SlideShare una empresa de Scribd logo
1 de 17
Cybersecurity and Its Implications
for Trade and Investment
Cybersecurity Summit
Louisville, Kentucky
June 15, 2017
Robert L. Brown
Lynch, Cox, Gilman & Goodman, P.S.C. Chair, National District Export Council
500 W. Jefferson St., Suite 2100 Vice, Chair, ABA Section of International Law
Louisville, KY 40202
T: 1-502-403-1011 T: 1-502-594-4767
E: rbrown@lynchcox.com E: rbrown@globallawbusiness.com
Introduction
• ICTs suddenly become relevant to national security
• Role of national security in trade and investment policy
• Rules affecting trade and investment based on
national security-related concerns
Actions by Governments
• In 2007, Russian cyberattacks disrupted Estonia’s Internet
• Russia accused of attacking Georgian government websites in 2008
• In 2008, cyberwar accompanied Russia’s military bombardment of Ukraine
• In 2016, Russia accused of cyber program influencing U.S. elections
Lead to Accusations by Opposing
Governments
• U.S. suspicious of Dubai Ports World bid to manage six U.S. ports
• U.S., Austria and India accuse Huawei Technologies
(Chinese company) of cyberespionage
• Chinese concerns about Microsoft products
• Chinese engineers working for Huawei in Bangalore
Accused of developing state-of-the-art telephone surveillance equipment
For Taliban regime in Afghanistan
• U.S. suspicion of Huawei’s close ties to
Chinese Communist Party and military
Lead to Reactions from Actors in
Firm’s Nonmarket Environment
Interest groups
Intelligentsia
Public:
• Amnesty International accuses Google, Microsoft and Yahoo
Violating Universal Declaration of Human Rights
By censoring Internet use in China
And to Government Reports
• 57 were covertly trying to obtain advanced technologies from the U.S (FBI’s 1990s
analysis of 173 nations)
• Cybercrime fastest growing problem for China-US corporations (1990s FBI Report)
• 108 countries developed offensive cyberwarfare capabilities (2007 FBI Report)
• U.S. House Intelligence Committee 2012 Report:
o Huawei and ZTE pose threat to U.S. national security
Leads to Lawsuits
Western companies’ compliance with cybercontrol in authoritarian regimes
Chinese dissidents filed suit against Yahoo and its Chinese subsidiary
And New Laws and New Applications
of Old Laws
• U.S. Alien Tort Claims Act of 1789
Allows foreigners to sue in U.S. for injuries abroad
• Foreign Intelligence and Surveillance Amendments Act of 2008
Require U.S. companies to hand over to EU citizens’ stored data
• Economic Espionage Act of 1996
Criminalizes trade secret thefts including by US citizens/corporations
overseas or if any action in U.S.
• EU General Data Protection Regulation of 2016, effective 2018
Supersedes Data Protection Directive of 1995
European Union adopts strict data privacy laws
Types of Actions
Political espionage
Economic espionage
Privacy and security of citizens’ information
Types of Reactions
Direct Barriers
Legal inflow and outflow restrictions of goods, services and capital
Indirect Investment Barriers
Availability of information
Differential accounting standards
Concern related to investor protection
Liquidity risk
Macroeconomic instability
Political risk
Cybersecurity Factors Determining
Trade and Investment Barriers
Factor 1: Close ties to state in home country
Concern:
foreign company spying for its home country
Examples:
• Huawei’s deep ties with Chinese military resulted in its proposal to buy 3Com
given “elevated attention” and subject to 45-day investigation by CFIUS
• Lenovo’s ties to Chinese government became roadblock to its acquisition of
IBM PC division
Conclusion:
Firm’s perceived closeness to state in home country leads to cybersecurity
barriers to trade and investment due to political espionage-related concerns
in the host country
Factor 2: Home and host country differences in cybersecurity goals
Concern:
Foreign company based in country with different Cold War military alliance
Country examples:
• Cybersecurity major issue in formation and structure of international alliances
o Council of Europe (CoE) Convention on Cybercrime
• Concern that Western countries monopolize software and hardware ICT products
o Shanghai Cooperation Organization (SCO)
• China express suspicion it is under cyber-attack from U.S.
Company examples:
• Barriers faced by Chinese firms in U.S., Australia and India
• Barriers faced by Microsoft in China and Russia: suspected spy on users by back doors
• Russia-originated cyber-attacks on Estonia, Georgia and Ukraine
Conclusion:
Home and host countries’ differences in membership in major international political
alliances lead to cybersecurity-related barriers to trade and investment due to political
espionage-related concerns in host country
Factor 3: Differences in economic development
levels of home and host countries
Concern:
Foreign company based in country with lower economic development less
protective of IP
Country examples:
• U.S. lawmakers expanding ‘national security’ to include ‘economic security’
in evaluating FDI
• China vice minister of science, “Technology affects national security thru
economic security”
• Western analysts argue lack of IP protection in China raises cybersecurity
risks by China
• Pentagon Cyber Command: IP thefts from U.S., “greatest transfer of wealth
in history”
o Valued at $250 billion year
Conclusion:
Firms from a country with lower economic development level likely to face
cybersecurity-related barriers to trade and investment due to economic
espionage-related concerns in a host county with higher economic
development level
Factor 4: Differences in strictness of data privacy regulations
of home and host countries
Concern:
Companies based in less strict data-privacy countries violate host country
data-privacy rules
Country examples:
• U.S. has stricter privacy laws than economies in Eastern Europe and Latin America
• EU has more strict privacy laws than U.S.
• U.S. relies on voluntary self-regulation while EU relies on legislation
Company examples:
• EU companies less likely to outsource data-related work outside EU
• U.S. companies more likely to do so
• Indian companies more likely to manage data for U.S. companies
• Business process outsourcing (BPO) from EU to India is low value-added work
• BPO from U.S. is higher-end, such as clinical trials, legal documents, credit/equity
analysis
Conclusion:
Firms with strict data-privacy regulations in home country face
cybersecurity-related barriers to trade and investment due to privacy and
security of citizens’ information-related concerns when doing business in
country with lower degree of strictness
Implications
• Home country support for cybersecurity increasingly
important in trade and investment
• Companies must protect their digital assets while balancing cybersecurity
goals of consumers, interest groups, governments and others
• Companies must develop cybersecurity strategy specific to barriers facing them
o Microsoft opened Windows XP, Windows 2000 and other programs
to security experts in China, Russia and U.K.
• Cybersecurity-related barriers are often established on
basis of perception rather than reality
• Decision makers must weigh costs and benefits of compliance
with various actors’ cybersecurity demands
Lynch, Cox, Gilman & Goodman, P.S.C. Chair, National District Export Council
500 W. Jefferson St., Suite 2100 Vice, Chair, ABA Section of International Law
Louisville, KY 40202
T: 1-502-403-1011 T: 1-502-594-4767
E: rbrown@lynchcox.com E: rbrown@globallawbusiness.com
Robert L. Brown

Más contenido relacionado

La actualidad más candente

Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
tamiuthomas
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
SaimaRafiq
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
misecho
 
Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentation
misecho
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
Louise Collins
 
The Great Firewall of China
The Great Firewall of ChinaThe Great Firewall of China
The Great Firewall of China
guest00df536
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
Jonan Momo
 

La actualidad más candente (18)

File000158
File000158File000158
File000158
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Asia Business Forum: Export + Financing Opportunities in China and Southeast ...
Asia Business Forum: Export + Financing Opportunities in China and Southeast ...Asia Business Forum: Export + Financing Opportunities in China and Southeast ...
Asia Business Forum: Export + Financing Opportunities in China and Southeast ...
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Divorce in the Digital Era
Divorce in the Digital EraDivorce in the Digital Era
Divorce in the Digital Era
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 
Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentation
 
It legislation
It legislationIt legislation
It legislation
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Mock Panel debate on hate speech
Mock Panel debate on hate speechMock Panel debate on hate speech
Mock Panel debate on hate speech
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Ethics in Technology - Privacy
Ethics in Technology - PrivacyEthics in Technology - Privacy
Ethics in Technology - Privacy
 
The Great Firewall of China
The Great Firewall of ChinaThe Great Firewall of China
The Great Firewall of China
 
Cybercrime law legality report
Cybercrime law legality reportCybercrime law legality report
Cybercrime law legality report
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in Pakistan
 

Similar a TALK Cybersecurity Summit 2017 Slides: Robert Brown, Attorney, Lynch Cox, Gilman & Goodman, P.S.C.

III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
FecomercioSP
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014
 
Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
Association for Project Management
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
ericbrooks84875
 
Privacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse CounselPrivacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse Counsel
amprivacy
 

Similar a TALK Cybersecurity Summit 2017 Slides: Robert Brown, Attorney, Lynch Cox, Gilman & Goodman, P.S.C. (20)

The Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUDThe Patriot Act and Cloud Security - Busting the European FUD
The Patriot Act and Cloud Security - Busting the European FUD
 
How your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacyHow your nonprofit can avoid data breaches and ensure privacy
How your nonprofit can avoid data breaches and ensure privacy
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
AIIM 2015 - Data Privacy
AIIM 2015 - Data PrivacyAIIM 2015 - Data Privacy
AIIM 2015 - Data Privacy
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
Data Privacy Compliance (Series: Corporate & Regulatory Compliance Boot Camp)
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
Ip commission report_052213
Ip commission report_052213Ip commission report_052213
Ip commission report_052213
 
Privacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse CounselPrivacy & Data Security for InHouse Counsel
Privacy & Data Security for InHouse Counsel
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Using international standards to improve US cybersecurity
Using international standards to improve US cybersecurityUsing international standards to improve US cybersecurity
Using international standards to improve US cybersecurity
 
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy ComplianceCorporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
Corporate & Regulatory Compliance Boot Camp - Data Privacy Compliance
 
04 privacy
04 privacy04 privacy
04 privacy
 

Más de Dawn Yankeelov

Más de Dawn Yankeelov (20)

TALK Public Policy 2022
TALK Public Policy 2022TALK Public Policy 2022
TALK Public Policy 2022
 
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
A Look At Evolving Cybersecurity Policy for Financial Institutions 2021
 
Discussing Guidance & Liabilities Regarding Reopening
Discussing Guidance & Liabilities Regarding ReopeningDiscussing Guidance & Liabilities Regarding Reopening
Discussing Guidance & Liabilities Regarding Reopening
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
The Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your ToolkitThe Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your Toolkit
 
Cyber Security Resilience by KY CISO David Carter
Cyber Security Resilience by KY CISO David CarterCyber Security Resilience by KY CISO David Carter
Cyber Security Resilience by KY CISO David Carter
 
Cyber Security Resilience from Metro Louisville Govt.
Cyber Security Resilience from Metro Louisville Govt. Cyber Security Resilience from Metro Louisville Govt.
Cyber Security Resilience from Metro Louisville Govt.
 
Cybersecurity Information From KY's CISO
Cybersecurity Information From KY's CISOCybersecurity Information From KY's CISO
Cybersecurity Information From KY's CISO
 
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
Legal Issues in Data Privacy and Security: Response Readiness Before the BreachLegal Issues in Data Privacy and Security: Response Readiness Before the Breach
Legal Issues in Data Privacy and Security: Response Readiness Before the Breach
 
Kentucky's Cyber Enclave
Kentucky's Cyber EnclaveKentucky's Cyber Enclave
Kentucky's Cyber Enclave
 
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
 
RCM Brain: AI Bots in Healthcare
RCM Brain:  AI Bots in HealthcareRCM Brain:  AI Bots in Healthcare
RCM Brain: AI Bots in Healthcare
 
Kentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
Kentucky's Cyber Engineering Pathway for Teens By Scott U'SellisKentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
Kentucky's Cyber Engineering Pathway for Teens By Scott U'Sellis
 
PSST: Seamless Data Solutions
PSST:  Seamless Data Solutions PSST:  Seamless Data Solutions
PSST: Seamless Data Solutions
 
RCM Brain: AI Bots in Healthcare
RCM Brain:  AI Bots in Healthcare RCM Brain:  AI Bots in Healthcare
RCM Brain: AI Bots in Healthcare
 
Cybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech AdventuresCybersecurity Trends & Startups by Gula Tech Adventures
Cybersecurity Trends & Startups by Gula Tech Adventures
 
How I Will Phish You
How I Will Phish You How I Will Phish You
How I Will Phish You
 
Understanding Research & Development Tax Credits in KY
Understanding Research & Development Tax Credits in KYUnderstanding Research & Development Tax Credits in KY
Understanding Research & Development Tax Credits in KY
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

TALK Cybersecurity Summit 2017 Slides: Robert Brown, Attorney, Lynch Cox, Gilman & Goodman, P.S.C.

  • 1. Cybersecurity and Its Implications for Trade and Investment Cybersecurity Summit Louisville, Kentucky June 15, 2017 Robert L. Brown Lynch, Cox, Gilman & Goodman, P.S.C. Chair, National District Export Council 500 W. Jefferson St., Suite 2100 Vice, Chair, ABA Section of International Law Louisville, KY 40202 T: 1-502-403-1011 T: 1-502-594-4767 E: rbrown@lynchcox.com E: rbrown@globallawbusiness.com
  • 2. Introduction • ICTs suddenly become relevant to national security • Role of national security in trade and investment policy • Rules affecting trade and investment based on national security-related concerns
  • 3. Actions by Governments • In 2007, Russian cyberattacks disrupted Estonia’s Internet • Russia accused of attacking Georgian government websites in 2008 • In 2008, cyberwar accompanied Russia’s military bombardment of Ukraine • In 2016, Russia accused of cyber program influencing U.S. elections
  • 4. Lead to Accusations by Opposing Governments • U.S. suspicious of Dubai Ports World bid to manage six U.S. ports • U.S., Austria and India accuse Huawei Technologies (Chinese company) of cyberespionage • Chinese concerns about Microsoft products • Chinese engineers working for Huawei in Bangalore Accused of developing state-of-the-art telephone surveillance equipment For Taliban regime in Afghanistan • U.S. suspicion of Huawei’s close ties to Chinese Communist Party and military
  • 5. Lead to Reactions from Actors in Firm’s Nonmarket Environment Interest groups Intelligentsia Public: • Amnesty International accuses Google, Microsoft and Yahoo Violating Universal Declaration of Human Rights By censoring Internet use in China
  • 6. And to Government Reports • 57 were covertly trying to obtain advanced technologies from the U.S (FBI’s 1990s analysis of 173 nations) • Cybercrime fastest growing problem for China-US corporations (1990s FBI Report) • 108 countries developed offensive cyberwarfare capabilities (2007 FBI Report) • U.S. House Intelligence Committee 2012 Report: o Huawei and ZTE pose threat to U.S. national security
  • 7. Leads to Lawsuits Western companies’ compliance with cybercontrol in authoritarian regimes Chinese dissidents filed suit against Yahoo and its Chinese subsidiary
  • 8. And New Laws and New Applications of Old Laws • U.S. Alien Tort Claims Act of 1789 Allows foreigners to sue in U.S. for injuries abroad • Foreign Intelligence and Surveillance Amendments Act of 2008 Require U.S. companies to hand over to EU citizens’ stored data • Economic Espionage Act of 1996 Criminalizes trade secret thefts including by US citizens/corporations overseas or if any action in U.S. • EU General Data Protection Regulation of 2016, effective 2018 Supersedes Data Protection Directive of 1995 European Union adopts strict data privacy laws
  • 9. Types of Actions Political espionage Economic espionage Privacy and security of citizens’ information
  • 10. Types of Reactions Direct Barriers Legal inflow and outflow restrictions of goods, services and capital Indirect Investment Barriers Availability of information Differential accounting standards Concern related to investor protection Liquidity risk Macroeconomic instability Political risk
  • 11. Cybersecurity Factors Determining Trade and Investment Barriers Factor 1: Close ties to state in home country Concern: foreign company spying for its home country Examples: • Huawei’s deep ties with Chinese military resulted in its proposal to buy 3Com given “elevated attention” and subject to 45-day investigation by CFIUS • Lenovo’s ties to Chinese government became roadblock to its acquisition of IBM PC division Conclusion: Firm’s perceived closeness to state in home country leads to cybersecurity barriers to trade and investment due to political espionage-related concerns in the host country
  • 12. Factor 2: Home and host country differences in cybersecurity goals Concern: Foreign company based in country with different Cold War military alliance Country examples: • Cybersecurity major issue in formation and structure of international alliances o Council of Europe (CoE) Convention on Cybercrime • Concern that Western countries monopolize software and hardware ICT products o Shanghai Cooperation Organization (SCO) • China express suspicion it is under cyber-attack from U.S. Company examples: • Barriers faced by Chinese firms in U.S., Australia and India • Barriers faced by Microsoft in China and Russia: suspected spy on users by back doors • Russia-originated cyber-attacks on Estonia, Georgia and Ukraine Conclusion: Home and host countries’ differences in membership in major international political alliances lead to cybersecurity-related barriers to trade and investment due to political espionage-related concerns in host country
  • 13. Factor 3: Differences in economic development levels of home and host countries Concern: Foreign company based in country with lower economic development less protective of IP Country examples: • U.S. lawmakers expanding ‘national security’ to include ‘economic security’ in evaluating FDI • China vice minister of science, “Technology affects national security thru economic security” • Western analysts argue lack of IP protection in China raises cybersecurity risks by China • Pentagon Cyber Command: IP thefts from U.S., “greatest transfer of wealth in history” o Valued at $250 billion year Conclusion: Firms from a country with lower economic development level likely to face cybersecurity-related barriers to trade and investment due to economic espionage-related concerns in a host county with higher economic development level
  • 14. Factor 4: Differences in strictness of data privacy regulations of home and host countries Concern: Companies based in less strict data-privacy countries violate host country data-privacy rules Country examples: • U.S. has stricter privacy laws than economies in Eastern Europe and Latin America • EU has more strict privacy laws than U.S. • U.S. relies on voluntary self-regulation while EU relies on legislation Company examples: • EU companies less likely to outsource data-related work outside EU • U.S. companies more likely to do so • Indian companies more likely to manage data for U.S. companies • Business process outsourcing (BPO) from EU to India is low value-added work • BPO from U.S. is higher-end, such as clinical trials, legal documents, credit/equity analysis
  • 15. Conclusion: Firms with strict data-privacy regulations in home country face cybersecurity-related barriers to trade and investment due to privacy and security of citizens’ information-related concerns when doing business in country with lower degree of strictness
  • 16. Implications • Home country support for cybersecurity increasingly important in trade and investment • Companies must protect their digital assets while balancing cybersecurity goals of consumers, interest groups, governments and others • Companies must develop cybersecurity strategy specific to barriers facing them o Microsoft opened Windows XP, Windows 2000 and other programs to security experts in China, Russia and U.K. • Cybersecurity-related barriers are often established on basis of perception rather than reality • Decision makers must weigh costs and benefits of compliance with various actors’ cybersecurity demands
  • 17. Lynch, Cox, Gilman & Goodman, P.S.C. Chair, National District Export Council 500 W. Jefferson St., Suite 2100 Vice, Chair, ABA Section of International Law Louisville, KY 40202 T: 1-502-403-1011 T: 1-502-594-4767 E: rbrown@lynchcox.com E: rbrown@globallawbusiness.com Robert L. Brown