Google Chrome's new Certificate Transparency Requirement

Dear Valued Partner and Dytek End-Users,
As part of Comodo CA’s mission to keep your organization safe, we wanted to share the latest information about Google’s Chrome browser and trust issues.
In April 2018, Google's Chrome browser will begin requiring that all publicly-trusted server certificates are logged in public Certificate Transparency (CT) logs. This will include all Organization Validated (OV) and Domain Validated (DV) certificates, in addition to EV (Extended Validation) certificates which have been included in CT logs since January 2015.
What is Certificate Transparency? It is a system of public 'logs' that are used to maintain an append-only list of all publicly-issued certificates. These logs can be used to detect any incorrectly-issued certificates, as well as allow users to monitor certificate issuance for their own properties that they may not know about or not have authorized. Browsers can use data within the certificates that 'prove' the certificates were logged, and ensure they come across as trusted.  Enterprises should note that certificates from private CAs are not part of this requirement and will not be logged.
There are no actions you need to take (on certificates issued by Dytek via Comodo), Comodo CA will meet this requirement and will automatically generate the required Signed Certificate Timestamps and add them to issued certificates so that Google Chrome and other browsers can be sure the certificates were issued correctly.
If you have additional questions, please contact Dytek Support directly, or visit:
Comodo CA Management Team