- Latest available (Revised)
- Original (As adopted by EU)
Council Decision (EU) 2018/1926 of 19 November 2018 on the position to be taken, on behalf of the European Union, in the Group of Experts on the European Agreement concerning the work of crews of vehicles engaged in international road transport of the United Nations Economic Commission for Europe
When the UK left the EU, legislation.gov.uk published EU legislation that had been published by the EU up to IP completion day (31 December 2020 11.00 p.m.). On legislation.gov.uk, these items of legislation are kept up-to-date with any amendments made by the UK since then.
Legislation.gov.uk publishes the UK version. EUR-Lex publishes the EU version. The EU Exit Web Archive holds a snapshot of EUR-Lex’s version from IP completion day (31 December 2020 11.00 p.m.).
This version of this Decision was derived from EUR-Lex on IP completion day (31 December 2020 11:00 p.m.). It has not been amended by the UK since then. Find out more about legislation originating from the EU as published on legislation.gov.uk.![]()
Revised legislation carried on this site may not be fully up to date. At the current time any known changes or effects made by subsequent legislation have been applied to the text of the legislation you are viewing by the editorial team. Please see ‘Frequently Asked Questions’ for details regarding the timescales for which new effects are identified and recorded on this site.
THE COUNCIL OF THE EUROPEAN UNION,
Having regard to the Treaty on the Functioning of the European Union, and in particular Article 91, in conjunction with Article 218(9) thereof,
Having regard to the proposal from the European Commission,
Whereas:
(1) The European Agreement concerning the work of crews of vehicles engaged in international road transport (AETR)(1) entered into force on 5 January 1976.
(2) A Group of Experts on AETR has been established by the United Nations Economic Commission for Europe (UNECE) in the framework of the AETR. That group is a body empowered to develop and submit proposals for amending the AETR to the UNECE Working Party on Road Transport.
(3) The Group of Experts on AETR is currently discussing amendments to the AETR, based on a Union proposal following, to that effect, a position on behalf of the Union adopted by Council Decision (EU) 2016/1877(2). A further amendment to the AETR appears necessary in order to ensure that non-EU Contracting Parties to the AETR can participate in data exchange on driver cards based on harmonised security and data protection standards.
(4) Regulation (EU) No 165/2014 of the European Parliament and of the Council(3) requires Member States to interconnect their national electronic registers on driver cards through the Telematics Network for the Exchange of Information Concerning the Issuing of Tachograph Cards (TACHOnet) messaging system or, when using a compatible system, to ensure that exchange of electronic data with all other Member States is possible through the TACHOnet messaging system. TACHOnet is a platform for the exchange of information on driver cards between Member States, in order to ensure that drivers do not hold more than one driver card.
(5) In order to achieve a pan-European harmonisation in the field of electronic exchange of information on driver cards, it is necessary that TACHOnet be used as the single platform by all Contracting Parties to the AETR.
(6) The connection to the TACHOnet messaging system is currently carried out either directly through a Trans-European Services for Telematics between Administrations (TESTA) connection or indirectly through a Member State already connected to TESTA. As TESTA are services restricted to Member States and institutions of the Union, non-EU Contracting Parties to the AETR can only connect to TACHOnet indirectly.
(7) The Commission has recently assessed the indirect connections to the TACHOnet messaging system and concluded that they do not provide the same level of security as TESTA. In particular, there is not a sufficient guarantee about the authenticity, integrity and confidentiality of the information exchanged through indirect connections. Indirect connections to TACHOnet should therefore be replaced by a secure connection.
(8) eDelivery is a network of connection nodes for digital communications developed by the Commission, where every participant at national level becomes a node using standard transport protocols and security policies. eDelivery is a flexible tool that may be customised to each specific service.
(9) eDelivery makes use of widely implemented security technologies, such as public key infrastructure (PKI), in order to ensure the authenticity, integrity and confidentiality of the information exchanged. Access to TACHOnet of non-EU Contracting Parties to the AETR should be granted by means of eDelivery.
(10) The Contracting Parties to the AETR should follow a specific procedure to receive the digital certificates and the respective electronic keys granting access to TACHOnet.
(11) The connection to TACHOnet by means of eDelivery implies that the Contracting Parties to the AETR are required to ensure that the electronic keys and certificates granting access to the system are protected and cannot be used by non-authorised parties. The Contracting Parties to the AETR should also guarantee that keys covered by certificates having expired are not used anymore.
(12) It is necessary to guarantee the protection of personal data available to the parties through TACHOnet in accordance with the Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data of 28 January 1981.
(13) National authorities connected to TACHOnet have the obligation to carry out the relevant technical implementations in order to ensure that TACHOnet operates according to high levels of performance. It is the task of the Commission to set up the tests confirming that those levels of performance are achieved and to implement them in coordination with the national competent authorities.
(14) In its judgment of 31 March 1971 in Case 22/70(4), the Court of Justice of the European Union recognised that the work of crews of vehicles engaged in road transport is an area that is an external competence of the Union. That competence has been exercised since then in numerous legal acts adopted by the Union, including Regulations (EC) No 561/2006(5) and (EU) No 165/2014 of the European Parliament and of the Council. Since the subject matter of the AETR falls within the scope of Regulation (EC) No 561/2006, the power to negotiate and conclude any relevant agreement and modifications thereto lies exclusively with the Union.
(15) If accepted by the Group of Experts on AETR, the proposals made by the Contracting Parties may lead to an amendment of AETR, after a procedure for the revision of AETR is launched and concluded. Where those proposals are accepted by the Group of Experts on AETR, as a second step, the Union Member States as Contracting Parties to the AETR are under an obligation to cooperate in using the mechanism for the revision of the AETR, in line with the duty of sincere cooperation pursuant to Article 4(3) of the Treaty on European Union and subject to a Council decision in accordance with Article 218(6) of the Treaty on the Functioning of the European Union, as appropriate. The proposed amendments to the AETR will become effective only once the revision of the AETR is completed.
(16) It is appropriate to establish the position to be taken on the Union's behalf in the Group of Experts on AETR, as the amendment to the AETR will be binding on the Union.
(17) As the Union is not a Contracting Party to the AETR and its status does not allow it to communicate the proposed amendments, Member States, acting in the interest of the Union, should communicate the proposed amendments to the Group of Experts on AETR in the spirit of loyal cooperation in order to promote the achievement of the Union's objectives.
(18) The Union's position is to be expressed by its Member States that are members of the Group of Experts on AETR and of the UNECE Working Party on Road Transport, acting jointly,
HAS ADOPTED THIS DECISION:
The position to be taken on the Union's behalf in the Group of Experts on the European Agreement concerning the work of crews of vehicles engaged in international road transport (AETR) shall be in favour of the proposed amendments to the AETR as set out in the document attached to this Decision.
The position referred to in Article 1 shall be expressed by the Member States of the Union that are Contracting Parties to the AETR, acting jointly.
Formal and minor changes to the position referred to in Article 1 may be agreed without requiring that position to be amended.
This Decision shall enter into force on the day following that of its adoption.
Done at Brussels, 19 November 2018.
For the Council
The President
E. Köstinger
‘Contracting party’ or ‘party’ means any Contracting party to the AETR;
‘eDelivery’ means the service developed by the European Commission making possible to transmit data between third parties by electronic means, providing evidence relating to the handling of the transmitted data, including proof of sending and receiving the data, and protecting transmitted data against the risk of any unauthorised alteration;
‘TACHOnet’ means the system for the electronic exchange of information on driver cards between contracting parties referred to in Article 31(2) of Regulation (EU) No 165/2014;
‘Central hub’ means the information system enabling the routing of TACHOnet messages between requesting and responding parties;
‘Requesting party’ means the contracting party emitting a TACHOnet request or a notification, which is then routed to the appropriate responding party by the central hub;
‘Responding party’ means the contracting party to whom the TACHOnet request or notification is addressed;
‘Card issuing authority’ or ‘CIA’ means the entity empowered by a contracting party for the issuing and management of tachograph cards.
Certification Authority, responsible for the generation of the digital certificates to be delivered by the Registration Authority to the national authorities of the contracting parties (via trusted couriers appointed by them), as well as for setting up the technical infrastructure regarding the issuance, revocation and renewal of digital certificates.
Domain Owner, responsible for the operation of the central hub referred to in Sub-appendix 4.1 and for the validation and coordination of the TACHOnet trust architecture.
Registration Authority, responsible for registering and approving the requests of issuance, revocation and renewal of digital certificates, and for verifying the identity of the trusted couriers.
Trusted Courier, is the person appointed by the national authorities, responsible for handing the public key to the Registration Authority and for getting the corresponding certificate being generated by the Certification Authority.
National authority from the contracting party, which shall:
generate the private keys and the corresponding public keys to be included in the certificates to be generated by the Certification Authority;
request the digital certificates to the Certification Authority;
appoint the Trusted Courier.
TACHOnet is an electronic system for the exchange of information on driver cards between AETR contracting parties. TACHOnet routes the requests for information from the requesting parties to the responding parties, as well as the replies from the latter to the former. Contracting parties being part of TACHOnet must connect their national registers on driver cards to the system.
TACHOnet messaging system shall be composed of the following parts:
A central hub, which shall be able to receive a request from the requesting party, validate it and process it by forwarding it to the responding parties. The central hub shall wait for each responding party to answer, consolidate all the answers and forward the consolidated response to the requesting Party.
The set-up and management of their national systems, including the interface with the central hub.
The installation and maintenance of their national system, both hardware and software, whether proprietary or commercial.
The correct interoperability of their national system with the central hub, including the management of error messages received from the central hub.
Taking all the measures to ensure the confidentiality, integrity and availability of the information.
The operation of the national systems in accordance with the service levels set out in Sub-appendix 4.6.
Check Issued Cards (CIC): allows the requesting party to send a Check Issued Cards Request to one or all responding parties, in order to determine if a card applicant already possesses a driver card issued by the responding parties. The responding parties shall reply to the request by sending a Check Issued Cards Response.
Check Card Status (CCS): allows the requesting party to ask the responding party about the details of a card issued by the latter by sending a Check Card Status Request. The responding party shall reply to the request by sending a Check Card Status Response.
Modify Card Status (MCS): allows the requesting party to notify the responding party, through a Modify Card Status Request, that the status of a card issued by the latter has changed. The responding party shall reply with a Modify Card Status Acknowledgement.
Issued Card Driving Licence (ICDL): allows the requesting party to notify the responding party, through an Issued Card Driving Licence Request, that a card has been issued by the former against a driving licence issued by the latter. The responding party shall reply with an Issued Card Driving Licence Response.
Card statuses
| Card Status | Definition |
|---|---|
| Application | The CIA has received an application to issue a driver card. This information has been registered and stored in the database with the generated search keys. |
| Approved | The CIA has approved the application for the tachograph card. |
| Rejected | The CIA did not approve the application. |
| Personalised | The tachograph card has been personalised. |
| Dispatched | The National Authority has dispatched the driver card to the relevant driver or delivering agency. |
| Handed Over | The National Authority has handed over the driver card to the relevant driver. |
| Confiscated | The driver card has been taken from the driver by the competent authority. |
| Suspended | The driver card has been taken temporarily from the driver. |
| Withdrawn | The CIA has decided to withdraw the driver card. The card has been permanently invalidated. |
| Surrendered | The tachograph card has been returned to the CIA, and declared no longer needed. |
| Lost | The tachograph card has been declared lost to the CIA. |
| Stolen | The tachograph card has been reported stolen to the CIA. A stolen card is considered lost. |
| Malfunctioning | The tachograph card has been reported as malfunctioning to the CIA. |
| Expired | The period of validity of the tachograph card has expired. |
| Replaced | The tachograph card, which has been reported lost, stolen or malfunctioning, has been replaced by a new card. The data on the new card is the same, with the exception of the card number replacement index, which has been increased by one. |
| Renewed | The tachograph card has been renewed because of a change of administrative data or the validity period coming to an end. The card number of the new card is the same, with the exception of the card number renewal index, which has been increased by one. |
| In Exchange | The CIA that issued a driver card has received a notification that the procedure to exchange that card for a driver card issued by the CIA of another Party has started. |
| Exchanged | The CIA that issued a driver card has received a notification that the procedure to exchange that card for a driver card issued by the CIA of another Party has completed. |
Minimum requirements for the content of the XML messages
| Common Header | Mandatory | |
|---|---|---|
| Version | The official version of the XML specifications will be specified through the namespace defined in the message XSD and in the version attribute of the Header element of any XML message. The version number (‘n.m’) will be defined as fixed value in every release of the XML Schema Definition file (xsd). | Yes |
| Test Identifier | Optional id for testing. The originator of the test will populate the id and all participants in the workflow will forward/return the same id. In production it should be ignored and will not be used if it is supplied. | No |
| Technical Identifier | A UUID uniquely identifying each individual message. The sender generates a UUID and populates this attribute. This data is not used in any business capacity. | Yes |
| Workflow Identifier | The workflow id is a UUID and should be generated by the requesting party. This id is then used in all messages to correlate the workflow. | Yes |
| Sent At | The date and time (UTC) that the message was sent. | Yes |
| Timeout | This is an optional date and time (in UTC format) attribute. This value will be set only by the central hub for forwarded requests. This will inform the responding party of the time when the request will be timed out. This value is not required in MS2TCN_<x>_Req and all response messages. It is optional so that the same header definition can be used for all message types regardless of whether or not the timeoutValue attribute is required. | No |
| From | The ISO 3166-1 Alpha 2 code of the party sending the message or ‘EU’. | Yes |
| To | The ISO 3166-1 Alpha 2 code of the party to which the message is being sent or ‘EU’. | Yes |
They shall be available 24 hours a day, 7 days a week.
Their availability shall be monitored by a heartbeat message issued from the central hub.
Their availability rate shall be 98 %, according to the following table (the figures have been rounded to the nearest convenient unit):
| An availability of | means an unavailability of | ||
|---|---|---|---|
| Daily | Monthly | Yearly | |
| 98 % | 0,5 hours | 15 hours | 7,5 days |
Parties are encouraged to respect the daily availability rate, however it is recognised that certain necessary activities, such as system maintenance, require a downtime of more than 30 minutes. However, the monthly and yearly availability rates remain mandatory.
They shall respond to a minimum of 98 % of the requests forwarded to them in one calendar month.
They shall respond to requests within 10 seconds.
The global request timeout (time within which the requestor may wait for a response) shall not exceed 20 seconds.
They shall be able to service a request rate of 6 messages per second.
National systems may not send requests to the TACHOnet hub at a rate exceeding 2 requests per second.
Every national system shall be able to cope with potential technical problems of the central hub or national systems in other parties. These include, but are not limited to:
loss of connection to the central hub;
no response to a request;
receipt of responses after message timeout;
receipt of unsolicited messages;
receipt of invalid messages.
feature an availability rate of 98 %;
provide to national systems notification of any errors, either via the response message or via a dedicated error message. The national systems, in turn, shall receive these dedicated error messages and have an escalation workflow in place to take any appropriate action to rectify the notified error.
Parties shall notify other parties and the European Commission of any routine maintenance activities via the web application, at least one week before the beginning of those activities if technically possible.
the requesting party;
the responding party;
the type of message;
the status code of the response;
the date and time of the messages;
the response time.
Once the certificate is issued, the national authority(7), shall use the certificate only in the context of TACHOnet. The certificate can be used to:
authenticate the origin of data;
encrypt data;
ensure detection of integrity breaches of data.
Any usage not explicitly authorised as part of the permitted usages of the certificate is prohibited.
protect their private key against unauthorised use;
refrain from transferring or revealing their private key to third parties, even as representatives;
ensure confidentiality, integrity, and availability of the private keys generated, stored and used for TACHOnet;
refrain from continued use of the private key following expiry of the validity period or revocation of the certificate, other than to view encrypted data (e.g., decrypting emails). Expired keys shall be either destroyed or retained in a manner preventing its use;
provide the Registration Authority with the identification of those authorised representatives who are authorised to request revocation of certificates issued to the organisation (revocation requests shall include a revocation request password and details about the events that lead to revocation);
prevent misuse of the private key by requesting the revocation of the associated public key certificate in case of compromise of the private key or of the private key activation data;
be responsible and hold the obligation of requesting revocation of certificate under circumstances identified in the certification policies (CP) and certification practices statement (CPS) of the Certification Authority;
notify the Registration Authority without delay of loss, theft, or potential compromise of any AETR keys used in the context of TACHOnet.
Without prejudice of the liability of the European Commission in contravention of any requirements laid down in applicable national law or with respect to liability for matters which may not be excluded under that law, the European Commission shall not be responsible or liable with regard to:
the content of the certificate which lies exclusively with the certificate owner. It shall be the responsibility of the certificate owner to check the accuracy of the certificate content;
the use of the certificate by its owner.
A PKI (Public Key Infrastructure) is a set of roles, policies, procedures and systems needed to create, manage, distribute and revoke digital certificates(8). The CEF PKI service of eDelivery enables issuance and management of digital certificates used to ensure confidentiality, integrity and non-repudiation of the information exchanged between Access Points (AP).
The PKI service of eDelivery is based on the Trust Centre Services TeleSec Shared Business CA (Certification Authority) for which the Certificate Policy (CP)/Certification Practices Statement (CPS) of TeleSec Shared-Business-CA of T-Systems International GmbH(9) apply.
The PKI service issues certificates that are suitable for securing various business processes within and outside of companies, organisations, public authorities and institutions that require a medium security level to prove the authenticity, integrity and trustworthiness of the end-entity.
request the certificates from the CEF PKI service;
generate the private keys and the corresponding public keys to be included in the certificates issued by the Certification Authority;
download the certificate when approved;
sign and send back to the Registration Authority:
the contact persons and trusted couriers identification form,
the signed individual Power of Attorney(10).
hand over the public key to the Registration Authority during a face-to-face identification and registration process;
get the corresponding certificate from the Registration Authority.
validate and coordinate the TACHOnet network and the TACHOnet trust architecture, including the validation of the procedures for the issuance of the certificates;
operate the TACHOnet central hub and coordinate the activity of the parties regarding the functioning of TACHOnet;
perform, along with national authorities, the tests of connection to TACHOnet.
assign the unique identifier to the national authority;
authenticate the identity of the national authority, its contact points and trusted couriers;
communicate with the CEF Support regarding the authenticity of the national authority, its contact points and trusted couriers;
inform the national authority about the approval or rejection of certificate.
provide for the technical infrastructure for certificate requests by national authorities;
validate or reject certificate request;
communicate with the Registration Authority for the identity verification of the requesting organisation, when required.
Step 1: Trusted Courier identification;
Step 2: Certificate request creation;
Step 3: Registration at RA;
Step 4: Certificate generation;
Step 5: Certificate publication;
Step 6: Certificate acceptance.
The following process shall be carried out for the Trusted Courier identification:
The Registration Authority shall send to the national authority the contact persons and trusted couriers' identification form(11). This form shall also include a power of attorney (PoA) that the organisation (AETR Authority) shall sign.
The national authority shall send back the completed form and signed PoA to the Registration Authority.
The Registration Authority shall acknowledge the good reception and completeness of the form.
The Registration Authority shall provide an updated copy of the list of contact persons and trusted couriers to the domain owner.
The Organisation shall navigate to the user web interface to request the certificate via the URL https://sbca.telesec.de/sbca/ee/login/displayLogin.html?locale=en:, and shall enter the username ‘sbca/CEF_eDelivery.europa.eu’ and the password ‘digit.333’
The Organisation shall click on ‘request’ on the left side of the panel and shall select ‘CEF_TACHOnet’ in the dropdown list.
The Organisation shall populate the certificate request form laid down in Figure 4 with the information in Table 3, clicking on ‘Next (soft-PSE)’ to finish the process.
| Requested Fields | Description |
|---|---|
| Country | C = Country Code, location of certificate owner, verified using a public directory; Constraints: 2 characters, in accordance to ISO 3166-1, alpha-2, Case Sensitive; Examples: DE, BE, NL, Specific cases: UK (for Great-Britain), EL (for Greece) |
| Organisation/Company (O) | O = Organisation name of the certificate owner |
| Master domain (OU1) | OU = CEF_eDelivery.europa.eu |
| Area of responsibility (OU2) | OU = CEF_TACHOnet |
| Department (OU3) | Mandatory value per ‘AREA OF RESPONSIBILITY’ The content must be checked using a positive list (white list) when the certificate is requested. If the information does not correspond to the list, the request is prevented. Format: OU=<TYPE>-<GTC_NUMBER> Where ‘<TYPE>’ is replaced by AP_PROD: Access Point in Production environment. And where <GTC_NUMBER> is GTC_OID-1.3.130.0.2018.xxxxxx, where Ares(2018)xxxxxx is the GTC number for the TACHOnet project. e.g.: AP_PROD-GTC_OID-1.3.130.0.2018.xxxxxx |
| First name (CN) | Must be Empty |
| Last name (CN) | Must start with ‘GRP:’, followed by a common name. Format: CN = GRP:<AREA OF RESPONSIBILITY>_<TYPE>_<COUNTRY CODE>_<UNIQUE IDENTIFIER> e.g.: GRP:CEF_TACHOnet_AP_PROD_BE_001 |
| E = CEF-EDELIVERY-SUPPORT@ec.europa.eu | |
| Email 1 (SAN) | Must be Empty |
| Email 2 (SAN) | Must be Empty |
| Email 3 (SAN) | Must be Empty |
| Address | Must be Empty |
| Street | Must be the official address of the Organisation of the Certificate Owner. (Used for the Power of Attorney.) |
| Street no. | Must be the official address of the Organisation of the Certificate Owner. (Used for the Power of Attorney.) |
| Zip Code | Must be the official address of the Organisation of the Certificate Owner. (Used for the Power of Attorney.) Attention : if the ZIP code is NOT a 5-digit ZIP code, leave the ZIP code field empty and put the ZIP code in the City field. |
| City | Must be the official address of the Organisation of the Certificate Owner. (Used for the Power of Attorney.) Attention : if the ZIP code is NOT a 5-digit ZIP code, leave the ZIP code field empty and put the ZIP code in the City field. |
| Phone no | Must be Empty |
| Identification data | The email address must be the same as the one used for registering the Unique Identifier. + Must be the name of the person representing the organisation. (Used for the Power of Attorney) + Commercial Register No (only mandatory for private organisations) Entered at the Local Court of (only required for German and Austrian private organisations) |
| Revocation password | Mandatory field chosen by the requestor |
| Revocation password repetition | Mandatory field chosen by the requestor repeated |
Table 3. Complete details of each requested fieldU.K.
The CEF Support Team shall check for new requests of certificates and verify if the information in the certificate request is valid, i.e. that it conforms to the naming convention specified in Appendix 5.1 Certificate Naming Convention.
The CEF Support Team shall verify that the information entered in the request is in a valid format.
When either check from points 5 or 6 above fails, the CEF Support Team shall send an email to the email address provided in the ‘Identification data’ of the request form, with the Domain Owner in cc, in which the Organisation is requested to start the process again. The failed certificate request shall be cancelled.
The CEF Support Team shall send an email to the Registration Authority about the validity of the request. The email shall include:
the name of the Organisation, available in the field ‘Organisation (O)’ of the certificate request;
the certificate data including the name of the AP for which the certificate is to be issued, available in the field ‘Last Name (CN)’ of the certificate request;
the certificate reference number;
the address of the Organisation, its email and the name of the person representing it.
the filled-in and signed power of attorney;
a copy of the valid passport of the trusted courier who will perform the face-to-face. This copy must be signed by one of the step 1 identified Organisation points of contact;
the certificate request paper form signed by one of the points of contact of the Organisation.
identifying and authenticating the Trusted Courier;
verifying the trusted courier physical appearance against the passport presented by the Trusted Courier;
verifying the validity of the passport presented by the Trusted Courier;
verifying the validated passport presented by the trusted courier against the copy of the valid passport of the trusted courier signed by one of the identified points of contact of the Organisation. Signature is authenticated against the original ‘trusted courier and contact points identification form’;
verifying the filled-in and signed power of attorney;
verifying certificate request paper form and its signature against the original ‘trusted courier and contact points identification form’;
calling the signatory contact point to double check the identity of the trusted courier and the content of the certificate request.
Upon approval of the certificate request, the certificate shall be generated.
export the private key and the certificate,
create the keystore and the truststore,
install the keystore and the truststore on the access point.
In its capacity as Solution Provider of the eDelivery Building Block of the Connecting Europe Facility, DIGIT shall make available a PKI service(12) (‘CEF PKI service’) to the AETR Contracting Parties. The CEF PKI service shall be used by national authorities (‘end-users’) participating in TACHOnet.
DIGIT is a PKI tenant within the TeleSec Shared-Business-CA solution (‘SBCA’) operated in the Trust Centre of the Group unit T-Systems International GmbH (‘T-Systems’(13)). DIGIT plays the role of Master Registrar of the ‘CEF_eDelivery.europa.eu’ domain of the SBCA. In this role, DIGIT creates sub-domains within the ‘CEF_eDelivery.europa.eu’ domain for each project using the CEF PKI service.
This document provides details on the terms and conditions of the TACHOnet sub-domain. DIGIT plays the role of sub-Registrar of this sub-domain. In this capacity, it issues, revokes and renews the certificates of this project.
The European Commission accepts no responsibility or liability whatsoever with regard to the content of the certificate which lies exclusively with the certificate owner. It is the responsibility of the certificate owner to check the accuracy of the certificate content.
The European Commission accepts no responsibility or liability whatsoever with regard to the use of the certificate by its owner being a third legal entity outside the European Commission.
This disclaimer is not intended to limit the liability of the European Commission in contravention of any requirements laid down in applicable national law or to exclude its liability for matters which may not be excluded under that law.
Once the certificate is issued, the certificate owner(14) shall use the certificate only in the context of TACHOnet. Within this context, the certificate can be used to:
authenticate the origin of data,
encrypt data,
ensure detection of integrity breaches of data.
Any usage not explicitly authorised as part of the permitted usages of the certificate is prohibited.
The detailed terms and conditions of the SBCA are defined by T-Systems in the Certificate Policy (CP)/Certification Practice Statement (CPS) of the SBCA service(15). This document includes security specifications and guidelines regarding technical and organisational aspects and describes the activities of the Trust Centre operator in the roles of Certification Authority (CA) and Registration Authority (RA) as well as the Registration Authority's (RA) delegated third party.
Only entities authorised to participate TACHOnet can request a certificate.
Regarding certificate acceptance, clause 4.4.1 of the SBCA Certificate Policy and Certification Practice Statement (‘CP/CPS’) applies, furthermore the terms of use and provisions described in the present document are deemed accepted by the organisation to which the certificate is issued (‘O=’) when first used.
Regarding publication of the certificate, clause 2.2 of the SBCA CP/CPS applies.
All certificate owners shall comply with the following requirements:
protect their private key against unauthorised use;
refrain from transferring or revealing their private key to third parties, even as representatives;
refrain from continued use of the private key following expiry of the validity period or revocation of the certificate, other than to view encrypted data (e.g., decrypting emails);
the certificate owner is responsible for copying or forwarding the key to the end-entity or entities;
the certificate owner must obligate the end-entity/all end-entities to comply with the present terms and conditions, including the SBCA CP/CPS, when dealing with the private key;
the certificate owner must provide the identification of those authorised representatives who are authorised to request revocation of certificates issued to the organisation with the details of events that lead to revocation and the revocation password;
for certificates associated to groups of persons and functions and/or legal persons, after a person leaves the group of end-entities (e.g. termination of the employment relationship), the certificate owner must prevent misuse of the private key by revoking the certificate;
the certificate owner is responsible and shall request revocation of the certificate under the circumstances referred to in clause 4.9.1 of the SBCA CP/CPS.
Regarding renewal or rekey of certificates, clause 4.6 or 4.7 of the SBCA CP/CPS applies.
Regarding amendment of certificate, clause 4.8 of the SBCA CP/CPS applies.
Regarding certificate revocation, clause 4.9 of the SBCA CP/CPS applies.
I, [name and address of the organisation representative], certifies that the following information are to be used in the context of the request, generation and retrieval of public key digital certificates for TACHOnet access points supporting the confidentiality, integrity and non-repudiation of the TACHOnet messages:
Contact person information:
Trusted courier information:
Place, date, company stamp or seal of the Organisation:
Signature of the authorised representative:
A sample of the individual Power of Attorney that must be signed and presented by the trusted courier during face-to-face registration at RAO can be found here:
A sample of the certificate request paper form that must be signed and presented by the trusted courier during face-to-face registration at RAO can be found here:
The key terms used in this Sub-appendix are defined in the CEF Definitions section on the CEF Digital Single Web Portal:
https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/CEF+Definitions
The key acronyms used in this Component Offering Description are defined in the CEF Glossary on the CEF Digital Single Web Portal:
https://ec.europa.eu/cefdigital/wiki/pages/viewpage.action?spaceKey=CEFDIGITAL&title=CEF+Glossary
Council Decision (EU) 2016/1877 of 17 October 2016 on the position to be adopted, on behalf of the European Union, in the Group of Experts on the European Agreement concerning the work of crews of vehicles engaged in international road transport (AETR), and in the Working Party on Road Transport, of the United Nations Economic Commission for Europe (OJ L 288, 22.10.2016, p. 49).
Regulation (EU) No 165/2014 of the European Parliament and of the Council of 4 February 2014 on tachographs in road transport, repealing Council Regulation (EEC) No 3821/85 on recording equipment in road transport and amending Regulation (EC) No 561/2006 of the European Parliament and of the Council on the harmonisation of certain social legislation relating to road transport (OJ L 60, 28.2.2014, p. 1).
ECLI:EU:C:1971:32.
Regulation (EC) No 561/2006 of the European Parliament and of the Council of 15 March 2006 on the harmonisation of certain social legislation relating to road transport and amending Council Regulations (EEC) No 3821/85 and (EC) No 2135/98 and repealing Council Regulation (EEC) No 3820/85 (OJ L 102, 11.4.2006, p. 1).
A PKI (Public Key Infrastructure) is a set of roles, policies, procedures and systems needed to create, manage, distribute and revoke digital certificates.
Identified by the ‘O=’ attribute value in the Subject Distinguished Name of the issued certificate
https://en.wikipedia.org/wiki/Public_key_infrastructure
The latest version of the CP and CPS can be downloaded on https://www.telesec.de/en/sbca-en/support/download-area/
A power of attorney is a legal document by which the Organisation empowers and authorises the European Commission represented by the identified official responsible for the CEF PKI service the power to request the generation of a certificate on its behalf from the T-Systems International GmbH TeleSec Shared Business CA. See also point 6.
See point 5.
A PKI (Public Key Infrastructure) is a set of roles, policies, procedures and systems needed to create, manage, distribute and revoke digital certificates.
The trusted role of the Trust Centre operator, located in the T-Systems Trust Centre, also performs the task of internal registration authority.
Identified by the ‘O=’ attribute value in the Subject Distinguished Name of the issued certificate.
The latest version of the T-Systems SBCA CP/CPS is available from https://www.telesec.de/en/sbca-en/support/download-area/
Latest Available (revised):The latest available updated version of the legislation incorporating changes made by subsequent legislation and applied by our editorial team. Changes we have not yet applied to the text, can be found in the ‘Changes to Legislation’ area.
Original (As adopted by EU): The original version of the legislation as it stood when it was first adopted in the EU. No changes have been applied to the text.
Geographical Extent: Indicates the geographical area that this provision applies to. For further information see ‘Frequently Asked Questions’.
Show Timeline of Changes: See how this legislation has or could change over time. Turning this feature on will show extra navigation options to go to these specific points in time. Return to the latest available version by using the controls above in the What Version box.
Access essential accompanying documents and information for this legislation item from this tab. Dependent on the legislation item being viewed this may include:
This timeline shows the different versions taken from EUR-Lex before exit day and during the implementation period as well as any subsequent versions created after the implementation period as a result of changes made by UK legislation.
The dates for the EU versions are taken from the document dates on EUR-Lex and may not always coincide with when the changes came into force for the document.
For any versions created after the implementation period as a result of changes made by UK legislation the date will coincide with the earliest date on which the change (e.g an insertion, a repeal or a substitution) that was applied came into force. For further information see our guide to revised legislation on Understanding Legislation.
Use this menu to access essential accompanying documents and information for this legislation item. Dependent on the legislation item being viewed this may include:
Click 'View More' or select 'More Resources' tab for additional information including: