Unless otherwise stated in legal notices elsewhere on this World Wide Web server, any person is hereby authorized to view, copy, print and distribute any document published by Ericsson on its WWW server provided that it is:
- for personal use
- for non-commercial use
- for information purposes,
- and reference is made to Ericsson when the document is used.
Note that any product, process or technology described in a document on this server may be subject of other Intellectual Property Rights owned by Telefonaktiebolaget LM Ericsson or any of its subsidiaries and not licensed hereunder. The same may apply to Intellectual Property Rights owned by others.
Information on this server is provided “as is” without any warranty of any kind, either express or implied, including but not limited to, the implied warranties of merchantability, fitness for a particular purpose, or non-infringement.
The information herein may include technical inaccuracies or typographical errors. Changes may periodically be made to the information and will be incorporated in new editions of this document. Telefonaktiebolaget LM Ericsson may make improvements or changes in products and programs described in this publication at anytime without notice.
Certificate value statement
The purpose of this Certificate Value Statement (CVS) is to establish the minimum requirements for the issuing and use of electronic signatures within Ericsson. This CVS thus states the lowest level of administrative and security requirements in order to obtain digital signatures of different legal and organizational value.
The certificates issued in accordance with this CVS are typically suitable for verifying the identity of entities and the authenticity of digital documents and other information objects in connection with information services. Certificates issued in accordance with this CVS may be suitable for a wide range of applications primarily focusing on the following main classes of security services:
- Non-repudiation: the party relying on the certificate can be confident that their counterpart cannot deny an exchange of information.
- Authentication (including authentication of subscribers identity and message integrity).
- Confidentiality: unauthorized persons cannot gain access to confidential information or classified systems.
Publisher: Helena Norrman, Senior Vice President, Chief Communications Officer and Head of Group Function Communications
Our Enterprise Security
Please refer to the Enterprise Security document, which is intended to provide an overview of how Ericsson addresses the different aspects of our Enterprise Security. View the document here.