Regulation (EU) no. 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC (eIDAS Regulation)
Additional information on electronic signatures may be obtained from the Authority for the Digitization of Romania, which acts as a Supervisory Body for Trust Service Providers based in Romania.Qualified Trust Service Provider
DigiSign is a certified Qualified Trust Service Provider which acts as a trusted third party, providing reliability and trust services in accordance with eIDAS Regulation. DigiSign is listed within the European Trusted List for the provision of qualified electronic signatures, qualified electronic seals and qualified electronic time stamps.
Assessments and Certifications
Periodically, DigiSign is being audited, in order to guarantee a thorough control of the processes it uses. DigiSign has successfully passed various audits, according to the norms of relevant ETSI and ISO standards. Assessments and certifications:
According to EU Regulation no. 910/2014 – eIDAS
According to EU Regulation no. 910/2014 – eIDAS
According to EU Regulation no. 910/2014 – eIDAS
Regarding the use of the video identification platform
A cookie contains information linking users and a particular site. If a browser accesses the respective server again, it can read the information already stored and may react accordingly. Cookies provide users a pleasant browsing experience and support the efforts of many websites to offer users comfort: e.g. . online privacy preferences, website language options, shopping basket or relevant advertising.
A cookie life span may be different, depending on the purpose for which it is placed. There are cookies used only for one session - they are no longer retained after the user exits the website. Permanent cookies - are retained and reused every time the user returns to that website, but they may be removed by the user at any time.
Certain parts of content on specific sites can be placed on the accessed website, by third parties through banners, boxes or links - and all of these tools may contain cookies. They are called "third party cookies" for they are placed by the owner of the respective website, and the third-party providers are subject to the laws and privacy policies of the website owner.
Cookies retain information in a small text file which allows a website to recognize a browser. The web-server will recognize the browser until the cookie expires or is deleted. The cookie stores important information that improves the Internet browsing experience (e.g.: settings of the language in which you wish to access a site; keeping a user logged in the webmail account; online banking security; preservation of products in the shopping basket).
Cookies are NOT viruses! They use plain text-type formats. There are composed of pieces of code so they cannot be enforced either can auto-run. Consequently, they cannot be duplicated or replicated in other networks to be run or replicated again. For they cannot perform these functions, they cannot be considered viruses.
Cookies can still be used for negative purposes. Since they store information about the users. preferences and browsing history, both on a particular site and on many other sites, cookies can be used as a form of Spyware. Many anti-spyware products are aware of this fact and constantly mark the cookies to be deleted in anti-virus/anti-spyware removal/scanning proceedings.
In general, browsers have integrated privacy settings that provide different levels of cookies acceptance, the validity period and automatic erasion after the user has visited a particular site.
For the identity protection is very valuable and is the right of every Internet user, it should be known what eventual problems cookies may create. For through them there are constantly transmitted information in both directions between the browser and the website, if an attacker or an unauthorized person comes in during the data transmission, the information contained in the cookie may be intercepted. Although rare, this can happen if the browser connects to a server by using an unencrypted network (e.g.: an unsecured WiFi network).
Other cookie-based attacks involve wrong setting of the cookies on servers. If a website does not require the browser to use only encrypted channels, the attackers can make use of this vulnerability to trick browsers into sending information via unsecured channels. Attackers then use the information for purposes of unauthorized access to certain sites. It is important to be careful in choosing the most suitable method of protection of personal information.
Disabling and refusal to accept cookies can make certain websites impassable or difficult to visit and use. Also, by refusing to accept cookies does not mean you will not receive/view online advertising.
It is possible to set the browser so that these be no longer accepted or you may set your browser to accept cookies from a particular site. But, for example, if you are not registered with using cookies, you will not be able to insert comments.
All modern browsers offer the possibility to change the cookies settings. These settings are usually found in the the "options" or "preferences" menu of your web browser.
For setting cookies generated by third-parties, you may also consult the website.