Work programme 2009 – Info Day European Commission – DG Enterprise & Industry E-M. Engdahl Information Day 16th September 2009 REA - Brussels Seventh Framework.

Slides:



Advertisements
Similar presentations
The Role of the IRB An Institutional Review Board (IRB) is a review committee established to help protect the rights and welfare of human research subjects.
Advertisements

Petr Cerveny Unit Administration and Finance 31/5/2010 Major FP7 Negotiation Issues.
Grant-Financed Projects: Introduction
Regional Policy EUROPEAN COMMISSION 1 EGTC regulation EGTC regulation ESF and EGTC regulations Regulation of the European Parliament and of the Council.
URF/The Validation Process
Introduction to Article 45 (5) of the CLP Regulation
European Union Cohesion Policy
Human Capital Investment Programme Disability Activation Project (DACT) WELCOME Support Workshop Thursday 7 th February
Timeline – Choice of Law in International Contracts Mandate given to conduct feasibility study Working Group formed Third Working.
Characteristics of projects in EU research programmes
FP7 Grant Agreement Amendments: basic principles and processing
1 The Data Protection Officer at work Experience, good practices and lessons learnt Pierre Vernhes – former DPO at the Council of the EU Workshop on Data.
Offsite Storage RAF/2013/00023 Compulsory Briefing Session 16 August 2013 The Road Accident Fund.
Auditing, Assurance and Governance in Local Government
Work programme 2009 – Info Day European Commission – DG Enterprise & Industry E-M. Engdahl Security Work Programme 2009 Information Day 15 September 2008.
Policy Research and Innovation Research and Innovation Implementation of FP7 support actions READi KICK-OFF MEETING 26 September 2013 MURCIA Carmen Madrid.
IP rights in FP7 PROTECT Study Visit 10th June 2008 (Alicante) IPR-Helpdesk is a constituent part of the IP-BASE project which is financed by the CIP Programme,
Research Contracts and IP Services TRAINING WORKSHOPS ON HORIZON 2020 – 27 NOV 2014 The Grant Agreement Roger Wallace – Research Contracts & IP Services.
European Commission DG for Fisheries and Maritime Affairs Research & scientific analysis SSP Kick-off meeting The 6 th Framework Programme
Contractors’ Day, June 2008 to the Framework Partnership Agreement & the Specific Grant Agreement Financial Guidelines for co-ordinators and co-partners.
Sustainable Energy Systems Overview of contractual obligations, procedures and practical matters KICK-OFF MEETING.
Not legally binding FP7 Rules for Participation and Grant agreement FP7 Helpdesk 
1 EFCA - 21th March 2002 Raul Mateus Paula. 2 This presentation underlines: The key objectives of the Relex Reform The division of the responsibilities.
1 Reform of the EU regulatory framework for electronic communications What it means for Access to Emergency Services Reform of the EU regulatory framework.
Horizontal Research Activities involving SMEs Joachim Ball, European Commission, DG RTD B3 n Co-operative Research n Collective Research General Introduction.
FP7 Grant Agreement and its parts Moldova – Research Horizon 30 January 2013 Kristin Kraav.
Call ref.: FP ACC-SSA-2 (10/2004) Contract Negotiation - Sofia - Bulgaria 10 February, Mrs Marina ZANCHI DG Research Directorate N International.
Privacy Codes of Conduct as a self- regulatory approach to cope with restrictions on transborder data flow Dr. Anja Miedbrodt Exemplified with the help.
ISP Preparation Series 1- Chapter 3. CHAPTER 3: SECURITY TRAINING AND BRIEFING SECTION 1: SECURITY TRAINING General (3-100) - Provide all with training.
The Data Protection Act 1998 The Eight Principles.
INTERREG IVA 2 Mers Seas Zeeën Crossborder Cooperation Programme Part-financed by the European Regional Development Fund (ERDF) Legal framework:
RACS coordination meeting 29 May 2008 Brussels. Review of the functioning of the RACs.
New Implementing Regulation DG Enterprise on the Administrative Requirements for the approval and market surveillance of 2- or 3-wheel vehicles and quadricycles.
Implementation of EU Electronic Communication Directives.
AIDA negotiation process AIDA NCP Meeting,
ADMINISTRATIVE & FINANCIAL ISSUES DG ECHO HUMANITARIAN AID AND CIVIL PROTECTION Finance, Legal Affairs and Partner Support unit-C3.
ICT-C Meeting, 25 July 2007 Jacques Bus Head of Unit, INFSO-F5 “Security” ICT and Security FP7 Themes Joint Call on Critical Infrastructure Protection.
© 2004 The IPR-Helpdesk is a project of the European Commission DG Enterprise, co-financed within the fifth framework programme of the European Community.
Volvox The EC Contract Angela Pettit – Contracts Officer.
ISO/IEC 27001:2013 Annex A.8 Asset management
Authorization Part III. Content of a license Structure of a license General elements General and specific conditions Annexes Documents attached (e.g.
National INFOSEC Organisations and INFOSEC Management in Hungary.
FP7 Security Theme /1 CAST Kick-off meeting 15 July '09 – Salzburg Eva-Maria Engdahl - European Commission – DG Enterprise & Industry Security Research.
Workshop on Privacy of Public Figures and Freedom of Information - Skopje, 9-10 October 2012.
1 TAIEX JHA Workshop on data protection and cloud computing Data transfers to third countries and standard contractual clauses Skopje, 29 May 2014.
Horizon 2020 Ian Devine European Advisor – UK Research Office University of Manchester, 11 September 2014.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 - Foreign, security and defence.
Presented by Ms. Teki Akuetteh LLM (IT and Telecom Law) 16/07/2013Data Protection Act, 2012: A call for Action1.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
EU - China 11 Guidelines for Applicants rules for applications European Union Delegation to China & Mongolia Beijing Information Session 14 th November.
Coordinators' day on FP7 Project Negotiation Description Of Work Annex I Griet Van Caenegem DG CNECT R5 Programme Operations May 28, 2013.
1 Details of the Sword Contract Kick-off meeting Autonomous Province of Trento Trento, December 18-19, 2014 SWORD (School and WOrk-Related Dual learning)
Article 4 [Obligations of Applicant] 4.1. As a sole and exclusive owner of the Application, Applicant warrants that.
WP3 - Evaluation and proposal selection
Tender Evaluation and Award Process
Particular Conditions of Contract & Appendix to Tender
General Data Protection Regulation
Particular Conditions of Contract & Appendix to Tender
Derivative Classification Overview
Ethics Review and the FP7 Ethics Framework
Employee Privacy and Privacy of Employee Information
FP7 SCIENTIFIC NEGOTIATIONS Astrid Kaemena European Commission
Institutional changes The role of Bilateral Oversight Boards
FP7 SCIENTIFIC NEGOTIATIONS
Information session SCIENTIFIC NEGOTIATIONS Call FP7-ENV-2013-two-stage "Environment (including climate change)" Brussels 22/05/2013 José M. Jiménez.
Information session SCIENTIFIC & TECHNICAL NEGOTIATIONS Call FP7-ENV-2013-WATER-INNO-DEMO "Environment (including climate change)" Brussels 24/06/2013.
INTELLECTUAL PROPERTY RIGHTS (IPR) IN FP7
Operationalizing Export Certification and Regionalization Programmes
Financial and Administrative presentation on PARTICULATES project
Adult Education Survey Anonymisation Point 6
Presentation transcript:

Work programme 2009 – Info Day European Commission – DG Enterprise & Industry E-M. Engdahl Information Day 16th September 2009 REA - Brussels Seventh Framework Programme Security Research

 A “Sensitive” Project is handling: – Data or information requiring protection against unauthorised disclosure: classified information – Information or materials subject to security restrictions – Material subject to export- or transfer-control  No “Classified” Proposals are allowed in the call (no classified information in a proposal)  BUT: a Proposal could lead to a “Sensitive” Project (project that could use classified/sensitive background and/or produce classified/sensitive foreground) “Sensitive” Projects: What is a sensitive project?

Security issues: Principles and legal base Originator consent Need to know 2001/844/EC amended by 2006/548/EC OJ L215, National laws rules for submission, evaluation, etc…

“Sensitive” Projects: Sensitive proposals with non-EU participants EU classification is limited to EU Member States Sensitive projects can include participants from associated or third countries Countries having a security agreement with the EU (Council level) could refer to that security agreement for handling sensitive information and material Special MoU (Memorandum of Understanding) could be agreed between the countries involved in the handling of sensitive information/material of a project limited to that project No restriction for the participation to sensitive projects for associated countries and from third countries if no access foreseen to sensitive information/material

“Sensitive” Projects: Use of classified information No classified information to be used in the proposal However, the project could use classified/sensitive background and/or produce classified/sensitive foreground In that case,  The proposal should be flagged on page 1 of the part B of the proposal as security sensitive  The table of deliverables must specify the level of classification for each deliverable  A Security Aspect Letter (SAL) + a Security Classification Guide (SCG) must be attached to the proposal

“Sensitive” Projects: Security Scrutiny Procedure For each sensitive project proposal of the selection list:  The Security Committee Members/Observers will be requested (via their national security authority representative) to verify that all security aspects are properly addressed and to reach an agreement among themselves  the scrutiny procedure is done, in a 2 months period, following the evaluation and before the start of the negotiation of the projects The results of the scrutiny could be:  go ahead with negotiation;  recommendations for the negotiation without classification;  recommendations for the negotiation with classification;  Recommendation not to finance the proposal Proposers receive the conclusions of the scrutiny procedure with the “Invitation letter” (negotiation mandate)

“Sensitive” Projects: Some recommendations Be serious about the sensitivity declaration Consider carefully the requirements for accessing sensitive information/material in a project (limit it as far as possible) Get reference of all applicable EU and national legislation Contact your National Contact Point (NCP) – see CORDIS Contact your NSA for sensitive proposals (OJ L193 of p.31-36) For non-EU countries find out if there are some security agreement between your country and EU

“Sensitive” Projects: Grant specificities Core Grant Agreement: the main special clauses 21 and 22 Annex 1 (DoW) SAL (Security Aspect Letter SCG (Security Classification Guide) Guideline for handling classified information in FP7 project (Draft)

“Sensitive” Projects: Grant specificities Core Grant Agreement : special clause 21 When classified information is used as background, or is planned to be generated as foreground, or is actually generated as foreground, or if export or transfer licences are required for the transfer of dangerous materials or substances or where a topic is subject to specific national or European security related legal restrictions, a Security Aspect Letter (SAL) is annexed to this grant agreement as an integral part of Annex I. Core Grant Agreement : special clause 22 1.Each beneficiary shall comply with any security requirements prescribed by the Security Aspect Letter (SAL) attached to Annex I of this grant agreement. The Commission may terminate the grant agreement or the participation of the beneficiary(ies), in accordance with Article II.38, in case of non compliance with this obligation. Such action shall be without prejudice to any further legal action. 2.This SAL is valid throughout the duration of the project. 3.The beneficiaries of this grant agreement shall via the Coordinator inform the Commission of any change of security requirements emerging during the performance of the project. Any such change shall be introduced in the SAL by means of an amendment following the rules on amendments of Annex I. 4.In cases where a beneficiary cannot comply with increased security requirements, the grant agreement shall be terminated. 5.The beneficiaries shall ensure that any subcontractor or other third party complies with the security requirements set out in the SAL.

“Sensitive” Projects: Grant specificities Annex 1 (DoW) : SAL (Security Aspect Letter) The performance of the grant agreement will involve information classified CONFIDENTIAL UE. [A Facility Security Clearance is required]. Persons who need to access EU classified information must [have an EU personal security clearance and] be briefed as to their responsibility for security[1].[1] The beneficiaries concerned shall take all measures prescribed by the National Security Authority/Designated Security Authority (NSA/DSA) for safeguarding EUCI. The beneficiaries concerned shall appoint a Facility Security Officer (FSO). The beneficiaries concerned, through the FSO, shall maintain a continuing relationship with his NSA/DSA. The beneficiaries concerned shall maintain a record of his employees taking part in the project and who have been cleared for access to EUCI. EU classified information for the purpose of these instructions is to be understood as information classified and marked CONFIDENTIAL UE or its equivalent national classification. Information generated by the beneficiaries concerned will require EU classification and marking. Continued on next slide

“Sensitive” Projects: Grant specificities Annex 1 (DoW) : SAL (Security Aspect Letter – continued) The beneficiaries concerned must obtain the approval of the Contracting Authority before beginning negotiations with a view to subcontract. The Commission Security Directorate may - in co-ordination with the responsible NSA/DSA - conduct inspections at beneficiaries’ facilities concerned to verify the implementation of the security requirements for the handling of EUCI. The beneficiaries concerned shall report all cases of unauthorised disclosure or loss of EUCI to the responsible NSA/DSA, the Commission Security Directorate and the Contracting Authority. All EUCI provided or generated under this grant agreement shall continue to be protected in the event of termination of the grant agreement. The beneficiaries concerned shall undertake not to utilise the EUCI provided or generated, other than for the specific purpose of the grant agreement XXXXXX Handling and storage instructions for information classified CONFIDENTIAL UE [2][2] [1][1] Commission Decision 2001/844/EC, Rules on Security Section 19.1 [2][2] Idem above note 1

“Sensitive” Projects: Grant specificities Annex 1 (DoW) : SCG (Security Classification Guide)

Guideline for handling CONFIDENTIEL EU classified information in FP7 project (Draft) Introduction Production of a classified document Anatomy of a classified document Stamping Classified digital media The Classified Document Register – Receipt The Classified Document register – Disposal Filing & storage Maintenance of files and folders Personal retention of documents Reproduction Downgrading Declassification Destruction Transmission Receipting Packaging Transmission methods Returned receipts “Sensitive” Projects: Guidelines. WORK IN PROGRESS Comment welcome

Further information CORDIS site:  Work Programme  Call for proposals  Guide for applicants  etc. All topics (but 7.0-4): Demos phase 1 and 2; topic 7.0-4; Security issues: