EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know

Similar documents
NIS-Directive and Smart Grids

Directive on Security of Network and Information Systems

ENISA s Position on the NIS Directive

The GDPR and NIS Directive: Risk-based security measures and incident notification requirements

How icims Supports. Your Readiness for the European Union General Data Protection Regulation

Network and Information Security Directive

Directive on security of network and information systems (NIS): State of Play

Regulating Cyber: the UK s plans for the NIS Directive

The Role of the Data Protection Officer

GDPR: A QUICK OVERVIEW

General Data Protection Regulation (GDPR)

The NIS Directive and Cybersecurity in

EU GDPR and . The complete text of the EU GDPR can be found at What is GDPR?

General Data Protection Regulation (GDPR) NEW RULES

European Union Agency for Network and Information Security

Changing times in Swiss Data Privacy: new opportunities? Microsoft Security Day 27 April 2017 Clara-Ann Gordon

G DATA Whitepaper. The new EU General Data Protection Regulation - What businesses need to know

Cybersecurity Considerations for GDPR

Do you handle EU residents personal data? The GDPR update is coming May 25, Are you ready?

The Network and Information Security Directive - ENISA's contribution

COUNCIL OF THE EUROPEAN UNION. Brussels, 24 May /13. Interinstitutional File: 2013/0027 (COD)

Discussion on MS contribution to the WP2018

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe

CNPD Course: Data Protection Basics

EY s data privacy service offering. How to transform your data privacy capabilities for an EU General Data Protection Regulation (GDPR) world

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Getting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions

GDPR - Are you ready?

Creating NIS Compliant Country in a Non-Regulated Environment. Jurica Čular

General Data Protection Regulation (GDPR) Key Facts & FAQ s

Our agenda. The basics

Implementing the new GDPR: what does it mean for Universities?

COMMENTARY. The New EU Cybersecurity Directive: What Impact on Digital Service Providers? Relevant Terms

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

The GDPR Are you ready?

Technology's role in General Data Protection Regulation Dr. Prokopios Drogkaris Officer in NIS SECPRE 2017 Oslo

EU General Data Protection Regulation (GDPR) Achieving compliance

ETNO Reflection Document on the EC Proposal for a Directive on Network and Information Security (NIS Directive)

Cisco Spark and GDPR. Thomas Flambeaux. Collaboration Consulting Solution Engineer, Security and Compliance. Cisco Connect 2018 Copenhagen April 12th

Recommendations on How to Tackle the D in GDPR. White Paper

First aid toolkit for the management of data breaches. Mary Deligianni Senior Associate 15 February 2018

Committee on the Internal Market and Consumer Protection

How the GDPR will impact your software delivery processes

Developments in Global Data Protection & Transfer: How They Impact Third-Party Contracts

EY s data privacy service offering

DATA PROTECTION BY DESIGN

NIS Directive development The Incident Notification Framework


IAB Europe Guidance CONTROLLER-PROCESSOR CRITERIA. IAB Europe GDPR Implementation Working Group. Version July Working Paper 05/2018

CONCLUSIONS OF THE WESTERN BALKANS DIGITAL SUMMIT APRIL, SKOPJE

Cybersecurity Policy in the EU: Security Directive - Security for the data in the cloud

New cybersecurity landscape in the EU Sławek Górniak 9. CA-Day, Berlin, 28th November 2017

Cybersecurity & Digital Privacy in the Energy sector

All you need to know and do to comply with the EU General Data Protection Regulation

Adtech and GDPR What to consider when choosing your partner

EU General Data Protection Regulation (GDPR) A Point of View for Technology Sector Organisations. For private circulation only.

IT MANAGEMENT AND THE GDPR: THE VMWARE PERSPECTIVE

The SPARKS Project Motivation, Objectives and Results

COMMISSION STAFF WORKING DOCUMENT EXECUTIVE SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

Call for Expressions of Interest

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant

GDPR compliance: some basics & practical to do list

EU data security and privacy trends

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

IMPACT OF INTERNATIONAL PRIVACY REGULATIONS. Michelle Caswell, Coalfire Julia Jacobson, K&L Gates

General Data Protection Regulation (GDPR) and the Implications for IT Service Management

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant

Data Breach Notification: what EU law means for your information security strategy

The European Policy on Critical Information Infrastructure Protection (CIIP) Andrea SERVIDA European Commission DG INFSO.A3

General Data Protection Regulation (GDPR)

The Role of ENISA in the Implementation of the NIS Directive Anna Sarri Officer in NIS CIP Workshop Vienna 19 th September 2017

ENISA Cooperation in the EU / NIS Directive

Contributed by Djingov, Gouginski, Kyutchukov & Velichkov

2017 ANNUAL TRUST SERVICES SECURITY INCIDENTS ANALYSIS. ENISA Article 19 Team

Resilience, Deterrence and Defence: Building strong cybersecurity for the EU

NEWSFLASH GDPR N 8 - New Data Protection Obligations

GDPR and the Privacy Shield

Magento GDPR Frequently Asked Questions

WHITE PAPER. Meeting GDPR Challenges with Delphix. KuppingerCole Report

ENISA EU Threat Landscape

In Accountable IoT We Trust

Data Leak Protection legal framework and managing the challenges of a security breach

Package of initiatives on Cybersecurity

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

Overview of Key E.U. and U.S. Privacy and Cybersecurity Laws. Brett Lockwood Smith, Gambrell & Russell, LLP May 15, 2018

IEEE GDPR Implementation & NTC

Exploring the European Commission s Network and Information Security Directive (NIS) What every CISO should know

I GOT ROBBED! HOW NYS AND THE US SHOULD PROTECT YOUR DATA ONLINE

Islam21c.com Data Protection and Privacy Policy

Cybersecurity Strategy of the Republic of Cyprus

Martijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain

Privacy and Data Protection Draft Personal Data Protection Bill 2018: A Summary. For Private Circulation Only August 2018.

ENISA & Cybersecurity. Steve Purser Head of Technical Competence Department December 2012

Getting ready for GDPR

FAQ about the General Data Protection Regulation (GDPR)

Accelerate GDPR compliance with the Microsoft Cloud

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

GDPR COMPLIANCE REPORT

THE NEW EU DATA PROTECTION REGULATION: WHAT IS IT AND WHAT DO WE NEED TO DO? KALLIOPI SPYRIDAKI CHIEF PRIVACY STRATEGIST, EUROPE

2017 RIMS CYBER SURVEY

Transcription:

EU Data Protection Triple Threat for May of 2018 What Inside Counsel Needs to Know The General Data Protection Regulation (GDPR) The eprivacy Regulation (epr) The Network and Information Security Directive (NISD)

Our Topics & Agenda Highlights of the Triple Threat General Data Protection Regulation (GDPR) National Information Security Directive (NISD) eprivacy Regulation (epr) Designing a Compliance Program Legal Management Operational Technical Minefields and gotchas Conclusion 2

Highlights of the Triple Threats All three are effective May 2018 Expansion of territorial and sectoral application of data security and privacy obligations and sanctions Strict data security and privacy reporting obligations Reflects global trend (e.g., see DFARS, NYSDFS Cybersecurity Regulation) Implicates increasingly broader ecosystem of third- and fourth-party vendors 3

General Data Protection Regulation 4

Overview What is GDPR? General Data Protection Regulation Replaces local EU Data Protection Directive implementations (e.g., in UK the Data Protection Act ) Starts on May 25, 2018 Who is Subject? All organizations that collect and process personal data of EU Data Subjects regardless of size No longer applies only to organizations with an office the EU is borderless Applies to data processors not just data controllers What are the Penalties? Up to 20M or 4% of organization s annual global turnover, whichever is higher (board attention is now guaranteed) Data subjects can claim compensation for damages from breaches to their personal data

Key Requirements Breach Notification Privacy By Design & By Default Data Subject s Rights Consent Data Protection Officer (DPO) Requirement to report privacy breaches to the regulator within 72 hours and potentially to the data subject Firms must, when introducing new technology, minimize the collection of personal data and ensure that the right security controls are in place throughout all development phases New rights include the right to erasure ( right to be forgotten ) and the right to data portability Requirement to gain unambiguous consent (i.e., explicit) DPO required for organizations that conduct regular and systematic monitoring of data subjects on a large scale or process Special Categories of data (e.g., healthcare) on a large scale

Top Challenges Data Inventories Third Party Compliance Cross-Border Data Transfers Notice and Consent Right to Erasure Article 30 Requirement to develop Records of processing activities Processors held to essentially the same standard as controllers; Article 28 list of requirements Considerations: Scope, time, and expense Requirement to gain unambiguous consent (i.e., explicit) Is notice given at every collection point? How much search and deletion is enough?

Top Challenges Privacy By Design & By Default Breach Notification Art. 25 Two considerations: (1) data minimization and (2) information security Meeting the 72-hour requirement Data Protection Impact Assessments Data Protection Officer (DPO) Privacy Policy Art. 29 WP 248 list of 10 criteria Art. 37 Determining whether you need a DPO. Some confusion vs. Art. 35 Data Protection Impact Assessments (DPIA) Implied by Art. 32; a principle organizational control; policies vs. notices

eprivacy Regulation 9

eprivacy Regulation January 2017, the European Commission published draft eprivacy Regulation to replace current eprivacy Directive Consolidates member state implementation and Align with the General Data Protection Regulation Applies to any provider of electronic communications services ( ECS ) or to any entity that processes electronic communications data ECS includes voice telephony, SMS, email, internet access services, services consisting wholly or in part in the conveyance of signals (e.g., radio), VoIP, messaging services including services where the messaging function is ancillary (such as dating apps or video game services), web-based email, connected devices (e.g., Internet of Things devices), and public and semi-private Wi-Fi hotspots. 10

eprivacy What s in scope? Entities that process electronic communications data now include Telecoms Providers of publicly available directories Software providers permitting electronic communications, including the presentation and retrieval of online information Natural and legal persons who use ECS to send direct marketing communications or collect information from or stored in end users terminal equipment. The Regulation applies to: Data processed in connection with ECS in the EU, regardless of whether the data is processed in the EU or elsewhere. It also applies to data associated with electronic communications sent from outside the EU to users in the EU. 11

Liability & Penalties The Regulation Permits users to bring suit against any entity that violates the Regulation s provisions. Users may sue for both material and non-material damages. Data protection authorities also have the right to impose monetary penalties for violations of the Regulation. Administrative penalties for violations of the Regulation will correspond with those laid out in the GDPR, ranging up to $10m Euro or 2% of the worldwide annual turnover to up to $20m Euro or 4% of worldwide turnover, whichever is greater, depending on the type of violation. 12

The Network and Information Security Directive (NISD) 13

NISD The purpose is to ensure a high common level of network and information security across the Union. The NIS Directive provides legal measures to boost the overall level of cybersecurity in the EU by ensuring: Preparedness via a Computer Security Incident Response Team (CSIRT) and a competent national NIS authority; Cooperation among Member States to support and facilitate strategic cooperation and exchange of information Establishment of CSIRT Network to promote swift and effective operational cooperation on specific cybersecurity incidents Creation of terms Operators of Essential Services ( OES ) Digital Service Providers ( DSP ) 14

NISD Directive covers sectors vital for our economy and society ( OES ) Energy Transport Water Banking Financial market infrastructures Healthcare and digital infrastructure Additional Providers in Scope Key digital service providers ( DSP ) Search engines Cloud computing services and Online marketplaces 15

NISD Adopted by the European Parliament on 6 July 2016. The Directive entered into force in August 2016. Member States will have 21 months to transpose the Directive into their national laws and 6 months more to identify operators of essential services. Germany has passed the NIS Directive Implementation Act ( NIS-Umsetzungsgesetz ) in April 2017 Significantly increases the territorial and sectoral scope of organizations subject to EU cybersecurity and privacy obligations and introduces strict data security and breach disclosure obligations with potentially severe penalties for non-compliance 16

Discussion What are the opportunities for synchronizing internal initiatives to respond to the Triple Threat? What foundational steps should be taken over the next 3 months? How does the GC balance the business drivers associated with automated processing/profiling and the related security and privacy risks? What are three minefields in driving to the finish line? Who owns these initiatives? 17