The laws of information security by Dr. Tuomas Pöysti counsellor of the Ministry of Finance (chief adviser on public economic and public law, regulatory policy, management and governance issues), deputy member of the Government board of public sector information management, docent of administrative law (university of Helsinki) The information security has been a concern for law for a long time. Initially information security has been tacit knowledge embedded in the rationale of many rules of law. In the age of computing information security became explicit technical knowledge. In the information age and network society information security has become a legal principle and constitutional meta-right which is part of the requirements of good governance. The regulatory change is connected to informatiosation and convergence which all are parts of the emergence of network society. The law of network society regulates information security generally and in its particular fields. Current information security regulation calls for a new pluri-disciplinary co-operation and new role for lawyers. These lectures aim to systematise current information security legislation in European and Finnish law and to build an understanding of the inter-action between technology and security theory and law. MINISTRY OF FINANCE Counsellor, Docent Tuomas Pöysti 5.12.2003 1 The unfortunate company The company strategy was based on the increase of market value of its shares and then a eventual merger. IT –boom accelerated rise of the value. Eventually disputes among the company management and particularly among the Board members Helsingin sanomat (a major Finnish newspaper) made critical reports on the disputes and bad atmosphere. Company started to investigate ’’leaks’’. Sonere security chief and his team, eventually on the request or at least for the CEO used information Sonera possessed as telecom operator on the communications the board members and personnel had made to press (traffic data). Sidestory: networking of the security personnel. The head of security of Government got access to and used Sonera telecom operator traffic data to analyse a case in which driver of the Prime Minister and from a portable phone at the disposal of the Prime Minister in his car calls were made to a person suspected of serious tax fraud. MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 2 FICORA decision on the ’’Sonera telecom espionage’’ Request by FICORA (Finnish Communications Regulatory Authority, in Finnish Viestintävirasto) to Sonera. Response: first an internal investigation report, at the further request: system login reports, data protection and information security instructions and policies and internal audit reports. According to FICORA the general information security policy and awareness of it were sufficient. Recording of the processing of traffic data was, however, not sufficient, and the purpose of the processing in cases where information was drawn from the operator systems was not systematically written down. In some areas the internal information security policies were not uniform enogh or comprehensive. The supervision of the compliance with the security policies had to be strenghened. According to FICORA there is reason to believe that operator traffic data has been processed in unlawful manner and FICORA forwards its report to the police investigating the case. MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 3 The unfortunate company The e-mail services of TeliaSonera overloaded due to the messages and return messages sent as a consequence of viruses. Consequently sending e-mails via TeliaSonera was slowed down substantially, even by several days or weeks Finnish communications regulatory authority (FICORA) asked the service provider to set the email communications to the good technical level required by the Communications Market Act. Additionally FICORA found that the operator had not been informing its clients sufficiently MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 4 The unfortunate society Virus attack causes a disfuntion of the electricity network MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti may cause a blackout or atleast slow down recovery from a failure evidence that this was partially the reason to the slow recovery of the recent blackout in the U.S. => warning letter of the Ministry of Trafic and Communications and the National Emergency Supply Agency 5.12.2003 5 Information security Information security is a state of affairs in which there is no significant risk to Availability Integrity & authentication Confidentiality Auditability is an additional information security feature. Information security refers to the entirety of measures aiming at guaranteeing availability, integrity, authentication and confidentiality in all circumstances (information security work) MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 6 Availability Accessibility and availability of information, ITC system and services Ability to utilise information, service and systems in correct time MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti usability availability of updates, meta-data & metainformation (name-servers, structured documents) In legal sense: making access-to rights effective in the infrastructure and practise 5.12.2003 7 Integrity and authentication data unaltered and correct (structurally, logically), non-compromised completeness of data recognition and confirmation of the asserted identity, user or source Non-repudiation of the message and content MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 8 Confidentiality protection of the data and messages against interception and access by unauthorised persons and protection of information from accidental or intentional but non-authorised losses protection of data and systems against unlawful use or use for an unlawful purpose safeguarding the secrecy & confidentiality rights and other exclusive rights to information and information processing MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 9 Information security is often about risks Different definitions of risks 1. 2. 3. MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti risk is a propability of an adverse event (loss or other) monetary value of an adverse event or expected monetary value of an adverse event: monetary value x propabilility propability of the realisation of a threat 5.12.2003 10 Dimensions of information security 1. 2. 3. 4. 5. 6. 7. 8. Distinguishing the different dimensions helps planning and management of information security measures Administrative and organisational security Personnel security Physical security Communications security Hardware security / facilities security Software security Data security Operations security MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 11 Data security – information security – security of knowledge The pyramid of data, information and knowledge Intuition, wisdom Tacit knowledge Documented knowledge Knowledge Information Data MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 Knowledge management Personnel security IPR and business secrets Technical security and legal principles concerning it 12 Historical evolution and driving forces of information security regulation First stage: information security is tacit knowledge and embedded in the rationale of some rules and principles of law. form requirements in private law individual information security rules and administrative regulations (noticeboards, archives, notarius publicus system) Computing brings gradually information security as explicit , documented knowledge distinct from document management and archiving. Information security, however, does not yet have a status in the recognised legal knowledge Personal data laws have been the source of development of legal information security rules and principles. Confidentiality rules in the public administration defined the development of information security rules MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 13 Historical evolution and driving forces of information security legislation First generation data protection laws: concept of data protection and information security not clearly distinguished. Register –based rules on access to personal data, no very well defined information security rules Second generation data protection laws (in Finland the Personal Registry Act of 1987). Fairly wide concept of personal register and the requirements of good register practise. Particular information security obligations and information security a clear embedded objective of data protection laws. Information security is not yet an explicit obligation. Third generation personal data legislation: logical concept of personal register in which law regulates all computerised use of personal data. General information security obligation and particular information security provisions. Good information management practise as a leading concern. Fourth generation: information security as a legal institution of its own, regulated in the information security and management acts. Abuse model in the personal data legislation. General laws governing the digital communications MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 14 Phenomena leading the development of information security law Informatiosation – the Information Age – and the emergence of the network society. Networks and networking are essential modes of organisation and work in public and private sector. Information, information processing capacity and knowledge are the strategic assets or key success factors of individuals, organisations and societies. information and network depedence of individuals, organisations and societies as a whole Commoditification of information and the related juridification of information and information processing. Information is increasingly a product, a commodity, and subject for value and trade. Convergence of technologies and media. Different medias and platforms are able to provide similar or inter-operable services. Convergence has a technical, economic, cultura, legal l and societal dimension MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 15 Information security law today Necessity for the efficiency of information-bound fundamental and basic rights Legal principle and constitutional meta-right Part of the requirements of good governance General obligation prescibed in European and national law and in contracts, general object for legal protection Particular information security obligations and working tools for information security work in sectoral legislation Normative element in the system and infrastructure design, operation and in organisation management proactive and preventive law challenge for lawyers MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 16 The constitutional foundation of information security law Evolution of rule of law: From formal rule of law to material rule of law. The efficiency of rights is an essential component of rights in the contemporary legal thinking the ECHR practise the EC law Positive obligation to promote the realisation of fundamental and basic rights Concept of good constitutional governance embodies the requirements of materiality of fundamental and basic rights and the efficiency of rights. In today’s context technical security is needed for the efficiency of rights. In other words technical security is a necessary condition for legal certainty (legal security) MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 17 Information security – legal certainty Technical security Legal certainty Requirement for the efficiency of rights and thereby legal certainty Dependent of technical infrastructure Information security: encountering technical reguirements and the legal interests related to information and information processing • technical and legal security encounter • risk management is a common backbone for both •genuine encountering requires that neither technical nor legal aspect suppress the other perspective. This requires new pluridisciplinary co-operation and discussion MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 18 Systematics of information security law General information security legislation and soft law General public information security law – e-Goverment acts Particular information security provisions covering some aspects of: 1. Administrative and organisational security provisions 2. Personnel security provisions 3. Physical security provisions 4. Communications security provisions 5. Hardware security / facilities security provisions 6. Software security provisions 7. Data security provisions 8. Operations security provisions Law in this dimension either establishes obligations for security work, or provides governance tools or sets limits and boundaries for information security work Information security contracts MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 19 General information security legislation EC personal data directive 95/46/EC and the implementing national personal data laws EC directive on privacy and electronic communications (2002/58/EC) article 17: general information security obligation particular information security rules information security as a principle of information infrastructure information security requirements for electronic communications Penal law provisions on information crime: Council of Europe Cybercrime convention MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 20 Principles of general information security legislation The general doctrines of information security in law which are part of the general doctrines of information law Establishment of information security as meta-right and legal principle General information security obligation: technical, organisational and other measures (art 17 of Personal data directive, art. 4 of the privacy and electronic communications directive) Requirement for effective risk management risk analyses, establishment of management responsibilities and measures for prevention and limitation of risks Principle of proportionality and reasonableness on risk measures Principle of due care (precaution). Stance to technology as enablener and duty to follow technical development MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 21 General Public Information Security Legislation Trend towards more general e-Government acts or government information management acts Examples: MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti the U.S. e-Government Act of 2002, Finnish Act on the Openness in the Government 5.12.2003 22 Good information management practise Openness of Government Act, section 18 Obligation to safeguard accessibility availability protection integrity other factors having an influence on the quality of information of the information in documents and information systems MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 23 Good Information Management Obligations in section 18 Obligations cover the whole life cycle of information from creation to destroying emphasis on the planning procedures MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti planning optimism as a model of rationality 5.12.2003 24 Objective of section 18 Efficient and easy use of the principle of openness Information security Quality of information Efficiency MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti efficiency of administration economic efficiency and functioning of the markets 5.12.2003 25 Key contents of section 18 Obligation to create and maintain good information management practise Creation of catalogues and reports serving the implementation of openness Mapping and preserving the rights related to information Planning obligations Principle of information security Principle of the quality of information MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 26 Good information management practise in the systematic of the Act on the Opennes of Government Right to information public information Obligations safeguarding the openness exception: exhaustive (?) list of secrecy grounds access to file of a party duty to promote access to information good information management practise Principles concerning the interpretation MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti Openness-friendly interpretation 5.12.2003 27 Section 18 and the paradigm of law of the network society Regulation focuses also on the information infrastructure and information logistics Good practise as a regulatory model codes of conducts Efficiency as a concern for positive law; scarcity of law and rights MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 28 Problems related to Act on the Openness of Government Law-making risk ? Attempt of the all at once -solution Recognition of the imperfect governance ? Exhaustive and wide list of rules and exceptions Lack of the recognition of codes of conducts planning optimism Formulation and appearance MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 29 Administrative and organisational security Administrative and organisational security is the backbone of the information security work. Administrative security is often the reason for serious information security problems (together with the malicious software and junk mail). The EC personal data directive and EC privacy and electronic communications directive require particular attention to organisational security. ex. internal ’’Chinese walls’’ concerning the use of traffic data in a communications enterprise Sectoral regulation may in some ares establish additional requirements. Example financial market law in which high information security is embeddly required. Information security provisions in contracts often require organisational information security measures. MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 30 Dimensions of administrative and organisational information security 1. Security environment 1. 2. 3. 4. 5. 6. 7. 2. 3. 4. Ethical and moral principles and their implementation in practise Organisational policies Definition of responsibilities Organisational structure favouring security Sufficient financial resourses and reliability Sufficient skills and expertice, continous learning and education Awareness of legal and security requirements among management and personnel Objectives and risks, riskmanagement Supervision and controls, security audits Follow-up, reporting and learning MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 31 Personnel security Main sources of law concerning personnel security are the obligations set for employee in the labour legislation and the prohibition of unauthorised use of business secrets. In Finnish law: Main contractual instruments for personnel security are the non-disclosure agreements and non-recruitement clauses. the Act on Work Contracts The labour legislation may limit the possibilities to agree on the duration of non-disclosure and no-use clauses Act on Security Clearances: a security clearance procedure for the protection of state security MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 32 Physical security Physical security is legally protected by the penal law provisions concerning trespassing, inviolability of public and private premises and damaging property. Certain penal law provisions recognise information security as the additional objective of legal protection. Example: General and particular information security provisions require often physical security measures. Ex. electronic accounting documents, Ministry of Trade and Commerce Decision (47/1998) 6 § 2 parag. Double copies, other copy shall be kept in a secure location and separate from other copy Organisations own norms require often particular physical security measures MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 33 Communications security Communications security is the fastest developing area of regulation Privacy on electronic communications directive and implementing ecommunications privacy and information security laws Universal service rules and communication markets: a user access to (technically) high quality communication services imply also right to information security example: FICORA decisions Informatoion security is a part of a wider right to quality Electronic signatures directive and law on electronic signatures Uncitral model law on electronic signatures covers certain areas which have not been regulated in the EC electronic signature directive The new Act on the Use of Freedom of Speech in Mass Communications MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 34 Particular security requirements for electronic signature certification service providers Art. 6: particular liability rules for issuers of qualified certificates Annex II of the directive MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti organisational and economic security and reliability personnel security and adequate personnel and expertice adequate hardware and software systems and security adequate data recording and promt revocation lists prohibition of storing private keys as part of keymanagement 5.12.2003 35 Hardware security / facilities security In the communications sector some particular hardware requirements. A hardware connected to general communications network may not cause harm to the network or to the others. Only standard-conforming equipment may be used. Risk-division: each party bears the risks related to the hardware in his possession. This risk-provision is standardly repeated in the information security provisions in contracts. MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 36 Software security General rules follow from personal data directive and privacy and electronic communications directive Act on the Electronic Communications with the Public Authorities Particular problem: the liability for defective software and creating proper incentives for good software in law MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 37 Data security Technical measures for the protection of copyright: article 6 of the Infosoc –directive (directive 2001/29/EC). In the U.S. the DMCA Directive on the conditional access services Several sectoral rules on the data security Contractual provisions often require secure storing and even deletion of stored data MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti implementation of these provisions. A follow-up report should be required 5.12.2003 38 Operations security Electronic commerce directive establishes rules on the operations security in the e-commerce In sensitive domains the operations security require constant surveillance and instruction / training In security sensitive services contractual provisions on operations security and risk-division may be required MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 39 Information security provisions in contracts Contract is the principal governance tool of business co-operation. Contract is among the legal devices to built reasoned trust and a tool in the risk prevention and risk management Due to importance of information security risks and strategic value of information information security provisions are often needed in contracts. A good information security provision is not the transfer of all responsibility to other party. Legislation may limit such a contract. More sensitive information risk is the more detailed and clear contract is needed. MINISTRY OF FINANCE Counsellor, docent Tuomas Pöysti 5.12.2003 40