Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL



Similar documents
Privacy Level Agreement Outline for the Sale of Cloud Services in the European Union

Recommendations for companies planning to use Cloud computing services

Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL

Acquia Comments on EU Recommendations for Data Processing in the Cloud

Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini

CLOUD COMPUTING Contractual and data protection aspects

ARTICLE 29 DATA PROTECTION WORKING PARTY

LIABILITY FOR NON-COMPLIANCE WITH DATA PROTECTION OBLIGATIONS

Data and Cyber Laws Up-date 9 July 2015

Cloud Security under the EU Data Protection Directive and draft General Data Protection Regulation

PRIVACY CHECKLIST FOR CLOUD SERVICE CONTRACTS

Context. To cloud or not to cloud, that is a very serious question. Legal challenges in a post Safe Harbour and pre GDPR cloud world

(a) the kind of data and the harm that could result if any of those things should occur;

Article 29 Working Party Issues Opinion on Cloud Computing

Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015

OVERVIEW. stakeholder engagement mechanisms and WP29 consultation mechanisms respectively.

GDPR & Service Providers ( Cloud Focus )

Information Security Risks when going cloud. How to deal with data security: an EU perspective.

The Cloud Security Alliance

Global Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister

Data protection legislation influence on cloud computing from local as well as EU perspective

Overview. Data protection in a swirl of change Cloud computing. Software as a service. Infrastructure as a service. Platform as a service

GDPR & Cloud Providers Keynote Presentation

Data Protection and Cloud Computing: an Overview of the Legal Issues

Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:

Ethical hotlines and whistleblowing ensuring businesses are not in conflict with local laws

Privacy Compliance and Security SLA: CSA addressing the challenges

A Flexible and Comprehensive Approach to a Cloud Compliance Program

How To Protect Your Data In The Cloud

The potential legal consequences of a personal data breach

Presentation by: Dr. Nathalie Moreno Partner. Cloud Computing and Data Protection: an Update 4 October 2012

OUTSOURCING, HOSTING AND DATA PRIVACY ISSUES

ARTICLE 29 DATA PROTECTION WORKING PARTY

Privacy vs Data Protection. PRESENTATION TITLE GOES HERE Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Accountability in Cloud Computing An Introduction to the Issues, Approaches, and Tools

Office 365 Data Processing Agreement with Model Clauses

Into the Cloud: How will the Draft EU Data Protection Regulation affect cloud computing service providers and users?

Cloud Security Introduction and Overview

An Overview of ISO/IEC family of Information Security Management System Standards

PRIVACY MANAGEMENT ACTIVITIES

Privacy & Data Security: The Future of the US-EU Safe Harbor

1. General questions. 2. Personal data protection rights of employees PERSONAL DATA PROTECTION FAQ

Purpose of the document:

Cyber Security and Cloud Computing. Dr Daniel Prince Course Director MSc in Cyber Security

Implementation of eidas through Member States Supervisory Bodies

Legal Aspects of Cloud Computing. Dr. Susann Wolfgram & Ulrike Weinbrenner Dr. Alexander Duisberg (Bird&Bird)

Data Protection Policy.

BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS

Information Security ISO Standards. Feb 11, Glen Bruce Director, Enterprise Risk Security & Privacy

ENISA and Cloud Security

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

The reform of the EU Data Protection framework - Building trust in a digital and global world. 9/10 October 2012

The problem of cloud data governance

Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

Council of the European Union Brussels, 5 March 2015 (OR. en)

Adopting Cloud Computing with a RISK Mitigation Strategy

Role of contracts in Cloud Computing an Overview. Kevin McGillivray Doctoral Candidate (NRCCL)

Best Practices at Research Level

ARTICLE 29 DATA PROTECTION WORKING PARTY

FRANCE. Chapter XX OVERVIEW

New EU Data Protection legislation comes into force today. What does this mean for your business?

How To Understand The Privacy Shield

Privacy in the cloud. DNB has indicated that it considers cloud computing a form of outsourcing.

Align Technology. Data Protection Binding Corporate Rules Processor Policy Align Technology, Inc. All rights reserved.

Data protection issues on an EU outsourcing

CFPB Readiness Series: Compliant Vendor Management Overview

Big Data for Mutuals. Marc Dautlich 25 November 2013

Cloud Computing in a Government Context

White Paper: Data Protection In The Cloud. Data Protection In The Cloud

How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015

Data Processing Agreement for Oracle Cloud Services

Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries

Pursuant to Convention No. 108 of the Council of Europe for the protection of persons with regard to the automated processing of personal data;

Transcription:

Cloud computing and personal data protection Gwendal LE GRAND Director of technology and innovation CNIL 1

Data protection in Europe Directive 95/46/EC Loi 78-17 du 6 janvier 1978 amended in 2004 (France) Definition of personal data Principles : Purpose limitation, proportionality, retention period, security, data subjects rights Cloud vs. data protection Topic Cloud Data protection (Directive) Control and security Data controllership Provider: We take care of everything Provider: We take care of everything and we are not liable the processor shall act only on instructions from the controller controller shall mean the entity which determines the purposes and means of the processing Location Retention period Provider: We cannot guarantee the location of your data Retention policies are independent from the client or the processing transfer may take place only if ( ) the third country in question ensures an adequate level of protection personal data is kept for no longer than is necessary for the purposes for which the data were collected 2 Opportunity: Strategic data = Personal data

Snowden impact 88% decision-makers changing cloud buying behavior 5% of respondents believe location does not matter at all when it comes to storing company data 31% of ICT decision-makers are moving data to locations where it will be safe 62% of those not currently using cloud feel the revelations have prevented them from moving their ICT into the cloud ICT decision-makers prefer buying a cloud service located in their own region, esp. EU respondents (97 %) and US respondents (92%) 16 % are delaying or cancelling contracts with cloud service providers Source : NTT Communications 2014 survey of 1,000 ICT decision-makers in France, Germany, Hong Kong, UK and USA http://nsaaftershocks.com/wp-content/themes/nsa/images/nttc_report_web.pdf 3

Part 2 Part 1 Outline CNIL recommendations Guidance with models of contractual clauses (2012) WP29 recommendations Opinion 5/2012 on cloud computing Cloud security alliance Privacy Level Agreement Outline for cloud services in the EU Star certification Part 3 GDPR Adoption process Certification Processors C-SIG draft code of conduct (EU level) Opinion 2/2015 on C-SIG draft code of conduct ISO standards 4

1. CNIL s recommendations Process Interviews Public consultation (end 2011) Consultation analysis Publication of recommendations (June 2012) Objectives Help companies, esp. SMEs, decide Meet current state of play practical tools: method and model clauses Formal documents to support (security and legal) vs. finance Provide food for thought Key steps Identify data + processing operations which will be passed to Cloud Define your requirements for technical and legal security Carry out a risk analysis to identify the essential security measures for the company* Identify the relevant type of Cloud Choose a service provider offering sufficient guarantees* Review the internal security policy Monitor changes over time 5

1. CNIL s recommendations Process Interviews Public consultation (end 2011) Consultation analysis Publication of recommendations (June 2012) Objectives Help companies, esp. SMEs, decide Meet current state of play practical tools: method and model clauses Formal documents to support (security and legal) vs. finance Provide food for thought Key steps Identify data + processing operations which will be passed to Cloud Define your requirements for technical and legal security Carry out a risk analysis to identify the essential security measures for the company* Identify the relevant type of Cloud Choose a service provider offering sufficient guarantees* Review the internal security policy Monitor changes over time 6

1. CNIL s recommendations: Risk analysis Information security risks + data protection and privacy risks Both processes can be combined Methodology for Privacy Impact Assesments For data controllers For data processors 7

1. CNIL s recommendations: Risks 35 risks identified by ENISA 1 CNIL : 10 risks with higher data protection relevance Loss of governance; Vendor lock-in; Isolation failure; Legal requests, in particular by foreign authorities; Supply chain failure; Insecure or ineffective deletion of data, or too long retention period; Improper access rights management; Unavailability; Cloud provider termination or acquisition; Compliance challenges, especially on international transfers. Data protection specific 1. http://www.enisa.europa.eu/activities/risk-management/files/deliverables/cloud-computing-risk-assessment 8

1. CNIL s recommendations: A provider with sufficient guarantees Determine CSP qualification : Processor OR joint controllership Allocating liability Facts analysis on public PaaS and SaaS: Low level of instructions No monitoring capabilities Standard offers Standard contracts Joint controllership (generally) Model clauses only models! But: Service providers who do not offer these essential guarantees in their contracts and who refuse any negotiation with their potential customers should not be selected Controller must have access to all the technical and security information needed for risk analysis: Accessible security policy Physical safety and security measures on the host site Measures to ensure the availability, integrity, confidentiality; System for reporting complaints and security breaches; Reversibility/portability ; Traceability and reporting of incidents detected by the CSP ; Service Level Agreements Privacy commitments (e.g. clauses, CSA PLA) If the provider is data processor, the customer must be able to audit the provider s system* Role of Certifications (ex : ISO /IEC 27001) Compliance with data protection laws, subcontractors, retention period, transfers (next slides), etc. 9

1. CNIL s recommendations: Audit & Certification Right to Audit? from the right to audit the location of the servers where data are processed and stored. to the right to audit the security measures of the processor, CSP : As a processor, you should accept audit from your controllers As a joint-controller, responsible of security. Controller : You don t HAVE TO audit your processors but you should BE ABLE TO. 10

1. CNIL s recommendations: Transfers outside EU Clear and complete indication of countries hosting the service provider's data centres; Adequate protection abroad EC Standard contractual clauses Binding corporate rules BCR 1 st transfer vs ulterior transfer Any transfer should be legally grounded Add in your contract that clauses or BCR are mandatory to any ulterior transfer About Safe Harbor Safe Harbor is illegal since 6/10/2015 Any such transfers should be stopped What can replace SH? EC Standard contractual clauses? Binding corporate rules BCR? SH2? Immediate information to the customer in case of a request from a foreign administrative or judicial authority. 11

2. Other actions Contribution to ANSSI referential on qualification of Cloud provider («Prestataire de services sécurisés d informatique en nuage») WP29 recommendations (WP196 July 2012) and Opinion 2/2015 on C-SIG draft code of conduct Participation to several international groups ISO [see next slide] CSA : PLA (February 2013) and PLAv2 (May 2015) 12

2. C-SIG draft code of conduct Cloud code of conduct (EU level) Opinion 2/2015 on C-SIG draft code of conduct Transition to GDPR ; CoC vs enforcement by DPAs ; governance of the code ; Location of the processing ; International transfers ; liability ; security ; right to audit Next steps 13

2. ISO standards ISO/IEC 29100 Privacy framework Terminology and principles to be used in every privacy related standard ISO/IEC 29151 Code of practice for PII protection Catalogue of generic privacy controls, in addition to ISO/IEC 27002 (information security controls) ISO/IEC 27017 Code of practice for information security controls for cloud computing services based on ISO/IEC 27002 Catalogue of information security controls specific to cloud computing, in addition to ISO/IEC 27002 ISO/IEC 27018 Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors Catalogue of privacy controls specific to cloud computing, (theoretically) in addition to ISO/IEC 29151 ISO/IEC 27001 Information security management system (ISMS) Requirements for the certification of information security management systems ISO/IEC 27009 Sector specific application of ISO/IEC 27001 Requirements Requirements for the creation of sector-specific standards that would fit in the ISO/IEC 27001 framework Next step: use ISO/IEC 27009 requirements to build the missing privacy requirements in a new standard, in order to be able to certify management systems including privacy and/or cloud computing specific aspects 14

3. The draft GDPR General purposes Adapt to the Internet world Harmonise across Europe Simplify procedures Accountability European Commission Publication of the proposal for a Regulation VOTE in Parliament VOTE in Council In practice No prior notification but extended data breach notification Joint responsibility for some services and security (art 24 & 30) Cloud computing Higher fines TRILOGUE between EC, EP and Council to build a consensus on the text Expected adoption of the final text The regulation is applicable. Directive 95/46/EC is repealed 95/46/CE 15

3. GDPR: Certification (art.39) Different types certification mechanisms, data protection seals and marks In effect Demonstrate compliance with the Regulation of processing operations carried out. Does not reduce the responsibility of the controller or the processor for compliance with the Regulation Does not impact the tasks and powers of the supervisory authority 16

3. GDPR: processors Changes / clarifications. The processor: shall not enlist another processor without consent of the controller ; Implements appropriate measures to ensure a level of security appropriate to the risks ; makes available to the controller all information necessary to demonstrate compliance + allow for and contribute to audits conducted by the controller ; informs the controller if, in his opinion, an instruction breaches this Regulation or Union or Member State data protection provisions ; shall notify the controller without undue delay after becoming aware of a personal data breach ; may/shall designate a data protection officer. 17

Conclusion Several tools are useful in the cloud DPA recommendations Best practices Certifications Codes of conducts Different level of transparency and assurance GDPR as a game changer and opportunity to raise trust in CSPs 18 TITRE DE LA PRESENTATION

Useful references CNIL s recommendations http://www.cnil.fr/english/news-and-events/news/article/cloud-computing-cnilsrecommandations-for-companies-using-these-new-services/ CNIL s guides Security (basics): http://www.cnil.fr/fileadmin/documents/en/guide_security_of_personal_data-2010.pdf Privacy Impact Assessment: http://www.cnil.fr/english/news-and-events/news/article/privacy-impact-assessmentsthe-cnil-publishes-its-pia-manual/ WP29 Opinion on Cloud computing: http://ec.europa.eu/justice/data-protection/article-29/documentation/opinionrecommendation/files/2012/wp196_en.pdf 19