Can EU Judges Keep NSA Spying in Check ?

 

The NSA's blanket surveillance of Europeans will be subject to judicial review, according to EU Justice Commissioner Vera Jourová.

At a committee meeting of the European Parliament this week, Jourová provided details of the replacement to the struck-down safe harbor framework, which until this month allowed people's personal information to flow across the Atlantic and into American servers. She told the hearing the new agreement would move away from the previous self-regulatory approach to one that allows for "pro-active" enforcement and sanctions.

There will be an annual review of the new framework, including any access to personal information granted to the FBI and other US agencies on national security grounds.

On judicial oversight, Jourová noted that a law bill – approved by the US House of Representatives and soon to be introduced to the Senate – would extend judicial protection currently enjoyed by US citizens in the Privacy Act to EU citizens. Once approved, that bill would "be another important step in guaranteeing protection for data transfers," she argued.
We'll spy on you a little bit less

Jourová then went into some depth over the changes that the US government has made to its surveillance programs.
"Following the initial surveillance revelations two years ago, which gave rise to the facts of the court case, the US has undergone a period of internal review as regards its national intelligence activities," she told the Committee on Civil Liberties, Justice and Home Affairs (LIBE). "This has led to reform steps such as the USA Freedom Act, but also the President's instructions to the whole intelligence community on surveillance and the need to take account of privacy rights of non-Americans."

She continued: "We have already seen some progress compared to the past in the direction of more targeted and tailored surveillance. Moreover, as for the use of data that have been collected, certain protections formerly reserved only to US persons have been extended to EU citizens, for instance as regards further dissemination or the period of retention."
The European Commission is still assessing the safeguards and getting "further clarifications," but in general sees the changes as "encouraging."

The commission expects to complete negotiations before the "deadline" of the end of January 2016 set by the Article 29 Working Party. But before that it will publish an "explanatory communication" providing "guidance" on international data transfers following the decision by the European Court of Justice earlier this month in favor of Max Schrems.

Under the new framework, Europe's national data protection authorities will have "a more active and visible role in the system than previously," Jourová said.
Register: http://bit.ly/1HdWghL

 

 

 

« Bank of England Partners With US for Cyberattack Simulation
IncuBus Ventures Teams Up with PwC to Offer the Future of Work Incubator Programme »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Roka Security

Roka Security

Roka Security is a boutique security firm specializing in full-scale network protection, defending against advanced attacks, and rapid response to security incidents.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

Asigra

Asigra

Asigra provides an industry leading cloud backup and recovery software platform called Asigra Cloud Backup.

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

BELAC

BELAC

BELAC is the national accreditation body for Belgium.

Liberman Networks

Liberman Networks

Liberman Networks is an IT solutions provider company that provides security, management, monitoring, BDR and cloud solutions.

Alias

Alias

Alias (formerly Alias Forensics) provide penetration testing, vulnerability assessments, incident response and security consulting services.

International Cyber Threat Task Force (ICTTF)

International Cyber Threat Task Force (ICTTF)

The International Cyber Threat Task Force is a not-for-profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

Cranium

Cranium

AI is being implemented into every business process, but nobody knows whether their AI is secure. Our mission is to deliver security and trust to the AI revolution.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.

Infima Cybersecurity

Infima Cybersecurity

INFIMA tackle the hard parts of managing your Security Awareness Training program so you can focus elsewhere.

Internet Watch Foundation (IWF)

Internet Watch Foundation (IWF)

Since the early days of the internet, our job has been to help child victims of sexual abuse by hunting down and removing any online record of the abuse.

Complete Cyber

Complete Cyber

Complete Cyber provide professional cybersecurity services and products to help secure your infrastructure, systems and data.