Identifying the responsible party for incidents
The European Parliament’s briefing paper on the “Metaverse – opportunities, risks and policy implications”*, rightfully points out the increasingly “blurred roles” between parties in the metaverse and the fact that “the multitude of entities present in the metaverse will create a web of relationships, making it very difficult to determine responsibilities and liabilities”**.
Identifying the responsible party for incidents
The European Parliament’s briefing paper on the “Metaverse – opportunities, risks and policy implications”*, rightfully points out the increasingly “blurred roles” between parties in the metaverse and the fact that “the multitude of entities present in the metaverse will create a web of relationships, making it very difficult to determine responsibilities and liabilities”**.
Global cyber incident / data breach reporting obligations generally apply to entities that control, hold or process personal data. However, in one user experience in the metaverse alone, there may be multiple controllers and processors and roles can change frequently depending on how interactions and data processing operations related to the user experience change or evolve. For example, if a user purchases a ticket (e.g. in the form of a NFT) to watch a concert in a virtual world, there may be multiple data controllers and processors for different data elements of that user experience:
- the platform operator/creator of the virtual world will be a controller over the data it collects and processes directly from a user, such as a user’s online identifiers and user’s activity, in order to provide the user’s experience in the metaverse
- the brand owner (concert artist) will also be controller over any data it collects from users who attend the concert. The platform operator may act as a processor in helping collect and provide this data to the brand owner
- the platform operator and the brand owner may also be joint controllers*** over various analytics gathered from users when in attendance at the concert
- the wallet provider and NFT marketplace are likely to be controllers over various aspects of the financial data used to power the transaction, but may also have roles as processors
- each of the parties may engage processors/sub-processors for specific elements of data processing required during the experience
Mitigating risks
Any organization operating in the metaverse should be mindful that it may be sharing data with partners/third parties far more frequently, in increasingly complex scenarios. But complexity is unlikely a compelling defense when regulators and plaintiffs begin inquiring about data security incidents. So companies that are building and operating in the metaverse should strongly consider taking steps to define respective roles for themselves, for their contractual relationships, and for the Terms & Conditions well in advance of a data breach:
Contracts and Terms of Use
- a truly decentralized and interoperable metaverse will require the free movement of data between different operators/platforms to enable users’ digital assets to move across platforms. In the background, this will require organizations to have established bilateral or multilateral data processing/data sharing agreements as well as direct terms and conditions with users
- the interoperability of services may warrant extra breach cooperation and assistance provisions in agreements, or indeed reciprocal powers of audit
- also, there should be a renewed focus on liability positions – in practice it may not be so easy for users to immediately distinguish which party is responsible for an incident, so it is important to ensure that any damage to reputation, or associated costs from PR remediation, are sufficiently covered
Maintain Risk / Impact Assessments and Access Control Lists
- understand who has access to any data you hold or control and make sure you understand the sensitivity of that data and that appropriate security is in place relative to any risks. Also make sure that appropriate impact assessment has been undertaken in a documented form prior to collecting and further processing user data
Avatar Integrity and Measures Aimed at Preventing Misuse
- apply proper identity verification schemes to help prevent misidentification, identity theft and other misuse of identity and information, and implement additional data security measures to help avoid excessive data concentration****
User acknowledgments (e.g. “you are entering a public space; by entering you acknowledge that what you do and say here is not private;” “you are entering a private space,” “only authorized users may enter,” etc.)
Key legal risks / issues
- blurring of data processing across multiple organizations, as well as different roles in complex web of data sharing
- more difficult to identify the party responsible for notification of incidents
- take steps to define respective roles and appropriately allocate liability in user T&Cs and contractual relationships, well in advance of a data breach
- conduct risk assessments and mitigate identified risks where possible
Questions to consider
- are you clear on when your organization is controller of personal data?
- are all data sharing arrangements with third parties mapped?
- have contractual arrangements been reviewed to ensure controller roles are clear, that they allocate liability appropriately, that they contain appropriate breach notification obligations and breach cooperation provisions?
- what risks are associated with your processing activities in the metaverse? How likely would it be that an incident would result in harm to the impacted individuals?
- are there any ways to mitigate your risks contractually (limiting liability) or through technical controls / user acknowledgements?
** Link to Briefing Paper - see page 5.
*** Joint Controllership occurs “where two or more controllers jointly determine the purposes and means of the processing of personal data” – and this attracts specific obligations under Article 26 UK/EU GDPR
**** Link to Briefing Paper - see page 9.
Find out more by viewing our three Cybersecurity and Data Breaches issues:
Contact
Paula Barrett
Co-Lead of Global Cybersecurity and Data Privacy paulabarrett@eversheds-sutherland.com View Paula Barrett's full contact details
Michael Bahar
Co-Lead of Global Cybersecurity and Data Privacy michaelbahar@eversheds-sutherland.com View Michael Bahar's full contact details
Jonathan Palmer
Shaping the future
Digitalization and corporate digital responsibility (CDR)
Businesses are forecast to spend $10 trillion over a five-year period on digital transformation. Digitalization is game-changing. But it comes with numerous risks, challenges and obligations that need to be understood and navigated to stand the best chance of success.
Our global report highlights key findings on the uptake of digital technologies, future strategies and M&A activities, perceived risks, challenges and approaches to using, developing, buying or selling digital technology responsibly.