Local view for "http://purl.org/linkedpolitics/eu/plenary/2000-03-30-Speech-4-025"

PredicateValue (sorted: default)
rdf:type
dcterms:Date
dcterms:Is Part Of
dcterms:Language
lpv:document identification number
"en.20000330.2.4-025"2
lpv:hasSubsequent
lpv:speaker
lpv:spokenAs
lpv:translated text
"Madam President, I would like to extend my sincere thanks to the Council and the Commissioner for their response, but would particularly like to point out that there is still a lack of clarity. I have several questions to put to the Council and the Commission and if they do not wish to answer them today, then I would ask them to do so in writing in the very near future. It emerged during the hearing that two companies have reported missing out on orders on account of industrial espionage. My first question to the Council is this: is the Council familiar with a number of instances of companies complaining to the Member States about orders not going through on account of industrial espionage? My second question is addressed to both the Council and the Commission: we are all fussing about encryption. This is marvellous. What guarantees are there that the encryption technology currently being developed in Europe is secure and not liable to fall into the hands of third parties? You know only too well what I am driving at. My third question relates to Article 3. Mr Woolsey, the former Director of the CIA, writes in the Wall Street Journal of 22 March last that dual use technology is most definitely attracting increased attention from the United States. I would like to ask the Council how this additional security system relating to dual use technology and operating from the United States works? Can you give an insight into the kind of special role the American Security Services will have in this? My fourth question to the Commission is as follows: there is a directive on data protection. This directive imposes obligations on those who offer services to networks, but software does not appear to have been considered. My first question is this: is the European Commission prepared to close this software loophole in the course of a review of this directive? My second question to the Commission is: will the European Commission examine the proportionality of measures taken by the Member States in respect of the permitted exceptions in the European data protection directive, as part of its task to oversee the correct transposition of European directives in national legislation? What have your findings been in this sphere?"@en1

Named graphs describing this resource:

1http://purl.org/linkedpolitics/rdf/English.ttl.gz
2http://purl.org/linkedpolitics/rdf/Events_and_structure.ttl.gz
3http://purl.org/linkedpolitics/rdf/spokenAs.ttl.gz

The resource appears as object in 2 triples

Context graph