Here you will find the definitions for the classification criteria :

Probationary deposit

To protect your copyright, it is recommended to make probative deposits, to prove the existence of ownership on a given date and on an item deposited and defend your company against potential litigation . the probationary deposit involves placing an innovation under seal, kept by a trusted third party. This deposit represents the essential element to be transmitted to the beneficiary of the Escrow agreement.

 

Escrow agreement

An Escrow agreement is a specific contract which consists, for the supplier of a product or service, in entrusting to an escrow third party essential elements (software, databases, documents, etc.) for the use of this product or the provision of this service. The objective is to ensure that a third party (client, partner, etc.) has access to it, in accordance with the provisions laid down between the parties, and in particular in the event of a supplier default.
There are 2 forms of escrow:  

  • The Bipartite Escrow Agreement The agreement is signed by 2 parties (the supplier and the trusted third party). It is accompanied by a list of one or more beneficiaries.
  • The Tripartite Escrow Agreement The agreement is signed by the 3 parties (the trusted third party, the supplier, the customer)

 

Content verification

When depositing as part of an escrow, checking the content of the deposit (often code) is essential to ensure long-term maintenance of the deposit. By not checking the content of a deposit, you have no guarantee that all the elements deposited are present and usable. Different types of verification can be effectuated depending on the trusted third party chosen.

 

Web interface

A web interface is a light web interface enabling the depositor to:

  • secure the data (dubbed essential elements here above)
  • receive a certificate
  • order the escrow agreement.

All these actions can be made digitally.

 

ISO 27001

ISO / IEC 27001 is an international standard for information systems security. It specifies the requirements for information security management systems (ISMS). The objective is to protect functions and information from loss, theft or alteration, and computer systems from any intrusion and computer damage.

 

eiDAS compliant

The European standard eIDAS aims to give a legal framework to electronic exchanges taking place on the European market

It relates to :

  • electronic signature
  • electronic seals
  • electronic time stamp
  • electronic supply services
  • website authentication

 

Timestamp

With the acceleration of document scanning and the constant increase in the number of digital assets, there is also the risk of altering digital content, it can be difficult to prove the integrity of a document or of a digital asset. Therefore, the certified timestamping becomes a necessity.

A certified timestamp and secure archiving can effectively guarantee that when a digital document is created, it becomes the equivalent of an original paper document with certified creation date and time. Time-stamped documents or their copies held by you or by third parties can be compared, from the point of view of their integrity, to the original time-stamped certified and archived at a trusted third party and thus proven true.

Invoices, signed contracts, medical notes, pricing information, graphics, stock values, measurements, drawings, collaborative work efforts, strategic documents, personal data notes, can all be timestamped and archived to possess an unforgeable content and serve as an evidence for regulation and litigation purposes.