SlideShare a Scribd company logo
Cloud Computing: A Primer on Legal Issues,
Including Privacy and Data Security
Concerns
Privacy and Information Management Practice / Washington, DC
www.hoganlovells.com 2
Disclaimer
• THIS PRESENTATION IS TO ASSIST IN A
GENERAL UNDERSTANDING OF THE LEGAL
ISSUES SURROUNDING CLOUD COMPUTING.
IT IS NOT INTENDED, NOR SHOULD IT BE
REGARDED, AS LEGAL ADVICE. COMPANIES
OR INDIVIDUALS CONTEMPLATING ENTRY
INTO A CLOUD COMPUTING CONTRACT OR
HAVING PARTICULAR QUESTIONS SHOULD
SEEK THE ADVICE OF COUNSEL.
www.hoganlovells.com 3
Overview
• Privacy and Data Security Concerns
• Privacy and Data Security Laws and Regulations
– Federal Laws
• Compelled Governmental Disclosure
• Data Security and Breach Issues
• Section 5 of the FTC Act
– State Laws
• Data Security Issues
• Data Breach Issues
• Data Breaches/Breach Responsibility
• Information Ownership and Control
• How Cloud Customers Can Manage Risk
www.hoganlovells.com 4
Privacy and Data Security Concerns
• Major cloud computing privacy concerns:
– Compelled disclosure to the government
• Information stored on the cloud is subject to different protections than information
stored in-house
– Data security and disclosure of breaches
• Generally, how does a cloud provider protect a customer’s data?
• When the law imposes data security requirements on a customer, how can the
customer ensure its compliance when storing information on the cloud?
• If the cloud’s security is breached, must the cloud give notice of the breach?
– Transfer of, access to, and retention of data
• Will companies and consumers have access to data on the cloud? Can the cloud
confirm the destruction of data or return it?
– Location of data
• The physical location of the server storing the data may have legal implications
– Consumer notice and choice
• For companies who will store consumers’ data on the cloud
www.hoganlovells.com 5
Privacy and Data Security Laws and Regulations
• Compelled disclosure to the government
– Electronic Communications Privacy Act (ECPA); Stored
Communications Act (SCA)
– USA Patriot Act (including National Security Letters; FISA warrants)
– Warrants and Subpoenas Generally
• Data security issues and data breach notification
– Family Educational Rights and Privacy Act (FERPA)
– Gramm-Leach-Bliley Act (GLBA)
– Health Insurance Portability and Accountability Act (HIPAA)
– Health Information Technology for Economic and Clinical Health
(HITECH) Act
– Sarbanes Oxley
– State Laws and Regulations
– Section 5 of the FTC Act (for companies who will store consumer
information on the cloud)
www.hoganlovells.com 6
Compelled Disclosure to the Government –
ECPA (Including SCA)
• Enacted in 1986
– No one was thinking of cloud computing
• Protects electronic communications while in transit and while
held in storage from disclosure
– Gives different levels of protection to electronic data based on
outdated distinctions like whether it is stored in ―electronic storage,‖ or
by a ―remote computing service‖ and how old the data is
– For example, information stored on a ―remote computing service‖ that
is older than 180 days is subject to Gov’t search with just an
administrative subpoena
• Problems arise with how to characterize cloud computing
activity
www.hoganlovells.com 7
Compelled Disclosure to the Government –
USA Patriot Act
• Originally enacted in 2001, amended in 2005
• Allows FBI access to certain business records with
a court order
• Also provides for use of National Security Letters
(form of administrative subpoena) to obtain records
• The law limits the ability of cloud providers to reveal
that they received an order
– Cloud users may not even know about a disclosure
www.hoganlovells.com 8
Data Security Issues – Federal Laws,
Regulations, and Standards
• Federal laws & regulations:
– Certain Federal laws and regulations impose industry-specific data
security and/or breach notification obligations
• Financial institutions (GLBA)
• Educational institutions (FERPA)
• Health care (HIPAA and HITECH)
• Publicly traded companies (SOX)
– Generally, an entity cannot contract away its obligation to comply with these
industry-specific regimes
– Some of these statutes, however, require an entity to pass these obligations to
cloud providers by contract
• Federal administrative guidance
– White House CIO Council, which released data security guidelines for
federal agency use of cloud computing and
• Industry standards
– Payment Card Industry Data Security Standards (PCI DSS) for credit
card data
www.hoganlovells.com 9
White House CIO Council – Federal
Administrative Guidance
• Released as a draft on November 2, 2010
– Final version to be released after public comments
• Produced by the Federal Risk and Authorization
Management Program (FedRAMP)
– Interagency effort aimed at consolidating risk
management activities related to cloud computing
• Proposes standards for cloud computing
– Common security baseline
– Continuous monitoring
www.hoganlovells.com 10
Data Security Issues – Federal Laws,
Regulations, and Standards (continued)
• Some cloud service providers offer ―take it or leave
it contracts‖
• Some cloud providers offer no transparency into
their security programs
• Without notice, transparency and communication, it
may be impossible for a cloud user to know if it’s
complying with data security and breach notification
requirements imposed by federal statutes and
regulations
www.hoganlovells.com 11
Section 5 of the FTC Act (if applicable)—Will the FTC
Take Lead on Privacy and Security in the Cloud?
• The FTC has not done a lot in the cloud computing area
• The FTC’s December 2010 draft report on privacy
highlighted cloud computing as one of the technologies that
makes changes to the existing privacy framework necessary
– But it does not offer prescriptive advice for what sort of notice and
choice must be given to consumers by entities who store consumer
information on the cloud
• However, entities that store consumer information on the
cloud face the threat of FTC enforcement if their
representations to consumers about where and how
information is stored and secured do not match their actual
practices
www.hoganlovells.com 12
Data Security Issues – State Laws
• Many states also impose data security requirements
on entities operating in the state or who hold data
about state residents
– State data protection laws
– State data breach laws
• Much like the federal statutes discussed, some
state laws obligate entities to receive contractual
guarantees that technology vendors will provide
adequate information security
www.hoganlovells.com 13
State Laws: Massachusetts
• Massachusetts has an extensive data security legal
regime
• Regulations provide that businesses must ―take
reasonable steps to select and retain‖ third-party
service providers
• Regulators have not clarified or explained what this
means
– It potentially could be read to impose an audit or
assessment requirement before a business can use a
cloud provider
www.hoganlovells.com 14
State Laws: Data Breach Notification
• Data breach notification
– 46 states, DC, Puerto Rico, and the U.S. Virgin Islands
have data breach notification statutes for breaches of
sensitive information
– State law varies: 37 states have some risk of harm threshold; each
state has its own definition of protected information
– Usually requires notification of all affected individuals if
sensitive information is lost or exposed in a manner that
creates a risk of identity theft
– Notification must be made in a reasonable period of time,
though in certain circumstances may be delayed by a
government investigation into the breach
www.hoganlovells.com 15
Data Breach Responsibility
• Under state data breach laws, the data host (cloud
provider) is responsible for breach notification
(hacking, lost data, unauthorized access) to the
data owner, but not to individuals
– The data owner is ultimately responsible for the breach
– The parties can agree by contract on who will perform
notification duties and functions
• The parties can agree about who will be financially
responsible for the breach
– This might include: notification costs, legal costs
(indemnification), investigation costs (such as IT forensic
firms), and reputational costs
www.hoganlovells.com 16
Information Ownership and Control Issues
• Who owns data on the cloud?
• Can a cloud provider use the data for its own
purposes? What if it’s de-identified or aggregated?
• When and under what circumstances can the
customer obtain a copy of information stored on the
cloud?
• When a customer leaves the cloud, what obligations
does the provider have to assist in the transition?
• What happens when service to the cloud is
interrupted?
www.hoganlovells.com 17
How to Deal with Cloud Computing Legal Issues
• Contract! Almost all issues can be dealt with
contractually:
– Where data can be stored
– What security standards the cloud provider will adhere to
• Is customer data segregated
• Does the cloud conform to industry standards
• Do outside auditors confirm its security practices
– Who is liable for a data breach
– Regulatory compliance and indemnification
responsibilities
– Ownership and control of information and availability and
maintenance of the cloud
– See the checklist for more at (hyperlink)
www.hoganlovells.com 18
What if I can’t negotiate?
• Perform a cost/benefit analysis when choosing a
provider
– What is the reputational risk to the cloud provider if
something goes wrong?
• Consider the company’s current reputation for quality, compliance,
and best practice
– What is the reputational risk to your company if something
goes wrong?
• What data will you store on the cloud?
• How sensitive is this data?
www.hoganlovells.com
Hogan Lovells has offices in:
Abu Dhabi
Alicante
Amsterdam
Baltimore
Beijing
Berlin
Boulder
Brussels
Budapest*
Caracas
Colorado Springs
Denver
Dubai
Dusseldorf
Frankfurt
Hamburg
Hanoi
Ho Chi Minh City
Hong Kong
Houston
Jeddah*
London
Los Angeles
Madrid
Miami
Milan
Moscow
Munich
New York
Northern Virginia
Paris
Philadelphia
Prague
Riyadh*
Rome
San Francisco
Shanghai
Silicon Valley
Singapore
Tokyo
Ulaanbaatar*
Warsaw
Washington DC
Zagreb*
"Hogan Lovells" or the "firm" refers to the international legal practice comprising Hogan Lovells International LLP, Hogan Lovells US LLP, Hogan Lovells Worldwide Group (a Swiss Verein), and their affiliated businesses,
each of which is a separate legal entity. Hogan Lovells International LLP is a limited liability partnership registered in England and Wales with registered number OC323639. Registered office and principal place of
business: Atlantic House, Holborn Viaduct, London EC1A 2FG. Hogan Lovells US LLP is a limited liability partnership registered in the District of Columbia.
The word "partner" is used to refer to a member of Hogan Lovells International LLP or a partner of Hogan Lovells US LLP, or an employee or consultant with equivalent standing and qualifications, and to a partner, member,
employee or consultant in any of their affiliated businesses who has equivalent standing. Rankings and quotes from legal directories and other sources may refer to the former firms of Hogan & Hartson LLP and Lovells
LLP. Where case studies are included, results achieved do not guarantee similaroutcomes for other clients. New York State Notice: Attorney Advertising.
© Copyright Hogan Lovells 2010. All rights reserved.
* Associated offices

More Related Content

PPT
Privacy and Data Security: Risk Management and Avoidance
PDF
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
PPT
Personal Data Privacy and Information Security
PPT
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
PDF
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
PDF
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
PDF
Introduction to EU General Data Protection Regulation: Planning, Implementati...
PDF
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Privacy and Data Security: Risk Management and Avoidance
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Personal Data Privacy and Information Security
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Getting to Accountability Karbaliotis and Patrikios-Oct 22 2015
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
Introduction to EU General Data Protection Regulation: Planning, Implementati...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...

What's hot (17)

PPTX
Data Privacy for Information Security Professionals Part 1
PPTX
GDPR- GENERAL DATA PROTECTION REGULATION
PDF
Privacy and Data Security
PPTX
General Data Protection Regulation for Ops
PPTX
Preparing for GDPR: What Every B2B Marketer Must Know
PPTX
GDPR Introduction and overview
PPT
Consumer Privacy
PPTX
Data Privacy Introduction
PPTX
Cybersecurity and Data Privacy Whistleblower Protections
PPTX
General Data Protection Regulation (GDPR)
PPTX
Draft Bill on the Protection of Personal Data
PDF
Cybersecurity and Data Privacy
PDF
Gdpr and usa data privacy issues
PPTX
*Webinar* CCPA: Get Your Business Ready
PDF
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
PPTX
EU GDPR (training)
PPTX
Privacy and Data Protection CLE Presentation for Touro Law Center
Data Privacy for Information Security Professionals Part 1
GDPR- GENERAL DATA PROTECTION REGULATION
Privacy and Data Security
General Data Protection Regulation for Ops
Preparing for GDPR: What Every B2B Marketer Must Know
GDPR Introduction and overview
Consumer Privacy
Data Privacy Introduction
Cybersecurity and Data Privacy Whistleblower Protections
General Data Protection Regulation (GDPR)
Draft Bill on the Protection of Personal Data
Cybersecurity and Data Privacy
Gdpr and usa data privacy issues
*Webinar* CCPA: Get Your Business Ready
Francoise Gilbert Proposed EU Data Protection Regulation-20120214
EU GDPR (training)
Privacy and Data Protection CLE Presentation for Touro Law Center
Ad

Viewers also liked (20)

PDF
Addictive manufacturing
DOCX
Worse than AIDS
PPTX
Winnable Battle Lymphatic Filariasis presentation
PDF
Privacy Concerns and Cloud Computing
PPTX
Security and Privacy in Cloud Computing - a High-level view
PPTX
Addictive printing or 3d printing
PDF
Grow your business by shaping the human impacts of technology
PPT
Cloud Computing & Security Concerns
PPTX
Elephantiasis
PPTX
Neglected Tropical Diseases
PPT
Filariasis
PPTX
Elephantiasis
PPT
Security & Privacy In Cloud Computing
PPTX
Lecture01: Introduction to Security and Privacy in Cloud Computing
PPTX
Lymphatic Filariasis jp
PPT
Lymphatic Filariasis
PPT
Lymphatic filariasis
Addictive manufacturing
Worse than AIDS
Winnable Battle Lymphatic Filariasis presentation
Privacy Concerns and Cloud Computing
Security and Privacy in Cloud Computing - a High-level view
Addictive printing or 3d printing
Grow your business by shaping the human impacts of technology
Cloud Computing & Security Concerns
Elephantiasis
Neglected Tropical Diseases
Filariasis
Elephantiasis
Security & Privacy In Cloud Computing
Lecture01: Introduction to Security and Privacy in Cloud Computing
Lymphatic Filariasis jp
Lymphatic Filariasis
Lymphatic filariasis
Ad

Similar to Cloud primer (20)

PDF
Cloud Computing: What You Don't Know Can Hurt You
PDF
12 02-14 information security managers - unannotated
PPT
Contracting in the Cloud by Tammy Bortz
PPTX
Technology Law: Regulations on the Internet and Emerging Technologies
PPTX
Technology Law: Regulations on the Internet and Emerging Technologies
PDF
Cloud Webinar Neiditz Weitz Mitchell Goodman
PDF
Security Issues for Cloud Applications
PDF
Frukostseminarium om molntjänster
PPTX
Cloud computing and its security issues
PPTX
Is There Sun Behind Those Clouds
PPT
28_Security-Privacy-inxssudusd_Cloud.ppt
PPT
28_Security-Privacy-in_Cloud_AND_real.ppt
PPTX
The Impact of Cloud: Cloud Computing Security and Privacy
PDF
Securing data in the cloud: A challenge for UK Law Firms
PDF
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
PPTX
Cloud security (domain11 14)
PDF
Cloud Computing: legal issues
PPT
Risks and Benefits of Cloud Computing
PDF
Legal issues in the cloud renzo marchini & gene landy
PDF
Ian walden - data protection in cloud computing
Cloud Computing: What You Don't Know Can Hurt You
12 02-14 information security managers - unannotated
Contracting in the Cloud by Tammy Bortz
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
Cloud Webinar Neiditz Weitz Mitchell Goodman
Security Issues for Cloud Applications
Frukostseminarium om molntjänster
Cloud computing and its security issues
Is There Sun Behind Those Clouds
28_Security-Privacy-inxssudusd_Cloud.ppt
28_Security-Privacy-in_Cloud_AND_real.ppt
The Impact of Cloud: Cloud Computing Security and Privacy
Securing data in the cloud: A challenge for UK Law Firms
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
Cloud security (domain11 14)
Cloud Computing: legal issues
Risks and Benefits of Cloud Computing
Legal issues in the cloud renzo marchini & gene landy
Ian walden - data protection in cloud computing

Recently uploaded (20)

PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Architecture types and enterprise applications.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
The various Industrial Revolutions .pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
STKI Israel Market Study 2025 version august
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Getting Started with Data Integration: FME Form 101
WOOl fibre morphology and structure.pdf for textiles
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
A comparative study of natural language inference in Swahili using monolingua...
Architecture types and enterprise applications.pdf
Enhancing emotion recognition model for a student engagement use case through...
observCloud-Native Containerability and monitoring.pptx
The various Industrial Revolutions .pptx
Assigned Numbers - 2025 - Bluetooth® Document
TLE Review Electricity (Electricity).pptx
Getting started with AI Agents and Multi-Agent Systems
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
DP Operators-handbook-extract for the Mautical Institute
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
STKI Israel Market Study 2025 version august
Chapter 5: Probability Theory and Statistics
cloud_computing_Infrastucture_as_cloud_p
A contest of sentiment analysis: k-nearest neighbor versus neural network
Hindi spoken digit analysis for native and non-native speakers
Getting Started with Data Integration: FME Form 101

Cloud primer

  • 1. Cloud Computing: A Primer on Legal Issues, Including Privacy and Data Security Concerns Privacy and Information Management Practice / Washington, DC
  • 2. www.hoganlovells.com 2 Disclaimer • THIS PRESENTATION IS TO ASSIST IN A GENERAL UNDERSTANDING OF THE LEGAL ISSUES SURROUNDING CLOUD COMPUTING. IT IS NOT INTENDED, NOR SHOULD IT BE REGARDED, AS LEGAL ADVICE. COMPANIES OR INDIVIDUALS CONTEMPLATING ENTRY INTO A CLOUD COMPUTING CONTRACT OR HAVING PARTICULAR QUESTIONS SHOULD SEEK THE ADVICE OF COUNSEL.
  • 3. www.hoganlovells.com 3 Overview • Privacy and Data Security Concerns • Privacy and Data Security Laws and Regulations – Federal Laws • Compelled Governmental Disclosure • Data Security and Breach Issues • Section 5 of the FTC Act – State Laws • Data Security Issues • Data Breach Issues • Data Breaches/Breach Responsibility • Information Ownership and Control • How Cloud Customers Can Manage Risk
  • 4. www.hoganlovells.com 4 Privacy and Data Security Concerns • Major cloud computing privacy concerns: – Compelled disclosure to the government • Information stored on the cloud is subject to different protections than information stored in-house – Data security and disclosure of breaches • Generally, how does a cloud provider protect a customer’s data? • When the law imposes data security requirements on a customer, how can the customer ensure its compliance when storing information on the cloud? • If the cloud’s security is breached, must the cloud give notice of the breach? – Transfer of, access to, and retention of data • Will companies and consumers have access to data on the cloud? Can the cloud confirm the destruction of data or return it? – Location of data • The physical location of the server storing the data may have legal implications – Consumer notice and choice • For companies who will store consumers’ data on the cloud
  • 5. www.hoganlovells.com 5 Privacy and Data Security Laws and Regulations • Compelled disclosure to the government – Electronic Communications Privacy Act (ECPA); Stored Communications Act (SCA) – USA Patriot Act (including National Security Letters; FISA warrants) – Warrants and Subpoenas Generally • Data security issues and data breach notification – Family Educational Rights and Privacy Act (FERPA) – Gramm-Leach-Bliley Act (GLBA) – Health Insurance Portability and Accountability Act (HIPAA) – Health Information Technology for Economic and Clinical Health (HITECH) Act – Sarbanes Oxley – State Laws and Regulations – Section 5 of the FTC Act (for companies who will store consumer information on the cloud)
  • 6. www.hoganlovells.com 6 Compelled Disclosure to the Government – ECPA (Including SCA) • Enacted in 1986 – No one was thinking of cloud computing • Protects electronic communications while in transit and while held in storage from disclosure – Gives different levels of protection to electronic data based on outdated distinctions like whether it is stored in ―electronic storage,‖ or by a ―remote computing service‖ and how old the data is – For example, information stored on a ―remote computing service‖ that is older than 180 days is subject to Gov’t search with just an administrative subpoena • Problems arise with how to characterize cloud computing activity
  • 7. www.hoganlovells.com 7 Compelled Disclosure to the Government – USA Patriot Act • Originally enacted in 2001, amended in 2005 • Allows FBI access to certain business records with a court order • Also provides for use of National Security Letters (form of administrative subpoena) to obtain records • The law limits the ability of cloud providers to reveal that they received an order – Cloud users may not even know about a disclosure
  • 8. www.hoganlovells.com 8 Data Security Issues – Federal Laws, Regulations, and Standards • Federal laws & regulations: – Certain Federal laws and regulations impose industry-specific data security and/or breach notification obligations • Financial institutions (GLBA) • Educational institutions (FERPA) • Health care (HIPAA and HITECH) • Publicly traded companies (SOX) – Generally, an entity cannot contract away its obligation to comply with these industry-specific regimes – Some of these statutes, however, require an entity to pass these obligations to cloud providers by contract • Federal administrative guidance – White House CIO Council, which released data security guidelines for federal agency use of cloud computing and • Industry standards – Payment Card Industry Data Security Standards (PCI DSS) for credit card data
  • 9. www.hoganlovells.com 9 White House CIO Council – Federal Administrative Guidance • Released as a draft on November 2, 2010 – Final version to be released after public comments • Produced by the Federal Risk and Authorization Management Program (FedRAMP) – Interagency effort aimed at consolidating risk management activities related to cloud computing • Proposes standards for cloud computing – Common security baseline – Continuous monitoring
  • 10. www.hoganlovells.com 10 Data Security Issues – Federal Laws, Regulations, and Standards (continued) • Some cloud service providers offer ―take it or leave it contracts‖ • Some cloud providers offer no transparency into their security programs • Without notice, transparency and communication, it may be impossible for a cloud user to know if it’s complying with data security and breach notification requirements imposed by federal statutes and regulations
  • 11. www.hoganlovells.com 11 Section 5 of the FTC Act (if applicable)—Will the FTC Take Lead on Privacy and Security in the Cloud? • The FTC has not done a lot in the cloud computing area • The FTC’s December 2010 draft report on privacy highlighted cloud computing as one of the technologies that makes changes to the existing privacy framework necessary – But it does not offer prescriptive advice for what sort of notice and choice must be given to consumers by entities who store consumer information on the cloud • However, entities that store consumer information on the cloud face the threat of FTC enforcement if their representations to consumers about where and how information is stored and secured do not match their actual practices
  • 12. www.hoganlovells.com 12 Data Security Issues – State Laws • Many states also impose data security requirements on entities operating in the state or who hold data about state residents – State data protection laws – State data breach laws • Much like the federal statutes discussed, some state laws obligate entities to receive contractual guarantees that technology vendors will provide adequate information security
  • 13. www.hoganlovells.com 13 State Laws: Massachusetts • Massachusetts has an extensive data security legal regime • Regulations provide that businesses must ―take reasonable steps to select and retain‖ third-party service providers • Regulators have not clarified or explained what this means – It potentially could be read to impose an audit or assessment requirement before a business can use a cloud provider
  • 14. www.hoganlovells.com 14 State Laws: Data Breach Notification • Data breach notification – 46 states, DC, Puerto Rico, and the U.S. Virgin Islands have data breach notification statutes for breaches of sensitive information – State law varies: 37 states have some risk of harm threshold; each state has its own definition of protected information – Usually requires notification of all affected individuals if sensitive information is lost or exposed in a manner that creates a risk of identity theft – Notification must be made in a reasonable period of time, though in certain circumstances may be delayed by a government investigation into the breach
  • 15. www.hoganlovells.com 15 Data Breach Responsibility • Under state data breach laws, the data host (cloud provider) is responsible for breach notification (hacking, lost data, unauthorized access) to the data owner, but not to individuals – The data owner is ultimately responsible for the breach – The parties can agree by contract on who will perform notification duties and functions • The parties can agree about who will be financially responsible for the breach – This might include: notification costs, legal costs (indemnification), investigation costs (such as IT forensic firms), and reputational costs
  • 16. www.hoganlovells.com 16 Information Ownership and Control Issues • Who owns data on the cloud? • Can a cloud provider use the data for its own purposes? What if it’s de-identified or aggregated? • When and under what circumstances can the customer obtain a copy of information stored on the cloud? • When a customer leaves the cloud, what obligations does the provider have to assist in the transition? • What happens when service to the cloud is interrupted?
  • 17. www.hoganlovells.com 17 How to Deal with Cloud Computing Legal Issues • Contract! Almost all issues can be dealt with contractually: – Where data can be stored – What security standards the cloud provider will adhere to • Is customer data segregated • Does the cloud conform to industry standards • Do outside auditors confirm its security practices – Who is liable for a data breach – Regulatory compliance and indemnification responsibilities – Ownership and control of information and availability and maintenance of the cloud – See the checklist for more at (hyperlink)
  • 18. www.hoganlovells.com 18 What if I can’t negotiate? • Perform a cost/benefit analysis when choosing a provider – What is the reputational risk to the cloud provider if something goes wrong? • Consider the company’s current reputation for quality, compliance, and best practice – What is the reputational risk to your company if something goes wrong? • What data will you store on the cloud? • How sensitive is this data?
  • 19. www.hoganlovells.com Hogan Lovells has offices in: Abu Dhabi Alicante Amsterdam Baltimore Beijing Berlin Boulder Brussels Budapest* Caracas Colorado Springs Denver Dubai Dusseldorf Frankfurt Hamburg Hanoi Ho Chi Minh City Hong Kong Houston Jeddah* London Los Angeles Madrid Miami Milan Moscow Munich New York Northern Virginia Paris Philadelphia Prague Riyadh* Rome San Francisco Shanghai Silicon Valley Singapore Tokyo Ulaanbaatar* Warsaw Washington DC Zagreb* "Hogan Lovells" or the "firm" refers to the international legal practice comprising Hogan Lovells International LLP, Hogan Lovells US LLP, Hogan Lovells Worldwide Group (a Swiss Verein), and their affiliated businesses, each of which is a separate legal entity. Hogan Lovells International LLP is a limited liability partnership registered in England and Wales with registered number OC323639. Registered office and principal place of business: Atlantic House, Holborn Viaduct, London EC1A 2FG. Hogan Lovells US LLP is a limited liability partnership registered in the District of Columbia. The word "partner" is used to refer to a member of Hogan Lovells International LLP or a partner of Hogan Lovells US LLP, or an employee or consultant with equivalent standing and qualifications, and to a partner, member, employee or consultant in any of their affiliated businesses who has equivalent standing. Rankings and quotes from legal directories and other sources may refer to the former firms of Hogan & Hartson LLP and Lovells LLP. Where case studies are included, results achieved do not guarantee similaroutcomes for other clients. New York State Notice: Attorney Advertising. © Copyright Hogan Lovells 2010. All rights reserved. * Associated offices