Combating Gender-Based Violence: Cyber Violence

Total Page:16

File Type:pdf, Size:1020Kb

Combating Gender-Based Violence: Cyber Violence Combating gender-based violence: Cyber violence European added value assessment STUDY EPRS | European Parliamentary Research Service Authors: Niombo Lomba, Cecilia Navarra and Meenakshi Fernandes European Added Value Unit PE 662.621 – March 2021 EN Combating gender- based violence: Cyber violence European added value assessment With the rise of new technology and social media, gender-based cyber violence is a constantly growing threat with impacts at individual, social and economic levels, on women and girls and on society generally. There is currently no common definition or effective policy approach to combating gender-based cyber violence at EU or national level. Action taken so far has been inadequate, and the cross-border nature of gender- based cyber violence has yet to be properly addressed either. This European added value assessment (EAVA) supports the European Parliament in its right to request legislative action by the Commission, and complements its own-initiative legislative report 'Combating gender- based violence: Cyber violence' (2020/2035(INL)). Examining the definition and prevalence of gender-based cyber violence, the legal situation and individual, social and economic impacts, the EAVA draws conclusions on the EU action that could be taken, and identifies eight policy options. The costs to individuals and society are substantial and shown to be in the order of €49.0 to €89.3 billion. The assessment also finds that a combination of legal and non-legal policy options would generate the greatest European added value, promote the fundamental rights of victims, address individual, social and economic impacts, and support law enforcement and people working with victims. The potential European added value of the policy options considered is a reduction in the cost of gender-based cyber violence ranging from 1 to 24 %. EPRS | European Parliamentary Research Service AUTHORS Niombo Lomba, Cecilia Navarra and Meenakshi Fernandes, European Added Value Unit, Directorate-General for Parliamentary Research Services (EPRS). This paper has been drawn up by the European Added Value Unit of the Directorate for Impact Assessment and European Added Value, within the Directorate-General for Parliamentary Research Services (EPRS) of the Secretariat of the European Parliament. The first annexed study on the European added value assessment on combating gender-based cyber violence was written by Jack Malan, James Eager, Clara Burillo Feduchi, Michaela Brady and Ivan Bosch Chen from the Centre for Strategy & Evaluation Services LLP (CSES), with external quality assurance inputs from Merja Pentikäinen and Ben Hayes. The second annexed research paper on a quantitative assessment of the European added value on gender-based cyber violence was written by Dr Stella Capuano (ICF). Both studies were conducted at the request of the European Added Value Unit (EPRS). EPRS acknowledges collaboration with the European Union Agency for Fundamental Rights (EU FRA) to obtain disaggregated data from the Crime, Safety and Victims' Rights – Fundamental Rights Survey to support the analysis. To contact the authors, please email: [email protected] LINGUISTIC VERSIONS Original: EN Manuscript completed in March 2021. DISCLAIMERA NDC OPYRIGHT This document is prepared for, and addressed to, the Members and staff of the European Parliament as background material to assist them in their parliamentary work. The content of the document is the sole responsibility of its author(s) and any opinions expressed herein should not be taken to represent an official position of the Parliament. Reproduction and translation for non-commercial purposes are authorised, provided the source is acknowledged and the European Parliament is given prior notice and sent a copy. Brussels © European Union, 2021. PE 662.621 ISBN: 978-92-846-7890-7 DOI: 10.2861/23053 CAT: QA-02-21-301-EN-N [email protected] http://www.eprs.ep.parl.union.eu (intranet) http://www.europarl.europa.eu/thinktank (internet) http://epthinktank.eu (blog) Combating gender-based violence: Cyber violence Executive summary Background Gender-based cyber violence is a phenomenon that was inconceivable 30 years ago. More and more women and girls are experiencing harassment, stalking and other kinds of threats while online. With the ever-growing use of social media, the threats women and girls experience online have an effect on how they use the internet. Although there are many examples of women, female politicians and female journalists experiencing cyber violence and even going to court owing to harassment or other forms of cyber violence, not a lot of data or evidence has been gathered on the phenomenon. Meanwhile, the EU Member States react and act differently when dealing with the topic. It is known that gender-based cyber violence does not necessarily happen in isolation but that in many cases there is a connection with gender-based violence face-to-face; online and off-line violence is in many cases connected and/or intertwined. The coronavirus pandemic has potentially worsened the situation as people's social lives have shifted online. Why should the EU act? Having identified a wide range of gaps in existing EU actions and legislation and the negative impacts on woman and girls individually, socially and economically on account of gender-based cyber violence, this paper supports the need to act and/or intervene at EU level. Whether on the lack of harmonised legal definitions, the lack of awareness-raising and under-reporting or the need for more research and data, greater momentum would be achieved by EU action, not least since this is also a cross-border issue. This European added value assessment (EAVA) 'Combating gender-based violence: Cyber violence' is intended to underpin the European Parliament's right to request legislative action by the Commission. This is in line with Article 225 of the Treaty on the Functioning of the European Union (TFEU). Own-initiative legislative reports (INIL) must be given prompt and detailed consideration by the European Commission as set out in point 10 of the Interinstitutional Agreement on Better Law- making of 13 April 2016. The European Parliament's Committees on Civil liberties, Justice and Home Affairs (LIBE) and on Women's Rights and Gender Equality (FEMM) jointly requested the permission to draw up an own-initiative legislative report on combating gender-based violence: cyber violence (2020/2035(INL)). Scope of the assessment Beginning with a discussion on the definition of gender-based cyber violence, this assessment also considers the prevalence, and the legal, individual, social and economic impacts of gender-based cyber violence, and examines the regulatory framework at EU and national levels. To this end 12 EU Member States were analysed in greater depth. Having explored the legal base, and identified the weakness and gaps in the existing EU legal system, the paper suggests policy responses the EU could take. The assessment then discusses the qualitative and quantitative impacts, including economic estimates of the impacts of the policy options identified. External experts were commissioned to conduct additional analysis and contribute to a study and a paper; these are both annexed to this paper. The status quo The study estimates that 4 to 7 % of women in the EU-27 have experienced cyber harassment during the past 12 months, while between 1 and 3 % have experienced cyber stalking. The ranges in the estimates reflect the underlying uncertainty arising from the lack of robust and recent cross-country data available on the phenomenon. It appears nevertheless that younger age groups face the greatest risk and that the prevalence of the phenomenon has risen with greater internet I EPRS | European Parliamentary Research Service and social media use. The prevalence of gender-based cyber violence is likely to continue to rise in the coming years, especially among adolescents. Cyber violence has a direct impact on victims, first and foremost in terms of mental health, reflected in an increased incidence of depression and anxiety disorders. A number of social and economic impacts can also be identified: withdrawal from the public debate, costs incurred for seeking legal and healthcare assistance, labour market impacts in terms of lower presence at work, risks of job loss or lower productivity, and reduced quality of life due to poor mental health itself. Some of these impacts compound other forms of discrimination faced by women, e.g. the gender pay gap on the labour market. Moreover, they have an intersectional dimension and have to be observed together with other forms of discrimination and hate speech towards lesbian, gay, bisexual, transgender, intersex, and questioning (LGBTIQ) people, as well as women from racial minority groups and different religious communities. This set of impacts generates costs affecting victims as well as society. Some impacts are tangible and can translate into economic costs, while others are intangible and cannot be monetised, despite being of major relevance. Some of the costs of gender-based cyber violence were quantified by means of an economic assessment. These costs included healthcare costs, legal costs, labour market costs and costs associated with a reduced quality of life. The economic assessment estimated the overall costs of cyber harassment and cyber stalking at between €49.0 and €89.3 billion. The largest cost category was the monetised value of the loss in terms of quality of life, which accounted for more than half of the overall costs (about 60 % for cyber harassment and about 50 % for cyber stalking). Labour market impacts were also found to be substantial, together accounting for approximately 30 % for cyber harassment and 35 % for cyber stalking, the higher costs for the latter owing to lower labour force participation. Healthcare costs and legal costs, while contributing less to overall costs, were nonetheless substantial. European added value The analysis of the scope of the problem, the identified gaps and the resulting impact have led to the development of a set of policy options.
Recommended publications
  • Cyber Violence Against Women and Girls
    CYBER VIOLENCE AGAINST WOMEN AND GIRLS A WORLD-WIDE WAKE-UP CALL 2015 Photo credits:Shutterstock A REPORT BY THE UN BROADBAND COMMISSION FOR DIGITAL DEVELOPMENT WORKING GROUP ON BROADBAND AND GENDER CYBER VIOLENCE AGAINST WOMEN AND GIRLS: A WORLD-WIDE WAKE-UP CALL Acknowledgements This Report has been written collaboratively, drawing on insights and rich contributions from a range of Commissioners and Expert Members of the Working Group on Broadband and Gender. It has been researched and compiled by lead author Nidhi Tandon, assisted by Shannon Pritchard, with editorial inputs by teams from UN Women, UNDP and ITU. Design concepts were developed by Céline Desthomas of ITU. We wish to thank the following people for their contributions and kind review and comments (listed in alphabetical order of institution, followed by alphabetical order of surname): Dafne Sabanes Plou, Jac sm Kee and Chat Garcia Ramilo (APC); Dr Nancy Hafkin; Minerva Novero- Belec (UNDP); Corat Suniye Gulser (UNESCO); Jennifer Breslin and team (UN Women); Samia Melhem and team (World Bank). About the Commission The Broadband Commission for Digital Development was launched by the International Telecommunication Union (ITU) and the United Nations Educational, Scientific and Cultural Organization (UNESCO) in response to UN Secretary-General Ban Ki-moon’s call to step up efforts to meet the Millennium Development Goals. Established in May 2010, the Commission unites top industry executives with government leaders, thought leaders and policy pioneers and international agencies and organizations concerned with development. The Broadband Commission embraces a range of different perspectives in a multi-stakeholder approach to promoting the roll-out of broadband, as well as providing a fresh approach to UN and business engagement.
    [Show full text]
  • Staying Safe Online: Gender and Safety on the Internet
    MEDITERRANEAN INSTITUTE OF GENDER STUDIES (MIGS) Staying Safe Online: Gender and Safety on the Internet Experiences of Young Women and Men in Cyprus Nicosia, Cyprus November 2014 Staying Safe Online: Gender and Safety on the Internet © 2014, Mediterranean Institute of Gender Studies, all rights reserved. 46 Makedonitissas Ave. P.O. Box 24005, Nicosia 1703 Cyprus Authors: Elena Rousou, Christina Kaili Edited by Susana Elisa Pavlou Published by the Mediterranean Institute of Gender Studies (M.I.G.S.) on December 2014 Coordinated by Gender Studies, o.p.s., Czech Republic Partner Organisations Feminoteka , Poland ProFem, Czech Republic Mediterranean Institute of Gender Studies (M.I.G.S.), Cyprus This publication has been produced with the financial support of the DAPHNE III Programme of the European Union. The contents of this publication are the sole responsibility of the Mediterranean Institute of Gender Studies (M.I.G.S.) and can in no way be taken to reflect the views of the European Commission. 1 Table of Contents 1. INTRODUCTION ........................................................................................................ 4 1.1 SCOPE, GOALS AND OBJECTIVES ....................................................................................... 4 1.2 METHODOLOGY ............................................................................................................. 4 1.3 DEFINITIONS ................................................................................................................. 6 2. THEORETICAL FRAMEWORK
    [Show full text]
  • Coronavirus Social Engineering Attacks: Issues and Recommendations
    (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 11, No. 5, 2020 Coronavirus Social Engineering Attacks: Issues and Recommendations Ahmed Alzahrani Faculty of Computing and Information Technology King Abdulaziz University, Jeddah Saudia Arabia Abstract—During the current coronavirus pandemic, Social engineering attacks fall into four types: physical, cybercriminals are exploiting people’s anxieties to steal technical, social, and socio-technical [3]. In general, there are confidential information, distribute malicious software, perform two methods of social engineering attacks, human-based and ransomware attacks and use other social engineering attacks. computer-based. Human-based social engineering requires The number of social engineering attacks is increasing day by interaction with humans to gain the desired information. day due to people's failure to recognize the attacks. Therefore, Impersonation is the most common approach for this type, via there is an urgent need for solutions to help people understand a phone call or text message (see Fig. 2), online, or even in social engineering attacks and techniques. This paper helps person. Computer-based social engineering uses computer individuals and industry by reviewing the most common software to try to gain the required information. This attack coronavirus social engineering attacks and provides includes sending scam emails asking the user to open an recommendations for responding to such an attack. The paper also discusses the psychology behind social engineering and attachment to check the latest statistics about coronavirus or introduces security awareness as a solution to reduce the risk of information about coronavirus safety measures (see Fig. 1). social engineering attacks. Cybercriminals can also create a fake website to trick users into downloading malware to steal users' credentials and online Keywords—Social engineering; coronavirus; COVID-19; banking information.
    [Show full text]
  • GDPR Is Here: What to Expect Now?
    GDPR Is Here: What to Expect Now? Brett Lockwood Smith, Gambrell & Russell, LLP June 19, 2018 Agenda Principal Obligations Related Developments Under GDPR & What’s Ahead E.U. / U.S. Compliance Comparison & Best Practices GDPR Obligations Summary • E.U. General Data Protection Regulation (GDPR) was effective May 25, 2018 • Replaces 1995 E.U. Privacy Directive, with many new provisions: enhanced personal rights, affirmative consent, breach notice and DPO requirements • Very broad and process oriented • Essentially: If you process personal data of a person in the E.U. or processing is in the uE.U. or yo are a controller or processor in the E.U. then GDPR applies • Penalties –greater of €20 MM or up to 4% of worldwide revenue GDPR Obligations Key Definitions • Data Subject: an identified or identifiable natural person • Personal Data: any information relating to a Data Subject • Processing: any operation which is performed on personal data • Controller: one who determines the purposes and means for the processing of personal data • Processor: one who processes personal data on behalf of a controller (Art. 4) GDPR Obligations Major Requirements • Governing Principles for Processing Personal Data (Arts. 5, 24 & 25) ► Processing must be lawful, fair and transparent ► Processed for specified, explicit and legitimate purpose ► Adequate, relevant and limited to processing purpose ► Must be accurate and kept updated without delay ► Maintained only as long as necessary for processing purpose ► Must ensure appropriate security GDPR Obligations Major Requirements (Continued) • Affirmative consent from data subject (or guardian) or another lawful basis (e.g., legitimate interest or contract fulfillment) is needed to process data (Arts.
    [Show full text]
  • Table of Contents
    Table of Contents Foreword ...................................................................................................................... v Preface ........................................................................................................................ vii Table of Contents ......................................................................................................... xi Table of Cases ........................................................................................................... xxi Table of Legislation ...................................................................................................lvii Chapter 1 Introduction Introduction .................................................................................................................. 1 Core Principles that apply to Internet Law ................................................................... 5 Importance of the internet ....................................................................................... 5 User-generated content ........................................................................................... 9 Internet v traditional modes of communication .................................................... 11 Liability of intermediaries .................................................................................... 22 The E-Commerce Directive .................................................................................. 28 Privacy and anonymity ........................................................................................
    [Show full text]
  • Internet Safety 101
    INTERNET SAFETY 101 Learn what you need to know to keep yourself and your family safe on the internet. Why are you here? To learn: About the type of threats you may encounter online To gain a safer mindset towards using the internet Precautions we should all be taking on a regular basis How to protect yourself and your device Google Yourself The easiest way to track your digital footprint Try searching for: Variations of your name Email address Home address Work address Phone number Found something you would like taken down? Alter your privacy settings on social media accounts. Deactivate old and unused accounts. Go through sites on an individual basis to see if you can delete your information from their listings or request to have it removed. Safe Browsing Practices Look at your browser’s built in security settings “Sandboxing” – Each tab is run in a separate application environment. If harmful content is discovered in one tab, it will not spread any further. Always keep browser updated for latest security features Downloading Content Treat all downloads as suspicious until proven safe. Always SAVE files, don’t RUN them. This will give your system a chance to check for threats. No one wants to do it, but read the terms and conditions. Freeware and P2P files should be treated with extreme caution. Safe Browsing Practices Continued… Pop-Ups Always keep your pop-up blockers ON Usually contain unwanted advertisements or malware “Malware” – any software specifically intended to damage your computer system Some pop-ups are legitimate. Use icon in the address bar to allow safe pop-ups.
    [Show full text]
  • Social Engineering Attacks and the Corona Virus Pandemic
    ISSN (Online): 2455-3662 EPRA International Journal of Multidisciplinary Research (IJMR) - Peer Reviewed Journal Volume: 6 | Issue: 10 | October 2020 || Journal DOI: 10.36713/epra2013 || SJIF Impact Factor: 7.032 ||ISI Value: 1.188 SOCIAL ENGINEERING ATTACKS AND THE CORONA VIRUS PANDEMIC Ajayi Adebowale. O.1 Ajayi Oluwabukola. F 2 1 Lecturer, 2 Lecturer, Computer Science Department, Computer Science Department, Babcock University, Babcock University, Ilishan-Remo Ogun State, Ilishan-Remo Ogun State, Nigeria. Nigeria. ABSTRACT Social engineering attacks are amongst the most successful and rampant cyber-attacks. The major focus of social engineering is the manipulation of human targets to further the objectives of an attacker. The present coronavirus pandemic has had a profound effect on how we live and work and has proved to be perfect fodder for the nefarious activities of cybercriminals. This study delineates the underlying problems in social engineering vis-à-vis the corona pandemic. A descriptive survey was carried out on social engineering attacks and the corona virus pandemic including focused group discussions with some cyber attackers and regular users of information systems. A review of current covid- 19 related social engineering schemes are presented. Insights gotten from synthesizing the knowledge gathered from the analysis of social engineering attacks during Covid-19 are also highlighted in this paper. It is very likely that many people will continue to work from home or, at the very least, switch back and forth between home and traditional offices in their normal routines. The study therefore recommends that as the global community stays on high alert for signs of new pandemics or recurrence of the present one, safeguards will need to be put in place ensure that these anxieties don’t expose enterprise IT assets to social engineering tactics.
    [Show full text]
  • Annual Report 2017
    101110101011101101010011100101110101011101101010011100 10111010101110110101001 10101110001010 EDRi EUROPEAN DIGITAL RIGHTS 110101011101101010011100101011101101010011100101 10101110110101000010010100EUROPEAN010 DIGITAL001 RIGHTS11011101110101011101101100000100101101000 DEFENDING RIGHTS AND FREEDOMS ONLINE 01000111011101110101 101011101101010000100101000100011101110111010101110110110000010010110100001000111011101110101 101110101010011100 101110101011101101010011100 101011101101010000100101000100011101 101011101101010000100101000100011101110111010101110110110000010010110100001000111011101110101 101110101010011100 101110101011101101010011100 1010111011010100001001010001000111011101110101011101101100000 101011101101010000100101000100011101110111010101110110110000010010110100001000111011101110101 101110101010011100 101110101011101101010011100 10101110110101000010010100010001110111011101010111011011000001001011010000100011101110111010 101011101101010000100101000100011101110111010101110110110000010010110100001000111011101110101 101110101010011100 101110101011101101010011100 101011101101010000100101000100011101110111010101110110110000010010110100001000111011101110101 101110101010011100 101110101011101101010011100 EUROPEAN DIGITAL RIGHTS EUROPEAN DIGITAL RIGHTS ANNUAL REPORT 2017 1011011101101110111010111011111011 January 2017 – December 2017 1011011101101110111011101100110111 101011101101010000100101000100011101110111010101110110110000010010110100001000111011101110101 101110101010011100 101110101011101101010011100 101011101101010000100101000100011101110111010101110110110000010010110100001000111011101110101
    [Show full text]
  • Civil Society Organizations and General Data Protection Regulation Compliance
    Civil Society Organizations and General Data Protection Regulation Compliance Challenges, Opportunities, and Best Practices ABOUT THE ORGANIZATIONS The Open Society Foundations, founded by George Soros, are the world’s largest private funder of independent groups working for justice, democratic governance, and human rights. Open Society funded this report hoping to make a contribution towards stronger data governance in civil society. Data Protection Support & Management is a niche data protection consultancy specializing in assisting humanitarian organizations, nonprofits, research institutes, and organizations dealing with vulnerable data subjects and complex processing environments These efforts aim to help these groups and organizations innovate responsibly and comply with their data protection obligations. © 2020 Open Society Foundations This publication is available as a PDF on the Open Society Foundations website under a Creative Commons license that allows copying and distributing the publication, only in its entirety, as long as it is attributed to the Open Society Foundations and used for noncommercial educational or public policy purposes. Photographs may not be used separately from the publication. ABOUT THE AUTHORS Vera Franz is deputy director of the Open Society Lucy Hannah is a data protection consultant with Information Program where she oversees the global Digital Protection Support & Management, a certified portfolios responding to threats to open society data protection officer, and an Australian-qualified created by information technology. For the past lawyer, working across Europe and the United decade, Franz has worked to develop and implement Kingdom. Hannah has extensive experience in field strategies to confront corporate data exploitation privacy, data protection, and regulatory compliance. and government surveillance.
    [Show full text]
  • The Eprivacy Regulation (Epr) and Its Impact on Banks
    www.pwc.ch/ Is ePrivacy defining the future standard of data protection for the banking industry? The ePrivacy Regulation (ePR) and its impact on banks “The question of the right to privacy must be one of the defining issues of our time.” S. Shetty PwC | The ePrivacy Regulation and its impact on banks | 2 Table of Contents The ePrivacy Regulation (ePR) and the impact on banks 3 The ePrivacy Regulation in a nutshell 3 Legal background 3 Key requirements of the ePrivacy Regulation 4 The ePrivacy Regulation and the GDPR 5 How does the ePrivacy Regulation affect you? 7 Key challenges of ePR for banks 7 What is our suggested approach 8 Prioritisation is key 8 How can PwC help? 9 Contacts 9 3 | The ePrivacy Regulation and its impact on banks | PwC The ePrivacy Regulation (ePR) and its impact on banks The European Commission is finalising the ePri- The cornerstones of the proposed rules on Privacy vacy Regulation (ePR), which may become effec- and Electronic Communications are: tive, together with the EU GDPR, from May 2018. All electronic communications must be confi- The ePR, which protects the right to respect for dential private life and communications, is one of the key Listening to, tapping, intercepting, scanning and pillars of the EU’s Digital Single Market Strategy. storing of, for example, text messages, e-mails or voice calls will not be allowed without the consent This new regulation is designed to be ‘future- of the user. The newly introduced principle of proof’: all existing and future communication confidentiality of electronic communications will technologies are and will be subject to it.
    [Show full text]
  • Gibson Dunn Paris | Data Protection – December 2020
    December 14, 2020 GIBSON DUNN PARIS | DATA PROTECTION – DECEMBER 2020 To Our Clients and Friends: Personal Data Watch Europe 11/27/2020 – Committee of Convention 108 | Guidelines | Children's data protection in education setting The Council of Europe’s Committee of Convention 108 published guidelines on children's data protection in an education setting. For further information: Council of the Europe Website 11/20/2020 – Presidency of the Council of the European Union | Progress report | ePrivacy Regulation The European Data Protection Board (EDPB) published a statement on the ePrivacy Regulation and the future role of Supervisory Authorities and the EDPB. In particular, the EDPB expressed its concerns about the latest developments regarding the enforcement of the future ePrivacy Regulation, which would create fragmentation of supervision, procedural complexity, as well as lack of consistency and legal certainty. For further information: EDPB Website 11/17/2020 – European Data Protection Supervisor | Opinion | European Health Data Space The European Data Protection Supervisor published a Preliminary Opinion on the European Health Data Space, which aims to highlight the essential elements to be taken into account in its elaboration from a data protection perspective. For further information: EDPB Website 11/10/2020 – European Data Protection Board | Document | Procedure for the development of informal Codes of Conduct sessions The European Data Protection Board (EDPB) published a document on the procedure for the development of informal “Codes of Conduct sessions”. For further information: EDPB Website 11/12/2020 – European Commission | Draft Standard Contractual Clauses The European Commission published two draft Standard Contractual Clauses: (i) the first to carry out an international transfer of data to a third country in the absence of an adequacy decision under Article 46 of the GDPR, and (ii) the second to regulate the relationship between data controller and data processor in accordance with the requirements of Article 28.
    [Show full text]
  • Access Now's Comments to the Proposed E-Privacy Regulation
    Access Now’s comments to the proposed e-Privacy Regulation On January 2017, the European Commission tabled a proposal for a Regulation of the European ​ Parliament and of the Council concerning the respect for private life and the protection of personal data in electronic communications and repealing Directive 2002/58/EC (Regulation on Privacy and Electronic Communications), also known as the ePrivacy Regulation. Access Now welcomes the proposal which aims at upgrading the rules on the right to privacy and the confidentiality of communications to today’s digital era. We have taken an active role in the review of this important legal instrument, by providing comments to the EU Commission consultation of Spring 2016 and policy recommendations in December 2016. Access Now ​ supports the development of an e-Privacy Regulation, a central piece of legislation for the development of a digital single market that would provide users with a high standard of privacy protection, help restore trust in businesses, and promote the use of tools to fight surveillance. On that basis, we have analysed below the Commission’s proposal and proposed amendments to improve the future Regulation. For More Information, Please Contact Fanny Hidvégi | European Policy Manager | [email protected] Estelle Massé | Senior Policy Analyst | [email protected] 1 Original proposal Access Now proposed amendments (1) Article 7 of the Charter of Fundamental (1) Article 7 of the Charter of Fundamental Rights of the European Union ("the Charter") Rights of the European Union ("the Charter") protects the fundamental right of everyone to protects the fundamental right of everyone to the respect for his or her private and family life, the respect for his or her private and family life, home and communications.
    [Show full text]