TR ZU 20/2011 is the Technical Regulation (TR) of Eurasian Economic Union (EAEU) for Electromagnetic compatibility of technical means. This negative certificate from EAC confirms that Wibu-Systems' hardware dongles (WibuKey and CmDongle) do not fall within the scope of TR ZU 20/2011.
The primary aim of the EC Regulation 1907/2006 on the Registration, Evaluation and Authorisation of Chemicals (REACH) regulation is to protect the environment and human health within the EU from any adverse effects resulting from the manufacture, import or use of chemicals.
TR ZU 37/2016 is the Technical Regulation (TR) of Eurasian Economic Union (EAEU) on limiting the use of hazardous substances in products of electrical engineering and radio electronics, analogous to EU RoHS (2011/65/EU) . This declaration from EAC confirms that Wibu-Systems' hardware dongles (WibuKey and CmDongle) comply with this technical regulation.
The United States Environmental Protection Agency (EPA), which is considered the equivalent of the European Chemicals Agency (ECHA), has finalized the Toxic Substances Control Act (TSCA) Section 6 (h) rules in January 2021 for persistent, bioaccumulative and toxic (PBT) substances. This declaration confirms that Wibu-Systems' hardware dongles (WibuKey and CmDongle) comply with the actual regulation.
ISO 9001 is defined as the international standard that specifies requirements for a quality management system (QMS). Organizations use the standard to demonstrate the ability to consistently provide products and services that meet customer and regulatory requirements. The standard is based on the plan-do-check-act methodology and provides a process-oriented approach to documenting and reviewing the structure, responsibilities, and procedures required to achieve effective quality management in an organization.
ISO/IEC 27001 is an international standard on how to manage information security. It details requirements for establishing, implementing, maintaining and continually improving an information security management system (ISMS) – the aim of which is to help organizations make the information assets they hold more secure.
The Federal Information Processing Standard (140-x) specifies the security requirements that will be satisfied by a cryptographic module, providing four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure design and implementation of a cryptographic module, include specification; ports and interfaces; roles, services, and authentication; finite state model; physical security; operational environment; cryptographic key management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self-tests; design assurance; and mitigation of other attacks.