You are on page 1of 45

Cloud Expo Asia, Hong Kong 2018

Hong Kong Convention and Exhibition Centre


16.05.2018

Cybersecurity Law, GDPR and Data Ethics

Stephen Kai-yi Wong, Barrister


Privacy Commissioner for Personal Data, Hong Kong
Cloud Computing
Characteristics:
Rapid cross-border data flow

Unknown/little control over data


storage locations
Rapidly changing/loose outsourcing
arrangements
Standardised contracts adopted by
the cloud service providers

2
Cloud Computing and Personal Data Privacy

Bottom Line

Outsourcing
Organisations are data
Organisations need to fully responsible for processing ≠
maintain control personal data outsourcing
protection
legal
responsibility

3
Cybersecurity Law

4
Mainland’s Data Protection Regime

No omnibus data protection law in the mainland of China


currently

Personal data privacy protection governed by sectoral


law

Hong Kong businesses with interests in the mainland of


China should closely monitor recent developments to
prepare for compliance

5
Mainland’s Cybersecurity Law
• Effective on 1 June 2017 Guarantee
• Does not apply in HK cybersecurity

Promote sound
development Safeguard
of economic cyberspace
and social sovereignty
informatisation Objectives
[Art. 1]

Protect lawful
Safeguard
rights and
national
interests of
security and
citizens, legal
public
persons and
interest
other orgs.
6
Mainland’s Cybersecurity Law
Scope of Application:

• Apply to the construction, operation, maintenance and use of


networks, and the supervision and administration of cybersecurity
within China [Art. 2]
• Regulate network operators, i.e. owners and administrators of
networks, and network service providers [Art. 76(3)]
• Protect personal information

7
How May Cybersecurity Law Affect
Hong Kong Businesses?

• Processing of personal
data by a Hong Kong-
Then • Both the Personal Data
based business is
regulated by Hong (Privacy) Ordinance and
Kong’s Personal Data the Cybersecurity Law
• The processing also may apply to the
(Privacy) Ordinance, but involves construction,
not Mainland’s processing activities
operation, maintenance
Cybersecurity Law or use of networks in
the mainland of China
Unless

8
Comparison between
Cybersecurity Law and PDPO
Collection & Use

Cybersecurity Law HK PDPO


Art. 41 (collection & use) DPP1 (collection)
• Follow the principles of lawfulness, • No consent requirement
propriety and necessity • Collect data in a lawful and fair way, for a
• Obtain consent from data subjects purpose directly related to a function or
• Do not collect personal information activity of the data user
irrelevant to services provided • Data collected shall be necessary but not
• Disclose related policy and practice excessive
• Clearly indicate the purposes, means and • Notify data subjects about the purpose of
scope of collection and use collection, the classes of persons to whom
• Do not collect or use personal information the data may be transferred, and the
in violation of agreements with the data contact person
subjects
DPP3 (use, including disclosure)
Art. 42 (disclosure) • Shall not use personal data for new
• Personal information shall not be disclosed purposes, unless with prescribed consent of
to third parties without the data subject’s data subjects 9
consent
Comparison between
Cybersecurity Law and PDPO
Security & Data Breach Notification

Cybersecurity Law HK PDPO


Art. 42 (security & notification) DPP4 (security)
• Adopt technical measures and other • Take all practicable steps to protect
measures to ensure security of personal personal data against unauthorised or
information, and prevent information accidental access, processing, erasure,
leakage, damage and loss loss or use
• In case of information leakage, damage
or loss, take remedial actions • No requirement for data breach
immediately, and notify data subjects notification
and the supervisory authority

10
Comparison between
Cybersecurity Law and PDPO
Cross-border Data Transfer

Cybersecurity Law HK PDPO


Art. 37 (data localisation) S. 33 (prohibition against transfer)
• Personal information and important data • Personal data shall not be transferred to
collected and produced by operators of places outside Hong Kong, unless under
critical information infrastructure during specified circumstances, e.g.:
their operations in China shall be stored  transfer to White List regions
locally  consent by data subjects in writing
• If cross-border transfer is needed for  reasonable precautions taken and
business reasons, security assessment due diligence exercised by the data
should be conducted pursuant to the user
measures stipulated by the Cyberspace • S.33 is not yet in force
Administration of China (CAC) and the
relevant department of the State Council

11
What is Critical Information
Infrastructure under Cybersecurity Law?
Examples of Critical Information Infrastructure
(CII) under Cybersecurity Law:

• Public communications and information


services
• Energy
• Transportation
• Water conservancy
• Finance
• Public services
• E-government affairs
• Other infrastructure which will cause
serious damage to state security and public
interests, in case of destruction,
dysfunction or data leakage
[Art. 31] 12
Comparison between
Cybersecurity Law and PDPO
Sanctions

Cybersecurity Law HK PDPO


Arts. 64 & 66 • PCPD has no power to impose
• Possible administrative sanctions for a administrative sanction
breach:
Ss. 50 & 50A
 Corrective action • The Privacy Commissioner may issue an
 Warning enforcement notice, ordering remedial
 Confiscation of illegal income actions by a data user
 Fine between 1 and 10 times of illegal • Non-compliance with an enforcement
income (if no illegal income, fine < notice may (upon conviction by a court)
RMB 1 million) subject to a fine of HK$50,000 and
 Fine between RMB 10,000 and 100,000 imprisonment for 2 years
on directly responsible person
 Suspension or cease of business
operation for rectification, or
closedown of website, or revoking of
business permit or license 13
Information security technology — Personal
information security specification
《信息安全技术 个人信息安全规范》
• Implemented on 1 May 2018

• Comprehensive personal data protection standard in mainland China

• Developed with reference to personal data protection


guidelines/regulations of OECD, EU and USA

• Recommended good practice – organisations that follow the


Specification will be taken to have observed the data protection
requirements under the Cybersecurity Law

• Provide guidance for compliance with the data protection principles in


the Cybersecurity Law
14
General Data Protection Regulation
(GDPR)

15
PDPO – GDPR Comparative Study

Background
• Keep abreast of overseas privacy law developments

• Assess GDPR’s impact on businesses (in particular multi-national


organisations)

• Comparable legal framework facilitates free flow of information


and commercial activities

16
PDPO – GDPR Comparative Study
Major differences between PDPO and GDPR:

EU HK
Application Data processors or controllers: Data users (controllers /processors)
• processing personal data in the who, either alone or jointly or in
context of activities of EU common with other persons, control
establishments, or the collection, holding, processing
• with an establishment in the or use of the personal data in or
EU, or from Hong Kong. [s.2(1)]
• established outside the EU,
that offer goods or services
to, or monitor the behaviour of
individuals in the EU. [Art 3]

Cloud service providers with customers/clients in the EU


should be mindful of the extra-territorial application of GDPR 17
PDPO – GDPR Comparative Study
Major differences between PDPO and GDPR:

EU HK
Personal Data "Personal data" means "Personal data" means any
• any information relating to an data –
identified or identifiable natural • relating directly or indirectly to a
person; an identifiable natural living individual;
person is one who can be identified, • from which it is practicable for the
directly or indirectly. identity of the individual to be
• examples of personal data directly or indirectly ascertained;
explicitly identified being extended and
to include location data and online • in a form in which access to or
identifier. processing of the data is practicable.
[Art 4(1)] [s.2(1)]

Broader definition of personal data under GDPR 18


PDPO – GDPR Comparative Study
Major differences between PDPO and GDPR:
EU HK
Accountability Risk-based approach; data The accountability principle and the
controllers are required to: related privacy management
and • implement technical and measures are not explicitly stated.
Governance organisational measures to ensure The Privacy Commissioner advocates
compliance [Art 24]; the adoption of a privacy
• adopt data protection by design management programme which
and by default [Art 25]; manifests the accountability
• conduct data protection impact principle. The appointment of data
assessment for high-risk processing protection officers and the conduct of
[Art 35]; and privacy impact assessment are
• (for certain types of organisations) recommended good practices for
designate Data Protection Officers. achieving accountability.
[Art 37]

19
PDPO – GDPR Comparative Study
Major differences between PDPO and GDPR:

EU HK
Sensitive Category of sensitive personal data No distinction between sensitive and
expanded. non-sensitive personal data for all
Personal Data Processing of sensitive personal purposes.
data is allowed only under specific
circumstances. [Art 9]

20
PDPO – GDPR Comparative Study
Major differences between PDPO and GDPR:

EU HK
Consent Consent must be Consent is not a pre-requisite for the
• freely given, specific and collection of personal data, unless
informed; the personal data is used for a new
• an unambiguous indication of a purpose.[DPP1&3] For other
data subject's wishes, by statement purposes, where consent is also
or by clear affirmative action, which required, consent means express and
signifies agreement [Art 4(1)]; and voluntary consent.
• given by a child below 16 (or 13)
with parental authorisation. No requirement for parental consent.

21
PDPO – GDPR Comparative Study
Major differences between PDPO and GDPR:

EU HK
Breach Data controllers are required to No mandatory requirement, but
notify the authority of a data notification to the Privacy
Notification
breach without undue delay Commissioner (and data subjects,
(exceptions apply). where appropriate) is recommended
Data controllers are required to in the interest of all stakeholders
notify affected data subjects if it including data users/controllers and
is likely to result in high risk to subjects.
the rights and interests of the
data subjects, unless
exempted. [Arts 33-34]

22
PDPO – GDPR Comparative Study
Major differences between PDPO and GDPR:

EU HK
Data Data processors are additionally Data processors are not directly
obliged to maintain records of regulated. [s.2(12)]
Processors
processing, ensure security of Data users are required to adopt
processing, report data breaches, contractual or other means to ensure
designate Data Protection data processors' compliance.
Officers, etc. [Arts 30, 32-33, 37] [DPP2(3) & DPP4(2)]

Cloud service providers are likely to be regarded as data


processors to their customers under GDPR 23
PDPO – GDPR Comparative Study
Major differences between PDPO and GDPR:

EU HK
New and Enhanced • Right to notice on data • Less extensive notice
processing. [Art 13-14] requirements for data users /
Rights for • Right to erasure of personal controllers (processors).
Data Subjects data ("right to be forgotten"). • No right to erasure, but data
[Art 17] shall not be retained longer than
necessary.
[s.26 & DPP 2(2)]

24
PDPO – GDPR Comparative Study
Major differences between PDPO and GDPR:

EU HK
New and Enhanced • Right to restriction of • No right to restriction of
processing and data portability. processing and data portability,
Rights for Data [Art 18, 20] but data access
Subjects (con’t) • Right to object to processing and correction requests be
(including profiling). [Art 21] complied with. [DPP6, Part 5]
• No right to object to
processing (including profiling),
but may opt out from direct
marketing activities [ss.35G
&35L] and PDPO contains
provisions regulating data
matching procedure. [ss.30-31]

25
PDPO – GDPR Comparative Study
Major differences between PDPO and GDPR:

EU HK
Certification, Seals, and Mechanisms are explicitly No formal recognition of
recognised and established for certification or privacy seals
Codes of Conduct demonstrating compliance by mechanisms for demonstrating
data controllers and processors. compliance. The Privacy
[Art 42] Commissioner may approve
and issue code of practice after
consultation. [s.12]

Industry resources:
• Code of Conduct for GDPR Compliance (issued by the Cloud Security Alliance
(CSA) in Nov 2017): https://gdpr.cloudsecurityalliance.org/
• EU Cloud Code of Conduct (May 2017): https://eucoc.cloud/en/home.html
26
PDPO – GDPR Comparative Study
Major differences between PDPO and GDPR:
EU HK
Cross-jurisdiction Certification and adherence to Certification and adherence to
approved codes of conduct are an approved code of practice are
Data Transfer explicitly made one of the legal not explicitly made a legal basis.
bases for transfer. [Art 46]

Cloud service providers may make use of certification


mechanism and/or approved codes of conduct for the
transfer of personal data out of EU
27
PDPO – GDPR Comparative Study
Major differences between PDPO and GDPR:
EU HK
Sanctions Data protection authorities are The Privacy Commissioner is not
empowered to impose empowered to impose
administrative fines on data administrative fines or penalties.
controllers and processors. [Art The Privacy Commissioner may
58] serve Enforcement Notices on
Depending on the nature of the data users, failure to comply
breach, the fine could be up to with which may attract penalties
€20 million or 4% of the total after judicial process. [s.50]
worldwide annual turnover.
[Art 83]

28
“European Union General Data Protection Regulation 2016” Booklet

www.pcpd.org.hk//tc_chi/resources_centre/publications/files/eugdpr_c.pdf www.pcpd.org.hk//english/resources_centre/publications/files/eugdpr_e.pdf
29
Access by Law Enforcement
Agencies

30
United States v Microsoft
(US Supreme Court case)

• Must a US provider of email


services comply with a US
warrant by disclosing electronic
communications within its control
even if the communications are
stored in non-US jurisdictions?

• The case is moot due to the


Implications: passage of the Clarifying
US authorities may compel US-based Overseas Use of Data Act
service providers to provide data stored on (CLOUD Act) by the US
the latter’s servers, regardless of whether
Congress in March 2018.
that data is stored in the US or a foreign
jurisdiction. 31
e-Evidence Regulation of the EU
• Proposed by the European Commission on 17 April 2018

• Objective: makes it easier and faster for police and judicial authorities to access
the electronic evidence (e.g., emails, texts or messaging apps) they need in
investigations

• A judicial authority in one Member State can obtain electronic evidence directly
from a service provider (or its legal representative) in another Member State,
regardless of the location of data

• Service providers are obliged to respond within 10 days, and within 6 hours in
cases of emergency

• Investigators could also require that certain data not be deleted

• A service provider that offers services in the EU but without a presence in the
EU is still subject to the same obligations 32
Accountability & Ethics

33
Mishandling of Personal Data

Sources: Reuters; NBC News 34


Privacy Risks and Challenges

Big Data Analytics Digital Platforms

Privacy Risks &


Challenges
35
Ubiquitous and Covert Data Collection

Data Minimization Data Transparency

Adequate Notification Erodes Individuals’


Control Over Data 36
Unpredictable Analytics

✘ Notice & Consent

✘ Purpose & Use Limitations

37
Profiling
Re-identification

✘ Distinction between Personal Data


& Non-Personal Data

38
Inaccurate Inferences and Predictions

✘Data Accuracy

Filter Bubble

Interference in Elections…

39
Why Accountability?

Regulator Company

40
Mechanics of Accountability
Voluntary/Self-Regulatory
Education → Incentivise
or
Mandatory
Accountability?

41
Data Ethics and Trust

Data

Ethical Obligations

• No Surprise to Consumers
• No Harm to Consumers
42
Building Confidence and Trust
Short term actions:
Data users
• Be transparent
• Obtain meaningful consent
• Report data security incidents without
delay

Medium and long term actions:


Regulators Data users
• Education • Paradigm shift from
• Fair and proactive compliance to
enforcement accountability
• Updating the law • Develop privacy-
• Use of certification & friendly culture
trust marks • Ethical processing of 43

personal data
44
歐洲聯盟 歐洲聯盟
《通用數據保障條例 2016 》 《通用數據保障條例 2016 》
小冊子 – 中文版 小冊子 – 英文版

45

You might also like