메뉴 건너뛰기




Volumn 28, Issue 3, 2012, Pages 308-319

Protecting the privacy and security of sensitive customer data in the cloud

Author keywords

Cloud computing; Data protection; Information privacy; Sensitive data

Indexed keywords

COMPUTING ENVIRONMENTS; COMPUTING INDUSTRY; CONSUMER PRIVACY; CRITICAL CHALLENGES; CUSTOMER DATA; DATA PROTECTION; DATA PROTECTION LAWS; INFORMATION PRIVACY; NEW INDUSTRY; PRIVACY AND SECURITY; REGULATORY FRAMEWORKS; REGULATORY REFORM; SENSITIVE DATAS; SENSITIVE INFORMATIONS;

EID: 84861355449     PISSN: 02673649     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.clsr.2012.03.003     Document Type: Article
Times cited : (107)

References (89)
  • 2
    • 84856711072 scopus 로고    scopus 로고
    • European Network and Information Security Agency Jan. (ENISA Guidelines) (guide for European public agencies about the use of cloud computing)
    • Security and Resilience in Governmental Clouds, Making an Informed Decision, European Network and Information Security Agency, p. 11 (Jan. 2011) (ENISA Guidelines) (guide for European public agencies about the use of cloud computing).
    • (2011) Security and Resilience in Governmental Clouds, Making An Informed Decision , pp. 11
  • 3
    • 84870473585 scopus 로고    scopus 로고
    • Electronic Privacy Information Center (EPIC)
    • Cloud Computing, Electronic Privacy Information Center (EPIC), at: http://epic.org/privacy/cloudcomputing/default.html (referencing and linking a survey of experts on the privacy and security risks of cloud computing).
    • Cloud Computing
  • 4
    • 84861392982 scopus 로고    scopus 로고
    • European Commission
    • European Commission: Trade: United States (Bilateral relations), at: http://ec.europa.eu/trade/issues/bilateral/countries/usa/index-en.htm.
    • Trade: United States (Bilateral Relations)
  • 5
    • 84856455245 scopus 로고    scopus 로고
    • Article 29 Data Protection Working Party, 0836/10/EN, WP 179 16 Dec. (Art. 29 Opinion 10/2010)
    • Opinion 8/2010 on applicable law, Article 29 Data Protection Working Party, 0836/10/EN, WP 179, p. 21 (16 Dec. 2010) (Art. 29 Opinion 10/2010).
    • (2010) Opinion 8/2010 on Applicable Law , pp. 21
  • 6
    • 84861413773 scopus 로고    scopus 로고
    • Editorial
    • Baker & McKenzie (Mar.) Personal information online code of practice, Information Commissioner's Office, U.K. (July 2010) (UK Online Code of Practice)
    • Editorial, Hong Kong and China: Into the Cloud, LegalBytes, Baker & McKenzie (Mar. 2011); Personal information online code of practice, Information Commissioner's Office, U.K., p. 40 (July 2010) (UK Online Code of Practice).
    • (2011) Hong Kong and China: Into the Cloud, LegalBytes , pp. 40
  • 8
    • 84861413793 scopus 로고    scopus 로고
    • For clarification, this paper focuses on the security and privacy challenges of using public cloud computing. It is, however, recognized that the use of Virtual Private Clouds (VPC) may allow organizations to exercise more controls and enhance security in the cloud. See, e.g., Amazon's VPC, at: http://aws.amazon.com/vpc/.
    • Amazon's VPC
  • 9
    • 77957809714 scopus 로고    scopus 로고
    • International Association of Privacy Professionals (IAPP)
    • "Information security is an essential component of information privacy: it is often said that privacy is not possible without security." Swire, P. & Bermann, S., Information Privacy, the Official Reference for the Certified Information Privacy Professional (CIPP), International Association of Privacy Professionals (IAPP), p. 161 (2007) (Information Privacy). "Information Security describes the systems, policies and controls within a typical enterpriselevel information security operation." Ibid.
    • (2007) Information Privacy, the Official Reference for the Certified Information Privacy Professional (CIPP) , pp. 161
    • Swire, P.1    Bermann, S.2
  • 10
    • 84861377113 scopus 로고    scopus 로고
    • Presentation: 'Cloud Computing: Privacy Storm on the Horizon?'
    • DeVore, A. C., Presentation: 'Cloud Computing: Privacy Storm on the Horizon?' 20 Albany Law Journal of Science and Technology, p. 365 (2010).
    • (2010) Albany Law Journal of Science and Technology , vol.20 , pp. 365
    • Devore, A.C.1
  • 11
    • 79959433819 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, U.S. Dept. of Commerce, Draft Special Pub. 800-144 (Jan.) (NIST Cloud Computing Guidelines)
    • Jansen, W. & Grance, T., Guidelines on Security and Privacy in Public Cloud Computing, National Institute of Standards and Technology, U.S. Dept. of Commerce, Draft Special Pub. 800-144, pp. 10-12 (Jan. 2011) (NIST Cloud Computing Guidelines).
    • (2011) Guidelines on Security and Privacy in Public Cloud Computing , pp. 10-12
    • Jansen, W.1    Grance, T.2
  • 14
    • 84861413805 scopus 로고    scopus 로고
    • Researchers find "massive" security flaws in cloud architectures
    • Oct. 26
    • Greene, T., 'Researchers find "massive" security flaws in cloud architectures,' Networkworld (Oct. 26, 2011).
    • (2011) Networkworld
    • Greene, T.1
  • 15
    • 84861413804 scopus 로고    scopus 로고
    • Cloud Computing: What are the Security Implications?
    • Oct. 6
    • NIST Cloud Computing Guidelines, note 15, iii (guiding the U.S. federal government's processing of sensitive unclassified information in the cloud); see also, 'Cloud Computing: What are the Security Implications?' U.S. House of Representatives Sub-Committee on Cybersecurity, Infrastructure Protection and Security Technologies (Oct. 6, 2011), at http://homeland.house.gov/hearing/ cloud-computing-what-are-security-implications.
    • (2011) U.S. House of Representatives Sub-Committee on Cybersecurity, Infrastructure Protection and Security Technologies
  • 16
    • 84861383333 scopus 로고    scopus 로고
    • AWS GovCloud (US)
    • Cloud services are available to address special government security objectives, such as a need to limit access to more sensitive data to citizens of a particular country. See, for example, AWS GovCloud (US), at: http://aws.amazon.com/govcloud-us/.
  • 17
    • 84861393011 scopus 로고    scopus 로고
    • Congress urged to leave cloud computing alone
    • 12 Apr.
    • Thibodeau, P., 'Congress urged to leave cloud computing alone,' Computerworld (12 Apr. 2011).
    • (2011) Computerworld
    • Thibodeau, P.1
  • 18
    • 84861410930 scopus 로고    scopus 로고
    • Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281/31, 23.11.95, art. 17(1) (Data Protection Directive); OJ L 178/1,17.07.2000 (E-Privacy Directive)
    • See generally, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281/31, 23.11.95, art. 17(1) (Data Protection Directive); Directive of the European Parliament and of the Council 2000/31/EC of 8 June 2000 on Certain Legal Aspects of Information Society Services, in Particular e-Commerce, in the Internal Market, OJ L 178/1,17.07.2000 (E-Privacy Directive).
    • Directive of the European Parliament and of the Council 2000/31/EC of 8 June 2000 on Certain Legal Aspects of Information Society Services, in Particular E-Commerce, in the Internal Market
  • 22
    • 84861383324 scopus 로고    scopus 로고
    • Proposed Bill Would Put Curbs on Data Gathering
    • 10 March
    • Angwin, J. 'Proposed Bill Would Put Curbs on Data Gathering,' MarketWatch (10 March 2011) (reporting the proposed federal legislation "would create the nation's first comprehensive privacy law covering personal-data gathering").
    • (2011) MarketWatch
    • Angwin, J.1
  • 23
    • 49649097066 scopus 로고    scopus 로고
    • POCKET Protection
    • Children's Online Privacy Protection Act of 1998, 15 U.S.C. xx 6501-6506 (COPPA);
    • Children's Online Privacy Protection Act of 1998, 15 U.S.C. xx 6501-6506 (COPPA); Hiller et al., 'POCKET Protection,' 45 American Business Law Journal 417 (2008).
    • (2008) American Business Law Journal , vol.45 , pp. 417
    • Hiller1
  • 25
    • 0004320806 scopus 로고
    • Pub. L. No. 104-191, 110 Stat. (codified, as amended, in 42 U.S. C. x1936 et seq.)
    • Health Insurance Portability and Accountability Act of 1996, Pub. L. No. 104-191, 110 Stat. 1936 (codified, as amended, in 42 U.S. C. x1936 et seq.).
    • (1936) Health Insurance Portability and Accountability Act of 1996
  • 27
    • 13844259700 scopus 로고    scopus 로고
    • 15 U.S.C. x45 (Section 5)
    • Federal Trade Commission Act (FTC Act), 15 U.S.C. x45 (Section 5). Deceptive practices include material misrepresentations or omissions that are likely to mislead reasonable consumers. Unfair practices involve substantial harm to consumers where the harm is not reasonably avoidable by consumers and the benefits of the practices to consumers do not outweigh the harm.
    • Federal Trade Commission Act (FTC Act)
  • 28
    • 77957971111 scopus 로고    scopus 로고
    • 'Profiling the Mobile Customer,' Part i
    • (King. N. & Jessen, P., 'Profiling the Mobile Customer,' Part I,' 26-5 Computer Law & Security Review 455-478 (2010).
    • (2010) Computer Law & Security Review , vol.26 , Issue.5 , pp. 455-478
    • King, N.1    Jessen, P.2
  • 29
    • 84861373407 scopus 로고    scopus 로고
    • In the Matter of BJ's Wholesale Club, Inc., Federal Trade Commission FTC File No. 042 3160 (Sept.) (FTC v. BJ)
    • In the Matter of BJ's Wholesale Club, Inc., Federal Trade Commission, Complaint and Consent Decree, FTC File No. 042 3160 (Sept. 2005) (FTC v. BJ) (addressing the company's failure to adequately secure sensitive personal information which allowed hackers to acquire customers' personal data and make fraudulent credit card charges as an unfair trade practice).
    • (2005) Complaint and Consent Decree
  • 30
    • 84861383325 scopus 로고    scopus 로고
    • note 31
    • FTC v. BJ, note 31, pp. 2-3.
    • FTC V. BJ , pp. 2-3
  • 31
    • 84861413794 scopus 로고    scopus 로고
    • Self-Regulatory Principles for Online Behavioral Advertising
    • Federal Trade Commission February (FTC Guidelines)
    • FTC Guidelines, Federal Trade Commission, 'Self-Regulatory Principles for Online Behavioral Advertising,' pp. 22-23, February 2009 (FTC Guidelines).
    • (2009) FTC Guidelines , pp. 22-23
  • 32
    • 84964917698 scopus 로고    scopus 로고
    • Protecting Consumer Privacy in an Era of Rapid Change, Recommendations for Businesses and Policymakers
    • FTC (Mar.) (FTC Report, March 2012)
    • See also, FTC Report, 'Protecting Consumer Privacy in an Era of Rapid Change, Recommendations for Businesses and Policymakers,' FTC (Mar. 2012) (FTC Report, March 2012).
    • (2012) FTC Report
  • 33
    • 77957954190 scopus 로고    scopus 로고
    • note 33
    • FTC Guidelines, note 33, pp. 43-44.
    • FTC Guidelines , pp. 43-44
  • 34
    • 77957954190 scopus 로고    scopus 로고
    • note 33
    • FTC Guidelines, note 33, pp. 44.
    • FTC Guidelines , pp. 44
  • 35
    • 84861383326 scopus 로고    scopus 로고
    • 15 U.S.C. Section 1691(a)(1)
    • Equal Credit Opportunity Act, 15 U.S.C. Section 1691(a)(1)(2012).
    • (2012) Equal Credit Opportunity Act
  • 37
    • 77952207972 scopus 로고    scopus 로고
    • Sexuality and Transgender Issues in Employment Law
    • At least eighteen states prohibit sexual-orientation discrimination. Martichuski, D., 'Sexuality and Transgender Issues in Employment Law,' 8 Georgetown Journal of Gender and the Law 505, n.81 (2007).
    • (2007) Georgetown Journal of Gender and the Law , vol.8 , Issue.81 , pp. 505
    • Martichuski, D.1
  • 38
    • 84861401912 scopus 로고    scopus 로고
    • Republican Lawmaker Promises New Online Privacy Legislation
    • 4 Mar.
    • See 'Republican Lawmaker Promises New Online Privacy Legislation,' PCWorld (4 Mar. 2011) (designed primarily to address online privacy issues).
    • (2011) PCWorld
  • 41
    • 84883687306 scopus 로고    scopus 로고
    • Data Protection and Cloud Computing under EU Law
    • European Data Protection Supervisor European Parliament (13 Apr.) (Hustinix Speech)
    • The eight requirements to process personal data in the EU are: (1) fair and lawful processing; (2) collection and processing only for a proper purpose; (3) that data be adequate, relevant and not excessive; (4) that data be accurate and up to date; (5) that data be retained no longer than necessary; (6) giving the data subject access to his or her data; (7) keeping data secure; and (8) no transfer of personal data to a country that does not provide an adequate level of privacy and personal data protection. Data Protection Directive, note 21, arts. 6 et seq. See also, Speech, Peter Hustinix, European Data Protection Supervisor, 'Data Protection and Cloud Computing Under EU Law,' Third European Cyber Security Day BSA, European Parliament (13 Apr. 2010) (Hustinix Speech) (commenting that data protection regulation applies to cloud services where they process personal data that fall within the scope of EU jurisdiction "regardless of where the data are processed") (emphasis in original).
    • (2010) Third European Cyber Security Day BSA
    • Hustinix, P.1
  • 42
    • 84861393003 scopus 로고    scopus 로고
    • Euro Regulators Probe Sony Data Breach
    • 29 Apr.
    • Data Protection Directive, note 21, arts. 6(1)(b) and (c), 7, 12, 17. Article 17 requires data controllers to implement appropriate technical and organizational security measures to protect personal data from destruction, loss, alteration, unauthorized disclosure or access and against all other unlawful forms of processing. Such measures must take into account the state of the art, the cost of implementation and ensure a level of security appropriate to the risks represented by the processing and the nature of the data to be protected. Currently, except in the telecommunications sector, the security obligation does not include notifying customers of security breaches. See Olson, P., 'Euro Regulators Probe Sony Data Breach,' Forbes blog (29 Apr. 2011), at: http://blogs.forbes.com.
    • (2011) Forbes Blog
    • Olson, P.1
  • 43
    • 0038087577 scopus 로고    scopus 로고
    • Globalization and Social Protection: The Impact of EU and International Rules in the Ratcheting Up of Privacy Standards
    • Shaffer, G., 'Globalization and Social Protection: The Impact of EU and International Rules in the Ratcheting Up of Privacy Standards,' 25 Yale Journal of International Law 1, pp. 13-16 (2000).
    • (2000) Yale Journal of International Law , vol.25 , Issue.1 , pp. 13-16
    • Shaffer, G.1
  • 46
    • 84861413797 scopus 로고    scopus 로고
    • FT.com (7 Mar.)
    • Prinsley, M., 'Privacy concerns in clouds,' FT.com (7 Mar. 2011) ("processing in 'the cloud' may involve a complex web of parties processing data in a variety of locations around the world"). One challenge of applying the EU's Data Protection Directive to international data transfers in cloud computing is that the current regulation relies on a definition of data transfer from "point to point," while data transfers in cloud computing may be continuous. Hustinix Speech, note 43, p. 4.
    • (2011) Privacy Concerns in Clouds
    • Prinsley, M.1
  • 48
    • 3042749885 scopus 로고    scopus 로고
    • (2nd ed.) (Solove et al.)
    • Solove, D., Rotenberg, M. and Schwartz, P., Information Privacy Law, pp. 933-935 (2nd ed., 2006) (Solove et al.). Exceptions permit export of personal data to processors outside the EEA when the transfer is to a company that has signed the EU/U.S. Safe Harbour Agreement, is pursuant to standard contractual clauses approved by the European Commission or is covered by binding corporate rules.
    • (2006) Information Privacy Law , pp. 933-935
    • Solove, D.1    Rotenberg, M.2    Schwartz, P.3
  • 49
    • 84861401913 scopus 로고    scopus 로고
    • note 8 Prinsley, note 50
    • UK Online Code of Practice, note 8, p. 28; Prinsley, note 50.
    • UK Online Code of Practice , pp. 28
  • 50
    • 84861383328 scopus 로고    scopus 로고
    • Art. 29 Opinion 10/2010, note 6, pp. 21-22
    • Art. 29 Opinion 10/2010, note 6, pp. 21-22.
  • 52
    • 84861393004 scopus 로고    scopus 로고
    • Export Administration Regulations (EARS), U.S. Department of Commerce
    • Federal laws regulating the export of encryption technology for national security reasons are beyond the scope of this article. See, e.g., EAR Controls for Items that Use Encryption, Export Administration Regulations (EARS), U.S. Department of Commerce, at: http://www.bis.doc.gov/encryption/default.htm.
    • EAR Controls for Items That Use Encryption
  • 53
    • 84861351297 scopus 로고    scopus 로고
    • note 12 37, 43, 46
    • Information Privacy, note 12, pp. 32, 37, 43, 46.
    • Information Privacy , pp. 32
  • 54
    • 84861351297 scopus 로고    scopus 로고
    • note 12
    • Information Privacy, note 12, p. 37 (requires administrative, physical and technical safeguards to protect the confidentiality and integrity of PHI).
    • Information Privacy , pp. 37
  • 56
    • 50649098182 scopus 로고    scopus 로고
    • Direct Marketing, Mobile Phones, and Consumer Privacy: Ensuring Adequate Disclosure and Consent Mechanisms for Emerging Mobile Advertising Practices
    • 242 (Exhibit A)
    • Geo-location data currently receives limited protection under laws that limit telephone carriers from disclosing customer proprietary data except in certain circumstances. See King, N., 'Direct Marketing, Mobile Phones, and Consumer Privacy: Ensuring Adequate Disclosure and Consent Mechanisms for Emerging Mobile Advertising Practices,' 60-2 Federal Communications Law Journal, 229, 242 (2008) (Exhibit A).
    • (2008) Federal Communications Law Journal , vol.60 , Issue.2 , pp. 229
    • King, N.1
  • 57
    • 84861351297 scopus 로고    scopus 로고
    • note 12
    • Information Privacy, note 12, pp. 69-70. California was the first state to enact a security breach notification law. Commercial entities that do business in California must notify consumers about the breach of any computer system that contains the unencrypted personal information of California residents. As of the data of this writing, at least 46 of the 50 states have enacted breach notification laws.
    • Information Privacy , pp. 69-70
  • 58
    • 77956216961 scopus 로고    scopus 로고
    • Data Breach: From Notification to Prevention Using PCI DSS
    • Shaw, A., 'Data Breach: From Notification to Prevention Using PCI DSS,' 43 Columbia J. Law & Soc. Problems 517, pp. 519-520 (2010). Proposed federal legislation requiring breach notification has been introduced into Congress that would criminalize intentionally or wilfully concealing a data breach.
    • (2010) Columbia J. Law & Soc. Problems , vol.43 , Issue.517 , pp. 519-520
    • Shaw, A.1
  • 59
    • 84861383330 scopus 로고    scopus 로고
    • Concealing a Data Breach Would Be a Crime under Leahy Bill
    • 7 June
    • Engleman, E., 'Concealing a Data Breach Would Be a Crime Under Leahy Bill,' Bloomberg (7 June 2011);
    • (2011) Bloomberg
    • Engleman, E.1
  • 60
    • 84861413800 scopus 로고    scopus 로고
    • Panel Approves Data-Breach Bills Despite Partisan Rancor
    • 22 Sept.
    • Gruenwald, J., 'Panel Approves Data-Breach Bills Despite Partisan Rancor,' National Journal (22 Sept. 2011) (reporting that the Senate Judiciary Committee has approved three bills aimed at setting national standards for security breaches involving personal data although none have yet come to a vote on the Senate floor).
    • (2011) National Journal
    • Gruenwald, J.1
  • 61
    • 84861413799 scopus 로고    scopus 로고
    • For example, the California Computer Security Act of 2002, defines personal information as an individual's name in combination with their: (1) Social security number; (2) California identification card number; (3) driver's license number; or (4) financial account number or credit or debit card number in combination with any required security code, access code or password that would permit access to an individual's financial account. Information Privacy, note 12, p. 69-70.
    • Information Privacy, Note 12 , pp. 69-70
  • 62
    • 84861351297 scopus 로고    scopus 로고
    • note 12
    • Federal financial regulators have also issued a joint security breach notification guidelines interpreting section 501(b) of the Gramm-Leach-Bliley Act. Information Privacy, note 12, p. 70. Settlement agreements between state government regulators and companies that have been investigated for violating state breach notification laws may require companies to adequately secure sensitive data.
    • Information Privacy , pp. 70
  • 63
    • 84861383329 scopus 로고    scopus 로고
    • States getting tougher on data breaches
    • 1 Apr.
    • Mello, J. P., 'States getting tougher on data breaches,' Government Security News (1 Apr. 2011).
    • (2011) Government Security News
    • Mello, J.P.1
  • 64
    • 84861393006 scopus 로고    scopus 로고
    • Apple Sued for Violating iPhone, iPad Privacy
    • 16 Feb.
    • Davis, W., 'Apple Sued for Violating iPhone, iPad Privacy,' Online Media Daily (16 Feb. 2011) (reporting that Apple has now been sued in four potential class action privacy lawsuits for transmitting the devices' unique identifiers to app developers);
    • (2011) Online Media Daily
    • Davis, W.1
  • 65
    • 84861413798 scopus 로고    scopus 로고
    • Apple Risks Following Google as Europe Leads Privacy Probes
    • 28 Apr.
    • Bedoni, S., 'Apple Risks Following Google as Europe Leads Privacy Probes', Bloomberg (28 Apr. 2011).
    • (2011) Bloomberg
    • Bedoni, S.1
  • 66
    • 84861401915 scopus 로고    scopus 로고
    • Privacy Lawsuit Dismissed Against Apple, Mobile Ad Developers
    • 22 Sept.
    • Absent proof of specific harm to consumers such as losses due to identity theft, consumers who have attempted to challenge the failure of private businesses to protect their sensitive personal information have generally been unsuccessful. Consistent with this view, a federal court recently dismissed a consumer privacy lawsuit brought against Apple and eight mobile ad companies. Despite claims in this lawsuit that defendants were sharing personal information about plaintiffs without their consent, the court ruled dismissal was required because plaintiffs failed to allege any tangible injuries from the resulting tracking. However, the court's order dismissing the lawsuit permits plaintiffs to refile their complaint if they are able to amend it to allege tangible injury. See Davis, W., 'Privacy Lawsuit Dismissed Against Apple, Mobile Ad Developers,' MediaPost (22 Sept. 2011).
    • (2011) MediaPost
    • Davis, W.1
  • 67
    • 84861401917 scopus 로고    scopus 로고
    • Lawsuit targeting RockYou data breach gets green light
    • 18 Apr.
    • See Goodin, D., 'Lawsuit targeting RockYou data breach gets green light,' The Register (18 Apr. 2011) (reporting that a federal judge has refused to dismiss a lawsuit raising claims of negligence, breach of contract, violations of the federal Stored Communications Act and state unfair competition law that was filed against social-media developer RockYou for exposing personal data of 32 million users to a major breach of its site by hackers).
    • (2011) The Register
    • Goodin, D.1
  • 68
    • 77954044387 scopus 로고    scopus 로고
    • Free at What Cost? Cloud Computing Privacy under the Stored Communications Act
    • Lawsuits alleging consumer harm caused by security failures that expose sensitive personal data may include claims of violations of federal laws that protect the privacy of electronic communications. However, these laws need to be updated in order to ensure application to cloud computing contexts. See Robison, W. J., 'Free at What Cost? Cloud Computing Privacy Under the Stored Communications Act,' 98 Georgetown Law Journal, 1195 (2010).
    • (2010) Georgetown Law Journal , vol.98 , pp. 1195
    • Robison, W.J.1
  • 70
    • 84861401916 scopus 로고    scopus 로고
    • In Brief: 'Federal Trade Commission: No need to Keep Information in the U.S
    • 13 May Boyd, note 22, p. 971
    • For example, the Federal Trade Commission has said no U.S. laws restrict financial services firms from sending customer data outside the U.S. for processing. Heller, Michele, In Brief: 'Federal Trade Commission: No need to Keep Information in the U.S.,' American Banker (13 May 2004). But see, Boyd, note 22, p. 971 (cautioning that financial institutions that outsource customer data may be sued under state laws if they invade consumers' basic expectations of privacy).
    • (2004) American Banker
    • Heller, M.1
  • 71
    • 84861393007 scopus 로고    scopus 로고
    • U.S. companies may become members of the U.S.-EU Safe Harbour Agreement in order to be able to lawfully transfer personal data from the EU to the U.S. when transfer of the data would otherwise be prohibited under EU law. See U.S.-EU Safe Harbour Overview, at: http://www.export.gov/safeharbor/eu/eg-main- 018476.asp. Members of the Safe Harbour Agreement must comply with seven privacy principles that include: notice, choice, onward transfer, access, security, data integrity and enforcement ("Principles"). Express, opt in consent is required to process sensitive data. To disclose information to a third-party (onward transfer), organizations must apply the notice and choice principles. Transfers to an agent are permitted if the transferring organization makes sure that the third party subscribes to the Principles or is subject to the EU's Data Protection Directive. Ibid.
    • U.S.-EU Safe Harbour Overview
  • 72
    • 0042181282 scopus 로고    scopus 로고
    • issued by the U.S. Department of Commerce July 21
    • Organizations are advised to treat as sensitive any information received from a third party where the third party treats and identifies it as sensitive. Safe Harbour Privacy Principles, issued by the U.S. Department of Commerce July 21, 2000, at: http://www.export.gov/safeharbor/eu/eg-main-018475.asp.
    • (2000) Safe Harbour Privacy Principles
  • 73
    • 84861393009 scopus 로고    scopus 로고
    • The Digital Agenda: Europe's key driver of growth and innovation
    • (Brussels, Oct. 4)
    • Speech, Neelie Kroes, 'The Digital Agenda: Europe's key driver of growth and innovation,' 2011 Digital Agenda Summit organized by the Lisbon Council, p. 5 (Brussels, Oct. 4, 2011).
    • (2011) 2011 Digital Agenda Summit Organized by the Lisbon Council , pp. 5
    • Kroes, N.1
  • 74
    • 84861401918 scopus 로고    scopus 로고
    • Computerworld.com (12 Apr.)
    • Thibodeau, P., 'Congress urged to leave cloud computing alone,' Computerworld.com (12 Apr. 2011) (experts express worries about how the world perceives U.S. data security law although current data security policies and initiatives, such as the Safe Harbour program, appear to be working for providers and users of cloud-based applications). Cloud providers who sign a Safe Harbour Agreement make a pledge to follow the EU's data protection principles.
    • (2011) Congress Urged to Leave Cloud Computing Alone
    • Thibodeau, P.1
  • 75
    • 79957554283 scopus 로고    scopus 로고
    • U.S. Federal Trade Commission (November) Boyd, note 22
    • See, e.g., 2006 Identity Theft Survey Report, U.S. Federal Trade Commission (November 2007); Boyd, note 22, p. 965 (commenting that most personal data collected by banks and other financial service providers relating to clients is not considered "sensitive" under Article 8(1) of the Directive).
    • (2007) 2006 Identity Theft Survey Report , pp. 965
  • 76
    • 84861393008 scopus 로고    scopus 로고
    • 24 and 25 February
    • Council of the European Union, Council's conclusions on the Communication from the Commission to the European Parliament and the Council e A comprehensive approach on personal data protection in the European Union, 3071st Justice and Home Affairs Council Meeting Brussels, 24 and 25 February 2011. pp. 3-4 (concluding that the Council "expects the special protection of sensitive personal data to remain a core element" of EU data protection).
    • (2011) 3071st Justice and Home Affairs Council Meeting Brussels , pp. 3-4
  • 77
    • 84861383331 scopus 로고    scopus 로고
    • Appendix on Profiling, Electronic Information Privacy Center, Washington, D.C., before the European Committee on Legal Cooperation of the Council of Europe Plenary Meeting - October 11-14 14 Sept.
    • Comments on COE Convention 108, Appendix on Profiling, Electronic Information Privacy Center, Washington, D.C., before the European Committee on Legal Cooperation of the Council of Europe Plenary Meeting - October 11-14, p. 3 (14 Sept. 2010) (sex should be included in definitions of sensitive data to ensure regulation of privacy invasive technologies that target men or women).
    • (2010) Comments on COE Convention 108 , pp. 3
  • 78
    • 84960492449 scopus 로고    scopus 로고
    • Cloud Computing Hits Snag in Europe
    • 19 Sept.
    • O'Brien, K.J., 'Cloud Computing Hits Snag in Europe,' The New York Times (19 Sept. 2010).
    • (2010) The New York Times
    • O'Brien, K.J.1
  • 79
    • 84861413801 scopus 로고    scopus 로고
    • iTnews.com.au (30 Sept.)
    • Brewster, T., 'EU to legislate on cloud security,' iTnews.com.au (30 Sept. 2011) (reporting that one possible result of the ongoing regulatory review and revision of the EU's Data Protection Directive may be a requirement that cloud service providers assume liability for any data breaches or losses that occur in their data centres, so called Binding Safe Processor Rules). Since this paper focuses on the need to protect sensitive data as opposed to who should ultimately be liable for data breaches and the EU's regulatory reform related to data protection legislation is ongoing having produced proposed regulations that have not yet been adopted, this topic is not explored further in this article. It will certainly deserve further research and analysis in the EU's regulatory reform process.
    • (2011) EU to Legislate on Cloud Security
    • Brewster, T.1
  • 81
    • 84861352176 scopus 로고    scopus 로고
    • European Commission, Brussels, COM Art. 9(1) (released 25 Jan. 2012)
    • In its current draft, the proposed reform package expands the special categories of data to include genetic data but does not include other categories of sensitive data that this article recommends be protected as sensitive data. See Proposal of the European Parliament and the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data, General Data Protection Regulation, European Commission, Brussels, COM(2012), Art. 9(1) (released 25 Jan. 2012).
    • (2012) General Data Protection Regulation
  • 83
    • 84861401919 scopus 로고    scopus 로고
    • Art. 29 Opinion 10/2010, note 6
    • Art. 29 Opinion 10/2010, note 6.
  • 84
    • 84861413802 scopus 로고    scopus 로고
    • Simplified filing requirements for non-EU controllers for processing in France of employee and customer data collected outside France
    • Baker & McKenzie (March) (Legal Bytes) (referencing Decision No. 2011-023 by the French Data Protection Authority (CNIL) (16 Feb. 2011))
    • Szuskin, L. & Nakano, S., 'Simplified filing requirements for non-EU controllers for processing in France of employee and customer data collected outside France,' LegalBytes, Baker & McKenzie (March 2011) (Legal Bytes) (referencing Decision No. 2011-023 by the French Data Protection Authority (CNIL) (16 Feb. 2011)).
    • (2011) LegalBytes
    • Szuskin, L.1    Nakano, S.2
  • 85
    • 84861383332 scopus 로고    scopus 로고
    • note 89
    • Legal Bytes, note 89, p.3.
    • Legal Bytes , pp. 3
  • 89
    • 84861365522 scopus 로고    scopus 로고
    • World Privacy Forum (22 Nov.)
    • The Safe Harbour program and other negotiated mechanisms to transfer personal data lawfully from the EU to the U.S. may not be adequate to support the growth of the cloud computing industry. Study, 'The US Department of Commerce and International Privacy Activities: Indifference and Neglect,' World Privacy Forum (22 Nov. 2010).
    • (2010) The US Department of Commerce and International Privacy Activities: Indifference and Neglect


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.