SlideShare a Scribd company logo
1
How does IBM support clients around data protection (GDPR)
and cyber security (NIS) legislation?
In 2016, significant new cyber security and data protection legislation is being adopted in
Europe: the General Data Protection Regulation (GDPR) and the Network and Information
Security (NIS) Directive. These legislation changes will affect customers in Europe, as well as
those around the world doing business with Europe. IBM has been working on these issues for
the last few years. In this paper, we share our perspective on some of the key changes, their
implications and how IBM can help clients prepare for the changes necessary to meet the new
regulatory and compliance requirements.
The new General Data Protection Regulation
Current European Union (EU) Data Protection rules date back to 1995. The EU was keen to
establish a new set of rules that reflected the current reality of data usage and in response to
calls that existing data protection laws were out of date. In January 2012, the European
Commission made a proposal for a single harmonized General Data Protection Regulation
across the EU.
After four years of intense negotiations, a political agreement on the General Data Protection
Regulation was finally reached in December 2015. This was formally adopted into European law
in May 20161. Companies now have two years to implement and conform to the new
regulation, which will enter into force in 2018. A parallel Directive affecting the processing of
data by law enforcement authorities was agreed at the same time2.
Member States and their relevant National Data Protection Authorities (DPAs) will now provide
clarification and informative guidelines to help companies implement the regulation and to
continue to do business with legal certainty. The National DPAs will build a European Data
Protection Board that will coordinate the national DPA’s across the EU and issue opinions on
different aspects of the regulation to guide the implementation phase.
What are the implications?
The GDPR introduces significant changes to how companies must handle and process personal
data. Processes from collection, processing, retention and deletion will have to be revised so
they are compliant under the stricter data protection rules. Internal governance processes will
have to change. For example, new data governance obligations will require companies who
1
General Data Protection Regulation – Final Text
2
Directive affecting the processing of personal data for law enforcement purposes
2
process data to prepare and keep records of processing activities, and also to demonstrate how
decisions to use data for further processing have been reached. Even more than today,
personal data must be processed in a transparent manner, collected for explicit and legitimate
purposes (‘purpose limitation’), limited to what is necessary in relation to the purposes for
which they are processed (‘data minimization’) and must be accurate (and kept up to date).
New rights for Data Subjects
Data subjects, people whose personal data is stored, have new mandatory rights which give
them more control over their personal data. This includes, amongst others, the right to be
forgotten (erasure) and the right to data portability. Data subjects who require more
information on their data and the rights they have will also be able to request that more easily
than they can today, and information about actions taken to satisfy their rights need to be
provided within a month in principle.
• Consent must be clearly distinguishable from other written declarations and cannot be
hidden within other information notices.
• Privacy policies surrounding data processing on these aspects will be longer and more
detailed.
• Companies will have to keep a track record to show where the different sources of data
have come from, how the data has been collected, and demonstrate the explicit consent
of the data subjects.
There will thus be an increase in administrative burden in these areas and will be particularly
difficult for companies who still store data on paper.
New responsibilities for Data Controllers & Data Processors
The regulation introduces a new concept of joint liability for both data controllers and
processers under which data processors are now jointly liable to data subjects for damages
unless they can prove that a breach, for example, was not their fault. This now also means that
previous contractual obligations may need to be revised, and new contracts will require
appropriate stipulations.
Data controllers will have more responsibility to provide concise information on how data is
processed. For example, they will have to detail the retention period of storage of the data and
need to inform about the legal basis for the processing. In addition not only data controllers,
but also data processors need to maintain records of their processing activities.
The principle of ‘Data Protection by Design’ is emphasized in the new regulation, and needs to
become part of best practices in all product life-cycles. Each part of designing or compiling a
3
new solution needs to show that the rights of the data subject were taken into account. This
can for example be used through methods of pseudonymization or encryption.
The regulation also introduces a new security breach notification, which is applicable for all
data controllers across sectors. Data processors have to report respective breaches to the data
controller. Data controllers must now also report security breaches to their supervisory
authority without undue delay and, where feasible, no more than 72 hours after having
become aware of it. In some cases, individuals need to be notified directly.
Privacy Impact Assessments will be required when organizations want to undertake certain
type of processing of personal data.
Transfer of Personal Data (Data transmission to Third Parties)
The transfer of personal data provisions remain largely the same as was outlined in the
previous directive. Transfer mechanisms such as Model Clauses and Binding Corporate Rules
can still be used. Data transfers under the mechanisms of ‘Safe Harbor’ are no longer
permissible, following its invalidation in October 2015. For data transfers previously held under
‘Safe Harbor,’ the renamed ‘Privacy Shield’ agreement has yet to be approved by the EU
Member States. This transfer mechanism has more stringent rules then the previous Safe
Harbor agreement. For example, it offers more channels for the data subject to seek redress.
How can IBM help?
IBM offers services and solutions which can help clients around the world prepare for these
changes. Some examples include:
• IBM Data Privacy Consulting Services can help customers identify areas of their
business which may be impacted by the GDPR. IBM Consulting experts work with clients
to help them on organization design, and developing and implementing solutions in line
with data privacy requirements, as well as from an operational, information technology
and information security perspective, all of which are key to data privacy/protection
compliance.
• IBM Security Solutions help detect, address and prevent security breaches, through
integrated hardware and software solutions. IBM® Security Guardium is a
comprehensive data security platform that provides a full range of capabilities – from
discovery and classification of sensitive data to vulnerability assessment to data and file
activity monitoring to masking, encryption, blocking, alerting and quarantining to
protect sensitive data.
4
• IBM Cloud & Cognitive Services are transparent and agile enough to fit our client’s
needs. In general, clients will need help ensuring they are compliant in the way they
process personal data through their internal (governance) processes, by keeping track of
and reporting data breaches, and documenting how data is obtained, from where, on
what date, etc.
• IBM Information Integration & Governance (IIG) can provide agile data integration and
governance to build confidence in data exploration and management. The IIG also can
provide insight into unstructured data, and also the tools and methodologies to
instrument and enforce policies.
The new Network and Information Security Directive
In 2012, the commission proposed a new law to drive enhanced cyber security across Europe,
stating that existing capabilities were not sufficient to ensure a high level of security of network
and information systems within the Union. The Network and Information Security (NIS)
Directive is the resulting new legal framework in Europe covering cyber security or Network and
Information Security. It is going through its final processes to become law in 2016. This new EU
law directs Member States to create or adapt their laws covering Network and Information
Security in line with the scope of the directive.
European Member States will have 21 months to implement the NIS directive – each national
government will use the directive as their “template” to adjust local laws. This process starts
once the directive has been finalized and published and will continue through 2018, until the
maximum amount of time each Member State has to implement the directive has expired.
Some Member States have already started to align their national cyber security strategy, their
operational capabilities and their legislation with the directive.
In the new legislation, operators of essential services in critical industry sectors are placed at
the highest risk level, and areas such as cloud computing providers are subject to a lighter touch
approach in a new category of providers called digital service providers (or DSPs).
5
What are the implications?
The NIS Directive imposes a new set of security obligations and incident reporting requirements
on a broad set of private sector companies, many of whom are IBM clients. The primary focus
will be on operators of essential services in critical industry sectors, as well as on incident
reporting requirements for a broad set of DSPs – online search engines, online marketplaces
and cloud computing providers. The directive however goes further into requiring appropriate
security measures. Some of the core changes which are being driven in the directive are:
New requirements for Incident Reporting
Thresholds are now set out to determine whether an incident should be categorized as having a
significant impact on the continuity of essential services, and would thus need to be notified by
operators of essential services to the relevant government authority. The aspects which will
need to be particularly considered now include:
• Number of users affected by the disruption of the essential service;
• Duration of the incident;
• The geographical area affected.
New Government National Regulatory Authorities
Organizations will see new arrangements being put in place for coordinating cyber security
issues. Each Member State government will set out one or more competent national authorities
responsible for fulfilling the tasks linked to the security of the network and information systems
of operators of essential services and DSPs. These governments also will be required to
designate in each country a national single point of contact responsible for coordinating issues
related to the security of network and information systems and cross–border cooperation at
the EU-level.
New National Cyber Security Capabilities
Organizations will also see Member State governments directed to ensure that every EU
Member State has in place well-functioning Cyber Security Incident Response Teams (CSIRTs),
also known as Computer Emergency Response Teams (CERTs). These will have to meet essential
capability requirements for dealing with incidents and risks, and ensuring efficient cooperation
at the Union level.
6
New Risk Management requirements
The NIS directive calls for a culture of risk management, involving risk assessment and the
implementation of security measures appropriate and proportionate to the risks faced. These
are to be promoted and developed through appropriate regulatory requirements and voluntary
industry practices. This will potentially require IBM clients to demonstrate that they are
conducting risk assessments, and that they have implemented appropriate security measures.
Some requirements already exist around risk assessment and reporting with respect to
essential services, and new requirements for essential services may be set at national level.
Operators of essential services under this legislation include operators in the following industry
sectors: energy, transport, banking, financial market infrastructures, health, drinking water
supply and distribution and digital infrastructures such as internet exchange points. The other
category of DSPs will see requirements created on a pan-European basis.
How can IBM help?
As the NIS Directive is being rolled out across Europe, clients are asking for our views, for help
in understanding how the directive can be applied, and whether we have services and solutions
available to bolster their Network and Information Security. Examples of relevant IBM offerings
include:
• IBM Security Consulting Services are helping clients build Security Operations Centers
and Computer Emergency Response Team (CERT) capabilities. We are helping clients
optimize existing capabilities, and develop a strategy and plan to build next-generation
threat intelligence, enterprise monitoring and security operation centers.
• IBM X-Force Incident Response Solutions are helping clients plan for and manage
security incidents. Consulting teams are working with clients to create security incident
processes and, with the new capabilities of IBM Resilient Systems solutions, helping
clients collect and manage information in connection with their compliance
requirements.
These are examples of the range of capabilities - from risk assessment, developing and
implementing appropriate security measures and enabling capacity around incident reporting –
available to clients looking to run their own operations, or reaching out for cloud and managed
service delivery models.
7
Summary
The evolving European regulatory environment on cyber security and data protection offers
both possibilities and challenges for both IBM and our clients. These challenges range from
governance to securing application and infrastructure. Fundamentally, it is important to assure
stakeholders of IBM’s expertise and capabilities in these areas in order to build upon existing
trust and confidence in our brand.
IBM has extensive experience helping clients navigate regulatory environments in Europe and
around the world. We have done this successfully through consulting services and solutions and
through our delivery of cloud and cognitive solutions. This paper reflects IBM’s general view of
Europe’s new regulatory landscape. It is not, however, intended to be exhaustive and does not
describe every procedure and technical detail that could be required.
The key to establishing preparedness in this new era lies in choosing the right partner(s) for
your organization, and being able to deploy appropriate security and data protection controls
and procedures in a way that can be rapidly and readily demonstrated. We understand this is
not just a technical challenge, but a challenge of governance and compliance, applications and
infrastructure and assurance.
8
Author Nick Coleman
IBM Global Head Cyber Intelligence
Email: coleman@uk.ibm.com
twitter.com/colemansec
© Copyright IBM Corporation 2016
IBM, the IBM logo and ibm.com are trademarks of International Business Machines Corp.,
registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web
at “Copyright and trademark information” at www.ibm.com/legal/ copytrade.shtml.
This document is current as of the initial date of publication and may be changed by IBM at any
time. Not all offerings are available in every country in which IBM operates.
The information in this document is provided “as is” without any warranty, express or implied,
including without any warranties of merchantability, fitness for a particular purpose and any
warranty or condition of non-infringement. IBM products are warranted according to the terms
and conditions of the agreements under which they are provided.
This report is intended for general guidance only. It is not intended to be a substitute for
detailed research or the exercise of professional judgment. IBM shall not be responsible for any
loss whatsoever sustained by any organization or person who relies on this publication.
The data used in this report may be derived from third-party sources and IBM does not
independently verify, validate or audit such data. The results from the use of such data are
provided on an “as is” basis and IBM makes no representations or warranties, express or
implied.

More Related Content

PDF
GDPR and Irish SMEs May 2017
PDF
2016 11-17-gdpr-integro-webinar
PPTX
GDPR and NIS Compliance - How HyTrust Can Help
PDF
The Essential Guide to GDPR
PPTX
GDPR security services - Areyou ready ?
PPTX
EU GDPR - 12 Steps To Compliance
PPTX
An Essential Guide to EU GDPR
PDF
GDPR what you should know and how to minimize impact on your business
GDPR and Irish SMEs May 2017
2016 11-17-gdpr-integro-webinar
GDPR and NIS Compliance - How HyTrust Can Help
The Essential Guide to GDPR
GDPR security services - Areyou ready ?
EU GDPR - 12 Steps To Compliance
An Essential Guide to EU GDPR
GDPR what you should know and how to minimize impact on your business

What's hot (19)

PPTX
12 steps to gdpr compliance unleashed
PDF
20170323 are you ready the new gdpr is here
PDF
3GRC approach to GDPR V 0.1 www.3grc.co.uk
PPTX
GDPR – The Practicalities of a New Reality
PPTX
Teradata's approach to addressing GDPR
PPTX
GDPR practical info session for development
PDF
Convince your board - Ten steps to GDPR compliance
PPTX
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
PPTX
Gdpr action plan
PDF
GDPR for Dummies
PDF
SureSkills GDPR - Discover the Smart Solution
PDF
[Presentation] GDPR - How to Ensure Compliance
PPTX
Findability Day 2016 - What is GDPR?
PPTX
GDPR Presentation slides
PPTX
Preparing for general data protection regulations (gdpr) within the hous...
PPTX
Gdpr action plan - ISSA
PDF
GDPR: the legal aspects. By Matthias of theJurists Europe.
PDF
DAMA Ireland - GDPR
PDF
GDPR - a view for the non experts
12 steps to gdpr compliance unleashed
20170323 are you ready the new gdpr is here
3GRC approach to GDPR V 0.1 www.3grc.co.uk
GDPR – The Practicalities of a New Reality
Teradata's approach to addressing GDPR
GDPR practical info session for development
Convince your board - Ten steps to GDPR compliance
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Gdpr action plan
GDPR for Dummies
SureSkills GDPR - Discover the Smart Solution
[Presentation] GDPR - How to Ensure Compliance
Findability Day 2016 - What is GDPR?
GDPR Presentation slides
Preparing for general data protection regulations (gdpr) within the hous...
Gdpr action plan - ISSA
GDPR: the legal aspects. By Matthias of theJurists Europe.
DAMA Ireland - GDPR
GDPR - a view for the non experts
Ad

Viewers also liked (20)

PPTX
Gdpr security services
PDF
GDPR Implementation Basics_Igor Mate_2016 CEE GC Summit_Istanbul
PDF
World of Watson 2016 - Information Insecurity
PPTX
CORPORATE GOVERNANCE IN A CHANGING ORGANIZATION
PDF
White-Paper_Security-DBSec_EU-GDPR_06-2016
PDF
The Essential Guide to GDPR
PPTX
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
PPTX
Graphics for big data reference architecture blog
PDF
Enterprise Security Architecture: From access to audit
PPTX
GDPRR: The Key Changes
PDF
Preparing for EU GDPR
PDF
Developer view on new EU privacy legislation (GDPR)
PDF
GDPR in a nutshell
PPT
efecto doppler
PPTX
Teleconferencias
PPTX
tranSMART Community Meeting 5-7 Nov 13 - Session 2: MongoDB: What, Why And When
PDF
Locking down a Hitachi ID Management Suite server
PPT
Clemente De Lucia, Senior Economist at BNP Paribas - How should the ECB act t...
PPS
黃晴與彭立人醫師的對話錄
PPTX
Inmigración Armenia
Gdpr security services
GDPR Implementation Basics_Igor Mate_2016 CEE GC Summit_Istanbul
World of Watson 2016 - Information Insecurity
CORPORATE GOVERNANCE IN A CHANGING ORGANIZATION
White-Paper_Security-DBSec_EU-GDPR_06-2016
The Essential Guide to GDPR
GDPR clinic - CloudWATCH at Cloud Security Expo 2017
Graphics for big data reference architecture blog
Enterprise Security Architecture: From access to audit
GDPRR: The Key Changes
Preparing for EU GDPR
Developer view on new EU privacy legislation (GDPR)
GDPR in a nutshell
efecto doppler
Teleconferencias
tranSMART Community Meeting 5-7 Nov 13 - Session 2: MongoDB: What, Why And When
Locking down a Hitachi ID Management Suite server
Clemente De Lucia, Senior Economist at BNP Paribas - How should the ECB act t...
黃晴與彭立人醫師的對話錄
Inmigración Armenia
Ad

Similar to How IBM Supports Clients around GDPR and Cybersecurity Legislation (20)

PDF
GDPRIBMWhitePaper
PDF
GDPR- Get the facts and prepare your business
PPTX
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
PDF
LW-Privacy-GDPR-Compliance-Checklist.pdf
PDF
Aon GDPR white paper
PDF
Understanding Binding Corporate Rules
PPTX
2015-0318 GAC Presentation - BCR - 05052015
PDF
The Evolution of Data Privacy: 3 things you didn’t know
PPTX
Impact of GDPR on the pre dominant business model for digital economies
PDF
Cognizant business consulting the impacts of gdpr
PPTX
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
DOCX
General data protection regulation - European union
PDF
Embracing Digital Convergence amid Regulatory-Driven Overhauls
PPTX
Practical Guide to GDPR 2017
PDF
Rollits Education Focus Summer 2017
PDF
EU Data Protection Regulation Skyhigh Networks
PDF
Infographic : What's going to change with the GDPR (2018)
PDF
The Evolution of Data Privacy: 3 Things You Need To Consider
PDF
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
PDF
Privacy Year In Preview
GDPRIBMWhitePaper
GDPR- Get the facts and prepare your business
General Data Protection Regulation (GDPR) - Moving from confusion to readiness
LW-Privacy-GDPR-Compliance-Checklist.pdf
Aon GDPR white paper
Understanding Binding Corporate Rules
2015-0318 GAC Presentation - BCR - 05052015
The Evolution of Data Privacy: 3 things you didn’t know
Impact of GDPR on the pre dominant business model for digital economies
Cognizant business consulting the impacts of gdpr
"The EU General Data Protection Regulation: GDPR" - TRA Annual Meeting 2018
General data protection regulation - European union
Embracing Digital Convergence amid Regulatory-Driven Overhauls
Practical Guide to GDPR 2017
Rollits Education Focus Summer 2017
EU Data Protection Regulation Skyhigh Networks
Infographic : What's going to change with the GDPR (2018)
The Evolution of Data Privacy: 3 Things You Need To Consider
The Evolution of Data Privacy - A Symantec Information Security Perspective o...
Privacy Year In Preview

More from IBM Security (20)

PPTX
Automation: Embracing the Future of SecOps
PDF
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
PDF
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
PPTX
Integrated Response with v32 of IBM Resilient
PDF
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
PDF
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
PDF
Accelerating SOC Transformation with IBM Resilient and Carbon Black
PDF
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
PPTX
Are You Ready to Move Your IAM to the Cloud?
PPTX
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
PPTX
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
PPTX
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
PPTX
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
PDF
WannaCry Ransomware Attack: What to Do Now
PPTX
How to Improve Threat Detection & Simplify Security Operations
PPTX
IBM QRadar UBA
PDF
Mobile Vision 2020
PDF
Retail Mobility, Productivity and Security
PDF
Close the Loop on Incident Response
PDF
Orchestrate Your Security Defenses; Protect Against Insider Threats
Automation: Embracing the Future of SecOps
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Integrated Response with v32 of IBM Resilient
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Accelerating SOC Transformation with IBM Resilient and Carbon Black
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
Are You Ready to Move Your IAM to the Cloud?
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
WannaCry Ransomware Attack: What to Do Now
How to Improve Threat Detection & Simplify Security Operations
IBM QRadar UBA
Mobile Vision 2020
Retail Mobility, Productivity and Security
Close the Loop on Incident Response
Orchestrate Your Security Defenses; Protect Against Insider Threats

Recently uploaded (20)

PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PDF
Mega Projects Data Mega Projects Data
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
1_Introduction to advance data techniques.pptx
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PPTX
Supervised vs unsupervised machine learning algorithms
PDF
Introduction to Business Data Analytics.
PPTX
Business Acumen Training GuidePresentation.pptx
PDF
.pdf is not working space design for the following data for the following dat...
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPTX
Introduction to Knowledge Engineering Part 1
PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PDF
Clinical guidelines as a resource for EBP(1).pdf
PPTX
Global journeys: estimating international migration
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
Mega Projects Data Mega Projects Data
IBA_Chapter_11_Slides_Final_Accessible.pptx
1_Introduction to advance data techniques.pptx
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
Data_Analytics_and_PowerBI_Presentation.pptx
Supervised vs unsupervised machine learning algorithms
Introduction to Business Data Analytics.
Business Acumen Training GuidePresentation.pptx
.pdf is not working space design for the following data for the following dat...
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
Introduction to Knowledge Engineering Part 1
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
Clinical guidelines as a resource for EBP(1).pdf
Global journeys: estimating international migration
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb

How IBM Supports Clients around GDPR and Cybersecurity Legislation

  • 1. 1 How does IBM support clients around data protection (GDPR) and cyber security (NIS) legislation? In 2016, significant new cyber security and data protection legislation is being adopted in Europe: the General Data Protection Regulation (GDPR) and the Network and Information Security (NIS) Directive. These legislation changes will affect customers in Europe, as well as those around the world doing business with Europe. IBM has been working on these issues for the last few years. In this paper, we share our perspective on some of the key changes, their implications and how IBM can help clients prepare for the changes necessary to meet the new regulatory and compliance requirements. The new General Data Protection Regulation Current European Union (EU) Data Protection rules date back to 1995. The EU was keen to establish a new set of rules that reflected the current reality of data usage and in response to calls that existing data protection laws were out of date. In January 2012, the European Commission made a proposal for a single harmonized General Data Protection Regulation across the EU. After four years of intense negotiations, a political agreement on the General Data Protection Regulation was finally reached in December 2015. This was formally adopted into European law in May 20161. Companies now have two years to implement and conform to the new regulation, which will enter into force in 2018. A parallel Directive affecting the processing of data by law enforcement authorities was agreed at the same time2. Member States and their relevant National Data Protection Authorities (DPAs) will now provide clarification and informative guidelines to help companies implement the regulation and to continue to do business with legal certainty. The National DPAs will build a European Data Protection Board that will coordinate the national DPA’s across the EU and issue opinions on different aspects of the regulation to guide the implementation phase. What are the implications? The GDPR introduces significant changes to how companies must handle and process personal data. Processes from collection, processing, retention and deletion will have to be revised so they are compliant under the stricter data protection rules. Internal governance processes will have to change. For example, new data governance obligations will require companies who 1 General Data Protection Regulation – Final Text 2 Directive affecting the processing of personal data for law enforcement purposes
  • 2. 2 process data to prepare and keep records of processing activities, and also to demonstrate how decisions to use data for further processing have been reached. Even more than today, personal data must be processed in a transparent manner, collected for explicit and legitimate purposes (‘purpose limitation’), limited to what is necessary in relation to the purposes for which they are processed (‘data minimization’) and must be accurate (and kept up to date). New rights for Data Subjects Data subjects, people whose personal data is stored, have new mandatory rights which give them more control over their personal data. This includes, amongst others, the right to be forgotten (erasure) and the right to data portability. Data subjects who require more information on their data and the rights they have will also be able to request that more easily than they can today, and information about actions taken to satisfy their rights need to be provided within a month in principle. • Consent must be clearly distinguishable from other written declarations and cannot be hidden within other information notices. • Privacy policies surrounding data processing on these aspects will be longer and more detailed. • Companies will have to keep a track record to show where the different sources of data have come from, how the data has been collected, and demonstrate the explicit consent of the data subjects. There will thus be an increase in administrative burden in these areas and will be particularly difficult for companies who still store data on paper. New responsibilities for Data Controllers & Data Processors The regulation introduces a new concept of joint liability for both data controllers and processers under which data processors are now jointly liable to data subjects for damages unless they can prove that a breach, for example, was not their fault. This now also means that previous contractual obligations may need to be revised, and new contracts will require appropriate stipulations. Data controllers will have more responsibility to provide concise information on how data is processed. For example, they will have to detail the retention period of storage of the data and need to inform about the legal basis for the processing. In addition not only data controllers, but also data processors need to maintain records of their processing activities. The principle of ‘Data Protection by Design’ is emphasized in the new regulation, and needs to become part of best practices in all product life-cycles. Each part of designing or compiling a
  • 3. 3 new solution needs to show that the rights of the data subject were taken into account. This can for example be used through methods of pseudonymization or encryption. The regulation also introduces a new security breach notification, which is applicable for all data controllers across sectors. Data processors have to report respective breaches to the data controller. Data controllers must now also report security breaches to their supervisory authority without undue delay and, where feasible, no more than 72 hours after having become aware of it. In some cases, individuals need to be notified directly. Privacy Impact Assessments will be required when organizations want to undertake certain type of processing of personal data. Transfer of Personal Data (Data transmission to Third Parties) The transfer of personal data provisions remain largely the same as was outlined in the previous directive. Transfer mechanisms such as Model Clauses and Binding Corporate Rules can still be used. Data transfers under the mechanisms of ‘Safe Harbor’ are no longer permissible, following its invalidation in October 2015. For data transfers previously held under ‘Safe Harbor,’ the renamed ‘Privacy Shield’ agreement has yet to be approved by the EU Member States. This transfer mechanism has more stringent rules then the previous Safe Harbor agreement. For example, it offers more channels for the data subject to seek redress. How can IBM help? IBM offers services and solutions which can help clients around the world prepare for these changes. Some examples include: • IBM Data Privacy Consulting Services can help customers identify areas of their business which may be impacted by the GDPR. IBM Consulting experts work with clients to help them on organization design, and developing and implementing solutions in line with data privacy requirements, as well as from an operational, information technology and information security perspective, all of which are key to data privacy/protection compliance. • IBM Security Solutions help detect, address and prevent security breaches, through integrated hardware and software solutions. IBM® Security Guardium is a comprehensive data security platform that provides a full range of capabilities – from discovery and classification of sensitive data to vulnerability assessment to data and file activity monitoring to masking, encryption, blocking, alerting and quarantining to protect sensitive data.
  • 4. 4 • IBM Cloud & Cognitive Services are transparent and agile enough to fit our client’s needs. In general, clients will need help ensuring they are compliant in the way they process personal data through their internal (governance) processes, by keeping track of and reporting data breaches, and documenting how data is obtained, from where, on what date, etc. • IBM Information Integration & Governance (IIG) can provide agile data integration and governance to build confidence in data exploration and management. The IIG also can provide insight into unstructured data, and also the tools and methodologies to instrument and enforce policies. The new Network and Information Security Directive In 2012, the commission proposed a new law to drive enhanced cyber security across Europe, stating that existing capabilities were not sufficient to ensure a high level of security of network and information systems within the Union. The Network and Information Security (NIS) Directive is the resulting new legal framework in Europe covering cyber security or Network and Information Security. It is going through its final processes to become law in 2016. This new EU law directs Member States to create or adapt their laws covering Network and Information Security in line with the scope of the directive. European Member States will have 21 months to implement the NIS directive – each national government will use the directive as their “template” to adjust local laws. This process starts once the directive has been finalized and published and will continue through 2018, until the maximum amount of time each Member State has to implement the directive has expired. Some Member States have already started to align their national cyber security strategy, their operational capabilities and their legislation with the directive. In the new legislation, operators of essential services in critical industry sectors are placed at the highest risk level, and areas such as cloud computing providers are subject to a lighter touch approach in a new category of providers called digital service providers (or DSPs).
  • 5. 5 What are the implications? The NIS Directive imposes a new set of security obligations and incident reporting requirements on a broad set of private sector companies, many of whom are IBM clients. The primary focus will be on operators of essential services in critical industry sectors, as well as on incident reporting requirements for a broad set of DSPs – online search engines, online marketplaces and cloud computing providers. The directive however goes further into requiring appropriate security measures. Some of the core changes which are being driven in the directive are: New requirements for Incident Reporting Thresholds are now set out to determine whether an incident should be categorized as having a significant impact on the continuity of essential services, and would thus need to be notified by operators of essential services to the relevant government authority. The aspects which will need to be particularly considered now include: • Number of users affected by the disruption of the essential service; • Duration of the incident; • The geographical area affected. New Government National Regulatory Authorities Organizations will see new arrangements being put in place for coordinating cyber security issues. Each Member State government will set out one or more competent national authorities responsible for fulfilling the tasks linked to the security of the network and information systems of operators of essential services and DSPs. These governments also will be required to designate in each country a national single point of contact responsible for coordinating issues related to the security of network and information systems and cross–border cooperation at the EU-level. New National Cyber Security Capabilities Organizations will also see Member State governments directed to ensure that every EU Member State has in place well-functioning Cyber Security Incident Response Teams (CSIRTs), also known as Computer Emergency Response Teams (CERTs). These will have to meet essential capability requirements for dealing with incidents and risks, and ensuring efficient cooperation at the Union level.
  • 6. 6 New Risk Management requirements The NIS directive calls for a culture of risk management, involving risk assessment and the implementation of security measures appropriate and proportionate to the risks faced. These are to be promoted and developed through appropriate regulatory requirements and voluntary industry practices. This will potentially require IBM clients to demonstrate that they are conducting risk assessments, and that they have implemented appropriate security measures. Some requirements already exist around risk assessment and reporting with respect to essential services, and new requirements for essential services may be set at national level. Operators of essential services under this legislation include operators in the following industry sectors: energy, transport, banking, financial market infrastructures, health, drinking water supply and distribution and digital infrastructures such as internet exchange points. The other category of DSPs will see requirements created on a pan-European basis. How can IBM help? As the NIS Directive is being rolled out across Europe, clients are asking for our views, for help in understanding how the directive can be applied, and whether we have services and solutions available to bolster their Network and Information Security. Examples of relevant IBM offerings include: • IBM Security Consulting Services are helping clients build Security Operations Centers and Computer Emergency Response Team (CERT) capabilities. We are helping clients optimize existing capabilities, and develop a strategy and plan to build next-generation threat intelligence, enterprise monitoring and security operation centers. • IBM X-Force Incident Response Solutions are helping clients plan for and manage security incidents. Consulting teams are working with clients to create security incident processes and, with the new capabilities of IBM Resilient Systems solutions, helping clients collect and manage information in connection with their compliance requirements. These are examples of the range of capabilities - from risk assessment, developing and implementing appropriate security measures and enabling capacity around incident reporting – available to clients looking to run their own operations, or reaching out for cloud and managed service delivery models.
  • 7. 7 Summary The evolving European regulatory environment on cyber security and data protection offers both possibilities and challenges for both IBM and our clients. These challenges range from governance to securing application and infrastructure. Fundamentally, it is important to assure stakeholders of IBM’s expertise and capabilities in these areas in order to build upon existing trust and confidence in our brand. IBM has extensive experience helping clients navigate regulatory environments in Europe and around the world. We have done this successfully through consulting services and solutions and through our delivery of cloud and cognitive solutions. This paper reflects IBM’s general view of Europe’s new regulatory landscape. It is not, however, intended to be exhaustive and does not describe every procedure and technical detail that could be required. The key to establishing preparedness in this new era lies in choosing the right partner(s) for your organization, and being able to deploy appropriate security and data protection controls and procedures in a way that can be rapidly and readily demonstrated. We understand this is not just a technical challenge, but a challenge of governance and compliance, applications and infrastructure and assurance.
  • 8. 8 Author Nick Coleman IBM Global Head Cyber Intelligence Email: coleman@uk.ibm.com twitter.com/colemansec © Copyright IBM Corporation 2016 IBM, the IBM logo and ibm.com are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/ copytrade.shtml. This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. The information in this document is provided “as is” without any warranty, express or implied, including without any warranties of merchantability, fitness for a particular purpose and any warranty or condition of non-infringement. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. This report is intended for general guidance only. It is not intended to be a substitute for detailed research or the exercise of professional judgment. IBM shall not be responsible for any loss whatsoever sustained by any organization or person who relies on this publication. The data used in this report may be derived from third-party sources and IBM does not independently verify, validate or audit such data. The results from the use of such data are provided on an “as is” basis and IBM makes no representations or warranties, express or implied.