DECISION No 2/2020 OF THE JOINT COMMITTEE ESTABLISHED BY THE AGREEMENT BETWEEN THE EUROPEAN UNION AND THE SWISS CONFEDERATION ON THE LINKING OF THEIR GREENHOUSE GAS EMISSIONS TRADING SYSTEMS
of 5 November 2020
on amending Annexes I and II to the Agreement and the adoption of Linking Technical Standards (LTS) (2021/1034)
Article 1
Article 2
Article 3
Article 4
Article 5
ANNEX
Linking technical standards (LTS) pursuant to Article 3(7) of the Agreement between the European Union and the Swiss Confederation on the linking of their greenhouse gas emissions trading systems
STANDARDS FOR PROVISIONAL SOLUTION
1. Glossary
Acronym/Term |
Definition |
Allowance |
An allowance to emit one tonne of carbon dioxide equivalent during a specified period, which shall be valid only for the purposes of meeting the requirements under the EU ETS or the ETS of Switzerland. |
CH |
Swiss Confederation |
CHU |
Swiss general allowances (Term ‘CHU2’ is used as abbreviation for commitment period 2 CHU allowances) |
CHUA |
Swiss Aviation Allowance |
COP |
Common Operational Procedures jointly developed by the Parties to the Agreement to operationalise the link between the EU ETS and the ETS of Switzerland. |
ETR |
Emissions Trading Registry |
ETS |
Emissions Trading System |
EU |
European Union |
EUA |
EU General Allowance |
EUAA |
EU Aviation Allowance |
EUCR |
European Union Consolidated Registry |
EUTL |
European Union Transaction Log |
Registry |
An accounting system for allowances issued under the ETS, which keeps track of the ownership of allowances held in electronic accounts. |
SSTL |
Swiss Supplementary Transaction Log |
Transaction |
A process in a registry that includes the transfer of an allowance from one account to another account. |
Transaction log system |
The transaction log contains a record of each proposed transaction sent from one Registry to the other. |
Acronym |
Definition |
Asymmetric cryptography |
Uses public and private keys to encrypt and decrypt data. |
Certificate Authority (CA) |
Entity that issues digital certificates. |
Cryptographic key |
A piece of information that determines the functional output of a cryptographic algorithm. |
Decryption |
Reverse process of encryption. |
Digital signature |
A mathematical technique used to validate the authenticity and integrity of a message, software or digital document. |
Encryption |
The process of converting information or data into a code, especially to prevent unauthorized access. |
File ingestion |
The process of reading a file. |
Firewall |
Network security appliance or software that monitors and controls incoming and outgoing network traffic based on predetermined rules. |
Heartbeat monitoring |
Periodic signal generated and monitored by hardware or software to indicate normal operation or to synchronize other parts of a computer system. |
IPSec |
IP SECurity. Network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. |
Penetration testing |
Practice of testing a computer system, network or web application to find security vulnerabilities that an attacker could exploit. |
Reconciliation process |
Process of ensuring that two sets of records are in agreement. |
VPN |
Virtual Private Network. |
XML |
Extensible Mark-up Language. It allows designers to create their own customised tags, enabling the definition, transmission, validation, and interpretation of data between applications and between organisations. |