services) is terminated: 1) by a decision of the service provider; 2) by a decision of the authority exercising supervision over the provision of services; 3) by a court judgment; 4) upon liquidation of the service provider or termination of the activities thereof; 5) by a Government of the Republic resolution which terminates the provision of services by state agencies specified in clauses 18 (1) 4) and 25 4) of this Act. (2) Upon termination of the provision of certification services and time-stamping services, the service provider shall transfer the documentation concerning provision of the service to the register of certification. [ RT I 2009 1 3 - pub. 12.01.2009] § 31. Notification of termination of provision of services (1) A service provider is required to notify the authorised processor or the chief processor of the register of certification promptly of a decision to terminate provision of the service. If the person or agency notifies the authorised processor of the register of the decision to terminate the provision of services, the authorised processor is required to promptly notify the chief processor of the register thereof. [ RT I 2009 1 3 - pub. 12.01.2009] (2) A service provider is required to notify users of its service of a decision to terminate provision of the service at least one month before termination of provision of the service. (3) The chief processor of the register of certification shall notify the data protection supervision authority and the state information systems co-ordination authority of any decision to terminate provision of a service. [ RT I 2009 1 3 - pub. 12.01.2009] 6. chapter REGISTER OF CERTIFICATION [ RT I 2009 1 3 - pub. 12.01.2009] § 32. Register of certification [ RT I 2009 1 3 - pub. 12.01.2009] (1) The register of certification (hereinafter register) is a database established by the Government of the Republic which is established and introduced in order to maintain records of certification service providers and time-stamping service providers. [ RT I 2009 1 3 - pub. 12.01.2009] (2) The chief processor of the register is the Ministry of Economic Affairs and Communications. (3) The register comprises: 1) a database of certification service providers; 2) a database of time-stamping service providers; 3) [repealed – RT I 2009, 1, 3 – entry into force 12.01.2009] 4) the registry archives. § 33. Application for entry of service providers in register (1) In order to be entered in the register, a person or agency shall submit the following: 1) an application for registration of the person or agency as a service provider, which is signed by a legal representative and which sets out the public key (public keys) which the person or agency will begin to use upon the provision of certification services or time-stamping services by the person or agency; 2) the same application in digital form, which is certified pursuant to the procedure for certification of the issued certificates and time stamps and which includes proof concerning possession of private keys used upon provision of certification services or time-stamping services; 3) [repealed – RT I 2002, 61, 375 – entry into force 01.08.2002] 4) the certification or time-stamping principles; 5) [repealed – RT I 2002, 61, 375 – entry into force 01.08.2002] 6) the results of the information systems audit; 7) confirmation concerning the absence of arrears which compromise the provision of services in compliance with the principles provided for in Chapters II–V of this Act. (2) An application for the entry of a service provider in the register shall set out the following: 1) the name of the service provider; 2) the address of the seat of the service provider; 3) the registry code of the service provider; 4) the name, title, personal identification code and contact details of the representative of the service provider; 5) the telecommunications numbers and addresses of the service provider; 6) the limitations established on provision of the service. (3) The authorised processor of the register is required to verify the accuracy of the submitted data and the compliance of the service with the requirements of this Act. Additionally, the authorised processor of the register shall verify whether the applicant has paid the state fee, whether the person or agency which provides the service is registered and whether the person has any tax arrears to the Tax and Customs Board. [ RT I 2009 1 3 - pub. 12.01.2009] (4) The authorised processor of the register has the right to make inquiries to all state agencies and state and local government databases in order to verify the accuracy of the data submitted by a person or agency. (5) Before entry in the register, a person or agency is required to ensure the conduct of an information systems audit, the results of which shall be submitted to the authorised processor of the register. The cost of the information systems audit shall be incurred by the person or agency. § 34. Registration of service providers (1) After verification of the documents, the authorised processor of the register shall decide on the registration of a person or agency in the register as a service provider within five working days after the date of receipt of the documents and data specified in subsections 33 (1) and (2) of this Act and shall communicate the decision to the person or agency. [ RT I 2002 61 375 - pub. 01.08.2002] (2) If the term provided for in subsection (1) of this section is not sufficient for verification of the submitted data and documents, the chief processor of the register may extend the term up to ten working days. (3) After a decision is made to register a person or agency in the register, the person or agency shall submit a copy of an insurance policy which complies with the requirements of § 39 of this Act to the authorised processor after which the person or agency shall promptly be registered as a service provider. (4) The authorised processor of the register shall grant a non-recurrent registry code to each service provider entered in the register. (5) The authorised processor of the register shall approve the public keys of registered service providers set out in clause 33 (1) 1) of this Act. (6) Upon termination of the provision of a service, a corresponding application shall be submitted to the authorised processor of the register who shall input data on the termination of provision of the service in the register. § 35. Refusal to register service providers (1) The authorised processor of the register shall refuse to register a service provider if: 1) the person or agency is not in compliance with the requirements provided for in this Act; 2) the certification or time-stamping principles are not in compliance with the requirements provided for in this Act; 3) [repealed – RT I 2002, 61, 375 – entry into force 01.08.2002] 4) the person or agency submits incorrect data to the authorised processor of the register; 5) on the basis of the submitted results of the information systems audit, there is reason to believe that the person or agency is unable to ensure services which are in compliance with the requirements of this Act; 6) {> the person or agency has tax arrears, is not registered or has not paid the state fee; 7) in other cases provided by law. (2) The authorised processor of the register shall deliver a decision on refusal to register a service provider to the person or agency by post or by electronic means. [ RT I 2002 61 375 - pub. 01.08.2002] § 36. Deletion of service providers from register () A service provider shall be deleted from the register if the service provider has terminated the provision of services pursuant to the provisions of Chapter V of this Act. § 37. Access to registered data (1) Data entered in the register are public. (2) The authorised processor of the register is required to ensure access to the data stored in the register concerning service providers, and the availability thereof twenty-four hours a day. [ RT I 2009 1 3 - pub. 12.01.2009] 6^1. chapter SECURE SIGNATURE CREATION DEVICES [ RT I 2009 1 3 - pub. 12.01.2009] § 37^1. Requirements for secure signature creation devices (1) A secure signature creation device is an adapted piece of software or hardware, for example a microchip card equipped with a security chip, which is used for the storage and application of a personal key. (2) Secure signature creation devices shall, by appropriate technical and procedural means, ensure that: 1) the personal key used for signature generation can practically occur only once and that its secrecy is reasonably assured; 2) the personal key cannot be derived and the signature is protected against forgery using currently available technology; 3) the personal key can be reliably protected by the legitimate signatory against the use of others. (3) Secure signature creation devices shall not alter the data to be signed or prevent such data from being presented to the signatory prior to the signature process. [ RT I 2009 1 3 - pub. 12.01.2009] 7. chapter PROPRIETARY LIABILITY OF SERVICE PROVIDERS AND INSURANCE § 38. Proprietary liability of service providers (1) Service providers are liable for patrimonial damage which is caused as a result of violation of the obligations of the service provider. (2) If a third person besides the service provider is liable for damage specified in subsection (1) of this section, they shall be solidarily liable. [ RT I 2002 53 336 - pub. 01.07.2002] § 39. Compulsory insurance of service providers (1) In order to ensure compensation for damage provided for in § 38 of this Act, service providers are required to enter into compulsory insurance contracts. (2) Service providers are required to publicise the conditions of insurance contracts in a public data communication network. 8. chapter RECOGNITION OF CERTIFICATES ISSUED BY FOREIGN CERTIFICATION SERVICE PROVIDERS AND OF DIGITAL SIGNATURES AND DIGITAL SEALS CREATED ON BASIS THEREOF [ RT I 2009 1 3 - pub. 12.01.2009] § 40. Recognition of foreign certificates () Certificates issued by a foreign certification service provider shall be recognised as equivalent to certificates issued by certification service providers acting on the basis of this Act if at least one of the following conditions is met: 1) according to the decision of the chief processor of the register, the foreign certification service provider complies with the requirements provided for in this Act and legislation established on the basis thereof; 2) the certificates of the foreign certification provider are guaranteed by a certification service provider acting on the basis of this Act who assumes responsibility for the accuracy of the data contained in the certificates; 3) the certificates issued by the foreign certification service provider are recognised by an international agreement entered into by the Republic of Estonia. 9. chapter STATE SUPERVISION AND ADMINISTRATIVE SUPERVISION OVER CERTIFICATION SERVICE PROVIDERS AND TIME-STAMPING SERVICE PROVIDERS [ RT I 2014-03-13 4 113032014004 - pub. 01.07.2014] § 41. Supervisory authorities exercising state supervision and administrative supervision [ RT I 2014-03-13 4 113032014004 - pub. 01.07.2014] (1) The Ministry of Economic Affairs and Communications shall exercise state supervision over fulfillment of the requirements of this Act and legislation established on the basis thereof. [ RT I 2014-03-13 4 113032014004 - pub. 01.07.2014] (2) The chief processor of the register shall exercise administrative supervision over the maintenance of the register pursuant to the procedure prescribed in the Public Information Act. [ RT I 2014-03-13 4 113032014004 - pub. 01.07.2014] (3) The authority exercising supervision over the administration of databases and the data protection supervision authority shall exercise administrative supervision over the legality of maintenance of the register and over the protection of data pursuant to the procedure prescribed in the Public Information Act and the Personal Data Protection Act. [ RT I 2014-03-13 4 113032014004 - pub. 01.07.2014] § 42. Special state supervision measures [ RT I 2014-03-13 4 113032014004 - pub. 01.07.2014] A law enforcement agency may apply special state supervision measures provided for in §§ 30, 31, 32 and 50 of the Law Enforcement Act on the bases and according to the procedure provided for in the Law Enforcement Act for the purpose of exercising the state supervision provided for in this Act. [ RT I 2014-03-13 4 113032014004 - pub. 01.07.2014] § 42^1. Specifications of state supervision (1) The measure provided for in § 50 of the Law Enforcement Act may be applied only upon entry into premises which are used for the provision of services, in the presence of a representative of the service provider. (2) A law enforcement agency as the agency monitoring fulfilment of the requirements of this Act and legislation established on the basis thereof has the right to decide on the deletion of a service provider from the register and submit the decision to the authorised processor of the register in order to have a corresponding entry made. [ RT I 2014-03-13 4 113032014004 - pub. 01.07.2014] § 42^2. Upper limit of penalty payment () If the precept is not observed, the upper limit of penalty payment imposed in accordance with the procedure provided for in the Substitutive Enforcement and Penalty Payment Act is 3200 euros. [ RT I 2014-03-13 4 113032014004 - pub. 01.07.2014] 10. chapter IMPLEMENTING PROVISIONS § 43. Implementation of digital signatures (1) The Government of the Republic shall establish and introduce the register provided for in subsection 32 (1) of this Act by the time this Act enters into force. (2) The Government of the Republic shall establish uniform bases for the document management procedures of state and local government agencies and legal persons in public law by 1 March 2001 and the bases shall also enable the use of digitally signed documents in the document management of the agencies. (3) State and local government agencies and legal persons in public law shall reorganise the document management thereof pursuant to the document management procedures provided for in subsection (2) of this section by 1 June 2001. (4) The Minister of Economic Affairs and Communications shall approve the procedure for the information systems audit of service providers by 1 October 2000. [ RT I 2003 88 594 - pub. 08.01.2004] § 44. Approval of public keys of authorised processor of register and service providers and determination of scope of use of private keys corresponding thereto (1) The Minister of Economic Affairs and Communications shall approve the public key of the authorised processor of the register, which is used for the approval of the public keys of certification service providers and time-stamping service providers set out in clause 33 (1) 1) of this Act, and shall determine the scope of use of the private key corresponding thereto. (2) The authorised processor of the register shall approve the public key used for the provision of certification services or time-stamping services by certification service providers and time-stamping service providers, and the scope of use of the private key corresponding thereto. [ RT I 2003 88 594 - pub. 08.01.2004] § 45. [Omitted from this text] § 46. [Omitted from this text] § 47. Entry into force of Act () This Act enters into force on 15 December 2000. 1 Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures (OJ L 13, 19.01.2000, pp 12–20) [RT I 2009, 1, 3 – entry into force 12.01.2009]