EC calls consultation on web authentication

The EC is wondering whether improved online signature technologies will be a boon to the EU economy.

Authentication

The European Commission (EC) has launched a consultation on whether electronic signatures and electronic identification (eID) and authentication could help boost e-commerce across the continent.

According to the body, problems with identifying people and their signatures are stunting the growth of the EU's online economy.

Citizens and interested parties are to be asked for their opinions on electronic signatures, identification and authentication.

The ICT sector will be targeted as well, as the EC seeks to gain the industry's thoughts on how eSignatures could be introduced effectively and securely, as well as what expectations companies have when it comes to standardisation.

"I welcome everybody's views on how we can best verify people's identities and signatures when we buy, sell or undertake administrative procedures online that need to be highly secure," said Neelie Kroes, European Commission Vice President for the Digital Agenda.

"I want to help all Europeans get online without feeling that they will fall victim to data frauds or scams."

The EC said it was also looking to the future of authentication technologies, inviting thoughts on alternatives to Public Key Infrastructure, which is widely used for managing electronic signatures.

The consultation will aid the commission's wider review of how the EU should move forward in the internet age, known as the Digital Agenda for Europe, which was launched last May.

Featured Resources

Become a digital service provider

How to transform your business from network core to edge

Download now

Optimal business results with the cloud

Evaluating the best approaches to hybrid cloud adoption

Download now

Virtualisation that enables choices, not compromises

Harness the virtualisation technology that's right for your hybrid infrastructure

Download now

Email security threat report 2020

Four key trends from spear fishing to credentials theft

Download now

Recommended

How LogPoint uses MITRE ATT&CK
Whitepaper

How LogPoint uses MITRE ATT&CK

15 Jan 2021
Weekly threat roundup: Microsoft Defender, Adobe, Mimecast
vulnerability

Weekly threat roundup: Microsoft Defender, Adobe, Mimecast

14 Jan 2021
Mimecast admits hackers accessed users’ Microsoft accounts
Security

Mimecast admits hackers accessed users’ Microsoft accounts

13 Jan 2021
What is public key infrastructure (PKI)?
Security

What is public key infrastructure (PKI)?

12 Jan 2021

Most Popular

150,000 arrest records accidentally deleted from police database
data management

150,000 arrest records accidentally deleted from police database

15 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

12 Jan 2021