Get Ready For ePrivacy Regulation

While the Facebook-Cambridge Analytica situation catapulted the GDPR (in force since May 25th) into national prominence and jolted many non-EU companies into action vis-a-vie data protections, there is an even more concerning regulation waiting in the wings; ePrivacy Regulation or ePR for short. 
 
ePR is essentially a complement to the GDPR covering all electronic communications and data. It is intended to provide a single digital data privacy framework under which all companies doing business with EU residents must conform, and the penalties are similar to those enforced under the GDPR. 
 
Originally intended to roll out simultaneously with the GDPR, ePR has caused such extreme concerns across a variety of industries that rollout has been postponed as rigorous negations and clarifications take place.
 
According to an economic impacts’ report commissioned by the Developers Alliance, concerns include:
 
• Up to a 30 percent fall in economic profits dependent, directly or indirectly, on electronic communication.
• Impacts felt far beyond telecommunications and into many data-driven industries;
• And EU residents paying a stiff price in terms of stifled innovation, lost jobs and reduced economic growth.
 
In a Nutshell - ePR
Regulators developed ePR because the volume and complexity of digital data are increasing exponentially and the environment for generating, storing and consuming these emerging types of data can be quite different from more traditional data formats. 
 
While the GDPR focuses on providing consumers with protections for and control over the use of personal data stored in a company’s databases or passed to a third party, ePR speaks specifically to electronic communications data. In some cases, it enumerates how GDPR protections should be applied to electronic communications data. In others, it adds restrictions not found under GDPR. In all cases, the intent is to create a single unified regulatory platform between GDPR and ePR for handling of personal data, whether digital or traditional.
 
The regulation cuts a broad swath, applying to traditional telecommunications companies and internet service providers, to e-mail, messaging apps and VOIP services, to anyone any company using electronic tracking (e.g., cookies) and to some uses of IoT and machine-to-machine communications.
 
In a divergence from the GDPR, business-to-business companies are also required to comply which incorporates business employees into the GDPR protections currently afforded to consumers.
 
Extended or expanded requirements under ePR include the following:
 
Consent – the GDPR delineates rules for obtaining clear and unambiguous consent for collection and use of personal information. ePR follows the same definition of what constitutes valid consent but makes it the “central legal ground” for the processing of electronic communications data, direct marketing communications and the access to end users’ terminal devices (phones, wearable devices, gaming consoles, etc.). 
 
One area of concern under ePR is that while GDPR also includes legitimate interest (as long as the consumers are aware of this and have consented to it) and contractual necessity as allowable factors for collecting and processing personal data, ePR lacks these exemptions to consent. This adds ambiguity, brings into question the alignment and relationship between GDPR and ePR and may effectively narrow how companies can process electronic communications data as well as what they can collect. 
 
For example, without contractual necessity, what happens if a company needs to process certain electronic communications information to provide service, but the customer refuses to give consent? Or on the flip side, does it mean that companies have to alter account origination processes to obtain consent for processing necessary to set up the account? Both questions seem to extend the need for obtaining consent beyond what the GDPR established. 
 
Cookies – Although ePR will allow the use of first-party cookies for analytics, it imposes severe restrictions on the use of third-party cookies. Under the regulation, companies will have to obtain specific consent for social plug-in cookies, third-party cookies used for behavioral advertising and third-party analytics. Companies are concerned that this type of consent will be quite hard to obtain. 
 
Also under discussion is the question of whether companies whose business model is based on targeted advertising (e.g., Facebook) can deny users who refuse consent access to the site or if they must provide other fair and reasonable options for access (subscription, paid access or limited access to parts of the site). 
 
Communications Data, Metadata – ePR delineates between communications content (what was said) and metadata (type of communication, length, location, involved parties, devices involved, etc.). It also limits the ability to access the processing and storage of terminal devices (e.g., phones) to collect metadata and to implement the tracking options discussed above. 
Metadata usage is limited to statistical counting, requires data to be deleted and anonymised immediately after the function it was collected for is complete. Users also have the ability to object. 
 
Industry groups are negotiating to have legitimate interest (e.g., analysis of customer behaviors and hardware performance needed to improve service) added into the rules here, particularly for metadata, as they feel customer experience and network efficiency will be negatively impacted under the current rules. 
 
Predicted Business Impacts
The projected impacts are significant and impact a varied number of industries. Concerns revolve mainly around the restrictions of metadata and the inclusion of IoT and machine-to-machine communications. Put simply, if you can’t transmit and analyse activity, you can’t use it, which calls into question a significant number of current IoT and customer experience management activities. 
 
Gaming – Video game developers rely on gamer metadata to feed machine learning algorithms that make play better in subsequent versions and help find and fix bugs post-release. Under ePR, this would cease to be a viable path for product improvement and will severely impact game quality. 
 
Communications content is also critical for social games as both the gaming community and the platform providers monitor for hate-speech, targeted harassment and illegal communications. Gamer-developer give and take feedback mechanisms could be adversely impacted as well. 
 
Telecommunications - Monitoring network metadata (volume, location and duration of calls, data usage, device types, dropped calls, etc.) is critical to maintaining network performance, analyzing root causes of persistent issues and determining infrastructure investment requirements. Historical information is needed as well, making the requirement to delete problematic. 
 
Telecommunications also use metadata to provide targeted offers and suggestions to individual customers. Detecting calling behaviors that indicate a need for plan changes or proactively identifying handset issues are good examples of activities which may be curtailed or restricted. 
 
Online Advertising – The advertising business model will be significantly impacted by the restrictions placed on third-party analytics. Some fear that companies will have to move analytics in-house where they lack the technology and skillsets needed to precisely target communications and offers thus pushing smaller companies back to the days of “spray and pray” communications.
 
Another question concerns how to manage the specific consent requirements in today’s high-volume, real-time analytic environments needed for customer experience initiatives. And the big elephant in the room - a significant change to the many on-line businesses that rely on advertisers to provide free services (social media, paid search, etc.). 
Smart Things and IOT in General – Smart cities and houses, automated distribution initiatives, fitness and health wearables – these all rely on activity data (metadata) and location data, and many have a human component – drivers, cell phone users, wearers etc.
 
It is unclear where ePR will land in terms what types of IoT data will eventually be covered, what consent will be needed and what processing can occur. This is an area of significant concern, and many industries are weighing in and watching closely. 
 
The bottom line? Keep a close eye on the progress of discussions around ePR, because like it or not, some form of regulation will be in force one day. And that day may come sooner than you think. 
 
Information-Management
 
You Might Aso Read: 
 
California Passes Its Own GDPR Law:
 
GDPR Will Impact Data Management In The USA:
 
 
« UK CEOs Believe Cyber Attacks Are Inevitable
Top Cyber Spy Warns Against AI »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

European Defence Agency (EDA)

European Defence Agency (EDA)

EDAs mission is to improve European defence capabilities. Programme areas include Cyber Defence.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

CyberOne

CyberOne

CyberOne (formerly Comtact) offer a full stack cybersecurity service to ensure our customers understand the cyber maturity of their organisation.

WizNucleus

WizNucleus

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and remain compliant.

National Cyber Security Centre (NCSC) - Switzerland

National Cyber Security Centre (NCSC) - Switzerland

The National Cyber Security Centre is Swizerland's competence centre for cybersecurity and the first contact point for businesses, public administrations, and the public for cyber issues.

DANAK

DANAK

DANAK is the national accreditation body for Denmark. The directory of members provides details of organisations offering certification services for ISO 27001.

HardSecure

HardSecure

Hardsecure supports organizations to face security threats through the adoption of cybersecurity capabilities that guarantee 360º monitoring, visibility, mitigation, and blocking.

Informatics International

Informatics International

Informatics is a leading ICT provider in Sri Lanka, providing cutting-edge software & infrastructure solutions and services including cyber security.

Adit Ventures

Adit Ventures

Adit Ventures is a venture capital firm with a focus on dynamic growth sectors including AI & Machine Learning, Big Data, Cybersecurity and IoT.

01 Communique Laboratory

01 Communique Laboratory

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security.

Cyberi

Cyberi

Cyberi provide specialist technical consultancy and cyber advisory services, from penetration testing and assurance to incident management and response, and technical security research.

Aptum

Aptum

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network.

SignMyCode

SignMyCode

SignMyCode is a one-stop shop for trusted and authentic code signing solutions to safeguard software.

Ark Technology Consultants

Ark Technology Consultants

Ark Technology Consultants is a unique IT Services Firm which blends technology solutions with consultative insight around governance and process management.

SOCRadar

SOCRadar

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI).

SGS Brightsight

SGS Brightsight

SGS Brightsight is the largest independent security evaluation lab in the world, with ten recognised labs worldwide.