On 12 September 2023, the UK Information Commissioner, John Edwards, and the Chief Executive of the National Cyber Security Centre (“NCSC”), Lindy Cameron, signed a joint memorandum of understanding (“MoU”) detailing how the Information Commissioner’s Office (“ICO”) and NCSC will work together moving forward.

The MoU does not create legally binding obligations between the ICO and NCSC, but provides a strong signal of intent for areas of cooperation.  The statements about information sharing and engaging with NCSC leading to potentially reduced fines under the UK GDPR are likely to be of particular interest to commercial organizations.

Areas of Cooperation

The ICO and NCSC have committed to working together in the following areas:

  • Cyber Security Guidance:  Both parties will work together to support the development of guidance, including the NCSC’s Cyber Assessment Framework, and encourage adoption by industry;
  • Regulated Organizations:  The NCSC will support continuous improvement in cyber security amongst the organizations that the ICO regulates by, for example, providing technical advice to the ICO regarding cyber security risk management;
  • Information Sharing:  To help encourage organizations to approach NCSC the MoU makes the following point about information sharing:

“For the avoidance of doubt, the NCSC will not share information from an organisation it is engaged with due to a cyber incident with the Commissioner unless it has the consent of the organisation to do so. Disclosure of such information to the Commissioner, without consent, may be a breach of the duty of the Director of GCHQ set out in section 4(2) of the Intelligence Services Act 1994, which requires that no information is disclosed by GCHQ except so far as it is necessary for the proper discharge of GCHQ’s statutory functions or for the purpose of any criminal proceedings.”

The MoU states that the “NCSC and the Commissioner will share information to the extent permitted by law”, including in relation to “relevant cyber threat information with the Commissioner, including cyber threat assessments that are likely to affect Relevant Digital Service Providers (as defined under the NIS Regulations) and other organisations regulated by the Commissioner.”

ICO will share information about cyber security incidents with the NCSC on an anonymous, systemic and aggregate basis.  The ICO may also share specific details relating to an incident of national significance;

  • Direct NCSC Support:  The NCSC will support the ICO’s own cyber security by providing technical tools and guidance, including if the ICO is subject to a serious cyber security incident;
  • Deconfliction:  The MoU makes it clear that “where organisations report an incident to the NCSC and the NCSC identifies that the case may be legally reportable to Commissioner, the NCSC will remind organisations to be mindful of their regulatory obligations, but will not opine on whether an organisation may be under an obligation to notify nor make notifications to the Commissioner on the organisation’s behalf .”  Where the ICO and NCSC are both engaged on a cyber security incident, they will endeavor to minimize disruption to the affected organization’s ability to mitigate harm.  Helpfully, the MoU recognizes that “the Commissioner’s incident response phase will seek to make sure organisations are able to prioritise engagement with the NCSC and/or its cyber incident response providers in the immediate aftermath of an incident to prioritise the mitigation of harm, identify the root cause of the incident, and take appropriate steps to prevent the incident reoccurring.”  Where it is necessary to involve different entities within the UK government, the NCSC will lead the coordinated response in its role as national technical authority (alongside other government departments where appropriate); and
  • Public Communications:  The ICO and NCSC will agree press releases in advance concerning incidents that involve both parties.

Regulatory Penalties

The ICO has committed under the MoU “on an increasing basis, [to] continue to recognize and incentivize appropriate engagement with the NCSC on cyber security matters,” including recognizing organizations that report to and work with the NCSC following a significant cyber incident.

Specifically, the ICO has agreed to publicize (on its website, in guidance, and in relevant press releases) that it “looks favorably” on “victims of nationally significant cyber incidents who report to and engage with the NCSC,” and that it will “consider whether it can be more specific on how such engagement might factor into its calculation of regulatory fines.”  An accompanying press release clarified that the ICO has committed to “exploring how it can transparently demonstrate that meaningful engagement with the NCSC will reduce regulatory penalties”.  

Moving Forward

The ICO and NCSC have agreed to monitor the operation of the MoU and review its provisions every two years.

__________________________

Will Capstick of Covington & Burling LLP contributed to the preparation of this article.

Print:
Email this postTweet this postLike this postShare this post on LinkedIn
Photo of Mark Young Mark Young

Mark Young is an experienced tech regulatory lawyer and a vice-chair of Covington’s Data Privacy and Cybersecurity Practice Group. He advises major global companies on their most challenging data privacy compliance matters and investigations. Mark also leads on EMEA cybersecurity matters at the…

Mark Young is an experienced tech regulatory lawyer and a vice-chair of Covington’s Data Privacy and Cybersecurity Practice Group. He advises major global companies on their most challenging data privacy compliance matters and investigations. Mark also leads on EMEA cybersecurity matters at the firm. In these contexts, he has worked closely with some of the world’s leading technology and life sciences companies and other multinationals.

Mark has been recognized for several years in Chambers UK as “a trusted adviser – practical, results-oriented and an expert in the field;” “fast, thorough and responsive;” “extremely pragmatic in advice on risk;” “provides thoughtful, strategic guidance and is a pleasure to work with;” and has “great insight into the regulators.” According to the most recent edition (2024), “He’s extremely technologically sophisticated and advises on true issues of first impression, particularly in the field of AI.”

Drawing on over 15 years of experience, Mark specializes in:

  • Advising on potential exposure under GDPR and international data privacy laws in relation to innovative products and services that involve cutting-edge technology, e.g., AI, biometric data, and connected devices.
  • Providing practical guidance on novel uses of personal data, responding to individuals exercising rights, and data transfers, including advising on Binding Corporate Rules (BCRs) and compliance challenges following Brexit and Schrems II.
  • Helping clients respond to investigations by data protection regulators in the UK, EU and globally, and advising on potential follow-on litigation risks.
  • Counseling ad networks (demand and supply side), retailers, and other adtech companies on data privacy compliance relating to programmatic advertising, and providing strategic advice on complaints and claims in a range of jurisdictions.
  • Advising life sciences companies on industry-specific data privacy issues, including:
    • clinical trials and pharmacovigilance;
    • digital health products and services; and
    • engagement with healthcare professionals and marketing programs.
  • International conflict of law issues relating to white collar investigations and data privacy compliance (collecting data from employees and others, international transfers, etc.).
  • Advising various clients on the EU NIS2 Directive and UK NIS regulations and other cybersecurity-related regulations, particularly (i) cloud computing service providers, online marketplaces, social media networks, and other digital infrastructure and service providers, and (ii) medical device and pharma companies, and other manufacturers.
  • Helping a broad range of organizations prepare for and respond to cybersecurity incidents, including personal data breaches, IP and trade secret theft, ransomware, insider threats, supply chain incidents, and state-sponsored attacks. Mark’s incident response expertise includes:
    • supervising technical investigations and providing updates to company boards and leaders;
    • advising on PR and related legal risks following an incident;
    • engaging with law enforcement and government agencies; and
    • advising on notification obligations and other legal risks, and representing clients before regulators around the world.
  • Advising clients on risks and potential liabilities in relation to corporate transactions, especially involving companies that process significant volumes of personal data (e.g., in the adtech, digital identity/anti-fraud, and social network sectors.)
  • Providing strategic advice and advocacy on a range of UK and EU technology law reform issues including data privacy, cybersecurity, ecommerce, eID and trust services, and software-related proposals.
  • Representing clients in connection with references to the Court of Justice of the EU.