ENISA
https://www.enisa.europa.eu
Technology-induced challenges in Privacy & Data Protection in Europe [French Version]
https://www.enisa.europa.eu/publications/technology-induced-challenges-in-privacy-data-protection-in-europe-fr
In this page you will find the French version of the report. No publisherIdentity & TrustTrainingsPrivacy2009/10/13 10:05:00 GMT+2Report/StudyTechnology-induced challenges in Privacy & Data Protection in Europe
https://www.enisa.europa.eu/publications/technology-induced-challenges-in-privacy-data-protection-in-europe
The ENISA Working Group on Privacy & Technology has been established to analyse the problems posed by these technology trends and the implications for the current EU legal framework. The main task of the Working Group is to propose actions to cope with these difficulties. In this report, we identify the main technology-induced gaps between data protection regulation and the realities of the developing socio-economic environment. We consider the potential threats and opportunities presented by state-of-the-art technologies and suggest priorities for tackling the most pressing gaps.No publisherIdentity & TrustTrainingsPrivacy2009/08/07 12:50:00 GMT+2Report/StudySurvey of accountability, trust, consent, tracking, security and privacy mechanisms in online environments
https://www.enisa.europa.eu/publications/survey-pat
The study, using a survey, attempts to evaluate which are currently the mechanisms deployed in available online services for accountability, consent, trust, security and privacy. While the finding of this survey cannot be easily extrapolated to all online services, some trends are prominent and it is safe to assume that these are valid for most organisations that operate online. Besides these trends, we mention here the lack of a single coherent view on how to best achieve user privacy in online environments. An increase in awareness of privacy and security concepts within organisations and industry sectors appears to be desirable, in order to maintain a high level of security and confidence on the part of users and society in the ICT infrastructure and services provided within the EU. A major area of concern was how the EU would create and maintain a ‘level regulatory playing field’, especially with non-EU based multinationals entering the EU market without proper (privacy) compliance and rapidly establishing a significant user base. No publisherIdentity & TrustPrivacy2011/01/31 15:45:00 GMT+2Report/StudySupporting the fight against cybercrime
https://www.enisa.europa.eu/news/enisa-news/supporting-the-fight-against-cybercrime
The map to the road less traveled: CSIRTs & Law Enforcement cooperationNo publisherCybersecurityLaw Enforcement AutoritiesIdentity & TrustCSIRTsCyber Crisis Cooperation2020/04/02 12:00:00 GMT+2News ItemStudy on data collection and storage in the EU
https://www.enisa.europa.eu/publications/data-collection
Given the clear contrast between the importance of the privacy by design principle on the one hand, and the reality of lax data protection practices with many online service providers on the other hand, the aim of this study is to present an analysis of the relevant legal framework of European Member States on the principles of minimal disclosure and the minimum duration of the storage of personal data. The study is not intended to go too deep into the details of the legal complexities of the data protection legislation. It rather focuses on a limited number of relevant use cases and tries to find out how the aforementioned principles are expressed in concrete legal or regulatory provisions applicable to these cases, and how they are observed in practice.No publisherIdentity & TrustPrivacy2012/02/23 11:55:00 GMT+2Report/StudySeminar on Blockchain-based Digital Identity Solutions
https://www.enisa.europa.eu/events/workshop-on-blockchain-based-digital-identity-solutions
ENISA, helped by Delft Blockchain Lab, organises a seminar on blockchain solutions, delving into the basic concepts and pro & cons, presenting also current initiatives and some practical examples.No publisherIdentity & Trust2021/04/26 10:00:00 GMT+2EventSecurity, is there an app for that? EU’s cyber-security agency highlights risks & opportunities of smartphones
https://www.enisa.europa.eu/news/enisa-news/security-is-there-an-app-for-that-eu2019s-cyber-security-agency-highlights-risks-opportunities-of-smartphones
A new ENISA report identifies the top security risks and opportunities of smartphone use and gives practical security advice for businesses, consumers and governments. Top risks include spyware, poor data cleansing when recycling phones, accidental data leakage, and unauthorised premium-rate phonecalls and SMSs.No publisherIdentity & Trust2010/12/10 09:10:00 GMT+2Press ReleaseSecurity Privacy and Dataprotection
https://www.enisa.europa.eu/media/news-items/security-privacy-and-dataprotection/view
Presentation by Dr Udo Helmbrecht, Spain 24 May 2010 on Security a key element of Privacy and DataprotectionNo publisherPrivacyIdentity & Trust2010/05/28 09:36:42 GMT+2FileSecurity guidelines on the appropriate use of qualified electronic registered delivery services
https://www.enisa.europa.eu/publications/security-guidelines-on-the-appropriate-use-of-qualified-electronic-registered-delivery-services
This document addresses qualified electronic registered delivery services and is one out of a series of five documents which aim to assist parties wishing to use qualified electronic signatures, seals, time stamps, eDelivery or website authentication certificates to understand the subject correctly as-well-as the potential benefits, amongst others, by giving examples of possible applications. This series of documents also aims to give those parties some advice on how to correctly use the related qualified trust services. No publisherTrust service providerseIDIdentity & Trust2017/05/07 23:00:00 GMT+2Report/StudySecurity guidelines on the appropriate use of qualified electronic signatures
https://www.enisa.europa.eu/publications/security-guidelines-on-the-appropriate-use-of-qualified-electronic-signatures
This document addresses qualified electronic signatures and is one out of a series of five documents which target to assist parties aiming to use qualified electronic signatures, seals, time stamps, eDelivery or website authentication certificates to understand the subject correctly as-well-as the potential benefits, amongst others, by giving examples of possible application. This series of documents also targets to give those parties some advice on how to correctly use the related (qualified) trust services. No publisherTrust service providerseIDIdentity & Trust2017/05/07 23:00:00 GMT+2Report/StudySecurity guidelines on the appropriate use of qualified website authentication certificates
https://www.enisa.europa.eu/publications/security-guidelines-on-the-appropriate-use-of-qualified-website-authentication-certificates
This document addresses qualified certificates for website authentication and is one out of a series of five documents which aim to assist parties wishing to use qualified electronic signatures, seals, time stamps, eDelivery or website authentication certificates to understand the subject correctly as-well-as the potential benefits, amongst others, by giving examples of possible application. This series of documents also targets to give those parties some advice on how to correctly use the related qualified trust services.No publisherTrust service providerseIDIdentity & Trust2017/05/07 23:00:00 GMT+2Report/StudySecurity guidelines on the appropriate use of qualified electronic seals
https://www.enisa.europa.eu/publications/security-guidelines-on-the-appropriate-use-of-qualified-electronic-seals
This document addresses qualified electronic seals and is one out of a series of five documents which target to assist parties aiming to use qualified electronic signatures, seals, time stamps, eDelivery and website authentication certificates to understand the subject correctly as-well-as the potential benefits, amongst others, by giving examples of possible application. This series of documents also targets to give those parties some advice on how to correctly use the related qualified trust services.No publisherTrust service providerseIDIdentity & Trust2017/05/07 23:00:00 GMT+2Report/StudySecurity guidelines on the appropriate use of qualified electronic time stamps
https://www.enisa.europa.eu/publications/security-guidelines-on-the-appropriate-use-of-qualified-electronic-time-stamps
This document addresses qualified electronic time stamps and is one out of a series of five documents which target to assist parties aiming to use qualified electronic signatures, seals, time stamps, eDelivery or website authentication certificates to understand the subject correctly as-well-as the potential benefits, amongst others, by giving examples of possible application. This series of documents also targets to give those parties some advice on how to correctly use the related qualified trust services. No publisherTrust service providerseIDIdentity & Trust2017/05/07 23:00:00 GMT+2Report/StudyRevisión de la cuestión de la privacidad: iconos, normas y una evaluación de sellos en línea más claros para generar confianza en línea
https://www.enisa.europa.eu/news/enisa-news/prs-in-french/revision-de-la-cuestion-de-la-privacidad/view
¿Cuándo confía Vd. realmente en que los servicios web gestionen sus datos de manera segura? La agencia de ciberseguridad de la UE (ENISA) ha elaborado un nuevo informe en el que analiza las condiciones bajo las cuales los sellos de seguridad y privacidad en línea ayudan a los usuarios a evaluar la confianza que genera un servicio web.No publisherIdentity & Trust2014/01/15 16:02:15 GMT+2FileReport on European eIDM
https://www.enisa.europa.eu/news/enisa-news/report-on-european-eidm
ENISA launches its 1st report on the state of play in European eIDM. Could ‘digital free movement of people’ in Europe become a reality by the end of 2009? The EU Agency ENISA [the European Network and Information Security Agency] presents its first report on the current state of European eID interoperability. Europe has bold ambitions for interoperable eID services by the end of 2009. This report looks at how various initiatives such as the STORK project and the Services Directive could make eID work for business and government e-services across Europe. No publisherIdentity & Trust2009/01/29 16:55:00 GMT+2Press Release