Us-class and services organisation ABS Group of Companies, (ABS Group) has launched a new set of safety and risk-based services to support compliance to the 2021 Cyber Risk Management (CRM) guidelines recommended by the IMO. The IMO CRM guidelines encourage maritime organisations to address cyber risk management in a safety management system (SMS) no later than the first annual verification of the company’s Document of Compliance after 1 January 2021.

ABS Group’s says its new cyber security services will help clients understand how to align to the IMO guidelines and other accepted standards and build comprehensive cyber security capabilities that address enterprise and ship level cyber controls as identified in the IMO guidance. CRM capabilities will span both information technology (IT) and operational technology (OT) systems in accordance with IMO, BIMCO, National Institute of Standards and Technology Cyber Security Framework (NIST), ISO/IEC 27001 and other accepted standards.

“Using a ‘defence in depth and breadth’ approach, owners and operators must protect their critical assets with a comprehensive set of risk controls,” said Ian Bramson, Global Head of Cyber Security at ABS Group. “We are working closely with industry stakeholders and regulators to reduce cyber risk and lessen the impact of cyber incidents that can have serious financial, operational and environmental consequences. Looking beyond 2021 compliance, our Cyber Security consultants understand this is a long-term challenge that will continue to affect OT assets in an increasingly connected world. Building robust OT cyber security capabilities will provide better control, visibility and management of risk across maritime operations.”

ABS Group’s cyber security portfolio offers risk-based capabilities at every stage of cyber defence and includes the proprietary Cyber Risk Reduction and Cyber Risk Rating (CybeR2) program. CybeR2 builds on the award-winning ABS FCI Cyber Risk Model developed with the Maritime Security Center, a U.S. Department of Homeland Security Center of Excellence.

 

Source: shipinsight


Cyber defence expert Naval Dome and the offshore division of a supermajor have completed a joint project to identify and mitigate cyber risks common to offshore deepwater drilling rigs.

Findings from the two-year project, culminating in the installation and pilot testing of Naval Dome’s Endpoint cyber defence system aboard drilling rigs in the Gulf of Mexico, indicate that the minimum industry guidelines, regulations and security techniques are out of step with current platform technology, connectivity requirements and cyber-attack methodology.

In a joint research paper presented at an Offshore Technology conference in Houston last week, the authors state: “Activities over two years have demonstrated shortfalls and real challenges that need to be addressed if we are to create a more cyber-secure deepwater drilling rig environment.”

In presenting the Cyberdefence of Offshore Deepwater Drilling Rigs paper to conference delegates, Adam Rizika, Head of Strategy, Naval Dome, said: “Where systems installed on offshore platforms had traditionally been isolated and unconnected, limiting cyber hack success, the increase in remote monitoring and autonomous control, IOT and digitalisation has made rigs much more susceptible to attack.”

Going on to reveal how the test rigs’ OT (operation technology) networks were penetrated using a software installation file for dynamic positioning (DP) and workstation charts, Rizika, explained that Naval Dome simulated an OEM service technician unwittingly using a USB stick with malicious software containing three zero-day exploits.

“The modified file was packaged in a way that looked and acted like the original one and passed anti-virus scanning without being identified as a cyberattack or picked up by the installed cyber network traffic monitoring system,” he said.

Although the attack was carried out internally, Rizika noted remote execution was feasible using the rig’s externally facing network connections.

“Penetration testing confirmed how a targeted cyber attack on a deepwater drilling rig could result in a serious process safety incident, with associated financial and reputational impact,” he said.

In the paper, the authors state that pilot tests confirm traditional, “perimeter type” IT transplanted OT cyber security solutions, such as anti-virus, network monitoring and firewalls, are not enough to protect critical safety and processing equipment from attack, leaving rigs vulnerable.

“It is abundantly clear that more advanced purpose-built solutions are needed to better protect an offshore platform from exposure to external and internal cyber attacks, whether targeted or otherwise,” reported Rizika.

The paper goes on to highlight a shortage of OT cyber domain skilled staff, regulation and controls that are slow to evolve and be implemented, an IT-centric approached being applied to an OT environment, and a mismatch between drilling rig systems and equipment and their supporting software.

Rizika said: “Although industry guidelines and regulations offer minimum standard requirements, we found the advancement in rig technology, connectivity and cyber-attack methodology has outpaced the regulations, driving the need for a more comprehensive approach.”

Commenting on the project’s findings, Naval Dome Chief Executive Officer Itai Sela, said: “The project and successful pilot testing of a multi-layer cyber defence solution aboard these rigs has demonstrated that both new and legacy OEM systems can be better protected from internal and external cyberattack vectors, without the need for expensive equipment upgrades, or higher overheads that lead to an increase in total cost of ownership.

“Results to date demonstrate that the endpoint system is robust and can operate without interfering with ongoing rig operations. The cost of upgrading the obsolete systems is high, and even if upgrades are undertaken vulnerabilities can still remain.”

By approaching the problem differently, Naval Dome and the oil major  believe that the attainment of a cyber resilient environment can be accelerated onboard offshore installations at a critical time for the industry.

 

Source: maritime-executive


On August 20, 2021, the National People’s Congress Standing Committee finally passed the Personal Information Protection Law, which aims to establish a personal information protection system with Chinese features and, meanwhile, in line with international standards. It provides a variety of rights for personal information subjects to strengthen their control of personal information, while imposing strict obligations to personal information handlers. The law shall enter into force on November 1, 2021, leaving companies less than three months to prepare for their compliance obligations. Therefore, we would introduce the law in comparison to the EU General Data Protection Regulation to help companies better understand the key points and provide companies with preliminary guidance.

The publication of the EU General Data Protection Regulation (“GDPR”) in April 2016 (effective May 2018) may be regarded as the beginning of a wave of data privacy rules across the globe. Following the trend, China passed its first comprehensive law regulating personal information protection on August 20, 2021, namely the Personal Information Protection Law[1] (“PIPL”), which will come into effect on November 1, 2021.

As a law dedicated to personal information protection, the PIPL tracks the GDPR in many perspectives. For example, both laws enjoy extraterritorial reach, provide various rights for personal information subjects, impose high administrative fines (PIPL sets a fine up to RMB 50 million or 5% of annual revenue) for infringements, and set joint liability upon the entities who jointly conduct data processing activities. However, the PIPL retains unique Chinese features, reflecting the government’s regulatory approach toward personal information, especially from the perspectives of cross-border personal information transfer and the public interest litigation system. In short, in addition to protecting the rights and interests of personal information subjects, the PIPL also aims to safeguard national security and public interests.

Considering the PIPL would significantly impact the Chinese data protection legal framework, companies need to heed China’s “GDPR.”  To better understand the regulations of the PIPL, we would compare it with the GDPR in the following aspects:

TERRITORIAL SCOPE

According to PIPL Article 3, the law primarily regulates how personal information[2] is handled within the territory of the People’s Public of China (“PRC”), regardless of whether the entity that conducts handling activities has an establishment within the PRC.

As cross-border data transfers are essential in a globalized world, entities outside of China routinely may come into the possession or control of personal information relating to natural persons in China. The possession or control of this data adds both the risks for personal information infringement and the difficulty of personal information protection. It is thus important to include clauses for extraterritorial reach in the data protection legislation to better protect the interests of individuals, as well as maintain social stability and national security.

Therefore, it is not surprising to see that both the GDPR and the PIPL provide provisions regarding extraterritorial effects. PIPL Art. 3 states that it shall also apply to handling activities outside the territory of the PRC regarding the personal information of natural persons inside the territory of the PRC under certain circumstances. Examples include the provision of products or services from outside of the PRC to natural persons within the PRC. Other instances include where an entity outside of the PRC analyzes or assesses activities of natural persons within the PRC.

These concepts within the PIPL are not unfamiliar. The GDPR also applies to the processing of personal data of data subjects who are in the EU by a controller or processor not established in the EU, where the processing activities are related to the offering of goods or services to such data subjects in the EU or the monitoring of their behavior takes place within the EU. To confirm whether the processing activities are related to the offering of goods or services, the GDPR further clarifies that, factors such as the use of a generally used language or currency in the States with the possibility of ordering goods and services in that other language, or the mentioning of customers or users who are in the EU may be considered, which to some extent helps us better understand the provision in the PIPL.

RIGHTS OF THE PERSONAL INFORMATION SUBJECTS

The PIPL provides abundant rights for personal information subjects, such as the right to know, the right to decide on, and the right to limit or refuse the handling of their personal information by others. Individuals also enjoy the right to access and copy their personal information from personal information handlers,[3] the right to request correction or completion of their personal information, the right to withdraw consent, and the right to request that personal information handlers explain the handling rules. Under certain circumstances, the PIPL grants individuals the right to delete, such as when the handling purpose has been achieved, is impossible to achieve, or is no longer necessary to achieve.

Although adopting different terms, the data subjects enjoy similar rights under the GDPR, such as the right of access, the right to rectification, the right to be forgotten, the right to object, etc. It is worth noting that the PIPL imposes higher obligations on the personal information handlers regarding the individual’s right to know. For example, when providing personal information to other parties, regarding the scope of notification of the recipients’ information, while the PIPL requires personal information handlers to notify individuals about the name/personal name and contact method of the receiving party, the data controller only needs to notify the data subjects about the categories of recipients under the GDPR.

In addition, the GDPR provides individuals with the right to data portability, which also appears in the PIPL after its third review. PIPL Art. 45 states that where individuals request that their personal information be transferred to a personal information handler they designate, if such request meets conditions set up by State cyberspace administrations, personal information handlers shall provide a channel to transfer it. The GDPR provides more clear regulations regarding this right, stating that the data shall be transferred in a structured, commonly used and machine-readable format, and the data subject shall only exercise the right under certain circumstances, i.e., when the lawful basis for processing the data is consent or for the performance of a contract, and the processing is carried out by automated means. It is recognized that the right to data portability better enables the individual’s control of personal information and to some extent promotes the data flow between different platforms. However, it may generate technical difficulties for small-scale businesses as well as aggravate unfair competition between companies for data assets. Considering PIPL Art. 45 emphasizes that the right to data portability shall be exercised subject to the conditions set by the State cyberspace administrations, we can anticipate that the administrations will release further regulations to better implement the rule.

PERSONAL INFORMATION EXPORT MECHANISMS

The PIPL imposes clear obligations on the provision of personal information to any foreign parties. PIPL Art. 38 provides three mechanisms for exporting personal information out of the PRC, depending on the type of personal information handlers who need to provide personal information outside the PRC for business or other such purposes.

Critical information infrastructure operators[4] and personal information handlers processing personal information reaching certain volumes shall store personal information collected and produced within the PRC domestically. Where such personal information must be provided across borders, the PIPL requires that such cross-border provision pass a security assessment administered by the State cyberspace administrations. Unfortunately, there is a lack of clear guidance on assessment procedures and standards at the current stage.

As for other personal information handlers, the PIPL provides two additional mechanisms for their cross-border personal information provision needs, namely 1) obtaining personal information protection certification; or 2) concluding a standard contract formulated by the State cyberspace administrations with the foreign receiving party.

The two export mechanisms can also be found in the GDPR. GDPR Art. 46 stipulates that a controller or processor may (in the absence of an adequacy decision) transfer personal data to a third country or an international organization only if the controller or processor has provided appropriate safeguards, and on the condition that enforceable data subject rights and effective legal remedies for data subjects are available. GDPR recognizes, inter alia, both standard contractual clauses and approved certification mechanisms as “appropriate safeguards.”

However, the PIPL also provides exemptions for the above mechanisms that the provision of personal information abroad can be conducted in the ways stipulated in the treaties or international agreements concluded or acceded to by the Chinese government.

Overall, the PIPL imposes more restrictions on the cross-border provision of personal information than the GDPR does. The PIPL provides fewer legal bases for the export of personal information. Additionally, to provide personal information abroad, personal information handlers shall conduct a personal information protection impact assessment in advance, fulfill its notification obligations to the individual, and obtain the individual’s separate consent, as well as adopt necessary measures to ensure that foreign receiving parties’ personal information handling activities reach the standard of protection provided in the PIPL.

LEGAL LIABILITIES

Many companies are quite concerned about the GDPR due to its tough fines, which could be up to €20 million, or 4% of a company’s worldwide annual revenue from the preceding financial year, whichever amount is higher. The PIPL also may fine up to RMB 50 million or 5% of a company’s turnover in the previous year (it is unclear how the 5% will be calculated and whether it refers to turnover in China or worldwide). The authorities may also order the suspension of related business activities, or cessation of business for rectification, cancellation, or corresponding professional licenses or business permits.

The directly responsible person in charge and other directly responsible personnel are fined up to RMB 1 million and may also be prohibited from holding the positions of director, supervisor, high-level manager, or personal information protection officer for a certain period.

In addition to the administrative liabilities mentioned above, the PIPL provides civil and potential criminal liabilities. Civil liabilities include penalties for damages and losses to the individual. Joint personal information handlers would bear joint liability if their personal information handling activities harm individuals’ personal information rights and interests and result in damages. PIPL Art. 70 further establishes a public interest litigation system, stating that the People’s Procuratorates (the Prosecutor General’s Office in common parlance), statutorily designated consumer organizations, and organizations designated by the State cyberspace administrations may file a lawsuit if the rights and interests of many individuals are infringed by the personal information handlers. Criminal liability would be pursued depending on the type of violation.

CHINA-SPECIFIC PROVISIONS

As mentioned above, the PIPL provides some provisions with strong national features, which indicates that the government has considered personal information protection to be an important issue for national security. For example, PIPL Art. 41 prohibits personal information handlers to provide any personal information stored within the PRC to any foreign judicial or law enforcement agencies without approval of the authorities. PIPL Arts. 42-43 further provide regulations for extraterritorial and reciprocal protection systems, specifying that the government may put the foreign entities on a list limiting or prohibiting personal information provision if they engage in any personal information handling activity harming the national security or public interests of the PRC, and adopt retaliatory measures against any country or region adopting discriminatory prohibitions, limitations, or other similar measures against the PRC in the area of personal information protection.

To summarize, the protection of personal information in China is not only a matter of securing the rights and interests of personal information subjects, but also an essential element of national security and public interests.

OBSERVATIONS AND SUGGESTIONS

As analyzed above, although the PIPL draws great inspiration from the GDPR, the PIPL imposes higher compliance obligations on companies from certain perspectives. For example, when transferring personal information abroad, individual’s “separate consent” of cross-border personal data transfer is required under PIPL. Therefore, companies that fall in the regulatory scope of the PIPL shall develop their compliance system accordingly, instead of relying on the GDPR system. It is worth noting that the PIPL would come into effect within less than three months, which would be a great challenge for companies due to its strict penalties and stringent obligations placed.

In this regard, we would suggest companies start considering the questions that may arise from the new law, such as:

  • Does the company need to set up a local data center?
  • Does the company need to update its data processing agreement with its third-party data processors?
  • How shall the company update its internal policies, such as personal information policies for employees or consumers?
  • What export mechanism can the company adopt in order to achieve its data transfer needs with foreign affiliates?

Considering the PIPL is overall legislation establishing the data protection framework and provides general principles for personal information handling activities and personal information handlers’ obligations, it somehow lacks detailed explanations. It is anticipated that the authorities would release further regulations and rules to provide companies with more guidance and implement the supervision work step-by-step.

 

Source: winston


OSMs recruitment services help maritime and offshore businesses who want to recruit the right people with the right expertise by increasing the speed of delivery and secure quality and compliance.

OSM Recruitment team has extensive experience across all types of vessels and offshore units. OSM has the industry’s leading pool of candidates where seafarers and offshore specialists register their CV and profile. Additionally, we have offices around the world on locations relevant to our clients and candidates. As a result, OSM can connect your business with talented seafarers and offshore specialists across the globe, being your recruitment partner in the maritime and offshore industry.

 

Source: osm.no


From 21 to 25 August 2021, the Multinational Maritime Coordination Centre (MMCC) of ECOWAS Zone F prepared and conducted the Operation Anouanze. The operation, led by Ghana and Cote d’Ivoire, was supported by UNODC through Danish funding and used data provided by Skylight and Trygg Mat Tracking.  Aiming to oversee the compliance with law at sea in the vast area connecting the EEZs of Ghana and Cote d’Ivoire, the operation was carried out thanks to a system of naval air assets pooled by the two countries and coordinated by the MMCC.

At the request of the participants, GoGIN sent a trainer to Abidjan to optimise the use of the YARIS communications and decision-making platform during the operation. The feedback on YARIS following Operation Anouanze highlights the value of the platform, which offers a single, comprehensive information system to use in situations where, in the past, several tools were required to achieve the same results.

 

Source: gogin


Piracy is no longer just a matter of gangs entering your yacht in the middle of the night. The threat of cyber space is building up rapidly, with the potential of posing even bigger risks, to the owners, their family and the crew. Good training can help.

This Cyber Security for Superyacht online course provides you with knowledge about common cyber attacks that the ship’s crew can face. Additionally, the course suggests best practices for the protection against cyber threats. As a result, all aboard are better protected.

This course aligns with:

The ISM Code (MSC.428 (98) Maritime Cyber Risk Management in Safety Management Systems)
MSC-FAL.1/Circ.3 Guidelines on maritime cyber risk management
ISO/IEC 27001 – Information Security Management, 2013
BIMCO Guidelines on Cybersecurity Onboard Ships(v4)

 

Source: stcw.online


In the last two decades, the cases of cyberattacks against Institutions have increased exponentially, so much so that they pose a real threat to the defense of the state and organizations.

As the global shipping and commerce industry becomes increasingly dependent on highly sophisticated technical equipment and software to keep it running efficiently, it also becomes more vulnerable to the risks that cyberattacks pose – herein lie the importance of maritime cyber security

SEAFUTURE is the convention on maritime and dual-use technologies, designed to provide civil or military Institutions and Organizations with the progress of science in the maritime industry and defense, also and above all about the theme of maritime cyber security.

From 29 September to 1 October 2021 Telsy will participate in the SEAFUTURE 2021 convention, at the naval arsenal of La Spezia, during which the major national and international defense and security players engaged in the maritime field will be present.

 

THE CYBER THREAT

Some of the major factors that make maritime cybersecurity such a topical topic are the proliferation of automated systems onboard ships, the integration of multiple systems, the growing ability to monitor systems remotely, and the fact that all of these systems rely on the Internet for their connectivity.

Ships and ports can be damaged by malware, system failures, and other harmful computer activities. That’s why maritime cybersecurity must be able to better protect and inform sea workers who rely on technology to assist them in everything from vessel navigation and control to cargo and shore management issues.

The Internet of Things (IoT) can make a home smart and more efficient, but at the same time make it vulnerable to hackers looking to disable its security system and steal the personal data of its occupants.

Ships that rely on advanced technologies can be equally vulnerable. For this reason, maritime cyber security is as much about the adoption of new technologies as it’s about the awareness of the susceptibilities that derive from that technology.

For further information, an article on the risks deriving from cyber threats is available on our blog.

 

MARITIME CYBER RISK

Maritime cyber risk aims to quantify how much a technological asset may be threatened by a potential circumstance or event, which could lead to operational, security, or compromise-related failures of information or systems. From these assumptions arises the need for effective maritime cyber risk management.

Cyber risk management refers to the process of identifying, analyzing, evaluating, and communicating an IT risk and accepting, preventing, transferring, or mitigating it at an acceptable level, considering the costs and benefits of the actions taken by the stakeholders.

In this sense, cybersecurity represents a conditio sine equa non to affirm substantial success for the marine industry.

 

THE MARITIME EMPOWERMENT

Italy – and the enlarged Mediterranean in general – is an essential crossroad for world trade and shipping. Located in the center of the Mediterranean basin and “closed” by the two most strategic “choke points” of the old continent (the Strait of Gibraltar and the Suez Canal), it has the potential to be the protagonist of the international maritime transformation.

With the growing need for greater quantities of traded goods and the newly formed Italian EEZ (Exclusive Economic Zone), the entire private and institutional maritime organization is in an epochal modernization and development process about its capabilities.

Among these, cyber security is an indispensable element for virtuous and far-sighted development.

 

TELSY AT SEAFUTURE 2021

During the SEAFUTURE 2021 convention, the hot topics in the fight against cybercrime and, in particular, maritime cyber security will be exposed. The event will be attended by the major exponents in the field of industry and maritime defense, both in the civil and military sides.

Competence Center of the TIM Group in the cyber and crypto sector, Telsy provides innovative security technologies to support strategic assets and critical infrastructures in the fight against maritime cybercrime.

On September 30 Telsy, in addition to exhibiting its technologies, will be the official sponsor of the main event dedicated to cybersecurity, during which Eugenio Santagata, CEO of the company, will speak.

 

Source: telsy


ATHENS, Aug 28 (Reuters) – A Togo-flagged cargo ship sank on Saturday after hitting Greek islets in the Aegean Sea but all 16 crew were rescued, the Greek coast guard said.

The freighter Sea Bird, which sailed from Ukraine and was bound for Tunisia, sent a distress signal after sailing into rocky islets in the southwestern Aegean Sea, the coast guard said in a statement.

Nearby vessels rescued all 16 Syrian crew, a coast guard official said.

It was not immediately clear what caused the accident.

Three anti-pollution vessels have rushed to the scene to check whether there was any leaking from the freighter, the coast guardadded.

(Reporting by Angeliki Koutantou; Editing by Angus MacSwan)

(c) Copyright Thomson Reuters 2021

 

SOURCE READ THE FULL ARTICLE

Togo-Flagged Cargo Ship Sinks In The Aegean Sea


(Reuters)–Spanish NGO Proactiva Open Arms located a wooden boat on Tuesday (August 31) in the Mediterranean Sea carrying 23 migrants, including 4 children, from Tunisia.

The boat was 21 miles off the coast of the Italian island of Lampedusa when staff on the Open Arms rescue boat “Astral” spotted the vessel.

“This family and the children and all of our friends that are here have left Tunisia because there is no money, no work, no food. Sixty percent have been sick with COVID and above all it is because there is no work, all shops are closed. The situation in Tunisia is very difficult,” said one of the migrants who did not give his name.

Open Arms staff on the “Astral” provided the migrants with life jackets and water before alerting the Italian Coast Guard to come to their rescue.

Unlike its bigger brother, the famous “Open Arms” tug ship, the “Astral” is not big enough to take migrants on board, so it accompanies migrant boats until an Italian Guardia di Finanza vessel arrives to provide assistance.

According to Italian interior ministry data, the number of migrants arriving in the country so far this year has more than doubled compared to last year.

(Production: Juan Medina, Catherine Macdonald)

(c) Copyright Thomson Reuters

 

SOURCE READ THE FULL ARTICLE

23 Migrants Rescued In Mediterranean Sea


(Bloomberg) —Hurricane Ida is shaking up grain exports in the U.S.’s busiest agricultural port, a problem that could balloon as the nation approaches its peak harvest season in the coming weeks.

Farmers in the Midwest will soon begin reaping corn and soybean crops, and a hefty percentage of it flows down the Mississippi River, where it’s then shipped around the world via the the Gulf of Mexico. The U.S. is the world’s biggest corn supplier. If grain elevators and port terminals are still dealing with outages and damage, that could back up exports.

Officials from some of the biggest trading houses, including Archer-Daniels-Midland Co., Bunge Ltd. and Cargill Inc., are already assessing damages to grain elevators and port terminals after Ida tore through Louisiana and Mississippi over the weekend. Boats and barges broke loose while the Mississippi River briefly flowed in reverse as the hurricane pulled sea water ashore.

Cargill’s port facility in Reserve, Louisiana, sustained significant damage and there’s no timetable for restarting, according to a company spokesperson.

ADM said it would reopen four grain elevators in New Orleans that were shut over the weekend depending on the impact of the storm. Bunge shuttered a grain terminal and soybean crush plant in Destrehan, Louisiana.

Global importers may soon start seeking alternatives, such as shipments off the U.S. Pacific Northwest or out of Brazil and Argentina.

–With assistance from Fabiana Batista and Sergio Chapa.

 

SOURCE READ THE FULL ARTICLE

Hurricane Ida Threatens U.S. Grain Exports If Disruptions Linger


Company DETAILS

SHIP IP LTD
VAT:BG 202572176
Rakovski STR.145
Sofia,
Bulgaria
Phone ( +359) 24929284
E-mail: sales(at)shipip.com

ISO 9001:2015 CERTIFIED