The RFID agenda of the European Commission. Florent Frederix European Commission Directorate General Information Society and Media

Size: px
Start display at page:

Download "The RFID agenda of the European Commission. Florent Frederix European Commission Directorate General Information Society and Media"

Transcription

1 The RFID agenda of the European Commission RFID i Danmark 2011 May 3, 2011, IT-University in Copenhagen Florent Frederix European Commission Directorate General Information Society and Media This document does not necessarily reflect any official position of the Commission

2 Recommendation on RFID to member countries International cooperation on RFID and IoT The Privacy Impact Assessment Security of RFID applications RFID signage and emblem EU norm

3 The international dimension Share best practices/conferences OECD (2005, 2009) RFID/USN South Korea (October 2007) Exchanges with China (MOST2006, CESI 2009) FTC / DoC / DoD conferences ( ) Exchanges with Japan (METI ) Enhanced co-operation EU-US RFID lighthouse project (2008) Co-operation agreement with METI Japan Partnership of standards organisations under GRIFS project (EU / US / Japan / China / South Korea / )

4 Recommendation on RFID Small chips with big potential Recommendation on the implementation of privacy and data protection principles in applications supported by radiofrequency identification 12 th May 2009 (2009) 585

5 RFID Policy Mix Charter of Fundamentals Right E-Privacy Directive Data Protection Directive Recommendation Self-regulation Codes of Conduct R&TTE Directive Standardization

6 OBJECTIVE Promote: a wider take-up of RFID under lawful, ethical, socially and politically acceptable conditions the Internal Market

7 History (references) WG 29 Working document on data protection issues related to RFID technology Communication: Radio Frequency Identification (RFID) in Europe:steps towards a policy framework The Commission Decision setting up the RFID Expert Group Opinion of the European Economic and Social Committee on Radio Frequency Identification Results of the public online consultation on future RFID Technology Policy European Data Protection Supervisor adopted an opinion Recommendation on the privacy and data protection principles in applications supported by RFID

8 Operators RFID Recommendation: operator Similarity Data Protection Directive controller Difference

9 Application RFID Recommendation: application

10 PIA PIA from the UK Information Commissioner s Privacy Impact Assessment is usefully defined as a process whereby a project's potential privacy issues and risks are identified and examined from the perspectives of all stakeholders, and a search is undertaken for ways to avoid or minimise privacy concerns. Src.: The Information Commissioner's Office (UK)

11 who what what who why Information Security RFID applications with implications for the general public, are especially critical with regard to information security and privacy and therefore require specific attention. Member States Identify the applications that might raise information security threats with implications for the general public. Operators Develop new schemes i.e. certification. ENISA study on Airport applications (2010)

12 who what why Information and Transparency on RFID if the processing of data is to be fair, the data subject must be in a position to learn of the existence of a processing operation and, where data are collected from him, must be given accurate and full information Operators Src.: Data Protection Directive Develop and publish information policy for each of their application Use European sign: identity and a point of contact

13 Information and Transparency on RFID (emblem and signage standard) RFID Information Policy the identity and address of the operators the purpose of the application what data will be processed by the identity of the the application? operator(s) will personal data be processed? will the location of tags be + monitored? a summary of the PIA a point of contact for the likely privacy risks (if any) more information the measures that individuals can take to mitigate these risks

14 how who what why RFID in retail (I) Use of a European Sign if the processing of data is to be fair, the data subject must be in a position to learn of the existence of a processing operation and, where data are collected from him, must be given accurate and full information Src.: Data Protection Directive Retailers Inform individuals of the presence of tags in the products Not specified!

15 Examples in retail

16 how who what why RFID in retail (II) Tag deactivation RFID tags contain unique IDs attached to consumer products: if each tag has a unique ID, such identification can be used for surveillance purposes... Src.: EDPS opinion Retailers Deactivate or remove at the point of sale the tag unless consumer give their consent. Free of charge Immediately Consumer can verify

17 what RFID in retail (III) Tag deactivation Deactivation of the tags should be understood as any process that stops those interactions of a tag with its environment which do not require the active involvement of the consumer

18 how who what why RFID in retail (IV) Tag deactivation Some PIA will conclude that the application doesn t represent a likely threat to privacy or the protection of personal data Retailers Don t deactivate but make available an easy means to deactivate or remove the tags Free of charge Immediately & later

19 retailers are not operators what if what what RFID in retail (V) Tag deactivation Retailers Default No threat to privacy Opt-in Opt-out Retailer has no obligation Operator should determine whether tagged products sold to consumers through retailers who are not operators represent a likely threat to privacy or the protection of personal data, etc

20 what who why Awareness raising action and R&D Awareness RFID technology among the public and SME and spread the trust in this technology All stakeholders Inform and raise awareness among: Citizens SMEs Support security and privacy by design

21 Summary of follow up actions Privacy Impact Assessment Security applications Information policy, including signs/logos Retail specific provisions Awareness Raising Research and Development

22 RFID recommendation Follow-up what Develop PIA Framework who leads? Industry Security applications Development of signs Awareness Raising Members States Standardisation Organisations Member States Research and Development Member States Inform on actions taken Member States

23 RFID Follow-up Commission s role what Develop PIA Framework Security applications Development of signs report Follow-up Standards Support Closely Continue Member monitor with mandate Member funding States the is implementation States, research already to development innovation carry including the adopted activities work. of of through such and this the Recommendation, the development includes framework as i2010 the the RACE Committee development thematic through efforts and its effectiveness the through of regular network such Article signs meetings FP7 and (and 29 upcoming and Working FP8) inviting its impact Party all pilot interested projects on operators parties and to consumers report progress made Awareness Raising Research and Development Inform on actions taken Report on Recommendation

24 Standards (the standardisation mandate) - ensure compliance to recommendation - Interoperability - Economies of scale - Lowering entry barriers - Operational costs RFID standardisation mandate

25 For more information on IOT and RFID visit the policy pages of the European Commission: Access to an extensive library, events, links and news section

European Commission policy towards the Internet of Things

European Commission policy towards the Internet of Things European Commission policy towards the Internet of Things OECD Conference Lisbon, 8th June 2009 Florent Frederix, Head of Sector European Commission Directorate General Information Society and Media This

More information

RECOMMENDATIONS COMMISSION

RECOMMENDATIONS COMMISSION 16.5.2009 Official Journal of the European Union L 122/47 RECOMMENDATIONS COMMISSION COMMISSION RECOMMENDATION of 12 May 2009 on the implementation of privacy and data protection principles in applications

More information

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION. of 12.5.2009

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION. of 12.5.2009 COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 12.5.2009 C(2009) 3200 final COMMISSION RECOMMENDATION of 12.5.2009 on the implementation of privacy and data protection principles in applications supported

More information

The definitions of Article 2 might be misleading, especially for the definition of public spaces.

The definitions of Article 2 might be misleading, especially for the definition of public spaces. APRIL 2008 Position on European Commission consultation on "Draft Recommendation on the implementation of privacy, data protection and information security principles in applications supported by Radio

More information

European Policy in support of the emerging Internet of Things

European Policy in support of the emerging Internet of Things European Policy in support of the emerging Internet of Things Dr. Florent Frederix, Head of Sector Information Society and Media European Commission This document does not necessarily reflect any official

More information

Comments and Responses by FoeBuD for the EU Consultation on RFID, April 2008

Comments and Responses by FoeBuD for the EU Consultation on RFID, April 2008 Comments and Responses by FoeBuD for the EU Consultation on RFID, April 2008 Article 1 - Scope 1. This Recommendation provides guidance to Member States and stakeholders on the design and operation of

More information

EU Policy on RFID & Privacy

EU Policy on RFID & Privacy EU Policy on RFID & Privacy Developments 2007, Outlook 2008 Andreas Krisch http://www.edri.org/ http://www.unwatched.org/ 24C3, 30.12.2007 European Digital Rights (EDRi) Umbrella

More information

2012 ISO TC46/SC4/WG11 N246

2012 ISO TC46/SC4/WG11 N246 RFID PRIVACY IN EUROPE Implications for Libraries Paul Chartier Convergent Software Ltd CILIP Conference, Nov 2012 ISO TC46/SC4/WG11 N246 Today s Presentation Broad Overview of the EU position A bit of

More information

Privacy(and(Data( Protection( (Part(II(

Privacy(and(Data( Protection( (Part(II( Privacy(Recap( Privacy(and(Data( Protection( (Part(II( KTH, Media Law Pam Storr O Legal requirements on data controller. Must consider: O why store personal data? O what personal data? O is the data correct

More information

Approaches to Impact Assessment

Approaches to Impact Assessment Approaches to Impact Assessment Roger Clarke Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW, Sydney Visiting Professor in Computer Science, ANU, Canberra http://www.rogerclarke.com/sos/ia-1401

More information

RFIDs and European Policies

RFIDs and European Policies ICTSB Seminar on RFID Standardisation CEN/CENELEC Meeting Centre Brussels, Belgium RFIDs and European Policies Gérald SANTUCCI, Head of Unit gerald.santucci@ec.europa.eu European Commission Directorate

More information

European Commission initiatives on e- and mhealth

European Commission initiatives on e- and mhealth European Commission initiatives on e- and mhealth Fundamental Rights Forum, 22 June 2016 WG 24: E-health: improving rights fulfilment through innovation Claudia Prettner, Unit for Health and Well-Being,

More information

Prof. Udo Helmbrecht

Prof. Udo Helmbrecht Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for

More information

Privacy and Data Protection Impact Assessment Framework for RFID Applications. 12 January 2011

Privacy and Data Protection Impact Assessment Framework for RFID Applications. 12 January 2011 Privacy and Data Protection Impact Assessment Framework for RFID Applications 12 January 2011 1 INDEX 1. Introduction...3 1.1. Key Concepts...4 1.2. Internal Procedures...5 2. The PIA Process...6 2.1.

More information

RESOLUTION ON RADIO-FREQUENCY IDENTIFICATION (RFID)

RESOLUTION ON RADIO-FREQUENCY IDENTIFICATION (RFID) DOC NO. INTERNET-31-05 DATE ISSUED: APRIL, 2005 RESOLUTION ON RADIO-FREQUENCY IDENTIFICATION (RFID) Introduction The Trans Atlantic Consumer Dialogue (TACD) believes action is urgently needed to address

More information

Privacy Guidelines for RFID Information Systems (RFID Privacy Guidelines)

Privacy Guidelines for RFID Information Systems (RFID Privacy Guidelines) Privacy Guidelines for RFID Information Systems (RFID Privacy Guidelines) Information and Privacy Ann Cavoukian, Ph.D. Commissioner June 2006 Commissioner Ann Cavoukian gratefully acknowledges the work

More information

The RFID Revolution: Your voice on the Challenges, Opportunities and Threats. Online Public Consultation Preliminary Overview of the Results

The RFID Revolution: Your voice on the Challenges, Opportunities and Threats. Online Public Consultation Preliminary Overview of the Results The RFID Revolution: Your voice on the Challenges, Opportunities and Threats Online Public Consultation Preliminary Overview of the Results 16 October 2006 Disclaimer: This document is a working document

More information

A. Background. In this Communication we can read:

A. Background. In this Communication we can read: On RFID The Next Step to THE INTERNET OF THINGS Information of the Presidency 2832nd Council meeting, Competitiveness (Internal Market, Industry and Research), Brussels, 22-23 November 2007 A. Background

More information

The Future of Electronic Verification in Australia

The Future of Electronic Verification in Australia The Future of Electronic Verification in Australia Malcolm Crompton Managing Director, IIS Tonkin s 4 th Annual Electronic Identity Verification Roadshow Sydney, 28 February 2013 About IIS Services: privacy

More information

Guidelines on the Use of the Common European RFID Sign

Guidelines on the Use of the Common European RFID Sign Guidelines on the Use of the Common European RFID Sign Final Version 15 January 2012 Disclaimer: This document has been prepared by Unit "Networked Enterprise and RFID" of the European Commission's Directorate

More information

Summary of feedback on Big data and data protection and ICO response

Summary of feedback on Big data and data protection and ICO response Summary of feedback on Big data and data protection and ICO response Contents Introduction... 2 Question 1... 3 Impacts and benefits; privacy impact assessments (PIAs)... 3 New approaches to data protection...

More information

Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me?

Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? EUROPEAN COMMISSION MEMO Brussels, 27 September 2012 Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me? See also IP/12/1025 What is Cloud Computing? Cloud

More information

Privacy and Data protection Impact Assessment. Frequently Asked Questions. 1. RFID Privacy Impact Assessment

Privacy and Data protection Impact Assessment. Frequently Asked Questions. 1. RFID Privacy Impact Assessment Privacy and Data protection Impact Assessment Frequently Asked Questions 1. RFID Privacy Impact Assessment a. What is a Privacy Impact Assessment and where does it come from? It is a tool for companies

More information

Internet of Things Value Proposition for Europe

Internet of Things Value Proposition for Europe Internet of Things Value Proposition for Europe European Commission - DG CONNECT Dr Florent Frederix, (Online) Trust and Cybersecurity unit 7 th European Conference on ICT for Transport Logistics 5 th

More information

EU Cybersecurity Policy & Legislation ENISA s Contribution

EU Cybersecurity Policy & Legislation ENISA s Contribution EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA

More information

RFID and Privacy Impact Assessment (PIA)

RFID and Privacy Impact Assessment (PIA) URSI-France Journées scientifiques 25/26 mars 2014 Claude Tételin RFID and Privacy Impact Assessment (PIA) Centre National de Référence RFID, ctetelin@centrenational-rfid.com Mots clés : RFID, privacy,

More information

Speakers. Navigating Through The Legal Complexities And Cloudy Conditions To Implement A Successful Global OBA Program

Speakers. Navigating Through The Legal Complexities And Cloudy Conditions To Implement A Successful Global OBA Program Speakers Navigating Through The Legal Complexities And Cloudy Conditions To Implement A Successful Global OBA Program Speakers: Ashlen Cherry, Americas Privacy Officer, Dell, ashlen_cherry@dell.com Ruth

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development

EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL. Space, Security and GMES Security Research and Development Ref. Ares(2011)193990-22/02/2011 EUROPEAN COMMISSION ENTERPRISE AND INDUSTRY DIRECTORATE-GENERAL Space, Security and GMES Security Research and Development Brussels, 17 th February 2011 M/487 EN PROGRAMMING

More information

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net This project has received funding from the European Union s Seventh Framework Programme for research, technological development

More information

BCS, The Chartered Institute for IT Consultation Response to:

BCS, The Chartered Institute for IT Consultation Response to: BCS, The Chartered Institute for IT Consultation Response to: A Comprehensive Approach to Personal Data Protection in the European Union Dated: 15 January 2011 BCS The Chartered Institute for IT First

More information

Bringing European values to the Internet of Things

Bringing European values to the Internet of Things SPEECH/10/279 Neelie Kroes European Commissioner for Digital agenda Bringing European values to the Internet of Things 2 nd Annual Internet of Things Conference Brussels, 1 st June 2010 Ladies and gentlemen,

More information

Procurement Strategy The City Council s Procurement Strategy for the period

Procurement Strategy The City Council s Procurement Strategy for the period Procurement Strategy The City Council s Procurement Strategy for the period 2014-2016 1 Name Content Creator Darren Pearce, Strategic Manager Corporate Procurement, Stoke-on-Trent City Council darren.pearce@stoke.gov.uk

More information

8970/15 FMA/AFG/cb 1 DG G 3 C

8970/15 FMA/AFG/cb 1 DG G 3 C Council of the European Union Brussels, 19 May 2015 (OR. en) 8970/15 NOTE RECH 141 TELECOM 119 COMPET 228 IND 80 From: Permanent Representatives Committee (Part 1) To: Council No. prev. doc.: 8583/15 RECH

More information

The Information Commissioner s Office response to HM Treasury s Call for Evidence on Data Sharing and Open Data in Banking

The Information Commissioner s Office response to HM Treasury s Call for Evidence on Data Sharing and Open Data in Banking The Information Commissioner s Office response to HM Treasury s Call for Evidence on Data Sharing and Open Data in Banking The Information Commissioner has responsibility for promoting and enforcing the

More information

Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment

Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment Template for Automatic Number Plate Recognition (ANPR) Infrastructure Development Privacy Impact Assessment This template is provided to support the police service and other law enforcement agencies (LEA)

More information

9360/15 FMA/AFG/cb 1 DG G 3 C

9360/15 FMA/AFG/cb 1 DG G 3 C Council of the European Union Brussels, 29 May 2015 (OR. en) 9360/15 OUTCOME OF PROCEEDINGS From: To: Council Delegations RECH 183 TELECOM 134 COMPET 288 IND 92 No. prev. doc.: 8970/15 RECH 141 TELECOM

More information

Privacy and Data Protection Impact Assessment Framework for RFID Applications. 12 January 2011

Privacy and Data Protection Impact Assessment Framework for RFID Applications. 12 January 2011 Privacy and Data Protection Impact Assessment Framework for RFID Applications 12 January 2011 1 INDEX 1. Introduction...3 1.1. Key Concepts...4 1.2. Internal Procedures...5 2. The PIA Process...6 2.1.

More information

In which new or innovative ways do you think RPAS will be used in the future?

In which new or innovative ways do you think RPAS will be used in the future? Written evidence Submitted by Trilateral Research & Consulting On the House of Lords Select Committee on the European Union call for evidence on Civil use of remotely piloted aircraft systems (RPAS) in

More information

Demystifying cloud computing for SMEs

Demystifying cloud computing for SMEs Demystifying cloud computing for SMEs Tools & Guides for SMEs moving to the Cloud Silvana Muscella, Founder and CEO Trust-IT Services Ltd s.muscella@trust-itservices.com @silvanamuscella www.cloudwatchhub.eu

More information

Best Practices at Research Level

Best Practices at Research Level PReparing Industry to Privacy-by-design by supporting its Application in REsearch Best Practices at Research Level Hisain Elshaafi Telecommunications Software and Systems Group (TSSG) Waterford Institute

More information

Health Data Governance: Privacy, Monitoring and Research - Policy Brief

Health Data Governance: Privacy, Monitoring and Research - Policy Brief Health Data Governance: Privacy, Monitoring and Research - Policy Brief October 2015 www.oecd.org/health Highlights All countries can improve their health information systems and make better use of data

More information

Tesco: use of IT and information systems

Tesco: use of IT and information systems Student Self-administered case study Tesco: use of IT and information systems Introduction to MIS Case duration (Min): 45-60 Management Information Systems (MIS) Introduction to MIS Business functions

More information

Questions & Answers clarifying key aspects of the SEPA Cards Framework

Questions & Answers clarifying key aspects of the SEPA Cards Framework Doc. EPC075-08 (Version 10.0) 11 June 2008 Questions & Answers clarifying key aspects of the SEPA Cards Framework Circulation: Publicly available Restricted: No SEPA a Guide to the Single Euro Payments

More information

DELIVERING OUR STRATEGY

DELIVERING OUR STRATEGY www.lawsociety.org.uk DELIVERING OUR STRATEGY Our three year plan 2015 2018 >2 > Delivering our strategy Catherine Dixon Chief executive Foreword Welcome to our three year business plan which sets out

More information

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013 EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber

More information

Value of the EU Data Protection Reform against the Big Data challenges. Keynote address 5th European Data Protection Days Berlin, 4.5.

Value of the EU Data Protection Reform against the Big Data challenges. Keynote address 5th European Data Protection Days Berlin, 4.5. Value of the EU Data Protection Reform against the Big Data challenges Keynote address 5th European Data Protection Days Berlin, 4.5.2015 Giovanni Buttarelli European Data Protection Supervisor (Check

More information

Privacy by Design. Ian Brown, Prof. of Information Security and Privacy Oxford Internet Institute, University of Oxford @IanBrownOII

Privacy by Design. Ian Brown, Prof. of Information Security and Privacy Oxford Internet Institute, University of Oxford @IanBrownOII Privacy by Design Ian Brown, Prof. of Information Security and Privacy Oxford Internet Institute, University of Oxford @IanBrownOII Privacy by Design principles 1. Proactive not Reactive; Preventative

More information

ICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments

ICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments Call 5 NCP briefing 12th May 2009 ICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments Peter Friess, Project officer, Head of Cluster Alain Jaume, Deputy Head of Unit D4 Cristina Martinez,

More information

Data protection. Wi-Fi location analytics

Data protection. Wi-Fi location analytics Data protection Wi-Fi location analytics ICO lo Wi-Fi location analytics Data Protection Act Contents Introduction... 2 Overview... 2 What the DPA says... 2 What is Wi-Fi analytics?... 3 Conduct a privacy

More information

How the British Council develops international English and education contract opportunities

How the British Council develops international English and education contract opportunities How the British Council develops international English and education contract opportunities Purpose This document describes how the British Council develops and responds to English and education contract

More information

EUROPEAN DATA PROTECTION SUPERVISOR

EUROPEAN DATA PROTECTION SUPERVISOR C 47/6 Official Journal of the European Union 25.2.2010 EUROPEAN DATA PROTECTION SUPERVISOR Opinion of the European Data Protection Supervisor on the Communication from the Commission on an Action Plan

More information

Position Paper e-regulation

Position Paper e-regulation Position Paper e-regulation Ecommerce Europe s Proposal for Sustainable Growth of E-commerce in Europe www.ecommerce-europe.eu POSITION PAPER 3 Table of contents 1 Introduction 4 5.1.4 Harmonisation and

More information

COMMISSION OF THE EUROPEAN COMMUNITIES

COMMISSION OF THE EUROPEAN COMMUNITIES EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, [ ] COM(2006) 251 COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE

More information

Cooperation in Securing National Critical Infrastructure

Cooperation in Securing National Critical Infrastructure Cooperation in Securing National Critical Infrastructure Dr. Steve Purser Head of Core Operations Department European Network and Information Security Agency Agenda About ENISA Protecting Critical Information

More information

Information Security Seminar 2013

Information Security Seminar 2013 Information Security Seminar 2013 Mr. Victor Lam, JP Deputy Government Chief Information Officer Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative

More information

ENISA workshop on Security Certification of ICT products in Europe

ENISA workshop on Security Certification of ICT products in Europe ENISA workshop on Security Certification of ICT products in Europe Introduction On 16th of March 2016 ENISA organised a workshop aiming at bringing together stakeholders from the ICT security certification

More information

Appendix A Lancashire County Council Procurement Strategy October 2014

Appendix A Lancashire County Council Procurement Strategy October 2014 Appendix A Lancashire County Council Procurement Strategy October 2014 Foreword Lancashire County Council spends approximately 529m per year through procurement. The goods, services and works we procure

More information

Towards a data-driven economy in Europe

Towards a data-driven economy in Europe Towards a data-driven economy in Europe Trusting Big Data Trust in the Digital World Conference 26 February 2015 Dr. Márta NAGY-ROTHENGASS Head of Unit CNECT.G3 (Data Value Chain) Why is data-driven economy

More information

ROADMAP. A Pan-European framework for electronic identification, authentication and signature

ROADMAP. A Pan-European framework for electronic identification, authentication and signature TITLE OF THE INITIATIVE ROADMAP A Pan-European framework for electronic identification, authentication and signature TYPE OF INITIATIVE CWP Non-CWP Implementing act/delegated act LEAD DG RESPONSIBLE UNIT

More information

Technical Guidelines RFID as Templates for the PIA- Framework

Technical Guidelines RFID as Templates for the PIA- Framework Technical Guidelines RFID as Templates for the PIA- Framework Federal Office for Information Security (BSI) Postbox 20 03 63 53133 Bonn, Germany Tel.: +49 22899 9582-0 E-Mail: rfid@bsi.bund.de Internet:

More information

Big data EU-ASEAN collaboration: a success story, and its continuation after the project

Big data EU-ASEAN collaboration: a success story, and its continuation after the project Supporting European Union and Southeast Asia ICT strategic partnership and policy dialogue: Connecting ICT EU-SEA Research, Development and Innovation Knowledge Networks Big data EU-ASEAN collaboration:

More information

Digitizing European Industry: Digital Industrial Platform Building

Digitizing European Industry: Digital Industrial Platform Building Digitizing European Industry: Digital Industrial Platform Building EFFRA General Assembly Dr Max Lemke Head of Unit DG CONNECT A3 European Commission 1 The political context Speech of Commissioner Oettinger

More information

ICT Research in Norway The road ahead. Till Christopher Lech The Research Council of Norway

ICT Research in Norway The road ahead. Till Christopher Lech The Research Council of Norway ICT Research in Norway The road ahead Till Christopher Lech The Research Council of Norway, The remainder of this presentation: The view back The view on the present The view forward Public investments

More information

Internet of Things. Legal Perspectives. Bearbeitet von Rolf H Weber, Romana Weber

Internet of Things. Legal Perspectives. Bearbeitet von Rolf H Weber, Romana Weber Internet of Things Legal Perspectives Bearbeitet von Rolf H Weber, Romana Weber 1. Auflage 2010. Buch. xxiv, 135 S. Hardcover ISBN 978 3 642 11709 1 Format (B x L): 15,5 x 23,5 cm Gewicht: 910 g Recht

More information

Data Protection & Cyber Security Law Update 1 st October 2015

Data Protection & Cyber Security Law Update 1 st October 2015 Data Protection & Cyber Security Law Update 1 st October 2015 Robert Bond, Partner Janine Regan, Associate Viktoria Protokova, Data Protection Executive charlesrussellspeechlys.com Brief introduction to

More information

Reflection Paper of the Federal Government of Germany. From Berlin 2007 to Nice 2008 and Beyond: RFID Internet of Things Internet of the Future

Reflection Paper of the Federal Government of Germany. From Berlin 2007 to Nice 2008 and Beyond: RFID Internet of Things Internet of the Future Reflection Paper of the Federal Government of Germany From Berlin 2007 to Nice 2008 and Beyond: RFID Internet of Things Internet of the Future Applications based on Radio Frequency Identification (RFID)

More information

Ofcom guidance on security requirements in sections 105A to D of the Communications Act 2003

Ofcom guidance on security requirements in sections 105A to D of the Communications Act 2003 Ofcom guidance on security requirements in sections 105A to D of the Communications Act 2003 Guidance Publication date: 08 August 2014 About this document The legislation that applies to telecoms providers

More information

Towards an RFID policy for Europe

Towards an RFID policy for Europe Towards an RFID policy for Europe Workshop report MAARTEN VAN DE VOORT ANDREAS LIGTVOET DRR-4046-EC 31 August 2006 Prepared for the EUROPEAN COMMISSION, Directorate General Information Society and Media

More information

Call topics (funding action), expected EU funding per project

Call topics (funding action), expected EU funding per project Horizon 2020 Energy Calls The EU Energy Focus service is a free, Government-funded service that aims to ensure that UK companies, research institutions and other organisations are well informed and have

More information

Opportunities for the Automotive Sector in Horizon 2020. Cliff Funnell UK FP7/H2020 Surface Transport NCP FP7UK

Opportunities for the Automotive Sector in Horizon 2020. Cliff Funnell UK FP7/H2020 Surface Transport NCP FP7UK Opportunities for the Automotive Sector in Horizon 2020 Cliff Funnell UK FP7/H2020 Surface Transport NCP Opportunity: The performance of the UK automotive sector and the success of the Low Carbon Vehicles

More information

Resolution on Privacy Protection in Social Network Services

Resolution on Privacy Protection in Social Network Services 30 th International Conference of Data Protection and Privacy Commissioners Strasbourg, 17 October 2008 Resolution on Privacy Protection in Social Network Services Proposer: Data Protection and Freedom

More information

E-PRIVACY DIRECTIVE: Personal Data Breach Notification

E-PRIVACY DIRECTIVE: Personal Data Breach Notification E-PRIVACY DIRECTIVE: Personal Data Breach Notification PUBLIC CONSULTATION BEUC Response Contact: Kostas Rossoglou digital@beuc.eu Ref.: X/2011/092-13/09/11 EC register for interest representatives: identification

More information

FRAMEWORK FOR ADVANCING TRANSATLANTIC ECONOMIC INTEGRATION BETWEEN THE EUROPEAN UNION AND THE UNITED STATES OF AMERICA

FRAMEWORK FOR ADVANCING TRANSATLANTIC ECONOMIC INTEGRATION BETWEEN THE EUROPEAN UNION AND THE UNITED STATES OF AMERICA FRAMEWORK FOR ADVANCING TRANSATLANTIC ECONOMIC INTEGRATION BETWEEN THE EUROPEAN UNION AND THE UNITED STATES OF AMERICA We, leaders of the European Union and the United States of America: Believing that

More information

The European CYberSecurity cppp ECYS Draft Proposal

The European CYberSecurity cppp ECYS Draft Proposal The European CYberSecurity cppp ECYS Draft Proposal 12 April 2016 The urgency to act We cannot miss the window opportunity for budgetary reasons: create a synergy among the different EC budgets via the

More information

Promoting investment and innovation in the Internet of Things

Promoting investment and innovation in the Internet of Things Promoting investment and innovation in the Internet of Things Call for input Publication date: 23 July 2014 Closing Date for Responses: 1 October 2014 About this document This document seeks stakeholders

More information

POSITION ON THE COMMUNICATION FROM THE EUROPEAN COMMISSION. A comprehensive strategy on data protection in the European Union

POSITION ON THE COMMUNICATION FROM THE EUROPEAN COMMISSION. A comprehensive strategy on data protection in the European Union JANUARY 14 th, 2011 POSITION ON THE COMMUNICATION FROM THE EUROPEAN COMMISSION A comprehensive strategy on data protection in the European Union This Position Paper has been entered on the European Commission's

More information

European Innovation Partnership Smart Cities and Communities Henriette VAN EIJL, European Commission, DG MOVE-C2

European Innovation Partnership Smart Cities and Communities Henriette VAN EIJL, European Commission, DG MOVE-C2 European Innovation Partnership Smart Cities and Communities Henriette VAN EIJL, European Commission, DG MOVE-C2 ERRIN-EURADA-EUROCITIES-Dutch Provinces Information/ de-brief meeting 14-5-2013 Overview

More information

Cloud Computing. by Civic Consulting (research conducted October 2011 January 2012)

Cloud Computing. by Civic Consulting (research conducted October 2011 January 2012) Cloud Computing by (research conducted October 2011 January 2012) for the European Parliament, DG Internal Policies of the Union, Directorate A (Economic and Scientific Policy); presentation for the EP

More information

What is Quantified Self (QS)?

What is Quantified Self (QS)? Subtitle Title Content Quantified Self (QS) (Sensitive) Personal data Security risks QS Privacy risks QS Art. 29 Working Party (WP29) on QS WP29 on ehealth WP29 on Internet of Things (IoT) QS data at risk

More information

How RFID can deliver benefits to the operating theatre A presentation to King's Fund Leadership Summit May 2013 Date Thursday 23rd May 2012 By Mark

How RFID can deliver benefits to the operating theatre A presentation to King's Fund Leadership Summit May 2013 Date Thursday 23rd May 2012 By Mark How RFID can deliver benefits to the operating theatre A presentation to King's Fund Leadership Summit May 2013 Date Thursday 23rd May 2012 By Mark Capel Synergy Health's, Group IT Director Overview What

More information

Global RFID Market: Trends and Opportunities ( )

Global RFID Market: Trends and Opportunities ( ) Brochure More information from http://www.researchandmarkets.com/reports/3301929/ Global RFID Market: Trends and Opportunities (2015-2019) Description: Scope of the Report The report titled Global RFID

More information

Horizon 2020 Secure Societies

Horizon 2020 Secure Societies Horizon 2020 Secure Societies Khoen Liem Policy and Research in security DG Enterprise and Industry Vienna, 18 Nov. 2013i 2013 1 Security research & the 7 th Framework Programme (FP7) FP7-Security (2007-2013):

More information

Consent Receipts. Addressing the biggest lies which are: consent & notice

Consent Receipts. Addressing the biggest lies which are: consent & notice Consent Receipts Addressing the biggest lies which are: consent & notice 1 What is a consent receipt? A consent receipt does what it says on the tin. It tracks consent by making a record of it. (Similar

More information

A European Policy on Open Access and its implementation in Horizon 2020

A European Policy on Open Access and its implementation in Horizon 2020 A European Policy on Open Access and its implementation in Horizon 2020 José C. Cotta Head of Unit 'Digital Science' Directorate-General for Communications Networks, Content & Technology (DG CONNECT) 1

More information

Automotive Oil & Fuel Filter Market

Automotive Oil & Fuel Filter Market http://www.gosreports.com Smart Label Market by Type (EAS, RFID, Sensing, & ESL), Tracking Application, Industry (Aerospace, Data Centre & Library, Food & Beverage, Healthcare & Pharmaceutical, Logistics,

More information

Procurement Innovation for Cloud Services in Europe - PICSE

Procurement Innovation for Cloud Services in Europe - PICSE Procurement Innovation for Cloud Services in Europe - PICSE Sara Garavelli, Trust-IT Services s.garavelli@trust-itservices.com ICT Proposer s Day, 9 October 2014, Florence, Italy 1 The road to PICSE Cloud

More information

Horizon 2020 - ICT Call 2016 Topic Preview 5 th May 2015

Horizon 2020 - ICT Call 2016 Topic Preview 5 th May 2015 Horizon 2020 - ICT Call 206 Topic Preview 5 th May 205 Call Identifier: H2020-ICT-206 Call Publication: late Q3 205 Call Deadline: Q-2 206 (except for the instrument) Estimated budget for this call: 970

More information

Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity

Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity Sebastian Meissner Security Incident Information Sharing Workshop Berlin, 26.07.2013 Introduction Opening question Privacy & cybersecurity:

More information

Procurement Strategy 2013-2017 Delivering Social Value for our Community

Procurement Strategy 2013-2017 Delivering Social Value for our Community Procurement Strategy 2013-2017 Delivering Social Value for our Community Making Bath & North East Somerset an even better place to live, work and visit 1 Picture courtesy of Bath & News Media Group Our

More information

This strategy has been developed by Corporate Procurement in line with The Council s high level priorities which are as follows:-

This strategy has been developed by Corporate Procurement in line with The Council s high level priorities which are as follows:- PROCUREMENT STRATEGY 1 Introduction Introduction to the Corporate Strategy for Procurement This document sets out the Council s Corporate. Its purpose is to provide Officers, Members, Contractors and the

More information

The Netherlands response to the public consultation on the revision of the European Commission s Impact Assessment guidelines

The Netherlands response to the public consultation on the revision of the European Commission s Impact Assessment guidelines The Netherlands response to the public consultation on the revision of the European Commission s Impact Assessment guidelines Introduction Robust impact assessment is a vital element of both the Dutch

More information

HORIZON 2020. ENERGY context and Calls 2014/15. Ljubljana, 23 January 2014 THE EU FRAMEWORK PROGRAMME FOR RESEARCH AND INNOVATION

HORIZON 2020. ENERGY context and Calls 2014/15. Ljubljana, 23 January 2014 THE EU FRAMEWORK PROGRAMME FOR RESEARCH AND INNOVATION THE EU FRAMEWORK PROGRAMME FOR RESEARCH AND INNOVATION HORIZON 2020 ENERGY context and Calls 2014/15 Ljubljana, 23 January 2014 Jeroen SCHUPPERS European Commission, DG Research and Innovation Europe's

More information

Dr. Jehad Al Amri and Dr. Salha Al Zahrani 02/12/2013. Computing Ethics. Lecture 7 Privacy. Dr. Jehad Al Amri and Dr. Salha Al Zahrani 1

Dr. Jehad Al Amri and Dr. Salha Al Zahrani 02/12/2013. Computing Ethics. Lecture 7 Privacy. Dr. Jehad Al Amri and Dr. Salha Al Zahrani 1 Computing Ethics Lecture 7 Privacy Dr. Jehad Al Amri and Dr. Salha Al Zahrani 1 1 2 Outline Learning Outcomes Computer Revolution and Ethics TheConcept of Privacy Privacy concepts in different cultures

More information

Procurement Strategy

Procurement Strategy Procurement Strategy 2014-15 www.gwynedd.gov.uk Table of content 1. Introduction 1.1 Procurement in Gwynedd 1.2 What we have achieved 2. Local Benefit from Procurement Spend 2.1 Category management 2.2

More information

TOWARDS A STRATEGIC NANOTECHNOLOGY ACTION PLAN (SNAP) 2010-2015

TOWARDS A STRATEGIC NANOTECHNOLOGY ACTION PLAN (SNAP) 2010-2015 TOWARDS A STRATEGIC NANOTECHNOLOGY ACTION PLAN (SNAP) 2010-2015 1. Respondent profile For individuals: - Name, age, gender, country, e-mail. - From which perspective are you interested in nanotechnologies:

More information

ICT 6: Cloud computing

ICT 6: Cloud computing computing Jorge GASÓS Software and Services, Cloud Unit DG Connect Jorge.Gasos@ec.europa.eu Cloud computing in previous WPs FP7 ICT Work Programmes (Calls 1, 5, 8, 10) Total investment in the software,

More information

The European Alliance for IoT Innovation

The European Alliance for IoT Innovation The European Alliance for IoT Innovation An Innovation Perspective Rolf Riemenschneider Thibaut Kleiner DG CONNECT E1 Network Technologies European Commission 1 Value creation from digitisation: Products,

More information

Privacy Update for Australian Government Agencies. What we've seen in the first 12 months of the new APPs and what's next!

Privacy Update for Australian Government Agencies. What we've seen in the first 12 months of the new APPs and what's next! Privacy Update for Australian Government Agencies What we've seen in the first 12 months of the new APPs and what's next! Presented by Sharon Rowe and Alec Christie Canberra, 31 March 2015 What we are

More information

Regulator Performance Framework: ASIC evidence metrics

Regulator Performance Framework: ASIC evidence metrics Regulator Performance Framework: Contents The Regulator Performance Framework (Framework) provides common performance measures to assess how Commonwealth regulators operate. The Framework is designed to

More information