Don’t Miss IAPP Webinar on Operating the U.S. Cloud Under Schrems
Learn how Statutory Pseudonymization can support technical controls that enable customers to improve the predictability of operations by enforcing the security of data when in use - under the shared responsibility model[1] - to help ensure that cloud use complies with requirements and applicable laws and regulations for:
?- Lawfulness of Processing
- Breach Resistant Processing
- Data Supply Chain Immunity
Benefit from hearing different perspectives from Cynthia O'Donoghue,?Alex van der Wolk,?Magali Feys?and?Gary LaFever on the following issues related to Operating the U.S. Cloud Under Schrems:?
The demand for technical controls that help to protect EU personal data when in use and prevent misuse in U.S.-operated Cloud does not originate from any one group. Rather, the growing demand comes from at least four groups, and the confluence of the interests of these different groups makes the current situation irreversible. The common theme across the interests, and perspectives of these groups is that technological controls are now critically important. These groups comprise the following:
CJEU Schrems II Decision
The processing of EU personal data in U.S. operated Clouds requires compliance with Schrems II requirements promulgated by the CJEU and the EDPB, including the use of technical controls as supplementary measures when organisational and contractual supplementary measures cannot prevent surveillance by third-country governments. These obligations extend to onward transfers and processing by sub-processors, with respect to which the EDPB specifically highlighted concerns since “a large variety of computing solutions may imply the transfer of personal data to a third country (e.g., for storage or maintenance purposes).”
?US Cloud Act of 2018
In addition, a 26 July 2022 Dutch Ministry of Justice and Security (NCSC) legal memorandum stresses that the reach of government surveillance extends to data processed internationally by sub-contractors and cloud processors. Global enterprises that leverage non-EEA (e.g., U.S.) managed infrastructure (e.g., public cloud, multiparty data sharing and analytics) to process EU personal data will be subject to similar scrutiny.
?GDPR Pseudonymisation: EDPB and EDPS Recognition
?In addition to the EDPB recommending GDPR-compliant Pseudonymisation as a technical supplemental measures for international data transfers, the heightened EU GDPR requirements of pseudonymisation have been recognised by the EDPS as a means of enabling the lawful transfer of personal data to third countries not offering an equivalent level of protection. As noted by European Data Protection Supervisor, Wojciech Wiewiórowski, in an EDPS webinar titled Pseudonymous Data: Processing Personal Data While Mitigating Risks:
“Our legal data protection rules in the European Union and particularly GDPR itself considered pseudonymisation as a sort of model of all risk mitigating measures. This comes only after the first of all obligations, if you do not need the personal data do not process them. But if you need the personal data, then GDPR refers to pseudonymisation when it takes exemplifying the appropriate safeguards in many circumstances.”
[1] See https://cloudsecurityalliance.org/blog/2020/08/26/shared-responsibility-model-explained/