SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
Privacy
Issues
in
the
Cloud

    Presenta4on
to
the
Chief
Privacy
Officers
Council


    Constan4ne
Karbalio4s

    Data
Protec*on
&
Privacy
Lead


May
4,
2010
                                           1

Agenda

           1
       Introduc*on


           2
       What
is
the
Cloud?


           3
       What
do
Security
Professionals
See
as
Risks?


           4
       What
are
the
Privacy
Issues?


           5
       What
is
the
Real
Problem?


          6
        Conclusion/Q&A

                                                                    2

Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s

What
is
the
Cloud?




Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
   3

What
is
“the
Cloud”?

• “Cloud
compu*ng”
defini*ons:

    – Cloud
compu*ng
is
interconnected
networks
of
IT
enabled

      resources
(i.e.
services)
delivered
in
a
dynamically
scalable

      and
virtualized
method,
made
available
to
customers
for

      purchase
via
variable
cost
models
based
on
usage.

        •  Symantec


    – just
as
with
a
u*lity,
enterprises
can
pay
for
informa*on

      technology
services
on
a
consump*on
basis





Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                   4

Benefits
and
Risks

Accelera4ng
Trend

  –  Growing
market
to
reach
$42
billion
by
2012
‐
IDC

Rewards

   –  Takes
advantage
of
virtualiza*on


   –  Provides
on‐demand
services
for
easy
scalability

   –  Minimizes
capital
and
opera*ng
costs
expenditures

   –  Provides
access
to
exper*se
not
available
in‐house

   –  Enhances
business
agility


Risks

    –  Current
lack
of
standardiza*on

    –  Rela*vely
high
switching
costs
for
proprietary
solu*ons

    –  Security
and
Privacy



Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
              5

                                                                       5
What
do
Security
Professionals
See
as

    Risks?




Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
   6

Top
Security
Threats
to
Cloud
Compu4ng

•  Abuse
and
Nefarious
Use
of
Cloud
Compu*ng

•  Insecure
Applica*on
Programming
Interfaces

•  Malicious
Insiders

•  Shared
Technology
Vulnerabili*es

•  Data
Loss/Leakage

•  Account,
Service
&
Traffic
Hijacking

•  Unknown
Risk
Profile



•    Source:


        Top
Threats
to
Cloud
Compu*ng,
Version
1.0

        Cloud
Security
Alliance

        hbp://www.cloudsecurityalliance.org/topthreats



 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
     7

Governance
Concerns

PERCEIVED
RISKS
IN
CLOUD
COMPUTING


Uncertain
ability
to
enforce
security
                      23
percent


policies
at
a
provider


Inadequate
training
and
IT
audi*ng
                    

   22
percent
    


Ques*onable
privileged
access
control
at
                   14
percent     


provider
site
    


Uncertain
ability
to
recover
data                      

   12
percent
    


Proximity
of
data
to
another
customer’s

                   11
percent


Uncertain
ability
to
audit
provider
                   

   10
percent
    


Uncertain
con*nued
existence
of
provider

 4
percent
                      


Uncertain
provider
regulatory
compliance

 4
percent



               Source:
Price
Waterhouse
Cooper/CISO‐CIO
Magazine
Survey,
2010



Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                             8

What
are
the
Privacy
Risks?




Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
   9

Privacy
Risks
with
Cloud
Compu4ng

  •  Certain
types
of
data
may
trigger
specific

     obliga*ons
under
na*onal
or
local
law

  •  Vendor
issues:


       –  Organiza*ons
may
be
unaware
they
are
even
using

          cloud‐based
vendors

       –  Due
diligence
s*ll
required
as
in
any
vendor
rela*onship

       –  Data
security
is
s*ll
the
responsibility
of
the
customer

       –  Service
Level
agreements
need
to
account
for
access,

          correc*on
and
privacy
rights

  •    Data
Transfer:

       –    Cloud
models
may
trigger
interna*onal
legal
data

            transfer
requirements

                      Source:
Hunton
&
Williams,
“Outsourcing
to
the
cloud:
data
security
and

                      privacy
risks”,
March
15,
2010

Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                                             10

What
is
the
Real
Problem?




Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
   11

Ponemon
Study
for
Symantec:
Summary

•  Business
applica*ons,
solu*on
stacks
and
storage
are
the
most
popular
cloud

   compu*ng
applica*ons,
plaiorms
and
infrastructure
services

•  Few
organiza*ons
take
proac*ve
steps
to
protect
both
their
own
sensi*ve

   business
informa*on
and
that
of
their
customers,
consumers
and
employees

   when
they
store
that
informa*on
with
cloud
compu*ng
vendors

•  Organiza*ons
are
adop*ng
cloud
technologies
without
the
usual
vekng

   procedures

•  Employees
are
making
decisions
without
their
IT
departments’
insights
or
full

   knowledge
of
the
security
risks
involved

•  Two
years
from
now,
most
respondents
plan
to
use
cloud
compu*ng
much

   more
intensively
than
they
do
today

•  Yet
even
as
momentum
for
cloud
compu*ng
builds,
doubts
about
security

   difficul*es
of
cloud
compu*ng
persist

•  Organiza*ons
most
frequently
protect
themselves
through
tradi*onal
IT

   security
solu*ons
and
legal
or
indemnifica*on
agreements
with
vendors.


Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                           12

Ponemon
Study
finds
Fewer
than
One
in
Ten
Companies

Evaluate
Vendors
or
Train
Employees
on
Cloud
Security:

   •  More
than
75
percent
of
respondents
noted
that
the
migra*on
to

      cloud
compu*ng
was
occurring
in
a
less‐than
ideal
manner,
due

      to
a
lack
of
control
over
end
users

   •  Only
27
percent
of
respondents
said
their
organiza*ons
have

      procedures
for
approving
cloud
applica*ons
that
use
sensi*ve
or

      confiden*al
informa*on

   •  68
percent
indicated
that
ownership
for
evalua*ng
cloud

      compu*ng
vendors
resides
with
end
users
and
business
managers

   •  Only
20
percent
of
the
organiza*ons
surveyed
reported
that
their

      informa*on
security
teams
are
regularly
involved
in
the
decision

      making
process
and
approximately
a
quarter
said
they
never

      par*cipated
at
all

   •  69
percent
of
the
respondents
indicated
they
would
prefer
to
see

      the
informa*on
security
or
corporate
IT
teams
lead
the
cloud

      decision
making
process


Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                      13

Policy
and
Procedural
Gaps





                      Source:
Ponemon
Ins*tute
study
for
Symantec:
“Flying
Blind
in
the
Cloud”,

                      April
7,
2010

Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                                               14

Ineffec4ve
Review





Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
   15

Cloud
Compu4ng
Vendors
Review
“Process”





                      Source:
Ponemon
Ins*tute
study
for
Symantec:
“Flying
Blind
in
the
Cloud”,

                      April
7,
2010

Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                                               16

Organiza4onal
steps
to
ensure
data
protec4on





                      Source:
Ponemon
Ins*tute
study
for
Symantec:
“Flying
Blind
in
the
Cloud”,

                      April
7,
2010

Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                                               17

Conclusion/Q&A




Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
   18

Managing
Privacy
in
the
Cloud

•  Policies
and
procedures
must
explicitly
address
cloud
privacy

   risks

•  Informa*on
governance
must
be
put
in
place
that:

    –  Provides
tools
and
procedures
for
classifying
informa*on
and
assessing
risk


    –  Establish
policies
for
cloud‐based
processing
based
upon
risk
and
value
of

       asset.


•  Evaluate
third
par*es’
security
and
privacy
capabili*es
before

   sharing
confiden*al
or
sensi*ve
informa*on.


    –  Thorough
review
and
audit
of
vendors

    –  Independent
third
party
verifica*on


•  Train
employees
and
staff
accordingly
to
mi*gate
security/
   privacy
risks
in
cloud
compu*ng

    –  Address
from
mul*‐departmental
perspec*ve

Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                             19

Model
for
Managing
Cloud
Risks
‐
Governance

•  Strategy:

    –  What
kinds
of
data
will
you
as
a
maber
of
course
not
allow
to
go
to
the

       cloud?
What
kind
of
cloud
is
appropriate
for
certain
types
of
data?

    –  Implicit:
you
have
a
data
classifica*on
system
that
you
follow
and
know

       the
value
of
your
data
assets

•  Educa*on
&
training

    –  Train
users/business
units
that
this
requires
vendor
review
just
as
any

       other
vendor

•  Resources
&
Ownership

    –  Academic
to
have
nice
policies,
contractual
language
permikng
audit

       rights,
if
you
don’t
have
staff
to
do
it

    –  Everyone
wants
Informa*on
Security
or
IT
to
own
this
–
equip
them


Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                              20

Model
for
Managing
Cloud
Risks
–
Formal
Risk

Management

•  Privacy
Risk/Impact
Assessment

    –  Document
ownership
of
risks,
mi*ga*ons

•  Data
Flow
Diagram

    –  Iden*fy
types
of
PII
in
flow,
as
well
as
what
systems,
en**es
and

       jurisdic*ons
that
data
flows
through

•  Security
Assessments
&
Measures

    –  Appropriate
measures
to
ensure
adequate
applica*on
security,

       development
processes
and
penetra*on/vulnerability
tes*ng

    –  Require
regular
tes*ng
as
well
as
at
outset
of
rela*onship

    –  Consider
strategies
based
on
encryp*on,
data
obfusca*on






Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                       21

Model
for
Managing
Cloud
Risks
–
Contract
&
Audit

•  Legal
Models

    –  Develop
appropriate
contractual
terms
to
ensure
protec*on
of
the
types
of

       data
you
want
to
process:

        •  Records
reten4on
&
lawful
access

        •  Access

        •  Data
sharing
risks/commingling

        •  Jurisdic4onal
risks

        •  Flow‐down
of
requirements
for
security,
audit,
evidence
of
compliance
for
sub‐contractors

    –  Revisit/revise
customer
privacy
no*ces,
agreements:
do
they
reflect
what
you

       are
doing
with
the
data?


•  Monitoring

    –  Ensure
that
there
are
mechanisms
technical
and
organiza*onal
to
assess
and

       audit
cloud
vendor’s
use
of
data

•  Audit
and
Third
Party
Cer*fica*on

    –  Ensure
you
have
the
ability
to
audit
–
and
do
it

    –  Third
party
cer*fica*ons
as
a
minimum


Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                                                    22

Thank
you!

    Constan*ne
Karbalio*s,
J.D.,
CIPP/C/IT

    constan*ne_karbalio*s@symantec.com

    416.402.9873



    Copyright
©
2010
Symantec
Corpora4on.
All
rights
reserved.
Symantec
and
the
Symantec
Logo
are
trademarks
or
registered
trademarks
of
Symantec
Corpora*on
or
its
affiliates
in

    the
U.S.
and
other
countries.

Other
names
may
be
trademarks
of
their
respec*ve
owners.


    This
document
is
provided
for
informa*onal
purposes
only
and
is
not
intended
as
adver*sing.

All
warran*es
rela*ng
to
the
informa*on
in
this
document,
either
express
or
implied,

    are
disclaimed
to
the
maximum
extent
allowed
by
law.

The
informa*on
in
this
document
is
subject
to
change
without
no*ce.



Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
                                                                                                                                     23


Más contenido relacionado

La actualidad más candente

Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNinh Nguyen
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 
Deductive databases
Deductive databasesDeductive databases
Deductive databasesJohn Popoola
 
Database Administration
Database AdministrationDatabase Administration
Database AdministrationBilal Arshad
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2MLG College of Learning, Inc
 
Cloud Security Top Threats
Cloud Security Top ThreatsCloud Security Top Threats
Cloud Security Top ThreatsTiago de Almeida
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Jitendra s Rathore
 
Cloud and dynamic infrastructure
Cloud and dynamic infrastructureCloud and dynamic infrastructure
Cloud and dynamic infrastructuregaurav jain
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
Multi Tenancy In The Cloud
Multi Tenancy In The CloudMulti Tenancy In The Cloud
Multi Tenancy In The Cloudrohit_ainapure
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and securityDhani Ahmad
 

La actualidad más candente (20)

Forensics Analysis and Validation
Forensics Analysis and Validation  Forensics Analysis and Validation
Forensics Analysis and Validation
 
03 cia
03 cia03 cia
03 cia
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 
Whitman_Ch02.pptx
Whitman_Ch02.pptxWhitman_Ch02.pptx
Whitman_Ch02.pptx
 
Deductive databases
Deductive databasesDeductive databases
Deductive databases
 
Database Administration
Database AdministrationDatabase Administration
Database Administration
 
Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2Information Assurance And Security - Chapter 2 - Lesson 2
Information Assurance And Security - Chapter 2 - Lesson 2
 
Cloud Security Top Threats
Cloud Security Top ThreatsCloud Security Top Threats
Cloud Security Top Threats
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2Cloud computing (IT-703) UNIT 1 & 2
Cloud computing (IT-703) UNIT 1 & 2
 
Cloud and dynamic infrastructure
Cloud and dynamic infrastructureCloud and dynamic infrastructure
Cloud and dynamic infrastructure
 
Data loss prevention (dlp)
Data loss prevention (dlp)Data loss prevention (dlp)
Data loss prevention (dlp)
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Multi Tenancy In The Cloud
Multi Tenancy In The CloudMulti Tenancy In The Cloud
Multi Tenancy In The Cloud
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and security
 
Security policies
Security policiesSecurity policies
Security policies
 

Destacado

Cloud Computing: The Hard Problems Never Go Away
Cloud Computing: The Hard Problems Never Go AwayCloud Computing: The Hard Problems Never Go Away
Cloud Computing: The Hard Problems Never Go AwayZendCon
 
Lotusphere 2011, BP106: "Where is the Love? How to get your users to fall in ...
Lotusphere 2011, BP106: "Where is the Love? How to get your users to fall in ...Lotusphere 2011, BP106: "Where is the Love? How to get your users to fall in ...
Lotusphere 2011, BP106: "Where is the Love? How to get your users to fall in ...Mat Newman
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaelirefaeli
 
Canadian Response to the Draft EU Regulation - May 2013
Canadian Response to the Draft EU Regulation - May 2013Canadian Response to the Draft EU Regulation - May 2013
Canadian Response to the Draft EU Regulation - May 2013Constantine Karbaliotis
 

Destacado (6)

Cloud Computing: The Hard Problems Never Go Away
Cloud Computing: The Hard Problems Never Go AwayCloud Computing: The Hard Problems Never Go Away
Cloud Computing: The Hard Problems Never Go Away
 
Analytics Store for Hybrid Cloud
Analytics Store for Hybrid CloudAnalytics Store for Hybrid Cloud
Analytics Store for Hybrid Cloud
 
Lotusphere 2011, BP106: "Where is the Love? How to get your users to fall in ...
Lotusphere 2011, BP106: "Where is the Love? How to get your users to fall in ...Lotusphere 2011, BP106: "Where is the Love? How to get your users to fall in ...
Lotusphere 2011, BP106: "Where is the Love? How to get your users to fall in ...
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaeli
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Canadian Response to the Draft EU Regulation - May 2013
Canadian Response to the Draft EU Regulation - May 2013Canadian Response to the Draft EU Regulation - May 2013
Canadian Response to the Draft EU Regulation - May 2013
 

Similar a Privacy issues in the cloud

Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580Joanna Hendricks
 
Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenyaTonny Omwansa
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.pptssuser3be95f
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.pptSameer Ali
 
cloud-complete power point presentation for digital signature
cloud-complete power point presentation for digital signaturecloud-complete power point presentation for digital signature
cloud-complete power point presentation for digital signatureArunsunaiComputer
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01promediakw
 
Itmgen 4317 security
Itmgen 4317 securityItmgen 4317 security
Itmgen 4317 securityCisco
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing RisksMarc Vael
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formattedMatthew Moldvan
 
Cloud complete
Cloud completeCloud complete
Cloud completeNavriti
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Cloud Standards Customer Council
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
Issue identification cloud computing
Issue identification cloud computingIssue identification cloud computing
Issue identification cloud computinggirish0984
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptxNguyenNM
 

Similar a Privacy issues in the cloud (20)

Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
 
Cloud and challenges isacakenya
Cloud and challenges   isacakenyaCloud and challenges   isacakenya
Cloud and challenges isacakenya
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
Cloud complete
Cloud completeCloud complete
Cloud complete
 
cloud-complete power point presentation for digital signature
cloud-complete power point presentation for digital signaturecloud-complete power point presentation for digital signature
cloud-complete power point presentation for digital signature
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
Itmgen 4317 security
Itmgen 4317 securityItmgen 4317 security
Itmgen 4317 security
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
Automation alley day in the cloud presentation - formatted
Automation alley   day in the cloud presentation - formattedAutomation alley   day in the cloud presentation - formatted
Automation alley day in the cloud presentation - formatted
 
Cloud complete
Cloud completeCloud complete
Cloud complete
 
cloud-complete.ppt
cloud-complete.pptcloud-complete.ppt
cloud-complete.ppt
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
 
3.pptx
3.pptx3.pptx
3.pptx
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Issue identification cloud computing
Issue identification cloud computingIssue identification cloud computing
Issue identification cloud computing
 
093049ov4.pptx
093049ov4.pptx093049ov4.pptx
093049ov4.pptx
 

Más de Constantine Karbaliotis

Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015Constantine Karbaliotis
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumConstantine Karbaliotis
 
The Value of Personal Information - IAPP Canada 2011
The Value of Personal Information - IAPP Canada 2011The Value of Personal Information - IAPP Canada 2011
The Value of Personal Information - IAPP Canada 2011Constantine Karbaliotis
 
International Perspectives on Data Breach
International Perspectives on Data BreachInternational Perspectives on Data Breach
International Perspectives on Data BreachConstantine Karbaliotis
 
Update on enterprise social media risks
Update on enterprise social media risks Update on enterprise social media risks
Update on enterprise social media risks Constantine Karbaliotis
 

Más de Constantine Karbaliotis (8)

Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
 
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada SymposiumImpact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
Impact of GDPR on Canada May 2016 - Presented at IAPP Canada Symposium
 
The Value of Personal Information - IAPP Canada 2011
The Value of Personal Information - IAPP Canada 2011The Value of Personal Information - IAPP Canada 2011
The Value of Personal Information - IAPP Canada 2011
 
International Perspectives on Data Breach
International Perspectives on Data BreachInternational Perspectives on Data Breach
International Perspectives on Data Breach
 
Update on enterprise social media risks
Update on enterprise social media risks Update on enterprise social media risks
Update on enterprise social media risks
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Privacy Access Letter I Feb 5 07
Privacy Access Letter I   Feb 5 07Privacy Access Letter I   Feb 5 07
Privacy Access Letter I Feb 5 07
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Privacy issues in the cloud

  • 1. Privacy
Issues
in
the
Cloud
 Presenta4on
to
the
Chief
Privacy
Officers
Council
 Constan4ne
Karbalio4s
 Data
Protec*on
&
Privacy
Lead
 May
4,
2010
 1

  • 2. Agenda
 1
 Introduc*on
 2
 What
is
the
Cloud?
 3
 What
do
Security
Professionals
See
as
Risks?
 4
 What
are
the
Privacy
Issues?
 5
 What
is
the
Real
Problem?
 6
 Conclusion/Q&A
 2
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s

  • 4. What
is
“the
Cloud”?
 • “Cloud
compu*ng”
defini*ons:
 – Cloud
compu*ng
is
interconnected
networks
of
IT
enabled
 resources
(i.e.
services)
delivered
in
a
dynamically
scalable
 and
virtualized
method,
made
available
to
customers
for
 purchase
via
variable
cost
models
based
on
usage.
 •  Symantec
 – just
as
with
a
u*lity,
enterprises
can
pay
for
informa*on
 technology
services
on
a
consump*on
basis
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 4

  • 5. Benefits
and
Risks
 Accelera4ng
Trend
 –  Growing
market
to
reach
$42
billion
by
2012
‐
IDC
 Rewards
 –  Takes
advantage
of
virtualiza*on

 –  Provides
on‐demand
services
for
easy
scalability
 –  Minimizes
capital
and
opera*ng
costs
expenditures
 –  Provides
access
to
exper*se
not
available
in‐house
 –  Enhances
business
agility

 Risks
 –  Current
lack
of
standardiza*on
 –  Rela*vely
high
switching
costs
for
proprietary
solu*ons
 –  Security
and
Privacy
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 5
 5
  • 6. What
do
Security
Professionals
See
as
 Risks?
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 6

  • 7. Top
Security
Threats
to
Cloud
Compu4ng
 •  Abuse
and
Nefarious
Use
of
Cloud
Compu*ng
 •  Insecure
Applica*on
Programming
Interfaces
 •  Malicious
Insiders
 •  Shared
Technology
Vulnerabili*es
 •  Data
Loss/Leakage
 •  Account,
Service
&
Traffic
Hijacking
 •  Unknown
Risk
Profile
 •  Source:

 Top
Threats
to
Cloud
Compu*ng,
Version
1.0
 Cloud
Security
Alliance
 hbp://www.cloudsecurityalliance.org/topthreats
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 7

  • 8. Governance
Concerns
 PERCEIVED
RISKS
IN
CLOUD
COMPUTING

 Uncertain
ability
to
enforce
security
 23
percent

 policies
at
a
provider

 Inadequate
training
and
IT
audi*ng
 

 22
percent
 

 Ques*onable
privileged
access
control
at
 14
percent 

 provider
site
 

 Uncertain
ability
to
recover
data 

 12
percent
 

 Proximity
of
data
to
another
customer’s

 11
percent

 Uncertain
ability
to
audit
provider
 

 10
percent
 

 Uncertain
con*nued
existence
of
provider

 4
percent
 

 Uncertain
provider
regulatory
compliance

 4
percent

 Source:
Price
Waterhouse
Cooper/CISO‐CIO
Magazine
Survey,
2010
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 8

  • 10. Privacy
Risks
with
Cloud
Compu4ng
 •  Certain
types
of
data
may
trigger
specific
 obliga*ons
under
na*onal
or
local
law
 •  Vendor
issues:

 –  Organiza*ons
may
be
unaware
they
are
even
using
 cloud‐based
vendors
 –  Due
diligence
s*ll
required
as
in
any
vendor
rela*onship
 –  Data
security
is
s*ll
the
responsibility
of
the
customer
 –  Service
Level
agreements
need
to
account
for
access,
 correc*on
and
privacy
rights
 •  Data
Transfer:
 –  Cloud
models
may
trigger
interna*onal
legal
data
 transfer
requirements
 Source:
Hunton
&
Williams,
“Outsourcing
to
the
cloud:
data
security
and
 privacy
risks”,
March
15,
2010
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 10

  • 12. Ponemon
Study
for
Symantec:
Summary
 •  Business
applica*ons,
solu*on
stacks
and
storage
are
the
most
popular
cloud
 compu*ng
applica*ons,
plaiorms
and
infrastructure
services
 •  Few
organiza*ons
take
proac*ve
steps
to
protect
both
their
own
sensi*ve
 business
informa*on
and
that
of
their
customers,
consumers
and
employees
 when
they
store
that
informa*on
with
cloud
compu*ng
vendors
 •  Organiza*ons
are
adop*ng
cloud
technologies
without
the
usual
vekng
 procedures
 •  Employees
are
making
decisions
without
their
IT
departments’
insights
or
full
 knowledge
of
the
security
risks
involved
 •  Two
years
from
now,
most
respondents
plan
to
use
cloud
compu*ng
much
 more
intensively
than
they
do
today
 •  Yet
even
as
momentum
for
cloud
compu*ng
builds,
doubts
about
security
 difficul*es
of
cloud
compu*ng
persist
 •  Organiza*ons
most
frequently
protect
themselves
through
tradi*onal
IT
 security
solu*ons
and
legal
or
indemnifica*on
agreements
with
vendors.
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 12

  • 13. Ponemon
Study
finds
Fewer
than
One
in
Ten
Companies
 Evaluate
Vendors
or
Train
Employees
on
Cloud
Security:
 •  More
than
75
percent
of
respondents
noted
that
the
migra*on
to
 cloud
compu*ng
was
occurring
in
a
less‐than
ideal
manner,
due
 to
a
lack
of
control
over
end
users
 •  Only
27
percent
of
respondents
said
their
organiza*ons
have
 procedures
for
approving
cloud
applica*ons
that
use
sensi*ve
or
 confiden*al
informa*on
 •  68
percent
indicated
that
ownership
for
evalua*ng
cloud
 compu*ng
vendors
resides
with
end
users
and
business
managers
 •  Only
20
percent
of
the
organiza*ons
surveyed
reported
that
their
 informa*on
security
teams
are
regularly
involved
in
the
decision
 making
process
and
approximately
a
quarter
said
they
never
 par*cipated
at
all
 •  69
percent
of
the
respondents
indicated
they
would
prefer
to
see
 the
informa*on
security
or
corporate
IT
teams
lead
the
cloud
 decision
making
process
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 13

  • 14. Policy
and
Procedural
Gaps
 Source:
Ponemon
Ins*tute
study
for
Symantec:
“Flying
Blind
in
the
Cloud”,
 April
7,
2010
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 14

  • 16. Cloud
Compu4ng
Vendors
Review
“Process”
 Source:
Ponemon
Ins*tute
study
for
Symantec:
“Flying
Blind
in
the
Cloud”,
 April
7,
2010
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 16

  • 17. Organiza4onal
steps
to
ensure
data
protec4on
 Source:
Ponemon
Ins*tute
study
for
Symantec:
“Flying
Blind
in
the
Cloud”,
 April
7,
2010
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 17

  • 19. Managing
Privacy
in
the
Cloud
 •  Policies
and
procedures
must
explicitly
address
cloud
privacy
 risks
 •  Informa*on
governance
must
be
put
in
place
that:
 –  Provides
tools
and
procedures
for
classifying
informa*on
and
assessing
risk

 –  Establish
policies
for
cloud‐based
processing
based
upon
risk
and
value
of
 asset.

 •  Evaluate
third
par*es’
security
and
privacy
capabili*es
before
 sharing
confiden*al
or
sensi*ve
informa*on.

 –  Thorough
review
and
audit
of
vendors
 –  Independent
third
party
verifica*on

 •  Train
employees
and
staff
accordingly
to
mi*gate
security/ privacy
risks
in
cloud
compu*ng
 –  Address
from
mul*‐departmental
perspec*ve
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 19

  • 20. Model
for
Managing
Cloud
Risks
‐
Governance
 •  Strategy:
 –  What
kinds
of
data
will
you
as
a
maber
of
course
not
allow
to
go
to
the
 cloud?
What
kind
of
cloud
is
appropriate
for
certain
types
of
data?
 –  Implicit:
you
have
a
data
classifica*on
system
that
you
follow
and
know
 the
value
of
your
data
assets
 •  Educa*on
&
training
 –  Train
users/business
units
that
this
requires
vendor
review
just
as
any
 other
vendor
 •  Resources
&
Ownership
 –  Academic
to
have
nice
policies,
contractual
language
permikng
audit
 rights,
if
you
don’t
have
staff
to
do
it
 –  Everyone
wants
Informa*on
Security
or
IT
to
own
this
–
equip
them
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 20

  • 21. Model
for
Managing
Cloud
Risks
–
Formal
Risk
 Management
 •  Privacy
Risk/Impact
Assessment
 –  Document
ownership
of
risks,
mi*ga*ons
 •  Data
Flow
Diagram
 –  Iden*fy
types
of
PII
in
flow,
as
well
as
what
systems,
en**es
and
 jurisdic*ons
that
data
flows
through
 •  Security
Assessments
&
Measures
 –  Appropriate
measures
to
ensure
adequate
applica*on
security,
 development
processes
and
penetra*on/vulnerability
tes*ng
 –  Require
regular
tes*ng
as
well
as
at
outset
of
rela*onship
 –  Consider
strategies
based
on
encryp*on,
data
obfusca*on

 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 21

  • 22. Model
for
Managing
Cloud
Risks
–
Contract
&
Audit
 •  Legal
Models
 –  Develop
appropriate
contractual
terms
to
ensure
protec*on
of
the
types
of
 data
you
want
to
process:
 •  Records
reten4on
&
lawful
access
 •  Access
 •  Data
sharing
risks/commingling
 •  Jurisdic4onal
risks
 •  Flow‐down
of
requirements
for
security,
audit,
evidence
of
compliance
for
sub‐contractors
 –  Revisit/revise
customer
privacy
no*ces,
agreements:
do
they
reflect
what
you
 are
doing
with
the
data?

 •  Monitoring
 –  Ensure
that
there
are
mechanisms
technical
and
organiza*onal
to
assess
and
 audit
cloud
vendor’s
use
of
data
 •  Audit
and
Third
Party
Cer*fica*on
 –  Ensure
you
have
the
ability
to
audit
–
and
do
it
 –  Third
party
cer*fica*ons
as
a
minimum
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 22

  • 23. Thank
you!
 Constan*ne
Karbalio*s,
J.D.,
CIPP/C/IT
 constan*ne_karbalio*s@symantec.com
 416.402.9873
 Copyright
©
2010
Symantec
Corpora4on.
All
rights
reserved.
Symantec
and
the
Symantec
Logo
are
trademarks
or
registered
trademarks
of
Symantec
Corpora*on
or
its
affiliates
in
 the
U.S.
and
other
countries.

Other
names
may
be
trademarks
of
their
respec*ve
owners.
 This
document
is
provided
for
informa*onal
purposes
only
and
is
not
intended
as
adver*sing.

All
warran*es
rela*ng
to
the
informa*on
in
this
document,
either
express
or
implied,
 are
disclaimed
to
the
maximum
extent
allowed
by
law.

The
informa*on
in
this
document
is
subject
to
change
without
no*ce.
 Privacy
Issues
in
the
Cloud
‐
Constan*ne
Karbalio*s
 23