Cybershare Conference to share experience on cybersecurity.
ICT security
Last update: 20/02/2024
Discover Helsinki
“Discover Helsinki” is a web application information service for users with poor reading and writing skills. It provides information on the City of Helsinki and its services in audio form. The application speaks Finnish, Arabic and Somali.
eInclusion
Last update: 08/03/2019
Suomi.fi-e-Authorizations
Suomi.fi e-Authorizations is a service for reliable verification of a person’s or organisation’s authorization, mandate or right to use digital services on behalf of another person or organisation regardless of time or place. The service provides mandates for all possible business cases and scenarios and their use cases, depending on which services the mandate is being used for. Different scenarios include: person to person mandates, person to company/organisation mandates, company/organisation to person mandates and company/organisation to company/organisation mandates. The service consists…
Open Source Software
Last update: 11/01/2017
ROS Digital Certificates
Revenue uses a “digital certificate” to allow Business customers electronically access their account and sign and submit their returns via Revenue’s secure electronic channel (ROS). Electronically “signing and submitting” represents a legal signature and ensures that the communications and transactions between customers and Revenue cannot be repudiated at a later stage. Developed on a PKI infrastructure, this security underpins all electronic activity for Business Users. 5.3 million Revenue Returns were processed through this channel over the course of 2015, and Ireland is considered as 1st in…
ICT security
Last update: 07/12/2016
MoD Public Key Infrastructure
The public key infrastructure (PKI) is a set of hardware, software, people, policies and procedures needed to create, manage, distribute, use, store, and revoke digital certificates. The PKI infrastructure uniquely binds public keys with respective user identities by means of a certificate authority (CA) trusting digital identities through the registration and issuance process. Depending on the assurance level of the binding, this may be carried out by software at a CA or under human supervision. The PKI role that assures this binding is called the registration authority (RA) that ensures the…
ICT security
Last update: 02/10/2017
SEMIRAMIS
SEMIRAMIS (Secure Management of Information across multiple Stakeholders) is a pilot infrastructure to provide e-services with the required underlying secure authentication and management approach and tests it through two scenarios representing a large number of options related to ID Management and Secure Data Transfer: 1) a scenario that involves public and private organizations and legal requirements for exchange of sensitive information; 2) a scenario that involves worldwide citizen and their requirement to exchange personal information. A third Scenario is envisaged to involve public and…
ICT security
Last update: 20/02/2024
X-Road Data Exchange Layer
X-Road is an OSS (under MIT) for secure data exchange. In particular, it enables digital signature and encryption. Governed by NIIS, founded by Finland and Estonia. It is a NIIS solution.
ICT security
Last update: 02/10/2017
CPA Creation Toolkit
The CPA Creation Toolkit is a web-based application to easily create a Collaboration Protocol Agreement (CPA). A CPA document is an XML based document that describes the formal relationship between two parties, specifying an ebMS trading agreement between trading partners. The following information will typically be contained in a CPA document: - Identification information: the unique identifiers for each party and their roles within the trading relationship - Security information: for instance, are digital signatures required, and what algorithms do they use - Communication information: the…
ICT security
Last update: 21/08/2015
Verinice - the ISMS tool
verinice is a tool for managing information security. The software comes without license or subscription costs and is provided under the GPLv3 license. As open source software, it is available for free. You can use verinice for: establishing, maintaining and improving an ISMS based on ISO 27001 assuring the compliance with standards such as ISO 27002, BSI IT-Baseline Security, VDA IS-Assessments and many more performing risk analysis based on ISO 27005 auditing, document management, report generation and much more verinice runs on Windows, Linux and Mac OS. For more information…
ICT security
Last update: 23/04/2024
Shaping Europe’s digital future
In the framework of the Digital Decade Policy Programme 2030, the European Digital Infrastructure Consortium (EDIC) emerges as a vital instrument, streamlining the initiation and execution of multi-country projects. Aimed at realizing the overarching objectives of the Digital Decade, each EDIC is established through a Commission decision upon the joint application of a minimum of three Member States, coupled with Commission approval. EDICs, recognized as legal entities, shape their governance structure and operational rules through statutes defined by the founding Member States. Operating on…
CollaborationeInclusion
Last update: 20/03/2024
New responsibilities for platforms and empowered users
The EU's Digital Services Act (DSA) is now operational, impacting most online platforms in its quest to increase online safety. The DSA introduces measures to combat illegal content, requiring platforms to empower users by allowing them to flag such content. Protection for minors is emphasised, with a specific ban on targeted ads based on profiling or personal data. Users will gain more transparency about the ads they encounter, and platforms are obligated to publish annual reports detailing their content moderation procedures. Notably, small enterprises meeting certain criteria are exempted…
Digital-ready policymakingeGovernment
Last update: 23/04/2024
Europe Leads in Digital Transformation
The European Union's Cohesion Policy is playing an important role in propelling Europe to the forefront of the digital age, aligning with the European Commission's priority to leverage digital technology for sustainable growth, improved quality of life, and securing a competitive edge in the global economy. With a significant allocation from the European Regional Development Fund (ERDF), over €14 billion was invested in digital projects for 2014-2020, aiming to digitise firms, expand e-services, promote digital literacy, and ensure broadband access in remote areas. Investments have supported…