PL EN


Journal
2015 | 2 (22) | 107-122
Article title

Methods of securing and controlling critical infrastructure assets allocated in information and communications technology sector companies in leading European Union countries

Authors
Content
Title variants
Languages of publication
EN
Abstracts
EN
Critical Infrastructure (CI) plays a significant role in maintaining public order and national security. The state may use many different methods to protect and control CI allocated to commercial companies. This article describes the three most important ones: legislation, ownership and government institutions and agencies. The data presented in this paper is the result of research done on the most developed countries in the EU (United Kingdom, France, Germany and Italy) and their strategic enterprises in the ICT sector, one of the most important sectors in any national security system.
Journal
Year
Issue
Pages
107-122
Physical description
Dates
published
2015
Contributors
author
References
  • 2009 registration document France Telecom. Annual Financial Report (2009), France Telecom, http://www.orange.com/en/content/download/3111/36938/version/2/file/2009RegistrationdocumentFranceTelecomGroup.pdf
  • 2012 registration document France Telecom-Orange (2013), France Telecom, http://www.orange.com/en/content/download/12506/259365/version/2/file/2012%20Registration%20Document.pdf
  • About Oftel (2014), http://webarchive.nationalarchives.gov.uk/20040104233440/http://www.ofcom.org.uk/static/archive/oftel/about/index.htm
  • Annual Report & Form 20-F 2010 (2010), BT Group plc, https://www.btplc.com/Sharesandperformance/Annualreportandreview/pdf/BTGroupAnnualReport2010.pdf
  • Annual Report 2010, Deutsche Telekom AG, https://www.telekom.com/static/-/12172/2/110225-ar10-pdf-si
  • Blocman A. (2000), E-mail Protected by Privacy of Correspondence, IRIS Legal Observations of the European Audiovisual Observatory. IRIS 2000-10:9/17, http://merlin.obs.coe.int/iris/2000/10/article17.en.html
  • British Telecom Group Annual Report & Form 20-F (2010), https://www.btplc.com/Sharesandperformance/Annualreportandreview/pdf/BTGroupAnnualReport2010.pdf
  • Civil Contingencies Act (2004), Act of the Parliament of the United Kingdom, http://www.legislation.gov.uk/ukpga/2004/36/contents
  • Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection, OJ L 345, http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:32008L0114
  • Décret-loi du 30 octobre 1935 unifiant le droit en matière de chèques et relatif aux cartes de paiement (1935), http://www.legifrance.gouv.fr/affichTexte.do;jsessionid=4E292DB84A7E82469050D450EF2F9416.tpdjo16v_2?cidTexte=LEGITEXT000006072897&idArticle=&dateTexte=20131210
  • Dekret Prezesa Rady Ministrów dot. technicznych zasad tworzenia, przekazywania, przechowywania, powielania i reprodukcji walidacji, nawet tymczasowo, doku-mentów elektronicznych [Decree of the President of the Council of Ministers concerning the technical principles of the production, transmission, storage, du-plication and reproduction of validation, even temporarily, of electronic docu-ments], 13.01.2004, http://www.altalex.com/index.php?idnot=7212 after: System kontroli strategicznych podmiotów sektora ICT we Włoszech (Materiał poglądowy) (2011), Instytut Strategii Polskiej, Warszawa
  • France – Fonds Stratégique d'Investissement (2009), Les Fonds Souverains, http://www.fondssouverains.com/pages/France_Fonds_Strategique_dInvestissement_FSI-994599.html
  • Heath D. (2009), The electronic communication sector response to emergencies, “UK Journal of the Institute of Telecommunications Professionals” Vol. 3, Part 4
  • KfW receives new shares in the course of Deutsche Telekom AG’s scrip dividend (2013), https://www.kfw.de/KfW-Group/Newsroom/Aktuelles/News/News-Details_134528.html
  • Kirchmaier T. (2004), Who governs? Corporate Ownership and Control Structures in Europe, Jeremy Grant Graduate Institute of International Studies, Interdisciplinary Insti-tute of Management LSE, Genova
  • Kublik A. (2014), Rząd Francji broni swoje firmy przed cudzoziemcami, http://wyborcza.biz/biznes/1,100896,15970541,Rzad_Francji_broni_swoje_firmy_przed_cudzoziemcami.html
  • Loi n° 91-646 du 10 juillet 1991 relative au secret des correspondances émises par la voie des communications électroniques, http://www.legifrance.gouv.fr/affichTexte.do?cidTexte=LEGITEXT000006077780&dateTexte=20110915
  • Loi n° 91-646 du 10 juillet 1991 relative au secret des correspondances émises par la voie des communications électroniques, http://www.legifrance.gouv.fr/affichTexte.docidTexte=LEGITEXT000006077780&dateTexte=20110915
  • Narodowy Program Ochrony Infrastruktury Krytycznej (2013), Rządowe Centrum Bezpie-czeństwa, http://rcb.gov.pl/wp-content/uploads/NPOIK-dokument-główny.pdf
  • The National Emergency Plan for the UK Telecommunications Industry (2011), HM Govern-ment, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/61807/emergency-plan-telecomms-sector.pdf
  • The national infrastructure, Centre for the Protection of National Infrastructure, http://www.cpni.gov.uk/about/cni/
  • National Infrastructure Plan (2010), HM Treasury and Infrastructure UK, http://www.hm-treasury.gov.uk/ppp_national_infrastructure_plan.htm
  • National Infrastructure Plan 2013 (2013), HM Treasury, Infrastructure UK, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/263159/national_infrastructure_plan_2013.pdf
  • National Strategy for Critical Infrastructure Protection (2009), BSI, http://www.bsi.bund.de
  • Nationaler Plan zum Schutz der Informationsinfrastrukturen (2005), BMI, http://www.bmi.bund.de/cae/servlet/contentblob/121734/publicationFile/13577/Nationaler_Plan_Schutz_Informationsinfrastrukturen.pdf
  • Patriotisme économique: le décret Montebourg divise (2014), “Le Parisien”, http://www.leparisien.fr/economie/investissements-etrangers-sapin-defend-un-decret-protecteur-pour-la-france-15-05-2014-3842759.php
  • Przygotowanie systemu ochrony ludności przed klęskami żywiołowymi oraz sytuacjami kryzysowymi (2013), Informacja o wynikach kontroli, KPB-4114-01-0/2012, Nr ewid. 148/2013/I/12/006/KPB, Najwyższa Izba Kontroli, Warszawa, https://www.nik.gov.pl/plik/id,5308,vp,6885.pdf
  • Recommendations for critical information infrastructure protection (2012), BSI, https://www.bsi.bund.de/EN/Topics/Criticalinfrastructures/criticalinfrastructures_node.html
  • Strategy for National Infrastructure (2010), HM Treasury, Infrastructure UK, http://
  • www.direct.gov.uk/prod_consum_dg/groups/dg_digitalassets/@dg/@en/documents/digitalasset/dg_186451.pdf
  • A Strong Britain in an Age of Uncertainty: The National Security Strategy (2010), HM Gov-ernment, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/
  • 61936/national-security-strategy.pdf
  • System kontroli strategicznych podmiotów sektora ICT we Francji (Materiał poglądowy) (2011), Instytut Strategii Polskiej, Warszawa
  • Telecommunication security, public interest, contingency planning – Oecd Reviews of Regulatory Reform. Regulatory Reform in Germany (2004), OECD, https://www.oecd.org/regreform/32408088.pdf
  • Telecommunications Act (1984), Act of the Parliament of the United Kingdom, http://www.legislation.gov.uk/ukpga/1984/12/contents
  • Telecommunications Act (2003), Act of the Parliament of the United Kingdom, http://www.legislation.gov.uk/ukpga/2003/21/contents
  • Telecommunications Networks – a vital part of the Critical National Infrastructure (2011), Ofcom,
  • Treaty on European Union (2007), Consolidated versions of the Treaty on Europe-an Union and the Treaty on the Functioning of the European Union, Official Journal C 326, http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A12012M%2FTXT
Document Type
Publication order reference
Identifiers
YADDA identifier
bwmeta1.element.desklight-7e00cf92-db1b-45be-b9a0-a6198387e4a7
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.