12
CLOUD AND SECURITY: A LEGISLAT OR' S PERSPECTIVE 6/7 /2013

Cloud and Security: a Legislator's Perspective

  • Upload
    cana

  • View
    42

  • Download
    0

Embed Size (px)

DESCRIPTION

Cloud and Security: a Legislator's Perspective. 6 / 7 /2013. Biggest inhibitor to the adoption of cloud computing. Data Security?. sensitive data in the cloud. More data, more storage, more risks Identifiable personal information examples Credit card information Medical records - PowerPoint PPT Presentation

Citation preview

Page 1: Cloud and Security: a Legislator's Perspective

CLOUD AND SE

CURITY: A

LEGISL

ATOR'S

PERSPECTIVE

6 / 7/ 2

0 1 3

Page 2: Cloud and Security: a Legislator's Perspective

BIGGEST INHIBITOR TO THE ADOPTION OF CLOUD

COMPUTING

Data Security?

Page 3: Cloud and Security: a Legislator's Perspective

SENSITIVE DATA IN THE CLOUD• More data, more storage, more risks

• Identifiable personal information examples• Credit card information•Medical records• Tax records• Customer account records• Human resources information• Banking and insurance records• Browsing history, emails and other communication• “Metadata”

• Sensitive personal data?

Page 4: Cloud and Security: a Legislator's Perspective

CLOUD SECURITY - STAKEHOLDERS

Data collector/own

er• Outsourcing:

How to select a cloud vendor?

• How to maintain direct control to safeguard data integrity?

Cloud service providers

• How to satisfy data residency and privacy requirements

• How to remain flexible and provide cost-effective service?

Regulator

• Formulation of relevant standards and practices

• How to ensure adoption and compliance?

• Would sensitive data end up overseas?

Customers/end-users

• Are my data safe in the cloud?

• Would I know if there is security or privacy breach?

Page 5: Cloud and Security: a Legislator's Perspective

ISSUES ON CLOUD SECURITY

SecurityIs the data

protected from theft, leakage,

spying or attacks?

What is the level of control

and protection?

Residency

Where is the data stored?

geographically disbursed?

What to do with data in

transit & outside

territory?

PrivacyWho can see personally identifiable information

(PII)?

Storing, transferring, locating and protecting PII

Page 6: Cloud and Security: a Legislator's Perspective

Challenges of cloud and

security

Maintaining ownership and control

of data

Info on 3rd party service

and distributed

infrastructure Deliver resiliency, availability

and flexibility of cloud services

Page 7: Cloud and Security: a Legislator's Perspective

COMPLIANCE REQUIREMENTS• Some countries have laws restricting storage of data

outside their physical country borders: India, Switzerland, Germany, Australia, South Africa and Canada

• EU: Data Protection Directive; Safe Harbor Principles – no sending PII outside European Economic area unless protections guaranteed

• USA: US Patriot Act, 40+ states have breach notification laws (25 states have exemption for encrypted personal data)

• Canada: Freedom of Information and Protection of Privacy Act

Page 8: Cloud and Security: a Legislator's Perspective

HONG KONG• Section 33(2)(f) of Personal Data (Privacy)

Ordinance, • Standard discussions through HK/Guangdong

Expert Committee on Cloud Computing Services and Standards

• Guidelines and information via infocloud.gov.hk

Page 9: Cloud and Security: a Legislator's Perspective

Can we still trust the ‘cloud’?What are the local laws that govern

data being collected, transferred and stored?

State-sponsored attacks?

Page 10: Cloud and Security: a Legislator's Perspective

INTERCEPTION OF COMMUNICATIONS – GOVERNMENT BODIES/OFFICIALS• Article 30 of the Basic Law specifies that the freedom and privacy of

communication of Hong Kong residents shall be protected by law.• Interception of Communications and Surveillance Ordinance (Cap 589)

-- since 2006• Regulate law enforcement agencies’ lawful interception of

communications and covert surveillance operations for the prevention and detection of serious crimes and the protection of public security.• Not applicable to non-public officers, and cannot be used to apply to

non-governmental bodies and individuals. • LEAs are required by the ICSO to obtain an authorization from a panel

judge or a designated authorizing officer prior to any interception of communications and covert surveillance operations.

Page 11: Cloud and Security: a Legislator's Perspective

INTERCEPTION OF COMMUNICATIONS – NON-GOVT PERSONS/BODIES• s24 of Telecommunications Ordinance (Cap 106) does not allow a

telecommunications officer, or any person who, though not a telecommunications officer, has official duties in connection with a telecommunications service to wilfully intercept any message

• s27 of Telecommunications Ordinance (Cap 106) imposes prohibition on any person who damages, removes or interferes with a telecommunications installation with intent to intercept or discover the contents of a message

• s29 of the Post Office Ordinance (Cap 98) states that no person shall open any postal packet or take any of the contents out of any postal packet or have in his possession any postal packet or mail bag or any of the contents of any postal packet or mail bag or delay any postal packet or mail bag

• If such activities involve the collection of personal data, they are subject to the provisions of the Personal Data (Privacy) Ordinance.

• The hacking of the computer system is dealt with mainly by section 161 of the Crimes Ordinance (Cap 200) (obtains access to a computer with intent to commit an offence or with a dishonest intent) and section 27A of the Telecommunications Ordinance (Cap 106) (by telecommunications, obtains unauthorized access to any computer).

Page 12: Cloud and Security: a Legislator's Perspective

THANK YO

U!

C H A R L E S @ C H A R L E S M O K . HK

W W W. CH A R L E S M O K . H

K