16
Page 1 Confidential Property of Schneider Electric | Global Forced Localization and Data Sovereignty Impacts Greg Conary, SVP Group Strategy, Schneider Electric

Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

Page 1Confidential Property of Schneider Electric |

Global Forced Localization and Data Sovereignty Impa cts

Greg Conary, SVP Group Strategy, Schneider Electric

Page 2: Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

2

IIoT in Process Automation – From Concepts to Practi se

Page 3: Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

Global Geopolitical Trends Impacting Business and the digital space

• Anemic Economic Growth

• Digital Commerce and Accessibility

• Advancements in IIoT: Impacting Process Engineering & Digital Manufacturing

• Forced Localization & Data Sovereignty

• Environmental Sustainability

• Global Trade Pressure

Page 3Property of Schneider Electric |

Page 4: Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

Why Data Portability is Critical

Page 4Property of Schneider Electric |

video

Page 5: Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

Advancements in IIoT requireglobal exchange of commercial data

Page 5Property of Schneider Electric |

Microgrid Asset Efficiency Time Sensitive Networks,

CM & PM Industrial Digital Thread Security Claims Evaluation,

Smart Supply Chain: Manufacturing Smart Energy Management Smart Factory Web

Smart Manufacturing Connectiviy Smart Airline Baggage ManagementFactory Automation Platform AAS

Global Testbed Program Samples from the IIC

Page 6: Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

Page 6Property of Schneider Electric |

Forced Localization and Data Sovereignty PolicySamples of Accelerating Impact

Page 6Confidential Property of Schneider Electric |

Page 7: Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

7

North America (examples)• DoD Rule on Network Reporting & Contracting• Cybersecurity National Action Plan• OMB Circular A-119• Wassenear Arrangement• China-US Cyber Agreement• Canadian Telecom Exclusions• Mexico Law of Acquisitions

Page 8: Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

8

Russia (examples)• Federal Laws 374-FZ & 375-FZ "Yarovaya Amendments“• Russian Federation Counterterrorism Requirements• Federal Law 242-FZ (March 2016 Update for Commercial Data)• Federal Law 149-FZ “On Information Technologies and Protection of Information”• Federal Laws #256-FZ ”On the safety of the fuel and energy complex”• Federal Laws #382- FZ “On the state information system of the fuel and energy complex”• Presidential Order #646 “The doctrine of the Russian Federation Information Security”• Draft of the Federal Law “About the security of the Russian Federation of the critical

information infrastructure” (prepared by Federal Security Service).• FSTEC of Russia Order #31 “About the protection of information in automated

production and process control systems to mission-critical facilities ….”.

Page 9: Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

9

India (examples)• Telecom Security Testing• Preferred Market Access• Draft Encryption Policy• Draft Cert-IN Advisory Vietnam (examples)

• Network Information Security Law• Decree on Information Technology

Services (No.72/2013/ND-CP)

Page 10: Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

10

Brazil (examples)• Decree 8135• Marco Civil• ePING• Brazil Informatics Law • Privacy Data Protection Law

Argentina (examples)• NAILs Resolution and Certification

Page 11: Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

11

European Union (examples)• General Data Protection Regime (GDPR)• Digital Single Market• EU NIS (Cyber) Directive• European Court SHF Ruling• France Data Protection Act No. 78-17• Germany Federal Data Protect Act

(Bundesdatenschutzgesetz)• Germany IT Security Act (IT-Sicherheitsgesetz)

Page 12: Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

12

China (examples)• Banking & Financial Institutional Notice of Protection of Data• Administrative Regulation on Credit Industry• Population & Healthcare Information Measures• Online Publishing Service Management Rules• Information Security Technology Guidelines for Personal Information

Protection within Public and Commercial Information Systems• China Counter Terrorism Law• Wuhzen Declaration• China US Cyber Agreement

Page 13: Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

13

Data Generated at Gas Field

Data transmitted to Moscow

Data sent to equipment manufacturer in France (simplex)

Equip Manufacturer sends analysis of data (more data!) to both gas field site and Moscow customer HQ

Architecture of gas field and resulting global data traffic• Cloud-based

Apps• Wireless

Connectivity• Low Power

WAN• Low cost

Sensors

X

X

X

Page 14: Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

Confidential Property of Schneider Electric |

Market Creation: IoT/IIoT Influence Landscape

Government Regulatory Frameworks

Market Driver and Industry & Technology Adoption

AIOT

I

Industrial IoT, customer use-cases, E2E architecture, application testbeds

H2020 objectives, initial EU funded Large Scale Pilots

Fog (edge) architecture, Operational model

Product Interoperability Wireless Mesh

IP network, Wireless mesh

Technical Industry Standards & Compliance

Web of Things & Internet

P2413: IoT E2E

WG10: Systems IoT E2E, SC27

EU Commission, IoT Committee, AIOTI, Digital Manufacturing

US National IoT Policy, US Dept of Commerce, US Dept State, NIST, CyberSecurityRegulatory Framework, US/EU Privacy Shield

China 2025 Industrie 4.0 Industrie du futur

ICT, Telco Specs, Policies

Consumer/Industrial, Connectivity specs, Open source

System, Lifecycle

Market Creation

Thread

Machine to Machine Communications

Long Range Low Power radio

Advanced Manufacturing Smart Industries

Industry Consortia• Fastest Path• Accelerates market shaping & segment alignment

Government• Timing lags Industry Consortia, but faster than Technical Standards

• Sees IIoT as path for economic growth

• Building increasingly prescriptive and national regulatory frameworks on industry

Technical Standards • Longest time Threshold• Critical alignment to codify baseline interoperability, safety, CyberSecurity, etc.

ICT, SG20

Whole New Game in Our Customer Connected World !

Page 15: Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

Page 15Property of Schneider Electric |

Recommendations:

• Industry must proactively work with governments to educate the national advantages of data-based economic growth while countering the negative economic impact of data sovereignty

• Globally coordinated policy is needed to ensure an expansion of global digital Process Data while ensuring proper data protection

Page 16: Global Forced Localization and Data Sovereignty Impacts · 2018-12-12 · India (examples) • Telecom Security Testing • Preferred Market Access • Draft Encryption Policy •

16

Thank you

Presented by: Greg [email protected]