Understanding Global Data Protection Laws: Webinar

CipherCloud
CipherCloudSenior Marketing Operations Analyst - Cloud Security
© 2015 CipherCloud | All rights reserved 1
Understanding Global Data Protection Laws
Willy Leichter
Global Director, Cloud Security
© 2015 CipherCloud | All rights reserved 2
Agenda
Cloud benefits and inhibitors
Changing IT landscape
Compliance basics
Overview of global protection laws
Microsoft/Ireland legal challenge
Best practices to meet compliance
Recommendations
© 2015 CipherCloud | All rights reserved 3
Balancing Cloud Benefits with Compliance Requirements
Top 3 US Bank’s Consumer Self-Service
Loan Origination Portal
UK Education Organization Deploys
Global Cloud-Based Portal
Non-Technology Leader Trust
Sensitive Data in Cloud Email
German Cosmetics Giants Meets
International Security Regulations
Major European Telco Consolidates Call
Centers for 25 Countries
Largest Hospital Chain Meets HIPAA &
HITECH in the Cloud
Top Canadian Bank Safeguards
Proprietary Information in the Cloud
Major Wall Street Firm Adopts Cloud
Applications with Confidence
Global Leader in Customer Loyalty
Moves Email to the Cloud
Genomics Testing Leader Protects
Patient Data while Using the Cloud
New Zealand Bank Collaborates in the
Cloud and Meets Compliance
Medical Audit Leader Launches Cloud-
Based Customer Portal
Large Pharmaceutical Company
Uses Encrypted Email
Credit Reporting Giant Deploys Cloud
Collaboration with DLP Controls
Government-Owned Mortgage Backer
Protect PII Data in the Cloud
© 2015 CipherCloud | All rights reserved 4
Changing IT Challenges
Managing the proliferation
of cloud services
Protecting data instead of
just infrastructure
Complying with data
protection and residency laws
Using legacy tools against
emerging cloud threats
Disappearing network
perimeter
Surveillance and
forced disclosure risks
© 2015 CipherCloud | All rights reserved 5© 2015 CipherCloud 5
Chile
Law for the Protection of
Private Life
Argentina
Personal Data Protection Law,
Information Confidentiality Law
New Zealand
Privacy Act
Philippines
Propose Data Privacy Law
Canada
PIPEDA, FOIPPA, PIPA
Taiwan
Computer-Processed
Personal Data Protection
Hong Kong
Personal Data Privacy
Ordinance
Japan
Personal Information
Protection Act
South Korea
Network Utilization and
Data Protection Act
European Union
EU Data Protection Directive,
State Data Protection Laws
India
Pending Laws under
discussion
United Kingdom
ICO Privacy and Electronic
Communications Regulations
Australia
National Privacy Principals,
State Privacy Bills, Email
Spam and Privacy Bills
US States
Breach notification in 48 states
USA Federal
CALEA, CCRA, CIPA, COPPA, EFTA,
FACTA, ECPA, FCRA, FISMA, FERPA,
GLBA, HIPAA, HITECH, PPA, RFPA,
Safe Harbor, US PATRIOT Act
Brazil
Article 5 of ConstitutionColombia
Data Privacy Law 1266
Mexico
Personal Data
Protection Law
Morocco
Data Protection Act
Thailand
Official Information
Act B.E. 2540
Europe
Privacy laws in 28 countries
South Africa
Electronic Communications
and Transactions Act
Singapore
Personal & Financial
Data Protection Acts
Where Cloud Data Resides and What Laws Might Apply
© 2015 CipherCloud | All rights reserved 6© 2015 CipherCloud 6
Customer Example: GlobalTelco
• Moving legacy CRM systems in
25 countries to Salesforce
• Complying with dozens of
privacy and data residency laws
Challenge
© 2015 CipherCloud | All rights reserved 7
Legacy Compliance Models Don’tWork in the Cloud
Legacy Protection Model
• Location of data determines
what laws apply
• Legal sovereignty over
physical media or files
• Data owners control
infrastructure security
• Transfer and processing of data
is controlled (in theory…)
• Regulators focus on location,
certification, perimeter security
Reality in the Cloud
• Data won’t and shouldn’t stay
in one location
• Distributed computing
• Cross-region backups
• Third-party processing
• Many people can access the data
• Remote command-and control
• Support & services
• Customer ask the wrong questions
• Datacenter location
• Infrastructure security
© 2015 CipherCloud | All rights reserved 8
Global Compliance Basics
Data Owner/Controller
– Always responsible, regardless of location
Data Processors & Sub-Processors
– Cloud providers with access to private data
– Extensive contractual requirements for data owner
Data Residency/Sovereignty
– Must assure data doesn’t go to regions
with weaker privacy protections
Data Transfer
– Strict requirements if data goes to a
specific region with weaker controls
© 2015 CipherCloud | All rights reserved 9
Global Compliance Resource Center
Details on data protection laws in 83 countries
– Summaries of laws
– National authorities and links
– Security requirements
– Definitions of personal and sensitive data
– Data transfer restrictions
– Breach notification requirements
Content on industry-specific regulations
– Financial services
– Payment card industry (PCI)
– Healthcare
ciphercloud.com/global-compliance-resource-center
– Dynamic interactive map
– Downloadable book (PDF)
© 2015 CipherCloud | All rights reserved 10© 2015 CipherCloud 10
Overall Levels of Restrictions Strong Restrictions
Moderate Restrictions
Limited Restrictions
© 2015 CipherCloud | All rights reserved 11© 2015 CipherCloud 11
EEA and Safe Harbor EEA Countries
Adequate protection
US Safe Harbor
• Austria
• Belgium
• Bulgaria
• Croatia
• Cyprus
• Czech Republic
• Denmark
• Estonia
• Finland
• France
• Germany
• Greece
• Hungary
• Iceland
• Ireland
• Italy
• Latvia
• Liechtenstein
• Lithuania
• Luxembourg
• Malta
• Netherlands
• Norway
• Poland
• Portugal
• Romania
• Slovakia
• Slovenia
• Spain
• Sweden
• United Kingdom
EEA Countries
• Andorra
• Argentina
• Canada
• Faroe Islands
• Guernsey
• Isle of Man
• Israel
• Jersey
• New Zealand
• Switzerland
• Uruguay
Adequate Protection
© 2015 CipherCloud | All rights reserved 12© 2015 CipherCloud 12
Breach Notification Requirements Strong Requirements
Limited Requirements
Mandatory in 47 US States
and Albertan, Canada
Limited or not required in
most other countries
© 2015 CipherCloud | All rights reserved 13
Does Data Residency = Data Sovereignty?
Cloud providers control data across borders
• Regional datacenters are rarely autonomous
• Redundant backup data centers onlyin US
• Central “command and control” can usually
access data residing in any country
SLAs are usually not binding on location
• Data often spread across multiple datacenters
• Best practices call forbackups in other regions
US court rulings challenge data residency
• Data “controlled” by US cloud providers can still be
subject to US subpoenas
• Microsoft ruled to release data stored in Ireland
to US law enforcement
Primary Microsoft datacenter locations
© 2015 CipherCloud | All rights reserved 14
The Microsoft / Ireland Case
“They have total control of those records, can
produce them here, and that’s all that
matters.” - Federal prosecutor Serrin Turner
“Warrant requires the company to provide
documents it controls, regardless of location”
-U.S. Justice Department
“It is a question of control, not a question
of the location of that information”
- Judge Loretta Preska, chief of the US District Court in Manhattan
© 2015 CipherCloud | All rights reserved 15
Microsoft – standard SLAs for South American cloud customers
Weak SLAs Don’t Help
SharePoint Online,
Exchange Online and
Lync Online Datacenter
locations for South
American customers.
SharePoint Online,
Exchange Online and
Lync Online Datacenter
locations for Brazilian
customers.
Active Directory and
Global Address Book
Datacenter locations for
all South American
customers including
Brazil.
© 2015 CipherCloud | All rights reserved 16
“The requirements of providing the services may mean that some
data is moved to or accessed by Microsoft personnel or
subcontractors outside the primary storage region. For instance, to
address latency, routing data may need to be copied to different
data centers in different regions. In addition, personnel who have
the most technical expertise to troubleshoot specific service issues
may be located in locations other than the primary location, and
they may require access to systems or data for purposes of
resolving an issue.”
- Microsoft standard cloud SLAs
Weak SLAs Don’t Help
© 2015 CipherCloud | All rights reserved 17
2. Ignore the problem
• Your users will use cloud anyway
• Hope (and pray) you’re not the
next data breach time bomb
What AreYour Practical Options?
1. Just say ‘NO’ to the Cloud
• Not viable or recommended
• Makes you less competitive
• Limits access to latest technology
3. Focus on protecting data
- not just infrastructure
• Technology solutions exist
• It’s possible to control sensitive
data and benefit from the cloud
© 2015 CipherCloud | All rights reserved 18
Cloud Use is Inevitable
The average global
enterprise utilizes over
1,100 cloud applications“
“
NA
EU
86% of cloud applications
used by enterprises are
unsanctioned Shadow IT“
“
© 2015 CipherCloud | All rights reserved 19© 2015 CipherCloud 19
Cloud Discovery Dashboard
© 2015 CipherCloud | All rights reserved 20
Where ShouldYou ProtectYour Data?
Data in Transit Data at Rest
* Top Threats
Vulnerabilities
• Account hijacking*
• Forced disclosure
• Data breaches*
• Malicious insiders*
• Insecure APIs*
• Shared technology*
Data in Use
© 2015 CipherCloud | All rights reserved 21
Encryption keys never
leave the enterprise
CipherCloud Encryption Model
Encrypted data is
indecipherable to
unauthorized users
Transparent to users
Preserves application
functionality
• Encryption or tokenization at
the enterprise gateway
• Minimal latency
• Integrated malware detection
© 2015 CipherCloud | All rights reserved 22
Unauthorized User
CipherCloud Encryption
Authorized User
© 2015 CipherCloud | All rights reserved 23
©CipherCloud | All rights reserved | 23
Authorized User
Unauthorized User
Granular Field-Level Control
©CipherCloud | All rights reserved | 23
© 2015 CipherCloud | All rights reserved 24© 2015 CipherCloud 24
Customer Example: GlobalTelco
• Moving legacy CRM systems in
25 countries to Salesforce
• Complying with dozens of
privacy and data residency laws
Challenge
• CipherCloud encryption for all
personal information fields
• Consistent global policy
enforcement and compliance
Solution
Customer PII data
Encrypted PII
Cloud traffic
© 2015 CipherCloud | All rights reserved 25
Compliance Arguments for Cloud Encryption
Prevents Cloud Providers from being Data Processors
– Widely accepted for US and many global data protection laws
– Still debated in Europe – especially Germany
• Some believe any encryption to be “pseudo-anonymization”
Improves Controller compliance even if
Cloud Provider is not exempt
– Important added layer of security
– Widely accepted for US data protection laws
Aligns with upcoming data privacy laws
– Significantly stiffer penalties and legal enforcement
– Important added layer of security
– Widely accepted for US data protection laws
© 2015 CipherCloud | All rights reserved 26
Upcoming EU Data Protection Requirements
Core principles all supported by advanced data protection
– Data Minimization
– Data Portability
– Privacy by Design & Default
– Privacy Impact Analysis Canada
United
Kingdom
IrelandFrance
© 2015 CipherCloud | All rights reserved 27
Growing Consensus on Encryption
Regulation Region Breach
Notification
Safe Harbor
Exemptions
Recommendations on Encryption
PCI DSS   Encryption a “critical component”
GLBA   Safe harbor “if encryption has been applied adequately”
HIPAA, HITECH   Safe harbor “if encryption has been applied adequately”
EU Directives Proposed Proposed Encryption likely to be recommended
ICO Privacy
Amendment  
Notification not required if there are “measures in place
which render the data unintelligible.”
Privacy
Amendment  Not specified
Not specified but you should to “take adequate measures to
prevent the unlawful disclosure”
US State Privacy
Laws  Generally Yes
Typical breach definitions:
- Personal Information: “data that is not encrypted”
- Breach: “access to unencrypted data”
© 2015 CipherCloud | All rights reserved 28
The CipherCloud Platform
Multi-Cloud
Any Location
Any Device
Visibility &
Monitoring
Threat
Prevention
Data
Security
Privacy &
Compliance
Enterprise Requirements
Visibility &
Monitoring
Threat
Prevention
Data
Security
Privacy &
Compliance
Platform
Advanced Data Protection
User & Data Monitoring
Cloud Risk Intelligence
CloudIntegrations
EnterpriseIntegration
Integrated Policy Controls
On-Premises Hybrid Cloud
© 2015 CipherCloud | All rights reserved 29
Recommendations
Avoiding the cloud is no longer viable, or desirable
IT must move beyond the perimeter model to stay relevant
– Focus needs to be on protecting data – not infrastructure
Compliance requires more than cloud provider assurances
– You’re responsible for the data – you must be proactive
Security and privacy challenges are solvable
– Strong encryption can assure exclusive access to data located anywhere
– But keys must be retained by the data owner
Encryption is becoming and established best practice
– Not applying encryption is increasingly hard to justify
Work with companies that understand data protection and have deep integration
with cloud applications
© 2015 CipherCloud | All rights reserved 30
AboutCipherCloud
Solutions
Cloud Discovery
Cloud DLP
Strong Encryption
Tokenization
Activity Monitoring
Anomaly Detection
525+ Employees
Company
3.8+ Million
Active Users
13 Industries
25 Countries
7 Languages
P 13 Patents
Customers
5 out of 10
Top US Banks
3 out of 5
Top Health Providers
Top 2 Global
Telecomm Company
40% of Global
Mail Delivery
Largest US
Media Company
3 out of 5
Top Pharmaceuticals
© 2015 CipherCloud | All rights reserved 31
Visit our new Global Compliance Resource Center
Online Map, Guide, Whitepapers & More: www.ciphercloud.com/resources/global-compliance-resource-center
© 2015 CipherCloud | All rights reserved 32
Questions?
Click to Watch On-demand Webinar :
Understanding Global Data Protection Laws
For additional information :
• Website: www.ciphercloud.com
• Email: info@ciphercloud.com
• Phone: +1 855-5CIPHER
Willy Leichter
Global Director, Cloud Security
wleichter@ciphercloud.com
Twitter: @WillyLeichter
Twitter.com/ciphercloud
Youtube.com/user/CipherCloudVideo
Linkedin.com/company/ciphercloud
Facebook.com/ciphercloud
Connect with Us!
1 of 32

Recommended

Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance by
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceWebinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceCipherCloud
2K views19 slides
CIO's Guide to Enterprise Cloud Adoption by
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCipherCloud
1.6K views16 slides
Salesforce Security with Visibility, Control & Data Protection by
Salesforce Security with Visibility, Control & Data ProtectionSalesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionCipherCloud
3.4K views24 slides
CipherCloud Webinar - Cloud Encryption & Tokenization 101 by
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud
2.1K views29 slides
CipherCloud for Salesforce - Solution Overview by
CipherCloud for Salesforce - Solution OverviewCipherCloud for Salesforce - Solution Overview
CipherCloud for Salesforce - Solution OverviewCipherCloud
2.3K views17 slides
CipherCloud Technology Overview: Encryption by
CipherCloud Technology Overview: EncryptionCipherCloud Technology Overview: Encryption
CipherCloud Technology Overview: EncryptionCipherCloud
1.2K views12 slides

More Related Content

What's hot

Cloud Visibility & Cloud Data Loss Prevention Approaches by
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention ApproachesCipherCloud
1K views18 slides
Shadow IT: The CISO Perspective on Regaining Control by
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlCipherCloud
1K views11 slides
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an... by
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...LaRel Rogers
899 views34 slides
Forcepoint Dynamic Data Protection by
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
1.6K views16 slides
CASBs and Office 365: The Security Menace by
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceBitglass
691 views24 slides
IRDAI Compliance & Data-Centric Security | Seclore by
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | SecloreSeclore
32 views7 slides

What's hot(20)

Cloud Visibility & Cloud Data Loss Prevention Approaches by CipherCloud
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention Approaches
CipherCloud1K views
Shadow IT: The CISO Perspective on Regaining Control by CipherCloud
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
CipherCloud1K views
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an... by LaRel Rogers
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
LaRel Rogers899 views
CASBs and Office 365: The Security Menace by Bitglass
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
Bitglass691 views
IRDAI Compliance & Data-Centric Security | Seclore by Seclore
IRDAI Compliance & Data-Centric Security | SecloreIRDAI Compliance & Data-Centric Security | Seclore
IRDAI Compliance & Data-Centric Security | Seclore
Seclore 32 views
Combatting Insider Threats Presentation by Sara Thomason
Combatting Insider Threats PresentationCombatting Insider Threats Presentation
Combatting Insider Threats Presentation
Sara Thomason488 views
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud by MarketingArrowECS_CZ
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Secure Your Web Applications and Achieve Compliance by Avi Networks
Secure Your Web Applications and Achieve Compliance Secure Your Web Applications and Achieve Compliance
Secure Your Web Applications and Achieve Compliance
Avi Networks379 views
CASB Cases: How Your Peers are Securing the Cloud by Bitglass
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
Bitglass371 views
Hyperconverged: The Future of Data Centers Presentation by Sara Thomason
Hyperconverged: The Future of Data Centers PresentationHyperconverged: The Future of Data Centers Presentation
Hyperconverged: The Future of Data Centers Presentation
Sara Thomason299 views
OpenText Core Customer Presentation Sept 2015 by Marcel Hoffmann
OpenText Core Customer Presentation Sept 2015OpenText Core Customer Presentation Sept 2015
OpenText Core Customer Presentation Sept 2015
Marcel Hoffmann645 views
Webinar - Bitglass and CyberEdge - Hidden Security Threats by Bitglass
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Bitglass90 views
Webinar bitglass - complete deck-2 by Bitglass
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
Bitglass311 views
The Definitive CASB Business Case Kit - Presentation by Netskope
The Definitive CASB Business Case Kit - PresentationThe Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - Presentation
Netskope4.4K views
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud. by Netskope
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Lions, Tigers, and PHI, Oh My! The latest in data loss prevention in the cloud.
Netskope1.1K views
PTC Cloud Services Datasheet: Security Primer by PTC
PTC Cloud Services Datasheet: Security PrimerPTC Cloud Services Datasheet: Security Primer
PTC Cloud Services Datasheet: Security Primer
PTC276 views
Jisc cloud services: helping our members deliver their cloud strategies by Jisc
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
Jisc1.8K views

Similar to Understanding Global Data Protection Laws: Webinar

Cloud Computing: What You Don't Know Can Hurt You by
Cloud Computing:  What You Don't Know Can Hurt YouCloud Computing:  What You Don't Know Can Hurt You
Cloud Computing: What You Don't Know Can Hurt YouPatrick Fowler
260 views35 slides
Isaca new delhi india - privacy and big data by
Isaca new delhi india - privacy and big dataIsaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big dataUlf Mattsson
357 views76 slides
Safe Harbor Webinar by
Safe Harbor WebinarSafe Harbor Webinar
Safe Harbor WebinarEthisphere
177 views16 slides
Cloud Computing and the Public Sector by
Cloud Computing and the Public SectorCloud Computing and the Public Sector
Cloud Computing and the Public SectorMHCCloud
301 views26 slides
Isaca new delhi india privacy and big data by
Isaca new delhi india   privacy and big dataIsaca new delhi india   privacy and big data
Isaca new delhi india privacy and big dataUlf Mattsson
834 views76 slides
Cloud Regulations and Security Standards by Ran Adler by
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerIdan Tohami
171 views50 slides

Similar to Understanding Global Data Protection Laws: Webinar(20)

Cloud Computing: What You Don't Know Can Hurt You by Patrick Fowler
Cloud Computing:  What You Don't Know Can Hurt YouCloud Computing:  What You Don't Know Can Hurt You
Cloud Computing: What You Don't Know Can Hurt You
Patrick Fowler260 views
Isaca new delhi india - privacy and big data by Ulf Mattsson
Isaca new delhi india - privacy and big dataIsaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big data
Ulf Mattsson357 views
Safe Harbor Webinar by Ethisphere
Safe Harbor WebinarSafe Harbor Webinar
Safe Harbor Webinar
Ethisphere177 views
Cloud Computing and the Public Sector by MHCCloud
Cloud Computing and the Public SectorCloud Computing and the Public Sector
Cloud Computing and the Public Sector
MHCCloud301 views
Isaca new delhi india privacy and big data by Ulf Mattsson
Isaca new delhi india   privacy and big dataIsaca new delhi india   privacy and big data
Isaca new delhi india privacy and big data
Ulf Mattsson834 views
Cloud Regulations and Security Standards by Ran Adler by Idan Tohami
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran Adler
Idan Tohami171 views
Unlock the potential of data security 2020 by Ulf Mattsson
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
Ulf Mattsson121 views
Scot Cloud 2016 by Ray Bugg
Scot Cloud 2016Scot Cloud 2016
Scot Cloud 2016
Ray Bugg927 views
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo... by Brian Miller, Solicitor
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
Data Protection and the Cloud (Part 2) by Brian Miller Solicitor and Vicki Bo...
GDPR and evolving international privacy regulations by Ulf Mattsson
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
Ulf Mattsson116 views
Cross border - off-shoring and outsourcing privacy sensitive data by Ulf Mattsson
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
Ulf Mattsson1.3K views
Mind Your Business: Why Privacy Matters to the Successful Enterprise by Eric Kavanagh
 Mind Your Business: Why Privacy Matters to the Successful Enterprise Mind Your Business: Why Privacy Matters to the Successful Enterprise
Mind Your Business: Why Privacy Matters to the Successful Enterprise
Eric Kavanagh255 views
Windstream Cloud Security Presentation by Ideba
Windstream Cloud Security PresentationWindstream Cloud Security Presentation
Windstream Cloud Security Presentation
Ideba487 views
Kawser Hamid : ICO and Data Protection in the Cloud by Gurbir Singh
Kawser Hamid : ICO and Data Protection in the CloudKawser Hamid : ICO and Data Protection in the Cloud
Kawser Hamid : ICO and Data Protection in the Cloud
Gurbir Singh980 views
Privacy and the GDPR: How Cloud computing could be your failing by IT Governance Ltd
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
IT Governance Ltd652 views
ISACA Houston - Practical data privacy and de-identification techniques by Ulf Mattsson
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
Ulf Mattsson213 views
Improve IT Security and Compliance with Mainframe Data in Splunk by Precisely
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
Precisely203 views
TrustArc Webinar: Challenges & Risks Of Data Graveyards by TrustArc
TrustArc Webinar: Challenges & Risks Of Data GraveyardsTrustArc Webinar: Challenges & Risks Of Data Graveyards
TrustArc Webinar: Challenges & Risks Of Data Graveyards
TrustArc268 views
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured by Precisely
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Precisely108 views

More from CipherCloud

Cyber Security Lessons from the NSA by
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSACipherCloud
933 views18 slides
Shedding Light on Shadow IT for File Sharing by
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File SharingCipherCloud
764 views17 slides
CipherCloud at DreamForce 2014! by
CipherCloud at DreamForce 2014!CipherCloud at DreamForce 2014!
CipherCloud at DreamForce 2014!CipherCloud
472 views44 slides
Encryption Crackability by
Encryption CrackabilityEncryption Crackability
Encryption CrackabilityCipherCloud
186 views1 slide
Customer Success Story by CipherCloud by
Customer Success Story by CipherCloudCustomer Success Story by CipherCloud
Customer Success Story by CipherCloudCipherCloud
613 views8 slides
A Casestudy on Salesforce Cloud Security by
A Casestudy on Salesforce Cloud SecurityA Casestudy on Salesforce Cloud Security
A Casestudy on Salesforce Cloud SecurityCipherCloud
659 views1 slide

More from CipherCloud(8)

Cyber Security Lessons from the NSA by CipherCloud
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSA
CipherCloud933 views
Shedding Light on Shadow IT for File Sharing by CipherCloud
Shedding Light on Shadow IT for File SharingShedding Light on Shadow IT for File Sharing
Shedding Light on Shadow IT for File Sharing
CipherCloud764 views
CipherCloud at DreamForce 2014! by CipherCloud
CipherCloud at DreamForce 2014!CipherCloud at DreamForce 2014!
CipherCloud at DreamForce 2014!
CipherCloud472 views
Encryption Crackability by CipherCloud
Encryption CrackabilityEncryption Crackability
Encryption Crackability
CipherCloud186 views
Customer Success Story by CipherCloud by CipherCloud
Customer Success Story by CipherCloudCustomer Success Story by CipherCloud
Customer Success Story by CipherCloud
CipherCloud613 views
A Casestudy on Salesforce Cloud Security by CipherCloud
A Casestudy on Salesforce Cloud SecurityA Casestudy on Salesforce Cloud Security
A Casestudy on Salesforce Cloud Security
CipherCloud659 views
CipherCloud's Solutions for Salesforce Chatter by CipherCloud
CipherCloud's Solutions for Salesforce ChatterCipherCloud's Solutions for Salesforce Chatter
CipherCloud's Solutions for Salesforce Chatter
CipherCloud636 views
CipherCloud for Any App by CipherCloud
CipherCloud for Any AppCipherCloud for Any App
CipherCloud for Any App
CipherCloud1.4K views

Recently uploaded

Initiating and Advancing Your Strategic GIS Governance Strategy by
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance StrategySafe Software
176 views68 slides
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...ShapeBlue
119 views17 slides
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...James Anderson
160 views32 slides
NTGapps NTG LowCode Platform by
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform Mustafa Kuğu
423 views30 slides
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... by
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...ShapeBlue
186 views15 slides
DRBD Deep Dive - Philipp Reisner - LINBIT by
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBITShapeBlue
180 views21 slides

Recently uploaded(20)

Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software176 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue119 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson160 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu423 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... by ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue186 views
DRBD Deep Dive - Philipp Reisner - LINBIT by ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue180 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue206 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue139 views
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... by ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue106 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates by ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue252 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker54 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue222 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue198 views
Business Analyst Series 2023 - Week 4 Session 7 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10139 views
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... by ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue194 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue135 views
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... by ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue126 views

Understanding Global Data Protection Laws: Webinar

  • 1. © 2015 CipherCloud | All rights reserved 1 Understanding Global Data Protection Laws Willy Leichter Global Director, Cloud Security
  • 2. © 2015 CipherCloud | All rights reserved 2 Agenda Cloud benefits and inhibitors Changing IT landscape Compliance basics Overview of global protection laws Microsoft/Ireland legal challenge Best practices to meet compliance Recommendations
  • 3. © 2015 CipherCloud | All rights reserved 3 Balancing Cloud Benefits with Compliance Requirements Top 3 US Bank’s Consumer Self-Service Loan Origination Portal UK Education Organization Deploys Global Cloud-Based Portal Non-Technology Leader Trust Sensitive Data in Cloud Email German Cosmetics Giants Meets International Security Regulations Major European Telco Consolidates Call Centers for 25 Countries Largest Hospital Chain Meets HIPAA & HITECH in the Cloud Top Canadian Bank Safeguards Proprietary Information in the Cloud Major Wall Street Firm Adopts Cloud Applications with Confidence Global Leader in Customer Loyalty Moves Email to the Cloud Genomics Testing Leader Protects Patient Data while Using the Cloud New Zealand Bank Collaborates in the Cloud and Meets Compliance Medical Audit Leader Launches Cloud- Based Customer Portal Large Pharmaceutical Company Uses Encrypted Email Credit Reporting Giant Deploys Cloud Collaboration with DLP Controls Government-Owned Mortgage Backer Protect PII Data in the Cloud
  • 4. © 2015 CipherCloud | All rights reserved 4 Changing IT Challenges Managing the proliferation of cloud services Protecting data instead of just infrastructure Complying with data protection and residency laws Using legacy tools against emerging cloud threats Disappearing network perimeter Surveillance and forced disclosure risks
  • 5. © 2015 CipherCloud | All rights reserved 5© 2015 CipherCloud 5 Chile Law for the Protection of Private Life Argentina Personal Data Protection Law, Information Confidentiality Law New Zealand Privacy Act Philippines Propose Data Privacy Law Canada PIPEDA, FOIPPA, PIPA Taiwan Computer-Processed Personal Data Protection Hong Kong Personal Data Privacy Ordinance Japan Personal Information Protection Act South Korea Network Utilization and Data Protection Act European Union EU Data Protection Directive, State Data Protection Laws India Pending Laws under discussion United Kingdom ICO Privacy and Electronic Communications Regulations Australia National Privacy Principals, State Privacy Bills, Email Spam and Privacy Bills US States Breach notification in 48 states USA Federal CALEA, CCRA, CIPA, COPPA, EFTA, FACTA, ECPA, FCRA, FISMA, FERPA, GLBA, HIPAA, HITECH, PPA, RFPA, Safe Harbor, US PATRIOT Act Brazil Article 5 of ConstitutionColombia Data Privacy Law 1266 Mexico Personal Data Protection Law Morocco Data Protection Act Thailand Official Information Act B.E. 2540 Europe Privacy laws in 28 countries South Africa Electronic Communications and Transactions Act Singapore Personal & Financial Data Protection Acts Where Cloud Data Resides and What Laws Might Apply
  • 6. © 2015 CipherCloud | All rights reserved 6© 2015 CipherCloud 6 Customer Example: GlobalTelco • Moving legacy CRM systems in 25 countries to Salesforce • Complying with dozens of privacy and data residency laws Challenge
  • 7. © 2015 CipherCloud | All rights reserved 7 Legacy Compliance Models Don’tWork in the Cloud Legacy Protection Model • Location of data determines what laws apply • Legal sovereignty over physical media or files • Data owners control infrastructure security • Transfer and processing of data is controlled (in theory…) • Regulators focus on location, certification, perimeter security Reality in the Cloud • Data won’t and shouldn’t stay in one location • Distributed computing • Cross-region backups • Third-party processing • Many people can access the data • Remote command-and control • Support & services • Customer ask the wrong questions • Datacenter location • Infrastructure security
  • 8. © 2015 CipherCloud | All rights reserved 8 Global Compliance Basics Data Owner/Controller – Always responsible, regardless of location Data Processors & Sub-Processors – Cloud providers with access to private data – Extensive contractual requirements for data owner Data Residency/Sovereignty – Must assure data doesn’t go to regions with weaker privacy protections Data Transfer – Strict requirements if data goes to a specific region with weaker controls
  • 9. © 2015 CipherCloud | All rights reserved 9 Global Compliance Resource Center Details on data protection laws in 83 countries – Summaries of laws – National authorities and links – Security requirements – Definitions of personal and sensitive data – Data transfer restrictions – Breach notification requirements Content on industry-specific regulations – Financial services – Payment card industry (PCI) – Healthcare ciphercloud.com/global-compliance-resource-center – Dynamic interactive map – Downloadable book (PDF)
  • 10. © 2015 CipherCloud | All rights reserved 10© 2015 CipherCloud 10 Overall Levels of Restrictions Strong Restrictions Moderate Restrictions Limited Restrictions
  • 11. © 2015 CipherCloud | All rights reserved 11© 2015 CipherCloud 11 EEA and Safe Harbor EEA Countries Adequate protection US Safe Harbor • Austria • Belgium • Bulgaria • Croatia • Cyprus • Czech Republic • Denmark • Estonia • Finland • France • Germany • Greece • Hungary • Iceland • Ireland • Italy • Latvia • Liechtenstein • Lithuania • Luxembourg • Malta • Netherlands • Norway • Poland • Portugal • Romania • Slovakia • Slovenia • Spain • Sweden • United Kingdom EEA Countries • Andorra • Argentina • Canada • Faroe Islands • Guernsey • Isle of Man • Israel • Jersey • New Zealand • Switzerland • Uruguay Adequate Protection
  • 12. © 2015 CipherCloud | All rights reserved 12© 2015 CipherCloud 12 Breach Notification Requirements Strong Requirements Limited Requirements Mandatory in 47 US States and Albertan, Canada Limited or not required in most other countries
  • 13. © 2015 CipherCloud | All rights reserved 13 Does Data Residency = Data Sovereignty? Cloud providers control data across borders • Regional datacenters are rarely autonomous • Redundant backup data centers onlyin US • Central “command and control” can usually access data residing in any country SLAs are usually not binding on location • Data often spread across multiple datacenters • Best practices call forbackups in other regions US court rulings challenge data residency • Data “controlled” by US cloud providers can still be subject to US subpoenas • Microsoft ruled to release data stored in Ireland to US law enforcement Primary Microsoft datacenter locations
  • 14. © 2015 CipherCloud | All rights reserved 14 The Microsoft / Ireland Case “They have total control of those records, can produce them here, and that’s all that matters.” - Federal prosecutor Serrin Turner “Warrant requires the company to provide documents it controls, regardless of location” -U.S. Justice Department “It is a question of control, not a question of the location of that information” - Judge Loretta Preska, chief of the US District Court in Manhattan
  • 15. © 2015 CipherCloud | All rights reserved 15 Microsoft – standard SLAs for South American cloud customers Weak SLAs Don’t Help SharePoint Online, Exchange Online and Lync Online Datacenter locations for South American customers. SharePoint Online, Exchange Online and Lync Online Datacenter locations for Brazilian customers. Active Directory and Global Address Book Datacenter locations for all South American customers including Brazil.
  • 16. © 2015 CipherCloud | All rights reserved 16 “The requirements of providing the services may mean that some data is moved to or accessed by Microsoft personnel or subcontractors outside the primary storage region. For instance, to address latency, routing data may need to be copied to different data centers in different regions. In addition, personnel who have the most technical expertise to troubleshoot specific service issues may be located in locations other than the primary location, and they may require access to systems or data for purposes of resolving an issue.” - Microsoft standard cloud SLAs Weak SLAs Don’t Help
  • 17. © 2015 CipherCloud | All rights reserved 17 2. Ignore the problem • Your users will use cloud anyway • Hope (and pray) you’re not the next data breach time bomb What AreYour Practical Options? 1. Just say ‘NO’ to the Cloud • Not viable or recommended • Makes you less competitive • Limits access to latest technology 3. Focus on protecting data - not just infrastructure • Technology solutions exist • It’s possible to control sensitive data and benefit from the cloud
  • 18. © 2015 CipherCloud | All rights reserved 18 Cloud Use is Inevitable The average global enterprise utilizes over 1,100 cloud applications“ “ NA EU 86% of cloud applications used by enterprises are unsanctioned Shadow IT“ “
  • 19. © 2015 CipherCloud | All rights reserved 19© 2015 CipherCloud 19 Cloud Discovery Dashboard
  • 20. © 2015 CipherCloud | All rights reserved 20 Where ShouldYou ProtectYour Data? Data in Transit Data at Rest * Top Threats Vulnerabilities • Account hijacking* • Forced disclosure • Data breaches* • Malicious insiders* • Insecure APIs* • Shared technology* Data in Use
  • 21. © 2015 CipherCloud | All rights reserved 21 Encryption keys never leave the enterprise CipherCloud Encryption Model Encrypted data is indecipherable to unauthorized users Transparent to users Preserves application functionality • Encryption or tokenization at the enterprise gateway • Minimal latency • Integrated malware detection
  • 22. © 2015 CipherCloud | All rights reserved 22 Unauthorized User CipherCloud Encryption Authorized User
  • 23. © 2015 CipherCloud | All rights reserved 23 ©CipherCloud | All rights reserved | 23 Authorized User Unauthorized User Granular Field-Level Control ©CipherCloud | All rights reserved | 23
  • 24. © 2015 CipherCloud | All rights reserved 24© 2015 CipherCloud 24 Customer Example: GlobalTelco • Moving legacy CRM systems in 25 countries to Salesforce • Complying with dozens of privacy and data residency laws Challenge • CipherCloud encryption for all personal information fields • Consistent global policy enforcement and compliance Solution Customer PII data Encrypted PII Cloud traffic
  • 25. © 2015 CipherCloud | All rights reserved 25 Compliance Arguments for Cloud Encryption Prevents Cloud Providers from being Data Processors – Widely accepted for US and many global data protection laws – Still debated in Europe – especially Germany • Some believe any encryption to be “pseudo-anonymization” Improves Controller compliance even if Cloud Provider is not exempt – Important added layer of security – Widely accepted for US data protection laws Aligns with upcoming data privacy laws – Significantly stiffer penalties and legal enforcement – Important added layer of security – Widely accepted for US data protection laws
  • 26. © 2015 CipherCloud | All rights reserved 26 Upcoming EU Data Protection Requirements Core principles all supported by advanced data protection – Data Minimization – Data Portability – Privacy by Design & Default – Privacy Impact Analysis Canada United Kingdom IrelandFrance
  • 27. © 2015 CipherCloud | All rights reserved 27 Growing Consensus on Encryption Regulation Region Breach Notification Safe Harbor Exemptions Recommendations on Encryption PCI DSS   Encryption a “critical component” GLBA   Safe harbor “if encryption has been applied adequately” HIPAA, HITECH   Safe harbor “if encryption has been applied adequately” EU Directives Proposed Proposed Encryption likely to be recommended ICO Privacy Amendment   Notification not required if there are “measures in place which render the data unintelligible.” Privacy Amendment  Not specified Not specified but you should to “take adequate measures to prevent the unlawful disclosure” US State Privacy Laws  Generally Yes Typical breach definitions: - Personal Information: “data that is not encrypted” - Breach: “access to unencrypted data”
  • 28. © 2015 CipherCloud | All rights reserved 28 The CipherCloud Platform Multi-Cloud Any Location Any Device Visibility & Monitoring Threat Prevention Data Security Privacy & Compliance Enterprise Requirements Visibility & Monitoring Threat Prevention Data Security Privacy & Compliance Platform Advanced Data Protection User & Data Monitoring Cloud Risk Intelligence CloudIntegrations EnterpriseIntegration Integrated Policy Controls On-Premises Hybrid Cloud
  • 29. © 2015 CipherCloud | All rights reserved 29 Recommendations Avoiding the cloud is no longer viable, or desirable IT must move beyond the perimeter model to stay relevant – Focus needs to be on protecting data – not infrastructure Compliance requires more than cloud provider assurances – You’re responsible for the data – you must be proactive Security and privacy challenges are solvable – Strong encryption can assure exclusive access to data located anywhere – But keys must be retained by the data owner Encryption is becoming and established best practice – Not applying encryption is increasingly hard to justify Work with companies that understand data protection and have deep integration with cloud applications
  • 30. © 2015 CipherCloud | All rights reserved 30 AboutCipherCloud Solutions Cloud Discovery Cloud DLP Strong Encryption Tokenization Activity Monitoring Anomaly Detection 525+ Employees Company 3.8+ Million Active Users 13 Industries 25 Countries 7 Languages P 13 Patents Customers 5 out of 10 Top US Banks 3 out of 5 Top Health Providers Top 2 Global Telecomm Company 40% of Global Mail Delivery Largest US Media Company 3 out of 5 Top Pharmaceuticals
  • 31. © 2015 CipherCloud | All rights reserved 31 Visit our new Global Compliance Resource Center Online Map, Guide, Whitepapers & More: www.ciphercloud.com/resources/global-compliance-resource-center
  • 32. © 2015 CipherCloud | All rights reserved 32 Questions? Click to Watch On-demand Webinar : Understanding Global Data Protection Laws For additional information : • Website: www.ciphercloud.com • Email: info@ciphercloud.com • Phone: +1 855-5CIPHER Willy Leichter Global Director, Cloud Security wleichter@ciphercloud.com Twitter: @WillyLeichter Twitter.com/ciphercloud Youtube.com/user/CipherCloudVideo Linkedin.com/company/ciphercloud Facebook.com/ciphercloud Connect with Us!