You should suspend the certificates of your ID-card as soon as you notice that you have lost it or it has been stolen: this way, your electronic identity remains protected.
If you’re certain that your ID-card has been stolen and cannot be retrieved, you should cancel it.
Kui oled kindel, et ID-kaart on tõepoolest varastatud ja välja ei tule, tuleks kaart tühistada.
märksõna: ID-card
The terms of use of certificates describe the main principles followed when issuing and using the certificates of ID-cards, residence permit cards, digital IDs and diplomatic identity cards.
Guidelines on how to view and save your ID-card certificates.
You can see whether your ID-card certificates are valid when you open DigiDoc4. An ID-card cannot be used for electronic acts without valid certificates, e.g. you cannot log in to your bank or sign documents digitally!
Digital documents: ID-card, digital ID, residence permit card and e-Resident digital ID
Digital documents (ID-card, digital ID, e-Resident’s digital ID, etc.) enable identification of the user in electronic channels.
What to do if issues arise with the card reader while using the ID-card?
What to do if an ID-card or other digital document is lost or stolen?
Did you discover that your ID-card is lost or stolen? First, consider whether you have used it recently and left it in a slightly different place than usual, for example, on the desk? How you proceed depends on how sure you are of the theft of the card.
The certificates tied to your digital means of identification (such as the ID-card, digital ID, Mobile-ID, Smart-ID) represent you in the electronic world. Therefore, it’s important that your certificates are always protected.
Certificate means the electronic evidence that ties a person (e.g. with their ID-card) to the right to perform legally binding acts (making bank transfers, signing contracts, etc.).
How is a secure connection between an ID-card and the server established?
We will explain how the secure connection between an ID-card and the server is established and shed some light on the possibility/impossibility of man-in-the-middle attacks upon the creation of this connection.