{"id":14996,"date":"2019-04-02T08:10:02","date_gmt":"2019-04-02T16:10:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/04\/02\/news-8745\/"},"modified":"2019-04-02T08:10:02","modified_gmt":"2019-04-02T16:10:02","slug":"news-8745","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/04\/02\/news-8745\/","title":{"rendered":"The global data privacy roadmap: a question of risk"},"content":{"rendered":"<p><strong>Credit to Author: David Ruiz| Date: Tue, 02 Apr 2019 15:00:00 +0000<\/strong><\/p>\n<p>For most American businesses, <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/not-definitive-guide-cybersecurity-data-privacy-laws\/\" target=\"_blank\" rel=\"noopener\">complying with US data privacy laws<\/a> follows a somewhat linear, albeit lengthy, path. Set up a privacy policy, don\u2019t lie to the consumer, and check the specific rules if you\u2019re a health care provider, video streaming company, or kids\u2019 app maker.<\/p>\n<p>For American businesses that want to expand to a new market, though, complying with global data privacy laws is more akin to finding dozens of forks in the road, each one marked with an indecipherable signpost.<\/p>\n<p>Should a company expand to China? That depends on whether the company wants to have its source code potentially analyzed by the Chinese government. Okay, what about South Korea? Well, is the company ready to pay three percent of its revenue for a wrongful data transfer, or to have one of its executives spend time behind bars?<\/p>\n<p>Europe is an obvious market to capture, right? That\u2019s true, but, depending on which country, the local data protection authorities could issue enormous fines for violating the <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/make-way-for-the-gdpr-is-your-business-ready\/\" target=\"_blank\" rel=\"noopener\">General Data Protection Regulation<\/a>.<\/p>\n<p>What if a company just follows in the footsteps of the more established firms, like Google, Amazon, or Microsoft, which all opened data centers in Singapore in the past two years? Once again, the answer depends on the company. If it\u2019s providing a service that Singapore considers \u201cessential,\u201d it will have to heed a new cybersecurity law there.<\/p>\n<p>At this point, a company might think about entering a country with no data privacy laws. No laws, no getting in trouble, right? Wrong. Data privacy laws can sprout up seemingly overnight, and future compliance costs could severely cut into a company\u2019s budget.<\/p>\n<p>While this may appear overcomplicated, one guiding principle helps: If a company cannot afford to comply with a country\u2019s data privacy laws, it probably should not expand to that country. The risk, which could be millions in penalties, might not outweigh the reward.<\/p>\n<p>Today, for the third piece in our data privacy and cybersecurity blog series, which also took a look at <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/not-definitive-guide-cybersecurity-data-privacy-laws\/\" target=\"_blank\" rel=\"noopener\">current US data privacy laws<\/a>\u00a0and <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/privacy-security-world\/2019\/03\/what-congress-means-when-it-talks-about-data-privacy-legislation\/\" target=\"_blank\" rel=\"noopener\">federal legislation on the floor<\/a>, we explore the decision-making process of a mid-market-sized company that wants to expand its business outside the United States.<\/p>\n<p>With the help of Reed Smith LLP counsel Xiaoyan Zhang, we looked at several notable data privacy laws in Europe, Asia, Latin America, the Middle East, and Africa.<\/p>\n<h3><strong>Issue-spotting within a culturally-crafted landscape<\/strong><\/h3>\n<p>Before a company expands into a new country, it should try to truly comprehend the data privacy laws located within, Zhang said. She said this involves more than just reading the law; it requires training one\u2019s thinking into an entirely different culture.<\/p>\n<p>Unlike crimes including manslaughter and robbery\u2014which have near-universal definitions\u2014Zhang said data privacy violations fluctuate from region to region, with interpretations rooted in a country\u2019s history, economy, public awareness, and opinions on privacy.<\/p>\n<p>\u201cData privacy is not like murder, which is much more straightforward,\u201d Zhang said. \u201cPrivacy law is very intimately tied into culture.\u201d<\/p>\n<p>So, while overseas concepts might appear familiar\u2014 like protecting \u201cpersonally identifiable information\u201d in the US and protecting \u201cpersonal information\u201d in the European Union\u2014the culture behind those concepts varies.<\/p>\n<p>For example, in the European Union, a history of fierce antitrust regulation and government enforcement helped usher GDPR\u2019s passage. In fact, Austrian online privacy advocate Max Schrems\u2014whose <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/02\/max-schrems-lawyer-regulator-international-man-of-privacy\/\" target=\"_blank\" rel=\"noopener\">legal complaints against Facebook heavily influenced<\/a> the final text of GDPR\u2014<a href=\"https:\/\/www.washingtonpost.com\/business\/economy\/facebook-privacy-targeted-by-austrian-law-student\/2012\/10\/19\/45a38efc-e70c-11e1-936a-b801f1abab19_story.html?utm_term=.488820d388ba\" target=\"_blank\" rel=\"noopener\">remarked years ago<\/a> that he was surprised at the lack of tall garden hedges around Americans\u2019 homes. The country\u2019s understanding of privacy, Schrems realized, was different than that of Austria, and so, too, are its data privacy laws.<\/p>\n<p>Similarly, Zhang said she has fielded many questions from EU lawyers who assume that data privacy regulations around the world are similar to those in GDPR.<\/p>\n<p>\u201cEU lawyers are used to thinking that, for every data collection, there must be a legitimate purpose, and they insist on asking the same questions,\u201d Zhang said. \u201cWhen I\u2019m talking about legal advice in China, they\u2019ll say \u2018Oh, our medical device needs to collect data from users, does China have any law or statutes that give us a legitimate business purpose to collect that data?\u2019\u201d<\/p>\n<p>Zhang continued: \u201cNo. In China, you don\u2019t need that. It\u2019s totally different.\u201d<\/p>\n<p>The differences can be managed with the right help, though.<\/p>\n<p>The safest path for market expansion is to rely on a global data privacy lawyer to \u201cissue-spot\u201d any obvious global compliance issues, Zhang said. These experts will look at what type of data a company handles\u2014including medical, financial, geolocation, biometric, and others\u2014what type of service the company performs, and whether the company will need to perform frequent cross-border data transfers. Depending on all these factors, each company\u2019s individual roadmap for data privacy compliance will be unique.<\/p>\n<p>However, Zhang led us on a bit of a world tour, detailing some of the notable data privacy laws in Europe, Asia, Africa, the Middle East, and Latin America. Company expansion into these markets, Zhang emphasized, depends on whether a company is ready for compliance.<\/p>\n<h3><strong>Many countries, many laws<\/strong><\/h3>\n<h4>Europe<\/h4>\n<p>Starting with Europe there is, of course, GDPR. Complying with the sweeping set of provisions is tricky because GDPR gives each EU member-state the authority to enforce the new data protection law on its own turf.<\/p>\n<p>This enforcement is done through Data Protection Authorities (DPAs), which oversee, investigate, and issue fines for GDPR violation. Each member-state has its own DPA, and, in the months before GDPR\u2019s implementation, the DPAs <a href=\"https:\/\/www.cyberadviserblog.com\/2018\/05\/gdpr-now-effective-will-regulators-enforce\/\" target=\"_blank\" rel=\"noopener\">gave mixed signals about what local enforcement would look like<\/a>.<\/p>\n<p>France\u2019s DPA, the National Data Protection Commission (CNIL), said that companies that are at least trying to comply with GDPR \u201c<a href=\"https:\/\/iapp.org\/news\/a\/cnil-may-go-easier-on-companies-who-prepped-for-gdpr\/\" target=\"_blank\" rel=\"noopener\">can expect to be treated leniently initially, provided that they have acted in good faith.\u201d<\/a><\/p>\n<p>Less than one year later, though, that leniency met its limit. CNIL <a href=\"https:\/\/www.theverge.com\/2019\/1\/21\/18191591\/google-gdpr-fine-50-million-euros-data-consent-cnil\" target=\"_blank\" rel=\"noopener\">hit Google with the largest GDPR-violation fine on record<\/a>, at roughly $57 million.<\/p>\n<p>The best defense to these penalties, Zhang said, is to consult with local legal experts who know the region\u2019s enforcement history and details.<\/p>\n<p>\u201cYou cannot just seek consultation from a GDPR expert. If you want to go specifically to Germany, you need German lawyers who can offer insight on things that are specific to Germany,\u201d Zhang said. \u201cThat\u2019s for all of Europe.\u201d<\/p>\n<h4>Latin America<\/h4>\n<p>Outside of Europe\u2014but still inspired by GDPR\u2014is Latin America. Zhang said several Latin American countries have enacted, or are considering, legislation that protects the data privacy rights of individuals.<\/p>\n<p>In 2018, Brazil passed its comprehensive data protection law, which protects people\u2019s personal information and includes tighter protections for sensitive information that discloses race, ethnicity, religion, political affiliation, and biometrics. Argentina also forwarded privacy protections for its citizens, and it earned a special clearance in GDPR as a \u201cwhitelisted\u201d party, meaning that personal data can be moved to Argentina from the EU without extra safeguards.<\/p>\n<h4>Asia<\/h4>\n<p>Moving to China, a whole new risk factor comes into play\u2014surveillance.<\/p>\n<p>China\u2019s cybersecurity law grants the Chinese government broad, invasive powers to spy on Internet-related businesses that operate within the country. Implemented in 2017, the law allows China\u2019s foreign intelligence agency to perform \u201cnational security reviews\u201d on technology that foreign companies want to sell or offer in China.<\/p>\n<p>This authority <a href=\"https:\/\/www.recordedfuture.com\/china-cybersecurity-law\/\" target=\"_blank\" rel=\"noopener\">raised alarm bells<\/a> for the researchers at Recorded Future, who <a href=\"https:\/\/www.recordedfuture.com\/chinese-mss-behind-apt3\/\" target=\"_blank\" rel=\"noopener\">attributed past cyberattacks directly to the Chinese government<\/a>. Researchers said the law could give the Chinese government the power to both find and exploit zero-day vulnerabilities in foreign companies\u2019 products, all for the price of admission into the Chinese market.<\/p>\n<p>\u201cChina\u2019s law has a hidden angle for government control and monitoring,\u201d Zhang said. \u201cIt has a different rationale.\u201d<\/p>\n<p>Outside of China, Singapore has garnered the attention of Google, Microsoft, and Amazon, which all <a href=\"https:\/\/www.cio.com\/article\/3296099\/why-are-businesses-relocating-data-centres-to-southeast-asia.html\" target=\"_blank\" rel=\"noopener\">built data centers in the country in the past few years<\/a>. The country passed its Personal Data Protection Act in 2012 and its Cybersecurity Act in 2018, the latter of which sets up a framework for monitoring cybersecurity threats in the country.<\/p>\n<p>The law has a narrow scope, as it only applies to companies and organizations that control what the Singaporean government calls \u201ccritical information infrastructure,\u201d or CII. This includes computer systems that manage banking, government, healthcare, and aviation services, among others. The law also includes data breach notification requirements.<\/p>\n<p>Moving to South Korea, the risk for organizations goes up dramatically, Zhang said. The country\u2019s Personal Information Protection Act preserves the privacy rights of its citizens, and its penalties include criminal and regulatory fines, and even jail time. Cross-border data transfers, in particular, are strictly guarded. One wrongful transfer can result in a fine of up to three percent of a company\u2019s revenue.<\/p>\n<h4>Africa<\/h4>\n<p>Traveling once again, expansion into Africa requires an understanding of the continent\u2019s burgeoning, or sometimes non-existent, data privacy laws. Zhang said that, of Africa\u2019s more than 50 countries, only about 15 have data protection laws, and even fewer have the regulators necessary to enforce those laws.<\/p>\n<p>\u201cAmong [the countries], nine have no regulators to enforce the law, and five have a symbolic law but it\u2019s not enforced,\u201d Zhang said.<\/p>\n<p>So, that invites the question: What exactly does happen if a company expands into a country that doesn\u2019t have any data privacy laws?<\/p>\n<p>What happens is potentially more risk.<\/p>\n<p>First, a country could actually develop and pass a data privacy law within years of a company\u2019s expansion into its borders. It\u2019s not unheard of\u2014less than one year after Amazon <a href=\"https:\/\/aws.amazon.com\/blogs\/publicsector\/aws-region-to-open-in-the-middle-east-by-early-2019\/\" target=\"_blank\" rel=\"noopener\">announced its rollout into Bahrain<\/a>, the country <a href=\"https:\/\/iapp.org\/news\/a\/bahrain-publishes-data-protection-law\/\" target=\"_blank\" rel=\"noopener\">introduced<\/a> its first comprehensive data privacy law. Second, compliance with the new data privacy law could be expensive, Zhang said, forcing a company into a tough situation where it might have to withdraw entirely from the new market.<\/p>\n<p>\u201cOne common misconception is that if a country doesn\u2019t have a law at all, it\u2019s a good country to go to,\u201d Zhang said. \u201cYou should think twice about whether that\u2019s the case.<\/p>\n<h3><strong>Expand or not? It\u2019s up to each company<\/strong><\/h3>\n<p>There is no single roadmap for companies entering new markets outside the United States. Instead, there are multiple paths a company can take depending on its product, services, the data it collects, data it will need to move between borders, and its tolerance for risk.<\/p>\n<p>The safest path, Zhang said, is to ask questions upfront. It is far better to make an informed decision about how to enter a market\u2014even if compliance is costly\u2014than to be surprised with fines or penalties later on.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/privacy-security-world\/2019\/04\/globetrotting-businesses-beware-data-privacy-abroad-question-risk\/\">The global data privacy roadmap: a question of risk<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/privacy-security-world\/2019\/04\/globetrotting-businesses-beware-data-privacy-abroad-question-risk\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: David Ruiz| Date: Tue, 02 Apr 2019 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/privacy-security-world\/2019\/04\/globetrotting-businesses-beware-data-privacy-abroad-question-risk\/' title='The global data privacy roadmap: a question of risk'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/04\/shutterstock_314222288.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>For any American company taking steps outside the US market, global data privacy compliance is a question of risk versus reward.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/privacy-security-world\/\" rel=\"category tag\">Privacy<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/africa\/\" rel=\"tag\">Africa<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/amazon\/\" rel=\"tag\">amazon<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/argentina\/\" rel=\"tag\">Argentina<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/asia\/\" rel=\"tag\">asia<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bahrain\/\" rel=\"tag\">Bahrain<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/brazil\/\" rel=\"tag\">Brazil<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/china\/\" rel=\"tag\">china<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cnil\/\" rel=\"tag\">CNIL<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-privacy\/\" rel=\"tag\">Data privacy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-privacy-laws\/\" rel=\"tag\">data privacy laws<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-protection-authority\/\" rel=\"tag\">data protection authority<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/europe\/\" rel=\"tag\">Europe<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/european-union\/\" rel=\"tag\">European Union<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gdpr\/\" rel=\"tag\">gdpr<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/general-data-protection-regulation\/\" rel=\"tag\">General Data Protection Regulation<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/global-data-privacy\/\" rel=\"tag\">global data privacy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google\/\" rel=\"tag\">Google<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/microsoft\/\" rel=\"tag\">microsoft<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/middle-east\/\" rel=\"tag\">Middle East<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/national-data-protection-commission\/\" rel=\"tag\">National Data Protection Commission<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/personal-information-protection-act\/\" rel=\"tag\">Personal Information Protection Act<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/qatar\/\" rel=\"tag\">Qatar<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/singapore\/\" rel=\"tag\">singapore<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/south-korea\/\" rel=\"tag\">South Korea<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/whitelist\/\" rel=\"tag\">whitelist<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/privacy-security-world\/2019\/04\/globetrotting-businesses-beware-data-privacy-abroad-question-risk\/' title='The global data privacy roadmap: a question of risk'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/privacy-security-world\/2019\/04\/globetrotting-businesses-beware-data-privacy-abroad-question-risk\/\">The global data privacy roadmap: a question of risk<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[2260,5588,7025,15663,21443,2908,402,21012,11063,21178,21444,2290,3037,12116,12210,21445,1670,10516,21446,21447,21448,5897,21449,17259,206,21450],"class_list":["post-14996","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-africa","tag-amazon","tag-argentina","tag-asia","tag-bahrain","tag-brazil","tag-china","tag-cnil","tag-data-privacy","tag-data-privacy-laws","tag-data-protection-authority","tag-europe","tag-european-union","tag-gdpr","tag-general-data-protection-regulation","tag-global-data-privacy","tag-google","tag-microsoft","tag-middle-east","tag-national-data-protection-commission","tag-personal-information-protection-act","tag-privacy","tag-qatar","tag-singapore","tag-south-korea","tag-whitelist"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14996","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14996"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14996\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14996"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}