24
PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC The 6th International Conference on Internet Applications, Protocols and Services (Netapps2020): “Enduring Internet's Use and Growth in the Post Pandemic Era” 2 December 2020 ASSOC. PROF. DR. SONNY ZULHUDA INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA

PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

PRIVACY AND DATA

PROTECTION IN THE

TIME OF PANDEMIC

The 6th International Conference on Internet Applications,

Protocols and Services (Netapps2020): “Enduring Internet's Use

and Growth in the Post Pandemic Era”

2 December 2020

ASSOC. PROF. DR. SONNY ZULHUDA

INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA

Page 2: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

Agenda

Reality Check01

Response and Trends02

Emerging Privacy Risks03

Data Protection and

Governance Strategies04

sonnyzulhuda.com

Page 3: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

COVID-19

CORONAVIRUS

PANDEMIC

MOVEMENT…………..

CONTROL ……………..

ORDER ………………..sonnyzulhuda.com

Page 4: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

Covid-19 Statistics as of 30th Nov 2020

62,363,527Confirmed cases

1,456,687Confirmed deaths

220Countries, areas or

territories with cases

RU: 2.3million

IN: 9.4million

UK: 1.6 million

US: 13 million

BR: 6.2million

CN: 93K

sonnyzulhuda.com

Page 5: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

POLICY MEASURES: Governments around the world impose movement

restriction, lockdown, surveillance, curfew, quarantine and border control

HEALTH CONCERNS: intensified reporting, patients tagging, scheduled

control, body temp scanning, contact tracing, high-risk people identification

NEW NORM: Physical distancing and its Ramifications. New way of

Work, Learn, Shop, Meet, Business from Home

BRING ABOUT: Social, Psychological, Technical, Public Trusts,

Business and Governance Vulnerabilities

sonnyzulhuda.com

Page 6: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

Vulnerabilities

People tend to collect information about the

Pandemic, click on links and web pages,

spreading the information with poor

exercise of fact-checking

People work on official documents using

home-based computers, not subject to a

security protection and support as they

have in office.

Reduced mobility, losing jobs, scarcity of

earning opportunities, etc. creates

financially challenged society, who would

turn into shortcuts.

INFORMATION

TECHNICAL

FINANCIAL

Apps for social networking, e-shopping, e-

meeting, e-learning and cloud services are

mushrooming and widely used, but may not

adequately equipped with rigorous security

and privacy measures or policies

TRUST

sonnyzulhuda.com

Page 7: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

The urgency of digital working environment has not been

fairly balanced with the prerequisite of data culture

awareness, thus creates loopholes in the data

management, and data governance

Technical Vulnerabilities

We witness how malicious minds potentially used this

Covid-19 crisis as a window to exploit our vulnerabilities.

Window for Cyber Criminals?

The concept of national critical infrastructure need to be

relooked so as to accommodate this threat to national and

public health as one critical security objectives.

Critical Infrastructure Protection

sonnyzulhuda.com

Page 8: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

8

sonnyzulhuda.com

Page 9: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

PANDEMIC

Simple Portfolio Presentation

Portfolio Presentation

Simple Portfolio

COVID-19

How To Prevent An Outbreak Portfolio Presentation

Simple Portfolio

Vulnerabilities

sonnyzulhuda.com

Page 10: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

Exploitation of Cyber Infrastructure (CIIP)What had happened in the Cyberspace during Covid-19 Crisis?

Coronavirus

research hack?Intrusion to

Critical Utilities

Ransomware on

public health systemRansomware on

energy company

Sabotage on Govt

online meeting

Terrorists and cybercriminals are always interested to exploit cyberspace vulnerabilities.

The activity of cyber terrorism does not relax during Covid-19. Several cyber attacks do

target a critical information infrastructure (CII), a traditional target for cyber terrorism.

sonnyzulhuda.com

Page 11: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

Emerging Privacy Risks

Personal data exploitation through illicit collections via online services, Apps, etc;

Fraud & scam via fake accounts begging for

donation, fake charity drives, fake emergencies etc.

Misinformation: Rise of citizen news portals with

unaccountable stories – a test-bed for phishing attacks.

Unsecured online platforms prone to personal data breaches (online shopping, online meeting, social

media, etc).

The rise of surveillance and Private data

collection?

sonnyzulhuda.com

Page 12: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

12

sonnyzulhuda.com

Page 13: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

13

Private Surveillance?

sonnyzulhuda.com

Page 14: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

Private Surveillance?

14

KUALA LUMPUR

IPOH

GEORGETOWN

sonnyzulhuda.com

Page 15: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

15

sonnyzulhuda.com

Page 16: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

Emerging Mobile Tracking Apps

16

sonnyzulhuda.com

Page 17: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

Newly infected patients – Should it be disclosed, announced or published? What if it happens in a workplace?

Collection of individuals data during movement, entry to premise or visit to clinic/hospital.

• Who is in charge?

• What items need to be collected?

• How those data are retained, processed and disposed of?

• Who to disclose the data to?

• Who to contact on this data processing matter?

Who manages the data? (Processors, Cloud, IT Providers? Any 3rd party service provider is a data processor, thus subject to Security, Disclosure as well as Retention principles.

17

Data Processing during the Pandemic

sonnyzulhuda.com

Page 18: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

18

• Privacy policies on those initiatives will need to be notified and publicisedto achieve transparency and to ensure due diligence.

• Pertinent to strengthen your cyber security system: both technical and organisational.

• Privacy is not only a matter of PDPA compliance but also a common law rights for individuals.

• Room for improving the Law: e.g. Data breach notification duty, Data protection officer, Regulating data processor, and trans-border data transfer.

Data Processing during the Pandemic

sonnyzulhuda.com

Page 19: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

You can Resize without

losing quality

You can Change Fill

Color &

Line Color

www.allppt.com

FREE

PPT

TEMPLATES

General: Consent,

etc.(s.6 PDPA)

Notice & Choice (s.7)

Disclosure (s.8)

Security (s.9)

Retention (s.10)

Integrity (s.11)

Access (s.12)

Seven Personal Data Protection Principles

Data user who

contravenes the

above Principles

commits an offence

and shall, on

conviction, be liable

to a fine not

exceeding three

hundred thousand

ringgit or to

imprisonment for a

term not exceeding

two years or to both.

sonnyzulhuda.com

Page 20: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

The Milestone of PDPA 2010

Regulates processing of

PII in commercial transactions

New sets of obligations for

data users

New offences relating to data

abuses etc.

Rights for individuals

Information governance and

Data due diligence

Promotes self-regulatory Codes

of Practices

20

sonnyzulhuda.com

Page 21: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

And… creates new data offences

21

Breaching data

protection principles

Failure to register as Data User

(when applicable)

Unlawful collection

of personal data

Unlawful sale of

personal data

Breach of data

security system

sonnyzulhuda.com

Page 22: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

Basic:

* Building internal data culture and awareness of ALL stake-holders

* Continuous training program

Governance:

* Appoint leaders and owners of compliance measures.

* Centralised, Decentralised, Hybrid leadership.

* Organisational & Operational ownership

Baselining & Benchmarking:

* Define data security & privacy goals

* Define the measures to achieve goals (Core & elective measures)

* Define timeframe, team, budget, plan, etc.

Documentation & Audit:

* Document all the measures & processes

* Conduct audits including adequacy audit and compliance audit across departments and divisions

Implementation:

* Continuous monitoring for compliance (due diligence)

* PDCA Framework

* Keeping up with outsiders (Regulators, Data User Forum, Consumers Associations, Workers Union, press, etc.)

22

MOVING ON: THE DATA GOVERNANCE STRATEGY

sonnyzulhuda.com

Page 23: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

Conclusion Remarks

As Malaysia is

battling Covid-19,

we shall strengthen

trust and maintain

sustainability

Massive exemption

given to the

Government is not a

“license” to

downgrade their

data protection.

Pandemic is not a

basis for relaxing the

Rule. The Pandemic

leads to system and

governance

vulnerabilities – Alert

mode on data

protection.

Relaxing data

protection will only

create elements of

distrust among

members of society

and citizen-

government

relationship.

sonnyzulhuda.com

Page 24: PRIVACY AND DATA PROTECTION IN THE TIME OF PANDEMIC

FEEDBACK:

[email protected]

http://sonnyzulhuda.com

THANK YOU