EU's cybersecurity strategy under fire before Thursday reveal

Industry, politicians and digital rights groups are all taking issue with the plan

The European Commission's long-awaited Cyber Security Strategy will be presented on Thursday and as written, it would force private companies, so-called "enablers of information society services," to report all data breaches or cyber security incidents to national authorities.

With leaked drafts of the text circulating in Brussels, the strategy has come under fire before it has even been formally announced. Industry leaders are worried that extending the scope of reporting mandates could harm business, while European digital rights group EDRi said that the move would give national authorities access to "sufficient information from almost everyone online" in breach of the European Convention on Human Rights.

The next step in implementing the strategy is a planned Directive on Network and Infrastructure Security that will need to be approved by the European Parliament and the European Union member states.

Voluntary regulation has not worked, a European Commission official said. Therefore member states will be required to designate a contact agency that is responsible for interacting with other agencies in the E.U. "We would expect such agencies to include experts who can forensically analyze malware," said the official. E.U. member states will also be asked to guarantee minimum capabilities to respond adequately to threats.

So-called enablers of information society services, which would include companies such as PayPal, Google, Amazon, eBay and Skype, would have to notify authorities of data-privacy breaches or "incidents with a significant impact" on services, such as natural disasters, extreme weather and cases of human error, as well as cyberattacks. There must be consequences if this is not done, said the Commission official, but it is up to the member states what sort of sanctions they want to implement.

Meanwhile Dutch Member of the European Parliament, Sophie in 't Veld said the strategy was "incoherent, lacking in focus and a complete hotchpotch."

"It looks like almost every Directorate General (department) in the Commission wanted to write its own bit of the strategy. It bothers me that all these different policy areas are being lumped together in one document. It covers so much, from internet fraud and illegal downloading, to child pornography and international security," she said.

"The lines are being blurred and we need to safeguard the fundamental rights we expect in a democracy and not cede disproportionate powers to law enforcement," said In't Veld.

The Commission draft text says that "synergies between civilian and military approaches in protecting critical cyber assets should be enhanced" and adds that the Budapest convention on cybercrime should serve as a model for future plans. But, said the official, "we are not China, we are not trying to use cyber security to control what is on the web."

The Commission's 2012 online public consultation found that 57 percent of respondents had experienced cyber security incidents in the previous year that had a serious impact on their activities.

Follow Jennifer on Twitter at @BrusselsGeek or email tips and comments to jennifer_baker@idg.com.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags business issuessecuritylegalinternetgovernment

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jennifer Baker

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?