ePrivacy Regulation
Filter resources
-
EU Council indecision on ePrivacy is bad for Europe
In 2017, the United States National Telecommunications and Information Administration (NTIA), which is part of the Department of Commerce, warned of the “chill on discourse and economic activity” caused by privacy and security fears.
Read more
-
EU Commission’s Recommendation: Let’s put internet giants in charge of censoring Europe
On 1 March 2018, the European Commission proposed a "Recommendation" on the surveillance and filtering of the internet by online companies.
Read more
-
The Bulgarian EU Council presidency & the latest assault on ePrivacy
In January 2018, the Bulgarian Presidency of the Council of the European Union (EU) picked up where the Estonian Presidency left off on the ePrivacy Regulation. It issued two examinations of the last Estonian “compromise” proposal and asked national delegations for guidance on some issues. Together, the documents cover most of the key points of […]
Read more
-
ePrivacy proposal undermined by EU Member States
The discussions on the ePrivacy Regulation continue in the European Union (EU) legislative process. They were on hold for a few weeks because of ongoing negotiations on the European Electronic Communications Code (EECC) – another big “telecoms” file that the Council of the European Union is working on.
Read more
-
e-Privacy: What happened and what happens next
With the vote on the mandate for trilogues in the European Parliament Plenary session of 26 October 2017, the European Parliament confirmed its strong position on e-Privacy for the following inter-institutional negotiations, also called trilogues.
Read more
-
EU Member States plan to ignore EU Court data retention rulings
Documents made publicly available through EDRi member Statewatch reveal that EU Member States are exploring all possible options to keep, and in fact expand, their current data retention regimes. The general plan is based on a new concept of ”restricted data retention”, which is really blanket data retention with a new name, along with amendments […]
Read more
-
Estonian eID cryptography mess – 750000 cards compromised
In 2017, a flaw causing vulnerabilities in millions of encryption keys, including national Estonian electronic ID (eID) cards, was discovered. A month and a half after the discovery, the Estonian Police publicly announced the vulnerability, but stated that the eID cards “are completely secure”.
Read more
-
High time: Policy makers increasingly embrace encryption
Encryption is of critical importance to our democracy and rule of law. Nevertheless, politicians frequently advocate for weakening this technology. Slowly but surely, however, policy makers seem to start embracing it.
Read more
-
The European Commission struggles to find a position on encryption
On 18 October, the European Commission adopted some form of position on encryption, inexplicably embedded in its “anti-terrorism package”. Home affairs activity in relation to encryption is horizontal (covering all illegal activity) and not specifically related to terrorism. However, the Commission chose to include this topic in its anti-terrorism package. The decision to publish the […]
Read more
-
Tell the European Parliament to stand up for e-Privacy!
Stand up for e-Privacy!
Read more
-
Tell the European Parliament to stand up for e-Privacy!
On 26 October, the European Parliament (EP) will decide on a key proposal to protect your privacy and security online. This step consists in confirming (or not) the Parliament’s mandate to negotiate the e-Privacy Regulation with the Council of the European Union. This vote has been demanded as part of an effort to either water […]
Read more
-
Last-ditch attack on e-Privacy Regulation in the European Parliament
The ECR, the right-wing, Eurosceptic political group in the European Parliament has joined forces with German Conservatives, Axel Voss and Monika Hohlmeier, as well as the Danish Liberal Morten Løkkegaard to try to overturn progress made on the e-Privacy Regulation. The Regulation applies to confidentiality of communications, online and offline tracking and device security. It […]
Read more