This document discusses emerging trends in information and communications technology (ICT) and their implications for the legal framework in Europe. It identifies 11 key ICT trends, such as ubiquitous computing, cloud computing, digital natives, user-generated content, and the convergence of online and offline activities. For each trend, challenges for the current European legal system are described. The document also outlines recommendations to update EU legislation to address these challenges and keep European law "future proof" in the face of rapid technological change.
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Chris Marsden
With the move to a more digital, mobile, and platform-dominated media environment people increasingly find and access news and information via platforms like search engines and social media. These have empowered citizens in many ways and are important drivers of attention to established publishers but have also enabled the distribution of disinformation from a range of different actors. In a context where citizens are often increasingly sceptical of both platforms, publishers, and public authorities, what do we know about the scale and scope of disinformation problems and what can different actors do to counter the problems we face?
https://www.scl.org/articles/10662-interoperability-an-answer-to-regulating-ai-and-social-media-platforms
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Tech and Law Center
Even if the term “digital native” have been debated for years by several esteemed scholars, this article aims to seek the digital natives’ attitude towards data protection and safety. It is fundamental, in a society which is evolving so fast, not to focus solely on the present, but to endeavour to improve the future by paying the utmost attention to the new generations. What balance of interests must we achieve between privacy vs transparency, secrecy vs security, reputation vs freedom of expression in a world of internet which is increasingly regulated by Moore’s Law, rather than by state legislation? The purpose is to analyze the current tension between privacy and other fundamental rights from a predominantly legal standpoint, pointing out that the solutions adopted by legislation and case law are not sufficient and that maybe it is also necessary to reconsider this value from an ethical viewpoint.
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGMijait
Web 3.0 promises to have a significant effect in users and businesses. It will change how people work and
play, how companies use information to market and sell their products, as well as operate their businesses.
The basic shift occurring in Web 3.0 is from information-centric to knowledge-centric patterns of
computing. Web 3.0 will enable people and machines to connect, evolve, share and use knowledge on an
unprecedented scale and in new ways that make our experience of the Internet better. Additionally,
semantic technologies have the potential to drive significant improvements in capabilities and life cycle
economics through cost reductions, improved efficiencies, enhanced effectiveness, and new functionalities
that were not possible or economically feasible before. In this paper we look to the semantic web and Web
3.0 technologies as enablers for the creation of value and appearance of new business models. For that, we
analyze the role and impact of Web 3.0 in business and we identify nine potential business models, based in
direct and undirected revenue sources, which have emerged with the appearance of semantic web
technologies.
Identity REvolution multi disciplinary perspectivesKarlos Svoboda
The identity [r]evolution is happening. Who are
you, who am I in the information society ?
In recent years, the convergence of several factors – technological, political, economic –
has accelerated a fundamental change in our networked world. On a technological level, information
becomes easier to gather, to store, to exchange
and to process. The belief that more information
brings more security has been a strong political
driver to promote information gathering since September 11. Profiling intends to transform information into knowledge in order to anticipate one’s behaviour, or needs, or preferences. It can lead to
categorizations according to some specific risk criteria, for example, or to direct and personalized
marketing. As a consequence, new forms of identities appear. They are not necessarily related to our
names anymore. They are based on information,
on traces that we leave when we act or interact,
when we go somewhere or just stay in one place,
or even sometimes when we make a choice. They
are related to the SIM cards of our mobile phones,
to our credit card numbers, to the pseudonyms
that we use on the Internet, to our email addresses,
to the IP addresses of our computers, to our profiles… Like traditional identities, these new forms of
identities can allow us to distinguish an individual
within a group of people, or describe this person as
belonging to a community or a category.
Oxford Internet Institute 19 Sept 2019: Disinformation – Platform, publisher ...Chris Marsden
With the move to a more digital, mobile, and platform-dominated media environment people increasingly find and access news and information via platforms like search engines and social media. These have empowered citizens in many ways and are important drivers of attention to established publishers but have also enabled the distribution of disinformation from a range of different actors. In a context where citizens are often increasingly sceptical of both platforms, publishers, and public authorities, what do we know about the scale and scope of disinformation problems and what can different actors do to counter the problems we face?
https://www.scl.org/articles/10662-interoperability-an-answer-to-regulating-ai-and-social-media-platforms
Digital Native Privacy (Francesca Bosco & Giuseppe Vaciago)Tech and Law Center
Even if the term “digital native” have been debated for years by several esteemed scholars, this article aims to seek the digital natives’ attitude towards data protection and safety. It is fundamental, in a society which is evolving so fast, not to focus solely on the present, but to endeavour to improve the future by paying the utmost attention to the new generations. What balance of interests must we achieve between privacy vs transparency, secrecy vs security, reputation vs freedom of expression in a world of internet which is increasingly regulated by Moore’s Law, rather than by state legislation? The purpose is to analyze the current tension between privacy and other fundamental rights from a predominantly legal standpoint, pointing out that the solutions adopted by legislation and case law are not sufficient and that maybe it is also necessary to reconsider this value from an ethical viewpoint.
E-COMMERCE BUSINESS MODELS IN THE CONTEXT OF WEB 3.0 PARADIGMijait
Web 3.0 promises to have a significant effect in users and businesses. It will change how people work and
play, how companies use information to market and sell their products, as well as operate their businesses.
The basic shift occurring in Web 3.0 is from information-centric to knowledge-centric patterns of
computing. Web 3.0 will enable people and machines to connect, evolve, share and use knowledge on an
unprecedented scale and in new ways that make our experience of the Internet better. Additionally,
semantic technologies have the potential to drive significant improvements in capabilities and life cycle
economics through cost reductions, improved efficiencies, enhanced effectiveness, and new functionalities
that were not possible or economically feasible before. In this paper we look to the semantic web and Web
3.0 technologies as enablers for the creation of value and appearance of new business models. For that, we
analyze the role and impact of Web 3.0 in business and we identify nine potential business models, based in
direct and undirected revenue sources, which have emerged with the appearance of semantic web
technologies.
Identity REvolution multi disciplinary perspectivesKarlos Svoboda
The identity [r]evolution is happening. Who are
you, who am I in the information society ?
In recent years, the convergence of several factors – technological, political, economic –
has accelerated a fundamental change in our networked world. On a technological level, information
becomes easier to gather, to store, to exchange
and to process. The belief that more information
brings more security has been a strong political
driver to promote information gathering since September 11. Profiling intends to transform information into knowledge in order to anticipate one’s behaviour, or needs, or preferences. It can lead to
categorizations according to some specific risk criteria, for example, or to direct and personalized
marketing. As a consequence, new forms of identities appear. They are not necessarily related to our
names anymore. They are based on information,
on traces that we leave when we act or interact,
when we go somewhere or just stay in one place,
or even sometimes when we make a choice. They
are related to the SIM cards of our mobile phones,
to our credit card numbers, to the pseudonyms
that we use on the Internet, to our email addresses,
to the IP addresses of our computers, to our profiles… Like traditional identities, these new forms of
identities can allow us to distinguish an individual
within a group of people, or describe this person as
belonging to a community or a category.
Student Data and Its Discontents: How FUD undermined an education reform agendaPatrick McCormick
In 2012 New York launched one of the most ambitious education reform policy agendas in the country fueled by $700M in Race to the Top funding. New technology, online collaboration, and data driven instruction were at the center of one the largest NY RTTT projects. But within a year student data had shifted from being part of the solution to being part of the problem as public and political opposition grew across the state. The story of what happened in New York between 2012 and 2015 mirrored much of what unfolded across the U.S. raising the question of where we go from here with education reform, emerging technologies, and student data.
What's next in digital communications for construction marketingpwcom.co.uk Ltd
What's next in digital communications for construction marketing - a presentation by Paul Wilkinson given to a half-day CIMCIG conference at the Building Centre, London on 16 May 2012
The War on Vertical Integration in the Digital EconomyAdam Thierer
Presentation delivered before the Southern Economic Association on November 16, 2012. Examines concerns about vertical integration in the tech economy and specifically addresses regulatory proposals set forth by Tim Wu (arguing for a "separations principle" for the tech economy) & Jonathan ZIttrain (arguing for "API neutrality" for social media and digital platforms. This presentation is based on two papers published by the Mercatus Center at George Mason University: “Uncreative Destruction: The Misguided War on Vertical Integration in the Information Economy” & “The Perils of Classifying Social Media Platforms as Public Utilities." Both are available at www.Mercatus.org.
Student Data and Its Discontents: How FUD undermined an education reform agendaPatrick McCormick
In 2012 New York launched one of the most ambitious education reform policy agendas in the country fueled by $700M in Race to the Top funding. New technology, online collaboration, and data driven instruction were at the center of one the largest NY RTTT projects. But within a year student data had shifted from being part of the solution to being part of the problem as public and political opposition grew across the state. The story of what happened in New York between 2012 and 2015 mirrored much of what unfolded across the U.S. raising the question of where we go from here with education reform, emerging technologies, and student data.
What's next in digital communications for construction marketingpwcom.co.uk Ltd
What's next in digital communications for construction marketing - a presentation by Paul Wilkinson given to a half-day CIMCIG conference at the Building Centre, London on 16 May 2012
The War on Vertical Integration in the Digital EconomyAdam Thierer
Presentation delivered before the Southern Economic Association on November 16, 2012. Examines concerns about vertical integration in the tech economy and specifically addresses regulatory proposals set forth by Tim Wu (arguing for a "separations principle" for the tech economy) & Jonathan ZIttrain (arguing for "API neutrality" for social media and digital platforms. This presentation is based on two papers published by the Mercatus Center at George Mason University: “Uncreative Destruction: The Misguided War on Vertical Integration in the Information Economy” & “The Perils of Classifying Social Media Platforms as Public Utilities." Both are available at www.Mercatus.org.
A Lecture given during a Learning Lunch at A Hundred Years. Overviewing the changing web and how the Internet of Things is impacting the use of the internet and how designers thing about it.
Evolution of Social Media and its effects on Knowledge OrganisationCollabor8now Ltd
There has been a lot of hype around social media, social networks and social business, much of it unhelpful in understanding what this is all about. For some people, “social” will always mean frivolity and time wasting. For others, social media just means marketing and communications.
The evolution of social media over the past several years has made it easier than ever before to find, connect and engage with “experts” and people with similar interests. Enlightened organisations have recognised that investment in social technologies and (most importantly) the organisational change required in order to nurture and embed a collaborative culture, can overcome the limitations of silo’d structures that have traditionally inhibited information flows and opportunities for innovation.
In a broader context, the pervasive and ubiquitous availability of social media in almost all aspects of daily life, from the way we communicate, get information, buy and sell, travel, live and learn is adding to the pressure on organisations to provide a more porous interface between internal (behind the firewall) and external services. Knowledge workers are increasingly making their own decisions on what tools, products and services that they need to work more effectively and will become increasingly disaffected if these are not available within the work environment.
This presentation looks at industry trends on how social media and social technologies are changing the way that we generate, organise and consume knowledge, and how this is driving emergent digital literacies for knowledge workers.
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)Gerd Leonhard
This is an edited version of a presentation I gave at ITUWorld 2013 in Bangkok, Nov 21, 2013, see more details at http://www.futuristgerd.com/2013/11/21/here-is-the-pdf-with-my-slides-from-the-ituworld-event-in-bkk-today/ Topics: US domination of the Internet and cloud computing, big data futures, privacy failure and the global digital rights bill, the importance of trust, key issues for cloud computing, and much more. Check www.gerdtube.com for a video version (should be available soon)
If you enjoy my slideshares please take a look at my new book “Technology vs Humanity” http://www.techvshuman.com or buy it via Amazon http://gerd.fm/globalTVHamazon
More at http://www.futuristgerd.com or www.gerdleonhard.de
Download all of my videos and PDFs at http://www.gerdcloud.net
About my new book: are you ready for the greatest changes in recent human history? Futurism meets humanism in Gerd Leonhard’s ground-breaking new work of critical observation, discussing the multiple Megashifts that will radically alter not just our society and economy but our values and our biology. Wherever you stand on the scale between technomania and nostalgia for a lost world, this is a book to challenge, provoke, warn and inspire.
4 Trends Shaping the Future of Social Mediaplusaziz
I worked with the Advertising Educational Foundation & Xavier University to develop a presentation for students and academics in marketing | Presentation took place on October 9th, 2014 (a day before my 31st birthday)
Presentation discusses these Internet future developments:
1. Social computing will expand to business
2. Internet access will be ubiquitous
3. The Web will become faster
4. The Web will become smarter
5. Security will improve
6. IT products will morph into services
Similar to Convergence legal aspects- regulatory framework - patrick van eecke (20)
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Convergence legal aspects- regulatory framework - patrick van eecke
1. Convergence - Legal Aspects
Regulatory Framework
dr. Patrick Van Eecke
Partner, DLA Piper, Brussels
Professor University Antwerp
2. Agenda
At stake
Swiftly moving to a converging world
Legal framework not at pace with technological developments
EU response
Digital agenda
2
3. European study
Commissioned by the European Commission
(DG Information Society)
From May 2008 until December 2009
Holistic approach
1. Identify the ICT trends that will have a future impact
2. Identify the gaps in the current legal framework
3. Provide recommendations for making the European
legislation future proof
3
4. Team
International Study team
Patrick Mina Joao Maarten Daniel
Van Eecke Zoulovits Traça Truyens Nepelski
Global Advisory Board
Makoto Lawrence Ian
Ibusuki Lessig Walden
4
11. Real time web
Twitter lead the media in breaking news about US Airways
flight 1549 crashing in New York's Hudson river and the
Mumbai bombing
11
12. Real time web
Government to citizen real time crisis communication combined with
location based services
Microsoft Vine after Katrina Hurricane
12
13. Full accessibility: legal challenges
Clean Internet
Net neutrality
Digital divide
Liability due to on-line naivety
Security & cybercrime
13
21. New intermediaries
Traditional players
internet infrastructure providers
access providers
hosting providers
New players: platforms
eBay, eBid, …
Layar, Mint
Wikipedia
Yahoo, Google
Second Life, Eve
MSN, Facebook, Myspace, Netlog, …
21
22. New intermediaries: legal challenges
Liability limitations
Applicable law
Co-operation duties
22
24. Cloud computing
From homeserver to cloud computing
Not limited to data, but also applications
IaaS – Infrastructure as a Service
PaaS – Platform as a Service
SaaS – Software as a Service
Biggest CC provider?
24
25. Cloud computing
Aggregation of data:
combining structured/non
structured data
Cfr Reuters (Open Calais)
Cfr Google snippets
25
29. Digital natives
I always do more than one thing in
parallel, otherwise I would feel like I
am running at partial capacity
You just don’t ask for a phone
number, you ask for a MSN
contact
I could spend 24 hours a day in
front of my PC and not get bored
With Facebook I can be available all
the time and always up-to-date with
what is going on. It’s important to be
part of everything
29
32. The Digital Native
The Internet has become the new way for social networking
P16-34 are 25% more likely than P35-49 to use instant messenger, with over 75% of P16-34
currently using at least one service.
About 40% of P16-34 belong to a social network site; this is twice the percentage of P35-49
year olds.
Nearly 40% of P16-34 have met someone face to face after meeting on the Internet.
Yahoo, AOL and MSN Messenger are among the top Internet services in terms of awareness
and use by P16-34.
This is followed closely behind by social networking site, Myspace.com with 43% of P16-34
being current users. In comparison, only 16% of P35-49 are using Myspace.
Blogging and twittering is the “voice” of the new generation
71% of P16-34 year olds have participated in a blogging activity.
P16-34 are three times more likely (25%) than P35-49 to manage and/or write their own blog.
While personal and family/friend are the most common types of blogs among the younger
group, more than 40% are developing photo and pop culture (music/film) blogs as well. This is
different from the older group, who are using blogs to share information and discuss current
news and world events.
32
33. The Digital Native
File-sharing
One third of P16-34s have participated in peer-to-peer file sharing compared to just 12% of
P35-49.
With the continued advancement of mobile telecoms, mobile video uploads to sites such as
YouTube and Grouper will be increasingly commonplace, spreading quickly to more well known
social networking sites such as MySpace and Flickr.
Multi-tasking
Despite the emergence of new media platforms, consumers continue to bond with television
and other traditional media
85% of heavy Internet users say they participate in other media related activities while online,
mostly watching television or listening to music.
Always connected
The only time when they aren’t communicating is when they are sleeping
No geographical boundaries
You NEVER lose touch with people unless you want to
When you change schools you can keep in touch with the same people, through university,
through different jobs, moving location…
You decide who makes up your friendship group, not circumstance
33
34. The Digital Native
Other legal reference model
Geographical link not relevant
Alternative identity management
Alternative dispute resolution
mechanisms
Own codes of behavior
34
35. Digital natives: legal challenges
New legal paradigms
Lack of public support for legal initiatives taken by digital
immigrants
35
40. Consumerisation of IT
Convergence between consumer and corporate tools and
devices
WiFi
'smart' mobile phones & personal electronic devices
Blogs and wiki’s
instant messaging & the Internet
even the PC itself
Google Desktop, Skype
40
53. 3D printing
Jay Leno has a lot of old cars with a lot of obsolete parts. When
he needs to replace these parts, he skips the error-prone
machinist and goes to his rapid prototyping 3D printer.
The 3D scanner next to Jay creates a digital model of this flanged nut
from Jay’s EcoJet supercar. The nut takes 20 minutes to scan and
reverse model and 3 hours to print in plastic.
53
57. Off line & on line convergence
Barriers between off line and on line world fading away
Real time web
Mobile applications
Location based services (augmented reality)
Surface computing
Merging social networks
57
58. Location based services
Augmented reality
Combination of mobile web, camera, compass and GPS
E.g. iPhone, Android, Layar
Step by step tourist guides, real estate, musea, …
58
69. Legal challenges for Europe
From i2010 to i2020
The future of data protection in the information society
copyright
liability
money
contracting
dispute resolution
consumer protection
…
69
72. Examples of recommendations
The definition of "information society services" (as used in the
E-commerce Directive) must be decoupled from article 50 the EC
Treaty and must include all online activities, whether or not
provided for remuneration.
The current EU legal instruments on jurisdiction (Brussels I) and
applicable law (Rome I - II) must be modified to take into account
online issues. In particular, clear rules must be established on
which country's tort laws apply in case of copyright breaches,
defamation issues, and unlawful processing of personal data.
Steps must be taken to clarify that the scope of the "coordinated
field" in the E-commerce Directive covers any rule that can affect
an online service provider, with the single exception of a rule that
indiscriminately applies to both the online and the offline
environment.
72
73. Examples of recommendations
A "right to forget" should be introduced, allowing citizens to
ask a data controller to remove personal data as from a
specified period of time (for example, five years), regardless of
whether the data controller has reserved the right to keep
using the data in the future.
A "right to data portability" should be introduced, allowing
citizens to request a copy of the personal data held by the data
controller.
The private use exception must be extended, so that it also
covers internet publishing activities undertaken by consumers.
The adoption of multi-territorial licensing must be further
encouraged in order to increase legal certainty of commercial
users and foster the development of legitimate online services.
73
74. Examples of recommendations
A harmonised and detailed notice-and-takedown procedure
must be introduced, which balances the rights of all
stakeholders.
The scope of the special liability regime must be enlarged
and clarified, by replacing the current three-fold structure with
a two-fold structure (mere conduit service providers and "third
party information processors"). Community-driven platforms,
platforms with user generated content and cloud computing
services must in particular fall under the special liability regime.
The scope of the new exceptions of the revised E-money
Directive (the "limited networks" exception of article 1.4 and
the "value added services" exception of article 1.5) must be
clarified in order to resolve the legal uncertainty faced by many
emerging online payment services.
74
75. Examples of recommendations
Harmonised rules on e-archiving and digital evidence must
be adopted.
A "comply or explain" approach (self-regulation) should be
adopted, which allows access providers to engage in legitimate
bandwidth management practices, but discourages other net
neutrality interferences.
Article 13 of the E-privacy Directive must be adapted in order
to include new forms of spam and solve issues with the
current legal framework.
Etc, etc.
75
78. Digital Agenda
A Digital Agenda for Europe
Commission Communication of 19 May 2010 - COM(2010) 245
part of the Europe 2020 Strategy
Successor of i2010, A European Information Society for growth
and employment
European Commission Communication of 1 July 2005,
COM(2005) 229 final
part of the Lisbon Agenda
78
79. 7 priority areas for action
1. Creating a Digital Single Market
2. Improving the framework conditions for interoperability
between ICT products and services
3. Boosting internet trust and security
4. Guaranteeing the provision of much faster internet access
5. Encouraging investment in research and development
6. Enhancing digital literacy, skills and inclusion
7. Applying ICT to address social challenges such as climate
change, rising healthcare costs and the ageing population.
79
80. 7 obstacles hindering that goal
1. Fragmented digital markets
2. Lack of interoperability
3. Rising cybercrime and risk of low trust in networks
4. Lack of investment in networks
5. Insufficient research and innovation efforts
6. Lack of digital literacy and skills
7. Missed opportunities in addressing
societal challenges
80
81. 16 key actions for overturning the obstacles
Key Action 1: Simplify copyright clearance, management and
crossborder licensing by:
Enhancing the governance, transparency and pan-European
licensing for (online) rights management by proposing a
framework Directive on collective rights management (2010)
Creating a legal framework to facilitate the digitisation and
dissemination of cultural works in Europe by proposing a Directive
on orphan works, to conduct a dialogue with stakeholders with a
view to further measures on out-of print works, complemented by
rights information databases (2010)
Reviewing the Directive on Re-Use of Public Sector Information,
notably its scope and principles on charging for access and use.
(2012)
81
82. 16 key actions
Key Action 2: Ensure the completion of the Single Euro
Payment Area (SEPA), eventually by binding legal measures
fixing an end date for migration and facilitate the emergence of
an interoperable European eInvoicing framework through a
Communication on eInvoicing and by establishing a
multistakeholder forum (2010)
Key Action 3: Propose a revision of the eSignature Directive
with a view to provide a legal framework for cross-border
recognition and interoperability of secure eAuthentication
systems (2011)
Key Action 4: Review the EU data protection regulatory
framework with a view to enhancing individuals' confidence
and strengthening their rights (2010)
82
83. 16 key actions
Key Action 5: As part of the review of EU standardisation
policy, propose legal measures on ICT interoperability to
reform the rules on implementation of ICT standards in Europe
to allow use of certain ICT fora and consortia standards (2010)
Key Action 6: Present measures aiming at a reinforced and
high level Network and Information Security Policy, including
legislative initiatives such as a modernised European Network
and Information Security Agency (ENISA), and measures
allowing faster reactions in the event of cyber attacks,
including a CERT for the EU institutions (2010)
Key Action 7: Present measures, including legislative
initiatives, to combat cyber attacks against information
systems, and related rules on jurisdiction in cyberspace at
European and international levels by (2010-2013)
83
84. 16 key actions
Key Action 8: Adopt a Broadband Communication that lays
out a common framework for actions at EU and Member State
to meet the Europe 2020 broadband targets, including:
Reinforce and rationalise, in this framework, the funding of high-
speed broadband through EU instruments and explore how to
attract capital for broadband investments through credit
enhancement (2014)
Propose an ambitious European Spectrum Policy Programme that
will create a co-ordinated and strategic spectrum policy at EU level
in order increase the efficiency of radio spectrum management
and maximise the benefits for consumers and industry (2010)
Issue a Recommendation in 2010 to encourage investment in
competitive Next Generation Access networks through clear and
effective regulatory measures (2010)
84
85. 16 key actions
Other actions relating to
Research and Innovation
Enhancing digital literacy, skills and inclusion
ICT-enabled benefits for EU society
Example:
Propose a Council and Parliament Decision to ensure mutual
recognition of e-identification and e-authentication across the EU
based on online 'authentication services' to be offered in all Member
States (which may use the most appropriate official citizen documents
– issued by the public or the private sector) (2012)
85