Strategy for a Secure Information Society in Europe - Main contents
Please note
This page contains a limited version of this dossier in the EU Monitor.
Contents
official title
Council Resolution of 22 March 2007 on a Strategy for a Secure Information Society in EuropeLegal instrument | Council resolution |
---|---|
Original proposal | COM(2006)251 ![]() |
CELEX number i | 32007G0324(01) |
Document | 22-03-2007 |
---|---|
Publication in Official Journal | 24-03-2007; OJ C 68 p. 1-4 |
End of validity | 31-12-9999 |
24.3.2007 |
EN |
Official Journal of the European Union |
C 68/1 |
COUNCIL RESOLUTION
of 22 March 2007
on a Strategy for a Secure Information Society in Europe
(2007/C 68/01)
THE COUNCIL OF THE EUROPEAN UNION,
HEREBY ADOPTS THIS RESOLUTION AND
WELCOMES
The 31 May 2006 Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions — A Strategy for a Secure Information Society — ‘Dialogue, Partnership and Empowerment’;
NOTES
The 15 November 2006 Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions on Fighting spam, spyware and malicious software;
RECALLS
1. |
The 28 January 2002 Council Resolution on a Common Approach and Specific Actions in the area of Network and Information Security (1); |
2. |
The 18 February 2003 Council Resolution on a European Approach towards a culture of Network and Information Security (2); |
3. |
The 8/9 March 2004 Council Conclusions on Unsolicited communications for direct marketing purposes or ‘spam ’and the 9/10 December 2004 Council Conclusions on Fight against spam; |
4. |
The March 2005 European Council Conclusions re-launching the Lisbon strategy and the European Council March 2006 Conclusions calling on the Commission and the Member States to implement the new i2010 Strategy vigorously; |
5. |
The EU Regulatory Framework for Electronic Communications (3), and, in particular, the provisions relating to communication security, privacy and confidentiality, which have contributed to ensuring a high level of personal data and privacy protection and the integrity and security of public communications networks; |
6. |
The 10 March 2004 Regulation (EC) No 460/2004 of the European Parliament and of the Council establishing the European Network and Information Security Agency (ENISA) (4); |
7. |
The Tunis Agenda and the Tunis Commitment of the World Summit on the Information Society (WSIS) highlighting the need to continue the fight against cyber-crime and spam while ensuring the protection of privacy and freedom of expression, and to further promote, develop and implement, in cooperation with all stakeholders, a global cyber-security culture; |
8. |
The Presidency Conclusions of the Annual European Information Society Conference (27-28 September 2006) ‘i2010 — Towards a Ubiquitous European Information Society’, in Espoo, Finland; |
ACCORDINGLY STRESSES THAT:
1. |
Our societies are rapidly moving into a new phase of development, towards a ubiquitous information society, where more and more of the everyday activities of the citizens are based on the use of Information and Communications Technologies (ICT) as well as electronic communications networks; network and information security should be considered as a key enabler for this development and for its success; |
2. |
Trust is a vital element in the success of the new Information Society; trust also relates to the experiences of the end-users and to the need to respect their privacy; therefore, network and information security should not be merely considered as a technical issue; |
3. |
Network and information security is an essential part in the creation of a European Information Space as part of the i2010 Initiative, thus contributing to the success of the renewed Lisbon Strategy; ICT is also a critical component of innovation, economic growth and jobs throughout the economy; |
4. |
New technologies that will lead us to the ubiquitous information society are already under development; the advent of ground-breaking technologies (such as, high-speed wireless networks, Radio... |
More
This text has been adopted from EUR-Lex.
This dossier is compiled each night drawing from aforementioned sources through automated processes. We have invested a great deal in optimising the programming underlying these processes. However, we cannot guarantee the sources we draw our information from nor the resulting dossier are without fault.
This page is also available in a full version containing the legal context, other dossiers related to the dossier at hand and the related cases of the European Court of Justice.
The full version is available for registered users of the EU Monitor by ANP and PDC Informatie Architectuur.
The EU Monitor enables its users to keep track of the European process of lawmaking, focusing on the relevant dossiers. It automatically signals developments in your chosen topics of interest. Apologies to unregistered users, we can no longer add new users.This service will discontinue in the near future.