19
Patrick Sefton | Principal Privacy and data control in the era of cloud computing

Patrick Sefton | Principal

  • Upload
    von

  • View
    40

  • Download
    0

Embed Size (px)

DESCRIPTION

Privacy and data control in the era of cloud computing. Patrick Sefton | Principal. Outline. “cloud computing” definition & examples information privacy compliance requirements pre-contract enquiries / capability questions contracts (including GITC in particular) - PowerPoint PPT Presentation

Citation preview

Page 1: Patrick Sefton |   Principal

Patrick Sefton | Principal

Privacy and data control in the era of cloud computing

Page 2: Patrick Sefton |   Principal

Outline

“cloud computing” definition & examples

information privacy compliance requirements

pre-contract enquiries / capability questions

contracts (including GITC in particular)

standards & certifications

ongoing contract management & reporting

Page 3: Patrick Sefton |   Principal

“Cloud computing”

Many names, slightly different meaningsdata / application hosting

ICT managed servicesASP / software-as-a-serviceplatform-as-a-serviceinfrastructure-as-a-serviceutility computing

but the same concept:ICT capabilityprovisioned remotely, delivered as a servicewith abstraction of detail

Page 4: Patrick Sefton |   Principal

← less of this

more like this... →

Page 5: Patrick Sefton |   Principal

...connected tothese →

Page 6: Patrick Sefton |   Principal

Commercial & technical drivers

ubiquitous high-speed communications

leverage economies of scale cost of supporting infrastructure & redundancy energy costs

reduce capital expenditure

flexibility / agility

rapid provisioning / dynamic scalability

Page 7: Patrick Sefton |   Principal

Example: Microsoft

Steve Ballmer, 4 March 2010: “literally I will tell you we’re betting our company on it.”

Page 8: Patrick Sefton |   Principal

Example: Google

Google Apps (Office workalike, email, storage) USD50/user/year 2M+ clients, including significant government

clients eg City of Los Angeles, City of Washington DC

Google AppEngine Run private software on

Google’s infrastructure

Spanner (announced October 2009) storage and computation system which spans all

datacentres & scales to 10M+ servers, 1B+ clients

Page 9: Patrick Sefton |   Principal

The devil is in the details

so ... ICT capability is provided as a service,the details are abstracted and the cost is downso everyone’s happy?

but ... some of those about-to-be-abstracted-away details are really important

information privacy and data control are important details that need to be addressed up front in cloud computing arrangements

statutory essentials pre-contract enquiries contract terms

Page 10: Patrick Sefton |   Principal

IPA & service providers to agencies

special provisions about agencies entering service arrangements

if service provider performing agency function... s35: agency must take all reasonable steps to

ensure service provider required to comply with IPPs/NPPs as if it was the agency

s36: “bound contracted service provider” required to comply with IPPs/NPPs (attracts complaint, approval, compliance mechanics of IPA)

s37: failure to bind → agency still has obligation

Page 11: Patrick Sefton |   Principal

IPA section 35

s35: agency must take all reasonable steps to ensure service provider required to comply with IPPs/NPPs as if it was the agency

essential minimal requirement for departments & agencies – a low water mark

easy to include:

The Contractor must comply with Parts 1 and 3 of Chapter 2 of the Act, as if it was the Customer, in relation to the discharge of its obligations under this agreement.

Page 12: Patrick Sefton |   Principal

IPA & cross-border transfers

special provisions about cross-border transfers by agencies (s33)

consent, or at least 2 of the following:

equivalent treatment necessity individual benefits, consent impracticable & likely reasonable steps to protect

Page 13: Patrick Sefton |   Principal

Service providers & the Cth Act

private sector has no provision like s35 IPA: you’re on your own

is the service provider governed by the Act? $3M turnover threshold s6D(4)(c) & (d): collecting/disclosing for payment should contractor “opt in”? (s6EA)

otherwise, contract terms equivalent to NPPs

Page 14: Patrick Sefton |   Principal

Pre-contract enquiries

What questions should we ask a potential cloud computing service provider?

location of provider, data (including backups)deletion & disposal process?

who has access? what access controls are used?are any subcontractors involved?

insolvency of supplier? ease of transfer to another supplier? single- or multi-tenanted servers? supplier’s own privacy & security policies (incl. physical security)

awareness of compliance mechanics of IPA reporting / notification / breach response standards compliance & certifications, audit reports?

Page 15: Patrick Sefton |   Principal

Contract terms

is GITC sufficient? cl 5.4: broad confidentiality terms cl 5.5: broad privacy terms can obtain deed of confidentiality / privacy from subcontractors,

but only if not reasonably satisfied proper practices in place(query whether this is done as a matter of course)

a good start, but what about ...

Page 16: Patrick Sefton |   Principal

Contract terms

what about... supplier’s responses to pre-contract enquiries (incorporate them) more detailed action in response to security / privacy breach

promptness & detail of reportinformation about security / privacy breaches for other clientsaudit right (electronic & physical practices) or periodic audit

awareness of personnel who have access (with ongoing updates) disposal / return of records regular reporting freedom to move (incl. return of data in standard format) limitation of liability: does the normal position work?

Page 17: Patrick Sefton |   Principal

Standards & Certifications

FISMA: a framework for managing information security under Federal Information Security Management Act of 2002 (US)

HIPAA: standards for eHealth transactions under Health Insurance Portability and Accountability Act of 1996 (US) extended by HITECH: Health Information Technology for Economic and Clinical Health Act 2009 (US)

SOX: Sarbanes-Oxley Act of 2002 (US) (public companies) &Basel II: international standard for risks in financial sector

PCI DSS: Payment Card Industry Data Security Standard SAS70: Statement on Auditing Standards No.70: an accounting

standard to assess internal controls within a service organisation ISO15489: int’l standard for record and information management

ISO27001: int’l standard for information security systems access to audit/certification reports?

Page 18: Patrick Sefton |   Principal

Ongoing management

Don’t forget ongoing management periodic reporting: review & act on issues options under contract including audit, further deed internal process for privacy breaches co-operative & transparent management of privacy

complaints and investigations appropriate escalation of issues:

privacy a critical reputational & political risk

Page 19: Patrick Sefton |   Principal

Thank you.

Patrick [email protected]