{"id":1654,"date":"2006-05-04T00:00:00","date_gmt":"2006-05-04T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/04\/survey-on-industry-measures-taken-to-comply-with-national-measures\/"},"modified":"2021-12-30T11:39:45","modified_gmt":"2021-12-30T11:39:45","slug":"survey-on-industry-measures-taken-to-comply-with-national-measures","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/04\/survey-on-industry-measures-taken-to-comply-with-national-measures\/","title":{"rendered":"Survey on Industry Measures taken to comply with National Measures"},"content":{"rendered":"<p>European providers of electronic communication services use a variety of technical and organizational measures to secure their services and to fight unsolicited electronic mail (spam).  This study, conducted by ENISA in January 2006, provides an overview of these measures.  The security measures that providers implement vary widely. They depend on the type of threat  against which each provider focuses its defense, and the specific nature of the business the provider is in.  The outline of the study follows Directive 2002\/58\/EC, in particular Article 4 (Security) and Article 13 (Unsolicited Communications).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Guidelines for this directive include:<br \/>\n\u00b7 There should be an incentive for providers to contribute to the overall security of interconnected networks rather than protecting merely their own resources.<br \/>\n\u00b7 Providers need to be more proactive and monitor their networks for risks of security breaches.  Providers could also be asked to report which networks they monitor.<br \/>\n\u00b7 This includes guidance to consumers as well as guidance to the provider&#8217;s staff, in particular with regard to incident response and emergency planning.<br \/>\n\u00b7 The need for contact details for email abuse and security violations should also be stressed.<\/p>\n<p>Providers in Europe are more concerned about spam emails that their customers receive than they are concerned with spam that their customers send.<\/p>\n<p>http:\/\/www.enisa.eu.int\/doc\/pdf\/deliverables\/enisa_security_spam.pdf<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1654","post","type-post","status-publish","format-standard","hentry","category-regulations"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1654"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1654\/revisions"}],"predecessor-version":[{"id":4141,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1654\/revisions\/4141"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}