Brexit Fallout Continues – ePrivacy


The fall-out over the Brexit vote has already started concerns that the UK will lose its influence over the EU review of online privacy laws - and any future legislation - as the long-running dispute over transatlantic data transfers appears to be settled.

Brussels chiefs have already started a consultation on the ePrivacy Directive – including the Privacy & Electronic Communications Regulations (PECR) – which covers all online and mobile marketing, SMS, email and telemarketing activity.

The Directive was last updated in 2009 to provide clearer rules on customers’ rights to privacy. In particular, on so-called “cookies” and personal data breaches.

But Fedma - the Pan-European lobbying body of the direct and digital marketing industries - has already lamented the fact that UK experts will not be able to influence discussions.

Fedma co-chairwoman Dr Sachiko Scheuing said: “The UK has been instrumental in helping to shape the future of privacy in Europe and seen a huge number of legal professionals, business experts and data practitioners inform the legislation which will influence the way companies are able to target EU residents.

“Now the UK has left, that expertise will be unable to continue to add value to, for instance the ePrivacy directive, in the same way moving forward.” The move comes as the EU and US seem to have finally settled their differences over the transatlantic data transfer pact, Privacy Shield.

Industry experts, MEPs, UK Information Commissioner Christopher Graham, and the EU Article 29 Working Party – which is made up of the data chiefs of all EU states – had all criticised the levels of protection offered.

But the new agreement has seen the US commit not to continue its bulk collection of data sent from the EU to the US, while there are also more explicit data retention rules, and the ombudsman - who will act in any disputes - will be independent from national security services.

A spokesman for the European Commission said: “This new framework for transatlantic data flows protects the fundamental rights of Europeans and ensures legal certainty for businesses.”

While the agreement will only apply to the UK until it officially leaves the EU, the UK Information Commissioner has reaffirmed its view that Britain would need to adopt similar terms, much like it will for the EU's General Data Protection Regulation.

In a statement, the ICO said: “If the UK is not part of the EU, then upcoming EU reforms to data protection law would not directly apply to the UK. But if the UK wants to trade with the Single Market on equal terms we would have to prove 'adequacy' - in other words UK data protection standards would have to be equivalent to the GDPR framework starting in 2018."

DataIQ

 

« Cybersecurity Insurance – What Is It? How Does It Work?
China’s South Sea Cyber War »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

Jamcracker

Jamcracker

Jamcracker is a cloud services management and cloud governance solutions company, with more than a decade of experience providing industry leading software and services.

Pindrop Security

Pindrop Security

Pindrop solutions are leading the way to the future of voice by establishing the standard for security, identity, and trust for every voice interaction.

Nok Nok Labs

Nok Nok Labs

Nok Nok is a market leader in next generation authentication for cloud, mobile and IoT applications.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

DisruptOps

DisruptOps

Built for today’s cloud-scale enterprises, DisruptOps’ Cloud Detection and Response platform automates assessment and remediation procedures of critical cloud security issues.

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group (STIGroup)

Secure Technology Integration Group, Ltd. (STIGroup) is an innovative firm that provides CyberSecurity consulting, secure IT engineering, managed security services, and human capital solutions.

ThreatReady Resources

ThreatReady Resources

ThreatReady reduces an organization’s risk by delivering cyber security awareness training based on the latest, state-of-the-art learning science to effectively drive long-term cyber-safe behavior.

ditno

ditno

ditno uses machine learning to help you build a fully governed and micro-segmented network. Dramatically mitigate risk and prevent lateral movement across your organisation – all from one centralised

Sparrow

Sparrow

Sparrow specializes in application security testing solutions to cope with new technology trends such as cloud, mobile, and DevSecOps.

Mode Solutions

Mode Solutions

Mode guarantee IT performance where you need it most, creating seamless and secure solutions that will alleviate pressure from your business.

Levio

Levio

Levio is a digital native business and technology consulting firm. As a true partner from start to finish, our goal is a long-lasting transformation that’s right for your business model.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.