Activities of Petr JEŽEK related to 2018/2209(DEC)
Shadow opinions (1)
OPINION on discharge in respect of the implementation of the budget of the European Agency for the Operational Management of Large-Scale IT systems in the Area of Freedom, Security and Justice for the financial year 2017
Amendments (1)
Amendment 6 #
Draft opinion
Paragraph 2
Paragraph 2
2. Welcomes that IT projects were implemented on time, on cost and on budget in 2017; points out, however, that the Agency outsourced 90 % of its projects via three framework contracts; stresses that even if the Agency’s IT projects are under its control, outsourcing its activities to such a large extendt creates risks of over-reliance and over-dependency on external contractors; request, therefore, the Agency to devise a long term strategy to mitigtakes note of the Agency's response thate this risk; acknowledges the administrative overhead, technical challenges and additional costs of adopting such a strategy but stresses that, given the sensitivity of its IT systems, contractor lock-in must be avoided; requests the Agency to present its vendor and contractor strategy to the European Parliament; requests the Agency to take all necessary measures to ensureese issues may be addressed under the Commission's interoperability proposal; welcomes that the Agency has undertaken a study in order to have an overview of the architecture of the future IT systems; requests therefore, the Agency to devise a long term strategy to address thate contractors having access to sensitive information about IT systems or the data they process are legally bound to stringent confidentiality rules and to demand that such contractors have formal national security clearances at the time of accessing such information; requests the Agency to ensure that its contractors are not bound by any laws of third countries that could bring them into conflict with the confidentiality arrangements established by the Agencycerns of the Court; acknowledges the administrative overhead, technical challenges and additional costs of adopting such a strategy but stresses that, given the sensitivity of its IT systems, contractor lock-in must be avoided;