7 Amendments of Sophia IN 'T VELD related to 2015/2233(INI)
Amendment 3 #
Draft opinion
Recital A
Recital A
A. whereas the Union is bound by the Charter of Fundamental Rights of the European Union (the Charter), including Article 7 thereof concerning the right to respect for private and family life and Article 8 thereof on the right to the protection of personal data, and by Article 16 of the Treaty on the Functioning of the European Union (TFEU) on the same fundamental right, as a key pillar of EU primary law which must be fully respected by all international agreements;
Amendment 6 #
Draft opinion
Recital C a (new)
Recital C a (new)
Ca. whereas Article 31 of the Charter requires the Union to ensure fair and just working conditions;
Amendment 12 #
Draft opinion
Recital E a (new)
Recital E a (new)
Ea. whereas data flows are assuming growing importance for the economy and for international trade and whereas the increase in these flows must have as a corollary a greater effort by the Union to ensure its independence in the digital sphere and to develop cutting-edge expertise in the field of cybersecurity;
Amendment 13 #
Draft opinion
Recital E b (new)
Recital E b (new)
Eb. whereas the USA is a party to the negotiations on the future agreement; having regard to the recent judgment of the Court of Justice declaring the European Commission’s decision on Safe Harbour invalid;
Amendment 20 #
Draft opinion
Recital F a (new)
Recital F a (new)
Fa. whereas TiSA will entail movements of natural persons and whereas in this context all European citizens should be treated equally as regards access to the territory of the other parties to the agreement;
Amendment 22 #
Draft opinion
Recital F b (new)
Recital F b (new)
Fb. whereas the European Parliament will have the power to approve or reject the final agreement;
Amendment 43 #
Draft opinion
Paragraph 1 – point d a (new)
Paragraph 1 – point d a (new)
(da) to implement the recommendations of the European Parliament formulated in its resolution of 12 March 2014 concerning European independence in the fields of IT and cybersecurity in order to ensure optimal security of data flows;