Difference between revisions of "PDT:EU2020"
Jump to navigation
Jump to search
Line 26: | Line 26: | ||
| | | | ||
| | | | ||
| | | EC | ||
| | | | ||
| | | | ||
Line 35: | Line 35: | ||
| | | | ||
| | | | ||
| | | EC | ||
| | | | ||
| | | | ||
Line 44: | Line 44: | ||
| | | | ||
| | | | ||
| | | EC | ||
| | | | ||
| | | | ||
Line 53: | Line 53: | ||
| | | | ||
| | | | ||
| | | EC | ||
| | | | ||
| | | | ||
Line 80: | Line 80: | ||
| | | | ||
| | | | ||
| | | EC | ||
| | | | ||
| | | | ||
Line 89: | Line 89: | ||
| | | | ||
| | | | ||
| | | EC | ||
| | | | ||
| | | | ||
Line 98: | Line 98: | ||
| | | | ||
| | | | ||
| | | EC | ||
| | | | ||
| | | | ||
Line 107: | Line 107: | ||
| | | | ||
| | | | ||
| | | EC | ||
| | | | ||
| | | | ||
Line 116: | Line 116: | ||
| | | | ||
| | | | ||
| | | EC | ||
| | | | ||
| | | | ||
Line 125: | Line 125: | ||
| | | | ||
| | | | ||
| | | EC | ||
| | | | ||
| | | | ||
Line 170: | Line 170: | ||
| | | | ||
| | | | ||
| | | EC | ||
| | | | ||
| | | | ||
Line 179: | Line 179: | ||
| | | | ||
| | | | ||
| | | EC | ||
| | | | ||
| | | | ||
Line 188: | Line 188: | ||
| | | | ||
| | | | ||
| | | EC | ||
| | | | ||
| | | | ||
Line 197: | Line 197: | ||
| | | | ||
| | | | ||
| | | EC | ||
| | | | ||
| | | | ||
Line 224: | Line 224: | ||
| | | | ||
| | | | ||
| | | EC | ||
| | | | ||
| | | |
Revision as of 17:10, 27 July 2011
# | Action | What is the problem? | What can EGI do? | Level | Importance | ||
---|---|---|---|---|---|---|---|
12 | Review the EU data protection rules | EC | |||||
21 | Propose legislation on ICT interoperability | EC | |||||
22 | Promote rules via guidelines for exante disclosure | EC | |||||
23 | Guidance on link between ICT standardisation and public procurement | EC | |||||
24 | Adopt a European Interoperability Strategy and European Interoperability Framework | EC | |||||
26 | Implement European Interoperability Framework at national level | MS | |||||
27 | Implement Malmo and Granada declarations | MS | |||||
28 | Reinforced and high level Network and Information Security Policy | EC | |||||
29 | Combat cyber attacks against information systems | EC | |||||
30 | Establish a European cybercrime platform | EC | |||||
32 | Work with global stakeholders on targeted actions against computer-based crime and security attacks | EC | |||||
33 | Support EU-wide cyber-security preparedness exercises | EC | |||||
34 | Explore the extension of security breach notification provisions | EC | |||||
38 | Network of CERTs covering all of Europe | MS | |||||
39 | Carry out large scale attack simulation and test mitigation strategies | MS | |||||
40 | Member States - Fully implement harmful content alert hotlines | MS | |||||
41 | National alert platforms to the Europol cybercrime platform | MS | |||||
50 | Leverage more private investment | EC | |||||
51 | Reinforce the coordination and pooling of resources | EC | |||||
53 | Financial support to joint ICT research infrastructures and innovation clusters | EC | |||||
54 | Develop a new generation of web-based applications and services | EC | |||||
55 | Double annual public spending on ICT research and development | MS | |||||
56 | Engage in large scale pilots financed by the CIP | MS | |||||
77 | EU-wide standards, interoperability testing and certification of eHealth | EC | |||||
89 | Make eGovernment services fully interoperable | MS |