2019-2024

Committee on Industry, Research and Energy

2020/0359(COD)

3.6.2021

AMENDMENTS 92 - 362

Draft report Bart Groothuis (PE692.602v01-00)

Measures for a high common level of cybersecurity across the Union, repealing Directive (EU) 2016/1148

Proposal for a directive (COM(2020)0823 – C9-0422/2020 – 2020/0359(COD))

AM\1232969EN.docx PE693.680v01-00

EN United in diversityEN AM_Com_LegReport

PE693.680v01-00 2/176 AM\1232969EN.docx EN Amendment 92 Evžen Tošenovský

Proposal for a directive Title 1

Text proposed by the Commission Amendment

Proposal for a Proposal for a DIRECTIVE OF THE EUROPEAN DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL PARLIAMENT AND OF THE COUNCIL on measures for a high common level of on measures for a high common level of cybersecurity across the Union, repealing cybersecurity across the Union (NIS Directive (EU) 2016/1148 Directive), repealing Directive (EU) (Text with EEA relevance) 2016/1148 (Text with EEA relevance)

Or. en

Amendment 93 , Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 3

Text proposed by the Commission Amendment

(3) Network and information systems (3) Network and information systems have developed into a central feature of have developed into a central feature of everyday life with the speedy digital everyday life with the speedy digital transformation and interconnectedness of transformation and interconnectedness of society, including in cross-border society, including in cross-border exchanges. That development has led to an exchanges. That development has led to an expansion of the cybersecurity threat expansion of the cybersecurity threat landscape, bringing about new challenges, landscape, bringing about new challenges, which require adapted, coordinated and which require adapted, coordinated and innovative responses in all Member States. innovative responses in all Member States. The number, magnitude, sophistication, The number, magnitude, sophistication, frequency and impact of cybersecurity frequency and impact of cybersecurity incidents are increasing, and present a incidents are increasing, and present a major threat to the functioning of network major threat to the functioning of network and information systems. As a result, cyber and information systems. As a result, cyber incidents can impede the pursuit of incidents can impede the pursuit of economic activities in the internal market, economic activities in the internal market, generate financial losses, undermine user generate financial losses, undermine user confidence and cause major damage to the confidence and cause major damage to the Union economy and society. Cybersecurity Union economy and society. Cybersecurity

AM\1232969EN.docx 3/176 PE693.680v01-00 EN preparedness and effectiveness are preparedness and effectiveness are therefore now more essential than ever to therefore now more essential than ever to the proper functioning of the internal the proper functioning of the internal market. market. The use of artificial intelligence in cybersecurity has the potential of improving the detection and to stop unsophisticated attacks, enabling resources to be diverted towards more sophisticated attacks. Member States should therefore encourage in their national strategies the use of automated tools in cybersecurity and the sharing of data needed to train and improve automated tools in cybersecurity.

Or. en

Amendment 94 Evžen Tošenovský

Proposal for a directive Recital 7

Text proposed by the Commission Amendment

(7) With the repeal of Directive (EU) (7) With the repeal of Directive (EU) 2016/1148, the scope of application by 2016/1148, the scope of application by sectors should be extended to a larger part sectors should be extended to a larger part of the economy in light of the of the economy in light of the considerations set out in recitals (4) to (6). considerations set out in recitals (4) to (6). The sectors covered by Directive (EU) The sectors covered by Directive (EU) 2016/1148 should therefore be extended to 2016/1148 should therefore be extended to provide a comprehensive coverage of the provide a comprehensive coverage of the sectors and services of vital importance for sectors and services of vital importance for key societal and economic activities within key societal and economic activities within the internal market. The rules should not the internal market. be different according to whether the entities are operators of essential services or digital service providers. That differentiation has proven obsolete, since it does not reflect the actual importance of the sectors or services for the societal and economic activities in the internal market.

Or. en

PE693.680v01-00 4/176 AM\1232969EN.docx EN Amendment 95 , , Łukasz Kohut, , , , Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 7

Text proposed by the Commission Amendment

(7) With the repeal of Directive (EU) (7) With the repeal of Directive (EU) 2016/1148, the scope of application by 2016/1148, the scope of application by sectors should be extended to a larger part sectors should be extended to a larger part of the economy in light of the of the economy in light of the considerations set out in recitals (4) to (6). considerations set out in recitals (4) to (6). The sectors covered by Directive (EU) The sectors covered by Directive (EU) 2016/1148 should therefore be extended to 2016/1148 should therefore be extended to provide a comprehensive coverage of the provide a comprehensive coverage of the sectors and services of vital importance for sectors and services of vital importance for key societal and economic activities within key societal and economic activities within the internal market. The rules should not the internal market. The risk management be different according to whether the requirements and reporting obligations entities are operators of essential services should not be different according to or digital service providers. That whether the entities are operators of differentiation has proven obsolete, since it essential services or digital service does not reflect the actual importance of providers. That differentiation has proven the sectors or services for the societal and obsolete, since it does not reflect the actual economic activities in the internal market. importance of the sectors or services for the societal and economic activities in the internal market.

Or. en

Justification

Consistency with text of the Directive.

Amendment 96 Marisa Matias, Sira Rego, Cornelia Ernst, Manuel Bompard

Proposal for a directive Recital 10

Text proposed by the Commission Amendment

(10) The Commission, in cooperation (10) SMEs represent, in the European with the Cooperation Group, may issue context, a huge percentage of the

AM\1232969EN.docx 5/176 PE693.680v01-00 EN guidelines on the implementation of the industrial/business market and, given the criteria applicable to micro and small new practices in the sector, increasingly enterprises. digitised, they face specific and worrying cybersecurity challenges. Limited cyber knowledge, lack of cybersecurity, high cost of cybersecurity solutions are some of these challenges for which SMEs need increased protection. Member States should therefore, and on the basis of this Directive, plan and implement national cybersecurity strategies to make available all existing or to be created means to technically support SMEs so they will be able to detect, prevent and react to cyberattacks or cyber threats. The Commission, directly or through ENISA, in cooperation with the Cooperation Group, will issue guidelines on the implementation of the criteria applicable to micro and small enterprises.

Or. en

Amendment 97 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 11

Text proposed by the Commission Amendment

(11) Depending on the sector in which (11) Depending on the sector in which they operate or the type of service they they operate or the type of service they provide, the entities falling within the provide, the entities falling within the scope of this Directive should be classified scope of this Directive should be classified into two categories: essential and into two categories: essential and important. That categorisation should take important. That categorisation should take into account the level of criticality of the into account the level of criticality of the sector or of the type of service, as well as sector or of the type of service, as well as the level of dependency of other sectors or the level of dependency of other sectors or types of services. Both essential and types of services. Both essential and important entities should be subject to the important entities should be subject to the same risk management requirements and same risk management requirements and reporting obligations. The supervisory and reporting obligations. The supervisory and penalty regimes between these two penalty regimes between these two

PE693.680v01-00 6/176 AM\1232969EN.docx EN categories of entities should be categories of entities should be differentiated to ensure a fair balance differentiated to ensure a fair balance between requirements and obligations on between requirements and obligations on one hand, and the administrative burden one hand, and the administrative burden stemming from the supervision of stemming from the supervision of compliance on the other hand. compliance on the other hand. The provisions of this Directive apply to entities with complex business models or operating environments, whereby an entity may simultaneously fulfil the criteria assigned to both essential and important entities. In order to enable the effective supervision and enforcement of risk management measures and reporting obligations for entities falling within the scope of this Directive, competent authorities or CSIRTs shall enforce the provisions of this Directive to a function or unit level within an entity, in order to appropriately and sufficiently address the level of criticality.

Or. en

Justification

Entities with complex business models may at the same time fulfil the classification criteria for both essential and important entities. This addition is intended to allow competent authorities or CSIRTs to enforce the provision of the Directive to such complex environments in order to properly assess the level of criticality.

Amendment 98 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Recital 11

Text proposed by the Commission Amendment

(11) Depending on the sector in which (11) Depending on the sector in which they operate or the type of service they they operate or the type of service they provide, the entities falling within the provide, the entities falling within the scope of this Directive should be classified scope of this Directive should be classified into two categories: essential and into two categories: essential and important. That categorisation should take important. That categorisation should take into account the level of criticality of the into account the level of criticality of the sector or of the type of service, as well as sector or of the type of service, as well as

AM\1232969EN.docx 7/176 PE693.680v01-00 EN the level of dependency of other sectors or the level of dependency of other sectors or types of services. Both essential and types of services. Both essential and important entities should be subject to the important entities should be subject to the same risk management requirements and same risk management requirements and reporting obligations. The supervisory and reporting obligations. The cybersecurity penalty regimes between these two risk management measures, reporting categories of entities should be obligations and supervisory and penalty differentiated to ensure a fair balance regimes between these two categories of between requirements and obligations on entities should be differentiated to ensure a one hand, and the administrative burden fair balance between requirements and stemming from the supervision of obligations on one hand, and the compliance on the other hand. administrative burden stemming from the supervision of compliance on the other hand.

Or. en

Amendment 99 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 11

Text proposed by the Commission Amendment

(11) Depending on the sector in which (11) Depending on the sector in which they operate or the type of service they they operate or the type of service they provide, the entities falling within the provide, the entities falling within the scope of this Directive should be classified scope of this Directive should be classified into two categories: essential and into two categories: essential and important. That categorisation should take important. That categorisation should take into account the level of criticality of the into account the level of criticality of the sector or of the type of service, as well as sector or of the type of service, as well as the level of dependency of other sectors or the level of dependency of other sectors or types of services. Both essential and types of services. Important entities should important entities should be subject to the be subject to lighter reporting obligations, same risk management requirements and and longer timelines to reflect the reporting obligations. The supervisory and complexity of forensics. The supervisory penalty regimes between these two and penalty regimes between these two categories of entities should be categories of entities should be differentiated to ensure a fair balance differentiated to ensure a fair balance between requirements and obligations on between requirements and obligations on one hand, and the administrative burden one hand, and the administrative burden stemming from the supervision of stemming from the supervision of compliance on the other hand. compliance on the other hand.

PE693.680v01-00 8/176 AM\1232969EN.docx EN Or. en

Amendment 100 Marisa Matias, Sira Rego, Cornelia Ernst, Sandra Pereira, Giorgos Georgiou, Manuel Bompard

Proposal for a directive Recital 11 a (new)

Text proposed by the Commission Amendment

(11a) The Covid-19 pandemic has changed many pre-existing work situations, forcing many workers to work from home, and it seems that this change is here to stay for many of these situations. Therefore, it is necessary to ensure that homeworkers are also adequately protected against cybercrime threats and/or attacks. This requires such workers to be adequately trained to detect, prevent and/or react to cyber threats. These workers must as well be protected against employers' cyber surveillance systems that would not just violate their labour rights as their personal ones as the right to privacy. Trade unions and other relevant stakeholders must play a meaningful role in this protection.

Or. en

Amendment 101 Marisa Matias, Sira Rego, Cornelia Ernst, Sandra Pereira, Giorgos Georgiou, Manuel Bompard

Proposal for a directive Recital 11 b (new)

Text proposed by the Commission Amendment

(11b) The daily lives of a large part of the population are increasingly digitalised, both personally and professionally, and in this pandemic

AM\1232969EN.docx 9/176 PE693.680v01-00 EN phase we are seeing much greater and growing use of various digital platforms for various purposes. Consumers' rights must therefore be properly protected, particularly the right to be informed of any cyberattacks on websites that they have used and/or on which they may have provided their personal data.

Or. en

Amendment 102 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 12

Text proposed by the Commission Amendment

(12) Sector-specific legislation and (12) Sector-specific legislation and instruments can contribute to ensuring high instruments can contribute to ensuring high levels of cybersecurity, while taking full levels of cybersecurity, while taking full account of the specificities and account of the specificities and complexities of those sectors. Where a complexities of those sectors. Sector- sector–specific Union legal act requires specific legislation and instruments that essential or important entities to adopt require essential or important entities to cybersecurity risk management measures adopt cybersecurity risk management or to notify incidents or significant cyber measures, or impose reporting obligations threats of at least an equivalent effect to the for significant incidents, shall, where obligations laid down in this Directive, possible, be consistent with the those sector-specific provisions, including terminology, and refer to the definitions on supervision and enforcement, should in Article 4 of this Directive. Where a apply. The Commission may issue sector–specific Union legal act requires guidelines in relation to the implementation essential or important entities to adopt of the lex specialis. This Directive does not cybersecurity risk management measures preclude the adoption of additional sector- or to notify incidents or significant cyber specific Union acts addressing threats of at least an equivalent effect to the cybersecurity risk management measures obligations laid down in this Directive, and and incident notifications. This Directive is apply to the entirety of the security aspects without prejudice to the existing of the operations and services provided by implementing powers that have been essential and important entities, those conferred to the Commission in a number sector-specific provisions, including on of sectors, including transport and energy. supervision and enforcement, should apply. The Commission may issue guidelines in relation to the implementation of the lex

PE693.680v01-00 10/176 AM\1232969EN.docx EN specialis. This Directive does not preclude the adoption of additional sector-specific Union acts addressing cybersecurity risk management measures and incident notifications. This Directive is without prejudice to the existing implementing powers that have been conferred to the Commission in a number of sectors, including transport and energy.

Or. en

Justification

This Directive should remain the building block on which different sector-specific issues shall be addressed through sector-specific legislation or instruments. Sufficient alignment and coordination of future sector-specific instruments shall be foreseen in order to avoid regulatory overlaps and the risks arising therefrom.

Amendment 103 Zdzisław Krasnodębski, Evžen Tošenovský, Izabela-Helena Kloc, Elżbieta Kruk

Proposal for a directive Recital 12

Text proposed by the Commission Amendment

(12) Sector-specific legislation and (12) Sector-specific legislation and instruments can contribute to ensuring high instruments can contribute to ensuring high levels of cybersecurity, while taking full levels of cybersecurity, while taking full account of the specificities and account of the specificities and complexities of those sectors. Where a complexities of those sectors. As a sector–specific Union legal act requires minimum baseline sector–specific Union essential or important entities to adopt legal act should require essential or cybersecurity risk management measures important entities to adopt cybersecurity or to notify incidents or significant cyber risk management measures and to notify threats of at least an equivalent effect to incidents or significant cyber threats in line the obligations laid down in this Directive, with requirements laid down in Articles 18 those sector-specific provisions, including (1, 2) and 20 of this Directive. Where on supervision and enforcement, should sector-specific legislations foresee specific apply. The Commission may issue rules on supervision and enforcement, guidelines in relation to the implementation these rules should apply. The Commission of the lex specialis. This Directive does not may issue guidelines in relation to the preclude the adoption of additional sector- implementation of the lex specialis. This specific Union acts addressing Directive does not preclude the adoption of cybersecurity risk management measures additional sector-specific Union acts and incident notifications. This Directive is addressing cybersecurity risk management

AM\1232969EN.docx 11/176 PE693.680v01-00 EN without prejudice to the existing measures and incident notifications. implementing powers that have been Nevertheless, while adopting the conferred to the Commission in a number additional sector-specific Union acts the of sectors, including transport and energy. need of a comprehensive and consistent cybersecurity framework should be duly taken into account. This Directive is without prejudice to the existing implementing powers that have been conferred to the Commission in a number of sectors, including transport and energy.

Or. en

Justification

There is a need to strengthen the importance of the NIS2 Directive as the main horizontal legislation in the field of cybersecurity. Safeguards should be provided that future sectoral legislation does not change the main principles of the NIS2 framework when it comes to cybersecurity requirements and incident notification. It is also crucial that incident notifications from all sectors are sent directly to CSIRTs.

Amendment 104 Christophe Grudler, Klemen Grošelj, Nathalie Loiseau, Sandro Gozi, Stéphanie Yon- Courtin, Valérie Hayer

Proposal for a directive Recital 12

Text proposed by the Commission Amendment

(12) Sector-specific legislation and (12) Sector-specific legislation and instruments can contribute to ensuring high instruments can contribute to ensuring high levels of cybersecurity, while taking full levels of cybersecurity, while taking full account of the specificities and account of the specificities and complexities of those sectors. Where a complexities of those sectors. Where a sector–specific Union legal act requires sector–specific Union legal act requires essential or important entities to adopt essential or important entities to adopt cybersecurity risk management measures cybersecurity risk management measures or to notify incidents or significant cyber or to notify incidents or significant cyber threats of at least an equivalent effect to the threats of at least an equivalent effect to the obligations laid down in this Directive, obligations laid down in this Directive, those sector-specific provisions, including those sector-specific provisions, including on supervision and enforcement, should on supervision and enforcement, should apply. The Commission may issue apply. The Commission should issue guidelines in relation to the implementation guidelines in relation to the implementation of the lex specialis. This Directive does not of the lex specialis, taking relevant preclude the adoption of additional sector- opinions, expertise and best practices of

PE693.680v01-00 12/176 AM\1232969EN.docx EN specific Union acts addressing ENISA and the Cooperation Group into cybersecurity risk management measures account. This Directive does not preclude and incident notifications. This Directive is the adoption of additional sector-specific without prejudice to the existing Union acts addressing cybersecurity risk implementing powers that have been management measures and incident conferred to the Commission in a number notifications. This Directive is without of sectors, including transport and energy. prejudice to the existing implementing powers that have been conferred to the Commission in a number of sectors, including transport and energy.

Or. en

Justification

To ensure that implementation of lex specialis is done in a way that respects the minimum security requirements defined and established by the NIS directive, best practices collected by ENISA and the NIS cooperation group should be taken into account in Commission guidelines.

Amendment 105 Tsvetelina Penkova

Proposal for a directive Recital 12

Text proposed by the Commission Amendment

(12) Sector-specific legislation and (12) Sector-specific legislation and instruments can contribute to ensuring high instruments can contribute to ensuring high levels of cybersecurity, while taking full levels of cybersecurity, while taking full account of the specificities and account of the specificities and complexities of those sectors. Where a complexities of those sectors. Where a sector–specific Union legal act requires sector–specific Union legal act requires essential or important entities to adopt essential or important entities to adopt cybersecurity risk management measures cybersecurity risk management measures or to notify incidents or significant cyber or to notify incidents or significant cyber threats of at least an equivalent effect to the threats of at least an equivalent effect to the obligations laid down in this Directive, obligations laid down in this Directive, and those sector-specific provisions, including where the requirements are neither on supervision and enforcement, should conflicting nor overlapping, those sector- apply. The Commission may issue specific provisions, including on guidelines in relation to the implementation supervision and enforcement, should apply. of the lex specialis. This Directive does The Commission shall issue not preclude the adoption of additional comprehensive guidelines in relation to the sector-specific Union acts addressing implementation of each sector specific cybersecurity risk management measures legislation, including on how it impacts

AM\1232969EN.docx 13/176 PE693.680v01-00 EN and incident notifications. This Directive the application of the directive. This is without prejudice to the existing Directive is without prejudice to the implementing powers that have been existing implementing powers that have conferred to the Commission in a number been conferred to the Commission in a of sectors, including transport and energy. number of sectors, including transport and energy.

Or. en

Amendment 106 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 14

Text proposed by the Commission Amendment

(14) In view of the interlinkages (14) In view of the interlinkages between cybersecurity and the physical between cybersecurity and the physical security of entities, a coherent approach security of entities, a coherent approach should be ensured between Directive (EU) should be ensured between Directive (EU) XXX/XXX of the European Parliament XXX/XXX of the European Parliament and of the Council17 and this Directive. To and of the Council17 and this Directive. To achieve this, Member States should ensure achieve this, Member States should ensure that critical entities, and equivalent entities, that critical entities, and equivalent entities, pursuant to Directive (EU) XXX/XXX are pursuant to Directive (EU) XXX/XXX are considered to be essential entities under considered to be essential entities under this Directive. Member States should also this Directive. Member States should also ensure that their cybersecurity strategies ensure that their cybersecurity strategies provide for a policy framework for provide for a policy framework for enhanced coordination between the enhanced coordination between the competent authority under this Directive competent authority under this Directive and the one under Directive (EU) and the one under Directive (EU) XXX/XXX in the context of information XXX/XXX in the context of information sharing on incidents and cyber threats and sharing on incidents and cyber threats and the exercise of supervisory tasks. the exercise of supervisory tasks. Authorities under both Directives should Authorities under both Directives should cooperate and exchange information, cooperate and exchange information on a particularly in relation to the identification regular basis, particularly in relation to the of critical entities, cyber threats, identification of critical entities, cyber cybersecurity risks, incidents affecting threats, cybersecurity risks, incidents critical entities as well as on the affecting critical entities as well as on the cybersecurity measures taken by critical cybersecurity measures taken by critical entities. Upon request of competent entities. Upon request of competent authorities under Directive (EU) authorities under Directive (EU) XXX/XXX, competent authorities under XXX/XXX, competent authorities under this Directive should be allowed to this Directive should be allowed to

PE693.680v01-00 14/176 AM\1232969EN.docx EN exercise their supervisory and enforcement exercise their supervisory and enforcement powers on an essential entity identified as powers on an essential entity identified as critical. Both authorities should cooperate critical. Both authorities should cooperate and exchange information for this purpose. and exchange information for this purpose. ______17 [insert the full title and OJ publication 17 [insert the full title and OJ publication reference when known] reference when known]

Or. en

Amendment 107 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Recital 15

Text proposed by the Commission Amendment

(15) Upholding and preserving a (15) Upholding and preserving a reliable, resilient and secure domain name reliable, resilient and secure domain name system (DNS) is a key factor in system (DNS) is a key factor in maintaining the integrity of the Internet maintaining the integrity of the Internet and is essential for its continuous and and is essential for its continuous and stable operation, on which the digital stable operation, on which the digital economy and society depend. Therefore, economy and society depend. this Directive should apply to all providers of DNS services along the DNS resolution chain, including operators of root name servers, top-level-domain (TLD) name servers, authoritative name servers for domain names and recursive resolvers.

Or. en

Justification

As this Directive sets a general cybersecurity framework for networks, DNS operators could fall under the category of essential or important entities, but a sectorial regulation of DNS should be introduced only if necessary and through a separate act.

Amendment 108 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez

AM\1232969EN.docx 15/176 PE693.680v01-00 EN Muñoz

Proposal for a directive Recital 15

Text proposed by the Commission Amendment

(15) Upholding and preserving a (15) Upholding and preserving a reliable, resilient and secure domain name reliable, resilient and secure domain name system (DNS) is a key factor in system (DNS) is a key factor in maintaining the integrity of the Internet maintaining the integrity of the Internet and is essential for its continuous and and is essential for its continuous and stable operation, on which the digital stable operation, on which the digital economy and society depend. Therefore, economy and society depend. Therefore, this Directive should apply to all providers this Directive should apply to top-level- of DNS services along the DNS resolution domain (TLD) name servers, public and chain, including operators of root name open recursive domain name resolution servers, top-level-domain (TLD) name services, and authoritative domain name servers, authoritative name servers for resolution services. This Directive should domain names and recursive resolvers. not apply to decentralised services for which centralised administration does not exist, such as the root name servers.

Or. en

Justification

Differentiating between the resolution sides of the DNS is essential to include in scope the necessary services and excluding the root name servers. Excluding those from the scope if essential to maintain and open internet and avoid risks of fragmentation and risks of extra- territorial application of the Directive.

Amendment 109 Bart Groothuis, Klemen Grošelj, , Christophe Grudler

Proposal for a directive Recital 15

Text proposed by the Commission Amendment

(15) Upholding and preserving a (15) Upholding and preserving a reliable, resilient and secure domain name reliable, resilient and secure domain name system (DNS) is a key factor in system (DNS) is a key factor in maintaining the integrity of the Internet maintaining the integrity of the Internet and is essential for its continuous and and is essential for its continuous and stable operation, on which the digital stable operation, on which the digital economy and society depend. Therefore, economy and society depend. Therefore,

PE693.680v01-00 16/176 AM\1232969EN.docx EN this Directive should apply to all providers this Directive should apply to publicly of DNS services along the DNS resolution available recursive domain name chain, including operators of root name resolution services and authoritative servers, top-level-domain (TLD) name domain name resolution services. This servers, authoritative name servers for Directive does not apply to root name domain names and recursive resolvers. servers.

Or. en

Amendment 110 Evžen Tošenovský

Proposal for a directive Recital 15

Text proposed by the Commission Amendment

(15) Upholding and preserving a (15) Upholding and preserving a reliable, resilient and secure domain name reliable, resilient and secure domain name system (DNS) is a key factor in system (DNS) is a key factor in maintaining the integrity of the Internet maintaining the integrity of the Internet and is essential for its continuous and and is essential for its continuous and stable operation, on which the digital stable operation, on which the digital economy and society depend. Therefore, economy and society depend. Therefore, this Directive should apply to all providers this Directive should apply to all providers of DNS services along the DNS resolution of DNS services along the DNS resolution chain, including operators of root name chain, top-level-domain (TLD) name servers, top-level-domain (TLD) name servers, authoritative name servers for servers, authoritative name servers for domain names and recursive resolvers. domain names and recursive resolvers.

Or. en

Amendment 111 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 17 a (new)

Text proposed by the Commission Amendment

(17a) The edge ecosystem is an emerging vector susceptible to cyber threats and a

AM\1232969EN.docx 17/176 PE693.680v01-00 EN growing trend with attacks targeting devices — such as routers, switches, and firewalls — is having a significant impact to both enterprises and to the connected digital ecosystem in its entirety. Edge computing ecosystems delivered in a highly distributed form are essential for the development of the Internet of Things (IoT), the Industrial Internet of Things (IIoT) and the sectoral ecosystems of connected devices such as connectivity infrastructure and autonomous vehicles. IoT devices may potentially offer additional attack surfaces and allow threats and attacks to trickle from the device to the network or the cloud. Poor security of IoT devices or IoT gateways can potentially hinder the security of the entire connectivity chain and the data flows towards the edge and the cloud, consequentially affecting the overall security of the ecosystem.

Or. en

Justification

Distributed cloud computing and connected devices offer additional attack surfaces and can lead to spill over effects of risks, incidents and cybersecurity threats.

Amendment 112 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 17 b (new)

Text proposed by the Commission Amendment

(17b) The continuous increase of computing power combined with the rising levels of maturity of exponential technologies such as machine learning (ML) and artificial intelligence (AI) enable the development of advanced cybersecurity capabilities for real-time

PE693.680v01-00 18/176 AM\1232969EN.docx EN detection, analysis, containment and response to cyber threats in a rapidly evolving threat landscape. AI tools and applications are used to develop security controls including, but not limited to, active firewalls, smart antivirus, automated CTI (cyber threat intelligence) operations, AI fuzzing, smart forensics, email scanning, adaptive sandboxing, and automated malware analysis.

Or. en

Justification

Artificial Intelligence and machine learning can enhance the capabilities of cybersecurity tools and applications, and enable the creation of new forms of collective threat intelligence and automation of cybersecurity-enhancing functions.

Amendment 113 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 17 c (new)

Text proposed by the Commission Amendment

(17c) Data-driven tools and applications powered by AI-enabled systems require the processing of large amounts of data, which may include personal data. Risks persist in the entire lifecycle of AI- enabled systems in cybersecurity- enhancing tools and applications, and in order to mitigate risks of unduly interference with the rights and freedoms of individuals, the requirements of data protection by design and by default laid down in Article 25 of Regulation (EU) 2016/679 shall be applied. Integrating appropriate safeguards such as pseudonymisation, encryption, data accuracy, and data minimisation in the design and use of AI-enabled systems deployed in cybersecurity applications and

AM\1232969EN.docx 19/176 PE693.680v01-00 EN processes is essential to mitigate the risks that such systems may pose on personal data.

Or. en

Justification

AI-enabled cybersecurity tools and applications must take account of risks arising to the processing of personal data. The requirements of data protection by design and by default as laid down by Regulation (EU) 2016/679 must be respected when such tools are designed and integrated in cybersecurity.

Amendment 114 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 17 d (new)

Text proposed by the Commission Amendment

(17d) Member States should adopt policies on the promotion and integration of AI-enabled systems in the prevention and detection of cybersecurity incidents and threats as part of their national cybersecurity strategies. Such policies should emphasise the technological and operational measures including, but not limited to, workflow automation, streaming analytics, active monitoring, intelligent prediction and advanced network threat detection, in order to accelerate the analysis, validation and prioritisation of threats. ENISA’s National Capabilities Assessment Framework (NCAF) can assist in the evaluation and alignment of Member States’ policies building on available use cases and key performance indicators. Moreover, an assessment of Member States’ capabilities and overall level of maturity as regards the integration of AI- enabled systems in cybersecurity should be factored in the methodological

PE693.680v01-00 20/176 AM\1232969EN.docx EN construction of the cybersecurity index within the meaning of ENISA’s report on the state of cybersecurity in the Union under Article 15 of this Directive.

Or. en

Justification

Member States’ national cybersecurity strategies to include the promotion and integration of AI in cybersecurity-related practices to enable the development of national cybersecurity processes fit for the future.

Amendment 115 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 17 e (new)

Text proposed by the Commission Amendment

(17e) Open-source cybersecurity tools contribute to a higher degree of transparency and have a positive impact on the efficiency of industrial innovation. Open standards facilitate interoperability between security tools, benefitting the security of industrial stakeholders, enabling the diversification of reliance from a single supplier or vendor, and leading to a more comprehensive CTI framework. Semi-automation of CTI production is an important tool to reduce the number of manual steps underpinning the analysis of CTI. The use of AI and ML within CTI should be further explored to increase the value of machine learning functions within CTI activities.

Or. en

Justification

Open-source tools and applications increase interoperability and enable the diversification of reliance from single vendors for industrial stakeholders. Such tools may also allow for

AM\1232969EN.docx 21/176 PE693.680v01-00 EN increased automation.

Amendment 116 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 17 f (new)

Text proposed by the Commission Amendment

(17f) Member States should develop a policy for the integration of open-source tools in public administration, and further explore measures to incentivise the wider adoption of open-source software by developing strategies to address and minimise the legal and technical risks that entities are faced with, as regards licensing and the necessary levels of technical support. Such policies are of particular importance for small and medium-sized enterprises (SMEs) facing significant costs for implementation, which can be minimised by reducing the need for specific applications or tools.

Or. en

Justification

Member States to include policies on integrating open-source tools and applications in their national cybersecurity strategies.

Amendment 117 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 19

Text proposed by the Commission Amendment

(19) Postal service providers within the (19) Postal service providers within the meaning of Directive 97/67/EC of the meaning of Directive 97/67/EC of the

PE693.680v01-00 22/176 AM\1232969EN.docx EN European Parliament and of the Council18 , European Parliament and of the Council18 , as well as express and courier delivery as well as express and courier delivery service providers, should be subject to this service providers, should be subject to this Directive if they provide at least one of the Directive if they provide at least one of the steps in the postal delivery chain and in steps in the postal delivery chain and in particular clearance, sorting or distribution, particular clearance, sorting or distribution, including pick-up services. Transport including pick-up services while taking services that are not undertaken in into account the degree of their conjunction with one of those steps should dependence on network and information fall outside of the scope of postal services. systems. Transport services that are not undertaken in conjunction with one of those steps should fall outside of the scope of postal services. ______18 Directive 97/67/EC of the European 18 Directive 97/67/EC of the European Parliament and of the Council of 15 Parliament and of the Council of 15 December 1997 on common rules for the December 1997 on common rules for the development of the internal market of development of the internal market of Community postal services and the Community postal services and the improvement of quality of service (OJ L improvement of quality of service (OJ L 15, 21.1.1998, p. 14). 15, 21.1.1998, p. 14).

Or. en

Amendment 118 Evžen Tošenovský

Proposal for a directive Recital 20

Text proposed by the Commission Amendment

(20) Those growing interdependencies (20) Those growing interdependencies are the result of an increasingly cross- are the result of an increasingly cross- border and interdependent network of border and interdependent network of service provision using key infrastructures service provision using key infrastructures across the Union in the sectors of energy, across the Union in the sectors of energy, transport, digital infrastructure, drinking transport, digital infrastructure, drinking and waste water, health, certain aspects of and waste water, health, as well as space in public administration, as well as space in as far as the provision of certain services as far as the provision of certain services depending on ground-based infrastructures depending on ground-based infrastructures that are owned, managed and operated that are owned, managed and operated either by Member States or by private either by Member States or by private parties is concerned, therefore not covering parties is concerned, therefore not covering infrastructures owned, managed or infrastructures owned, managed or operated by or on behalf of the Union as

AM\1232969EN.docx 23/176 PE693.680v01-00 EN operated by or on behalf of the Union as part of its space programmes. Those part of its space programmes. Those interdependencies mean that any interdependencies mean that any disruption, even one initially confined to disruption, even one initially confined to one entity or one sector, can have one entity or one sector, can have cascading effects more broadly, potentially cascading effects more broadly, potentially resulting in far-reaching and long-lasting resulting in far-reaching and long-lasting negative impacts in the delivery of services negative impacts in the delivery of services across the internal market. The COVID-19 across the internal market. The COVID-19 pandemic has shown the vulnerability of pandemic has shown the vulnerability of our increasingly interdependent societies in our increasingly interdependent societies in the face of low-probability risks. the face of low-probability risks.

Or. en

Amendment 119 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Recital 20 a (new)

Text proposed by the Commission Amendment

(20a) Member States should ensure that the network and information systems used by their public administration entities are subject to their national cybersecurity regulation. Where appropriate, public administration entities should be subject to obligations similar to those for essential and important entities, as appropriate.

Or. en

Amendment 120 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Recital 21

Text proposed by the Commission Amendment

(21) In view of the differences in (21) In view of the differences in national governance structures and in order national governance structures and in order to safeguard already existing sectoral to safeguard already existing sectoral

PE693.680v01-00 24/176 AM\1232969EN.docx EN arrangements or Union supervisory and arrangements or Union supervisory and regulatory bodies, Member States should regulatory bodies, Member States should be able to designate more than one national be able to designate more than one national competent authority responsible for competent authority responsible for fulfilling the tasks linked to the security of fulfilling the tasks linked to the security of the network and information systems of the network and information systems of essential and important entities under this essential and important entities under this Directive. Member States should be able to Directive, particularly for supervision and assign this role to an existing authority. enforcement. Member States should be able to assign this role to an existing authority. The competent authorities should have the necessary means to perform their duties, including powers to request the information necessary to assess the level of security of networks or services. They should also have the power to request comprehensive and reliable data about actual security incidents that have had a significant impact on the operation of services. They should, where necessary, be assisted by CSIRTs. In particular, CSIRTs may be required to provide competent authorities with information about risks and security incidents affecting services and recommend ways to address them.

Or. en

Amendment 121 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova

Proposal for a directive Recital 21 a (new)

Text proposed by the Commission Amendment

(21a) Public-Private Partnerships (PPPs) in the field of cybersecurity can provide the right framework for knowledge exchange, sharing of best practices and the establishment of a common level of understanding amongst all stakeholders. Goal-oriented and service outsourcing PPPs foster a culture of cybersecurity at the Member State level,

AM\1232969EN.docx 25/176 PE693.680v01-00 EN and leverage the exchange and transfer of expertise, thus raising cybersecurity awareness and the overall level of reciprocal support between public and private entities. Hybrid PPPs enable governments to assign either the operation, or the delivery of service- specific functions, of a CSIRT to an experienced entity facilitating the access of public administrations to private sector resources, and increasing the levels of trust between stakeholders by establishing a proactive attitude in case of incidents or crises.

Or. en

Amendment 122 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova

Proposal for a directive Recital 21 b (new)

Text proposed by the Commission Amendment

(21b) Member States should adopt policies underpinning the establishment of cybersecurity-specific PPPs as part of their national cybersecurity strategies. These policies should clarify, among others, the scope and stakeholders involved, the governance model, the available funding options, and the interaction among participating stakeholders. PPPs can leverage the expertise of private sector entities to support Member States’ competent authorities in developing state-of-the art services and processes including, but not limited to, information exchange, early warnings, cyber threat and incident exercises, crisis management, and resilience planning.

Or. en

PE693.680v01-00 26/176 AM\1232969EN.docx EN Justification

Member States to include PPP policies in their national cybersecurity strategies, laying out specific provisions underpinning the governance model, the funding options and the interaction within the PPP framework to enable Member States with limited resources to take advantage of private sector resources in further strengthening their competent authorities and CSIRTs.

Amendment 123 Marisa Matias, Sira Rego, Cornelia Ernst, Manuel Bompard

Proposal for a directive Recital 23 a (new)

Text proposed by the Commission Amendment

(23a) Cybercrime is a cross-border issue, in a constant changing process, so in order to achieve a common level of cybersecurity across the EU, the rules on prevention, detection and response to cyber threats and attacks need to be harmonized as far as possible. Therefore, ENISA should provide continuous technical support to Member States and national competent authorities and, in addition to its supervisory tasks, ENISA should provide regular recommendations and guidance for the implementation of cybersecurity best practices, also for support to SMEs. and to workers.

Or. en

Amendment 124 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 24

Text proposed by the Commission Amendment

(24) Member States should be (24) Member States should be adequately equipped, in terms of both adequately equipped, in terms of both technical and organisational capabilities, to technical and organisational capabilities, to

AM\1232969EN.docx 27/176 PE693.680v01-00 EN prevent, detect, respond to and mitigate prevent, detect, respond to and mitigate network and information system incidents network and information system incidents and risks. Member States should therefore and risks. Member States should ensure ensure that they have well-functioning that CSIRTs have at their disposal an CSIRTs, also known as computer appropriate, secure, and resilient emergency response teams (‘CERTs’), communication and information complying with essential requirements in infrastructure to exchange information order to guarantee effective and compatible between CSIRTs and with essential and capabilities to deal with incidents and risks important entities and other relevant and to ensure efficient cooperation at parties. Member States should therefore Union level. In view of enhancing the trust ensure that they have well-functioning relationship between the entities and the CSIRTs, also known as computer CSIRTs, in cases where a CSIRT is part of emergency response teams (‘CERTs’), the competent authority, Member States complying with essential requirements in should consider functional separation order to guarantee effective and compatible between the operational tasks provided by capabilities to deal with incidents and risks CSIRTs, notably in relation to information and to ensure efficient cooperation at sharing and support to the entities, and the Union level. In view of enhancing the trust supervisory activities of competent relationship between the entities and the authorities. CSIRTs, in cases where a CSIRT is part of the competent authority, Member States should consider functional separation between the operational tasks provided by CSIRTs, notably in relation to information sharing and support to the entities, and the supervisory activities of competent authorities.

Or. en

Amendment 125 Evžen Tošenovský

Proposal for a directive Recital 24

Text proposed by the Commission Amendment

(24) Member States should be (24) Member States should be adequately equipped, in terms of both adequately equipped, in terms of both technical and organisational capabilities, to technical and organisational capabilities, to prevent, detect, respond to and mitigate prevent, detect, respond to and mitigate network and information system incidents network and information system incidents and risks. Member States should therefore and risks. Member States should therefore ensure that they have well-functioning designate one or more CSIRTs under this CSIRTs, also known as computer Directive and ensure that they are well- emergency response teams (‘CERTs’), functioning, complying with essential

PE693.680v01-00 28/176 AM\1232969EN.docx EN complying with essential requirements in requirements in order to guarantee order to guarantee effective and compatible effective and compatible capabilities to capabilities to deal with incidents and risks deal with incidents and risks and to ensure and to ensure efficient cooperation at efficient cooperation at Union level. Union level. In view of enhancing the trust Member States may as CSIRTs designate relationship between the entities and the also existing computer emergency CSIRTs, in cases where a CSIRT is part of response teams (‘CERTs’). In view of the competent authority, Member States enhancing the trust relationship between should consider functional separation the entities and the CSIRTs, in cases where between the operational tasks provided by a CSIRT is part of the competent authority, CSIRTs, notably in relation to information Member States should consider functional sharing and support to the entities, and the separation between the operational tasks supervisory activities of competent provided by CSIRTs, notably in relation to authorities. information sharing and support to the entities, and the supervisory activities of competent authorities.

Or. en

Amendment 126 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 25

Text proposed by the Commission Amendment

(25) As regards personal data, CSIRTs (25) As regards personal data, CSIRTs should be able to provide, in accordance should be able to provide, in accordance with Regulation (EU) 2016/679 of the with Regulation (EU) 2016/679 of the European Parliament and of the Council19 European Parliament and of the Council19 as regards personal data, on behalf of and as regards personal data, on behalf of and upon request by an entity under this upon request by an entity under this Directive, a proactive scanning of the Directive, or in case of a serious threat to network and information systems used for national security, a proactive scanning of the provision of their services. Member the network and information systems used States should aim at ensuring an equal for the provision of their services. The level of technical capabilities for all knowledge whether an entity runs a sectorial CSIRTs. Member States may privileged management interface, affects request the assistance of the European the speed of undertaking mitigating Union Agency for Cybersecurity (ENISA) actions. It is critical that an entity or a in developing national CSIRTs. CSIRTs upon an entity's request, have the ability to continuously discover, inventory, manage, and monitor all internet-facing assets, both on premises and in the cloud, to understand their overall organisational risk to newly discovered supply chain

AM\1232969EN.docx 29/176 PE693.680v01-00 EN compromises or critical vulnerabilities. Member States should aim at ensuring an equal level of technical capabilities for all sectorial CSIRTs. Member States may request the assistance of the European Union Agency for Cybersecurity (ENISA) in developing national CSIRTs. ______19 Regulation (EU) 2016/679 of the 19 Regulation (EU) 2016/679 of the European Parliament and of the Council of European Parliament and of the Council of 27 April 2016 on the protection of natural 27 April 2016 on the protection of natural persons with regard to the processing of persons with regard to the processing of personal data and on the free movement of personal data and on the free movement of such data, and repealing Directive such data, and repealing Directive 95/46/EC (General Data Protection 95/46/EC (General Data Protection Regulation) (OJ L 119, 4.5.2016, p. 1). Regulation) (OJ L 119, 4.5.2016, p. 1).

Or. en

Amendment 127 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Recital 25

Text proposed by the Commission Amendment

(25) As regards personal data, CSIRTs (25) As regards personal data, CSIRTs should be able to provide, in accordance should be able to provide, in accordance with Regulation (EU) 2016/679 of the with Regulation (EU) 2016/679 of the European Parliament and of the Council19 European Parliament and of the Council19 as regards personal data, on behalf of and as regards personal data, on behalf of and upon request by an entity under this upon request by an entity under this Directive, a proactive scanning of the Directive, a proactive scanning of the network and information systems used for network and information systems used for the provision of their services. Member the provision of their services in order to States should aim at ensuring an equal identify, mitigate or prevent specific level of technical capabilities for all network and information security threats. sectorial CSIRTs. Member States may Processing of personal data by such request the assistance of the European scanning should be kept to the minimum Union Agency for Cybersecurity (ENISA) necessary and should, in particular, in developing national CSIRTs. respect the principles of data minimisation, purpose limitation and data protection by design and by default. Member States should aim at ensuring an

PE693.680v01-00 30/176 AM\1232969EN.docx EN equal level of technical capabilities for all sectorial CSIRTs. Member States may request the assistance of the European Union Agency for Cybersecurity (ENISA) in developing national CSIRTs. ______19 Regulation (EU) 2016/679 of the 19 Regulation (EU) 2016/679 of the European Parliament and of the Council of European Parliament and of the Council of 27 April 2016 on the protection of natural 27 April 2016 on the protection of natural persons with regard to the processing of persons with regard to the processing of personal data and on the free movement of personal data and on the free movement of such data, and repealing Directive such data, and repealing Directive 95/46/EC (General Data Protection 95/46/EC (General Data Protection Regulation) (OJ L 119, 4.5.2016, p. 1). Regulation) (OJ L 119, 4.5.2016, p. 1).

Or. en

Justification

As a particular case, answering a targeted need, such scanning should be accompanied by legal clarity and safeguards.

Amendment 128 Marisa Matias, Sira Rego, Cornelia Ernst, Manuel Bompard

Proposal for a directive Recital 25

Text proposed by the Commission Amendment

(25) As regards personal data, CSIRTs (25) As regards personal data, CSIRTs should be able to provide, in accordance should be able to provide, in accordance with Regulation (EU) 2016/679 of the with Regulation (EU) 2016/679 of the European Parliament and of the Council19 European Parliament and of the Council19 as regards personal data, on behalf of and as regards personal data, on behalf of and upon request by an entity under this upon request by an entity under this Directive, a proactive scanning of the Directive, a proactive scanning of the network and information systems used for network and information systems used for the provision of their services. Member the provision of their services. Member States should aim at ensuring an equal States should aim at ensuring an equal level of technical capabilities for all level of technical capabilities for all sectorial CSIRTs. Member States may sectorial CSIRTs. Member States may request the assistance of the European request the assistance of the European Union Agency for Cybersecurity (ENISA) Union Agency for Cybersecurity (ENISA) in developing national CSIRTs. in developing national CSIRTs. With regard to personal data, all entities, public

AM\1232969EN.docx 31/176 PE693.680v01-00 EN and/or private, which, due to a reported incident or a detected cybersecurity threat, wish to access or legitimately access personal data shall proceed in absolute accordance with the General Data Protection Regulation. ______19 Regulation (EU) 2016/679 of the 19 Regulation (EU) 2016/679 of the European Parliament and of the Council of European Parliament and of the Council of 27 April 2016 on the protection of natural 27 April 2016 on the protection of natural persons with regard to the processing of persons with regard to the processing of personal data and on the free movement of personal data and on the free movement of such data, and repealing Directive such data, and repealing Directive 95/46/EC (General Data Protection 95/46/EC (General Data Protection Regulation) (OJ L 119, 4.5.2016, p. 1). Regulation) (OJ L 119, 4.5.2016, p. 1).

Or. en

Amendment 129 Bart Groothuis, Klemen Grošelj, Iskra Mihaylova, Nicola Danti, Christophe Grudler, Martina Dlabajová

Proposal for a directive Recital 26

Text proposed by the Commission Amendment

(26) Given the importance of (26) Given the importance of international cooperation on cybersecurity, international cooperation on cybersecurity, CSIRTs should be able to participate in CSIRTs should be able to participate in international cooperation networks in international cooperation networks, addition to the CSIRTs network established including with CSIRTs outside the Union, by this Directive. in addition to the CSIRTs network established by this Directive.

Or. en

Justification

International cooperation with likeminded partners outside the Union should be encouraged.

Amendment 130 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez

PE693.680v01-00 32/176 AM\1232969EN.docx EN Muñoz

Proposal for a directive Recital 26 a (new)

Text proposed by the Commission Amendment

(26a) Cyber hygiene policies provide the foundations for protecting network and information system infrastructures, hardware, software and online application security, and business or end-user data which entities rely on. Cyber hygiene policies comprising a common baseline set of practices including, but not limited to, software and hardware updates, password changes, management of new installs, limitation of administrator-level access accounts, and backing up of data, enable a proactive framework of preparedness and overall safety and security in the event of incidents or threats.

Or. en

Justification

Cyber hygiene policies and control cam prevent security risks, enabling a proactive framework of security preparedness and safety.

Amendment 131 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 26 b (new)

Text proposed by the Commission Amendment

(26b) Member States should adopt policies to promote cyber hygiene as part of their national cybersecurity strategies. Such policies should build on cyber hygiene controls and programmes that are affordable and accreditable in order to

AM\1232969EN.docx 33/176 PE693.680v01-00 EN minimise the cost of implementation, especially for SMEs, and encourage wider compliance thereto by both public and private entities. ENISA should monitor and assess Member States’ cyber hygiene policies, and explore EU wide schemes to enable cross-border checks ensuring equivalence independent of Member State requirements.

Or. en

Justification

Member States adopting cyber hygiene protocols can add value to the overall preparedness of competent authorities and raise security overall.

Amendment 132 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova

Proposal for a directive Recital 28

Text proposed by the Commission Amendment

(28) Since the exploitation of (28) Since the exploitation of vulnerabilities in network and information vulnerabilities in network and information systems may cause significant disruption systems may cause significant disruption and harm, swiftly identifying and and harm, swiftly identifying and remedying those vulnerabilities is an remedying those vulnerabilities is an important factor in reducing cybersecurity important factor in reducing cybersecurity risk. Entities that develop such systems risk. Entities that develop such systems should therefore establish appropriate should therefore establish appropriate procedures to handle vulnerabilities when procedures to handle vulnerabilities when they are discovered. Since vulnerabilities they are discovered. Since vulnerabilities are often discovered and reported are often discovered and reported (disclosed) by third parties (reporting (disclosed) by third parties (reporting entities), the manufacturer or provider of entities), the manufacturer or provider of ICT products or services should also put in ICT products or services should also put in place the necessary procedures to receive place the necessary procedures to receive vulnerability information from third vulnerability information from third parties. In this regard, international parties. In this regard, international standards ISO/IEC 30111 and ISO/IEC standards ISO/IEC 30111 and ISO/IEC 29417 provide guidance on vulnerability 29417 provide guidance on vulnerability handling and vulnerability disclosure handling and vulnerability disclosure respectively. As regards vulnerability respectively. As regards vulnerability

PE693.680v01-00 34/176 AM\1232969EN.docx EN disclosure, coordination between reporting disclosure, coordination between reporting entities and manufacturers or providers of entities and manufacturers or providers of ICT products or services is particularly ICT products or services is particularly important. Coordinated vulnerability important. Voluntary coordinated disclosure specifies a structured process vulnerability disclosure specifies a through which vulnerabilities are reported structured process through which to organisations in a manner allowing the vulnerabilities are reported to organisations organisation to diagnose and remedy the in a manner allowing the organisation to vulnerability before detailed vulnerability diagnose and remedy the vulnerability information is disclosed to third parties or before detailed vulnerability information is to the public. Coordinated vulnerability disclosed to third parties or to the public. disclosure should also comprise Coordinated vulnerability disclosure coordination between the reporting entity should also comprise coordination between and the organisation as regards the timing the reporting entity and the organisation as of remediation and publication of regards the timing of remediation and vulnerabilities. publication of vulnerabilities. Strengthening the coordination and timely exchange of relevant information between the manufacturer or provider of ICT products or services and the reporting entities is essential to facilitate the voluntary framework of vulnerability disclosure.

Or. en

Amendment 133 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 29

Text proposed by the Commission Amendment

(29) Member States should therefore (29) Member States should therefore take measures to facilitate coordinated take measures to facilitate coordinated vulnerability disclosure by establishing a vulnerability disclosure by establishing a relevant national policy. In this regard, relevant national policy. In this regard, Member States should designate a CSIRT Member States should designate a CSIRT to take the role of ‘coordinator’, acting as to take the role of ‘coordinator’, acting as an intermediary between the reporting an intermediary between the reporting entities and the manufacturers or providers entities and the manufacturers or providers of ICT products or services where of ICT products or services, where the necessary. The tasks of the CSIRT reporting entity, or the manufacturer or coordinator should in particular include the provider of ICT products or services,

AM\1232969EN.docx 35/176 PE693.680v01-00 EN identifying and contacting concerned engages a third-party coordinator to assist entities, supporting reporting entities, with the disclosure process. The tasks of negotiating disclosure timelines, and the CSIRT coordinator should, in managing vulnerabilities that affect particular, include identifying and multiple organisations (multi-party contacting concerned entities, supporting vulnerability disclosure). Where reporting entities, negotiating disclosure vulnerabilities affect multiple timelines, and managing vulnerabilities manufacturers or providers of ICT products that affect multiple organisations (multi- or services established in more than one party vulnerability disclosure). Where Member State, the designated CSIRTs vulnerabilities affect multiple from each of the affected Member States manufacturers or providers of ICT products should cooperate within the CSIRTs or services established in more than one Network. Member State, the designated CSIRTs from each of the affected Member States should cooperate within the CSIRTs Network.

Or. en

Amendment 134 Tsvetelina Penkova

Proposal for a directive Recital 29

Text proposed by the Commission Amendment

(29) Member States should therefore (29) Member States should therefore take measures to facilitate coordinated take measures to facilitate coordinated vulnerability disclosure by establishing a vulnerability disclosure by establishing a relevant national policy. In this regard, relevant national policy. In this regard, Member States should designate a CSIRT Member States should designate a CSIRT to take the role of ‘coordinator’, acting as to take the role of ‘coordinator’, acting as an intermediary between the reporting an intermediary between the manufacturers entities and the manufacturers or providers or providers of ICT products or services, of ICT products or services where which report the vulnerability, and their necessary. The tasks of the CSIRT customers, which are likely to be affected coordinator should in particular include by the vulnerability, where necessary. The identifying and contacting concerned tasks of the CSIRT coordinator should in entities, supporting reporting entities, particular include identifying and negotiating disclosure timelines, and contacting concerned entities, supporting managing vulnerabilities that affect reporting entities, providing guidelines on multiple organisations (multi-party disclosure timelines, and managing vulnerability disclosure). Where vulnerabilities that affect multiple vulnerabilities affect multiple organisations (multi-party vulnerability manufacturers or providers of ICT products disclosure). Where vulnerabilities affect or services established in more than one multiple manufacturers or providers of ICT

PE693.680v01-00 36/176 AM\1232969EN.docx EN Member State, the designated CSIRTs products or services established in more from each of the affected Member States than one Member State, the designated should cooperate within the CSIRTs CSIRTs from each of the affected Member Network. States should cooperate within the CSIRTs Network in providing assistance and guidance to the affected manufacturers.

Or. en

Amendment 135 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 29

Text proposed by the Commission Amendment

(29) Member States should therefore (29) Member States, in cooperation take measures to facilitate coordinated with ENISA, should therefore take vulnerability disclosure by establishing a measures to facilitate coordinated relevant national policy. In this regard, vulnerability disclosure by establishing a Member States should designate a CSIRT relevant national policy. In this regard, to take the role of ‘coordinator’, acting as Member States should designate a CSIRT an intermediary between the reporting to take the role of ‘coordinator’, acting as entities and the manufacturers or providers an intermediary between the reporting of ICT products or services where entities and the manufacturers or providers necessary. The tasks of the CSIRT of ICT products or services where coordinator should in particular include necessary. The tasks of the CSIRT identifying and contacting concerned coordinator should in particular include entities, supporting reporting entities, identifying and contacting concerned negotiating disclosure timelines, and entities, supporting reporting entities, managing vulnerabilities that affect negotiating disclosure timelines, and multiple organisations (multi-party managing vulnerabilities that affect vulnerability disclosure). Where multiple organisations (multi-party vulnerabilities affect multiple vulnerability disclosure). Where manufacturers or providers of ICT products vulnerabilities affect multiple or services established in more than one manufacturers or providers of ICT products Member State, the designated CSIRTs or services established in more than one from each of the affected Member States Member State, the designated CSIRTs should cooperate within the CSIRTs from each of the affected Member States Network. should cooperate within the CSIRTs Network.

Or. en

AM\1232969EN.docx 37/176 PE693.680v01-00 EN Amendment 136 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 30

Text proposed by the Commission Amendment

(30) Access to correct and timely (30) Access to correct and timely information on vulnerabilities affecting information on vulnerabilities affecting ICT products and services contributes to an ICT products and services contributes to an enhanced cybersecurity risk management. enhanced cybersecurity risk management. In that regard, sources of publicly available In that regard, sources of publicly available information on vulnerabilities are an information on vulnerabilities are an important tool for entities and their users, important tool for entities and their users, but also national competent authorities and but also national competent authorities and CSIRTs. For this reason, ENISA should CSIRTs. For this reason, ENISA should establish a vulnerability registry where, establish a vulnerability registry where, essential and important entities and their essential and important entities and their suppliers, as well as entities which do not suppliers, as well as entities which do not fall in the scope of application of this fall in the scope of application of this Directive may, on a voluntary basis, Directive may, on a voluntary basis, disclose vulnerabilities and provide the disclose vulnerabilities and provide the vulnerability information that allows users vulnerability information that allows users to take appropriate mitigating measures. to take appropriate mitigating measures. In general, to encourage a culture of disclosure of incidents a voluntary disclosure should be without detriment to the reporting entity. Any exchange of information shall preserve the confidentiality of that information and protect the security and commercial interests of essential or important entities

Or. en

Amendment 137 Thierry Mariani, Paolo Borchia, Isabella Tovaglieri

Proposal for a directive Recital 30

Text proposed by the Commission Amendment

(30) Access to correct and timely (30) Access to correct and timely information on vulnerabilities affecting information on vulnerabilities affecting ICT products and services contributes to an ICT products and services and industrial

PE693.680v01-00 38/176 AM\1232969EN.docx EN enhanced cybersecurity risk management. control systems (ICS) contributes to an In that regard, sources of publicly available enhanced cybersecurity risk management. information on vulnerabilities are an In that regard, sources of publicly available important tool for entities and their users, information on vulnerabilities are an but also national competent authorities and important tool for entities and their users, CSIRTs. For this reason, ENISA should but also national competent authorities and establish a vulnerability registry where, CSIRTs. For this reason, ENISA should essential and important entities and their establish a vulnerability registry where, suppliers, as well as entities which do not essential and important entities and their fall in the scope of application of this suppliers, as well as entities which do not Directive may, on a voluntary basis, fall in the scope of application of this disclose vulnerabilities and provide the Directive may, on a voluntary basis, vulnerability information that allows users disclose vulnerabilities and provide the to take appropriate mitigating measures. vulnerability information that allows users to take appropriate mitigating measures.

Or. fr

Amendment 138 Evžen Tošenovský

Proposal for a directive Recital 30

Text proposed by the Commission Amendment

(30) Access to correct and timely (30) Access to correct and timely information on vulnerabilities affecting information on vulnerabilities affecting ICT products and services contributes to an ICT products and services contributes to an enhanced cybersecurity risk management. enhanced cybersecurity risk management. In that regard, sources of publicly available In that regard, sources of publicly available information on vulnerabilities are an information on vulnerabilities are an important tool for entities and their users, important tool for entities and their users, but also national competent authorities and but also national competent authorities and CSIRTs. For this reason, ENISA should CSIRTs. For this reason, ENISA should establish a vulnerability registry where, establish a vulnerability database where, essential and important entities and their essential and important entities and their suppliers, as well as entities which do not suppliers, as well as entities which do not fall in the scope of application of this fall in the scope of application of this Directive may, on a voluntary basis, Directive may, on a voluntary basis, disclose vulnerabilities and provide the disclose the patched vulnerabilities and vulnerability information that allows users provide the vulnerability information that to take appropriate mitigating measures. allows users to take appropriate mitigating measures.

Or. en

AM\1232969EN.docx 39/176 PE693.680v01-00 EN Amendment 139 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 31

Text proposed by the Commission Amendment

(31) Although similar vulnerability (31) Although similar vulnerability registries or databases do exist, these are registries or databases do exist, these are hosted and maintained by entities which hosted and maintained by entities which are not established in the Union. A are not established in the Union. A European vulnerability registry maintained European vulnerability registry maintained by ENISA would provide improved by ENISA would provide improved transparency regarding the publication transparency regarding the publication process before the vulnerability is officially process before the vulnerability is officially disclosed, and resilience in cases of disclosed, and resilience in cases of disruptions or interruptions on the disruptions or interruptions on the provision of similar services. To avoid provision of similar services. To avoid duplication of efforts and seek duplication of efforts and seek complementarity to the extent possible, complementarity to the extent possible, ENISA should explore the possibility of ENISA should explore the possibility of entering into structured cooperation entering into structured cooperation agreements with similar registries in third agreements with similar registries in third country jurisdictions. country jurisdictions. ENISA could play a more central management role either by exploring the option of becoming a “Root CVE Numbering Authority” in the global Common Vulnerabilities and Exposures (CVE) registry, or setting up a database to leverage the existing CVE programme for vulnerability identification and registration to enable interoperability and reference between the European and third country jurisdiction registries.

Or. en

Justification

ENISA can pursue becoming a root numbering authority in the global CVE efforts and thus gain a more central management role, allowing ENISA to enable interoperability and reference of the European registry with global equivalent efforts.

PE693.680v01-00 40/176 AM\1232969EN.docx EN Amendment 140 Evžen Tošenovský

Proposal for a directive Recital 31

Text proposed by the Commission Amendment

(31) Although similar vulnerability (31) The European vulnerability registries or databases do exist, these are database maintained by ENISA should hosted and maintained by entities which leverage the global Common are not established in the Union. A Vulnerabilities and Exposures (CVE) European vulnerability registry maintained registry. To avoid duplication of efforts by ENISA would provide improved and seek complementarity to the extent transparency regarding the publication possible, ENISA should explore the process before the vulnerability is possibility of entering into structured officially disclosed, and resilience in cases cooperation agreements with the CVE, of disruptions or interruptions on the including by membership in its Board and provision of similar services. To avoid by becoming a Root CVE Numbering duplication of efforts and seek Authority, and with other similar registries complementarity to the extent possible, in third country jurisdictions. ENISA should explore the possibility of entering into structured cooperation agreements with similar registries in third country jurisdictions.

Or. en

Amendment 141 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Recital 32

Text proposed by the Commission Amendment

(32) The Cooperation Group should (32) The Cooperation Group set up establish a work programme every two under this Directive, should include years including the actions to be representatives of Member States, the undertaken by the Group to implement its Commission, ENISA and, due to the link objectives and tasks. The timeframe of the with the data protection framework, the first programme adopted under this European Data Protection Board Directive should be aligned with the (EDPB). The cooperation group should timeframe of the last programme adopted establish a work programme every two under Directive (EU) 2016/1148 in order to years including the actions to be avoid potential disruptions in the work of undertaken by the Group to implement its

AM\1232969EN.docx 41/176 PE693.680v01-00 EN the Group. objectives and tasks. The timeframe of the first programme adopted under this Directive should be aligned with the timeframe of the last programme adopted under Directive (EU) 2016/1148 in order to avoid potential disruptions in the work of the Group.

Or. en

Justification

As a first mention of the Group, clarity on its membership has been added, in line with changes proposed in the articles.

Amendment 142 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 35

Text proposed by the Commission Amendment

(35) The competent authorities and (35) The competent authorities and CSIRTs should be empowered to CSIRTs should be empowered to participate in exchange schemes for participate in exchange schemes for officials from other Member States in order officials from other Member States, within to improve cooperation. The competent structured rules and mechanisms authorities should take the necessary underpinning the scope and, where measures to enable officials from other applicable, the required security clearance Member States to play an effective role in of officials participating in such exchange the activities of the host competent schemes, in order to improve cooperation. authority. The competent authorities should take the necessary measures to enable officials from other Member States to play an effective role in the activities of the host competent authority or CSIRT.

Or. en

Justification

Clarity of the structure and security clearance of such exchanges is necessary to ensure the effectiveness of the exchange and cooperation among CSIRTs.

PE693.680v01-00 42/176 AM\1232969EN.docx EN Amendment 143 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Recital 36

Text proposed by the Commission Amendment

(36) The Union should, where (36) The Union should, where appropriate, conclude international appropriate, conclude international agreements, in accordance with Article 218 agreements, in accordance with Article 218 TFEU, with third countries or international TFEU, with third countries or international organisations, allowing and organising organisations, allowing and organising their participation in some activities of the their participation in some activities of the Cooperation Group and the CSIRTs Cooperation Group and the CSIRTs network. Such agreements should ensure network and the European cyber crises adequate protection of data. liaison organisation network. Such agreements should ensure adequate protection of Union interests and data. This shall not preclude the right of Member States to cooperate with like- minded third countries on management of vulnerabilities and cyber security risk management, facilitating reporting and general information sharing in line with Union legislation.

Or. en

Justification

Cyber incidents are often cross border beyond the Union and it makes sense to cooperate in treating them.

Amendment 144 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 38

Text proposed by the Commission Amendment

AM\1232969EN.docx 43/176 PE693.680v01-00 EN (38) For the purposes of this Directive, deleted the term ‘risk’ should refer to the potential for loss or disruption caused by a cybersecurity incident and should be expressed as a combination of the magnitude of such loss or disruption and the likelihood of occurrence of said incident.

Or. en

Justification

Moved from recital to Article 4 (Definitions).

Amendment 145 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 39

Text proposed by the Commission Amendment

(39) For the purposes of this Directive, deleted the term ‘near misses’ should refer to an event which could potentially have caused harm, but was successfully prevented from fully transpiring.

Or. en

Justification

Moved from recital to Article 4 (Definitions).

Amendment 146 Christophe Grudler, Klemen Grošelj, Sandro Gozi, Stéphanie Yon-Courtin, Valérie Hayer

Proposal for a directive Recital 40

PE693.680v01-00 44/176 AM\1232969EN.docx EN Text proposed by the Commission Amendment

(40) Risk-management measures should (40) Risk-management measures should include measures to identify any risks of include measures to identify any risks of incidents, to prevent, detect and handle incidents, to prevent, detect and handle incidents and to mitigate their impact. The incidents and to mitigate their impact. The security of network and information security of network and information systems should comprise the security of systems should comprise the security of stored, transmitted and processed data. stored, transmitted and processed data. It must be approached using systemic analysis that break down the various processes and the interactions between the subsystems, in order to have a complete picture of the security of the information system. The human factor should be fully taken into account in the analysis.

Or. en

Justification

A systemic approach towards the security of information systems is necessary

Amendment 147 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 40

Text proposed by the Commission Amendment

(40) Risk-management measures should (40) Risk-management measures should include measures to identify any risks of include measures to identify any risks of incidents, to prevent, detect and handle incidents, to prevent, detect, respond to, incidents and to mitigate their impact. The attribute, and recover from incidents, and security of network and information to mitigate their impact. The security of systems should comprise the security of network and information systems should stored, transmitted and processed data. comprise the security of stored, transmitted and processed data.

Or. en

Amendment 148

AM\1232969EN.docx 45/176 PE693.680v01-00 EN Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Recital 43

Text proposed by the Commission Amendment

(43) Addressing cybersecurity risks (43) Addressing cybersecurity risks stemming from an entity’s supply chain stemming from an entity’s supply chain and its relationship with its suppliers is and its relationship with its suppliers is particularly important given the prevalence particularly important given the prevalence of incidents where entities have fallen of incidents where entities have fallen victim to cyber-attacks and where victim to cyber-attacks and where malicious actors were able to compromise malicious actors were able to compromise the security of an entity’s network and the security of an entity’s network and information systems by exploiting information systems by exploiting vulnerabilities affecting third party vulnerabilities affecting third party products and services. Entities should products and services. Entities should therefore assess and take into account the therefore assess and take into account the overall quality of products and overall quality of products and cybersecurity practices of their suppliers cybersecurity practices of their suppliers and service providers, including their and service providers, including their secure development procedures. secure development procedures. Entities should be in particular encouraged to incorporate the cybersecurity safeguards into the contractual arrangements with the tier-1 suppliers and service providers, including responsibility of the tier-1 suppliers for other tiers of suppliers and service providers.

Or. en

Amendment 149 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 43

Text proposed by the Commission Amendment

(43) Addressing cybersecurity risks (43) Addressing cybersecurity risks stemming from an entity’s supply chain stemming from an entity’s supply chain and its relationship with its suppliers is and its relationship with its suppliers is particularly important given the prevalence particularly important given the prevalence

PE693.680v01-00 46/176 AM\1232969EN.docx EN of incidents where entities have fallen of incidents where entities have fallen victim to cyber-attacks and where victim to cyber-attacks and where malicious actors were able to compromise malicious actors were able to compromise the security of an entity’s network and the security of an entity’s network and information systems by exploiting information systems by exploiting vulnerabilities affecting third party vulnerabilities affecting third party products and services. Entities should products and services. Entities should therefore assess and take into account the evaluate their own cybersecurity overall quality of products and capabilities and pursue the integration of cybersecurity practices of their suppliers cybersecurity enhancing technologies and service providers, including their driven by AI or machine learning systems secure development procedures. to automate their capabilities and the protection of network architectures. Entities should also assess and take into account the overall quality of products and cybersecurity practices of their suppliers and service providers, including their secure development procedures.

Or. en

Justification

Lesson learned from past cybersecurity incidents is the need to modernise technologies such as artificial intelligence & machine learning -based user behavioural, and technologies that effectively collect, integrate, and normalise security data across the entire network to assist with incident response.

Amendment 150 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Recital 43

Text proposed by the Commission Amendment

(43) Addressing cybersecurity risks (43) Addressing cybersecurity risks stemming from an entity’s supply chain stemming from an entity’s supply chain and its relationship with its suppliers is and its relationship with its suppliers is particularly important given the prevalence particularly important given the prevalence of incidents where entities have fallen of incidents where entities have fallen victim to cyber-attacks and where victim to attacks against information malicious actors were able to compromise systems and where malicious actors were the security of an entity’s network and able to compromise the security of an information systems by exploiting entity’s network and information systems vulnerabilities affecting third party by exploiting vulnerabilities affecting third

AM\1232969EN.docx 47/176 PE693.680v01-00 EN products and services. Entities should party products and services. Entities should therefore assess and take into account the therefore assess and take into account the overall quality of products and overall quality of products, the security cybersecurity practices of their suppliers measures embedded in them and the and service providers, including their cybersecurity practices of their suppliers secure development procedures. and service providers, including their secure development procedures and security features of the product.

Or. en

Justification

In order to address efficiently the security, not only the stakeholders in a supply chain have to implement security measures for themselves, but the products need to be assessed from a cybersecurity standpoint.

Amendment 151 Tsvetelina Penkova

Proposal for a directive Recital 43

Text proposed by the Commission Amendment

(43) Addressing cybersecurity risks (43) Addressing cybersecurity risks stemming from an entity’s supply chain stemming from an entity’s supply chain and its relationship with its suppliers is and its relationship with its suppliers is particularly important given the prevalence particularly important given the prevalence of incidents where entities have fallen of incidents where entities have fallen victim to cyber-attacks and where victim to cyber-attacks and where malicious actors were able to compromise malicious actors were able to compromise the security of an entity’s network and the security of an entity’s network and information systems by exploiting information systems by exploiting vulnerabilities affecting third party vulnerabilities affecting third party products and services. Entities should products and services. Entities should therefore assess and take into account the therefore assess and take into account the overall quality of products and overall quality and resilience of products, cybersecurity practices of their suppliers services and cybersecurity practices of and service providers, including their their suppliers and service providers, secure development procedures. including their secure development procedures.

Or. en

PE693.680v01-00 48/176 AM\1232969EN.docx EN Amendment 152 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Recital 43 a (new)

Text proposed by the Commission Amendment

(43a) In order to offer the necessary transparency to mitigate supply chain risks, open source cybersecurity products (software and hardware), including open source encryption, should be favoured, in line with Opinion 5/2021 of the European Data Protection Supervisor1a

Or. en

(1a Opinion 5/2021 of the European Data Protection Supervisor on the Cybersecurity Strategy and the NIS 2.0 Directive, 11 March 2021)

Justification

Supply chains are included in the Opinion 5/2021 of the European Data Protection Supervisor.

Amendment 153 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 44

Text proposed by the Commission Amendment

(44) Among service providers, managed (44) Among service providers, managed security services providers (MSSPs) in security services providers (MSSPs) in areas such as incident response, penetration areas such as incident response, penetration testing, security audits and consultancy testing, security audits and consultancy play a particularly important role in play a particularly important role in assisting entities in their efforts to detect assisting entities in their efforts to prevent, and respond to incidents. Those MSSPs detect and respond to incidents. Those have however also been the targets of MSSPs have however also been the targets cyberattacks themselves and through their of cyberattacks themselves and through close integration in the operations of their close integration in the operations of

AM\1232969EN.docx 49/176 PE693.680v01-00 EN operators pose a particular cybersecurity operators pose a particular cybersecurity risk. Entities should therefore exercise risk. Entities should therefore exercise increased diligence in selecting an MSSP. increased diligence in selecting an MSSP, not only in terms of the close operational integration but also as regards the need for such outsourced activities involving personal data by a controller to be in full compliance with Regulation (EU) 2016/679, in particular the processing by a processor on behalf of a controller.

Or. en

Amendment 154 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Recital 44

Text proposed by the Commission Amendment

(44) Among service providers, managed (44) Among service providers, managed security services providers (MSSPs) in security services providers (MSSPs) in areas such as incident response, penetration areas such as incident response, penetration testing, security audits and consultancy testing, security audits and consultancy play a particularly important role in play a particularly important role in assisting entities in their efforts to detect assisting entities in their efforts to detect and respond to incidents. Those MSSPs and respond to incidents. Those MSSPs have however also been the targets of have however also been the targets cyberattacks themselves and through their of attacks against information systems close integration in the operations of themselves and through their close operators pose a particular cybersecurity integration in the operations of operators risk. Entities should therefore exercise pose a particular cybersecurity risk. increased diligence in selecting an MSSP. Entities should therefore exercise increased diligence in selecting an MSSP. (This amendment should apply across the text, replacing cyberattacks with “attacks against information systems", aligning the wording with the Cybercrime Directive 2013/40/EU)

Or. en

PE693.680v01-00 50/176 AM\1232969EN.docx EN Justification

The term cyberattack is not explicit by itself therefore needs to be replaced with “attacks against information systems”, as in the Cybercrime Directive 2013/40/EU.

Amendment 155 Bart Groothuis, Klemen Grošelj, Iskra Mihaylova, Nicola Danti, Christophe Grudler

Proposal for a directive Recital 45

Text proposed by the Commission Amendment

(45) Entities should also address (45) Entities should also address cybersecurity risks stemming from their cybersecurity risks stemming from their interactions and relationships with other interactions and relationships with other stakeholders within a broader ecosystem. stakeholders within a broader ecosystem, In particular, entities should take including to counter industrial espionage appropriate measures to ensure that their and to protect trade secrets. In particular, cooperation with academic and research entities should take appropriate measures institutions takes place in line with their to ensure that their cooperation with cybersecurity policies and follows good academic and research institutions takes practices as regards secure access and place in line with their cybersecurity dissemination of information in general policies and follows good practices as and the protection of intellectual property regards secure access and dissemination of in particular. Similarly, given the information in general and the protection importance and value of data for the of intellectual property in particular. activities of the entities, when relying on Similarly, given the importance and value data transformation and data analytics of data for the activities of the entities, services from third parties, the entities when relying on data transformation and should take all appropriate cybersecurity data analytics services from third parties, measures. the entities should take all appropriate cybersecurity measures.

Or. en

Amendment 156 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 46

AM\1232969EN.docx 51/176 PE693.680v01-00 EN Text proposed by the Commission Amendment

(46) To further address key supply chain (46) To further address key supply chain risks and assist entities operating in sectors risks and assist entities operating in sectors covered by this Directive to appropriately covered by this Directive to appropriately manage supply chain and supplier related manage supply chain and supplier related cybersecurity risks, the Cooperation Group cybersecurity risks, the Cooperation Group involving relevant national authorities, in involving relevant national authorities, in cooperation with the Commission and cooperation with the Commission and ENISA, should carry out coordinated ENISA, and in consultation with the sectoral supply chain risk assessments, as European Data Protection Board was already done for 5G networks (EDPB), should carry out coordinated following Recommendation (EU) 2019/534 sectoral supply chain risk assessments, as on Cybersecurity of 5G networks21 , with was already done for 5G networks the aim of identifying per sector which are following Recommendation (EU) 2019/534 the critical ICT services, systems or on Cybersecurity of 5G networks21 , with products, relevant threats and the aim of identifying per sector which are vulnerabilities. the critical ICT services, systems or products, relevant threats and vulnerabilities. Particular emphasis should be placed on ICT services, systems or products subject to specific requirements, in particular in third country jurisdictions serving as the country of origin. ______21 Commission Recommendation (EU) 21 Commission Recommendation (EU) 2019/534 of 26 March 2019 Cybersecurity 2019/534 of 26 March 2019 Cybersecurity of 5G networks (OJ L 88, 29.3.2019, p. of 5G networks (OJ L 88, 29.3.2019, p. 42). 42).

Or. en

Justification

The EDPB can assist the Cooperation Group, the Commission and ENISA to factor in considerations regarding personal data in the risk assessments of supply chains. It is also important to emphasise ICT services, systems and products’ requirements when such services, systems, and products originate form a third country.

Amendment 157 Evžen Tošenovský

Proposal for a directive Recital 46

PE693.680v01-00 52/176 AM\1232969EN.docx EN Text proposed by the Commission Amendment

(46) To further address key supply chain (46) To further address key supply chain risks and assist entities operating in sectors risks and assist entities operating in sectors covered by this Directive to appropriately covered by this Directive to appropriately manage supply chain and supplier related manage supply chain and supplier related cybersecurity risks, the Cooperation Group cybersecurity risks, the Cooperation Group involving relevant national authorities, in involving relevant national authorities, in cooperation with the Commission and cooperation with the Commission and ENISA, should carry out coordinated ENISA, should carry out coordinated sectoral supply chain risk assessments, as supply chain risk assessments, as was was already done for 5G networks already done for 5G networks following following Recommendation (EU) 2019/534 Recommendation (EU) 2019/534 on on Cybersecurity of 5G networks21 , with Cybersecurity of 5G networks21 , with the the aim of identifying per sector which are aim of identifying per sector which are the the critical ICT services, systems or critical ICT services, systems or products, products, relevant threats and relevant threats and vulnerabilities. Where vulnerabilities. appropriate, the Cooperation Group should monitor the supply chain risk assessment activities of other democratic countries. ______21 Commission Recommendation (EU) 21 Commission Recommendation (EU) 2019/534 of 26 March 2019 Cybersecurity 2019/534 of 26 March 2019 Cybersecurity of 5G networks (OJ L 88, 29.3.2019, p. of 5G networks (OJ L 88, 29.3.2019, p. 42). 42).

Or. en

Amendment 158 Christophe Grudler, Klemen Grošelj, Sandro Gozi, Stéphanie Yon-Courtin, Valérie Hayer, Nathalie Loiseau

Proposal for a directive Recital 47

Text proposed by the Commission Amendment

(47) The supply chain risk assessments, (47) The supply chain risk assessments, in light of the features of the sector in light of the features of the sector concerned, should take into account both concerned, should take into account both technical and, where relevant, non- technical and, where relevant, non- technical factors including those defined in technical factors including those defined in Recommendation (EU) 2019/534, in the Recommendation (EU) 2019/534, in the EU wide coordinated risk assessment of EU wide coordinated risk assessment of 5G networks security and in the EU 5G networks security and in the EU

AM\1232969EN.docx 53/176 PE693.680v01-00 EN Toolbox on 5G cybersecurity agreed by the Toolbox on 5G cybersecurity agreed by the Cooperation Group. To identify the supply Cooperation Group. chains that should be subject to a coordinated risk assessment, the following criteria should be taken into account: (i) the extent to which essential and important entities use and rely on specific critical ICT services, systems or products; (ii) the relevance of specific critical ICT services, systems or products for performing critical or sensitive functions, including the processing of personal data; (iii) the availability of alternative ICT services, systems or products; (iv) the resilience of the overall supply chain of ICT services, systems or products against disruptive events and (v) for emerging ICT services, systems or products, their potential future significance for the entities’ activities.

Or. en

Justification

Moved to Article 19

Amendment 159 Evžen Tošenovský

Proposal for a directive Recital 47

Text proposed by the Commission Amendment

(47) The supply chain risk assessments, (47) The supply chain risk assessments, in light of the features of the sector in light of the features of the sector concerned, should take into account both concerned, should take into account both technical and, where relevant, non- technical and, where relevant, non- technical factors including those defined in technical factors including those defined in Recommendation (EU) 2019/534, in the Recommendation (EU) 2019/534, in the EU wide coordinated risk assessment of EU wide coordinated risk assessment of 5G networks security and in the EU 5G networks security and in the EU Toolbox on 5G cybersecurity agreed by the Toolbox on 5G cybersecurity agreed by the Cooperation Group. To identify the supply Cooperation Group. chains that should be subject to a coordinated risk assessment, the following

PE693.680v01-00 54/176 AM\1232969EN.docx EN criteria should be taken into account: (i) the extent to which essential and important entities use and rely on specific critical ICT services, systems or products; (ii) the relevance of specific critical ICT services, systems or products for performing critical or sensitive functions, including the processing of personal data; (iii) the availability of alternative ICT services, systems or products; (iv) the resilience of the overall supply chain of ICT services, systems or products against disruptive events and (v) for emerging ICT services, systems or products, their potential future significance for the entities’ activities.

Or. en

Amendment 160 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 47

Text proposed by the Commission Amendment

(47) The supply chain risk assessments, (47) The supply chain risk assessments, in light of the features of the sector in light of the features of the sector concerned, should take into account both concerned, should take into account both technical and, where relevant, non- technical and, where relevant, non- technical factors including those defined in technical factors including those defined in Recommendation (EU) 2019/534, in the Recommendation (EU) 2019/534, in the EU wide coordinated risk assessment of EU wide coordinated risk assessment of 5G networks security and in the EU 5G networks security and in the EU Toolbox on 5G cybersecurity agreed by the Toolbox on 5G cybersecurity agreed by the Cooperation Group. To identify the supply Cooperation Group. To identify the supply chains that should be subject to a chains that should be subject to a coordinated risk assessment, the following coordinated risk assessment, the following criteria should be taken into account: (i) the criteria should be taken into account: (i) the extent to which essential and important extent to which essential and important entities use and rely on specific critical ICT entities use and rely on specific critical ICT services, systems or products; (ii) the services, systems or products; (ii) the relevance of specific critical ICT services, relevance of specific critical ICT services, systems or products for performing critical systems or products for performing critical

AM\1232969EN.docx 55/176 PE693.680v01-00 EN or sensitive functions, including the or sensitive functions, including the processing of personal data; (iii) the processing of personal data; (iii) the availability of alternative ICT services, availability of alternative ICT services, systems or products; (iv) the resilience of systems or products; (iv) the resilience of the overall supply chain of ICT services, the overall supply chain of ICT services, systems or products against disruptive systems or products against disruptive events and (v) for emerging ICT services, events across the entire lifecycle of the systems or products, their potential future service, system or product and (v) for significance for the entities’ activities. emerging ICT services, systems or products, their potential future significance for the entities’ activities. Such risk assessments should identify best practices for managing risks associated with risks in the ICT supply chain and explore ways to further incentivise their wider adoption by entities within each sector under examination.

Or. en

Amendment 161 Bart Groothuis, Iskra Mihaylova, Christophe Grudler, Martina Dlabajová

Proposal for a directive Recital 48

Text proposed by the Commission Amendment

(48) In order to streamline the legal (48) In order to streamline the legal obligations imposed on providers of public obligations imposed on providers of public electronic communications networks or electronic communications networks or publicly available electronic publicly available electronic communications services, and trust service communications services, and trust service providers related to the security of their providers related to the security of their network and information systems, as well network and information systems, as well as to enable those entities and their as to enable those entities and their respective competent authorities to benefit respective competent authorities to benefit from the legal framework established by from the legal framework established by this Directive (including designation of this Directive (including designation of CSIRT responsible for risk and incident CSIRT responsible for risk and incident handling, participation of competent handling, participation of competent authorities and bodies in the work of the authorities and bodies in the work of the Cooperation Group and the CSIRT Cooperation Group and the CSIRT network), they should be included in the network), they should be included in the scope of application of this Directive. The scope of application of this Directive. The corresponding provisions laid down in rules on reporting obligations should be Regulation (EU) No 910/2014 of the without prejudice to Regulation (EU)

PE693.680v01-00 56/176 AM\1232969EN.docx EN European Parliament and of the 2016/679 and Directive 2002/58/EC of the Council22 and Directive (EU) 2018/1972 European Parliament and of the Council24 . of the European Parliament and of the Council23 related to the imposition of security and notification requirement on these types of entities should therefore be repealed. The rules on reporting obligations should be without prejudice to Regulation (EU) 2016/679 and Directive 2002/58/EC of the European Parliament and of the Council24 . ______22 Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC (OJ L 257, 28.8.2014, p. 73). 23 Directive (EU) 2018/1972 of the European Parliament and of the Council of 11 December 2018 establishing the European Electronic Communications Code (OJ L 321, 17.12.2018, p. 36). 24 Directive 2002/58/EC of the European 24 Directive 2002/58/EC of the European Parliament and of the Council of 12 July Parliament and of the Council of 12 July 2002 concerning the processing of personal 2002 concerning the processing of personal data and the protection of privacy in the data and the protection of privacy in the electronic communications sector electronic communications sector (Directive on privacy and electronic (Directive on privacy and electronic communications) (OJ L 201, 31.7.2002, p. communications) (OJ L 201, 31.7.2002, p. 37). 37).

Or. en

Justification

In order to avoid legal uncertainty, corresponding provision in Regulation No 910/2014 (eIDAS) should be repealed/amended in the revision of the Regulation itself.

Amendment 162 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 48

AM\1232969EN.docx 57/176 PE693.680v01-00 EN Text proposed by the Commission Amendment

(48) In order to streamline the legal (48) In order to streamline the legal obligations imposed on providers of public obligations imposed on providers of public electronic communications networks or electronic communications networks or publicly available electronic publicly available electronic communications services, and trust service communications services, and trust service providers related to the security of their providers related to the security of their network and information systems, as well network and information systems, as well as to enable those entities and their as to enable those entities and their respective competent authorities to benefit respective competent authorities to benefit from the legal framework established by from the legal framework established by this Directive (including designation of this Directive (including designation of CSIRT responsible for risk and incident CSIRT responsible for risk and incident handling, participation of competent handling, participation of competent authorities and bodies in the work of the authorities and bodies in the work of the Cooperation Group and the CSIRT Cooperation Group and the CSIRT network), they should be included in the network), they should be included in the scope of application of this Directive. The scope of application of this Directive. The corresponding provisions laid down in corresponding provisions laid down in Regulation (EU) No 910/2014 of the Regulation (EU) No 910/2014 of the European Parliament and of the Council22 European Parliament and of the Council22 and Directive (EU) 2018/1972 of the and Directive (EU) 2018/1972 of the European Parliament and of the Council23 European Parliament and of the Council23 related to the imposition of security and related to the imposition of security and notification requirement on these types of notification requirement on these types of entities should therefore be repealed. The entities should be complemented. The rules rules on reporting obligations should be on reporting obligations should be without without prejudice to Regulation (EU) prejudice to Regulation (EU) 2016/679 and 2016/679 and Directive 2002/58/EC of the Directive 2002/58/EC of the European European Parliament and of the Council24 . Parliament and of the Council24 . ______22 Regulation (EU) No 910/2014 of the 22 Regulation (EU) No 910/2014 of the European Parliament and of the Council of European Parliament and of the Council of 23 July 2014 on electronic identification 23 July 2014 on electronic identification and trust services for electronic and trust services for electronic transactions in the internal market and transactions in the internal market and repealing Directive 1999/93/EC (OJ L 257, repealing Directive 1999/93/EC (OJ L 257, 28.8.2014, p. 73). 28.8.2014, p. 73). 23 Directive (EU) 2018/1972 of the 23 Directive (EU) 2018/1972 of the European Parliament and of the Council of European Parliament and of the Council of 11 December 2018 establishing the 11 December 2018 establishing the European Electronic Communications European Electronic Communications Code (OJ L 321, 17.12.2018, p. 36). Code (OJ L 321, 17.12.2018, p. 36). 24 Directive 2002/58/EC of the European 24 Directive 2002/58/EC of the European Parliament and of the Council of 12 July Parliament and of the Council of 12 July

PE693.680v01-00 58/176 AM\1232969EN.docx EN 2002 concerning the processing of personal 2002 concerning the processing of personal data and the protection of privacy in the data and the protection of privacy in the electronic communications sector electronic communications sector (Directive on privacy and electronic (Directive on privacy and electronic communications) (OJ L 201, 31.7.2002, p. communications) (OJ L 201, 31.7.2002, p. 37). 37).

Or. en

Amendment 163 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Recital 48 a (new)

Text proposed by the Commission Amendment

(48a) The national regulatory authorities or other competent authorities responsible for public electronic communications networks or of publicly available electronic communications services pursuant to Directive (EU) 2018/1972 should be informed of significant incidents, cyber threats and near misses notified by providers of public electronic communications networks or publicly available electronic communications services and the measures taken in response to those risks and incidents.

Or. en

Amendment 164 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 50

Text proposed by the Commission Amendment

(50) Given the growing importance of (50) Given the growing importance of

AM\1232969EN.docx 59/176 PE693.680v01-00 EN number-independent interpersonal number-independent interpersonal communications services, it is necessary to communications services, it is necessary to ensure that such services are also subject to ensure that such services are also subject to appropriate security requirements in view appropriate security requirements in view of their specific nature and economic of their specific nature and economic importance. Providers of such services importance. Providers of such services should thus also ensure a level of security should thus also ensure a level of security of network and information systems of network and information systems appropriate to the risk posed. Given that appropriate to the risk posed. Given that providers of number-independent providers of number-independent interpersonal communications services interpersonal communications services normally do not exercise actual control normally do not exercise actual control over the transmission of signals over over the transmission of signals over networks, the degree of risk for such networks, the degree of risk to network services can be considered in some security for such services can be respects to be lower than for traditional considered in some respects to be lower electronic communications services. The than for traditional electronic same applies to interpersonal communications services. The same communications services which make use applies to interpersonal communications of numbers and which do not exercise services which make use of numbers and actual control over signal transmission. which do not exercise actual control over signal transmission. However, as the attack surface continues to expand, number-independent interpersonal communications services including, but not limited to, social media messengers, are becoming popular attack vectors. Malicious actors use platforms to communicate and attract victims to open compromised web pages, therefore increasing the likelihood of incidents involving the exploitation of personal data, and by extension, the security of information systems.

Or. en

Justification

ENISA’s Emerging Trends chapter of the Threat Landscape finds that malicious actors are now using other platforms to communicate and attract victims to open compromised web pages. Hence, despite the lower risk to network security from number-independent interpersonal communication services, the risk remains high for attacks to users.

Amendment 165 Tsvetelina Penkova

PE693.680v01-00 60/176 AM\1232969EN.docx EN Proposal for a directive Recital 50

Text proposed by the Commission Amendment

(50) Given the growing importance of (50) Given the growing importance of number-independent interpersonal number-independent interpersonal communications services, it is necessary to communications services, it is necessary to ensure that such services are also subject to ensure that such services are also subject to appropriate security requirements in view appropriate security requirements or used of their specific nature and economic as means for meeting the requirements importance. Providers of such services for risk management set under Article should thus also ensure a level of security 18, in view of their specific nature, of network and information systems technological pervasiveness and economic appropriate to the risk posed. Given that importance. Providers of such services providers of number-independent should thus also ensure a level of security interpersonal communications services of network and information systems normally do not exercise actual control appropriate to the risk posed. Given that over the transmission of signals over providers of number-independent networks, the degree of risk for such interpersonal communications services services can be considered in some normally do not exercise actual control respects to be lower than for traditional over the transmission of signals over electronic communications services. The networks, the degree of risk for such same applies to interpersonal services can be considered in some communications services which make use respects to be lower than for traditional of numbers and which do not exercise electronic communications services. The actual control over signal transmission. same applies to interpersonal communications services which make use of numbers and which do not exercise actual control over signal transmission.

Or. en

Amendment 166 Evžen Tošenovský

Proposal for a directive Recital 50

Text proposed by the Commission Amendment

(50) Given the growing importance of (50) Given the growing importance of number-independent interpersonal number-independent interpersonal communications services, it is necessary to communications services, it is necessary to ensure that such services are also subject to ensure that such services are also subject to appropriate security requirements in view appropriate security requirements in view of their specific nature and economic of their specific nature and economic

AM\1232969EN.docx 61/176 PE693.680v01-00 EN importance. Providers of such services importance. Providers of such services should thus also ensure a level of security should thus also ensure a level of security of network and information systems of network and information systems appropriate to the risk posed. Given that appropriate to the risk posed. Given that providers of number-independent providers of number-independent interpersonal communications services interpersonal communications services normally do not exercise actual control normally do not exercise actual control over the transmission of signals over over the transmission of signals over networks, the degree of risk for such networks, the degree of risk for such services can be considered in some services can be considered in some respects to be lower than for traditional respects to be lower than for traditional electronic communications services. The electronic communications services. The same applies to interpersonal same applies to number-based communications services which make use interpersonal communications services of numbers and which do not exercise which do not exercise actual control over actual control over signal transmission. signal transmission.

Or. en

Amendment 167 Evžen Tošenovský

Proposal for a directive Recital 51

Text proposed by the Commission Amendment

(51) The internal market is more reliant (51) The internal market is more reliant on the functioning of the internet than ever on the functioning of the internet than ever before. The services of virtually all before. The services of virtually all essential and important entities are essential and important entities are dependent on services provided over the dependent on services provided over the internet. In order to ensure the smooth internet. The competent authorities should provision of services provided by essential thus ensure that the integrity and and important entities, it is important that availability of public electronic public electronic communications communications networks are networks, such as, for example, internet maintained. In order to ensure the smooth backbones or submarine communications provision of services provided by essential cables, have appropriate cybersecurity and important entities, it is important that measures in place and report incidents in all public electronic communications relation thereto. networks, such as, for example, internet backbones or submarine communications cables, have appropriate cybersecurity measures in place and report significant incidents in relation thereto.

PE693.680v01-00 62/176 AM\1232969EN.docx EN Or. en

Amendment 168 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 51

Text proposed by the Commission Amendment

(51) The internal market is more reliant (51) The internal market is more reliant on the functioning of the internet than ever on the functioning of the internet than ever before. The services of virtually all before. The services of virtually all essential and important entities are essential and important entities are dependent on services provided over the dependent on services provided over the internet. In order to ensure the smooth internet. In order to ensure the smooth provision of services provided by essential provision of services provided by essential and important entities, it is important that and important entities, it is important that public electronic communications public electronic communications networks, such as, for example, internet networks, such as, for example, internet backbones or submarine communications backbones or submarine communications cables, have appropriate cybersecurity cables, have appropriate cybersecurity measures in place and report incidents in measures in place and report security relation thereto. incidents as in Article 2 (41) of the European Electronic Communications Code (EECC).

Or. en

Amendment 169 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Recital 53

Text proposed by the Commission Amendment

(53) In particular, providers of public (53) Encryption is critical and electronic communications networks or irreplaceable for safeguarding the publicly available electronic security of electronic communications communications services, should inform networks and services data protection and the service recipients of particular and privacy. Strong and state of the art significant cyber threats and of measures encryption must be available to be used they can take to protect the security of their for mitigation of risks to network and

AM\1232969EN.docx 63/176 PE693.680v01-00 EN communications, for instance by using information security and for the rights specific types of software or encryption and freedoms of individuals. Providers of technologies. public electronic communications networks or publicly available electronic communications services, should implement security by design and by default, and inform the service recipients of particular and significant cyber threats and of additional measures they can take to protect the security of their devices and communications, for instance by using specific types of software or encryption technologies. The approach to security through obscurity has its limitations, while the open cooperative models can provide relief and increase the security of hardware and software, therefore service providers and traders are encouraged to use open source and open hardware.

Or. en

Justification

Strong and state of the art encryption is critical and irreplaceable for effective data protection and privacy.

Amendment 170 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 53

Text proposed by the Commission Amendment

(53) In particular, providers of public (53) In particular, providers of public electronic communications networks or electronic communications networks or publicly available electronic publicly available electronic communications services, should inform communications services, should inform the service recipients of particular and the service recipients of particular and significant cyber threats and of measures significant cyber threats and of measures they can take to protect the security of their they can take to protect the security of their communications, for instance by using communications, for instance by using specific types of software or encryption specific types of software or data-centric technologies. security techniques.

Or. en

PE693.680v01-00 64/176 AM\1232969EN.docx EN Amendment 171 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Recital 54

Text proposed by the Commission Amendment

(54) In order to safeguard the security of (54) In order to safeguard the security of electronic communications networks and electronic communications networks and services, the use of encryption, and in services, the use of encryption, and in particular end-to-end encryption, should be particular end-to-end encryption, should be promoted and, where necessary, should be promoted and mandatory for providers of mandatory for providers of such services such services and networks in accordance and networks in accordance with the with the principles of security and privacy principles of security and privacy by by default and by design for the purposes default and by design for the purposes of of Article 18. The use of end-to-end Article 18. The use of end-to-end encryption is without prejudice to the encryption should be reconciled with the Member State’ powers to ensure the Member State’ powers to ensure the protection of their essential security protection of their essential security interests and public security, and to permit interests and public security, and to permit the investigation, detection and prosecution the investigation, detection and prosecution of criminal offences in compliance with of criminal offences in compliance with Union law. Such enforcement powers Union law. Solutions for lawful access to must always fully respect due process and information in end-to-end encrypted other safeguards, as well as fundamental communications should maintain the rights, in particular the right to respect effectiveness of encryption in protecting for private life and communications and privacy and security of communications, the right to the protection of personal while providing an effective response to data. Solutions for lawful access to crime. information from end-to-end encrypted communications should maintain the effectiveness of encryption in protecting privacy and security of communications, while providing an effective response to crime. Any actions taken have to carefully adhere to the principles of necessity, proportionality and subsidiarity and shall not lead to creating backdoors or weakening encryption, ensuring that the privacy and security of encrypted data, including in end-to-end encrypted communications is not compromised.

Or. en

AM\1232969EN.docx 65/176 PE693.680v01-00 EN Justification

Paraphrasing the Council communication on Encryption

Amendment 172 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 54

Text proposed by the Commission Amendment

(54) In order to safeguard the security of (54) In order to safeguard the security of electronic communications networks and electronic communications networks and services, the use of encryption, and in services, the use of data-centric security particular end-to-end encryption, should techniques, such as encryption, be promoted and, where necessary, should tokenisation, segmentation, throttle be mandatory for providers of such access, marking, tagging, strong identity services and networks in accordance with and access management, and automated the principles of security and privacy by access decisions, should be promoted for default and by design for the purposes of providers of such services and networks in Article 18. The use of end-to-end accordance with the principles of security encryption should be reconciled with the and privacy by default and by design for Member State’ powers to ensure the the purposes of Article 18. The use of end- protection of their essential security to-end encryption should be reconciled interests and public security, and to permit with the Member State’ powers to ensure the investigation, detection and prosecution the protection of their essential security of criminal offences in compliance with interests and public security, and to permit Union law. Solutions for lawful access to the investigation, detection and prosecution information in end-to-end encrypted of criminal offences in compliance with communications should maintain the Union law. Solutions for lawful access to effectiveness of encryption in protecting information in end-to-end encrypted privacy and security of communications, communications should maintain the while providing an effective response to effectiveness of encryption in protecting crime. privacy and security of communications, while providing an effective response to crime.

Or. en

Amendment 173 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

PE693.680v01-00 66/176 AM\1232969EN.docx EN Proposal for a directive Recital 54

Text proposed by the Commission Amendment

(54) In order to safeguard the security of (54) In order to safeguard the security of electronic communications networks and electronic communications networks and services, the use of encryption, and in services, the use of encryption, and in particular end-to-end encryption, should be particular end-to-end encryption, should be promoted and, where necessary, should be promoted and, where necessary, should be mandatory for providers of such services mandatory for providers of such services and networks in accordance with the and networks in accordance with the principles of security and privacy by principles of security and privacy by default and by design for the purposes of default and by design for the purposes of Article 18. The use of end-to-end Article 18. The use of end-to-end encryption should be reconciled with the encryption should be reconciled with the Member State’ powers to ensure the Member State’ powers to ensure the protection of their essential security protection of their essential security interests and public security, and to permit interests and public security, and to permit the investigation, detection and prosecution the investigation, detection and prosecution of criminal offences in compliance with of criminal offences in compliance with Union law. Solutions for lawful access to Union law. The effectiveness of encryption information in end-to-end encrypted in protecting the privacy and security of communications should maintain the communications must not be undermined effectiveness of encryption in protecting in any circumstance, as any loophole in privacy and security of communications, encryption is open to be explored or while providing an effective response to exploited by actors, regardless of their crime. legitimacy or intent.

Or. en

Amendment 174 Evžen Tošenovský

Proposal for a directive Recital 54

Text proposed by the Commission Amendment

(54) In order to safeguard the security of (54) In order to safeguard the security of electronic communications networks and electronic communications networks and services, the use of encryption, and in services, the use of encryption, and in particular end-to-end encryption, should be particular end-to-end encryption, could be promoted and, where necessary, should be promoted and, where necessary, should be mandatory for providers of such services implemented by providers of such services and networks in accordance with the and networks in accordance with the principles of security and privacy by principles of security and privacy by

AM\1232969EN.docx 67/176 PE693.680v01-00 EN default and by design for the purposes of default and by design for the purposes of Article 18. The use of end-to-end Article 18. The use of end-to-end encryption should be reconciled with the encryption should be reconciled with the Member State’ powers to ensure the Member State’ powers to ensure the protection of their essential security protection of their essential security interests and public security, and to permit interests and public security, and to permit the investigation, detection and prosecution the investigation, detection and prosecution of criminal offences in compliance with of criminal offences in compliance with Union law. Solutions for lawful access to Union law. Solutions for lawful access to information in end-to-end encrypted information in end-to-end encrypted communications should maintain the communications should maintain the effectiveness of encryption in protecting effectiveness of encryption in protecting privacy and security of communications, privacy and security of communications, while providing an effective response to while providing an effective response to crime. crime.

Or. en

Amendment 175 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 54 a (new)

Text proposed by the Commission Amendment

(54a) Any measures aimed at weakening encryption or circumventing the technology’s architecture may incur significant risks to the effective protection capabilities it entails, thus inevitably compromising the protection of personal data and privacy, resulting in an overall loss of trust in security controls. Any unauthorised decryption, reverse engineering of encryption code, or monitoring of electronic communications outside clear legal authorities should be prohibited to ensure the effectiveness of the technology and its wider use. The cases where encryption can be used to mitigate risks related to non-compliant data transfers as presented in EDPB Recommendations 01/2020 may enable stronger encryption, whether in transit or

PE693.680v01-00 68/176 AM\1232969EN.docx EN at rest, for providers of such services and networks for the purposes of Article 18.

Or. en

Amendment 176 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Recital 54 a (new)

Text proposed by the Commission Amendment

(54a) An incident should be typically considered significant by the competent authorities or the CSIRT if the incident has caused substantial operational disruption or financial losses for the entity concerned and the incident has affected other natural or legal persons by causing considerable material or non- material losses.

Or. en

Amendment 177 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 55

Text proposed by the Commission Amendment

(55) This Directive lays down a two- (55) This Directive lays down a three- stage approach to incident reporting in stage approach to incident reporting in order to strike the right balance between, order to strike the right balance between, on the one hand, swift reporting that helps on the one hand, swift reporting that helps mitigate the potential spread of incidents mitigate the potential spread of incidents and allows entities to seek support, and, on and allows entities to seek support, and, on the other hand, in-depth reporting that the other hand, in-depth reporting that draws valuable lessons from individual draws valuable lessons from individual incidents and improves over time the incidents and improves over time the resilience to cyber threats of individual resilience to cyber threats of individual

AM\1232969EN.docx 69/176 PE693.680v01-00 EN companies and entire sectors. Where companies and entire sectors. In this entities become aware of an incident, they regard, the Directive should also include should be required to submit an initial reporting of incidents that, based on an notification within 24 hours, followed by a initial assessment performed by the entity, final report not later than one month after. may be assumed to lead to substantial The initial notification should only include operational disruption or financial losses the information strictly necessary to make or affect other natural or legal persons by the competent authorities aware of the causing considerable material or non- incident and allow the entity to seek material losses. The initial assessment assistance, if required. Such notification, should take into account amongst others, where applicable, should indicate whether the affected network and information the incident is presumably caused by systems and, in particular, their unlawful or malicious action. Member importance in the provision of the entity’s States should ensure that the requirement services, the severity and technical to submit this initial notification does not characteristics of the cyber threat, and divert the reporting entity’s resources from any underlying vulnerabilities that are activities related to incident handling that being exploited, as well as the entity’s should be prioritised. To further prevent experience with similar incidents. Where that incident reporting obligations either entities become aware of an incident, they divert resources from incident response should provide an early warning within handling or may otherwise compromise the 24 hours, without any obligation to entities efforts in that respect, Member disclose additional information. Entities States should also provide that, in duly should be required to submit an initial justified cases and in agreement with the notification within 72 hours, followed by a competent authorities or the CSIRT, the comprehensive report not later than one entity concerned can deviate from the month after the incident has been handled. deadlines of 24 hours for the initial The initial incident notification timeline notification and one month for the final of 72 hours should not preclude entities report. from reporting incidents earlier, therefore allowing entities to seek support from competent authorities or CSIRTs swiftly, and enabling competent authorities or CSIRTs to mitigate the potential spread of the reported incident. Where an incident requires a longer period to be handled, an entity should be required to submit regular reports on the mitigation measures in place to contain, respond to, attribute and recover from the incident, and a comprehensive report not later than one month after the incident has been handled. The initial notification should allow the entity to seek assistance, if required. Such notification, where applicable, should indicate whether the incident is presumably caused by unlawful or malicious action. Member States should ensure that the requirement to submit this initial notification does not divert the

PE693.680v01-00 70/176 AM\1232969EN.docx EN reporting entity’s resources from activities related to incident handling that should be prioritised. To further prevent that incident reporting obligations either divert resources from incident response handling or may otherwise compromise the entities efforts in that respect, Member States should also provide that, in duly justified cases and in agreement with the competent authorities or the CSIRT, the entity concerned can deviate from the deadlines of 72 hours for the initial notification and one month for the comprehensive report.

Or. en

Justification

Aligning the notification timeline with the timeline provided in Regulation (EU) 2016/679 can harmonise the notification process and avoid double reporting in cases where the incident involves personal data. An early warning mechanism will allow entities to swiftly make competent authorities or CSIRTs aware of an incident, without that warning requiring entities to disclose additional information, hence enabling entities to invest resources in dealing with the incident and gain a better understanding of the incident in order to provide more detailed information to the competent authority of CSIRT in their initial notification.

Amendment 178 Eva Maydell, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 55

Text proposed by the Commission Amendment

(55) This Directive lays down a two- (55) This Directive lays down a two- stage approach to incident reporting in stage approach to incident reporting in order to strike the right balance between, order to strike the right balance between, on the one hand, swift reporting that helps on the one hand, swift reporting that helps mitigate the potential spread of incidents mitigate the potential spread of incidents and allows entities to seek support, and, on and allows entities to seek support, and, on the other hand, in-depth reporting that the other hand, in-depth reporting that draws valuable lessons from individual draws valuable lessons from individual incidents and improves over time the incidents and improves over time the resilience to cyber threats of individual resilience to cyber threats of individual companies and entire sectors. Where companies and entire sectors. In this entities become aware of an incident, they regard, the Directive should also include should be required to submit an initial reporting of incidents that, based on an

AM\1232969EN.docx 71/176 PE693.680v01-00 EN notification within 24 hours, followed by a initial assessment performed by the entity, final report not later than one month after. may be assumed to lead to substantial The initial notification should only include operational disruption or financial losses the information strictly necessary to make or affect other natural or legal persons by the competent authorities aware of the causing considerable material or non- incident and allow the entity to seek material losses. The initial assessment assistance, if required. Such notification, should take into account amongst other, where applicable, should indicate whether the affected network and information the incident is presumably caused by systems and in particular their importance unlawful or malicious action. Member in the provision of the entity’s services, States should ensure that the requirement the severity and technical characteristics to submit this initial notification does not of the cyber threat, and any underlying divert the reporting entity’s resources vulnerabilities that are being exploited as from activities related to incident well as the entity’s experience with similar handling that should be prioritised. To incidents. Where entities become aware of further prevent that incident reporting an incident, they should be required to obligations either divert resources from submit an initial notification within 72 incident response handling or may hours, followed by a report not later than otherwise compromise the entities efforts three months after. The initial notification in that respect, Member States should also should only include the information strictly provide that, in duly justified cases and in necessary to make the competent agreement with the competent authorities authorities aware of the incident and allow or the CSIRT, the entity concerned can the entity to seek assistance, if required. deviate from the deadlines of 24 hours for Such notification, where applicable, should the initial notification and one month for indicate whether the incident is presumably the final report. caused by unlawful or malicious action. To further prevent that incident reporting obligations either divert resources from incident response handling or may otherwise compromise the entities efforts in that respect, Member States should also provide that, in duly justified cases and in agreement with the competent authorities or the CSIRT, the entity concerned can deviate from the deadlines of 72 hours for the initial notification and three months for the report.

Or. en

Amendment 179 Evžen Tošenovský

Proposal for a directive Recital 55

PE693.680v01-00 72/176 AM\1232969EN.docx EN Text proposed by the Commission Amendment

(55) This Directive lays down a two- (55) This Directive lays down a two- stage approach to incident reporting in stage approach to incident reporting in order to strike the right balance between, order to strike the right balance between, on the one hand, swift reporting that helps on the one hand, swift reporting that helps mitigate the potential spread of incidents mitigate the potential spread of incidents and allows entities to seek support, and, on and allows entities to seek support, and, on the other hand, in-depth reporting that the other hand, in-depth reporting that draws valuable lessons from individual draws valuable lessons from individual incidents and improves over time the incidents and improves over time the resilience to cyber threats of individual resilience to cyber threats of individual companies and entire sectors. Where companies and entire sectors. Where entities become aware of an incident, they entities become aware of an significant should be required to submit an initial incident, they should be required to submit notification within 24 hours, followed by a an initial notification without undue delay, final report not later than one month after. followed by a final report not later than one The initial notification should only include month after. The initial notification should the information strictly necessary to make only include the information strictly the competent authorities aware of the necessary to make the competent incident and allow the entity to seek authorities aware of the incident and allow assistance, if required. Such notification, the entity to seek assistance, if required. where applicable, should indicate whether Such notification, where applicable, should the incident is presumably caused by indicate whether the incident is presumably unlawful or malicious action. Member caused by unlawful or malicious action. States should ensure that the requirement Member States should ensure that the to submit this initial notification does not requirement to submit this initial divert the reporting entity’s resources from notification does not divert the reporting activities related to incident handling that entity’s resources from activities related to should be prioritised. To further prevent incident handling that should be prioritised. that incident reporting obligations either To further prevent that incident reporting divert resources from incident response obligations either divert resources from handling or may otherwise compromise the incident response handling or may entities efforts in that respect, Member otherwise compromise the entities efforts States should also provide that, in duly in that respect, Member States should also justified cases and in agreement with the provide that, in duly justified cases and in competent authorities or the CSIRT, the agreement with the competent authorities entity concerned can deviate from the or the CSIRT, the entity concerned can deadlines of 24 hours for the initial deviate from the reporting deadlines. notification and one month for the final report.

Or. en

Amendment 180 Rasmus Andresen on behalf of the Greens/EFA Group

AM\1232969EN.docx 73/176 PE693.680v01-00 EN Proposal for a directive Recital 59

Text proposed by the Commission Amendment

(59) Maintaining accurate and complete (59) Maintaining accurate and complete databases of domain names and registration databases of domain names and registration data (so called ‘WHOIS data’) and data (so called ‘WHOIS data’) and providing lawful access to such data is providing lawful access to competent essential to ensure the security, stability authorities for network and information and resilience of the DNS, which in turn security to such data may contribute to contributes to a high common level of increased cybersecurity. Where processing cybersecurity within the Union. Where includes personal data such processing processing includes personal data such shall comply with Union data protection processing shall comply with Union data law. This Directive is to be applied in full protection law. compliance with Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and with Directive 2002/58/EC on concerning the processing of personal data and the protection of privacy in the electronic communications sector, and is not modifying or adding to their provisions.

Or. en

Justification

Clarifying the scope and extent.

Amendment 181 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 59

Text proposed by the Commission Amendment

(59) Maintaining accurate and complete (59) Maintaining accurate, verified and databases of domain names and registration complete databases of domain names and data (so called ‘WHOIS data’) and registration data (so called “WHOIS data”) providing lawful access to such data is and providing lawful access to such data is essential to ensure the security, stability essential to ensure the security, stability and resilience of the DNS, which in turn and resilience of the DNS, so that third-

PE693.680v01-00 74/176 AM\1232969EN.docx EN contributes to a high common level of party rights could be protected and which cybersecurity within the Union. Where in turn contributes to a high common level processing includes personal data such of cybersecurity within the Union. Where processing shall comply with Union data processing includes personal data such protection law. processing shall comply with Union data protection law.

Or. en

Amendment 182 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Recital 60

Text proposed by the Commission Amendment

(60) The availability and timely (60) The availability and timely accessibility of these data to public accessibility of data to public authorities, authorities, including competent CERTs and CSIRTs can sometimes be authorities under Union or national law useful to prevent and combat Domain for the prevention, investigation or Name System abuse, in particular to prosecution of criminal offences, CERTs, respond to cybersecurity incidents. Such (CSIRTs, and as regards the data of their access should comply with Union data clients to providers of electronic protection law insofar as it is related to communications networks and services personal data. and providers of cybersecurity technologies and services acting on behalf of those clients, is essential to prevent and combat Domain Name System abuse, in particular to prevent, detect and respond to cybersecurity incidents. Such access should comply with Union data protection law insofar as it is related to personal data.

Or. en

Justification

Change required for the scope alignment

Amendment 183 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez

AM\1232969EN.docx 75/176 PE693.680v01-00 EN Muñoz

Proposal for a directive Recital 60

Text proposed by the Commission Amendment

(60) The availability and timely (60) The availability and timely accessibility of these data to public accessibility of the domain name authorities, including competent registration data to legitimate access authorities under Union or national law for seekers is essential to protect the online the prevention, investigation or prosecution ecosystem, prevent DNS abuse, detect and of criminal offences, CERTs, (CSIRTs, prevent crime and fraud, protect minors, and as regards the data of their clients to protect intellectual property, and protect providers of electronic communications against hate speech. For the purposes of networks and services and providers of this Directive, legitimate access seekers cybersecurity technologies and services are natural or legal persons making a acting on behalf of those clients, is justified request on the basis of a essential to prevent and combat Domain legitimate interest under Union or Name System abuse, in particular to national law to access DNS data, and they prevent, detect and respond to may include competent authorities under cybersecurity incidents. Such access Union or national law for the prevention, should comply with Union data protection investigation or prosecution of criminal law insofar as it is related to personal data. offences, CERTs, CSIRTs, and as regards the data of their clients, providers of electronic communications networks and services and providers of cybersecurity technologies. Such access should comply with Union data protection law insofar as it is related to personal data.

Or. en

Amendment 184 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Recital 61

Text proposed by the Commission Amendment

(61) In order to ensure the availability of (61) In order to ensure the availability of accurate and complete domain name accurate and complete domain name registration data, TLD registries and the registration data, TLD registries and the entities providing domain name entities providing domain name registration services for the TLD (so-called registration services for the TLD (so-called

PE693.680v01-00 76/176 AM\1232969EN.docx EN registrars) should collect and guarantee the registrars) collect and guarantee the integrity and availability of domain names integrity and availability of domain names registration data. In particular, TLD registration data. In particular, TLD registries and the entities providing domain registries and the entities providing domain name registration services for the TLD name registration services for the TLD should establish policies and procedures to establish policies and procedures to collect collect and maintain accurate and complete and maintain accurate and complete registration data, as well as to prevent and registration data, as well as to prevent and correct inaccurate registration data in correct inaccurate registration data in accordance with Union data protection accordance with Union data protection rules. rules.

Or. en

Justification

Changed the language to underline that NIS2 is not a sectorial regulation for TLDs

Amendment 185 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 61

Text proposed by the Commission Amendment

(61) In order to ensure the availability of (61) In order to ensure the availability of accurate and complete domain name accurate and complete domain name registration data, TLD registries and the registration data, TLD registries and the entities providing domain name entities providing domain name registration services for the TLD (so-called registration services for the TLD (so-called registrars) should collect and guarantee the registrars) should collect and guarantee the integrity and availability of domain names integrity and availability of domain names registration data. In particular, TLD registration data. In particular, TLD registries and the entities providing domain registries and entities providing domain name registration services for the TLD name registration services should establish should establish policies and procedures to policies and procedures to collect and collect and maintain accurate and complete maintain accurate and complete registration data, as well as to prevent and registration data, as well as to prevent and correct inaccurate registration data in correct inaccurate registration data in accordance with Union data protection accordance with Union data protection rules. rules.

Or. en

AM\1232969EN.docx 77/176 PE693.680v01-00 EN Amendment 186 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Recital 62

Text proposed by the Commission Amendment

(62) TLD registries and the entities deleted providing domain name registration services for them should make publically available domain name registration data that fall outside the scope of Union data protection rules, such as data that concern legal persons25 . TLD registries and the entities providing domain name registration services for the TLD should also enable lawful access to specific domain name registration data concerning natural persons to legitimate access seekers, in accordance with Union data protection law. Member States should ensure that TLD registries and the entities providing domain name registration services for them should respond without undue delay to requests from legitimate access seekers for the disclosure of domain name registration data. TLD registries and the entities providing domain name registration services for them should establish policies and procedures for the publication and disclosure of registration data, including service level agreements to deal with requests for access from legitimate access seekers. The access procedure may also include the use of an interface, portal or other technical tool to provide an efficient system for requesting and accessing registration data. With a view to promoting harmonised practices across the internal market, the Commission may adopt guidelines on such procedures without prejudice to the competences of the European Data Protection Board.

PE693.680v01-00 78/176 AM\1232969EN.docx EN ______25 REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL recital (14) whereby “this Regulation does not cover the processing of personal data which concerns legal persons and in particular undertakings established as legal persons, including the name and the form of the legal person and the contact details of the legal person”.

Or. en

Justification

This recital falls outside the scope of a cybersecurity act.

Amendment 187 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 62

Text proposed by the Commission Amendment

(62) TLD registries and the entities (62) TLD registries and entities providing domain name registration providing domain name registration services for them should make publically services should be required to make available domain name registration data publically available domain name that fall outside the scope of Union data registration data of legal persons25. TLD protection rules, such as data that registries and entities providing domain concern legal persons25 . TLD registries name registration services should also and the entities providing domain name enable lawful access to specific domain registration services for the TLD should name registration data concerning natural also enable lawful access to specific persons to legitimate access seekers, in domain name registration data concerning accordance with Union data protection law. natural persons to legitimate access Member States should ensure that TLD seekers, in accordance with Union data registries and entities providing domain protection law. Member States should name registration services should respond ensure that TLD registries and the entities within 72 hours to requests from providing domain name registration legitimate access seekers for the disclosure services for them should respond without of domain name registration data. TLD undue delay to requests from legitimate registries and entities providing domain access seekers for the disclosure of domain name registration services should establish

AM\1232969EN.docx 79/176 PE693.680v01-00 EN name registration data. TLD registries and policies and procedures for the publication the entities providing domain name and disclosure of registration data, registration services for them should including service level agreements to deal establish policies and procedures for the with requests for access from legitimate publication and disclosure of registration access seekers. The access procedure may data, including service level agreements to also include the use of an interface, portal deal with requests for access from or other technical tool to provide an legitimate access seekers. The access efficient system for requesting and procedure may also include the use of an accessing registration data. With a view to interface, portal or other technical tool to promoting harmonised practices across the provide an efficient system for requesting internal market, the Commission may and accessing registration data. With a adopt guidelines on such procedures view to promoting harmonised practices without prejudice to the competences of across the internal market, the Commission the European Data Protection Board. may adopt guidelines on such procedures without prejudice to the competences of the European Data Protection Board. ______25 REGULATION (EU) 2016/679 OF THE 25 REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF EUROPEAN PARLIAMENT AND OF THE COUNCIL recital (14) whereby “this THE COUNCIL recital (14) whereby “this Regulation does not cover the processing Regulation does not cover the processing of personal data which concerns legal of personal data which concerns legal persons and in particular undertakings persons and in particular undertakings established as legal persons, including the established as legal persons, including the name and the form of the legal person and name and the form of the legal person and the contact details of the legal person”. the contact details of the legal person”.

Or. en

Amendment 188 Bart Groothuis, Klemen Grošelj, Iskra Mihaylova, Nicola Danti, Christophe Grudler

Proposal for a directive Recital 63

Text proposed by the Commission Amendment

(63) All essential and important entities (63) All essential and important entities under this Directive should fall under the under this Directive should fall under the jurisdiction of the Member State where jurisdiction of the Member State where they provide their services. If the entity they provide their services or carry out provides services in more than one their activities. If the entity provides Member State, it should fall under the services in more than one Member State, it separate and concurrent jurisdiction of each should fall under the separate and of these Member States. The competent concurrent jurisdiction of each of these

PE693.680v01-00 80/176 AM\1232969EN.docx EN authorities of these Member States should Member States. The competent authorities cooperate, provide mutual assistance to of these Member States should cooperate, each other and where appropriate, carry out provide mutual assistance to each other and joint supervisory actions. where appropriate, carry out joint supervisory actions.

Or. en

Justification

This directive applies to both entities that provide services as to entities which manufacture or carry out activities related to any stage of production, processing and distribution of food, as indicated in the Annexes.

Amendment 189 Evžen Tošenovský

Proposal for a directive Recital 64

Text proposed by the Commission Amendment

(64) In order to take account of the (64) In order to take account of the cross-border nature of the services and cross-border nature of the services and operations of DNS service providers, TLD operations of DNS service providers, TLD name registries, content delivery network name registries, content delivery network providers, cloud computing service providers, cloud computing service providers, data centre service providers providers, data centre service providers, and digital providers, only one Member digital providers and providers of number- State should have jurisdiction over these independent interpersonal entities. Jurisdiction should be attributed to communications services, only one the Member State in which the respective Member State should have jurisdiction entity has its main establishment in the over these entities. Jurisdiction should be Union. The criterion of establishment for attributed to the Member State in which the the purposes of this Directive implies the respective entity has its main establishment effective exercise of activity through stable in the Union. The criterion of arrangements. The legal form of such establishment for the purposes of this arrangements, whether through a branch or Directive implies the effective exercise of a subsidiary with a legal personality, is not activity through stable arrangements. The the determining factor in that respect. legal form of such arrangements, whether Whether this criterion is fulfilled should through a branch or a subsidiary with a not depend on whether the network and legal personality, is not the determining information systems are physically located factor in that respect. Whether this criterion in a given place; the presence and use of is fulfilled should not depend on whether such systems do not, in themselves, the network and information systems are constitute such main establishment and are physically located in a given place; the therefore not decisive criteria for presence and use of such systems do not, in

AM\1232969EN.docx 81/176 PE693.680v01-00 EN determining the main establishment. The themselves, constitute such main main establishment should be the place establishment and are therefore not where the decisions related to the decisive criteria for determining the main cybersecurity risk management measures establishment. The main establishment are taken in the Union. This will typically should be the place where the decisions correspond to the place of the companies’ related to the cybersecurity risk central administration in the Union. If such management measures are taken in the decisions are not taken in the Union, the Union. This will typically correspond to main establishment should be deemed to be the place of the companies’ central in the Member States where the entity has administration in the Union. If such an establishment with the highest number decisions are not taken in the Union, the of employees in the Union. Where the main establishment should be deemed to be services are carried out by a group of in the Member States where the entity has undertakings, the main establishment of the an establishment implementing the main controlling undertaking should be cybersecurity risk management measures considered to be the main establishment of in the Union. Where the services are the group of undertakings. carried out by a group of undertakings, the main establishment of the controlling undertaking should be considered to be the main establishment of the group of undertakings.

Or. en

Amendment 190 Evžen Tošenovský

Proposal for a directive Recital 65

Text proposed by the Commission Amendment

(65) In cases where a DNS service (65) In cases where a DNS service provider, TLD name registry, content provider, TLD name registry, content delivery network provider, cloud delivery network provider, cloud computing service provider, data centre computing service provider, data centre service provider and digital provider not service provider, digital provider and established in the Union offers services provider of number-independent within the Union, it should designate a interpersonal communications services representative. In order to determine not established in the Union offers services whether such an entity is offering services within the Union, it should designate a within the Union, it should be ascertained representative. In order to determine whether it is apparent that the entity is whether such an entity is offering services planning to offer services to persons in one within the Union, it should be ascertained or more Member States. The mere whether it is apparent that the entity is accessibility in the Union of the entity’s or planning to offer services to persons in one an intermediary's website or of an email or more Member States. The mere

PE693.680v01-00 82/176 AM\1232969EN.docx EN address and of other contact details, or the accessibility in the Union of the entity’s or use of a language generally used in the an intermediary's website or of an email third country where the entity is address and of other contact details, or the established, is as such insufficient to use of a language generally used in the ascertain such an intention. However, third country where the entity is factors such as the use of a language or a established, is as such insufficient to currency generally used in one or more ascertain such an intention. However, Member States with the possibility of factors such as the use of a language or a ordering services in that other language, or currency generally used in one or more the mentioning of customers or users who Member States with the possibility of are in the Union, may make it apparent that ordering services in that other language, or the entity is planning to offer services the mentioning of customers or users who within the Union. The representative are in the Union, may make it apparent that should act on behalf of the entity and it the entity is planning to offer services should be possible for competent within the Union. The representative authorities or the CSIRTs to contact the should act on behalf of the entity and it representative. The representative should should be possible for competent be explicitly designated by a written authorities or the CSIRTs to contact the mandate of the entity to act on the latter's representative. The representative should behalf with regard to the latter's obligations be explicitly designated by a written under this Directive, including incident mandate of the entity to act on the latter's reporting. behalf with regard to the latter's obligations under this Directive, including incident reporting.

Or. en

Amendment 191 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Recital 65

Text proposed by the Commission Amendment

(65) In cases where a DNS service (65) In cases where a content delivery provider, TLD name registry, content network provider, cloud computing service delivery network provider, cloud provider, data centre service provider and computing service provider, data centre digital provider not established in the service provider and digital provider not Union offers services within the Union, it established in the Union offers services should designate a representative. In order within the Union, it should designate a to determine whether such an entity is representative. In order to determine offering services within the Union, it whether such an entity is offering services should be ascertained whether it is within the Union, it should be ascertained apparent that the entity is planning to offer whether it is apparent that the entity is services to persons in one or more Member

AM\1232969EN.docx 83/176 PE693.680v01-00 EN planning to offer services to persons in one States. The mere accessibility in the Union or more Member States. The mere of the entity’s or an intermediary's website accessibility in the Union of the entity’s or or of an email address and of other contact an intermediary's website or of an email details, or the use of a language generally address and of other contact details, or the used in the third country where the entity is use of a language generally used in the established, is as such insufficient to third country where the entity is ascertain such an intention. However, established, is as such insufficient to factors such as the use of a language or a ascertain such an intention. However, currency generally used in one or more factors such as the use of a language or a Member States with the possibility of currency generally used in one or more ordering services in that other language, or Member States with the possibility of the mentioning of customers or users who ordering services in that other language, or are in the Union, may make it apparent that the mentioning of customers or users who the entity is planning to offer services are in the Union, may make it apparent that within the Union. The representative the entity is planning to offer services should act on behalf of the entity and it within the Union. The representative should be possible for competent should act on behalf of the entity and it authorities or the CSIRTs to contact the should be possible for competent representative. The representative should authorities or the CSIRTs to contact the be explicitly designated by a written representative. The representative should mandate of the entity to act on the latter's be explicitly designated by a written behalf with regard to the latter's obligations mandate of the entity to act on the latter's under this Directive, including incident behalf with regard to the latter's obligations reporting. under this Directive, including incident reporting.

Or. en

Justification

In line with keeping NIS2 a general framework and avoiding sectorial regulation.

Amendment 192 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Recital 68

Text proposed by the Commission Amendment

(68) Entities should be encouraged to (68) Entities should be encouraged to collectively leverage their individual collectively leverage their individual knowledge and practical experience at knowledge and practical experience at strategic, tactical and operational levels strategic, tactical and operational levels with a view to enhance their capabilities to with a view to enhance their capabilities to adequately assess, monitor, defend against, adequately assess, monitor, defend against,

PE693.680v01-00 84/176 AM\1232969EN.docx EN and respond to, cyber threats. It is thus and respond to, cyber threats. It is thus necessary to enable the emergence at necessary to enable the emergence at Union level of mechanisms for voluntary Union level of mechanisms for voluntary information sharing arrangements. To this information sharing arrangements. To this end, Member States should actively end, Member States should actively support and encourage also relevant support and encourage also relevant entities not covered by the scope of this entities not covered by the scope of this Directive to participate in such Directive, such as entities focusing on information-sharing mechanisms. Those cybersecurity services and research, to mechanisms should be conducted in full participate in such information-sharing compliance with the competition rules of mechanisms. Those mechanisms should be the Union as well as the data protection conducted in full compliance with the Union law rules. competition rules of the Union as well as the data protection Union law rules.

Or. en

Amendment 193 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Recital 69

Text proposed by the Commission Amendment

(69) The processing of personal data, to (69) The processing of personal data, the extent strictly necessary and which should be limited to what is strictly proportionate for the purposes of ensuring necessary and proportionate for the network and information security by purposes of ensuring network and entities, public authorities, CERTs, information security by entities, public CSIRTs, and providers of security authorities, CERTs, CSIRTs, and providers technologies and services should constitute of security technologies and services a legitimate interest of the data controller should constitute a legitimate interest of concerned, as referred to in Regulation the data controller concerned, as referred to (EU) 2016/679. That should include in Regulation (EU) 2016/679. measures related to the prevention, detection, analysis and response to incidents, measures to raise awareness in relation to specific cyber threats, exchange of information in the context of vulnerability remediation and coordinated disclosure, as well as the voluntary exchange of information on those incidents, as well as cyber threats and vulnerabilities, indicators of compromise, tactics, techniques and procedures,

AM\1232969EN.docx 85/176 PE693.680v01-00 EN cybersecurity alerts and configuration tools. Such measures may require the processing of the following types of personal data: IP addresses, uniform resources locators (URLs), domain names, and email addresses.

Or. en

Justification

Aligning the text with GDPR recital 49 without adding to and indirectly modifying it.

Amendment 194 Zdzisław Krasnodębski, Evžen Tošenovský, Izabela-Helena Kloc, Elżbieta Kruk

Proposal for a directive Recital 69

Text proposed by the Commission Amendment

(69) The processing of personal data, to (69) The processing of personal data, to the extent strictly necessary and the extent strictly necessary and proportionate for the purposes of ensuring proportionate for the purposes of ensuring network and information security by network and information security by entities, public authorities, CERTs, entities, CERTs should constitute a CSIRTs, and providers of security legitimate interest of the data controller technologies and services should concerned, as referred to in Regulation constitute a legitimate interest of the data (EU) 2016/679 and by public authorities, controller concerned, as referred to in namely competent authorities, Single Regulation (EU) 2016/679. That should Points Of Contact (SPOCs), CSIRTs, NIS include measures related to the prevention, CG, CSIRT Network, CERTs and detection, analysis and response to CYCLONe should constitute a legal incidents, measures to raise awareness in obligation or the public interest or the relation to specific cyber threats, exchange exercise of official authority of the data of information in the context of controller concerned, as referred to in vulnerability remediation and coordinated Regulation (EU) 2016/679. That should disclosure, as well as the voluntary include measures related to the prevention, exchange of information on those detection, analysis and response to incidents, as well as cyber threats and incidents, measures to raise awareness in vulnerabilities, indicators of compromise, relation to specific cyber threats, exchange tactics, techniques and procedures, of information in the context of cybersecurity alerts and configuration vulnerability remediation and coordinated tools. Such measures may require the disclosure, as well as the voluntary processing of the following types of exchange of information on those personal data: IP addresses, uniform incidents, as well as cyber threats and resources locators (URLs), domain names, vulnerabilities, indicators of compromise,

PE693.680v01-00 86/176 AM\1232969EN.docx EN and email addresses. tactics, techniques and procedures, cybersecurity alerts and configuration tools. Such measures may require the processing of the following types of personal data: IP addresses, telephone numbers, bank account numbers, geolocation data, payment data, uniform resources locators (URLs), domain names, and email addresses.

Or. en

Amendment 195 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 69

Text proposed by the Commission Amendment

(69) The processing of personal data, to (69) The processing of personal data, to the extent strictly necessary and the extent strictly necessary and proportionate for the purposes of ensuring proportionate for the purposes of ensuring network and information security by network and information security by entities, public authorities, CERTs, essential and important entities, public CSIRTs, and providers of security authorities, CERTs, CSIRTs, and providers technologies and services should of security technologies and services is constitute a legitimate interest of the data necessary to comply with a legal controller concerned, as referred to in obligation under this Directive and Regulation (EU) 2016/679. That should constitutes a legitimate interest of the data include measures related to the prevention, controller concerned, as referred to in point detection, analysis and response to (c) paragraph 1, and point (f) paragraph 1 incidents, measures to raise awareness in respectively of Article 6 of Regulation relation to specific cyber threats, exchange (EU) 2016/679. That should include of information in the context of measures related to the prevention, vulnerability remediation and coordinated detection, analysis and response to disclosure, as well as the voluntary incidents, measures to raise awareness in exchange of information on those relation to specific cyber threats, exchange incidents, as well as cyber threats and of information in the context of vulnerabilities, indicators of compromise, vulnerability remediation and coordinated tactics, techniques and procedures, disclosure, as well as the voluntary cybersecurity alerts and configuration exchange of information on those tools. Such measures may require the incidents, as well as cyber threats and processing of the following types of vulnerabilities, indicators of compromise, personal data: IP addresses, uniform tactics, techniques and procedures,

AM\1232969EN.docx 87/176 PE693.680v01-00 EN resources locators (URLs), domain names, cybersecurity alerts and configuration and email addresses. tools. Such measures may require the processing of the following types of personal data: IP addresses, uniform resources locators (URLs), domain names, and email addresses.

Or. en

Justification

A clear legal basis is necessary for the processing of personal data for cybersecurity related purposes. The legal basis of legitimate interest as prescribed in Article 6(1)(f) of Regulation (EU) 2016/679 should underpin information-arrangements, whereas the legal basis of compliance with a legal obligation as prescribed in Article 6(1)(c) of Regulation (EU) 2016/679 should underpin the cybersecurity risk-management measures, reporting obligations and the provisions laid out in Article 23 of this Directive.

Amendment 196 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 69

Text proposed by the Commission Amendment

(69) The processing of personal data, to (69) The processing of personal data, to the extent strictly necessary and the extent strictly necessary and proportionate for the purposes of ensuring proportionate for the purposes of ensuring network and information security by network and information security by entities, public authorities, CERTs, entities, public authorities, CERTs, CSIRTs, and providers of security CSIRTs, and providers of security technologies and services should constitute technologies and services should constitute a legitimate interest of the data controller a legitimate interest of the data controller concerned, as referred to in Regulation concerned, as referred to in Regulation (EU) 2016/679. That should include (EU) 2016/679. That should include measures related to the prevention, measures related to the prevention, detection, analysis and response to detection, identification, containment, incidents, measures to raise awareness in analysis and response to incidents, relation to specific cyber threats, exchange measures to raise awareness in relation to of information in the context of specific cyber threats, exchange of vulnerability remediation and coordinated information in the context of vulnerability disclosure, as well as the voluntary remediation and coordinated disclosure, as exchange of information on those well as the voluntary exchange of incidents, as well as cyber threats and information on those incidents, as well as vulnerabilities, indicators of compromise, cyber threats and vulnerabilities, indicators tactics, techniques and procedures, of compromise, tactics, techniques and

PE693.680v01-00 88/176 AM\1232969EN.docx EN cybersecurity alerts and configuration procedures, cybersecurity alerts and tools. Such measures may require the configuration tools. Such measures may processing of the following types of require the processing of personal data. personal data: IP addresses, uniform resources locators (URLs), domain names, and email addresses.

Or. en

Amendment 197 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 70

Text proposed by the Commission Amendment

(70) In order to strengthen the (70) In order to strengthen the supervisory powers and actions that help supervisory powers and actions that help ensure effective compliance, this Directive ensure effective compliance, this Directive should provide for a minimum list of should provide for a minimum list of supervisory actions and means through supervisory actions and means through which competent authorities may supervise which competent authorities may supervise essential and important entities. In essential and important entities. The addition, this Directive should establish a supervisory regime shall, amongst other differentiation of supervisory regime issues, verify that essential and important between essential and important entities entities take appropriate technical and with a view to ensuring a fair balance of organisational measures to manage the obligations for both entities and competent risks posed to the security of network and authorities. Thus, essential entities should information systems by implementing be subject to a fully-fledged supervisory basic computer hygiene practices such as regime (ex-ante and ex-post), while software updates, device configuration, important entities should be subject to a network segmentation, identity and access light supervisory regime, ex-post only. For management or user awareness and the latter, this means that important entities training regarding corporate email cyber should not document systematically threats, phishing or social engineering compliance with cybersecurity risk techniques. In addition, this Directive management requirements, while should establish a differentiation of competent authorities should implement a supervisory regime between essential and reactive ex -post approach to supervision important entities with a view to ensuring a and, hence, not have a general obligation to fair balance of obligations for both entities supervise those entities. and competent authorities. Thus, essential entities should be subject to a fully-fledged supervisory regime (ex-ante and ex-post), while important entities should be subject to a light supervisory regime, ex-post only. For the latter, this means that important

AM\1232969EN.docx 89/176 PE693.680v01-00 EN entities should not document systematically compliance with cybersecurity risk management requirements, while competent authorities should implement a reactive ex -post approach to supervision and, hence, not have a general obligation to supervise those entities.

Or. en

Amendment 198 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 71

Text proposed by the Commission Amendment

(71) In order to make enforcement (71) In order to make enforcement effective, a minimum list of administrative effective, a minimum list of administrative sanctions for breach of the cybersecurity sanctions for breach of the cybersecurity risk management and reporting obligations risk management and reporting obligations provided by this Directive should be laid provided by this Directive should be laid down, setting up a clear and consistent down, setting up a clear and consistent framework for such sanctions across the framework for such sanctions across the Union. Due regard should be given to the Union. Due regard should be given to the nature, gravity and duration of the nature, gravity and duration of the infringement, the actual damage caused or infringement, the actual damage caused or losses incurred or potential damage or losses incurred, the intentional or negligent losses that could have been triggered, the character of the infringement, actions taken intentional or negligent character of the to prevent or mitigate the damage and/or infringement, actions taken to prevent or losses suffered, the degree of responsibility mitigate the damage and/or losses suffered, or any relevant previous infringements, the the degree of responsibility or any relevant degree of cooperation with the competent previous infringements, the degree of authority and any other aggravating or cooperation with the competent authority mitigating factor. The imposition of and any other aggravating or mitigating penalties including administrative fines factor. The imposition of penalties should respect the proportionality of the including administrative fines should be fines in order to avoid hampering subject to appropriate procedural businesses from innovating and be subject safeguards in accordance with the general to appropriate procedural safeguards in principles of Union law and the Charter of accordance with the general principles of Fundamental Rights of the European Union law and the Charter of Fundamental Union, including effective judicial Rights of the European Union, including protection and due process. effective judicial protection and due

PE693.680v01-00 90/176 AM\1232969EN.docx EN process.

Or. en

Amendment 199 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 71

Text proposed by the Commission Amendment

(71) In order to make enforcement (71) In order to make enforcement effective, a minimum list of administrative effective, a minimum list of administrative sanctions for breach of the cybersecurity sanctions for breach of the cybersecurity risk management and reporting obligations risk management and reporting obligations provided by this Directive should be laid provided by this Directive should be laid down, setting up a clear and consistent down, setting up a clear and consistent framework for such sanctions across the framework for such sanctions across the Union. Due regard should be given to the Union. Due regard should be given to the nature, gravity and duration of the nature, gravity and duration of the infringement, the actual damage caused or infringement, the actual damage caused or losses incurred or potential damage or losses incurred, the intentional or negligent losses that could have been triggered, the character of the infringement, actions taken intentional or negligent character of the to prevent or mitigate the damage and/or infringement, actions taken to prevent or losses suffered, the degree of responsibility mitigate the damage and/or losses suffered, or any relevant previous infringements, the the degree of responsibility or any relevant degree of cooperation with the competent previous infringements, the degree of authority and any other aggravating or cooperation with the competent authority mitigating factor. The imposition of and any other aggravating or mitigating penalties including administrative fines factor. The imposition of penalties should be subject to appropriate procedural including administrative fines should be safeguards in accordance with the general subject to appropriate procedural principles of Union law and the Charter of safeguards in accordance with the general Fundamental Rights of the European principles of Union law and the Charter of Union, including effective judicial Fundamental Rights of the European protection and due process. Union, including effective judicial protection and due process.

Or. en

Justification

Administrative sanctions stemming from breaches of cybersecurity risk management and

AM\1232969EN.docx 91/176 PE693.680v01-00 EN reporting obligations of entities should target actual damages or losses rather than potential damages or losses that could have been triggered.

Amendment 200 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 72

Text proposed by the Commission Amendment

(72) In order to ensure effective (72) In order to ensure effective enforcement of the obligations laid down enforcement of the obligations laid down in this Directive, each competent authority in this Directive, each competent authority should have the power to impose or request should have the power to impose or request the imposition of administrative fines. the imposition of administrative fines if the infringement was intentional, negligent or the entity had had prior notice of the possibility of committing an infringement.

Or. en

Amendment 201 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Recital 76

Text proposed by the Commission Amendment

(76) In order to further strengthen the (76) In order to further strengthen the effectiveness and dissuasiveness of the effectiveness and dissuasiveness of the penalties applicable to infringements of penalties applicable to infringements of obligations laid down pursuant to this obligations laid down pursuant to this Directive, the competent authorities should Directive, the competent authorities should be empowered to apply sanctions be empowered to apply sanctions consisting of the suspension of a consisting of, where applicable, the certification or authorisation concerning temporary suspension of a certification or part or all the services provided by an authorisation concerning part or all the essential entity and the imposition of a services provided by an essential entity, temporary ban from the exercise of and the imposition of a temporary against managerial functions by a natural person. any person discharging managerial Given their severity and impact on the responsibilities at chief executive officer

PE693.680v01-00 92/176 AM\1232969EN.docx EN entities’ activities and ultimately on their or legal representative level in that consumers, such sanctions should only be essential entity from exercising applied proportionally to the severity of the managerial functions in that entity. This infringement and taking account of the provision shall not apply to public specific circumstances of each case, administration entities as referred to in including the intentional or negligent this Directive. Given their severity and character of the infringement, actions taken impact on the entities’ activities and to prevent or mitigate the damage and/or ultimately on their consumers, such losses suffered. Such sanctions should only sanctions should only be applied be applied as ultima ratio, meaning only proportionally to the severity of the after the other relevant enforcement actions infringement and taking account of the laid down by this Directive have been specific circumstances of each case, exhausted, and only for the time until the including the intentional or negligent entities to which they apply take the character of the infringement, actions taken necessary action to remedy the deficiencies to prevent or mitigate the damage and/or or comply with the requirements of the losses suffered. Such sanctions should only competent authority for which such be applied as ultima ratio, meaning only sanctions were applied. The imposition of after the other relevant enforcement actions such sanctions shall be subject to laid down by this Directive have been appropriate procedural safeguards in exhausted, and only for the time until the accordance with the general principles of entities to which they apply take the Union law and the Charter of Fundamental necessary action to remedy the deficiencies Rights of the European Union, including or comply with the requirements of the effective judicial protection, due process, competent authority for which such presumption of innocence and right of sanctions were applied. The imposition of defence. such sanctions shall be subject to appropriate procedural safeguards in accordance with the general principles of Union law and the Charter of Fundamental Rights of the European Union, including effective judicial protection, due process, presumption of innocence and right of defence.

Or. en

Amendment 202 Evžen Tošenovský

Proposal for a directive Recital 76

Text proposed by the Commission Amendment

(76) In order to further strengthen the (76) In order to further strengthen the effectiveness and dissuasiveness of the effectiveness and dissuasiveness of the penalties applicable to infringements of penalties applicable to infringements of

AM\1232969EN.docx 93/176 PE693.680v01-00 EN obligations laid down pursuant to this obligations laid down pursuant to this Directive, the competent authorities should Directive, the competent authorities should be empowered to apply sanctions be empowered to apply sanctions consisting of the suspension of a consisting of the suspension of a certification or authorisation concerning certification or authorisation concerning part or all the services provided by an services provided by an essential entity. essential entity and the imposition of a Given their severity and impact on the temporary ban from the exercise of entities’ activities and ultimately on their managerial functions by a natural person. consumers, such sanctions should only be Given their severity and impact on the applied proportionally to the severity of the entities’ activities and ultimately on their infringement and taking account of the consumers, such sanctions should only be specific circumstances of each case, applied proportionally to the severity of the including the intentional or negligent infringement and taking account of the character of the infringement, actions taken specific circumstances of each case, to prevent or mitigate the damage and/or including the intentional or negligent losses suffered. Such sanctions should only character of the infringement, actions taken be applied as ultima ratio, meaning only to prevent or mitigate the damage and/or after the other relevant enforcement actions losses suffered. Such sanctions should only laid down by this Directive have been be applied as ultima ratio, meaning only exhausted, and only for the time until the after the other relevant enforcement actions entities to which they apply take the laid down by this Directive have been necessary action to remedy the deficiencies exhausted, and only for the time until the or comply with the requirements of the entities to which they apply take the competent authority for which such necessary action to remedy the deficiencies sanctions were applied. The imposition of or comply with the requirements of the such sanctions shall be subject to competent authority for which such appropriate procedural safeguards in sanctions were applied. The imposition of accordance with the general principles of such sanctions shall be subject to Union law and the Charter of Fundamental appropriate procedural safeguards in Rights of the European Union, including accordance with the general principles of effective judicial protection, due process, Union law and the Charter of Fundamental presumption of innocence and right of Rights of the European Union, including defence. effective judicial protection, due process, presumption of innocence and right of defence.

Or. en

Amendment 203 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Recital 76

Text proposed by the Commission Amendment

PE693.680v01-00 94/176 AM\1232969EN.docx EN (76) In order to further strengthen the (76) In order to further strengthen the effectiveness and dissuasiveness of the effectiveness and dissuasiveness of the penalties applicable to infringements of penalties applicable to infringements of obligations laid down pursuant to this obligations laid down pursuant to this Directive, the competent authorities should Directive, the competent authorities should be empowered to apply sanctions be empowered to apply sanctions consisting of the suspension of a consisting of the suspension of a certification or authorisation concerning certification or authorisation concerning part or all the services provided by an part or all the services provided by an essential entity and the imposition of a essential entity. Given their severity and temporary ban from the exercise of impact on the entities’ activities and managerial functions by a natural person. ultimately on their consumers, such Given their severity and impact on the sanctions should only be applied entities’ activities and ultimately on their proportionally to the severity of the consumers, such sanctions should only be infringement and taking account of the applied proportionally to the severity of the specific circumstances of each case, infringement and taking account of the including the intentional or negligent specific circumstances of each case, character of the infringement, actions taken including the intentional or negligent to prevent or mitigate the damage and/or character of the infringement, actions taken losses suffered. Such sanctions should only to prevent or mitigate the damage and/or be applied as ultima ratio, meaning only losses suffered. Such sanctions should only after the other relevant enforcement actions be applied as ultima ratio, meaning only laid down by this Directive have been after the other relevant enforcement actions exhausted, and only for the time until the laid down by this Directive have been entities to which they apply take the exhausted, and only for the time until the necessary action to remedy the deficiencies entities to which they apply take the or comply with the requirements of the necessary action to remedy the deficiencies competent authority for which such or comply with the requirements of the sanctions were applied. The imposition of competent authority for which such such sanctions shall be subject to sanctions were applied. The imposition of appropriate procedural safeguards in such sanctions shall be subject to accordance with the general principles of appropriate procedural safeguards in Union law and the Charter of Fundamental accordance with the general principles of Rights of the European Union, including Union law and the Charter of Fundamental effective judicial protection, due process, Rights of the European Union, including presumption of innocence and right of effective judicial protection, due process, defence. presumption of innocence and right of defence.

Or. en

Amendment 204 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Recital 79

AM\1232969EN.docx 95/176 PE693.680v01-00 EN Text proposed by the Commission Amendment

(79) A peer-review mechanism should deleted be introduced, allowing the assessment by experts designated by the Member States of the implementation of cybersecurity policies, including the level of Member States’ capabilities and available resources.

Or. en

Amendment 205 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Recital 79

Text proposed by the Commission Amendment

(79) A peer-review mechanism should (79) A peer-review mechanism should be introduced, allowing the assessment by be introduced, allowing the assessment by experts designated by the Member States independent experts designated by the of the implementation of cybersecurity Member States, of the implementation of policies, including the level of Member cybersecurity policies, including the level States’ capabilities and available resources. of Member States’ capabilities and available resources. When deciding on the methodology, the Commission, supported by ENISA, should establish an objective, non-discriminatory, technology neutral, fair and transparent system for the selection of such experts.

Or. en

Justification

In order to ensure an objective view, the procedure should be transparent and the experts independent.

Amendment 206 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez

PE693.680v01-00 96/176 AM\1232969EN.docx EN Muñoz

Proposal for a directive Recital 79

Text proposed by the Commission Amendment

(79) A peer-review mechanism should (79) A peer-review mechanism should be introduced, allowing the assessment by be introduced, allowing the assessment by experts designated by the Member States experts designated by the Member States of the implementation of cybersecurity and ENISA of the implementation of policies, including the level of Member cybersecurity policies, including the level States’ capabilities and available resources. of Member States’ capabilities and available resources, and provide an effective path for the transfer of cybersecurity-enhancing technologies, mechanisms and processes between and among competent authorities or CSIRTs.

Or. en

Justification

The peer-review process laid out in Article 16 of the Directive can enable mature CSIRTs to transfer cybersecurity technology and related polices, controls and practices to Member States’ competent authorities and CSIRTs under review leading not only to better cooperation but also more harmonious development of capabilities and expertise from this process.

Amendment 207 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Recital 80

Text proposed by the Commission Amendment

(80) In order to take into account new deleted cyber threats, technological developments or sectorial specificities, the power to adopt acts in accordance with Article 290 TFEU should be delegated to the Commission in respect of the elements in relation to risk management measures required by this Directive. The Commission should also be empowered to adopt delegated acts establishing which categories of essential entities shall be

AM\1232969EN.docx 97/176 PE693.680v01-00 EN required to obtain a certificate and under which specific European cybersecurity certification schemes. It is of particular importance that the Commission carry out appropriate consultations during its preparatory work, including at expert level, and that those consultations be conducted in accordance with the principles laid down in the Inter- institutional Agreement of 13 April 2016 on Better Law-Making26 . In particular, to ensure equal participation in the preparation of delegated acts, the European Parliament and the Council receive all documents at the same time as Member States' experts, and their experts systematically have access to meetings of Commission expert groups dealing with the preparation of delegated acts. ______26 OJ L 123, 12.5.2016, p. 1.

Or. en

Amendment 208 Tsvetelina Penkova

Proposal for a directive Recital 80

Text proposed by the Commission Amendment

(80) In order to take into account new (80) In order to take into account new cyber threats, technological developments cyber threats, technological developments or sectorial specificities, the power to adopt or sectorial specificities, the power to adopt acts in accordance with Article 290 TFEU acts in accordance with Article 290 TFEU should be delegated to the Commission in should be delegated to the Commission in respect of the elements in relation to risk respect of the elements in relation to risk management measures required by this management measures required by this Directive. The Commission should also be Directive. The Commission should also be empowered to adopt delegated acts empowered to initiate legislative proposals establishing which categories of essential under Article 114 TFEU establishing entities shall be required to obtain a which categories of essential entities shall certificate and under which specific be required to obtain a certificate and under European cybersecurity certification which specific European cybersecurity schemes. It is of particular importance that certification schemes. It is of particular

PE693.680v01-00 98/176 AM\1232969EN.docx EN the Commission carry out appropriate importance that the Commission carry out consultations during its preparatory work, appropriate consultations during its including at expert level, and that those preparatory work, including at expert level, consultations be conducted in accordance and that those consultations be conducted with the principles laid down in the Inter- in accordance with the principles laid down institutional Agreement of 13 April 2016 in the Inter-institutional Agreement of 13 on Better Law-Making26 . In particular, to April 2016 on Better Law-Making26. In ensure equal participation in the particular, to ensure equal participation in preparation of delegated acts, the European the preparation of delegated acts, the Parliament and the Council receive all European Parliament and the Council documents at the same time as Member receive all documents at the same time as States' experts, and their experts Member States' experts, and their experts systematically have access to meetings of systematically have access to meetings of Commission expert groups dealing with the Commission expert groups dealing with the preparation of delegated acts. preparation of delegated acts. ______26 OJ L 123, 12.5.2016, p. 1. 26 OJ L 123, 12.5.2016, p. 1.

Or. en

Justification

The suggested amendment is necessary as to ensure that the legal coherence is preserved with the existing EU acquis. Formally requiring specific sectors or products, services or processes to undergo certification introduces a mandatory requirement, which is inconsistent with Regulation 2019/881/EC (“The Cybersecurity Act”) and the provisions that govern the EU certification framework under Article 56(2) and Article 56(3). The latter unambiguously stipulates that the certification is voluntary, unless “otherwise specified by Union or Member State law”.

Amendment 209 Evžen Tošenovský

Proposal for a directive Article 1 – paragraph 2 – point a a (new)

Text proposed by the Commission Amendment

(aa) establishes framework for cooperation among Member States;

Or. en

Amendment 210

AM\1232969EN.docx 99/176 PE693.680v01-00 EN Evžen Tošenovský

Proposal for a directive Article 1 – paragraph 2 – point b

Text proposed by the Commission Amendment

(b) lays down cybersecurity risk (b) lays down obligation on Member management and reporting obligations for States to introduce cybersecurity risk entities of a type referred to as essential management and reporting obligations for entities in Annex I and important entities in entities of a type referred to as essential Annex II; entities in Annex I and important entities in Annex II;

Or. en

Amendment 211 Evžen Tošenovský

Proposal for a directive Article 1 – paragraph 2 – point c

Text proposed by the Commission Amendment

(c) lays down obligations on (c) lays down obligations on Member cybersecurity information sharing. States to facilitate the cybersecurity information sharing;

Or. en

Amendment 212 Evžen Tošenovský

Proposal for a directive Article 1 – paragraph 2 – point c a (new)

Text proposed by the Commission Amendment

(ca) lays down supervision and enforcement obligations on Member States.

Or. en

PE693.680v01-00 100/176 AM\1232969EN.docx EN Amendment 213 Thierry Mariani, Paolo Borchia, Isabella Tovaglieri

Proposal for a directive Article 2 – paragraph 1

Text proposed by the Commission Amendment

1. This Directive applies to public and 1. This Directive applies to public and private entities of a type referred to as private entities of a type referred to as essential entities in Annex I and as essential entities in Annex I and as important entities in Annex II. This important entities in Annex II, including Directive does not apply to entities that ICT suppliers providing products and qualify as micro and small enterprises services for critical functions performed within the meaning of Commission by essential or important entities. This Recommendation 2003/361/EC.28 Directive does not apply to entities regarded by Member States as non- critical. This Directive does not apply to entities that qualify as micro and small enterprises within the meaning of Commission Recommendation 2003/361/EC.28 ______28 Commission Recommendation 28 Commission Recommendation 2003/361/EC of 6 May 2003 concerning 2003/361/EC of 6 May 2003 concerning the definition of micro, small and medium- the definition of micro, small and medium- sized enterprises (OJ L 124, 20.5.2003, p. sized enterprises (OJ L 124, 20.5.2003, p. 36). 36).

Or. fr

Amendment 214 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Article 2 – paragraph 1

Text proposed by the Commission Amendment

1. This Directive applies to public and 1. This Directive applies to public and private entities of a type referred to as private entities of a type referred to as essential entities in Annex I and as essential entities in Annex I and as important entities in Annex II. This important entities in Annex II. This Directive does not apply to entities that Directive does not apply to entities that qualify as micro and small enterprises qualify as micro and small enterprises

AM\1232969EN.docx 101/176 PE693.680v01-00 EN within the meaning of Commission within the meaning of Commission Recommendation 2003/361/EC.28 Recommendation 2003/361/EC28 nor to non-commercial free and open source projects. Article 3 Paragraph 4 of the Annex to Commission Recommendation 2003/361/EC is not applicable. ______28 Commission Recommendation 28 Commission Recommendation 2003/361/EC of 6 May 2003 concerning 2003/361/EC of 6 May 2003 concerning the definition of micro, small and medium- the definition of micro, small and medium- sized enterprises (OJ L 124, 20.5.2003, p. sized enterprises (OJ L 124, 20.5.2003, p. 36). 36).

Or. en

Justification

Although security needs to be raised everywhere, the adding too much requirements on non- commercial free and open source projects could have a chilling effect.

Amendment 215 Bart Groothuis, Klemen Grošelj, Iskra Mihaylova, Nicola Danti, Christophe Grudler

Proposal for a directive Article 2 – paragraph 1

Text proposed by the Commission Amendment

1. This Directive applies to public and 1. This Directive applies to public and private entities of a type referred to as private entities of a type referred to as essential entities in Annex I and as essential entities in Annex I and as important entities in Annex II. This important entities in Annex II that provide Directive does not apply to entities that their services or carry out their activities qualify as micro and small enterprises within the Union. This Directive does not within the meaning of Commission apply to entities that qualify as micro and Recommendation 2003/361/EC.28 small enterprises within the meaning of Commission Recommendation 2003/361/EC.28 ______28 Commission Recommendation 28 Commission Recommendation 2003/361/EC of 6 May 2003 concerning 2003/361/EC of 6 May 2003 concerning the definition of micro, small and medium- the definition of micro, small and medium- sized enterprises (OJ L 124, 20.5.2003, p. sized enterprises (OJ L 124, 20.5.2003, p. 36). 36).

PE693.680v01-00 102/176 AM\1232969EN.docx EN Or. en

Justification

To clarify that the directive applies to entities active within the EU.

Amendment 216 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Article 2 – paragraph 1

Text proposed by the Commission Amendment

1. This Directive applies to public and 1. This Directive applies to public and private entities of a type referred to as private entities of a type referred to as essential entities in Annex I and as essential entities in Annex I and as important entities in Annex II. This important entities in Annex II in so far as Directive does not apply to entities that they carry out in-scope activities within qualify as micro and small enterprises the Union. This Directive does not apply within the meaning of Commission to entities that qualify as micro and small Recommendation 2003/361/EC.28 enterprises within the meaning of Commission Recommendation 2003/361/EC.28 ______28 Commission Recommendation 28 Commission Recommendation 2003/361/EC of 6 May 2003 concerning 2003/361/EC of 6 May 2003 concerning the definition of micro, small and medium- the definition of micro, small and medium- sized enterprises (OJ L 124, 20.5.2003, p. sized enterprises (OJ L 124, 20.5.2003, p. 36). 36).

Or. en

Justification

This Directive applies only to entities which are active within the EU.

Amendment 217 François-Xavier Bellamy

Proposal for a directive Article 2 – paragraph 1

Text proposed by the Commission Amendment

AM\1232969EN.docx 103/176 PE693.680v01-00 EN 1. This Directive applies to public and 1. This Directive applies to public and private entities of a type referred to as private entities of a type referred to as essential entities in Annex I and as essential entities in Annex I and as important entities in Annex II. This important entities in Annex II, including Directive does not apply to entities that manufacturers and providers of ICT qualify as micro and small enterprises products. This Directive does not apply to within the meaning of Commission entities that qualify as micro and small Recommendation 2003/361/EC.28 enterprises within the meaning of Commission Recommendation 2003/361/EC.28 ______28 Commission Recommendation 28 Commission Recommendation 2003/361/EC of 6 May 2003 concerning 2003/361/EC of 6 May 2003 concerning the definition of micro, small and medium- the definition of micro, small and medium- sized enterprises (OJ L 124, 20.5.2003, p. sized enterprises (OJ L 124, 20.5.2003, p. 36). 36).

Or. en

Amendment 218 Evžen Tošenovský

Proposal for a directive Article 2 – paragraph 1

Text proposed by the Commission Amendment

1. This Directive applies to public and 1. This Directive applies to public and private entities of a type referred to as private entities of a type referred to in essential entities in Annex I and as Annex I and Annex II. Without prejudice important entities in Annex II. This to paragraph 2 of this Article and Article Directive does not apply to entities that 27, this Directive does not apply to entities qualify as micro and small enterprises that qualify as micro and small enterprises within the meaning of Commission within the meaning of Commission Recommendation 2003/361/EC.28 Recommendation 2003/361/EC.28 ______28 Commission Recommendation 28 Commission Recommendation 2003/361/EC of 6 May 2003 concerning 2003/361/EC of 6 May 2003 concerning the definition of micro, small and medium- the definition of micro, small and medium- sized enterprises (OJ L 124, 20.5.2003, p. sized enterprises (OJ L 124, 20.5.2003, p. 36). 36).

Or. en

PE693.680v01-00 104/176 AM\1232969EN.docx EN Amendment 219 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 2 – paragraph 2 – introductory part

Text proposed by the Commission Amendment

2. However, regardless of their size, 2. By way of derogation from this Directive also applies to entities paragraph 1 of this Article, regardless of referred to in Annexes I and II, where: their size, this Directive also applies to entities of a type referred to in Annexes I and II, where:

Or. en

Amendment 220 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Article 2 – paragraph 2 – point a – point iii

Text proposed by the Commission Amendment

(iii) top–level domain name registries deleted and domain name system (DNS) service providers referred to in point 8 of Annex I;

Or. en

Justification

A catch all, sectorial approach is not compatible with the scope of this directive.

Amendment 221 Marisa Matias, Sira Rego, Sandra Pereira, Giorgos Georgiou, Manuel Bompard

Proposal for a directive Article 2 – paragraph 2 – point d

Text proposed by the Commission Amendment

(d) a potential disruption of the service (d) a potential disruption of the service

AM\1232969EN.docx 105/176 PE693.680v01-00 EN provided by the entity could have an provided by the entity could have impact on public safety, public security or repercussions on the provision of public public health; services, particularly health, education, transport security or public order;

Or. en

Amendment 222 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Article 2 – paragraph 2 – point d

Text proposed by the Commission Amendment

(d) a potential disruption of the service (d) a disruption of the service provided provided by the entity could have an by the entity could have an impact on impact on public safety, public security or public safety, public security or public public health; health;

Or. en

Justification

The text provides assessment criteria, therefore the rule will apply when a disruption could have an impact. The change eliminates a double conditionality.

Amendment 223 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Article 2 – paragraph 2 – point e

Text proposed by the Commission Amendment

(e) a potential disruption of the service (e) a disruption of the service provided provided by the entity could induce by the entity could induce systemic risks, systemic risks, in particular for the sectors in particular for the sectors where such where such disruption could have a cross- disruption could have a cross-border border impact; impact;

Or. en

PE693.680v01-00 106/176 AM\1232969EN.docx EN Justification

The text provides assessment criteria, therefore the rule will apply when a disruption could have an impact. The change eliminates a double conditionality.

Amendment 224 Marisa Matias, Sira Rego, Cornelia Ernst, Manuel Bompard

Proposal for a directive Article 2 – paragraph 2 – point f a (new)

Text proposed by the Commission Amendment

(fa) the entity is critical for the provision of services in insular, remote or unpopulated areas;

Or. en

Amendment 225 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 2 – paragraph 2 a (new)

Text proposed by the Commission Amendment

2a. Member States shall ensure that all entities falling under the scope of this Directive comply with this Directive as important entities. Member States may decide which important entities shall be designated as essential entities, taking into account particularly whether the entities had already been identified as the operators of essential services pursuant to Article 5 of NIS Directive (2016/1148) and prioritisation of the sectors and subsectors with higher level of criticality listed in Annex I. Member States shall by [transposition deadline] establish an initial list of essential and important entities, which should comply with this Directive and review it, on a regular basis, and, where

AM\1232969EN.docx 107/176 PE693.680v01-00 EN appropriate, update it. Member States shall set a deadline for initial self-notification or identification by the competent authority and compliance with this Directive for the entities falling under the scope of this Directive not exceeding [6 months after the transposition deadline]. The entities which had been already identified as the operators of essential services pursuant to Article 5 of NIS Directive (2016/1148) shall comply with this Directive by [transposition deadline]. The entities shall submit at least the following information: the name of the entity, address and up-to-date contact details, including email addresses and telephone numbers, and relevant sector(s) and subsector(s) referred to in Annexes I and II. The entities shall without undue delay notify any changes to the details they submitted, and in any event, within two weeks from the date on which the change took effect.

Or. en

Amendment 226 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Article 2 – paragraph 2 a (new)

Text proposed by the Commission Amendment

2a. This Directive applies only to manufacturing facilities of important and essential entities listed in Annexes I and II that are located within the Union.

Or. en

Amendment 227 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

PE693.680v01-00 108/176 AM\1232969EN.docx EN Proposal for a directive Article 2 – paragraph 2 b (new)

Text proposed by the Commission Amendment

2b. The entities referred to in Article 24(1) shall submit the self-notifications in the Member State in which they have their main establishment. Apart from information referred to in the third subparagraph of paragraph 2a of this Article, they shall notify the address of its main establishment and its other legal establishments in the Union or, if not established in the Union, of its representative designated pursuant to Article 24(3) and the Member States where the entity provides services. Where an entity referred to in paragraph 1 has besides its main establishment in the Union further establishments or provides services in other Member States, the single contact point of the main establishment shall without undue delay forward the information to the single points of contact of those Member States. Where an entity fails to notify or to provide the relevant information on Member States concerned within the deadline set out by the Member State of its main establishment, any Member State where the entity provides services shall be competent to ensure that entity’s compliance with the obligations laid down in this Directive.

Or. en

Amendment 228 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 2 – paragraph 2 c (new)

AM\1232969EN.docx 109/176 PE693.680v01-00 EN Text proposed by the Commission Amendment

2c. By [6 months after the transposition deadline] and every 12 months thereafter, Member States shall submit to the Cooperation Group and for the purpose of the review referred to in Article 35 to the Commission the information necessary to enable to assess the consistency of Member States' approaches to the identification of essential and important services. That information shall include at least the number of all essential and important entities identified for each sector and subsector referred to in Annexes I and II, including number of small and micro enterprises in each category;

Or. en

Amendment 229 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 2 – paragraph 3 a (new)

Text proposed by the Commission Amendment

3a. Member States shall ensure that the network and information systems used by their public administration entities are subject to their national cybersecurity regulation.

Or. en

Amendment 230 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Article 2 – paragraph 4

PE693.680v01-00 110/176 AM\1232969EN.docx EN Text proposed by the Commission Amendment

4. This Directive applies without 4. This Directive applies without prejudice to Council Directive prejudice to Council Directive 2008/114/EC30 and Directives 2008/114/EC30 and Directives 2011/93/EU31 and 2013/40/EU32 of the 2011/93/EU31 and 2013/40/EU32 and European Parliament and of the Council. 2002/58/EC1a and Regulation (EU) 2016/6791b of the European Parliament and of the Council. ______30 Council Directive 2008/114/EC of 8 30 Council Directive 2008/114/EC of 8 December 2008 on the identification and December 2008 on the identification and designation of European critical designation of European critical infrastructures and the assessment of the infrastructures and the assessment of the need to improve their protection (OJ L 345, need to improve their protection (OJ L 345, 23.12.2008, p. 75). 23.12.2008, p. 75). 31 Directive 2011/93/EU of the European 31 Directive 2011/93/EU of the European Parliament and of the Council of 13 Parliament and of the Council of 13 December 2011 on combating the sexual December 2011 on combating the sexual abuse and sexual exploitation of children abuse and sexual exploitation of children and child pornography, and replacing and child pornography, and replacing Council Framework Decision 2004/68/JHA Council Framework Decision 2004/68/JHA (OJ L 335, 17.12.2011, p. 1). (OJ L 335, 17.12.2011, p. 1). 32 Directive 2013/40/EU of the European 32 Directive 2013/40/EU of the European Parliament and of the Council of 12 August Parliament and of the Council of 12 August 2013 on attacks against information 2013 on attacks against information systems and replacing Council Framework systems and replacing Council Framework Decision 2005/222/JHA (OJ L 218, Decision 2005/222/JHA (OJ L 218, 14.8.2013, p. 8). 14.8.2013, p. 8).

Or. en

(1a Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector1b Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC)

Justification

Completing the relevant list of provisions

Amendment 231 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez

AM\1232969EN.docx 111/176 PE693.680v01-00 EN Muñoz

Proposal for a directive Article 2 – paragraph 5 a (new)

Text proposed by the Commission Amendment

5a. As regards the processing of personal data, essential and important entities as well as competent authorities, CERTs, and CSIRTs, shall process personal data to the extent strictly necessary and proportionate for the purposes of ensuring network and information security in accordance with the obligations set out in this Directive. Where the processing of personal data is required for the purpose of cybersecurity and network and information security in accordance with the provisions set out in Article 18 and Article 20 of the Directive, including the provisions set out in Article 23, that processing is considered necessary for compliance with a legal obligation in accordance with paragraph1(c) of Article 6 of Regulation (EU) 2016/679.

Or. en

Justification

Clarifying legal basis under Regulation (EU) 2016/679 for the processing of personal data where there is an obligation to comply with the requirements of the provisions laid out in this Directive.

Amendment 232 Zdzisław Krasnodębski, Evžen Tošenovský, Izabela-Helena Kloc, Elżbieta Kruk

Proposal for a directive Article 2 – paragraph 5 a (new)

Text proposed by the Commission Amendment

5a. To fulfil the tasks set out in this Directive, competent authorities and CSIRTs shall process personal data,

PE693.680v01-00 112/176 AM\1232969EN.docx EN including the data referred to in Article 9 of the Regulation (EU) 2016/679, and shall process information that is confidential pursuant to Union and national rules, for the purposes and to the extent strictly necessary to fulfil these tasks.

Or. en

Amendment 233 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 2 – paragraph 5 b (new)

Text proposed by the Commission Amendment

5b. For the purposes of arrangements underpinning cybersecurity information- sharing and voluntary notification of information as set out in Articles 26 and 27 of this Directive, the processing of personal data constitutes a legitimate interest of the data controller concerned in accordance with paragraph 1(f) of Article 6 of Regulation (EU) 2016/679.

Or. en

Justification

Clarifying legal basis under Regulation (EU) 2016/679 for the processing of personal data where there is a legitimate interest.

Amendment 234 Zdzisław Krasnodębski, Evžen Tošenovský, Izabela-Helena Kloc, Elżbieta Kruk

Proposal for a directive Article 2 – paragraph 5 b (new)

Text proposed by the Commission Amendment

AM\1232969EN.docx 113/176 PE693.680v01-00 EN 5b. To fulfil the tasks set out in this Directive, SPOCs, the Cooperation Group, the CSIRT Network and CyCLONe shall process personal data and information that is confidential pursuant to Union and national rules, for the purposes and to the extent strictly necessary to fulfil these tasks.

Or. en

Amendment 235 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 2 – paragraph 5 c (new)

Text proposed by the Commission Amendment

5c. As regards the processing of personal data from essential entities providing services of public electronic communications networks or publicly available electronic communications referred to in point 8 of Annex I and point (a)(i) of paragraph2(1), such processing of personal data required for the purposes of ensuring network and information security shall be in compliance with the provisions set out in Directive 2002/58/EC.

Or. en

Justification

Clarifying legal basis under Directive 2002/58/EC (ePrivacy Directive) for the processing of personal data from entities providing services of public communications networks, or publicly available electronic communications, which are in scope of this Directive.

Amendment 236 Zdzisław Krasnodębski, Evžen Tošenovský, Izabela-Helena Kloc, Elżbieta Kruk

PE693.680v01-00 114/176 AM\1232969EN.docx EN Proposal for a directive Article 2 – paragraph 5 c (new)

Text proposed by the Commission Amendment

5c. When processing the personal data referred to in Article 9 of the Regulation (EU) 2016/679, competent authorities and CSIRTs shall conduct the risk analyses, introduce proper safeguards and procedures to exchange information.

Or. en

Amendment 237 Christophe Grudler, Klemen Grošelj, Nathalie Loiseau, Sandro Gozi, Stéphanie Yon- Courtin, Valérie Hayer

Proposal for a directive Article 2 – paragraph 6

Text proposed by the Commission Amendment

6. Where provisions of sector–specific 6. Where provisions of sector–specific acts of Union law require essential or acts of Union law require essential or important entities either to adopt important entities either to adopt cybersecurity risk management measures cybersecurity risk management measures or to notify incidents or significant cyber or to notify incidents or significant cyber threats, and where those requirements are threats, and where those requirements are at least equivalent in effect to the at least equivalent in effect to the obligations laid down in this Directive, the obligations laid down in this Directive, the relevant provisions of this Directive, relevant provisions of this Directive, including the provision on supervision and including the provision on supervision and enforcement laid down in Chapter VI, shall enforcement laid down in Chapter VI, shall not apply. not apply. The Commission shall issue guidelines in relation to the implementation of the sector–specific acts of Union law in order to ensure that security requirements established by this Directive are met by those acts. When preparing those guidelines, the Commission shall take into account ENISA and the Cooperation Group best practices and expertise.

Or. en

AM\1232969EN.docx 115/176 PE693.680v01-00 EN Justification

To ensure that implementation of lex specialis is done in a way that respects the minimum security requirements defined and established by the NIS directive, the Commission shall issue guidelines for the implementation of the sector-specific acts. Best practices collected by ENISA and the NIS cooperation group should be taken into account in the preparation of these guidelines

Amendment 238 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 2 – paragraph 6

Text proposed by the Commission Amendment

6. Where provisions of sector–specific 6. Sector-specific acts that require acts of Union law require essential or essential or important entities either to important entities either to adopt adopt cybersecurity risk management cybersecurity risk management measures measures or to notify incidents or or to notify incidents or significant cyber significant cyber threats, shall, where threats, and where those requirements are possible, refer to the definitions in Article at least equivalent in effect to the 4 of this Directive. Where provisions of obligations laid down in this Directive, the sector–specific acts of Union law require relevant provisions of this Directive, essential or important entities either to including the provision on supervision and adopt cybersecurity risk management enforcement laid down in Chapter VI, shall measures or to notify incidents or not apply. significant cyber threats, and where those requirements are at least equivalent in effect to the obligations laid down in this Directive, the relevant provisions of this Directive, including the provision on supervision and enforcement laid down in Chapter VI, shall not apply.

Or. en

Amendment 239 Tsvetelina Penkova

Proposal for a directive Article 2 – paragraph 6

PE693.680v01-00 116/176 AM\1232969EN.docx EN Text proposed by the Commission Amendment

6. Where provisions of sector–specific 6. Where provisions of sector–specific acts of Union law require essential or acts of Union law require essential important entities either to adopt or important entities either to adopt cybersecurity risk management measures cybersecurity risk management measures or to notify incidents or significant cyber or to notify incidents or significant cyber threats, and where those requirements are threats, and where those requirements are at least equivalent in effect to the at least equivalent in effect to the obligations laid down in this Directive, the obligations laid down in this Directive, relevant provisions of this Directive, including with regards to the competence including the provision on supervision and and obligations of the supervisory enforcement laid down in Chapter VI, shall authority, the relevant provisions of this not apply. Directive, including the provision on supervision and enforcement laid down in Chapter VI, shall not apply.

Or. en

Amendment 240 Zdzisław Krasnodębski, Evžen Tošenovský, Izabela-Helena Kloc, Elżbieta Kruk

Proposal for a directive Article 2 – paragraph 6

Text proposed by the Commission Amendment

6. Where provisions of sector–specific 6. Where provisions of sector–specific acts of Union law require essential or acts of Union law require essential or important entities either to adopt important entities to adopt cybersecurity cybersecurity risk management measures risk management measures and to notify or to notify incidents or significant cyber incidents or significant cyber threats, and threats, and where those requirements are where those requirements are at least at least equivalent in effect to the equivalent in effect to the obligations laid obligations laid down in this Directive, the down in this Directive, the relevant relevant provisions of this Directive, provisions of this Directive, including the including the provision on supervision and provision on supervision and enforcement enforcement laid down in Chapter VI, shall laid down in Chapter VI, shall not apply. not apply.

Or. en

Amendment 241 Zdzisław Krasnodębski, Evžen Tošenovský, Izabela-Helena Kloc, Elżbieta Kruk

AM\1232969EN.docx 117/176 PE693.680v01-00 EN Proposal for a directive Article 2 – paragraph 6 a (new)

Text proposed by the Commission Amendment

6a. Sector-specific acts of Union law referred to in paragraph 6 should at minimum include: (a) cybersecurity risk management measures as laid down in Article 18 (1) and (2); and (b) requirements to notify incidents and significant cyber threats as laid down in Article 20 (1- 4)

Or. en

Amendment 242 Evžen Tošenovský

Proposal for a directive Article 4 – paragraph 1 – point 4

Text proposed by the Commission Amendment

(4) ‘national strategy on deleted cybersecurity’ means a coherent framework of a Member State providing strategic objectives and priorities on the security of network and information systems in that Member State;

Or. en

Amendment 243 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 4 – paragraph 1 – point 4 a (new)

Text proposed by the Commission Amendment

PE693.680v01-00 118/176 AM\1232969EN.docx EN (4a) ‘near miss’ means an event which could have caused harm, but was successfully prevented from fully transpiring;

Or. en

Justification

Moved from Recitals.

Amendment 244 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Article 4 – paragraph 1 – point 5

Text proposed by the Commission Amendment

(5) ‘incident’ means any event (5) ‘incident’ means any unwanted or compromising the availability, authenticity, unexpected event compromising the integrity or confidentiality of stored, availability, authenticity, integrity or transmitted or processed data or of the confidentiality of stored, transmitted or related services offered by, or accessible processed data or of the related services via, network and information systems; offered by, or accessible via, network and information systems;

Or. en

Amendment 245 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Article 4 – paragraph 1 – point 5 – point i (new)

Text proposed by the Commission Amendment

(i) by way of derogation 'security incident' as defined in Article 2(41) of Directive (EU) 2018/1972 remains applicable for interpersonal electronic communications service providers.

Or. en

AM\1232969EN.docx 119/176 PE693.680v01-00 EN Justification

The definition of security incident as in EECC has been recently transposed in national law and repealing it with this Directive may be premature. There is a need for further assessment the impact of repealing the definition.

Amendment 246 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 4 – paragraph 1 – point 5 a (new)

Text proposed by the Commission Amendment

(5a) ‘near miss’ means any event which could have compromised the availability, authenticity, integrity or confidentiality of stored, transmitted or processed data or of the related services offered by, or accessible via, network and information systems, but was successfully prevented from fully transpiring;

Or. en

Amendment 247 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 4 – paragraph 1 – point 6

Text proposed by the Commission Amendment

(6) ‘incident handling’ means all (6) ‘incident handling’ means all actions and procedures aiming at detection, actions and procedures aiming at analysis and containment of and a response prevention, detection, analysis, attribution, to an incident; and containment of and response to an incident;

Or. en

PE693.680v01-00 120/176 AM\1232969EN.docx EN Amendment 248 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 4 – paragraph 1 – point 7 a (new)

Text proposed by the Commission Amendment

(7a) ‘risk’ means the potential for loss or disruption caused by an incident and is to be expressed as a combination of the magnitude of such loss or disruption and the likelihood of occurrence of that incident;

Or. en

Justification

Moved from Recitals.

Amendment 249 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Article 4 – paragraph 1 – point 9

Text proposed by the Commission Amendment

(9) ‘representative’ means any natural (9) ‘representative’ means any natural or legal person established in the Union or legal person established in the Union explicitly designated to act on behalf of i) a explicitly designated to act on behalf of i) a DNS service provider, a top-level domain cloud computing service provider, a data (TLD) name registry, a cloud computing centre service provider, a content delivery service provider, a data centre service network provider as referred to in point 8 provider, a content delivery network of Annex I or ii) entities referred to in point provider as referred to in point 8 of Annex 6 of Annex II that are not established in the I or ii) entities referred to in point 6 of Union, which may be addressed by a Annex II that are not established in the national competent authority or a CSIRT Union, which may be addressed by a instead of the entity with regard to the national competent authority or a CSIRT obligations of that entity under this instead of the entity with regard to the Directive; obligations of that entity under this Directive;

AM\1232969EN.docx 121/176 PE693.680v01-00 EN Or. en

Justification

Aligning the text with the changes to the scope

Amendment 250 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 4 – paragraph 1 – point 13

Text proposed by the Commission Amendment

(13) ‘domain name system (DNS)’ (13) ‘domain name system (DNS)’ means a hierarchical distributed naming means a hierarchical distributed naming system which allows end-users to reach system which enables the identification of services and resources on the internet; internet services and resources, allowing end-user devices to utilise internet routing and connectivity services, to reach those services and resources;

Or. en

Justification

The DNS does not allow end-users to reach services and resources on the internet. Rather, it allows end-users to look up those services and resources enabling their devices to communicate with those services and resources over the Internet. The DNS merely provides identification of services and resources; reachability of those services and resources depends on internet routing and connectivity services.

Amendment 251 Bart Groothuis, Klemen Grošelj, Iskra Mihaylova, Christophe Grudler, Martina Dlabajová

Proposal for a directive Article 4 – paragraph 1 – point 13

Text proposed by the Commission Amendment

(13) ‘domain name system (DNS)’ (13) ‘domain name system (DNS)’ means a hierarchical distributed naming means a hierarchical, distributed naming system which allows end-users to reach system which is used to identify Internet

PE693.680v01-00 122/176 AM\1232969EN.docx EN services and resources on the internet; services and resources, allowing end user devices to make use of Internet routing and connectivity services to reach those services and resources.

Or. en

Amendment 252 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Article 4 – paragraph 1 – point 14

Text proposed by the Commission Amendment

(14) ‘DNS service provider’ means an deleted entity that provides recursive or authoritative domain name resolution services to internet end-users and other DNS service providers;

Or. en

Justification

Aligning the text with the changes to the scope

Amendment 253 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 4 – paragraph 1 – point 14

Text proposed by the Commission Amendment

(14) ‘DNS service provider’ means an (14) ‘DNS service provider’ means an entity that provides recursive or entity that provides: a) open and public authoritative domain name resolution recursive domain name resolution services to internet end-users and other services; or b) authoritative domain name DNS service providers; resolution services as a service procurable by third-party entities;

AM\1232969EN.docx 123/176 PE693.680v01-00 EN Or. en

Justification

Differentiating between the resolution sides of the DNS is essential to include in scope the necessary services and excluding the root name servers. Excluding those from the scope if essential to maintain and open internet and avoid risks of fragmentation and risks of extra- territorial application of the Directive.

Amendment 254 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Article 4 – paragraph 1 – point 15

Text proposed by the Commission Amendment

(15) ‘top–level domain name registry’ deleted means an entity which has been delegated a specific TLD and is responsible for administering the TLD including the registration of domain names under the TLD and the technical operation of the TLD, including the operation of its name servers, the maintenance of its databases and the distribution of TLD zone files across name servers;

Or. en

Justification

Aligning the text with the changes to the scope. The fact that there was a need to define this term shows the need for a sector specific legislation.

Amendment 255 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 4 – paragraph 1 – point 15

Text proposed by the Commission Amendment

PE693.680v01-00 124/176 AM\1232969EN.docx EN (15) ‘top–level domain name registry’ (15) ‘top–level domain name registry’ means an entity which has been delegated a means an entity which has been delegated a specific TLD and is responsible for specific TLD and is responsible for administering the TLD including the administering the TLD including the registration of domain names under the registration of domain names under the TLD and the technical operation of the TLD and the technical operation of the TLD, including the operation of its name TLD, including the operation of its name servers, the maintenance of its databases servers, the maintenance of its databases and the distribution of TLD zone files and the distribution of TLD zone files across name servers; across name servers, irrespective of whether any of those operations are being performed by the entity or are outsourced;

Or. en

Justification

Many top-level domain name registries outsource the technical operation of their TLD. Thus, it is more appropriate to not imply such outsourcing excludes the entity from being a top-level domain name registry.

Amendment 256 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 4 – paragraph 1 – point 15 a (new)

Text proposed by the Commission Amendment

(15a) ‘legitimate access seekers’ means any natural or legal person, including competent authorities under Union or national law for the prevention, investigation or prosecution of criminal offences, CSIRTs, CERTs, providers of electronic communications networks and services, and providers of cybersecurity technologies and services, seeking DNS data upon a justified request on the basis of Union or national law for the purposes of preventing DNS abuse, detecting and preventing crime and fraud, protecting minors, protecting intellectual property, and protecting against hate speech;

AM\1232969EN.docx 125/176 PE693.680v01-00 EN Or. en

Amendment 257 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 4 – paragraph 1 – point 22

Text proposed by the Commission Amendment

(22) ‘social networking services (22) ‘social networking services platform’ means a platform that enables platform’ means a platform that enables end-users to connect, share, discover and end-users to connect, share, discover and communicate with each other across communicate with each other via number- multiple devices, and in particular, via independent interpersonal chats, posts, videos and recommendations); communications services across multiple devices, and in particular, via chats, posts, videos and recommendations;

Or. en

Amendment 258 Tsvetelina Penkova

Proposal for a directive Article 4 – paragraph 1 – point 22 a (new)

Text proposed by the Commission Amendment

(22a) ‘compromise assessment’ is an objective inspection by a qualified entity of a network and its devices to discover unknown security breaches and ongoing or past intrusions, signs of indicators of compromise, unauthorised access, malware, and to assess risks by identifying weaknesses in the security architecture, vulnerabilities, improper usage or policy violations and system security misconfigurations;

Or. en

PE693.680v01-00 126/176 AM\1232969EN.docx EN Amendment 259 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 4 – paragraph 1 – point 23

Text proposed by the Commission Amendment

(23) ‘public administration entity’ deleted means an entity in a Member State that complies with the following criteria: (a) it is established for the purpose of meeting needs in the general interest and does not have an industrial or commercial character; (b) it has legal personality; (c) it is financed, for the most part, by the State, regional authority, or by other bodies governed by public law; or it is subject to management supervision by those authorities or bodies; or it has an administrative, managerial or supervisory board, more than half of whose members are appointed by the State, regional authorities, or by other bodies governed by public law; (d) it has the power to address to natural or legal persons administrative or regulatory decisions affecting their rights in the cross-border movement of persons, goods, services or capital. Public administration entities that carry out activities in the areas of public security, law enforcement, defence or national security are excluded.

Or. en

Amendment 260 Marisa Matias, Sira Rego, Cornelia Ernst, Manuel Bompard

Proposal for a directive Article 4 – paragraph 1 – point 23 – introductory part

AM\1232969EN.docx 127/176 PE693.680v01-00 EN Text proposed by the Commission Amendment

(23) ‘public administration entity’ (23) ‘public administration entity’ means an entity in a Member State that means an entity in a Member State that has complies with the following criteria: legal personality and complies with some of the following criteria:

Or. en

Amendment 261 Marisa Matias, Sira Rego, Cornelia Ernst, Manuel Bompard

Proposal for a directive Article 4 – paragraph 1 – point 23 – point b

Text proposed by the Commission Amendment

(b) it has legal personality; deleted

Or. en

Amendment 262 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 4 – paragraph 1 – point 23 a (new)

Text proposed by the Commission Amendment

(23a) ‘public electronic communications network’ means a public electronic communications network as defined in point (8) of Article 2 of Directive (EU) 2018/1972;

Or. en

Amendment 263 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 4 – paragraph 1 – point 23 b (new)

PE693.680v01-00 128/176 AM\1232969EN.docx EN Text proposed by the Commission Amendment

(23b) ‘electronic communications service’ means an electronic communications service as defined in point (4) of Article 2 of Directive (EU) 2018/1972;

Or. en

Amendment 264 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 4 – paragraph 1 – point 23 c (new)

Text proposed by the Commission Amendment

(23c) ‘number-based interpersonal communications service’ means a number-based interpersonal communications service as defined in point (6) of Article 2 of Directive (EU) 2018/1972;

Or. en

Amendment 265 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 4 – paragraph 1 – point 23 d (new)

Text proposed by the Commission Amendment

(23d) ‘number-independent interpersonal communications service’ means a number-independent interpersonal communications service as defined in point (7) of Article 2 of Directive (EU) 2018/1972;

Or. en

AM\1232969EN.docx 129/176 PE693.680v01-00 EN Amendment 266 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 4 – paragraph 1 – point 25

Text proposed by the Commission Amendment

(25) ‘essential entity’ means any entity (25) ‘essential entity’ means any entity of a type referred to as an essential entity of a type referred to in Annex I and II, in Annex I; designated by the Member State as an essential entity;

Or. en

Amendment 267 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 4 – paragraph 1 – point 26

Text proposed by the Commission Amendment

(26) ‘important entity’ means any entity (26) ‘important entity’ means any entity of a type referred to as an important entity of a type referred to in Annex I and II, in Annex II. unless exempted from the scope of this Directive or designated by the Member State as an essential entity;

Or. en

Amendment 268 Thierry Mariani, Paolo Borchia, Isabella Tovaglieri

Proposal for a directive Article 4 – paragraph 1 – point 26 a (new)

Text proposed by the Commission Amendment

(26a) ‘non-critical entity’ means any entity of a type referred to in Annex I and Annex II which, regardless of its size and resources, has no critical function within

PE693.680v01-00 130/176 AM\1232969EN.docx EN a specific sector or type of service and is not highly dependent on other sectors or types of service;

Or. fr

Amendment 269 Evžen Tošenovský

Proposal for a directive Article 4 – paragraph 1 – point 26 a (new)

Text proposed by the Commission Amendment

(26a) 'service' means any activity referred to in Annexes I and II provided for essential, important or other public or private entities or consumers, including provision of electronic communication networks and manufacture;

Or. en

Amendment 270 Thierry Mariani, Paolo Borchia, Isabella Tovaglieri

Proposal for a directive Article 4 – paragraph 1 – point 26 b (new)

Text proposed by the Commission Amendment

(26b) ‘critical function' means a network and information system function of an essential or important entity in connection with which disruption to availability, integrity, authenticity and confidentiality will result in a significant failure or deterioration of the functionality of the services provided by the critical or important entity concerned;

Or. fr

AM\1232969EN.docx 131/176 PE693.680v01-00 EN Amendment 271

Proposal for a directive Article 5 – paragraph 1 – introductory part

Text proposed by the Commission Amendment

1. Each Member State shall adopt a 1. Each Member State shall adopt a national cybersecurity strategy defining the national cybersecurity strategy defining the strategic objectives and appropriate policy strategic objectives and appropriate policy and regulatory measures, with a view to and regulatory measures, with a view to achieving and maintaining a high level of achieving and maintaining a high level of cybersecurity. The national cybersecurity cybersecurity and taking into account strategy shall include, in particular, the each sector specificities in terms of cyber following: risk management and resilience. The national cybersecurity strategy shall include, in particular, the following:

Or. en

Amendment 272 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 5 – paragraph 1 – introductory part

Text proposed by the Commission Amendment

1. Each Member State shall adopt a 1. Each Member State shall adopt a national cybersecurity strategy defining the national cybersecurity strategy defining the strategic objectives and appropriate policy strategic objectives, the required and regulatory measures, with a view to technical, organisational, and financial achieving and maintaining a high level of resources to achieve those objectives, and cybersecurity. The national cybersecurity the appropriate policy and regulatory strategy shall include, in particular, the measures, with a view to achieving and following: maintaining a high level of cybersecurity. The national cybersecurity strategy shall include, in particular, the following:

Or. en

Amendment 273

PE693.680v01-00 132/176 AM\1232969EN.docx EN Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 5 – paragraph 1 – introductory part

Text proposed by the Commission Amendment

1. Each Member State shall adopt a 1. Each Member State shall adopt a national cybersecurity strategy defining the national cybersecurity strategy, a coherent strategic objectives and appropriate policy framework defining the strategic and regulatory measures, with a view to objectives and appropriate policy and achieving and maintaining a high level of regulatory measures, with a view to cybersecurity. The national cybersecurity achieving and maintaining a high level of strategy shall include, in particular, the security of network and information following: systems in that Member State. The national cybersecurity strategy shall include, in particular, the following:

Or. en

Amendment 274 François-Xavier Bellamy

Proposal for a directive Article 5 – paragraph 1 – introductory part

Text proposed by the Commission Amendment

1. Each Member State shall adopt a 1. Each Member State shall adopt a national cybersecurity strategy defining the national cybersecurity strategy defining the strategic objectives and appropriate policy strategic objectives and appropriate policy and regulatory measures, with a view to and regulatory measures, with a view to achieving and maintaining a high level of achieving and maintaining a high level of cybersecurity. The national cybersecurity cybersecurity, and strengthening the strategy shall include, in particular, the Union’s strategic autonomy. The national following: cybersecurity strategy shall include, in particular, the following:

Or. en

Amendment 275 Patrizia Toia

Proposal for a directive Article 5 – paragraph 1 – point a

AM\1232969EN.docx 133/176 PE693.680v01-00 EN Text proposed by the Commission Amendment

(a) a definition of objectives and (a) a definition of objectives and priorities of the Member States’ strategy on priorities of the Member States’ strategy on cybersecurity; cybersecurity for each sector covered by this Directive;

Or. en

Amendment 276 Thierry Mariani, Paolo Borchia, Isabella Tovaglieri

Proposal for a directive Article 5 – paragraph 1 – point b

Text proposed by the Commission Amendment

(b) a governance framework to achieve (b) a governance framework to achieve those objectives and priorities, including those objectives and priorities, including the policies referred to in paragraph 2 and the policies referred to in paragraph 2 and the roles and responsibilities of public the roles and responsibilities of public bodies and entities as well as other relevant bodies and entities as well as other relevant actors; actors, in particular those with responsibility for specific support for SMEs. The governance framework shall clearly lay down the organisational arrangements for cooperation and coordination between the national competent authorities designated under this Directive, taking account of their specific national circumstances;

Or. fr

Amendment 277 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 5 – paragraph 1 – point b

Text proposed by the Commission Amendment

PE693.680v01-00 134/176 AM\1232969EN.docx EN (b) a governance framework to achieve (b) a governance framework to achieve those objectives and priorities, including those objectives and priorities, including the policies referred to in paragraph 2 and the policies referred to in paragraph 2, and the roles and responsibilities of public an appropriate framework defining the bodies and entities as well as other relevant roles and responsibilities of public bodies actors; and entities as well as other relevant actors, underpinning the cooperation and coordination, at the national level, between the competent authorities designated under Articles 7(1) and 8(1), the single point of contact designated under Article 8(3), and the CSIRTs designated under Article 9;

Or. en

Amendment 278 Christophe Grudler, Klemen Grošelj, Sandro Gozi, Stéphanie Yon-Courtin, Valérie Hayer

Proposal for a directive Article 5 – paragraph 1 – point b

Text proposed by the Commission Amendment

(b) a governance framework to achieve (b) a governance framework to achieve those objectives and priorities, including those objectives and priorities, including the policies referred to in paragraph 2 and the policies referred to in paragraph 2; the roles and responsibilities of public bodies and entities as well as other relevant actors;

Or. en

Justification

Moved to Article 5, paragraph 1, point b a (new)

Amendment 279 Christophe Grudler, Klemen Grošelj, Nathalie Loiseau, Sandro Gozi, Stéphanie Yon- Courtin, Valérie Hayer

Proposal for a directive Article 5 – paragraph 1 – point b a (new)

AM\1232969EN.docx 135/176 PE693.680v01-00 EN Text proposed by the Commission Amendment

(ba) a framework for allocating the roles and responsibilities of public bodies and entities as well as other relevant actors, including the organisation of the cooperation at the national level, between the competent authorities designated under Article 7(1) and Article 8(1), the single point of contact designated under Article 8(3), and CSIRTs designated under Article 9;

Or. en

Justification

The organisation of the cooperation between the different actors should be clearly defined in the national cybersecurity strategy.

Amendment 280 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Article 5 – paragraph 1 – point d a (new)

Text proposed by the Commission Amendment

(da) an assessment of the general level of cybersecurity awareness amongst citizens as well as on the general level of security of consumer connected devices;

Or. en

Justification

The security is also a matter of user awareness and level of security of consumer connected devices. Consumer connected devices can be elements in DDoS attacks therefore the level of preparedness of the citizens and the devices commonly put on the market is an important indicator of risks. The reporting is linked to Article 5(2) e which requires awareness raising measures.

Amendment 281

PE693.680v01-00 136/176 AM\1232969EN.docx EN Thierry Mariani, Paolo Borchia, Isabella Tovaglieri

Proposal for a directive Article 5 – paragraph 1 – point e

Text proposed by the Commission Amendment

(e) a list of the various authorities and (e) a list of the various authorities and actors involved in the implementation of actors involved in the implementation of the national cybersecurity strategy; the national cybersecurity strategy, taking steps to establish a single cybersecurity point of contact for SMEs in order to support them in implementing specific cybersecurity measures;

Or. fr

Amendment 282 Marisa Matias, Sira Rego, Cornelia Ernst, Sandra Pereira, Giorgos Georgiou, Manuel Bompard

Proposal for a directive Article 5 – paragraph 1 – point e

Text proposed by the Commission Amendment

(e) a list of the various authorities and (e) a list of the various authorities and actors involved in the implementation of actors involved in the implementation of the national cybersecurity strategy; the national cybersecurity strategy, including trade unions and other focused on workers' protection;

Or. en

Amendment 283 Evžen Tošenovský

Proposal for a directive Article 5 – paragraph 2 – introductory part

Text proposed by the Commission Amendment

2. As part of the national 2. In the framework of the national cybersecurity strategy, Member States shall cybersecurity strategy, Member States shall in particular adopt the following policies: in particular address the following policies:

AM\1232969EN.docx 137/176 PE693.680v01-00 EN Or. en

Amendment 284 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 5 – paragraph 2 – point a a (new)

Text proposed by the Commission Amendment

(aa) guidelines addressing cybersecurity in the supply chain for ICT products and services used by entities outside the scope of this Directive, and in particular supply chain challenges faced by SMEs;

Or. en

Amendment 285 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Article 5 – paragraph 2 – point b

Text proposed by the Commission Amendment

(b) guidelines regarding the inclusion (b) guidelines regarding the inclusion and specification of cybersecurity-related and specification of cybersecurity-related requirements for ICT products and service requirements for ICT products and service in public procurement; in public procurement, including but not limited to encryption requirements and the promotion of the use of open source cybersecurity products;

Or. en

Justification

While allowing MS flexibility, some level of guidance is introduced.

PE693.680v01-00 138/176 AM\1232969EN.docx EN Amendment 286 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Article 5 – paragraph 2 – point d a (new)

Text proposed by the Commission Amendment

(da) a policy related to sustaining the use of open data and open source as part of security through transparency;

Or. en

Justification

In order to support a diverse threat mitigation landscape.

Amendment 287 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 5 – paragraph 2 – point d a (new)

Text proposed by the Commission Amendment

(da) a policy on promoting the integration of open-source tools and applications;

Or. en

Amendment 288 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 5 – paragraph 2 – point d b (new)

Text proposed by the Commission Amendment

AM\1232969EN.docx 139/176 PE693.680v01-00 EN (db) a policy to promote and support the development and integration of AI and other emerging technologies in cybersecurity-enhancing tools and applications;

Or. en

Amendment 289 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 5 – paragraph 2 – point e

Text proposed by the Commission Amendment

(e) a policy on promoting and (e) a policy on promoting and developing cybersecurity skills, awareness developing cybersecurity skills, awareness raising and research and development raising and research and development initiatives; initiatives, including targeted policies addressing issues relating to gender representation and balance in the aforementioned areas;

Or. en

Amendment 290 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 5 – paragraph 2 – point e a (new)

Text proposed by the Commission Amendment

(ea) a policy to promote cyber hygiene programmes comprising a baseline set of practices and controls;

Or. en

PE693.680v01-00 140/176 AM\1232969EN.docx EN Amendment 291 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Article 5 – paragraph 2 – point f

Text proposed by the Commission Amendment

(f) a policy on supporting academic (f) a policy on supporting education and research institutions to develop establishments, in particular academic and cybersecurity tools and secure network research institutions to develop and deploy infrastructure; cybersecurity tools and secure network infrastructure;

Or. en

Justification

Education needs special attention but also support.

Amendment 292 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Article 5 – paragraph 2 – point f

Text proposed by the Commission Amendment

(f) a policy on supporting academic (f) a policy on supporting academic and research institutions to develop and research institutions to develop and cybersecurity tools and secure network enhance cybersecurity tools and secure infrastructure; network infrastructure;

Or. en

Amendment 293 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova

Proposal for a directive Article 5 – paragraph 2 – point f a (new)

Text proposed by the Commission Amendment

AM\1232969EN.docx 141/176 PE693.680v01-00 EN (fa) a policy, including relevant procedures and governance frameworks, to support and promote the establishment of cybersecurity PPPs;

Or. en

Amendment 294 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera, Markus Pieper

Proposal for a directive Article 5 – paragraph 2 – point h

Text proposed by the Commission Amendment

(h) a policy addressing specific needs (h) a policy promoting cybersecurity of SMEs, in particular those excluded from and addressing specific needs of SMEs, in the scope of this Directive, in relation to particular those excluded from the scope of guidance and support in improving their this Directive, including guidance and resilience to cybersecurity threats. support in improving their resilience to cybersecurity threats.

Or. en

Amendment 295 Marisa Matias, Sira Rego, Cornelia Ernst, Sandra Pereira, Giorgos Georgiou, Manuel Bompard

Proposal for a directive Article 5 – paragraph 2 – point h a (new)

Text proposed by the Commission Amendment

(ha) a policy for cyber hygiene, and protection and training of workers against these new labour risks and threats.

Or. en

Amendment 296 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera, Markus Pieper

PE693.680v01-00 142/176 AM\1232969EN.docx EN Proposal for a directive Article 5 – paragraph 2 – point h a (new)

Text proposed by the Commission Amendment

(ha) a policy raising awareness for cybersecurity threats and best practices among the general population.

Or. en

Amendment 297 Marisa Matias, Sira Rego, Cornelia Ernst, Sandra Pereira, Giorgos Georgiou, Manuel Bompard

Proposal for a directive Article 5 – paragraph 2 – point h b (new)

Text proposed by the Commission Amendment

(hb) a policy for addressing awareness and security of consumers of digital services.

Or. en

Amendment 298 Marisa Matias, Sira Rego, Cornelia Ernst, Manuel Bompard

Proposal for a directive Article 5 – paragraph 2 – point h c (new)

Text proposed by the Commission Amendment

(hc) an evaluation of the proper harmonisation between this Directive and the General Date Protection Regulation.

Or. en

Amendment 299 Bart Groothuis, Klemen Grošelj, Iskra Mihaylova, Nicola Danti, Christophe Grudler,

AM\1232969EN.docx 143/176 PE693.680v01-00 EN Martina Dlabajová

Proposal for a directive Article 5 – paragraph 2 a (new)

Text proposed by the Commission Amendment

2a. A policy to help authorities build awareness and understanding of the security considerations needed to design, build, and manage connected places.

Or. en

Justification

Connected places (i.e. smart cities) and their underlying infrastructure should become more resilient against cyberattacks.

Amendment 300 Bart Groothuis, Klemen Grošelj, Iskra Mihaylova, Nicola Danti, Christophe Grudler, Martina Dlabajová

Proposal for a directive Article 5 – paragraph 2 b (new)

Text proposed by the Commission Amendment

2b. A policy specifically addressing the ransomware threat and disrupting the ransomware business model.

Or. en

Justification

Member States should raise awareness and take action to combat the rapidly increasing and evolving ransomware pandemic.

Amendment 301 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive

PE693.680v01-00 144/176 AM\1232969EN.docx EN Article 5 – paragraph 3

Text proposed by the Commission Amendment

3. Member States shall notify their 3. Member States shall notify their national cybersecurity strategies to the national cybersecurity strategies to the Commission within three months from Commission within three months from their adoption. Member States may exclude their adoption. Member States may exclude specific information from the notification specific information from the notification where and to the extent that it is strictly where and to the extent that it is necessary necessary to preserve national security. to preserve national security.

Or. en

Amendment 302 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 5 – paragraph 4

Text proposed by the Commission Amendment

4. Member States shall assess their 4. Member States shall assess their national cybersecurity strategies at least national cybersecurity strategies at least every four years on the basis of key every four years on the basis of key performance indicators and, where performance indicators and, where necessary, amend them. The European necessary, amend them. The European Union Agency for Cybersecurity (ENISA) Union Agency for Cybersecurity (ENISA) shall assist Member States, upon request, shall assist Member States, upon request, in the development of a national strategy in the development of a national strategy and of key performance indicators for the and of key performance indicators for the assessment of the strategy. assessment of the strategy. ENISA shall provide guidance to Member States in order to align their already formulated national cybersecurity strategies with the requirements and obligations set out in this Directive.

Or. en

Amendment 303 Patrizia Toia

AM\1232969EN.docx 145/176 PE693.680v01-00 EN Proposal for a directive Article 5 – paragraph 4

Text proposed by the Commission Amendment

4. Member States shall assess their 4. Member States shall assess their national cybersecurity strategies at least national cybersecurity strategies at least every four years on the basis of key every four years on the basis of key performance indicators and, where performance indicators and, where necessary, amend them. The European necessary, amend them. The European Union Agency for Cybersecurity (ENISA) Union Agency for Cybersecurity (ENISA) shall assist Member States, upon request, and the EU competent authorities for in the development of a national strategy each sector shall define guidelines to and of key performance indicators for the Member States for the development of a assessment of the strategy. national strategy and of key performance indicators for the assessment of the strategy.

Or. en

Amendment 304 Eva Maydell, Massimiliano Salini

Proposal for a directive Article 5 – paragraph 4 a (new)

Text proposed by the Commission Amendment

4a. While implementing this Directive, Member States shall enforce EU guidance in order to ensure harmonisation at EU level, also by defining a homogeneous set of cybersecurity rules for new players that could enter in the European market;

Or. en

Amendment 305 Evžen Tošenovský

Proposal for a directive Article 6 – title

Text proposed by the Commission Amendment

PE693.680v01-00 146/176 AM\1232969EN.docx EN Coordinated vulnerability disclosure and a Coordinated vulnerability disclosure and a European vulnerability registry European vulnerability database

Or. en

Amendment 306 Evžen Tošenovský

Proposal for a directive Article 6 – paragraph 1

Text proposed by the Commission Amendment

1. Each Member State shall 1. Where requested, the CVD CSIRT designate one of its CSIRTs as referred to coordinator referred to in Article 9(1a) in Article 9 as a coordinator for the shall act as a trusted intermediary, purpose of coordinated vulnerability facilitating the interaction between the disclosure. The designated CSIRT shall reporting entity and the manufacturer or act as a trusted intermediary, facilitating, provider of ICT products or ICT services. where necessary, the interaction between Where the reported vulnerability concerns the reporting entity and the manufacturer multiple manufacturers or providers of ICT or provider of ICT products or ICT products or ICT services across the Union, services. Where the reported vulnerability CVD CSIRT coordinator of each Member concerns multiple manufacturers or State concerned shall cooperate with the providers of ICT products or ICT services CSIRT network. across the Union, the designated CSIRT of each Member State concerned shall cooperate with the CSIRT network.

Or. en

Amendment 307 Thierry Mariani, Paolo Borchia, Isabella Tovaglieri

Proposal for a directive Article 6 – paragraph 2

Text proposed by the Commission Amendment

2. ENISA shall develop and maintain 2. ENISA shall develop and maintain a European vulnerability registry. To that a European vulnerability registry. To that end, ENISA shall establish and maintain end, ENISA shall establish and maintain the appropriate information systems, the appropriate information systems, policies and procedures with a view in policies and procedures with a view in particular to enabling important and particular to enabling important and

AM\1232969EN.docx 147/176 PE693.680v01-00 EN essential entities and their suppliers of essential entities and their suppliers of network and information systems to network and information systems to disclose and register vulnerabilities present disclose and register only those in ICT products or ICT services, as well as vulnerabilities present in ICT products or to provide access to the information on ICT services which can be mitigated, as vulnerabilities contained in the registry to well as to provide access to the information all interested parties. The registry shall, in on vulnerabilities contained in the registry particular, include information describing to all interested parties. The registry shall, the vulnerability, the affected ICT product in particular, include information or ICT services and the severity of the describing the vulnerability, the affected vulnerability in terms of the circumstances ICT product or ICT services, the severity under which it may be exploited, the of the vulnerability in terms of the availability of related patches and, in the circumstances under which it may be absence of available patches, guidance exploited, and related patches. In the addressed to users of vulnerable products absence of available patches, ENISA and services as to how the risks resulting should not disclose the vulnerability and from disclosed vulnerabilities may be should set manufacturers or suppliers of mitigated. ICT products or services a deadline for providing reliable mitigation. Where several actors are affected by the same vulnerability, ENISA should coordinate the mitigation patch installation schedule.

Or. fr

Amendment 308 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Article 6 – paragraph 2

Text proposed by the Commission Amendment

2. ENISA shall develop and maintain 2. ENISA shall develop and maintain a European vulnerability registry. To that a European vulnerability registry. To that end, ENISA shall establish and maintain end, ENISA shall establish and maintain the appropriate information systems, the appropriate information systems, policies and procedures with a view in policies and procedures with a view in particular to enabling important and particular to enabling important and essential entities and their suppliers of essential entities and their suppliers of network and information systems to network and information systems to disclose and register vulnerabilities present disclose and register only those in ICT products or ICT services, as well as vulnerabilities present in ICT products or to provide access to the information on ICT services that have a mitigation vulnerabilities contained in the registry to available , as well as to provide access to all interested parties. The registry shall, in the information on vulnerabilities particular, include information describing contained in the registry to all interested

PE693.680v01-00 148/176 AM\1232969EN.docx EN the vulnerability, the affected ICT product parties. The registry shall, in particular, or ICT services and the severity of the include information describing the vulnerability in terms of the circumstances vulnerability, the affected ICT product or under which it may be exploited, the ICT services and the severity of the availability of related patches and, in the vulnerability in terms of the circumstances absence of available patches, guidance under which it may be exploited, the addressed to users of vulnerable products availability of related patches and, in the and services as to how the risks resulting absence of available patches, guidance from disclosed vulnerabilities may be addressed to users of vulnerable products mitigated. and services as to how the risks resulting from disclosed vulnerabilities may be mitigated. When several users are affected by the same vulnerability, ENISA should coordinate the schedule of the installation of the mitigation patches.

Or. en

Amendment 309 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Article 6 – paragraph 2

Text proposed by the Commission Amendment

2. ENISA shall develop and maintain 2. ENISA shall develop and maintain a European vulnerability registry. To that a European vulnerability registry. To that end, ENISA shall establish and maintain end, ENISA shall establish and maintain the appropriate information systems, the appropriate information systems, policies and procedures with a view in policies and procedures with a view in particular to enabling important and particular to enabling important and essential entities and their suppliers of essential entities and their suppliers of network and information systems to network and information systems to disclose and register vulnerabilities present disclose and register vulnerabilities present in ICT products or ICT services, as well as in ICT products or ICT services, as well as to provide access to the information on to provide access to the information on vulnerabilities contained in the registry to vulnerabilities contained in the registry to all interested parties. The registry shall, in all interested parties. The registry shall, in particular, include information describing particular, include information describing the vulnerability, the affected ICT product the vulnerability, the affected ICT product or ICT services and the severity of the or ICT services and the severity of the vulnerability in terms of the circumstances vulnerability in terms of the circumstances under which it may be exploited, the under which it may be exploited, the availability of related patches and, in the availability of related patches and, in the absence of available patches, guidance absence of available patches, guidance

AM\1232969EN.docx 149/176 PE693.680v01-00 EN addressed to users of vulnerable products addressed to users of vulnerable products and services as to how the risks resulting and services as to how the risks resulting from disclosed vulnerabilities may be from disclosed vulnerabilities may be mitigated. mitigated. For ensuring security and accessibility of information, state of the art cybersecurity measures shall be accompanied by machine-readable datasets and corresponding interfaces (APIs).

Or. en

Justification

Due to the need to ensure fast reaction times, automatisation needs to be favoured.

Amendment 310 François-Xavier Bellamy

Proposal for a directive Article 6 – paragraph 2

Text proposed by the Commission Amendment

2. ENISA shall develop and maintain 2. ENISA shall develop and maintain a European vulnerability registry. To that a European vulnerability registry. To that end, ENISA shall establish and maintain end, ENISA shall establish and maintain the appropriate information systems, the appropriate information systems, policies and procedures with a view in policies and procedures with a view in particular to enabling important and particular to enabling important and essential entities and their suppliers of essential entities and their suppliers of network and information systems to network and information systems to disclose and register vulnerabilities present disclose and register vulnerabilities present in ICT products or ICT services, as well as in ICT products or ICT services, as well as to provide access to the information on to provide access to the information on vulnerabilities contained in the registry to vulnerabilities contained in the registry to all interested parties. The registry shall, in all interested parties. The registry shall, in particular, include information describing particular, include information describing the vulnerability, the affected ICT product the vulnerability, the affected ICT product or ICT services and the severity of the or ICT services and the severity of the vulnerability in terms of the circumstances vulnerability in terms of the circumstances under which it may be exploited, the under which it may be exploited, the availability of related patches and, in the availability of related patches and, in the absence of available patches, guidance absence of available patches, ENISA addressed to users of vulnerable products should not disclose the vulnerability and and services as to how the risks resulting impose a deadline to manufacturers or from disclosed vulnerabilities may be providers of ICT products or ICT services

PE693.680v01-00 150/176 AM\1232969EN.docx EN mitigated. to provide a reliable mitigation. When several players are affected by the same vulnerability, ENISA should coordinate the schedule of the installation of the mitigation patches.

Or. en

Amendment 311 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 6 – paragraph 2

Text proposed by the Commission Amendment

2. ENISA shall develop and maintain 2. ENISA shall develop and maintain a European vulnerability registry. To that a European vulnerability registry. To that end, ENISA shall establish and maintain end, ENISA shall establish and maintain the appropriate information systems, the appropriate information systems, policies and procedures with a view in policies and procedures, and the necessary particular to enabling important and technical and organisational measures to essential entities and their suppliers of ensure the security and integrity of the network and information systems to registry, with a view in particular to disclose and register vulnerabilities present enabling important and essential entities in ICT products or ICT services, as well as and their suppliers of network and to provide access to the information on information systems, as well as entities vulnerabilities contained in the registry to excluded from the scope of this Directive, all interested parties. The registry shall, in and their suppliers, to disclose and register particular, include information describing vulnerabilities present in ICT products or the vulnerability, the affected ICT product ICT services, as well as to provide access or ICT services and the severity of the to the information on vulnerabilities vulnerability in terms of the circumstances contained in the registry to all interested under which it may be exploited, the parties, enabling all parties and in availability of related patches and, in the particular, the users of the ICT products absence of available patches, guidance or ICT services concerned to adopt addressed to users of vulnerable products appropriate mitigating measures. The and services as to how the risks resulting registry shall, in particular, include from disclosed vulnerabilities may be information describing the vulnerability, mitigated. the affected ICT product or ICT services and the severity of the vulnerability in terms of the circumstances under which it may be exploited, and the availability of related patches.

AM\1232969EN.docx 151/176 PE693.680v01-00 EN Or. en

Justification

ENISA to adopt the required policies and controls to ensure the security and integrity of the coordinated vulnerability registry.

Amendment 312 Evžen Tošenovský

Proposal for a directive Article 6 – paragraph 2

Text proposed by the Commission Amendment

2. ENISA shall develop and maintain 2. ENISA shall develop and maintain a European vulnerability registry. To that a European vulnerability database end, ENISA shall establish and maintain leveraging the global Common the appropriate information systems, Vulnerabilities and Exposures (CVE) policies and procedures with a view in registry. To that end, ENISA shall establish particular to enabling important and and maintain the appropriate information essential entities and their suppliers of systems, policies and procedures with a network and information systems to view in particular to enabling important disclose and register vulnerabilities present and essential entities and their suppliers of in ICT products or ICT services, as well as network and information systems to to provide access to the information on voluntarily disclose and register vulnerabilities contained in the registry to vulnerabilities present in ICT products or all interested parties. The registry shall, in ICT services, as well as to provide access particular, include information describing to the information on vulnerabilities the vulnerability, the affected ICT product contained in the database to all interested or ICT services and the severity of the parties. The database shall, in particular, vulnerability in terms of the circumstances include information describing the under which it may be exploited, the vulnerability, the affected ICT product or availability of related patches and, in the ICT services and the severity of the absence of available patches, guidance vulnerability in terms of the circumstances addressed to users of vulnerable products under which it may be exploited, the and services as to how the risks resulting availability of related patches and, in the from disclosed vulnerabilities may be absence of available patches, guidance mitigated. addressed to users of vulnerable products and services as to how the risks resulting from disclosed vulnerabilities may be mitigated.

Or. en

PE693.680v01-00 152/176 AM\1232969EN.docx EN Amendment 313 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Article 6 – paragraph 2 a (new)

Text proposed by the Commission Amendment

2a. ENISA shall establish a structured cooperation agreements with Common Vulnerability and Exposure registry or other similar registries.

Or. en

Amendment 314 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 7 – paragraph 1 a (new)

Text proposed by the Commission Amendment

1a. Where a Member State designates more than one competent authorities referred to in paragraph1, it should clearly indicate which of these competent authorities shall serve as the main point of contact for the management of large- scale incidents and crises.

Or. en

Amendment 315 Evžen Tošenovský

Proposal for a directive Article 7 – paragraph 3 – introductory part

Text proposed by the Commission Amendment

3. Each Member State shall adopt a 3. Each Member State shall adopt a national cybersecurity incident and crisis national cybersecurity incident and crisis

AM\1232969EN.docx 153/176 PE693.680v01-00 EN response plan where objectives and response plan where objectives and modalities in the management of large- modalities in the management of large- scale cybersecurity incidents and crises are scale cybersecurity incidents and crises are set out. The plan shall lay down, in set out. Member States shall consider particular, the following: inclusion in the plan in particular of the following points:

Or. en

Amendment 316 Evžen Tošenovský

Proposal for a directive Article 7 – paragraph 4

Text proposed by the Commission Amendment

4. Member States shall communicate 4. Member States shall communicate to the Commission the designation of their to the EU-CyCLONe and the Commission competent authorities referred to in the designation of their competent paragraph 1 and submit their national authorities referred to in paragraph 1 and cybersecurity incident and crisis response submit their national cybersecurity incident plans as referred to in paragraph 3 within and crisis response plans as referred to in three months from that designation and the paragraph 3 within three months from that adoption of those plans. Member States designation and the adoption of those plans may exclude specific information from the to the EU-CyCLONe. Member States may plan where and to the extent that it is exclude specific information from the plan strictly necessary for their national where and to the extent that it is strictly security. necessary for their national security.

Or. en

Amendment 317 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera, Markus Pieper

Proposal for a directive Article 8 – paragraph 2 a (new)

Text proposed by the Commission Amendment

2a. Member States shall ensure that the competent authorities designated pursuant to paragraph 1 cooperate with competent authorities designated

PE693.680v01-00 154/176 AM\1232969EN.docx EN pursuant to Article 8 of (CER Directive) for the purposes of information sharing on incidents and cyber threats and the exercise of supervisory tasks.

Or. en

Amendment 318 Evžen Tošenovský

Proposal for a directive Article 8 – paragraph 3

Text proposed by the Commission Amendment

3. Each Member State shall designate 3. Each Member State shall designate one national single point of contact on one of the competent authorities referred cybersecurity (‘single point of contact’). to in paragraph 1 as a national single Where a Member State designates only one point of contact on cybersecurity (‘single competent authority, that competent point of contact’). Where a Member State authority shall also be the single point of designates only one competent authority, contact for that Member State. that competent authority shall also be the single point of contact for that Member State.

Or. en

Amendment 319 Evžen Tošenovský

Proposal for a directive Article 9 – paragraph 1 a (new)

Text proposed by the Commission Amendment

1a. Each Member State shall designate one of its CSIRTs referred to in paragraph 1 as a coordinator for the purpose of coordinated vulnerability disclosure pursuant to Article 6(1) (‘CVD CSIRT coordinator’). Where a Member State designates only one CSIRT, that CSIRT shall also be the CVD CSIRT coordinator for that Member State.

AM\1232969EN.docx 155/176 PE693.680v01-00 EN Or. en

Amendment 320 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 9 – paragraph 2

Text proposed by the Commission Amendment

2. Member States shall ensure that 2. Member States shall ensure that each CSIRT has adequate resources to each CSIRT has adequate resources and carry out effectively their tasks as set out in the technical capabilities necessary to Article 10(2). carry out effectively their tasks as set out in Article 10(3).

Or. en

Justification

Proposed amendments in Article 10 in accordance with requirements, technical capabilities to perform tasks, and tasks for CSIRTs.

Amendment 321 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 9 – paragraph 5

Text proposed by the Commission Amendment

5. CSIRTs shall participate in peer deleted reviews organised in accordance with Article 16.

Or. en

Amendment 322 Seán Kelly

Proposal for a directive

PE693.680v01-00 156/176 AM\1232969EN.docx EN Article 9 – paragraph 6 a (new)

Text proposed by the Commission Amendment

6a. The Union may conclude international agreements, in accordance with Article 218 TFEU, with third countries or international organisations, allowing and organising their participation in some activities of the Cooperation Group, the CSIRTs Network and the European cyber crises liaison organisation network. Such agreements shall take into account the need to ensure adequate protection of data.

Or. en

Justification

This Article would enable continued co-operation with the UK, post-Brexit which is reliant on that article for UK’s interaction with the Cooperation Group under the Cyber Security provisions of the EU-UK Trade and Cooperation Agreement.

Amendment 323 Seán Kelly

Proposal for a directive Article 9 – paragraph 6 b (new)

Text proposed by the Commission Amendment

6b. Member States may cooperate with particular third countries as a means to meeting the provisions in this Directive on management of vulnerabilities, peer reviews, cyber security risk management, reporting measures and information sharing arrangements.

Or. en

Justification

This Article would allow specific Member States to avail of long standing links with particular third countries (i.e. UK and US) as a way of complying with the obligations in the Directive.

AM\1232969EN.docx 157/176 PE693.680v01-00 EN Amendment 324 Evžen Tošenovský

Proposal for a directive Article 9 – paragraph 7

Text proposed by the Commission Amendment

7. Member States shall communicate 7. Member States shall communicate to the Commission without undue delay the to the Commission without undue delay the CSIRTs designated in accordance with CSIRTs designated in accordance with paragraph 1, the CSIRT coordinator paragraph 1 and their respective tasks designated in accordance with Article 6(1) provided in relation to the entities referred and their respective tasks provided in to in Annexes I and II, and the CVD relation to the entities referred to in CSIRT coordinator designated in Annexes I and II. accordance with paragraph 1a of this Article.

Or. en

Amendment 325 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 10 – paragraph 1 – point c

Text proposed by the Commission Amendment

(c) CSIRTs shall be equipped with an (c) CSIRTs shall be equipped with an appropriate system for managing and appropriate system for classifying, routing, routing requests, in particular, to facilitate and tracking requests, in particular, to effective and efficient handovers; facilitate effective and efficient handovers;

Or. en

Amendment 326 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive

PE693.680v01-00 158/176 AM\1232969EN.docx EN Article 10 – paragraph 1 – point c a (new)

Text proposed by the Commission Amendment

(ca) CSIRTs shall have appropriate codes of conduct in place to ensure the confidentiality and trustworthiness of their operations;

Or. en

Justification

Codes of conduct to govern the confidentiality of CSIRT operations, underpinning the interactions and work methods of CSIRT staff to ensure the security, integrity and trustworthiness of task-related information.

Amendment 327 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 10 – paragraph 1 – point e

Text proposed by the Commission Amendment

(e) CSIRTs shall be equipped with (e) CSIRTs shall be equipped with redundant systems and backup working redundant systems and backup working space to ensure continuity of its services; space to ensure continuity of its services, including full-spectrum connectivity across networks, information systems and services, and devices;

Or. en

Amendment 328 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 10 – paragraph 1 – point e a (new)

AM\1232969EN.docx 159/176 PE693.680v01-00 EN Text proposed by the Commission Amendment

(ea) CSIRTs shall have appropriate descriptions of the skillsets required by staff to meet the technical capabilities necessary to perform assigned tasks;

Or. en

Justification

Appropriate descriptions of skillsets can clarify task description and refine technical requirements for the sourcing and training of staff to develop the right skills for the tasks assigned to the CSIRT.

Amendment 329 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 10 – paragraph 1 – point e b (new)

Text proposed by the Commission Amendment

(eb) CSIRTs shall have appropriate internal training frameworks and, where suitable, relevant policies to support external technical training of staff in order to reinforce a culture of continuous improvement;

Or. en

Amendment 330 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 10 – paragraph 1 a (new)

Text proposed by the Commission Amendment

1a. CSIRTs shall develop the

PE693.680v01-00 160/176 AM\1232969EN.docx EN following technical capabilities to perform their tasks: (a) The ability to conduct real-time monitoring of networks and information systems, and anomaly detection; (b) The ability to support penetration prevention operations including, in particular, the detection and analysis of sophisticated cyber threats; (c) The ability to collect and conduct complex forensic data analysis, and reverse engineering of cyber threats; (d) The ability to filter harmful communication content including, but not limited to, malicious e-mails; (e) The ability to protect data, including personal and sensitive data, from unauthorised exfiltration; (f) The ability to enforce strong authentication and access privileges; (g) The ability to analyse and attribute cyber threats.

Or. en

Justification

Commission’s proposal expands CSIRTs’ requirements and tasks however, in order to support CSIRTs in reaching the required maturity levels to perform the assigned tasks, it is more appropriate to describe the technical capabilities that CSIRTs need to develop. This approach takes account of CSIRTs with divergent maturity levels, rather than directly assigning those tasks to them, thus avoiding any risks of failure for CSIRTs with limited resources and decreased maturity levels.

Amendment 331 Eva Maydell, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera, Markus Pieper

Proposal for a directive Article 10 – paragraph 2 – point d a (new)

Text proposed by the Commission Amendment

(da) acquiring real time threat

AM\1232969EN.docx 161/176 PE693.680v01-00 EN intelligence and sharing the information among public and private entities based on interoperable solutions.

Or. en

Amendment 332 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Article 10 – paragraph 2 – point e

Text proposed by the Commission Amendment

(e) providing, upon request of an (e) providing, upon a specific request entity, a proactive scanning of the network of an entity, scanning of the network and and information systems used for the information systems used for the provision provision of their services; of their services in order to identify, mitigate or prevent specific and exceptional network and information security threats, in full respect of Regulation 2016/679;

Or. en

Justification

Clarification needed both on the target of such scans and the limitations of the activity.

Amendment 333 Thierry Mariani, Paolo Borchia, Isabella Tovaglieri

Proposal for a directive Article 10 – paragraph 2 – point f a (new)

Text proposed by the Commission Amendment

(fa) providing practical and operational guidance for essential and important entities in connection with cybersecurity response and prevention activities, including, in particular, dedicated technical support for SMEs;

PE693.680v01-00 162/176 AM\1232969EN.docx EN Or. fr

Amendment 334 Eva Maydell, Markus Pieper, Franc Bogovič, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Article 10 – paragraph 2 – point f a (new)

Text proposed by the Commission Amendment

(fa) contributing to the deployment of secure information sharing tools pursuant to Article 9(3) of this Directive.

Or. en

Amendment 335 Evžen Tošenovský

Proposal for a directive Article 10 – paragraph 3

Text proposed by the Commission Amendment

3. CSIRTs shall establish cooperation 3. CSIRTs shall establish cooperation relationships with relevant actors in the relationships with relevant entities, private sector, with a view to better industry and other relevant actors in the achieving the objectives of the Directive. private sector, with a view to better achieving the objectives of the Directive.

Or. en

Amendment 336 Evžen Tošenovský

Proposal for a directive Article 11 – paragraph 2

Text proposed by the Commission Amendment

2. Member States shall ensure that 2. Member States shall ensure their either their competent authorities or their competent authorities and their CSIRTs

AM\1232969EN.docx 163/176 PE693.680v01-00 EN CSIRTs receive notifications on incidents, receive notifications on significant and significant cyber threats and near incidents, significant cyber threats and misses submitted pursuant to this significant near misses submitted pursuant Directive. Where a Member State decides to Articles 20 and 27 of this Directive via that its CSIRTs shall not receive those the single entry point referred to in Article notifications, the CSIRTs shall, to the 20(3a). extent necessary to carry out their tasks, be granted access to data on incidents notified by the essential or important entities, pursuant to Article 20.

Or. en

Amendment 337 Evžen Tošenovský

Proposal for a directive Article 11 – paragraph 3

Text proposed by the Commission Amendment

3. Each Member State shall ensure 3. Each Member State shall ensure that its competent authorities or CSIRTs that its competent authorities or CSIRTs inform its single point of contact of inform its single point of contact and other notifications on incidents, significant cyber relevant authorities in accordance with threats and near misses submitted pursuant Article 20 of notifications on significant to this Directive. incidents, significant cyber threats and significant near misses.

Or. en

Amendment 338 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 11 – paragraph 4

Text proposed by the Commission Amendment

4. To the extent necessary to 4. To the extent necessary to effectively carry out the tasks and effectively carry out the tasks and obligations laid down in this Directive, obligations laid down in this Directive, Member States shall ensure appropriate including supervision and enforcement, cooperation between the competent Member States shall ensure appropriate authorities and single points of contact and cooperation between the competent

PE693.680v01-00 164/176 AM\1232969EN.docx EN law enforcement authorities, data authorities, single points of contact, protection authorities, and the authorities CSIRTs and law enforcement authorities, responsible for critical infrastructure national regulatory authorities or other pursuant to Directive (EU) XXXX/XXXX competent authorities responsible for [Resilience of Critical Entities Directive] public electronic communications and the national financial authorities networks or for publicly available designated in accordance with Regulation electronic communications services (EU) XXXX/XXXX of the European pursuant to Directive (EU) 2018/1972, Parliament and of the Council39 [the data protection authorities, the authorities DORA Regulation] within that Member responsible for critical infrastructure State. pursuant to Directive (EU) XXXX/XXXX [Resilience of Critical Entities Directive] and the national financial authorities designated in accordance with Regulation (EU) XXXX/XXXX of the European Parliament and of the Council39 [the DORA Regulation] within that Member State. ______39 [insert the full title and OJ publication 39 [insert the full title and OJ publication reference when known] reference when known]

Or. en

Amendment 339 Evžen Tošenovský

Proposal for a directive Article 11 – paragraph 4 a (new)

Text proposed by the Commission Amendment

4a. Where relevant to the extent necessary to effectively carry out the tasks and obligations laid down in this Directive, Member States shall ensure appropriate cooperation with other relevant stakeholders, such as CSIRTs other than those referred to in Article 9(1), CERTs and SOCs.

Or. en

Amendment 340

AM\1232969EN.docx 165/176 PE693.680v01-00 EN Evžen Tošenovský

Proposal for a directive Article 11 – paragraph 5

Text proposed by the Commission Amendment

5. Member States shall ensure that deleted their competent authorities regularly provide information to competent authorities designated pursuant to Directive (EU) XXXX/XXXX [Resilience of Critical Entities Directive] on cybersecurity risks, cyber threats and incidents affecting essential entities identified as critical, or as entities equivalent to critical entities, pursuant to Directive (EU) XXXX/XXXX [Resilience of Critical Entities Directive], as well as the measures taken by competent authorities in response to those risks and incidents.

Or. en

Amendment 341 Evžen Tošenovský

Proposal for a directive Article 12 – paragraph 3 – subparagraph 1

Text proposed by the Commission Amendment

The Cooperation Group shall be composed The Cooperation Group shall be composed of representatives of Member States, the of representatives of Member States Commission and ENISA. The European nominated by the single point of contact, External Action Service shall participate in the Commission and ENISA. The the activities of the Cooperation Group as European External Action Service shall an observer. The European Supervisory participate in the activities of the Authorities (ESAs) in accordance with Cooperation Group as an observer. The Article 17(5)(c) of Regulation (EU) European Supervisory Authorities (ESAs) XXXX/XXXX [the DORA Regulation] in accordance with Article 17(5)(c) of may participate in the activities of the Regulation (EU) XXXX/XXXX [the Cooperation Group. DORA Regulation] may participate in the activities of the Cooperation Group. Where appropriate, the Cooperation Group may invite representatives of relevant

PE693.680v01-00 166/176 AM\1232969EN.docx EN stakeholders, particularly representatives of industry, to participate in its work.

Or. en

Amendment 342 Rasmus Andresen on behalf of the Greens/EFA Group

Proposal for a directive Article 12 – paragraph 3 – subparagraph 1

Text proposed by the Commission Amendment

The Cooperation Group shall be composed The Cooperation Group shall be composed of representatives of Member States, the of representatives of Member States, the Commission and ENISA. The European Commission, ENISA and EDPB. The External Action Service shall participate in European External Action Service shall the activities of the Cooperation Group as participate in the activities of the an observer. The European Supervisory Cooperation Group as an observer. The Authorities (ESAs) in accordance with European Supervisory Authorities (ESAs) Article 17(5)(c) of Regulation (EU) in accordance with Article 17(5)(c) of XXXX/XXXX [the DORA Regulation] Regulation (EU) XXXX/XXXX [the may participate in the activities of the DORA Regulation] may participate in the Cooperation Group. activities of the Cooperation Group.

Or. en

Justification

As many of the security incidents result in consequences on personal data it is essential that EDPB is a permanent member.

Amendment 343 Eva Maydell, Franc Bogovič, Markus Pieper, Angelika Niebler, Ivan Štefanec, Pilar del Castillo Vera

Proposal for a directive Article 12 – paragraph 3 – subparagraph 2

Text proposed by the Commission Amendment

Where appropriate, the Cooperation Group Where appropriate, the Cooperation Group may invite representatives of relevant may invite representatives of relevant stakeholders to participate in its work. industry stakeholders covered by this

AM\1232969EN.docx 167/176 PE693.680v01-00 EN Directive to participate in its work.

Or. en

Amendment 344 Thierry Mariani, Paolo Borchia, Isabella Tovaglieri

Proposal for a directive Article 12 – paragraph 3 – subparagraph 2

Text proposed by the Commission Amendment

Where appropriate, the Cooperation Group The Cooperation Group shall invite may invite representatives of relevant representatives of relevant industrial stakeholders to participate in its work. stakeholders, including SMEs, to participate in its work.

Or. fr

Amendment 345 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 12 – paragraph 4 – point b

Text proposed by the Commission Amendment

(b) exchanging best practices and (b) exchanging best practices and information in relation to the information in relation to the implementation of this Directive, including implementation of this Directive, including in relation to cyber threats, incidents, in relation to identification of essential vulnerabilities, near misses, awareness- and important entities, cyber threats, raising initiatives, trainings, exercises and incidents, vulnerabilities, near misses, skills, building capacity as well as awareness-raising initiatives, trainings, standards and technical specifications; exercises and skills, capacity building as well as standards and technical specifications;

Or. en

Amendment 346 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

PE693.680v01-00 168/176 AM\1232969EN.docx EN Proposal for a directive Article 12 – paragraph 4 – point d

Text proposed by the Commission Amendment

(d) exchanging advice and cooperating (d) exchanging advice and cooperating with the Commission on draft Commission with the Commission on draft Commission implementing or delegated acts adopted implementing acts adopted pursuant to this pursuant to this Directive; Directive;

Or. en

Amendment 347 Christophe Grudler, Klemen Grošelj, Nathalie Loiseau, Sandro Gozi, Stéphanie Yon- Courtin, Valérie Hayer

Proposal for a directive Article 12 – paragraph 4 – point d a (new)

Text proposed by the Commission Amendment

(da) provide advice on the overall consistency of sector-specific cybersecurity requirements;

Or. en

Justification

The Cooperation Group should exchange with ENISA in order to maintain coherence in the different requirements in a specific sector.

Amendment 348 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 12 – paragraph 4 – point f

Text proposed by the Commission Amendment

(f) discussing reports on the peer deleted review referred to in Article 16(7);

Or. en

AM\1232969EN.docx 169/176 PE693.680v01-00 EN Amendment 349 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 12 – paragraph 4 – point f a (new)

Text proposed by the Commission Amendment

(fa) carrying out coordinated security risk assessments pursuant to Article 19(1), where applicable;

Or. en

Amendment 350 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 12 – paragraph 4 – point k a (new)

Text proposed by the Commission Amendment

(ka) submitting to the Commission for the purpose of review referred to in Article 35 the reports on the experience gained at a strategic and operational level;

Or. en

Amendment 351 Bart Groothuis, Klemen Grošelj, Iskra Mihaylova, Nicola Danti, Christophe Grudler

Proposal for a directive Article 12 – paragraph 4 – point k a (new)

Text proposed by the Commission Amendment

(ka) providing a yearly assessment in cooperation with ENISA on which Nation States are harbouring ransomware criminals.

PE693.680v01-00 170/176 AM\1232969EN.docx EN Or. en

Justification

Harbouring ransomware criminals should not be left unaddressed and should come with a cost. The assessment should be followed up with concrete policy.

Amendment 352 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 13 – paragraph 3 – point a a (new)

Text proposed by the Commission Amendment

(aa) facilitating the transfer of technology and relevant measures, policies and frameworks among the CSIRTs;

Or. en

Justification

CSIRTs network can be an appropriate platform not only for the exchange of information relating to cybersecurity policies, practices, and controls, but also for the transfer of technology and technical expertise from more mature to less mature CSIRTs.

Amendment 353 Eva Kaili, Dan Nica, Łukasz Kohut, Ivo Hristov, Carlos Zorrinho, Marina Kaljurand, Maria-Manuel Leitão-Marques, Romana Jerković, Tsvetelina Penkova, Lina Gálvez Muñoz

Proposal for a directive Article 13 – paragraph 3 – point g – point v

Text proposed by the Commission Amendment

(v) contribution to the national (v) contribution to the national cybersecurity incident and crisis response cybersecurity incident and crisis response plan referred to in Article 7 (3); plan referred to in Article 7 (4);

Or. en

AM\1232969EN.docx 171/176 PE693.680v01-00 EN Justification

Consistency with amended text of the Directive.

Amendment 354 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 13 – paragraph 3 – point l

Text proposed by the Commission Amendment

(l) discussing the peer-review reports deleted referred to in Article 16(7);

Or. en

Amendment 355 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 13 – paragraph 4

Text proposed by the Commission Amendment

4. For the purpose of the review 4. For the purpose of the review referred to in Article 35 and by 24 referred to in Article 35 and by 24 months months after the date of entry into force of after the date of entry into force of this this Directive, and every two years Directive, and every two years thereafter, thereafter, the CSIRTs network shall assess the CSIRTs network shall assess the the progress made with the operational progress made with the operational cooperation and produce a report. The cooperation and produce a report. That report shall, in particular, draw report shall also be submitted to the conclusions on the outcomes of the peer Cooperation Group. reviews referred to in Article 16 carried out in relation to national CSIRTs, including conclusions and recommendations, pursued under this Article. That report shall also be submitted to the Cooperation Group.

Or. en

PE693.680v01-00 172/176 AM\1232969EN.docx EN Amendment 356 Zdzisław Krasnodębski, Evžen Tošenovský, Izabela-Helena Kloc, Elżbieta Kruk

Proposal for a directive Article 14 – paragraph 1

Text proposed by the Commission Amendment

1. In order to support the coordinated 1. In order to support the coordinated management of large-scale cybersecurity management of large-scale cybersecurity incidents and crises at operational level and incidents and crises at operational level and to ensure the regular exchange of to ensure the regular exchange of information among Member States and information among Member States and Union institutions, bodies and agencies, the Union institutions, bodies and agencies European Cyber Crises Liaison considering such incidents and crises, the Organisation Network (EU - CyCLONe) is European Cyber Crises Liaison hereby established. Organisation Network (EU - CyCLONe) is hereby established.

Or. en

Justification

It should be clear from the wording of Article 14 that the CyCLONe is only for cases of large – scale cybersecurity incidents and crises (as it results from the Blueprint) and that exchange of information in the framework of the CyCLONe only considers such incidents and crises. It essential that CYCLOne fits into the existing institutional framework and there is no duplication of task especially with NIS CG and CSIRT Network.

Amendment 357 Evžen Tošenovský, Zdzisław Krasnodębski, Izabela-Helena Kloc

Proposal for a directive Article 14 – paragraph 2

Text proposed by the Commission Amendment

2. EU-CyCLONe shall be composed 2. EU-CyCLONe shall be composed of the representatives of Member States’ of the representatives of Member States’ crisis management authorities designated crisis management authorities designated in accordance with Article 7, the in accordance with Article 7 and ENISA. Commission and ENISA. ENISA shall Commission shall participate in the EU- provide the secretariat of the network and CyCLONe as an observer. ENISA shall support the secure exchange of provide the secretariat of the network and information. support the secure exchange of information.

AM\1232969EN.docx 173/176 PE693.680v01-00 EN Or. en

Amendment 358 Zdzisław Krasnodębski, Evžen Tošenovský, Izabela-Helena Kloc, Elżbieta Kruk

Proposal for a directive Article 14 – paragraph 3 – introductory part

Text proposed by the Commission Amendment

3. EU-CyCLONe shall have the 3. EU-CyCLONe, while avoiding any following tasks: duplication of tasks with the CSIRT Network, shall have the following tasks:

Or. en

Justification

It essential that CYCLOne fits into the existing institutional framework and there is no duplication of task especially with NIS CG and CSIRT Network.

Amendment 359 Zdzisław Krasnodębski, Evžen Tošenovský, Izabela-Helena Kloc, Elżbieta Kruk

Proposal for a directive Article 14 – paragraph 3 – point b

Text proposed by the Commission Amendment

(b) developing a shared situational deleted awareness of relevant cybersecurity events;

Or. en

Justification

It is the CSIRTs Network task to exchange information (including technical details) on incidents, near misses, cyber threats, risks, vulnerabilities and trends and the CG to facilitate the strategic cooperation and exchange of information.

Amendment 360 Zdzisław Krasnodębski, Evžen Tošenovský, Izabela-Helena Kloc, Elżbieta Kruk

PE693.680v01-00 174/176 AM\1232969EN.docx EN Proposal for a directive Article 14 – paragraph 3 – point d

Text proposed by the Commission Amendment

(d) discussing national cybersecurity deleted incident and response plans referred to in Article 7(2).

Or. en

Amendment 361 Evžen Tošenovský

Proposal for a directive Article 14 – paragraph 3 – point d

Text proposed by the Commission Amendment

(d) discussing national cybersecurity deleted incident and response plans referred to in Article 7(2).

Or. en

Amendment 362 Zdzisław Krasnodębski, Evžen Tošenovský, Izabela-Helena Kloc, Elżbieta Kruk

Proposal for a directive Article 14 – paragraph 5

Text proposed by the Commission Amendment

5. EU-CyCLONe shall regularly 5. EU-CyCLONe shall regularly report to the Cooperation Group on cyber report to the Cooperation Group on large threats, incidents and trends, focusing in scale incidents and crises, focusing in particular on their impact on essential and particular on their impact on essential and important entities. important entities.

Or. en

Justification

The scope of reporting is too wide and overlaps with the tasks of CSIRTs Network and CG. Moreover, this also overlaps with tasks of ENISA. The CyCLONe should focus on large-scale

AM\1232969EN.docx 175/176 PE693.680v01-00 EN incidents and crises.

PE693.680v01-00 176/176 AM\1232969EN.docx EN