{"id":19217,"date":"2014-09-09T14:39:11","date_gmt":"2014-09-09T12:39:11","guid":{"rendered":"https:\/\/www.hiig.de\/?p=19217"},"modified":"2018-07-02T18:14:57","modified_gmt":"2018-07-02T16:14:57","slug":"germany-is-preparing-for-new-it-security-legislation","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/","title":{"rendered":"Germany is preparing for new IT security legislation"},"content":{"rendered":"<p>As an essential cornerstone of the Government&#8217;s Digital Agenda on 19 August Thomas de Maizi\u00e8re, Federal Minister of the Interior, presented a <a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.bmi.bund.de%2FSharedDocs%2FDownloads%2FDE%2FGesetzestexte%2FEntwuerfe%2FEntwurf_IT-Sicherheitsgesetz.pdf%3F__blob%3DpublicationFile&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNGS1OECiG7zlPblsBgLTLnAJ07GCA\">new draft law<\/a> which aims at increasing the security of information technology systems (IT Security Act).<\/p>\n<p>The IT Security Act draft (IT-SIG-E) provides for amendments in several specific legal acts, particularly in the <a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.gesetze-im-internet.de%2Fbsig_2009%2F&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNHbvtusQ7YBPZ1HAUaZTPZ5CSlP0A\">BSI-G<\/a>, <a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.gesetze-im-internet.de%2Ftmg%2F&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNGmCGnJoAA7mJxfM687Hd5_E55mCA\">TMG<\/a>, <a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.gesetze-im-internet.de%2Ftkg_2004%2F&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNHQxYwBl-61MTPiUxSI3oezX7EH5Q\">TKG<\/a>, <a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.gesetze-im-internet.de%2Fbkag_1997%2F&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNEt53S5X87FlxjPePJk1GDmkPx8yg\">BKA-G<\/a> and <a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.gesetze-im-internet.de%2Fawg_2013%2F&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNHJWl02ezkNMEcQsk4askzrQFj93Q\">AWG<\/a>. The law aims to increase the minimum level of IT security. It primarily targets to boost IT security in critical infrastructures. Such infrastructures operate in various sectors which play a very important role for society (energy, health, transport, finance, etc.).<\/p>\n<h3>How does the IT Security Act affect the Internet?<\/h3>\n<p>Since large parts of the Internet are, in the legal sense, to be understood as &#8220;telecommunications infrastructure&#8221;, area-specific requirements for the security level already exist &#8211; in the German Telecommunications Act or, for telemedia services provider, in the German Teleservices Act.<sup>1<\/sup> These are supposed to be modified and extended by the present legal draft.<sup>2<\/sup> Telecommunications service provider (e.g. access provider) and Telemedia services provider (e.g. website operator), &#8220;which play a key role in the security of cyberspace,&#8221; are to &#8220;made even more accountable.&#8221;<sup>3<\/sup><\/p>\n<h3>Problems of Internet regulation<\/h3>\n<p>Legal regulation however is not capable of resolving all problems regarding the Internet. Due to its global character, legal measures alone &#8211; especially when they &#8220;only&#8221; come from the national or the European level &#8211; cannot provide for the security of and in the Internet. For the Internet is just not an intranet. In addition, is an issue as well on the physical as on the logical level. Internet communication, for example, is based on internationally standardized protocols. Many features and services of the Internet which are essential to its security (here in the broad sense) are administrated by decentral actors who are not legally regulated. The Domain Name System (DNS), as another example, is necessary for the functioning of the Internet (it is important for the translation of domain names to IP addresses); the system is however managed by non-governmental organizations. Thus, IT security law can only serve as a partial solution.<\/p>\n<h3>Problems to be dicussed<\/h3>\n<p>Currently, the IT-SIG-E is submitted for inter-departmental coordination and approval. But However, it should not only be discussed in the ministries but also by computer scientists, legal experts, Internet activists and all other Internet users (and providers). The IT-SIG-E contains many contentious points. These include: the effectiveness and the scope of incident reporting requirements, the extent to which competencies to store inventory, traffic and usage data are <a href=\"https:\/\/www.google.com\/url?q=https%3A%2F%2Fwww.bvdnet.de%2Fsystem-ordner%2Ftt-news%2Fdetailansicht%2Farticle%2Fbvd-unterstuetzt-it-sicherheitsgesetz-grundsaetzlich-und-regt-verbesserungen-an.html&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNGOaUh1ponY4c_rwNvSlycwU1nG-g\">required<\/a> and whether the proposed act alltogether suffices to rise to the complex and manifold <a href=\"http:\/\/www.google.com\/url?q=http%3A%2F%2Fwww.theeuropean.de%2Fdennis-schmidt-bordemann%2F8865-cyber-kriminalitaet-und-die-rolle-des-staats&amp;sa=D&amp;sntz=1&amp;usg=AFQjCNGLWYiyKfg7rKuLOVpirZRSip-F0g\">challenges<\/a>.<\/p>\n<hr \/>\n<ol>\n<li>cf. \u00a7 109 TKG bzw. \u00a7 13 TMG; see also \u00a7 9 BDSG.<\/li>\n<li>for a more detailed legal analysis see Leisterer\/Schneider, Das neue IT-Sicherheitsgesetz &#8211; \u00c4nderungen und Problemfelder, CR 09\/2014, (forthcoming). Among other changes, the draft law extends the competences to storage data, modifies the cyber incident notifications requirements, introduces a notification requirement for service providers and makes it mandatory for personalised telemedia providers to offer a authentification method.<\/li>\n<li>IT-SIG-E, explanation, p. 3.<\/li>\n<\/ol>\n<h4>This post is part of a weekly series of articles by <a title=\"Doctoral Programme\" href=\"https:\/\/www.hiig.de\/en\/doctoral-programme\/\">doctoral candidates<\/a> of the Alexander von Humboldt Institute for Internet and Society. It does not necessarily represent the view of the Institute itself. For more information about the topics of these articles and associated research projects, please contact <a href=\"mailto:presse@hiig.de\">presse@hiig.de<\/a>.<\/h4>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fgermany-is-preparing-for-new-it-security-legislation%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=Germany%20is%20preparing%20for%20new%20IT%20security%20legislation https%3A%2F%2Fwww.hiig.de%2Fen%2Fgermany-is-preparing-for-new-it-security-legislation%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fgermany-is-preparing-for-new-it-security-legislation%2F&subject=Germany%20is%20preparing%20for%20new%20IT%20security%20legislation\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>As an essential cornerstone of the Government&#8217;s Digital Agenda on 19 August Thomas de Maizi\u00e8re, Federal Minister of the Interior, presented a new draft law which aims at increasing the security of information technology systems (IT Security Act). The IT Security Act draft (IT-SIG-E) provides for amendments in several specific legal acts, particularly in the&hellip;<\/p>\n","protected":false},"author":50,"featured_media":9833,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[224],"tags":[],"class_list":["post-19217","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policy-and-law"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Germany is preparing for new IT security legislation &#8211; Digital Society Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Germany is preparing for new IT security legislation &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"As an essential cornerstone of the Government&#8217;s Digital Agenda on 19 August Thomas de Maizi\u00e8re, Federal Minister of the Interior, presented a new draft law which aims at increasing the security of information technology systems (IT Security Act). The IT Security Act draft (IT-SIG-E) provides for amendments in several specific legal acts, particularly in the&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-09T12:39:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-07-02T16:14:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2013\/01\/Datenschutz_im_21ten_Jahrhundert_Konferenz1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1232\" \/>\n\t<meta property=\"og:image:height\" content=\"613\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hannfried Leisterer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hannfried Leisterer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Germany is preparing for new IT security legislation &#8211; Digital Society Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/","og_locale":"en_US","og_type":"article","og_title":"Germany is preparing for new IT security legislation &#8211; Digital Society Blog","og_description":"As an essential cornerstone of the Government&#8217;s Digital Agenda on 19 August Thomas de Maizi\u00e8re, Federal Minister of the Interior, presented a new draft law which aims at increasing the security of information technology systems (IT Security Act). The IT Security Act draft (IT-SIG-E) provides for amendments in several specific legal acts, particularly in the&hellip;","og_url":"https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/","og_site_name":"HIIG","article_published_time":"2014-09-09T12:39:11+00:00","article_modified_time":"2018-07-02T16:14:57+00:00","og_image":[{"width":1232,"height":613,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2013\/01\/Datenschutz_im_21ten_Jahrhundert_Konferenz1.jpg","type":"image\/jpeg"}],"author":"Hannfried Leisterer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hannfried Leisterer","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/"},"author":{"name":"Hannfried Leisterer","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/be2f0008393292dc0ae9646459502bb2"},"headline":"Germany is preparing for new IT security legislation","datePublished":"2014-09-09T12:39:11+00:00","dateModified":"2018-07-02T16:14:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/"},"wordCount":566,"commentCount":0,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","articleSection":["Policy and Law"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/","url":"https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/","name":"Germany is preparing for new IT security legislation &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","datePublished":"2014-09-09T12:39:11+00:00","dateModified":"2018-07-02T16:14:57+00:00","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","width":1232,"height":613},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/germany-is-preparing-for-new-it-security-legislation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"Germany is preparing for new IT security legislation"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/be2f0008393292dc0ae9646459502bb2","name":"Hannfried Leisterer"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/19217","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=19217"}],"version-history":[{"count":5,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/19217\/revisions"}],"predecessor-version":[{"id":19260,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/19217\/revisions\/19260"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/9833"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=19217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=19217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=19217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}