Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
Page 1Confidential Property of Schneider Electric |
Global Forced Localization and Data Sovereignty Impa cts
Greg Conary, SVP Group Strategy, Schneider Electric
2
IIoT in Process Automation – From Concepts to Practi se
Global Geopolitical Trends Impacting Business and the digital space
• Anemic Economic Growth
• Digital Commerce and Accessibility
• Advancements in IIoT: Impacting Process Engineering & Digital Manufacturing
• Forced Localization & Data Sovereignty
• Environmental Sustainability
• Global Trade Pressure
Page 3Property of Schneider Electric |
Why Data Portability is Critical
Page 4Property of Schneider Electric |
video
Advancements in IIoT requireglobal exchange of commercial data
Page 5Property of Schneider Electric |
Microgrid Asset Efficiency Time Sensitive Networks,
CM & PM Industrial Digital Thread Security Claims Evaluation,
Smart Supply Chain: Manufacturing Smart Energy Management Smart Factory Web
Smart Manufacturing Connectiviy Smart Airline Baggage ManagementFactory Automation Platform AAS
Global Testbed Program Samples from the IIC
Page 6Property of Schneider Electric |
Forced Localization and Data Sovereignty PolicySamples of Accelerating Impact
Page 6Confidential Property of Schneider Electric |
7
North America (examples)• DoD Rule on Network Reporting & Contracting• Cybersecurity National Action Plan• OMB Circular A-119• Wassenear Arrangement• China-US Cyber Agreement• Canadian Telecom Exclusions• Mexico Law of Acquisitions
8
Russia (examples)• Federal Laws 374-FZ & 375-FZ "Yarovaya Amendments“• Russian Federation Counterterrorism Requirements• Federal Law 242-FZ (March 2016 Update for Commercial Data)• Federal Law 149-FZ “On Information Technologies and Protection of Information”• Federal Laws #256-FZ ”On the safety of the fuel and energy complex”• Federal Laws #382- FZ “On the state information system of the fuel and energy complex”• Presidential Order #646 “The doctrine of the Russian Federation Information Security”• Draft of the Federal Law “About the security of the Russian Federation of the critical
information infrastructure” (prepared by Federal Security Service).• FSTEC of Russia Order #31 “About the protection of information in automated
production and process control systems to mission-critical facilities ….”.
9
India (examples)• Telecom Security Testing• Preferred Market Access• Draft Encryption Policy• Draft Cert-IN Advisory Vietnam (examples)
• Network Information Security Law• Decree on Information Technology
Services (No.72/2013/ND-CP)
10
Brazil (examples)• Decree 8135• Marco Civil• ePING• Brazil Informatics Law • Privacy Data Protection Law
Argentina (examples)• NAILs Resolution and Certification
11
European Union (examples)• General Data Protection Regime (GDPR)• Digital Single Market• EU NIS (Cyber) Directive• European Court SHF Ruling• France Data Protection Act No. 78-17• Germany Federal Data Protect Act
(Bundesdatenschutzgesetz)• Germany IT Security Act (IT-Sicherheitsgesetz)
12
China (examples)• Banking & Financial Institutional Notice of Protection of Data• Administrative Regulation on Credit Industry• Population & Healthcare Information Measures• Online Publishing Service Management Rules• Information Security Technology Guidelines for Personal Information
Protection within Public and Commercial Information Systems• China Counter Terrorism Law• Wuhzen Declaration• China US Cyber Agreement
13
Data Generated at Gas Field
Data transmitted to Moscow
Data sent to equipment manufacturer in France (simplex)
Equip Manufacturer sends analysis of data (more data!) to both gas field site and Moscow customer HQ
Architecture of gas field and resulting global data traffic• Cloud-based
Apps• Wireless
Connectivity• Low Power
WAN• Low cost
Sensors
X
X
X
Confidential Property of Schneider Electric |
Market Creation: IoT/IIoT Influence Landscape
Government Regulatory Frameworks
Market Driver and Industry & Technology Adoption
AIOT
I
Industrial IoT, customer use-cases, E2E architecture, application testbeds
H2020 objectives, initial EU funded Large Scale Pilots
Fog (edge) architecture, Operational model
Product Interoperability Wireless Mesh
IP network, Wireless mesh
Technical Industry Standards & Compliance
Web of Things & Internet
P2413: IoT E2E
WG10: Systems IoT E2E, SC27
EU Commission, IoT Committee, AIOTI, Digital Manufacturing
US National IoT Policy, US Dept of Commerce, US Dept State, NIST, CyberSecurityRegulatory Framework, US/EU Privacy Shield
China 2025 Industrie 4.0 Industrie du futur
ICT, Telco Specs, Policies
Consumer/Industrial, Connectivity specs, Open source
System, Lifecycle
Market Creation
Thread
Machine to Machine Communications
Long Range Low Power radio
Advanced Manufacturing Smart Industries
Industry Consortia• Fastest Path• Accelerates market shaping & segment alignment
Government• Timing lags Industry Consortia, but faster than Technical Standards
• Sees IIoT as path for economic growth
• Building increasingly prescriptive and national regulatory frameworks on industry
Technical Standards • Longest time Threshold• Critical alignment to codify baseline interoperability, safety, CyberSecurity, etc.
ICT, SG20
Whole New Game in Our Customer Connected World !
Page 15Property of Schneider Electric |
Recommendations:
• Industry must proactively work with governments to educate the national advantages of data-based economic growth while countering the negative economic impact of data sovereignty
• Globally coordinated policy is needed to ensure an expansion of global digital Process Data while ensuring proper data protection