Brexit Fallout Continues – ePrivacy


The fall-out over the Brexit vote has already started concerns that the UK will lose its influence over the EU review of online privacy laws - and any future legislation - as the long-running dispute over transatlantic data transfers appears to be settled.

Brussels chiefs have already started a consultation on the ePrivacy Directive – including the Privacy & Electronic Communications Regulations (PECR) – which covers all online and mobile marketing, SMS, email and telemarketing activity.

The Directive was last updated in 2009 to provide clearer rules on customers’ rights to privacy. In particular, on so-called “cookies” and personal data breaches.

But Fedma - the Pan-European lobbying body of the direct and digital marketing industries - has already lamented the fact that UK experts will not be able to influence discussions.

Fedma co-chairwoman Dr Sachiko Scheuing said: “The UK has been instrumental in helping to shape the future of privacy in Europe and seen a huge number of legal professionals, business experts and data practitioners inform the legislation which will influence the way companies are able to target EU residents.

“Now the UK has left, that expertise will be unable to continue to add value to, for instance the ePrivacy directive, in the same way moving forward.” The move comes as the EU and US seem to have finally settled their differences over the transatlantic data transfer pact, Privacy Shield.

Industry experts, MEPs, UK Information Commissioner Christopher Graham, and the EU Article 29 Working Party – which is made up of the data chiefs of all EU states – had all criticised the levels of protection offered.

But the new agreement has seen the US commit not to continue its bulk collection of data sent from the EU to the US, while there are also more explicit data retention rules, and the ombudsman - who will act in any disputes - will be independent from national security services.

A spokesman for the European Commission said: “This new framework for transatlantic data flows protects the fundamental rights of Europeans and ensures legal certainty for businesses.”

While the agreement will only apply to the UK until it officially leaves the EU, the UK Information Commissioner has reaffirmed its view that Britain would need to adopt similar terms, much like it will for the EU's General Data Protection Regulation.

In a statement, the ICO said: “If the UK is not part of the EU, then upcoming EU reforms to data protection law would not directly apply to the UK. But if the UK wants to trade with the Single Market on equal terms we would have to prove 'adequacy' - in other words UK data protection standards would have to be equivalent to the GDPR framework starting in 2018."

DataIQ

 

« Cybersecurity Insurance – What Is It? How Does It Work?
China’s South Sea Cyber War »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

Allgress

Allgress

Allgress solutions converge disparate risk silos across enterprise networks and automate governance, risk and compliance management processes.

IoT Now

IoT Now

IoT Now explores the evolving opportunities and challenges facing CSPs, and we pass on some lessons learned from those who have taken the first steps in next gen IoT services.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Transmit Security

Transmit Security

The Transmit Security Platform provides a solution for managing identity across applications while maintaining security and usability.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

Cyber Readiness Institute (CRI)

Cyber Readiness Institute (CRI)

At the Cyber Readiness Institute, our mission is simple: empower small and medium-sized enterprises with free tools and resources to help them become more secure and resilient.

Path Forward IT

Path Forward IT

Path Forward IT has been troubleshooting, architecting, migrating, protecting, and securing IT environments for businesses across the USA since 2002.

Plante Moran

Plante Moran

Plante Moran is a leading audit, tax, consulting, and wealth management firm. Areas of consulting expertise include cybersecurity.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

Prancer

Prancer

Prancer is the industry's first cloud-native, self-service SAAS platform for automated security validation and penetration testing in the cloud.

Aegis9

Aegis9

Aegis9 is an Australian owned and sovereign consultancy that specialises in providing tailored security solutions for both public and private sector clients based on their specific needs.

Tausight

Tausight

Tausight is an AI-Powered patient data security startup with a mission of reducing healthcare cyber incidents using a more proactive, risk management philosophy.

AuthX

AuthX

AuthX provides secure and seamless log-in capabilities through strong authentication and integrations.

WIIT Group

WIIT Group

WIIT Group are focused on a single goal: securing our clients’ critical processes and enabling them for digital transformation.