COUNCIL OF THE EUROPEAN UNION. Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593

Similar documents
Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

13967/16 MK/mj 1 DG D 2B

A Strategy for a secure Information Society Dialogue, Partnership and empowerment

Security and resilience in Information Society: the European approach

Commonwealth Cyber Declaration

Promoting Global Cybersecurity

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

10496/18 MC/sl 1 DGD 2

Cyber Security in Europe

Information sharing in the EU policy on NIS & CIIP. Andrea Servida European Commission DG INFSO-A3

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Plenipotentiary Conference (PP- 14) Busan, 20 October 7 November 2014

Implementing the Administration's Critical Infrastructure and Cybersecurity Policy

The EU Cybersecurity Package: Implications for ENISA Dr. Steve Purser Head of ENISA Core Operations Athens, 30 th January 2018

Cybersecurity for ALL

Valérie Andrianavaly European Commission DG INFSO-A3

ENISA s Position on the NIS Directive

Global cybersecurity and international standards

ENISA EU Threat Landscape

5972/17 GT/cb 1 DG G 3 C

Security and resilience in the Information Society: the role of CERTs/CSIRTs in the context of the EU CIIP policy

EU policy on Network and Information Security & Critical Information Infrastructures Protection

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

EISAS Enhanced Roadmap 2012

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/56/561/Add.2)]

General Framework for Secure IoT Systems

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

Resolution adopted by the General Assembly. [without reference to a Main Committee (A/62/L.30 and Add.1)]

The commission communication "towards a general policy on the fight against cyber crime"

MOTION FOR A RESOLUTION

European Union Agency for Network and Information Security

RESOLUTION 130 (REV. BUSAN, 2014)

Horizon 2020 Security

Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

Cyber Security Strategy

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

IPv6 Task Force - Phase II. Welcome

RESOLUTION 130 (Rev. Antalya, 2006)

The NIS Directive and Cybersecurity in

Implementing Executive Order and Presidential Policy Directive 21

ISRAEL NATIONAL CYBER SECURITY STRATEGY IN BRIEF

NIS-Directive and Smart Grids

Position Paper of the ASD Civil Aviation Cybersecurity Taskforce

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 21 October /13 LIMITE CO EUR-PREP 37. NOTE General Secretariat of the Council

6056/17 MK/ec 1 DG D 2B

Resolution adopted by the General Assembly on 14 December [without reference to a Main Committee (A/61/L.44 and Add.1)]

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

Child Online Protection

LIMITE EN COUNCIL OF THE EUROPEAN UNION. Brussels, 26 September 2008 (30.09) (OR. fr) 13567/08 LIMITE ENFOPOL 170 CRIMORG 150

Securing Europe's Information Society

G8 Lyon-Roma Group High Tech Crime Subgroup

10007/16 MP/mj 1 DG D 2B

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

The Science and Technology Roadmap to Support the Implementation of the Sendai Framework for Disaster Risk Reduction

European Union Financing Mechanisms for ICT in Latin American context

2009/7 Assessment of the progress made in the implementation of and follow-up to the outcomes of the World Summit on the Information Society

RESOLUTION 45 (Rev. Hyderabad, 2010)

Research Infrastructures and Horizon 2020

Resolution adopted by the General Assembly. [on the report of the Second Committee (A/64/417)]

Nuclear Security. Resolution adopted on 30 September 2016 during the tenth plenary meeting

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

13543/17 PhL/at 1 DG G 3 B

Cybersecurity & Digital Privacy in the Energy sector

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

16474/08 JJ/ap 1 DGH4

Cyber Security in Europe and CEER s new PEER initiative

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Public consultation on Counterfeit and Piracy Watch-List

European Commission Directorate General Enterprise and Industry INSTITUTIONAL FRAMEWORK ON

10025/16 MP/mj 1 DG D 2B

Joint Declaration by G7 ICT Ministers

ehealth Ministerial Conference 2013 Dublin May 2013 Irish Presidency Declaration

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

Between 1981 and 1983, I worked as a research assistant and for the following two years, I ran a Software Development Department.

Harmonisation of Digital Markets in the EaP. Vassilis Kopanas European Commission, DG CONNECT

Enhancing the cyber security &

SWITCH-Asia Regional Policy Advocacy Component. Full Event Report Sustainability Reporting Thinking Circular Economy by Businesses

Discussion on MS contribution to the WP2018

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

Directive on Security of Network and Information Systems

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Requirements on new data protection regulations and current changing needs from the view of the EDPS

Research Infrastructures and Horizon 2020

COUNCIL OF THE EUROPEAN UNION. Brussels, 26 November /10

NIS Standardisation ENISA view

Directive on security of network and information systems (NIS): State of Play

Draft Resolution for Committee Consideration and Recommendation

Information Security and Cyber Security

Cybersecurity and Vulnerability Assessment

Cybersecurity Strategy of the Republic of Cyprus

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness

UNITED STATES OF AMERICA COMMENTS ON THE REPORT OF THE WGIG

Strategic and operational threat analysis at Europol's EC3

Transcription:

COUNCIL OF THE EUROPEAN UNION Brussels, 28 January 2003 (OR. en) 15723/02 TELECOM 78 JAI 307 PESC 593 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject : Council Resolution on a European approach towards a culture of network and information security 15723/02 GR/mn

COUNCIL RESOLUTION of on a European approach towards a culture of network and information security THE COUNCIL OF THE EUROPEAN UNION, RECALLING: 1. the Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions Network and Information Security: Proposal for a European Policy Approach; 2. the Council Resolution of 30 May 2001 on the "eeurope Action Plan: Information and Network Security"; 3. the Council Resolution of 28 January 2002 on a common approach and specific actions in the area of network and information security 1 ; 4. the eeurope 2005 action plan endorsed by the Seville European Council in June 2002; 5. the Opinion of the European Parliament on the European Commission Communication on Network and Information Security: Proposal for a European Policy Approach; 1 OJ C 43, 16.2.2002, p. 2. 15723/02 GR/mn 1

ACCORDINGLY STRESSES THAT: 1. with the development of information society services, network and information security is an increasingly vital issue for the daily life of citizens, businesses and public administrations contributing to the proper functioning of the Internal Market; 2. Member States and the European institutions must further develop a comprehensive European strategy for network and information security and strive towards "a culture of security" taking into account the importance of international cooperation; 3. the OECD Guidelines for the security of Information Systems and Networks are considered a valuable model for developing policies which achieve a culture of security while respecting democratic values and the importance of personal data protection; 4. care must be taken to respect privacy rights. Citizens and enterprises must have confidence that information is handled accurately, confidentially and reliably; 5. in developing a culture of security a significant a task will be to clarify by the responsibility for the security of networks and information systems for all stakeholders; 6. Europe needs to ensure the development and deployment of an appropriate skillbase in the field of network and information security; 15723/02 GR/mn 2

7. there is a need for increased transparency, information exchange and cooperation between Member States, European institutions and the private sector; 8. a coherent security policy development at European level requires cross-pillar transparency and cooperation; 9. the ongoing work to fulfil the commitments made in the Council Resolution of 28 January 2002 on a common approach and specific actions in the area of network and information security has to be continued. THEREFORE INVITES MEMBER STATES TO: 1. promote security as an essential component in public and private governance, in particular by encouraging assignment of responsibilities; 2. provide for appropriate education and vocational training, as well as awareness-raising, particularly among young people, to security issues; 3. take adequate measures to prevent and respond to security incidents, in particular through: (a) the continuous improvement of the identification and assessment of security problems and the application of appropriate controls; 15723/02 GR/mn 3

(b) the establishment of effective ways of communicating the need for action to all stakeholders by reinforcing the dialogue at European and national levels and, where appropriate, international levels in particular with those supplying information society technology and services; (c) addressing appropriate information exchange corresponding to the needs of society to remain informed on good practices related to security; 4. encourage cooperation and partnerships between academia and enterprises to provide secure technologies and services and to encourage development of recognised standards. WELCOMES THE INTTION OF THE COMMISSION TO: 1. apply the open method of coordination in relation to Member States' ongoing actions and to assess their impact on security; 2. set up a temporary interdisciplinary working group in close cooperation with and composed of Member States representatives to conduct preparatory actions with a view to the establishment of a Cyber-Security Task Force as referred to in the Council Resolution of 28 January 2002; 15723/02 GR/mn 4

3. further develop, in cooperation with Member States, a dialogue with industry to improve security in the development of hardware and software products and ensure the availability of services and data; 4. establish contacts with relevant international partners and international organisations with a view to cooperation and exchange of information in this area and to report to the Council on a regular basis; 5. establish the Cyber-Security Task Force referred to point 2. CALLS UPON: 1. industry to integrate the management of security risks into the mainstream of management thinking and business engineering; 2. all users to take a holistic view of the risks associated with information systems and look at the threats arising from physical events, human failings as well as technological vulnerabilities and deliberate attacks; 3. industry and all users to enter into dialogue with governments in developing a culture of security. 15723/02 GR/mn 5