Difference between revisions of "PDT:EU2020"
Jump to navigation
Jump to search
Line 76: | Line 76: | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 28 | ||
| | | Reinforced and high level Network and Information Security Policy | ||
| | | | ||
| | | | ||
Line 85: | Line 85: | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 29 | ||
| | | Combat cyber attacks against information systems | ||
| | | | ||
| | | | ||
Line 94: | Line 94: | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 30 | ||
| | | Establish a European cybercrime platform | ||
| | | | ||
| | | | ||
Line 103: | Line 103: | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 32 | ||
| | | Work with global stakeholders on targeted actions against computer-based crime and security attacks | ||
| | | | ||
| | | | ||
Line 112: | Line 112: | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 33 | ||
| | | Support EU-wide cyber-security preparedness exercises | ||
| | | | ||
| | | | ||
Line 121: | Line 121: | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 34 | ||
| | | Explore the extension of security breach notification provisions | ||
| | | | ||
| | | | ||
Line 130: | Line 130: | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 38 | ||
| | | Network of CERTs covering all of Europe | ||
| | | | ||
| | | | ||
| | | MS | ||
| | | | ||
| | | | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 39 | ||
| | | Carry out large scale attack simulation and test mitigation strategies | ||
| | | | ||
| | | | ||
| MS | |||
| | | | ||
| | | | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 40 | ||
| | | Member States - Fully implement harmful content alert hotlines | ||
| | | | ||
| | | | ||
| MS | |||
| | | | ||
| | | | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 41 | ||
| | | National alert platforms to the Europol cybercrime platform | ||
| | | | ||
| | | | ||
| | | MS | ||
| | | | ||
| | | | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 50 | ||
| | | Leverage more private investment | ||
| | | | ||
| | | | ||
Line 175: | Line 175: | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 51 | ||
| | | Reinforce the coordination and pooling of resources | ||
| | | | ||
| | | | ||
Line 184: | Line 184: | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 53 | ||
| | | Financial support to joint ICT research infrastructures and innovation clusters | ||
| | | | ||
| | | | ||
Line 193: | Line 193: | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 54 | ||
| | | Develop a new generation of web-based applications and services | ||
| | | | ||
| | | | ||
Line 202: | Line 202: | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 55 | ||
| Double annual public spending on ICT research and development | |||
| | |||
| | | | ||
| | | | ||
| MS | |||
| | | | ||
| | | | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 56 | ||
| | | Engage in large scale pilots financed by the CIP | ||
| | | | ||
| | | | ||
| | | MS | ||
| | | | ||
| | | | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 77 | ||
| | | EU-wide standards, interoperability testing and certification of eHealth | ||
| | | | ||
| | | | ||
Line 229: | Line 229: | ||
| | | | ||
|- | |- | ||
! scope="row" | | ! scope="row" | 89 | ||
| Make eGovernment services fully interoperable | |||
| | |||
| | | | ||
| | | | ||
| MS | |||
| | | | ||
| | | |
Revision as of 16:58, 27 July 2011
# | Action | What is the problem? | What can EGI do? | Level | Importance | ||
---|---|---|---|---|---|---|---|
12 | Review the EU data protection rules | EC | |||||
21 | Propose legislation on ICT interoperability | ||||||
22 | Promote rules via guidelines for exante disclosure | ||||||
23 | Guidance on link between ICT standardisation and public procurement | ||||||
24 | Adopt a European Interoperability Strategy and European Interoperability Framework | ||||||
26 | Implement European Interoperability Framework at national level | MS | |||||
27 | Implement Malmo and Granada declarations | MS | |||||
28 | Reinforced and high level Network and Information Security Policy | ||||||
29 | Combat cyber attacks against information systems | ||||||
30 | Establish a European cybercrime platform | ||||||
32 | Work with global stakeholders on targeted actions against computer-based crime and security attacks | ||||||
33 | Support EU-wide cyber-security preparedness exercises | ||||||
34 | Explore the extension of security breach notification provisions | ||||||
38 | Network of CERTs covering all of Europe | MS | |||||
39 | Carry out large scale attack simulation and test mitigation strategies | MS | |||||
40 | Member States - Fully implement harmful content alert hotlines | MS | |||||
41 | National alert platforms to the Europol cybercrime platform | MS | |||||
50 | Leverage more private investment | ||||||
51 | Reinforce the coordination and pooling of resources | ||||||
53 | Financial support to joint ICT research infrastructures and innovation clusters | ||||||
54 | Develop a new generation of web-based applications and services | ||||||
55 | Double annual public spending on ICT research and development | MS | |||||
56 | Engage in large scale pilots financed by the CIP | MS | |||||
77 | EU-wide standards, interoperability testing and certification of eHealth | ||||||
89 | Make eGovernment services fully interoperable | MS | |||||
26 | |||||||
27 |