Secrets d'affaires et protec9on des données (entre droits et obliga9ons) - SUPPORT DE CONFERENCE

La page est créée Didier Richard
 
CONTINUER À LIRE
Secrets d'affaires et protec9on des données (entre droits et obliga9ons) - SUPPORT DE CONFERENCE
SUPPORT DE CONFERENCE

        Secrets d’affaires et protec9on des
        données (entre droits et obliga9ons)

                        Lundi 4 juin
                        14.00 - 15.00
Secrets d'affaires et protec9on des données (entre droits et obliga9ons) - SUPPORT DE CONFERENCE
Protection des données:
                       entre obligations et droits

      GDPR – SECRETS D’AFFAIRES - NIS
                                    Philippe LAURENT
Voir également l’article “L’intérêt des secrets bien gardés” publié dans le Classe Export Magazine n°18, disponible à l’adresse :
                      https://www.awex-export.be/fr/medias/classe-export-magazine-18-novembre-2017

                                                     independent
                                                      full service
                                                   business law firm
                                                  located in Brussels

                                                                                                                 4 juin 2018
Secrets d'affaires et protec9on des données (entre droits et obliga9ons) - SUPPORT DE CONFERENCE
POURQUOI
 PROTEGER VOS
  DONNEES &
INFORMATIONS?
Secrets d'affaires et protec9on des données (entre droits et obliga9ons) - SUPPORT DE CONFERENCE
• Réputation
• Argument commercial (“sérieux”)
• Compétitivité
• Condition de protection de PI (brevet,
  dessin/modèle, secrets d’affaires…)
• Obligations contractuelles (NDA)
• Obligations légales
   – responsabilité
   – protection des données à caractère
    personnel (GDPR)
   – réglementations sectorielles (ex.: secret
    professionnel, NIS)
Secrets d'affaires et protec9on des données (entre droits et obliga9ons) - SUPPORT DE CONFERENCE
GDPR
Secrets d'affaires et protec9on des données (entre droits et obliga9ons) - SUPPORT DE CONFERENCE
Traitement de données
         à caractère personnel =
  opération ou ensemble d’opérations
               appliquée(s)
           à toute(s) donnée(s)
se rapportant à des personnes physiques
       identifiées ou identifiables
                  (= Personnes Concernées)
Responsable =
Détermine les finalités et les moyens
          du traitement

            Sous-traitant =
Traite les données personnelles pour
      le compte du responsable
             (= “moyen”)
ACTIONNAIRES       MEMBRES         PARTENAIRES

      RH            ENTREPRISE               RP

  FOURNISSEURS       PROSPECTS         CLIENTS

                       CONSOMMATEURS     UTILISATEURS
       VISITEURS                             FINAUX

                 INTERNAUTES     BENEFICIAIRES
PERSONNES DE
   CONTACT
réseaux sociaux
cloud computing
                                              e-marketing

IOT

                                                  e-health
      big data                          smart city
                 Intelligence artificielle
Pourquoi me mettre
  en conformité?
Gustave Doré (Straatsburg, 6 januari 1832 – Parijs, 23 januari 1883

Parce que
c’est la
loi!
1382 civ. code

Faute   =>   Dommage

Réparation (indemnité)
A cause des pénalités!
• https://commons.wikimedia.org/wiki/File:Parking_ticket_in_Cambridge_(
  2008-04-01).jpg
Amendes administratives
 Because of the administrative Fines!
 (up to 20M EUR /4% annual turnover)

         jusque
       20M EUR
/ 4% ch. affaires mondial
A cause des
autres mesures
correctives!

     https://pixabay.com/nl/startonderbreker-wiel-klauw-1258099/
telles que
 Because of the administrative Fines!

•suspension des traitements
 (up to 20M EUR /4% annual turnover)

          et des flux
         •limitation
    définitive/temporaire
    • Interdiction totale
Parce que vos clients le
          demandent!
Client = personne concernée,
  Because of the administrative Fines!
  (up to 20M EUR /4% annual turnover)
  responsable de traitement, ou
       tout autre client avisé

Vous = responsable / sous-traitant
Parce que la concurrence
               vous observe!
Activité illégale
            =
 Pratique déloyale du
       commerce
(actions en cessation,
   indemnisation,…)
Parce que votre réputation est
en jeu!

       Everywhere on the web (+10 pages results on google imates)
       : author not found
Because of the administrative Fines!

La mise en conformité et
 (up to 20M EUR /4% annual turnover)

  la gestion de données
   sont une question de
        confiance…
Résumé : en cas d’infraction,
   d’où viennent les menaces??

• Autorité de supervision
• Clients
• Concurrents
• Personnes concernées
  (! Actions collectives)
De la DIRECTIVE 95/46/EC => au RGPD

Maintenant : Directive vie privée
EU: Directive 95/46/EC
BE: Loi du 8 décembre 1992 + A.R. + lois spécifiques

RGPD : 25 MAI 2018
EU: Règlement 2016/679 (GDPR)
BE: Lois spécifiques
Obligations du responsable : DIRECTIVE
• Légalité du traitement
• Déclaration auprès de la commission vie privée

• Information aux personnes concernées
• Respect des droits des personnes concernées (accès,
  rectification, objection)
• Confidentialité et sécurité des traitements
  => Mesures / sous-traitant contrôlé

• Transferts hors EU
Obligations du responsable : RGPD
• Légalité du traitement
• Déclaration auprès de la commission vie privée
          Gouvernance & “Accountability”       registre
• Information aux personnes concernées         étendu
• Respect des droits des personnes concernées (accès,
  rectification, objection)    + limitation, portabilité, …
• Confidentialité et sécurité des traitements
  => Mesures / sous-traitant contrôlé      contrat étendu
  “Protection dès la conception” & “Protection par défaut”
  DPD (DPO)                  Analyse d’impact
  notification violation de données
• Transferts hors EU          + obligations du sous-traitant!
Principes généraux à respecter
                     (inchangés)

• Traitement licite, loyal & transparent           Licéité
• Finalités déterminées, explicites &             Finalité
  légitimes + réutilisation compatible
                                           Minimisation
• Données adéquates, pertinentes,
   non-excessives (nécessité)           Proportionnalité

• Données exactes et à jour                     Intégrité

• Durée non excessive                Rétention minimale

• Protection adéquate                            Sécurité
Bases légales de traitement
              (inchangées, sauf…)
• Obligation légale
• Exécution du contrat
---------------
• Intérêt légitime > intérêts p. concernée
=> analyse d’impact!         “Risk-based approach”
• Consentement Étendu (déf. /formulaires /mineurs)
---------------
• Protection d’intérêts vitaux
• Intérêt public
Sécurité
• Mesures organisationnelles et techniques appropriées par
  rapport aux risques, en ce compris, e.a., selon les besoins:
  – pseudonymisation et chiffrement des données;
  – Assurer la confidentialité, l’integrité, la disponibilité et la resilience
    constante des systèmes et services;
  – Possibilité de rétablir la disponibilité et l’accès aux données à temps en
    cas d’incident physique ou technique;
  – Procédure de test, évalutation et analyse de l’efficacité des mesures
• Approche basée sur le risque
• Considérer : adhérence à un code de conduite approuvé ou la
  certification
• Garder le contrôle sur les employés & sous-traitants
  (politiques de respect de la vie privée, contrôle des accès, …)
NEW   Privacy by design / Privacy by default
• Protection dès la conception : intégrer les mesures de
  sauvegarde nécessaires au sein du traitement (au moment de
  la détermination des moyens) (pseudonymisation,
  minimisation des données,…)
• Par défaut, traiter seulement les données nécessaires au
  regard de chaque finalité spécifique du traitement .
  Cela s'applique
  – à la quantité de données collectées,
  – à l'étendue de leur traitement
  – à leur durée de conservation et à leur accessibilité
  Par défaut, les données ne sont pas rendues accessibles à un
  nombre indéfini d’individus (ex. réseaux sociaux)
NEW                 Analyse d’impact

• Si risque élevé (e.a. nouvelle techno), + en tous cas si
  – décision automatisée (+profiling) à effet significatif
  – Traitement à grande échelle de données sensibles
  – surveillance systématique à grande échelle d'une zone
    accessible au public
  – + vérifier liste de l’autorité de contrôle
• Avant le traitement : analyse d’impact
• Consultation préalable de l’autorité de contrôle si
  l’analyse indique qu’il y aurait des risques élevés en cas
  d’absence de mesures prises par le responsable pour
  aténuer le risque.
EXT.                Sous-traitants

• Faire appel à des sous-traitants qui fournissent les
  garanties suffisantes sur l’adoption et le respect de
  mesures techniques et organisationnelles appropriées
• Traitement: que sous instructions du responsable
• CONTRAT (!) : étendue, durée, nature, finalités du
  traitement, type de données, catégories de personnes
  concernées, obligations et droits du responsable…
• CLAUSES (voir RGPD)
• COMMISSION / Autorité de contrôle : adoption de
  clauses types (?)
TRADE
SECRETS
TOWARDS EU HARMONISATION
• International treaties (Paris, Trips,…)
• Discrepancies between national laws
• No general (horizontal) law in BE
 • Protection of know-how & trade secrets in employment
   agreements
 • Obligation of Professional Secrecy for specific professions(e.g.
   lawyers, public notaries)
 • Honest Trade Practices / unfair competition
 • Contract law (NDA)
Directive (EU) 2016/943 of the European
Parliament and of the Council of 8 June 2016 on
the protection of undisclosed know-how and
business information (trade secrets) against their
unlawful acquisition, use and disclosure (Text with
EEA relevance) => transposition 9 JUNE 2018
Definitions
• ‘trade secret’ means information which meets all of the
  following requirements:
  (a) it is secret in the sense that it is not, as a body or in
  the precise configuration and assembly of its
  components, generally known among or readily accessible
  to persons within the circles that normally deal with the
  kind of information in question;
  (b) it has commercial value because it is secret;
  (c) it has been subject to reasonable steps under the
  circumstances, by the person lawfully in control of the
  information, to keep it secret;
Definitions
• ‘trade secret holder’ means any natural or legal
  person lawfully controlling a trade secret;
• ‘infringer’ means any natural or legal person who
  has unlawfully acquired, used or disclosed trade
  secrets;
• ‘infringing goods’ means goods whose design [in fr
  "conception"], characteristics, functioning,
  manufacturing process or marketing significantly
  benefits from trade secrets unlawfully acquired,
  used or disclosed.
Lawful acquisition, use and disclosure
• The acquisition of trade secrets shall be considered lawful
   when they are obtained by any of the following means:
(a) independent discovery or creation;
(b) observation, study, disassembly or test of a product or object
   that has been made available to the public or that it is lawfully
   in the possession of the acquirer of the information who is free
   from any legally valid duty to limit the acquisition of the trade
   secret;
(c) exercise of the right of workers or workers' representatives to
   information and consultation in accordance with Union and
   national law or practices;
(d) any other practice which, under the circumstances, is in
   conformity with honest commercial practices.
Lawful acquisition, use and disclosure

• The acquisition, use and disclosure of trade secrets
  shall be considered lawful to the extent that such
  acquisition, use or disclosure is required or allowed
  by Union or national law.
Unlawful acquisition, use and disclosure
• The acquisition of a trade secret without the consent
   of the trade secret holder shall be considered
   unlawful, whenever carried out by:
(a) unauthorised access to, appropriation of, or copy of
   any documents, objects, materials, substances or
   electronic files, lawfully under the control of the trade
   secret holder, containing the trade secret or from
   which the trade secret can be deduced;
(b) any other conduct which, under the circumstances, is
   considered contrary to honest commercial practices;
Unlawful acquisition, use and disclosure

• The use or disclosure of a trade secret shall be
   considered unlawful whenever carried out, without
   the consent of the trade secret holder by a person
   who is found to meet any of the following conditions:
(a) have acquired the trade secret unlawfully;
(b) be in breach of a confidentiality agreement or any
   other duty not to disclose the trade secret;
(c) be in breach of a contractual or any other duty to
   limit the use of the trade secret.
Unlawful acquisition, use and disclosure
• The acquisition, use or disclosure of a trade secret shall also be
  considered unlawful whenever a person, at the time of
  acquisition, use or disclosure, knew or should, under the
  circumstances, have known that the trade secret was obtained
  directly or indirectly from another person who was using or
  disclosing the trade secret unlawfully within the meaning of
  paragraph 3.

• The production, offering or placing on the market of infringing
  goods, or import, export or storage of infringing goods for
  those purposes, shall also be considered an unlawful use of a
  trade secret when the person carrying out such activities knew,
  or should, under the circumstances, have known that the trade
  secret was used unlawfully within the meaning of paragraph 3.
Exceptions
• Member States shall ensure that the application for the measures,
    procedures and remedies provided for in this Directive is dismissed when
    the alleged acquisition, use or disclosure of the trade secret was carried
    out in any of the following cases:
(a) for exercising the right to freedom of expression and information as set
    out in the Charter of Fundamental Rights of the European Union,
    including respect for freedom and pluralism of the media;
(b) for revealing a misconduct, wrongdoing or illegal activity, provided that
    the respondent acted for the purpose of protecting the general public
    interest;
(c) the trade secret was disclosed by workers to their representatives as part
    of the legitimate exercise of their representative functions in accordance
    with Union or national law, provided that such disclosure was necessary
    for that exercise;
(d) for the purpose of protecting a legitimate interest recognised by Union
    or national law.
Measures, procedures and remedies
GENERAL CHARACTERISTICS :
• fair and equitable;
• not unnecessarily complicated or costly + timely
• effective and dissuasive
• proportionate
• no barrier to trade
• safeguards against abuses

LIMITATION PERIOD : (national law - not exceeding 6 y.)

LEGAL PROCEEDINGS : Preservation of confidentiality of
  trade secrets in the course of legal proceedings
Measures, procedures and remedies
CIVIL REDRESS :
• Provisional and Precautionary Measures (provisional
  cessation, prohibitions to use or disclose the TS,
  prohibition to produce, offer,… infriging goods,
  seizures,…)

  evidence : a TS exists / applicant holds the TS / TS
  “infringement”

  consider : value / the measures taken to protect the
  trade secret / conduct of the respondent / impact /
  legitimate interests / public interest/ and safeguard of
  fundamental rights.
Measures, procedures and remedies
CIVIL REDRESS :
• Injunctions and corrective measures (cessation,
  prohibition, destruction of document, recall/destruction
  of infringing goods,…)

  Same considerations : value, protection measures,…

• Indemnities for dammages

• Publication of the decision
NIS
DIRECTIVE (EU) 2016/1148 of 6 July 2016
concerning measures for a high common level of
security of network and information systems across
the Union
Transposition deadline: 10 May 2018.
By 9 November 2018, for each sector and subsector
referred to in Annex II, Member States shall identify
the operators of essential services with an
establishment on their territory.
NIS Directive (2016/1148) of 6 July 2016
• Any Member State adopts national strategy on the security of
  network and information systems
• Cooperation Group : cooperation and the exchange of
  information among Member States
• Each Member State has a computer security incident
  response team (CSIRT)
• A Network between CSIRTs is created
• Security and notification requirements for
   – operators of essential services (energy, transport,
      banking, financial market infrastructures, health, drinking
      water supply) and
   – digital service providers (online market place, search
      engine, cloud service)
• Network and information system:
- electronic communications network: transmission systems and,
where applicable, switching or routing equipment and other resources
which permit the conveyance of signals by wire, by radio, by optical or
by other electromagnetic means, including satellite networks, fixed
(circuit- and packet-switched, including Internet) and mobile terrestrial
networks, electricity cable systems, to the extent that they are used
for the purpose of transmitting signals, networks used for radio and
television broadcasting, and cable television networks, irrespective of
the type of information conveyed;
- any device or group of interconnected or related devices, one or
more of which, pursuant to a program, perform automatic processing
of digital data; or
- digital data stored, processed, retrieved or transmitted by elements
covered under points (a) and (b) for the purposes of their operation,
use, protection and maintenance.
• Operator of essential services: a public or private entity of a type
  referred to in Annex II (energy, transport, banking, financial market
  infrastructures, health sector, drinking water supply and
  distribution, digital infrastructures) which meets the criteria laid
  down in Article 5(2) ( a)service which is essential for the
  maintenance of critical societal and/or economic activities; b)the
  provision of that service depends on network and information
  systems; c) an incident would have significant disruptive effects on
  the provision of that service);

• Digital service provider: any legal person that provides a digital
  service (service within the meaning of point (b) of Article 1(1) of
  Directive (EU) 2015/1535 of the European Parliament and of the
  Council (17) which is of a type listed in Annex III) (online
  marketplace, online search engine, cloud computing services)
• Appropriate and proportionate technical and organisational
  measures to manage the risks posed to the security of network and
  information systems.
• Having regard to the state of the art, those measures shall ensure a
  level of security of network and information systems appropriate
  to the risk posed, [Digital Services] and shall take into account the
  following elements:
   – the security of systems and facilities;
   – incident handling;
   – business continuity management;
   – monitoring, auditing and testing;
   – compliance with international standards.
• Appropriate measures to prevent and minimise the impact of
  incidents affecting the security of the network and information
  systems used for the provision services, with a view to ensuring the
  continuity of those services.
• Obligation to notify, without undue delay, the
  competent authority or the CSIRT of incidents having a
  significant impact on the continuity of the services they
  provide. Notifications shall include information enabling
  the competent authority or the CSIRT to determine any
  cross-border impact of the incident.
Philippe LAURENT

                              philippe.laurent@mvvp.be
                Avocat – Marx Van Ranst Vermeersch & Partners (MVVP)
                                    DPO as a service

Propriété intellectuelle         (droit d’auteur, marques, dessins et modèles, brevets, noms
commerciaux, noms de domaines, bases de données, confidentialité, secrets d’affaire,…) :
protection, gestion, stratégie, avis, clearing, contrats, licensing, contentieux.
Droit des TICs :  E-commerce, droit de l’internet, cloud computing, outsourcing, software,
open source, services, SLAs, terms of use, responsabilités, garanties, supply chains
management,…
Droit commercial et de la distribution           : contrats, litiges, e-commerce, distribution,
franchise, agence, pratiques du marché, protection des consommateurs, publicité, marketing,
promotion, jeux, aspects régulatoires, normes,…
Protection des données et de la vie privée                     : stratégie, avis, compliance,
contentieux, gestion des données sensibles et critiques, traitements complexes, «
whistleblowers », contrôle des employés, outsourcing, transferts hors EU, privacy policies,…
Vous pouvez aussi lire