- Latest available (Revised)
- Original (As adopted by EU)
Commission Implementing Regulation (EU) No 1179/2011 of 17 November 2011 laying down technical specifications for online collection systems pursuant to Regulation (EU) No 211/2011 of the European Parliament and of the Council on the citizens’ initiative
When the UK left the EU, legislation.gov.uk published EU legislation that had been published by the EU up to IP completion day (31 December 2020 11.00 p.m.). On legislation.gov.uk, these items of legislation are kept up-to-date with any amendments made by the UK since then.
Legislation.gov.uk publishes the UK version. EUR-Lex publishes the EU version. The EU Exit Web Archive holds a snapshot of EUR-Lex’s version from IP completion day (31 December 2020 11.00 p.m.).
This version of this Regulation was derived from EUR-Lex on IP completion day (31 December 2020 11:00 p.m.). It has not been amended by the UK since then. Find out more about legislation originating from the EU as published on legislation.gov.uk.
Revised legislation carried on this site may not be fully up to date. At the current time any known changes or effects made by subsequent legislation have been applied to the text of the legislation you are viewing by the editorial team. Please see ‘Frequently Asked Questions’ for details regarding the timescales for which new effects are identified and recorded on this site.
THE EUROPEAN COMMISSION,
Having regard to the Treaty on the Functioning of the European Union,
Having regard to Regulation (EU) No 211/2011 of the European Parliament and of the Council of 16 February 2011 on the citizens’ initiative(1), and in particular Article 6(5) thereof,
After consulting the European Data Protection Supervisor,
Whereas:
(1) Regulation (EU) No 211/2011 provides that where statements of support are collected online, the system used for that purpose must satisfy certain security and technical requirements and must be certified by the competent authority of the relevant Member State.
(2) An online collection system within the meaning of Regulation (EU) No 211/2011 is an information system, consisting of software, hardware, hosting environment, business processes and staff in order to accomplish the online collection of statements of support.
(3) Regulation (EU) No 211/2011 sets out the requirements that online collection systems have to comply with in order to be certified and provides that the Commission should adopt technical specifications for implementing those requirements.
(4) The Open Web Application Security Project’s (OWASP) Top 10 2010 project provides an overview of the most critical web application security risks as well as tools for addressing these risks; the technical specifications therefore draw upon the findings of this project.
(5) Implementation by the organisers of the technical specifications should guarantee certification of the online collection systems by the Member States’ authorities, and contribute to ensure the implementation of the appropriate technical and organisational measures required to comply with the obligations imposed by Directive 95/46/EC of the European Parliament and of the Council(2) on the security of the processing activities, both at the time of the design of the processing system and at the time of the processing itself, in order to maintain security and thereby to prevent any unauthorised processing and protect personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access.
(6) The process of certification should be facilitated by the use by the organisers of the software provided by the Commission in accordance with Article 6(2) of Regulation (EU) No 211/2011.
(7) Organisers of citizens’ initiatives, as data controllers, should, when collecting statements of support online, implement the technical specifications set out in this Regulation in order to ensure the protection of personal data processed. Where the processing is carried out by a processor, the organisers should ensure that the processor acts only on instructions from the organisers and that he implements the technical specifications set out in this Regulation.
(8) This Regulation respects fundamental rights and observes the principles enshrined in the Charter of Fundamental Rights of the European Union, in particular Article 8 thereof, which states that everyone has the right to the protection of personal data concerning him or her.
(9) The measures provided for in this Regulation are in accordance with the opinion of the Committee established under Article 20 of Regulation (EU) No 211/2011,
HAS ADOPTED THIS REGULATION:
The technical specifications referred to in Article 6(5) of Regulation (EU) No 211/2011 are set out in the Annex.
This Regulation shall enter into force on the 20th day following its publication in the Official Journal of the European Union.
This Regulation shall be binding in its entirety and directly applicable in all Member States.
Done at Brussels, 17 November 2011.
For the Commission
The President
José Manuel Barroso
In order to prevent automated submission of a statement of support using the system, the signatory goes through an adequate verification process in line with current practice before submission of a statement of support. One possible verification process is the use of strong ‘captcha’.
performed a full risk assessment, which identifies the scope of the system, highlights business impact in case of various breaches in information assurance, enumerates the threats and vulnerabilities of the information system, produces a risk analysis document that also list countermeasures to avoid such threats and remedies that will be taken if a threat occurs, and finally draws up a prioritised list of improvements;
designed and implemented measures for treating risks with regard to the protection of personal data and the protection of family and private life and measures that will be taken in the case risk occurs;
identified the residual risks in writing;
provided the organisational means to receive feedback on new threats and security improvements.
ISO/IEC 27002; or
the Information Security Forum’s ‘Standard of Good Practice’
to address the following issues:
risk assessments (ISO/IEC 27005 or another specific and suitable risk assessment methodology are recommended);
physical and environmental security;
human resources security;
communications and operations management;
standard access control measures, in addition to those set forth in this Regulation;
information systems acquisition, development and maintenance;
information security incident management;
measures to remedy and mitigate breaches in information systems which would result in the destruction or accidental loss, alteration, unauthorised disclosure or access of personal data processed;
compliance;
computer network security (ISO/IEC 27033 or the SoGP are recommended).
Application of these standards can be limited to the parts of the organisation that are relevant for the online collection system. For instance, human resources security can be limited to any staff that has physical or networking access to the online collection system, and physical/environmental security can be limited to the building(s) hosting the system.
The system guards against injection flaws such as structured query language (SQL) queries, lightweight directory access protocol (LDAP) queries, XML path language (XPath) queries, operating system (OS) commands or program arguments. For this purpose, it requires at least that:
all user input is validated;
validation is performed at least by the server-side logic;
all use of interpreters clearly separates untrusted data from the command or query. For SQL calls, this means using bind variables in all prepared statements and stored procedures, and avoiding dynamic queries.
The system guards against cross-site scripting (XSS). For this purpose, it requires at least that:
all user supplied input sent back to the browser is verified to be safe (via input validation);
all user input is properly escaped before it is included in the output page;
proper output encoding ensures that such input is always treated as text in the browser. No active content is used.
The system has strong authentication and session management, which requires at least that:
credentials are always protected when stored using hashing or encryption. The risk that someone authenticates using ‘pass-the-hash’ is mitigated;
credentials cannot be guessed or overwritten through weak account management functions (e.g. account creation, change password, recover password, weak session identifiers (IDs));
session IDs and session data are not exposed in the uniform resource locator (URL);
session IDs are not vulnerable to session fixation attacks;
session IDs timeout, which ensures that users log out;
session IDs are not rotated after successful login;
passwords, session IDs, and other credentials are sent only over transport layer security (TLS);
the administration part of the system is protected. If it is protected by single-factor authentication, then the password is composed of a minimum of 10 characters, including at least one letter, one number and one special character. Alternatively two-factor authentication may be used. Where only single-factor authentication is used, it includes a two-step verification mechanism for accessing the administration part of the system via the Internet, in which the single factor is augmented by another means of authentication, such as a one-time pass-phrase/code via SMS or an asymmetrically encrypted random challenge string to be decrypted using the organisers’/administrators’ private key unknown to the system.
The system does not have insecure direct object references. For this purpose, it requires at least that:
for direct references to restricted resources, the application verifies that the user is authorised to access the exact resource requested;
if the reference is an indirect reference, the mapping to the direct reference is limited to values authorised for the current user.
The system guards against cross-site request forgery flaw.
Proper security configuration is in place, which requires, at least, that:
all software components are up to date, including the OS, web/application server, database management system (DBMS), applications, and all code libraries;
OS and web/application server unnecessary services are disabled, removed, or not installed;
default account passwords are changed or disabled;
error handling is set up to prevent stack traces and other overly informative error messages from leaking;
security settings in the development frameworks and libraries are configured in accordance with best practices, such as the guidelines of OWASP.
The system provides for encryption of data as follows:
personal data in electronic format is encrypted when stored or transferred to the competent authorities of the Member States in accordance with Article 8(1) of Regulation (EU) No 211/2011, the keys being managed and backed up separately;
strong standard algorithms and strong keys are used in line with international standards. Key management is in place;
passwords are hashed with a strong standard algorithm and an appropriate ‘salt’ is used;
all keys and passwords are protected from unauthorised access.
The system restricts URL access based on the user access levels and permissions. For this purpose, it requires at least that:
if external security mechanisms are used to provide authentication and authorisation checks for page access, they need to be properly configured for every page;
if code level protection is used, code level protection needs to be in place for every required page.
The system uses sufficient transport layer protection. For this purpose, all of the following measures or measures of at least equal strength are in place:
the system requires the most current version of the hypertext transfer protocol secure (HTTPS) to access any sensitive resource using certificates that are valid, not expired, not revoked, and match all domains used by the site;
the system sets the ‘secure’ flag on all sensitive cookies;
the server configures the TLS provider to only support encryption algorithms in line with best practices. The users are informed that they must enable TLS support in their browser.
The system guards against invalidated redirects and forwards.
dates and times for log-on and log-off by organisers/administrators;
performed backups;
all database administrator changes and updates.
Whatever the type of hosting used, the machine hosting the application is properly protected, which provides:
hosting area access control and audit log;
physical protection of backup data against theft or incidental misplacement;
that the server hosting the application is installed in a secured rack.
layer 2 (L2) access list/port switch security;
unused switch ports are disabled;
the DMZ is on a dedicated virtual local area network (VLAN)/LAN;
no L2 trunking enabled on unnecessary ports.
For the sake of end-to-end security, the organisers take necessary measures to secure their client application/device that they use to manage and access the online collection system, such as:
Users run non-maintenance tasks (such as office automation) with the lowest set of privileges that they require to run.
When relevant updates and patches of the OS, any installed applications, or anti-malware become public, then such updates or patches are installed expediently.
Latest Available (revised):The latest available updated version of the legislation incorporating changes made by subsequent legislation and applied by our editorial team. Changes we have not yet applied to the text, can be found in the ‘Changes to Legislation’ area.
Original (As adopted by EU): The original version of the legislation as it stood when it was first adopted in the EU. No changes have been applied to the text.
Geographical Extent: Indicates the geographical area that this provision applies to. For further information see ‘Frequently Asked Questions’.
Show Timeline of Changes: See how this legislation has or could change over time. Turning this feature on will show extra navigation options to go to these specific points in time. Return to the latest available version by using the controls above in the What Version box.
Access essential accompanying documents and information for this legislation item from this tab. Dependent on the legislation item being viewed this may include:
This timeline shows the different versions taken from EUR-Lex before exit day and during the implementation period as well as any subsequent versions created after the implementation period as a result of changes made by UK legislation.
The dates for the EU versions are taken from the document dates on EUR-Lex and may not always coincide with when the changes came into force for the document.
For any versions created after the implementation period as a result of changes made by UK legislation the date will coincide with the earliest date on which the change (e.g an insertion, a repeal or a substitution) that was applied came into force. For further information see our guide to revised legislation on Understanding Legislation.
Use this menu to access essential accompanying documents and information for this legislation item. Dependent on the legislation item being viewed this may include:
Click 'View More' or select 'More Resources' tab for additional information including: