We love the new banner for the 2017 SCI-FI-LONDON Film Festival (27 April - to - 6 May). We're also got some exciting news about the Flash Fiction Challenge – further details soon.
Guest cybersecurity comment by Tim Hyman* of 2Twenty4 Consulting
The General Data Protection Regulations are the most significant development in data protection that Europe, possibly the world, has seen over the past twenty years. There is a much greater emphasis on accountability and the principle aim is to move control back to the end user or data subject. To reinforce this there are many new auditable obligations and whilst the maximum penalty of 4% of global revenue grabs the headlines there are a number of other significant changes.
One of these relates to the lesser known penalty of 2% of global revenue for administrational non-compliance. New powers of audit mean that a data breach is not required before penalties kick in, lack of the appropriate documentation and/or protective processes are enough to warrant penalty. The person responsible for overseeing and maintain the new compliance requirements is the DPO or Data Protection Officer.
Not all businesses will be obliged to appoint one but even those that do not will still need someone to monitor compliance and take responsibility for data processing records and liaising with the authorities and data subjects.
GDPR states that a firm will require the appointment of a DPO in the following circumstances:
Data controllers (law firms) and processors (cloud service providers) shall designate a data protection officer in any case where:
• the processing is carried out by a public authority or body
• the core activities of the controller or the processor consist of processing operations which, by virtue of their nature require regular and systematic monitoring of data subjects on a large scale; or
• the core activities of the controller or the processor consist of processing on a large scale of special categories of data pursuant to Article 9
For law firms, it is the latter of these categories that will almost certainly apply. Having someone responsible for Data Protection is nothing new and it should be a straight forward conversion from the existing COLP or Head of Compliance to the new formal DPO role.
The duties of the DPO are unsurprising but with the additional requirement to deliver internal user awareness which when aligned with existing Information Security education will be a welcome addition to other compulsory learning participation such as anti-money laundering. DPO duties include:
• to inform and advise the law firm of their obligations pursuant to this Regulation;
• to monitor compliance with GDPR,
• awareness-raising and training of staff
• internal audits
• to provide advice regarding the data protection impact assessment and monitor its performance
• to cooperate and act as the contact point with the supervisory authority;
Perhaps more interesting however, and the reason for a close IT/DPO alliance going forward are the new obligations of a business regarding the role.
LAW FIRM OBLIGATIONS
All firms will have the following obligations to a DPO when in existence:
• ensure that the data protection officer is involved in all issues which relate to the protection of personal data (this will include IT solutions and services)
• provide resources necessary to carry out those tasks and access to personal data and processing operations,
• He or she shall not be dismissed or penalised by the firm for performing his tasks.
• report to the highest management level of the firm
The fact that a firm is obliged to ‘provide the resources necessary’ represents an excellent opportunity for IT to work with the DPO to achieve the appropriate budget and resources to deliver a robust Information Governance strategy – something that IT Directors have been struggling to justify on best practice principles as opposed to obligation.
So, with the DPO responsible for ensuring appropriate data protection measures are in place and with the new power to ensure resources are provided, a much closer alliance between IT and Risk will be the ideal way to provide the technical and legal expertise required to ensure compliance.
This is also borne out in the work needed to prepare the business for the May 29 2018 compliance deadline. To develop a GDPR Compliance Plan, it is first necessary to document current data practices and processes and understand any risk. This is achieved by first carrying out an Impact Assessment which can be broken down into three phases, Discovery, Risk Assessment and Mitigation Planning.
A Data Protection Impact Assessment is a tool designed to enable firms to work out the risks that are inherent in proposed data processing activities before either the legislation deadline in May or in future when planning a new system or process. This, in turn, enables firms to address and mitigate those risks before the processing begins.
It may also even be mandatory as where a new processing activity is proposed (especially where new technologies will be used) resulting in a high degree of risk for data subjects, the controller must first conduct an Impact Assessment. A single Impact Assessment can cover multiple processing operations that present similar risks.
Essentially the Impact Assessment has 3 key activities:
Data Mapping: A comprehensive and documented survey of all systems and processes where personal data is at play
Risk Assessment: An assessment of potential non-compliance based on the findings of the data and process mapping
Mitigation Plan: A documented approach to the risks discovered using a REMOVE, REMEDIATE or ACCEPT approach.
GDPRREADY COMPLIANCE FRAMEWORK
To assist firms with the initial preparation phase including the Impact Assessment we have developed a GDPRready Compliance framework that has 4 key phases
Step 1 – EDUCATE
GDPR Overview Workshop - an onsite workshop to build GDPR awareness and secure buy-in with your key internal stakeholders, custom-tailored to the needs of your firm.
GDPR Assessment workshop - A workshop for internal staff responsible for owning the assessment process.
Step 2 – DISCOVER
Impact Assessment – using our GDPRready Data Register and GDPRready Impact assessment templates you will document, data flows, gap analysis, risk assessment and remediation plans.
Step 3 – PLAN
GDPR Preparation Plan – document actions needed to prepare for and maintain GDPR compliance. Understand budget required and systems and processes that require modification.
Step 4 – MAINTAIN
Maintain compliance by aligning processes with our 12 best practice Information Security policies
GDPR is only 18 months away and any firm that has already started an Impact Assessment will know that they need all the time available to prepare. This a business project, owned at board room level but best managed and delivered by the IT/Risk team. This is an excellent opportunity for IT to provide leadership in a high-profile business project, get budget for Information Governance projects and now mandatory Security Awareness training and provide Impact Assessment advice to the firm’s clients. The Data Protection Officer will have a far reaching range of new responsibilities and powers – make them your best friend.
* Tim Hyman is also producing The Essential Guide to GDPR - email HERE for details.
Greg Bufithis, a writer, digital/telecom attorney and founder of GP Media Studios/The Project Counsel Group has just reported back from attending the annual Slush event in Helsinki last week...
"More than 17,500 people came to Helsinki for the annual Slush event which matches startups with investors. Bigger than almost any other event, the 2300+ startups came from around the world to match-make with 1100+ investors, plus attendees that just want to see the next "new new thing".
Held at the Messukeskus Convention Centre ("cyberpunk gothic-tech" as noted by many) it was wall-to-wall with applications that ranged from AI applied text analytics/text extraction to augmented reality to chat bots to food to robotics. I think after Brexit and Trump it was an affirmation that technology and innovation is thriving in a country that gave birth to Linux (still the most influential operating system in the world) and Nokia. Oh, and Angry Birds. Oh, and Clash of the Clans, too.
"As I have written before, European technology (and more generally, technology outside of the U.S.) has now broken the mould of trying to be the next Silicon Valley and created its own identity and momentum. U.S. companies ... Apple, Cisco, Facebook, Google, IBM, Microsoft, etc., etc. ... were here in force because as one attendee told me:
"there are something like 4.8 million professional developers in Europe compared to 4.1 million in the U.S. Given Trump's threats to curtail work visas, we need to be here looking for talent for our research and development centers."
"As I have noted before, in the last two years U.S. companies have opened more new R&D centers in Europe than in the U.S. or anywhere else in the world."
The Slush event is described as a Burning Man meets TED event (with rock music) and is now Europe's leading event for startups and the focal point for the Euro tech scene. The 2017 Slush event is scheduled for November 30 to 1 December 2017.
Another event Greg recommends is the Cannes Lions conference for the advertising and media industries, but which also has a big focus on the impact of technology, the visualization of data, creativity, and how to create a high level of quality storytelling. The next Cannes Lions runs 17 to 24 June 2017
The owner of my local art supplies shop found this hare as roadkill, had it preserved by a professional taxidermist and now it enjoys a degree of immortality as a model for artists and sculptors.
Just another quiet uneventful evening, in a quiet south Norfolk town - plus a few Molly Men (and Women)
So why do tech journalists never take industry "gurus" seriously?
Here's the thing: if you have a real job* and are at the sharp end of technology R&D and innovation, then we want to hear from you. Unfortunately, the majority of "gurus" don't have real jobs – their only vocation is travelling the world being a professional guru.
(*Sorry, to any academics out there but unless you work in a seriously boffin-intensive field – science, engineering etc – then you too also don't qualify as having real jobs.)
If you can walk the walk then we are happy to listen to you talk the talk. But, if you are just talk, talk, talk, then you are not a guru, you are just a consultant flogging your services, latest book, report or whatever.
Incidentally, "gurudom" is not a status you can confer upon yourself. You are only a guru if other people say you are – and those "other people" do not include your mother or your publicist!
If someone were to publicly announce that they were "beautiful" or "charismatic," we'd all laugh at their deluded vanity. The same applies to self-annointed gurus.
As for "social media maverns" and "LinkedIn ninja"... pass the sick-bag Alice, as the great newspaper editor and columnist John Junor would have said.
Yesterday it was reported that both TalkTalk and Post Office broadband customers have had their online access cut by an attack targeting certain types of internet routers. A spokeswoman for the Post Office told the BBC that the problem began on Sunday and had affected about 100,000 of its customers. Talk Talk also confirmed that some of its customers had been affected, and it was working on a fix. It is not yet known who is responsible for the attack. (It would also appear that local telco KCOM in Hull suffered similar problems last Saturday.)
In the light of these developments, Andy Green, a senior technical specialist at Varonis, comments: The lessons that should be learned from these ongoing Mirai attacks is just how vulnerable we were as a result of our own IT laziness. Sure, we can excuse harried consumers for treating their home routers and IoT gadgetry like toasters and other kitchen appliances – just plug it in and forget about it. So what excuse do professional IT types have for this rookie-level behaviour?
Not much! Unfortunately, default-itis still plagues large organisations. As long ago as 2014, the Verizon DBIR specifically noted that for POS-based attacks, the hackers typically scanned for public ports and then guessed for weak passwords on the PoS server or device – either ones that were never changed or were created for convenience, “admin1234”. This is exactly the technique used in the Mirai botnet attack against the IoT cameras.
Even if hackers use other methods to get inside a corporate network (phishing, most likely) they can still take advantage of internal enterprise software in which defaults accounts were never changed. For those organisations who think that the Mirai botnet incident has nothing to with them, or have to convince their board of this, here are two points to consider.
1. The lesson of the Mirai botnet attack is that the perimeter will always have leaks. For argument’s sake, even if you overlook phishing scenarios, there will continue to be vulnerabilities and holes in routers, network devices, and other core infrastructure that allow hackers to get inside.
2. Human nature tells us that IT will also continue to experience default-itis. Enterprise software is complicated. IT is often under pressure to quickly get apps and systems to work. As a result, default accounts and weak passwords that were set for reasons of convenience – thinking that users will change the passwords later – will always be an issue for organisations.
You have to plan for attackers breaching the first line of defences, and therefore have in place security controls to monitor and detect intruders. In a way, we should be thankful for the “script kiddies” who launched the Mirai botnet DDoS attack: it’s a great lesson for showing that companies should be looking inward, not at the perimeter, in planning their data security and risk mitigation programs.
This is Urban Fantasist
On this infotainment site, barrister and Reuters correspondent turned writer, award-winning tech journalist, radio presenter, podcaster, and sometime werewolf-hunter Charles Christian chronicles his adventures in the worlds of writing, radio, geek, tech, media, music, and the weird. The site also has links to all Charles Christian's books including fiction, nonfiction, and the latest reviews. Plus links to his Weird Tales and Smart Radio shows.
The Latest Podcast
Episode 41 of the Weird Tales Radio Show podcast features a major interview with the writer Nik Perring in which he discusses the tips and trips associated with turning your real-life paranormal experiences into a book that will enthral and captivate your readers. We also look at the Urban Myths surrounding Daylight Saving Time, as well as some November folklore, including Martinmas, Fenny Poppers and Pully Lugs.
Follow this link to access episodes of the Weird Tales Radio Show podcast. The page contains links to all our other podcast platforms. Click the player button below to hear latest show.
Hear Charles Christian on Smart Radio
The Midweek Late Lunch
Wednesdays 2:00pm to 4:00pm (UK)
The UK Chart Toppers Show
Sundays 2:00pm to 5:00pm (UK)
and on mobile...
Apple iOS App: Smart Radio GY
Android App: Smart Radio GY
TuneIn Radio App: Smart Radio GY
Weird Tales Podcast Links
The Urban Fantasist website is now averaging over 4750 page views daily and 140,000 page views a month plus over 5500 unique visitors each week.
Tel: 44(0)1986 788666
Tel/Txt: 44 77 86 73 81 72
"Listening to your wonderful show now. I love the stories! Wonderful concept. Great work."
"Charles Christian defiantly makes my world a brighter, funnier place."
"Wonderful show tonight full of all the usual delights we've come to expect."
"The legendary Charles Christian at his eclectic best... his insight and humour alone make this a must-read blog."
"Charles Christian is my inner spirit animal, thank you for making me laugh."
"the funny, wonderful and slightly cantankerous Charles Christian"
"Carlsberg don't make clients, but if they did... they'd be Charles Christian"
"His tech journalism is always witty. He has a talent for pricking the overblown claims of suppliers."
"Charles Christian does awesome!"
Charles Christian's Books
Can I copy content from this site?
Yes... providing you properly credit it. Urban Fantasist content is licensed under a Creative Commons Attribution 3.0 Unported License which means it may be shared, copied, remixed or used commercially as long as Urban Fantasist or the Weird Tales Radio Show are cited as the source.
This website uses marketing and tracking technologies. Opting out of this will opt you out of all cookies, except for those needed to run the website. Note that some products may not work as well without tracking cookies.Opt Out of Cookies
Copyright © Charles Christian
& WordsandVision Limited 2018
Tel: 44(0)1986 788666
Tel/Txt: 44 77 86 73 81 72
Urban Fantasist - infotainment fuelled by green tea and dark chocolate
Contact Address: Oak Lodge, Darrow Green Road, Denton, Harleston, Norfolk IP20 0AY, United Kingdom