Academia.eduAcademia.edu

Outline

Application of Data Protection Concepts to Cloud Computing

Abstract

The fast technological development and growing use of cloud computing services require implementation of effective legal infrastructure in order to deal with the privacy and data security implications that are raised.

References (35)

  1. UN, Information Economy Report 2013, The Cloud Economy and Developing Countries available at http://unctad.org/en/PublicationsLibrary/ier2013_en.pdf (accessed 25.04.2014)
  2. Gasser U. (2014), Cloud Innovation and the Law: Issues, Approaches, and Interplay, Berkman Center, online at Series: http://cyber.law.harvard.edu/research/cloudcomputing (accessed 25.04.2014)
  3. European Commission (EC), "Unleashing the Potential of the Cloud in Europe," COM(2012) 529, Brussels, 27.9.2012
  4. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281, 23.11.1995
  5. Article 29 Data Protection Working Party, Opinion 1/2010 on the concepts of "controller" and "processor" -WP 169 (16.02.2010)
  6. Robinson N., Graux H., Botterman M., and Valeri L. (2009), Review of the European Data Protection Directive online at http://www.hideproject.org/downloads/references/review_of_eu_dp_directive.pdf (accessed 25.04.2014)
  7. Article 29 Data Protection Working Party, Opinion 1/2010 on the concepts of "controller" and "processor" -WP 169 (16.02.2010)
  8. Art. 2 (d) of Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281, 23.11.1995
  9. Art. 2 (e) of Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281, 23.11.1995
  10. Art. 30 of Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281, 23.11.1995
  11. Article 29 Data Protection Working Party, Opinion 10/2006 on the processing of personal data by the Society for Worldwide Interbank Financial Telecommunication (SWIFT), WP128 (November 22, 2006)
  12. Article 29 Data Protection Working Party, Opinion 10/2006 on the processing of personal data by the Society for Worldwide Interbank Financial Telecommunication (SWIFT), WP128 (November 22, 2006), p. 11
  13. Article 29 Data Protection Working Party, Opinion 10/2006 on the processing of personal data by the Society for Worldwide Interbank Financial Telecommunication (SWIFT), WP128 (November 22, 2006), p. 12
  14. Article 29 Data Protection Working Party, Opinion 1/2010 on the concepts of "controller" and "processor" -WP 169 (16.02.2010)
  15. Art. 2 (d), sent. 2 of Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281, 23.11.1995
  16. Art. 17 (3) of Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281, 23.11.1995
  17. Article 29 Data Protection Working Party, Opinion 05/2012 on Cloud Computing, WP 196 (July 1, 2012)
  18. Irion K. and Luchetta G.,(2013) Online personal data processing and EU data protection reform online at http://www.ceps.eu/book/online-personal-data-processing-and- eu-data-protection-reform (accessed 25.04.2014), p. 46
  19. Commission Decision of 5 February 2010 on standard contractual clauses for the transfer of personal data to processors established in third countries under Directive 95/46/EC of the European Parliament and of the Council (notified under document C(2010)593)
  20. Article 29 Data Protection Working Party, Ref. Ares(2014)1033670 -02/04/2014, online at http://ec.europa.eu/justice/data-protection/article-29/documentation/other- document/files/2014/20140402_microsoft.pdf (accessed 09.05.2014)
  21. Harrison J.,EU Data Protection Authorities Endorse Microsoft's Cloud Computing Agreement, online at https://www.scl.org/site.aspx?i=ed36831 (accessed 09.05.2014)
  22. EC, "Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation," Brussels 25.1.2012, COM(2011) 11 final
  23. European Parliament legislative resolution of 12 March 2014 on the proposal for a regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) (COM(2012)0011 -C7-0025/2012 - 2012/0011(COD)) (Ordinary legislative procedure: first reading)
  24. EC, "Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation," Brussels 25.1.2012, COM(2011) 11 final, art. 3
  25. EC, "Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation," Brussels 25.1.2012, COM(2011) 11 final, Recital 15
  26. Opinion of the European Data Protection Supervisor on the Commission's Communication on "Unleashing the potential of Cloud Computing in Europe" (16.11.2012)
  27. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (OECD, 1980 as revised in 2013), art. 1(a)
  28. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (OECD, 1980 as revised in 2013), par. 16
  29. Schwartz P.(2013), Information Privacy in the Cloud online at http://scholarship.law.berkeley.edu/facpubs/1906/ (accessed 25.04.2014)
  30. Sotto L., Treacy B., and McLellan M. (2010), Privacy and Data Security Risks in Cloud Computing online at http://www.hunton.com/files/Publication/4845e31f-63d8-4f9a- 9a36-a074e4170225/Presentation/PublicationAttachment/6f52b2fd-2973-48cc-9f23- c941f1e19358/Privacy-Data_Security_Risks_in_Cloud_Computing_2.10.pdf (accessed 25.04.2014)
  31. 2000/520/EC: Commission Decision of 26 July 2000 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequacy of the protection provided by the safe harbour privacy principles and related frequently asked questions issued by the US Department of Commerce
  32. 2000/520/EC: Commission Decision of 26 July 2000 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequacy of the protection provided by the safe harbour privacy principles and related frequently asked questions issued by the US Department of Commerce
  33. 2000/520/EC: Commission Decision of 26 July 2000 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequacy of the protection provided by the safe harbour privacy principles and related frequently asked questions issued by the US Department of Commerce
  34. Kuner Ch. (2008), Membership of the US Safe Harbor Program by Data Processors online at http://www.huntonfiles.com/files/webupload/CIPL_Safe_Harbor_3.08.pdf (accessed 25.04.2014)
  35. APEC Privacy Framework (APEC, 2004)