Technology today, especially online applications over unsecure network like the Internet, demands more strengthened information security and user integrity. Cybersecurity issues, including the recent hacking incidents among government websites, identity theft, fraud, among others, threaten the security of information being exchanged as well as the integrity of the persons involved in the communication process.
As more and more people rely on the use of online applications over unsecure network like the Internet, the need to secure files and ensure their information integrity increases. This is where the PKI comes in. It addresses the issue of authenticity, confidentiality and integrity of information.
Public Key Infrastructure (PKI) allows users of public networks like the Internet to exchange private data securely. PKI is essentially a set of hardware, software, policies, personnel and procedures needed to create, manage, distribute, use, store and revoke digital certificates. The PKI is one of the core services being offered by the Department of Information and Communications Technology (DICT) that will foster trust in the government by ensuring secure and reliable online transactions.
WHAT IS A DIGITAL CERTIFICATE?
A very small file issued by a Certificate Authority as proof of an individual's (or machine's) electronic identity.
An electronic "passport" that allows a person, computer or organization to exchange information securely over the Internet.
Digital certificates will allow anyone to encrypt a document and/or digitally sign it anytime, anywhere to ensure continuity of services. It also provides additional security features to avoid forgery and tampering of health care documents.
ADVANTAGES:
Prevents fraud by authenticating the identity of an individual or entity.
Promotes privacy by preventing unauthorized access of common communications
Assures integrity of e-communications by securing them from being accessed while in transit.
Promotes non-repudiation of electronic transactions so that people will not be able to deny their involvement in a valid electronic transaction.
APPLICATION REQUIREMENTS:
WHO CAN AVAIL:
APPROVAL OR REJECTION OF CERTIFICATE APPLICATION:
The PNPKI has the right to reject an application if requirements are not complied with.TIME TO PROCESS CERTIFICATE APPLICATION:
PNPKI CA begins processing certificate application within a reasonable time of receipt “within 5 working days”.CIRCUMSTANCES UNDER WHICH A PNPKI CA CERTIFICATE WILL BE REVOKED:
a) Key Compromiseb) PNPKI CA Compromisec) PNPKI CA is not compliant with its Certificate Policy/Certificate Practice Statementd) Stop of OperationThe use and issuance of certificates under the Certificate Policy shall be covered by the applicable provisions of:
R.A. 8792 (the Electronic Commerce Act of 2000),
R.A. 8484 (Access Devices Regulation Act of 1998),
R.A. 7394 (Consumer Act of the Philippines),
R.A. 10173 (Data Privacy Act of 2012) and
E.O. 810, s2009 (Framework for National Certification Scheme for Digital Signatures).
A 10175 or The Cybercrime Prevention Act of 2012
Memorandum circular no. 2013-002
Department circular no. 2017 – 001