full screen background image

Events

2 August 2019 - Concours de droit comparé Société de législation comparée ... +++ 25 July 2019 - Formation: Après-midi d’étude – Blockchain et contrats intelligents Editions Larcier, ici Formation: Ap ... +++ 4 June 2019 - Formation Lexing – Marketing et RGPD Editions Larcier, ici   Format ... +++ 19 April 2019 - Société de législation comparée – Concours de droit comparé Revue internationale de droit compa ... +++ 11 April 2019 - Formation: Colloque DCCR – Droit de la consommation et protection des données à caractère personnel Revue de droit international et de ... +++ 7 March 2019 - 6ème Atelier de droit comparé – 22 mars 2019 Revue internationale de droit compa ... +++

*Law of Aliens

Published on January 27th, 2017 | by Elpida Tsiaka

0

Commission: Fourth progress report towards an effective and genuine Security Union

The Commission presented on January 25 2017, its fourth report on the progress made towards building an effective and genuine Security Union. This month’s report highlights key developments in four areas: (i) information systems and interoperability, (ii) soft target protection, (iii) cyber threat and (iv) data protection in the context of criminal investigations. The report also outlines some of the upcoming initiatives aimed at further strengthening the EU’s defence and resilience against terrorism and organised crime.

European Commissioner for the Security Union Julian King, said: “It’s essential that we continue our important work on further connecting and improving our databases and information exchange as it will make a real difference to Europe’s security. In addition, with increasing concerns around cyber threats, we need to put extra effort into building our resilience within cyber space, tackling cybercrime, investing in research and innovation in this area and cooperating widely with industry, Member States and third countries. This is why, in the months to come, we will identify further actions to provide an effective EU-wide framework for cybersecurity”.

For more information here





About the Author


Back to Top ↑