ΕΕΛ/ΛΑΚ - Λίστες Ταχυδρομείου

FYI: Points 27 to 34 of European Parliament resolution of July 2001

....

27. Calls on the Commission and the Member States to inform their citizens and
firms about the possibility that their international communications may, under
certain circumstances, be intercepted; insists that this information should be
accompanied by practical assistance
in designing and implementing comprehensive protection measures, including the
security of information technology;

28. Calls on the Commission, the Council and the Member States to develop and
implement an effective and active policy for security in the information
society; insists that as part of this policy specific attention should be given
to increasing the awareness of all users of modern communication systems of the
need to protect confidential information; furthermore, insists on the
establishment of a Europe-wide, coordinated network of agencies capable of
providing practical assistance in designing and implementing 
comprehensive protection strategies;

29. Urges the Commission and Member States to devise appropriate measures to
promote, develop and manufacture European encryption technology and software and
above all to support projects aimed at developing user-friendly open-source
encryption software;

30. Calls on the Commission and Member States to promote software projects whose
source text is made public (open-source software), as this is the only way of
guaranteeing that no backdoors are built into programmes;

31. Calls on the Commission to lay down a standard for the level of security of
e-mail software packages, placing those packages whose source code has not been
made public in the ?least reliable? category;

32. Calls on the European institutions and the public administrations of the
Member States systematically to encrypt e-mails, so that ultimately encryption
becomes the norm;

33. Calls on the Community institutions and the public administrations of the
Member States to provide training for their staff and make their staff familiar
with new encryption technologies and techniques by means of the necessary
practical training and courses;

34. Calls for particular attention to be paid to the position of the applicant
countries; urges that they should be given support, if their lack of
technological independence prevents them from implementing the requisite
protective measures;

....
http://www.europarl.eu.int/tempcom/echelon/pdf/rapport_echelon_en.pdf



πλοήγηση μηνυμάτων