Article

Vorläufige Bewertung des Referentenentwurfs zum IT-Sicherheitsgesetz 2.0

Vorläufige Bewertung des Referentenentwurfs zum IT-Sicherheitsgesetz 2.0

Published by

Interface

May 08, 2019

<div id="ftn3" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="line-height: normal;">
		<a href="#_ftnref3" name="_ftn3" style="mso-footnote-id:

ftn3" title id="_ftn3">[3] Sven Herpig: Sachverständigenstellungnahme im Ausschuss für Inneres und Heimat und Sven Herpig: Warum sollte die Polizei Instagram-Passwörter bekommen?

<div id="ftn4" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="line-height: normal;">
		<a href="#_ftnref4" name="_ftn4" style="mso-footnote-id:

ftn4" title id="_ftn4">[4] Bundesregierung: Koalitionsvertrag zwischen CDU, CSU und SPD

<div id="ftn5" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="line-height: normal;">
		<a href="#_ftnref5" name="_ftn5" style="mso-footnote-id:

ftn5" title id="_ftn5">[5] digitalcourage: Überwachungsgesamtrechnung

<div id="ftn6" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="line-height: normal;">
		<a href="#_ftnref6" name="_ftn6" style="mso-footnote-id:

ftn6" title id="_ftn6">[6] Sabine Leutheusser-Schnarrenberger: IT-Sicherheitsgesetz 2.0 – Seehofer bläst zur Attacke

<div id="ftn7" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="line-height: normal;">
		<a href="#_ftnref7" name="_ftn7" style="mso-footnote-id:

ftn7" title id="_ftn7">[7] Bundesregierung: Koalitionsvertrag zwischen CDU, CSU und SPD

<div id="ftn8" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="line-height: normal;">
		<a href="#_ftnref8" name="_ftn8" style="mso-footnote-id:

ftn8" title id="_ftn8">[8] Sven Herpig: Sachverständigenstellungnahme im Ausschuss für Inneres und Heimat

<div id="ftn9" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="line-height: normal;">
		<a href="#_ftnref9" name="_ftn9" style="mso-footnote-id:

ftn9" title id="_ftn9">[9] Bundesamt für Sicherheit in der Informationstechnik: Aktiv für mehr Cyber-Sicherheit

<div id="ftn10" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="text-align: justify; line-height: normal;">
		<a href="#_ftnref10" name="_ftn10" style="mso-footnote-id:ftn10" title id="_ftn10"><span class="MsoFootnoteReference"><span style="mso-special-character:footnote"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style='font-size:13.0pt;mso-bidi-font-size:

10.0pt;line-height:120%;font-family:"Roboto Regular";mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Roboto Regular";mso-fareast-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Roboto Regular"; mso-bidi-theme-font:minor-latin;mso-ansi-language:DE;mso-fareast-language:DE; mso-bidi-language:AR-SA'>[10] Amtsblatt der Europäischen Union: RICHTLINIE (EU) 2016/1148 DES EUROPÄISCHEN PARLAMENTS UND DES RATES vom 6. Juli 2016

<div id="ftn11" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="line-height: normal;">
		<a href="#_ftnref11" name="_ftn11" style="mso-footnote-id:

ftn11" title id="_ftn11">[11] Bundesgesetzblatt: Gesetzzur Umsetzung der Richtlinie (EU) 2016/1148des Europäischen Parlaments und des Rates vom 6. Juli 2016

<div id="ftn12" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="line-height: normal;">
		<a href="#_ftnref12" name="_ftn12" style="mso-footnote-id:

ftn12" title id="_ftn12">[12] Sven Herpig und Julia Schuetze: Mehr IT-Sicherheit für deutsche Wahlen

<div id="ftn13" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="line-height: normal;">
		<a href="#_ftnref13" name="_ftn13" style="mso-footnote-id:

ftn13" title id="_ftn13">[13] Bundesregierung: Staatsministerium für Kultur und Medien

<div id="ftn14" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="line-height: normal;">
		<a href="#_ftnref14" name="_ftn14" style="mso-footnote-id:

ftn14" title id="_ftn14">[14] ThingsCon: Trustable Technology Mark

<div id="ftn15" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="text-align: justify; line-height: normal;">
		<a href="#_ftnref15" name="_ftn15" style="mso-footnote-id:ftn15" title id="_ftn15"><span class="MsoFootnoteReference"><span style="mso-special-character:footnote"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style='font-size:13.0pt;mso-bidi-font-size:

10.0pt;line-height:120%;font-family:"Roboto Regular";mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Roboto Regular";mso-fareast-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Roboto Regular"; mso-bidi-theme-font:minor-latin;mso-ansi-language:DE;mso-fareast-language:DE; mso-bidi-language:AR-SA'>[15] z.B. Wolfgang Heinz: Mehr und härtere Strafen?

<div id="ftn16" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="text-align: justify; line-height: normal;">
		<a href="#_ftnref16" name="_ftn16" style="mso-footnote-id:ftn16" title id="_ftn16"><span class="MsoFootnoteReference"><span style="mso-special-character:footnote"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style='font-size:13.0pt;mso-bidi-font-size:

10.0pt;line-height:120%;font-family:"Roboto Regular";mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Roboto Regular";mso-fareast-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Roboto Regular"; mso-bidi-theme-font:minor-latin;mso-ansi-language:DE;mso-fareast-language:DE; mso-bidi-language:AR-SA'>[16] Matthias Bäcker und Sebastian J. Golla: Strafrecht in der Finsternis: Zu dem Vorhaben eines „Darknet-Tatbestands“

<div id="ftn17" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="text-align: justify; line-height: normal;">
		<a href="#_ftnref17" name="_ftn17" style="mso-footnote-id:ftn17" title id="_ftn17"><span class="MsoFootnoteReference"><span style="mso-special-character:footnote"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style='font-size:13.0pt;mso-bidi-font-size:

10.0pt;line-height:120%;font-family:"Roboto Regular";mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Roboto Regular";mso-fareast-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Roboto Regular"; mso-bidi-theme-font:minor-latin;mso-ansi-language:DE;mso-fareast-language:DE; mso-bidi-language:AR-SA'>[17] Matthias Bäcker und Sebastian J. Golla: Strafrecht in der Finsternis: Zu dem Vorhaben eines „Darknet-Tatbestands“

<div id="ftn18" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="text-align: justify; line-height: normal;">
		<a href="#_ftnref18" name="_ftn18" style="mso-footnote-id:ftn18" title id="_ftn18"><span class="MsoFootnoteReference"><span style="mso-special-character:footnote"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style='font-size:13.0pt;mso-bidi-font-size:

10.0pt;line-height:120%;font-family:"Roboto Regular";mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Roboto Regular";mso-fareast-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Roboto Regular"; mso-bidi-theme-font:minor-latin;mso-ansi-language:DE;mso-fareast-language:DE; mso-bidi-language:AR-SA'>[18] Ulf Buermeyer und Sebastian J. Golla: “Digitaler Hausfriedensbruch” – Der Entwurf eines Gesetzes zur Strafbarkeit der unbefugten Benutzung informationstechnischer Systeme

<div id="ftn19" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="text-align: justify; line-height: normal;">
		<a href="#_ftnref19" name="_ftn19" style="mso-footnote-id:ftn19" title id="_ftn19"><span class="MsoFootnoteReference"><span style="mso-special-character:footnote"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style='font-size:13.0pt;mso-bidi-font-size:

10.0pt;line-height:120%;font-family:"Roboto Regular";mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Roboto Regular";mso-fareast-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Roboto Regular"; mso-bidi-theme-font:minor-latin;mso-ansi-language:DE;mso-fareast-language:DE; mso-bidi-language:AR-SA'>[19] Jannis Brühl: Passwort oder Beugehaft

<div id="ftn20" style="mso-element:footnote">
	<p class="MsoFootnoteText" style="text-align: justify; line-height: normal;">
		<a href="#_ftnref20" name="_ftn20" style="mso-footnote-id:ftn20" title id="_ftn20"><span class="MsoFootnoteReference"><span style="mso-special-character:footnote"><!--[if !supportFootnotes]--><span class="MsoFootnoteReference"><span style='font-size:13.0pt;mso-bidi-font-size:

10.0pt;line-height:120%;font-family:"Roboto Regular";mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Roboto Regular";mso-fareast-theme-font:minor-latin; mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Roboto Regular"; mso-bidi-theme-font:minor-latin;mso-ansi-language:DE;mso-fareast-language:DE; mso-bidi-language:AR-SA'>[20] Sven Herpig: Warum sollte die Polizei Instagram-Passwörter bekommen?

Author

Dr. Sven Herpig

Lead Cybersecurity Policy and Resilience