A How-to Guide for Privacy, Big Data and the Cloud in the US and Asia Pacific



Similar documents
Using AWS in the context of Australian Privacy Considerations October 2015

Information Sheet: Cloud Computing

Privacy Policy. 30 January 2015

How Microsoft is taking Privacy by Design to Work. Alan Chan National Technology Officer Microsoft Hong Kong 7 May 2015

Understanding ISO and Preparing for the Modern Era of Cloud Security

PRIVACY IN THE CLOUD AND BIG DATA WHAT FRANCHISORS NEED TO KNOW!

PIPEDA and Online Backup White Paper

South East Asia: Data Protection Update

Privacy Risk Assessments

The Challenges of Applying HIPAA to the Cloud. Adam Greene, Partner Davis Wright Tremaine LLP

Privacy Statement. What Personal Information We Collect. Australia

Privacy in the Cloud A Microsoft Perspective

TPS Corporate Services Personal Data Protection Policy

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

(a) the kind of data and the harm that could result if any of those things should occur;

HIPAA and HITECH Compliance Simplification. Sol Cates

Cloud Computing Consumer Protocol. ACS Cloud Discussion Paper July 2013

ROYAL AUSTRALASIAN COLLEGE OF SURGEONS

INTERNATIONAL SOS. Data Protection Policy. Version 1.05

FISHER & PAYKEL PRIVACY POLICY

Acquia Comments on EU Recommendations for Data Processing in the Cloud

AASA Online Privacy Policy CRP.020

Cloud Computing and Records Management

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Privacy and Cloud Computing for Australian Government Agencies

Isaac Willett April 5, 2011

Cloud Computing in a Government Context

AlixPartners, LLP. General Data Protection Statement

Cloud Computing and Privacy Laws! Prof. Dr. Thomas Fetzer, LL.M. Technische Universität Dresden Law School

Analysis of Asia Pacific Hosted Market

Information Technology: This Year s Hot Issue - Cloud Computing

How To Secure Cloud Computing

{Moving to the cloud}

A Flexible and Comprehensive Approach to a Cloud Compliance Program

[Who Cares?] as a Service

Global Privacy and Data Security in the Cloud September 14, 2011 Miriam Wugmeister

How To Manage Cloud Data Safely

Four steps to improving cloud security and compliance

Brad Smith, General Counsel & Executive Vice President, Legal and Corporate Affairs, Microsoft

Recommendations for companies planning to use Cloud computing services

Cloud Security Strategies. Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems

The HR Skinny: Effectively managing international employee data flows

Cloud Computing Governance & Security. Security Risks in the Cloud

QUEENSLAND COUNTRY HEALTH FUND. privacy policy. Queensland Country Health Fund Ltd ABN better health cover shouldn t hurt

THE MOBILE MAJORITY: BUILDING PRIVACY BY DESIGN INTO MOBILE APPS

PRIVACY POLICY NEXT BUSINESS ENERGY PTY LIMITED ABN

Office of the Data Protection Commissioner of The Bahamas. Data Protection (Privacy of Personal Information) Act, A Guide for Data Controllers

Best Practices at Research Level

Addressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications

OUTSOURCING, HOSTING AND DATA PRIVACY ISSUES

SaaS. Business Associate Agreement

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Privacy Policy Draft

GE Money s Know Your Intermediary Personal Loan Broker Application

Estée Lauder Companies Global Jobs Website Privacy Policy

How To Ensure Health Information Is Protected

Data Protection Act Guidance on the use of cloud computing

Cloud Data Security. Sol Cates

John Essner, CISO Office of Information Technology State of New Jersey

Corporate Presentation

SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS

Legal Issues Associated with Cloud Computing. Laurin H. Mills May 13, 2009

Ten steps to develop a multilayered privacy notice

California State University, Sacramento INFORMATION SECURITY PROGRAM

Hans Bos Microsoft Nederland.

We ask that you contact our Privacy Officer in the event you have any questions or concerns regarding this Code or its implementation.

Service Organization Control Reports

The taxation treatment of Australian financial products is not the same as for New Zealand financial products.

Transcription:

A How-to Guide for Privacy, Big Data and the Cloud in the US and Asia Pacific Joel Lutz, The Vanguard Group, Inc and Alec Christie, DLA Piper Australia 1

SETTING THE SCENE 1. What do we mean by "Big Data" and "Cloud"? 2. Issues 3. What is the privacy framework for Big Data and Cloud? 4. Examples using framework 5. Applying the framework in a practical manner 2

THE CLOUD: WHAT IS IT? 3

BIG DATA: WHAT IS IT? 4

AUDIENCE QUESTIONS 1. For those of you who have been involved in a Big Data project, what was the privacy issue of most concern: a) re-identification of information (ie creation of personal data) b) acquisition of data from a third party c) use of collected personal data for other purposes d) the need for consent/notification e) other 2. For those of you who have been involved in a Cloud project, what was the privacy issue of most concern: a) sending personal data offshore b) security/data sovereignty c) the need for notification/consent d) working out who needed to comply with what privacy laws e) other 5

ISSUES Big Data Lack of transparency in how data is combined, transformed, and used within Big Data system Cloud Lack of transparency and joint responsibility IaaS and PaaS Disclosure and Security SaaS All framework principles are handled by data controller and cloud provider 6

GLOBAL PRIVACY FRAMEWORK Management Notice Choice/Consent Collection Use/Retention/Disposal Access Disclosure Security Quality Monitoring/Enforcement Define, document, communicate and assign accountability for privacy policies and procedures Provide notice about privacy policies and procedures; identify purpose for which information is collected, used, retained, and destroyed Provide data subject the opportunity to consent or opt out of collection or use where appropriate Collect only information needed for stated purposes Limit use to disclosed purposes; retain information only as long as needed for stated purpose; dispose of appropriately Provide data subject access to personal information for review and update Disclose information to third parties only for purposes identified Protect information against unauthorized access Maintain accurate, complete, and relevant information Monitor compliance with state privacy policies and procedures and handle related complaints 7

BIG DATA FRAMEWORK Small Data Notice/Consent/Choice Identify Data Sources Insure Proper Notice Big Data Identify Data Sources Insure Proper Notice Collection Identify Sources Assure Rights Identify Sources Assure Rights Use Policy Enforcement Create System Rules Create Business Process Rules Create Business Process Rules Create System Rules Retention/Destruction Set System Rules Set System Rules Access Input into system In system Output from system Disclosure What Data + What Purpose=Which Disclosure Allowed Input into system (In system?) Output from system What Data + What Purpose=Which Disclosure Allowed Quality Output Monitoring Output Monitoring 8

CLOUD FRAMEWORK Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Notice/Consent/Choice Data Controller Data Controller Both Collection Data Controller Data Controller Both Use Policy Enforcement Data Controller Data Controller Both Retention/Destruction Data Controller Data Controller Both Access Data Controller Data Controller Both Disclosure Both Both Both Quality Data Controller Data Controller Both Security Both Both Both 9

Notice/Consent /Choice Collection CLOUD FRAMEWORK EXAMPLE Contractual Commitment X X Data Controller Monitoring Cloud Provider Policy Review X X Cloud Provider Procedure Review Cloud Provider Reporting Use Policy Enforcement X X X X Retention/ Destruction Access Disclosure Quality Security Data Controller Inspection/ Testing Independent Audit and Report X X X X X X X X X X X X X Security: Physical X X X Security: Network X X X X Security: Application Security: Monitoring/ Data Loss Protection Security: Contingency X X X X X X X X X X X X 10

EXAMPLE/CASE STUDY: THE FACTS Australian based financial services company "Dollar Co" Operates in/collects personal data in each of: Japan through a subsidiary company "JCo" Malaysia in an incorporated joint venture with a Malaysian company "MJV" Singapore through an agent "SA" South Korea through a branch "SKB" (together "related entities") 11

EXAMPLE/CASE STUDY: THE FACTS As part of a global HR Could platform roll out Dollar Co puts (and asks all related entities to put) all their employee personal data into the third party HR Cloud platform with servers in the US and the EU. In order to focus their product development and marketing efforts across the region Dollar Co collects anonymised data from each of its related entities across the region third party information providers websites/databases on the Internet in order to run Big Data analytics and asks each of its related entities to do the same in their countries. 12

EXAMPLE/CASE STUDY: THE CHALLENGES Cloud (SaaS here): Who has what privacy obligations/what privacy laws apply? What method to confirm cloud provider responsibilities? Go through all parts of framework and answer who is responsible and how is that confirmed? 1. Notice 2. Consent 3. Collection 4. Use/Retention/Disposal 5. Access 6. Disclosure 7. Security 8. Quality 13

EXAMPLE/CASE STUDY: THE CHALLENGES Big Data How is data transformed, combined, and used? How do you confirm all parts of the framework with lack of transparency? 1. Notice 2. Consent 3. Collection 4. Use/Retention/Disposal 5. Access 6. Disclosure 7. Security 8. Quality 14

AUDIENCE QUESTION In respect of the Asia Pacific region, which do you believe is the most accurate statement: a) except for Australia and New Zealand, there are no real privacy laws in the region b) all countries in the region have privacy laws and they pretty much have uniform principles, penalties and enforcement regimes c) it is the "fastest growing" region in terms of the introduction of new and revised tougher privacy laws d) some key elements are common across most of the region (including being European in concept/approach to privacy) but there are also important differences to be wary of 15

ASIA PACIFIC PRIVACY REGIMES AT A GLANCE 16

EXAMPLE/CASE STUDY: IN GENERAL What privacy challenges are similar? Across Big Data and Cloud Across the U.S. and Asia Pacific What privacy challenges are different? Across Big Data and Cloud Across the U.S. and Asia Pacific 17

PRACTICAL SOLUTIONS 1. Have a framework based on rationalized legal requirements. (Use ours if you want!) 2. Do not abandon your framework because the project has a fancy name and uses cool sounding technology. (The names only attraction attention.) 3. Do not abandon your framework because the level or type of transparency is different. 4. Document your application of the framework. 5. Big Data: Execute at different points in different ways. 18

PRACTICAL SOLUTIONS 6. Big Data: Focus on what goes in and what comes out control there. 7. Cloud: Answer which type of cloud first. 8. Cloud: For IaaS and PaaS, focus on who is responsible for security and disclosure. 9. Cloud: For SaaS focus on who is responsible (Data Controller or Cloud Provider). 10. Cloud: For SaaS focus on how to confirm responsibilities are carried out. 19

QUESTIONS AND COMMENTS 20

RESOURCES Some resources we believe you will find useful in the Privacy, Big Data, and Cloud areas: Privacy: Data Protection Laws of the World Handbook (2014): http://www.dlapiperdataprotection.com Big Data: CSA Cloud Bytes Big Data, Open Data, Smart Data All need BIG Privacy https://cloudsecurityalliance.org/research/cloudbytes/big-data-open-datasmart-data/ Privacy and Big Data An ISACA White Paper August 2013 http://www.isaca.org/knowledge- Center/Research/ResearchDeliverables/Pages/Privacy-and-Big-Data.aspx CSA Big Data Working Group. Expanded Top Ten Big Data Security and Privacy Challenges, April 2013 http://downloads.cloudsecurityalliance. org/initiatives/bdwg/expanded_top_ten_big_data_security_and_privacy_ Challenges.pdf 21

Cloud: RESOURCES (CONT) Security Guidance for Critical Areas of Focus in Cloud Computing V3.0 http://www.cloudsecurityalliance.org/guidance/csaguide. v3.0.pdf Cloud Controls Matrix V3.0 https://cloudsecurityalliance.org/ download/cloud-controls-matrix-v3/ BSA Global Cloud Computing Scorecard 2013 http://cloudscorecard.bsa.org/2013/ Building Confidence in the Cloud: A Proposal for Industry and Government Action for Europe to Reap the Benefits of Cloud Computing (Microsoft's submission No 2 to the European Commission) http://ec.europa.eu/justice/news/consulting_ public/0003/contributions/organisations/microsoft_corporation_2nd_ document_en.pdf 22