{"id":3526,"date":"2024-06-11T14:43:47","date_gmt":"2024-06-11T12:43:47","guid":{"rendered":"https:\/\/evidency.io\/blog\/eidas-2-0-le-renforcement-de-lidentite-numerique-europeenne\/"},"modified":"2026-02-05T10:16:46","modified_gmt":"2026-02-05T09:16:46","slug":"eidas-2-0-and-european-digital-identity","status":"publish","type":"post","link":"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/","title":{"rendered":"eIDAS 2.0: strengthening European digital identity"},"content":{"rendered":"<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<p><strong>Key takeaways <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The eIDAS 2.0 Regulation <strong>strengthens the European legal framework for electronic transactions<\/strong> by extending its scope and increasing the level of security applicable to trust services.<\/li>\n\n\n\n<li>It introduces<strong> the European Digital Identity Wallet <\/strong>(eID Wallet), enabling citizens to manage and share their identity data in a secure and interoperable manner.<\/li>\n\n\n\n<li>eIDAS 2.0 expands the list of trust services by incorporating <strong>qualified electronic ledgers and qualified electronic archiving<\/strong>, in addition to electronic signatures, electronic seals and timestamping.<\/li>\n\n\n\n<li>These new services ensure <strong>the integrity, origin, traceability and long-term preservation of electronic data<\/strong>, with legal recognition throughout the European Union.<\/li>\n\n\n\n<li>By harmonising <strong>identification and trust standards<\/strong>, eIDAS 2.0 facilitates cross-border exchanges, strengthens digital security and supports innovation within the European market.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"titre1\">What is the eIDAS 2.0 regulation?<\/h2>\n\n\n\n<p>The eIDAS regulation (Electronic Identification, Authentication and Trust Services) aims to establish a <strong>unified legal framework for electronic transactions within the European Union<\/strong>. Its second version represents a significant advancement, expanding its scope and strengthening its security measures. It also includes developments in trust services, reorganising the list of existing services and introducing two new ones: <strong>electronic archiving and electronic registers<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Creating a digital identity wallet<\/h3>\n\n\n\n<p>The creation of <strong>the digital identity wallet, or Wallet, aims to securely store personal data of European citizens<\/strong>, independent of the authentication technology used, ensuring the confidentiality of this data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Expansion of Electronic Trust Services<\/h3>\n\n\n\n<p>The services of electronic signatures, electronic seals, and electronic timestamps are complemented by the new services of <strong>electronic registers<\/strong> and <strong>electronic archiving<\/strong>. These additional services ensure the integrity and accuracy of recorded data, with strict requirements for qualified trust service providers.<\/p>\n\n\n\n<p>In its first version, eIDAS included only <a href=\"https:\/\/evidency.io\/en\/guide-electronic-signature\/\">electronic signatures<\/a>, electronic seals, and electronic timestamps.<\/p>\n\n\n\n<p>The initial eIDAS regulation enumerates several levels of signatures:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Simple Signature<\/h3>\n\n\n\n<p>This form of electronic signature cannot be legally dismissed solely because of its electronic format. Examples include signing a name at the end of an email or a scanned signature.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Advanced Electronic Signature (AES)<\/h3>\n\n\n\n<p>Uniquely linked to the signatory, this signature allows the signatory to be identified and ensures the integrity of the document.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Qualified Electronic Signature (QES)<\/h3>\n\n\n\n<p>More stringent than AES, it holds the same legal value as a handwritten signature.<\/p>\n\n\n\n<p>Signatories must use a digital identity certificate issued by a qualified and accredited EU trust service provider according to eIDAS standards. Signatories also use a Qualified Signature Creation Device (QSCD), such as a smart card or USB token, or a mobile application with a unique secret code.<\/p>\n\n\n\n<p><a href=\"https:\/\/evidency.io\/en\/electronic-seal\/\">An electronic seal, or digital seal<\/a>, is defined as a <strong>set of electronic data attached to other electronic data to ensure their origin and integrity<\/strong>. Thus, the electronic seal is comparable to a company stamp or the signature of a legal entity.<\/p>\n\n\n\n<p><a href=\"https:\/\/evidency.io\/en\/qualified-timestamping\/\">An electronic timestamp <strong>certifies that data existed at a specific moment<\/strong><\/a>. For instance, it can validate promotional prices in e-commerce, ensure the traceability of supply chains, build infringement reports, guarantee regulatory compliance, etc.<\/p>\n\n\n\n<p>eIDAS 2.0 now includes the electronic register, aimed at sequentially recording data to guarantee their integrity and the accuracy of their chronological order. A qualified register must be managed by one or more qualified trust service providers, establish the origin of the records, maintain a unique chronological order, and detect any subsequent modifications.<\/p>\n\n\n\n<p>eIDAS 2.0 also introduces the electronic archiving service, defined as a service that <strong>guarantees the receipt, storage, retrieval, and deletion of electronic data or documents,<\/strong> ensuring their longevity, readability, integrity, and confidentiality.<\/p>\n\n\n\n<p>A <a href=\"https:\/\/evidency.io\/en\/eidas-v2-qualified-electronic-archiving\/\">qualified archiving service<\/a> must:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Be provided by a <strong>qualified trust service provider<\/strong>.<\/li>\n\n\n\n<li>Utilise processes and technologies <strong>ensuring data longevity and readability<\/strong>, even after technological obsolescence, at least for the legal retention period or as established in the contract, ensuring their integrity and origin.<\/li>\n\n\n\n<li>Ensure that data retention methods <strong>protect against any loss or modification<\/strong>, except in cases of modifications due to transfer of media or electronic format.<\/li>\n\n\n\n<li>Ensure that authorised parties automatically receive a <strong>report confirming that an electronic data retrieved from a qualified archiving service has maintained its integrity<\/strong> from entry into the archive to its exit.<\/li>\n<\/ul>\n\n\n\n<p>Electronic archiving and registers are now included in the list of trust services established in the eIDAS regulation, benefiting from recognition and interoperability among Member States. An electronic data archived in a qualified service will benefit from a presumption of origin and integrity during its retention period.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\">\n<h2 class=\"wp-block-heading\" id=\"titre2\">Advantages of eIDAS 2.0 regulation<\/h2>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\">\n<p>The eIDAS 2.0 regulation offers several advantages:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Facilitation of cross-border transactions<\/h3>\n\n\n\n<p>By harmonising identification and electronic signature standards, eIDAS 2.0 promotes transactions between Member States and encourages digital transactions within the EU.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Strengthening security<\/h3>\n\n\n\n<p>The use of qualified identifiers and electronic signatures enhances the security of digital transactions, protecting and reassuring citizens and businesses against <a href=\"https:\/\/evidency.io\/en\/document-fraud-leveraging-the-electronic-seal-as-an-anti-fraud-measure\/\">cybercrime and fraud<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Simplification of administrative procedures<\/h3>\n\n\n\n<p>By promoting the use of electronic identifiers for access to public and private services, eIDAS V2 helps reduce costs and shorten administrative delays within the European Union.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Development of digital innovation<\/h3>\n\n\n\n<p>Through this new legal framework for online identification and authentication, eIDAS 2.0 aims to promote innovation in the digital services sector and encourage the development of new products and services.<\/p>\n\n\n\n<p><\/p>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\">\n<p class=\"has-text-color has-link-color wp-elements-4b97c91eb747206c3998daef3364b62b\" style=\"color:#0c0171\"><strong>Conclusion<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\">\n<p>The eIDAS 2.0 regulation represents a crucial step towards <strong>creating a European digital identity<\/strong>. With these new shared standards within the EU for electronic identification, digital signatures, and qualified timestamps, eIDAS V2 facilitates cross-border transactions and strengthens trust in online transactions, building a <strong>secure and harmonised digital future<\/strong> for European citizens, businesses, and governments.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/evidency.io\/en\/contact-evidency\/\" style=\"background-color:#0c0171\">Our team of experts is available to discuss your specific use case<\/a><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\">\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><em><strong>Disclaimer<\/strong><\/em><\/p>\n\n\n\n<p>The opinions, presentations, figures and estimates set forth on the website including in the blog are for informational purposes only and should not be construed as legal advice. For legal advice you should contact a legal professional in your jurisdiction.<\/p>\n\n\n\n<p>The use of any content on this website, including in this blog, for any commercial purposes, including resale, is prohibited, unless permission is first obtained from Evidency. Request for permission should state the purpose and the extent of the reproduction. For non-commercial purposes, all material in this publication may be freely quoted or reprinted, but acknowledgement is required, together with a link to this website.<\/p>\n<\/div>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Key takeaways What is the eIDAS 2.0 regulation? The eIDAS regulation (Electronic Identification, Authentication and Trust Services) aims to establish a unified legal framework for electronic transactions within the European Union. Its second version represents a significant advancement, expanding its scope and strengthening its security measures. It also includes developments in trust services, reorganising the [&hellip;]<\/p>\n","protected":false},"author":246879331,"featured_media":10339,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[6410],"tags":[],"ppma_author":[6459],"class_list":["post-3526","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-timestamping","author-kristin-a"],"acf":{"profil":"","bio":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How eIDAS 2.0 strengthens European Digital Identity<\/title>\n<meta name=\"description\" content=\"Find out more about the new measures introduced in the European eIDAS 2.0 regulation and their benefits for strengthening digital identity and transaction security in the European Union.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How eIDAS 2.0 strengthens European Digital Identity\" \/>\n<meta property=\"og:description\" content=\"Find out more about the new measures introduced in the European eIDAS 2.0 regulation and their benefits for strengthening digital identity and transaction security in the European Union.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/\" \/>\n<meta property=\"og:site_name\" content=\"Evidency\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-11T12:43:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-05T09:16:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/blog-article-eidas-v2.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Kristin A.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kristin A.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/\"},\"author\":{\"name\":\"Kristin A.\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/60c35209fc928543ec89ae6b59e10a99\"},\"headline\":\"eIDAS 2.0: strengthening European digital identity\",\"datePublished\":\"2024-06-11T12:43:47+00:00\",\"dateModified\":\"2026-02-05T09:16:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/\"},\"wordCount\":1013,\"publisher\":{\"@id\":\"https:\/\/evidency.io\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/blog-article-eidas-v2.webp\",\"articleSection\":[\"Timestamping\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/\",\"url\":\"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/\",\"name\":\"How eIDAS 2.0 strengthens European Digital Identity\",\"isPartOf\":{\"@id\":\"https:\/\/evidency.io\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/blog-article-eidas-v2.webp\",\"datePublished\":\"2024-06-11T12:43:47+00:00\",\"dateModified\":\"2026-02-05T09:16:46+00:00\",\"description\":\"Find out more about the new measures introduced in the European eIDAS 2.0 regulation and their benefits for strengthening digital identity and transaction security in the European Union.\",\"breadcrumb\":{\"@id\":\"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/#primaryimage\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/blog-article-eidas-v2.webp\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/blog-article-eidas-v2.webp\",\"width\":950,\"height\":500,\"caption\":\"blog-article-eidas-v2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Evidency\",\"item\":\"https:\/\/evidency.io\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"eIDAS 2.0: strengthening European digital identity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/evidency.io\/en\/#website\",\"url\":\"https:\/\/evidency.io\/en\/\",\"name\":\"Evidency\",\"description\":\"Sp\u00e9cialiste de la preuve num\u00e9rique\",\"publisher\":{\"@id\":\"https:\/\/evidency.io\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/evidency.io\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/evidency.io\/en\/#organization\",\"name\":\"Evidency\",\"url\":\"https:\/\/evidency.io\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg\",\"width\":275,\"height\":58,\"caption\":\"Evidency\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/evidency-io\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/60c35209fc928543ec89ae6b59e10a99\",\"name\":\"Kristin A.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/image\/ec09afb1ed6d21195f6bbbb96df99746\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Kristin.webp\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Kristin.webp\",\"caption\":\"Kristin A.\"},\"description\":\"Kristin is a registered U.S. attorney with over a decade of experience in technology law, specialising in intellectual property and data privacy.\",\"url\":\"https:\/\/evidency.io\/author\/kristin-a\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How eIDAS 2.0 strengthens European Digital Identity","description":"Find out more about the new measures introduced in the European eIDAS 2.0 regulation and their benefits for strengthening digital identity and transaction security in the European Union.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/","og_locale":"en_US","og_type":"article","og_title":"How eIDAS 2.0 strengthens European Digital Identity","og_description":"Find out more about the new measures introduced in the European eIDAS 2.0 regulation and their benefits for strengthening digital identity and transaction security in the European Union.","og_url":"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/","og_site_name":"Evidency","article_published_time":"2024-06-11T12:43:47+00:00","article_modified_time":"2026-02-05T09:16:46+00:00","og_image":[{"width":950,"height":500,"url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/blog-article-eidas-v2.webp","type":"image\/webp"}],"author":"Kristin A.","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kristin A.","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/#article","isPartOf":{"@id":"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/"},"author":{"name":"Kristin A.","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/60c35209fc928543ec89ae6b59e10a99"},"headline":"eIDAS 2.0: strengthening European digital identity","datePublished":"2024-06-11T12:43:47+00:00","dateModified":"2026-02-05T09:16:46+00:00","mainEntityOfPage":{"@id":"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/"},"wordCount":1013,"publisher":{"@id":"https:\/\/evidency.io\/en\/#organization"},"image":{"@id":"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/blog-article-eidas-v2.webp","articleSection":["Timestamping"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/","url":"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/","name":"How eIDAS 2.0 strengthens European Digital Identity","isPartOf":{"@id":"https:\/\/evidency.io\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/#primaryimage"},"image":{"@id":"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/#primaryimage"},"thumbnailUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/blog-article-eidas-v2.webp","datePublished":"2024-06-11T12:43:47+00:00","dateModified":"2026-02-05T09:16:46+00:00","description":"Find out more about the new measures introduced in the European eIDAS 2.0 regulation and their benefits for strengthening digital identity and transaction security in the European Union.","breadcrumb":{"@id":"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/#primaryimage","url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/blog-article-eidas-v2.webp","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/blog-article-eidas-v2.webp","width":950,"height":500,"caption":"blog-article-eidas-v2"},{"@type":"BreadcrumbList","@id":"https:\/\/evidency.io\/en\/eidas-2-0-and-european-digital-identity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Evidency","item":"https:\/\/evidency.io\/en\/"},{"@type":"ListItem","position":2,"name":"eIDAS 2.0: strengthening European digital identity"}]},{"@type":"WebSite","@id":"https:\/\/evidency.io\/en\/#website","url":"https:\/\/evidency.io\/en\/","name":"Evidency","description":"Sp\u00e9cialiste de la preuve num\u00e9rique","publisher":{"@id":"https:\/\/evidency.io\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/evidency.io\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/evidency.io\/en\/#organization","name":"Evidency","url":"https:\/\/evidency.io\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/","url":"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg","width":275,"height":58,"caption":"Evidency"},"image":{"@id":"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/evidency-io\/"]},{"@type":"Person","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/60c35209fc928543ec89ae6b59e10a99","name":"Kristin A.","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/image\/ec09afb1ed6d21195f6bbbb96df99746","url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Kristin.webp","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Kristin.webp","caption":"Kristin A."},"description":"Kristin is a registered U.S. attorney with over a decade of experience in technology law, specialising in intellectual property and data privacy.","url":"https:\/\/evidency.io\/author\/kristin-a\/"}]}},"modified_by":"Cl\u00e9a Guinaudeau","authors":[{"term_id":6459,"user_id":246879331,"is_guest":0,"slug":"kristin-a","display_name":"Kristin A.","avatar_url":{"url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Kristin-1.webp","url2x":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Kristin-1.webp"},"author_category":"1","first_name":"Kristin","description_complete":"Kristin is a US-qualified lawyer and practices as a technology law specialist at Evidency. With over ten years of experience, she has deep expertise in intellectual property and data protection. At Evidency, Kristin supports clients on all legal matters related to the management and security of digital evidence, ensuring that the company\u2019s solutions, such as qualified timestamping, electronic seals, and archiving, meet international regulatory and legal standards. Leveraging her thorough understanding of technological and regulatory challenges, she translates complex issues into practical guidance, helping professionals safeguard the authenticity, integrity, and legal compliance of their digital data.","domaine_dexpertise":"<ul>\r\n \t<li>Intellectual Property<\/li>\r\n \t<li>Data protection<\/li>\r\n \t<li>Compliance and regulation<\/li>\r\n<\/ul>","last_name":"A","user_url":"","job_title":"Jurist","linkedin":"https:\/\/www.linkedin.com\/in\/kristin-a-44a93346\/","description":"Kristin is a registered U.S. attorney with over a decade of experience in technology law, specialising in intellectual property and data privacy."}],"_links":{"self":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/3526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/users\/246879331"}],"replies":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/comments?post=3526"}],"version-history":[{"count":3,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/3526\/revisions"}],"predecessor-version":[{"id":11276,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/3526\/revisions\/11276"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/media\/10339"}],"wp:attachment":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/media?parent=3526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/categories?post=3526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/tags?post=3526"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/ppma_author?post=3526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}