CCSK

Course
Time
9 hours 29 minutes
Difficulty
Intermediate
CEU/CPE
10

Video Transcription

00:01
Welcome back in this module, we're gonna talk about legal issues, contracts and electronic discovery.
00:09
Specifically, we're going to take a look at the legal considerations for data in the cloud. Will talk about the contracts with Cloud service providers in a bit more detail.
00:18
And we're going to talk about Elektronik discovery, which is a major part of modern day litigation.
00:26
The material in this module is not going to give you a law degree, nor will it make you an expert.
00:32
We will talk about legal implications to agree that you need to understand them for the CCS k exam. But by no means will this be a replacement for true legal counsel.
00:42
And keep in mind that laws and regulations affecting the cloud change frequently different regions and jurisdictions change at different paces.
00:50
Some of the regulations discussed may have changed even between the time of recording this
00:55
and when you're actually watching this,
00:57
uh, as it turns out, I'm recording it during the shelter in place of Cove in 19. And in the United States, there is a lot of talk about how do we deal with that? And how can we track immunity and vaccines and so forth. That's also brought up a real need for
01:14
more details around a federal level
01:18
privacy law within the United States. And at the time of recording this, there is no federal level for those laws.
01:26
So just that alone is a great example of why this stuff is moving fast.
01:30
And in the remainder of this video, we're gonna talk about data privacy basics.
01:37
Specifically, I'm going to introduce you to data privacy concepts and terminology.
01:44
Previously, laws define numerous obligations such as confidentiality and security obligations that a custodian or controller provider must provide by
01:55
the U in the US have regulations and and they break down and those specific roles that are involved in data and processing data,
02:05
we're going to go through the roles. They're often called by different names in different regions and different privacy regulations. And the nuances and legal definitions and details of those may vary. But here's a summary of those roles, at least at a level of detail. Good enough to get you through the exam. We start with the data controller.
02:25
This is the entity company.
02:28
Typically, that has the primary relationship with the consumer. Sometimes this is called the data Custodian as well.
02:35
Then you have the data subject. This is the consumer itself, the individual or the person that the data pertains to also referred to as the end user.
02:46
And then finally, we have the data processor. This is the third party entrusted by the data controller to process the data,
02:53
also referred to as the provider.
02:57
Knowing the three major roles When we're looking at data, let's talk about some common themes in privacy law throughout the Globe. Thes privacy laws. They really aren't new. They've been built over years and are really now being adjusted to clarify, because the specific impacts that technology has. And
03:16
we really want to increase the rigour of enforcement of these privacy laws
03:21
because the power that technology brings, for example, big data, big data mining how you can quickly and easily track millions of data points millions of individuals with modern technology. These are things that you really couldn't do back in the late sixties and seventies.
03:38
But frankly, a lot of the privacy principles in these laws
03:42
were established in the Fair Information Act of the late sixties and seventies, and they are ultimately intended to protect the individuals,
03:52
the responsibilities of the different roles we discussed in the previous slide. The controller, the subject, the processor.
03:59
They have certain obligations under the different laws. The specifics will vary by individual regulation, but overall, here's some of the obligations.
04:08
Data controller is required to ensure data processor safeguards data and can be held liable. The data controller themselves could be held liable if they are giving data to a data processor. And that data processor is not doing what they're supposed to be doing. They're not safe guarding the data or they're misusing the data.
04:27
In the last module, we talked about Facebook in Cambridge. Analytica,
04:30
in this case, Facebook was for most part, the data controller and Cambridge Analytica was the data processor. And as we saw in that example, and indeed the data controller, Facebook was held liable for the way that the data processor Cambridge Analytica decided to use the information that Facebook had
04:49
continuing on. The data subject
04:51
must consent to the data controllers collection and use intentions.
04:56
You have to tell the consumer Here's what I'm going to use your data. Four. You have to be clear, concise, specific, and you can't then at a later point, decide to use that data for additional things without obtaining additional consents from those individuals.
05:12
Data controllers and processors must adopt security measures to ensure protection off an individual's privacy.
05:18
So this can include things like anonymous ation taking general data, specific names of individuals, Social Security numbers, physical addresses and scrubbing them out for different purposes to provide additional analysis. It does happen that there are data breaches.
05:38
And so a lot of these laws actually
05:40
require that those data breaches be reported by the data controller to certain entities. Some laws require that the data subjects themselves be made aware of it. Some laws require that government agencies and specific regions be made aware of the data breaches.
05:57
And again, the specific regulation is going to dictate who you need to report it to
06:00
just understand that if something goes wrong, there is a legal obligation to let somebody else no outside of your own organization, don't try to cover up the data breach like uber did in late 2019.
06:15
So Cloud really breaks a lot of geographic boundaries. It's not always clear where physically are the servers and services being used running,
06:26
but the data itself is often bound to geographical boundaries. And if you're going to transfer data between borders of two different regions to different countries, let's say the Europe and United States or, let's say, outside of China, there are often in common that there are laws in the different countries
06:45
that disallow
06:46
moving the data transfer. If you're taking it from one country, which has say, very strict data loss and you move it into a region or an area that has less protections and less stringent sees around how that data is managed and it really makes sense, they don't want it to get out of their hands and
07:03
going to an area where
07:06
the data is less protected because there's a reason that that particular region decided to have regulations that are really protecting that data. And this last point really piggybacks on the transfer in that
07:19
there are situations where they say no, you actually cannot transfer. In fact, we need to make sure that the data itself physically resides within the physical territory.
07:30
And as we'll see later in our overview of the different regional laws, Russia is very strict about this and so is China.
07:36
Even though there are common themes that we just discussed,
07:41
it really does come down to specific regulations. So how do you determine which particular privacy laws are applicable to your situation, your company and your use of the cloud?
07:51
Well, here are some questions that will impact the answer to that
07:56
first and foremost. Where's your business located? What is the country? That region, the state that it is headquartered in? It resides in.
08:03
And then where is the cloud provided themselves located? Where? Their headquarters,
08:07
Where is the data subject located? The people that your collecting the data around where they physically located. Also, where there's citizenships In a world where we have a lot of individuals with dual citizenships and even multiple citizenships, this could be a very tricky question toe look at.
08:24
And then finally, where are the providers? Physical equipment?
08:28
We have major cloud providers, Amazon Web services. Microsoft is there and Google,
08:35
but they have physical data, so locations all across the globe. And that's going to impact where you store the data and the data about which data subjects can reside in these different regions.
08:46
When you operate across multiple regions and in transact with users throughout the globe. You need to ensure compliance with the applicability regulations. If your cloud provider this needs you, make sure your different locations meet requirements and you identify the controls. You have to address the different privacy of machines
09:03
as a cloud user. You need to understand what the provider will and will not be doing for you. So you know the gaps that you need to feel. This all dovetails nicely with shared responsibilities. Model. We've hit on so many times in this course. Just keep in mind the cloud user will be ultimately accountable for adhering to the regulations.
09:22
In the coming lessons, we will provide an overview of different laws and regional regulations. But for this video we covered
09:30
data privacy terminology, Data controller, data processor data subject. What are those? We talked about common themes and data privacy laws. And then we also reviewed key questions and factors that are going to influence which data privacy laws are applicable to your scenario.

Up Next

CCSK

This course prepares you to take the CCSK certification by covering material included in the exam. It explains how the exam can be taken and how CCSK certification process works.

Instructed By

Instructor Profile Image
James Leone
Cloud, IoT & DevSecOps at Abbott
Instructor