{"id":1331,"date":"2013-10-02T13:03:15","date_gmt":"2013-10-02T10:03:15","guid":{"rendered":"http:\/\/saisa.eu\/blogs\/Guidance\/?p=1331"},"modified":"2013-10-14T18:55:06","modified_gmt":"2013-10-14T15:55:06","slug":"eu-directive-201340eu-on-attacks-against-information-systems","status":"publish","type":"post","link":"https:\/\/saisa.eu\/blogs\/Guidance\/?p=1331","title":{"rendered":"EU Directive 2013\/40\/EU on attacks against information systems"},"content":{"rendered":"<p>There is a new EU Directive <a href=\"http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=OJ:L:2013:218:0008:0014:EN:PDF\">2013\/40\/EU<\/a>, which defines following as offences:<\/p>\n<ul>\n<li>\n<div>Illegal access to information systems<\/div>\n<\/li>\n<li>\n<div>Illegal system interference<\/div>\n<\/li>\n<li>\n<div>Illegal data interference<\/div>\n<\/li>\n<li>\n<div>Illegal interception<\/div>\n<\/li>\n<li>\n<div>Tools used for committing offences<\/div>\n<\/li>\n<\/ul>\n<blockquote>\n<p>Transposition: Member States shall bring into force the laws, regulations and administrative provisions necessary to comply with this Directive by 4 September 2015.<\/p>\n<\/blockquote>\n<p>It is an update of the earlier Directive <a href=\"http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=OJ:L:2005:069:0067:0071:EN:PDF\">2005\/222\/JHA<\/a>.<\/p>\n<blockquote>\n<p>Implementation: Member States shall take the necessary measures to comply with the provisions of this Framework Decision by 16 March 2007<\/p>\n<\/blockquote>\n<p><strong>Other Links<\/strong><\/p>\n<ul>\n<li>See also <a href=\"http:\/\/conventions.coe.int\/Treaty\/EN\/Treaties\/Html\/185.htm\">Convention on Cybercrime<\/a>, and the related <a href=\"http:\/\/conventions.coe.int\/Treaty\/Commun\/ChercheSig.asp?NT=185&amp;CM=&amp;DF=&amp;CL=ENG\">signatures and ratifications<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>There is a new EU Directive 2013\/40\/EU, which defines following as offences: Illegal access to information systems Illegal system interference Illegal data interference Illegal interception Tools used for committing offences Transposition: Member States shall bring into force the laws, regulations &hellip; <a href=\"https:\/\/saisa.eu\/blogs\/Guidance\/?p=1331\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[79,72,44],"tags":[],"_links":{"self":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1331"}],"collection":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1331"}],"version-history":[{"count":1,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1331\/revisions"}],"predecessor-version":[{"id":1333,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1331\/revisions\/1333"}],"wp:attachment":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}