14.01.2015 Views

legal issues in cloud computing agreements - Australian ...

legal issues in cloud computing agreements - Australian ...

legal issues in cloud computing agreements - Australian ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Agencies should also consider the practical implications of their Privacy Act obligations,<br />

<strong>in</strong>clud<strong>in</strong>g whether specific contractual measures enabl<strong>in</strong>g them to meet their obligations are<br />

required. For example, IPP 7 Alteration of records conta<strong>in</strong><strong>in</strong>g personal <strong>in</strong>formation requires<br />

agencies, where an <strong>in</strong>dividual’s request to alter a record has been refused, to attach a statement<br />

to the record on request. Agencies would need to ensure that a <strong>cloud</strong> service provider is obliged<br />

to meet this requirement.<br />

Future privacy compliance<br />

From March 2014, 13 new <strong>Australian</strong> Privacy Pr<strong>in</strong>ciples (APP’s) will apply to both the public and<br />

private sector. For <strong>Australian</strong> Government agencies these APP's will replace the current IPP's.<br />

The APP's are structured to reflect the <strong>in</strong>formation life cycle from notification and collection,<br />

through to use and disclosure, security, access and correction.<br />

While the changes to the Privacy Act will not take effect until March 2014, agencies should start<br />

prepar<strong>in</strong>g now to ensure compliance with the new APP's. This may <strong>in</strong>clude consider<strong>in</strong>g the<br />

impact of the APPs <strong>in</strong> any <strong>cloud</strong> comput<strong>in</strong>g procurements agencies anticipate undertak<strong>in</strong>g.<br />

The OAIC will produce detailed guidance published on the OAIC website 12 to assist agencies to<br />

understand the impact of the reforms and make the necessary changes to agency <strong>in</strong>formation<br />

handl<strong>in</strong>g practices.<br />

Security<br />

Clearly one significant issue for any <strong>cloud</strong> comput<strong>in</strong>g agreement where the provider holds, or is<br />

able to access, an agency's data is the security of that data. This issue is heightened from a risk<br />

perspective where the data is sensitive (<strong>in</strong>clud<strong>in</strong>g personal <strong>in</strong>formation).<br />

Agencies should refer to the Defence Signals Directorate's Cloud Comput<strong>in</strong>g Security<br />

Considerations 13 for detailed guidance on <strong>issues</strong> to consider from a security perspective. In<br />

follow<strong>in</strong>g this guidance, agencies should develop a comprehensive risk assessment to make an<br />

<strong>in</strong>formed decision on the suitability of adopt<strong>in</strong>g a <strong>cloud</strong> based solution and assess the<br />

appropriate security protections it requires. The follow<strong>in</strong>g are contractual measures that may,<br />

depend<strong>in</strong>g on the circumstances <strong>in</strong>clud<strong>in</strong>g the type of <strong>cloud</strong> service used, be appropriate to<br />

<strong>in</strong>clude <strong>in</strong> an agreement for <strong>cloud</strong> comput<strong>in</strong>g services:<br />

<br />

<br />

<br />

<br />

where the service is to be provided from a location with<strong>in</strong> Australia, a prohibition on the<br />

provider transmitt<strong>in</strong>g data outside of Australia without the prior approval of the agency<br />

the level of security and encryption to be applied to agency data held and transmitted by the<br />

provider<br />

the level of access security protocols to be implemented by the provider to defeat<br />

unauthorised attempts to access the data by third parties, provider personnel and other<br />

customers of the provider<br />

where physical media is damaged and replaced, requirements for the sanitisation or deletion<br />

of data <strong>in</strong> the damaged media<br />

12<br />

13<br />

http://www.oaic.gov.au/<br />

http://www.dsd.gov.au/<strong>in</strong>fosec/<strong>cloud</strong>security.htm<br />

Negotiat<strong>in</strong>g the <strong>cloud</strong> – <strong>legal</strong> <strong>issues</strong> <strong>in</strong> <strong>cloud</strong> comput<strong>in</strong>g <strong>agreements</strong> | 8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!