Abstract
While many privacy advocates consider the EU’s data privacy standards defensible and preferable, critics have been concerned that these standards fail to take into account the context of a changing technological landscape. This chapter reviews the key elements and strengths and weaknesses of EU data protection regulations. It also offers a comprehensive analysis of the EU emphasis on privacy protection as a fundamental human right. It highlights the new EU CS strategy and outlines the differences with the U.S. CS approach. It discusses EU regulations’ impact on CSPs and users, and key players and driving forces shaping the revision and future of the regulations. It also provides a detailed analysis and assessment of regulatory and enforcement programs for cloud security in the EU’s five biggest economies, whose experiences may act as a guide and template for other economies in the EU and elsewhere.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ashford, W. (2012). Proposed EC data protection rules help cloud adoption. http://www.computerweekly.com/news/2240114617/Proposed-EC-data-protection-rules-help-cloud-adoption-says-Kroes
blogs.wsj.com. (2014). One CIO’s guide to how board members can improve Cybersecurity. http://blogs.wsj.com/cio/2014/09/29/one-cios-guide-to-how-board-members-can-improve-cybersecurity/
bna.com. (2013). In wake of PRISM, German DPAs threaten to halt data transfers to non-EU countries. http://tinyurl.com/m2frwrb
Brown, M. (2014). Europe’s new data laws will affect MSPs. http://mspmentor.net/infocenter-cloud-based-file-sharing/082514/europe-s-new-data-laws-will-affect-msps; http://www.zdnet.com/europes-new-data-laws-just-how-many-cloud-vendors-would-comply-7000032499/
bsi.bund.de. (2011). Security recommendations for cloud computing providers. http://tinyurl.com/pdns54a
Clayton, M. (2014). Five overlooked costs of the NSA surveillance flap, Christian Science Monitor, January 12. http://www.csmonitor.com/World/Security-Watch/2014/0112/Five-overlooked-costs-of-the-NSA-surveillance-flap
cloudsecurityalliance.org. (2012). CNIL (French data protection authority) recommendations on the use of cloud computing services. http://tinyurl.com/pzvczy3
Cohen, N., & Scott, M. (2014). Times articles removed from Google results in Europe. http://www.nytimes.com/2014/10/04/business/media/times-articles-removed-from-google-results-in-europe.html
computerweekly.com. (2014). European firms far from ready for new data rules, study shows. http://www.computerweekly.com/news/2240231892/European-firms-far-from-ready-for-new-data-protection-rules-study-shows
Constantin, L. (2014). Romanian version of EU cybersecurity directive allows warrantless access to data, December 24. http://www.cio.com/article/2863633/romanian-version-of-eu-cybersecurity-directive-allows-warrantless-access-to-data.html
Degun, G. (2014). UK government demands suppliers meet cyber security standards. http://www.supplymanagement.com/news/2014/uk-government-demands-suppliers-meet-cyber-security-standards
Dowling, D. C. (2009). International data protection and privacy law. http://tinyurl.com/bgh4fza
dw.de. (2014). Cyber summit reveals concerns over internet security. http://www.dw.de/cyber-summit-reveals-concerns-over-internet-security/a-18038605
ec.europa.eu. (2013). Digital Agenda for Europe. http://tinyurl.com/cchnqpz
euractiv.com. (2013). Statement of Wim Nauwelaerts reported in “Storm cloud emerges from EU cybersecurity strategy”. http://tinyurl.com/avuq2bp
euractiv.com. (2014). Europe under massive virtual cyber attack. http://www.euractiv.com/sections/infosociety/europe-under-massive-virtual-cyber-attack-309623
europa.eu. (2013a). IBE Committee vote backs new EU data protection rules. http://tinyurl.com/q4dcxe7
europa.eu. (2013b). EU Cybersecurity plan to protect open internet and online freedom and opportunity. http://tinyurl.com/bhwgyuw
European Commission. (2013a). Cybersecurity strategy of the European Union. http://tinyurl.com/a6uomtz
European Commission. (2013b). LIBE Committee vote backs new EU data protection rules. http://tinyurl.com/q4dcxe7
European Commission. (2013c). The European Commission’s cybersecurity strategy – “An Open, Safe and Secure Cyberspace”. http://tinyurl.com/cdejw3a
European Commission. (2013d). Proposal for a directive of the european parliament and of the council. http://tinyurl.com/ctkcfhu
European Parliamentary Research Service. (2014). Mapping the Cost of Non-Europe, 2014-19, July 2014.
Fernandez-Samaniego, J. (2013). Spanish data protection agency issues guides on cookies and cloud computing. http://tinyurl.com/oec8b25
Finnegan, M. (2013). Prism harming US cloud provider business, European Commission claims. http://tinyurl.com/mk6rsef
Fouquet, H., & Mawad, M. (2014). France demonstrates security savoir faire as it enforces new cyber-security law. http://www.chicagotribune.com/sns-wp-blm-news-bc-france-cyber06-20141006-story.html#page=1
gov.uk. (2014). Cyber essentials scheme: Overview. https://www.gov.uk/government/publications/cyber-essentials-scheme-overview
ico.org.uk. (2012). Cloud on the horizon for data-handling outsourcing. http://tinyurl.com/panlo23
Ingthorsson, O. (2011). Regulations a barrier to cloud growth in Europe. http://www.datacenterknowledge.com/archives/2011/08/29/enhancing-cloud-development-in-europe/
Jervell, E. E., Gummer, C. (2014). U.S. web firms’ expansion leaves Germans conflicted. http://online.wsj.com/articles/amazon-to-launch-web-hosting-in-germany-1414075728
Kroes, N. (2012). Cloud computing: building a European cloud partnership. http://blogs.ec.europa.eu/neelie-kroes/european-cloud-partnership
Mantelero, A. (2012). Cloud computing, trans-border data flows and the European Directive 95/46/EC: applicable law and task distribution. http://tinyurl.com/nk47hy4
Maxwell, W. (2012). CNIL cloud guidelines address controller vs. processor issues. http://tinyurl.com/9boyl6y
O’Donoghue, C., & Kimoto, T. (2013). Spanish data protection watchdog publishes one new guidance on cookies and two on cloud computing . http://tinyurl.com/phrs425
out-law.com. (2013). European Commission opposes ‘Fortress Europe’ approach to cloud but wants region to lead on data security trust. http://tinyurl.com/lcyhu8b
Parliament of Romania. (2012). Chamber of Deputies, Committee for information technologies and communications, The reform of the EU Data Protection framework. http://tinyurl.com/bf5u6bd
reuters.com. (2014a). German government cancels Verizon contract in wake of U.S. spying row. http://www.reuters.com/article/2014/06/26/us-germany-security-verizon-idUSKBN0F11WJ20140626
reuters.com. (2014b). European banks team up with Europol in cybercrime fightback. http://uk.reuters.com/article/2014/09/22/uk-banks-cybersecurity-europe-idUKKCN0HH1RJ20140922
Robinson, N. et al. (2009). Review of the European Data Protection Directive. http://tinyurl.com/by7swsw
rt.com. (2013). Net cost: EU cybersecurity reform blighted by price tag concerns. http://tinyurl.com/aommfc2
Runsten, J. (2011). Cloud services and the Swedish Personal Data Act. http://tinyurl.com/qydmu2e
Samson, T. (2013). Germany joins in voicing distrust of U.S.-based cloud services. http://tinyurl.com/pendvhl
Schuppert, S. (2013). German data protection commissioners push government towards suspension of U.S. – EU safe harbor regime. http://tinyurl.com/my3epc3
Sforza, M. (2012). Italian data protection authority’s guide on cloud computing. http://tinyurl.com/npuxkdt
Taylor, P. (2013). Surveillance: Cloud users spooked by Washington’s snooping. http://tinyurl.com/kqc49pc
The Economist. (2013). To the barricades: How America and Europe are trying to bolster their cyber-defences. http://tinyurl.com/cnflnbz
Thiel, S., & Valpuesta, R. (2011). U.K. Trails U.S. in public cloud adoption, Sales force CEO Says. http://www.sfgate.com/cgi-bin/article.cgi?f=/g/a/2011/09/13/bloomberg1376-LRILRH0YHQ0X01-3L8HOVDU01DK87C6RGOVTSL63E.DTL
Tung, L. (2012). No personal data on Google Apps, Norway tells its councils as it clears cloud use. zdnet.com.
Tung, L. (2013). Sweden tells council to stop using Google Apps. zdnet.com
Vaas, L. (2013). Infosec pros give verdict on EU’s new cybersecurity strategy: “Nice try”. http://tinyurl.com/atooylq/
whitehouse.gov. (2013). Improving the security of the nation’s critical infrastructure. http://tinyurl.com/d9upafl
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Kshetri, N. (2016). Cybersecurity in European Union Economies. In: The Quest to Cyber Superiority. Springer, Cham. https://doi.org/10.1007/978-3-319-40554-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-40554-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-40553-7
Online ISBN: 978-3-319-40554-4
eBook Packages: Economics and FinanceEconomics and Finance (R0)