기본 콘텐츠로 건너뛰기

How the EU cybersecurity act could set standards that impact legal liability and cross-border data flows

The European Union believes that regulating IoT devices can solve this problem.


Consumers are expecting more from products they have used for decades, seeking additional control over devices ranging from refrigerators to cars to fire alarms.  And the Internet of Things (“IoT”), which involves the inclusion of limited data processing and software functionality in everyday devices connected to the internet, has allowed people to set their refrigerator temperature remotely from their phone and monitor their car from afar.  
But the limited nature of IoT devices means that they have been notoriously vulnerable to cyber attack.  The European Union believes that regulating IoT devices can solve this problem.  Other countries, the U.S. among them, are sceptical about the utility of regulation in this fast-moving industry.

The EU Cybersecurity Act
The EU plans to exert pressure on IoT device manufacturers through the EU Cybersecurity Act, which, as currently constructed, would create a single certification scheme for information communications technology (“ICT”) devices.  On June 8, the Council of the EA agreed on its position for the proposal, which allows for future deliberation within the European Parliament.  If the Council and the Parliament agree, the Act will become law.
The stated goal for the Act is to build consumer trust in IoT products while continuing construction of a single EU digital marketplace.  The second goal is difficult given that many individual EU member states already have their own cybersecurity certification rules.  The push for certification also goes hand in hand with the EU’s Network Infrastructure Security Directive (“NISD”), which went into effect in May 2018 and is designed to protect important sectors such as banking, energy and technology from cyber attacks.  NISD includes standards to prevent data breaches and quickly and efficiently confront problems as they occur.  It also calls for penalties set by each EU member state for companies that either lack sufficient security protections or fail to notify authorities of breaches.
The Act would also increase the authority of the EU Agency for Network and Information Security (“ENISA”) and make it a permanent EU-wide cybersecurity agency.  Currently, ENISA serves as a body of experts voluntarily consulted on cybersecurity matters.  But the Act would grant ENISA powers to support both member states and EU institutions on all cybersecurity issues and to conduct cybersecurity exercises.  ENISA would also be responsible for carrying out certifications of IoT products.  Under the Act as currently proposed, certifying products would be a voluntary exercise for companies unless otherwise stated in EU or specific member state law.
Under the Act, the European cybersecurity certification would: “attest that the ICT processes, products and services that have been evaluated in accordance with [the European cybersecurity certification framework] comply with specified security requirements with the aim to protect the availability, authenticity, integrity or confidentiality of stored or transmitted or processed data or the functions or services offered by, or accessible via, those protects, processes and services throughout their life cycle.”
Proposal 9350/18 (29 May 2018), Title III Cybersecurity Certification Framework, Article 43, ¶ 2.  While the certification process has the laudable goal of increasing security for IoT devices, details are scarce on exactly what standards will be applied.  The preliminary Act already details different levels of certification, ranging from “basic” to “substantial” to “high.”
But it remains unclear what standards whether different standards will be used for different kinds of devices.  In other words, will cars be held to the same standard as refrigerators?  More importantly, the Act does not explain how the certification will be renewed or checked throughout the “life cycle” of the IoT device, as set forth in Article 43.  Would remote security updates be sufficient, or will verified security audits be necessary for continued certification?  More than likely, the vague nature of the security specifications within the proposed Act is intentional, as the rapid nature of the development of ICT and IoT devices means that specific security requirements would become obsolete almost overnight.  But clear standards will be necessary before the Act becomes law.

Legal Questions
From a broader perspective, the Act raises two key legal questions.  First, if the Act creates a new standard of safety for ICT and IoT devices, who will be held liable when a data breach occurs through a certified device?  Second, how will the Act and the certification process impact cross-border data transfers between EU and non-EU countries?

Shield for Liability?
Currently, if a consumer in the EU has his or her personal data stolen through an ICT or IoT device, that consumer will pursue a remedy against the manufacturer of the device.  But what if the Act passes and the device in question is certified as complying with the EU’s security requirements?  Could the consumer hold the EU liable for a breach?
Nothing in the Act suggests that certification would shield an ICT or IoT manufacturer from liability for a data breach.  However, given that lawsuits and complaints about events leading to data breaches often turn on whether the manufacturer acted reasonably in protecting the data at issue, certification under the Act would appear to be a key fact in that analysis.  In addition, companies certifying their products under the Act would be working closely with ENISA, a body that could also be involved in the investigation of the data breach.  Facts relating to a company’s cooperation with ENISA and other EU agencies in investigating and halting a breach could be used to show that the company acted reasonably and responsibly.
The danger to the EU would arrive through the labelling of products as “certified” to create a sense that they are secure and absolutely safe.  While the Act makes clear that nothing can guarantee 100 per cent security, consumers may be drawn to certified products based on their belief that the information processed through such products is protected.  If a breach occurs within or through a certified product, consumers may challenge the sufficiency of the Act, the standards for certification, or the processes through which ENISA ensures that the products meet the standards.

Cross-Border Issues
Another issue arises when one considers the origin and portability of so many ICT and IoT devices.  Any time a U.S.-manufactured IoT device sends data from the EU to the U.S., regulatory issues must be navigated.  The EU General Data Protection Regulation (“GDPR”) and NISD both regulate such cross-border transfers, but it is unclear at this point how the proposed Act will incorporate the principles of these regulations.
The United States is urging caution when it comes to regulating ICT and IoT devices.  In a letter written by the U.S. Chamber of Commerce (among others) and addressed to the European Commission on the proposed Act, the U.S. implored the EU to avoid unnecessary regulation, eschew a one-size-fits-all approach to certification, and prevent creating a false sense of security through labelling certain products as “certified.”  See https://www.uschamber.com/iot%26cybersecurity.   The U.S. is pushing for policies based on “existing global, voluntary, consensus, and industry-driven standards” for cybersecurity as opposed to a black-and-white certification process.
If the Act passes and certification becomes a necessity to effectuate profitable sales of ICT and IoT devices in Europe, U.S manufacturers of such products may need to navigate the GDPR, the NISD, and the Act in concert.  As the U.S. Chamber of Commerce seems to recognise, this could be costly.  In any event, all companies involved in the ICT and IoT industry should follow closely the finalisation of the Act in the EU Council and Parliament.

John C. Eustice, member, Miller & Chevalier Chartered
Image Credit: Flickr / janneke staaks

댓글

이 블로그의 인기 게시물

지문 넘어 정맥·홍채로...4000억원 '생체인증' 선점경쟁

4000억원 규모 국내 생체인증 시장을 선점하기 위해 관련 업체 경쟁이 치열하다. 생체인증시스템이 현금자동입출금기( ATM )부터 공항 신분확인, 기업 출입관리까지 다양한 분야로 확대된다. 지문인증을 넘어 손바닥, 손가락 정맥(장정맥, 지정맥)과 안면, 홍채 등 다양한 신체 부위를 활용한 인증 솔루션이 각광 받는다. 25일 업계에 따르면  Sh 수협은행은 장정맥 기반 금융서비스를  ATM 에 먼저 적용한다. 자체 기기에 도입하는 데 그치지 않고, 장정맥 인증 확산을 위해 타행· GS 리테일과 제휴도 추진한다.  GS 25 편의점 내  ATM 에서 장정맥 인증으로 입·출금, 계좌이체 등이 가능해진다. 신협중앙회는 손가락 정맥패턴을 이용한 '지정맥' 인증 시스템을 고객 간편결제 서비스에 도입하는 방안을 검토한다. 지난해 시스템 통제와 임직원 확인용 지정맥 인증을 사내 도입했다. 생체인증은 금융권 중심으로  ATM 과 개인금고, 공항, 기업 출입 등 다양한 곳에 활용된다. 한국후지쯔는 신한은행 시작으로 국민은행, 우리은행,  NH 증권, 롯데카드, 케이뱅크 등에 장정맥 인증 서비스 '팜시큐어'를 공급했다. 제주·김포공항에 장정맥을 이용한 실명확인 시스템을 구축했다. 동서석유화학,  SK 텔링크 등 일반 기업도 도입했다. LG 히다찌는 지정맥 인증 서비스를 신협중앙회 사내통제시스템뿐 아니라  BNK 부산은행 스마트  ATM 에도 공급했다. 부산은행은  ATM 뿐 아니라 은행창구 등에도 지정맥을 활용한다.  LG 히다찌는 신한카드, 나이스정보통신 등과 업무협약을 맺고 오프라인 간편결제로 지정맥 활용 준비 작업에 나섰다. 계명대 동산의료원과도 업무협약을 맺고 병원 인증시스템 도입도 검토한다. 국내 스타트업 위닝아이는 카메라를 이용한 손바닥 인증 기술을 전북은행 '뉴스마트뱅킹', 한화손해보험 '스마트인슈', 신영증권 등에 공급했다. 현대모비스와 손잡고 차량용 인증 기술 개...

BLACK LABEL, An IoT Security and Platform Company, Signed An MOU of Developing Security Solution for WDF Cryptocurrency

On June 21, 2018, Black Label Gangnam signed an MOU for the development of an integrated security solution for electronic wallets, servers and shopping malls to be issued by (re) the WDF cryptocurrency by the World Distribution Federation.  (re) The World Trade Federation, under the umbrella of the United Nations, is building a global distribution platform with more than 80 member countries around the world. On this platform, we are developing cryptography for the payment of funds for distribution and for the payment of shopping malls, and have developed this security solution in conjunction with the black label and signed a working agreement for integration. We are going to issue an IC card with the black label's patented pattern-free personal identification code (RSA +, BLACK LABEL's Patent Technology) and apply it to individuals ' electronic wallets, company servers, and shopping mall payment security.  The biggest problem with cryptography is the physical security of...

BLACK LABEL IoT SECURITY SOLUTION, MUTUAL VERIFICATION SYSTEM

Black Label's security solution is a mutual verification system, which is a personal identification security solution through mutual verification between SIM and identity authentication server. Among existing wireless communication networks, a mobile communication network using a USIM, which is a personal identification device, is considered to be most secure against hacking. This is because the USIM card has a personal identification code, including the user's mobile communication number, so it sends and receives a telephone call or message after authentication. BLACK LABEL has developed a security solution called "Mutual Verification System" by utilizing the characteristics of SIM and enhancing the disadvantages of the personal identification process to enhance the personal identification security. The mutual verification system is a system that sends and receives personally identifiable information to the authentication server by infinitely changing the i...