COM(2001)298 - Network and Information Security: Proposal for A European Policy Approach
Please note
This page contains a limited version of this dossier in the EU Monitor.
Contents
official title
Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions - Network and Information Security: Proposal for A European Policy ApproachLegal instrument | Communication |
---|---|
reference by COM-number45 | COM(2001)298 ![]() |
Additional COM-numbers | COM(2001)298 |
CELEX number48 | 52001DC0298 |
Document | 06-06-2001 |
---|---|
Online publication | 06-06-2001 |
This page is also available in a full version containing the latest state of affairs, the summary of the European Parliament Legislative Observatory, the legal context, other dossiers related to the dossier at hand, the stakeholders involved (e.g. European Commission directorates-general, European Parliament committees, Council configurations and even individual EU Commissioners and Members of the European Parliament) and finally documents of the European Parliament, the Council of Ministers and the European Commission.
The full version is available for registered users of the EU Monitor by ANP and PDC Informatie Architectuur.
The EU Monitor enables its users to keep track of the European process of lawmaking, focusing on the relevant dossiers. It automatically signals developments in your chosen topics of interest. Apologies to unregistered users, we can no longer add new users.This service will discontinue in the near future.
- 1.Directive on data protection in telecommunications (OJ L 24 of 30.1.1998).
- 2.See Commission Communication on 'Ensuring security and trust in electronic communication', 8 October 1997, COM (1997) 503 final.
- 3.Council Regulation (EC) N° 1334/2000 setting up a Community regime for the control of exports of dual use items and technologies (OJ L 159 of 30.06.2000).
- 4.S-MIME (secure multiple Internet mail extensions) and OpenPGP (Pretty Good Privacy) are both IETF (Internet Engineering Task Force) standards.
- 5.The ECHELON system is allegedly used to intercept ordinary e-mail, fax, telex and telephone communications carried over the world's telecommunications networks. See also the activities of the European Parliament Temporary Committee on Echelon at www.europarl.eu.int/ committees/echelon_home.htm
- 6.The German government is funding a project based on the OpenPGP standard and is called GNUPG (www.gnupg.org).
- 7.
- 8.Directive 1999/93/EC of 13 December 1999 establishing a common framework for electronic signatures (OJ L 13 of 19.1.2000, p. 12).
- 9.OJ L 199 of 26.07.1997.
- 10.OJ L 101 of 01.04.1998.
- 11.IDC : Internet security market forecast and analysis, 2000-2004 Report
- 12.Creating a safer society by improving the security of information infrastructures and combating computer related crime, COM (2000) 890, europa.eu.int/ISPO/eif/internetPoliciesSite/Crime
- 13.Pluggable means that an encryption software commodity can be easily installed and made fully operational on top of operating systems.
- 14.Council Recommendation 95/144/EC on common information technology security evaluation criteria (implemented in the majority of EU Member States).
- 15.European co-operation for Accreditation between accreditation bodies from 25 EU, EFTA and candidate countries.
- 16.IPv6 is an Internet protocol increasing the number of possible IP addresses, optimising the traffic routing of messages and enhancing the possibilities to deploy IPSec. IPSec is another Inernet protocol aiming to provide confidentiality, to prevent packets from being viewed except by the receiving host and to provide authentication and integrity to guarantee that the data in the packet is authentic and from the correct sender.
- 17.There are security requirements regarding electrical components of a computer, but no requirements as to security of data handled by a computer.
- 19.
- 20.Directives 95/46/EC (OJ L281 of 23.11.1995) and 97/66/EC (OJ L24 of 30.1.1998) europa.eu.int/ISPO/infosoc/telecompolicy/en
- 21.Member States shall ensure via national regulations the confidentiality of communications by means of a public telecommunication network and publicly available telecommunication services. In particular, they shall prohibit listening, tapping, storage or other kinds of interception or surveillance of communications, by others than users, without the consent of the users concerned, except when legally authorised, in accordance with article 14 (1).
- 22.Commission Liberalisation Directive 90/388/EC, Interconnection Directive 97/33/EC, Voice Telephony Directive 98/10/EC.
- 23.Directive on data protection in telecommunications (OJ L 24 of 30.1.1998).
- 24.See Commission Communication on 'Ensuring security and trust in electronic communication', 8 October 1997, COM (1997) 503 final.
- 25.Council Regulation (EC) N° 1334/2000 setting up a Community regime for the control of exports of dual use items and technologies (OJ L 159 of 30.06.2000).
- 26.S-MIME (secure multiple Internet mail extensions) and OpenPGP (Pretty Good Privacy) are both IETF (Internet Engineering Task Force) standards.
- 27.The ECHELON system is allegedly used to intercept ordinary e-mail, fax, telex and telephone communications carried over the world's telecommunications networks. See also the activities of the European Parliament Temporary Committee on Echelon at www.europarl.eu.int/ committees/echelon_home.htm
- 28.The German government is funding a project based on the OpenPGP standard and is called GNUPG (www.gnupg.org).
- 29.
- 30.Directive 1999/93/EC of 13 December 1999 establishing a common framework for electronic signatures (OJ L 13 of 19.1.2000, p. 12).
- 31.OJ L 199 of 26.07.1997.
- 32.OJ L 101 of 01.04.1998.
- 33.IDC : Internet security market forecast and analysis, 2000-2004 Report
- 34.Creating a safer society by improving the security of information infrastructures and combating computer related crime, COM (2000) 890, europa.eu.int/ISPO/eif/internetPoliciesSite/Crime
- 35.Pluggable means that an encryption software commodity can be easily installed and made fully operational on top of operating systems.
- 36.Council Recommendation 95/144/EC on common information technology security evaluation criteria (implemented in the majority of EU Member States).
- 37.European co-operation for Accreditation between accreditation bodies from 25 EU, EFTA and candidate countries.
- 38.IPv6 is an Internet protocol increasing the number of possible IP addresses, optimising the traffic routing of messages and enhancing the possibilities to deploy IPSec. IPSec is another Inernet protocol aiming to provide confidentiality, to prevent packets from being viewed except by the receiving host and to provide authentication and integrity to guarantee that the data in the packet is authentic and from the correct sender.
- 39.There are security requirements regarding electrical components of a computer, but no requirements as to security of data handled by a computer.
- 41.
- 42.Directives 95/46/EC (OJ L281 of 23.11.1995) and 97/66/EC (OJ L24 of 30.1.1998) europa.eu.int/ISPO/infosoc/telecompolicy/en
- 43.Member States shall ensure via national regulations the confidentiality of communications by means of a public telecommunication network and publicly available telecommunication services. In particular, they shall prohibit listening, tapping, storage or other kinds of interception or surveillance of communications, by others than users, without the consent of the users concerned, except when legally authorised, in accordance with article 14 (1).
- 44.Commission Liberalisation Directive 90/388/EC, Interconnection Directive 97/33/EC, Voice Telephony Directive 98/10/EC.
- 45.De Europese Commissie kent nummers toe aan officiële documenten van de Europese Unie. De Commissie maakt onderscheid in een aantal typen documenten door middel van het toekennen van verschillende nummerseries. Het onderscheid is gebaseerd op het soort document en/of de instelling van de Unie van wie het document afkomstig is.
- 46.De Raad van de Europese Unie kent aan wetgevingsdossiers een uniek toe. Dit nummer bestaat uit een vijfcijferig volgnummer gevolgd door een schuine streep met de laatste twee cijfers van het jaartal, bijvoorbeeld 12345/00 - een document met nummer 12345 uit het jaar 2000.
- 47.Het interinstitutionele nummer is een nummerreeks die binnen de Europese Unie toegekend wordt aan voorstellen voor regelgeving van de Europese Commissie.
Binnen de Europese Unie worden nog een aantal andere nummerseries gebruikt. Iedere instelling heeft één of meerdere sets documenten met ieder een eigen nummering. Die reeksen komen niet overeen met elkaar of het interinstitutioneel nummer.
- 48.Deze databank van de Europese Unie biedt de mogelijkheid de actuele werkzaamheden (workflow) van de Europese instellingen (Europees Parlement, Raad, ESC, Comité van de Regio's, Europese Centrale Bank, Hof van Justitie enz.) te volgen. EURlex volgt alle voorstellen (zoals wetgevende en begrotingsdossiers) en mededelingen van de Commissie, vanaf het moment dat ze aan de Raad of het Europees Parlement worden voorgelegd.
- 49.Als dag van bekendmaking van een Europees besluit geldt de dag waarop het besluit in het Publicatieblad wordt bekendgemaakt, en daardoor in alle officiële talen van de Europese Unie bij het Publicatiebureau beschikbaar is.