Certificate Revocation Clause Samples

The Certificate Revocation clause outlines the conditions and procedures under which a previously issued certificate can be invalidated or cancelled. Typically, this clause specifies the events that may trigger revocation, such as misuse, compromise, or expiration of the certificate, and details the process for notifying relevant parties and updating revocation lists. Its core practical function is to maintain the integrity and trustworthiness of the certification system by ensuring that invalid or compromised certificates are promptly removed from circulation, thereby reducing security risks.
POPULAR SAMPLE Copied 3 times
Certificate Revocation. Except as otherwise set forth herein, You may revoke Apple Certificates issued to You at any time. If You want to revoke the Apple Certificates used to sign Your Passes and/or issued to You for use with Your macOS Applications distributed outside of the App Store, You may request that Apple revoke these Apple Certificates at any time by emailing: ▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇@▇▇▇▇▇.▇▇▇. Apple also reserves the right to revoke any Apple Certificates at any time, in its sole discretion. By way of example only, Apple may choose to do this if: (a) any of Your Apple Certificates or corresponding private keys have been compromised or Apple has reason to believe that either have been compromised; (b) Apple has reason to believe or has reasonable suspicions that Your Covered Products contain malware or malicious, suspicious or harmful code or components (e.g., a software virus); (c) Apple has reason to believe that Your Covered Products adversely affect the security of Apple-branded products, or any other software, firmware, hardware, data, systems, or networks accessed or used by such products; (d) Apple’s certificate issuance process is compromised or Apple has reason to believe that such process has been compromised; (e) You breach any term or condition of this Agreement; (f) Apple ceases to issue the Apple Certificates for the Covered Product under the Program; (g) Your Covered Product misuses or overburdens any Services provided hereunder; or (h) Apple has reason to believe that such action is prudent or necessary. Further, You understand and agree that Apple may notify end-users of Covered Products that are signed with Apple Certificates when Apple believes such action is necessary to protect the privacy, safety or security of end-users, or is otherwise prudent or necessary as determined in Apple’s reasonable judgment. Apple’s Certificate Policy and Certificate Practice Statements may be found at: ▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/certificateauthority.
Certificate Revocation. SwissSign may, at any time and where adequate without advance notification, revoke a customer’s certificate with immediate effect for reasons such as the following: • the Certificate Holder requests SwissSign to revoke his certificate, • a SwissSign private key in the trust chain of the customer's certificate has been compromised, • the Certificate Holder does not comply with the agreed conditions and/or other applicable laws, rules and regulations. In addition, SwissSign may investigate any such incidents and take legal action if required. After revocation, the certificate becomes invalid. The Certificate Holder is liable for any damages resulting from use of a revoked certificate. SwissSign will not assume any liability for any kind of damages resulting from such use.
Certificate Revocation. The CA will revoke certificates or a Certificate issued to Subscribers: (i) upon written request (including by electronic means) of any Subscriber to whom the subject Certificate was issued; (ii) if CA becomes aware that any material fact contained in the Certificate is no long- er true; (iii) as necessary to comply with the then-current Certification Standards, Operating Standards or Substitute Operating Standards. (iv) Subscriber is in material breach of terms of its Subscriber Agreement pertaining to Security or of any Certification Standards; (v) the security of a Certificate or any associated private key or Root(s) has (or may have) been compromised; (vi) the Certificate was not properly issued under this Agreement or any applicable Certification Standards; (vii) the Certificate was issued to persons or entities identified as publishers of mali- cious software or that impersonated other persons or entities; (viii) the Certificate was issued as a result of fraud or negligence (including fraud or negligence of or within CA or a Browser Manufacturer); or (ix) a Certificate, if not revoked, will compromise the trust status of any Product(s). (x) Certificates issued to subscribers who use it to digitally sign hostile code, includ- ing spyware or other malicious software (malware) downloaded without user con- sent. (xi) if CA becomes aware that the private key has been communicated to an unau- thorized person or a non-affiliated organization. The ATC will inform the Subscriber if by any reason a certificate issued to him has been re- voked by the ATC.
Certificate Revocation. 39. Certificate Revocation can be requested by You, Us, or the PA.
Certificate Revocation. If Client’s customer’s organizational names change, if the Certificate is no longer needed, or if the corresponding Private Key may have been compromised, then an Administrator shall promptly request revocation of all Certificates affected by such change. For personal Digital Certificates, revocation should be requested if the Certificate Holder’s name or organization details are subject to change.
Certificate Revocation. 6.4.1 CP shall disable any digital certificates it provides to connect and access any services of the P3N, or connection to other CPs of the trust community, in the event of any policy violation, certificate expiration, or termination of business relations.
Certificate Revocation. DigiCert may revoke a Certificate without notice for the reasons stated in the CPS, including if DigiCert reasonably believes that: a. Customer requested revocation of the Certificate or did not authorize the issuance of the Certificate; b. Customer has breached the Agreement or an obligation it has under the CPS; c. any provision of an agreement with Customer containing a representation or obligation related to the issuance, use, management, or revocation of the Certificate terminates or is held invalid; d. Customer is added to a government prohibited person or entity list or is operating from a prohibited destination under the laws of the United States; e. the Certificate contains inaccurate or misleading information; f. the Certificate was used without authorization, outside of its intended purpose or used to sign Suspect Code; g. the Private Key associated with the Certificate was disclosed or compromised; h. the Certificate was (i) misused, (ii) used or issued contrary to law, the CPS, or Industry Standards, or (iii) used, directly or indirectly, for illegal or fraudulent purposes, such as phishing attacks, fraud, or the distribution of malware or other illegal or fraudulent purposes; i. Industry Standards or DigiCert’s CPS require Certificate revocation, or revocation is necessary to protect the rights, confidential information, operations, or reputation of DigiCert or a third party.
Certificate Revocation. If the commission finds that a CTU is repeatedly in violation of this section, and if consistent with the public interest, the commission may suspend, restrict, or revoke the registration or certificate of the CTU.
Certificate Revocation. CP shall disable any digital certificates it provides to connect and access any services of the P3N, or connection to other CPs of the trust community, in the event of any security issue, policy violation, certificate expiration, or termination of business relations. CP shall ensure that any registry entries of revoked digital certificates are updated or corrected. CP may utilize Online Certificate Status Protocol (OCSP) transactions in conjunction with or in lieu of publishing a Certificate Revocation List (CRL). Entities requesting the trust status of disabled certificates shall be notified by PA eHealth of the certificates’ status. If the CP uses a CRL to maintain disabled certificates, the CP shall make the status of disabled/untrustworthy certificates discoverable by P3N entities. CRLs shall be published and maintained by Certificate Authorities on a periodic basis of no less than once every 24 hours. CRLs shall have a defined lifespan of no more than 24 hours for which they are valid. CRLs shall list information sufficient to identify all disabled certificates which are no longer trustworthy. Digital certificates listed on a CRL shall have status indicators of either “Revoked” (irreversibly disabled) or “Hold” (reversibly disabled). 7.1 P3N hosts a Provider Directory (PD) that is accessible from the P3N system portal. 7.2 CP may provide access to the P3N PD to users, which may include clinicians, support staff, and administrative staff. 7.3 The P3N PD hosts provider information on both individual providers as well as organizations. 7.4 CP may submit both individual and organizational Health Care Provider Data to PA eHealth to be included in the P3N PD.
Certificate Revocation. After revocation, the certificate becomes invalid. The Relying Party and/or the Certificate Holder are liable for any damages resulting from use of a revoked certificate. SwissSign will not assume any liability for any kind of damages resulting from such use.