{"id":624,"date":"2019-07-05T15:53:23","date_gmt":"2019-07-05T15:53:23","guid":{"rendered":"https:\/\/www.digitalpa.net\/?page_id=624"},"modified":"2024-03-29T08:15:35","modified_gmt":"2024-03-29T08:15:35","slug":"copyright","status":"publish","type":"page","link":"https:\/\/www.digitalpa.net\/en\/copyright\/","title":{"rendered":"Copyrighted Security Protocols"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.14.4&#8243; background_enable_image=&#8221;off&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.14.4&#8243; custom_padding=&#8221;|60px||60px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.14.4&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#0C364F&#8221; header_font=&#8221;|700|||||||&#8221; header_font_size=&#8221;40px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1 style=\"text-align: center;\">Copyrighted Security Protocols<\/h1>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#c00000&#8243; divider_weight=&#8221;7&#8243; admin_label=&#8221;Divider&#8221; _builder_version=&#8221;4.14.4&#8243; max_width=&#8221;5%&#8221; module_alignment=&#8221;center&#8221; height=&#8221;13px&#8221; custom_margin=&#8221;0px|||&#8221; custom_padding=&#8221;0px|||&#8221; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.14.4&#8243; text_font=&#8221;|300|||||||&#8221; text_font_size=&#8221;24px&#8221; text_line_height=&#8221;1.9em&#8221; text_orientation=&#8221;justified&#8221; max_width_tablet=&#8221;&#8221; max_width_phone=&#8221;100%&#8221; max_width_last_edited=&#8221;on|phone&#8221; custom_margin=&#8221;|||0px&#8221; custom_padding=&#8221;|||0px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">DigitalPA has certified with the competent bodies in Italy (SIAE) and internationally (U.S. Copyright Office) the <strong>Secure Digital Proposal \u00a9<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\">Information security is a key aspect of the digital management of Source-to-Pay.<br \/>That&#8217;s why DigitalPA owns International Certifications both for the software and the procedures management making sure the<strong> Online Procurement platform<\/strong> guarantees data secrecy during all stages of the tender management.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.14.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.14.4&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|||30%|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.digitalpa.net\/wp-content\/uploads\/digitalpa-certifications.jpeg&#8221; alt=&#8221;DigitalPA certifications&#8221; title_text=&#8221;digitalpa-certifications&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.14.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.14.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;\/wp-content\/uploads\/siae-certification.jpeg&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;SIAE Certificate of Patent&#8221; button_alignment=&#8221;left&#8221; button_text_tablet=&#8221;SIAE Certificate of Patent&#8221; button_text_phone=&#8221;SIAE Certificate of Patent&#8221; button_text_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.14.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][et_pb_button button_url=&#8221;\/wp-content\/uploads\/copyright-washington.jpeg&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;US Copyright Office Certificate&#8221; button_alignment=&#8221;left&#8221; button_text_tablet=&#8221;US Copyright Office Certificate&#8221; button_text_phone=&#8221;US Copyright Office Certificate&#8221; button_text_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.14.4&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-20px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.14.4&#8243; background_color=&#8221;#0C364F&#8221; custom_padding=&#8221;|||0|false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; make_equal=&#8221;on&#8221; custom_padding_last_edited=&#8221;on|tablet&#8221; _builder_version=&#8221;4.14.4&#8243; width=&#8221;100%&#8221; max_width=&#8221;100%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;2px|0px|0px|0px||&#8221; custom_margin_tablet=&#8221;2px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;2px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px|0px|0px|0px|true&#8221; custom_padding_tablet=&#8221;|48px||48px|true|false&#8221; custom_padding_phone=&#8221;|48px||48px|true|false&#8221; custom_css_main_element=&#8221;width: 100%;||max-width: 100%;&#8221; use_custom_width=&#8221;on&#8221; width_unit=&#8221;off&#8221; custom_width_percent=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.14.4&#8243; background_image=&#8221;https:\/\/www.digitalpa.net\/wp-content\/uploads\/secure-proposal-online-procurement.jpeg&#8221; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.14.4&#8243; custom_padding=&#8221;50px|50px|50px||false|false&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.14.4&#8243; text_text_color=&#8221;#FFFFFF&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_3_text_color=&#8221;#FFFFFF&#8221; custom_margin=&#8221;0px|0px|1%|0px&#8221; custom_margin_tablet=&#8221;0px|20px|1%|20px&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;6%|0px|0px|0px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Security across all Procurement Phases thanks to our <em>Secure Digital Proposal\u00a9<\/em><\/h3>\n<p>[\/et_pb_text][et_pb_divider color=&#8221;#0a6cb8&#8243; divider_weight=&#8221;7&#8243; _builder_version=&#8221;3.19.15&#8243; max_width=&#8221;5%&#8221; max_width_tablet=&#8221;10%&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|phone&#8221; module_alignment=&#8221;left&#8221; height=&#8221;13px&#8221; custom_margin=&#8221;0px||2%|&#8221; custom_margin_tablet=&#8221;0px|20px|2%|20px&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|phone&#8221; custom_padding=&#8221;0px|||&#8221; custom_padding_tablet=&#8221;0px|20px||20px&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_text _builder_version=&#8221;4.14.4&#8243; text_text_color=&#8221;#FFFFFF&#8221; text_orientation=&#8221;justified&#8221; max_width=&#8221;80%&#8221; max_width_tablet=&#8221;100%&#8221; max_width_phone=&#8221;&#8221; max_width_last_edited=&#8221;on|tablet&#8221; custom_padding=&#8221;0px|70px||0px&#8221; custom_padding_tablet=&#8221;0px|20px||20px&#8221; custom_padding_phone=&#8221;&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The secrecy of proposals is essential to <strong>ensure effective competition and transparency in offer assessment<\/strong>.<\/p>\n<p>Sourcing processes managed through our Online Procurement platform are protected by the security protocol<strong><em> Secure Digital Proposal \u00a9<\/em><\/strong> which ensures safety compliance, to protect both the buyer and the supplier.<\/p>\n<p>Inviolability and impossibility of modifying proposals and documents uploaded in the platform is guaranteed by an encryption procedure divided into two steps:<\/p>\n<ul>\n<li>In the first one, a sort of digital fingerprint is assigned to each file (Hash*). This happens exclusively within the terminal of each supplier sending a proposal through our proprietary software.<\/li>\n<li>In the second step, the supplier receives via email a receipt of participation containing details of the files and corresponding hash.<\/li>\n<\/ul>\n<p><em>The <strong>SHA-256 Hash<\/strong> (used in the encryption of digital signatures) is calculated with an algorithm that generates a string able to uniquely identify the digital document (<strong>a sort of file DNA<\/strong>). The string is obtained through the analysis of the contents of the document and uniquely identifies it.<\/em><\/p>\n<p>The procedure is certified nationally and internationally.<\/p>\n<p>[\/et_pb_text][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;3.19.15&#8243; height=&#8221;30px&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243; background_color=&#8221;#e5e5e5&#8243; custom_margin=&#8221;0px||0px|&#8221; custom_padding=&#8221;0px||0px|&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_cta title=&#8221;100% Secure Source-to-Pay Management &#8221; _builder_version=&#8221;4.14.4&#8243; header_level=&#8221;h1&#8243; header_font=&#8221;|700|||||||&#8221; header_text_align=&#8221;center&#8221; body_text_align=&#8221;center&#8221; use_background_color=&#8221;off&#8221; button_icon=&#8221;&#xe010;||divi||400&#8243; button_alignment=&#8221;center&#8221; background_layout=&#8221;light&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Find more about our certified Online Procurement software<\/p>\n<p>[\/et_pb_cta][et_pb_button button_url=&#8221;https:\/\/www.onlineprocurement.com\/contact-us\/&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Contact us&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.13.0&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;12&#8243; button_bg_use_color_gradient=&#8221;on&#8221; button_bg_color_gradient_start=&#8221;#0c364f&#8221; button_bg_color_gradient_end=&#8221;#004a7f&#8221; button_border_width=&#8221;0&#8243; button_border_radius=&#8221;10&#8243; button_font=&#8221;|600||on|||||&#8221; button_use_icon=&#8221;off&#8221; background_layout=&#8221;dark&#8221; custom_margin=&#8221;0px|||&#8221; custom_padding=&#8221;10px|20px|10px|20px&#8221; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; disabled_on=&#8221;off|off|on&#8221; _builder_version=&#8221;4.14.4&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row module_class=&#8221; et_pb_row_fullwidth&#8221; _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;89%&#8221; width_tablet=&#8221;80%&#8221; width_phone=&#8221;80%&#8221; width_last_edited=&#8221;on|desktop&#8221; max_width=&#8221;89%&#8221; max_width_tablet=&#8221;80%&#8221; max_width_phone=&#8221;80%&#8221; max_width_last_edited=&#8221;on|desktop&#8221; make_fullwidth=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_button button_url=&#8221;\/contacts\/&#8221; button_text=&#8221;Go to Contact Us&#8221; button_alignment=&#8221;right&#8221; _builder_version=&#8221;4.13.0&#8243; custom_button=&#8221;on&#8221; button_text_size=&#8221;14&#8243; button_text_color=&#8221;#0c364f&#8221; button_border_color=&#8221;#0c364f&#8221; button_font=&#8221;|700||on|||||&#8221; button_icon=&#8221;&#x35;||divi||400&#8243; button_icon_color=&#8221;#0c364f&#8221; animation_style=&#8221;slide&#8221; animation_direction=&#8221;right&#8221; animation_duration=&#8221;1500ms&#8221; animation_intensity_slide=&#8221;69%&#8221; saved_tabs=&#8221;all&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Copyrighted Security ProtocolsDigitalPA has certified with the competent bodies in Italy (SIAE) and internationally (U.S. Copyright Office) the Secure Digital Proposal \u00a9Information security is a key aspect of the digital management of Source-to-Pay.That&#8217;s why DigitalPA owns International Certifications both for the software and the procedures management making sure the Online Procurement platform guarantees data secrecy [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p>DigitalPA has obtained the certification from the Italian and international Certification Bodies (SIAE and Washington's Copyright Office) for the procedure of \u201cInviolability of the telematic offer \u00a9\u201d.<\/p><p>The secrecy of the telematic offer is the most sensitive aspect of an online tendering procedure. DigitalPA has obtained the certification for the software and the procedure that guarantees the absolute inviolability of the offer from the highest qualified Certification Bodies.<\/p><p>Online tender participation and \"Inviolability of the telematic offer \u00a9\":<\/p><p>The steps of the participation to a telematic tender follow a chronological sequence that guarantees the exact participation, the inviolability and the secrecy of the offers.<\/p><p>The tool for the calculation of the fingerprint of the file (Hash*) provides absolute certainty of the inviolability of each document: the calculation is made exclusively inside the terminal of the bidder, using a proprietary software and then sending via certified e-mail the receipt of participation, that contains the details of the files and the corresponding hash.<\/p><p>For further caution, the calculated Hash is transmitted to the bidder via certified e-mail in order to make impossible any substitution of the offer by the bidder or following a internal (system administrators) or external (hackers) breach of the server.<\/p><p>* The SHA-256 Hash (used in the encryption of digital signatures) is calculated with an algorithm that generates a string that identifies the digital document uniquely (DNA of the file). The string is obtained through the analysis of the contents of the document and uniquely identifies the file.<\/p>","_et_gb_content_width":"","footnotes":""},"class_list":["post-624","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Copyrighted Security Protocols - DigitalPA<\/title>\n<meta name=\"description\" content=\"Security across all Procurement Phases | Information security is a key aspect of the digital management of Source-to-Pay\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalpa.net\/en\/copyright\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Copyrighted Security Protocols - DigitalPA\" \/>\n<meta property=\"og:description\" content=\"Security across all Procurement Phases | Information security is a key aspect of the digital management of Source-to-Pay\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalpa.net\/en\/copyright\/\" \/>\n<meta property=\"og:site_name\" content=\"DigitalPA\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-29T08:15:35+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.digitalpa.net\/en\/copyright\/\",\"url\":\"https:\/\/www.digitalpa.net\/en\/copyright\/\",\"name\":\"Copyrighted Security Protocols - DigitalPA\",\"isPartOf\":{\"@id\":\"https:\/\/www.digitalpa.net\/en\/#website\"},\"datePublished\":\"2019-07-05T15:53:23+00:00\",\"dateModified\":\"2024-03-29T08:15:35+00:00\",\"description\":\"Security across all Procurement Phases | Information security is a key aspect of the digital management of Source-to-Pay\",\"breadcrumb\":{\"@id\":\"https:\/\/www.digitalpa.net\/en\/copyright\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.digitalpa.net\/en\/copyright\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.digitalpa.net\/en\/copyright\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.digitalpa.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Copyrighted Security Protocols\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.digitalpa.net\/en\/#website\",\"url\":\"https:\/\/www.digitalpa.net\/en\/\",\"name\":\"DigitalPA\",\"description\":\"Software &amp; Services for Public Authorities and Companies\",\"publisher\":{\"@id\":\"https:\/\/www.digitalpa.net\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.digitalpa.net\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.digitalpa.net\/en\/#organization\",\"name\":\"DigitalPA\",\"url\":\"https:\/\/www.digitalpa.net\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.digitalpa.net\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.digitalpa.net\/wp-content\/uploads\/logo-digitalpa-blu-rosso-orizzontale.jpg\",\"contentUrl\":\"https:\/\/www.digitalpa.net\/wp-content\/uploads\/logo-digitalpa-blu-rosso-orizzontale.jpg\",\"width\":249,\"height\":37,\"caption\":\"DigitalPA\"},\"image\":{\"@id\":\"https:\/\/www.digitalpa.net\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Copyrighted Security Protocols - DigitalPA","description":"Security across all Procurement Phases | Information security is a key aspect of the digital management of Source-to-Pay","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalpa.net\/en\/copyright\/","og_locale":"en_US","og_type":"article","og_title":"Copyrighted Security Protocols - DigitalPA","og_description":"Security across all Procurement Phases | Information security is a key aspect of the digital management of Source-to-Pay","og_url":"https:\/\/www.digitalpa.net\/en\/copyright\/","og_site_name":"DigitalPA","article_modified_time":"2024-03-29T08:15:35+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.digitalpa.net\/en\/copyright\/","url":"https:\/\/www.digitalpa.net\/en\/copyright\/","name":"Copyrighted Security Protocols - DigitalPA","isPartOf":{"@id":"https:\/\/www.digitalpa.net\/en\/#website"},"datePublished":"2019-07-05T15:53:23+00:00","dateModified":"2024-03-29T08:15:35+00:00","description":"Security across all Procurement Phases | Information security is a key aspect of the digital management of Source-to-Pay","breadcrumb":{"@id":"https:\/\/www.digitalpa.net\/en\/copyright\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalpa.net\/en\/copyright\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalpa.net\/en\/copyright\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.digitalpa.net\/en\/"},{"@type":"ListItem","position":2,"name":"Copyrighted Security Protocols"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalpa.net\/en\/#website","url":"https:\/\/www.digitalpa.net\/en\/","name":"DigitalPA","description":"Software &amp; Services for Public Authorities and Companies","publisher":{"@id":"https:\/\/www.digitalpa.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalpa.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalpa.net\/en\/#organization","name":"DigitalPA","url":"https:\/\/www.digitalpa.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalpa.net\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalpa.net\/wp-content\/uploads\/logo-digitalpa-blu-rosso-orizzontale.jpg","contentUrl":"https:\/\/www.digitalpa.net\/wp-content\/uploads\/logo-digitalpa-blu-rosso-orizzontale.jpg","width":249,"height":37,"caption":"DigitalPA"},"image":{"@id":"https:\/\/www.digitalpa.net\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.digitalpa.net\/en\/wp-json\/wp\/v2\/pages\/624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalpa.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.digitalpa.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalpa.net\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalpa.net\/en\/wp-json\/wp\/v2\/comments?post=624"}],"version-history":[{"count":53,"href":"https:\/\/www.digitalpa.net\/en\/wp-json\/wp\/v2\/pages\/624\/revisions"}],"predecessor-version":[{"id":6966,"href":"https:\/\/www.digitalpa.net\/en\/wp-json\/wp\/v2\/pages\/624\/revisions\/6966"}],"wp:attachment":[{"href":"https:\/\/www.digitalpa.net\/en\/wp-json\/wp\/v2\/media?parent=624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}