Go back to the Europarl portal

Choisissez la langue de votre document :

  • bg - български
  • es - español
  • cs - čeština
  • da - dansk
  • de - Deutsch
  • et - eesti keel
  • el - ελληνικά
  • en - English (Selected)
  • fr - français
  • ga - Gaeilge
  • hr - hrvatski
  • it - italiano
  • lv - latviešu valoda
  • lt - lietuvių kalba
  • hu - magyar
  • mt - Malti
  • nl - Nederlands
  • pl - polski
  • pt - português
  • ro - română
  • sk - slovenčina
  • sl - slovenščina
  • fi - suomi
  • sv - svenska
Parliamentary questions
13 February 2017
E-000982-17
Question for written answer
to the Commission
Rule 130
Elissavet Vozemberg-Vrionidi (PPE)

 Subject:  Protecting the EU against cybercrime
 Answer(s) 

There has recently been an increased number of cyber-attacks on the EU’s electronic systems. More specifically, in 2016 there were 20% more attacks than in 2015. The European strategy for cybersecurity dates from 2013, but the EU is almost always one step behind in tackling cybercrime, since the perpetrators have at their disposal more sophisticated means of attack. The directive on security of network and information systems (the NIS Directive) provides for a series of actions to strengthen protection in cyberspace and to curb cybercrime. At the same time, it requires Member States to establish a mechanism for cooperation with the Commission for early warning in case of cyber-attacks, and calls on some companies to report the more significant incidents.

As cybercrime is a serious threat to the democratic functioning of the EU, will the Commission say:

1. How does it intend to strengthen the exchange of information between Europol and Member States’ security services combating cybercrime which is still badly flawed and subject to serious delays?
2. When will it unveil the renewed European strategy for cybersecurity and what will be the main planks of this strategy?
3. How will it ensure that companies providing information and communications technology (ICT) will improve the security of their computer systems and implement transparent practices during the process of data transfer?

Original language of question: EL 
Last updated: 6 March 2017Legal notice