Framework decision 2005/222 - Attacks against information systems

Please note

This page contains a limited version of this dossier in the EU Monitor.

1.

Current status

This framework decision was in effect from March 16, 2005 until September  2, 2013 and should have been implemented in national regulation on March 16, 2007 at the latest.

2.

Key information

official title

Council Framework Decision 2005/222/JHA of 24 February 2005 on attacks against information systems
 
Legal instrument Framework decision
Number legal act Framework decision 2005/222
Original proposal COM(2002)173 EN
CELEX number i 32005F0222

3.

Key dates

Document 24-02-2005
Publication in Official Journal 16-03-2005; Special edition in Romanian: Chapter 18 Volume 003,OJ L 69, 16.3.2005,Special edition in Croatian: Chapter 18 Volume 007,Special edition in Bulgarian: Chapter 18 Volume 003
Effect 16-03-2005; Entry into force Date pub. See Art 3
End of validity 02-09-2013; Replaced by 32013L0040
Transposition 16-03-2007

4.

Legislative text

16.3.2005   

EN

Official Journal of the European Union

L 69/67

 

COUNCIL FRAMEWORK DECISION 2005/222/JHA

of 24 February 2005

on attacks against information systems

THE COUNCIL OF THE EUROPEAN UNION,

Having regard to the Treaty on European Union, and in particular Articles 29, 30(1)(a), 31(1)(e) and 34(2)(b) thereof,

Having regard to the proposal from the Commission,

Having regard to the opinion of the European Parliament (1),

Whereas:

 

(1)

The objective of this Framework Decision is to improve cooperation between judicial and other competent authorities, including the police and other specialised law enforcement services of the Member States, through approximating rules on criminal law in the Member States in the area of attacks against information systems.

 

(2)

There is evidence of attacks against information systems, in particular as a result of the threat from organised crime, and increasing concern at the potential of terrorist attacks against information systems which form part of the critical infrastructure of the Member States. This constitutes a threat to the achievement of a safer information society and an area of freedom, security and justice, and therefore requires a response at the level of the European Union.

 

(3)

An effective response to those threats requires a comprehensive approach to network and information security, as underlined in the eEurope Action Plan, in the Communication by the Commission ‘Network and Information Security: Proposal for a European Policy Approach’ and in the Council Resolution of 28 January 2002 on a common approach and specific actions in the area of network and information security (2).

 

(4)

The need to further increase awareness of the problems related to information security and provide practical assistance has also been stressed in the European Parliament Resolution of 5 September 2001.

 

(5)

Significant gaps and differences in Member States’ laws in this area may hamper the fight against organised crime and terrorism, and may complicate effective police and judicial cooperation in the area of attacks against information systems. The transnational and borderless character of modern information systems means that attacks against such systems are often trans-border in nature, thus underlining the urgent need for further action to approximate criminal laws in this area.

 

(6)

The Action Plan of the Council and the Commission on how to best implement the provisions of the Treaty of Amsterdam on an area of freedom, security and justice (3), the Tampere European Council on 15 to 16 October 1999, the Santa Maria da Feira European Council on 19 to 20 June 2000, the Commission in the ‘Scoreboard’ and the European Parliament in its Resolution of 19 May 2000 indicate or call for legislative action against high technology crime, including common definitions, incriminations and sanctions.

 

(7)

It is necessary to complement the work performed by international organisations, in particular the Council of Europe’s work on approximating criminal law and the G8’s work on transnational cooperation in the area of high tech crime, by providing a common approach in the European Union in this area. This call was further elaborated by the Communication from the Commission to the Council, the European Parliament, the Economic and Social Committee and the Committee of the Regions on ‘Creating a Safer Information Society by Improving the Security of Information Infrastructures and Combating Computer-related Crime’.

 

(8)

Criminal law in the area of attacks against information systems should be approximated in order to ensure the greatest possible police and judicial cooperation in the area of criminal offences related to attacks against information systems, and to contribute to the...


More

This text has been adopted from EUR-Lex.

5.

Original proposal

 

6.

Sources and disclaimer

For further information you may want to consult the following sources that have been used to compile this dossier:

This dossier is compiled each night drawing from aforementioned sources through automated processes. We have invested a great deal in optimising the programming underlying these processes. However, we cannot guarantee the sources we draw our information from nor the resulting dossier are without fault.

 

7.

Full version

This page is also available in a full version containing the legal context, de Europese rechtsgrond, other dossiers related to the dossier at hand and the related cases of the European Court of Justice.

The full version is available for registered users of the EU Monitor by ANP and PDC Informatie Architectuur.

8.

EU Monitor

The EU Monitor enables its users to keep track of the European process of lawmaking, focusing on the relevant dossiers. It automatically signals developments in your chosen topics of interest. Apologies to unregistered users, we can no longer add new users.This service will discontinue in the near future.