Strategy for a Secure Information Society in Europe

Please note

This page contains a limited version of this dossier in the EU Monitor.

Contents

  1. Current status
  2. Key information
  3. Key dates
  4. Legislative text
  5. Original proposal
  6. Sources and disclaimer
  7. Full version
  8. EU Monitor

1.

Current status

This council resolution has been published on March 24, 2007.

2.

Key information

official title

Council Resolution of 22 March 2007 on a Strategy for a Secure Information Society in Europe
 
Legal instrument Council resolution
Original proposal COM(2006)251 EN
CELEX number21 32007G0324(01)

3.

Key dates

Document 22-03-2007
Publication in Official Journal 24-03-2007; OJ C 68 p. 1-4
End of validity 31-12-9999

4.

Legislative text

24.3.2007   

EN

Official Journal of the European Union

C 68/1

 

COUNCIL RESOLUTION

of 22 March 2007

on a Strategy for a Secure Information Society in Europe

(2007/C 68/01)

THE COUNCIL OF THE EUROPEAN UNION,

HEREBY ADOPTS THIS RESOLUTION AND

WELCOMES

The 31 May 2006 Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions — A Strategy for a Secure Information Society — ‘Dialogue, Partnership and Empowerment’;

NOTES

The 15 November 2006 Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions on Fighting spam, spyware and malicious software;

RECALLS

 

1.

The 28 January 2002 Council Resolution on a Common Approach and Specific Actions in the area of Network and Information Security (1);

 

2.

The 18 February 2003 Council Resolution on a European Approach towards a culture of Network and Information Security (2);

 

3.

The 8/9 March 2004 Council Conclusions on Unsolicited communications for direct marketing purposes or ‘spam ’and the 9/10 December 2004 Council Conclusions on Fight against spam;

 

4.

The March 2005 European Council Conclusions re-launching the Lisbon strategy and the European Council March 2006 Conclusions calling on the Commission and the Member States to implement the new i2010 Strategy vigorously;

 

5.

The EU Regulatory Framework for Electronic Communications (3), and, in particular, the provisions relating to communication security, privacy and confidentiality, which have contributed to ensuring a high level of personal data and privacy protection and the integrity and security of public communications networks;

 

6.

The 10 March 2004 Regulation (EC) No 460/2004 of the European Parliament and of the Council establishing the European Network and Information Security Agency (ENISA) (4);

 

7.

The Tunis Agenda and the Tunis Commitment of the World Summit on the Information Society (WSIS) highlighting the need to continue the fight against cyber-crime and spam while ensuring the protection of privacy and freedom of expression, and to further promote, develop and implement, in cooperation with all stakeholders, a global cyber-security culture;

 

8.

The Presidency Conclusions of the Annual European Information Society Conference (27-28 September 2006) ‘i2010 — Towards a Ubiquitous European Information Society’, in Espoo, Finland;

ACCORDINGLY STRESSES THAT:

 

1.

Our societies are rapidly moving into a new phase of development, towards a ubiquitous information society, where more and more of the everyday activities of the citizens are based on the use of Information and Communications Technologies (ICT) as well as electronic communications networks; network and information security should be considered as a key enabler for this development and for its success;

 

2.

Trust is a vital element in the success of the new Information Society; trust also relates to the experiences of the end-users and to the need to respect their privacy; therefore, network and information security should not be merely considered as a technical issue;

 

3.

Network and information security is an essential part in the creation of a European Information Space as part of the i2010 Initiative, thus contributing to the success of the renewed Lisbon Strategy; ICT is also a critical component of innovation, economic growth and jobs throughout the economy;

 

4.

New technologies that will lead us to the ubiquitous information society are already under development; the advent of ground-breaking technologies (such as, high-speed wireless networks, Radio Frequency Identification (RFID) Devices, sensor...


More

This text has been adopted from EUR-Lex.

5.

Original proposal

  • COM(2006)251 - A strategy for a Secure Information Society - “Dialogue, partnership and empowerment”
 

6.

Sources and disclaimer

For further information you may want to consult the following sources that have been used to compile this dossier:
  • dossier EUR-Lex decision22

This dossier is compiled each night drawing from aforementioned sources through automated processes. We have invested a great deal in optimising the programming underlying these processes. However, we cannot guarantee the sources we draw our information from nor the resulting dossier are without fault.

 

7.

Full version

This page is also available in a full version containing the legal context, other dossiers related to the dossier at hand and the related cases of the European Court of Justice.

The full version is available for registered users of the EU Monitor by ANP and PDC Informatie Architectuur.

8.

EU Monitor

The EU Monitor enables its users to keep track of the European process of lawmaking, focusing on the relevant dossiers. It automatically signals developments in your chosen topics of interest. Apologies to unregistered users, we can no longer add new users.This service will discontinue in the near future.


  • 1. 
    Directive 2002/58/EC.

     
  • 2. 
    Or unsolicited commercial communications.

     
  • 3. 
    Spyware is tracking software deployed without adequate notice, consent, or control for the user.

     
  • 4. 
    The ESPR is being prepared in the course of a Preparatory Action for Security Research during the period 2004-2006.

     
  • 5. 
    Towards a global partnership in the Information Society: follow-up to the Tunis Phase of the World Summit on the Information Society (WSIS) - COM(2006) 181, 27.4.2006.

     
  • 6. 
    Malware stands for
     
  • 7. 
    Phishing is a form of Internet fraud aiming to steal valuable information such as credit cards, bank account numbers, user IDs and passwords.

     
  • 8. 
    Botnets are networks of bots, which are applications that perform actions on behalf of a remote controller and are installed covertly on a victim machine.

     
  • 9. 
    Radio Frequency Identification.

     
  • 10. 
    COM(2005) 576, 17.11.2005.

     
  • 11. 
    Directive 2002/58/EC.

     
  • 12. 
    Or unsolicited commercial communications.

     
  • 13. 
    Spyware is tracking software deployed without adequate notice, consent, or control for the user.

     
  • 14. 
    The ESPR is being prepared in the course of a Preparatory Action for Security Research during the period 2004-2006.

     
  • 15. 
    Towards a global partnership in the Information Society: follow-up to the Tunis Phase of the World Summit on the Information Society (WSIS) - COM(2006) 181, 27.4.2006.

     
  • 16. 
    Malware stands for
     
  • 17. 
    Phishing is a form of Internet fraud aiming to steal valuable information such as credit cards, bank account numbers, user IDs and passwords.

     
  • 18. 
    Botnets are networks of bots, which are applications that perform actions on behalf of a remote controller and are installed covertly on a victim machine.

     
  • 19. 
    Radio Frequency Identification.

     
  • 20. 
    COM(2005) 576,
     
  • 21. 
    Deze databank van de Europese Unie biedt de mogelijkheid de actuele werkzaamheden (workflow) van de Europese instellingen (Europees Parlement, Raad, ESC, Comité van de Regio's, Europese Centrale Bank, Hof van Justitie enz.) te volgen. EURlex volgt alle voorstellen (zoals wetgevende en begrotingsdossiers) en mededelingen van de Commissie, vanaf het moment dat ze aan de Raad of het Europees Parlement worden voorgelegd.
     
  • 22. 
    EUR-lex provides an overview of the proposal, amendments, citations and legality.