SlideShare una empresa de Scribd logo
1 de 13
Cloud:
Is it Legal to Use American
Cloud Services in Europe?
Martha Buyer
Law Offices of Martha Buyer, PLLC
East Aurora, NY
www.marthabuyer.com
www.marthabuyer.com
www.marthabuyer.com
Difference in Perception
between EU and US
• Privacy as a matter of commerce in the U.S.
• Privacy as a fundamental human right in the EU
• Right to be forgotten
www.marthabuyer.com
Once data crosses international borders,
where is it “safe?”
• “it depends”
• Do you know where your cloud actually is?
• Guess what? It matters.
www.marthabuyer.com
Schrems v. Data Protection Commissioner
(Case C-362/14)
• What the case means
• Historical context
• 2000 decision enabled U.S. companies to self-certify that company practices
ensured an adequate level of protection for personal data under the EU Data
Protection Directive, thus permitting the company to transfer data from the
EU to the United States.
• Schrems decision holds that U.S. law does not afford adequate protection to
personal data
www.marthabuyer.com
What’s happened since the decision
(October, 2015)
• Data transfers from the EU to the United States trigger the
provisions of the EU Data Protection Directive and may come
under scrutiny.
• Many companies utilize U.S.-based cloud services
• If personal data is kept outside of a U.S. jurisdiction
• Knowledge of compliance regs is required
• So is compliance!
www.marthabuyer.com
Companies can no longer rely on “safe
harbor” self-certification.
• Entities need to independently verify that company transfers of personal
data from the EU to the United States meet the level of data privacy
protection considered adequate by the EU Data Protection Directive.
• http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:31995L0046
• http://ec.europa.eu/justice/data-protection/
• The European Commission recommends that entities consider using the EU-
approved standard contractual clauses, the EU-approved Binding Corporate
Rules, or the enumerated derogations under which data can be transferred.
www.marthabuyer.com
Use of Standard Contract Clauses
• two sets of standard contractual clauses for transfers from data
controllers to data controllers established outside the EU/EEA
• one set for the transfer to processors established outside the EU/EEA.
• http://ec.europa.eu/justice/data-protection/international-
transfers/transfer/index_en.htm
www.marthabuyer.com
FCPA
Foreign Corrupt Practices Act
The Foreign Corrupt Practices Act of 1977, as amended, 15 U.S.C. §§ 78dd-1, et seq.
• The anti-bribery provisions prohibit paying foreign officials to obtain or
retain business.
• Accurate accounting and adequate internal controls are REQUIRED!
• jurisdiction of the FCPA is far-reaching and hinges on the use of interstate
commerce by a U.S. or foreign person.
• Aggressive Enforcement
• compliance policies to maintain watch over company actors to avoid
inadvertently violating the FCPA.
• http://www.justice.gov/criminal-fraud/foreign-corrupt-practices-act
www.marthabuyer.com
More FCPA
• Department of Justice is happy to offer opinions on
compliance:
U.S. Department of Justice
Criminal Division, Fraud Section
Attn: FCPA Coordinator
Bond Building, 4th Floor
10th and Constitution Ave., NW
Washington, DC 20530-0001
Fax: 202-514-7021
Email - FCPA.Fraud@usdoj.gov
www.marthabuyer.com
Protecting the Jewels
• WISP
• Protecting data within a company’s control
• Protecting data beyond the company’s walls
www.marthabuyer.com
Thank you!
www.marthabuyer.com

Más contenido relacionado

La actualidad más candente

International privacy with kevin haley
International privacy with kevin haleyInternational privacy with kevin haley
International privacy with kevin haley
Sarah Fletcher
 
Presentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese CommissiePresentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese Commissie
Europadialoog
 
DP on both sides of the Atlantic - august 2015
DP on both sides of the Atlantic - august 2015DP on both sides of the Atlantic - august 2015
DP on both sides of the Atlantic - august 2015
Saira Nayak, JD, CIPP/US/E
 

La actualidad más candente (19)

Cours CyberSécurité - Privacy
Cours CyberSécurité - PrivacyCours CyberSécurité - Privacy
Cours CyberSécurité - Privacy
 
EU Trade Secrets Directive & Data Protection Changes
EU Trade Secrets Directive & Data Protection ChangesEU Trade Secrets Directive & Data Protection Changes
EU Trade Secrets Directive & Data Protection Changes
 
International privacy with kevin haley
International privacy with kevin haleyInternational privacy with kevin haley
International privacy with kevin haley
 
Dai Davies - GDPR Presentation
Dai Davies - GDPR PresentationDai Davies - GDPR Presentation
Dai Davies - GDPR Presentation
 
Everything you need to know about the GDPR
Everything you need to know about the GDPREverything you need to know about the GDPR
Everything you need to know about the GDPR
 
Privacy shield: What You Need To Know About Storing EU Data
Privacy shield: What You Need To Know About Storing EU DataPrivacy shield: What You Need To Know About Storing EU Data
Privacy shield: What You Need To Know About Storing EU Data
 
Data Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesData Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud Services
 
Cross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy ShieldCross Border Data Transfers and the Privacy Shield
Cross Border Data Transfers and the Privacy Shield
 
Presentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese CommissiePresentatie Giorgos Rossides, Europese Commissie
Presentatie Giorgos Rossides, Europese Commissie
 
EU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart MeteringEU General Data Protection: Implications for Smart Metering
EU General Data Protection: Implications for Smart Metering
 
30-31 BB Nov_Dec14 (3)
30-31 BB Nov_Dec14 (3)30-31 BB Nov_Dec14 (3)
30-31 BB Nov_Dec14 (3)
 
Privacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffinPrivacy law-update-whitmeyer-tuffin
Privacy law-update-whitmeyer-tuffin
 
CASE STUDY: New EU legislation: how to avoid data disaster
CASE STUDY: New EU legislation: how to avoid data disasterCASE STUDY: New EU legislation: how to avoid data disaster
CASE STUDY: New EU legislation: how to avoid data disaster
 
DP on both sides of the Atlantic - august 2015
DP on both sides of the Atlantic - august 2015DP on both sides of the Atlantic - august 2015
DP on both sides of the Atlantic - august 2015
 
Case by case - moving data centres to Romania
Case by case - moving data centres to RomaniaCase by case - moving data centres to Romania
Case by case - moving data centres to Romania
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overview
 
Kroll.cross border ediscovery-2016
Kroll.cross border ediscovery-2016Kroll.cross border ediscovery-2016
Kroll.cross border ediscovery-2016
 
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...
The EU Data Protection Reform's Impact on Cross Border E-discovery; updated h...
 
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
The EU Data Protection Reform's Impact on Cross Border e-Discovery: new Devel...
 

Similar a Martha Buyer V SCTC day conference 24 feb16

Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
Craig Mullins
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
Ulf Mattsson
 
Data protection For CYP Organisations
Data protection For CYP OrganisationsData protection For CYP Organisations
Data protection For CYP Organisations
Cliff Ashcroft
 
US eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosureUS eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosure
J. David Morris
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
wdsnead
 

Similar a Martha Buyer V SCTC day conference 24 feb16 (20)

Safe Harbor Webinar
Safe Harbor WebinarSafe Harbor Webinar
Safe Harbor Webinar
 
EU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor ReplacementEU-US Privacy Shield - Safe Harbor Replacement
EU-US Privacy Shield - Safe Harbor Replacement
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise
Mind Your Business: Why Privacy Matters to the Successful Enterprise
 
28014_EY Safe Harbor_UK
28014_EY Safe Harbor_UK28014_EY Safe Harbor_UK
28014_EY Safe Harbor_UK
 
Data Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe HarborData Privacy vs. National Security post Safe Harbor
Data Privacy vs. National Security post Safe Harbor
 
Cloud Roundtable
Cloud RoundtableCloud Roundtable
Cloud Roundtable
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
 
Privacy Laws in Europe
Privacy Laws in EuropePrivacy Laws in Europe
Privacy Laws in Europe
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
 
Data protection For CYP Organisations
Data protection For CYP OrganisationsData protection For CYP Organisations
Data protection For CYP Organisations
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 Introduction to EU General Data Protection Regulation: Planning, Implementat... Introduction to EU General Data Protection Regulation: Planning, Implementat...
Introduction to EU General Data Protection Regulation: Planning, Implementat...
 
US eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosureUS eDiscovery v UK eDisclosure
US eDiscovery v UK eDisclosure
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 
Privacy shield what you need to know about storing eu data slideshare
Privacy shield what you need to know about storing  eu data slidesharePrivacy shield what you need to know about storing  eu data slideshare
Privacy shield what you need to know about storing eu data slideshare
 
The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?The GDPR: What About Data Stored or Transmitted Outside the EU?
The GDPR: What About Data Stored or Transmitted Outside the EU?
 

Más de Agustin Argelich Casals

Más de Agustin Argelich Casals (20)

AIRESS Resucitator: Emergency Ventilator
AIRESS Resucitator: Emergency VentilatorAIRESS Resucitator: Emergency Ventilator
AIRESS Resucitator: Emergency Ventilator
 
Energy Transformation for a Greener Future
Energy Transformation for a Greener FutureEnergy Transformation for a Greener Future
Energy Transformation for a Greener Future
 
Observations of Telecom over the last 40 years
Observations of Telecom over the last 40 yearsObservations of Telecom over the last 40 years
Observations of Telecom over the last 40 years
 
Healthcare digital transformation - How to lead it COMB def.pdf
Healthcare digital transformation - How to lead it COMB def.pdfHealthcare digital transformation - How to lead it COMB def.pdf
Healthcare digital transformation - How to lead it COMB def.pdf
 
The 5+1 indicators of the Intelligent Community Forum methodology
The 5+1 indicators of the Intelligent Community Forum methodologyThe 5+1 indicators of the Intelligent Community Forum methodology
The 5+1 indicators of the Intelligent Community Forum methodology
 
Agustin Argelich - 5 key factors to lead innovation.pdf
Agustin Argelich - 5 key factors to lead innovation.pdfAgustin Argelich - 5 key factors to lead innovation.pdf
Agustin Argelich - 5 key factors to lead innovation.pdf
 
Digital transformation: what does it mean for Vietnam, and how to lead it to ...
Digital transformation: what does it mean for Vietnam, and how to lead it to ...Digital transformation: what does it mean for Vietnam, and how to lead it to ...
Digital transformation: what does it mean for Vietnam, and how to lead it to ...
 
A networked World. The power of collaboration
A networked World.  The power of collaborationA networked World.  The power of collaboration
A networked World. The power of collaboration
 
The power of Collaboration in the Digital era
The power of Collaboration in the Digital eraThe power of Collaboration in the Digital era
The power of Collaboration in the Digital era
 
The new role of Governments in deregulated telecom markets. Who is responsibl...
The new role of Governments in deregulated telecom markets. Who is responsibl...The new role of Governments in deregulated telecom markets. Who is responsibl...
The new role of Governments in deregulated telecom markets. Who is responsibl...
 
An American Legal Perspective
An American Legal PerspectiveAn American Legal Perspective
An American Legal Perspective
 
How digital technology is shaping the future of humanity
How digital technology is shaping the future of humanityHow digital technology is shaping the future of humanity
How digital technology is shaping the future of humanity
 
US Enterprise Cellular Market Competing Against "Big Four"
US Enterprise Cellular Market Competing Against "Big Four"US Enterprise Cellular Market Competing Against "Big Four"
US Enterprise Cellular Market Competing Against "Big Four"
 
UETS – Universal Ethernet Telecommunications Services
UETS – Universal Ethernet Telecommunications ServicesUETS – Universal Ethernet Telecommunications Services
UETS – Universal Ethernet Telecommunications Services
 
Dave Mailer presentation at VI Telecom consultants day
Dave Mailer presentation at VI Telecom consultants dayDave Mailer presentation at VI Telecom consultants day
Dave Mailer presentation at VI Telecom consultants day
 
Communications Technology where we are? where are we going?
Communications Technology where we are? where are we  going?Communications Technology where we are? where are we  going?
Communications Technology where we are? where are we going?
 
Tackling Crisis and Disparity - Integral to Economic Progress
Tackling Crisis and Disparity - Integral to Economic ProgressTackling Crisis and Disparity - Integral to Economic Progress
Tackling Crisis and Disparity - Integral to Economic Progress
 
AIRESS investment opportunity - executive summary -eg-01
AIRESS investment opportunity - executive summary -eg-01AIRESS investment opportunity - executive summary -eg-01
AIRESS investment opportunity - executive summary -eg-01
 
AIRESS - Emergency Ventilator
AIRESS - Emergency VentilatorAIRESS - Emergency Ventilator
AIRESS - Emergency Ventilator
 
Como gestionar una pandemia sin confinar a todo el pais.
Como gestionar una pandemia sin confinar a todo el pais.Como gestionar una pandemia sin confinar a todo el pais.
Como gestionar una pandemia sin confinar a todo el pais.
 

Último

一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
Asmae Rabhi
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 

Último (20)

一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 

Martha Buyer V SCTC day conference 24 feb16

  • 1. Cloud: Is it Legal to Use American Cloud Services in Europe? Martha Buyer Law Offices of Martha Buyer, PLLC East Aurora, NY www.marthabuyer.com
  • 4. Difference in Perception between EU and US • Privacy as a matter of commerce in the U.S. • Privacy as a fundamental human right in the EU • Right to be forgotten www.marthabuyer.com
  • 5. Once data crosses international borders, where is it “safe?” • “it depends” • Do you know where your cloud actually is? • Guess what? It matters. www.marthabuyer.com
  • 6. Schrems v. Data Protection Commissioner (Case C-362/14) • What the case means • Historical context • 2000 decision enabled U.S. companies to self-certify that company practices ensured an adequate level of protection for personal data under the EU Data Protection Directive, thus permitting the company to transfer data from the EU to the United States. • Schrems decision holds that U.S. law does not afford adequate protection to personal data www.marthabuyer.com
  • 7. What’s happened since the decision (October, 2015) • Data transfers from the EU to the United States trigger the provisions of the EU Data Protection Directive and may come under scrutiny. • Many companies utilize U.S.-based cloud services • If personal data is kept outside of a U.S. jurisdiction • Knowledge of compliance regs is required • So is compliance! www.marthabuyer.com
  • 8. Companies can no longer rely on “safe harbor” self-certification. • Entities need to independently verify that company transfers of personal data from the EU to the United States meet the level of data privacy protection considered adequate by the EU Data Protection Directive. • http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:31995L0046 • http://ec.europa.eu/justice/data-protection/ • The European Commission recommends that entities consider using the EU- approved standard contractual clauses, the EU-approved Binding Corporate Rules, or the enumerated derogations under which data can be transferred. www.marthabuyer.com
  • 9. Use of Standard Contract Clauses • two sets of standard contractual clauses for transfers from data controllers to data controllers established outside the EU/EEA • one set for the transfer to processors established outside the EU/EEA. • http://ec.europa.eu/justice/data-protection/international- transfers/transfer/index_en.htm www.marthabuyer.com
  • 10. FCPA Foreign Corrupt Practices Act The Foreign Corrupt Practices Act of 1977, as amended, 15 U.S.C. §§ 78dd-1, et seq. • The anti-bribery provisions prohibit paying foreign officials to obtain or retain business. • Accurate accounting and adequate internal controls are REQUIRED! • jurisdiction of the FCPA is far-reaching and hinges on the use of interstate commerce by a U.S. or foreign person. • Aggressive Enforcement • compliance policies to maintain watch over company actors to avoid inadvertently violating the FCPA. • http://www.justice.gov/criminal-fraud/foreign-corrupt-practices-act www.marthabuyer.com
  • 11. More FCPA • Department of Justice is happy to offer opinions on compliance: U.S. Department of Justice Criminal Division, Fraud Section Attn: FCPA Coordinator Bond Building, 4th Floor 10th and Constitution Ave., NW Washington, DC 20530-0001 Fax: 202-514-7021 Email - FCPA.Fraud@usdoj.gov www.marthabuyer.com
  • 12. Protecting the Jewels • WISP • Protecting data within a company’s control • Protecting data beyond the company’s walls www.marthabuyer.com