Data protection conditions for the ID-software of the National Information System Authority
The National Information System Authority’s document on data protection conditions explains how personal information is used with ID-software (including DigiDoc4 Client, RIA SiVa e-signature validation service, and RIA DigiDoc mobile application): what data will be transmitted, for what purpose…
Visiting id.ee The following data is collected and retained about the visitor upon visiting the website: the Internet Protocol address (IP address) of the computer or computer network used, the site that was visited, the…
What to do if an ID-card or other digital document is lost or stolen?
Did you discover that your ID-card is lost or stolen? First, consider whether you have used it recently and left it in a slightly different place than usual, for example, on the desk? How you proceed depends on how sure you are of the theft of the card.
PIN and PUK codes: Security recommendations
A code envelope with the PIN and PUK codes was given to you with your digital identity card. You cannot use the ID-card (or other digital identity cards) without them. Your certificates, i.e. your electronic…
How is a secure connection between an ID-card and the server established?
We will explain how the secure connection between an ID-card and the server is established and shed some light on the possibility/impossibility of man-in-the-middle attacks upon the creation of this connection.