18.11.2012 Views

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

as a termination of this CP unless this CP is explicitly terminated by a separate resolution of the<br />

<strong>Raytheon</strong> CISO.<br />

This CP shall survive any termination of a <strong>Raytheon</strong> CA issuing certificates in accordance with<br />

policies set forth in this CP. The requirements of this CP remain in effect through the end of the<br />

archive period for the last certificate issued.<br />

9.10.3 Effect of Termination and Survival<br />

Upon termination of this CP, CAs cross certified with or subordinate to <strong>Raytheon</strong> are<br />

nevertheless bound by its terms for all <strong>Certificate</strong>s issued for the remainder of the validity<br />

periods of such <strong>Certificate</strong>s. The following sections of this CP shall survive the termination or<br />

expiration of this CP: 2.1.1, 2.2, 5.4, 5.5, 6.2-6.4, 6.8, 9.2-9.4, 9.7-9.10, 9.13-9.16.<br />

The responsibilities for protecting business confidential and personal information and<br />

<strong>Raytheon</strong>’s intellectual property rights shall survive termination of this CP.<br />

<strong>Raytheon</strong>’s right, title, and interest in all of its intellectual property rights, including owernship of<br />

any public key certificates and private keys issued pursuant to this CP shall survive termination<br />

of this CP.<br />

9.11 Individual Notices and Communications with Participants<br />

Unless otherwise specified by agreement between the parties, <strong>Raytheon</strong> shall use commercially<br />

reasonable methods to communicate with cross-certified or subordinate CAs, taking into<br />

account the criticality and subject matter of the communication.<br />

The CA Operational Authority, RA or TA may be removed from their duties by their supervisor<br />

and/or an authorized individual. Notice is effective when given; oral notification shall be<br />

confirmed in writing.<br />

If the termination is for convenience, contract expiration, re-organization, or other non-security<br />

related reason, and provisions have been made to continue compromise recovery within the<br />

timeframes specified in the <strong>Raytheon</strong> Disaster Recovery Plan (including destruction or<br />

continued protection of signing key), compliance and security audit, archive, and data recovery<br />

services, then neither the terminated CAs certificate, nor certificates signed by that CA, need to<br />

be revoked.<br />

If provisions for maintaining these services cannot be made, then the CA termination shall be<br />

handled as a CA compromise in accordance with Sections 5.7.3 and 5.7.4 above.<br />

Prior to CA termination, CAs shall provide archived data to a RPMA approved <strong>Raytheon</strong><br />

archival facility.<br />

9.12 Amendments<br />

9.12.1 Procedure for Amendment<br />

The <strong>Raytheon</strong> PMA shall review the CP and CPS at least once every year. Additional reviews<br />

may be enacted at any time at the discretion of the RPMA or at the request of the <strong>Raytheon</strong><br />

CISO.<br />

If the RPMA wishes to recommend amendments or corrections to the CP or CPS, such<br />

modifications shall be voted on by members of the RPMA following procedures documented in<br />

the <strong>Raytheon</strong> <strong>PKI</strong> PMA Charter for Operations. Following approval of any modifications, public<br />

notification of amendments shall be made.<br />

81 7/25/2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!