EU plans to expand chat control
The EU Commission, supported by European governments, is working quietly to lift digital mail secrecy. As part of the fight against child abuse, a regulation is to be passed that will require communication service providers to screen communication content for signs of child abuse or attempts by adults to attract children (so-called “grooming”). But that’s not all, the draft law should now also include the monitoring of audio communication!

User devices can be searched for images or content of potential child abuse should such an order be issued. This so-called client-side scanning (CSS) checks before a message is sent whether it contains a depiction of child abuse. Client-side scanning undermines the privacy of letters, which is protected by end-to-end encryption is guaranteed for communication services, since data is searched through before encryption without concrete suspicion. Apple had planned a similar process, despite opposition from recognized IT security researchers. In a study, they came to the conclusion that client-side scanning represents a threat to privacy, IT security, freedom of expression and overall democracy.
What is planned?
What is planned?
According to a survey by the Swedish Presidency, which was answered by 20 EU member states, many EU states want to expand the controversial plans for so-called chat control. Ten countries spoke out clearly in favor of monitoring audio communications in order to combat child sexual abuse. On the other hand, six countries, including Germany, expressed concerns and are more inclined to oppose this proposal. Seven Member States have not yet taken a position on this issue.
Controlling and monitoring these communication channels, also known as “chat control“, also presents a significant challenge. While text messages can be scanned for inappropriate or illegal content with relative ease, the Monitoring audio content is technically much more difficult, and error-prone.
Mass surveillance by order
Mass surveillance by order
Per Disclosure Order should enable authorities to oblige online services to automatically check the content of their users systematically and impartially. For such an arrangement, there must be a “significant risk” that, for example, depictions of abuse are disseminated via the service. Critics fear that this term could potentially apply to any service through which users share content.
The German Lawyers’ Association (DAV) shares this view and believes that the provisions are “extremely vague and also so low-threshold that they can basically be applied to all hosting and communication services, especially social networks would be.“
The DAV also notes that the associated obligation to evaluate communication content on a large scale would be incompatible with fundamental freedom rights, would represent a particularly serious encroachment on the confidentiality of communication and, in addition, all users of e-mail, chat and hosting services under general suspicion. There is a risk of significant “chilling effects“, i.e. self-censorship by EU citizens . In addition, interference with the relationship of trust with persons subject to professional secrecy such as lawyers, doctors and journalists could be feared.
This planned mass evaluation of communication content would also contradict the case law of the European Court of Justice (ECJ) in relation to data retention. The court has repeatedly declared excessively broad storage requirements to be unlawful.
The ECJ assessed the handling of traffic and location data. An inappropriate and mass evaluation of content, as envisaged in the current Commission draft, would go “far beyond the previously discussed measures of the data retention“, according to the statement of the DAV. The chances of the law surviving litigation would be correspondingly poor.
Popular Posts:
Microsoft Loop in Teams: The revolution of your notes?
What exactly are these Loop components in Microsoft Teams? We'll show you how these "living mini-documents" can accelerate your teamwork. From dynamic agendas to shared, real-time checklists – discover practical use cases for your everyday work.
Career booster 2026: These Microsoft Office skills will take you further!
A new year, new career opportunities! But which Office skills will really be in demand in 2026? "Skilled use" is no longer enough. We'll show you today's must-haves – like advanced Excel, using AI in the office, and relevant certifications for your resume.
Why Zero Trust doesn’t work without identity protection!
Zero Trust means: Trust no one, verify everyone. Identity protection is at the heart of this modern security model. Learn how IAM, MFA, Conditional Access, and the principle of least privilege effectively protect your business when the old network perimeter is gone.
How AI fuels cyberattacks – and how it protects us from them
Cybercriminals are using AI for deepfakes and automated attacks. Defenses are also relying on AI: through behavioral analysis (UEBA) and automated responses (SOAR). Learn how this arms race works and how modern security strategies can protect your business.
Information overload: Protection & tips against digital stress
Constantly online, overwhelmed by news, emails & social media? Digital information overload leads to stress and concentration problems. Learn the best strategies and practical tips to effectively protect yourself, manage the chaos, and regain your focus.
Put an end to password chaos: Why a password manager is important
Passwords are constantly being stolen through data leaks. A password manager is your digital vault. It creates and stores strong, unique passwords for every service. This effectively protects you against identity theft through "credential stuffing".
Popular Posts:
Microsoft Loop in Teams: The revolution of your notes?
What exactly are these Loop components in Microsoft Teams? We'll show you how these "living mini-documents" can accelerate your teamwork. From dynamic agendas to shared, real-time checklists – discover practical use cases for your everyday work.
Career booster 2026: These Microsoft Office skills will take you further!
A new year, new career opportunities! But which Office skills will really be in demand in 2026? "Skilled use" is no longer enough. We'll show you today's must-haves – like advanced Excel, using AI in the office, and relevant certifications for your resume.
Why Zero Trust doesn’t work without identity protection!
Zero Trust means: Trust no one, verify everyone. Identity protection is at the heart of this modern security model. Learn how IAM, MFA, Conditional Access, and the principle of least privilege effectively protect your business when the old network perimeter is gone.
How AI fuels cyberattacks – and how it protects us from them
Cybercriminals are using AI for deepfakes and automated attacks. Defenses are also relying on AI: through behavioral analysis (UEBA) and automated responses (SOAR). Learn how this arms race works and how modern security strategies can protect your business.
Information overload: Protection & tips against digital stress
Constantly online, overwhelmed by news, emails & social media? Digital information overload leads to stress and concentration problems. Learn the best strategies and practical tips to effectively protect yourself, manage the chaos, and regain your focus.
Put an end to password chaos: Why a password manager is important
Passwords are constantly being stolen through data leaks. A password manager is your digital vault. It creates and stores strong, unique passwords for every service. This effectively protects you against identity theft through "credential stuffing".

























