Feeds

Public IT must be accessible: EC

Reading frames it as a business issue

  • alert
  • submit to reddit

Application security programs and practises

The European Commission has called for all public IT procurement contracts to stipulate that the technology be made accessible to the elderly and disabled.

In its public consultation on the need for accessibility in IT, the EC surveyed 500 public agencies including universities, IT suppliers and user groups. It revealed that 90 per cent said accessibility should be a contractual requirement, 14 per cent said services needed to be fully interoperable, and 88 per cent said that EU institutions should take a lead in proposing these measures.

There was no real consensus on how these requirements should be enforced: respondents were evenly divided between voluntary, mandatory or self-certification checks on compliance, the EC says. However, almost three quarters were in favour of a product certification scheme.

Information Society commissioner Viviane Reading said that there were still 90 million people in the EU who could not properly benefit from technology because it was not accessible to them. She argued that bringing technology to everyone in Europe is more than a social or ethical issue: "Making the information society accessible for all is for me both a social necessity and an economic objective. The more accessible new technologies can be made, the bigger the potential markets for [vendors]."

Commission proposals will be set out in a Communication scheduled for September 2005. Its current policy is that harmonisation throughout the EU should be achieved voluntarily, but it reserves the right to get legislative if things don't improve in the next couple of years. ®

Related stories

BT automates talking book production
PLCs hit back at complaints on web accessibility
Web inaccessibility 'creates net underclass'

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.