Loading...
Skip to main content

Comme de nombreux sites Web, des cookies sont utilisés pour assurer le bon fonctionnement des Sites Web de BSA et offrir à leurs utilisateurs la meilleure expérience possible. Vous pouvez en apprendre davantage sur la façon dont nous utilisons les cookies et sur les options qui s’offrent à vous pour modifier l’utilisation des cookies par votre navigateur dans notre section d’information sur les cookies. Le fait d’utiliser ce site Web sans modifier vos paramètres de gestion des cookies signifie que vous acceptez nos conditions d’utilisation des cookies.

X

Thématiques politiques

Tous les secteurs de notre économie reposent sur les logiciels. Les membres de BSA | The Software Alliance fournit aux entreprises de toutes tailles des services de pointe en matière de cloud, d’outils d’analyse de données, d’outils de fabrication, de solutions de cybersécurité et d’autres fonctionnalités numériques pour créer de nouvelles industries et de nouveaux emplois. Des lois et des politiques modernisées dans ces domaines prioritaires permettront d’améliorer les conditions de vie et de soutenir la croissance économique et la croissance de l’emploi.

TRAVAUX DE RAPPORTS ET DOCUMENTS DE POSITION

BSA 5G Security Agenda cover

Securing 5G: A Call to Harness Software Innovation

JUL 21, 2020 | GLOBAL

Governments across the globe are racing to develop and deploy 5G technologies because of the enormous potential of 5G networks to transform businesses and individual lives. 5G networks will bring quantum leaps in speed, latency reduction, and flexibility that enable a wide range of new applications. In particular, 5G will support massive expansion of the Internet of Things (IoT), which is expected to grow to more than 200 billion devices by 2023. Together, these technologies will fundamentally reshape the global economy, improve the quality of life for billions of individuals, reshape the digital ecosystem, and transform how humans interact with the physical world.

LIRE LA SUITE
BSA Principles of IoT Cover

BSA Policy Principles for Building a Secure and Trustworthy Internet of Things

JUL 02, 2020 | GLOBAL

As trusted leaders in the global software industry, BSA members are at the forefront of Internet of Things (IoT) innovation, including advancements in IoT security. BSA endorses the following principles for building trust in the IoT that embody a responsible, risk-based approach to government IoT security policy.

LIRE LA SUITE
BSA Response & Recovery Agenda Cover 2020

BSA Response & Recovery Agenda

MAY 27, 2020 | GLOBAL

BSA’s Response & Recovery Agenda identifies the policy priorities and strategic initiatives that will enable governments and their citizens to prepare for and implement increased remote working, resilient education systems, and other remote-based activities.

LIRE LA SUITE
BSA Controller Processor position paper cover

The Global Standard: Distinguishing Between Controllers and Processors in Privacy Legislation

MAR 03, 2020 | GLOBAL

Comprehensive privacy legislation must create strong obligations for all companies that handle consumer data. These obligations will only be strong enough to protect consumer privacy and instill trust, though, if they reflect how a company interacts with consumer data.

LIRE LA SUITE
Global Best Practices for Law Enforcement Access to Digital Evidence cover

Global Best Practices for Law Enforcement Access to Digital Evidence

SEP 23, 2019 | GLOBAL

BSA recommends global best practices relating to law enforcement access to digital evidence that promote strong commitments to privacy, security, transparency, and the rule of law, while fostering constructive collaboration between governments, law enforcement agencies, and technology providers.

LIRE LA SUITE

ACTUALITÉS POLITIQUES

OCT 13, 2020 | US

Inside Cybersecurity, October 13, 2020. “We share the goal of the Defense Department to embrace modern software development and the policy is very useful for us and our members,” Tommy Ross, senior director of policy at BSA | The Software Alliance, told Inside Cybersecurity. “However, the pathway should not just be about developing software rapidly. It needs to also be about developing software that is secure.” Lire la suite

Tout afficher

RESSOURCES ET POSITIONS PUBLIQUES

Thématiques politiques
Date de publication
Tout afficher