1. INTRODUCTION
1.1. Overview
1.1.1. Certificate Policy
The Proof Certificate Policy (CP) defines the procedural and operations requirements for the Proof public key infrastructure (PKI) system. This CPS specifies the means in which the Proof PKI system meets those requirements. In addition, this CPS applies to all PKI Participants that request, issue, manage, and validate digital certificates and time stamp tokens (TSTs) from this Proof PKI system.
This CPS is consistent with the Internet Engineering Task Force (IETF) Request for Comments (RFC) 3647: Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework (RFC 3647) standard. In accordance with this standard, this CPS is organized into sections to cover security requirements and practices. Proof also uses “Not Applicable” or “No Stipulation” terms for sections that do not apply to this Proof PKI system.
Moreover, this CPS addresses requirements from the current versions of the following policies, guidelines, and practices:
- WebTrust Principles and Criteria for Certification Authorities
- WebTrust Principles and Criteria for Certification Authorities - Network Security
- Certificate Authority/Browser Forum Baseline Requirements for Issuance and Management of Publicly-Trusted TLS Server Certificates
- Certificate Authority/Browser Forum Network and Certificate System Security Requirements
- Adobe Approved Trust List Technical Requirements
- Coalition for Content Provenance and Authenticity Technical Specification
Proof continuously tracks changes to the above policies, guidelines, and practices and updates the Proof CP accordingly. In addition, Proof produces other documents about this Proof PKI system including, but not limited to, the Relying Party Agreement (RPA), privacy policies, and standard operating procedures (SOPs).
This CPS does not apply to the PKI Participants involved with other Proof PKI systems that are considered private. Proof has defined different CPS and PKI-related documents for those Proof PKI systems.
The Proof Root CA R1 conforms to the current version of the Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates published at https://www.cabforum.org. In the event of any inconsistency between this document and those Requirements, those Requirements take precedence over this document.
1.1.2. Digital Certificates
The Proof PKI system issues digital certificates to individuals as a means to assert their digital identity in electronic transactions (e.g., digitally signing documents). Proof registers individuals in this Proof PKI system. Once registered, Proof performs identity verification of the individuals. Next, Proof creates certificate requests and issues individual certificates. When the individual certificates are about to expire, Proof issues new individual certificates. Further, Proof allows individuals to revoke their individual certificates due to errors; changes to their identity data (e.g., last name changed due to marriage or divorce); or no longer required.
Moreover, the Proof PKI system issues certificates to legal entities as a way to assert their digital identity in electronic transactions (e.g., digitally sealing documents). Proof requires registered and vetted individuals to request organizational certificates. Once submitted, Proof verifies legal entity information. Next, Proof verifies the individuals are authorized to request organizational certificates on behalf of the legal entities. Then, Proof issues the organizational certificates. Finally, Proof allows legal entities to revoke organizational certificates due to errors; changes to the legal entity information (e.g., acquired by another company, corporate rebranding, etc.); or no longer required.
Proof issues individual and organizational certificates in compliance with the IETF RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List Profile (RFC 5280) standard to cryptographically bind data from Subscribers with public keys from asymmetric key pairs.
1.1.3. Validation Service
The Proof PKI system offers a couple of validation methods to Relying Parties to find the current status (e.g., good, revoked, etc.) of CA, individual, and organizational certificates. The first validation method, online certificate status protocol (OCSP), provides OCSP responses with the current status to OCSP requests sent by the Relying Parties. The second validation method, certificate revocation lists (CRLs), are files that contain serial numbers of all revoked CA, individual, and organizational certificates which have not expired yet.
1.1.4. System Availability
The Proof PKI system and repositories are maintained with resources to have 99.9% availability.
1.2. Document Name And Identification
1.2.1. Certificate Policy Name
The official document name is the Proof Certification Practice Statement. The PMA approves all changes to this CPS and maintains the version control for this CPS in Appendix C | Change History.
1.2.2. Proof Object Identifiers
Proof has registered the following Object Identifier (OID) arc, joint-ISO-CCIT (2) country (16) USA (840) US-company (1) Proof (63693), with the Internet Assigned Numbering Authority (IANA):

Further, Proof asserts the appropriate OIDs in the Certificate Policy extension of CA, individual, and organizational certificates issued from this Proof PKI system as appropriate.
1.3. PKI Participants
1.3.1. Policy Management Authority
Proof establishes a Policy Management Authority (PMA) to govern the Proof PKI system that includes the Root, Intermediate, and Issuing CAs. The PMA has the following responsibilities:
- Represent the interests of Proof
- Draft and update this CPS in accordance with applicable laws, regulations, policies, guidelines, and requirements
- Approve a CPS and related policies
- Supervise the conformance of the Proof PKI with this CPS and CPS
- The Proof policies are designed to ensure the Proof PKI system complies, in all material respects, with applicable United States (US) laws and regulations for electronic signatures; international standards; and program requirements such as WebTrust CA and and Network Security Requirements; Certificate Authority/Brower Forum (CA/B) TLS Baseline and Network Security Requirements; Coalition for Content Provenance and Authenticity (C2PA) Technical Specification; and Adobe Approved Trust List (ATL) Technical Requirements.
1.3.2. Certification Authority
Proof is the Certification Authority (CA) for this Proof PKI system. The CA has the following responsibilities:
- Create Root, Intermediate, and Issuing CA certificates in the CA systems
- Issue individual and organizational certificates in a timely manner from the CA systems
- Manage CA, organizational, and individual certificates which may involve rekeys, renewals, and revocations in the CA systems
- Operate Validation Authority (VA) systems that provide status (e.g., valid, revoked, etc.) of CA, individual, and organizational certificates to Relying Parties via CRL or OCSP methods
- Publish CA certificates, CRLs, and PKI documents (e.g., CPS, RPA, etc.) on publicly-available web sites
1.3.3. Registration Authorities
Proof is the Registration Authority (RA) for this Proof PKI system. The RA has the following responsibilities:
- Confirm qualification requirements defined in CPS Section 5.3.1
- Retain documentation in accordance with CPS Section 5.3.2
- Authenticates Subscribers to RA system
- Approve certificate and revocation requests submitted by Subscribers in RA system
- Notify Subscribers about imminent expiry of individual or organizational certificates
1.3.4. Subscribers
Subscribers are any natural persons that receive individual certificates from the Proof PKI system and are legally bound by the applicable terms and conditions.
Note: Before completing identity verification and certificate issuance processes, the Subscribers are known as Applicants. After the certificates are issued, the Applicants become Subscribers.
1.3.5. Sponsors
Sponsors are any representatives of legal entities that receive organizational certificates from the Proof PKI system and are legally bound by the applicable terms and conditions.
Note: Before completing identity verification and certificate issuance processes, the Sponsors are known as Applicants. After the certificates are issued, the Applicants become Sponsors.
1.3.6. Relying Parties
Relying Parties are any natural persons or legal entities that rely on individual or organizational certificates issued by this Proof PKI system. Further, Relying Parties may be any natural persons or legal entities that rely on digital signatures based on digital certificates or TSTs issued by the Proof PKI system.
Relying Parties may check the status of CA, individual, and organizational certificates via the CRL or OCSP methods.
1.3.7. Application Software Suppliers
Application Software Suppliers may include software or software-as-a-server (SaaS) vendors (e.g., Adobe Acrobat, Mozilla, etc.) that trust CA, individual, and organizational certificates issued by the CA.
1.3.8. Other Participants
No stipulations.
1.4. Certificate Usage
1.4.1. Appropriate Certificate Uses
Digital certificates issued under this CPS are only to be used as designated by the selected values in the Key Usage and Extended Key Usage extensions.
The Relying Parties should evaluate the associated risks of their environments and decide whether to accept digital certificates issued under this CPS.
1.4.2. Prohibited Certificate Uses
Digital certificates issued under this CPS are not to be used for any other purposes other than the selected values in the Key Usage and Extended Key Usage extensions.
1.5. Policy Administration
1.5.1. Organization Administering the Document
This CPS and relevant documents referenced herein are approved and maintained by the PMA.
1.5.2. Contact Person
Any questions about this CPS are addressed by the PMA which may be reached at either pma@proof.com or mailed to the following address.
Notarize Inc. (d.b.a. Proof.com)
ATTN: Proof PMA
867 Boylston St.
Boston, MA 02116
Note: See CPS Section 4.9.3.4 for instructions on how to submit Certificate Problem Reports.
1.5.3. Person Determining CPS Suitability for the Policy
The PMA determines the suitability and applicability of this CPS. Moreover, the PMA ensures the conformance of the CPS to this CP. Also, the PMA evaluates and acts on audit results by an independent auditor as specified in CPS Section 8.0.
1.5.4. CPS Approval Procedures
The PMA approves the CPS and any amendments. Amendments are made by either updating the entire CPS or by publishing an addendum. The PMA also decides whether a CPS amendment requires notice or an OID change as defined in CPS Sections 9.10 and 9.12.
1.6. Definitions and Acronyms
See Appendix A | Definitions and Appendix B | Acronyms and Abbreviations.
2. PUBLICATION AND REPOSITORY RESPONSIBILITIES
2.1. Repositories
The CA maintains repositories that allow public access to Proof policies, agreements, CA certificates, and revocation data.
While the publicly available CA certificates and revocation data are available in a security repository, the Proof policies and agreements are accessible in the legal repository located at:
- Security Repository: https://crl.proof.com, https://ocsp.proof.com
- Legal Repository: https://www.proof.com/legal/general-terms
- The repositories are maintained with resources to have 99.9% availability for access at all times.
2.2. Publication Of Certification Information
The CA publishes the following information in publicly-available repositories:
- Public CA certificates including Root, Intermediate, and Issuing CAs
- CRLs with revocation data about public CA, individual, and organizational certificates
- PKI documents including CPS, RPA, and applicable terms and conditions
- Further, the CA includes valid uniform resource identifiers (URIs) as distribution points for the above information in CA, individual, and organizational certificates. Relying Parties may use the URIs to access this information.
2.3. Time Or Frequency Of Publication
The CA publishes new versions of Proof policies and agreements in the legal repository within seven (7) days of approval. Further, the CA updates the public CA certificates as soon as possible after issuance in the security repository and before distribution to trusted root programs (e.g., Adobe ATL, C2PA, etc.)
Moreover, the CA updates the CRLs in the repositories for public Root and Intermediate CAs at least annually or upon revocation of an Intermediate or Issuing CA. The CA publishes new CRLs for Issuing CAs at least every seven (7) days.
Note: The CA removes expired CA, individual, and organizational certificates from CRLs.
2.4. Access Controls On Repositories
The CA configures all repositories to be publicly-available with unrestricted read access. Also, the CA implements security controls to ensure the integrity and availability of all repositories including, but not limited to, preventing unauthorized write access and protecting against distributed denial of service attacks (DDoS).
3. IDENTIFICATION AND AUTHENTICATION
3.1. Naming
3.1.1. Types Of Names
The CA has non-null values for the Common Name (CN) attribute within the Subject and Issuer Distinguished Name (DN) extensions of CA, individual, and organizational certificates. While the CA may include additional attributes (e.g., Country, Organization, etc.) in DN extensions. the CA verifies all values for attributes in DN extensions. All attributes are in compliance with the International Telecommunication Union (ITU) X.500: Open Systems Interconnection (ITU X.500) standard.
3.1.2. Need For Names To Be Meaningful
The CA verifies and includes meaningful representation of names for natural persons or legal entities in the CN or Organization (O) attributes of Subject and Issuer DN extensions of CA, individual, and organizational certificates.
3.1.3. Anonymity Or Pseudonymity Of Subscribers
The CA may use pseudonyms for legal entities that have “doing business as” (d.b.a.) names in the CN or O attributes of Subject DN extension of CA, individual, and organizational certificates.
3.1.4. Rules For Interpreting Various Name Forms
The DN is interpreted based on the ITU X.500, Abstract Syntax Notation One (ASN.1), and IETF RFC 822: Standard for the Format of ARPA Internet Text Messages (RFC 822) standards.
3.1.5. Uniqueness Of Names
The CA ensures name uniqueness based on a combination of attributes in the Subject DN extension of CA, individual, and organizational certificates.
3.1.5.1. CA Name Uniqueness
Proof utilizes unique values in the CN attribute of the Subject DN for the Proof Root and Issuing CAs.
3.1.5.2. Individual Certificate Name Uniqueness
Proof places individuals’ legal names in the CN attribute and email addresses in the E attribute of the Subject DN for individual certificates.
3.1.5.3. Organizational Certificate Name Uniqueness
Proof has unique values of the CN attribute of the Subject DN for organizational certificates.
Note: Name uniqueness is not violated when there are multiple certificates issued to the same natural person or organization.3.1.6. Recognition, Authentication, And Role Of Trademarks
The CA verifies the right of legal entities to use trade names, trademarks, service names, and d.b.a. names submitted by Applicants in the certificate requests.
Note: The CA may revoke any CA, individual, and organizational certificate that was issued based on information deemed to violate CPS Section 3.16. As part of the certificate request process, Applicants agree that their certificate request does not contain any information that infringes or interferes upon the rights of any third parties in any jurisdiction with regards to trade names, trademarks, service names, d.b.a. names, or any other intellectual property rights.
3.2. Initial Identity Validation
3.2.1. Method To Prove Possession Of Private Key
The CA generates and stores the private keys for CA certificates on hardware security modules (HSMs) rated at FIPS 140-2 Level 3. Since the CA has possession of the private keys, the CA does not perform any proof-of-possession.
Also, the CA requires Subscribers or Sponsors to generate and store the private keys for individual or organizational certificates on HSMs rated at least FIPS 140-2 Level 2. If the Subscribers or Sponsors generate their own private keys, the CA verifies proof-of-possession by checking the digital signatures on certificate signing requests (CSRs) submitted by Subscribers and Sponsors. If the CA creates and stores the private keys on behalf of Subscribers and Sponsors in their HSMs, the CA does not perform any proof-of-possession because the CA has possession of the private keys.
3.2.2. Authentication Of Organization Identity
The CA verifies all legal entity information for O and CN attributes in the Subject DN extension of CA certificates against Reliable Data Sources (e.g., Secretary of State offices, business-to- business contact services, etc.). The PMA authorizes the Reliable Data Sources.
If the CA includes legal entity information for CN or O attributes in the Subject DN extension of individual certificates, the CA verifies this information against the Reliable Data Sources.
3.2.3. Authentication Of Individual Identity
The CA verifies personally identifiable information (PII) of the Proof personnel, based on Proof employment data background checks, which submit CA Naming Forms to create Proof CAs.
The RA verifies and places PII and email addresses of Subscribers or Sponsors in the Subject DN extension of the individual or organizational certificates in the RA system.
3.2.4. Non-Verified Subscriber Information
The RA only utilizes verified PII for the C, O, and E attributes in the Subject DN extension of individual or organizational certificates in the production environment. However, RA may use non-verified PII for these attributes in the non-production environments (e.g., development, test, etc.).
3.2.5. Validation Of Authority
The RA contacts executives at legal entities to validate Sponsors are authorized to request organizational certificates on behalf of the legal entities.
If the RA includes legal entity names for the O attribute in the Subject DN extension of individual certificates, the RA maintains a list of approvers for the legal entities authorized to approve natural persons requesting individual certificates.
3.2.6. Criteria For Interoperation
No stipulations.
3.3. Identification And Authentication For Rekey Requests
The CA requires the PMA to approve CA Revocation Forms to revoke existing CA certificates and CA Naming Forms to request new CA certificates.
The RA provides the ability for Subscribers and Sponsors to revoke the existing certificates and submit new certificate requests for individual and organizational certificates in the RA system.
If the Subscribers or Sponsors need to rekey individual or organizational certificates after expiration or revocation, the RA requires Subscribers or Sponsors to login, with multifactor authentication, to the RA system in order to submit new certificate requests for individual or organizational certificates.
3.3.1. Identification And Authentication For Routine Rekey
The RA requires Subscribers or Sponsors to login with multifactor authentication to the RA system in order to submit revocation requests to revoke existing individual or organizational certificates and certificate requests to issue new individual or organizational certificates.
3.3.2. Identification And Authentication For Rekey after Revocation
The RA requires Subscribers or Sponsors to login with multifactor authentication to the RA system in order to submit certificate requests for new individual or organizational certificates.
3.4. Identification And Authentication For Revocation Requests
The CA requires the PMA to approve CA Revocation Forms to revoke existing CA certificates.
The RA requires Subscribers or Sponsors to login with multifactor authentication to the RA system to submit revocation requests for unexpired individual or organizational certificates.
If the CA receives revocation requests from other parties (e.g., Relying Parties, certificate problem reports, etc.), the CA investigates the requests. If there is just cause to revoke the individual or organizational certificates, the CA submits and approves the revocation requests in the RA system.
4. CERTIFICATE LIFE CYCLE OPERATIONAL REQUIREMENTS
4.1. Certificate Application
4.1.1. Who May Submit A Certificate Application
The Applicants need to meet one of the following requirements to submit certificate requests:
- Any individual who is the subject of the individual digital certificate
- Any authorized representative of a legal entity for organizational certificates
- Any authorized personnel for CA certificates
- Any authorized representative of the RA
- The RA includes checks in the RA system to ensure the Applicants are not included on denied persons or business lists maintained by the US Federal government. Further, the RA has checks in the RA system to ensure natural persons or legal entities are not located in a sanctioned country under US Federal laws and regulations.
4.1.2. Enrollment Process And Responsibilities
The CA ensures the RA verifies the PII and legal entity information in accordance with this CPS and associated CP and RPS (if applicable) before issuing CA, individual, and organizational certificates.
The RA requires Applicants to provide sufficient PII, legal entity information and documentation to perform the required verification in the RA system.
4.2. Certificate Application Processing
4.2.1. Performing Identification And Authentication Functions
The CA and RA identifies and verifies the Applicants in accordance with this CPS and associated CP and RPS (if applicable). Moreover, the CA or RA may use previously collected and verified PII and legal entity information up to 398 days to issue CA, individual, and organizational certificates (e.g., renewals, rekeys, etc.). Additionally, the CA or RA follow a High Risk Certificate Request procedure to address unique situations and ensure proper verifications.
4.2.2. Approval Or Rejection Of Certificate Applications
The CA or RA rejects any certificate applications under the following conditions:
- Incomplete PII or legal entity information
- PII or legal entity information that cannot be verified
- Additionally, the CA or RA may reject any certificate applications on a reasonable basis that includes, but is not limited to, one of the following conditions:
- Correlation with previously rejected certificate applications
- Correlation with previously revoked CA, individual, and organizational certificates
- Presence on denied persons or business lists
- Located in a sanctioned country under US laws and regulations
4.2.3. Time To Process Certificate Applications
The CA or RA process certificate applications in commercially reasonable timeframes, but the CA or RA are not responsible for delays caused by actions or inactions by Applicants in response to missing or incorrect PII or legal information. Also, the CA or RA are not responsible for events outside their control (e.g., Applicant experiences issues with liveness check, legal entity executives do not respond to verification requests, etc.).
4.3. Certificate Issuance
4.3.1. CA Actions During Certificate Issuance
The CA verifies the authenticity of certificate requests before issuing any CA, individual, and organizational certificates.
Also, the CA requires multi-person control to issue direct commands to any offline CA certificates (e.g., Root, Intermediate, etc.) to create new Intermediate or Issuing CAs as well as generate CRLs
Further, the CA implements a linting process to check conformity of the to-be-signed individual or organizational certificates.
4.3.2. Notification To Subscriber By The CA of Issuance Of Certificate
The CA or RA notifies the natural persons or legal entities about the issuance of CA, individual, and organizational certificates by a reliable method (e.g., email, instant message, etc.) within a reasonable timeframe, but no longer than two (2) business days.
4.4. Certificate Acceptance
4.4.1. Conduct Constituting Certificate Acceptance
The CA displays a preview of individual or organizational certificates to Subscribers or Sponsors in the RA system before issuing these certificates. The Subscribers or Sponsors need to accept the preview in order for the CA to issue these certificates.
Additionally, the CA considers CA certificates to be accepted if the Subscribers or Sponsors do not object within two (2) business days.
4.4.2. Publication Of The Certificate By The CA
The CA publishes CA certificates in the security repository. However, the CA does not publish individual or organizational certificates in a public repository.
4.4.3. Notification Of Certificate Issuance By The CA To Other Entities
The CA notifies the trusted root programs about CA certificates to be included in trust lists. Also, the CA notifies the RA about the issuance of individual or organizational certificates.
4.5. Key Pair and Certificate Usage
4.5.1. Subscriber Private Key And Certificate Usage
The CA requires Subscribers or Sponsors to protect the private keys as specified in the applicable terms and conditions which includes, but not limited to, the Subscriber Agreement. If the CA stores key pairs on behalf of natural persons or legal entities, the CA generates, stores, and protects the new key pairs on HSMs rated at least FIPS 140-2 Level 2. Moreover, the CA requires Subscribers or Sponsors to use multifactor authentication to access and use these key pairs.
Also, CA requires Subscribers or Sponsors to utilize individual and organizational certificates lawfully in accordance with the applicable terms and conditions which includes, but is not limited to, the Subscriber Agreement.
4.5.2. Relying Party Public Key And Certificate Usage
The CA requires Relying Parties to utilize the CA, individual, and organizational certificates in accordance with applicable terms and conditions which includes, but is not limited to, the RPA in order to make any claims against the warranties.
In addition, the CA requires Relying Parties to use software compliant with RFC 5280 and RFC 3161. Further, the Relying Parities are responsible for validating the status of CA, individual, and organizational certificates based on the CRLs and OCSP provided by the CA.
4.6. Certificate Renewal
4.6.1. Circumstance For Certificate Renewal
The CA may issue new CA, individual, and organizational certificates with extended values for Not After attribute under the following conditions:
- The associated public keys have not exceeded the values in Not After attribute
- The associated private Keys have not been compromised.
- The certificates have not been revoked
- The PII or legal entity information for Subscribers or Sponsors remains valid and accurate
- If required, the PII or legal entity information for Subscribers or Sponsors is revalidated by the CA
- The Subscribers or Sponsors should renew CA, individual, and organizational certificates before exceeding the values in the Not After attribute.
4.6.2. Who May Request Renewal
The CA requires Subscribers or Sponsors to meet one of the following requirements to submit renewal requests:
- Any individual who is the subject of the individual digital certificate
- Any authorized representative of a legal entity for organizational certificates
- Any authorized personnel for CA certificates
- Any authorized representative of the RA
4.6.3. Processing Certificate Renewal Requests
The CA may require confirmation of previously verified PII and legal entity information for Subscribers or Sponsors to process renewal requests. Further, the CA may need to re-validate the PII and legal entity information for Subscribers or Sponsors after 398 days since the previous verification by having Subscribers and Sponsor complete new Identify transactions in the RA system
4.6.4. Notification Of Renewal Certificate Issuance To Subscriber
The CA or RA notifies the natural persons or legal entities about the renewal of CA, individual, and organizational certificates by a reliable method (e.g., email, instant message, etc.) within a reasonable timeframe, but no longer than two (2) business days.
4.6.5. Conduct Constituting Acceptance Of A Renewal Certificate
The CA displays a preview of individual or organizational certificates to Subscribers or Sponsors in the RA system before renewing the certificates. The Subscribers or Sponsors need to accept the preview in order for the CA to renew these certificates.
4.6.6. Publication Of The Renewal Certificate By The CA
The CA publishes the renewed CA certificates in the security repository. However, the CA does not publish renewed individual or organizational certificates in a public repository.
4.6.7. Notification Of Certificate Renewal By The CA To Other Entities
The CA notifies the trusted root programs about the renewed CA certificates to update the trust lists. Also, the CA notifies the RA about the renewal of individual or organizational certificates.
4.7. Certificate Rekey
4.7.1. Circumstance For Certificate Rekey
The CA may rekey CA, individual, and organizational certificates by using new key pairs and re- issuing these certificates under the following conditions:
- The associated public keys have not exceeded the values in Not After attribute
- The associated private Keys have not been compromised.
- The certificates have not been revoked
- The PII or legal entity information for Subscribers or Sponsors remains valid and accurate
- If required, the PII or legal entity information for Subscribers or Sponsors is revalidated by the CA
- The Subscribers or Sponsors should rekey CA, individual, and organizational certificates before exceeding the values in the Not After attribute.
4.7.2. Who May Request Certification Of A New Public Key
The Subscribers or Sponsors need one of the following requirements to submit rekey requests:
- Any individual who is the subject of the individual digital certificate
- Any authorized representative of a legal entity for organizational certificates
- Any authorized personnel for CA certificates
- Any authorized representative of the RA
4.7.3. Processing Certificate Rekeying Requests
The CA does not support rekey requests that use the same certificate contents with new key pairs. Rather, the CA revokes current individual or organizational certificates and issues new individual or organizational certificates with new validity periods.
4.7.4. Notification Of New Certificate Issuance To Subscriber
The CA or RA notifies the natural persons or legal entities about the new CA, individual, and organizational certificates by any reliable method within a reasonable timeframe, but no longer than two (2) days.
4.7.5. Conduct Constituting Acceptance of a Rekeyed Certificate
The CA displays a preview of individual or organizational certificates to Subscribers or Sponsors in the RA system before issuing new individual and organizational certificates. The Subscribers or Sponsors need to accept the preview in order for the CA to rekey these certificates.
4.7.6. Publication Of The Rekeyed Certificate By The CA
The CA publishes the new CA certificates in the security repository. However, the CA does not publish rekeyed individual or organizational certificates in a public repository.
4.7.7. Notification Of Certificate Issuance By The CA To Other Entities
The CA notifies the trusted root programs about the new CA certificates to update the trust lists. Further, the CA notifies the RA about the new individual or organizational certificates.
4.8. Certificate Modification
4.8.1. Circumstance For Certificate Modification
The CA may modify CA, individual, and organizational certificates by updating attributes in these certificates, but using same key pairs and issue new certificates under the following conditions:
- The associated public keys have not exceeded the values in Not After attribute
- The associated private Keys have not been compromised.
- The certificates have not been revoked
- The PII or legal entity information for Subscribers or Sponsors remains valid and accurate
- If required, the PII or legal entity information for Subscribers or Sponsors is revalidated by the CA
- The Subscribers or Sponsors should modify CA, individual, and organizational certificates before exceeding the values in the Not After attribute.
4.8.2. Who May Request Certificate Modification
The Subscribers or Sponsors need to meet one of the following requirements to submit modification requests:
- Any individual who is the subject of the individual digital certificate
- Any authorized representative of a legal entity for organizational certificates
- Any authorized personnel for CA certificates
- Any authorized representative of the RA
4.8.3. Processing Certificate Modification Requests
The CA requires the confirmation of previously verified PII and legal entity information for Subscribers or Sponsors to process modification requests. Further, the CA re-validates the PII and legal entity information for Subscribers or Sponsors after 398 days since the previous verification.
Additionally, the CA determines whether the CA, individual, or organizational certificates have been used to digitally sign objects (e.g., PDF files, media content, etc.). If the certificates have digitally signed objects, the CA revokes the current and issues new CA, individual, or organizational certificates with new key pairs and modified certificate content. If the certificates have not digitally signed objects, the CA deletes the current and issues new CA, individual, or organizational certificates with same key pairs and modified certificate content.
4.8.4. Notification Of Modified Certificate Issuance To Subscriber
The CA or RA notifies the natural persons or legal entities about the new CA, individual, and organizational certificates by any reliable method within a reasonable timeframe, but no longer than two (2) business days.
4.8.5. Conduct Constituting Acceptance Of Modified Certificate
The CA displays a preview of individual or organizational certificates to Subscribers or Sponsors in the RA system before issuing new certificates. The Subscribers or Sponsors need to accept the preview in order for the CA to issue these certificates.
4.8.6. Publication Of The Modified Certificate By The CA
The CA publishes the new CA certificates in the security repository. However, the CA does not publish new individual or organizational certificates in a public repository.
4.8.7. Notification Of Certificate Modification By The CA To Other Entities
The CA notifies the trusted root programs about the new CA certificates to update the trust lists. Further, the CA notifies the RA about the new individual or organizational certificates.
4.9. Certificate Revocation And Suspension
The CA may revoke CA, individual, and organizational certificates for many reasons (e.g., private key compromise, incorrect PII, etc.). The revocation process changes the status of these certificates from valid to revoked. This process adds the values for Serial Number attribute of the revoked certificates to CRLs and returns a revoked status in OCSP responses. Once the revoked certificates expire, this process removes the revoked certificates from the CRLs.
The CA does not support suspended status for CA, individual, and organizational certificates.
4.9.1. Circumstances For Revocation
The CA revokes any individual or organizational certificates within 24 hours in accordance with one of the following conditions with revocation reason codes (CRLReason) as defined in RFC 5280:
- The Subscriber or Sponsor submits electronic or written revocation requests, but does not specify a reason (CRLReason 0: unspecified)
- The Subscriber or Sponsor notifies the CA that the original certificate request was not authorized and does not retroactively grant authorization (CRLReason 9: privilegeWithdrawn)
- The CA obtains evidence that the private keys corresponding to public keys in certificates have been compromised (CRLReason 1: keyCompromise)
- The CA becomes aware of a demonstrated or proven method to easily compute the private keys based on the corresponding public keys (CRLReason 1: keyCompromise)
- The CA obtains evidence the verified domain names for mailboxes managing email address is no longer valid (CRLReason 4: superceded)
- The CA strives to revoke any individual or organizational certificates within 24 hours, but no later than five (5) business days, in accordance with one of the following conditions with revocation reason codes:
- The CA becomes aware that the certificate no longer complies with this CPS (CRLReason 4: superceded)
- The CA obtains evidence that the certificate was either misused or used other than the intended purposes (CRLReason 9: privilegeWithdrawn)
- The Subscriber or Sponsor breached a material obligation under this CPS, CPS, or relevant agreement (CRLReason 9: privilegeWithdrawn)
- The CA receives notification that the legal entity name has changed or the Subscriber or Sponsor is no longer affiliated with the legal entity (CRLReason 9: privilegeWithdrawn)
- The CA confirms any circumstances indicating the Subscriber or Sponsor no longer has legal rights to the mailbox for the E attribute in the Subject DN extension of the certificate (CRLReason 5: cessationOfOperations)
- The CA confirms that there has been a material change to the information in the certificate (CRLReason 9: privilegeWithdrawn)
- The CA becomes aware that the certificate contains either misleading or inaccurate information (CRLReason 9: privilegeWithdrawn)
- The CA has clear evidence the specific method to generate the private key is flaws (CRLReason 1: keyCompromise)
- The CA revokes the certificate for another reason (CRLReason 0: unspecified)
- The CA revokes a CA or certificate within seven (7) days after receiving and confirming one or more of the following actions:
- The legal entity submits electronic or written revocation requests, but does not specify a reason (CRLReason 0: unspecified)
- The legal entity notifies the CA that the original certificate request was not authorized and does not retroactively grant authorization (CRLReason 9: privilegeWithdrawn)
- The CA becomes aware that the private key for CA certificate has been compromised (CRLReason 1: keyCompromise)
- The CA obtains evidence that the CA certificate was either misused or used other than the intended purposes (CRLReason 9: privilegeWithdrawn)
- The CA confirms that the CA certificate was not issued in accordance with this CPS, CPS, or relevant agreement (CRLReason 9: privilegeWithdrawn)
- The CA confirms that there has been a material change to the information in the CA certificate (CRLReason 9: privilegeWithdrawn)
- The CA determines that the CA certificate contains either misleading or inaccurate information (CRLReason 9: privilegeWithdrawn)
- The CA receives notification that the legal entity name has changed or the Subscriber is no longer affiliated with the legal entity (CRLReason 9: privilegeWithdrawn)
- The CA ceases operations for any reason and has not arranged for another CA to provide revocation support (CRLReason 5: cessationOfOperations)
- The CA revokes the CA certificate for another reason (CRLReason 0: unspecified)
4.9.2. Who May Request Revocation
The CA accepts revocation requests from authorized Subscribers, Sponsors, and/or Certificate Operator (Trusted Role) in the RA system. Further, the CA allows Application Software Suppliers to submit manual revocation requests. Lastly, the CA allows other entities to submit certificate problem reports about suspected issues. In these cases, the CA may revoke the certificates.
The CA may revoke certificates of its own volition without reason even if no entity requested revocation.
4.9.3. Procedure For Revocation Request
The CA has a Certificate Revocation SOP to address the following certificates:
4.9.3.1. CA Revocation Request
The CA provides a process for authorized Proof personnel to request revocation of the CAs through the CA Revocation Forms.
4.9.3.2. Subscriber Revocation Request
The CA provides a process for Subscribers or Sponsors to request revocation of their own individual certificates in the RA system. Also, the CA defines a process for legal entities to request revocation of their CA or organizational certificates in the RA system. Once received, the CA confirms the authenticity of the revocation requests.
4.9.3.3. RA Revocation Request
The CA establishes a process for the Certificate Operators (Trusted Role) to request revocation of individual or organizational certificates in the RA system. Once received, the CA verifies the authenticity of the revocation requests by validating digital signatures on these revocation requests from the RA system.
4.9.3.4. Certificate Problem Report
The CA allows any entity (e.g., Relying Parties, Application Software Suppliers, etc.) to submit a certificate problem report about the following conditions:
- Suspected Private Key compromise
- Certificate misuse
- Other types of fraud, compromise, misuse, or inappropriate conduct
- Any other matters related to the certificate
- The entities send emails to digital-certificates@proof.com to report problems with the certificates.
- The CA investigates the certificate problem reports and notifies Subscribers or Sponsors as well as entities with status of the investigation. If the CA finds sufficient evidence, the CA revokes the certificates.
4.9.3.5. Application Software Supplier Revocation Request
The CA develops a process for Application Software Suppliers to request revocation of CA, individual, and organizational certificates. Once received, the CA investigates these requests. If the CA finds sufficient evidence, the CA revokes the certificates
4.9.4. Revocation Request Grace Period
The CA does not allow a grace period for Subscribers, Sponsors, and/or Certificate Operators (Trusted Role) to withdraw the revocation requests.
4.9.5. Time Within Which CA Must Process The Revocation Request
4.9.5.1. Revocation Request
The CA processes revocation requests as defined in CPS Section 4.9.1.
4.9.5.2. Certificate Problem Report
The CA investigates certificate problem reports as defined in CPS Section 4.9.1 and the Certificate Problem Report SOP. Also, the CA provides preliminary reports about the investigation findings to the reporting entities as well as the Subscribers or Sponsors of the certificates in question within 24 hours.
During the investigations, the CA determines whether to revoke the certificates or take other appropriate actions. If the CA decides to revoke the certificates, the CA sets the revocation dates based on the following criteria:
- The nature of the alleged problem (scope, context, severity, magnitude, risk of harm)
- The consequences of revocation (direct and collateral impacts to Subscribers and Relying Parties)
- The number of certificate problem reports received about the certificates in question as well as the Subscribers and Sponsors
- The reporting entity that submitted the certificate problem reports
- Any relevant legislation
- At the end of the investigations, the CA sends final reports about investigation findings to the reporting entities as well as Subscribers or Sponsors of the certificates in question.
4.9.6. Revocation Checking Requirement For Relying Parties
The Relying Parties should verify each certificate in the certificate chain in accordance with relevant RFC standards which may include:
- Checking values for attributes in Issuer DN and Subject DN extensions chain as expected
- Confirming values for attributes in Key Usage and Extended Key Usage extensions meet intended use
- Verifying values in attributes in Certificate Policy extension meet expected policies
- Validating certificates have not exceeded values in Not After attribute
- Checking CRLs or OCSP to ensure certificates are not revoked
4.9.7. CRL Issuance Frequency
4.9.7.1. Offline CA Certificates
The CA produces CRLs for offline CA certificates at least once every 12 months. If the CA revokes Intermediate or Issuing CA certificates, the CA generates and publishes new CRLs within 24 hours of revocation.
4.9.7.2. Online CA Certificates
The CA creates CRLs for online CA certificates at least once every seven (7) days. Further, the values for the NextUpdate attribute is not more than ten (10) days beyond the values for the thisUpdate attribute.
4.9.8. Maximum Latency for CRLs (if applicable)
The CA publishes CRLs in the security repository within a commercially reasonable time after creation.
4.9.9. Online Revocation/Status Checking Availability
The CA provides OCSP support for CA, individual, and organizational certificates. Also, the CA ensures OCSP responses conform to the RFC 6960: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP standard. In addition, the CA signs the OCSP responses by either the CA certificates.
4.9.10. Online Revocation Checking Requirements
The Relying Parties should check the current status of certificates via CRL or OCSP before relying on these certificates.
If the CA provides OCSP for CA certificates, the CA updates information provided in OCSP responses at least every 12 months and within 24 hours of revoking a CA certificate.
If the CA enables OCSP for individual or organizational certificates, the CA ensures:
- OCSP responses have a validity period greater than or equal to eight (8) hours
- OCSP responses have a validity interval less than or equal to ten (10) days
- If OCSP responses have a validity interval less than 16 hours, then the CA updates information in OCSP responses before reaching the half way point of the validity interval (e.g., OCSP responses with a 12 hour validity interval must update information no later than every six (6) hours).
- If OCSP responses have a validity interval greater than 16 hours, then the CA refreshes the information in the OCSP responses at least eight (8) hours before reaching the value in NextUpdate attribute and no later than four (4) days after the value in the thisUpdate attribute (e.g., OCSP responses with a 48 hour validity interval must refresh information no later than every 40 hours, OCSP responses with a seven (7) day validity interval must update information no later than every four (4) days, etc.)
- The CA does not provide OCSP responses with good status for certificates which have not been assigned values for the Serial Number attribute (a.k.a., unused) or certificates not issued by this CA.
4.9.11. Other Forms Of Revocation Advertisements Available
The CA may use alternative methods to publish revoked certificates based on the following conditions:
- The alternative methods are described in the CPS
- The alternative methods provide authentication and integrity services
- The alternative methods meet CRL issuance and latency requirements as defined in CPS Sections 4.9.5, 4.9.7, and 4.9.8
4.9.12. Special Requirements Related To Key Compromise
The CA uses commercially reasonable efforts to notify Relying Parties and Application Software Suppliers about suspected or confirmed compromise of private keys.
The Entity uses the Certificate Problem Report as defined in CP Section 4.9.3.3 to provide evidence of a Private Key Compromise based on one of the following methods:
- Submission of the compromised Private Key itself
- Submission of a CSR signed by the compromised Private Key
- In addition, the Entity includes a valid email address in the Certificate Problem Report to get confirmation and updates.
4.9.13. Circumstances For Suspension
The CA does not suspend individual certificates.
4.9.14. Who May Request Suspension
The CA does not offer the ability for Subscribers to suspend individual certificates.
4.9.15. Procedure For Suspension Request
The CA does not provide a process for Subscribers to request suspension of their own individual certificates.
4.9.16. Limits On Suspension Period
The CA does not allow individual certificates to be suspended for up to six (6) months.
4.10. Certificate Status Services
4.10.1. Operational Characteristics
The CA provides current status of CA, individual, and organizational certificates through CRL and/or OCSP. In addition, the CA revokes certificates that have expired from the CRL and/or OCSP.
Moreover, the CA has a value for the URI attribute in Certificate Distribution Point (CDP) extension of these certificates (except for the Root CA certificates) to allow Relying Parties to download the CRLs. Also, the CA includes a value for the URLs in the Authority Information Access (AIA) extension of these certificates to let Relying Parties send OCSP requests and receive OCSP responses.
4.10.2. Service Availability
The CA maintains sufficient resources to provide responses in under ten (10) seconds for the current status of CA, individual, and organizational certificates. Also, the CA has 24x7x365 capability to respond to certificate problem reports. Where appropriate, the CA forwards these reports to law enforcement or revoke the certificates in question.
4.10.3. Optional Features
No stipulation.
4.11. End Of Subscription
The CA allows Subscriber and Sponsors to end their subscriptions by either revoking or not renewing their individual or organizational certificates. Further, legal entities may end their subscription by either revoking or not renewing their CA certificates.
4.12. Key Escrow And Recovery
4.12.1. Key Escrow And Recovery Policy And Practices
The CA does not escrow the private keys for CA certificates or any certificates with the Non-Repudiation values in the Key Usage extension of these certificates.
4.12.2. Session Key Encapsulation And Recovery Policy And Practices
The CA does not offer session key encapsulation. If the CA provides session key encapsulation, the CA defines the practices in the CPS.
5. FACILITY, MANAGEMENT, AND OPERATIONAL CONTROLS
5.1. Physical Controls
5.1.1. Site Location And Construction
The CA operates infrastructure (e.g., servers, networks, etc.) for the Proof PKI system in secure data centers with appropriate physical security controls to protect against interference or damage. Further, the CA leverages CA software, which uses HSMs, to create, manage, and protect the online CAs.
Additionally, the CA implements appropriate physical security controls to protect HSMs that are in use, in transit, or in storage for offline CAs. The HSMs are stored and used in facilities with at least four (4) security layers. Moreover, the HSMs are placed in tamper evident bags in transit and storage.
5.1.2. Physical Access
The CA utilizes data centers which have appropriate physical access controls to prevent unauthorized access to infrastructure for the Proof PKI system. Moreover, the CA contracts with vendors to provide safe deposit boxes storing HSMs for offline CAs. These vendors have physical controls that include, but are not limited to:
- Multifactor authentication to physically access infrastructure for the Poof PKI system via physical key cards and biometric readers
- Video surveillance on a 24x7x365 basis of the infrastructure for Proof PKI system
- Full time security guards on a 24x7x365 basis to log and monitor physical access
- Further, these vendors electronically monitor physical access logs at the secure data centers for unauthorized access to the Proof PKI system.
- Lastly, the CA has implemented multi-party controls to activate the HSMs for offline CAs.
5.1.3. Power And Air Conditioning
The CA utilizes data centers which have sufficient backup power and heating, ventilation, and air conditioning (HVAC) to ensure the infrastructure for the Proof PKI system may finish any pending operations before a system shutdown due a lack of power or air conditioning.
5.1.4. Water Exposure
The CA utilizes data centers which protect the infrastructure for the Proof PKI system from damage due to water exposure.
5.1.5. Fire Prevention And Protection
The CA utilizes data centers which protect the infrastructure for the Proof PKI system from fire with automatic fire suppression systems designed to protect electronic infrastructure.
5.1.6. Media Storage
The utilizes data centers which handle and store media to protect against unauthorized access, damage, or theft. Additionally, the vendors provide safe deposit boxes to protect HSMs against unauthorized access, damage, or theft.
5.1.7. Waste Disposal
The CA shreds and disposes of all paper documents or printed materials with confidential information in a secure manner by leveraging shredding services from third-party vendors.
Moreover, the CA wipes, zeroizes, or overwrites data on electronic media including HSMs.
5.1.8. Offsite Backup
The CA backups and/or replicates data in the Proof PKI system from the primary data center to the second data center. Both data centers have the same physical protections.
In addition, the CA backups the private keys for offline CAs between the primary and secondary HSMs.
5.2. Procedural Controls
5.2.1. Trusted Roles
The PMA defines and approves Trusted Roles that separates the CA and RA responsibilities to multiple personnel to prevent circumventing the security controls or subverting the trustworthiness of the Proof PKI system. At a minimum, the PMA splits the CA and RA responsibilities into the following Trusted Roles:
5.2.2. Number Of Persons Required Per Task
The CA has security controls to ensure segregation of duties based on job roles. In addition, the CA requires multi-person controls for critical CA functions which include, but are not limited to:
- Activating and using the HSMs
- Producing. backing up, and recovering key pairs for CA certificates
- Creating and managing offline CA certificates
- Generating CRLs for offline CA certificates
- Issuing OCSP responder certificates from CA certificates
- Archiving and deleting CA audit logs
5.2.3. Identification And Authentication For Each Role
The CA requires personnel in Trusted Roles to use multifactor authentication to access the Proof PKI system.
5.2.4. Roles Requiring Separation Of Duties
The PMA assigns personnel to the Trusted Roles. Further, the PMA may assign personnel to multiple Trusted Roles (e.g. a person may be assigned to System Administrator CA Operator Trusted Roles). But, the PMA does not allow personnel assigned to the Internal Auditor Trusted Role to have another Trusted Role.
5.3. Personnel Controls
5.3.1. Qualifications, Experience, And Clearance Requirements
The CA verifies the PII and trustworthiness of all personnel at Proof through employment data background checks. Also, the CA requires all personnel assigned to Trusted Roles to complete Identify transactions. Further, the CA specifies the qualifications and experience for positions in Trusted Roles in job descriptions. Also, the CA assesses whether candidates for these positions can perform responsibilities competently and satisfactorily in the job interview process.
5.3.2. Background Check Procedures
The CA conducts background checks, subject to local laws, on all personnel to verify PII, employment history, criminal and driving records, and educational levels.
5.3.3. Training Requirements
The CA provides comprehensive training to personnel in Trusted Roles to ensure understanding of the following items:
- Trusted roles and responsibilities
- Basic PKI concepts
- Security awareness
- Applicable policies and procedures
5.3.4. Retraining Frequency And Requirements
The CA requires personnel in Trusted Roles to maintain required skill levels to perform their assigned responsibilities. Moreover, the CA provides periodic training to reinforce those skills levels and reflect any relevant changes impacting the Proof PKI system.
5.3.5. Job Rotation Frequency And Sequence
The CA may have personnel in Trusted Roles change job functions. In these cases, the CA minimizes impacts due to these job changes.
5.3.6. Sanctions For Unauthorized Actions
The CA enforces administrative or disciplinary actions, up to and including termination and criminal sanctions, for personnel that fail to comply with this CPS whether through negligence or malicious intent.
5.3.7. Independent Contractor Requirements
The CA subjects independent contractors (i.e., Notaries) to the same qualification, background checks, training, and sanctions as specified in CPS Sections 5.3.1, 5.3.2, 5.3.3, 5.3.4, and 5.3.6.
5.3.8. Documentation Supplied To Personnel
The CA gives personnel in Trusted Roles with relevant documentation required to perform their job responsibilities. Also, the CA periodically updates the relevant documentation to accurately reflect the Proof PKI system, operations, or security measures.
5.4. Audit Logging Procedures
5.4.1. Types Of Events Recorded
The CA enables audit logging processes in the Proof PKI system to collect audit logs about system actions and security events. Further, the CA ensures the Proof PKI system invokes the audit logging processes at system start up and only ends at system shut down. Moreover, the CA prevents circumvention of the audit logging processes.
Additionally, the CA captures, at a minimum, the following information in the audit logs:
- System action or security event description
- System action or security event date and time
- System action result
- User or service account that triggered system action or security event
- If the Proof PKI system does not support automated audit logging, the CA implements manual SOPs to record system actions and security events (i.e., key ceremony inventory log).
- Finally, the CA makes the audit logs available to the Qualified Auditors for inspection.
5.4.1.1. System Actions For CA Certificates
The CA captures, at a minimum, the following system actions in audit logs for CA certificates:
- Key generation, backup, storage, recovery, archival, and destruction
- Submission of certificate, renewal, rekey, and revocation requests
- Approval or denial decision for certificate, renewal, rekey, or revocation requests
- Issuance and revocation of CA certificates
- HSM life cycle management events
- Generation of CRLs
- Signature of OCSP responses
- Introduction of new certificate profiles
- Retirement of existing certificate profiles
5.4.1.2. System Actions For Individual And Organizational Certificates
The CA captures, at a minimum, the following system actions in audit logs for individual and organizational certificates:
- All verification actions as defined in CPS Sections 3.1 and 3.2
- Submission of certificate, renewal, rekey, and revocation requests
- Approval or denial decision for certificate, renewal, rekey, and revocation requests
- Issuance and revocation of individual and organizational certificates
- Generation of CRLs
- Signature of OCSP responses
5.4.1.3. Security Events
The CA captures, at a minimum, the following security events in the audit logs:
- Successful and unsuccessful system access attempts
- PKI and security system actions performed
- Security profile changes
- Installation, update, or removal of infrastructure and applications
- System crashes, infrastructure failures, or other anomalies
- Firewall rule changes
- Physical access to data data centers
5.4.2. Frequency Of Processing Log
The CA collects and forwards audit logs from the Proof PKI system to a security information and event management (SIEM) system at least daily. Also, the CA configures the SIEM to process audit logs upon receipt to identify any security incidents.
5.4.3. Retention Period For Audit Log
The CA retains audit logs in the archive for, at a minimum, two (2) years related to the following:
- CA certificate and HSM life cycle system actions as specified in CPS Sections 5.4.1.1
- Individual and organizational certificate system actions as defined in CPS Section 5.4.1.2
- Security events as described in CPS Section 5.4.1.3
5.4.4. Protection Of Audit Log
The CA implements automated monitoring processes to continuously monitor the collection of audit logs from the Proof PKI system as well as processing of audit logs by the SIEM. Further, the CA ensures the processes check tamper-evident seals and time stamps on the audit logs. If the processes discover any anomalies, irregularities, or malicious activities, the CA produces security incidents and notifies appropriate personnel in Trusted Roles as per the security incident process defined in CPS Section 5.7.1.
Moreover, the CA configures the SIEM and has SOPs to protect archived audit logs from destruction before the end of the retention period by ensuring only authorized personnel in Trusted Roles have read only access and may archive audit logs.
5.4.5. Audit Log Backup Procedures
The CA backups and/or replicates data in the SIEM from the primary data center to at least one other geographically-separated data center based on the business continuity plans. Also, the CA ensures the other data center(s) have the commensurate security controls to the primary data center.
5.4.6. Audit Collection System (Internal Versus External)
The CA may deploy an internal SIEM system or use a third-party service as the SIEM system. If the SIEM fails, the CA notifies the PMA to determine whether to suspend CA and RA operations until the issues have been remediated.
5.4.7. Notification To Event-Causing Subject
No stipulation.
5.4.8. Vulnerability Assessments
The CA conducts risk assessments at least annually to identify known internal and external threats that may result in unauthorized access, disclosure, misuse, alteration, or destruction of data in the Proof PKI system. Also, the CA determines the likelihood and potential damage of these threats. Moreover, the CA performs internal audits as specified in CPS Section 8.7 to assess the effectiveness of security controls against these threats.
Further, the CA performs vulnerability scans at least quarterly to identify known vulnerabilities on the Proof PKI system. In addition, the CA engages an independent third-party vendor to hold penetration tests on the Proof PKI system. The CA identifies, reviews, prioritizes, and remediates findings discovered from these vulnerability scans and penetration tests to maintain integrity of the Proof PKI system.
5.5. Records Archival
5.5.1. Types Of Records Archived
The CA archives legal entity and PII verification results for Proof personnel along with the Subscribers and Sponsors of individual certificates. Also, the CA archives certificate, renewal, rekey, and revocation requests. Further, the CA archives documents about the Proof PKI system. Lastly, the CA archives audit logs.
5.5.2. Retention Period For Archive
The CA retains archived data in accordance with the following schedule:
- Legal entity and PII verification results are retained for the entire validity period of CA, individual, and organizational certificate plus two (2) years
- Certificate, renewal, rekey, and revocation requests are kept for the entire validity period of CA, individual, and organizational certificate plus two (2) years
- System documentation for Proof PKI system are retained for two (2) years
- Audit logs are kept for two (2) years
5.5.3. Protection Of Archive
The CA protects the data in archives from unauthorized access, changes, substitution, or destruction by restricting access to personnel in Trusted Roles and encrypting the data at-rest. Further, the CA monitors the archive for unauthorized access or changes.
5.5.4. Archive Backup Procedures
The CA backups and/or replicates data in the archives from the primary data center to the secondary data center based on the business continuity plans. Also, the CA ensures the data centers have the commensurate security controls.
5.5.5. Requirements For Time Stamping Of Records
The CA includes date and time stamps for all system actions (e.g., uploading data, viewing data, etc.) in the archives. Further, the CA ensures the time stamps are derived from trusted time sources.
5.5.6. Archive Collection System (Internal Or External)
The CA deploys an internal archive system or leverages a third-party service as the archive system.
5.5.7. Procedures To Obtain And Verify Archive Information
The CA periodically updates, deletes, and verifies data in the archives manually or automatically. Also, the CA restricts access to the archives to authorized personnel in Trusted Roles. Further, the CA has SOPs about updating, deleting, and verifying data in the archives.
5.6. Key Changeover
The CA periodically changes the key pairs for CA, individual, and organizational certificates as specified in the associated CPS Section 5.6.
5.7. Compromise And Disaster Recovery
5.7.1. Incident And Compromise Handling Procedures
The CA has security incident processes to identify, analyze, respond, remediate, and recover from security incidents in the Proof PKI system. Additionally, the CA prepares a business continuity plan to declare and recover from potential disasters that compromise data or impact secure data centers. Further, the CA notifies Subscribers, Sponsors, Relying Parties, Other Participants, and Application Software Suppliers in the event of disasters, data compromises, or business failures. Finally, the CA performs tabletop exercises to test security incident and business continuity processes at least every 12 months.
5.7.2. Recovery Procedures If Computing Resources, Software, And/Or Data Are Corrupted
The CA includes recovery options in the business continuity plans to promote alternative secure data centers to be the primary data centers and restore data from backups.
5.7.3. Recovery Procedures After Key Compromise
The CA includes recovery options in the business continuity plan to address suspected or confirmed compromise, loss, or destruction of the private keys for CA certificate. Further, the CA adds recovery options in business continuity plans to handle theoretical or actual compromise of the parameters or algorithms used to generate the private keys for CA certificates.
If the private keys for CA certificate are compromised, the CA investigates the security incidents as specified in CPS Section 5.7.1 and may take the following steps:
- Revoke all individual and organizational certificates issued by CA certificates
- Revoke CA certificates
- Generate new key pairs on HSMs
- Sign CA certificates with new key pairs
- Send notifications
5.7.4. Business Continuity Capabilities After A Disaster
The CA restores the Proof PKI system in accordance with recovery time objectives (RTOs) and recovery point objectives (RPOs) as per the business continuity plans in cases of disasters, data compromises, or business failures.
5.8. CA Or RA Termination
The CA sends timely notice about termination of CA or RA responsibilities to all affected Subscribers, Sponsors, Relying Parties, Other Participants, and Application Software Suppliers.
If the CA decides to transfer these responsibilities to another CA, the CA will create migration plans and share transfer details with all affected Subscribers, Sponsors, Relying Parties, Other Participants, and Application Software Suppliers.
If the CA opts to stop issuing or renewing certificates, the CA will send timely notice that allows affected Subscribers, Sponsors, Relying Parties, Other Participants, and Application Software Suppliers to switch to another CA. At the end of the notice period, the CA will perform the following tasks at the end of the notice period:
- Revoke all valid CA, individual, and organizational certificates
- Destroy the private keys for the CA certificates.
- Publish the final CRLs in the security repository
6. TECHNICAL SECURITY CONTROLS
6.1. Key Pair Generation And Installation
6.1.1. Key Pair Generation
The CA generates all key pairs (a.k.a., public/private keys) on HSMs validated by NIST to comply with US NIST Federal Information Processing Standards (FIPS) 140-2: Security Requirements for Cryptographic Modules standard.
Note: US NIST has published the FIPS 140-3 standard which supersedes FIPS 140-2 standard, but many HSM vendors are waiting for the NIST CryptographicModule Validation Program (CMVP) to review their applications for FIPS 140-3 certificates. The CA uses HSMs with FIPS 140-3 certificates where possible.
6.1.1.1. CA Certificates
The CA creates key pairs on HSMs rated at FIPS 140-2 Level 3 for CA certificates. Also, the PMA authorizes key ceremonies with personnel in Trusted Roles to follow key ceremony scripts to activate the HSMs and generate key pairs. Further, the CA requires M of N to activate HSMs and implement multi-person controls to perform CA operations. Further, the CA has Qualified Auditors either witness the key ceremonies or examine videos and attestations from the key ceremonies.
6.1.1.2. Individual And Organizational Certificates
The CA generates and hosts key pairs on behalf of Subscribers and Sponsors for individual and organizational certificates. If the CA hosts the key pairs, the CA generates the key pairs on HSMs rated at FIPS 140-2 Level 2.
Additionally, the CA does not allow Sponsors to generate key pairs and submit CSRs for organizational certificates.
6.1.2. Private Key Delivery To Subscriber
The CA grants access to Subscribers and Sponsors to use their private keys with the Proof digital signature service. Also, the CA requires Subscribers and Sponsors to use multifactor authentication to access Notarize or Sign transactions.
6.1.3. Public Key Delivery To Certificate Issuer
The CA delivers the public keys to Subscribers and Sponsors in the Public Key extension of individual and organizational certificates.
6.1.4. CA Public Key Delivery To Relying Parties
The CA delivers the public keys for CA certificates to Relying Parties by posting CAs in the security repository. Also, the CA includes URLs in the Authority Information to the CAs in Issuing CA, individual, and organizational certificates.
6.1.5. Key Sizes
The CA may use the following Rivest, Shamir, and Adleman (RSA) or elliptical curve cryptography (ECC) key sizes for certificates:

The CA ensures all RSA key pairs have a modulus size, in bits, evenly divisible by eight (8).
6.1.6. Public Key Parameters Generation And Quality Checking
The CA confirms public key exponents for RSA keys are an odd number equal to three (3) or more. In addition, the CA performs parameter quality checking in accordance with the US NIST FIPS 186-5: Digital Signature Standard (DSS). Further, the CA verifies the validity of ECC keys in the linting software based on ECC Full Public Key Validation Routine in accordance with US NIST SP 800-56A Rev. 3: Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography standard.
6.1.7. Key Usage Purposes (As Per X.509 V3 Key Usage Field)
The CA includes the Key Usage extension in CA, individual, and organizational certificates to technically limit usage in software applications compliant with the RFC 5280 standard based on CA and Certificate Naming Forms approved by the PMA.
Also, the CA only allows the private keys for Root CA certificates to sign the following types of certificates:
- Self-signed Root CA certificates
- Intermediate or Issuing CA certificates
- OCSP responses
6.2. Private Key Protection And Cryptographic Module Engineering Controls
6.2.1. Cryptographic Module Standards And Controls
The CA generates, stores, and protects key pairs on HSMs that have obtained FIPS 140-2 certificates. In particular, the CA uses the following HSMs for the certificates:

6.2.2. Private Key (N Out Of M) Multi-Person Control
The CA requires quorums (a.k.a., M of N) to activate and use the HSMs. Moreover, the CA implements multi-person controls to perform CA operations involving the HSMs.
6.2.3. Private Key Escrow
The CA does not escrow the key pairs from the HSMs.
6.2.4. Private Key Backup
The CA backups key pairs from the HSMs under multi-person controls during the key ceremony. Moreover, the CA encrypts the backups on the HSMs and stores the HSMs in the different geographic locations.
6.2.5. Private Key ArchivalThe CA does not archive private keys.
6.2.6. Private Key Transfer Into Or From A Cryptographic Module
The CA only allows private keys to be exported from HSMs for migration to other HSMs or backups. During migration, the CA follows vendor specifications to transfer private keys from old to new HSMs. For backups, the CA exports and encrypts the backups at rest. Further, the CA imports the encrypted backups into HSMs for use.
The CA does not permit the private keys to be in plain text outside of the HSMs.
6.2.7. Private Key Storage On Cryptographic Module
The CA stores key pairs on HSMs as specified in CPS Section 6.2.1.
6.2.8. Method Of Activating Private Key
The CA implements multi-person controls to perform all CA operations involving HSMs. Also, the CA meets the quorums to activate the HSMs storing the key pairs for CA certificates.
Moreover, the CA requires Subscribers and Sponsors to login with multifactor authentication to create sessions with the HSMs hosting key pairs for individual and organizational certificates.
6.2.9. Method Of Deactivating Private Key
The CA implements multi-person controls to perform all CA operations involving HSMs which includes shutting down the HSMs storing key pairs for CA certificates. Further, the CA protects the HSMs when not in use from interference, damage, or unauthorized access.
Also, the CA deactivates key pairs on HSMs hosting key pairs for individual and organizational certificates after the Subscribers and Sponsors terminate their authenticated sessions to the HSMs.
6.2.10. Method Of Destroying Private Key
The CA implements multi-person controls to perform all CA operations involving HSMs which includes destroying key pairs for CA certificates. For online CAs, the CA holds a key ceremony to perform a factory reset that zeroizes the physical HSMs. For online CAs, the CA holds virtual meetings to run scripts that call the CA software application programming interfaces (APIs) to delete the private keys.
Moreover, the CA destroys the key pairs after the expiration of individual or organization certificates.
6.2.11. Cryptographic Module Rating
The CA ensures the HSMs have valid FIPS certificates as specified in CPS Section 6.2.1.
6.3. Other Aspects Of Key Pair Management6.3.1. Public Key Archival
The CA archives public keys for CA, individual, and organizational certificates as specified in CPS Section 5.5.
6.3.2. Certificate Operational Periods And Key Pair Usage Periods
The CA sets the validity periods, not to exceed the following maximums, for certificates and key pairs:

The CA does not issue individual or organizational certificates with an expiration period that exceeds the Issuing CA certificates.
6.4. Activation Data
6.4.1. Activation Data Generation And Installation
The CA generates activation data (e.g., key pairs, passwords, etc.) with sufficient strength to protect key pairs on HSMs against loss, theft, modification, modification, unauthorized access, or unauthorized use.
For offline CAs, the CA requires quorum (2 of 5) to activate HSMs. Key Custodians have keys in USB tokens to achieve this quorum. Also, Key Custodians enter personal identification numbers (PINs) to access the keys.
For online CAs, the CA develops scripts that call CA software to deploy and activate private keys. The deployment leverages a service account with sufficient password strength to run these scripts.
For individual and organizational certificates, the CA requires Subscribers and Sponsors to use multifactor authentication to login to the Proof platform to use the private keys to digitally sign objects.
6.4.2. Activation Data Protection
The CA implements cryptographic and security controls to protect activation data from unauthorized access or use by storing the activation data protected by PINs.
6.4.3. Other Aspects Of Activation Data
The CA ensures only personnel in Trusted Roles have access to activation data for HSMs.
6.5. Computer Security Controls
6.5.1. Specific Computer Security Technical Requirements
The CA configures the Proof PKI system which includes CA, RA, and VA systems to meet the following technical requirements:
- Configured, maintained, and secured using industry best practices
- Operated on trustworthy software
- Regularly scanned for malicious code and protected against spyware and viruses
- Updated with recommended security patches within six (6) months of the security patch’s availability, unless documented testing determines that the security patch would introduce additional vulnerabilities
- In addition, the CA configures the Proof PKI system to perform the following security tasks:
- Verify identity of users before permitting access
- Use multifactor authentication to access systems
- Manage privileges of users and limit users to assigned roles
- Generate and archive audit records for all transactions
- Enforce domain integrity boundaries for critical security processes
- Support recovery from system failure
6.5.2. Computer Security Rating
No stipulation.
6.6. Life Cycle Technical Controls
6.6.1. System Development Controls
The CA implements the following security controls for the software development life cycle (SDLC):
- Follow a documented SDLC process for software development related to Proof PKI system
- Obtain infrastructure and software for the Proof PKI system in a manner that reduces risks of tampering, falsification, or modification
- Maintain integrity of software throughout the SDLC and deployment processes
- Ensure the CA system has dedicated infrastructure, databases, software, and networks for CA operations
- If the CA uses third-party software for linting, the CA installs the latest version that is no more than three (3) months from the general availability (GA) release.
6.6.2. Security Management Controls
The CA has security controls to establish, update, and monitor the baseline configurations for all infrastructure and software for the Proof PKI system. If the CA detects unauthorized modifications to the baseline configurations, the CA investigates the security incidents as specified in CPS Section 5.7.1.
6.6.3. Life Cycle Security Controls
No stipulation.
6.7. Network Security Controls
The CA implements security controls to protect all CA, RA, and VA operations in the Proof PKI system which includes:
- Segment networks into zones based on functional or logical relationships
- Apply security controls to all infrastructure and software within the same zones
- Manage data flow and secure communications within and between networks and zones
- Configure network infrastructure to only allow services, ports, and protocols required for CA, RA, and VA operations
- Ensure secure communications between Subscribers and RA system as well as RA system to CA system
- Grant and log access by personnel in Trusted Roles to networks and zones
- Monitor networks and zones for potential security incidents
6.8. Time Stamping
The CA ensures the accuracy of trusted time sources is within three (3) minutes for all time stamping operations based on known time sources.
7. CERTIFICATE, CRL, AND OCSP PROFILES
7.1. Certificate Profile
7.1.1. Version Number(s)
The CA configures the CA system to issue CA, individual, and organizational certificates based on X.509 Version 3 in the RFC 5280 standard.
7.1.2. Certificate Extensions
The CA configures the CA system to include extensions based on RFC 5280 standard, C2PA technical standard, and Adobe ATL technical requirements in CA, individual, and organizational certificates.
Further, the CA configures extensions of CA certificates based on CA/B Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates standard.
7.1.3. Algorithm Object Identifiers
The CA specifies one of the following object identifiers (OIDs) for the Signature Algorithm attribute in CA, individual, and organizational certificates:

In addition, the CA includes one of the OIDs for the Algorithm attribute in the Public Key Information extension of the CA, individual, and organizational certificates to indicate elliptical curve (EC) used for the key pair:

Moreover, the CA includes one of the OIDs for the Parameter attribute in the Public Key Information extension of the CA, individual, and organizational certificates to indicate type of key pair created by the CA, Subscriber, or Sponsor:

Note: RSA based key pairs have null values for the Parameter attribute.
7.1.4. Name Forms
The CA includes C, O, and CN attributes in the Issuer DN extension of CA, individual, and organizational certificates. Additionally, the CA populates C, O, and CN attributes in the Subject DN extension of CA and organizational certificates. Further, the CA has the C and CN attributes in the Subject DN extension of individual certificates. Moreover, the CA may include the O attribute in the Subject DN extension of individual certificates.
In addition, the CA populates the Serial Number attribute of CA, individual, and organizational certificates.
The CA does not add symbols (e.g., dash “-”, space “ “, etc.) for any attributes in the Subject or Issuer DN extensions that may indicate the value is absent, incomplete, or not applicable. Further, the CA does not include the Organizational Unit (OU) attribute in the Issuer or Subject DN extensions.
7.1.5. Name Constraints
The CA does not include the Permitted Sub Tree and Excluded Sub Tree attributes in the Naming Constraints extension.
7.1.6. Certificate Policy Object Identifier
The CA may add OIDs registered by Proof in the Certificate Policy extension of CA, individual, and organizational certificates.
7.1.7. Usage Of Policy Constraints Extension
No stipulation.
7.1.8. Policy Qualifiers Syntax and Semantics
The CA may include CPS and User Notice attributes in the Certificate Policy extension of CA, individual, and organizational certificates to notify Relying Parties about terms and conditions
7.1.9. Processing Semantics For The Critical Certificate Policies Extension
No stipulation.
7.2. CRL Profile
7.2.1. Version Number(s)
The CA configures the CA system to issue CRLs based on CRL Version 2 in the RFC 5280 standard.
7.2.2. CRL And CRL Entry Extensions
The CA includes the Authority Key Identifier (AKI), CRL Number, and AIA extensions in the CRLs. Also, the CA adds Reason Code as the CRL entry extension. Further, the CA populates the Reason Code extension as specified in CPS Section 4.9.1.
7.3. OCSP Profile
7.3.1. Version Number(s)
The CA configures the VA system to accept OCSP requests and return OCSP responses based on Version 1 of the RFC 6960 standard.
7.3.2. OCSP Extensions
The CA does not populate the Single Extension of the OCSP responses with the reason code values in the CRLs.
8. COMPLIANCE AUDIT AND OTHER ASSESSMENTS
8.1. Frequency Or Circumstances Of Assessment
The CA engages Qualified Auditors to assess the compliance of the Proof PKI system with this CPS and associated CPS at least every 12 months.
8.2. Identity And Qualifications Of Assessor
The CA engages Qualified Auditors with the following characteristics to assess the Proof PKI system:
- Is independent from the subject of the external assessment
- Has ability to conduct an external assessment that addresses criteria specified in CPS Section 8.4
- Employs individuals proficient in the examination of PKI infrastructure technology; information security tools and techniques; information technology and security auditing; and third-party attestation function
- Adhere to applicable laws, government regulations, and professional code of ethics
- Maintains a Professional Liability / Errors and Omissions insurance policy with a minimum of one million US dollars ($1,000,000) in coverage
8.3. Assessor's Relationship To Assessed Entity
The CA uses Qualified Auditors that are independent from any relationships that may constitute a conflict of interest or may impair the auditor’s objective assessment in any way.
8.4. Topics Covered By Assessment
The CA engages Qualified Auditors to perform assessments of the Proof PKI system in accordance with the latest versions of the following documents:
- CA/B Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted TLS Server Certificates
- CA/Browser Forum Network and Certificate System Security Requirements
- WebTrust Principles and Criteria for Certification Authorities – Network Security
- WebTrust Principles and Criteria for Certification Authorities – Network Security
- Adobe Approved Trust List 2.0 Technical Specification
8.5. Actions Taken As A Result Of Deficiency
The Qualified Auditors provides assessment reports with their opinions and findings for any security control deficiencies. The CA develops corrective action plans to remediate the deficiencies. Further, the CA monitors the progress against corrective action plans. If the corrective actions are not being resolved, the CA reports the issue to the PMA. If required, the CA may perform internal assessments to ensure the effectiveness of security controls.
8.6. Communication Of Results
The CA provides the assessment reports and summarizes the audit results for the PMA. Also, the CA shares assessment reports with third party entities as contractually required. In addition, the CA publishes the assessment reports in the legal repository.
8.7. Self Audits
The CA conducts internal audits to evaluate the design and effectiveness of security controls for the Proof PKI system at least every 12 months. Additionally, the CA audits a three percent (3%) random sample of individual and organizational certificates to verify ID verification of Subscribers and Sponsors at least quarterly.
9. OTHER BUSINESS AND LEGAL MATTERS
9.1. Fees
9.1.1. Certificate Issuance Or Renewal Fees
The CA may charge fees to issue and renew certificates.
9.1.2. Certificate Access Fees
The CA may charge fees to provide access to databases containing certificates.
9.1.3. Revocation Or Status Information Access Fees
The CA does not charge fees to check revocation information via standard CRLs or OCSP. However, the CA may charge for value-added services (e.g., customized CRLs, alternative authentication methods, etc.).
9.1.4. Fees For Other Services
The CA may charge fees for additional services (e.g., co-branded CAs, cross certification, etc.).
9.1.5. Refund Policy
The CA may offer refunds in accordance with the applicable terms and conditions.
9.2. Financial Responsibility
9.2.1. Insurance Coverage
The CA maintains commercial general liability insurance with policy limits of at least two million US dollars ($2,000,000) in coverage as well as Errors and Omissions/Professional Liability insurance with a policy limit of at least five million US dollars ($5,000,000) in coverage.
9.2.2. Other Assets
No stipulation.
9.2.3. Insurance Or Warranty Coverage For End Entities
The CA may offer limited warranties in accordance with the applicable terms and conditions.
9.3. Confidentiality Of Business Information
9.3.1. Scope Of Confidential Information
The CA specifies the information to be classified as confidential in the CPS.
9.3.2. Information Not Within The Scope Of Confidential Information
The CA may treat any information not listed as confidential in the CPS as public information.
9.3.3. Responsibility To Protect Confidential Information
The CA contractually obligates Proof personnel to protect confidential information. Further, the CA provides security training for Proof personnel about protecting confidential information.9.4. Privacy Of Personal Information
9.4.1. Privacy Plan
The CA creates and follow a publicly posted privacy policy that specifies how the CA handles PII at the following URL:
9.4.2. Information Treated As Private
The CA treats PII about Subscribers, not included in the Subject extension of individual certificates, as private.
9.4.3. Information Not Deemed Private
The CA does not consider certificates, CRLs, or documents published in repositories to be private.
9.4.4. Responsibility To Protect Private Information
The CA contractually obligates Proof personnel to protect private information. Further, the CA provides security training for Proof personnel about protecting private information.
9.4.5. Notice And Consent To Use Private Information
The CA complies with the publicly posted privacy policy to store, process, and transfer PII including any notices and consents stated within this policy.
9.4.6. Disclosure Pursuant To Judicial Or Administrative Process
The CA may disclose private PII without notice to Subscribers or Sponsors as required by applicable laws, court orders, and regulations.
9.4.7. Other Information Disclosure Circumstances
The CA may use third-party vendors to perform functions in the Proof PKI system. In these cases, the CA contractually requires third-party vendors to adhere to CA's privacy requirements, consistent with the publicly posted privacy policy and applicable privacy laws and regulations.
9.5. Intellectual Property Rights
The CA owns the intellectual property rights in the Proof PKI system including certificates and CRLs. Further, the CA grants permission to make revocation information available to Relying Parties that agree to the RPA. Also, the CA grants permission to use revocation information and distribute certificates to Application Software Suppliers in accordance with relevant agreements.
9.6. Representations And Warranties
9.6.1. CA Representations And Warranties
The CA represents compliance to this CP and associated CPS in all material aspects to Subscribers, Relying Parties, and Application Software Suppliers.
9.6.2. RA Representations And Warranties
The CA requires the RA to follow this CP and associated CPS for certificate issuance and management.
9.6.3. Subscriber Representations And Warranties
The CA requires Subscribers and Sponsors to agree with the applicable terms and conditions and make the following representations:
- Sponsors received appropriate security training about certificates
- Subscribers and Sponsors provided accurate and complete information at all times in connection with the issuance of certificates including certificate, renewal, and rekey requests as well as any additional information requested by RA or CA
- Subscribers and Sponsors took all reasonable measures to protect and control the private keys for the certificates including credentials used to access private keys
- Subscribers and Sponsors verified the accuracy of information in certificates
- Subscribers and Sponsors use certificates in compliance with the applicable laws
- Subscribers and Sponsors promptly request revocation due to actual or suspected compromise of private keys; misuse of certificates; and incorrect or inaccurate information in certificates
- Subscribers and Sponsors cease to use all private keys for revoked and expired certificates
- Subscribers and Sponsors acknowledge and accept the CA may revoke certificates immediately due to a violation of the terms and conditions or required by the CP and CPS
9.6.4. Relying Party Representations And Warranties
The Relying Parties make representations as required by this CP, associated CPS, and applicable terms and conditions prior to using or relying upon certificates issued by the CA.
9.6.5. Representations And Warranties Of Other Participants
No stipulation.
9.7. Disclaimers Of Warranties
ALL CERTIFICATES AND ANY RELATED SERVICES ARE PROVIDED “AS IS” AND “AS AVAILABLE” EXCEPT AS EXPRESSLY STATED IN PROOF CP SECTION 9.6.1.
TO THE MAXIMUM EXTENT PERMITTED BY LAW, PROOF DISCLAIMS ALL EXPRESS AND IMPLIED WARRANTIES, INCLUDING ALL WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT.
PROOF DOES NOT WARRANT THAT ANY SERVICE OR PRODUCT WILL MEET ANY EXPECTATIONS OR THAT ACCESS TO CERTIFICATES WILL BE TIMELY OR ERROR-FREE. FURTHER, PROOF DOES NOT GUARANTEE THE AVAILABILITY OF A PRODUCT OR SERVICE AND MAY MODIFY OR DISCONTINUE ANY PRODUCT OR SERVICE AT ANY TIME.
NO FIDUCIARY DUTY IS CREATED OR IMPLIED THROUGH THE USE OF A PROOF PRODUCT OR SERVICE BY ANY ENTITY.
9.8. Limitations Of Liability
The CA may disclaim liability in the applicable terms and conditions.
9.9. Indemnities
9.9.1. Indemnifications by CA
The CA represents compliance to this CP and associated CPS in all material aspects to Subscribers, Relying Parties, and Application Software Suppliers
9.9.2. Indemnification by Subscribers and Sponsors
The Subscribers and Sponsor indemnify the CA, to the extent permitted by applicable law, for:
- Falsehood or misrepresentation of fact by the Subscriber or Sponsor on the Certificate Application
- Failure by the Subscriber to disclose a material fact on the Certificate Application, if the misrepresentation or omission was made negligently or with intent to deceive any party
- Failure to protect the private key for the certificate, to use a trustworthy system, or to otherwise take the precautions necessary to prevent the compromise, loss, disclosure, modification, or unauthorized use of the private key for the certificate
- Use of a name (including without limitation within a common name or email address) that infringes upon the intellectual property rights of a third party.
9.9.3. Indemnification by Relying Parties
The CA includes any indemnification requirements for Relying Parties in the associated CPS for this CP.
9.10. Term And Termination
9.10.1. Term
The CA considers this version of the CP to be effective until otherwise communicated through the legal repository as specified in CP Section 2.1
9.10.2. Termination
The CA terminates older versions of the CP effective immediately as soon as the latest version has been published in the legal repository.
Note: Some CP Sections may include future dates for certain policies or practices to become effective.
9.10.3. Effect Of Termination And Survival
The CA communicates the conditions and effect of terminating this CP along with which provisions will survive termination in the legal repository. At a minimum, the CA survives provisions related to protection of confidential information.
9.11. Individual Notices And Communications With Participants
The CA accepts any formal notices related to this CP which either have digital signatures or have been delivered by physical mail to the address specified in CP Section 1.5.2. Also, the CA reviews and replies to valid notices in a timely manner.
9.12. Amendments
9.12.1. Procedure For Amendment
The PMA may enact amendments to this CP as required. Further, the PMA notes significant changes, may include minor changes (e.g., grammar corrections, formatting updates, etc.), in CP Appendix C. Also, the CA reviews this CA at least every 12 months. If there are no changes, the CA adds an entry in CP Appendix C stating no changes required.
9.12.2. Notification Mechanism And Period
The PMA uploads the latest CP version to the legal repository within seven (7) days after approval. In addition, the PMA notifies Subscribers and Sponsor within reasonable timeframes about any major changes and effective dates to the CP.
9.12.3. Circumstances Under Which OID Must Be Changed
The PMA reserves the right to amend this CP. If this CP necessitates a new OID, the PMA includes the new OID in the updated CP version. Otherwise, the CA may not have to change the OID for this CP.
9.13. Dispute Resolution Provisions
The Subscribers, Sponsors, Relying Parties, Application Software Suppliers, and any other entities are required to notify Proof and attempt to resolve any disputes before resorting to any dispute resolution including adjudication or any other alternative dispute resolution.
9.14. Governing Law
The CA abides by the laws of the State of Delaware to govern the interpretation, construction, and enforcement of this CP and all proceedings related to the Proof PKI system including tort claims without regard to any conflicts of law principles. Also, the CA uses the State of Delaware as the non-exclusive venue and jurisdiction over any proceedings related to this CP.
9.15. Compliance With Applicable Law
The CA issues certificates and operates the Proof PKI in accordance with all laws applicable to its business and the certificates it issues in every jurisdiction in which it operates.
9.16. Miscellaneous Provisions
9.16.1. Entire Agreement
The CA enters into legally enforceable contracts that delineate terms associated with the Proof PKI system and related services.
9.16.2. Assignment
The Subscribers, Sponsors, Relying Parties, Application Software Suppliers, any other legal entities may not assign their rights or obligations without prior written consent of the CA.
9.16.3. Severability
The CA may modify the CP to address any conflicting requirements with a law, regulation, or government order in an applicable jurisdiction.
If the law, regulation, or government order no longer applies, the CA reverts the modifications in the CP.
9.16.4. Enforcement (Attorney's Fees and Waiver of Rights)
The CA may seek indemnification and attorney’s fees for damages, losses, and expenses incurred from Subscribers, Sponsors, Relying Parties, Application Software Supplier, or other legal entities due to their conduct. If the CA fails to enforce a CP provision, the CA does not waive its rights to enforce the same CP provision or any other CP provisions in the future. Additionally, the CA requires any waivers to be in writing and signed by the CA to be effective.
9.16.5. Force Majeure
The CA is not liable for any delays or failure to perform an obligation under this CP to the extent of the delay or failure is caused by an occurrence beyond the reasonable control of the CA that includes the operation of the Internet.
9.17. Other Provisions
No stipulation.
APPENDIX A | DEFINITIONS
Applicant: Is a natural person or legal entity that applies for (or seeks renewal of) a certificate. Once the certificate has been issued, the Applicant is referred to as the Subscriber.
Audit Period: Is the period between the first day (start) and the last day of operations (end) covered by the auditors in their engagement which is not the same as the time period if auditors are onsite. The coverage rules and maximum length of audit periods are defined in CP Section 8.1.
Audit Report: Is a report from the Qualified Auditor stating their opinion on whether processes and controls by the CA or RA comply with requirements and industry standards.
Baseline Requirements: Refer to standards published by CA/B Forum including “Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates” and “Network and Certificate System Security Requirements” which form the basis for the requirements and WebTrust audits.
CA System: Is a collection of infrastructure, databases, and software to issue and manage certificates.
CAB Forum: Means the Certification Authority/Browser Forum which is a voluntary group of CAs, web browsers, and Application Software Suppliers that use X.509 V.3 digital certificates. The CAB Forum sets the guidelines and requirements to establish public trust in web browsers and other software for digital certificates.
Certificate: Is a X.509 based file that uses a digital signature to bind a public key and an identity.
Certificate Management Process: Refers to processes, practices, and procedures associated with the use of keys, software, and infrastructure by which a CA verifies PII, issues certificates, maintains repositories, and revokes certificates.
Certificate Policy: Is a set of rules that indicate the applicability of a certificate to a particular community and/or PKI implementation with common security requirements.
Certificate Problem Report: Is a complaint of suspected key compromise, certificate misuse, or other types of fraud, compromise, misuse, or inappropriate conduct related to certificates.
Certificate Profile: Means a set of requirements for certificate content and certificate extensions.
Certificate Revocation List: Refers to a regularly updated, time-stamped list of revoked certificates that is created and digitally signed by the CA that issued the certificates.
Certificate Systems: Means systems used by the CA to verify identity; register, enroll, approve, and issue certificates; check status of certificates; provide support functions; and other PKI‐related services.
Certification Authority: Is an organization that is responsible for the creation, issuance, revocation, and management of certificates. The term applies equally to Roots CAs, Intermediate CAs and Issuing CAs.
Certification Practice Statement: Is one of several documents that form the governance framework in which certificates are created, issued, managed, and used.
Country: Is either a member of the United Nations (UN) or a geographic region recognized as a Sovereign State by at least two UN member nations.
High Risk Certificate Request: Is a certificate request by an Applicant that has been flagged by the CA for additional scrutiny based on internal criteria.
Individual: Is a natural person (a.k.a., human being).
Intermediate CA Certificate: Is a CA certificate issued by a Root CA certificate that is capable of issuing new certificates containing the Certificate Authority (cA) attribute in the Basic Constraints extension.
Issuing CA: Is a CA certificate issued by a Root or Intermediate CA certificate that issues certificates to Subscribers or Sponsors.
Key Compromise: Means unauthorized access or use of the private key. The unauthorized access or use may be suspected or confirmed.
Key Pair: Refers to the public and private keys for certificates. The public key appears in the Subject Public Key attribute of the certificates.
Object Identifier: Is a unique alphanumeric or numeric identifier registered under the International Organization for Standardization’s applicable standard for a specific object or object class.
Online Certificate Status Protocol: Is an online certificate-checking protocol that enables Relying Parties to determine the status of a certificate.
OCSP Responder: Refers to a certificate that digitally signs OCSP responses with status of certificates.
Personally Identifiable Information: Means any information about an individual maintained, including, but not limited to, education, financial transactions, medical history, and criminal or employment history and information which can be used to distinguish or trace an individual’s identity, such as their name, social security number, date and place of birth, mother’s maiden name, biometric records, etc., including any other personal information which is linked or linkable to an individual.
Personal Identification Number: Is a secret numerical code set by Key Custodians to login to YubiKey tokens.
Policy Management Authority: Is an administrative body appointed by CA management to create and maintain policies described in this CP and related procedural or security policy documents.
Private Key: Is kept secret by the Subscriber or Sponsor to create digital signatures and/or decrypt data encrypted with the corresponding public key.
Public Key: Is publicly disclosed by the Subscriber or Sponsor to Relying Parties which use public keys to verify digital signatures or encrypt data.
Public Key Infrastructure: Refers to a set of infrastructure, databases, software, system, people, policies, procedures, rules, and obligations to facilitate trustworthy creation, issuance, management, and use of certificates and keys based on public key cryptography.
Publicly Trusted Certificate: Is a certificate trusted by virtue of the fact that its corresponding Root CA certificate is distributed as a trust anchor in widely-available application software.
Qualified Auditor: Is a natural person or legal entity that meets the requirements of CP Section 8.2.
RA System: Refers to a collection of infrastructure, databases, and software to verify PII and legal entity information as well as create and submit certificate, renewal, rekey, and revocation requests.
Registration Authority: Refers to any legal entity that is responsible for identification and authentication of subjects of certificates. While the RA is not a CA and does not issue certificates, the RA may assist in the certificate application and/or revocation processes. RA is also used as an adjective to describe a role or function and does not necessarily imply a separate legal entity, but may be part of the CA.
Rekeying: Means the creation of a new certificate, using some or all of the information submitted from an existing certificate, and generating a new key pair.
Reliable Data Source: Refers to a data source to verify PII and legal entity information that is generally recognized among commercial entities as reliable.
Relying Party: Is any natural person or legal entity that relies on a valid certificate.
Repository: Means publicly-available web sites containing Proof policies, agreements, CA certificates, and certificate status information. Proof manages a legal repository for policies and agreements as well as a security repository for certificate status information.
Root CA: Is a top-level, self-signed CA certificate that issues other CA certificates. The Root CA certificate may be distributed by Application Software Suppliers.
Root CA System: A system used to create a Root Certificate or to generate, store, or sign with the Private Key associated with a Root Certificate.
Sponsor: Is a natural person that enrolls for a certificate on behalf of a legal entity and is legally bound by the applicable terms and conditions.
Subject: Is a natural person or legal entity identified as the Subject in a certificate.
Subscriber: Is a natural person that enrolls for a certificate and is legally bound by the applicable terms and conditions.
Validity Period: Is defined in RFC 5280 Section 4.1.2.5 as the period of time calculated based on values in notBefore through notAfter attributes, inclusive.
APPENDIX B | ACRONYMS AND ABBREVIATIONS
The following acronyms and abbreviations are used in this CP:


APPENDIX C | CHANGE HISTORY

(in a given calendar month as measured by Proof monitoring systems, converted to minutes)
(in a given calendar month as measured by Proof monitoring systems)
For job applicants: directly from you; background check providers; recruiters; recruiting software providers.
For job applicants: Asses your application; satisfy legal obligations.
For job applicants: directly from you; background check providers; recruiters; recruiting software providers.
For job applicants: Process your application; satisfy legal obligations.
For job applicants: directly from you; background check providers; recruiters; recruiting software providers.
For job applicants: directly from you; background check providers; recruiters; recruiting software providers.
For job applicants: Process your application.
For job applicants: Barring any legally required additional retention period, up to 7 years for non-hired applicants.