Feeds

Make sure your data finds a safe harbour

Danger in international waters

Top 5 reasons to deploy VMware with Tegile

The drive to buy local is very much in vogue, even though the note of nationalism in the Buy British slogan may not sit comfortably with some.

And despite the many good reasons to support one’s local economy, there are limits: this writer is not buying local bananas until well into retirement on Mustique.

Outsourcing is also a necessary part of managing costs in a highly competitive business environment.

But when it comes to managing your data in the cloud, a little parochialism may be a good thing.

Buyers of off-the-peg cloud contracts could unwittingly be putting themselves in breach of UK data protections laws, says Kathryn Wynn, an associate at the law firm Pinsent Masons.

Many service providers have standard terms that specify compliance with US laws, for example, which could put the customer in breach of the UK's Data Protection Act.

“In a bespoke system, this can be tackled, but in standard contracts customers struggle to get this kind of protection,” she says.

Spoiling for a fight

There are safe-harbour agreements in place to ensure data can be held in a way that complies with EU data protection laws, but not all providers are safe harbour certified, Wynn warns.

The closest thing we have to a test case for data protection in the US is the Passenger Name Records incident from a few years back, she adds. On that occasion the EU was quite firm about not allowing the US government unfettered access to data and ensured that EU-level protection was applied.

The way this was handled suggests that if the safe-harbour agreement were to be tested, the EU would take a defensive stance, but the US Patriot act that could make for quite some scrap.

And the US is not the only place that can give data controllers legal headaches. Although the EU technically has the same protection requirements across all member states, there is still some variation.

"Creating an international regime would be very difficult”

Conor Callanan, chief executive of cloud service provider Core GB, says: “Different regions have different approaches to risk. Generally, yes, your data will be safe anywhere in the EU, but in Germany, for example, insurance regulations go above and beyond what is in EU laws. There are higher requirements.”

Both he and Gary Jensen, lead consultant at Silversands, a Microsoft partner, expect more pan-EU harmonisation as cloud deployments become common.

“It used to be that data in France could not be encrypted if the government wasn’t given the key, for instance,” Jensen notes. That was changed around the turn of the century amid fears that France would be isolated within the EU and would fail to take advantage of the new online economy.

Disunited nations

Speaking this month at a cloud computing forum at the National Institute of Standards and Technology in Gaithersburg, Maryland, Vivek Kundra, the US’s recently-departed federal chief information officer, said: "It's not going to be a question of technology. [Data sovereignty] is going to be a question of international law and treaties that we will need to engage in the coming years.”

But Wynn is unsure how easy it will be to harmonise across wider geographies. “There are high-level principles out there, but they are all very theoretical," she says.

"Managing data with the US under safe-harbour agreements will be easier, but creating an international regime would be difficult. Really, this is something that needs to happen commercially.”

She says that increasingly US companies are willing to sign up to the model clauses that would provide “adequacy” of data handling and protection under EU law, but cautions that companies still need to exercise their right to audit. The other point of order to watch out for is ISO 27001, an internationally recognised security standard.

“It is not always obvious where data is held. Customers might not even know where their data is,” she emphasises.

“This is why the due diligence process is so important. Asking the right questions reveals a lot: if a company is evasive, that should sound warning bells.” ®

Beginner's guide to SSL certificates

More from The Register

next story
Ellison: Sparc M7 is Oracle's most important silicon EVER
'Acceleration engines' key to performance, security, Larry says
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Lenovo to finish $2.1bn IBM x86 server gobble in October
A lighter snack than expected – but what's a few $100m between friends, eh?
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Hey, what's a STORAGE company doing working on Internet-of-Cars?
Boo - it's not a terabyte car, it's just predictive maintenance and that
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.