CCSK

Course
New
Time
9 hours 29 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Transcription

00:03
in this video, we're going to give an overview of different data privacy laws in countries and regions throughout the globe.
00:09
The CCS K exam doesn't require in depth knowledge of these different laws. However, when you take the test, I highly recommend you have a copy of the C s, a cloud security guidance document on hand and searchable. This will allow you to find some of the key highlights about the different privacy laws applicable to the different countries.
00:30
In 1988 Australia passed a privacy act
00:33
that defined 13 different privacy policies. These policies were applicable to private and nonprofit companies making more than $3 million a year.
00:44
The principles also applied to private health providers and certain small businesses.
00:49
Amongst other things, these principles required reporting data breaches specifically around the data breaches of P I. I personally identifiable information that could cause serious harm and in those circumstances, the entities that this privacy act is applicable to.
01:07
I need to report it to the Information Commissioner.
01:11
Australia also has a over our king consumer law that protects its consumers against false and misleading contracts or poor conduct by the businesses themselves. This isn't specific to technology, but it can certainly be applicable as a cloud provider operating in Australia.
01:32
In 2017 China passed its own cybersecurity law that governs and dictates operations of networks and critical infrastructure throughout the company.
01:41
This law placed various security requirements on that infrastructure information security measures. Emergency response plans are required of the businesses and they need to support the Chinese authorities in their investigations, off breaches or looking for data.
02:00
In 2017 China also drafted regulations on cross border data transfers. This put a lot of increase on the number of data categories that need to be stored locally in the country of China within the physical
02:14
boundaries of the country.
02:16
Japan has its own active protection of personal information overall, AP P I protects personal information and data. In 2017 it was amended to limit how that data can be transferred to third parties.
02:30
Japan also has regulations that pertain to personal health information. Ph i patient information.
02:38
When it comes to data transfer outside of Japan, no formal consent is required so long as you are transferring it out of Japan and into a country that has a comparable privacy framework in place.
02:49
Russia has significant restrictions on data processing. In 2015 they required data of the Russian citizens be physically stored within Russia. This is very similar to China's localization restrictions that we previously discussed.
03:06
In 2018 the European Union published GDP Art, the General Data Protection Regulation. This was a real big deal in the industry
03:15
in any company that processes data of any EU citizen regardless and avoid that. Actually you citizen is located. Must adhere to these regulations with regards to managing data of that individual or those individuals that are you citizens. Certain things include making sure you're very clear
03:32
on obtaining consent of the data subject.
03:36
You're very clear on what you're intending to use the data. Four. You can only transfer data to countries that have similar privacy and data protection frameworks in place.
03:46
You citizens have the right to request a company, provides all the data that they've collected
03:52
about them and even assert that they want to be for gotten require that those companies completely purge that data and information about them. Cos Air required to report breach within 72 hours off, becoming aware of the breach not within 72 hours of the breach itself because sometimes it takes more than 72 hours
04:12
t even
04:12
be aware that the breach occurred.
04:15
Failing to meet these regulations has some extremely steep fines, 20 million euros or even 4% of a company's gross income in that area. Germany has also come in and then they require a D P o, a data protection officer,
04:31
be in place for any company that has more than nine employees.
04:35
Also applicable is the Network Information Security directive from the EU. This governs network and information security for digital services such as e commerce, search engines and cloud computing.
04:48
And those essential service providers must notify government authorities if there is an impact to the services that they provide.
04:57
So if the search engine goes down, the government needs to be made aware of it.
05:01
Certain countries outside the EU have also adopted regulations highly influenced by GDP are including Dubai, Israel, Morocco, Senegal guitar and South Africa.
05:13
Privacy policies in Central and South America are rapidly changing. They've been highly inspired by European Directive 95 46 E. C. And the APEC Privacy Framework it's worth noting that European Directive 95 46 A c was the precursor to the GDP are that we just discussed a few moments ago.
05:33
Mexico itself also has explicit laws on the books that require disclosure. During the incidents of data breach,
05:42
Canada has addressed data privacy with Pepita, the Personal Information Protection and Electronic Documents Act,
05:49
unlike GDP, are in the EU. The United States does not have a single comprehensive privacy act. Rather, individual things such as the Gramm Leach Bliley Act are applicable. HIPPA very much focused on health information and patient health information and the management around that which was also amended for
06:10
high tech.
06:11
That brought some more modern constraints and requirements on health care providers for managing their information. Other privacy laws include addressing the nuances of data related to minors. This is Copa Children's Online Privacy Protection Act,
06:27
and there are other general laws that require reasonable security measures for personal data be put in place by companies,
06:32
and as we've hit on so many times, the data controller is ultimately responsible. This includes inheriting responsibility of data processors and subcontractors, actions and inactions and ability to protect the data or being held accountable when subcontractors air not performing unnecessary and expected diligence to manage the data
06:53
in the US there are also certain state level laws. These air aimed to fill the void due to the lack of an over our King federal level law. These laws apply to data of individuals, state residents. It doesn't matter where the company itself is located. If you have information from and about individuals that reside in the states that have enacted this laws,
07:13
the expectation is
07:14
the company will be able to adhere to those laws.
07:17
Amongst other things, These laws require written contracts between the entity and the service providers themselves to ensure that adequate protections are in place for personal data. There are laws that require notification to government agencies in the course of bridges. Massachusetts itself has
07:34
a pretty extensive suite of state laws,
07:38
and so does California, recently introducing the California Consumer Protection Act. And for a long time, the FTC has been responsible for enforcing action against unfair and deceptive practices.
07:49
While this isn't a technology specific or even a privacy data specific, it is worth noting because it's been pulled in too many cases and circumstances
07:59
as a reference against and prosecuting companies who are mishandling data or using data in ways that the customer themselves who was providing the data did not expect it to be used.
08:11
So in this video we took a whirlwind tour of all the privacy lost throughout the globe. Once again, you don't need to remember rise each and every one of these. But when you're taking the exam, it's gonna be very effective for you to have some good notes and highlights about key points on these different laws in the regions that their applicable to.

Up Next

CCSK

This course prepares you to take the CCSK exam certification by covering material included in the exam. It explains how the exam can be taken and how the certification process works.

Instructed By

Instructor Profile Image
James Leone
Cloud, IoT & DevSecOps at Abbott
Instructor