This Good Practice Collection was produced at the initiative of ENISA in the context of its support activities to ensure the efficient functioning of CERTs/CSIRTs and their cooperation with law enforcement agencies (LEAs) in the face of a new development in European cybercrime policy. In 2010, the European Commission published a Proposal for a Directive of the European Parliament and the Council on attacks against information systems. This proposal was intended to further streamline the legal framework in the Member States in relation to the definition and punishment of certain cybercrime incidents, and tackled several challenges which were not adequately dealt with under prior rules, such as notably the creation, use and dissemination of cybercrime tools, the penalisation of illegal interception, the use of botnets, and identity theft. The proposal was adopted by the European Parliament on 22 July 2013 and published in the Official Journal on 14 August 2013 as Directive 2013/40/EU. The Directive, which Member States will need to transpose by 4 September 2015, imposes new obligations, tasks and expectations on certain key stakeholders, including CERTs/CSIRTs, LEAs, security specialists, telecommunications service providers, etc. This report serves two major goals, which both aim at supporting CERTs/CSIRTs: Firstly to provide an analysis of the legal framework created by the Directive, coupled with a stock taking on relevant existing national activities and good practices; Secondly, the identification of key areas and, where appropriate, guidelines and recommendations derived from these good practices In this manner, the Collection endeavours to be a useful support tool for all stakeholders. -- EU Bookshop.
Data security breaches involving huge data losses such as that of Sony was well-publicised and reported.7 2 BBC news. Timeline: child benefits records loss available at http://news.bbc.co.uk/1/ hi/7104368.stm, dated 25 June 2008; Leydon ...
This updated edition of a well-known comprehensive analysis of the criminalization of cyberattacks adds important new guidance to the legal framework on cybercrime, reflecting new legislation, technological developments, and the changing ...
This open access book explores the legal aspects of cybersecurity in Poland.
That this is true is emphasised by the ever-increasing amount of legislation stemming from the European Union (EU) which impacts, both directly and indirectly, on the criminal law.
EU National Cyber Security Strategy and Programs Handbook - Strategic Information and Developments
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved.
This timely book answers the question with a comprehensive approach that combines legal, policy and technological perspectives to capture the essence of the relationship between cybersecurity, privacy and data protection in EU law.
381 John Borland, “'Hacker space' movement sought for US”; see also Dylan Tweney, “DIY freaks flock to 'hacker spaces' worldwide”; see also Steven Kurutz, “One big workbench”. 382 John Borland, “'Hacker space' movement sought for US”.
... Oxford University Press, 2010) Corstens, G and Pradel, J, European Criminal Law (The Hague, Kluwer Law International, 2002) Coulson, N and Hutchinson, AEJ, 'Should Access to the Internet be a Fundamental Right?' (2010) 12 E-Commerce ...
This extensively revised and updated third edition of EU Internet Law offers a state of the art overview of the key areas of EU Internet regulation, as well as a critical evaluation of EU policy-making and governance in the field.