30
WEBINAR | 07.12.2018 CYBERSECURITY IM DIGITALEN CHINA Mit freundlicher Unterstützung von:

WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

WEBINAR | 07.12.2018

CYBERSECURITY IM DIGITALEN CHINA

Mit freundlicher Unterstützung von:

Page 2: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

2

I. Introduction

II. Legal Base for Localization

III. Addressee of the CSL

IV. Relevant Data

V. Export

VI. Penalties

VII. Encryption

AGENDA

Page 3: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations
Page 4: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations
Page 5: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

5 of 17

Page 6: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

6 of 17

Page 7: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

7 of 17

Page 8: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

8 of 17

Page 9: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

Machine

Data Export?

Headquarter

Central Server in cloud

collects data from various

sensors

I. INTRODUCTION

HR Local Server

Server Location?

Page 10: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

II. LEGAL BASE FOR LOCALIZATION

• According to Cyber Security Law (“CSL”):

— Basic rule for data localization

Personal information and important data collected by critical

information infrastructure (“CII”) shall be stored in China!

— Exception:

Where it is necessary to provide such information and data abroad due

to business needs, a security assessment shall be carried out!

— Questions:

▪ Who is addressed and what is CII?

▪ What are important data?

▪ What are personal information?

▪ If and how is export allowed?

Page 11: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

III. ADDRESSEE OF THE CSL

• What is CII? No definition in CSL, just examples like:

— public communication and information services,

— energy, communication,

— water conservation,

— finance,

— public services and

— e-government affairs as well as

— national security,

— people´s livelihood and public interest

Page 12: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

3. Step: Classification e.g.: Incident results in 5 death or more

than 50 persons heavily injured

How to identify CII? By the operational guidance for national

network security check:

1. Step: Identification of industry and the critical business (table –

see example)

2. Step: Specification of industry information system or industrial

control system

Example:

Industry Production (raw

material, equipment,

consumables, electronic

production)

• Operation management

• Intelligent Production Systems

(Industrial Internet, IoT, Intelligent

equipment)

• Production and processing of dangerous

chemicals as well as control and storage

(chemicals / nuclear)

• Administration and control of High risk

industrial facilities

1. Step

Choose Field

of Industry

2. Step

Choose

specification

3. Step

Choose Classification

(not in Table)

III. ADDRESSEE OF THE CSL

Page 13: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

III. ADDRESSEE OF THE CSL

• Will the data localization rule be limited to CII?

— May expand to all network operators according to Draft Security

Protection Regulation for CII (July 10, 2017)

— Definition: Network Operator any operator of 2 or more devices

connected, details unclear

Page 14: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

IV. RELEVANT DATA

• What are important data? Not defined in CSL, but draft

guideline provides examples, e.g.:

— Data that is closely related to national security,

— economic development and

— supposed societal and public interests

Example: Technical information regarding ventilation systems used in

CII:

Ventilation controlled by Network used in metrosystem

= CII related information

Page 15: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

IV. RELEVANT DATA

• What is personal information? According to CSL:

Personal Information refers to various types of information that can be

used separately or in combination with other information to identify a

natural person

Page 16: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

V. EXPORT

• When is export of relevant data allowed? According to draft

guides and national standards:

― Never allowed to leave the country, e.g.:

▪ Personal data without informed consent of the person

▪ Information which threaten the political, economical, scientific

or military safety or public order

▪ Others (new rules and regulations/authority discretion)

― With authority assessment and subsequent permission, e.g.:

▪ threshold reg. relevant data (to be determined)

▪ Any data regarding failure of data protection or security problems

― Other relevant data with self assessment and no objection by

authorities

Page 17: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

VI. PENALTIES

Correction or

warning

Fine of up to

RMB 500,000

for Company

Suspension of

relevant

business

Close

website

Revoke

business

license or

other

permission

Example: Operator of CII stores network data

(relevant data) overseas

Fine up to RMB

100,000.- to

person in

charge or

responsible

Confiscate

illegal gains

Page 18: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

VII. ENCRYPTION OF COMMUNICATION

• Virtual Private Networks (“VPN”)

— Unlicensed VPN has never been permitted

— Since January 2017 “crack down”

— Crack down mainly against providers

— VPN may become slower and less reliable, due to closer scrutiny

• Other encryptions: Encryption Law from 1999 - latest valid version –

new draft 2017, but not released

• Current status (examples):

— Import has to be registered

— Only registered encryptions permitted

— Key shall be provided for criminal investigation and national security

— Registered encryptions can be found at the website of State Code

Administration: http://www.oscca.gov.cn/sca/index.shtml

Page 19: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

Freudenberg IT Asia

Cyber Security im digitalen ChinaShanghai, December 7th 2018 / Reto Bless

Page 20: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

Freudenberg IT Asia

About us (Freudenberg and Freudenberg IT)

… driven in a car?

… used a laptop?

… eaten candies?

… eaten with a fork?

IT Infrastructure Projects

Consulting Services

AMS (Application Management Support)

Client Services

Managed Services

Have you ever ...

If one yes, you most probably

were in touch with a Product of

Freudenberg

Founded in 1995 (spin off)

Headquarter: Weinheim

Employees: ~ 850 global

175 m€ Net Sales, thereof >85%

outside Freudenberg

>2,000 managed SAP systems on

over 4,500 servers

FIT in China

Webinar | Cyber Security im digitalen China

Page 21: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

Webinar | Cyber Security im digitalen China

Overview Cyber Security Law

Under the coordination of our corporate legal department in China we made some investigations and talked to other foreign

Companies with a similar setup as Freudenberg. The China Executive Team has decided to go for a common approach amongst

the Business Groups in China:

A) Doing nothing is not an option

B) We will assign a legal firm to support the procedure (Knowledge about the law, self assessment, documentation)

Fields of action:

1. Perform a cyber security assessment with legal support

2. Assign a Cyber Security Officer

3. Run awareness campaign for the employees

4. Establish a cyber security handbook/policy (in each Business Group, given they operate in different businesses)

What we do as Freudenberg Group

Page 22: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

Webinar | Cyber Security im digitalen China

Overview Cyber Security Law

What we observe so far

# Industry Approach

1 Car Manufacturer All SAP system were moved from the HQ in Europe to China

2 Component Manufacturer Decision to run everything separated in China. SAP: create a copy to China (separate

company code on premise in their location)

3 Car component Manufacturer Executed already in 2014. All SAP system has been consolidated to the HQ in Europe.

4 Manufacturing Company Plan for 2018: Consolidation to the HQ in Europe, no dedicated SAP system in China

anymore

5 Door systems manufacturer Dedicated SAP system for China instead of using central SAP system for SAP rollout

CSL is only relevant for Mainland China (Hong Kong, Taiwan, Macau are excluded)

There are different motivations behind the companies decisions. Some are influenced by a local, others by a global view.

There is no absolute clarity about the consequences given by the new regulation

We recommend:

Local legal support from law firm being familiar with the new regulation

There are companies, which can provide a CSL assessment (technical and legal)

Page 23: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

Webinar | Cyber Security im digitalen China

Overview Cyber Security Law

What we do as Freudenberg IT

FIT Management Service for Connectivity FIT Managed Services

FIT * Link Managed Microsoft Applications

FIT Management for WAN Multi Cloud Orchestration

Partnership with certified MPLS provider Private, Public, Hybrid Cloud

FIT as single point of contact Managed SAP Applications

National and international scope Remote Management Services

Page 24: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

Freudenberg IT Asia

How to reach us?

Webinar | Cyber Security im digitalen China

No. 720 Pudong Avenue

International financial & shipping

Building

Suite L/M, Floor 14th

200120 Shanghai, P.R. China

@

+86 186 1630 2266

[email protected]

www.freudenberg-it.com

General Manager

Reto Bless

Page 25: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

Thank you

for your attention

Page 26: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

• Self-assessment – ask yourself!

— Are you or your customers CII?

— Where is your data located?

— Which data is exported?

• Prepare local data storage and contingency plan for temporary

data exchange stop

• Despite of open questions: Action is better than reaction!

CONCLUSION

Page 27: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

DISCLAIMER

Please note that the Information and definitions in this presentation

are preliminary and often based on draft laws. All information and

definitions may be considered differently by the authorities of the

People´s Republic of China or change at any time!

Please note that there are special definitions for state secrets.

The above is for your information only and does not contain any

specific statements to individual cases or replaces any legal

consultation. Burkardt & Partner therefore assumes no liability for

the content of the presentation or the application on any

individual case.

Considerations are partly based on drafts and not on existing laws.

The information herein are not concluding.

Page 28: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

CONTACT

Copyright Notice: All rights, including copyright, in these materials are owned by Burkardt & Partner (“B&P”) and may only be

used for personal/non-commercial purposes. Reproduction is subject to prior permission from, and attribution to, B&P.

BURKARDT & PARTNER

Room 2507, 25/F, Bund Center

222 Yanan Road East

Shanghai 200002, PR China

中国上海延安东路222号外滩中心2507室 200002

T +86 (21) 6321 0088

F +86 (21) 6321 1100

[email protected]

www.BKTlegal.com

Note: This presentation is for your information only and does not contain any specific statements to individual cases.

Burkardt & Partner therefore assumes no liability for the content or the application on any individual case.

Page 29: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

29

WEBINAR | CYBERSECURITY IM DIGITALEN CHINAQ & A Session – gerne beantworten wir Ihre Fragen!

Mit freundlicher Unterstützung von:

Page 30: WEBINAR | 07.12...Webinar | Cyber Security im digitalen China Overview Cyber Security Law Under the coordination of our corporate legal department in China we made some investigations

Über Ihre Fragen freuen wir uns!

Mag. Christina Schösser

Die österreichische Wirtschaftsdelegierte

AußenwirtschaftsCenter Shanghai

T +86 (21) 6289 7123

E [email protected]

W wko.at/aussenwirtschaft/cn