Publication & Communication

This policy defines the communication channels, publication obligations, and update time-intervals that DDSign uses to reach its User Community, ensuring that all Subscribers, Relying Parties, and the public receive timely and accessible information.

Document Reference: CENT-ECSP-PCP-001 · Version 1.0

1. Purpose and Scope

1.1 Purpose

This document defines the communication channels, publication obligations, and update time-intervals that the ddsign Electronic Certification Service Provider (E-CSP), operated by Centric Limited, uses to reach its User Community. It demonstrates that:

  1. The modes of communication selected by the E-CSP are reasonable and sufficient to reach a majority of the User Community, including Subscribers, Relying Parties, and the general public.
  2. All updates to published information are performed within the time-intervals established and committed to by the E-CSP.

1.2 Scope

This policy covers all communications from the ddsign E-CSP to the User Community, including:

  • Publication of governance documents (CPS, CP, PKI Disclosure Statement, Subscriber Agreement, Relying Party Agreement, and related policies).
  • Publication of certificate status information (Certificate Revocation Lists and OCSP responses).
  • Notification of material changes to policies, practices, or service terms.
  • Security incident and compromise notifications.
  • Service availability and maintenance notifications.
  • Regulatory and compliance disclosures.

1.3 Definitions

TermDefinition
User CommunityThe collective body of all parties that interact with or rely upon the ddsign E-CSP, including Subscribers, Relying Parties, applicants, the Communications Authority of Kenya, and the general public.
SubscriberA natural person who holds or has applied for a digital certificate issued by the ddsign CA.
Relying PartyAny person or entity that relies on a certificate issued by the ddsign CA to verify a digital signature.
PublicationThe act of making information available through the E-CSP's designated communication channels.
NotificationA targeted communication sent directly to affected individuals or organisations to inform them of a specific event or change.

2. Communication Channels

The ddsign E-CSP employs multiple, complementary communication channels to ensure that information reaches the broadest possible segment of the User Community. No single channel is relied upon exclusively; the combination provides redundancy and maximises reach.

2.1 Channel Inventory

Channel Type Audience Justification
ddsign Website
ddsign.app
Pull (self-service) All: Subscribers, Relying Parties, general public Primary digital presence. All governance documents and policies published here. Accessible 24/7 from any internet-connected device without login. Indexed by search engines for discoverability.
PKI Repository
pki.ddsign.app
Pull (automated) Relying Parties, auditors Technical repository for CRL, OCSP endpoint, and CA certificates. Relying party software queries this automatically during every certificate validation, ensuring status reaches 100% of active transactions.
Email Notifications Push (targeted) Registered Subscribers Every Subscriber provides a verified email. Most direct channel for individual notifications. Delivery receipts and bounce handling confirm reach.
In-App Notifications Push (targeted) Authenticated Subscribers Displayed on the ddsign dashboard at login. Ensures actively-using Subscribers see critical updates at the point of use. Supplements email.
SMS Notifications Push (critical only) Subscribers with mobile number Used for high-urgency alerts (key compromise, outages). Reaches users independent of internet connectivity. Reserved for critical communications to avoid alert fatigue.
CRM Platform
sand-social.com
Internal (support) Support staff, operations All inbound Subscriber emails to support@ddsign.ae are tracked in the CRM. All interactions and support correspondence are documented, providing a centralised audit trail and enabling response-time monitoring.

2.2 Reasonableness Assessment

The combination of channels is designed to reach a majority of the User Community:

  • Public website: Reaches all internet users without prerequisite. Governance documents are indexed by search engines, extending discoverability.
  • PKI repository: Reaches relying party applications automatically. Every certificate validation triggers a CRL or OCSP lookup, reaching 100% of active relying party transactions.
  • Email: Reaches 100% of registered Subscribers at their verified address. Delivery success rates are monitored; bounced addresses trigger alternative-channel follow-up.
  • In-app notifications: Secondary path for users whose email may be delayed or filtered.
  • SMS: Independent of internet connectivity for critical alerts.
  • CRM (sand-social.com): Ensures every inbound Subscriber communication via support@ddsign.ae is documented, tracked, and responded to within committed timeframes.

Together, these channels cover pull-based access (website, repository) for the general public and relying parties, and push-based delivery (email, in-app, SMS) for registered Subscribers. This layered approach ensures that no single point of failure can prevent the User Community from receiving essential communications.

3. Publication Obligations and Time-Intervals

The following tables define the information the E-CSP is obligated to publish, the channels used, the committed time-intervals, and the governing reference.

3.1 Governance Document Publications

Information Channel(s) Time-Interval
CPSWebsite, PKI RepositoryWithin 24 hours of approval
Certificate Policy (CP)Website, PKI RepositoryWithin 24 hours of approval
PKI Disclosure StatementWebsiteWithin 24 hours of approval
Subscriber AgreementWebsiteWithin 24 hours; 30-day advance notice for material changes
Relying Party AgreementWebsiteWithin 24 hours of approval
Data Privacy PolicyWebsiteWithin 24 hours of approval
Certificate ProfilesPKI RepositoryWithin 24 hours of approval

3.2 Certificate Status Publications

Information Channel Time-Interval
Certificate Revocation List (CRL) PKI Repository (CRL Distribution Point) Scheduled: every 24 hours. On-event: within 1 hour of revocation.
OCSP Responses PKI Repository (OCSP Responder) Real-time on each query. Response validity: 4 hours. Status updated within 1 hour of revocation.
CA Certificates PKI Repository, Website Immediately upon generation. At least 30 days before old CA certificate expiry during rollover.

3.3 Notifications to Subscribers

Event Channel(s) Time-Interval
Certificate issuanceEmail, In-AppImmediately upon issuance
Certificate expiry warningEmail, In-App60, 30, 14, and 7 days before expiry
Certificate revocationEmail, In-AppImmediately upon revocation
Material policy changeEmail, In-App, Website bannerAt least 30 days before effective date
Security incident / CA compromiseEmail, SMS, In-App, WebsiteWithin 24 hours of confirmation
Planned maintenanceEmail, In-App, WebsiteAt least 72 hours before scheduled window
Unplanned outageEmail, In-App, Status pageWithin 1 hour of detection; updates every 2 hours
Privacy breachEmail, In-AppWithout undue delay (72 hours to regulator)

4. Advance Notice for Material Changes

4.1 What Constitutes a Material Change

A change is considered material if it:

  • Alters the obligations or rights of Subscribers or Relying Parties.
  • Changes the identity proofing or verification requirements.
  • Modifies the certificate profile, key usage, or validity period.
  • Introduces, removes, or changes fees.
  • Changes the data processing purposes, categories, or third-party disclosures.
  • Alters the revocation grounds or procedures.
  • Changes the governing law or dispute resolution mechanism.

4.2 Notice Period and Procedure

For material changes, the E-CSP shall:

  1. Publish the proposed new version on the website, clearly marked as forthcoming with the effective date.
  2. Send a notification to all registered Subscribers via email and in-app notification, summarising the change and linking to the full text.
  3. Allow a minimum of thirty (30) days between notification and the effective date.
  4. Provide a mechanism for Subscribers to raise objections or questions during the notice period.

4.3 Non-Material Changes

Non-material changes (typographical corrections, formatting, clarification without altering effect) may be published immediately without advance notice, but shall be reflected in the version history of the affected document.

5. Publication Infrastructure

5.1 Website and PKI Repository Availability

  • Uptime target: 99.5% availability per calendar month, measured at the network edge.
  • Redundancy: Hosted on infrastructure with automated failover. CRL and OCSP endpoints served from multiple points.
  • TLS protection: All endpoints served over TLS 1.2 or higher.
  • Monitoring: Automated uptime monitoring with alerting. Downtime exceeding 30 minutes triggers incident response and status page update.

5.2 CRM and Subscriber Correspondence Tracking

All inbound and outbound Subscriber communications are documented and tracked through the sand-social.com CRM platform:

  • Inbound channel: All emails from Subscribers sent to support@ddsign.ae are automatically ingested into the CRM, creating a ticketed record with timestamp, sender, and full message content.
  • Interaction history: Every interaction with a Subscriber -- including email exchanges, support requests, certificate lifecycle events, and status updates -- is logged against the Subscriber's CRM record, providing a complete communication history.
  • Audit trail: The CRM maintains an immutable log of all communications, providing verifiable evidence that Subscriber queries were received and responded to within committed timeframes.
  • Response-time monitoring: The CRM tracks time-to-first-response and time-to-resolution for each interaction, enabling compliance demonstration.

5.3 Email Notification Infrastructure

  • Sender authentication: SPF, DKIM, and DMARC records configured for the ddsign.app sending domain.
  • Bounce handling: Hard bounces flagged within 24 hours. Alternative channel (in-app or SMS) used if email delivery fails.
  • Delivery logging: All outbound notifications logged with timestamp, recipient, subject, and delivery status.

5.4 Version Control of Published Documents

  • Every published document includes a version number and effective date.
  • A version history table within each document shows all prior versions and change summaries.
  • Prior versions are archived and remain accessible for the retention period defined in the CPS.

6. Compliance Monitoring

6.1 Automated Monitoring

  • CRL freshness: Automated checks verify the CRL is re-issued within the 24-hour cycle. Alert raised if nextUpdate is within 2 hours of expiry without renewal.
  • OCSP responder: Synthetic queries issued at regular intervals to confirm operational status.
  • Website availability: External uptime monitoring confirms endpoints are reachable and serving expected content.

6.2 Manual Reviews

  • Quarterly review: The Policy Authority reviews publication logs to confirm governance documents were published within the 24-hour commitment.
  • Notification audit: Quarterly sample of outbound notifications reviewed for delivery success and timeliness.
  • Annual audit: The E-CSP compliance audit verifies publication timeliness and communication channel effectiveness.

6.3 Evidence Retention

The following evidence is retained for audit purposes:

  • Publication log: date, time, document published, channel, responsible officer.
  • Notification log: date, time, recipient (or count), channel, subject, delivery status.
  • CRL issuance log: issuance timestamp, serial number, nextUpdate value.
  • OCSP responder logs: query timestamp, certificate queried, response status.
  • Website deployment log: deployment timestamp, content changed, deploying officer.
  • CRM interaction logs: full correspondence trail per Subscriber, response times.

All logs are retained for a minimum of seven (7) years in accordance with the CPS and the Kenya Information and Communications Act.

7. Roles and Responsibilities

Role Responsibility
Policy AuthorityApproves governance documents and material changes. Authorises publication. Conducts quarterly compliance reviews.
CA OperationsPublishes CRL on schedule and on-event. Monitors OCSP responder. Publishes CA certificates on rollover.
Platform TeamDeploys content to website and PKI repository. Maintains email, in-app, and CRM notification infrastructure.
Registration AuthoritySends individual Subscriber notifications (issuance, expiry, revocation) through the platform.
Incident Response TeamTriggers security incident and compromise notifications across all channels within committed time-intervals.

8. Cross-References

This document should be read in conjunction with:

Document Relevance
Certification Practice Statement (CPS)Section 2 defines the overarching publication obligations this policy operationalises.
Certificate Policy (CP)Defines the policy OIDs and assurance levels communicated through published documents.
PKI Disclosure Statement (PDS)The public summary that is itself a publication obligation of this policy.
Subscriber AgreementMaterial change notice provisions reference this policy's communication commitments.
Subscriber Data Privacy PolicyPrivacy breach notification time-intervals are governed by this policy.
Incident Response PlanInternal escalation feeds into the external notification time-intervals in Section 3.3.
Change Management ProcedureDocument changes follow the change management workflow before publication.