Recommendation 15 | Principle 8: Security and privacy
Define a common security and privacy framework and establish processes for public services to ensure secure and trustworthy data exchange between public administrations and in interactiosn with citizens and businesses.
Solutions
List of all available solutions that implement this recommendation |
---|
![]() |
By using CEF's big data testing environment, Member States can ensure that their treat their big data in a secure and appropriate way. |
![]() |
CIRCABC provides European entities with a trustable, secure and easy to use collaboration, information and document exchange repository. |
![]() |
CISE has been designed to handle sensitive data and personal data. A study has been launched to use the solution for the exchange of classified information. |
![]() |
One of the main objectives of eDelivery is to promote secure and reliable data exchange among organisations. |
![]() |
eID, thanks to the e-IDAS nodes, allows for a secure and trustworthily data exchange between pubic administrations and in interactions with citizens and businesses. |
![]() |
The EIRA EIF view contains the principle of security and privacy and it is also included in the technical view of EIRA. |
![]() |
eSignature allows for the creation of secure and trustworthy electronic signatures. |
![]() |
eTrustEx defines a common security and privacy framework, as it is meant to offer a secure exchange of data between different systems via standardised interfaces. |
![]() Location Framework Blueprint
|
EULF Blueprint Recommendation 3 "Ensure all measures are in place, consistent with legal requirements, to protect personal privacy when processing location data" contains guidance on location data privacy, including the policy approach, the data management approach, awareness raising, trust measures and use of techniques such as anonymisation. More detailed guidance is available on Joinup (https://joinup.ec.europa.eu/collection/elise-european-location-interope…). |
![]() |
CISE has been designed to handle sensitive data and personal data. A study has been launched to use the solution for the exchange of classified information. |
IMAPS solution v1.2 |
IMAPS helps to assess the transparency and organisation of the data management processes within a public administration. This is assessed through question D3 of the IMAPS questionnaire. |
LIMAPS v1.0.0 |
Question C3 of the Service Consumption section of the LIMAPS questionnaire assesses the legal behavioural interoperability capabilities in place to ensure the secure consumption of data, information, knowledge from client services via appropriate tracing and logging mechanisms. |
OpenPM² |
OpenPM² is a project management methodology and it supports the establishment of processes. Thus, it can be used to guide the definition of a common security and privacy framework. |