Skip to main content

User accounts

With your (CH-Login) user account, you can work in the RPC for companies. Information on connecting, opening and modifying, on roles including responsibilities and much more can be found here.

General terms of use for (CH-Login) user accounts

The use of a (CH-Login) user account is subject to certain conditions. The most important ones are summarised here.

Principle of linking and administrative processes

With the help of graphical representations, you can learn how the RPC is linked to the CH login accounts in the background and which hierarchical principle it follows.

Account opening including access request for a registration company

Do you need a (CH-Login) user account and access to a registration company in the Chemicals Product Register (RPC)? Please find the relevant instructions and processes below

Role of the main user

Find out more about the role of the main user and their permissions and responsibilities here.

Roles of sub-users

Are sub-users internal or external? Find out more about sub-user roles, their authorisations and responsibilities here

Authorship

Confidential data is protected by authorship in the RPC and is only accessible to selected individuals.

Sharing or replacing information protected by the authorship

Sharing confidential information protected by the authorship is an option. If no authorship is shared, only the person who entered the confidential information can see it. Even a main user can only see the confidential information that he has either entered himself or that has been shared with him.Under Documents at the bottom of this page, you will find FAQs and examples of how to share confidential information protected by the authorship.

CH-Login: Mutation of the user account

You are responsible for making changes to your (CH-Login) user account. The FOITT provides various instructions for this.

Two-factor authentication

Due to the confidential data contained in RPC, secure access with a user account (CH-Login) is only possible via two-factor authentication. This chapter presents all the authentication options.