What Does Brexit Mean For British Data Privacy?

The UK’s data protection watchdog has three years to convince the government to adopt and enact the EU laws it is set to break away from.

On October 2, UK Prime Minister, Theresa May revealed that she planned to trigger Article 50 by March 2017, and thus set in motion the UK’s departure from the EU. Her announcement comes just days after the, newly appointed, Head of the Information Commissioner’s Office (ICO), Elizabeth Denham, told BBC Radio 4 that Britain must retain the European legislation.

"I don't think Brexit should mean Brexit when it comes to standards of data protection,” she said. “In order for British businesses to share information and provide services for EU consumers, the law has to be equivalent.”

The EU has for years been debating and finalising laws that it says will bring European privacy protections up to date with technological progress. The resulting Regulation and Directive came into force in May, to be applied by individual member states by May 2018, and is designed to help cement the EU’s Digital Single Market Strategy

As part of both EU privacy and human rights laws the regulation, the EU says, “is an essential step to strengthen citizens' fundamental rights in the digital age”. Come summer 2019, however, the date by which May promises to have exited the union, UK citizens will not have these safeguards in place.

"We are going to be a fully independent, sovereign country - a country that is no longer part of a political union with supranational institutions that can override national parliaments and courts,” the prime minister told the Conservative Party conference in Birmingham.

There is a chance the EU law will be transported into UK law, however. May also announced that a Great Repeal Bill would make up part of the next Queen’s Speech and will allow for a reversal of the European Communities Act 1972, the law that allows EU legislation to become British. The Bill will enact all EU laws into UK law - however, Parliament will be able to "amend or cancel" any law, reports the BBC.

“EU law will be transposed into domestic law, wherever practical, on exit day,” David Davis, Secretary of State for Exiting the EU, will say at a party conference speech. “It will be for elected politicians here to make the changes to reflect the outcome of our negotiation and our exit. That is what people voted for: power and authority residing once again with the sovereign institutions of our own country.” Scottish MPs, however, have threatened to dampen the force of that statement by voting against the Great Repeal Bill.

Europe’s data protection regulation is vast and thorough, designed to not only protect individuals’ privacy rights but ensure that businesses are not faced with multiple costly legal cases as a result of multiple strands of legislation, both national and European.

Among the protections the regulation affords EU citizens is a compulsory rule forcing companies to disclose data breaches within 72 hours of them being discovered. This is incredibly pertinent, considering it was just revealed that Yahoo took the better part of two years to disclose one of the biggest customer security breaches on record. 

Denham also brought this specific case up on BBC Radio 4’s PM programme, stating she would be personally following up. She also insisted she would follow-up on Facebook's attempt at sharing WhatsApp user data across its services, in direct contravention of the promise the social network made when it bought the app.

Since the EU's data regulation law will be in force before the UK’s expected summer 2019 exit, Denham did say she was “concerned about a start and stop regulatory environment”. The UK will have to implement and abide by the regulation from May 2018 at least up until a summer 2019 Brexit.

The commissioner did, however, assure an audience at the Personal Information Economy 2016 event in London last week that in spite of all this, her aim is to ensure the public feels secure: “What hasn’t changed are the strong data protection rules the UK already has. We need those rules to ensure cross-border commerce, not to mention the privacy protections citizens and consumers expect.

“The fact is, no matter what the future legal relationship between the UK and Europe, personal information will need to flow. It is fundamental to the digital economy. In a global economy we need consistency of law and standards, the GDPR is a strong law, and once we are out of Europe we will still need to be deemed adequate or essentially equivalent. For those of you who are not lawyers out there, this means there would be a legal basis for data to flow between Europe and the UK.

“We’re talking about proper protection for consumers, about certainty for business, and about strong independent oversight of the law...We’d all like a concrete answer about the specific outlines of post-Brexit data protection law. We know businesses don’t generally like uncertainty. But in the end, it’s government that will have to decide.”

She claimed this uncertain time, in fact, has its advantages: the opportunity to strengthen our data protection law with the express aim of inspiring “public trust and confidence.” Her words suggest she understands the importance of bridging the divide between personal rights and internet business growth in such a way that neither will be unduly burdened, so both thrive.

Ultimately, it does not make sense to have too disparate an approach from Europe when it comes to data protection: any UK internet startup will have to abide by European regulations anyway if it hopes to build its business on the continent. It would also seem to be an incredible waste of time to enact different legal approaches, considering the UK has to implement the regulation by May 2018 in line with EU laws, ahead of the 2019 Brexit.

"The ICO, UK Courts and all affected entities will have already put in place the requisite infrastructures to comply with the (the law)," points out Stewart Room, global head of cyber security and data protection legal services at PwC. "The new law will apply automatically from May 2018, exposing non-compliant organisations to a risk of staggering regulatory fines for non-compliance, as well as litigation risk," he tells WIRED.

"On leaving the EU the UK would technically be free to abandon the [law], but the question does arise as to why that option would be more attractive than retaining [it]. Retaining the [law] after exit would likely be in the UK’s interests, the interests of UK citizens and the interests of UK-based data controllers and data processors.”

Great Repeal Bill

The Bill will automatically allow May to do what she has long desired: pick and choose which European laws the UK has to follow. She has had a complicated history with the European Convention on Human Rights, for instance, which thwarted her attempts to deport Abu Qatada to Jordan.

The fact that EU courts will no longer have jurisdiction over UK matters will have major implications for citizen protections. Take the recent spate of surveillance suits taken to Europe, for instance. Having failed to take the UK government to task over the mass surveillance of its own citizens here in the UK, Amnesty International and nine other human rights organisations are currently bringing the case in Europe.

Earlier this year David Davis and Labour’s deputy leader Tom Watson brought a case against the UK government to the European Court of Justice (ECJ): it argued that the Data Retention and Investigatory Powers Act of 2014 - which was rushed through Parliament as an emergency measure to validate UK mass surveillance powers in the face of contradictory rulings made by European courts - should be reversed. In July, the ECJ found that retaining data from phone calls and emails could only be legal if UK law enforcement uses that data to fight serious crime. Cases like these will presumably be shelved.

The so-called 'Snoopers Charter' - which has been blasted by human rights groups internet companies, and the UN’s own privacy chief - is designed to be a more permanent update to the Data Retention and Investigatory Powers Act.

However, the UK’s removal from Europe’s privacy protections could still have an impact as the law is alread drafted.

Wired
 

« Hackers Target Election Systems in 20 US States
Hacking The Vote: Russia Wins, America Loses »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Verisec International

Verisec International

Verisec International AB is a Swedish Tech company focused since inception in enabling Trust in Digital Transactions, through the development of proprietary cutting-edge technologies and services.

Grid32

Grid32

Grid32 provides independent computer system and physical security audit services to government and corporate clients of all sizes.

TZ-CERT

TZ-CERT

TZ-CERT is the National Computer Emergence Response Team of Tanzania.

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

KirCCS harnesses expertise across Kent University to address current and potential cyber security challenges.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

Niksun

Niksun

Niksun's forensics-based cyber security and network performance monitoring products provide customers with actionable insight into security threats, performance issues, and compliance risks.

AimBrain

AimBrain

AimBrain tools detect and prevent fraud, faster and more accurately than ever before.

Haventec

Haventec

Haventec’s internationally patented technologies reduce cyber risk and enable pervasive trust services with a decentralised approach to authentication.

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

SEIRIM

SEIRIM

SEIRIM delivers cybersecurity solutions in Shanghai China specializing in Web Application Security, Network Security for SME's, Vulnerability Management, and serving as Managed Security as a Service.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

Winmill Software

Winmill Software

Winmill is a technology services company that provides expert consulting services in Application Development, Application Security and Cyber Security.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

Atlas Cloud

Atlas Cloud

Atlas Cloud is a UK-wide provider of managed services based in Newcastle. Our ‘research-led’ approach to IT services helps leaders make better decisions about IT for their businesses.

Brightworks Group

Brightworks Group

BrightWorks Group offer comprehensive technology operations and security operations consulting services, tailored to meet your specific needs.

Cognna

Cognna

Cognna's innovative platform is designed to empower you and your team, providing the tools you need to detect, prevent, and resolve threats with ease.