SlideShare a Scribd company logo
1 of 17
Download to read offline
Enabling Compliance
with EU Privacy Laws
Liz Bauzá
AWS Senior Corporate
Counsel
Legislative Framework
• Data Protection Directive (1995)
• Applies to “personal data” (i.e. any information relating to an identified or
identifiable natural person).
• Required each EU member state to…
– enact local laws to satisfy minimum standard for data protection
– establish its own data protection authority
– monitor and enforce these laws (e.g. penalties)
Key Concepts
• Data controller is responsible for:
ü protecting personal data from unlawful processing
ü compliance but must seek contractual assurances from processors
• Defined Terms:
– “Controller” determines purposes and means of processing (e.g.
customers)
– “processor” anyone who processes personal data for the controller
– “Processing” includes many activities (e.g. storage, making available,
blocking, erasure or destruction)
Key Principles
• Data controllers must ensure data processing
complies with these principles:
• Fairness and specific purpose
• Adequacy and relevance
• Accuracy
• Data is destroyed when obsolete
• Adequate security
• Adequate transfers
Key	for	AWS	
Customers
Data Transfers Outside the EU
Data cannot be transferred outside EEA without “adequate”
protection
Currently, the safe countries are:
• All 28 EU Member States:
(Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland,
France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta,
Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden & UK*)
• Members of EFTA:
Iceland, Lichtenstein & Norway
(together the EEA)
• And countries which the European Commission has recognized as
providing adequate data protection:
Andorra, Argentina, Canada, Faeroe Islands, Guernsey, Israel, Isle of Man, Jersey, New
Zealand, Switzerland and Uruguay
*for now
Data Transfers outside the EU
What constitutes “transfer”?
• Using Regions outside the EU
• Depending on the EU member state, potential access to personal data in the course of
service operations from outside of the EU
Data controller must satisfy itself that there are ”adequate” safeguards to protect the
transferred data
How..?
• Due Diligence (e.g. audit reports, certifications, industry standards)
• For transfers to countries without adequate protection: contractual terms (e.g. “EU
Model Clauses”/”Standard Contractual Clauses”/”SCCs”) and EU-US Privacy Shield*
*for now?
So what does compliance
look like on AWS?
Nature of the AWS Services
ü IT infrastructure services
ü Self-service, automated, on-demand, flexible
ü AWS data centres, but provisioned and
controlled by customers
ü Customers build solutions of their choice
virtual	server	instances	
cloud-based	storage
API	calls
Management	Console
Nature of the AWS Services
• Customers empowered to:
§ Design and architect the apps/solutions they run on AWS
§ Configure access controls or firewall settings
§ Implement encryption
§ Set up archiving frequency
§ Manage and protect their own content
§ Maintain appropriate security & back-up of their content
Security – A Shared Responsibility
Focus on Security & Enabling Compliance
“Based on our experience, I believe that we can be even more secure in the AWS cloud than in our own data centers.”
– Tom Soderstrom, CTO, NASA JPL
AWS provides the same, familiar approaches to security that companies have been using
for decades with increased visibility, control, and auditability.
Visibility
View your entire
infrastructure with one
click
Deep insight with
AWS CloudTrail
Control
You have sole
authority on where
data is stored
Shared responsibility
model
Auditability
3rd Party	Validation	– Certifications	for	Workloads	that	Matter
Content vs. Personal Data
Content
= anything that a customer
(or any end user) stores, or
processes using AWS
services, including:
Software ǀ Data ǀ Text ǀ Audio ǀ Video
Personal Data
= information from which a
living individual may be
identified or identifiable
(under EU data protection
law)
••Customer’s “content” might
include “personal data”
Security of Content and Data Breaches
ProcessorData Subject Controller
x
X
Must implement appropriate
technical and organizational
measures (“TOMs”)
Must monitor own environment
Must notify regulators and data
subjects
Content agnostic
Own TOMs
Transferring Content
Region and number
of availability zones
New region
(coming soon)
ü Customers decide where their data will be stored
ü Customers may choose to transfer content that
includes personal data
ü From EEA to a country outside the EEA: Data Processing
Addendum includes the Standard Contractual Clauses/Model
Clauses
ü From EU to US: EU-US Privacy Shield Framework
General Data Protection Regulation
• Applies from 25 May 2018
• Introduces obligations on processors
• Has extra-territorial effect:
Applies to controllers and processors in the EU, and to non-EU
controllers and processors providing products or services to data
subject in the EU
• Revenue-based fines of up to 4% of annual worldwide turnover for
undertakings
• We have a GDPR DPA which can be made available to customers
for signature in advance of the May 2018 deadline
How can we prepare for the
GDPR?
Getting ready for GDPR
AWS
ü All AWS services will comply with
the GDPR when it becomes
enforceable in May of 2018
ü AWS will also be compliant with
the CISPE Code of Conduct
(https://cispe.cloud/)
ü New Data Processing Agreement
(GDPR DPA) that will meet the
requirements of the GDPR
AWS Customers
Start with:
ü Data Subject Rights
ü Data Protection Impact
Assessment (DPIA)
More information available at:
https://aws.amazon.com/complianc
e/eu-data-protection/

More Related Content

What's hot

Security overview-aws-lambda
Security overview-aws-lambdaSecurity overview-aws-lambda
Security overview-aws-lambda
VIJAY REDDY
 

What's hot (20)

AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
 
Governance at Scale
Governance at Scale Governance at Scale
Governance at Scale
 
Security overview-aws-lambda
Security overview-aws-lambdaSecurity overview-aws-lambda
Security overview-aws-lambda
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial Services
 
Real-Time Insights Lab and Lab Prep
Real-Time Insights Lab and Lab PrepReal-Time Insights Lab and Lab Prep
Real-Time Insights Lab and Lab Prep
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Understanding AWS security
Understanding AWS securityUnderstanding AWS security
Understanding AWS security
 
Security Best Practices - AWS Summit Bahrain 2017
Security Best Practices - AWS Summit Bahrain 2017Security Best Practices - AWS Summit Bahrain 2017
Security Best Practices - AWS Summit Bahrain 2017
 
Introduction to AWS Organizations
Introduction to AWS OrganizationsIntroduction to AWS Organizations
Introduction to AWS Organizations
 
Successful Cloud Adoption for the Enterprise. Not If. When.
Successful Cloud Adoption for the Enterprise. Not If. When.Successful Cloud Adoption for the Enterprise. Not If. When.
Successful Cloud Adoption for the Enterprise. Not If. When.
 
Achieving Compliance and Selling to Regulated Markets
Achieving Compliance and Selling to Regulated MarketsAchieving Compliance and Selling to Regulated Markets
Achieving Compliance and Selling to Regulated Markets
 
Streamline Your Desktop Operations and Improve Security with Amazon WorkSpace...
Streamline Your Desktop Operations and Improve Security with Amazon WorkSpace...Streamline Your Desktop Operations and Improve Security with Amazon WorkSpace...
Streamline Your Desktop Operations and Improve Security with Amazon WorkSpace...
 
Using AWS CloudTrail and AWS Config to Enhance the Governance and Compliance ...
Using AWS CloudTrail and AWS Config to Enhance the Governance and Compliance ...Using AWS CloudTrail and AWS Config to Enhance the Governance and Compliance ...
Using AWS CloudTrail and AWS Config to Enhance the Governance and Compliance ...
 
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C. Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWS
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
 
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
Automating AWS security and compliance
Automating AWS security and compliance Automating AWS security and compliance
Automating AWS security and compliance
 

Viewers also liked

Viewers also liked (20)

Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...
Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...
Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...
 
Architecting an Open Data Lake for the Enterprise
 Architecting an Open Data Lake for the Enterprise  Architecting an Open Data Lake for the Enterprise
Architecting an Open Data Lake for the Enterprise
 
Cloud Economics; How to Quantify the Benefits of Moving to the Cloud - Transf...
Cloud Economics; How to Quantify the Benefits of Moving to the Cloud - Transf...Cloud Economics; How to Quantify the Benefits of Moving to the Cloud - Transf...
Cloud Economics; How to Quantify the Benefits of Moving to the Cloud - Transf...
 
Incident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseIncident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat Response
 
Analytics on AWS with Amazon Redshift, Amazon QuickSight, and Amazon Machine ...
Analytics on AWS with Amazon Redshift, Amazon QuickSight, and Amazon Machine ...Analytics on AWS with Amazon Redshift, Amazon QuickSight, and Amazon Machine ...
Analytics on AWS with Amazon Redshift, Amazon QuickSight, and Amazon Machine ...
 
Big Data Experience Sharing: Building Collaborative Data Analytics Platform -...
Big Data Experience Sharing: Building Collaborative Data Analytics Platform -...Big Data Experience Sharing: Building Collaborative Data Analytics Platform -...
Big Data Experience Sharing: Building Collaborative Data Analytics Platform -...
 
Deploying SAP Solutions on AWS
Deploying SAP Solutions on AWSDeploying SAP Solutions on AWS
Deploying SAP Solutions on AWS
 
Getting Started with Serverless Apps
Getting Started with Serverless AppsGetting Started with Serverless Apps
Getting Started with Serverless Apps
 
Detective Controls: Gain Visibility and Record Change:
Detective Controls: Gain Visibility and Record Change: Detective Controls: Gain Visibility and Record Change:
Detective Controls: Gain Visibility and Record Change:
 
Influencing the C-Suite to Champion Your Journey to the Cloud
Influencing the C-Suite to Champion Your Journey to the CloudInfluencing the C-Suite to Champion Your Journey to the Cloud
Influencing the C-Suite to Champion Your Journey to the Cloud
 
Turn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWSTurn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWS
 
Build Cloud-Connected Apps in React Native for iOS & Android.pdf
Build Cloud-Connected Apps in React Native for iOS & Android.pdfBuild Cloud-Connected Apps in React Native for iOS & Android.pdf
Build Cloud-Connected Apps in React Native for iOS & Android.pdf
 
Security Best Practices - Transformation Day Public Sector London 2017
Security Best Practices - Transformation Day Public Sector London 2017Security Best Practices - Transformation Day Public Sector London 2017
Security Best Practices - Transformation Day Public Sector London 2017
 
Voice of the Customer: Zocdoc and Elevating Security While Moving to AWS
Voice of the Customer: Zocdoc and Elevating Security While Moving to AWSVoice of the Customer: Zocdoc and Elevating Security While Moving to AWS
Voice of the Customer: Zocdoc and Elevating Security While Moving to AWS
 
Deep Dive on Amazon SES What's New - AWS Online Tech Talks
Deep Dive on Amazon SES What's New - AWS Online Tech TalksDeep Dive on Amazon SES What's New - AWS Online Tech Talks
Deep Dive on Amazon SES What's New - AWS Online Tech Talks
 
Opportunities derived by AI
Opportunities derived by AIOpportunities derived by AI
Opportunities derived by AI
 
Getting Started with AWS for Developers
Getting Started with AWS for DevelopersGetting Started with AWS for Developers
Getting Started with AWS for Developers
 
Achieving Compliance and Selling to Regulated Markets on AWS
Achieving Compliance and Selling to Regulated Markets on AWSAchieving Compliance and Selling to Regulated Markets on AWS
Achieving Compliance and Selling to Regulated Markets on AWS
 
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
 
智能零售解決方案
智能零售解決方案智能零售解決方案
智能零售解決方案
 

Similar to Enabling Compliance with EU Privacy Laws

Securing Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeSecuring Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & Netskope
Ahmad Abdalla
 
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of TradeSecuring Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Lisa Abe-Oldenburg, B.Comm., JD.
 

Similar to Enabling Compliance with EU Privacy Laws (20)

GDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUGDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EU
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSNavigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS
 
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech TalksNavigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS
 
Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWS
 
Kawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
 
SID303 Navigating GDPR Compliance on AWS
 SID303 Navigating GDPR Compliance on AWS SID303 Navigating GDPR Compliance on AWS
SID303 Navigating GDPR Compliance on AWS
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSNavigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS
 
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
Critical Hong Kong Banking, Securities and Insurance Workloads on the Cloud –...
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdf
 
Datasheet: Security
Datasheet: SecurityDatasheet: Security
Datasheet: Security
 
Introdction to Cloud Regulation for Enterprise by 2Bsecure
Introdction to Cloud Regulation for Enterprise by 2BsecureIntrodction to Cloud Regulation for Enterprise by 2Bsecure
Introdction to Cloud Regulation for Enterprise by 2Bsecure
 
The Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThe Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud Services
 
Legal issues in the cloud renzo marchini & gene landy
Legal issues in the cloud   renzo marchini & gene landyLegal issues in the cloud   renzo marchini & gene landy
Legal issues in the cloud renzo marchini & gene landy
 
AWS Shared Responsibility Model and GDPR
AWS Shared Responsibility Model and GDPRAWS Shared Responsibility Model and GDPR
AWS Shared Responsibility Model and GDPR
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
Securing Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeSecuring Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & Netskope
 
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
 
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of TradeSecuring Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
 

More from Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Enabling Compliance with EU Privacy Laws

  • 1. Enabling Compliance with EU Privacy Laws Liz Bauzá AWS Senior Corporate Counsel
  • 2. Legislative Framework • Data Protection Directive (1995) • Applies to “personal data” (i.e. any information relating to an identified or identifiable natural person). • Required each EU member state to… – enact local laws to satisfy minimum standard for data protection – establish its own data protection authority – monitor and enforce these laws (e.g. penalties)
  • 3. Key Concepts • Data controller is responsible for: ü protecting personal data from unlawful processing ü compliance but must seek contractual assurances from processors • Defined Terms: – “Controller” determines purposes and means of processing (e.g. customers) – “processor” anyone who processes personal data for the controller – “Processing” includes many activities (e.g. storage, making available, blocking, erasure or destruction)
  • 4. Key Principles • Data controllers must ensure data processing complies with these principles: • Fairness and specific purpose • Adequacy and relevance • Accuracy • Data is destroyed when obsolete • Adequate security • Adequate transfers Key for AWS Customers
  • 5. Data Transfers Outside the EU Data cannot be transferred outside EEA without “adequate” protection Currently, the safe countries are: • All 28 EU Member States: (Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden & UK*) • Members of EFTA: Iceland, Lichtenstein & Norway (together the EEA) • And countries which the European Commission has recognized as providing adequate data protection: Andorra, Argentina, Canada, Faeroe Islands, Guernsey, Israel, Isle of Man, Jersey, New Zealand, Switzerland and Uruguay *for now
  • 6. Data Transfers outside the EU What constitutes “transfer”? • Using Regions outside the EU • Depending on the EU member state, potential access to personal data in the course of service operations from outside of the EU Data controller must satisfy itself that there are ”adequate” safeguards to protect the transferred data How..? • Due Diligence (e.g. audit reports, certifications, industry standards) • For transfers to countries without adequate protection: contractual terms (e.g. “EU Model Clauses”/”Standard Contractual Clauses”/”SCCs”) and EU-US Privacy Shield* *for now?
  • 7. So what does compliance look like on AWS?
  • 8. Nature of the AWS Services ü IT infrastructure services ü Self-service, automated, on-demand, flexible ü AWS data centres, but provisioned and controlled by customers ü Customers build solutions of their choice virtual server instances cloud-based storage API calls Management Console
  • 9. Nature of the AWS Services • Customers empowered to: § Design and architect the apps/solutions they run on AWS § Configure access controls or firewall settings § Implement encryption § Set up archiving frequency § Manage and protect their own content § Maintain appropriate security & back-up of their content
  • 10. Security – A Shared Responsibility
  • 11. Focus on Security & Enabling Compliance “Based on our experience, I believe that we can be even more secure in the AWS cloud than in our own data centers.” – Tom Soderstrom, CTO, NASA JPL AWS provides the same, familiar approaches to security that companies have been using for decades with increased visibility, control, and auditability. Visibility View your entire infrastructure with one click Deep insight with AWS CloudTrail Control You have sole authority on where data is stored Shared responsibility model Auditability 3rd Party Validation – Certifications for Workloads that Matter
  • 12. Content vs. Personal Data Content = anything that a customer (or any end user) stores, or processes using AWS services, including: Software ǀ Data ǀ Text ǀ Audio ǀ Video Personal Data = information from which a living individual may be identified or identifiable (under EU data protection law) ••Customer’s “content” might include “personal data”
  • 13. Security of Content and Data Breaches ProcessorData Subject Controller x X Must implement appropriate technical and organizational measures (“TOMs”) Must monitor own environment Must notify regulators and data subjects Content agnostic Own TOMs
  • 14. Transferring Content Region and number of availability zones New region (coming soon) ü Customers decide where their data will be stored ü Customers may choose to transfer content that includes personal data ü From EEA to a country outside the EEA: Data Processing Addendum includes the Standard Contractual Clauses/Model Clauses ü From EU to US: EU-US Privacy Shield Framework
  • 15. General Data Protection Regulation • Applies from 25 May 2018 • Introduces obligations on processors • Has extra-territorial effect: Applies to controllers and processors in the EU, and to non-EU controllers and processors providing products or services to data subject in the EU • Revenue-based fines of up to 4% of annual worldwide turnover for undertakings • We have a GDPR DPA which can be made available to customers for signature in advance of the May 2018 deadline
  • 16. How can we prepare for the GDPR?
  • 17. Getting ready for GDPR AWS ü All AWS services will comply with the GDPR when it becomes enforceable in May of 2018 ü AWS will also be compliant with the CISPE Code of Conduct (https://cispe.cloud/) ü New Data Processing Agreement (GDPR DPA) that will meet the requirements of the GDPR AWS Customers Start with: ü Data Subject Rights ü Data Protection Impact Assessment (DPIA) More information available at: https://aws.amazon.com/complianc e/eu-data-protection/