Explore European Union Legislation by Asking a Legal Question
assisted-checkbox
filter-instruction-1
positive-filters
negative-filters
act-filter tabs-all
parameters-title
query
assisted-checkbox: ✅
result-title
total 2
Council Regulation (EC) No 515/97 of 13 March 1997 on mutual assistance between the administrative authorities of the Member States and cooperation between the latter and the Commission to ensure the correct application of the law on customs and agricultural matters article 38 CELEX: 01997R0515-20210101 1. All appropriate technical and organizational measures necessary to maintain security shall be taken: (a) by the Member States and the Commission, each insofar as it concerns them, in respect of the terminals of the CIS located on their respective territories and in the Commission's offices; ————— (c) by the Commission for the Community elements of the common communication network. |
Council Regulation (EC) No 515/97 of 13 March 1997 on mutual assistance between the administrative authorities of the Member States and cooperation between the latter and the Commission to ensure the correct application of the law on customs and agricultural matters article 38 CELEX: 01997R0515-20210101 2. In particular, both the Member States and the Commission shall take measures: (a) to prevent any unauthorised person from having access to installations used for the processing of data; (b) to prevent data and data media from being read, copied, modified or deleted by unauthorised persons; (c) to prevent the unauthorised entry of data and any unauthorised consultation, modification or deletion of data; (d) to prevent data in the CIS from being accessed by unauthorised persons by means of data-transmission equipment; (e) to guarantee that, with respect to the use of the CIS, authorised persons have right of access only to data for which they have competence; (f) to guarantee that it is possible to check and establish to which authorities data may be transmitted by data-transmission equipment; (g) to guarantee that it is possible to check and establish ex post facto what data have been introduced into the CIS, when and by whom, and to monitor interrogation; (h) to prevent the unauthorised reading, copying, modification or deletion of data during the transmission of data and the transport of data media.
————— |