Feeds

Privacy winds blow through Clouds towards Switzerland

Safe haven guaranteed?

3 Big data security analytics techniques

Opinion Cloud services are one of the major changes to the way companies use computing services, but the weather may be changing as a consequence of increasing activity of European Data Protection watchdogs.

Whereas US citizens and companies have to contend with ever decreasing rights to privacy, EU companies will come under pressure from Data Protection regulators keen to show their independence (as Google has discovered). This will create a demand for assurances.

Companies that do not want to fall foul of privacy regulations have a problem: the legislative anti-terror backdoors installed post 9/11 offer authorities easy access, but provide for little transparency in how those rights are used or what happens to the data afterwards, and they exist in European law too.

In the UK alone, fairly public events have shown that not only such legislation will be abused, even more so when those who are supposed to guard against abuse are in collusion with those who break the law.

The result will be a continued search for a safe haven for any company that requires confidentiality. There are plenty companies that need it: organisations with interesting IP and any entity that handles truly private data such as law firms, medical practices, private banks and finance advisers.

Unsafe harbour

Companies with links to the US will have to prove they are not simply shipping all data to the US, and this may prove impossible. The lack of oversight and control over use of the US PATRIOT Act renders the whole Safe Harbor agreement effectively meaningless, yet companies without such links will only have local legal leverage available as an offset to the risks posed by laws that effectively seek to bypass due process. Europe may be safer, but not safe.

Companies with intelligent lawyers will eventually discover that cross-jurisdictional IT deployment offers the only route to secure storage. For example, they can avoid the EC legal risks by hosting in Switzerland. This creates a two-pronged safety net for abuse of intercept facilities: not only will an international request for assistance create a visible audit trail, Swiss laws are also stricter when it comes to standards of evidence and containment of any information gleaned during an investigation, thus frustrating abuse and returning due process to investigations.

Continuing the Swiss theme, last year has also seen a hardening of the Swiss stance against data theft. They will no longer collaborate with investigations where evidence has been sourced by means considered illegal under Swiss law, which makes the nation all the more attractive as a new data haven for European organisations.

US as well as European law makers will have to find ways to demonstrate that they use their powers responsibly, with more transparency of their use of special powers as a good first step. Otherwise, pressure groups such as Anonymous and Wikileaks will see a continued justification of their existence. A jurisdiction that seeks to avoid due process should not be surprised when its citizens start to ask:

What do they have to hide?

Peter Houppermans is a privacy and IT security expert based in Switzerland.

3 Big data security analytics techniques

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.