Search results

242 items matching your search terms.
Filter the results.
Item type


















































New items since



Sort by relevance · date (newest first) · alphabetically
Image JPEG image securityprinciples.jpg
Located in Topics / Data Protection / Security of personal data
Image JPEG image privacysecurity.jpg
Located in Topics / Data Protection / Security of personal data
Image JPEG image locksecurity2.jpg
Located in Topics / / Security of personal data / Cryptographic protocols and tools
Image JPEG image informationsecurity.jpg
Located in Topics / / Security of personal data / Security measures
Image PNG image PETs.png
Located in Topics / Data Protection / Privacy enhancing technologies
Image JPEG image PbD.jpg
Located in Topics / Data Protection / Privacy by Design
Report/Study ECMAScript program Information security and privacy standards for SMEs
The analysis conducted for this study, based on the interviews with subject matter experts and review of available studies, shows that, despite rising concerns on information security risks, the level of SMEs information security and privacy standard adoption is relatively low. The main existing drivers and barriers that contribute to the limited uptake of information security and privacy standards in European SMEs have been identified and analysed in this
Located in Publications
Report/Study text/texmacs Readiness Analysis for the Adoption and Evolution of Privacy Enhancing Technologies
This report aims at developing a methodology that allows to compare different Privacy Enhancing Tech-nologies (PETs) with regard to their maturity, i.e., their technology readiness and their quality concerning the provided privacy notion. The report firstly sketches a methodology for gathering expert opinions and measurable indicators as evidence for a two dimensional rating scale. Secondly, this report reviews two pilots to test the proposed scales and methodology. The results of these pilots are presented in this study. Finally, a list of necessary steps towards a PET maturity repository is made available.
Located in Publications
Annual Privacy Forum 2016: Final call for papers
Interested parties are invited to submit their papers for this year's #APF16 conference until 31st March, 2016.
Located in News / ENISA News
Emerging and Future Risks
Folder contains our work in the area of identification of emerging and future risks.
Located in Topics / Threat and Risk Management / Risk Management

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information