Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL
|
|
|
- Brianne Hubbard
- 10 years ago
- Views:
Transcription
1 Cloud computing and personal data protection Gwendal LE GRAND Director of technology and innovation CNIL 1
2 Data protection in Europe Directive 95/46/EC Loi du 6 janvier 1978 amended in 2004 (France) Definition of personal data Principles : Purpose limitation, proportionality, retention period, security, data subjects rights Cloud vs. data protection Topic Cloud Data protection (Directive) Control and security Data controllership Provider: We take care of everything Provider: We take care of everything and we are not liable the processor shall act only on instructions from the controller controller shall mean the entity which determines the purposes and means of the processing Location Retention period Provider: We cannot guarantee the location of your data Retention policies are independent from the client or the processing transfer may take place only if ( ) the third country in question ensures an adequate level of protection personal data is kept for no longer than is necessary for the purposes for which the data were collected 2 Opportunity: Strategic data = Personal data
3 Snowden impact 88% decision-makers changing cloud buying behavior 5% of respondents believe location does not matter at all when it comes to storing company data 31% of ICT decision-makers are moving data to locations where it will be safe 62% of those not currently using cloud feel the revelations have prevented them from moving their ICT into the cloud ICT decision-makers prefer buying a cloud service located in their own region, esp. EU respondents (97 %) and US respondents (92%) 16 % are delaying or cancelling contracts with cloud service providers Source : NTT Communications 2014 survey of 1,000 ICT decision-makers in France, Germany, Hong Kong, UK and USA 3
4 Part 2 Part 1 Outline CNIL recommendations Guidance with models of contractual clauses (2012) WP29 recommendations Opinion 5/2012 on cloud computing Cloud security alliance Privacy Level Agreement Outline for cloud services in the EU Star certification Part 3 GDPR Adoption process Certification Processors C-SIG draft code of conduct (EU level) Opinion 2/2015 on C-SIG draft code of conduct ISO standards 4
5 1. CNIL s recommendations Process Interviews Public consultation (end 2011) Consultation analysis Publication of recommendations (June 2012) Objectives Help companies, esp. SMEs, decide Meet current state of play practical tools: method and model clauses Formal documents to support (security and legal) vs. finance Provide food for thought Key steps Identify data + processing operations which will be passed to Cloud Define your requirements for technical and legal security Carry out a risk analysis to identify the essential security measures for the company* Identify the relevant type of Cloud Choose a service provider offering sufficient guarantees* Review the internal security policy Monitor changes over time 5
6 1. CNIL s recommendations Process Interviews Public consultation (end 2011) Consultation analysis Publication of recommendations (June 2012) Objectives Help companies, esp. SMEs, decide Meet current state of play practical tools: method and model clauses Formal documents to support (security and legal) vs. finance Provide food for thought Key steps Identify data + processing operations which will be passed to Cloud Define your requirements for technical and legal security Carry out a risk analysis to identify the essential security measures for the company* Identify the relevant type of Cloud Choose a service provider offering sufficient guarantees* Review the internal security policy Monitor changes over time 6
7 1. CNIL s recommendations: Risk analysis Information security risks + data protection and privacy risks Both processes can be combined Methodology for Privacy Impact Assesments For data controllers For data processors 7
8 1. CNIL s recommendations: Risks 35 risks identified by ENISA 1 CNIL : 10 risks with higher data protection relevance Loss of governance; Vendor lock-in; Isolation failure; Legal requests, in particular by foreign authorities; Supply chain failure; Insecure or ineffective deletion of data, or too long retention period; Improper access rights management; Unavailability; Cloud provider termination or acquisition; Compliance challenges, especially on international transfers. Data protection specific
9 1. CNIL s recommendations: A provider with sufficient guarantees Determine CSP qualification : Processor OR joint controllership Allocating liability Facts analysis on public PaaS and SaaS: Low level of instructions No monitoring capabilities Standard offers Standard contracts Joint controllership (generally) Model clauses only models! But: Service providers who do not offer these essential guarantees in their contracts and who refuse any negotiation with their potential customers should not be selected Controller must have access to all the technical and security information needed for risk analysis: Accessible security policy Physical safety and security measures on the host site Measures to ensure the availability, integrity, confidentiality; System for reporting complaints and security breaches; Reversibility/portability ; Traceability and reporting of incidents detected by the CSP ; Service Level Agreements Privacy commitments (e.g. clauses, CSA PLA) If the provider is data processor, the customer must be able to audit the provider s system* Role of Certifications (ex : ISO /IEC 27001) Compliance with data protection laws, subcontractors, retention period, transfers (next slides), etc. 9
10 1. CNIL s recommendations: Audit & Certification Right to Audit? from the right to audit the location of the servers where data are processed and stored. to the right to audit the security measures of the processor, CSP : As a processor, you should accept audit from your controllers As a joint-controller, responsible of security. Controller : You don t HAVE TO audit your processors but you should BE ABLE TO. 10
11 1. CNIL s recommendations: Transfers outside EU Clear and complete indication of countries hosting the service provider's data centres; Adequate protection abroad EC Standard contractual clauses Binding corporate rules BCR 1 st transfer vs ulterior transfer Any transfer should be legally grounded Add in your contract that clauses or BCR are mandatory to any ulterior transfer About Safe Harbor Safe Harbor is illegal since 6/10/2015 Any such transfers should be stopped What can replace SH? EC Standard contractual clauses? Binding corporate rules BCR? SH2? Immediate information to the customer in case of a request from a foreign administrative or judicial authority. 11
12 2. Other actions Contribution to ANSSI referential on qualification of Cloud provider («Prestataire de services sécurisés d informatique en nuage») WP29 recommendations (WP196 July 2012) and Opinion 2/2015 on C-SIG draft code of conduct Participation to several international groups ISO [see next slide] CSA : PLA (February 2013) and PLAv2 (May 2015) 12
13 2. C-SIG draft code of conduct Cloud code of conduct (EU level) Opinion 2/2015 on C-SIG draft code of conduct Transition to GDPR ; CoC vs enforcement by DPAs ; governance of the code ; Location of the processing ; International transfers ; liability ; security ; right to audit Next steps 13
14 2. ISO standards ISO/IEC Privacy framework Terminology and principles to be used in every privacy related standard ISO/IEC Code of practice for PII protection Catalogue of generic privacy controls, in addition to ISO/IEC (information security controls) ISO/IEC Code of practice for information security controls for cloud computing services based on ISO/IEC Catalogue of information security controls specific to cloud computing, in addition to ISO/IEC ISO/IEC Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors Catalogue of privacy controls specific to cloud computing, (theoretically) in addition to ISO/IEC ISO/IEC Information security management system (ISMS) Requirements for the certification of information security management systems ISO/IEC Sector specific application of ISO/IEC Requirements Requirements for the creation of sector-specific standards that would fit in the ISO/IEC framework Next step: use ISO/IEC requirements to build the missing privacy requirements in a new standard, in order to be able to certify management systems including privacy and/or cloud computing specific aspects 14
15 3. The draft GDPR General purposes Adapt to the Internet world Harmonise across Europe Simplify procedures Accountability European Commission Publication of the proposal for a Regulation VOTE in Parliament VOTE in Council In practice No prior notification but extended data breach notification Joint responsibility for some services and security (art 24 & 30) Cloud computing Higher fines TRILOGUE between EC, EP and Council to build a consensus on the text Expected adoption of the final text The regulation is applicable. Directive 95/46/EC is repealed 95/46/CE 15
16 3. GDPR: Certification (art.39) Different types certification mechanisms, data protection seals and marks In effect Demonstrate compliance with the Regulation of processing operations carried out. Does not reduce the responsibility of the controller or the processor for compliance with the Regulation Does not impact the tasks and powers of the supervisory authority 16
17 3. GDPR: processors Changes / clarifications. The processor: shall not enlist another processor without consent of the controller ; Implements appropriate measures to ensure a level of security appropriate to the risks ; makes available to the controller all information necessary to demonstrate compliance + allow for and contribute to audits conducted by the controller ; informs the controller if, in his opinion, an instruction breaches this Regulation or Union or Member State data protection provisions ; shall notify the controller without undue delay after becoming aware of a personal data breach ; may/shall designate a data protection officer. 17
18 Conclusion Several tools are useful in the cloud DPA recommendations Best practices Certifications Codes of conducts Different level of transparency and assurance GDPR as a game changer and opportunity to raise trust in CSPs 18 TITRE DE LA PRESENTATION
19 Useful references CNIL s recommendations CNIL s guides Security (basics): Privacy Impact Assessment: WP29 Opinion on Cloud computing: 19
Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union
Privacy Level Agreement Working Group Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union February 2013 The PLA Outline has been developed within CSA by an expert working
Recommendations for companies planning to use Cloud computing services
Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation
Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL
Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL 1. Definition of Cloud Computing In the public consultation, CNIL defined
Acquia Comments on EU Recommendations for Data Processing in the Cloud
Acquia Comments on EU Recommendations for Data Processing in the Cloud Executive Summary On July 1, 2012, European Union (EU) data protection regulators provided guidelines for service providers processing
Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini
Personal data and cloud computing, the cloud now has a standard by Luca Bolognini Lawyer, President of the Italian Institute for Privacy and Data Valorization, founding partner ICT Legal Consulting Last
CLOUD COMPUTING Contractual and data protection aspects
CLOUD COMPUTING Contractual and data protection aspects Cloudscape VI 25 February 2014, Bruxelles Paolo Balboni Ph.D., Founding Partner, ICT Legal Consulting Domenico Converso LL.M., Senior Associate,
ARTICLE 29 DATA PROTECTION WORKING PARTY
ARTICLE 29 DATA PROTECTION WORKING PARTY 2588/15/EN WP 232 Opinion 02/2015 on C-SIG Code of Conduct on Cloud Computing Adopted on 22 September 2015 This Working Party was set up under Article 29 of Directive
LIABILITY FOR NON-COMPLIANCE WITH DATA PROTECTION OBLIGATIONS
LIABILITY FOR NON-COMPLIANCE WITH DATA PROTECTION OBLIGATIONS This document is a rough draft aiming at presenting key provisions, current clauses used in Cloud computing contracts and first drafts on possible
Data and Cyber Laws Up-date 9 July 2015
Data and Cyber Laws Up-date 9 July 2015 Janine Regan Alexia Zuber Viktoria Protokova Simon Holdsworth charlesrussellspeechlys.com Topics Updates on the key aspects of, and commentary on, the proposed GDPR
Cloud Security under the EU Data Protection Directive and draft General Data Protection Regulation
ENISA EU28 Cloud Security Conference 16 June 2015 Cloud Security under the EU Data Protection Directive and draft General Data Protection Regulation Kuan Hon Senior Researcher, Cloud Legal Project & Microsoft
PRIVACY CHECKLIST FOR CLOUD SERVICE CONTRACTS
PRIVACY CHECKLIST FOR CLOUD SERVICE CONTRACTS CIRRUS WORSHOP 28 February 2013, The Interna
Context. To cloud or not to cloud, that is a very serious question. Legal challenges in a post Safe Harbour and pre GDPR cloud world
To cloud or not to cloud, that is a very serious question EEMA / TrustCore Legal challenges in a post Safe Harbour and pre GDPR cloud world 18 November 2015 [email protected] Context Major cloud providers
(a) the kind of data and the harm that could result if any of those things should occur;
Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data
Article 29 Working Party Issues Opinion on Cloud Computing
Client Alert Global Regulatory Enforcement If you have questions or would like additional information on the material covered in this Alert, please contact one of the authors: Cynthia O Donoghue Partner,
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015
Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015 The following comprises a checklist of areas that genomic research organizations or consortia (collectively referred
OVERVIEW. stakeholder engagement mechanisms and WP29 consultation mechanisms respectively.
Joint work between experts from the Article 29 Working Party and from APEC Economies, on a referential for requirements for Binding Corporate Rules submitted to national Data Protection Authorities in
GDPR & Service Providers ( Cloud Focus )
OASIS / EEMA Digital Enterprise Europe 2015 Building Trust in the Hyperconnected World 8 July 2015 GDPR & Service Providers ( Cloud Focus ) Kuan Hon Senior Researcher, Cloud Legal Project & Microsoft Cloud
Information Security Risks when going cloud. How to deal with data security: an EU perspective.
Separating fact from fiction about new software licensing /SaaS/ cloud computing models: advantages, disadvantages and ethical implications. Information Security Risks when going cloud. How to deal with
The Cloud Security Alliance
The Cloud Security Alliance Daniele Catteddu, Managing Director EMEA & OCF-STAR Program Director Cloud Security Alliance ABOUT THE CLOUD SECURITY ALLIANCE To promote the use of best practices for providing
Global Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister
2011 Morrison & Foerster LLP All Rights Reserved mofo.com Global Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister Presenter Miriam Wugmeister Morrison & Foerster LLP New York
Data protection legislation influence on cloud computing from local as well as EU perspective
mag. Andrej Tomšič Deputy Information Commissioner Information Commissioner Data protection legislation influence on cloud computing from local as well as EU perspective CLASS conference 2012 I Cloud Assisted
Overview. Data protection in a swirl of change 28.03.2014. Cloud computing. Software as a service. Infrastructure as a service. Platform as a service
Data protection in a swirl of change Overview 1 Data protection issues in cloud computing 2 Consent for mobile applications Security Seminar 2014: Privacy Radboud University Nijmegen 3 The WhatsApp case
GDPR & Cloud Providers Keynote Presentation
Cloudscape VII 9 March 2015 GDPR & Cloud Providers Keynote Presentation Kuan Hon Research Consultant, Cloud Legal Project & MCCRC Centre for Commercial Law Studies Queen Mary, University of London [email protected]
Data Protection and Cloud Computing: an Overview of the Legal Issues
Data Protection and Cloud Computing: an Overview of the Legal Issues Christopher Kuner Partner, Hunton & Williams, Brussels Research Assistant, University of Copenhagen Nordic IT Law Conference Copenhagen,
Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:
UNOFFICIAL TRANSLATION Written opinion on the application of the Wet bescherming persoonsgegevens [Dutch Data Protection Act] in the case of a contract for cloud computing services from an American provider
Ethical hotlines and whistleblowing ensuring businesses are not in conflict with local laws
Ethical hotlines and whistleblowing ensuring businesses are not in conflict with local laws 16 January 2014 Robert Bond, CCEP Partner and Notary Public Our Team Speechly Bircham is an ambitious, full-service
Privacy Compliance and Security SLA: CSA addressing the challenges
Privacy Compliance and Security SLA: CSA addressing the challenges Daniele Catteddu, Managing Director EMEA & OCF-STAR Program Director - Cloud Security Alliance Arthur van der Wees, Managing Director
A Flexible and Comprehensive Approach to a Cloud Compliance Program
A Flexible and Comprehensive Approach to a Cloud Compliance Program Stuart Aston Microsoft UK Session ID: SPO-201 Session Classification: General Interest Compliance in the cloud Transparency Responsibility
How To Protect Your Data In The Cloud
Cloud Computing Hot topics in relation to security, liability and privacy Steven De Schrijver Cloud Computing : who and what is involved? Data Cloud Service Provider (e.g. SaaS, PaaS, IaaS) Sub-contractor
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Presentation by: Dr. Nathalie Moreno Partner. Cloud Computing and Data Protection: an Update 4 October 2012
Presentation by: Dr. Nathalie Moreno Partner Cloud Computing and Data Protection: an Update 4 October 2012 Our team Speechly Bircham is an ambitious, international mid-size fullservice law firm head-quartered
OUTSOURCING, HOSTING AND DATA PRIVACY ISSUES
OUTSOURCING, HOSTING AND DATA PRIVACY ISSUES 4 April 2013 James Castro-Edwards Solicitor Monica Salgado Advogada / Portuguese Lawyer OUR TEAM Speechly Bircham is an ambitious, full-service law firm with
ARTICLE 29 DATA PROTECTION WORKING PARTY
ARTICLE 29 DATA PROTECTION WORKING PARTY 01037/12/EN WP 196 Opinion 05/2012 on Cloud Computing Adopted July 1 st 2012 This Working Party was set up under Article 29 of Directive 95/46/EC. It is an independent
Privacy vs Data Protection. PRESENTATION TITLE GOES HERE Eric A. Hibbard, CISSP, CISA Hitachi Data Systems
Privacy vs Data Protection PRESENTATION TITLE GOES HERE Eric A. Hibbard, CISSP, CISA Hitachi Data Systems Introduction The terms privacy and data protection are often used interchangeable In reality they
Accountability in Cloud Computing An Introduction to the Issues, Approaches, and Tools
Accountability in Cloud Computing An Introduction to the Issues, Approaches, and Tools Nick Papanikolaou, Cloud and Security Lab, HP Labs Europe [email protected] With special thanks to Nick Wainwright and Siani
Office 365 Data Processing Agreement with Model Clauses
Enrollment for Education Solutions Office 365 Data Processing Agreement (with EU Standard Contractual Clauses) Amendment ID Enrollment for Education Solutions number Microsoft to complete 7392924 GOLDS03081
Into the Cloud: How will the Draft EU Data Protection Regulation affect cloud computing service providers and users?
10 Juni 2013 Taylor Wessing - Essay Competition 2013 Into the Cloud: How will the Draft EU Data Protection Regulation affect cloud computing service providers and users? by Katarina Kesselová, LLM. Introduction
Cloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
An Overview of ISO/IEC 27000 family of Information Security Management System Standards
What is ISO/IEC 27001? The ISO/IEC 27001 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), is known as Information
PRIVACY MANAGEMENT ACTIVITIES
PRIVACY MANAGEMENT ACTIVITIES Designed for the privacy office to take privacy management to the next level, Nymity Templates offers a wide range of downloadable resources. Publication Date: June 2014 1.
Privacy & Data Security: The Future of the US-EU Safe Harbor
Privacy & Data Security: The Future of the US-EU Safe Harbor NAOMI MCBRIDE, LISA J. SOTTO AND BRIDGET TREACY, HUNTON & WILLIAMS LLP, WITH PRACTICAL LAW US INTELLECTUAL PROPERTY & TECHNOLOGY AND UK IP&IT
1. General questions. 2. Personal data protection rights of employees PERSONAL DATA PROTECTION FAQ
PERSONAL DATA PROTECTION FAQ These Frequently Asked Questions are broken down into three parts: Part 1 contains answers to general questions on personal data protection. Part 2 is about employees personal
Purpose of the document:
Purpose of the document: Target public: Status: The purpose of the document is to establish common control points, by which users as well as supervisory authorities will be able to come to informed decisions
Cyber Security and Cloud Computing. Dr Daniel Prince Course Director MSc in Cyber Security [email protected]
Cyber Security and Cloud Computing Dr Daniel Prince Course Director MSc in Cyber Security [email protected] Scope of Today SME Attractors for Cloud Switching to the Cloud Public Private Hybrid Big
Implementation of eidas through Member States Supervisory Bodies
Implementation of eidas through Member States Supervisory Bodies Riccardo Genghini - ETSI TC ESI & CEN-ETSI e-sign Coord. Group Chairman CA Day Berlin June 09 th, 2015 ETSI 2013. All rights reserved 2
Legal Aspects of Cloud Computing. Dr. Susann Wolfgram & Ulrike Weinbrenner Dr. Alexander Duisberg (Bird&Bird)
Legal Aspects of Cloud Computing Dr. Susann Wolfgram & Ulrike Weinbrenner Dr. Alexander Duisberg (Bird&Bird) Agenda Cloud Computing Overview Role Play on Hot Topics SAAS versus on-premise software licensing
Data Protection Policy.
Data Protection Policy. Data Protection Policy Foreword 2 Foreword Ladies and Gentlemen, In the information age, we offer customers the means to be always connected, even in their cars. This requires data
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
ENISA and Cloud Security
ENISA and Cloud Security Rossen Naydenov Network Information Security Officer Critical Information Infrastructure Protection Department - ENISA European Union Agency for Network and Information Security
Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------
w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------
Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World
Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World Web Hull Privacy, Data Protection, & Compliance Advisor Society
The reform of the EU Data Protection framework - Building trust in a digital and global world. 9/10 October 2012
The reform of the EU Data Protection framework - Building trust in a digital and global world 9/10 October 2012 Questionnaire addressed to national Parliaments Please, find attached a number of questions
The problem of cloud data governance
The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in
Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015
Multi-Jurisdictional Study: Cloud Computing Legal Requirements Julien Debussche Associate January 2015 Content 1. General Legal Framework 2. Data Protection Legal Framework 3. Security Requirements 4.
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10
Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between
Council of the European Union Brussels, 5 March 2015 (OR. en)
Council of the European Union Brussels, 5 March 2015 (OR. en) Interinstitutional File: 2013/0027 (COD) 6788/15 LIMITE TELECOM 59 DATAPROTECT 23 CYBER 13 MI 139 CSC 55 CODEC 279 NOTE From: Presidency To:
Adopting Cloud Computing with a RISK Mitigation Strategy
Adopting Cloud Computing with a RISK Mitigation Strategy TS Yu, OGCIO 21 March 2013 1. Introduction 2. Security Challenges Agenda 3. Risk Mitigation Strategy Before start using When using 4. Policy & Guidelines
Role of contracts in Cloud Computing an Overview. Kevin McGillivray Doctoral Candidate (NRCCL)
Role of contracts in Cloud Computing an Overview Kevin McGillivray Doctoral Candidate (NRCCL) Barriers/Challenges to Cloud Transparency Compliance Legal Shared infrastructure Subcontractors (and their
Best Practices at Research Level
PReparing Industry to Privacy-by-design by supporting its Application in REsearch Best Practices at Research Level Hisain Elshaafi Telecommunications Software and Systems Group (TSSG) Waterford Institute
ARTICLE 29 DATA PROTECTION WORKING PARTY
ARTICLE 29 DATA PROTECTION WORKING PARTY 00658/13/EN WP 204 Explanatory Document on the Processor Binding Corporate Rules Adopted on 19 April 2013 This Working Party was set up under Article 29 of Directive
FRANCE. Chapter XX OVERVIEW
Chapter XX FRANCE Merav Griguer 1 I OVERVIEW France has an omnibus privacy, data protection and cybersecurity framework law. As a member of the European Union, France has implemented the EU Data Protection
New EU Data Protection legislation comes into force today. What does this mean for your business?
24 th May 2016 New EU Data Protection legislation comes into force today. What does this mean for your business? After years of discussion and proposals, the General Data Protection Regulation ( GDPR )
How To Understand The Privacy Shield
The Privacy Shield and EU GDP Regulation- A Data Safekeeping Revolution? SCCE Webinar May 24, 2016 Presenter: Dan Cotter [email protected] 312-696-4497 Agenda - What is the Privacy Shield - What
Privacy in the cloud. DNB has indicated that it considers cloud computing a form of outsourcing.
Privacy in the cloud computing, and the company concerned is required to submit a risk analysis to DNB. 3 Cloud computing entails the saving, processing and using of company data on the servers of a cloud
Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:
Data protection issues on an EU outsourcing
Data protection issues on an EU outsourcing Saam Golshani, Alastair Gorrie and Diego Rigatti, Orrick Herrington & Sutcliffe www.practicallaw.com/8-380-8496 Outsourcing can mean subcontracting a process
CFPB Readiness Series: Compliant Vendor Management Overview
CFPB Readiness Series: Compliant Vendor Management Overview Legal Disclaimer This information is not intended to be legal advice and may not be used as legal advice. Legal advice must be tailored to the
Big Data for Mutuals. Marc Dautlich 25 November 2013
Big Data for Mutuals Marc Dautlich 25 November 2013 Agenda BIG DATA What is it? OPPORTUNITIES What are they? LEGAL CHALLENGES How do we overcome them? LEGAL REFORM What can we do now to minimise impact?
Cloud Computing in a Government Context
Cloud Computing in a Government Context Introduction There has been a lot of hype around cloud computing to the point where, according to Gartner, 1 it has become 'deafening'. However, it is important
White Paper: Data Protection In The Cloud. Data Protection In The Cloud
White Paper: Data Protection In The Cloud Data Protection In The Cloud Introduction The rapid emergence of cloud computing has placed it at the forefront of IT decision making and business strategies.
How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015
How Microsoft is taking Privacy by Design to Work Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015 Agenda Introducing the New Microsoft Microsoft privacy principle Protecting privacy
Data Processing Agreement for Oracle Cloud Services
Data Processing Agreement for Oracle Cloud Services Version December 1, 2013 1. Scope and order of precedence This is an agreement concerning the Processing of Personal Data as part of Oracle s Cloud Services
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries
Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries Sopra HR Software as a Data Processor Sopra HR Software, 2014 / Ref. : 20141120-101114-m 1/32 1.
Pursuant to Convention No. 108 of the Council of Europe for the protection of persons with regard to the automated processing of personal data;
Decision No. 2011-316 dated 6 October 2011 adopting a standard for delivering privacy seals in audit procedures covering the protection of persons with regard to the processing of personal data The French
