12.07.2015 Views

A Cl rtic loud cle 2 d Co 29 W omp Work putin king ng O g Pa Opin ...

A Cl rtic loud cle 2 d Co 29 W omp Work putin king ng O g Pa Opin ...

A Cl rtic loud cle 2 d Co 29 W omp Work putin king ng O g Pa Opin ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

A<stro<strong>ng</strong>>rtic</stro<strong>ng</strong>>le <stro<strong>ng</strong>>29</stro<strong>ng</strong>> <stro<strong>ng</strong>>Work</stro<strong>ng</strong>><stro<strong>ng</strong>>ki<strong>ng</strong></stro<strong>ng</strong>><strong>Pa</strong>rty<stro<strong>ng</strong>>Cl</stro<strong>ng</strong>>oud<stro<strong>ng</strong>>Co</stro<strong>ng</strong>>m<stro<strong>ng</strong>>putin</stro<strong>ng</strong>>g <strong>Opin</strong>ionnCSA Legaal InformationCenterSponnsored Research


A<stro<strong>ng</strong>>rtic</stro<strong>ng</strong>>le <stro<strong>ng</strong>>29</stro<strong>ng</strong>> <stro<strong>ng</strong>>Work</stro<strong>ng</strong>>i<strong>ng</strong><strong>Pa</strong>rty <stro<strong>ng</strong>>Cl</stro<strong>ng</strong>>oud<stro<strong>ng</strong>>Co</stro<strong>ng</strong>>m<stro<strong>ng</strong>>putin</stro<strong>ng</strong>>g <strong>Opin</strong>ion:Blowto Safe Harbor?CSALegal Information CenterSponsored ResearchINTRODUCTIONThe <stro<strong>ng</strong>>Cl</stro<strong>ng</strong>>oud Security Alliance is a not‐for‐profit organization with a mission to promote the use of best practices forprovidi<strong>ng</strong> securityassurance within <stro<strong>ng</strong>>Cl</stro<strong>ng</strong>>oud <stro<strong>ng</strong>>Co</stro<strong>ng</strong>>m<stro<strong>ng</strong>>putin</stro<strong>ng</strong>>g, and to providee education on the uses of<stro<strong>ng</strong>>Cl</stro<strong>ng</strong>>oud <stro<strong>ng</strong>>Co</stro<strong>ng</strong>>m<stro<strong>ng</strong>>putin</stro<strong>ng</strong>>g to helpsecure all other forms of c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>uti<strong>ng</strong>. The <stro<strong>ng</strong>>Cl</stro<strong>ng</strong>>oud Security Alliance is ledd by a broad coalition of industry practitioners,corporations, associations and other key stakeholders. CSA sets the pace as the industry leader in research, bestpractices and certification for the trusted c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> ecosystem.The CSA Legal Information Center is an expert‐led community resource for global legal issues impacti<strong>ng</strong> c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>>c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>uti<strong>ng</strong>. Our mission is to provide unbiased information about thee applicabilityof existi<strong>ng</strong> laws and also identify lawsthat are bei<strong>ng</strong> impacted by technology trends and may require modification. The CSA Legal Information Center includeswhitepapers, webinars, an advice column and in‐person events.The CSA Legal Information Center is locatedat: https://c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>>securityalliance.org/research/clic//The CSA Legal Information Center is supported by our foundi<strong>ng</strong> sponsor and corporate member Box. Founded in 2005,Box provides a secure content shari<strong>ng</strong> platform that both users and ITT love and adopt. <stro<strong>ng</strong>>Co</stro<strong>ng</strong>>ntentt on Box can be sharedinternally and externally, accessed through i<strong>Pa</strong>d, iPhone, Android, Touch<strong>Pa</strong>d and PlayBook applications, andextended toopartner applications such as Google Apps, NetSuite and Salesforce. Headquarteredd in <strong>Pa</strong>lo Alto, CA, Box is a privatelyheld c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>any andis backed byventure capital firms Andreessen Horowitz, Draper Fisher Jurvetson, Emergence Capital<strong>Pa</strong>rtners, Meritech Capital <strong>Pa</strong>rtners, Scale Venture <strong>Pa</strong>rtners, and U.S. Venture <strong>Pa</strong>rtners. To learn more about Box, pleasevisit www.box.com.All trademarks, copyrights and logos are theproperty oftheir respective owners.Author Acknowledgment© 2013 FrancoiseGilbert ‐ IT Law Group – All Rights ReservedFrancoise Gilbert, JD, CIPP/US, focuses her legal practiceon information privacy and security, c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>uti<strong>ng</strong>, and dataagovernance. She was listed as one of the country’s top legal advisors on privacy matters in a recent industrysurvey and,for several years, has been recognized by Chambers, Best Lawyers, ass leadi<strong>ng</strong> lawyer in the field of information privacyand security. For the past two years, Ethisphere has identified her as “an attorneywho matters” in the fieldofinformation privacy and security.Gilbert is the author and editor of the two‐volume treatise Global Privacy & Security Law (3,000 pages; Aspen Publishers,Wolters Kluwer Law and Business) (www.globalprivacybook.com), which analyzes the data protection laws of 65countries on all continents.She is the managi<strong>ng</strong> attorney of the IT Law Group (www.itlawgroup.com) and serves as the general counselof the <stro<strong>ng</strong>>Cl</stro<strong>ng</strong>>oudSecurity Alliance. She also keeps a blog on domestic and international data privacyand securityissues(www.francoisegilbert.com). (650) 804‐1235 fgilbert@itlawgroup.com2013 CLOUD SECURITY ALLIANCE | 1


A<stro<strong>ng</strong>>rtic</stro<strong>ng</strong>>le <stro<strong>ng</strong>>29</stro<strong>ng</strong>> <stro<strong>ng</strong>>Work</stro<strong>ng</strong>>i<strong>ng</strong> <strong>Pa</strong>rty <stro<strong>ng</strong>>Cl</stro<strong>ng</strong>>oud <stro<strong>ng</strong>>Co</stro<strong>ng</strong>>m<stro<strong>ng</strong>>putin</stro<strong>ng</strong>>g <strong>Opin</strong>ion:Blow to Safe Harbor?CSA Legal Information CenterSponsored ResearchA<stro<strong>ng</strong>>rtic</stro<strong>ng</strong>>le <stro<strong>ng</strong>>29</stro<strong>ng</strong>> <stro<strong>ng</strong>>Work</stro<strong>ng</strong>>i<strong>ng</strong> <strong>Pa</strong>rty <stro<strong>ng</strong>>Cl</stro<strong>ng</strong>>oud <stro<strong>ng</strong>>Co</stro<strong>ng</strong>>m<stro<strong>ng</strong>>putin</stro<strong>ng</strong>>g <strong>Opin</strong>ion:Blow to Safe Harbor?by Francoise Gilbert, JD, CIPP/USThe A<stro<strong>ng</strong>>rtic</stro<strong>ng</strong>>le <stro<strong>ng</strong>>29</stro<strong>ng</strong>> Data Protection <stro<strong>ng</strong>>Work</stro<strong>ng</strong>>i<strong>ng</strong> <strong>Pa</strong>rty—which includes representatives of the data protection authorities of eachof the European Union member states—recently issued an opinion on c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>uti<strong>ng</strong> that could impact U.S. c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>>providers. The opinion, published July 2 as Document WP 196, 1 analyzes the applicable data protection laws andobligations for c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>anies providi<strong>ng</strong>, or usi<strong>ng</strong> c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>uti<strong>ng</strong> services in the European Economic Area (EEA). Itidentifies data protection risks that are likely to result from the use of c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>uti<strong>ng</strong> services, and provides guidanceon how to manage a c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>uti<strong>ng</strong> contract.The most significant aspect of the opinion is its negative evaluation of the ability of Safe Harbor self‐certification to meetthe requirement of national laws implementi<strong>ng</strong> the 1995 EU Data Protection Directive.While they do not have the force of law, opinions of the A<stro<strong>ng</strong>>rtic</stro<strong>ng</strong>>le <stro<strong>ng</strong>>29</stro<strong>ng</strong>> <stro<strong>ng</strong>>Work</stro<strong>ng</strong>>i<strong>ng</strong> <strong>Pa</strong>rty 2 have a significant influence over theways c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>anies operate and the privacy choices they make. Businesses operati<strong>ng</strong> in the European Economic Areashould keep in mind that the data protection authority of the country, or countries, in which they operate are highlylikely to follow the guidance set forth in a <stro<strong>ng</strong>>Work</stro<strong>ng</strong>>i<strong>ng</strong> <strong>Pa</strong>rty’s opinion. 3 Thus, it is important that they operate within theguidelines provided in the opinions and other writi<strong>ng</strong>s of the A<stro<strong>ng</strong>>rtic</stro<strong>ng</strong>>le <stro<strong>ng</strong>>29</stro<strong>ng</strong>> Data Protection <stro<strong>ng</strong>>Work</stro<strong>ng</strong>>i<strong>ng</strong> <strong>Pa</strong>rty. 4Risk analysis and contractual provisionsFor businesses and governmental administrations wishi<strong>ng</strong> to use c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>uti<strong>ng</strong> services, WP 196 recommends thedata controller (the data owner) first conduct a c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>rehensive and thorough risk analysis of the proposed c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>>service—includi<strong>ng</strong>, in pa<stro<strong>ng</strong>>rtic</stro<strong>ng</strong>>ular, an evaluation of the risk to the data that would be held in the c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>>. This due diligencerequires actions by the purchaser of the c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> services, as well as cooperation from the providers of the c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> services.The second part of the opinion provides guidance on the contractual arra<strong>ng</strong>ements that regulate the relationshipbetween a data controller and a c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> service provider with respect to data privacy and security. Accordi<strong>ng</strong> to WP 196,the contract should provide appropriate transparency with respect to data handli<strong>ng</strong> practices. It should also ensureisolation, “intervenability” (the data subject’s ability to exercise their rights) and portability of personal data.Appropriate security measures should provide the tools necessary for ensuri<strong>ng</strong> availability, integrity and confidentiality.Cross‐border data transfers and Safe HarborBecause national data protection laws in the European Economic Area create significant barriers to cross‐border transferof data, WP 196 analyzes, at le<strong>ng</strong>th, how these restrictions affect c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>uti<strong>ng</strong>. The opinion casts significant doubtson the ability of Safe Harbor self‐certification 5 to meet the data protection requirements in the EEA. It states: “Sole selfcertificationwith Safe Harbor may not be deemed sufficient in the absence of robust enforcement of data protectionprinciples in the c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> environment. ... [C]<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>anies exporti<strong>ng</strong> data should not merely rely on the statement of the dataimporter claimi<strong>ng</strong> that he has a Safe Harbor certification. ... [T]he c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>any exporti<strong>ng</strong> data should request evidence1 http://ec.europa.eu/justice/data-protection/a<stro<strong>ng</strong>>rtic</stro<strong>ng</strong>>le-<stro<strong>ng</strong>>29</stro<strong>ng</strong>>/documentation/opinion-recommendation/files/2012/wp196_en.pdf.2 http://ec.europa.eu/justice/data-protection/a<stro<strong>ng</strong>>rtic</stro<strong>ng</strong>>le-<stro<strong>ng</strong>>29</stro<strong>ng</strong>>/index_en.htm.3 http://ec.europa.eu/justice/data-protection/a<stro<strong>ng</strong>>rtic</stro<strong>ng</strong>>le-<stro<strong>ng</strong>>29</stro<strong>ng</strong>>/documentation/opinion-recommendation/files/2012/wp196_en.pdf.4 http://www.c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>uterweekly.com/news/1280089878/Google-cha<strong>ng</strong>es-Street-view-to-meet-privacy-obligations.5 http://www.c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>uterweekly.com/blogs/it-fud-blog/2011/03/in-the-past-week-ive.html.2013 CLOUD SECURITY ALLIANCE | 2


A<stro<strong>ng</strong>>rtic</stro<strong>ng</strong>>le <stro<strong>ng</strong>>29</stro<strong>ng</strong>> <stro<strong>ng</strong>>Work</stro<strong>ng</strong>>i<strong>ng</strong> <strong>Pa</strong>rty <stro<strong>ng</strong>>Cl</stro<strong>ng</strong>>oud <stro<strong>ng</strong>>Co</stro<strong>ng</strong>>m<stro<strong>ng</strong>>putin</stro<strong>ng</strong>>g <strong>Opin</strong>ion:Blow to Safe Harbor?CSA Legal Information CenterSponsored Researchdemonstrati<strong>ng</strong> that these principles are c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>lied with. … It might be advisable to c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>lement the commitment of thedata importer to the Safe Harbor with additional safeguards, ta<stro<strong>ng</strong>>ki<strong>ng</strong></stro<strong>ng</strong>> into account the specific nature of the c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>>.”This negative assessment of the viability of Safe Harbor self‐certification as a way to meet the adequacy requirement ofEEA national data protection laws is detrimental to the adoption of c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>uti<strong>ng</strong>—it is likely to slow down itsadoption in Europe because most c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> providers are U.S.‐based. If, as stated in the opinion, the Safe Harbor principlesmay not guarantee the data exporter the necessary means to ensure that appropriate security safeguards have beenapplied by a U.S. c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> provider (as may be required under the national data protection laws of the EU Member States),then both U.S. data importers and EEA data exporters may be left with no certainty on how to proceed and morequestions about what will satisfy the EEA regulators.<stro<strong>ng</strong>>Cl</stro<strong>ng</strong>>oud c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>uti<strong>ng</strong> contractsThe recommendations on c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>uti<strong>ng</strong> contracts go significantly beyond the current provisions of most c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>>service agreements. While the opinion recommends obtaini<strong>ng</strong> information about server location and the use ore<strong>ng</strong>agement of subcontractors, c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> clients have had significant difficulty obtaini<strong>ng</strong> this information and have generallybeen unable to control the use of subcontractors. While the opinion favors the use of liability provisions, most contractsfor c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> services do not include any significant penalties for breach of contract. In existi<strong>ng</strong> contracts, a c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> provider’sliability is usually limited to direct damages and capped at the amount paid for the services for the few months thatpreceded an incident (usually two to 12 months). Most c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> contracts also do not address data retention or datadisposal. Provisions that address data retention, if any, are frequently limited to granti<strong>ng</strong> the c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> provider the right todelete all data within a short time after the end of the relationship.It’s not <stro<strong>ng</strong>>cle</stro<strong>ng</strong>>ar what effect the <stro<strong>ng</strong>>Work</stro<strong>ng</strong>>i<strong>ng</strong> <strong>Pa</strong>rty’s opinion will have on U.S. c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> providers, or the extent to which U.S. c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>>providers will adjust their operati<strong>ng</strong> terms in order to meet these guidelines. However, if U.S. c<stro<strong>ng</strong>>loud</stro<strong>ng</strong>> providers want tocontinue to attract EU‐based clients, they will have to address the recommendations of WP 196, especially those relatedto cross‐border data transfers—at least in connection with their sales in the European Economic Area. Will they want orbe able to keep different sets of terms for their contracts signed in the United States, when many of their clients areglobal c<stro<strong>ng</strong>>omp</stro<strong>ng</strong>>anies who want to sign global deals?// This a<stro<strong>ng</strong>>rtic</stro<strong>ng</strong>>le was first published by TechTarget2013 CLOUD SECURITY ALLIANCE | 3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!