trusted data sharing - iot european lsp programme · in, collected or derived from or with cloud...

36
All rights reserved, Arthur’s Legal B.V. Current State of Affairs in Lawmaking Europe Arthur van der Wees Managing Director Arthur’s Legal, Strategies & Systems, the global strategic X-by design firm & knowledge partner Expert Advisor to the European Commission (IoT, Data, Computing, Spectrum, Cybersecurity, Privacy, AI, Robotics & Accountability) Expert Advisor to Rijksoverheid (Digital Ecosystems, eIDAS, Dynamic Attributes, Data, Privacy, Cybersecurity, AI, Robotics & Regulations) Project Leader to various H2020 IoT, Data, Trust, Security, Privacy, Ethics, Accountability & Liability in Cyber-Physical Ecosystems Specialist Task Force ETSI Leader for Security in IoT & Privacy in IoT (STF 547) Founding Member Alliance for IoT Innovation (AIOTI), Chair Policy Working Group, Security in IoT & Privacy in IoT Taskforce Leader Co-Founder & Director of the Institute for Accountability in the Digital Age Member of the European AI Alliance & European Cybersecurity Organisation Trusted Data Sharing

Upload: others

Post on 05-Aug-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Current State of Affairs in Lawmaking Europe

Arthur van der WeesManaging Director Arthur’s Legal, Strategies & Systems, the global strategic X-by design firm & knowledge partner

Expert Advisor to the European Commission (IoT, Data, Computing, Spectrum, Cybersecurity, Privacy, AI, Robotics & Accountability)Expert Advisor to Rijksoverheid (Digital Ecosystems, eIDAS, Dynamic Attributes, Data, Privacy, Cybersecurity, AI, Robotics & Regulations)

Project Leader to various H2020 IoT, Data, Trust, Security, Privacy, Ethics, Accountability & Liability in Cyber-Physical EcosystemsSpecialist Task Force ETSI Leader for Security in IoT & Privacy in IoT (STF 547)

Founding Member Alliance for IoT Innovation (AIOTI), Chair Policy Working Group, Security in IoT & Privacy in IoT Taskforce LeaderCo-Founder & Director of the Institute for Accountability in the Digital Age

Member of the European AI Alliance & European Cybersecurity Organisation

Trusted Data Sharing

Page 2: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

‘As a European Commissioner, the question I've been probably asked the most in the last few weeks is:

What is your priority?Is it 5G? Is it artificial intelligence? Is it industry? Services?

Audiovisual? Tourism? Space? Defence?’

Last week, Commissioner Breton (Internal Market (DG GROW), Digital Single Market (DG CNECT) and DG Defense & Aerospace

Page 3: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

‘Obviously, all these topics are priorities.But for me, their foundation, their common denominator, what runs through all their activities from end to end, is …

Last week, Commissioner Breton (Internal Market (DG GROW), Digital Single Market (DG CNECT) and DG Defense & Aerospace

their foundation,end, is …

their common denominator,end, is …from end to end,

is …what runs through all their activities end, is …

is …is …

Data.’is

Page 4: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Last week, Commissioner Breton (Internal Market (DG GROW), Digital Single Market (DG CNECT) and DG Defense & Aerospace

1. Ability to Access2. Ability to Exploit’

‘Dominance is not the Result of Technological Excellence that we are not able to catch up.

It is the result of their:

Page 5: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Data is not a four letter word

N-Dimensional Approach | Multi-story of connected data types: Classified | Confidential | Sensitive | Personal | Non-Personal| Derived | Meta |Proprietary | IPR | Open | Encrypted | Anonymized | Et cetera |

Every kind of data needs to be addressed differently

Data

Data of any form, nature or structure, that can be created, uploaded, insertedin, collected or derived from or with cloud services and/or cloud computing,including without limitation proprietary and non-proprietary data, confidentialand non-confidential data, non-personal and personal data, as well as otherhuman readable or machine readable data.

Start with Common Understanding: Definitions

EC Cloud Service Level Agreement Standardisation Guidelines

Page 6: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Stand-AloneConnectivity

Inter-ConnectivityHyper-Connectivity

Page 7: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

The Dynamicsin the Digital Age

The only constant is: Change

Page 8: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Technology

Data (Static & Dynamic Data), Information (including Attributes) & Knowledge

Process

People & Society

People, Process, Technology & DataHuman-Centric Organisations & Systems

Page 9: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Data ControlData AccessUse & DRM

Page 10: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Data ControlData AccessUse & DRM

Page 11: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Data ControlData AccessUse & DRM

Page 12: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

This will be FunFacebook has been ordered to disclose records of thousands of apps that may

have misused personal data.#CambridgeAnalytica January 2020

Shadow Cloud + Shadow Edge/IoT +

Shadow Apps + (personal) Data

=Unknown/Unclear Data Sharing a.k.a. MIST

Page 13: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Data ControlData AccessUse & DRM

Page 14: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Last week, Commissioner Breton (Internal Market (DG GROW), Digital Single Market (DG CNECT) and DG Defense & Aerospace

1. Ability to Access2. Ability to Exploit’

‘Dominance is not the Result of Technological Excellence that we are not able to catch up.

It is the result of their:

Page 15: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Page 16: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Human-Centric:

FreedomHuman Values

InnovationOpportunities

So, also These:

Data ControlData AccessUse & DRM

Accountability

Page 17: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

7 Phases of the Data Life Cycle (Personal & Non-Personal)

1. Obtain & Collect

2. Create & Derive

4. Store

3. Access, Control & Use

5. Share & Disclose

6. Retain & Archive

7. Destroy & Delete

Most Data comes out of Phase 1 & 2

BUT

Data is created &

processed in any and each

phase

Which phase(s) are we talking about? Data + Actor +

Legal Basis + Purpose(s)

Page 18: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Real Life Dilemma in this Digital Age

Privacy, Human Values & Data Control

Most of Us

Instant Pleasure & The Fear of Missing Out

Security, Safety & Interoperability

Page 19: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

2006

Page 20: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Page 21: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

‘I want Europe to strive for more by grasping the

opportunities from the digital age within safe and ethical

boundaries.’Ursula von der Leyen, President

https://ec.europa.eu/commission/sites/beta-political/files/political-guidelines-next-commission_en.pdf

Page 22: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Vestager will coordinate work on a European approach to artificialintelligence. During her Hearing, she emphasised the need todevelop AI built according to ‘Trust by Design’, as well asretaining human oversight of such systems, and addressing the riskthat automated decision-making could cement inequalities.

Vestager will oversee work on a new legislative proposal (DigitalServices Act (DSA)) that would include ‘upgrading our liabilityand safety rules on digital platforms, services and products.’Vestager also stated that the DSA may need to regulate the waythat companies use and share data.

Executive VP Margrethe Vestager

Page 23: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Not If,But How

Page 24: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

REGULATION IN DIGITAL AGE NETWORK SYSTEMS DATA APPLICATION PEOPLE

NIS Directive Impact-Based?

Cybersecurity Act ?

Free Flow of Non-Personal Data Regulation

General Data Protection Regulation

Payment Services Directive

Product Liability Directive ? ? ? ?

Radio Equipment Directive Impact-Based?

eIDAS Regulation

Page 25: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Data Sharing:No One Can

Do This Alone

Page 26: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

How to measure DSRL?

Data Sharing Readiness Level

Page 27: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

#DSRLVarious Internal DSRLsVarious External DSRLs

Page 28: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

‘It is better to offer no excuse than offer a bad one’George Washington

1. it is our Intellectual Property …2. of Compliance & Regulatory Restrictions …3. it is Technically not possible …4. we have the Policy not to share …5. we do Not Know How and What to share …

Top 5 Excuses for Data Sharing BlockingWe are not ‘allowed’ to share, because:

Page 29: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

Stop Pointing To The Other One

Page 30: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

This is a Challenging Problem SetThere is No One Solution

There is No One Group with the AnswerThere is No One Technical Fixture

This is about Working Together, as TeamsTo Achieve Outcomes.This is a Team Sport

Page 31: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

All rights reserved, Arthur’s Legal B.V.

To Make an Investment of EUR 1 in Technology Work,

One Needs to Invest3 Units in People &

Organisations

Page 32: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

Europe has Great CapabilitiesInward & Inbound

Outward & Outbound

If, and Only If, We Organize Ourselves

Page 33: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

Building Trust that is Enough toStart Trusted Sharing Data:

IT’S A SLOW PROCESS,BUT QUITTING WON’T

SPEED IT UP

Page 34: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

[email protected]

Arthurslegal.comArthurstrategies.com

Arthur.nl@Arthurslegal

People, Data & Technology Symbiosis: Multiplicity

Page 35: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

Arthur’Legal, Strategies & Systems Role & Mission

Page 36: Trusted Data Sharing - IoT European LSP Programme · in, collected or derived from or with cloud services and/or cloud computing, including without limitation proprietary and non-proprietary

Legal NoticesAll rights reserved, Arthur’s Legal B.V. The content of this document is provided ‘as-is’ and for general information purposes only; itdoes not constitute strategic, legal or any other professional advice. The content or parts thereof may not be complete, accurate or upto date. Notwithstanding anything contained in this document, Arthur’s Legal B.V. disclaims responsibility (including where Arthur’sLegal B.V. or any of its officers, employees or contractors have been negligent) for any direct or indirect loss, damage, claim, or liabilityany person, company, organisation or other entity or body may incur as a result, this to the maximum extent permitted by law.