Research & Innovation - Participant Portal

Digital Security: Cybersecurity, Privacy and Trust

H2020-DS-2014-1Sub call of: H2020-DS-2014-2015
Opening Date 11-12-2013
Publication date 11-12-2013 Deadline Date 28-08-2014 17:00:00 (Brussels local time)
Total Call Budget €47,040,000 Main Pillar Societal Challenges
Status Closed OJ reference OJ C 361 of 11 December 2013
Topic: Privacy
DS-01-2014

Specific challenge:

Many online users are reluctant to disclose personal information online because of privacy concerns. Personal data has become an economic asset, but it is not the owners, i.e. the users, that control or monetize it. This is in the hands of the service providers whose business case often includes the use of data they collect (e.g. social networks, search engines, online retailers, and cloud hosting services).

Data protection and privacy frameworks in Member States and Associated Countries need to be implemented in a transparent and user-friendly way to help users understand how their personal data might be used, including the economic value of their data. Such knowledge will enable them to exercise choice and know and assert their rights. As the economic value of their data is not known to the average user, they are not able to evaluate the value of their data relative to the value they assign to a "free" service. Moreover, the users have no control over what happens with their data, e.g. they cannot verify the data is not passed on to 3rd parties. This situation may influence individuals notion of privacy which may be perceived as a non-valuable asset.

Data protection principles need to be visibly respected for the delivery of personalised public services, to increase trust in public administrations. Transparency is particularly important in an open government context, where personal data may be shared between different departments and administrations or across borders and where third parties can engage in the creation and delivery of personalised services for citizens and businesses.

Scope:

The focus is on the demonstration of solutions to protect individuals' privacy by default while empowering the users to set the desired level of privacy, based on a simple to understand visualisation of the privacy level, giving them control over how their data will be used by service providers (including public authorities), and making it easier for them to verify both whether their online rights are respected and if they get a reasonable bargain. The activities may also cover tools facilitating the information of individuals about the processing of their personal data. Systems will either have to detect the privacy settings automatically, or the data will have its privacy settings permanently associated to it by the user.

Activities can include the investigation of measures to safeguard privacy in the context of mass data handling, for example where services exploiting big data, cloud services, data sharing by interconnected devices in the internet of things, and data handling in the highly sensitive context of criminal investigations.

Where relevant, actions can be proposed to apply privacy-by-design frameworks for a range of different applications to promote the usage of privacy enhanced technology.

The Commission considers that proposals requesting a contribution from the EU of between €2m and €5m EURO  would allow this topic to be addressed appropriately. Nonetheless, this does not preclude submission and selection of proposals requesting other amounts.

Proposals have to address the specific needs of the end-user, private and public security end user alike. Proposals are encouraged to include public security end-users and/or private end users.

Expected impact:

The actions supported under this objective are to provide a practical, user friendly and economically viable implementation of the legal obliations related to personal data processing and the legal obligation for prior consent. The actions will not only identify but more importantly implement privacy by design architectures. It is expected that the actions will lead to an increased user trust online, resulting in a higher uptake of online services. Actions should generate positive business cases for online privacy.

Type of action: Innovation actions

Please read carefully all provisions below before the preparation of your application.

To see the budget earmarked for this topic, please look at the call budget distribution table by topic.

  1. List of countries and applicable rules for funding: described in part A of the General Annexes of the General Work Programme.
     
  2. Eligibility and admissibility conditions: described in part B and C of the General Annexes of the General Work Programme
     
  3. Evaluation

    3.1  Evaluation criteria and procedure, scoring and threshold: described in part H of the General Annexes of the General Work Programme

    3.2 Guide to the submission and evaluation process
     
  4. Proposal page limits and layout: Please refer to Part B of the standard proposal template.
     
  5. Indicative timetable for evaluation and grant agreement:
    Information on the outcome of one-stage evaluation: maximum 5 months from the final date for submission.
    Signature of grant agreements: maximum 3 months from the date of informing successful applicants.
     
  6. Provisions, proposal templates and evaluation forms for the type(s) of action(s) under this topic:

    Innovation Action:

    Specific provisions and funding rates
    Standard proposal template (administrative forms and structure of technical annex)
    Standard evaluation form
    Annotated Model Grant Agreement
     
  7. Additional provisions:

    Horizon 2020 budget flexibility

    Classified information
     
  8. Open access must be granted to all scientific publications resulting from Horizon 2020 actions, and proposals must refer to measures envisaged. Where relevant, proposals should also provide information on how the participants will manage the research data generated and/or collected during the project, such as details on what types of data the project will generate, whether and how this data will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.

 

Additional documents

You can download the same documents as one zip file from the call page

  • Legal basis - Specific Programme H2020 en
  • WP H2020 - 1. Introduction en
  • WP H2020 - 14. Secure societies - protecting freedom and security of Europe and its citizens en
  • WP H2020 - 17. Communication and Dissemination en
  • Budget Table en
  • A guide to ICT-related activities in WP2014-15 en

No submission system is open for this topic.