Because this presentation involves discussion of geopolitics, I feel that it is important for me to acknowledge some of my personal biases. Your views may differ, and that's perfectly fine with me. We all have different biases, experiences, and priorities. We all need to learn to work with people who hold different opinions and values.
Agenda
Working definitions of privacy, data sovereignty, and security
Survey of international, national, sub-national, and industry regulations
What this means to you, an information security professional
If speaking to an audience containing relatively new people to the security profession, welcome them and emphasise that they really can wear the title of "security professional".
Data sovereignty in a nutshell
My people, my property, my rules
Data localisation
Require specific types of data to remain inside a short list of countries/li>
Usually require all copies to remain, sometimes just a copy
Data access
Control who is allowed to handle specific types of data and for what purposes
Sometimes require giving access to law enforcement
Personal rights (consent to collect, right to be forgotten etc.)
Require third parties that collect data about "their people" to give "their people" some level of control over the use of that data
Extra-territorial effect - Data sovereignty laws often apply to data, people, companies, situations, etc. even if some or all of them are not inside that country's borders.
Data localisation - Some countries restrict processing of certan types of data to specific locations (personal information, geological surveys, other data of strategic or military importance). Sometimes they are protecting it. Sometimes they are making sure they can access it.
Data access - Some countries restrict create/read/update/delete access for certain classifications of data to people with certain legal status, country of origin, etc.. Some also require that the government be allowed access with various levels of due process.
Personal rights - Some countries want to ensure that their citizens, residents, and other groups of people to whom they lay some claim have adequate privacy protections wherever they are.
Data sovereignty in application
The good, the bad, and the ugly
Health and welfare
Protect citizens, residents, protected peoples from exploitation
Keeping tabs
Retain (or gain) access to people's data for surveillance purposes
Intellectual property control
Protect commercially or strategically valuable informaton from falling into the wrong hands
The subtitle is a good example of where my personal bias comes in.
Some of the reasons countries enact data sovereignty laws are:
Health and welfare - Ensure that people they care about are protected from exploitation wherever they may be.
Keeping tabs - Some countries want to make sure they can access data about people they care about wherever they may be.
Intellectual property control - Most countries want to retain some level of control over information that gives them geopolitical, strategic, military, economic, or other advantages.
What does privacy even mean?
There's no good answer! Here are some options:
Leave me alone!
Protections from snooping on people in non-public places like their homes
Some countries extend surveillance protections to the workplace
That's none of your business!
Control over who is allowed access to personal information
Ability to revoke access
Why do you want to know?
Transparency and control over what personal information others have and what they do with it
Security implements the rules described by data sovereignty and privacy laws.
Confidentiality - The hard part is in building the process required to determine who is authorised and how to revoke that authorisation when required
Integrity - Many requirements around integrity of data involve recording why someone is making a change in addition to what the change is - intent is hard because it is not a technical thing
Availability - Data localisation is a particular challenge for availability because the results of data analysis often need to be in one country while the data itself must be in a different country
Security is enforcement
We don't make the rules, but we do make the rules to enforce them
People Skills, knowledge, and obligations
Process Checks and balances to minimise occurrence and impact of errors and malicious actions
Implementing security requires three things, in order of importance.
People - Properly trained staff with skills, knowledge, and awareness of their obligations
Process - Checks and balances, orderly workflows, and opportunities to verify that decisions are reasonable and actually do what they are supposed to do
Technology - Easy to buy, but requires People and Process to get meaningful value out of them
Europe and the United Kingdom
General Data Protection Regulation (GDPR) Protects data privacy of citizens and residents of European Union (EU) and European Economic Area (EEA) member countries, no matter where they are.
Africa and the Middle East
Countries with strategic resources Geological data related to oil, gas, and precious minerals often required to remain exclusively in-country
South Africa, Uganda, Botswana, Ghana, Angola, and others Privacy laws exist, are enforced, and are expanding
Russia and China
China New laws are vague - commercial and "common" cryptography rules are different. Probably require allowing government oversight
Russia Primary copy of data about Russians (defined broadly) must reside in Russia Note: Russia recently demonstrated the ability to sever ties to the Internet at large (Runet)
United States and Canada
Canada PIPEDA - Privacy law comparable to GDPR, more coming
United States HIPAA - National health information privacy law Note: The US is considering legislation forcing companies to install backdoors in encrypted systems (again) California CCPA - Leading the nation in general privacy (somewhat comparable to GDPR)
South America
Privacy laws improving Many countries have privacy laws and are actively working on expanding their scope and enforcement
Brazil and Argentina Two countries leading the way on privacy regulations (Argentina is deemed adequate for GDPR)
Australia and New Zealand
New Zealand Privacy laws somewhat comparable to GDPR
Australia Strong privacy laws, somewhat comparable to GDPR Note: Companies are required to assist the government in investigations and can be compelled to create technical capabilities to do so
Payment Card Industry (PCI) Data Security Standard (PCI-DSS)
Established through contract, not through sovereignty
Covers handling of information related to credit, debit, and other payment cards
Forbids recording of certain data (e.g. CVV numbers)
Prescriptive framework (for now)
Heavy on Confidentiality, light on Integrity, barely touches Availability
Penalties for compliance failure include fines and revocation of payment processing privileges
Understand that you will be working with lots of grey areas that make you uncomfortable. Design systems assuming that regulatory frameworks will change in strange ways.
Use a spacebar or arrow keys to navigate.
Press 'P' to launch speaker console.