iTnews Asia
  • Home
  • News
  • Security

EU drops sovereignty requirements in cybersecurity certification scheme

EU drops sovereignty requirements in cybersecurity certification scheme

Companies may find it easier to bid for cloud computing contracts.

By Foo Yun Chee on Apr 4, 2024 10:51AM

Amazon, Alphabet's Google and Microsoft may find it easier to bid for EU cloud computing contracts after draft cybersecurity labelling rules scrapped a requirement that vendors should be independent from non-EU laws, according to the document seen by Reuters.

The European Union has struggled to agree to a cybersecurity certification scheme (EUCS) to vouch for the cybersecurity of cloud services and help governments and companies to select a secure and trusted vendor for their business.

The move comes as Big Tech looks to the lucrative government cloud market to spur growth. The EU on the other hand fears illegal state surveillance while some governments worry that the dominance of US cloud providers may inhibit nascent EU rivals.

One draft circulated to EU governments last year required U.S. tech giants to set up a joint venture with an EU-based company and store and process customer data in the bloc to qualify for the EU cybersecurity label.

Such so-called sovereignty requirements sparked criticism from European banks, clearing houses, insurance groups and some startups which said technical provisions rather than political and sovereignty obligations should prevail.

The latest draft dated March 22 removed such requirements, with cloud vendors only obliged to provide information about the location of the storage and processing of their customers' data and about applicable laws.

EU countries are now reviewing the tweaked draft after which the European Commission will adopt a final scheme. The EU executive did not respond to a request for comment.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright Reuters
© 2019 Thomson Reuters. Click for Restrictions.
Tags:
amazon european union google microsoft security

Related Articles

  • The best way to outsmart your threat actors is to think like one
  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
  • Cybersecurity threats CISOs should be most worried about in 2025
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

Philippines Maxicare, Jollibee Foods Corporation hit by data breach

Philippines Maxicare, Jollibee Foods Corporation hit by data breach

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

Malaysia ramps up cyber security defense to stem rising fraud and ransomware attacks

What are the most pressing cyber security concerns going into 2025?

What are the most pressing cyber security concerns going into 2025?

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.