You are on page 1of 3

International Data Privacy Law, 2017, Vol. 7, No.

2 EDITORIAL 73

Editorial
The rise of cybersecurity and its impact on data
protection

Downloaded from https://academic.oup.com/idpl/article/7/2/73/3896058 by tomas.alassia@alumnos.uchceu.es on 17 November 2021


Christopher Kuner*, Dan Jerker B. Svantesson**, Fred H. Cate***,
Orla Lynskey*** and Christopher Millard***

Cybersecurity is attracting more attention than ever— botnet exploited vulnerabilities in the Internet of Things
not just in headlines, but among policymakers, industry devices to overwhelm the Dyn domain server, causing
leaders, academics, and the public. Successful cyberat- major Internet platforms and services to be unavailable
tacks are becoming more frequent and threatening as ad- in the U.S. and Europe. Enterprising security researchers
versaries become more determined, more sophisticated, have hacked insulin pumps, drones in flight, and cars
and more likely to be connected with a nation state. No on the road.
one and nothing seems safe. The May WannaCry ran- It is no wonder that cybersecurity is attracting
somware attack affected more than 300,000 computers more attention, but such attention raises important is-
in 150 countries. The presidential elections in France sues for personal privacy and the data protection tools
and the United States (U.S.) have been the subject of we use to protect it. The relationship between security
major attacks, followed by strategically timed disclo- and data privacy has always been complicated. Privacy
sures. Yahoo, in the midst of its sale to Verizon, reported depends absolutely on security. No obligation to pro-
that information of approximately 1.5 billion user ac- vide privacy, whether entered into voluntarily or com-
counts had been stolen. In the United States (U.S.), the pelled by law, will be meaningful if the data to be
NSA and the CIA appear to be haemorrhaging top secret protected are accessed or stolen by unauthorized third
documents apparently stolen by insiders, while the U.S. parties. As a result, all modern data protection princi-
Office of Personnel Management was unable to protect ples include an obligation to protect security as well.
21.5 million records on government employees and con- For example, the influential 1980 Guidelines on the
tractors holding security clearances. Protection of Privacy and Transborder Flows of Personal
Part of the escalating attention to cybersecurity is the Data, adopted by the Committee of Ministers of
result of society’s growing reliance on digital systems to the Organization for Economic Cooperation and
control important infrastructure, such as cars, airplanes, Development (OECD) in 1980, included the Security
utilities, supply chains, and industrial systems. In 2010, Safeguards Principle as one of the eight foundational
for example, the U.S. and Israel reportedly cooperated principles of data protection: ‘Personal data should be
in the development and use of Stuxnet, a software pro- protected by reasonable security safeguards against
gram that destroyed centrifuges critical to Iran’s nuclear such risks as loss or unauthorised access, destruction,
weapons program by inferring with their control sys- use, modification or disclosure of data.’ This principle
tems. Hackers used cyberattacks to temporarily shutter was retained in the 2013 revision of the Guidelines
three power distribution companies in western Ukraine (the OECD Privacy Framework), and supplemented
and operations at a Venezuelan oil unloading facility. by additional security-related language covering
In 2014, cyberattacks on a German iron plant caused data breaches. And security has been recognized in ev-
widespread damage. In 2015, thieves stole $81 million ery significant codification of data protection law
by exploiting weak security at the Central Bank of since then, including the EU Data Protection
Bangladesh to persuade the network that controls inter- Directive, the U.S. Federal Trade Commission’s fair
national transfers of money between banks to transfer information practice principles, the APEC Privacy
the money from the Federal Reserve Bank of New York Framework, and the EU General Data Protection
to the thieves’ accounts. The following year, the Mirai Regulation.

* Editor-in-Chief. *** Editor.


** Managing Editor.

C The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com
V
74 EDITORIAL International Data Privacy Law, 2017, Vol. 7, No. 2

Data privacy and cybersecurity are often advanced by diminishing the individual and human rights compo-
common tools, such as encryption, data minimization, nents of data protection law.
and limits on collecting, retaining, and transferring per-  Many data protection professionals in industry and
sonal data. In short, what is good for privacy is often government have historically lacked training or expe-
good for security as well. rience in computer science or other technologies.
But this is not always the case. Despite the founda- Fortunately, this is beginning to change. However,
tional importance of information security for modern pressure to focus more attention on cybersecurity is-

Downloaded from https://academic.oup.com/idpl/article/7/2/73/3896058 by tomas.alassia@alumnos.uchceu.es on 17 November 2021


data protection and the considerable overlap between sues runs the risk of concentrating too much on tech-
many tools for protecting privacy and security, privacy nology and neglecting other important skills, to the
and security are often in tension as well. Many measures detriment of both privacy and security.
employed to enhance cybersecurity pose a risk to pri-
These risks are real and growing. However, the intensi-
vacy. For example, proposals to enhance cybersecurity
fied attention to cybersecurity also presents opportuni-
by requiring identity verification, reducing online ano-
ties, including these:
nymity, and sharing potentially personal information
about cyberattacks all pose risks for personal privacy.  By drawing attention to the challenges of information
This tension is more than theoretical: concerns about governance broadly, the growing focus on cybersecu-
the privacy impact of proposed data sharing legislation rity may lead to increased funding and other re-
in the U.S. led to widespread protests online and offline, sources for privacy work as well. This is especially
delayed its passage for more than four years, and re- true because security is so integral to privacy and
sulted in a substantially weakened final law. public acceptance of new security measures often de-
Whatever the relationship between the legal tools pends, at least in part, on the degree to which those
used for protecting privacy and security, the greatly ex- measures protect privacy.
panded focus on cybersecurity poses other challenges  Enhanced attention to information security, and es-
for privacy and the professionals in public and private pecially the sense of urgency with which these threats
sectors who work to protect it, such as the following: must be addressed, may lead not only to more atten-
tion being given to privacy as well, but also to greater
 The commitment of an ever-increasing portion of insistence that data protection tools, like cybersecu-
scarce resources in industry and government to ad- rity tools, adapt and change more readily to the chal-
dressing cybersecurity challenges threatens to dimin- lenges of the 21st century. Data protection law has
ish investment in data protection. This is not just a rarely been thought nimble; pressure to deal with cy-
matter of money. Institutions only have so much bersecurity may help change that.
bandwidth, and as more time, attention, and re-
sources are focused on enhancing security, privacy  The importance of technological skills for cybersecu-
runs the risk of being shortchanged. rity professionals may intensify the movement to-
wards more data protection professionals trained in
 Data protection officials and practitioners often face technologies as well. At the same time, the broader
a Hobson’s choice of leaving information security range of disciplines traditionally applied to privacy
(and the resources that go with it) to others or add- may help facilitate a much-needed expansion of cy-
ing information security to their portfolios, at the bersecurity competencies as well. After all, the vast
risk of diminishing their attention to privacy. majority of successful cyberattacks involves human
 Historically, when security and privacy priorities or institutional failures, so greater attention to hu-
have competed head-on, privacy is lost. We see evi- man and institutional behaviour, training, incentives,
dence of this following major terrorist attacks, when and risk management is key to enhancing cybersecu-
national governments consider and, in many cases, rity, being applied to privacy.
adopt private-restrictive measures based on the  The human rights foundations of data protection law
premise that it is necessary to sacrifice a little privacy could benefit efforts to improve cybersecurity as well.
in the cause of greater security. This bargain rarely For years, many institutions calculated the ‘cost’ of
proves productive, yet we run the risk of repeating it information security breaches only in terms of the
in the context of measures designed to enhance losses suffered by the institution. A greater under-
cybersecurity. standing that information security, as a component
 Privacy is deeply rooted in human rights principles of data protection, is not just a financial obligation,
and law; cybersecurity historically has not been. but a human rights obligation might contribute to a
A greater focus on cybersecurity runs the risk of broader accounting of the harms that may be caused
EDITORIAL  International Data Privacy Law EDITORIAL 75

by breaches and the range of parties who may be should, at a minimum, be paying close attention to the
injured. emergence of cybersecurity. Even better would be to
Civilization needs better protection for cybersecurity— think constructively and proactively about how to take
far better than we have seen to date–urgently, but it advantage of this important development to ensure that
also needs better data protection. The significance of people everywhere enjoy strong, effective protections
the possible effects on data protection—both positive for their privacy and for the security of their data.
and negative—of the increased attention being paid

Downloaded from https://academic.oup.com/idpl/article/7/2/73/3896058 by tomas.alassia@alumnos.uchceu.es on 17 November 2021


to cybersecurity suggests that privacy professionals in doi:10.1093/idpl/ipx009
government, industry, civil society, and academia

You might also like