Search results

221 items matching your search terms.
Filter the results.
Item type












































New items since



Sort by relevance · date (newest first) · alphabetically
Image JPEG image dataprotection.jpg
Located in Topics / Data Protection
File ECMAScript program PETs control matrix Annex 1: Assessment questionnaires
Located in Publications / PETs controls matrix
Press Release Privacy tools, security measures and evaluation of current technologies under the spotlight at this year’s Annual Privacy Forum
Successful conclusion of the fourth edition of the Annual Privacy Forum, held on the 7th and 8th September at Goethe University Frankfurt, Germany. The event provided a forum to academia, industry and policy makers for a discussion on privacy engineering and technical solutions to data protection.
Located in News / ENISA News
Report/Study Technology-induced challenges in Privacy & Data Protection in Europe
The ENISA Working Group on Privacy & Technology has been established to analyse the problems posed by these technology trends and the implications for the current EU legal framework. The main task of the Working Group is to propose actions to cope with these difficulties. In this report, we identify the main technology-induced gaps between data protection regulation and the realities of the developing socio-economic environment. We consider the potential threats and opportunities presented by state-of-the-art technologies and suggest priorities for tackling the most pressing gaps.
Located in Publications
Report/Study Technology-induced challenges in Privacy & Data Protection in Europe [French Version]
In this page you will find the French version of the report.
Located in Publications
Report/Study Technology-induced challenges in Privacy & Data Protection in Europe [Spanish Version]
In this page you will find the Spanish version of the report.
Located in Publications
Report/Study Technology-induced challenges in Privacy & Data Protection in Europe [German Version]
In this page you will find the German version of the report.
Located in Publications
Report/Study ECMAScript program Status of privacy and NIS course curricula in EU Member States
User Education is key in cyber security. Our work for this report follows up on previous efforts and suggested recommendations from 2014 and 2013. The first objective of this report is to identify gaps between available training courses, certifications and NIS education needs with particular emphasis on ePrivacy. The second objective is to suggest further actions based on the analysed needs of NIS communities in Europe
Located in Publications
Report/Study Algorithms, key size and parameters report 2014
The “Algorithms, key size and parameters” report of 2014 is a reference document providing a set of guidelines to decision makers, in particular specialists designing and implementing cryptographic solutions for personal data protection within commercial organisations or governmental services for citizens. This report provides an update of the 2013 cryptographic guidelines report (link below) on security measures required to protect personal data in online systems. Compared with the 2013 edition, the report has been extended to include a section on hardware and software side-channels, random number generation, and key life cycle management, while the part on protocols, for 2014 is extended and is a stand-alone study on cryptographic protocols (link included below). The EC Regulation 611/2013 (link below) references ENISA as a consultative body, in the process of establishing a list of appropriate cryptographic protective measures for personal data protection
Located in Publications
Report/Study Troff document Algorithms, Key Sizes and Parameters Report - 2013
This document collates a series of recommendations for algorithms, keysizes, and parameter recommendations. It addresses the need for a minimum level of requirements for cryptography across European Union (EU) Member States (MSs) in their effort to protect personal and sensitive data of the citizens. The document tries to address the need for continuation of the reports published by ECRYPT NoE and also the requirements for cryptographic protective measures applicable to the notification of personal data breaches. This report is complementing another study published by ENISA that provides an easy to read and understand context for non-speciallized parties.
Located in Publications

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information