Innovating Works
DS-08-2017
DS-08-2017: Cybersecurity PPP: Privacy, Data Protection, Digital Identities
Specific Challenge:The use of modern telecommunications and on-line services involve users' personal information.. For example, using search engines exposes the query terms used, which can be both sensitive and identifying, as illustrated by the exposure of search terms; social networking services expect users to reveal their social connections, messages and preferences, that could lead to direct privacy violation if exposed. Browsing the web also leaves traces of where users have gone, their interests, and their actions - meta-data that can be used to profile individuals.
Sólo fondo perdido 18M €
Europeo
Esta convocatoria está cerrada Esta línea ya está cerrada por lo que no puedes aplicar. Cerró el pasado día 24-08-2017.
Esta ayuda tiene otras 84 convocatoria(s) que puedes consultar.
Por suerte, hemos conseguido la lista de proyectos financiados!
Presentación: Consorcio Consorcio: Esta ayuda está diseñada para aplicar a ella en formato consorcio.
Número mínimo de participantes.
Esta ayuda financia Proyectos: Objetivo del proyecto:

Specific Challenge:The use of modern telecommunications and on-line services involve users' personal information.. For example, using search engines exposes the query terms used, which can be both sensitive and identifying, as illustrated by the exposure of search terms; social networking services expect users to reveal their social connections, messages and preferences, that could lead to direct privacy violation if exposed. Browsing the web also leaves traces of where users have gone, their interests, and their actions - meta-data that can be used to profile individuals.

The implementation the draft General Data Protection Regulation (GDPR - currently in the law-making process) presents both technological as well as organisational challenges for organisations which have to implement novelties such as the right to data portability, the right to be forgotten, data protection impact assessments and the various implementations of the principle of accountability.

Many services on the Internet depend on the availability of secure digital identities which play a crucial role in safeguarding the data and privacy of citizens as well as protecting them and ot... ver más

Specific Challenge:The use of modern telecommunications and on-line services involve users' personal information.. For example, using search engines exposes the query terms used, which can be both sensitive and identifying, as illustrated by the exposure of search terms; social networking services expect users to reveal their social connections, messages and preferences, that could lead to direct privacy violation if exposed. Browsing the web also leaves traces of where users have gone, their interests, and their actions - meta-data that can be used to profile individuals.

The implementation the draft General Data Protection Regulation (GDPR - currently in the law-making process) presents both technological as well as organisational challenges for organisations which have to implement novelties such as the right to data portability, the right to be forgotten, data protection impact assessments and the various implementations of the principle of accountability.

Many services on the Internet depend on the availability of secure digital identities which play a crucial role in safeguarding the data and privacy of citizens as well as protecting them and other actors such as private companies or public services form various online threats. At the same time, many European countries already have or are in the process of developing an electronic identity (eID) scheme. Most of these projects are built to be at a very high security level, which makes them very suitable for diverse eGovernment processes. But in turn they may lack usability for commercial applications.


Scope:Innovation Actions: Proposals may cover one of the strands identified below.

Privacy-enhancing Technologies (PET)

Novel designs and tools to provide users with the functionality they require without exposing any more information than necessary, and without losing control over their data, to any third parties. PET should be available in a broad spectrum of products and services, with usable, friendly and accessible safeguards options. PET should be developed having also cost effective solutions.

Comprehensive and consistent Privacy Risks Management Framework should be available, in order to allow people to understand their privacy exposure (i.e. helping people to understand what happens to their data when they go online, use social networks etc).

Open source and externally auditable solutions are encouraged in order to maximise uptake and increase the trustworthiness of proposed solutions.

General Data Protection Regulation in practice

Tools and methods to assist organisations to implement the GDPR taking into account the final provisions of GDPR and guidance from relevant authorities (Data Protection Authorities, Art 29 WP or its successor).

Proposals may also address the need to provide support (procedures, tools) for entities to understand how to operate without requiring unnecessary information (so as to promote privacy respecting practices), in particular when the issue is mainly related to the fact that organizations (businesses, service providers, and government agencies) often require too much information from their target customer/user.

Secure digital identities

With a view to reducing identity fraud while protecting the privacy of citizens, proposals should develop innovative, secure and privacy enhancing digital identity platforms beyond national eID systems.

Activities may leverage existing European electronic identification and authentication platforms with clearly defined interfaces based on the General Data Protection Regulation (GDPR).

Proposals may:

Leverage evidence-based identities (using adequate correlation of multiple soft proofs of identity, as opposed to the usage of a central register); Provide a function for so called “qualified anonymity”, which means, that the online service does not have any information about the user but a pseudonym. The real identity of the user can only be revealed under specific conditions such as at the request of legal authorities; Consider cost-effective and user-friendly verification methods for mobile identity documents. For all strands, proposals should identify and address the societal and ethical dimensions of the strand they choose to cover taking into consideration the possibly divergent perspectives of pertinent stakeholders.

Proposals have to address the specific needs of the end-user, private and public security end users alike. Proposals are encouraged to include public security end-users and/or private end users.

The Commission considers that proposals requesting a contribution from the EU between EUR 2 and 3 million would allow these areas to be addressed appropriately. Nonetheless, this does not preclude submission and selection of proposals requesting other amounts.

The outcome of the proposals is expected to lead to development up to Technology Readiness Level (TRL) 6 to 7; please see part G of the General Annexes.


Expected Impact: Support for Fundamental Rights in Digital Society. Increased Trust and Confidence in the Digital Single Market Increase in the use of privacy-by-design principles in ICT systems and services
Cross-cutting Priorities:Open InnovationSocio-economic science and humanities


ver menos

Temáticas Obligatorias del proyecto: Temática principal:

Características del consorcio

Ámbito Europeo : La ayuda es de ámbito europeo, puede aplicar a esta linea cualquier empresa que forme parte de la Comunidad Europea.
Tipo y tamaño de organizaciones: El diseño de consorcio necesario para la tramitación de esta ayuda necesita de:

Características del Proyecto

Requisitos de diseño: Duración:
Requisitos técnicos: Specific Challenge:The use of modern telecommunications and on-line services involve users' personal information.. For example, using search engines exposes the query terms used, which can be both sensitive and identifying, as illustrated by the exposure of search terms; social networking services expect users to reveal their social connections, messages and preferences, that could lead to direct privacy violation if exposed. Browsing the web also leaves traces of where users have gone, their interests, and their actions - meta-data that can be used to profile individuals. Specific Challenge:The use of modern telecommunications and on-line services involve users' personal information.. For example, using search engines exposes the query terms used, which can be both sensitive and identifying, as illustrated by the exposure of search terms; social networking services expect users to reveal their social connections, messages and preferences, that could lead to direct privacy violation if exposed. Browsing the web also leaves traces of where users have gone, their interests, and their actions - meta-data that can be used to profile individuals.
¿Quieres ejemplos? Puedes consultar aquí los últimos proyectos conocidos financiados por esta línea, sus tecnologías, sus presupuestos y sus compañías.
Capítulos financiables: Los capítulos de gastos financiables para esta línea son:
Personnel costs.
Los costes de personal subvencionables cubren las horas de trabajo efectivo de las personas directamente dedicadas a la ejecución de la acción. Los propietarios de pequeñas y medianas empresas que no perciban salario y otras personas físicas que no perciban salario podrán imputar los costes de personal sobre la base de una escala de costes unitarios
Purchase costs.
Los otros costes directos se dividen en los siguientes apartados: Viajes, amortizaciones, equipamiento y otros bienes y servicios. Se financia la amortización de equipos, permitiendo incluir la amortización de equipos adquiridos antes del proyecto si se registra durante su ejecución. En el apartado de otros bienes y servicios se incluyen los diferentes bienes y servicios comprados por los beneficiarios a proveedores externos para poder llevar a cabo sus tareas
Subcontracting costs.
La subcontratación en ayudas europeas no debe tratarse del core de actividades de I+D del proyecto. El contratista debe ser seleccionado por el beneficiario de acuerdo con el principio de mejor relación calidad-precio bajo las condiciones de transparencia e igualdad (en ningún caso consistirá en solicitar menos de 3 ofertas). En el caso de entidades públicas, para la subcontratación se deberán de seguir las leyes que rijan en el país al que pertenezca el contratante
Amortizaciones.
Activos.
Otros Gastos.
Madurez tecnológica: La tramitación de esta ayuda requiere de un nivel tecnológico mínimo en el proyecto de TRL 5:. Los elementos básicos de la innovación son integrados de manera que la configuración final es similar a su aplicación final, es decir que está listo para ser usado en la simulación de un entorno real. Se mejoran los modelos tanto técnicos como económicos del diseño inicial, se ha identificado adicionalmente aspectos de seguridad, limitaciones ambiéntales y/o regulatorios entre otros. + info.
TRL esperado:

Características de la financiación

Intensidad de la ayuda: Sólo fondo perdido + info
Fondo perdido:
0% 25% 50% 75% 100%
Please read carefully all provisions below before the preparation of your application.
 
List of countries and applicable rules for funding: described in part A of the General Annexes of the General Work Programme.
Note also that a number of non-EU/non-Associated Countries that are not automatically eligible for funding have made specific provisions for making funding available for their participants in Horizon 2020 projects (follow the links to China, Japan, Republic of Korea, Mexico, Russia, Taiwan).
 
Eligibility and admissibility conditions: described in part B and C of the General Annexes of the General Work Programme
Proposal page limits and layout: Please refer to Part B of the standard proposal template.
 
Evaluation
3.1  Evaluation criteria and procedure, scoring and threshold: described in part H of the General Annexes of the General Work Programme
3.2 Submission and evaluation process: Guide to the submission and evaluation process
      
Indicative timetable for evaluation and grant agreement:
Information on the outcome of single-stage evaluation: maximum 5 months from the deadline for submission.
Signature of grant agreements: maximum 8 months from the deadline for submission.
 
Provisions, proposal templates and evaluation forms for the type(s) of action(s) under this topic:...
Please read carefully all provisions below before the preparation of your application.
 
List of countries and applicable rules for funding: described in part A of the General Annexes of the General Work Programme.
Note also that a number of non-EU/non-Associated Countries that are not automatically eligible for funding have made specific provisions for making funding available for their participants in Horizon 2020 projects (follow the links to China, Japan, Republic of Korea, Mexico, Russia, Taiwan).
 
Eligibility and admissibility conditions: described in part B and C of the General Annexes of the General Work Programme
Proposal page limits and layout: Please refer to Part B of the standard proposal template.
 
Evaluation
3.1  Evaluation criteria and procedure, scoring and threshold: described in part H of the General Annexes of the General Work Programme
3.2 Submission and evaluation process: Guide to the submission and evaluation process
      
Indicative timetable for evaluation and grant agreement:
Information on the outcome of single-stage evaluation: maximum 5 months from the deadline for submission.
Signature of grant agreements: maximum 8 months from the deadline for submission.
 
Provisions, proposal templates and evaluation forms for the type(s) of action(s) under this topic:
Innovation Action:
Specific provisions and funding rates
Standard proposal template
Standard evaluation form
H2020 General MGA -Multi-Beneficiary
Annotated Grant Agreement
 
Additional provisions:
Horizon 2020 budget flexibility
Classified information
Technology readiness levels (TRL) – where a topic description refers to TRL, these definitions apply.
Financial support to Third Parties – where a topic description foresees financial support to Third Parties, these provisions apply.
 
Open access must be granted to all scientific publications resulting from Horizon 2020 actions.
Where relevant, proposals should also provide information on how the participants will manage the research data generated and/or collected during the project, such as details on what types of data the project will generate, whether and how this data will be exploited or made accessible for verification and re-use, and how it will be curated and preserved.
Open access to research data
The Open Research Data Pilot has been extended to cover all Horizon 2020 topics for which the submission is opened on 26 July 2016 or later. Projects funded under this topic will therefore by default provide open access to the research data they generate, except if they decide to opt-out under the conditions described in annex L of the Work Programme. Projects can opt-out at any stage, that is both before and after the grant signature.
Note that the evaluation phase proposals will not be evaluated more favourably because they plan to open or share their data, and will not be penalised for opting out.
Open research data sharing applies to the data needed to validate the results presented in scientific publications. Additionally, projects can choose to make other data available open access and need to describe their approach in a Data Management Plan.
- Projects need to create a Data Management Plan (DMP), except if they opt-out of making their research data open access. A first version of the DMP must be provided as an early deliverable within six months of the project and should be updated during the project as appropriate. The Commission already provides guidance documents, including a template for DMPs.
- Eligibility of costs: costs related to data management and data sharing are eligible for reimbursement during the project duration.
The legal requirements for projects participating in this pilot are in the article 29.3 of the Model Grant Agreement.
 
Additional documents:
H2020 Work Programme 2016-17: Introduction
H2020 Work Programme 2016-17: Innovation in SMEs
H2020 Work Programme 2016-17: Secure societies – protecting freedom and security of Europe and its citizens
H2020 Work Programme 2016-17: Cross-cutting activities (Focus Areas)
H2020 Work Programme 2016-17: Dissemination, Exploitation and Evaluation
H2020 Work Programme 2016-17: General Annexes
Legal basis: Horizon 2020 - Regulation of Establishment
Legal basis: Horizon 2020 Rules for Participation
Legal basis: Horizon 2020 Specific Programme
 
 
Garantías:
No exige Garantías
No existen condiciones financieras para el beneficiario.

Información adicional de la convocatoria

Efecto incentivador: Esta ayuda tiene efecto incentivador, por lo que el proyecto no puede haberse iniciado antes de la presentación de la solicitud de ayuda. + info.
Respuesta Organismo: Se calcula que aproximadamente, la respuesta del organismo una vez tramitada la ayuda es de:
Meses de respuesta:
Muy Competitiva:
No Competitiva Competitiva Muy Competitiva
El presupuesto total de la convocatoria asciende a
Presupuesto total de la convocatoria.
Minimis: Esta línea de financiación NO considera una “ayuda de minimis”. Puedes consultar la normativa aquí.

Otras ventajas

Sello PYME: Tramitar esta ayuda con éxito permite conseguir el sello de calidad de “sello pyme innovadora”. Que permite ciertas ventajas fiscales.
H2020-DS-2016-2017 Cybersecurity PPP: Privacy, Data Protection, Digital Identities Specific Challenge:The use of modern telecommunications and on-line services involve users' personal information.. For example, using search...
Sin info.
EDF-2025-RA-C4ISR-MIDS-STEP Multifunctional Information Distribution System
en consorcio: Expected Impact:The outcome should contribute to: Improve EU sovereignty and autonomy of EU Member States’ and EDF Associated Countries’ Ar...
Abierta | Desde 18-02-2025 Hasta el 15-10-2025
CEF-T-2024-COMPCOEN-ROADS-WORKS Roads and multimodal freight terminals – studies, works or mixed
Objective:The objective is to develop transport infrastructure projects on roads and multimodal freight terminals of the TEN-T comprehensive...
Cerrada hace 3 meses | Próxima convocatoria prevista para el mes de
CEF-T-2024-CORECOEN-ROADS-WORKS Roads and multimodal freight terminals – studies, works or mixed
Objective:The objective is to develop transport infrastructure projects on roads and multimodal freight terminals of the TEN-T core and exte...
Cerrada hace 3 meses | Próxima convocatoria prevista para el mes de
CEF-T-2024-COMPCOEN-ROADS-WORKS Roads and multimodal freight terminals – studies, works or mixed
Objective:The objective is to develop transport infrastructure projects on roads and multimodal freight terminals of the TEN-T comprehensive...
Cerrada hace 3 meses | Próxima convocatoria prevista para el mes de
CEF-T-2024-CORECOEN-ROADS-WORKS Roads and multimodal freight terminals – studies, works or mixed
Objective:The objective is to develop transport infrastructure projects on roads and multimodal freight terminals of the TEN-T core and exte...
Cerrada hace 3 meses | Próxima convocatoria prevista para el mes de
ERASMUS-SPORT-2024-BEINCLUSIVE-SPORT-AWARDS-GENDER #BeInclusive - Promoting Gender Equality in Sport
en consorcio: Scope:To reward projects promoting the empowerment and participation of women and girls in sport. This category would celebrate role models...
Cerrada hace 7 meses | Próxima convocatoria prevista para el mes de