Local view for "http://purl.org/linkedpolitics/eu/plenary/2002-10-23-Speech-3-188"

PredicateValue (sorted: default)
rdf:type
dcterms:Date
dcterms:Is Part Of
dcterms:Language
lpv:document identification number
"en.20021023.4.3-188"2
lpv:hasSubsequent
lpv:speaker
lpv:spoken text
". – Madam President I wish to reply to two comments, one by Mrs Flesch and one by Mr von Boetticher. The budget in that area is still limited, only EUR 1 million. I hope the budgetary authority will be more helpful and increase the allocation. Paragraph 34 calls for particular attention to be paid to the position of the applicant countries. We have opened discussions with the specific aim of finding solutions for technology-neutral electronic signature. We have also initiated research programmes for the candidate countries. Paragraphs 36, 37 and 39 concern our internal decisions. As I said earlier, the Commission has conducted an internal audit to detect any flaws in the configuration of servers, primary domain controllers, personal computers and webservers. A new decision on the Commission's security provisions was taken in November 2001. Our security directorate has drafted a new information systems security programme. A specific decision was recently taken on the external delegations, as a result of which we have modernised and extended the cypher system for secure data communications between headquarters and Commission delegations worldwide. In paragraph 40, you call on the Commission and Member States to invest in new technologies in the field of decryption and encryption techniques as part of the Sixth Framework Programme. That will be a major priority. Paragraph 42 calls on the Commission to put forward a proposal to establish a coordinated network of advisory centres. That is exactly what the cyber-security task force is proposing. I am fully prepared to accept criticism, but if you say that nothing has happened, then I must be a very bad communicator. At any rate I will send Members of Parliament the information in writing. We are working in an extremely difficult field. Mr Schmid, who was the rapporteur on this very complex subject, concentrated on general network and information security network issues, not just on Echelon. I have replied on those issues where you have given the Commission specific tasks. Many tasks have been assigned to Member States and, on those, Member States will reply directly. Mrs Flesch, I mentioned Echelon exactly as many times as it was mentioned in Parliament's resolution. It was mentioned only once in the resolution because the resolution concentrated specifically on the information network security measures. As regards the concrete measures, I have a bad habit of adhering to Parliament's time-limits and I used nine minutes fifty-seven seconds out of the allotted ten minutes. There are 70 measures. That means I would have 20 seconds for each. But as I have been asked, I will go through them all. I hope you will listen to what we have done. On paragraph 27, the Commission's proposal for a cyber security task force will come in early December or in November, if we are lucky. This will create a network of experts in the field and also computer emergency response teams. This applies to both paragraphs 27 and 28. Paragraph 29 concerns research work on encryption technology. I have personally guaranteed that it will have higher priority in the IST programme under the Sixth Framework Programme. We have just given instructions to our committees. Open-source encryption software is a higher priority in FP6. Thirdly, on the promotion of open-source software, I personally organised an IDA – interchange of data between administrations – conference and Member States were invited to look at how open-source software can be used in public administrations. It was a great success. I have one comment to make on open-source. Remember, if the source code is open for developers then it is also open for interceptors. So it does not solve all the problems, but I am very much in favour of it. Paragraph 31 concerns standardisation. You said that nothing has been done. You are wrong. I have tasked European standardisation organisations to work on this issue. Their working group on NIS was set up in June 2002. The aim is to determine the need for new security standards, to improve security policy. Paragraphs 32 and 34 call for European institutions and the public administrations of the Member States systematically to encrypt e-mails. There are now a number of measures in the Commission's strategy which are based on preventing intrusion into the Commission's internal network, ensuring a good overall level of security. The sensitivity of the data called for special solutions."@en1
lpv:unclassifiedMetadata

Named graphs describing this resource:

1http://purl.org/linkedpolitics/rdf/English.ttl.gz
2http://purl.org/linkedpolitics/rdf/Events_and_structure.ttl.gz

The resource appears as object in 2 triples

Context graph