3. “Legal Issues, Contracts, and Electronic Discovery” - DONE Flashcards

1
Q

What may make you reconsider migrating your data to the cloud?

A

If the data processed by the company is so sensitive or confidential its disclosure would lead to a disastrous scenario for your company.

Not all data has the same value so you need to take a risk-based approach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

“Legal Frameworks Governing Data Protection and Privacy”

A

“Many countries have their own legal frameworks requiring appropriate safeguards to protect the privacy of personal data and the security of information and computer systems. ”

“These were ultimately the basis for the Organization for Economic Cooperation and Development (OECD) Privacy Guidelines This then fed the formation of the Data Protection Directive, aka Directive 95/46/EC, which was superseded by the General Data Protection Regulation (GDPR, covered later in this chapter).

The main point is this: These privacy laws aren’t new. They have been built over years and are only now being rigorously enforced.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

“From a legal perspective, three entities are involved when cloud services are consumed (shown in Figure 3-1), and all have different requirements from a legal perspective.”

“Of the three models, you should get your head around the role of the controller/custodian and remember that jurisdiction is very important to determine applicable laws.”

A

“*Provider/Processor
This one is straightforward. This is the cloud service provider. The provider must operate in accordance with the laws in the jurisdictions in which they operate.

*Custodian/Controller
This is the entity that holds end-user data. The naming of this role is dependent on the location you’re in. In the United States, it’s called the “data custodian”; in Europe, it’s called the “data controller.” Either way, this entity is legally accountable for properly securing end-user data. As an example of a data custodian/controller, if your company uses an Infrastructure as a Service (IaaS) provider to store your customer data, you are the data custodian/controller of that end-user data. The custodian/controller must operate in accordance with the laws of the jurisdiction in which the company operates.

*End User/Data Subject
This entity (such as you and I) has their data being held by a controller/custodian.”

Excerpt From
CCSK Certificate of Cloud Security Knowledge All-in-One Exam Guide
Graham Thompson
This material may be protected by copyright

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

These privacy laws define numerous obligations, such as confidentiality and security obligations that a custodian/controller and provider/processor must abide by.

“The legal requirement on the data custodian/controller is no joke. Being labelled the data custodian has very real legal ramifications. If your company holds end-user data and is found to be negligent in privacy or security as required by laws (or even prudent practice) in your company’s jurisdiction, your company is open to being sued.”

A

The “data custodian/controller is prohibited from collecting and processing personal data unless certain criteria are met. For example, the data custodian/controller is limited to what the end-user has consented to regarding the collection and proposed uses of the end user’s data, according to the consent agreement. When using a data processor (such as a CSP) to process data on its behalf, a data custodian/controller remains responsible (accountable by law) for the collection and processing of that data.

As the data custodian/controller, you are required to ensure that your provider/processor takes adequate technical and organizational security measures to safeguard the data. This, of course, requires that you perform proper due diligence with regard to the provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Despite common themes among countries on all continents, each has developed data protection regimes that may conflict with another’s regime. As a result, cloud providers and cloud users operating in multiple regions struggle to meet compliance requirements. In many cases, the laws of different countries may apply according to the following criteria:

A

“*The location of the cloud provider

*The location of the data custodian/controller

*The location of the end user

*The location of the servers

*The legal jurisdiction of the contract between parties, which may be different from the locations of any of the parties involved

*Any treaties or other legal frameworks between those various locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Required Security Measures

A

“Many countries have adopted privacy laws that are either omnibus (covers all categories of personal data) or sectoral (covers specific categories of personal data). These laws often require that appropriate security measures be in place to ensure that privacy-related data is properly protected. These security measures may require companies to adopt technical, physical, and administrative measures. These measures may of course be used to protect more than just personal information; they will likely be leveraged to protect other sensitive data sets such as financial data and trade secrets, for example.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Treaties

A

“A treaty is an agreement between two political authorities. There are two treaties worthy of discussion to help you prepare for the CCSK exam. You may have heard of the International Safe Harbor Privacy Principles, otherwise known as the Safe Harbor agreement, between the United States and the European Union. This treaty basically allowed companies to commit voluntarily to protecting EU citizens’ data stored in the United States the same way that it would protect the data if it were held in the European Union.

This agreement was terminated in 2015, however, and was replaced shortly afterward with a new agreement, the EU-US Privacy Shield. Privacy Shield operates in much the same way as Safe Harbor, in that Privacy Shield allows for personal data transfer and storage between the European Union and the United States. Companies self-certify as having appropriate privacy measures in place, and Privacy Shield serves as a data transfer mechanism under the EU GDPR.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

“Restrictions to Cross-Border Data Transfers”

A

Barring a treaty such as the Privacy Shield in place, which establishes an adequate level of protection, many countries prohibit data being stored outside of their boundaries. If no treaty is in place, however, it is still possible to store data in a foreign country, although it requires a more complex solution.

In this scenario, the data importer and exporter may sign a contract ensuring privacy rights for end users. The complexity may come from some cases requiring prior permission from a data protection commissioner before data can be transferred into or out of the country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

“In the CSA Guidance, two examples are cited as countries that prohibit data from being exported”

A

“Russia and China. These countries’ data localization laws require that data pertaining to individuals residing in their countries be stored within the “individual’s home country. Make no mistake; there are other countries and even Canadian provinces that have the same laws, but the CSA Guidance addresses only these two countries”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CLOUD Act

“A CSP should always defend clients from over-reaching access requests by any authorities. Customers should look for this language in contracts.”

A

“The Clarifying Lawful Overseas Use of Data Act (CLOUD Act) was introduced in the United States in 2018. Its purpose is to finalize some legal issues surrounding the US government’s ability to issue subpoenas or warrants to access client data stored by an American provider, regardless of where that data is physically stored.

A great example of the importance of the CLOUD Act is a court case between Microsoft and the US Department of Justice (DOJ). The DOJ wanted access to data stored in an Irish data center. Microsoft defended its client (which a CSP should always do!) by refusing DOJ access because the data itself was held outside of the United States. A court battle ensued and went all the way to the Supreme Court. During this time, the CLOUD Act was passed, and the Supreme Court declared the case moot because the CLOUD Act gave the DOJ access to the data because Microsoft is an American company.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Australia

A

“n Australia, the Privacy Act of 1988 (Privacy Act) and the Australian Consumer Law (ACL) of 2010 serve to protect end users. The Privacy Act includes 13 Australian Privacy Principles (APPs), which apply to all private-sector and not-for-profit organizations with revenues greater than AUD $3 million, all private health service providers, “and some small businesses. The Privacy Act can apply to (protect) any Australian customer even if the CSP is based outside of Australia and even if other laws are stated in a contract.

Australia amended its 1988 Privacy Act in February 2017 to require companies to notify affected Australian residents and the Australian Information Commissioner in the event of a security breach. A breach of security must be reported under two conditions: if there is unauthorized access or disclosure of personal information that would be likely to result in serious harm, or if personal information is lost in circumstances where unauthorized access or disclosure is likely to occur—and if it did occur, it would be likely to result in serious harm to any of the individuals to whom the information relates.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

China

A

Its 2017 Cyber Security Law (2018 updates are covered later) governs the operations of network operators and critical information infrastructure operators. The 2017 law requires these operators to implement a series of security requirements, including the design and adoption of information security measures; the formulation of cybersecurity emergency response plans; and assistance and support to investigative authorities, where necessary, for protecting national security and investigating crimes. The law requires providers of network products and services to inform users about known security defects and bugs and to report such defects and bugs to relevant authorities.

the law includes a data localization provision, which requires that personal information and other important data be stored within the territories of the People’s Republic of China. (What constitutes “important data” in the 2017 Cyber Security Law is extremely vague and subject to great debate)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Japan

A

“Like many countries, Japan’s Act on the Protection of Personal Information (APPI) requires the private sector to protect personal information and data securely. There are several other national laws, such as the Law on the Protection of Personal Information Held by Administrative Organs (not a typo), and sector-specific laws, such as the healthcare industry that requires registered health professionals to maintain the confidentiality of patient information.

Japan also limits the ability to transfer personal data to third parties (such as cloud providers). The prior consent of the data subject is required in order to transfer data to a third party. This consent is not required if the country of destination has an established framework for the protection of personal information that meets the standard specified by the Personal Information Protection Commission. Such a framework between Japan and the EU was ratified in 2018, around the same time the GDPR came into effect.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Russia

A

“The Russian data protection laws state that citizen data must be localized. In other words, like China, Russian citizen data must be stored within Russia. Roskomnadzor, the Russian Data Protection regulator, is responsible for enforcement of the law and has already blocked access to multiple web sites based on the fact that they may store Russian citizen data but do not do so within Russia. Essentially, if you see that a web site isn’t available in Russia, it’s because the web site owners don’t operate and store such data within Russia.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

“European Union and European Economic Area”

A

“The EU adopted the GDPR in 2016 (which became enforceable in May 2018), which is binding on all EU member states, as well as members of the European Economic Area (EEA). It replaced Directive 95/46/EC on the Protection of Personal Data, which had been the legal basis of data protection laws of all EU and EEA member states.”

“Another document you should know about that governs protection of personal data in the EU/EEA is Directive 2002/58/EC on Privacy and Electronic Communications. This directive is being phased out and is expected to be replaced with the new E-Privacy Regulation, but this new regulation has been delayed for years, and these delays are likely to continue for the foreseeable future.

Of course, privacy isn’t possible to implement without some form of security. The Network Information Security Directive (NIS Directive) addresses these security requirements. Adopted alongside the GDPR in 2016, the NIS Directive was implemented in May 2018. This saw EU/EEA member states implementing new information “security laws for the protection of critical infrastructure and essential services. The next two sections address both GDPR and the NIS Directive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

General Data Protection Regulation

A

“The GDPR applies to any legal entity engaged in economic activity (both organizations and individuals) that processes data associated with EU citizens, and it will be adjudicated (a legal term for making an official decision) by the data supervisory authorities or the courts of the member states that have the closest relationship with the individuals or the entities on both sides of the dispute.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

“The following list covers the GDPR’s basic points:

A

*Applicability - The GDPR applies to the processing of personal data in the context of the activities of a controller or processor in the EU/EEA, regardless of whether or not the processing takes place in the EU/EEA. It also applies to the processing of personal data of data subjects who are in the EU/EEA by a controller or a processor not established in the EU/EEA if the processing relates to the offering of goods or services (paid or not) or the monitoring of the behavior of a data subject when the behavior takes place within the EU/EEA.

*Lawfulness - Processing personal data is permitted only if the data subject has freely given specific, informed, and unambiguous consent to the processing of their personal data, or the processing is authorized by a statutory provision.

*Accountability obligations - The GDPR has created numerous obligations for companies, including requiring that companies retain records of their processing activities. A data protection impact assessment must always be conducted when the processing could “result in a high risk to the rights and freedoms of natural persons.” Companies are expected to develop and operate their products and services in accordance with “privacy by design “and “privacy by default” principles.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

“The following list covers the GDPR’s basic points:

A

*Data subjects’ rights
Data subjects have rights regarding the processing of their data. The big ones are the right to object to use of their personal data, the right to be forgotten, and the right to have corrections made to their data.

*Cross-border data transfer restrictions
Personal data cannot be transferred outside the EU/EEA to a processor or custodian/controller that is located in a country that does similar protection of personal data and privacy rights. A company can prove that it will be offering the “adequate level of protection” required by executing Standard Contractual Clauses (SCC), signing up to the EU-US Privacy Shield, obtaining certification of Binding Corporate Rules (BCRs), or complying with an approved industry code of conduct or approved certification mechanism. In rare cases, the transfer may be allowed with the explicit, informed consent of the data subject, or if other exceptions apply.

*Breaches of security
The GDPR requires that data controllers report security breaches within 72 hours of detection. The reporting requirements are risk-based, and there are different requirements for reporting the breach to the Supervisory Authority and to the affected data subjects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

“The following list covers the GDPR’s basic points:

A

*Discrepancies among member states
The GDPR allows member states to implement additional requirements above and beyond the GDPR baseline. For example, Germany (one of the leading countries when it comes to privacy regulations prior to GDPR) requires that a data protection officer be appointed if the company has more than nine employees.

*Sanctions
Violations of the GDPR expose a company to significant sanctions. These sanctions may reach up to 4 percent of the company’s global gross income, or up to EUR 20 million, whichever is greater.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

“Network Information Security Directive”

A

“The NIS Directive required each EU/EEA member state to implement the directive into its national legislation by May 2018 and identify Operators of Essential Services (OES), such as energy, transport, banking, financial market infrastructures, health, drinking water supply, and distribution, by November 2018. In addition to these OES, the NIS directive addresses (albeit to a less stringent regime) digital service providers (DSPs). The specific types of companies considered to qualify as a DSP include cloud service providers, online marketplaces, and search engines. DSPs should be aware that the NIS Directive also applies to companies based outside of the European Union whose services are available within the European Union. These companies are obliged to assign an EU-based representative to act on their behalf in ensuring NIS Directive compliance.

The NIS Directive establishes a framework to enable networks and information systems to resist, at a given level of confidence, actions that compromise the availability, authenticity, integrity, or confidentiality of stored, transmitted, or processed data, or the related services that are offered by or accessible through those networks and information systems.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

“Regarding “authenticity” versus “integrity”:”

A

“Integrity can be defined as assurance of the accuracy and reliability of information and systems from its original state (called a “reference version”). Authenticity is defined as assurance that the “reference version” data has not been altered from what it was when another party was in control of it”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

“Network Information Security Directive

“The requirements to be implemented into national laws include the following:”

A

“*Each member state must create a computer security incident response team (CSIRT). These CSIRTs will work in cooperation with CSIRTs across all EU/EEA members as part of a cohesive EU-wide network.
*Those organizations who qualify as DSPs under the Directive’s criteria must implement a range of risk management measures, both technical and operational. DSP organizations must comply with the Directive’s incident reporting protocol, which requires that organizations notify “without undue delay” CSIRTs and other relevant bodies about any significant security incidents encountered.
*Each member must provide evidence of the effective implementation of security policies, such as the results of a security audit.
*Each member must take technical and organizational measures to manage risks posed to the security of networks and information systems used in their operations.
*Each member must take appropriate measures to prevent and minimize the impact of incidents affecting the security of the networks and information systems used for the provision of such essential services, to facilitate the continuation of those services.
*Each member must provide information necessary to assess the security of their networks and information systems.”
*Each member must notify the competent authority without undue delay of any incident having a substantial impact on the provision of a service.

The NIS Directive states that the responsibility to determine penalties for noncompliance rests with the individual member states and not the European Union. The Directive does, however, state that penalties must be “effective, proportionate, and dissuasive.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The Americas

US State Laws

“Remember that many states have laws and regulations that require organizations to ensure that service providers provide adequate privacy protections and security measures for personal data.”

A

“Most security and privacy laws and regulations in the United States are driven at a state level. These laws apply to any entity that collects or processes personal information (as narrowly defined in the applicable law) of individuals who reside in that state, regardless of where in the United States the data is stored.

State laws differ widely across the United States, down to the most basic element of what is considered “protected information.” For example, California declares that a username and a password are considered protected data. Meanwhile, across the street in Arizona, a username and password are not considered protected data. When it comes to playing it safe and ensuring that you are compliant with all standards, you’re going to want legal counsel involved to determine the “hardest” state-level privacy requirements and follow those.”

24
Q

The Americas

US Federal Laws

“Remember that many states have laws and regulations that require organizations to ensure that service providers provide adequate privacy protections and security measures for personal data.”

A

“There are a few examples of US laws and regulations that apply to organizations in the United States. These include financial regulations in the Gramm-Leach-Bliley Act (GLBA), the Health Insurance Portability and Accountability Act of 1996 (HIPAA), and the Children’s Online Privacy Protection Act of 1998 (COPPA). All these regulations contain provisions that pertain to the privacy and the adoption of reasonable security measures surrounding processing of personal information.

Most of these laws require companies to take precautions when hiring subcontractors and service providers (including CSPs). They may also hold organizations responsible for the acts of their subcontractors. For example, both GLBA and HIPAA require that covered organizations use written contract clauses requiring third parties to use reasonable security measures and comply with data privacy provisions.”

25
Q

“Security Breach Disclosure Laws”

A

“Several federal and state security and privacy laws or rules require entities that have suffered a breach of security that compromised specified categories of data, such as personally identifiable information (PII) and especially patient health information (PHI), to notify affected individuals promptly, and in many cases, notify state or federal agencies of the occurrence of the breach of security.

For a state breach disclosure law, I like to point out Washington State’s Breach Notification Law (enacted in 2015). This law states that any breach that is reasonably expected to impact more than 500 Washington State residents must be reported to the Washington State attorney general within 45 days following discovery. All breach notifications are published on the Washington State Attorney General web site.

Contrast this law with the breach notification law in Alabama, which was the final state to implement a breach notification law in June 2018. Alabama requires notification to individuals within 45 days if lost data is “deemed to cause substantial harm.” Notification to consumer reporting agencies and the state attorney general must be performed if more than 1000 Alabama citizens are impacted. All states have wildly different requirements regarding what data constitutes a breach, notification times[…]”

26
Q

“Network Information Security Directive

“The requirements to be implemented into national laws include the following:”

A

“*Each member state must create a computer security incident response team (CSIRT). These CSIRTs will work in cooperation with CSIRTs across all EU/EEA members as part of a cohesive EU-wide network.
*Those organizations who qualify as DSPs under the Directive’s criteria must implement a range of risk management measures, both technical and operational. DSP organizations must comply with the Directive’s incident reporting protocol, which requires that organizations notify “without undue delay” CSIRTs and other relevant bodies about any significant security incidents encountered.
*Each member must provide evidence of the effective implementation of security policies, such as the results of a security audit.
*Each member must take technical and organizational measures to manage risks posed to the security of networks and information systems used in their operations.
*Each member must take appropriate measures to prevent and minimize the impact of incidents affecting the security of the networks and information systems used for the provision of such essential services, to facilitate the continuation of those services.
*Each member must provide information necessary to assess the security of their networks and information systems.”
*Each member must notify the competent authority without undue delay of any incident having a substantial impact on the provision of a service.

The NIS Directive states that the responsibility to determine penalties for noncompliance rests with the individual member states and not the European Union. The Directive does, however, state that penalties must be “effective, proportionate, and dissuasive.”

27
Q

“Federal and State Agencies”

“Remember that the FTC has taken the charge from a federal perspective on consumer privacy rights. State attorneys general deal with consumer privacy rights at a state level.”

A

“Cloud providers and consumers should also be aware that laws don’t live in a vacuum; they continuously change. US government agencies, such as the Federal Trade Commission (FTC), and the state attorneys general have used their power under federal or state “unfair and deceptive practices” acts to fine companies whose privacy or security practices are inconsistent with their claims, thus making their practices unfair or deceptive. From a privacy and security enforcement perspective, the FTC has the ability to issue fines and consent orders that outline FTC findings and how a company will address any issues (and generally includes a requirement of 20 years of FTC oversight). Both consent orders and fines can be used by legal counsel to update or modify security and privacy statements based on the new precedents they provide.

The FTC has the ability to impose significant fines on companies found to be in violation of a consent order. In July 2019, for example, the FTC fined Facebook $5 billion for violations of a consent order the company agreed to in 2011.”

28
Q

“Central and South America”

A

“Central and South American countries are adopting data protection laws at a rapid pace. Argentina, Chile, Colombia, Mexico, Peru, and Uruguay have passed data protection laws inspired mainly by the EU Directive 95/46/EC and may include references to the Asia-Pacific Economic Cooperation (APEC) Privacy Framework. These laws include security requirements and assign the data custodian/controller the burden of ensuring the protection and security of personal data wherever the data is located, and especially when data is being transferred to a third party, such as a cloud provider.

29
Q

“Contracts and Provider Selection”

A

“In addition to the various laws and regulations you may face as a cloud customer, you will likely have contractual obligations that require you to protect the personal information of your own clients, contacts, or employees (aka stakeholders) to ensure that data is not used for any reason other than its original intent and is not shared with third parties. These clauses are usually found in the terms and conditions and/or privacy statement that a company posts on its web site, or from written contracts. ”

“In addition to the various laws and regulations you may face as a cloud customer, you will likely have contractual obligations that require you to protect the personal information of your own clients, contacts, or employees (aka stakeholders) to ensure that data is not used for any reason other than its original intent and is not shared with third parties. These clauses are usually found in the terms and conditions and/or privacy statement that a company posts on its web site, or from written contracts. ”

30
Q

“Contracts and Provider Selection”

A

“If the privacy notice follows the GDPR (which most legal counsel will insist upon as a general precaution) and allows individual data subjects to have access to their personal data and to have this information modified or deleted, the CSP must also allow these access, modification, and deletion rights to be exercised to the same extent as it would in a non-cloud relationship.

The terms and conditions and privacy statements tell your end users how you will handle their data, period. As the data custodian/controller, your company is legally responsible and accountable for making sure those protections are in place. Know the old saying, “ignorance is no excuse”? What do you think would happen if one of your clients sued you for loss of data and you told the judge you didn’t know the provider didn’t secure data once you moved it? You need a full understanding of what the provider does (external due diligence) and what you must do to support your claims and capabilities to do so (internal due diligence), and you must get everything in writing. If the provider lied to you (in writing) and you get sued by your end users, you at “least have an ability to launch a lawsuit against the provider. Who wins in this situation? Probably the lawyers and nobody else.

The laws, regulations, standards, and related best practices discussed earlier also require data custodians/controllers to ensure that these obligations will be fulfilled by conducting due diligence (before execution of the contract) and security audits (during performance of the contract).

31
Q

“At all times, you must consider the “cloud friendliness” of data that will be migrated to a cloud environment.”

A

“If the data processed by the company is so sensitive or confidential that its disclosure would lead to a disastrous scenario for your company, you might want to reconsider transferring it to a cloud service or take significant precautions for its transfer and storage. Just remember that not all data has the same value and/or regulations surrounding it. You always need to take a risk-based approach.

Financial reports for a publicly traded company have Sarbanes-Oxley (SOX) requirements and need to be tightly controlled, but the latest marketing blog content for the same organization likely doesn’t have the same security requirements.

32
Q

The cloud is very dynamic. How do you ensure that required privacy and security measures are followed?

A

Periodic monitoring, testing and evaluation of cloud services

many providers may restrict you from testing their systems, platforms and applications. This restriction may force you into more of a paper exercise, where you are reliant on such providers supplying you with documentation of tests performed by third parties.

Both cloud clients and cloud providers need to keep abreast with new security laws, threats and compliance requirements

33
Q

how can you do your due diligence on prospective CSPs?

A

“Due diligence of prospective CSPs must be performed prior to your using their services. This requires that you request and review all relevant documentation from the provider, such as security documentation, contracts, terms and conditions, and acceptable use policies. The goal here is not just to assess the overall service provider but to investigate the actual services you are consuming”

“The criticality of the workload should always be considered when performing due diligence of a service.

The CSA’s STAR registry is a great tool

“Sources of information need not be limited to documentation supplied by the vendor. You may find a treasure trove of information from sources such as other customers, online searches about the vendor’s reputation, and reviews of any reports of litigation filed against the provider. These sources may highlight the quality or stability of a service and support capabilities, for example.”

34
Q

Once you have done your due diligence what is next?

A

That you and/or your legal team have fully read and understood the conditions included in the contract

As the nature of cloud computing is based on economies of scale, you will likely find many contract clauses to be non-negotiable.

“You may be able to negotiate contract terms with smaller providers if you are willing to be a reference client for them, for example. If a provider isn’t open to changing contract clauses, it doesn’t mean you need to abandon them as a service provider. It means that you need to understand your requirements, what the provider is contractually obligated to deliver, and fill any potential gaps by implementing appropriate controls. Alternatively, risk acceptance is always an option. Your organization’s risk tolerance will determine the appropriate course of action.”

35
Q

How will you get an audit or attestation from a company?

What will you need to consider about third-party audits and attestations?

A

Most large companies will not allow your company to perform an audit of their data centres so you will be reliant on a third party to serve as assurance.

“transparency is critical for the provider to have available to prospective and current customers. It is the customer’s responsibility to evaluate the most recently available audit or attestation, its scope, and the features and services included in the assessment. You will want to also take into consideration the date of the documentation you are reviewing. Does it reflect the way things are today, or is the report you’re relying on five years old, with little applicability to the current environment?”

36
Q

What is the FRCP?

Which rule in particular in the FRCP can pertain to the cloud provider?

A

The federal rules of Civil procedure govern the procedure in all civil actions and proceedings in US district courts

Rule 26: Duty to disclose, General provisions governing discovery - the rule requires that a party make disclosures based on information reasonably available and must also declare any witnesses who will present at trial.

37
Q

How may the FRCP pertain to a cloud provider and consumer?

A

The cloud provider may be required to collect electronically stored information.

As a consumer, you must work with the provider to plan how to identify all documents that may pertain to a particular e-discovery request.

If a judge deems data was purposefully deleted or otherwise destroyed, he or she may issue an instruction of “adverse inference” to the jury.”

38
Q

Describe the requirement of possession, custody and control associated with the FRCP

A

If you can provide data (electronic or not), you are legally obligated to produce it. It doesn’t matter where it is stored.

The CSA guidance says that “hosting data via a third party does not obviate a party’s obligation to produce data.

39
Q

How should you consider searchability and e-discovery tools regarding the FRCP?

A

Lack of tools =. increase time + expenses required to produce relevant data

Customers’ requirements to address discovery should be negotiated in advance to prevent surprises such as the provider’s inability to assist and astronomical bills

40
Q

Give an example of data preservation laws outside of the US

A

The EU = Directive 2006/24EC
Brazil = Azeredo Bill
Argentina = Data retention law of 2014

41
Q

Many laws deal with data retention periods that your company must address and can lead to additional costs. This data can reasonably be expected to be requested in the event of a court case.

What are some questions listed by the CSA guidance to consider before migrating data to the cloud?

A
  • what are the ramifications of retaining data under the service level agreement?
    -what happens if the preservation requirements outlast the terms of the SLA
    -Does the client have the storage capacity under the SLA
    -Can the client effectively download the data in a forensically sound manner so it can be preserved offline or nearline

Data retention services may be available but at an additional cost. Make sure you understand whether multiple parties will be involved and they may impact you

42
Q

The scope of preservation is an important aspect of data retention. Legal requests must be very specific as to the data requested.

What is a possible consequence if a customer is unable to retain specific information sets with granularity?

A

They may have to ‘over preserve” which can lead to increased costs as someone (e.g. a client-paid attorney’s staff) has to sift through all this information to determine what is required by the courts. This is called document review or privilege review

43
Q

With all the new technologies associated with the cloud, e-discovery is becoming more complex in a world where data storage is more dynamic than ever

e.g. SaaS cloud environment = programmatically modifies/ purges data when uploaded by a client/ data Is shared with other people or systems that are unaware of the need to preserve

How do you tackle this issue?

A

The trick is to realize what data may realistically be required in a court of law and work with the provider to understand the best way to preserve such data

44
Q

What are some issues that may arise from data collection from a CSP?

Define chain of custody

A
  1. potential lack of transparency of how the data is stored/processed within a cloud service = validating that data found is complete and accurate
  2. functionality of the application storing data - the provider may limit the data exported to a month’s worth at a time = additional effort and expense
  3. The bandwidth available for exporting data from a cloud environment and that export is done in a forensically sound manner ( All reasonably relevant metadata preserved) and that it follows appropriate chain-of-custody requirements

The documentation showing the full process of acquisition, transfer, handling and disposition of physical or electronic materials

45
Q

The FRCP includes a clause regarding data collection and accessibility. What does it pertain to?

26(b)(2)(B)

A

it excuses a litigant from presenting data that is truly not reasonably accessible.

The mere complaint that additional effort is required to retrieve data does not fall into this category and you will be responsible for the extra time and cost associated with data collection

46
Q

How does forensics pertain to the FRCP clause 26(b)(2)(B)

A

you need virtual tools for a virtual cloud. You will not be able to take a hard drive, make a bit-by-bit image of it and perform your investigations using this replica. You will be forced to use virtual tools to perform forensics on cloud workloads.

Not being able to present a bit-by-bit copy of a drive is a good example of the clause that excuses the presentation of data if it’s not reasonably accessible.

“In reality, this type of forensic analysis is rarely warranted in cloud computing, because of the nature of storage (virtualized) that doesn’t provide significant additional relevant information.”

47
Q

How does reasonable integrity pertain to data being used as evidence in court?

How does it change for data in the cloud?

A

“For evidence to be considered admissible in a court of law, it must be considered accurate and authenticated. This is true regardless of where such evidence is held. Authenticated means the data is considered genuine. This is where a chain of custody comes into play. If data cannot be authenticated, it cannot be considered admissible evidence in a court of law (barring any extenuating circumstances).

The cloud does change how the chain of custody is ensured. Take an example of a cloud provider that may allow you to export data, but any metadata is stripped as part of the process. But the metadata may be required to validate that the data is indeed genuine and therefore admissible in a court of law.”

48
Q

How may access to data be obtained for the court?

A

“Direct access may be impossible from both the customer and the SaaS provider (for example) you have a contract with if the provider, in turn, is using a third-party IaaS to store and process data. After all, the SaaS provider in this example is just another customer of the IaaS provider and may not have any access to the hardware or facilities. As such, in this example, a requesting party may need to negotiate directly with the IaaS provider for any access.”

49
Q

How is the native production of data important for court admission?

A

“When digital evidence is requested, it is expected to be produced in standard formats such as PDF or CSV. If a cloud provider can export data from their highly proprietary system in a proprietary format only, this data may not be admissible as evidence in a court of law. The only circumstance that may require the export of data in a proprietary format is if relevant metadata would be lost if converted to a standard format.

50
Q

What is the issue with data being stored in the cloud and authentication?

A

“The mere notion of storing data in a cloud has nothing to do with its authentication. The issue is the integrity of the data and that it wasn’t altered or modified since creation (chain of custody), just as it would be if it were stored on a server in your own data centre.

51
Q

what is discovery by design?

A

Discovery by design essentially means the provider has planned for discovery requests being an expected occurrence and that extreme measures, such as limiting other tenants from updating their data in the event of a litigation hold, do not need to be performed.

Providers should also consider creating systems with “discovery by design” to attract clients.

52
Q

What is the general best practice for a subpoena or a search warrant for a provider?

A

A general best practice for providers is to have their customers’ best interests in mind at all times, and this includes responding to subpoenas and search warrants for access to customer data. Providers should fight overbroad or otherwise problematic demands for information when possible.

As the customer, you cannot reasonably expect a provider to break the law to protect your data from being handed over to a government agency, as the provider may be compelled by law to do so based on the jurisdiction in which they are operating

53
Q
A

“*Cloud customers should understand the relevant legal and regulatory frameworks, contractual requirements, and restrictions that apply to the handling of their data or data in their custody, and the conduct of their operations before moving systems and data to the cloud.

*Cloud providers should clearly and conspicuously disclose their policies, requirements, and capabilities, including all terms and conditions that apply to the services they provide.

*Cloud customers should conduct a comprehensive evaluation of a proposed cloud service provider before signing a contract, and they should regularly update this evaluation and monitor the scope, nature, and consistency of the services they purchase.”

“*Cloud providers should publish their policies, requirements, and capabilities to meet legal obligations for customers, such as electronic discovery.

*Cloud customers should understand the legal implications of using particular cloud providers and match those to their legal requirements.

*Cloud customers should understand the legal implications of where the cloud provider physically operates and stores information.

*Cloud customers should decide whether to choose where their data will be hosted, if the option is available, to comply with their own jurisdictional requirements.

*Cloud customers and providers should have a clear understanding of the legal and technical requirements to meet any electronic discovery requests.

*Cloud customers should understand that click-through legal agreements are legally binding.”

54
Q

“What is the most important item to consider when reviewing third-party audits and attestations?”

A

“The services being consumed by the customer is the most important item to consider when reviewing third-party audits and attestations. Although all of the other options are certainly valid, they are of little value if the services consumed are not part of the scope of the audit being reviewed.”

55
Q

“Which of the following is the minimum retention period for any data that may be required in a court of law?”

A

“There are no mandated retention periods that are generically applied to all data sets. Different retention periods will be applied by laws or other means (such as standards, continued value to the company, and so on) based on the type of data. Although data that can be reasonably expected to serve as evidence in a court case should be preserved by an organization, there is no retention period mandated for these data sets.”