SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
Understanding the opportunities and threats
The fourth industrial revolution
Thursday 15 June 2017
Charlotte Walker-Osborn
Technology & Outsourcing Partner and Head
of Telecoms, Media & Technology Sector
(EMEA and Asia-Pac)
Liz Fitzsimons
Partner, Privacy & Cyber Security
James Burnie
Associate, Financial Institutions
With the speed of change
that the new wave of
technology represents we
will consider the changing
impact on business
Eversheds Sutherland | 11 July 2017 |
Agenda for today’s webinar
─ Overview of revolutionary development
─ Robotics, AI and automation
─ Blockchain
─ Additive manufacturing
─ Cyber and data security
─ Conclusions
• Underlying themes we will touch upon
• Opportunities
• Potential threats
• Horizon scanning
The fourth industrial revolution – understanding the opportunities and threats
Brief overview of
revolutionary development
Eversheds Sutherland | 11 July 2017 | The fourth industrial revolution – understanding the opportunities and threats
Smart
metering
Connected
Autonomous
vehicles
(CAV)
Big Data
Internet of
Things
Additive
Manufacturi
ng
Robotics
Individual
genome
mapping
Personalised
medications
and
treatments
Automation Virtual
reality
Telematics
Cloud
storage
Blockchain P2P
Eversheds Sutherland | 11 July 2017 | The fourth industrial revolution – understanding the opportunities and threats
source: Cap Gemini / David Hamman
Eversheds Sutherland | 11 July 2017 | The fourth industrial revolution – understanding the opportunities and threats
Eversheds Sutherland | 11 July 2017 | The fourth industrial revolution – understanding the opportunities and threats
Eversheds Sutherland | 11 July 2017 |
Key Opportunities
Revolutionary development
─ Growth & sustainability
• Improved ROI
• New products and services
• Improves profitability and efficiency
• New employment opportunities
─ Big data
• Improved understanding
• Greater insight of needs, likes, dislikes and trends
─ Tailored to need
• Personalised
• Saves time and costs
• Rewards loyalty
• Smart incentivisation
─ Potential safety benefits
The fourth industrial revolution – understanding the opportunities and threats
Eversheds Sutherland | 11 July 2017 |
Potential Threats
Revolutionary development
─ Employment and job security
─ Brand and reputation
─ Competition concern
─ Inadequate regulation
─ The surveillance debate
─ Cybersecurity
The fourth industrial revolution – understanding the opportunities and threats
source: Hewlett Packard Enterprises
The Guardian. BBC News.
Connected car (example)
Factoring in legal considerations to the technology build
within a connected environment
Focusing in on some of the hot areas and their related
considerations
Robotics, AI and
automation
• Legislative position uncertain in many countries
• Watch for new laws coming in
• IP ownership / ownership of outputs
• Product liability / liability and responsibility positions
• Employment considerations
• Data protection / cyber
Robotics, AI and automation – key legal points to think about
Eversheds Sutherland | 11 July 2017 |
Blockchain
The third party intermediary system
What is blockchain / DLT?
The DLT system
Seller
Intermediary
Buyer
Nod
e
Nod
e
Nod
e
Nod
e
Nod
e
Nod
e
Nod
e
Nod
e
Nod
e
Nod
e
Buye
r
Selle
r
Eversheds Sutherland | 11 July 2017 |
• What is a smart contract?
IF [Entity #564445] sends [10
widgets] that [meet at least standard
XYZ] THEN release [[£1.00] for each of
those widgets] to User/Account
#590235234
• The risks of using smart contracts:
• Perverse outcomes
• The difficulty of coding “reasonableness”
• The increasing importance of smart contract technology
Smart contracts
Eversheds Sutherland | 11 July 2017 |
The DAO attack
ETH
Nod
e
Nod
e
Nod
e
Nod
e
Nod
e
Nod
e
Nod
e
Nod
e
Member
Idea
MemberMember
Eversheds Sutherland | 11 July 2017 |
─ The actual need for blockchain
─ Governance:
• permissioned vs permissionless
• tiered authority
• correcting mistakes vs immutability
─ Resource costs
─ Privacy
─ Legal:
• position in the legal framework /
sandboxes
• conflicts of law
• AML
• insolvency
─ Interoperability
─ Competition
Issues to consider when using a blockchain solution
Additive
Manufacturing
What is Additive Manufacturing?
11/07/2017 22
 Additive Manufacturing (or 3D printing) is a process of making three dimensional solid objects from a digital file
 The digital file is created via 3D CAD software by a designer or can be generated via a 3D Scanner. The files are
saved as STL files
 STL files describe only the surface geometry of a three-dimensional object without any representation of colour,
texture or other common CAD model attributes
 The STL format approximates the surfaces of a solid model with a number of small triangles
11/07/2017 23
What is Additive Manufacturing
 The STL file is then sliced into tiny layers, hence the term Additive Layer Manufacturing, via the Additive
Manufacturing Machine software
 The data is then sent to the Additive Manufacturing Machine (3D Printer) where the final part is produced
CAD Data Save as STL Slice File Print Process
24
AM Industries – Who is using AM?
24
 Industrial/Business Machines is the leading Sector which Includes office equipment such as computers and
industrial automation equipment (robots)
 AM is being used particularly in the Consumer Products and Automotive Industry to accelerate product
development enabling rapid design iterations and optimization
4.3% growth since
2013
Source: Wohlers Report 2016
Eversheds Sutherland | 11 July 2017 |
Key considerations
Additive manufacturing
Version: [###] Classification: Internal Owner: [Insert name]
Cyber and data security
A deeper look
• Preventative measures to tackle cyber security incidents:
• invest in security and scanning tools
• checking traffic in and out of networks
• checking use of IT equipment and access to the internet – although note rules controlling interception
of communications and monitoring and privacy and data protection rules
• training - staff recognise security breaches and know how to react to them, who to report to, how
quickly and with what details
• response team must be able to cover an incident 24/7, 365 days per year and may need international
support
• Practically, appropriate and effective monitoring can help avoid and minimise cybersecurity risks
• Failing to identify and deal with threats shown to increase sanctions imposed by regulators following resultant
breach
• Monitoring can provide essential intelligence about compromised security, when and where and how it
happened
• allow a gap to be identified at a stage where the relevant incident and compromised data is minimal
• allow adjustments to be made to prevent further and more serious breaches taking place
• understand what data has been compromised or extracted, how many individuals or systems are
affected and the severity of the incident.
• First priority - isolate the breach and stop it to prevent further intrusion, data loss or damage. Then to try to
recover any data lost and/or to lock it down.
• Mandatory and voluntary reporting, as well as communication and PR strategies.
• Outsourcing, e.g. to cloud providers, may enhance security, bringing state of the art security within affordable
reach
• also carries inherent security risks
Data and cyber security
Eversheds Sutherland | 11 July 2017 |
• Smart technology being developed, plugged into systems and implemented at a rapid rate –
• not always allowed for the full security implications to be considered or addressed
• security considerations not necessarily a high priority since businesses have assumed that
details obtained are not “personal” and have minimal if any privacy impact
• regulators disagree and believe that the data collected by a great deal of smart technology has
privacy implications and may often involve the collection and use of personal data, such as from
metadata about usage and/or location
• Adding components, devices and interfaces to systems necessarily increases the potential routes
into systems and increases potential security vulnerabilities.
• Security – especially of personal data and other higher risk data – should be considered from the
outset and at every stage of the design and development of technological innovation.
• Should determine whether the collection and use of data envisaged is lawful, necessary and
proportionate to need.
• Amount and sensitivity of data involved should be assessed: has this been minimised and why is
it essential? Could it be encrypted?
• The potential impact on individuals from the proposed technology should be considered and
mitigated.
• Risk of attack and exploitation should be considered, addressed and engineered out completely
or as much as possible and appropriate.
• Privacy by design and default is a mandatory GDPR obligation from May 2018 but buyers of systems
and products will be looking for comfort on compliance now if systems and products are to be used
post May 2018.
• Businesses can address these issues by impact assessments throughout the design process.
Data and cyber security
The fourth industrial revolution – understanding the opportunities and threats
Eversheds Sutherland | 11 July 2017 |
Threats
• Lack of ability to make
mistakes, learn and grow
• Bad publicity
• Potential litigation
• Loss of trust
• Cost of security
• Shareholder confidence
Opportunities
• Comprehensive security
system saves time and
worry
• Good safety record boosts
reputation
Data and cyber security
The fourth industrial revolution – understanding the opportunities and threats
Threats and opportunities
An Overview of Data Protection and Privacy
Threats and opportunities
Eversheds Sutherland | 11 July 2017 |
Overview of Issues
Data Protection and Privacy
─ Privacy impact
─ Lack of understanding and knowledge
─ Lack of choice and control
─ Loss of opportunity
─ Discriminatory access, terms and pricing
─ Lack of safe space
─ Security threats, fraud and identity theft
─ Enhanced regulatory concern
─ Growing public awareness
─ Intense media interest
─ Rebalancing of power from organisations to individuals
The fourth industrial revolution – understanding the opportunities and threats
Eversheds Sutherland | 11 July 2017 |
What you need to know
Data Protection and Privacy
─ Is it data or personal data?
─ Which laws apply?
• Extra territorial reach
─ Is its use regulated?
─ Which regime applies?
─ Have you considered compliance?
• Speed of change
• Product development cycle
─ How can you comply?
─ What are the risks if you don’t?
• Financial
• Business critical
• Brand & reputation
• Personal
The fourth industrial revolution – understanding the opportunities and threats
Eversheds Sutherland | 11 July 2017 |
The increasing controls on use of data
Data protection and Privacy
─ New and enhanced laws
• GDPR
• Japan
• New York and Illinois
• Digital Single Market
• ePrivacy regime
• Future proofing
• Technology neutral
─ More data becomes personal
• Individual identifiers
• Re-identification
• Pseudonymisation
─ Greater thought & explanation needed
─ Additional individual controls and rights
─ Increased regulator and individual appetite to challenge
The fourth industrial revolution – understanding the opportunities and threats
Eversheds Sutherland | 11 July 2017 |
What you need to do
Data Protection and Privacy
─ Identify new
• Systems & processes
• Technology
• Products
• Data collection
• Uses of data
• Websites & apps
─ Think data protection and privacy first
─ Privacy by design and default
─ Minimised access
─ Collaboration and partnering
─ Privacy impact assessments
─ Privacy governance and data protection officer
─ Meeting individual rights
─ Regulator consultation and approval
The fourth industrial revolution – understanding the opportunities and threats
• Necessity & proportionality
• Data minimisation
• Lawful basis & purpose limitation
• Maintenance of accurate, complete and up to date data
• Retention and storage limitation
• Security, integrity and confidentiality
• Accountability
• Danger areas
• Profiling and automated decision making
• Monitoring & tracking
• Surveillance
• Location and mobility data
• Unexpected use, sharing and export
• Special personal data
• Criminal offence related data
• Targeted / behavioural use
• Permanent impact
Helpful hints
Data Protection and Privacy
Eversheds Sutherland | 11 July 2017 |
Conclusions / questions?
The fourth industrial revolution – understanding the opportunities and threats
Thank you
eversheds-sutherland.com
This information pack is intended as a guide only. Whilst the information it contains
is believed to be correct, it is not a substitute for appropriate legal advice.
Eversheds Sutherland (International) LLP can take no responsibility for actions
taken based on the information contained in this pack.
© Eversheds Sutherland 2017. All rights reserved.
Charlotte Walker-Osborn
Technology & Outsourcing
Partner, Head of Telecoms, Media
& Technology Sector
Tel: +44 121 232 1220
Mob: +44 779 907 5756
E-mail: charlottewalker-
osborn@eversheds-sutherland.com
James Burnie
Associate, Financial Institutions
Liz Fitzsimons
Partner, Privacy & Cyber Security
Tel: +44 20 7919 0879
E-mail: jamesburnie@eversheds-
sutherland.com
Tel: +44 1223 44 3808
Mob: +44 774 091 8238
E-mail: lizfitzsimons@eversheds-
sutherland.com
CAM_1B-#5510193CAM_1B-#5510193CAM_1B-#5510193CAM_1B-#5510193CAM_1B-#5510193CAM_1B-#5510193CAM_1B-#5510193CAM_1B-#5510193CAM_1B-#5510193CAM_1B-#5510193

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Industry 4.0
Industry 4.0 Industry 4.0
Industry 4.0
 
Overview on Industry 4.0
Overview on Industry 4.0Overview on Industry 4.0
Overview on Industry 4.0
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
Fundamentals of industry 4.0
Fundamentals of industry 4.0Fundamentals of industry 4.0
Fundamentals of industry 4.0
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
Marketing reimagined within the fourth industrial revolution
Marketing reimagined within the fourth industrial revolutionMarketing reimagined within the fourth industrial revolution
Marketing reimagined within the fourth industrial revolution
 
Industry 5.0.pptx
Industry 5.0.pptxIndustry 5.0.pptx
Industry 5.0.pptx
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
Industry 4.0 and its technological needs
Industry 4.0 and its technological needsIndustry 4.0 and its technological needs
Industry 4.0 and its technological needs
 
INDUSTRY 4.0 (Economics for Engineers)
INDUSTRY 4.0 (Economics for Engineers)INDUSTRY 4.0 (Economics for Engineers)
INDUSTRY 4.0 (Economics for Engineers)
 
4.0 Industry - What everyone must know about it!
4.0 Industry - What everyone must know about it!4.0 Industry - What everyone must know about it!
4.0 Industry - What everyone must know about it!
 
Industry 4.0 vcj
Industry 4.0 vcjIndustry 4.0 vcj
Industry 4.0 vcj
 
INTRODUCTION TO INDUSTRIAL REVOLUTION 4.0
INTRODUCTION TO INDUSTRIAL REVOLUTION 4.0 INTRODUCTION TO INDUSTRIAL REVOLUTION 4.0
INTRODUCTION TO INDUSTRIAL REVOLUTION 4.0
 
Industry 4.0 @ Jyothi Nivas
Industry 4.0 @ Jyothi NivasIndustry 4.0 @ Jyothi Nivas
Industry 4.0 @ Jyothi Nivas
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
4th industrial revolution & the Future of Work
4th industrial revolution & the Future of Work4th industrial revolution & the Future of Work
4th industrial revolution & the Future of Work
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
4th Industrial Revolution - Industry 4.0 & Pakistan
4th Industrial Revolution - Industry 4.0 & Pakistan4th Industrial Revolution - Industry 4.0 & Pakistan
4th Industrial Revolution - Industry 4.0 & Pakistan
 
Industry 4.0 for Society 5.0
Industry 4.0 for Society 5.0Industry 4.0 for Society 5.0
Industry 4.0 for Society 5.0
 

Andere mochten auch

lassification with decision trees from a nonparametric predictive inference p...
lassification with decision trees from a nonparametric predictive inference p...lassification with decision trees from a nonparametric predictive inference p...
lassification with decision trees from a nonparametric predictive inference p...NTNU
 
Industry 4.0 and the road towards it
Industry 4.0 and the road towards itIndustry 4.0 and the road towards it
Industry 4.0 and the road towards itRick Bouter
 
The Hyper Connected Era: Mobile First, Cloud First and Multi Screen
The Hyper Connected Era: Mobile First, Cloud First and Multi Screen The Hyper Connected Era: Mobile First, Cloud First and Multi Screen
The Hyper Connected Era: Mobile First, Cloud First and Multi Screen Jose Papo, MSc
 
The Evolution of Offshoring
The Evolution of OffshoringThe Evolution of Offshoring
The Evolution of Offshoringswiss IT bridge
 
Origins of Public Relations
Origins of Public RelationsOrigins of Public Relations
Origins of Public RelationsKelli Burns
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparisonPhearin Sok
 
Lviv Outsourcing Forum Олександра Альхімович “Drivers of change at the begin...
Lviv Outsourcing Forum Олександра Альхімович  “Drivers of change at the begin...Lviv Outsourcing Forum Олександра Альхімович  “Drivers of change at the begin...
Lviv Outsourcing Forum Олександра Альхімович “Drivers of change at the begin...Lviv Startup Club
 
Outsourcing & Offshoring
Outsourcing & OffshoringOutsourcing & Offshoring
Outsourcing & OffshoringArun Khedwal
 
4th Industrial Revolution by Sam Williams
4th Industrial Revolution by Sam Williams4th Industrial Revolution by Sam Williams
4th Industrial Revolution by Sam WilliamsCertus Solutions
 
Huawei parameter strategy v1.4 1st dec
Huawei parameter strategy v1.4  1st decHuawei parameter strategy v1.4  1st dec
Huawei parameter strategy v1.4 1st decKetut Widya
 

Andere mochten auch (14)

Analysis of Business Environment
Analysis of  Business EnvironmentAnalysis of  Business Environment
Analysis of Business Environment
 
The Future of Work - The Fourth Industrial Revolution
The Future of Work - The Fourth Industrial RevolutionThe Future of Work - The Fourth Industrial Revolution
The Future of Work - The Fourth Industrial Revolution
 
lassification with decision trees from a nonparametric predictive inference p...
lassification with decision trees from a nonparametric predictive inference p...lassification with decision trees from a nonparametric predictive inference p...
lassification with decision trees from a nonparametric predictive inference p...
 
Industry 4.0 and the road towards it
Industry 4.0 and the road towards itIndustry 4.0 and the road towards it
Industry 4.0 and the road towards it
 
The Hyper Connected Era: Mobile First, Cloud First and Multi Screen
The Hyper Connected Era: Mobile First, Cloud First and Multi Screen The Hyper Connected Era: Mobile First, Cloud First and Multi Screen
The Hyper Connected Era: Mobile First, Cloud First and Multi Screen
 
BlitzTrader_PPT
BlitzTrader_PPTBlitzTrader_PPT
BlitzTrader_PPT
 
The Evolution of Offshoring
The Evolution of OffshoringThe Evolution of Offshoring
The Evolution of Offshoring
 
Origins of Public Relations
Origins of Public RelationsOrigins of Public Relations
Origins of Public Relations
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
Lviv Outsourcing Forum Олександра Альхімович “Drivers of change at the begin...
Lviv Outsourcing Forum Олександра Альхімович  “Drivers of change at the begin...Lviv Outsourcing Forum Олександра Альхімович  “Drivers of change at the begin...
Lviv Outsourcing Forum Олександра Альхімович “Drivers of change at the begin...
 
Outsourcing & Offshoring
Outsourcing & OffshoringOutsourcing & Offshoring
Outsourcing & Offshoring
 
4th Industrial Revolution by Sam Williams
4th Industrial Revolution by Sam Williams4th Industrial Revolution by Sam Williams
4th Industrial Revolution by Sam Williams
 
Huawei parameter strategy v1.4 1st dec
Huawei parameter strategy v1.4  1st decHuawei parameter strategy v1.4  1st dec
Huawei parameter strategy v1.4 1st dec
 
10 facts about jobs in the future
10 facts about jobs in the future10 facts about jobs in the future
10 facts about jobs in the future
 

Ähnlich wie Understanding the opportunities and threats of Industry 4.0

Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
Mobile Devices and Internet of Things
Mobile Devices and Internet of ThingsMobile Devices and Internet of Things
Mobile Devices and Internet of ThingsPaul Hastings
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Ravinder (Ravi) Singh
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Huntsman Security
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report SummaryAccenture Technology
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...FinTech Belgium
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance EnergyTech2015
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxS .Ali Raza
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 

Ähnlich wie Understanding the opportunities and threats of Industry 4.0 (20)

Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Mobile Devices and Internet of Things
Mobile Devices and Internet of ThingsMobile Devices and Internet of Things
Mobile Devices and Internet of Things
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 

Mehr von Eversheds Sutherland

Conduct Risk – What Corporates Can Learn From The Financial Sector
Conduct Risk – What Corporates Can Learn From The Financial SectorConduct Risk – What Corporates Can Learn From The Financial Sector
Conduct Risk – What Corporates Can Learn From The Financial SectorEversheds Sutherland
 
How technology and innovative processes can make your legal team more efficient
How technology and innovative processes can make your legal team more efficientHow technology and innovative processes can make your legal team more efficient
How technology and innovative processes can make your legal team more efficientEversheds Sutherland
 
Preparing for Brexit - Future proofing your contracts
Preparing for Brexit - Future proofing your contractsPreparing for Brexit - Future proofing your contracts
Preparing for Brexit - Future proofing your contractsEversheds Sutherland
 
State Aid and Tax – Understanding the risks
State Aid and Tax – Understanding the risksState Aid and Tax – Understanding the risks
State Aid and Tax – Understanding the risksEversheds Sutherland
 
Opportunities and challenges of managing a globally mobile workforce
Opportunities and challenges of managing a globally mobile workforceOpportunities and challenges of managing a globally mobile workforce
Opportunities and challenges of managing a globally mobile workforceEversheds Sutherland
 
Getting over ‘Regrexit’ - Post Brexit Real Estate Opportunities
Getting over ‘Regrexit’ - Post Brexit Real Estate OpportunitiesGetting over ‘Regrexit’ - Post Brexit Real Estate Opportunities
Getting over ‘Regrexit’ - Post Brexit Real Estate OpportunitiesEversheds Sutherland
 
State Aid and Tax challenges - 13 May 2016
State Aid and Tax challenges - 13 May 2016State Aid and Tax challenges - 13 May 2016
State Aid and Tax challenges - 13 May 2016Eversheds Sutherland
 
Is your intellectual property at risk?
Is your intellectual property at risk?Is your intellectual property at risk?
Is your intellectual property at risk?Eversheds Sutherland
 
The Key Role of In-House Legal in Business and Human Rights
The Key Role of In-House Legal in Business and Human RightsThe Key Role of In-House Legal in Business and Human Rights
The Key Role of In-House Legal in Business and Human RightsEversheds Sutherland
 
Front office controls – what are the FCA’s expectations?
Front office controls – what are the FCA’s expectations?Front office controls – what are the FCA’s expectations?
Front office controls – what are the FCA’s expectations?Eversheds Sutherland
 
Eversheds CREATE Workshop #1: Real estate holding structures
Eversheds CREATE Workshop #1: Real estate holding structuresEversheds CREATE Workshop #1: Real estate holding structures
Eversheds CREATE Workshop #1: Real estate holding structuresEversheds Sutherland
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessEversheds Sutherland
 
LawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worthLawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worthEversheds Sutherland
 
Eversheds 'Spotlight on the Cloud' - headline results presentation and key sp...
Eversheds 'Spotlight on the Cloud' - headline results presentation and key sp...Eversheds 'Spotlight on the Cloud' - headline results presentation and key sp...
Eversheds 'Spotlight on the Cloud' - headline results presentation and key sp...Eversheds Sutherland
 
Talent Management – Harnessing the power of your team
Talent Management – Harnessing the power of your teamTalent Management – Harnessing the power of your team
Talent Management – Harnessing the power of your teamEversheds Sutherland
 

Mehr von Eversheds Sutherland (20)

Conduct Risk – What Corporates Can Learn From The Financial Sector
Conduct Risk – What Corporates Can Learn From The Financial SectorConduct Risk – What Corporates Can Learn From The Financial Sector
Conduct Risk – What Corporates Can Learn From The Financial Sector
 
Navigating the Insurance Act
Navigating the Insurance ActNavigating the Insurance Act
Navigating the Insurance Act
 
How technology and innovative processes can make your legal team more efficient
How technology and innovative processes can make your legal team more efficientHow technology and innovative processes can make your legal team more efficient
How technology and innovative processes can make your legal team more efficient
 
Preparing for Brexit - Future proofing your contracts
Preparing for Brexit - Future proofing your contractsPreparing for Brexit - Future proofing your contracts
Preparing for Brexit - Future proofing your contracts
 
State Aid and Tax – Understanding the risks
State Aid and Tax – Understanding the risksState Aid and Tax – Understanding the risks
State Aid and Tax – Understanding the risks
 
Opportunities and challenges of managing a globally mobile workforce
Opportunities and challenges of managing a globally mobile workforceOpportunities and challenges of managing a globally mobile workforce
Opportunities and challenges of managing a globally mobile workforce
 
Post Brexit Update
Post Brexit UpdatePost Brexit Update
Post Brexit Update
 
Getting over ‘Regrexit’ - Post Brexit Real Estate Opportunities
Getting over ‘Regrexit’ - Post Brexit Real Estate OpportunitiesGetting over ‘Regrexit’ - Post Brexit Real Estate Opportunities
Getting over ‘Regrexit’ - Post Brexit Real Estate Opportunities
 
Metrics for In-House Teams
Metrics for In-House TeamsMetrics for In-House Teams
Metrics for In-House Teams
 
State Aid and Tax challenges - 13 May 2016
State Aid and Tax challenges - 13 May 2016State Aid and Tax challenges - 13 May 2016
State Aid and Tax challenges - 13 May 2016
 
Is your intellectual property at risk?
Is your intellectual property at risk?Is your intellectual property at risk?
Is your intellectual property at risk?
 
The Key Role of In-House Legal in Business and Human Rights
The Key Role of In-House Legal in Business and Human RightsThe Key Role of In-House Legal in Business and Human Rights
The Key Role of In-House Legal in Business and Human Rights
 
Front office controls – what are the FCA’s expectations?
Front office controls – what are the FCA’s expectations?Front office controls – what are the FCA’s expectations?
Front office controls – what are the FCA’s expectations?
 
Eversheds CREATE Workshop #1: Real estate holding structures
Eversheds CREATE Workshop #1: Real estate holding structuresEversheds CREATE Workshop #1: Real estate holding structures
Eversheds CREATE Workshop #1: Real estate holding structures
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
LawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worthLawWithoutWalls - 2016 projects of worth
LawWithoutWalls - 2016 projects of worth
 
Eversheds 'Spotlight on the Cloud' - headline results presentation and key sp...
Eversheds 'Spotlight on the Cloud' - headline results presentation and key sp...Eversheds 'Spotlight on the Cloud' - headline results presentation and key sp...
Eversheds 'Spotlight on the Cloud' - headline results presentation and key sp...
 
Bribery and Corruption Campaign
Bribery and Corruption CampaignBribery and Corruption Campaign
Bribery and Corruption Campaign
 
Talent Management – Harnessing the power of your team
Talent Management – Harnessing the power of your teamTalent Management – Harnessing the power of your team
Talent Management – Harnessing the power of your team
 
Tapered annual allowance_webinar
Tapered annual allowance_webinarTapered annual allowance_webinar
Tapered annual allowance_webinar
 

Kürzlich hochgeladen

Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791BlayneRush1
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791BlayneRush1
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...shubhuc963
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfDrNiteshSaraswat
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxAdityasinhRana4
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 

Kürzlich hochgeladen (20)

Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791Alexis O'Connell Lexileeyogi 512-840-8791
Alexis O'Connell Lexileeyogi 512-840-8791
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
Alexis O'Connell Alexis Lee mugshot Lexileeyogi 512-840-8791
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
Good Governance Practices for protection of Human Rights (Discuss Transparen...
Good Governance Practices for protection  of Human Rights (Discuss Transparen...Good Governance Practices for protection  of Human Rights (Discuss Transparen...
Good Governance Practices for protection of Human Rights (Discuss Transparen...
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
SecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdfSecuritiesContracts(Regulation)Act,1956.pdf
SecuritiesContracts(Regulation)Act,1956.pdf
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
The Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptxThe Patents Act 1970 Notes For College .pptx
The Patents Act 1970 Notes For College .pptx
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 

Understanding the opportunities and threats of Industry 4.0

  • 1. Understanding the opportunities and threats The fourth industrial revolution Thursday 15 June 2017 Charlotte Walker-Osborn Technology & Outsourcing Partner and Head of Telecoms, Media & Technology Sector (EMEA and Asia-Pac) Liz Fitzsimons Partner, Privacy & Cyber Security James Burnie Associate, Financial Institutions
  • 2. With the speed of change that the new wave of technology represents we will consider the changing impact on business
  • 3. Eversheds Sutherland | 11 July 2017 | Agenda for today’s webinar ─ Overview of revolutionary development ─ Robotics, AI and automation ─ Blockchain ─ Additive manufacturing ─ Cyber and data security ─ Conclusions • Underlying themes we will touch upon • Opportunities • Potential threats • Horizon scanning The fourth industrial revolution – understanding the opportunities and threats
  • 5. Eversheds Sutherland | 11 July 2017 | The fourth industrial revolution – understanding the opportunities and threats Smart metering Connected Autonomous vehicles (CAV) Big Data Internet of Things Additive Manufacturi ng Robotics Individual genome mapping Personalised medications and treatments Automation Virtual reality Telematics Cloud storage Blockchain P2P
  • 6. Eversheds Sutherland | 11 July 2017 | The fourth industrial revolution – understanding the opportunities and threats source: Cap Gemini / David Hamman
  • 7. Eversheds Sutherland | 11 July 2017 | The fourth industrial revolution – understanding the opportunities and threats
  • 8. Eversheds Sutherland | 11 July 2017 | The fourth industrial revolution – understanding the opportunities and threats
  • 9. Eversheds Sutherland | 11 July 2017 | Key Opportunities Revolutionary development ─ Growth & sustainability • Improved ROI • New products and services • Improves profitability and efficiency • New employment opportunities ─ Big data • Improved understanding • Greater insight of needs, likes, dislikes and trends ─ Tailored to need • Personalised • Saves time and costs • Rewards loyalty • Smart incentivisation ─ Potential safety benefits The fourth industrial revolution – understanding the opportunities and threats
  • 10. Eversheds Sutherland | 11 July 2017 | Potential Threats Revolutionary development ─ Employment and job security ─ Brand and reputation ─ Competition concern ─ Inadequate regulation ─ The surveillance debate ─ Cybersecurity The fourth industrial revolution – understanding the opportunities and threats source: Hewlett Packard Enterprises The Guardian. BBC News.
  • 12. Factoring in legal considerations to the technology build within a connected environment
  • 13. Focusing in on some of the hot areas and their related considerations
  • 15. • Legislative position uncertain in many countries • Watch for new laws coming in • IP ownership / ownership of outputs • Product liability / liability and responsibility positions • Employment considerations • Data protection / cyber Robotics, AI and automation – key legal points to think about
  • 16. Eversheds Sutherland | 11 July 2017 | Blockchain
  • 17. The third party intermediary system What is blockchain / DLT? The DLT system Seller Intermediary Buyer Nod e Nod e Nod e Nod e Nod e Nod e Nod e Nod e Nod e Nod e Buye r Selle r
  • 18. Eversheds Sutherland | 11 July 2017 | • What is a smart contract? IF [Entity #564445] sends [10 widgets] that [meet at least standard XYZ] THEN release [[£1.00] for each of those widgets] to User/Account #590235234 • The risks of using smart contracts: • Perverse outcomes • The difficulty of coding “reasonableness” • The increasing importance of smart contract technology Smart contracts
  • 19. Eversheds Sutherland | 11 July 2017 | The DAO attack ETH Nod e Nod e Nod e Nod e Nod e Nod e Nod e Nod e Member Idea MemberMember
  • 20. Eversheds Sutherland | 11 July 2017 | ─ The actual need for blockchain ─ Governance: • permissioned vs permissionless • tiered authority • correcting mistakes vs immutability ─ Resource costs ─ Privacy ─ Legal: • position in the legal framework / sandboxes • conflicts of law • AML • insolvency ─ Interoperability ─ Competition Issues to consider when using a blockchain solution
  • 22. What is Additive Manufacturing? 11/07/2017 22  Additive Manufacturing (or 3D printing) is a process of making three dimensional solid objects from a digital file  The digital file is created via 3D CAD software by a designer or can be generated via a 3D Scanner. The files are saved as STL files  STL files describe only the surface geometry of a three-dimensional object without any representation of colour, texture or other common CAD model attributes  The STL format approximates the surfaces of a solid model with a number of small triangles
  • 23. 11/07/2017 23 What is Additive Manufacturing  The STL file is then sliced into tiny layers, hence the term Additive Layer Manufacturing, via the Additive Manufacturing Machine software  The data is then sent to the Additive Manufacturing Machine (3D Printer) where the final part is produced CAD Data Save as STL Slice File Print Process
  • 24. 24 AM Industries – Who is using AM? 24  Industrial/Business Machines is the leading Sector which Includes office equipment such as computers and industrial automation equipment (robots)  AM is being used particularly in the Consumer Products and Automotive Industry to accelerate product development enabling rapid design iterations and optimization 4.3% growth since 2013 Source: Wohlers Report 2016
  • 25. Eversheds Sutherland | 11 July 2017 | Key considerations Additive manufacturing Version: [###] Classification: Internal Owner: [Insert name]
  • 26. Cyber and data security A deeper look
  • 27. • Preventative measures to tackle cyber security incidents: • invest in security and scanning tools • checking traffic in and out of networks • checking use of IT equipment and access to the internet – although note rules controlling interception of communications and monitoring and privacy and data protection rules • training - staff recognise security breaches and know how to react to them, who to report to, how quickly and with what details • response team must be able to cover an incident 24/7, 365 days per year and may need international support • Practically, appropriate and effective monitoring can help avoid and minimise cybersecurity risks • Failing to identify and deal with threats shown to increase sanctions imposed by regulators following resultant breach • Monitoring can provide essential intelligence about compromised security, when and where and how it happened • allow a gap to be identified at a stage where the relevant incident and compromised data is minimal • allow adjustments to be made to prevent further and more serious breaches taking place • understand what data has been compromised or extracted, how many individuals or systems are affected and the severity of the incident. • First priority - isolate the breach and stop it to prevent further intrusion, data loss or damage. Then to try to recover any data lost and/or to lock it down. • Mandatory and voluntary reporting, as well as communication and PR strategies. • Outsourcing, e.g. to cloud providers, may enhance security, bringing state of the art security within affordable reach • also carries inherent security risks Data and cyber security
  • 28. Eversheds Sutherland | 11 July 2017 | • Smart technology being developed, plugged into systems and implemented at a rapid rate – • not always allowed for the full security implications to be considered or addressed • security considerations not necessarily a high priority since businesses have assumed that details obtained are not “personal” and have minimal if any privacy impact • regulators disagree and believe that the data collected by a great deal of smart technology has privacy implications and may often involve the collection and use of personal data, such as from metadata about usage and/or location • Adding components, devices and interfaces to systems necessarily increases the potential routes into systems and increases potential security vulnerabilities. • Security – especially of personal data and other higher risk data – should be considered from the outset and at every stage of the design and development of technological innovation. • Should determine whether the collection and use of data envisaged is lawful, necessary and proportionate to need. • Amount and sensitivity of data involved should be assessed: has this been minimised and why is it essential? Could it be encrypted? • The potential impact on individuals from the proposed technology should be considered and mitigated. • Risk of attack and exploitation should be considered, addressed and engineered out completely or as much as possible and appropriate. • Privacy by design and default is a mandatory GDPR obligation from May 2018 but buyers of systems and products will be looking for comfort on compliance now if systems and products are to be used post May 2018. • Businesses can address these issues by impact assessments throughout the design process. Data and cyber security The fourth industrial revolution – understanding the opportunities and threats
  • 29. Eversheds Sutherland | 11 July 2017 | Threats • Lack of ability to make mistakes, learn and grow • Bad publicity • Potential litigation • Loss of trust • Cost of security • Shareholder confidence Opportunities • Comprehensive security system saves time and worry • Good safety record boosts reputation Data and cyber security The fourth industrial revolution – understanding the opportunities and threats Threats and opportunities
  • 30. An Overview of Data Protection and Privacy Threats and opportunities
  • 31. Eversheds Sutherland | 11 July 2017 | Overview of Issues Data Protection and Privacy ─ Privacy impact ─ Lack of understanding and knowledge ─ Lack of choice and control ─ Loss of opportunity ─ Discriminatory access, terms and pricing ─ Lack of safe space ─ Security threats, fraud and identity theft ─ Enhanced regulatory concern ─ Growing public awareness ─ Intense media interest ─ Rebalancing of power from organisations to individuals The fourth industrial revolution – understanding the opportunities and threats
  • 32. Eversheds Sutherland | 11 July 2017 | What you need to know Data Protection and Privacy ─ Is it data or personal data? ─ Which laws apply? • Extra territorial reach ─ Is its use regulated? ─ Which regime applies? ─ Have you considered compliance? • Speed of change • Product development cycle ─ How can you comply? ─ What are the risks if you don’t? • Financial • Business critical • Brand & reputation • Personal The fourth industrial revolution – understanding the opportunities and threats
  • 33. Eversheds Sutherland | 11 July 2017 | The increasing controls on use of data Data protection and Privacy ─ New and enhanced laws • GDPR • Japan • New York and Illinois • Digital Single Market • ePrivacy regime • Future proofing • Technology neutral ─ More data becomes personal • Individual identifiers • Re-identification • Pseudonymisation ─ Greater thought & explanation needed ─ Additional individual controls and rights ─ Increased regulator and individual appetite to challenge The fourth industrial revolution – understanding the opportunities and threats
  • 34. Eversheds Sutherland | 11 July 2017 | What you need to do Data Protection and Privacy ─ Identify new • Systems & processes • Technology • Products • Data collection • Uses of data • Websites & apps ─ Think data protection and privacy first ─ Privacy by design and default ─ Minimised access ─ Collaboration and partnering ─ Privacy impact assessments ─ Privacy governance and data protection officer ─ Meeting individual rights ─ Regulator consultation and approval The fourth industrial revolution – understanding the opportunities and threats
  • 35. • Necessity & proportionality • Data minimisation • Lawful basis & purpose limitation • Maintenance of accurate, complete and up to date data • Retention and storage limitation • Security, integrity and confidentiality • Accountability • Danger areas • Profiling and automated decision making • Monitoring & tracking • Surveillance • Location and mobility data • Unexpected use, sharing and export • Special personal data • Criminal offence related data • Targeted / behavioural use • Permanent impact Helpful hints Data Protection and Privacy
  • 36. Eversheds Sutherland | 11 July 2017 | Conclusions / questions? The fourth industrial revolution – understanding the opportunities and threats
  • 38. eversheds-sutherland.com This information pack is intended as a guide only. Whilst the information it contains is believed to be correct, it is not a substitute for appropriate legal advice. Eversheds Sutherland (International) LLP can take no responsibility for actions taken based on the information contained in this pack. © Eversheds Sutherland 2017. All rights reserved. Charlotte Walker-Osborn Technology & Outsourcing Partner, Head of Telecoms, Media & Technology Sector Tel: +44 121 232 1220 Mob: +44 779 907 5756 E-mail: charlottewalker- osborn@eversheds-sutherland.com James Burnie Associate, Financial Institutions Liz Fitzsimons Partner, Privacy & Cyber Security Tel: +44 20 7919 0879 E-mail: jamesburnie@eversheds- sutherland.com Tel: +44 1223 44 3808 Mob: +44 774 091 8238 E-mail: lizfitzsimons@eversheds- sutherland.com CAM_1B-#5510193CAM_1B-#5510193CAM_1B-#5510193CAM_1B-#5510193CAM_1B-#5510193CAM_1B-#5510193CAM_1B-#5510193CAM_1B-#5510193CAM_1B-#5510193CAM_1B-#5510193