SlideShare a Scribd company logo
eInvoicing Public Meeting
Brussels, 19 June 2008



  WG 3: Cost effective means to
  guarantee authenticity & integrity


  Johan Borendal – Trustweaver (Chair)
  Nick Pope – Thales e-Security (Technical Editor)
CEN eInvoicing Workshop – Phase 2

  Aim: Stimulate further standardization work in the domain of
  electronic invoices in Europe building on Phase 1 activities:
    WG 1: Adoption
    WG 2: Compliance of electronic invoice implementations
    WG 3: Cost effective authenticity & integrity
    WG4: Emerging technologies and business processes
    WG5: eInvoice service operators and mobility of users




                         eInvoicing Public Meeting
                          Brussels, 19 June 2008         ©2005 CEN – all rights reserved
Terms of Reference

   “Cost-effective authenticity and integrity of
   electronic invoices and related business
   documents regardless of formats and
   technologies”

  Minimise unnecessary costs to businesses
  Ensure that major risks identified by Tax
  Authorities are addressed




                    eInvoicing Public Meeting
                     Brussels, 19 June 2008     ©2005 CEN – all rights reserved
CEN eInvoicing WG 3: Terms of
Reference
   “Cost-effective authenticity and integrity of
   electronic invoices and related business
   documents regardless of formats and
   technologies”

  Authenticity & integrity in transfer

  Maintain authenticity & integrity over period
  of storage


                  eInvoicing Public Meeting
                   Brussels, 19 June 2008     ©2005 CEN – all rights reserved
CEN eInvoicing WG 3: Terms of
Reference
   “Cost-effective authenticity and integrity of
   electronic invoices and related business
   documents regardless of formats and
   technologies”

  eInvoicing main legal pressure point
  for business
  Applicable to other aspects of
  eBusiness & eGovernment



                  eInvoicing Public Meeting
                   Brussels, 19 June 2008     ©2005 CEN – all rights reserved
CEN eInvoicing WG 3: Terms of
Reference
   “Cost-effective authenticity and integrity of
   electronic invoices and related business
   documents regardless of formats and
   technologies”

Addressing Authenticity & Integrity by:
  Electronic Signatures
  Electronic Data Interchange (EDI)
  Other means


                   eInvoicing Public Meeting
                    Brussels, 19 June 2008     ©2005 CEN – all rights reserved
What Already Done

   Inventory of Authenticity & Integrity Requirements
      Spreadsheet of Requirements against 28 EU
      States / EFTA members
   Integrity and authenticity Requirements in common e-
   invoicing scenarios
       Model of eInvoicing exchanges
       Requirements derived from Directive 2006/112/EC
       + national implementations
   Authenticity and Integrity Requirements & Controls




                   eInvoicing Public Meeting
                    Brussels, 19 June 2008     ©2005 CEN – all rights reserved
WG2 Good Practice vs WG3
Requirements & Controls

                     WG2                                 WG3

     EInvoice    Requirements                                  Mechanisms
                                               A&I
    Preparation.

                                                EDI
     eInvoice
    Translation.
                         Controls           Signatures
                                                                   Protocols
               Self
              Billing.



                             eInvoicing Public Meeting
                              Brussels, 19 June 2008                 ©2005 CEN – all rights reserved
Conclusion
 - Lets join forces




CEN WG2 & WG3 / FISCALIS
e-Invoicing Good Practice Guidelines



                 eInvoicing Public Meeting
                  Brussels, 19 June 2008     ©2005 CEN – all rights reserved
WG3 Current Approach

Authenticity & Integrity Controls
       Option 1: General procedural and technical controls to protect
       data at each stage of process (EDI / Other), or
       Option 2: Advanced electronic signatures protecting data from
       creation through whole storage lifetime (AdES)
Baseline security controls (e.g. audit, access control, contracts) should
be applied throughout
        No end-to-end long-term signatures                                   With end-to-end long-term signatures




                                         Technical controls                                                     Technical controls
                                         Process controls                                                       Process controls
                                         Audit                                                                  Audit
                                         Documentation                                                          Documentation
                                         Contract                                                               Contract
                                         General system security                                                General system security



                                                 eInvoicing Public Meeting
                                                  Brussels, 19 June 2008                             ©2005 CEN – all rights reserved
WG3 – Example Authenticity & Integrity
      Controls

   Baseline controls

   Example controls for EDI (other) Scenario

   Example controls for Advanced Electronic
   signature based scenario




                  eInvoicing Public Meeting
                   Brussels, 19 June 2008     ©2005 CEN – all rights reserved
Baseline controls
  Recognised standard based practices for the
  security and integrity:
     e.g. ISO 27001,
     SAS70,
     OECD Guidance on Tax Compliance for Business
     and Accounting Software
  Includes general controls for:
     Audit trails
     Access control enforcing business roles
     Protected Communications
     Data correctness and accuracy checks
  Prior agreement for security of
  communications
                   eInvoicing Public Meeting
                    Brussels, 19 June 2008     ©2005 CEN – all rights reserved
EDI/Other Example:
Requirements & Controls
               Supplier                                      Customer
               (Seller)                                       (Buyer)




  Communications
   Authenticity &                                                 Communications
     Integrity                                                        A& I
       (A& I)

                                                                 Processing
      Processing                                                 & Storage
      & Storage                   Comms               Customer’s    A& I
                 Supplier’s        A& I
         A& I                                         (Buyer’s)
                    Service
                                                       Service
                    Provider
                                                      Provider
                          eInvoicing Public Meeting
                           Brussels, 19 June 2008                  ©2005 CEN – all rights reserved
EDI/Other Example: Communications
 A&I

     Requirement                                     Control
Ensure authenticity and         The electronic invoice shall be
integrity of invoice whilst     sent through a secure channel
being sent.                     which :
                                a) Protects the integrity ….
                                b) Authenticates the invoice
                                   issuer …
                                Implementation examples:
                                i) TLS with passwords.
                                ii) AS/1-3 with signatures
                                ……




                         eInvoicing Public Meeting
                          Brussels, 19 June 2008               ©2005 CEN – all rights reserved
EDI/Other Example: Storage A & I

     Requirement                                          Control
The authenticity and              The invoice and audit records
integrity of the content of       regarding handling of the invoice,
the invoices stored must          including information on
be guaranteed throughout          authentication checks carried out, shall
the storage period..              be protected by mechanisms that
                                  assure the integrity of data throughout
                                  the storage period.

                                  Implementation examples:
                                   - WORM,
                                   - Secure archive

                              eInvoicing Public Meeting
                               Brussels, 19 June 2008               ©2005 CEN – all rights reserved
EDI/Other Example: Processing A & I


Met by a range of controls:

      Baseline security controls

      General eInvoice process requirements




                     eInvoicing Public Meeting
                      Brussels, 19 June 2008     ©2005 CEN – all rights reserved
AdES Example Requirements

              Supplier                                     Customer
              (Seller)                                      (Buyer)




  Communications
      A& I


         Signature                                               Signature
         Creation                                               Long term
                     Supplier’s                       Customer’s
                      Service
                                                                  validity
       Signature                                      (Buyer’s)
                      Provider                         Service
       Long term
                                                      Provider
        validity
                          eInvoicing Public Meeting
                           Brussels, 19 June 2008                 ©2005 CEN – all rights reserved
AdES Example: Signature creation

        Requirement                               Control
  The invoice is provided with      The application should ensure
  an electronic signature to        that signatures are applied when
  protect its integrity and         appropriate. The signature shall
  authenticity.                     be created in accordance to an
                                    internationally recognised
                                    standard signature format.
                                    Implementation examples:
                                    eg: CAdES-T / XAdES-T
                                      …


                      eInvoicing Public Meeting
                       Brussels, 19 June 2008          ©2005 CEN – all rights reserved
AdES Example: Signature verification

   Requirement                                  Control
 The authentication of   The validity of the AdES signature
 origin and integrity    shall be checked and the results
 of the invoice must     recorded including verification time
 be verified by          and information (e.g. CRLs or OCSP
 verifying the           and certificates) used to verify the
 signature.              signature.
                         .......




                         eInvoicing Public Meeting
                          Brussels, 19 June 2008          ©2005 CEN – all rights reserved
AdES Example: Signature long term
validity
    Requirement                                      Control
Electronic signatures      The integrity of the signed invoice,
must remain verifiable     including information used to reverify
during the storage         the signature (see above under invoice
period.                    creation), shall be maintained beyond the
                           lifetime of the signature algorithm and
                           certificates.
                           Implementation examples:
                           1) Applying archive timestamp to
                           signature as in XAdES-A, CAdES-A
                           2) WORM devices.
                           .......
                         eInvoicing Public Meeting
                          Brussels, 19 June 2008               ©2005 CEN – all rights reserved
Next Steps

    Continue working with Good practice
    Authenticity & Integrity Controls
     (Joint deliverable with WG2)

    Further Guidance on Authenticity and Integrity
      Further guidance on example mechanisms and
      protocols

      Developed in next phase



                 eInvoicing Public Meeting
                  Brussels, 19 June 2008     ©2005 CEN – all rights reserved
Thank you


            Thanks
            any questions?

            nick.pope@thales-eSecurity
            (editor)

            johan.borendal@trustweaver.com
            (chair)




            eInvoicing Public Meeting
             Brussels, 19 June 2008     ©2005 CEN – all rights reserved

More Related Content

Similar to CEN ISSS workshop e-invoicing N Pope Wg3[1]

CEN ISSS Public Workshop Wg2 Sg1 Cen Fiscalis 19 06 2008 V003 C Valk[1]
CEN ISSS Public Workshop Wg2 Sg1 Cen Fiscalis 19 06 2008 V003 C Valk[1]CEN ISSS Public Workshop Wg2 Sg1 Cen Fiscalis 19 06 2008 V003 C Valk[1]
CEN ISSS Public Workshop Wg2 Sg1 Cen Fiscalis 19 06 2008 V003 C Valk[1]
guest642d13
 
CEN ISSS workshop e-invoicing Wg2 Sg1 Cen Fiscalis 19 06 2008 V003 C Valk[1]
CEN ISSS workshop e-invoicing Wg2 Sg1 Cen Fiscalis 19 06 2008 V003 C Valk[1]CEN ISSS workshop e-invoicing Wg2 Sg1 Cen Fiscalis 19 06 2008 V003 C Valk[1]
CEN ISSS workshop e-invoicing Wg2 Sg1 Cen Fiscalis 19 06 2008 V003 C Valk[1]
Friso de Jong
 
CEN ISSS workshop e-invoicing D Chambers Presentation Mk[1]
CEN ISSS workshop e-invoicing D Chambers Presentation Mk[1]CEN ISSS workshop e-invoicing D Chambers Presentation Mk[1]
CEN ISSS workshop e-invoicing D Chambers Presentation Mk[1]
Friso de Jong
 
CEN ISSS workshop e-invoicing Cen 19 06 2008 Engel Flechsig[1]
CEN ISSS workshop e-invoicing Cen 19 06 2008 Engel Flechsig[1]CEN ISSS workshop e-invoicing Cen 19 06 2008 Engel Flechsig[1]
CEN ISSS workshop e-invoicing Cen 19 06 2008 Engel Flechsig[1]
Friso de Jong
 
CEN ISSS Public Workshop Cen 19 06 2008 Engel Flechsig[1]
CEN ISSS Public Workshop Cen 19 06 2008 Engel Flechsig[1]CEN ISSS Public Workshop Cen 19 06 2008 Engel Flechsig[1]
CEN ISSS Public Workshop Cen 19 06 2008 Engel Flechsig[1]
guest642d13
 
CEN ISSS workshop e-invoicing 42 6 20080619 Jk Overview On Compliance Of Ele...
CEN ISSS workshop e-invoicing 42  6 20080619 Jk Overview On Compliance Of Ele...CEN ISSS workshop e-invoicing 42  6 20080619 Jk Overview On Compliance Of Ele...
CEN ISSS workshop e-invoicing 42 6 20080619 Jk Overview On Compliance Of Ele...
Friso de Jong
 
CEN ISSS Public Workshop 20080619 Jk Overview On Compliance Of Electronic Inv...
CEN ISSS Public Workshop 20080619 Jk Overview On Compliance Of Electronic Inv...CEN ISSS Public Workshop 20080619 Jk Overview On Compliance Of Electronic Inv...
CEN ISSS Public Workshop 20080619 Jk Overview On Compliance Of Electronic Inv...
guest642d13
 
Interconnection of Service Providers - Ahti Allikas & Jari Salo
Interconnection of Service Providers - Ahti Allikas & Jari SaloInterconnection of Service Providers - Ahti Allikas & Jari Salo
Interconnection of Service Providers - Ahti Allikas & Jari Salo
Danny Gaethofs
 
Tg 5 Ahti Allikas Cen 18 06 2009
Tg 5 Ahti Allikas Cen 18 06 2009Tg 5 Ahti Allikas Cen 18 06 2009
Tg 5 Ahti Allikas Cen 18 06 2009
Friso de Jong
 
CEN ISSS Public Workshop A Allikas Tg5 V 1.0[1]
CEN ISSS Public Workshop A Allikas Tg5 V 1.0[1]CEN ISSS Public Workshop A Allikas Tg5 V 1.0[1]
CEN ISSS Public Workshop A Allikas Tg5 V 1.0[1]
guest642d13
 
CEN ISSS workshop e-invoicing A Allikas Tg5 V 1.0[1]
CEN ISSS workshop e-invoicing A Allikas Tg5 V 1.0[1]CEN ISSS workshop e-invoicing A Allikas Tg5 V 1.0[1]
CEN ISSS workshop e-invoicing A Allikas Tg5 V 1.0[1]
Friso de Jong
 
Tg 2 3 Compliance Cen 18 06 2009
Tg 2 3 Compliance Cen 18 06 2009Tg 2 3 Compliance Cen 18 06 2009
Tg 2 3 Compliance Cen 18 06 2009
Friso de Jong
 
Overview on Compliance of Electronic Invoices - Joost Kuipers
Overview on Compliance of Electronic Invoices - Joost KuipersOverview on Compliance of Electronic Invoices - Joost Kuipers
Overview on Compliance of Electronic Invoices - Joost Kuipers
Danny Gaethofs
 
Engel Flechsig Cen 18 06 2009
Engel Flechsig Cen 18 06 2009Engel Flechsig Cen 18 06 2009
Engel Flechsig Cen 18 06 2009
Friso de Jong
 
Cooperative Vehicle Infrastructure Systems (CVIS)
Cooperative Vehicle Infrastructure Systems (CVIS)Cooperative Vehicle Infrastructure Systems (CVIS)
Cooperative Vehicle Infrastructure Systems (CVIS)
zjeftic
 
Cwa sustainable compliance guidelines
Cwa sustainable compliance guidelinesCwa sustainable compliance guidelines
Cwa sustainable compliance guidelinesFriso de Jong
 
Presentation of A.Tosetti 8th EXPP Summit 24 Sep 2012
Presentation of A.Tosetti 8th EXPP Summit 24 Sep 2012Presentation of A.Tosetti 8th EXPP Summit 24 Sep 2012
Presentation of A.Tosetti 8th EXPP Summit 24 Sep 2012
kotpat
 
E invoicing, the un cefact cross industry invoice
E invoicing, the un cefact cross industry invoiceE invoicing, the un cefact cross industry invoice
E invoicing, the un cefact cross industry invoiceFriso de Jong
 
Break Out Sessie Factuurcongres 2009 Peter Potgieser
Break Out Sessie Factuurcongres 2009 Peter PotgieserBreak Out Sessie Factuurcongres 2009 Peter Potgieser
Break Out Sessie Factuurcongres 2009 Peter PotgieserFactuurwijzer
 
Break-Out sessie Factuurcongres 2009 van Peter Potgieser
Break-Out sessie Factuurcongres 2009 van Peter PotgieserBreak-Out sessie Factuurcongres 2009 van Peter Potgieser
Break-Out sessie Factuurcongres 2009 van Peter Potgieser
Friso de Jong
 

Similar to CEN ISSS workshop e-invoicing N Pope Wg3[1] (20)

CEN ISSS Public Workshop Wg2 Sg1 Cen Fiscalis 19 06 2008 V003 C Valk[1]
CEN ISSS Public Workshop Wg2 Sg1 Cen Fiscalis 19 06 2008 V003 C Valk[1]CEN ISSS Public Workshop Wg2 Sg1 Cen Fiscalis 19 06 2008 V003 C Valk[1]
CEN ISSS Public Workshop Wg2 Sg1 Cen Fiscalis 19 06 2008 V003 C Valk[1]
 
CEN ISSS workshop e-invoicing Wg2 Sg1 Cen Fiscalis 19 06 2008 V003 C Valk[1]
CEN ISSS workshop e-invoicing Wg2 Sg1 Cen Fiscalis 19 06 2008 V003 C Valk[1]CEN ISSS workshop e-invoicing Wg2 Sg1 Cen Fiscalis 19 06 2008 V003 C Valk[1]
CEN ISSS workshop e-invoicing Wg2 Sg1 Cen Fiscalis 19 06 2008 V003 C Valk[1]
 
CEN ISSS workshop e-invoicing D Chambers Presentation Mk[1]
CEN ISSS workshop e-invoicing D Chambers Presentation Mk[1]CEN ISSS workshop e-invoicing D Chambers Presentation Mk[1]
CEN ISSS workshop e-invoicing D Chambers Presentation Mk[1]
 
CEN ISSS workshop e-invoicing Cen 19 06 2008 Engel Flechsig[1]
CEN ISSS workshop e-invoicing Cen 19 06 2008 Engel Flechsig[1]CEN ISSS workshop e-invoicing Cen 19 06 2008 Engel Flechsig[1]
CEN ISSS workshop e-invoicing Cen 19 06 2008 Engel Flechsig[1]
 
CEN ISSS Public Workshop Cen 19 06 2008 Engel Flechsig[1]
CEN ISSS Public Workshop Cen 19 06 2008 Engel Flechsig[1]CEN ISSS Public Workshop Cen 19 06 2008 Engel Flechsig[1]
CEN ISSS Public Workshop Cen 19 06 2008 Engel Flechsig[1]
 
CEN ISSS workshop e-invoicing 42 6 20080619 Jk Overview On Compliance Of Ele...
CEN ISSS workshop e-invoicing 42  6 20080619 Jk Overview On Compliance Of Ele...CEN ISSS workshop e-invoicing 42  6 20080619 Jk Overview On Compliance Of Ele...
CEN ISSS workshop e-invoicing 42 6 20080619 Jk Overview On Compliance Of Ele...
 
CEN ISSS Public Workshop 20080619 Jk Overview On Compliance Of Electronic Inv...
CEN ISSS Public Workshop 20080619 Jk Overview On Compliance Of Electronic Inv...CEN ISSS Public Workshop 20080619 Jk Overview On Compliance Of Electronic Inv...
CEN ISSS Public Workshop 20080619 Jk Overview On Compliance Of Electronic Inv...
 
Interconnection of Service Providers - Ahti Allikas & Jari Salo
Interconnection of Service Providers - Ahti Allikas & Jari SaloInterconnection of Service Providers - Ahti Allikas & Jari Salo
Interconnection of Service Providers - Ahti Allikas & Jari Salo
 
Tg 5 Ahti Allikas Cen 18 06 2009
Tg 5 Ahti Allikas Cen 18 06 2009Tg 5 Ahti Allikas Cen 18 06 2009
Tg 5 Ahti Allikas Cen 18 06 2009
 
CEN ISSS Public Workshop A Allikas Tg5 V 1.0[1]
CEN ISSS Public Workshop A Allikas Tg5 V 1.0[1]CEN ISSS Public Workshop A Allikas Tg5 V 1.0[1]
CEN ISSS Public Workshop A Allikas Tg5 V 1.0[1]
 
CEN ISSS workshop e-invoicing A Allikas Tg5 V 1.0[1]
CEN ISSS workshop e-invoicing A Allikas Tg5 V 1.0[1]CEN ISSS workshop e-invoicing A Allikas Tg5 V 1.0[1]
CEN ISSS workshop e-invoicing A Allikas Tg5 V 1.0[1]
 
Tg 2 3 Compliance Cen 18 06 2009
Tg 2 3 Compliance Cen 18 06 2009Tg 2 3 Compliance Cen 18 06 2009
Tg 2 3 Compliance Cen 18 06 2009
 
Overview on Compliance of Electronic Invoices - Joost Kuipers
Overview on Compliance of Electronic Invoices - Joost KuipersOverview on Compliance of Electronic Invoices - Joost Kuipers
Overview on Compliance of Electronic Invoices - Joost Kuipers
 
Engel Flechsig Cen 18 06 2009
Engel Flechsig Cen 18 06 2009Engel Flechsig Cen 18 06 2009
Engel Flechsig Cen 18 06 2009
 
Cooperative Vehicle Infrastructure Systems (CVIS)
Cooperative Vehicle Infrastructure Systems (CVIS)Cooperative Vehicle Infrastructure Systems (CVIS)
Cooperative Vehicle Infrastructure Systems (CVIS)
 
Cwa sustainable compliance guidelines
Cwa sustainable compliance guidelinesCwa sustainable compliance guidelines
Cwa sustainable compliance guidelines
 
Presentation of A.Tosetti 8th EXPP Summit 24 Sep 2012
Presentation of A.Tosetti 8th EXPP Summit 24 Sep 2012Presentation of A.Tosetti 8th EXPP Summit 24 Sep 2012
Presentation of A.Tosetti 8th EXPP Summit 24 Sep 2012
 
E invoicing, the un cefact cross industry invoice
E invoicing, the un cefact cross industry invoiceE invoicing, the un cefact cross industry invoice
E invoicing, the un cefact cross industry invoice
 
Break Out Sessie Factuurcongres 2009 Peter Potgieser
Break Out Sessie Factuurcongres 2009 Peter PotgieserBreak Out Sessie Factuurcongres 2009 Peter Potgieser
Break Out Sessie Factuurcongres 2009 Peter Potgieser
 
Break-Out sessie Factuurcongres 2009 van Peter Potgieser
Break-Out sessie Factuurcongres 2009 van Peter PotgieserBreak-Out sessie Factuurcongres 2009 van Peter Potgieser
Break-Out sessie Factuurcongres 2009 van Peter Potgieser
 

More from Friso de Jong

E-invoicing Yearbook 2017 - Q1
E-invoicing Yearbook 2017 - Q1E-invoicing Yearbook 2017 - Q1
E-invoicing Yearbook 2017 - Q1
Friso de Jong
 
Elektronische facturatie binnen heineken
Elektronische facturatie binnen heineken Elektronische facturatie binnen heineken
Elektronische facturatie binnen heineken Friso de Jong
 
Mug 'core' cross industry invoice european message implementation guideline...
Mug   'core' cross industry invoice european message implementation guideline...Mug   'core' cross industry invoice european message implementation guideline...
Mug 'core' cross industry invoice european message implementation guideline...Friso de Jong
 
Electronic invoice processes in europe and enablement of sm es to use them ef...
Electronic invoice processes in europe and enablement of sm es to use them ef...Electronic invoice processes in europe and enablement of sm es to use them ef...
Electronic invoice processes in europe and enablement of sm es to use them ef...Friso de Jong
 
E invoicing action plan, state of play
E invoicing action plan, state of playE invoicing action plan, state of play
E invoicing action plan, state of playFriso de Jong
 
Demonstration compliance toolbox
Demonstration compliance toolboxDemonstration compliance toolbox
Demonstration compliance toolboxFriso de Jong
 
Code of practice and glossary of terms
Code of practice and glossary of termsCode of practice and glossary of terms
Code of practice and glossary of termsFriso de Jong
 
Awareness and promotion of electronic e invoicing
Awareness and promotion of electronic e invoicingAwareness and promotion of electronic e invoicing
Awareness and promotion of electronic e invoicingFriso de Jong
 
Agenda workshop electronic invoices, phase 3
Agenda workshop electronic invoices, phase 3Agenda workshop electronic invoices, phase 3
Agenda workshop electronic invoices, phase 3Friso de Jong
 
Open meeting work group 3
Open meeting   work group 3Open meeting   work group 3
Open meeting work group 3Friso de Jong
 
E invoicing as accelerator for cross-industry edi
E invoicing as accelerator for cross-industry ediE invoicing as accelerator for cross-industry edi
E invoicing as accelerator for cross-industry ediFriso de Jong
 
Tax-compliant global electronic invoice lifecycle management
Tax-compliant global electronic invoice lifecycle managementTax-compliant global electronic invoice lifecycle management
Tax-compliant global electronic invoice lifecycle management
Friso de Jong
 
Wetsvoorstel implementatie richtlijn factureringsregels
Wetsvoorstel implementatie richtlijn factureringsregelsWetsvoorstel implementatie richtlijn factureringsregels
Wetsvoorstel implementatie richtlijn factureringsregelsFriso de Jong
 
Nader rapport implementatie richtlijn factureringsregels
Nader rapport implementatie richtlijn factureringsregelsNader rapport implementatie richtlijn factureringsregels
Nader rapport implementatie richtlijn factureringsregelsFriso de Jong
 
Memorie van toelichting implementatie richtlijn factureringsregels
Memorie van toelichting implementatie richtlijn factureringsregelsMemorie van toelichting implementatie richtlijn factureringsregels
Memorie van toelichting implementatie richtlijn factureringsregelsFriso de Jong
 
Advies raad van state implementatie richtlijn factureringsregels
Advies raad van state implementatie richtlijn factureringsregelsAdvies raad van state implementatie richtlijn factureringsregels
Advies raad van state implementatie richtlijn factureringsregelsFriso de Jong
 
Ricoh case carante group sep 2011
Ricoh case carante group sep 2011Ricoh case carante group sep 2011
Ricoh case carante group sep 2011Friso de Jong
 
Rules of procedure of the european multi stakeholder forum on electronic invo...
Rules of procedure of the european multi stakeholder forum on electronic invo...Rules of procedure of the european multi stakeholder forum on electronic invo...
Rules of procedure of the european multi stakeholder forum on electronic invo...Friso de Jong
 
Proposal for a work programme of the european multi stakeholder forum on e-in...
Proposal for a work programme of the european multi stakeholder forum on e-in...Proposal for a work programme of the european multi stakeholder forum on e-in...
Proposal for a work programme of the european multi stakeholder forum on e-in...Friso de Jong
 
Fundtech white paper, e invoicing provides new avenues for credit
Fundtech white paper, e invoicing provides new avenues for creditFundtech white paper, e invoicing provides new avenues for credit
Fundtech white paper, e invoicing provides new avenues for creditFriso de Jong
 

More from Friso de Jong (20)

E-invoicing Yearbook 2017 - Q1
E-invoicing Yearbook 2017 - Q1E-invoicing Yearbook 2017 - Q1
E-invoicing Yearbook 2017 - Q1
 
Elektronische facturatie binnen heineken
Elektronische facturatie binnen heineken Elektronische facturatie binnen heineken
Elektronische facturatie binnen heineken
 
Mug 'core' cross industry invoice european message implementation guideline...
Mug   'core' cross industry invoice european message implementation guideline...Mug   'core' cross industry invoice european message implementation guideline...
Mug 'core' cross industry invoice european message implementation guideline...
 
Electronic invoice processes in europe and enablement of sm es to use them ef...
Electronic invoice processes in europe and enablement of sm es to use them ef...Electronic invoice processes in europe and enablement of sm es to use them ef...
Electronic invoice processes in europe and enablement of sm es to use them ef...
 
E invoicing action plan, state of play
E invoicing action plan, state of playE invoicing action plan, state of play
E invoicing action plan, state of play
 
Demonstration compliance toolbox
Demonstration compliance toolboxDemonstration compliance toolbox
Demonstration compliance toolbox
 
Code of practice and glossary of terms
Code of practice and glossary of termsCode of practice and glossary of terms
Code of practice and glossary of terms
 
Awareness and promotion of electronic e invoicing
Awareness and promotion of electronic e invoicingAwareness and promotion of electronic e invoicing
Awareness and promotion of electronic e invoicing
 
Agenda workshop electronic invoices, phase 3
Agenda workshop electronic invoices, phase 3Agenda workshop electronic invoices, phase 3
Agenda workshop electronic invoices, phase 3
 
Open meeting work group 3
Open meeting   work group 3Open meeting   work group 3
Open meeting work group 3
 
E invoicing as accelerator for cross-industry edi
E invoicing as accelerator for cross-industry ediE invoicing as accelerator for cross-industry edi
E invoicing as accelerator for cross-industry edi
 
Tax-compliant global electronic invoice lifecycle management
Tax-compliant global electronic invoice lifecycle managementTax-compliant global electronic invoice lifecycle management
Tax-compliant global electronic invoice lifecycle management
 
Wetsvoorstel implementatie richtlijn factureringsregels
Wetsvoorstel implementatie richtlijn factureringsregelsWetsvoorstel implementatie richtlijn factureringsregels
Wetsvoorstel implementatie richtlijn factureringsregels
 
Nader rapport implementatie richtlijn factureringsregels
Nader rapport implementatie richtlijn factureringsregelsNader rapport implementatie richtlijn factureringsregels
Nader rapport implementatie richtlijn factureringsregels
 
Memorie van toelichting implementatie richtlijn factureringsregels
Memorie van toelichting implementatie richtlijn factureringsregelsMemorie van toelichting implementatie richtlijn factureringsregels
Memorie van toelichting implementatie richtlijn factureringsregels
 
Advies raad van state implementatie richtlijn factureringsregels
Advies raad van state implementatie richtlijn factureringsregelsAdvies raad van state implementatie richtlijn factureringsregels
Advies raad van state implementatie richtlijn factureringsregels
 
Ricoh case carante group sep 2011
Ricoh case carante group sep 2011Ricoh case carante group sep 2011
Ricoh case carante group sep 2011
 
Rules of procedure of the european multi stakeholder forum on electronic invo...
Rules of procedure of the european multi stakeholder forum on electronic invo...Rules of procedure of the european multi stakeholder forum on electronic invo...
Rules of procedure of the european multi stakeholder forum on electronic invo...
 
Proposal for a work programme of the european multi stakeholder forum on e-in...
Proposal for a work programme of the european multi stakeholder forum on e-in...Proposal for a work programme of the european multi stakeholder forum on e-in...
Proposal for a work programme of the european multi stakeholder forum on e-in...
 
Fundtech white paper, e invoicing provides new avenues for credit
Fundtech white paper, e invoicing provides new avenues for creditFundtech white paper, e invoicing provides new avenues for credit
Fundtech white paper, e invoicing provides new avenues for credit
 

Recently uploaded

FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Jos Voskuil
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
YourLegal Accounting
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
Naaraayani Minerals Pvt.Ltd
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
Henry Tapper
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 

Recently uploaded (20)

FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
Filing Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed GuideFiling Your Delaware Franchise Tax A Detailed Guide
Filing Your Delaware Franchise Tax A Detailed Guide
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Role of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in MiningRole of Remote Sensing and Monitoring in Mining
Role of Remote Sensing and Monitoring in Mining
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 

CEN ISSS workshop e-invoicing N Pope Wg3[1]

  • 1. eInvoicing Public Meeting Brussels, 19 June 2008 WG 3: Cost effective means to guarantee authenticity & integrity Johan Borendal – Trustweaver (Chair) Nick Pope – Thales e-Security (Technical Editor)
  • 2. CEN eInvoicing Workshop – Phase 2 Aim: Stimulate further standardization work in the domain of electronic invoices in Europe building on Phase 1 activities: WG 1: Adoption WG 2: Compliance of electronic invoice implementations WG 3: Cost effective authenticity & integrity WG4: Emerging technologies and business processes WG5: eInvoice service operators and mobility of users eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 3. Terms of Reference “Cost-effective authenticity and integrity of electronic invoices and related business documents regardless of formats and technologies” Minimise unnecessary costs to businesses Ensure that major risks identified by Tax Authorities are addressed eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 4. CEN eInvoicing WG 3: Terms of Reference “Cost-effective authenticity and integrity of electronic invoices and related business documents regardless of formats and technologies” Authenticity & integrity in transfer Maintain authenticity & integrity over period of storage eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 5. CEN eInvoicing WG 3: Terms of Reference “Cost-effective authenticity and integrity of electronic invoices and related business documents regardless of formats and technologies” eInvoicing main legal pressure point for business Applicable to other aspects of eBusiness & eGovernment eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 6. CEN eInvoicing WG 3: Terms of Reference “Cost-effective authenticity and integrity of electronic invoices and related business documents regardless of formats and technologies” Addressing Authenticity & Integrity by: Electronic Signatures Electronic Data Interchange (EDI) Other means eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 7. What Already Done Inventory of Authenticity & Integrity Requirements Spreadsheet of Requirements against 28 EU States / EFTA members Integrity and authenticity Requirements in common e- invoicing scenarios Model of eInvoicing exchanges Requirements derived from Directive 2006/112/EC + national implementations Authenticity and Integrity Requirements & Controls eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 8. WG2 Good Practice vs WG3 Requirements & Controls WG2 WG3 EInvoice Requirements Mechanisms A&I Preparation. EDI eInvoice Translation. Controls Signatures Protocols Self Billing. eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 9. Conclusion - Lets join forces CEN WG2 & WG3 / FISCALIS e-Invoicing Good Practice Guidelines eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 10. WG3 Current Approach Authenticity & Integrity Controls Option 1: General procedural and technical controls to protect data at each stage of process (EDI / Other), or Option 2: Advanced electronic signatures protecting data from creation through whole storage lifetime (AdES) Baseline security controls (e.g. audit, access control, contracts) should be applied throughout No end-to-end long-term signatures With end-to-end long-term signatures Technical controls Technical controls Process controls Process controls Audit Audit Documentation Documentation Contract Contract General system security General system security eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 11. WG3 – Example Authenticity & Integrity Controls Baseline controls Example controls for EDI (other) Scenario Example controls for Advanced Electronic signature based scenario eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 12. Baseline controls Recognised standard based practices for the security and integrity: e.g. ISO 27001, SAS70, OECD Guidance on Tax Compliance for Business and Accounting Software Includes general controls for: Audit trails Access control enforcing business roles Protected Communications Data correctness and accuracy checks Prior agreement for security of communications eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 13. EDI/Other Example: Requirements & Controls Supplier Customer (Seller) (Buyer) Communications Authenticity & Communications Integrity A& I (A& I) Processing Processing & Storage & Storage Comms Customer’s A& I Supplier’s A& I A& I (Buyer’s) Service Service Provider Provider eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 14. EDI/Other Example: Communications A&I Requirement Control Ensure authenticity and The electronic invoice shall be integrity of invoice whilst sent through a secure channel being sent. which : a) Protects the integrity …. b) Authenticates the invoice issuer … Implementation examples: i) TLS with passwords. ii) AS/1-3 with signatures …… eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 15. EDI/Other Example: Storage A & I Requirement Control The authenticity and The invoice and audit records integrity of the content of regarding handling of the invoice, the invoices stored must including information on be guaranteed throughout authentication checks carried out, shall the storage period.. be protected by mechanisms that assure the integrity of data throughout the storage period. Implementation examples: - WORM, - Secure archive eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 16. EDI/Other Example: Processing A & I Met by a range of controls: Baseline security controls General eInvoice process requirements eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 17. AdES Example Requirements Supplier Customer (Seller) (Buyer) Communications A& I Signature Signature Creation Long term Supplier’s Customer’s Service validity Signature (Buyer’s) Provider Service Long term Provider validity eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 18. AdES Example: Signature creation Requirement Control The invoice is provided with The application should ensure an electronic signature to that signatures are applied when protect its integrity and appropriate. The signature shall authenticity. be created in accordance to an internationally recognised standard signature format. Implementation examples: eg: CAdES-T / XAdES-T … eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 19. AdES Example: Signature verification Requirement Control The authentication of The validity of the AdES signature origin and integrity shall be checked and the results of the invoice must recorded including verification time be verified by and information (e.g. CRLs or OCSP verifying the and certificates) used to verify the signature. signature. ....... eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 20. AdES Example: Signature long term validity Requirement Control Electronic signatures The integrity of the signed invoice, must remain verifiable including information used to reverify during the storage the signature (see above under invoice period. creation), shall be maintained beyond the lifetime of the signature algorithm and certificates. Implementation examples: 1) Applying archive timestamp to signature as in XAdES-A, CAdES-A 2) WORM devices. ....... eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 21. Next Steps Continue working with Good practice Authenticity & Integrity Controls (Joint deliverable with WG2) Further Guidance on Authenticity and Integrity Further guidance on example mechanisms and protocols Developed in next phase eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved
  • 22. Thank you Thanks any questions? nick.pope@thales-eSecurity (editor) johan.borendal@trustweaver.com (chair) eInvoicing Public Meeting Brussels, 19 June 2008 ©2005 CEN – all rights reserved