CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS. White Paper



Similar documents
Cloud Computing: Privacy and Other Risks

MICROSOFT OFFICE 365 PRIVACY IMPACT ASSESSMENT. Western Student E-Communications Outsourcing

CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

Privacy Law in Canada

Cloud Computing Contracts. October 11, 2012

SUBJECT: VOYAGEUR TRANSPORTATION CORPORATE POLICIES/PROCEDURES TITLE: PRIVACY OF PERSONAL HEALTH INFORMATION

Cloud Computing: Trust But Verify

RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES

Protecting Saskatchewan data the USA Patriot Act

Privacy Law in Canada

Taking care of what s important to you

How To Ensure Health Information Is Protected

Accountable Privacy Management in BC s Public Sector

CLOUD COMPUTING & THE PATRIOT ACT: A RED HERRING?

Personal Information Protection Act ( PIPA ) Privacy-Proofing Your Retail Business Tips for Protecting Customers Personal Information 1

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector ANN CAVOUKIAN, PH.D. COMMISSIONER

The Use of Cloud Computing for the Storing and Accessing of Client Information: Some Practical and Ethical Considerations

Considerations for Outsourcing Records Storage to the Cloud

THE PERSONAL INFORMATION PROTECTION AND ELECTRONIC DOCUMENTS ACT (PIPEDA) PERSONAL INFORMATION POLICY & PROCEDURE HANDBOOK

Cloud Computing: Legal Risks and Best Practices

Data Management: Considerations for Integrating Compliance Requirements At Home and Abroad. Toronto, Ontario June 14, 2005

Law Firm Compliance: Key Privacy Considerations for Lawyers and Law Firms in Ontario

The Manitoba Child Care Association PRIVACY POLICY

Doing Business. A Practical Guide. casselsbrock.com. Canada. Dispute Resolution. Foreign Investment. Aboriginal. Securities and Corporate Finance

How to Avoid Abandoned Records: Guidelines on the Treatment of Personal Health Information, in the Event of a Change in Practice

This procedure is associated with BCIT policy 6700, Freedom of Information and Protection of Privacy.

M&T BANK CANADIAN PRIVACY POLICY

Privacy Breach Protocol

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1

Legal Cloud Computing: Concepts and Ramifications

Cloudy With a Chance Of Risk Management

Privacy Impact Assessment Guidelines for the Ontario Personal Health Information Protection Act. Ann Cavoukian, Ph.D. Commissioner October 2005

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

Best Practices for Protecting Individual Privacy in Conducting Survey Research

Policy Brief: Protecting Privacy in Cloud-Based Genomic Research

Best Practices in Data Management - A Guide for Marketers -

Office 365 Data Processing Agreement with Model Clauses

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES

Privacy in the Cloud Computing Era. A Microsoft Perspective

Managing Contracts under the FOIP Act. A Guide for Government of Alberta Contract Managers and FOIP Coordinators

Privacy Policy on the Collection, Use, Disclosure and Retention of Personal Health Information and De-Identified Data, 2010

Contact: Henry Torres, (870)

PERSONAL INFORMATION PRIVACY POLICY FOR EMPLOYEES AND VOLUNTEERS [ABC SCHOOL]

Privacy and Management of Health Information: Standards for CARNA s Regulated Members

Ministry of Children and Family Development (MCFD) Contractor s Information Management Guidelines

Report of the Information & Privacy Commissioner/Ontario. Review of the Canadian Institute for Health Information:

Annex 1. Contract Checklist for Cloud-Based Genomic Research Version 1.0, 21 July 2015

The USA Patriot Act Government Briefing. Kirsten Tisdale, Chris Norman, Sharon Plater & Alexandra (Gina) Henley September 30, 2004

Information Security Classification

Privacy and Security Framework, February 2010

COUNCIL OF THE EUROPEAN UNION. Brussels, 22 November /06 DATAPROTECT 45 EDPS 3

PERSONAL HEALTH INFORMATION PROTECTION ACT, 2004: AN OVERVIEW FOR HEALTH INFORMATION CUSTODIANS

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Privacy Incident and Breach Management Policy

Taking care of what s important to you

CLOUD COMPUTING ISSUES FOR SCHOOL DISTRICTS. Presented to the 2013 BRADLEY F. KIDDER LAW CONFERENCE. October 2, 2013

Privacy and Cloud Computing for Australian Government Agencies

British Columbia Personal Information Protection Act. Frequently Asked Questions:

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between

Personal Health Information Privacy Policy

Procedure for Managing a Privacy Breach

Personal Information Protection and Electronic Documents Act

Document Management in the FIPPA Era

INSTITUTE FOR SAFE MEDICATION PRACTICES CANADA

This Amendment consists of two parts. This is part 1 of 2 and must be accompanied by and signed with part 2 of 2 (Annex 1) to be valid.

EHR Contributor Agreement

Personal Information Protection and Electronic Documents Act (PIPEDA)

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

Secure Cross Border File Protection & Sharing for Enterprise Product Brief CRYPTOMILL INC

Personal Information Protection Act Information Sheet 11

Securing Data in the Cloud

Helpful Tips. Privacy Breach Guidelines. September 2010

A Privacy Handbook for Lawyers PIPEDA AND YOUR PRACTICE

California State University, Sacramento INFORMATION SECURITY PROGRAM

VIDEO SURVEILLANCE GUIDELINES

3. Consent for the Collection, Use or Disclosure of Personal Information

Index All entries in the index reference page numbers.

The potential legal consequences of a personal data breach

Metadata, Electronic File Management and File Destruction

XIT CLOUD SOLUTIONS LIMITED

Transcription:

CANADIAN PRIVACY AND DATA RESIDENCY REQUIREMENTS White Paper

Table of Contents Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership... Section I: Vaultive Response to PIPEDA, PIPA (Province of Alberta), PHIPA (Province of Ontario) and FIPPA Requirements... Section II: Data Residency and Residency of Controls... Vaultive Response: Maintaining Data Privacy and Control Residency... 3 4 9 10 2

Addressing Data Control and Compliance with Canadian Privacy Regulations for Cloud-based services: The adoption of cloud computing presents a new set of compliance concerns and need for best practices guidelines under privacy laws applied to both Canadian government bodies and organizations in the private sector. The Government of Canada and provincial governments have been required to manage the privacy of personal information since the passage of the Privacy Act of 1983. With the development of online commerce, requirements for the protection of personal information were extended to private sector organizations holding electronic records of personal information when the Personal Information Protection and Electronic Documents Act of 2004 was passed. The privacy laws and legislation share a set of common principles that relate to accountability, technical safeguards and limiting disclosure of personal information, at least in the context of this discussion. As cloud computing adoption grows, concerns about the integrity of safeguards for the privacy of personal information have intersected with anxiety over the implications of trans-border data flow and data residency issues that could be viewed as at odds with Canadian privacy requirements. This evolving landscape is catalyzing the initial definition of best practices related for the ownership and control of data processed in third-party environments. Addressing compliance with privacy laws for cloud-based services through persistent encryption and key ownership At the heart of the concerns that bring compliance under consideration is how organizations can continue to maintain control and protection of personal information, even when the information resides on a third-party service. Vaultive s platform is designed to complement existing cloud service provider security safeguards through an additional layer of data control capabilities based on persistent encryption and retention of the encryption keys by the organization held accountable for privacy protection. These data control capabilities enable organizations to satisfy the requirements for accountability and technical safeguards, specifically in the area of encryption. Vaultive s proxy-based approach enables organizations to seamlessly extend the trusted enterprise boundary through advanced encryption-in-use capabilities and preserve application functionality through platform extensions for Office 365 and Hosted Exchange services. In line with the Cloud Security Alliance s updated security guidance covering best practices for migrating data to the cloud, Vaultive s enterprise-grade cloud data encryption solutions enable customers to encrypt data-at-rest, data-intransit and data-in-use in the cloud. Microsoft has committed to providing Office 365 and Hosted Exchange customers the performance, scalability, security and service levels business customers expect, as well as ongoing investment in security processes and technologies. Vaultive s data control and encryption capabilities complement access management technologies for cloud-based services, such as federated identity supported by Microsoft technologies such as Active Directory Federation Server. This document provides an overview of how Vaultive s technology addresses the security, privacy and accountability requirements as defined by current Canadian privacy law, related to both government institutions and commercial organizations, specifically in the context of cloud-based services. The Personal Information Protection and Electronic Documents Act (PIPEDA) and related Personal Information Protection Act (PIPA) legislation as declared by provincial legislatures in Alberta, British Columbia, Ontario and Quebec is directed primarily at commercial organizations, while the Privacy Act of 1985 and the Freedom of Information and Protection of Privacy Act (FIPPA) covers federal and provincial organizations. Section I of this document also serves to illustrate how Vaultive can address the technical safeguards and accountability requirements as defined in the various laws. Section II addresses how Vaultive s key management and proxy-based approach enables Canadian organizations to manage border data flow and maintain residency of data controls. 3

Section I: Vaultive Response to PIPEDA, PIPA (Province of Alberta), PHIPA (Province of Ontario) and FIPPA Requirements PIPEDA Requirement Description of Controls 1 Vaultive Response 4.1.3 Principle 1 Accountability An organization is responsible for personal information in its possession or custody, including information that has been transferred to a third party for processing. The organization shall use contractual or other means to provide a comparable level of protection while the information is being processed by a third party. Vaultive s design goal is to deliver a platform that directly addresses the requirements for ownership and control of personal information under an organization s custody that resides or is processed on cloud-based services. Through deployment of the Vaultive proxy, organizations can encrypt data before it leaves the trusted network, while enterprise IT retains the encryption keys. Based on advanced encryption capabilities that allow for processing of encrypted ciphers in a third-party environment while maintaining application functionality, Vaultive s platform supports the additional dimension of encryption of data in use. Vaultive s persistent encryption capabilities allow customers to satisfy requirements to encrypt data in transit to the cloud service provider, maintain encryption of data at rest while resident in the cloud, in addition to supporting encryption of data processed by a third-party service. This functionality set enables organizations to address their responsibility related to the custody of personal information as delineated under PIPEDA in two key aspects: firstly, by encrypting all personal information before it traverses a trusted boundary; and, by retaining the encryption keys to data resident on a third-party service, organizations can point to system controls to demonstrate fulfillment of the protection requirement. 1 Personal Information Protection and Electronic Documents Act, Current to September 4, 2012, CAN/CSA-Q830-96 4

4.7 Principle 7 Safeguards The security safeguards shall protect personal information against loss or theft, as well as unauthorized access, disclosure, copying, use, or modification. Organizations shall protect personal information regardless of the format in which it is held. Vaultive s platform addresses the requirements for security safeguards to protect against loss or theft of personal information through advanced encryption techniques that span the trusted network and the service provider s environment. Based on the outcome of significant research and development in cryptography and key management, as well as ongoing product investments, the Vaultive platform maintains referential integrity to support processing of encrypted ciphers. Since the server-side processing is performed against encrypted data, data never resides in the clear outside of the trusted network. In addition, enterprise IT retains control of the encryption keys, providing an additional layer of controls to ensure protection of personal information and prevent unauthorized access. Because enterprise IT retains control of the encryption keys, disclosure requests from law enforcement agencies directed initially to the cloud service provider can be managed independently by the enterprise. Enterprise control of the encryption keys eliminates the risk that personal information can be inadvertently exposed to administrators at cloud service providers with access to customer instances. Were a hacker to be successful in their breach of the service provider s environment, the data that they would retrieve from Vaultive s customers would remain encrypted. The hacker would only gain access to the data or emails if they could also hack the encryption keys directly from the responsible organization. While cloud service providers would still be required to issue a notification should a breach take place, the use of Vaultive s technology would reduce the scope of customer records that could be compromised, since they are in encrypted format. 5

4.7 Principle 7 Safeguards The methods of protection should include: (a) physical measures, for example, locked filing cabinets and restricted access to offices; (b) organizational measures, for example, security clearances and limiting access on a need-to-know basis; and (c) technological measures, for example, the use of passwords and encryption. Vaultive s enterprise-class cloud data encryption solutions enable customers to encrypt data-at-rest, data-in-transit and data-in-use in the cloud. Since enterprise cloud data is encrypted for the entire duration of its lifecycle (at-rest, in-transit and in-use), Vaultive s market-leading capabilities for cloud data security serve to comprehensively insulate data from unauthorized access or targeted attacks by a third party. The Vaultive approach fully addresses the risk of inadvertent exposure of confidential data to administrators at the cloud service provider as enterprises reap the benefits from the moving their Exchange infrastructure to the cloud. Vaultive employs a patent-pending form of standard 256-bit AES encryption, supplemented with additional layer of encrypted metadata. In order to significantly minimize any statistical risk that the platform s referential integrity for maintaining server-side processing of encrypted data can be compromised, Vaultive has invested heavily in several layers of compensating security measures. 4.5 Principle 5 Limiting use, disclosure, and retention: Organizations are required to comply with a subpoena or warrant issued or an order made by a court, person or body with jurisdiction to compel the production of information, or to comply with rules of court relating to the production of records While service providers are compelled to comply with requests from law enforcement agencies delivered as a subpoena or a warrant to disclose personal information, once Vaultive is deployed only enterprise IT can release the keys to decrypt the data. This allows the organization to independently manage the government request. Additionally, the Vaultive appliance can be configured to ensure that data that moves beyond a specific jurisdictional domain remains encrypted. 6

PIPA Requirement Description of Controls 2 Vaultive Response Reasonable Technical Safeguards to protect personal information in their custody or control Section 34 of the Personal Information Protection Act ( PIPA or the Act ) requires organizations to protect personal information in their custody or control by making reasonable security arrangements against such risks as unauthorized access, collection, use, disclosure, copying, modification, disposal or destruction. Vaultive s design goal is to deliver a platform that directly addresses the requirements for ownership and control of personal information under an organization s custody that resides or is processed on cloudbased services. Through deployment of the Vaultive proxy, organizations can encrypt data before it leaves the trusted network, while enterprise IT retains the encryption keys. Based on advanced encryption capabilities that allow for processing of encrypted ciphers in a third-party environment while maintaining application functionality, Vaultive s platform supports the additional dimension of encryption of data in use. Vaultive s persistent encryption capabilities allow customers to satisfy requirements to encrypt data in transit to the cloud service provider, maintain encryption of data at rest while resident in the cloud, in addition to supporting encryption of data processed by a third-party service. This functionality set enables organizations to address their responsibility related to the custody of personal information as delineated under PIPA in two key aspects: firstly, by encrypting all personal information before it traverses a trusted boundary; and, by retaining the encryption keys to data resident on a third-party service, organizations can point to system level controls to demonstrate fulfillment of the protection requirement. Reasonable Technical Safeguards to protect personal information in their custody or control. According to the Alberta Information and Privacy Commissioner s report on privacy breaches in the province for the period of Jan 1- April 30 2012, of the 63 significant reported breaches, 14 were caused by electronic system compromises (with human error accounting for 22 of the total). These breaches were typically found to occur as a result of targeted attacks by external hackers seeking to extract large amounts of data. Were a hacker to be successful in their breach of the service provider s environment, the data that they would retrieve from Vaultive s customers would remain encrypted. The hacker would only gain access to the data or emails if they could also retrieve the encryption keys directly from the responsible organization. 2 Personal Information Protection Act, Province of Alberta, January 1, 2004 7

PHIPA Requirement Description of Controls 3 Vaultive Response Practices to Protect Personal Health Information, Security FIPPA (British Columbia Requirement) Protection of Privacy Collection, Protection and Retention of Personal Information by Public Bodies A health information custodian shall take steps that are reasonable in the circumstances to ensure that personal health information in the custodian s custody or control is protected against theft, loss and unauthorized use or disclosure and to ensure that the records containing the information are protected against unauthorized copying, modification or disposal. Description of Controls 4 A public body must protect personal information in its custody or under its control by making reasonable security arrangements against such risks as unauthorized access, collection, use, disclosure or disposal. Vaultive s persistent encryption capabilities allow customers to satisfy requirements to encrypt data in transit to the cloud service provider, maintain encryption of data at rest while resident in the cloud, in addition to supporting encryption of data processed by a third-party service. This functionality set enables organizations to address their responsibility related to the custody of personal information as delineated under PHIPA in two key aspects: firstly, by encrypting all personal information before it traverses a trusted boundary; and, by retaining the encryption keys to data resident on a third-party service, organizations can point to system level controls to demonstrate fulfillment of the protection requirement. Vaultive Response Vaultive s persistent encryption capabilities allow customers to satisfy requirements to encrypt data in transit to the cloud service provider, maintain encryption of data at rest while resident in the cloud, in addition to supporting encryption of data processed by a third-party service. This functionality set enables organizations to address their responsibility related to the custody of personal information as delineated under FIPPA in two key aspects: firstly, by encrypting all personal information before it traverses a trusted boundary; and, by retaining the encryption keys to data resident on a third-party service, organizations can point to system level controls to demonstrate fulfillment of the protection requirement. 3 Personal Health Information Protection Act, Province of Ontario, January 1, 2004 4 Freedom of Information and Protection of Privacy Act, [Revised Statutes of British Columbia, 1996] 8

FOIP Requirement Description of Controls 5 Vaultive Response Protection of Privacy Collection, Protection and Retention of Personal Information by Public Bodies...reasonable security measures are followed to protect against unauthorized access, use, alteration, destruction, or disclosure of personal information. Vaultive s persistent encryption capabilities allow customers to satisfy requirements to encrypt data in transit to the cloud service provider, maintain encryption of data at rest while resident in the cloud, in addition to supporting encryption of data processed by a third-party service. This functionality set enables organizations to address their responsibility related to the custody of personal information as delineated under FOIP in two crucial aspects: firstly, by encrypting all personal information before it traverses a trusted boundary; and, by retaining the encryption keys to data resident on a third-party service, organizations can point to system level controls to demonstrate fulfillment of the protection requirement. Section II: Data Residency and Residency of Controls Under Canadian privacy law, both federal bodies and commercial organizations domiciled within Canadian borders are responsible for the privacy and protection of personal information in their custody. This requirement applies regardless of where the data resides. While significant concerns have been articulated with regards to the probability of disclosure to US law enforcement agencies of data that resides within datacenters located within the US, the requirements pertain directly to the safeguards in place to maintain control. As noted in her formal response to a question related to compliance with the Freedom of Information and Protection of Privacy Act presented by two members of the Ontario provincial parliament about the privacy and security of personal information collected by the Ministry of Natural Resources that is currently being stored in the U.S., Ann Cavoukian, Information and Privacy Commissioner for the Province of Ontario wrote: It is important to remember that, in Ontario, there is no legislative prohibition against the storing of personal information outside of the province or Canada. In other words, Ontario law, including the Act, does not speak to this issue. However, the Act and its regulations do require provincial institutions to ensure that reasonable measures are in place to protect the privacy and security of their records containing personal information. This applies regardless of where the records are located. 5 The Freedom of Information and Protection of Privacy, Sec 38 9

Commissioner Cavoukian further added: The critical question for institutions which have outsourced their operations across provincial or international borders is whether they have taken reasonable steps to protect the privacy and security of the records in their custody and control. I have always taken the position that you can outsource services, but you cannot outsource accountability. Control of the keys in combination with Vaultive s encryption across the data lifecycle in transit, at rest and in use provide the foundation to satisfy requirements for control and adequate safeguards for the privacy of personal information. Trans Border Data Controls (Full document available at this link: http://www.ipc.on.ca/images/findings/2012-06-28-mnr_report.pdf) The requirements, therefore, relate to where control of the data resides and the location of the data is not germane to the requirements. Vaultive Response: Maintaining Data Privacy and Control Residency Data residency and privacy challenges in the context of Canadian privacy compliance requirements pertain to limiting access to personal information in the custody of organizations subject to the legislation. Vaultive addresses this requirement to prevent unauthorized access by third parties through organizational control and ownership of the encryption keys and the application of persistent encryption. Once encrypted at the boundary of the trusted network, the data remains encrypted, even when processed within the cloud service provider environment. Regardless of the jurisdiction where the data resides, control of the access to the data remains with the organization that retains the encryption key. For organizations that are hesitant about trans-border data flow, Vaultive s persistent encryption ensures that data is never decrypted when resident in a third party s environment. Figure 1: Vaultive Trans-Border Data Controls About Vaultive For businesses moving to the cloud, Vaultive s encryption in use technology mitigates risk by empowering companies with control and ownership of their data wherever it resides. Vaultive s customers hold the encryption keys, letting them retain the freedom to use the cloud applications professionals rely on, while ensuring the governance and security that the business demands. Optimized for multiple cloud applications, the Vaultive platform supports best practices for the control and ownership of corporate data in the cloud as outlined by the Cloud Security Alliance. Vaultive addresses the requirements of global enterprises in financial services, life sciences and pharma, legal and professional services, manufacturing, retail and media, while also offering a costeffective solution for mid-size and smaller companies. For more information, visit or follow us on Twitter @vaultive. 10