Iskanje

Rezultati iskanja

Prikazujem 6 od 6 Rezultati

The EU recognises that cybersecurity and cyber-defence are critical for its prosperity, security and global ambitions. Offensive cyber-attacks by malicious actors show no sign of slowing down (not even during the coronavirus pandemic) and thus require concrete dissuasive measures. In July 2020, the EU Member States decided for the first time to use the 'teeth' rooted in the EU cyber-diplomacy framework and to 'bite cyber perpetrators back' by placing sanctions on them. This precedent has helped reinforce ...

The spectrum auctions of fifth-generation (5G) mobile telecoms networks planned in 17 EU Member States for 2019 or 2020 have sparked a highly politicised debate in the EU about whether the use of Chinese 5G equipment in critical EU infrastructure poses a threat to security. While Australia, Japan, and New Zealand have followed the United States (US) in imposing a (partial) ban on Chinese telecom vendors, EU Member States appear to privilege EU-coordinated national risk-mitigating measures over a ...

Allegations of interference in the US electoral campaign in 2016 through cyber espionage and leaks have put the spotlight on cyber-security and cybercrime, not only for ensuring financial or strategic advantages, but increasingly as means of pursuing political aims. As digital technologies grow in importance, the clear view among analysts is that cyber-crime is becoming a major threat to governments, businesses and societies as a whole. This note offers links to reports and commentaries from some ...

On 15 December 2015, Parliament and Council negotiators reached a provisional agreement on a new EU directive setting common rules for protecting trade secrets and confidential information in the EU. On 28 January 2016, the Legal Affairs Committee (rapporteur Constance Le Grip, EPP, France) endorsed the agreed text, which is now to be voted by Parliament as a whole.

During the second half of the 1990s press and media reports revealed the existence of the Echelon network. This system for intercepting private and economic communications was developed and managed by the states that had signed the UKUSA and was characterised by its powers and the range of communications targeted: surveillance was directed against not only military organisations and installations but also governments, international organisations and companies throughout the world. This study recounts ...

This note seeks to provide an initial analysis of the strengths and weaknesses of the European Commission's Impact Assessment (IA) accompanying its proposal for a Directive on the protection of undisclosed know-how and business information (trade secrets) against their unlawful acquisition, use and disclosure (COM (2013) 813), which was adopted on 28 November 2013. It does not attempt to deal with the substance of the proposals and is drafted for informational and background purposes to assist ...