threat prevention and detection (within critical infrastructures) under eu data protection...

17
Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts – Legal Researcher KU Leuven Centre for IT & IP Law With the financial support of FP7 – Seventh Framework Programme FP7 – Seventh Framework Programme Grant agreement no: 607093 Grant agreement no: 607093

Upload: shavonne-harrington

Post on 17-Jan-2018

219 views

Category:

Documents


0 download

DESCRIPTION

Preemption Security practices that aim to act on threats that are unknown and recognized to be unknowable, yet deemed potentially catastrophic, requiring security intervention at the earliest possible stage (Aradau and Van Munster, 2007, 2011) o Critical infrastructures: An asset, system or part of a system essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people (e.g. electricity infrastructures, gas production companies, etc.), the disruption or destruction of which would have a significant impact on the State. Crossroads: public/private interest

TRANSCRIPT

Page 1: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation.

Laurens Naudts – Legal Researcher KU Leuven Centre for IT & IP Law

With the financial support of FP7 – Seventh Framework ProgrammeFP7 – Seventh Framework Programme Grant agreement no: 607093Grant agreement no: 607093

Page 2: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

I. ContextPreemption within Critical Infrastructures

Page 3: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

PreemptionSecurity practices that aim to act on threats that are unknown and recognized to be unknowable, yet deemed potentially catastrophic, requiring security intervention at the earliest possible stage (Aradau and Van Munster, 2007, 2011)

o Critical infrastructures: An asset, system or part of a system essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people (e.g. electricity infrastructures, gas production companies, etc.), the disruption or destruction of which would have a significant impact on the State.

• Crossroads: public/private interest

Page 4: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

Preemption Three Key Features of Preemptive Data Processing (Mitsilegas, 2014)

1.Purpose of collection: data is not collected for specific, identified risks, but to predict risk and preempt future activity.

2.Nature of data: data is generated by ‘little security nothings’ (Huysmans, 2011)

3.Actors of surveillance: privatization of surveillance.

Page 5: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

Source: Preemptive

Page 6: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

Security:

Data on ‘security anomalies’ (threat detection and prevention)

However:

“to implement better prevention techniques, cyber security utilities require vast amounts of data from the consumers: defensive measures could be used

as intrusive and offensive as well.” Thus privacy and data protection issues are present:

Aggregated (anonymous) group profiles

Individual Profiles

• Consumer Profiles (e.g. smart meter detection)• Employee Profiles (e.g. video surveillance infrastructures)

“Data sets that enable anonomaly detection may also function as an immediate source for the profiling or surveillance of individual end-users or parts of the

population”

Page 7: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

II. Purpose LimitationThe first bulwark against privacy intrusion

Page 8: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

Purpose Specification - LimitationArt. 6(1) b. 95/46/EC and Art. 5 GDPR: personal information may only be collected for specified, explicit and legitimate purposes  and not further processed in a way incompatible with those purposes.

A. Purpose specification: the requirement to specify at the moment of collection the purpose of data processing activities.

B. Purpose Limitation: the requirement for collected data not to be processed in a way incompatible with the initially specified purposes.

Page 9: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

Function CreepThe use of a technology or system is expanded or changed beyond the purpose for which it was originally intended, often leading to an invasion of privacy.

• Data gathered for security purposes (+ visualisation) can be used to infer privacy intrusive information concerning the end-user.

• As a national security tool: surveillance• As a commercial tool: commercial profiling, targeted advertising.

Page 10: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

SpecificationSpecification: Sufficiently defined to enable the implementation of data processing safeguards and to delimit the scope of the processing operation (e.g. ‘IT security’ vs. ‘network security anomaly detection’)

•Data must be necessary, adequate or relevant

•Each seperate purpose should be specified in enough detail to assess whether collection of personal data for this purpose complies with the law, and to establish data protection safeguards.

Data collected for one purpose may not always be relevant or necessary for other specified purposes.

Page 11: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

Purpose Limitation – CompatibilityLimitation: compatible v. incompatible further processing (case by case)

1.The distance between purposes.

2.Context of collection and reasonable expectations data subjects.

3.Nature of the data and impact further processing.

4.Safeguards applied by controller.

• When incompatible, derogation is possible for national security, but only when there is a specific legislative instrument (art. 13 95/46/EC)

Page 12: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

European Programme for Critical Infrastructure Protection• Critical Infrastructure Information can be shared among stakeholders:

o Stakeholders (market operators, critical infrastructure operators, Member States) will take appropriate measures to protect information concerning the security of critical infrastructures and protected systems, interdependency studies and CI related vulnerability, threat and risks assessments.

o Such information will not be used other than for the purpose of protecting the critical infrastructure

Page 13: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

The European Data Protection Regulation – Privacy by Default and Design• Art. 23 General Data Protection Regulation:

1. Data controllers should ensure by default that only those personal data are processed which are necessary for each specific purpose.

2. Data should not be retained or collected beyond the minimum necessary for the defined purposes.

3. Personal data should not be made accessible to an indefinite number of individuals (e.g. access control).

Page 14: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

III. Privacy By DesignA. MinimiseB. HideC. SeparateD. AggregateE. InformF. ControlG. EnforceH. Demonstrate

Enisa (European Union Agency for Network and Information Security)

Page 15: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

I. Segregation – Seperation

1. Functional Separation

2. Separation by Design

3. Organisational PbD

4. Access Control

Page 16: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

II. Data Minimisation

A. Data Minimization

B. Data Minimummization (Van der Sloot, 2013)

o Minimizing data as such may lead to a loss of value and contextuality.o A minimum set of data is gathered, stored and clustered. o The context of the data in the form of metadata is collected along with the

original data.

Page 17: Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts

Contact: [email protected]

KU Leuven Centre for IT & IP Law - iMindsSint-Michielsstraat 6, box 3443BE-3000 Leuven, Belgium

http://www.law.kuleuven.be/citip

Thank you for your attention!

With the financial support of FP7 – Seventh Framework ProgrammeFP7 – Seventh Framework Programme Grant agreement no: 607093Grant agreement no: 607093