Search results

246 items matching your search terms.
Filter the results.
Item type



















































New items since



Sort by relevance · date (newest first) · alphabetically
Report/Study image/x-coreldrawpattern Survey of accountability, trust, consent, tracking, security and privacy mechanisms in online environments
The study, using a survey, attempts to evaluate which are currently the mechanisms deployed in available online services for accountability, consent, trust, security and privacy. While the finding of this survey cannot be easily extrapolated to all online services, some trends are prominent and it is safe to assume that these are valid for most organisations that operate online. Besides these trends, we mention here the lack of a single coherent view on how to best achieve user privacy in online environments. An increase in awareness of privacy and security concepts within organisations and industry sectors appears to be desirable, in order to maintain a high level of security and confidence on the part of users and society in the ICT infrastructure and services provided within the EU. A major area of concern was how the EU would create and maintain a ‘level regulatory playing field’, especially with non-EU based multinationals entering the EU market without proper (privacy) compliance and rapidly establishing a significant user base.
Located in Publications
Press Release Taking rights seriously: GDPR starts applying today
Today, 25 May 2018, is a landmark in the protection of personal data and privacy of individuals, as the General Data Protection Regulation (GDPR) (EU) 2016/679 starts applying after a long-lasting legislative process.
Located in News / ENISA News
Report/Study Technology-induced challenges in Privacy & Data Protection in Europe
The ENISA Working Group on Privacy & Technology has been established to analyse the problems posed by these technology trends and the implications for the current EU legal framework. The main task of the Working Group is to propose actions to cope with these difficulties. In this report, we identify the main technology-induced gaps between data protection regulation and the realities of the developing socio-economic environment. We consider the potential threats and opportunities presented by state-of-the-art technologies and suggest priorities for tackling the most pressing gaps.
Located in Publications
Report/Study Technology-induced challenges in Privacy & Data Protection in Europe [French Version]
In this page you will find the French version of the report.
Located in Publications
Report/Study Technology-induced challenges in Privacy & Data Protection in Europe [Spanish Version]
In this page you will find the Spanish version of the report.
Located in Publications
Report/Study Technology-induced challenges in Privacy & Data Protection in Europe [German Version]
In this page you will find the German version of the report.
Located in Publications
File Pascal source code Terms of Reference - Data Security Stakeholders Group
Located in Press & Media / News Items
The importance of cryptography for the digital society
Following the Council meeting on 8th and 9th December 2016 in Brussels, ENISA’s paper gives an overview into aspects around the current debate on encryption, while highlighting the Agency’s key messages and views on the topic.
Located in News / ENISA News
Report/Study The right to be forgotten - between expectations and practice
The right to be forgotten is included in the proposed regulation on data protection published by the European Commission in January 2012. The regulation is still to be adopted by the European Parliament for entering into force. The different legal aspects of the right to be forgotten (i.e. right to erasure or right to oblivion) have been debated in different contexts and are beyond the scope of this paper. With this paper we aim to cover other facets of the right to be forgotten. We focus on the technical means to enforce or support the right in information systems; as can be seen from this paper, there are technical limitations and there is a further need for clear definitions and legal clarifications.
Located in Publications
File To log or not to log? - Risks and benefits of emerging life-logging applications [Appendix II]
This is the Appendix II Risk Assessment Spreadsheet, accompanying the deliverable "To log or not to log? - Risks and benefits of emerging life-logging applications"
Located in Publications / Life-logging risk assessment

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information