SlideShare uma empresa Scribd logo
1 de 41
Baixar para ler offline
Baker Tilly refers to Baker Tilly Virchow Krause, LLP,
an independently owned and managed member of Baker Tilly International.
Privacy Shield: What you
need to know
German American Chamber of Commerce
of the Midwest, Inc.
Nick Graham
Partner
Dentons UK
Jan Hertzberg
Director
Baker Tilly
• European Commission of the European Union (EU) and the US
Department of Commerce reached agreement on a new pact
for data transfers (February 2, 2016)
• “Safe Harbor” agreement was invalidated after the European
Court of Justice found that the US had violated the privacy of
its citizens
• Privacy Shield imposes:
− Stronger obligations on US companies to protect the personal data of EU
citizens
− Stronger monitoring, oversight and enforcement of the agreement
− Limitations and oversight on US government access to data
− US privacy office established to handle complaints of EU citizens
− Annual review of US commitments and performance against the Privacy
Shield agreement
Setting the Scene
2
Privacy Rules (current and future)
Privacy Shield
Securing Personally Identifiable Information (PII)
Wrap-up and takeaways
Q&A
Agenda
3
Baker Tilly refers to Baker Tilly Virchow Krause, LLP,
an independently owned and managed member of Baker Tilly International.
Privacy Rules:
Current Landscape
EU versus US – Treatment of Privacy
European US
Privacy is a human right Privacy is a consumer
protection issue
"Personal Data" "PII" (Personally Identifiable
Information)
No processing of personal
information is the default
The commercial use of
personal information is
acceptable as the default
• Cultural conflicts: e-discovery/litigation 5
Current German Legal Structure deriving
from EU Directive
Each of the other 27 EU
member states have similar
data protection regimes.
Comparable data protection
laws also apply outside the
EU (e.g. Russia).
EU Data Protection Directive
1995
6
When do the rules apply?
The EU rules apply when there is:
− processing
− of personal data
− by a data controller
− established in the EU (in the context of that establishment) or
(where the data controller is established outside of the EEA) using
equipment in the EU.
7
Controllers and Processors
Data Controller:
A person who determines the purposes and means of the processing of
personal data
Data Processor:
A person who processes personal data on behalf of the data controller
ABC KGaA
(Data Controller)
Employee
(Data Subject)
Microsoft
(Data Processor) 8
You will be required to:
• Comply with the Data Protection Principles
• Comply with the Rights of Data Subjects
• Notify its data processing to certain regulators
• Take the Consequences if it fails to comply
What does it mean if EU rules apply?
9
• Transparency: privacy policies and notices
• Comply: with one of the conditions for processing (e.g. consent/necessary to
perform a contract)
• Purpose limitation: only use personal data for specified and lawful
purposes; no incompatible purposes
• Proportionality: personal data to be adequate, relevant and not excessive
• Accuracy: personal data to be accurate/kept up-to-date
• Retention: personal data not to be retained for longer than necessary
• Individual rights: to access, correct and object as well as claim
compensation
• Security: appropriate measures to protect data required
• Exports: no transfers of personal data outside of the EEA without adequate
protection
Data Protection Principles
10
• Regulators can fine us
• Regulators may also have the ability to:
− issue an information notice
− issue an enforcement notice
− seek to bring criminal proceedings
• Compensation
• Bad publicity and reputational harm
• Personal liability for individuals who violate the rules
What happens if we get it wrong?
11
Baker Tilly refers to Baker Tilly Virchow Krause, LLP,
an independently owned and managed member of Baker Tilly International.
Privacy Rules:
Changing Landscape
EU Data Protection Regulation
• Scope: EEA, overseas and processors
• Model: "one stop shop"
• Governance: DPO and "privacy office;" refresh
policies and procedures; training; audit
• Privacy by design
• Privacy by default
IN FORCE FROM 25 MAY 2018
13
EU Data Protection Regulation
• Enhanced rights and duties of transparency and proportionality
• Data breach notification: to be a legal requirement
• Penalties: fines of up to 4% of annual worldwide revenue or EUR 20 million
(USD 22.6 million)
• Risk control: new "principle of accountability." This requires "control
framework" of polices, procedures, training and audit to manage and mitigate
global privacy risk.
14
Baker Tilly refers to Baker Tilly Virchow Krause, LLP,
an independently owned and managed member of Baker Tilly International.
EU-US Privacy Shield
Max Schrems complaint against
Facebook
Safe Harbor declared invalid 6 October 2015
Explore alternative transfer tools
Privacy Shield
Safe Harbor: The Case
16
Privacy Shield: The 7 Principles
• Notice
• Choice
• Accountability for onward transfer
• Security
• Data Integrity and Purpose Limitation
• Access
• Recourse, Enforcement and Liability
17
Old World: Safe Harbor New World : Privacy Shield
"Essentially
equivalent"
• Annual self-certification
• Notice
• Choice
• Onward Transfer
• Security
• Data Integrity / Purpose
Limitation
• Access
• Much more detailed privacy notices
• Onward transfer accountability:
• Agreement with Controllers
• Liability for Processor non-
compliance
Remedies /
individual
Redress
• Federal Trade Commission
Complaint
• Private dispute resolution
• Direct complaint - 45 days response
• ADR / DP Panel
• DP Authority complaints
• DoC Complaints
• Binding arbitration / Privacy Shield Panel
• Ombudsman for National Security
queries
Oversight • Federal Trade Commission
(but no control over public
authorities)
• Foreign Intelligence Services
Court - ex parte proceedings
• Proactive DoC investigation and extra
resource
• Name & shame for removal
• Release of Privacy Shield sections of
compliance reports
• Annual verification
• DP Authorities (especially HR data)
• Ombudsman: all US transfers
• Annual review of Privacy Shield
• Privacy Shield may be suspended
Safe Harbor v Privacy Shield
18
• Who can apply?
• Effective: Aug 1, 2016
• 9 month grace period on vendor contract review (if signed up by
Sept 30, 2016)
• Who have signed up?
Privacy Shield: Implementation
19
Put in place governance - who will own Privacy Shield?
Update notices to data subjects and create Privacy Shield
Privacy Policy
Set-up procedures to enable customers to opt-out, access
their personal information and the ability to correct, amend
or delete the data
Establish an annual compliance review
Set up a complaint handling process
Choose independent dispute resolution body
Update contracts with vendors/suppliers
Privacy Shield: Checklist for applying







20
Upsides
• Provides "adequate protection"
• Stepping stone for BCRs
• Less cumbersome contract
negotiations
Privacy Shield: Upsides and Downsides
Downsides
• Only transfers to the US
• Regulatory scrutiny
• Upgrade to policies/procedures
• FTC enforcement risk
• Annual verification
• Court challenge 21
https://www.privacyshield.gov/welcome
http://ec.europa.eu/justice/data-protection/international-transfers/eu-us-privacy-
shield/index_en.htm
Privacy Shield: How to apply?
22
• Consent from individuals - dubious validity
• Model Clauses - "snap shot" only, so require refreshing
• Binding Corporate Rules - Platinum standard; control framework
Alternative Data Transfer Options?
23
Baker Tilly refers to Baker Tilly Virchow Krause, LLP,
an independently owned and managed member of Baker Tilly International.
Securing Personally
Identifiable Information (PII)
Society Has Become Highly Digital
Hyper-Connectivity
Hyper-Mobility
Highly Sophisticated
Adversaries
Hyper-Sociability
Cyber-Physical “Things”
Physical Cyber “Things”
Smart fridge
can track what it stores,
alerting when products
expire, & even add items to
smartphone shopping list
Sources: Forbes, Vice, Cisco IBSG, University of Michigan, ABC News, Qmed, Network World
Security cameras & systems
can be remotely armed &
checked, get alerts or review
your security feeds from
any location
Lighting systems
can be controlled using a
smartphone app or via the web, as
can fans, hot tubs, water pumps,
thermostats, even door openers
Personal medical devices
can be implantable or
external & allow remote
monitoring / treatment
Today’s cars
are computer-guided and
wirelessly connected via Bluetooth,
GPS, radio protocols
F-35 fighter jet
has a highly advanced computerized
logistics system designed to minimize
repair and re-equipping turnaround
times by monitoring the plane’s status
and pre-emptively making service
decisions so that ground crews are
ready to go before the plane even lands
Smart TVs
connect to the Internet for web
browsing, image sharing, gaming,
or watching streaming video
Sources: http://krebsonsecurity.com/2016/04/fbi-2-3-billion-lost-to-ceo-email-scams/
https://www.fbi.gov/phoenix/press-releases/2016/fbi-warns-of-dramatic-increase-in-business-e-mail-scams
From October 2013 through February
2016, law enforcement received reports
from 17,642 victims.
Total Exposed Loss =
$2.3 billion since 2013
Business Email Compromise:
A Special Kind of “Phish”
The FBI has identified a 270% increase in BEC
attacks victims and exposed loss since Jan. 2015.
Law enforcement globally has received
complaints from victims in every U.S.
state & 95 countries.
In Arizona the average loss per scam is
between $25,000 and $75,000.
Strategies must be Intelligence-Driven
Business Lines
Require AGILITY and fast time
to market to meet business
goals and customer demand
Cyber-Threats
Require us to have MATURE
prevention, detection and
recovery controls to keep pace
Employees
Strive for excellence and are
interested in how and where they
WORK.
Shareholders
Require we protect revenue
to enable GROWTH
Customers
Place TRUST in us and demand we
are careful stewards of their data and
transactions
Regulators
Expect we provide evidence
of a STRONG information
security program
Client and
Strategies must also be Comprehensive
NETWORKS
Are monitored 24x7
IDENTITY & ACCESS
Is appropriate based
on job role
INDUSTRY &
PARTNERSHIPS
Provide actionable cost-
effective threat and risk
intelligence
DATA &
INFORMATION
Is secure at rest
and in transit
APPLICATIONS
Are secure in development
and production
CUSTOMERS & CLIENTS
Are educated on cyber-risks and
their role protecting their devices
Eight Security Ecosystem
Components
ANTICIPATE
emerging threats & risks
ENABLE
business growth while protecting existing revenue
SAFEGUARD
Information & assets
THIRD PARTIES
& VENDORS
Control parity is risk-based and
protections are appropriate
DEVICES
Are secure and patched
regularly to keep
secure over time
Information Security Program
Developed, documented, approved, and implemented security
program. Includes the following:
– Risk Assessment and treatment
– Security policy
– Organization of information security
– Asset management
– Human resources security
– Physical and environmental security
– Communications and operations management
– Access control
– Information systems acquisition, development, and maintenance
– Business continuity management
– Compliance
Security for Privacy Requirements
30
Logical Access Controls
Access to personal information is restricted by procedures that address
the following:
– Authorizing and registering internal personnel
– Identifying & authenticating internal personnel
– Changes and updating access profiles
– Granting permissions for access to IT infrastructure components and
personal information
– Preventing individuals from accessing anything other than their own or
sensitive information
– Limiting access to personal information only to authorized internal
personnel
– Restricting logical access to offline storage, backup data, systems and
media
– Restricting access to system configurations, superuser functionality,
master passwords, powerful utilities, and security devices
– Preventing the introduction of viruses, and malicious code
Security for Privacy Requirements (Cont.)
31
Physical Access Controls
• Restricted to personal information in any form (including the
components of the entity’s system(s) that contain or protect
personal information).
• Examples include:
− Theft
− Espionage
− Dumpster diving
− Social engineering (including phishing)
− Shoulder “surfing”
Security for Privacy Requirements (Cont.)
32
Environmental Safeguards
• Personal information, in all forms, is protected against accidental
disclosure due to natural disasters and environmental hazards
Security for Privacy Requirements (Cont.)
33
Transmitted Personal Information
• Personal information is protected when transmitted by mail or other
physical means such as:
− Emailing data from one person to another
− Faxing data from one person to another
− Updating or editing database information
− Storing data on USB drives, CDs, floppy disks (called “removable
media”)
− Storing data on a computer hard drive or networked drive (called “fixed
media”)
− Deleting information from fixed or removable media
− Scanning of a document and emailing to yourself
• Personal information collected and transmitted over the Internet is
protected by deploying industry-standard encryption technology for
transferring and receiving personal information
Security for Privacy Requirements (Cont.)
34
Personal Information on Portable Media
• Personal information stored on portable media or devices is
protected from unauthorized access.
Security for Privacy Requirements (Cont.)
35
Centralized Device Management
Automatically register user to devices and implements policies
• Low System overhead and limited support staff required
Manage Multiple Device Types and Brands
• Leverages existing investment
Provide Forensic Level Auditing
File level blocking by type and name
Manage Devices off the network
Remote Kill of Devices
Device Coverage:
Optical Products - CD/DVD
USB Flash Drives
External Hard Disk Drives
Multiple Authentication Methods
Password (hardware rules)
Biometric + Password
Validated Encryption
Security for Privacy Requirements (Cont.)
36
Testing Security Safeguards
• Test of the effectiveness of the key administrative, technical, and
physical safeguards protecting personal information are conducted
at least annually.
Security Risk Assessment
• Understand all information systems at a granular level
• Determine what assets really matter (crown jewels)
• Translate and align to business objectives and priorities
• A clear definition of risk tolerance levels is required
• The assessment must be unique to the company and its industry
• The process must be iterative and dynamic to adopt to constant
change
• Standard frameworks improve effectiveness (e.g., NIST, ISO)
Security for Privacy Criteria (Cont.)
37
NIST Cybersecurity Framework
Framework
Categories
Asset Management
Business Environment
Governance
Risk Assessment
Risk Management
Strategy
Access Control
Awareness and Training
Data Security
Information Protection Processes
Maintenance
Protective Technology
Anomalies and Events
Security Continuous
Monitoring
Response Planning
Detection Processes
Communications
Analysis
Mitigation
Improvements
Recovery Planning
Improvements
Communications
• Know your data (mapping)
• Check EU compliance
• Implement PIA
• Implement data transfer solution
• Understand the risks based on the agreement
• Evaluate and Implement data transfer solution
• Conduct a Security Assessment
• Closely Monitor developments
Wrap-up and Takeaways
39
Questions?
40
Contact
41
NICK GRAHAM
PARTNER / GLOBAL CO-CHAIR,
PRIVACY & CYBERSECURITY GROUP
Dentons
Nick.Graham@dentons.com
44 20 7320 6907
JAN HERTZBERG
DIRECTOR,
IL RISK & INTERNAL AUDIT
Baker Tilly
Jan.Hertzberg@bakertilly.com
312 729 8067

Mais conteúdo relacionado

Mais procurados

Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016
John Greenwood
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?
VYTIS MALECKAS
 
[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know
TrustArc
 
Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Datum DPO outsourced May 2016
Datum DPO outsourced May 2016
Mark Honeyball
 

Mais procurados (20)

GDPR: Key Article Overview
GDPR: Key Article OverviewGDPR: Key Article Overview
GDPR: Key Article Overview
 
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
 
The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?
 
The Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection RegulationThe Meaning and Impact of the General Data Protection Regulation
The Meaning and Impact of the General Data Protection Regulation
 
Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016Regulation (EU) 2016_679_GDPR_Overview_June 2016
Regulation (EU) 2016_679_GDPR_Overview_June 2016
 
EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?EY General Data Protection Regulation: Are you ready?
EY General Data Protection Regulation: Are you ready?
 
What is the new data protection regulation GDPR and why should you care? Jesp...
What is the new data protection regulation GDPR and why should you care? Jesp...What is the new data protection regulation GDPR and why should you care? Jesp...
What is the new data protection regulation GDPR and why should you care? Jesp...
 
Replacement standard contractual clauses
Replacement standard contractual clausesReplacement standard contractual clauses
Replacement standard contractual clauses
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 
EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017EU General Data Protection Regulation - Update 2017
EU General Data Protection Regulation - Update 2017
 
[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know[Webinar Slides] Privacy Shield is Here – What You Need to Know
[Webinar Slides] Privacy Shield is Here – What You Need to Know
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
GDPR: Are you Ready?
GDPR: Are you Ready?GDPR: Are you Ready?
GDPR: Are you Ready?
 
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTeEU US Privacy Shield vs. GDPR Infographic from TRUSTe
EU US Privacy Shield vs. GDPR Infographic from TRUSTe
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPR
 
GDPR-Overview
GDPR-OverviewGDPR-Overview
GDPR-Overview
 
Datum DPO outsourced May 2016
Datum DPO outsourced May 2016Datum DPO outsourced May 2016
Datum DPO outsourced May 2016
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPR
 
EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer EU GDPR: The role of the data protection officer
EU GDPR: The role of the data protection officer
 

Destaque

Destaque (20)

The New Privacy Shield for Trans-Atlantic Data - Is the Shield Better, Differ...
The New Privacy Shield for Trans-Atlantic Data - Is the Shield Better, Differ...The New Privacy Shield for Trans-Atlantic Data - Is the Shield Better, Differ...
The New Privacy Shield for Trans-Atlantic Data - Is the Shield Better, Differ...
 
How to comply with Privacy Shield
How to comply with Privacy ShieldHow to comply with Privacy Shield
How to comply with Privacy Shield
 
EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?EU-U.S. Privacy Shield: Should You Sign Up?
EU-U.S. Privacy Shield: Should You Sign Up?
 
Webinar Herramientas de Marketing para aumentar tus ingresos en 2016
Webinar Herramientas de Marketing para aumentar tus ingresos en 2016Webinar Herramientas de Marketing para aumentar tus ingresos en 2016
Webinar Herramientas de Marketing para aumentar tus ingresos en 2016
 
High Availability (HA) Explained - second edition
High Availability (HA) Explained - second editionHigh Availability (HA) Explained - second edition
High Availability (HA) Explained - second edition
 
Preparing for Biosimilars: Key Points for Participating in the U.S. Regulator...
Preparing for Biosimilars: Key Points for Participating in the U.S. Regulator...Preparing for Biosimilars: Key Points for Participating in the U.S. Regulator...
Preparing for Biosimilars: Key Points for Participating in the U.S. Regulator...
 
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSAUS Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
US Consumer Privacy Index 2016 – Infographic from TRUSTe & NCSA
 
EU Safe Harbor – What Now?
EU Safe Harbor – What Now?EU Safe Harbor – What Now?
EU Safe Harbor – What Now?
 
6 Reasons Why Hawaii Is #1
6 Reasons Why Hawaii Is #16 Reasons Why Hawaii Is #1
6 Reasons Why Hawaii Is #1
 
The State of Sales & Marketing at the 50 Fastest-Growing B2B Companies
The State of Sales & Marketing at the 50 Fastest-Growing B2B CompaniesThe State of Sales & Marketing at the 50 Fastest-Growing B2B Companies
The State of Sales & Marketing at the 50 Fastest-Growing B2B Companies
 
Effective Dashboard Design: Why Your Baby is Ugly
Effective Dashboard Design: Why Your Baby is UglyEffective Dashboard Design: Why Your Baby is Ugly
Effective Dashboard Design: Why Your Baby is Ugly
 
Design Principles of Excel Dashboards & Reports
Design Principles of Excel Dashboards & ReportsDesign Principles of Excel Dashboards & Reports
Design Principles of Excel Dashboards & Reports
 
A Quick Simple MS Excel Dashboard
A Quick Simple MS Excel DashboardA Quick Simple MS Excel Dashboard
A Quick Simple MS Excel Dashboard
 
Rundeck & Ansible
Rundeck & AnsibleRundeck & Ansible
Rundeck & Ansible
 
Dashboard - definition, examples
Dashboard - definition, examplesDashboard - definition, examples
Dashboard - definition, examples
 
Shall we play a game?
Shall we play a game?Shall we play a game?
Shall we play a game?
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to SlideshareSTOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
STOP! VIEW THIS! 10-Step Checklist When Uploading to Slideshare
 

Semelhante a EU-US Privacy Shield - Safe Harbor Replacement

ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptxISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
PECB
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Constantine Karbaliotis
 
DMA Legal update: autumn 2013 - Tuesday 1 October
DMA Legal update: autumn 2013 - Tuesday 1 OctoberDMA Legal update: autumn 2013 - Tuesday 1 October
DMA Legal update: autumn 2013 - Tuesday 1 October
Rachel Aldighieri
 

Semelhante a EU-US Privacy Shield - Safe Harbor Replacement (20)

Safe Harbor Webinar
Safe Harbor WebinarSafe Harbor Webinar
Safe Harbor Webinar
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
Privacy shield: What You Need To Know About Storing EU Data
Privacy shield: What You Need To Know About Storing EU DataPrivacy shield: What You Need To Know About Storing EU Data
Privacy shield: What You Need To Know About Storing EU Data
 
Privacy shield what you need to know about storing eu data slideshare
Privacy shield what you need to know about storing  eu data slidesharePrivacy shield what you need to know about storing  eu data slideshare
Privacy shield what you need to know about storing eu data slideshare
 
Gdpr and usa data privacy issues
Gdpr and usa data privacy issuesGdpr and usa data privacy issues
Gdpr and usa data privacy issues
 
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
 
Members evening - data protection
Members evening - data protectionMembers evening - data protection
Members evening - data protection
 
Data Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborData Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe Harbor
 
Gdpr action plan
Gdpr action plan Gdpr action plan
Gdpr action plan
 
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
Ipswitch and cordery on the road  " All you need to know about GDPR but are t...Ipswitch and cordery on the road  " All you need to know about GDPR but are t...
Ipswitch and cordery on the road " All you need to know about GDPR but are t...
 
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptxISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
 
Cross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy ShieldCross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy Shield
 
Taking the Fear Out of GDPR
Taking the Fear Out of GDPRTaking the Fear Out of GDPR
Taking the Fear Out of GDPR
 
What's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) ChangesWhat's Next - General Data Protection Regulation (GDPR) Changes
What's Next - General Data Protection Regulation (GDPR) Changes
 
EU Trade Secrets Directive & Data Protection Changes
EU Trade Secrets Directive & Data Protection ChangesEU Trade Secrets Directive & Data Protection Changes
EU Trade Secrets Directive & Data Protection Changes
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
 
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214Francoise Gilbert Proposed EU Data Protection Regulation-20120214
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
 
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to EU General Data Protection Regulation: Planning, Implementati...
 
DMA Legal update: autumn 2013 - Tuesday 1 October
DMA Legal update: autumn 2013 - Tuesday 1 OctoberDMA Legal update: autumn 2013 - Tuesday 1 October
DMA Legal update: autumn 2013 - Tuesday 1 October
 
TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...
TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...
TrustArc Webinar: New EU-US Data Transfer Agreement - An Important Milestone ...
 

Último

Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
amitlee9823
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
amitlee9823
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
amitlee9823
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
amitlee9823
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter Lessons
JoseMangaJr1
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
only4webmaster01
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
amitlee9823
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
amitlee9823
 

Último (20)

Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Detecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning ApproachDetecting Credit Card Fraud: A Machine Learning Approach
Detecting Credit Card Fraud: A Machine Learning Approach
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Probability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter LessonsProbability Grade 10 Third Quarter Lessons
Probability Grade 10 Third Quarter Lessons
 
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Junnasandra Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
 

EU-US Privacy Shield - Safe Harbor Replacement

  • 1. Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Privacy Shield: What you need to know German American Chamber of Commerce of the Midwest, Inc. Nick Graham Partner Dentons UK Jan Hertzberg Director Baker Tilly
  • 2. • European Commission of the European Union (EU) and the US Department of Commerce reached agreement on a new pact for data transfers (February 2, 2016) • “Safe Harbor” agreement was invalidated after the European Court of Justice found that the US had violated the privacy of its citizens • Privacy Shield imposes: − Stronger obligations on US companies to protect the personal data of EU citizens − Stronger monitoring, oversight and enforcement of the agreement − Limitations and oversight on US government access to data − US privacy office established to handle complaints of EU citizens − Annual review of US commitments and performance against the Privacy Shield agreement Setting the Scene 2
  • 3. Privacy Rules (current and future) Privacy Shield Securing Personally Identifiable Information (PII) Wrap-up and takeaways Q&A Agenda 3
  • 4. Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Privacy Rules: Current Landscape
  • 5. EU versus US – Treatment of Privacy European US Privacy is a human right Privacy is a consumer protection issue "Personal Data" "PII" (Personally Identifiable Information) No processing of personal information is the default The commercial use of personal information is acceptable as the default • Cultural conflicts: e-discovery/litigation 5
  • 6. Current German Legal Structure deriving from EU Directive Each of the other 27 EU member states have similar data protection regimes. Comparable data protection laws also apply outside the EU (e.g. Russia). EU Data Protection Directive 1995 6
  • 7. When do the rules apply? The EU rules apply when there is: − processing − of personal data − by a data controller − established in the EU (in the context of that establishment) or (where the data controller is established outside of the EEA) using equipment in the EU. 7
  • 8. Controllers and Processors Data Controller: A person who determines the purposes and means of the processing of personal data Data Processor: A person who processes personal data on behalf of the data controller ABC KGaA (Data Controller) Employee (Data Subject) Microsoft (Data Processor) 8
  • 9. You will be required to: • Comply with the Data Protection Principles • Comply with the Rights of Data Subjects • Notify its data processing to certain regulators • Take the Consequences if it fails to comply What does it mean if EU rules apply? 9
  • 10. • Transparency: privacy policies and notices • Comply: with one of the conditions for processing (e.g. consent/necessary to perform a contract) • Purpose limitation: only use personal data for specified and lawful purposes; no incompatible purposes • Proportionality: personal data to be adequate, relevant and not excessive • Accuracy: personal data to be accurate/kept up-to-date • Retention: personal data not to be retained for longer than necessary • Individual rights: to access, correct and object as well as claim compensation • Security: appropriate measures to protect data required • Exports: no transfers of personal data outside of the EEA without adequate protection Data Protection Principles 10
  • 11. • Regulators can fine us • Regulators may also have the ability to: − issue an information notice − issue an enforcement notice − seek to bring criminal proceedings • Compensation • Bad publicity and reputational harm • Personal liability for individuals who violate the rules What happens if we get it wrong? 11
  • 12. Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Privacy Rules: Changing Landscape
  • 13. EU Data Protection Regulation • Scope: EEA, overseas and processors • Model: "one stop shop" • Governance: DPO and "privacy office;" refresh policies and procedures; training; audit • Privacy by design • Privacy by default IN FORCE FROM 25 MAY 2018 13
  • 14. EU Data Protection Regulation • Enhanced rights and duties of transparency and proportionality • Data breach notification: to be a legal requirement • Penalties: fines of up to 4% of annual worldwide revenue or EUR 20 million (USD 22.6 million) • Risk control: new "principle of accountability." This requires "control framework" of polices, procedures, training and audit to manage and mitigate global privacy risk. 14
  • 15. Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. EU-US Privacy Shield
  • 16. Max Schrems complaint against Facebook Safe Harbor declared invalid 6 October 2015 Explore alternative transfer tools Privacy Shield Safe Harbor: The Case 16
  • 17. Privacy Shield: The 7 Principles • Notice • Choice • Accountability for onward transfer • Security • Data Integrity and Purpose Limitation • Access • Recourse, Enforcement and Liability 17
  • 18. Old World: Safe Harbor New World : Privacy Shield "Essentially equivalent" • Annual self-certification • Notice • Choice • Onward Transfer • Security • Data Integrity / Purpose Limitation • Access • Much more detailed privacy notices • Onward transfer accountability: • Agreement with Controllers • Liability for Processor non- compliance Remedies / individual Redress • Federal Trade Commission Complaint • Private dispute resolution • Direct complaint - 45 days response • ADR / DP Panel • DP Authority complaints • DoC Complaints • Binding arbitration / Privacy Shield Panel • Ombudsman for National Security queries Oversight • Federal Trade Commission (but no control over public authorities) • Foreign Intelligence Services Court - ex parte proceedings • Proactive DoC investigation and extra resource • Name & shame for removal • Release of Privacy Shield sections of compliance reports • Annual verification • DP Authorities (especially HR data) • Ombudsman: all US transfers • Annual review of Privacy Shield • Privacy Shield may be suspended Safe Harbor v Privacy Shield 18
  • 19. • Who can apply? • Effective: Aug 1, 2016 • 9 month grace period on vendor contract review (if signed up by Sept 30, 2016) • Who have signed up? Privacy Shield: Implementation 19
  • 20. Put in place governance - who will own Privacy Shield? Update notices to data subjects and create Privacy Shield Privacy Policy Set-up procedures to enable customers to opt-out, access their personal information and the ability to correct, amend or delete the data Establish an annual compliance review Set up a complaint handling process Choose independent dispute resolution body Update contracts with vendors/suppliers Privacy Shield: Checklist for applying        20
  • 21. Upsides • Provides "adequate protection" • Stepping stone for BCRs • Less cumbersome contract negotiations Privacy Shield: Upsides and Downsides Downsides • Only transfers to the US • Regulatory scrutiny • Upgrade to policies/procedures • FTC enforcement risk • Annual verification • Court challenge 21
  • 23. • Consent from individuals - dubious validity • Model Clauses - "snap shot" only, so require refreshing • Binding Corporate Rules - Platinum standard; control framework Alternative Data Transfer Options? 23
  • 24. Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Securing Personally Identifiable Information (PII)
  • 25. Society Has Become Highly Digital Hyper-Connectivity Hyper-Mobility Highly Sophisticated Adversaries Hyper-Sociability Cyber-Physical “Things”
  • 26. Physical Cyber “Things” Smart fridge can track what it stores, alerting when products expire, & even add items to smartphone shopping list Sources: Forbes, Vice, Cisco IBSG, University of Michigan, ABC News, Qmed, Network World Security cameras & systems can be remotely armed & checked, get alerts or review your security feeds from any location Lighting systems can be controlled using a smartphone app or via the web, as can fans, hot tubs, water pumps, thermostats, even door openers Personal medical devices can be implantable or external & allow remote monitoring / treatment Today’s cars are computer-guided and wirelessly connected via Bluetooth, GPS, radio protocols F-35 fighter jet has a highly advanced computerized logistics system designed to minimize repair and re-equipping turnaround times by monitoring the plane’s status and pre-emptively making service decisions so that ground crews are ready to go before the plane even lands Smart TVs connect to the Internet for web browsing, image sharing, gaming, or watching streaming video
  • 27. Sources: http://krebsonsecurity.com/2016/04/fbi-2-3-billion-lost-to-ceo-email-scams/ https://www.fbi.gov/phoenix/press-releases/2016/fbi-warns-of-dramatic-increase-in-business-e-mail-scams From October 2013 through February 2016, law enforcement received reports from 17,642 victims. Total Exposed Loss = $2.3 billion since 2013 Business Email Compromise: A Special Kind of “Phish” The FBI has identified a 270% increase in BEC attacks victims and exposed loss since Jan. 2015. Law enforcement globally has received complaints from victims in every U.S. state & 95 countries. In Arizona the average loss per scam is between $25,000 and $75,000.
  • 28. Strategies must be Intelligence-Driven Business Lines Require AGILITY and fast time to market to meet business goals and customer demand Cyber-Threats Require us to have MATURE prevention, detection and recovery controls to keep pace Employees Strive for excellence and are interested in how and where they WORK. Shareholders Require we protect revenue to enable GROWTH Customers Place TRUST in us and demand we are careful stewards of their data and transactions Regulators Expect we provide evidence of a STRONG information security program Client and
  • 29. Strategies must also be Comprehensive NETWORKS Are monitored 24x7 IDENTITY & ACCESS Is appropriate based on job role INDUSTRY & PARTNERSHIPS Provide actionable cost- effective threat and risk intelligence DATA & INFORMATION Is secure at rest and in transit APPLICATIONS Are secure in development and production CUSTOMERS & CLIENTS Are educated on cyber-risks and their role protecting their devices Eight Security Ecosystem Components ANTICIPATE emerging threats & risks ENABLE business growth while protecting existing revenue SAFEGUARD Information & assets THIRD PARTIES & VENDORS Control parity is risk-based and protections are appropriate DEVICES Are secure and patched regularly to keep secure over time
  • 30. Information Security Program Developed, documented, approved, and implemented security program. Includes the following: – Risk Assessment and treatment – Security policy – Organization of information security – Asset management – Human resources security – Physical and environmental security – Communications and operations management – Access control – Information systems acquisition, development, and maintenance – Business continuity management – Compliance Security for Privacy Requirements 30
  • 31. Logical Access Controls Access to personal information is restricted by procedures that address the following: – Authorizing and registering internal personnel – Identifying & authenticating internal personnel – Changes and updating access profiles – Granting permissions for access to IT infrastructure components and personal information – Preventing individuals from accessing anything other than their own or sensitive information – Limiting access to personal information only to authorized internal personnel – Restricting logical access to offline storage, backup data, systems and media – Restricting access to system configurations, superuser functionality, master passwords, powerful utilities, and security devices – Preventing the introduction of viruses, and malicious code Security for Privacy Requirements (Cont.) 31
  • 32. Physical Access Controls • Restricted to personal information in any form (including the components of the entity’s system(s) that contain or protect personal information). • Examples include: − Theft − Espionage − Dumpster diving − Social engineering (including phishing) − Shoulder “surfing” Security for Privacy Requirements (Cont.) 32
  • 33. Environmental Safeguards • Personal information, in all forms, is protected against accidental disclosure due to natural disasters and environmental hazards Security for Privacy Requirements (Cont.) 33
  • 34. Transmitted Personal Information • Personal information is protected when transmitted by mail or other physical means such as: − Emailing data from one person to another − Faxing data from one person to another − Updating or editing database information − Storing data on USB drives, CDs, floppy disks (called “removable media”) − Storing data on a computer hard drive or networked drive (called “fixed media”) − Deleting information from fixed or removable media − Scanning of a document and emailing to yourself • Personal information collected and transmitted over the Internet is protected by deploying industry-standard encryption technology for transferring and receiving personal information Security for Privacy Requirements (Cont.) 34
  • 35. Personal Information on Portable Media • Personal information stored on portable media or devices is protected from unauthorized access. Security for Privacy Requirements (Cont.) 35
  • 36. Centralized Device Management Automatically register user to devices and implements policies • Low System overhead and limited support staff required Manage Multiple Device Types and Brands • Leverages existing investment Provide Forensic Level Auditing File level blocking by type and name Manage Devices off the network Remote Kill of Devices Device Coverage: Optical Products - CD/DVD USB Flash Drives External Hard Disk Drives Multiple Authentication Methods Password (hardware rules) Biometric + Password Validated Encryption Security for Privacy Requirements (Cont.) 36
  • 37. Testing Security Safeguards • Test of the effectiveness of the key administrative, technical, and physical safeguards protecting personal information are conducted at least annually. Security Risk Assessment • Understand all information systems at a granular level • Determine what assets really matter (crown jewels) • Translate and align to business objectives and priorities • A clear definition of risk tolerance levels is required • The assessment must be unique to the company and its industry • The process must be iterative and dynamic to adopt to constant change • Standard frameworks improve effectiveness (e.g., NIST, ISO) Security for Privacy Criteria (Cont.) 37
  • 38. NIST Cybersecurity Framework Framework Categories Asset Management Business Environment Governance Risk Assessment Risk Management Strategy Access Control Awareness and Training Data Security Information Protection Processes Maintenance Protective Technology Anomalies and Events Security Continuous Monitoring Response Planning Detection Processes Communications Analysis Mitigation Improvements Recovery Planning Improvements Communications
  • 39. • Know your data (mapping) • Check EU compliance • Implement PIA • Implement data transfer solution • Understand the risks based on the agreement • Evaluate and Implement data transfer solution • Conduct a Security Assessment • Closely Monitor developments Wrap-up and Takeaways 39
  • 41. Contact 41 NICK GRAHAM PARTNER / GLOBAL CO-CHAIR, PRIVACY & CYBERSECURITY GROUP Dentons Nick.Graham@dentons.com 44 20 7320 6907 JAN HERTZBERG DIRECTOR, IL RISK & INTERNAL AUDIT Baker Tilly Jan.Hertzberg@bakertilly.com 312 729 8067