5G FOR INDUSTRIES. ETSI SUMMIT Releasing the Flow Data Protection and Privacy in a Data-Driven Economy. 19 April 2018

Size: px
Start display at page:

Download "5G FOR INDUSTRIES. ETSI SUMMIT Releasing the Flow Data Protection and Privacy in a Data-Driven Economy. 19 April 2018"

Transcription

1 ETSI SUMMIT Releasing the Flow Data Protection and Privacy in a Data-Driven Economy 19 April G FOR INDUSTRIES Ulf Pehrsson Head of Government & Industry Relations ERICSSON

2 5G FOR INDUSTRIES CROSS BORDER DATA FLOWS FOR 5G, IOT AND INDUSTRY 4.0

3 Industry Generations- driving forces and enablers Industry 1.0 Mechanization Steam, Weaving Loom Industry 2.0 Industry 3.0 Industry 4.0 Mass Production Electricity, Assembly Lines Automation Computers, IT-systems Cyber Physical Systems Connectivity, IoT, Virtualization, Flexibility ~1780 ~1870 ~1970 Today Alignment in generation shifts and technology components 5G IoT, NR Virtualization, Flexibility, Network Slicing 3

4 20 billion connected IoT devices in 2023 Vast majority of wide-area IOT devices will use 3GPP technology

5 5G drives values in multiple areas Platform for addressing industry and society transformations Cost effective delivery of increased data traffic Massive machine type communication Smart meter Tracking Fleet management Enhanced mobile broadband VR/AR 4K/8K UHD Smartphones Critical machine type communication Industrial applications Traffic safety & control Remote manufacturing Fixed wireless access Mobile / wireless / fixed Enterprise Home 5

6 Examples of data categories in industrial data processing context much more than personal data 6

7 Driving forces for Cloud closer to/further from Edge 7

8 5G for Industries - Implications for cross border data flows Flexibility to store and move data to maximize vertical industries competitive advantage - operational criteria to support core business processes Consolidation of data into central facilities enable data-driven innovation to continue to develop new services and capabilities for vertical industries Enabling after-sale support services to verticals, critical to differentiate value propositions; Organize IT support and network services: 24 7 every day, for business critical operations Including second line support Competitive offerings based on economies of scale Full service catering for all data processing = non-personal, personal and mixed data sets 8

9 The present EU data flow exchange regulation - missing out on inbound data flows Globally competitive EU based data processing requires securing inbound data flows in to EU. Inbound data flows of non-eu citizens and non-eu data not in scope of GDPR. Reciprocal adequacy: - can be unilaterally revoked, hence creating limited investment confidence - does not address barriers related to nonpersonal data. 9

10 Personal data flows: policy makers and businesses don t need to choose! NATIONAL PRIVACY STANDARDS OPEN DATA FLOWS ENFORCE PRIVACY STANDARDS AGAINST NON-COMPLIANCE = BUSINESSES ARE RESPONSIBLE FOR NON- COMPLIANCE REGARDLESS WHERE DATA IS LOCATED 10

11 Key challenge transferring personal data - a manufactured dilemma Today, policy makers tend to mix up data transfers with a possible act of circumvention of privacy regulation. This approach creates; an undesirable negative bias toward all data transfers, Introduces a zero-sum logic, transfers vs privacy, applies a broad brush approach to the use of all transfers by all companies i.e. wellintended as well as ill-intended ones. Instead policy makers should put more emphasis on compliance and enforcement, rather than limiting transfers 11

12 Summary - Key policy considerations for cross-border data flows 1. Data exchange = both in- and outbound data flows 2. Flexibility to locate/transfer data = relevance for industrial applications 3. Address all data transfers: personal data, mixed data sets, non-personal data 4. Create investment confidence; provisions that can be unilaterally revoked (adequacy) do not provider investors with sufficient investment time horizon 5. Recognize that not all transfers are created equally, for example Temporary access to data remotely (no permanent transfer) Transfers with no purpose to process personal data (B2B managed IT services) 6. Transfers Circumvention, instead Take legal measures against acts of circumvention/non-compliance! Securing predictable rules for open international data transfers in FTA is not optional but necessary! 12

13 13