EU Data Protection Regulation - BCS

40
EU Data Protection Regulation and what should we do about it? BCS North London Group 25 February 2016 Sarb Sembhi CISM Chief Technology Officer & Acting Chief Information Security Officer

Transcript of EU Data Protection Regulation - BCS

Page 1: EU Data Protection Regulation - BCS

EU Data Protection Regulation – and what should we do about it?

BCS North London Group – 25 February 2016

Sarb Sembhi CISM

Chief Technology Officer & Acting Chief Information Security Officer

Page 2: EU Data Protection Regulation - BCS

Disclaimer

• The views expressed in this presentation are those of the presenter and not BCS

• Nothing in this presentation is intended to be advice, it is presented as views of the presenter

• Please verify any actions you decide you wish to consider further – I am not a legal expert

• Things have still not been finalised … but it is pretty close

• I am not anti-US or Anti US businesses, but am against abuses of legislation which result in unfair competition against local businesses (especially if those business are in the UK)

Page 3: EU Data Protection Regulation - BCS

Objectives

• Convey that although Data Protection seems complex (and it is) but when you understand the different stakeholders’ positions, it becomes clearer (except that there are too many stakeholders)

• Don’t get caught up in the details right now, there are too many of them – several have yet to be agreed

• Although lawyers can help you with the legal bits, you will need to understand and determine the practical and technical implementation aspects yourselves

• Don’t worry, there will be plenty of more detailed information sessions once supervisory authorities start to interpret the Regulation

Page 4: EU Data Protection Regulation - BCS

Agenda

• Why it is all personal?

• Where we were with Data Protection before now?

• What changed and led to the draft EU GDPR?

• What was in the draft EU GDPR?

• Where is it all now?

• What’s the all fuss about Safe Harbour?

• What does all this mean for our business?

4

Page 5: EU Data Protection Regulation - BCS

Why it is all personal?

• National stakeholders

• Local differences

• Technology

• Business interests

• Value of data (or lack of it)

• People only likely to relate or react when its personal (sometimes not even then) or remain unaware

5

Page 6: EU Data Protection Regulation - BCS

Personal for kids and their parents

• A misconfigured database at uKnowKids.com exposed the data of 1,700 children, their personal messages, social media profiles, and images

• More than 6.8 million private text messages, nearly 2 million images (many depicting children)

• This includes first and last names, email addresses, dates of birth, GPS coordinates, social media access credentials, and more

• The insecure MongoDB installation was online for seven weeks before Vickery discovered it and reported the issue to uKnowKids

• uKnowKids goes on to accuse the security researcher who uncovered its problems of "hacking" its data

Page 7: EU Data Protection Regulation - BCS

Personal for kids and their parents

• The data breach affected about 5m parent accounts & more than 6m children's' accounts

• The children profiles included names, genders, birthdates, headshots and chat logs while the parent accounts included email addresses, passwords, secret questions and answers, IP addresses, and mailing addresses

• Security researchers found multiple security flaws in VTech tablets

• VTech’s response was to change its web site T&C’s

Page 8: EU Data Protection Regulation - BCS

If it’s not young children, it’s young adults

• Students’ personal information could be found via a Google search, landing Greenwich University

• Students' names, addresses, dates of birth, mobile phone numbers and signatures were all uploaded to the university's website

• In some cases, mental health and other medical problems were referenced to explain why students had fallen behind with their work

Page 9: EU Data Protection Regulation - BCS

Innocent gift cards are no less a target

• The information potentially accessed included names, contact information, dates of birth, and gift card numbers. Gift card numbers could have been used to make unauthorized purchases

• In addition, Gyft log-in credentials may have been compromised. An unauthorized party who acquired credentials could have accessed a Gyft account and used any gift cards in the account with unused balances, reward points or a Coinbase-enabled account to purchase additional gift cards

• Beginning on October 3 and continuing through December 18, 2015, an unknown party accessed without authorization two cloud providers used by Gyft

Page 10: EU Data Protection Regulation - BCS

And we’re back to young adults

• The University of Central Florida has admitted that hackers who broke into its systems may have snaffled the personal details of more than 60,000 staff and students

• The breach, discovered in early January but only made public in February, exposed the social security numbers and other private information

Page 11: EU Data Protection Regulation - BCS

And last but not least … our politicians

Page 12: EU Data Protection Regulation - BCS

Data breaches costs customers

Page 13: EU Data Protection Regulation - BCS

And a lot of money

Page 14: EU Data Protection Regulation - BCS

So, what personal data is out there? 1

• Telephone Call time, date, duration, originating / destination number, possibly content of call (VOIP, wiretapping)

• Unencrypted emails (Gmail, Hotmail, Yahoo, etc.)

• Perhaps even encrypted emails

• Calendar and contact data

• Other unencrypted traffic

• Including: access to all social media sites, uploading utilities, etc.

• Data collected by mobile device applications

14

Page 15: EU Data Protection Regulation - BCS

So, what personal data is out there? 2

• Data collected by mobile operating systems

• Data stored by backup sites

• Data collected by voip services

• Data collected by mobile payment services

• Search request data

• VPN log data

• This is regardless of business cloud services

15

Page 16: EU Data Protection Regulation - BCS

Plus more, with much more to come

• Data collected by Google Glass like products

• Data collected by smart tv’s (which watch you viewing TV)

• Data collected by smart meters & smart grid

• Data collection by driverless cars

• Data collected by Internet of Things devices around the home

• Data collected on wearable & health devices

• Mobile Payments (like Oyster card data)

• Advanced Big Data analysis and data mining tools

• Criminal use of above tools to create new business models based on data stolen from above sources

16

Page 17: EU Data Protection Regulation - BCS

Yes, it is really personal

• 27 EU members each with different cultures and histories around privacy, ID cards, etc.

• Several EU leaders only interested in the NSA revelations once they knew that they calls and data had likely been intercepted

• Customers and employees may only understand the issues when it happens to them

• When there is compensation involved its personal

17

Page 18: EU Data Protection Regulation - BCS

Where we were with Data Protection before 2012?

• Directive 95/46 EU

• Data Protection Act 1998

• 8 principles – 7th principle “Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data” relates most obviously to cyber security

• Safe Harbour Agreement 2000

18

Page 19: EU Data Protection Regulation - BCS

What changed and led to the draft EU GDPR?

• Variations in interpretation of the Directive, not only in the legislations themselves, but also in interpretations of wordings

• Burden to pan-European businesses in complying to each location’s interpretation

• Greater amount of personal EU citizen data being held outside of EU

• Great amount of personal data being collected by non-EU data controllers

• Experiences of abuses of fair use, purposes, adequacy, accuracy, retention, recognition of rights, security and transfers

• More case law, less advisories from Supervisory Authorities

19

Page 20: EU Data Protection Regulation - BCS

What else has changed?

• Ease of portability and transportability of data

• Regular (weekly) large scale data breaches

• Issues around control and ownership of personal data

• Recognition of the needs of Y generation to start again

• Economic climate – triple dip recession?

• Unfair competition

• Businesses that collect personal data and can leverage technology, as well as the tax system appear to be the most profitable and challenge existing business models

20

Page 21: EU Data Protection Regulation - BCS

Finally …

• A recognition by many that the 1995 Directive is no longer able to be fit for purpose due to the vast changes in everything

• Draft EU GDPR goes public in February 2012

• Causes a great debate that it is too over the top

• Then Snowden effect in June 2013 onwards

• Then the respective amendments by each of the two sides

21

Page 22: EU Data Protection Regulation - BCS

Clarification on proposed regimes

• Data Protection Regulation – does not need to be implemented by each member, as it becomes law when it is agreed. This will affect day to day DP operations for citizens and businesses

• Data Protection Regulation – does need to be implemented into law by each member. This is only for law enforcement and how they share data across Europe to fight and reduce crime

• Previous iterations of the Regulation are currently in force for the telecoms industry, as it was trialled there first

• Safe Harbour 2

22

Page 23: EU Data Protection Regulation - BCS

What was in the EU GDPR? 1

• New expanded Data Protection Principles: o Processed lawfully, fairly, and in a transparent manner;

o Collected for specified, explicit, and legitimate purposes, and not further processed in ways incompatible with purposes;

o Adequate, relevant and limited to the minimum necessary;

o Only processed if, and as long as, the purposes of the processing could not be fulfilled by processing information that does not involve personal data;

o Accurate, kept up‐to‐date, with incorrect data being erased or rectified;

o Kept in a form that permits identification of the data subjects for no longer than necessary;

o Processed under the responsibility and liability of the data controller, who must ensure and demonstrate for each operation its compliance with the Regulation.

23

Page 24: EU Data Protection Regulation - BCS

What was in the EU GDPR? 2

• Requirement for: Specific, Informed and Explicit Consent

• Protection of Children Under 13

• Expanded Definition of Sensitive Data

• Simplification of Cross Border Transfers

• Controllers and Processors to have greater accountability

• Special Rules for Data Processors and Subcontractors

• Businesses with over 500 employees to have a Data Protection Officer

24

Page 25: EU Data Protection Regulation - BCS

What was in the EU GDPR? 3

• Obligation to provide adequate security

• Security breach disclosure

• Data Protection Impact Assessment

• Right to lodge a complaint with a Supervisory Authority

• Judicial Remedy against Data Controllers or Processors

• Judicial Remedy against Supervisory Authorities

• Class Actions

• Individuals’ Right to Compensation

• Penalties 4% and Sanctions

25

Page 26: EU Data Protection Regulation - BCS

What was in the EU GDPR? 4

• Rights of Data Subjects:

o Transparency and better Communication

o Right of Information

o Right of Access

o Right of Rectification

o Right to Object to the Processing

o Right not to be Subject to Measures based on Profiling

o Right to be forgotten (not Erasure)

o Right to Data Portability

26

Page 27: EU Data Protection Regulation - BCS

But, then Snowden happened!

• Disclosures of mass US government surveillance

• Many large US data controllers considered to be complicit in providing data to intelligence services about EU citizens

• World leaders identified as having been targets of US surveillance activities

27

Page 28: EU Data Protection Regulation - BCS

Where is GDPR up to since Snowden? 1

• The privacy lobbies have been requesting: o clearer extensive rights from the outset and when things go wrong; o greater obligations for data processors

• data processors have been requesting : o less onerous obligations; o greater fuzziness in the language; o greater ease of managing relationship with a SA

• Supervisory Authorities have been requesting : o some of the above; o ease of managing issues in other member states for subjects; o powers to fine larger sums in relation to world wide turnover;

28

Page 29: EU Data Protection Regulation - BCS

Where is GDPR up to since Snowden? 2

• Intelligence agencies have requested: o ability to collect data for nation security purposes – this has overtaken privacy concerns in

some cases, and created better understanding of citizen and non-citizen surveillance

• After around 4,000 amendments, where a high percentage were funded by US corporate interests – more money spent on lobbying this single legislation than all others put together, ever!

• Pause for thoughts: Do our privacy and Data Protection laws come from the US internet giants? Do Europeans only get what the US corps give us?

• Several tripartite (European Commission, European Parliament and European Council) discussions and agreements have taken place to produce the final version which is likely to be out by year end

• It is likely that businesses will have around 18-24 months to implement compliance measures

29

Page 30: EU Data Protection Regulation - BCS

What’s the all fuss about Safe Harbour? 1

• Safe Harbour scheme set up in 2000

• EU DP law forbids the movement of its citizens’ data outside of the EU, unless it is transferred to a location which is deemed to have “adequate” privacy protections in line with those in the EU

• The Safe Harbour agreement between the EC and the US government essentially promised to protect EU citizens’ data if transferred by companies in the US. It allowed companies like Facebook to self-certify that they would protect EU citizens’ data when transferred and stored within US data centres

• It is a self-certification scheme managed by the Federal Trade Commission under the oversight of the US Department of Commerce

30

Page 31: EU Data Protection Regulation - BCS

What’s the all fuss about Safe Harbour? 2

• In 2008 Australian research firm (Galexia) found "the ability of the US to protect privacy through self-regulation, backed by claimed regulator oversight was questionable‘

• After Snowden, an Austrian Max Schrems challenged FaceBook that it wasn’t keeping his data safe from the US intelligence agencies, by taking the Irish ICO to court. This was referred to the EU Court of Justice, where the Court ruled that Safe Harbour principles were invalid

• 2 key findings: o US federal government agencies could use personal data under US law, but were not required

to opt in. o EU citizens did not have the same protection or rights in cases of wrong doing under Safe

Harbour as they do under EU law

• Enter Safe Harbour 2, coming your way soon

• Stop Press: EU Model Clauses may also be invalid, however binding corporate rules still most likely OK

31

Page 32: EU Data Protection Regulation - BCS

What does all this mean for your business? 1

• If you are using US based cloud services, you are transferring data, therefore you do need to consider your response to both:

o a) Pre-GDPR o b) Compliance with GDPR

• If you think you are not using any US cloud based services, audit all activities – it is more likely that you are but just don’t know it!

• Identify all the data you currently hold or use and the data you intend to hold or use and separate it according to your obligations and risks – this first (big) step will demonstrate to a Supervisory Authority that you have at least started the process of understanding what is required of you

• Use this data to undertake a privacy impact assessment

• Consider any data you hold or collect that may be excessive for the use it was collected for, and decide a way forward which respects the new rights

• Consider the consent you currently hold and how it will need to change

32

Page 33: EU Data Protection Regulation - BCS

What does all this mean for your business? 2

• Update privacy policies especially: what data you collect; how you will use it; subject rights and how you assist in subjects exercising them; your responsibilities; who and how to complain to

• Consider all your suppliers and all those to whom you supply services to in the context of who holds what data and the assurance you or they need to comply to the Regulation

• Revisit your Incident Response procedures and ensure that they work for you minimising your risks and maximising your response

• Consider the use of specialist services on a retainer basis to assist you doing the above plus more to instil a compliance regime, Virtual DPO, Virtual CIRO, Legal, Incident Response Team

• Consider the use of Cyber Insurance

33

Page 34: EU Data Protection Regulation - BCS

TRUSTe Survey 1

• Across US and Europe

• 100 medium to large organisations

• Respondents had responsibilities for IT or regulatory compliance

• 20% well prepared

• 26% just started

• 44% unaware of vaguely aware

Page 35: EU Data Protection Regulation - BCS

TRUSTe Survey 2

Page 36: EU Data Protection Regulation - BCS

If you remember nothing else …

• Regardless of whether the UK is a member of the EU or not, businesses in the UK will have to comply with the Regulation, since the Regulation relates to anyone handling data about EU citizens

• If you want to export data from the EU, then the territory that you intend to export it to must be able to provide the same safeguards as exists in the EU

• The chances are that if you can show that you have taken a risk based approach, you will most likely not be fined by a Supervisory Authority (ICO in the UK), its where you are unable to demonstrate your approach that you are most likely to be fined

• Equally, it is better to give subjects rights under the GDPR earlier than later than required by law

• Think of compliance to the EU GDPR like health and safety – certain industries / sectors or business types / model will need to do more than others

• There will always the “data protection gone mad” syndrome, but just don’t become part of it

36

Page 37: EU Data Protection Regulation - BCS

What to do, what to do

• Identify who be responsible

• Assess current policies

• Assess current use of personal and sensitive data

• Brief all senior managers – as they will determine the work for their staff in complying or not as the case may be

• Assess current 3rd party suppliers

• Create a knowledge base to share with others

• Develop an overall strategy to change

• Develop a plan with details on who will do what and by when

• Act on the plan

Page 38: EU Data Protection Regulation - BCS

Finally

We will be back here within 8-10 years from now!

Page 39: EU Data Protection Regulation - BCS

http://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-attacks-in-february-2016/

Page 40: EU Data Protection Regulation - BCS

[email protected]

Sarb Sembhi CISM

Chief Technology Officer & Acting Chief Information Security Officer

Questions