Data protection conditions for the ID software of the National Information System Authority
The National Information System Authority’s document on data protection conditions explains how personal information is used with ID software (including DigiDoc4 client, TeRa stamping application, RIA SiVa e-signature validation service, and RIA DigiDoc mobile application): what data will be transmitted, for…
How is a secure connection between an ID-card and the server established?
We will explain how the secure connection between an ID-card and the server is established and shed some light on the possibility/impossibility of man-in-the-middle attacks upon the creation of this connection.
PIN and PUK codes: Security recommendations
A code envelope with the PIN and PUK codes was given to you with your digital identity card. You cannot use the ID-card (or other digital identity cards) without them. Your certificates, i.e. your electronic…
What to do if an ID-card or other digital document is lost or stolen?
Did you discover that your ID-card is lost or stolen? First, consider whether you have used it recently and left it in a slightly different place than usual, for example, on the desk? How you proceed depends on how sure you are of the theft of the card.