Recommendation 15

what is EIFglossary image

Back

 

 

 

Recommendation 15 | Principle 8: Security and privacy

Define a common security and privacy framework and establish processes for public services to ensure secure and trustworthy data exchange between public administrations and in interactiosn with citizens and businesses. 

Solutions

List of all available solutions that implement this recommendation
BDTI logo
CEF Big Data Test Infrastructure
By using CEF's big data testing environment, Member States can ensure that their treat their big data in a secure and appropriate way. 
Communication and Information Resource Centre for Administrations, Businesses and Citizens
CIRCABC
CIRCABC provides European entities with a trustable, secure and easy to use collaboration, information and document exchange repository.
Logo
Data models
CISE has been designed to handle sensitive data and personal data. A study has been launched to use the solution for the exchange of classified information.
cef_edeliv
eDelivery 
One of the main objectives of eDelivery is to promote secure and reliable data exchange among organisations. 
cef_eID
eID
eID, thanks to the e-IDAS nodes, allows for a secure and trustworthily data exchange between pubic administrations and in interactions with citizens and businesses.
EIRA 
EIRA 
The EIRA EIF view contains the principle of security and privacy and it is also included in the technical view of EIRA. 
esignature
eSignature
eSignature allows for the creation of secure and trustworthy electronic signatures.
etrustex
eTrustEx open source software package
eTrustEx defines a common security and privacy framework, as it is meant to offer a secure exchange of data between different systems via standardised interfaces.
"."
European Union
Location Framework Blueprint

 

EULF Blueprint Recommendation 3 "Ensure all measures are in place, consistent with legal requirements, to protect personal privacy when processing location data" contains guidance on location data privacy, including the policy approach, the data management approach, awareness raising, trust measures and use of techniques such as anonymisation. More detailed guidance is available on Joinup (https://joinup.ec.europa.eu/collection/elise-european-location-interope…).
cise node
Service model
CISE has been designed to handle sensitive data and personal data. A study has been launched to use the solution for the exchange of classified information.

'.'

 

 

IMAPS solution v1.2

IMAPS helps to assess the transparency and organisation of the data management processes within a public administration. This is assessed through question D3 of the IMAPS questionnaire.

'.'

LIMAPS v1.0.0

Question C3 of the Service Consumption section of the LIMAPS questionnaire assesses the legal behavioural interoperability capabilities in place to ensure the secure consumption of data, information, knowledge from client services via appropriate tracing and logging mechanisms.

"."

OpenPM²

OpenPM² is a project management methodology and it supports the establishment of processes. Thus, it can be used to guide the definition of a common security and privacy framework.

back button