Israeli Law Information and Technology Authority. Privacy and Data Security in the Cloud - The Israeli Perspective



Similar documents
The problem of cloud data governance

Cloud Computing: Legal Risks and Best Practices

NATIONAL PARTNERSHIP AGREEMENT ON E-HEALTH

(a) the kind of data and the harm that could result if any of those things should occur;

Global Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister

Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL

CONSULTATION PAPER ON HIGH LEVEL PRINCIPLES ON OUTSOURCING COVER NOTE

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005

Clinical Trials in the Cloud: A New Paradigm?

Cloud Computing Security Audit

Cloud Computing. Introduction

Article 29 Working Party Issues Opinion on Cloud Computing

How To Secure Cloud Computing

Bank of Israel. 1. Background. In recent years, cloud. environmentally. from. aspects in. these. 2. Applicability. Directive ). 3.

ARTICLE 29 DATA PROTECTION WORKING PARTY

Data protection issues on an EU outsourcing

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

AUDITING AND ENFORCEMENT AT THE SPANISH DPA. EXPERIENCE WITH OUTSOURCING TO COUNTRIES WITH A NON ADEQUATE LEVEL OF PROTECTION

Evolving Technology Issues: Cloud Computing

AIRBUS GROUP BINDING CORPORATE RULES

Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL

7.0 Information Security Protections The aggregation and analysis of large collections of data and the development

Cloud Security Introduction and Overview

BANKING UNIT BANKING RULES OUTSOURCING BY CREDIT INSTITUTIONS AUTHORISED UNDER THE BANKING ACT 1994

Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:

OVERVIEW. stakeholder engagement mechanisms and WP29 consultation mechanisms respectively.

Data protection legislation influence on cloud computing from local as well as EU perspective

14 December 2006 GUIDELINES ON OUTSOURCING

Type of Personal Data We Collect and How We Use It

Information Technology: This Year s Hot Issue - Cloud Computing

All Party Parliamentary Group (APPG) on Nuisance Calls inquiry into Nuisance Telephone Calls. Written evidence from BT.

Big Data, Big Risk, Big Rewards. Hussein Syed

Outsourcing Technology Services A Management Decision

Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee

Assist Members in developing their own national arrangements through being able to draw on and hence benefit from the experience of other members;

Principles of Best Practice applicable to the distribution of Life Insurance Products on a Cross-border Basis within the EU or a Third Country

Protocol Concerning Cooperation. in the Administration and Enforcement. of Futures Laws. between the. Israel. Securities Authority.

Appendix 11 - Swiss Data Protection Act

Security Challenges of Cloud Providers ( Wie baue ich sichere Luftschlösser in den Wolken )

Processor Binding Corporate Rules (BCRs), for intra-group transfers of personal data to non EEA countries

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations

GUIDELINE ON THE APPLICATION OF THE OUTSOURCING REQUIREMENTS UNDER THE FSA RULES IMPLEMENTING MIFID AND THE CRD IN THE UK

The Legal Pitfalls of Failing to Develop Secure Cloud Services

Under European law teleradiology is both a health service and an information society service.

Statement of Guidance: Outsourcing All Regulated Entities

Role of contracts in Cloud Computing an Overview. Kevin McGillivray Doctoral Candidate (NRCCL)

Accountability: Data Governance for the Evolving Digital Marketplace 1

Cloud Computing Governance & Security. Security Risks in the Cloud

The eighth data protection principle and international data transfers

GSK Public policy positions

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Outsourcing Risk Guidance Note for Banks

Mapping of outsourcing requirements

Data Privacy and Security for Market Research in the Cloud

A Flexible and Comprehensive Approach to a Cloud Compliance Program

Policy and Procedure for approving, monitoring and reviewing personal data processing agreements

EU Regulatory Trends in Data Protection & Cybersecurity What should be on the industry s agenda?

Transparency. Privacy. Compliance. Security. What does privacy at Microsoft mean? Are you using my data to build advertising products?

CLOUD COMPUTING FOR ehealth DATA PROTECTION ISSUES

Law Enforcement Recommendations Regarding Amendments to the Registrar Accreditation Agreement

Refresher on cloud computing

Board of Directors Meeting 12/04/2010. Operational Risk Management Charter

CCBE GUIDELINES ON THE USE OF CLOUD COMPUTING SERVICES BY LAWYERS

Mutual legal recognition of electronic communications and electronic signatures and paperless trade facilitation: challenges and opportunities

OUTSOURCING, HOSTING AND DATA PRIVACY ISSUES

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak

Understanding ISO and Preparing for the Modern Era of Cloud Security

Guidance on Arrangements to Support Operational Continuity in Resolution. Consultative Document

CPNI VIEWPOINT 01/2010 CLOUD COMPUTING

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

HIPSSA Project. Support for Harmonization of the ICT Policies in Sub-Sahara Africa, Second Mission -Namibia

XIT CLOUD SOLUTIONS LIMITED

PIPEDA and Online Backup White Paper

Transcription:

הרשות למשפט, טכנולוגיה ומידע Israeli Law Information and Technology Authority Privacy and Data Security in the Cloud - The Israeli Perspective Amit Ashkenazi, Head of the Legal Department

Outline Introduction The Israeli Data Protection regime ILITA and ILITA s regulatory strategy Setting the ground for the cloud Outsourcing in general Transfer Abroad regime Data Protection compliance in the cloud Identifying cloud specific legal and technical risk areas Mitigating risks through legal and technical measures 2

Introduction OUTLINE 3

Data protection in Israel Basic law: Human Dignity and Liberty, Paragraph 7 The Protection of Privacy Act of 1981 Chapter A Privacy Torts and offenses Chapter B Regulation of databases collection and processing of PII - Reducing risks of misuse of collection and processing of PII Israel Data Protection regime found adequate according to EU Directive 4

ILITA ILITA set up in 2006 Regulatory functions according to three laws Protection of Privacy Act - Credit Information Services - Electronic Signature Head of ILITA (Data Protection Commissioner) Legal Department Enforcement Department Registration and Supervision Department 5

Setting the ground for the cloud - Outsourcing and Cross border transfers OUTLINE 6

Outsourcing Guideline (1) Controller s duties: Article 17 Information Security Protection of Privacy Regulations 2 nd Draft of Protection of Privacy Regulations (Information Security) Preliminary analysis Description of the service and data involved Internal coordination Privacy analysis risks and measures Privacy by design Budget to include costs of protective measures 7

Outsourcing Guideline (2) Contract Checking and managing conflicts of interest Purposes of processing defined in clear terms. Access rules. Information security Personnel and training Communication and coordination mechanisms as part of the service. Effective sanctions Contract termination Monitoring compliance 8

Cross-border Transfers - Overview Three specific requirements Notifying the transfer (section 9(b)(4) and (d) to the PPA) A base for transfer according to the Regulations* Adequate style country OR Other specific bases A written undertaking by the importer to the exporter regarding measures to protect privacy according to the Regulations. * Privacy Protection (Transfer of Data to Databases Abroad) Regulations, 5761-2001 9

Cross-border Transfers (2) Regulation 2 - Bases for transfer Adequate style country OR Other specific bases Consent Protection of vital interest of the data subject To a company controlled by the database owner. According to an agreement A transfer to a country which is Part of the COE 108. Imports data from EU members under the same terms. 10

The Cloud OUTLINE 11

Cloud challenges Technological challenges Virtualization Risks Network Risks Mutual Tenancy Risks Monitoring i data usage Legal challenges Standard form contracts Cross border transfers Monitoring compliance 12

Uniformity and Transparency Challenges 13

Looking for a Solution - NIST 14

Looking for a Solution - ENISA 15

Accountability and the cloud An enhanced accountability model Forcing high level management awareness by procedural means. Mandating contracts and commitments (fashioned after EU model contractual clauses) A basic outsourcing framework PLUS [Choice of law] [Jurisdiction] Special measures to mitigate relevant risks. Understanding cloud specific risks Implementing relevant measures. Using industry best practices [i.e. NIST, CSA, ENISA, etc.] 16

Workflow Accountability - example Preliminary Actions Choose service model and check privacy implications Assess cloud service provider Assess control in the service model Ongoing Ias, Pas, SaS Private vs. public Encryption Separating access control Verify all contractual requirements are addressed in the SLA, including data protection and privacy issues Managing access control. Monitoring. Information security audits 17

The Israeli Law Information and Technology Authority www.ilita.justice.gov.il ilita@justice.gov.il Amit Ashkenazi, Head of the Legal Department 18