Digital Signing Service (DSS) Account Sign up

Please fill in the information below. GlobalSign will use this to create your DSS account.
This is a 15 character alphanumeric string your account manager should have provided.
Are you signing up for a test or production account? Note: Test Accounts will provide a test hierarchy and therefore test/ untrusted signatures
GlobalSign will verify this information and it will be included in all certificates tied to your account. Please be sure to provide accurate data.
Please select whether you will be signing in the name of individuals (e.g., issuing certificates to individual employees for their use) or organization/department (e.g., applying signatures in the name of your company or a specific department).
This is the person who works for the organization specified above, is authorized to sign up for this service, and should be the person filling out this form. This is also the person GlobalSign will contact to resolve any vetting-related queries during the account set-up process.

This individual will:

  • Approve the activation of the Account
  • Authorize the Administrative contact (below) to receive API credentials
  • Receive technical support
  • Receive email updates regarding system maintenance plans and system changes
The account administrator is the technical contact person for the account and may be the same person as the business contact listed above. If this is a different person, GlobalSign will verify that the person is authorized to represent the company prior to activating the account.

Once verified, the admin will be authorized to:

  • Receive the account credentials
  • Have full control over certificate lifecycle management of certificates
  • Receive technical support
  • Receive email updates regarding system maintenance plans and system changes

The public key is used for 2 purposes:

  • to encrypt the Account API credentials back to you
  • to create the mTLS certificate you need to use to access the service (in addition to the API credentials)

Note: Supply an RSA Public key, generated using OpenSSL. Please follow this guide for instructions on how to generate an RSA public key and how to decrypt the returned file.

Please see this FAQ  for how to generate a public key and how to decrypt the returned file.

THE TEST ACCOUNT, ANY CERTIFICATES AND SERVICES (THE “TEST SERVICE”) ARE PROVIDED ON AN “AS-IS”, “AS AVAILABLE” BASIS, AND GLOBALSIGN DOES NOT MAKE ANY AND HEREBY SPECIFICALLY DISCLAIMS ANY REPRESENTATIONS, OR WARRANTIES, EXPRESS OR IMPLIED, OF ANY KIND INCLUDING: (I) OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, OR NONINFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS; AND (II) OF QUALITY, TIMELINESS, ACCURACY, RELIABILITY OR CONTENT. GLOBALSIGN ASSUMES NO LIABILITY FOR ANY DAMAGES OR LOSS OF ANY KIND THAT MIGHT ARISE FROM THE USE OF, MISUSE OF, OR THE INABILITY TO USE THE TEST SERVICE.
Agreement for Digital Signing Service - Version 1.1 3-5-2020

YOU MUST READ THIS AGREEMENT CAREFULLY BEFORE ENROLLING IN THE DIGITAL SIGNING SERVICE ("DSS" OR “THE SERVICE”) OFFERED BY GLOBALSIGN. BY CLICKING THE "I AGREE" BUTTON BELOW, YOU ARE AGREEING TO BE BOUND BY THE TERMS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, YOU WILL NOT BE PERMITTED TO ACCESS OR USE THE SERVICE.

BY CLICKING "I AGREE", YOU REPRESENT AND WARRANT THAT YOU, AS THE INDIVIDUAL ACCEPTING THIS AGREEMENT, ARE DULY AUTHORIZED TO ACCEPT THIS AGREEMENT ON BEHALF OF THE ORGANIZATION ENROLLING IN THE SERVICE (THE "CUSTOMER") AND TO BIND THE CUSTOMER TO THE TERMS OF THIS AGREEMENT WITH GLOBALSIGN.

1. Definitions

AATL Technical Requirements: The version of the Adobe Approved Trust List Technical Requirements available at https://helpx.adobe.com/acrobat/kb/approved-trust-list2.html#AATLtechnicalrequirements as may be updated from time to time.

Adobe Approved Trust List (AATL): A document signing certificate authority trust store created by the Adobe Root CA policy authority implemented from Adobe PDF Reader version 9.0 and later.

API Credentials: An authentication method comprised of a key and secret used in order to access the Service.

CPS: GlobalSign’s Certification Practice Statement available at http://www.globalsign.com/repository/ as may be updated from time to time.

DSS API: The application programming interface (API) that facilitates the integration of the Service with Customer’s internal systems, as may be made available by GlobalSign under this Agreement.

Electronic Seal: Data in electronic form, which is attached to or logically associated with other data in electronic form to ensure the latter’s origin and integrity and is applied in the name of a legal entity (business or organization).

Electronic Signature: Data in electronic form, which is attached to or logically associated with other data in electronic form to ensure the latter’s origin and integrity and is applied by Individuals. The Service supports two types: Individual External Identities and Individual Internal Identities.

GlobalSign: The GlobalSign entity with which you are placing an order to purchase the SERVICE, NAMELY GMO GlobalSign Limited, GMO GlobalSign, Inc., GMO GlobalSign K.K., GMO GlobalSign Pte. Ltd, GMO GlobalSign Certificate Services Pvt. Ltd, GMO GlobalSign Certificate Services Pvt. Ltd, or GMO GlobalSign Russia LLC.

Government-Accepted Form of ID: A physical or electronic form of identification (ID) issued by a local country/state government, or an ID issued or generated by a third party that the local government accepts for validating identities of Individuals for its own official purposes.

ID Source: Any of (i) A Government-Accepted Form of ID; (ii) copy of an attestation from an appropriate notary or Trusted Third Party that s/he has verified the Individual identity based on a Government-Accepted Form of ID, or (iii) copy of a video recording of the verification of Individual identity using secure video communication.

Identity Verification Process: The method used by Customer to verify the identity of an Individual, including the setup, ID Sources, security procedures, and other implementation details. The Identity Verification Process must comply with the AATL Technical Requirements.

Individual: A natural person.

Individual External Identities: The identity of an external Individual associated with Customer for purpose of conducting business with Customer.

Individual Internal Identities: The identity of an Individual who is an employee or contractor affiliated with the Customer’s Organization Validated (OV) Certificate Identity.

mTLS Certificate: A certificate used for two factor authentication for the Service if Customer is integrating its application directly to the DSS API.

Organization Validated (OV) Certificate Identity: A pre-approved Certificate template that restricts Certificate request and issuance to a specific organization that has been verified by GlobalSign using its OV vetting process.

Subscriber: A natural person or legal entity to whom a Certificate and digital signature is issued and who is legally bound by a Subscriber Agreement.

Subscriber Agreement: An agreement between the CA and the Subscriber that specifies the rights and responsibilities of the parties.

Trusted Third Party: A third party approved by GlobalSign that maintains a secure process used by Customer for its Identity Verification Process as may be permitted by the AATL Technical Requirements.

Any capitalized terms not defined herein shall have the meaning set forth in the CPS or Subscriber Agreement.

2. General Description of the Service. In order to use the Service, You must (i) submit Customer’s organization identity information for verification by GlobalSign to create an OV Certificate Identity, (ii) purchase a signing license pack, and (iii) enroll for a mTLS Certificate if Customer is integrating its application directly to the DSS API.

There are three identity configuration options available for the Service: (a) Digital Signatures – Individual Internal Identities; (b) Digital Signatures – Individual External Identities; and (c) Electronic Seals.

If Customer is using a Certificate hierarchy chained to one of GlobalSign’s public root CAs, the Certificates and Service shall be provided in accordance with the CPS.

Customer shall ensure that any Individual requesting a Digital Signature complies with the Subscriber Agreement. Customer shall be legally responsible for compliance with any terms that are applicable to “Subscriber”.

Use of Certificates for digital signing must comply with various industry standards and the AATL Requirements. GlobalSign reserves the right to request changes to or revoke its approval of a Customer’s Identity Verification Process in order to ensure compliance with the AATL Requirements. Customer must promptly comply with any such request from GlobalSign to (a) implement requested changes; and/or (b) immediately cease requesting Certificates and Digital Signatures.

3. Use of the Service. GlobalSign hereby grants to Customer the right to use the Service in accordance with the terms of this Agreement.

You are responsible for maintaining the confidentiality of your API Credentials and/or mTLS Certificate and are fully responsible for all activities that occur under your account. You agree to immediately notify GlobalSign of any unauthorized use of your API Credentials and/or mTLS Certificate or any other breach of security to support@globalsign.com.

GlobalSign hereby grants to Customer a non-exclusive, non-transferable, non-sublicensable, revocable license during the term of this Agreement to install, use and make calls to and from the DSS API solely for the purpose of facilitating Customer’s use of the Service directly from Customer’s internal systems.

4. Limitations on Use. Customer may only request the identity type purchased. Customer shall not (a) use the Certificates or DSS API except as permitted by this Agreement, (b) distribute or resell the Service or any portions thereof to any third party, (c) cause or permit the reverse engineering, disassembly, or decompilation of the Digital Signatures or the Certificates, or (d) request more than five (5) signatures per second and/or one (1) Individual Identity (External or Internal) or Electronic Seal creation per second.

5. Customer Obligations

5.1 Customer Obligations. Customer shall: (a) ensure all key activations and key pairs are controlled by the signer and access to signing keys are based on a two-factor authentication (2FA) process; (b) ensure that information provided on the enrollment requests is complete and accurate; (c) be solely responsible for developing or integrating the digitally signed hash and timestamp into Customer’s document management system using the DSS API or software developer kit (SDK) or configuring the Service for Customer’s own document workflow integration; (d) provide written evidence of compliance with the AATL Technical Requirements as may be requested by GlobalSign from time to time; (e) confirm with the Subscriber that the information is correct before approving a Certificate request; (f) request revocation of a Certificate when any information related to the Certificate request has changed; and (g) ensure compliance by each Individual Subscriber with the terms of the Subscriber Agreement.

5.2. Additional Obligations Based on Customer’s Service Configuration 5.2.1 Individual Internal Identities. If Customer is requesting Digital Signatures with Individual Internal Identities, Customer must: (a) verify the Individual’s identity via face to face verification and submit accurate identity information with each signature request for Subscribers; (b) ensure that the Individual identity information submitted by Customer to request Certificate and Digital Signatures is for a current employee or contractor of Customer who has consented to the request; and (c) create and keep records of the Identity Verification Process.

5.2.2 Individual External Identities. If Customer is requesting Digital Signatures with Individual External Identities, Customer must (a) only request Digital Signatures based on Certificates in the name of Individuals following GlobalSign’s prior written approval of the Identity Verification Process; (b) promptly notify Customer’s GlobalSign account manager of any proposed changes to the Identity Verification Process and only implement any proposed changes after receipt of written approval from GlobalSign; (c) keep accurate written records of the Identity Verification Process; (d) follow appropriate security procedures to ensure that the data used to generate the Certificate used in the Digital Signature is accurate and matches the ID Sources; (e) notify GlobalSign in writing of any failure of Customer to comply with the identity verification obligations; (f) certify in writing its compliance with the Identity Verification Process via a written attestation upon initial set up of the Service, annually and at any time within fourteen (14) days of request by GlobalSign; and (g) retain copies of the ID Sources used to perform the Identity Verification Process for seven (7) years.

During the term of this Agreement and for one (1) year following termination, GlobalSign shall have the right to perform audits of Customer or a Trusted Third Party used by Customer (if applicable) to verify the Identity Verification Process, including the related processes and results of the Identity Verification Process. Upon reasonable notice Customer will permit GlobalSign and/or its agents to access Customer records during normal business hours for the purpose of verifying Customer’s compliance with its obligations under this Agreement. The audit will be at the expense of GlobalSign and will not be performed more than once in each calendar quarter. Within five (5) business days of GlobalSign’s request, Customer will make available to GlobalSign (a) copies of the ID Sources used to perform the Identity Verification Process and (b) the name of the authorized representative of the Customer who will be responsible for acknowledging the audit observations. Upon completion of any audit, Customer’s authorized representative will sign the acknowledgement of the audit observations provided by GlobalSign within one (1) business day after GlobalSign has provided him/her with a copy of the audit observations. Customer may provide redacted or excerpted content as necessary to comply with any applicable data privacy law. In the case of non-conformities, Customer must provide GlobalSign with evidence of implementation of mitigation measures and alternative controls for evaluation and approval by GlobalSign.

5.2.3 Electronic Seals. If Customer is applying Electronic Seals to .pdf documents, Customer must (a) only submit requests in the name of an actual department at Customer; (b) not submit requests in the name of an Individual; and (c) not submit requests that are inaccurate or misleading.

The rights and remedies of GlobalSign set forth above are not exclusive of, but are cumulative to, any rights or remedies now or subsequently existing at law, in equity, by statute or otherwise.

6. Fees; Payment. Customer agrees to pay GlobalSign for the signing license packs ordered. Signing license packs expire 12 months from purchase. There is no credit or refund for expired unused signings.

On the date of each order, Customer shall provide to GlobalSign valid, up-to-date and complete credit card details or approved purchase order information acceptable to GlobalSign and, if Customer provides its credit card details to GlobalSign, Customer hereby authorizes GlobalSign to bill such credit card on the order date for the fees payable for any signing license packs ordered. If Customer provides its approved purchase order information to GlobalSign, and/or opts to pay by invoice, GlobalSign shall invoice Customer on the order date of the signing license pack for the fees payable in respect of any orders placed.

All payments are payable in the currency on the order and due net thirty (30) days from the invoice date. GlobalSign’s quoted prices for the Service are exclusive of any and all taxes or duties. Such taxes and duties, when applicable, will be added to GlobalSign's invoices. Customer will pay any taxes, fees and similar governmental charges related to the execution or performance of this Agreement, other than applicable income taxes imposed on GlobalSign related to its receipt of payments from Customer.

If any undisputed invoiced amount is not received by GlobalSign by the due date, then without limiting GlobalSign’s rights or remedies, (a) those charges will accrue late interest at the rate of 1.5% of the outstanding balance per month, or the maximum rate permitted by law, whichever is lower, and (b) GlobalSign may suspend or limit Customer’s access to the Service without notice until full payment is made. Customer must notify GlobalSign of any fee disputes within 30 days of the applicable invoice date or such invoice will be deemed accepted.

7. Term; Termination. The term of this Agreement will begin on the date the first order is placed by Customer (the “Effective Date”) and will continue unless terminated earlier as provided herein.

This Agreement and any active signing license packs may be terminated immediately by either party upon written notice (a) at any time upon thirty (30) days’ notice to the other party, (b) if the other party breaches any of the terms of this Agreement and such breach continues for a period of thirty (30) days after notice thereof has been given by a party; (c) if the other party files for bankruptcy, ceases to carry on business, or undergoes liquidation; or (d) if the other party is unable to perform a material portion of its obligations under this Agreement as a result of an event or events of force majeure for a period of not less than thirty (30) days. In addition, the parties agree that the following conditions will be deemed a material breach by Customer: (a) failure to comply with the AATL Technical Requirements, or (b) a breach of Section 5 (Customer Obligations). Either party may terminate this Agreement immediately if the other party in in breach of the confidentiality section of this Agreement.

8. Effect of Termination. Upon termination of this Agreement in any manner, (1) Customer shall immediately pay GlobalSign any outstanding fees; (2) Customer shall discontinue use of the Service, and (3) all rights and obligations of the parties under this Agreement shall cease immediately except the terms and conditions of this Agreement shall continue to apply to any signings created prior to the termination until the expiration or earlier revocation of the Certificate; and the following Sections which shall survive any expiration of termination: 9, 10, 11, 12.2, 12.3 and 13 - 16.

9. Warranty and Disclaimer

(a) Compliance with Laws. Each party warrants that it shall comply with all applicable federal, state, and local laws and regulations applicable to GlobalSign’s provision/use of the Service, as applicable. Each party shall have all professional licenses, permits, certificates and registrations required for its performance of the Service.

(b) Authority. Each party warrants that it is validly existing and in good standing under the laws of the jurisdiction of its organization and has the power and authority to enter into this Agreement and that this Agreement has been duly executed and delivered by such party and constitutes the valid and binding obligation of such party.

(c) Subscriber Information. Customer warrants that all information and representations made by the Subscriber are true.

(d) Personal Data. Customer warrants that (i) it has the necessary rights to provide any personal data or other information that Customer to GlobalSign, and (ii) providing such information does not violate any applicable data privacy law, contract or privacy policy. The terms of the GlobalSign data processing addendum at https://www.globalsign.com/en/repository/GlobalSign-DPA.pdf (“DPA”) are hereby incorporated by reference and shall apply to the extent GlobalSign processes any Customer Personal Data, as defined in the DPA.

(e) No Other Warranty. EXCEPT AS PROVIDED IN THE GLOBALSIGN CERTIFICATION PRACTICE STATEMENT AT https://www.globalsign.com/repository/, AND TO THE MAXIMUM EXTENT ALLOWED BY APPLICABLE LAW, GLOBALSIGN DISCLAIMS ALL OTHER WARRANTIES AS TO THE USE, DELIVERY, LICENSE, PERFORMANCE OR NONPERFORMANCE OF, USE OR INABILITY TO USE THE SERVICE, SOFTWARE, DOCUMENTATION OR ANY OTHER SERVICES OFFERED OR CONTEMPLATED BY THIS AGREEMENT, EXPRESS OR IMPLIED. GLOBALSIGN EXPRESSLY DISCLAIMS ALL REPRESENTATIONS AND WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT.

10. Confidentiality

10.1 “Confidential Information” means all information that is provided or made available to one party (the “Receiving Party”) by the other party (the “Disclosing Party”). Confidential Information includes, but is not limited to: inventions, technologies; strategies; trade secrets; customer and supplier lists; product designs and pricing information; processes; formulas; business plans; employer and consumer information; employee data; product licensing plans; budgets, finances, and financial plans; production plans and protocols; systems architecture, technology, data, and methods, and any other information that by its nature would typically be considered non-public information. Confidential Information may be conveyed to the Receiving Party in written, electronic, or oral form, and includes any information that may be derived from or developed as a result of access to the Disclosing Party’s facilities, as well as all notes, reports, evaluative materials, analyses or studies prepared by the Receiving Party or its directors, officers, employees, agents and advisors (collectively, such Party’s “Representatives”) regarding or relating to the Disclosing Party or its Confidential Information.

10.2 The Receiving Party will protect, and will ensure its employees, officers, agents and contractors will protect Confidential Information by using the same degree of care as Receiving Party uses to protect its own Confidential Information of a like nature (but no less than a reasonable degree of care) to prevent the unauthorized use, dissemination, disclosure or publication of such Confidential Information. The Receiving Party may disclose the Confidential Information only to those of its affiliates and their respective employees and advisors who have a need to know and who are under an obligation of confidentiality at least as restrictive as that contained herein. GlobalSign may also disclose the Confidential Information as may be required for GlobalSign to fulfill its obligations under the Adobe AATL program, subject to appropriate confidentiality provisions. Confidential Information received may be used only to fulfill the purposes of the Agreement. If a Receiving Party or any of its respective affiliates is requested or required by subpoena, court order, or similar process or applicable governmental regulation to disclose any Confidential Information, Receiving Party agrees to provide the Disclosing Party with prompt notice of such request or obligation so that the Disclosing Party may seek an appropriate protective order or procedure if it elects to do so. The Receiving Party’s obligations with respect to particular Confidential Information will expire three (3) years after the termination of this Agreement.

10.3 The foregoing confidentiality obligations will not apply to Confidential Information that (a) is now or subsequently becomes generally available to the public through no fault or breach on the part of the Receiving Party; (b) is known by the Receiving Party prior to disclosure as noted by tangible record; (c) is independently developed by the Receiving Party without the use of any Confidential Information of the Disclosing party; or (d) the Receiving Party rightfully obtains without a duty of confidentiality from a third party who has the right to transfer or disclose it; (e) is disclosed under operation of law; or (f) is disclosed by the Receiving Party with the prior written approval of the disclosing party.

11. Ownership. Except for the rights expressly granted under this Agreement, all right, title and interest in and to the Service, DSS API, and any related software are owned exclusively by GlobalSign. GlobalSign retains all right, title, and interest in and to the Service and all other products, software, documentation, works, and other intellectual property created, used, or provided by GlobalSign for the purposes of this Agreement, and all modifications, improvements and derivative works of the same.

12. Indemnification

12.1 GlobalSign will settle and/or defend at its own expense and indemnify and hold harmless Customer against any cost, loss or damage from any claim, demand, suit or action brought by a third party against Customer alleging that use of the Service by Customer as permitted hereunder infringes upon any copyright, trademark, trade secret, European patent or other intellectual property right of any third party.

Should the Service become, or in GlobalSign’s sole opinion likely to become, the subject of any claim or action for infringement, GlobalSign may (a) procure, at no cost to Customer, the right for Customer to continue using the Service as contemplated hereunder; (b) modify the Service, without loss of material functionality or performance, to render the Service non-infringing; or (c) if the foregoing alternatives are not reasonably available to GlobalSign, terminate this Agreement.

GlobalSign’s indemnification obligation will not apply to infringement actions or claims to the extent that those actions or claims are based on or result from: (i) modifications made to the Service by or on behalf of Customer, or (ii) the combination of the Service with items not supplied by GlobalSign.

12.2 Customer will settle and/or defend at its own expense and indemnify and hold harmless GlobalSign against any cost, loss or damage from any claim, demand, suit or action brought by a third party against GlobalSign arising out of or related to any breach of the Agreement by Customer.

12.3 The party seeking indemnification (the “Indemnified Party”) agrees to promptly notify the party providing indemnification (the “Indemnifying Party”) in writing of any indemnifiable claim. The Indemnifying Party shall control the defense and settlement of an indemnifiable claim. The Indemnified Party shall cooperate in all reasonable respects with Indemnifying Party and its attorneys in the investigation, trial, defense and settlement of such claim and any appeal arising therefrom. The Indemnified Party may participate in such investigation, trial, defense and settlement of such claim and any appeal arising therefrom, through its attorneys or otherwise, at its own cost and expense.

13. Limitation of Liability. GlobalSign’s aggregate liability to Customer for any and all claims arising out of or relating to this Agreement, or the use of or inability to use the Service, Digital Signatures or Certificates will in no event exceed the amount of fees paid by Customer for the Service, Digital Signatures and/or Certificates within the one (1) year period immediately prior to the event that gave rise to its claim.

14. Limitation of Damages. GlobalSign shall not be liable to Customer for any special, consequential, incidental or indirect damages including, but not limited to, loss of profits, revenue, or damage to or loss of data arising out of the use of or inability to use the Service or Certificates whether or not GlobalSign has been advised of the possibility of such damages.

15. Governing Law and Jurisdiction. The (i) laws that govern the interpretation, construction, and enforcement of this Agreement and all matters, claims or disputes related to it, including tort claims, and (ii) the courts that have exclusive jurisdiction over any of the matters, claims or disputes, are set forth in the table below.

GlobalSign Billing Entity Governing Law Venue
Japan Japan Tokyo District Court, Japan
China China Shanghai, China
United Kingdom England and Wales London, England
Europe Belgium Leuven
North America, South America, Latin America New Hampshire, USA State and federal courts of New Hampshire
Singapore Singapore Singapore
PhilippinesPhilippines Makati City, Singapore
Country in Asia Pacific region other than Singapore or Philippines Japan Tokyo, Japan
India Laws of Republic of India Delhi, India
Russia Russia Federation Laws Moscow, Russia

16. Miscellaneous

16.1. Force Majeure. Neither party shall be liable for failure or delay in performing its obligations hereunder if such failure or delay is due to circumstances beyond its reasonable control, including, without limitation, acts of any governmental body, war, insurrection, sabotage, embargo, fire, flood, strike or other, interruption of or delay in transportation, unavailability of interruption or delay in telecommunications or third party services; provided however, that if a party suffering a force majeure event is unable to cure that event within thirty (30) days, the other party may terminate this Agreement.

16.2. Notices. Notices shall, unless otherwise specified herein, be in writing and may be delivered by hand delivery, regular mail, or overnight courier service to the address specified in the order. Notices shall be effective at the close of business on the day actually received, if received during business hours on a business day, and otherwise shall be effective at the close of business on the next business day. A party may change its contact information below by providing notice of same in accordance herewith.

16.3 Assignment. Except as otherwise provided herein, this Agreement shall be binding upon, and inure to the benefit of, the successors, executors, heirs, representatives, administrators and assigns of the parties hereto. This Agreement may not be transferred or assigned by Customer without GlobalSign’s prior written consent. Any such purported transfer or assignment shall be void and of no effect and shall permit GlobalSign to terminate this Agreement.

16.4 Severability. If and to the extent that any court holds any provision of this Agreement to be unenforceable, such unenforceable provision shall be stricken and the remainder of this Agreement shall not be affected thereby. The parties shall in good faith attempt to replace any unenforceable provision of this Agreement with a provision that is enforceable and that comes as close as possible to expressing the intention of the original provision.

17. Entire Agreement. This Agreement, and any documents incorporated herein by reference constitute the entire agreement between the parties and supersedes any prior written or oral agreement or understanding with respect to the subject matter thereof. In the event of any conflict, the order of precedence shall be: this Agreement, the Subscriber Agreement, and the CPS. The terms and conditions of any past, present or future purchase order submitted by Customer which alter, modify or conflict with the terms and conditions of this Agreement are void.

18. Amendment. GlobalSign may amend: (i) the CPS and (ii) the Subscriber Agreement and will give notice by posting an updated version in its website repository or by a means set forth in Section 16.2 (Notices). If such an amendment materially and adversely affects Customer’s rights herein, Customer will have the right, as its sole and exclusive remedy in connection with such amendment, to terminate this Agreement during the 30-day period after GlobalSign’s notice of such amendment, by providing written notice of termination to GlobalSign. Customer’s continued use of the Service after 30 days of GlobalSign’s notice of the amendment constitutes Customer’s acceptance of the amendment.

19. Language. This Agreement is drafted in the English language. Any notice given under or in connection with this Agreement shall be in English. All other documents provided under or in connection with this Agreement shall be in English or accompanied by a certified English translation. The English language version of this Agreement and any notice or other document relating to this Agreement shall prevail if there is a conflict.

[DSS Agreement (non Atlas) v 1.1 3-6-2020]

GlobalSign Subscriber Agreement - Version 3.9

PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE CERTIFICATE ISSUED TO YOU OR YOUR ORGANIZATION. BY APPLYING FOR A CERTIFICATE, YOU ARE AGREEING TO BE BOUND BY THE TERMS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, CANCEL YOUR ORDER WITHIN SEVEN (7) DAYS OF THE AVAILABILITY OF THE CERTIFICATE FOR A FULL REFUND. IF YOU HAVE PROBLEMS UNDERSTANDING THIS AGREEMENT, E-MAIL US AT legal@globalsign.com

This GlobalSign Subscriber Agreement (the "Agreement") between GlobalSign and the Applicant or Subscriber is effective as of the date of the application for the Certificate (the "Effective Date").

1.0 Definitions and Incorporation by Reference

The following policies and associated guidelines are incorporated by reference into this Agreement:

  • *The GlobalSign Certification Practice Statement (CPS);
  • *The CA/Browser Forum Baseline Requirements;
  • *The GlobalSign Warranty Policy;
  • *The GlobalSign Payment Terms;
  • *The GlobalSign Refund & Cancellation Policy

The current versions of the above documents are located at https://www.globalsign.com/en/repository/.
The current version of the CA/Browser Forum Baseline Requirements is located at https://cabforum.org/baseline-requirements-documents/.

The following definitions are used in this Agreement:

Affiliate: A corporation, partnership, joint venture or other entity controlling, controlled by, or under common control with another entity, or an agency, department, political subdivision, or any entity operating under the direct control of a Government Entity.

Applicant: The natural person or Legal Entity that applies for (or seeks renewal of) a Certificate. Once the Certificate issues, the Legal Entity is referred to as the Subscriber. For Certificates issued to devices, the Applicant is the entity that controls or operates the device named in the Certificate, even if the device is sending the actual Certificate Request.

Application Software Supplier: A supplier of Internet browser software or other Relying Party application software that displays or uses Certificates and incorporates Root Certificates.

Authority Information Access: A Certificate extension that indicates how to access information and services for the issuer of the Certificate in which the extension appears.

CA/Browser Forum: An industry expert group of CA's and Application Software Suppliers. Details are available from www.cabforum.org.

Certificate: An electronic document that uses a Digital Signature to bind a Public Key and an identity.

Certificate Beneficiaries: The Subscriber that is a party to the Subscriber Agreement or Terms of Use for the Certificate, all Application Software Suppliers with whom GlobalSign has entered into a contract for inclusion of its Root Certificate in software distributed by such Application Software Supplier, and all Relying Parties who reasonably rely on a Valid Certificate.

Certificate Custodian: A nominated individual responsible for the lifecycle of the Certificate. This may or may not be the same entity as the Subscriber.

Certificate Request: Communications described in Section 10.2 of the CA/Browser Forum Baseline Requirements for the Issuance of Publicly-Trusted Certificates (the "Baseline Requirements") requesting the issuance of a Certificate.

Certificate Requester: Applicant's representative who has express authority to represent the Applicant, or a third party (such as an ISP or hosting company) that completes and submits Certificate Requests on behalf of the Applicant. Certificate Requesters can be pre-approved via the functionality of a GlobalSign managed service such as MSSL or EPKI.

Certificate Revocation List ("CRL"): A regularly updated timestamped list of revoked Certificates that is created and Digitally Signed by the CA that issued the Certificates.

Certification Authority ("CA"): An organization that is responsible for the creation, issuance, revocation, and management of Certificates. The term applies equally to both Roots CAs and Subordinate CAs. GlobalSign or an entity which is certified by GlobalSign to issue the Certificate to the "Subject". GlobalSign is Applicant's CA hereunder.

Digital Signature: To encode a message by using an asymmetric cryptosystem and a hash function such that a person having the initial message and the signer's Public Key can accurately determine whether the transformation was created using the Private Key that corresponds to the signer's Public Key and whether the initial message has been altered since the transformation was made. Digitally Signed shall refer to electronic data to which a Digital Signature has been appended.

Domain Name: The label assigned to a node in the Domain Name System.

Domain Name Registrant: Sometimes referred to as the "owner" of a Domain Name, but more properly the person's) or entity(ies) registered with a Domain Name Registrar as having the right to control how a Domain Name is used, such as the natural person or Legal Entity that is listed as the "Registrant" by WHOIS or the Domain Name Registrar.

Domain Name Registrar: A person or entity that registers Domain Names under the auspices of or by agreement with: (i) the Internet Corporation for Assigned Names and Numbers (ICANN), (ii) a national Domain Name authority/registry, or (iii) a Network Information Center (including their affiliates, contractors, delegates, successors, or assigns).

Domain Name System: An Internet service that translates Domain Names into IP addresses.

Fully-Qualified Domain Name: A Domain Name that includes the labels of all superior nodes in the Internet Domain Name System.

GlobalSign: The GlobalSign entity with which the Subscriber placed an order to purchase the Certificate, either GMO GlobalSign Limited, GMO GlobalSign, Inc., GMO GlobalSign Pte. Ltd, GMO GlobalSign Certificate Services Pvt. Ltd, GMO GlobalSign Russia LLC or GMO GlobalSign Inc. (Philippines).

Government Entity: A government-operated legal entity, agency, department, ministry, branch, or similar element of the government of a country, or political subdivision within such country (such as a state, province, city, county, etc.).

Key Compromise: A Private Key is said to be compromised if its value has been disclosed to an unauthorized person, an unauthorized person has had access to it.

Key Pair: The Private Key and its associated Public Key.

Legal Entity: An association, corporation, partnership, proprietorship, trust, government entity or other entity with legal standing in a country's legal system.

North American Energy Standards Board ("NAESB") Accreditation Requirements for Authorized Certification Authorities ("NAESB Accreditation Specification"): The technical and management details which a Certification Authority is required to meet in order to be accredited as an Authorized Certification Authority ("ACA") by NAESB.

Online Certificate Status Protocol ("OCSP"): An online Certificate-checking protocol that enables Relying Party application software to determine the status of an identified Certificate.

Private Key: The key of a Key Pair that is kept secret by the holder of the Key Pair, and that is used to create Digital Signatures and/or to decrypt electronic records or files that were encrypted with the corresponding Public Key.

Public Key: The key of a Key Pair that may be publicly disclosed by the holder of the corresponding Private Key and that is used by a Relying Party to verify Digital Signatures created with the holder's corresponding Private Key and/or to encrypt messages so that they can be decrypted only with the holder's corresponding Private Key.

Registration Authority ("RA"): Any Legal Entity that is responsible for identification and authentication of Subjects of Certificates, but is not a CA, and hence does not sign or issue Certificates. An RA may assist in the Certificate application process or revocation process or both. When "RA" is used as an adjective to describe a role or function, it does not necessarily imply a separate body, but can be part of the CA.

Relying Party: Any natural person or Legal Entity that relies on a Valid Certificate. An Application Software Supplier is not considered a Relying Party when software distributed by such supplier merely displays information relating to a Certificate.

Root Certificate: The self-signed Certificate issued by the Root CA to identify itself and to facilitate verification of Certificates issued to its Subordinate CAs.

Subject: The natural person, device, system, unit, or Legal Entity identified in a Certificate as the Subject. The Subject is either the Subscriber or a device under the control and operation of the Subscriber.

Subordinate CA: A Certification Authority whose Certificate is signed by the Root CA, or another Subordinate CA.

Subscriber: A natural person or Legal Entity to whom a Certificate is issued and who is legally bound by a Subscriber Agreement or Terms of Use.

Suspect Code: Code that contains malicious functionality or serious vulnerabilities, including spyware, malware and other code that installs without the user's consent and/or resists its own removal or detection, and code that can be exploited in ways not intended by its designers to compromise the trustworthiness of the platforms on which it executes.

Terms of Use: Provisions regarding the safekeeping and acceptable uses of a Certificate issued in accordance with the GlobalSign CPS when the Applicant/Subscriber is an Affiliate of the CA.

Wildcard Certificate: A Certificate containing an asterisk (*) in the left-most position of any of the Subject Fully-Qualified Domain Names contained in the Certificate.

2.0 Authority to Use Certificates

2.1 Grant of Authority: From the Effective Date and for the term set forth within the validity period of any issued Certificate ("Valid from" date to "Valid to" date), GlobalSign hereby grants to the Subscriber the authority to use the Certificate in conjunction with Private Key and/or Public Key operations. The obligations of the Subscriber in section 4.0 with respect to Private Key protection are applicable from the Effective Date.

2.2 Limitations on Authority: The Subscriber shall use the Certificate only in connection with properly licensed cryptographic software.

3.0 Services Provided by GlobalSign

After acceptance of this Agreement and payment of applicable fees, in addition to the "Grant of Authority", GlobalSign or a third-party provider designated by GlobalSign shall provide the following services from the point of issuance of the Certificate.

3.1 Provision of Certificate Revocation Lists (CRL), Online Certificate Status Protocol (OCSP) Services and Certificate Issuing Authority Details: GlobalSign shall use reasonable efforts to compile, aggregate and make electronically available for all Certificates signed and issued by GlobalSign's CA:

  • CRLs for any Certificate containing a CRL Certificate distribution point;
  • OCSP responders for any Certificates containing an OCSP responder URL, and
  • Issuing Certificate information from the Authority Information Access locations; provided, however that GlobalSign shall not be in breach of its obligations hereunder as a result of any delay in or failure of performance on its part which arises out of any equipment failure or telecommunications breakdown beyond the reasonable control of GlobalSign.

3.2 Revocation Services for Certificates: Revocation of a Subscriber Certificate shall be performed by GlobalSign within twenty-four (24) hours under the following circumstances:

  • The Subscriber requests in writing to GlobalSign .that the Subscriber wishes to revoke the Certificate;
  • The Subscriber notifies GlobalSign that the original Certificate Request was not authorized and does not retroactively grant authorization;
  • GlobalSign obtains evidence that the Subscriber's Private Key corresponding to the Public Key in the Certificate suffered a Key Compromise; or
  • GlobalSign obtains evidence that the validation of domain authorization or control for any Fully-Qualified Domain Name or IP address in the Certificate should not be relied upon.

Revocation of a Subscriber's Certificate should be performed within twenty-four (24) hours and will be performed within 5 days if one or more of the following occurs:

  • The Certificate no longer complies with the requirements for algorithm type and key size of the Baseline Requirements;
  • GlobalSign obtains evidence that the Certificate was misused;
  • GlobalSign receives notice or otherwise becomes aware that the Subscriber violated any of its material obligations under this Subscriber Agreement or Terms of Use;
  • GlobalSign is made aware of any circumstance indicating that use of a Fully-Qualified Domain Name or IP address in the Certificate is no longer legally permitted (e.g. a court or arbitrator has revoked a Domain Name Registrant's right to use the Domain Name, a relevant licensing or services agreement between the Domain Name Registrant and the Applicant has terminated, or the Domain Name Registrant has failed to renew the Domain Name);
  • GlobalSign is made aware that a Wildcard Certificate has been used to authenticate a fraudulently misleading subordinate Fully-Qualified Domain Name;
  • GlobalSign receives notice or otherwise becomes aware of a material change in the information contained in the Certificate;
  • GlobalSign is made aware that the Certificate was not issued in accordance with the Baseline Requirements or GlobalSign's CP or CPS;
  • GlobalSign determines that any of the information appearing in the Certificate is not accurate or is misleading;
  • GlobalSign ceases operations for any reason and has not arranged for another CA to provide revocation support for the Certificate;
  • GlobalSign's right to issue Certificates under the Baseline Requirements expires or is revoked or terminated, unless GlobalSign has made arrangements to continue maintaining the CRL/OCSP Repository;
  • Revocation is required by GlobalSign's CP and/or CPS;
  • The technical content of format of the Certificate presents an unacceptable risk to Application Software Suppliers or Relying Parties (e.g. the CA/B Forum might determine that a deprecated cryptographic/signature algorithm or key size presents an unacceptable risk and that such Certificates should be revoked and replaced by CAs within a given period of time);
  • GlobalSign is made aware of a demonstrated or proven method that exposes the Subscriber's Private Key to compromise, methods have been developed that can easily calculate it based on the Public Key (such as a Debian weak key, see http://wiki.debian.org/SSLkeys), or if there is clear evidence that the specific method used to generate the Private Key was flawed;
  • GlobalSign is made aware that the Certificate was used to sign malicious software or "malware."

Revocation of a Subscriber Certificate may also be performed by GlobalSign within a commercially reasonable period of time under the following circumstances:

  1. The Subscriber or organization administrator requests revocation of the Certificate through a GCC account which controls the lifecycle of the Certificate;
  2. The Subscriber requests revocation through an authenticated request to GlobalSign's support team or GlobalSign's Registration Authority;
  3. GlobalSign receives notice or otherwise becomes aware that the Subscriber has been added as a denied party or prohibited person to a blacklist, or is operating from a prohibited destination under the laws of GlobalSign's jurisdiction of operation;
  4. GlobalSign determines, in its sole discretion, that the use of the Certificate may compromise the security, reputation or trust status of the GlobalSign CA or GlobalSign;
  5. Following a request for cancellation of a Certificate;
  6. If a Certificate has been reissued, GlobalSign may revoke the previously issued Certificate;
  7. Under certain licensing arrangements, GlobalSign may revoke Certificates following expiration or termination of the applicable license agreement;
  8. GlobalSign determines the continued use of the Certificate is otherwise harmful to the business of GlobalSign or third parties When considering whether Certificate usage is harmful to GlobalSign's or a third party's business or reputation, GlobalSign will consider, among other things, the nature and number of complaints received; the identity of the complainant's); relevant legislation in force; and the response to the alleged harmful use by the Subscriber;
  9. If Microsoft, in its sole discretion, identifies a Code Signing or EV Code Signing Certificate as either containing a deceptive name or as being used to promote malware or unwanted software, Microsoft will contact GlobalSign and request that it revoke the Certificate. GlobalSign will either revoke the Certificate within a commercially-reasonable time frame, or request an exception from Microsoft within two (2) business days of receiving Microsoft's request. Microsoft may either grant or deny the exception at its sole discretion. In the event that Microsoft does not grant the exception, GlobalSign will revoke the Certificate within a commercially-reasonable timeframe not to exceed two (2) business days; or
  10. If Microsoft, it its sole discretion, identifies an SSL or Code Signing Certificate is being used to promote malware or unwanted software, Microsoft will contact GlobalSign and request that it revoke the Certificate. GlobalSign will either revoke the Certificate within a commercially-reasonable time frame or request an exception from Microsoft within two (2) business days of receiving Microsoft's request. Microsoft may either grant or deny the exception at its sole discretion. In the event that Microsoft does not grant the exception, GlobalSign will revoke the Certificate within a commercially-reasonable timeframe not to exceed two (2) business days.
  11. Death of a Subscriber.

3.3 Key Generation: If Key Pairs are generated by GlobalSign on behalf of the Subscriber offered as Token, PKCS#12 or AutoCSR options, GlobalSign will endeavor to use trustworthy systems in order to generate such Key Pairs, in which case, the following terms also apply. GlobalSign does not generate Key Pairs for publicly trusted SSL certificates:

  1. 1. GlobalSign will generate Key Pairs using a platform recognized as being fit for such purpose and will ensure that Private Keys are encrypted if transported to the Subscriber,
  2. GlobalSign will use a key length and algorithm which is recognized as being fit for the purpose of Digital Signature, and
  3. In the case of both Code Signing and EV Code Signing Certificates, Subscriber acknowledges that GlobalSign will not sign Key Pairs that are smaller than 2048 bits and, in the case of EV Code Signing, will offer SHA2 as the only option for the signature algorithm.

3.4 Site Seal Services for SSL/TLS Certificates and OCSP/CRL Responses: GlobalSign permits the Applicant to make use of GlobalSign's site seal on the Applicant's web site with a maximum daily rate of five hundred thousand (500,000) impressions per day. GlobalSign reserves the right to limit or stop the availability of the seal if this limit is exceeded.

GlobalSign provides a 24x7 service to check the validity of an issued Certificate either through an OCSP responder or CRL. A maximum daily rate of five hundred thousand (500,000) validations per Certificate per day is set. GlobalSign reserves the right to enforce OCSP stapling if this limit is exceeded.

3.5 Time stamping Services for Code Signing Certificate: GlobalSign offers the ability to timestamp code signed with a Code Signing Certificate as a non-chargeable service provided the service is used reasonably. As a best practice, GlobalSign requests that Subscriber timestamp the digital signature after signing his/her code. GlobalSign establishes a limit of a reasonable number of timestamps for the validity period of the Code Signing Certificate and reserves the right to withdraw the service or charge additional fees for the service where the volume of timestamps is deemed excessive by GlobalSign.

3.6 Time stamping Services for PDF Signing for Adobe CDS Certificate: GlobalSign offers the ability to timestamp Portable Document Format (PDF) documents as a paid GlobalSign service. The number of signatures per year allowed by this service is established during the application process. GlobalSign reserves the right to withdraw the service or charge additional fees for the service where the volume of time stamps is in excess of the agreed limit.

3.7 Time stamping Services for Adobe Authorized Trust List (AATL) Certificate: GlobalSign may offer the ability to timestamp Portable Document Format (PDF) and Microsoft Office documents as a paid GlobalSign service. The number of signatures per year allowed by this service is established during the application process. GlobalSign reserves the right to withdraw the service or charge additional fees for the service where the volume of time stamps is in excess of the agreed limit.

Subscriber's Obligations and Warranties

Subscriber and/or Applicant warrants for the benefit of GlobalSign and the Certificate Beneficiaries that:

4.1 Accuracy of Information: Subscriber will provide accurate, complete and truthful information at all times to GlobalSign, both in the Certificate Request and as otherwise requested by GlobalSign in connection with issuance of a Certificate, including but not limited to, the application name, information URL and application description in relation to EV Code Signing Certificates.

4.2 Protection of Private Key: Applicant shall take all reasonable measures to maintain sole control of, keep confidential, and properly protect at all times the Private Key to be included in the requested Certificate's) and any associated activation data or device, e.g. password or token. For Code Signing Certificates, the Subscriber will provide adequate network and other security controls to protect against misuse of the Private Key and that GlobalSign will revoke the Certificate without requiring prior notification if there is unauthorized access to the Private Keys.

4.3 Private Key Reuse: For Code Signing Certificates, the Applicant/Subscriber shall not apply for a Code Signing Certificate if the Public Key in the Certificate is or will be used with a non-Code Signing Certificate.

4.4 Prevention of Misuse: The Subscriber will provide adequate network and other security controls to protect against misuse of the Private Key and that GlobalSign will revoke the Certificate without requiring prior notification if there is unauthorized access to the Private Keys.

4.5 Acceptance of Certificate: Subscriber shall not use the Certificates until after Applicant, or an agent of Applicant, has reviewed and verified the Certificate contents for accuracy.

4.6 Use; Restrictions: Subscriber shall install the Certificate only on servers that are accessible at the subjectAltName's) listed in the Certificate, and use the Certificate solely in compliance with all applicable laws and solely in accordance with the Subscriber Agreement or Terms of Use.

Under no circumstances must the Certificate be used for criminal activities such as phishing attacks, fraud, certifying or signing malware. Subscriber should not use a Certificate to knowingly sign software that contains Suspect Code or otherwise distribute content that has the effect of misleading, inconveniencing or annoying the recipient such as software that includes unwelcome features or programs not disclosed appropriately to the user prior to installation, or is recognized as unwelcome or suspicious by commercial anti-virus scanning applications.

4.6.1 PDF Signing: In the event a Certificate is used to sign a PDF, the Subscriber shall maintain information that permits a determination of who approved the signature of a particular document.

4.6.2 EV Code Signing: Subscriber accepts these additional obligations and makes the following warranties when using EV Code Signing Certificates:
*Only to sign code that complies with the requirements set forth in the latest version of the CA/Browser Forum Guidelines for the Issuance and Management of Extended Validation Code Signing Certificates;
*Solely in compliance with all applicable laws;
*Solely for authorized company business; and
*Solely in accordance with this Agreement.

If Subscriber becomes aware (by whatever means) that it has signed code that contains malicious software or a serious vulnerability, the Subscriber must immediately inform GlobalSign.

4.6.3 Microsoft Stipulation: Subscriber acknowledges that Microsoft may independently determine that a Certificate is malicious or there has been a Key Compromise, and Microsoft services and applications may have the ability to modify Microsoft customer experiences to reflect Microsoft's determination without notice and without regard to the revocation status of the Certificate.

4.7 Reporting and Revocation: Subscriber shall promptly cease using a Certificate and its associated Private Key. If the Certificate is hosted by GlobalSign, Subscriber should promptly request that GlobalSign revoke the Certificate if the Subscriber believes that (a) any information in the Certificate is, or becomes, incorrect or inaccurate, (b) the Private Key associated with the Public Key contained in the Certificate was misused or compromised, or (c) in the case of a Code Signing Certificate, there is evidence that the Certificate was used to sign Suspect Code.

4.8 Termination of Use of Certificate: Subscriber shall promptly cease use of the Private Key associated with the Public Key in the Certificate upon expiration or revocation of the Certificate.

4.9 Responsiveness: Subscriber shall respond to GlobalSign's instructions concerning Key Compromise or Certificate misuse within forty-eight (48) hours.

4.10 Acknowledgement and Acceptance: Subscriber has evaluated GlobalSign's CPS. Subscriber acknowledges and accepts that GlobalSign is entitled to revoke the Certificate immediately if the Applicant violates the terms of the Subscriber Agreement or if GlobalSign discovers that the Certificate is being used to enable criminal activities such as phishing attacks, fraud, or the distribution of malware.

With respect to EV Code Signing Certificates used in connection with Microsoft services and applications, Subscriber further acknowledges that even though an EV Code Signing Certificate may not be revoked by GlobalSign Microsoft may independently determine that the Certificate is malicious or compromised and modify the Microsoft customer experience in the applicable Microsoft services and applications to reflect Microsoft's determination without notice and without regard to the revocation status of the Certificate.

4.11 Sharing of Information: With respect to Code Signing Certificates, Subscriber acknowledges and accepts that, if: (a) the Certificate or the Applicant is identified as a source of Suspect Code, (b) the authority to request the Certificate cannot be verified, or (c) the Certificate is revoked for reasons other than Subscriber request (e.g. as a result of Key Compromise, discovery of malware, etc.), then the CA is authorized to share information about the Applicant, signed application, Certificate, and surrounding circumstances with other CAs or industry groups, including the CA/Browser Forum.

4.12 Compliance with Industry Standards: Subscriber acknowledges and accepts that the GlobalSign may modify the Subscriber Agreement when necessary to comply with any changes in the Minimum Requirements for the Issuance and Management of Publicly-Trusted Code Signing Certificates, published at https://aka.ms/csbr or the Baseline Requirements.

4.13 Domain Control for SSL/TLS Certificate: The Subscriber acknowledges and asserts that's/he has control of the domain's) or IP Address listed in the SubjectAltName's) for which's/he is applying for the SSL/TLS Certificate. Should control cease for any domain's), the Subscriber acknowledges that's/he must promptly inform GlobalSign in accordance with the obligations of the 'Reporting and Revocation' section below.

4.14 Email Control for PersonalSign Certificate: The Subscriber acknowledges and asserts that's/he have control of the e-mail address for which they are applying for a PersonalSign Certificate. Should control cease for any e-mail address's), the Subscriber acknowledges that's/he must promptly inform GlobalSign in accordance with the obligations of the 'Reporting and Revocation' section below.

4.15 Key Generation and Usage: Where Key Pairs are generated by the Subscriber or the Certificate Requester, trustworthy systems must be used to generate Key Pairs, in which case, the following terms also apply:
1. Key Pairs must be generated using a platform recognized as being fit for such purpose. In the case of PDF Signing for Adobe CDS, AATL secure email and document signing, and EV Code Signing, this must be FIPS 140-2 Level 2 compliant,
2. A key length and algorithm must be used which is recognized as being fit for the purpose of Digital Signature,
3. The Subscriber shall ensure that the Public Key submitted to GlobalSign correctly corresponds to the Private Key used.

Where Key Pairs are generated in hardware (as required by the CPS):
1. The Subscriber must maintain processes, including, without limitation, changing of activation data, that assure that each Private Key within a hardware security module (HSM) or token can be used only with the knowledge and explicit action of the "Certificate Custodian",
2. The Subscriber must ensure that the Certificate Custodian has received security training appropriate for purposes for which the Certificate is issued, and
3. Certificate Custodians undertake to take all reasonable measures necessary to maintain sole control of, keep confidential, and properly protect at all times the Private Key that corresponds to the Public Key to be included in the requested Certificate, as well as any associated authentication mechanism to access the key (e.g., password to a token or HSM).

For Code Signing Certificates, Subscriber must use one of the following methods to generate and protect their Code Signing Certificate Private Keys. GlobalSign recommends Subscribers use method 1 or 2 over method 3:
1. A Trusted Platform Module (TPM) that generates and secures a key pair and that can document the Subscriber's private key protection through a TPM key attestation.
2. A hardware crypto module with a unit design form factor certified as conforming to at least FIPS 140 Level 2, Common Criteria EAL 4+, or equivalent.
3. Another type of hardware storage token with a unit design form factor of SD Card or USB token (not necessarily certified as conformant with FIPS 140 Level 2 or Common Criteria EAL 4+).

For EV Code Signing Certificates, Subscriber must use one of the following methods to generate and protect their EV Code Signing Certificate Private Keys.
1. A hardware security module (HSM) certified as conforming to FIPS 140-2 Level 2 or higher.
2. A hardware storage token with a unit design form factor of USB token FIPS 140-2 Level 2 or higher.

At any time during the application and life cycle of the Certificate, Subscriber must be able to, on request of GlobalSign, present proof that the Key Pair associated with the Certificate (request) is stored on a cryptographic device that meets the requirements of FIPS 140-2 Level 2 (or equivalent). Failure to provide such evidence might result in revocation of the Certificate.

The Subscriber also warrants that it will keep the token physically separate from the device that hosts the code signing function until a signing session is begun.

For Qualified Certificates, Subscriber keys must be generated and stored within a certified Qualified Signature Creation Device (QSCD) that meets the requirements laid down in Annex II of Regulation (EU) No 910/2014. The Subscriber agrees to use the Certificate only within a QSCD which has either been supplied or approved in writing by GlobalSign and the QSCD certification status must be monitored by the Subscriber and appropriate measures must be taken if the certification status of the QSCD changes.

4.16 NAESB Certificates

Subscribers for NAESB Certificates acknowledge their understanding of the following obligations of the NAESB Wholesale Electric Quadrant Business Practice Standards WEQ-012 (the "WEQ PKI Standards":
Subscribers participating in the WEQ PKI Standards shall be required to be registered in the NAESB EIR and furnish proof that they are an entity authorized to engage in the wholesale electricity industry. Entities or organizations that may require access to applications using authentication specified under the WEQ PKI Standards, but do not qualify as a wholesale electricity market participant (e.g., regulatory agencies, universities, consulting firms, etc.) must register.

Registered end entities and the user community they represent shall be required to meet to all end entity obligations in the WEQ PKI Standards.

Subscriber organization certifies to GlobalSign that it has reviewed and acknowledges the following WEQ PKI Standards:

4.16.1. Subscriber acknowledges the electric industry's need for secure private electronic communications that facilitate the following purposes:
*Privacy: The assurance to an entity that no one can read a particular piece of data except the receiver's) explicitly intended;
*Authentication: The assurance to one entity that another entity is who he/she/it claims to be;
*Integrity: The assurance to an entity that data has not been altered (intentionally or unintentionally) between "there" and "here,"" or between "then" and "now"; and
*Non-Repudiation: A party cannot deny having engaged in the transaction or having sent the electronic message.

4.16.2 Subscriber acknowledges the industry's endorsement of Public Key cryptography which utilizes Certificates to bind a person's or computer system's Public Key to its entity and to support symmetric encryption key exchange.

4.16.3 Subscriber has reviewed the WEQ PKI Standards with respect to industry guidelines for establishing a trusted PKI.

4.16.4 Subscriber has evaluated GlobalSign's CPS in light of those industry standards.

If applicable, Subscribers shall be obligated to register their legal business identification and secure an "Entity Code" that will be published in the NAESB EIR and used in all Subscriber applications submitted by, and Certificates issued to, that end entity. In complying with the WEQ-012 requirements, when issuing Certificates for use within the energy industry for other than WEQ-012 applications, ACAs must comply with the provisions of the WEQ PKI Standards, except provisions in WEQ-012.12.1.9, WEQ-012-1.3.3, and WEQ-012.1.4.3, which require end entity registration within the NAESB EIR.

Subscribers shall also be required to comply with the following requirements:
1. Protect their Private Keys from access by other parties.
2. If applicable, identify, through the NAESB EIR, that they have selected GlobalSign to use as their ACA.
3. Execute all agreements and contracts with GlobalSign necessary for GlobalSign to issue Certificates to the end entity for use in securing electronic communications.
4. Comply with all obligations required and stipulated by GlobalSign in its CPS, e.g., Certificate application procedures, Applicant identity proofing/verification, and Certificate management practices.
5. Confirm that it has a Certificate management program, has trained all affected employees in that program, and has established controls to ensure compliance with that program. This program shall include, but is not limited to:
6. Certificate Private Key security and handling policy(ies)
7. Certificate revocation policy(ies)
8. Identify the type of Subscriber (I.e., individual, role, device or application) and provide complete and accurate information for each Certificate Request.

5.0 Consent to Publish Information

By providing personal information when applying for a Certificate, Subscriber consents to GlobalSign's disclosure of this information publicly by (i) embedding the information issued in the Certificate and (ii) publishing the Certificate in Certificate Transparency (CT) logs.

6.0 GlobalSign Limited Warranty

EXCEPT TO THE EXTENT PROHIBITED BY LAW OR AS OTHERWISE PROVIDED HEREIN, GLOBALSIGN DISCLAIMS ALL WARRANTIES INCLUDING ANY WARRANTY OF MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE.

TO THE EXTENT GLOBALSIGN HAS ISSUED AND MANAGED THE CERTIFICATE IN ACCORDANCE WITH THE BASELINE REQUIREMENTS AND THE CPS, GLOBALSIGN SHALL NOT BE LIABLE TO THE SUBSCRIBER, RELYING PARTY OR ANY THIRD PARTIES FOR ANY LOSSES SUFFERED AS A RESULT OF USE OR RELIANCE ON SUCH CERTIFICATE. OTHERWISE, GLOBALSIGN'S LIABILITY TO THE SUBSCRIBER, RELYING PARTY OR ANY THIRD PARTIES FOR ANY SUCH LOSSES SHALL IN NO EVENT EXCEED ONE THOUSAND DOLLARS ($1,000) PER CERTIFICATE; PROVIDED HOWEVER THAT THE LIMITATION SHALL BE TWO THOUSAND DOLLARS ($2,000) PER CERTIFICATE FOR AN EV CERTIFICATE OR AN EV CODE SIGNING CERTIFICATE.

THIS LIABILITY CAP LIMITS DAMAGES RECOVERABLE OUTSIDE OF THE CONTEXT OF THE GLOBALSIGN WARRANTY POLICY. AMOUNTS PAID UNDER THE WARRANTY POLICY ARE SUBJECT TO THEIR OWN LIABILITY CAPS.

IN NO EVENT SHALL GLOBALSIGN SHALL BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES, OR FOR ANY LOSS OF PROFITS, LOSS OF DATA OR OTHER INDIRECT, INCIDENTAL, CONSEQUENTIAL DAMAGES ARISING FROM OR IN CONNECTION WITH THE USE, DELIVERY, RELIANCE UPON, LICENSE, PERFORMANCE OR NON PERFORMANCE OF CERTIFICATES, DIGITAL SIGNATURES OR ANY OTHER TRANSACTIONS OR SERVICES OFFERED OR CONTEMPLATED BY THIS SUBSCRIBER AGREEMENT.

THIS LIABILITY LIMITATION SHALL BE THE SAME REGARDLESS OF THE NUMBER OF DIGITAL SIGNATURES, TRANSACTIONS, OR CLAIMS RELATED TO SUCH CERTIFICATE.

7.0 Term and Termination

This Agreement shall terminate upon the earliest of:
*The expiration date of the Certificate issued to the Subscriber either directly, indirectly or through a MSSL or ePKI service that has not yet expired; or
*Failure by the Subscriber to perform any of its material obligations under this Agreement if such breach is not cured within five (5) days after receipt of notice thereof from GlobalSign.

8.0 Effect of Termination

Upon termination of this Agreement for any reason, GlobalSign may revoke the Subscriber's Certificate in accordance with GlobalSign procedures. Upon revocation of the Subscriber's Certificate, all authority granted to the Subscriber pursuant to Section 2 shall terminate. Such termination shall not affect Sections 4, 5, 6 and 9 of this Agreement, which shall continue in full force and effect to the extent necessary to permit the complete fulfillment thereof.

9.0 Miscellaneous Provisions

9.1 Governing Law and Venue

If you placed your order with GMO GlobalSign Limited, this Agreement shall be governed by, construed under and interpreted in accordance with the laws of England and Wales without regard to its conflict of law provisions. Venue shall be in the courts of England.

If you placed your order with GMO GlobalSign, Inc., this Agreement shall be governed by, construed under and interpreted in accordance with the laws of the State of New Hampshire U'S.A. without regard to its conflict of law provisions. Venue shall be in the courts of the New Hampshire State.

If you placed your order with GMO GlobalSign Pte. Ltd., this Agreement shall be governed by, construed under and interpreted in accordance with the laws of Singapore without regard to its conflict of law provisions. Venue shall be in the courts of Singapore.

If you placed your order with GMO GlobalSign Certificate Services Pvt. Ltd, this Agreement shall be governed by, construed under and interpreted in accordance with the laws of India and the related State laws without regard to its conflict of law provisions. Venue shall be in the courts of India.

If you placed your order with GMO GlobalSign Russia LLC, this Agreement shall be governed by, construed under and interpreted in accordance with the law of Russian Federation without regard to its conflict of law provisions. Venue shall be in the courts of Russian Federation.

If you placed your order with GMO GlobalSign Philippines (GSPH), this Agreement shall be governed by, construed under and interpreted in accordance with the law of the Republic of the Philippines without regard to its conflict of law provisions. Venue shall be exclusively in the courts of Makati City, Philippines.

9.2 Binding Effect

Except as otherwise provided herein, this Agreement shall be binding upon, and inure to the benefit of, the successors, executors, heirs, representatives, administrators and assigns of the parties hereto. Neither this Agreement not the Subscriber's rights in the Certificate shall be assignable by the Subscriber. Any such purported assignment or delegation shall be void and of no effect and shall permit GlobalSign to terminate this Agreement.

9.3 Entire Agreement

This Agreement, along with all documents referenced herein, any product or service agreement, and the reseller agreement (if you are a reseller) constitute the entire agreement between the parties and supersedes any prior oral or written agreements, commitments, understandings, or communications with respect to the subject matter of this Agreement.

9.4 Severability

If any provision of this Agreement, or the application thereof, shall for any reason and to any extent, be invalid or unenforceable, the remainder of this Agreement and application of such provision to other persons or circumstances shall be interpreted so as best to reasonably effect the intent of the parties hereto. IT IS EXPRESSLY UNDERSTOOD AND AGREED THAT EACH AND EVERY PROVISION OF THIS AGREEMENT WHICH PROVIDES FOR A LIMITATION OF LIABILITY, DISCLAIMER OF WARRANTIES OR EXCLUSION OF DAMAGES IS INTENDED BY THE PARTIES TO BE SEVERABLE AND INDEPENDENT OF ANY OTHER PROVISION AND TO BE ENFORCED AS SUCH.

9.5 Notices

Whenever Subscriber desires or is required to give any notice, demand, or request to GlobalSign with respect to this Agreement, each such communication shall be in writing and shall be effective only if it is delivered by a courier service that confirms delivery in writing or mailed, certified or registered mail, postage prepaid, return receipt requested, addressed to GlobalSign at one of our International offices as listed at http://www.globalsign.com/company/contact.htm, Attention: Legal Department. Such communications shall be effective when they are received.

9.6 Privacy; Use of third-party databases

GlobalSign shall follow the privacy policy posted on its website when receiving and using information from Subscriber. GlobalSign may amend the privacy policy at any time by posting the amended privacy policy on its website.

By providing personal information when applying for a Certificate, Subscriber consents to GlobalSign's processing, disclosure and transfer of this information on a global basis to its affiliates, agents and subcontractors as necessary to validate and issue a Certificate, including processing, disclosure and transfer to countries that may have data protection laws that are less protective than those in the country where Subscriber is located.

For natural persons, GlobalSign may validate items such as name, address and other personal information supplied during the application process against appropriate third party databases. By entering into this Agreement, the Subscriber consents to such checks being made. In performing these checks, personal information provided by the Subscriber may be disclosed to registered credit reference agencies, which may keep a record of that information. Such check is done only to confirm identity, and as such, a credit check is not performed. The Subscriber's credit rating will not be affected by this process.

If you placed your order with GMO GlobalSign Russia LLC, GlobalSign may, for natural persons, validate items such as name, address and other personal information supplied during the application. By entering into this Agreement, the Subscriber consents to their personal data being processed by GlobalSign in the following ways: collecting, classifying, processing, storing, editing, using, depersonalizing, blocking and deleting, as stated by Russian Federal Law FZ-No.152 at 27.07.2006, as well as transferring to third parties in cases established by regulations of the higher authorities and the law.

If you placed your order with GMO GlobalSign Philippines (GSPH), GlobalSign may, for natural persons, validate items such as name, address and other personal information supplied during the application. By entering into this Agreement, the Subscriber consents to their personal data being processed by GlobalSign in the following ways: collecting, classifying, processing, storing, editing, using, depersonalizing, blocking and deleting, as stated by Republic Act 10173 or the Philippine Data Privacy Act of the 2012, as well as transferring to third parties in cases established by regulations of the higher authorities and the law.

9.7 Trade Names, Logos

By reason of this Agreement or the performance hereof, Subscriber and GlobalSign shall acquire no rights of any kind in any trademark, brand name, logo or product designation of the other party and shall not make any use of the same for any reason except as otherwise authorized in writing by the party which owns all rights to such trademarks, trade names, logos or product designation.

10.0 Customer Support

The Subscriber must notify GlobalSign through any of our international offices listed on http://www.globalsign.com/company/contact.htm immediately if there is an error in the Certificate. If Subscriber fails to do so within seven (7) days from receipt, the Certificate shall be deemed accepted.

GlobalSign shall provide refunds pursuant to the "GlobalSign Refund Policy" published at http://www.globalsign.com/repository/

[V 3.9 03-25-19]

By clicking “I agree” below:

  • I represent that I am the business/vetting contact named above, and I am authorized to provide this information on behalf of the organization enrolling in the Service (the “Customer”) and that all information I have provided is accurate and truthful.
  • I further represent and warrant that I am duly authorized to accept the Agreement for Digital Signing Service (the “Agreement”) on behalf of the Customer and to bind the Customer to the terms of the Agreement.
  • I further represent and warrant that I am duly authorized to accept the Subscriber Agreement at https://www.globalsign.com/en/repository/ (as may be updated from time to time) on behalf of the Customer for every certificate the Customer receives from the service, and that the Customer shall be legally responsible for its employees’ compliance with the terms that are applicable to “Subscribers”.
  • I have read and understand the Test Certificate Acknowledgement above and further represent and warrant that I am duly authorized to accept the Test Certificate Acknowledgement on behalf of the Customer.