The European Court of Justice (ECJ) has weighed-in on a long debated area of data protection law by ruling that the definition of personal data extends to dynamic IP addresses. In a ruling dated 19 October 2016 (ref.: C582/14), the ECJ found that dynamic IP addresses constitute personal data whenever the website host that processed … More EU: Court of Justice rules on dynamic IP addresses
This article was first published on betterworkingworld.ey.com Could you explain how a cyber breach affects your bottom line? Cyber economics aims to do just that What is the true impact of a cyber breach? Lost data? Angry customers? A negative hit to your corporate reputation? With so many variables, many of which can be difficult … More Cyber economics: getting the board on board with cybersecurity
First published on betterworkingworld.ey.com Blockchain is more than just a data security protocol — it could transform the way industries and individuals do business Blockchain and the proliferation of the Internet of Things (IoT) presents an important opportunity to revolutionize supply chains, payments and revenue streams. But there are several unknowns and a number of … More With blockchain, what comes first, opportunity or threat?
Following the adoption of the Cybersecurity Law of China (CSL) on 7 November 2016 by the National People’s Congress (NPC), the legal framework for data protection and cybersecurity continues to be enhanced at a significant pace. In November 2016, the Ministry of Industry and Information Technology released for consultation a draft Notice on Regulating the … More China is strengthening its legal framework for the digital economy
It’s not a crime to be attacked; you can’t stop being a target. It’s not a crime even to be breached; threats come from many directions and are highly sophisticated. The real problem is not realizing you’ve been breached, and failing to react in a planned and coordinated manner. As many organizations have learned – … More Incident response: Preparing for and responding to a cyber attack
Excerpt taken from EY’s 19th Global Information Security Survey 2016-17, Path to cyber resilience: Sense, resist, react. Threats of all kinds continue to evolve, and today’s organizations find that the threat landscape changes and presents new challenges every day. Organizations have learned over decades to defend themselves and respond better, moving from very basic level … More EY Global Information Security Survey 2016-17: cyber resilience – regulatory and legal considerations
By Cornelius Grossmann, EY Global Law Leader The advent of blockchain technology not only has the potential to disrupt entire industries, but raises legal questions that present both risks and opportunities. The pace of disruption and advent of innovative technologies is accelerating and has already triggered a seismic shift across industries. Responding to this disruption … More Blockchain: five profound legal impacts
Technology advancements have fundamentally altered how organizations collect, use and manage data. In light of this, in 2012 the European Commission embarked on a process to both update, simplify and bolster privacy regulations, and allow EU residents to resume control over their personal data. The culmination of these efforts is the General Data Protection Regulation … More When is privacy not something to keep quiet about? New EU privacy rules are on the way
While the internet is a world-changing medium for information exchange, blockchain is the first native digital medium for peer-to-peer value exchange. EY’s analysis of blockchain suggests it may have the most impactful potential of the entire portfolio of disruptive technologies that are now emerging. But it also has the most obstacles to success, ranging from … More Legal disruption in a blockchain-enabled world
As a concept, privacy, and the need to protect it, has been around for decades. Yet the programs and governance structures in place to turn the concept of privacy protection into reality remain, if not in their infancy, then certainly in their adolescence. In EY’s Global Information Security Survey (GISS) 2015 privacy questionnaire, 38% of … More Privacy trends 2016: can privacy really be protected anymore?