SlideShare uma empresa Scribd logo
1 de 30
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
1
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  Quick Wording Overview
}  Quick Technology Overview
}  Privacy Stakes
}  Legal & Regulations Concerns
}  Q&A
2
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
3
“Asking Google to educate consumers about privacy
is like asking the fox to teach the chickens how to
ensure the security of their coop”
Consumer Watchdog, March 2013
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  Cloud
}  CSP – Cloud Service Provider
}  SOA (Service Oriented Architecture), WOA (Web Oriented Architecture)
}  Web Services, XML
}  SLA – Service Level Agreement
}  BYOD (« Bring Your Own Device »)
}  Virtualization, Virtual Machines
}  Scalability, Resource Sharing, Metering
}  Security / Safety/ Availability / Resilience / Privacy
}  CIA (Confidentiality Integrity and Availability)
}  Encryption, PKI
}  Auditability
}  Compliance (PCI-DSS, HIPAA, ISO/IEC 27001)
4
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
5
Mainframe
Client-Server
Web
SOA
Cloud
1980	
  
1990	
  
2000	
  
2010	
  
1970	
  
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  Many Services : CPUs, Storage, Middleware,
Backup, Translation, Payroll…
}  On demand service: just a few minutes needed
so that resources may be rent and available
}  Wide access: no bandwidth limits (basically…)
}  Metering service: pay as you consume, cost-
effectiveness, no resources waste
}  Effective scalability: Quick, cost-effective and
efficient down- or up-sizing
}  Resource-sharing: Cost reduction
6
Source:	
  NIST	
  
Examples
}  Microsoft Office 365
}  Salesforce.com
}  Google Apps
}  Microsoft Azure
}  Amazon EC2, S3
}  Google App Engine
}  Microsoft Azure
}  Amazon EC2
}  Oracle IaaS
7
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
8
Legacy
Infrastructure
(as a Service)
Platform
(as a Service)
Storage
Servers
Network
OS
Middleware
Virtualization
Data
Applications
Runtime
Storage
Servers
Network
OS
Middleware
Virtualization
Data
Applications
Runtime
CoudProvider-managed
CoudProvider-managed
Customer-managed
Customer-managed
Storage
Servers
Network
OS
Middleware
Virtualization
Applications
Runtime
Data
Software
(as a Service)
CoudProvider-managed
Storage
Servers
Network
OS
Middleware
Virtualization
Applications
Runtime
Data
Customer-managed
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  Private Cloud:
◦  Infrastructure Owned or Rented by Customer
◦  Internal or External to Customer Premises
}  Community Cloud:
◦  Shared Infrastructure by a specific business or academics
community or by a State
◦  Internal or External to community members Premises
}  Public Cloud:
◦  Infrastructure owned by the Cloud Service Provider
◦  Rented by Customer to the Provider
}  Hybrid Cloud:
◦  Mixed Cloud Services with data exchange and applications
portability
9
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
0.0%$
10.0%$
20.0%$
30.0%$
40.0%$
50.0%$
60.0%$
70.0%$
80.0%$
Security$
Perform
ance$Availability$
Hard$to$Integrate$
Hard$to$Custom
ize$
CostFEffecIve?$
Back$inFhouse?$
Regulatory$Com
pliance$
Source:(IDC(2008(Summer(
10
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  More than 60% of cloud users think the above
types of information are too risky to be
implemented into the cloud:
◦  Intellectual Properties
◦  Financial Information
◦  Health Information
◦  Employee Records
}  As amazing as it may sound, only 39% are
skeptic about storing ‘credit card
information’ (data collected before Sony Network hack)
11
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  Security is not a competitive advantage
}  It’s customer’s responsability to secure the cloud
}  Applications have to be evaluated for security
threats prior to deployment in the cloud
}  Less than 10% of Opex & Capex is dedicated to
security
}  Customers are interested by the cloud because of
lower cost and faster deployment not security nor
regulation compliance like privacy
12
Most often used Less often used
}  Firewalls
}  Anti-virus and anti-
malware
}  Encryption for data in
motion
}  Patch management
}  Log management
}  Single sign-on
}  Data loss prevention
}  Correlation or event
management
}  Access governance
systems
}  Encryption for wireless
communication
13
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
14
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  80% of survey respondents access cloud
applications for business purposes via their
smartphones
}  71% do so via a tablet
}  and 81% use a non-company computer
}  71% admitted to accessing cloud applications,
such as Dropbox or Google Drive, that have
not been sanctioned by their IT department. 


OneLogin – 2013 Survey
15
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  Provisioning, Directory Synchronization & Identity
Management Issues at large scale
}  Certificate and Key Revocation
}  Single Point of Failure : Connection between The Cloud
Provider and the Customer
}  Full-Private Encryption (aka data non ‘readable’ by Cloud
Provider) is VERY difficult (homomorphic encryption…)
}  Cloud Usage by Hackers and Cybercrime (Amazon Case) !
◦  Password Cracking by brute force
◦  DDoS Attacks
◦  Captcha Cracking
◦  IP Blacklisting
16
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  Lifecycle of Cloud Technologies
}  Lifecycle of Cloud Provider
}  Contract lock-in, destroying or sanitizing information at the
end of the service relationship
}  Encryption (who owns/manages the keys ?)
}  Compliance Management
}  Legal Issues (foreign court orders or subpoenas, foreign
agencies warrants)
}  Data Retention
}  Multiple-Countries Location

(Sub-contracting to low-cost countries)
}  Data and Goodwill Ownership
}  Sweet Target for Hackers and Cybercrime
}  Massive Crash due to cyber-attacks or one major failure
17
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  An average cloud customer typically cannot visit a
cloud data centre and perform an audit on all of
their infrastructure components across multiple
data centres
}  The audit itself could also violate the privacy of
other cloud customers, and thus the EDPD, by
exposing and identifying private data, as the
auditors would have to access the entire cloud
infrastructure
}  Virtualization (cross-hardware, cross-data centre,
cross-countries) makes audit and privacy
regulations compliance a nightmare
18
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  Search – Yahoo or Google keep your data for 18
months !
}  Webmail – Google goes through every word of every
Gmail that’s sent or received to sell targeted ads.
}  Google Docs
}  Street View (Wifi traffic and pwd scans… hum ?)
}  Conference Management Systems - very used in
academic research community with document
sharing (papers, reviews, patent drafts)
FREE SERVICE DOES NOT EXIST !
19
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  The data controller (CIL) differs upon cloud model:
◦  Private cloud: If the organisation is using a private cloud there
can only be one data controller as they have control over how
the data is processed in the cloud.
◦  Community cloud: The likelihood of more than one data
controller accessing the cloud service is high. The cloud
provider is the data processor and there are many cloud
customers/organisations sharing data through the cloud. In
this circumstance the roles and shared responsibilities of each
data controller need to be clear.
◦  Public cloud: The role of the data controller/organisation
becomes more complicated as the organisation will have very
little control over the operations of the cloud provider.

BUT the organisation is still responsible for the data they
choose to process in this way and remain the data controller.
20
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  Data Assessment and Categorization (minimum on
a yearly base)

Not all data needs to be in the cloud
}  Privacy Assessment (customers, business partners
and employees data)
}  Cloud users awareness about data in the Cloud
}  Monitoring and Auditing (minimum on a yearly
base)

Confidence and Compliance are built on Control
}  WRITTEN CONTRACT (prohibit online license
agreements which dynamic evolve and change for
‘enhancing customer experience’…)
21
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  The Foreign Intelligence Surveillance Act of 1978 prescribes
procedures for requesting judicial authorization for electronic
surveillance and physical search of persons engaged in
espionage or international terrorism against the United States
on behalf of a foreign power.
}  The Stored Communications Act of 1986 is a law that
addresses voluntary and compelled disclosure of "stored wire
and electronic communications and transactional records"
held by third-party internet service providers (ISPs)
}  Patriot Act - Signed by President George W. Bush on October
26, 200, renew by President Bush on March 9, 2006
}  The Foreign Intelligence Surveillance Act Amendment Act
(FISAA - 2008) allows US authorities to spy on cloud data that
includes Amazon Cloud Drive, Apple iCloud and Google Drive.
22
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  The US law allows American agencies to access all private
information stored with firms within Washington’s
jurisdiction, without a warrant, if the information is felt to be
in the US interests.
}  That means any company with a presence in the US and
regardless of where the data is stored or the existence of any
conflicting obligations under the laws where the data is
located
}  Some US-based cloud services and hosting companies might
not be able to comply with the EDPD : customers whose
private data should have been disclosed under FISA won’t be
always notified (which is not compliant with EC directives)
23
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  The famous 95/46/EC Directive
}  The European Data Protection Directive
requires companies to inform users when
they disclose personal information
}  There are clauses in the Directive that allow
data to be stored outside of the EU
}  Evolution in progress since 2012 ; but strong
lobbying against data breach notification
enforcement and data aggregation processing
restrictions
24
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  The U.S.-EU Safe Harbor Framework provides guidance for
U.S. organizations on how to provide adequate protection for
personal data from the EU as required by the European
Union's Directive on Data Protection.
}  Participation is voluntary
}  Based on principles agreed by Directive 95/46 (October,
1995)
}  Five major points :
◦  Data owner has been informed of data processing and transfer
◦  Data owner can revoke the rights he granted.
◦  Explicit agreement
◦  Access and change right (aka droit d’accès et de rectification)
◦  Data security (confidentiality, integrity, availability)
25
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  Payment card security standards body PCI Security Standards
Council (PCI SSC) has released new guidance for merchants
using cloud-based systems for customer payment data
}  “Many merchants mistakenly believe that if they outsource
everything to a cloud service provider, much of of the
responsibility goes away for being PCI compliant – 
unfortunately, that’s simply not the case,” Bob Russo, general
manager at the PCI Security Standards Council “A merchant
needs to ensure that a cloud services provider is PCI-
compliant not just for its own piece, but for the entire
spectrum, including what that provider is specifically doing
for the merchant.”
26
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  TFTP (Terrorist Financing Tracking System)/
SWIFT (28 Juin 2010)
}  Europol in charge of
}  Audit conducted by Europol in Nov 2010,
with warning report issued in March 2011
}  Too generic requests are made by US (Dpt of
Treasury) but acknowledged by Europol
}  So generic, it’s impossible to confirm these
requests are compliant with European Data
Protection Directives
27
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  Nova Scotia Case - As part of a criminal
prosecution in US, the Court requested that
the US subsidiary disclosed documents stored
in Cayman Islands.
}  Valetta Case – Australian subsidiary of this
Maltin bank was summoned by australian
Court to disclose documents stored in Malta
28
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
29
Source:	
  h-p://geekandpoke.typepad.com/	
  
Master Droit Innovation Communication Culture - Franck Franchin - © 2013
}  Foreign Intelligence Surveillance Act (http://www.gpo.gov/fdsys/pkg/BILLS-110hr6304enr/
pdf/BILLS-110hr6304enr.pdf)
}  Patriot Act (http://www.justice.gov/archive/ll/highlights.htm)
}  European Data Protection Directive (http://eur-lex.europa.eu/smartapi/cgi/sga_doc?
smartapi!celexplus!prod!CELEXnumdoc&lg=FR&numdoc=31995L0046)
}  Safe Harbor (https://safeharbor.export.gov/list.aspx)
}  European Parliament – “Fighting Cyber crime and protecting privacy in the
cloud” (
http://www.europarl.europa.eu/committees/en/studiesdownload.html?
languageDocument=EN&file=79050)
}  CSA (Cloud Security Alliance) – “Privacy Level Agreement – PLA” (http://)
}  Cloud Computing in Higher Education and Research Institutions and the USA
Patriot Act (http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2181534)
30

Mais conteúdo relacionado

Mais procurados

India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law Priyanka Aash
 
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...David Rozas
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingAbzetdin Adamov
 
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Ted Myerson
 
Copyright Protection in the Internet
Copyright Protection in the InternetCopyright Protection in the Internet
Copyright Protection in the Internetipoque
 
Legal ethics & cloud computing
Legal ethics & cloud computingLegal ethics & cloud computing
Legal ethics & cloud computingPatrick Fowler
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachSLA-Ready Network
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsUlf Mattsson
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityPrateek Panda
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionUlf Mattsson
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy  preserving public auditing for shared data in the cloudOruta privacy  preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudLeMeniz Infotech
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...Ulf Mattsson
 
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10Ulf Mattsson
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020Ulf Mattsson
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 

Mais procurados (20)

India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...
When Ostrom Meets Blockchain: Exploring the Potentials of Blockchain for Comm...
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision Making
 
GDPR - 5 Months On!
GDPR - 5 Months On!GDPR - 5 Months On!
GDPR - 5 Months On!
 
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
 
Copyright Protection in the Internet
Copyright Protection in the InternetCopyright Protection in the Internet
Copyright Protection in the Internet
 
Legal ethics & cloud computing
Legal ethics & cloud computingLegal ethics & cloud computing
Legal ethics & cloud computing
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy  preserving public auditing for shared data in the cloudOruta privacy  preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
 
Public wifi
Public wifiPublic wifi
Public wifi
 
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10Bridging the gap between privacy and big data   Ulf Mattsson - Protegrity Sep 10
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
NIST article I wrote
NIST article I wroteNIST article I wrote
NIST article I wrote
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 

Destaque

sorbonne entreprenariat
sorbonne entreprenariat sorbonne entreprenariat
sorbonne entreprenariat Sacha Berenfus
 
Les agrégats de la comptabilité national
Les agrégats de la comptabilité nationalLes agrégats de la comptabilité national
Les agrégats de la comptabilité nationalzaidmeziani
 
Comptabilité nationale pratiques
Comptabilité nationale pratiquesComptabilité nationale pratiques
Comptabilité nationale pratiquesAbdelhak Essoulahi
 
Cours comptabilite-gestion ahsan cours et exercices
Cours comptabilite-gestion ahsan cours et exercicesCours comptabilite-gestion ahsan cours et exercices
Cours comptabilite-gestion ahsan cours et exercicesnezha errechydy
 
Recherche cours de comptabilite analytique
Recherche cours de comptabilite analytiqueRecherche cours de comptabilite analytique
Recherche cours de comptabilite analytiquehassan1488
 
Mécanismes de transmission de la politique monétaire.
Mécanismes de transmission de la politique monétaire.Mécanismes de transmission de la politique monétaire.
Mécanismes de transmission de la politique monétaire.bouchra elabbadi
 
Cours CyberSécurité - Infrastructures Critiques
Cours CyberSécurité - Infrastructures CritiquesCours CyberSécurité - Infrastructures Critiques
Cours CyberSécurité - Infrastructures CritiquesFranck Franchin
 
les Formules de calcul des agrégats de la comptabilité nationale
les Formules de calcul des agrégats de la comptabilité nationaleles Formules de calcul des agrégats de la comptabilité nationale
les Formules de calcul des agrégats de la comptabilité nationalecours fsjes
 
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorismeCours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorismeFranck Franchin
 
Intelligence Artificielle - Algorithmes de recherche
Intelligence Artificielle - Algorithmes de rechercheIntelligence Artificielle - Algorithmes de recherche
Intelligence Artificielle - Algorithmes de rechercheMohamed Heny SELMI
 
Technique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSATechnique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSAHouda Elmoutaoukil
 
Cours de-fiscalite-avec-exercices-corriges
Cours de-fiscalite-avec-exercices-corrigesCours de-fiscalite-avec-exercices-corriges
Cours de-fiscalite-avec-exercices-corrigesHabiba MEZYANI
 
Initiation à la comptabilité bancaire
Initiation à la comptabilité bancaireInitiation à la comptabilité bancaire
Initiation à la comptabilité bancaireActions-Finance
 
Comptabilite-analytique
 Comptabilite-analytique Comptabilite-analytique
Comptabilite-analytiqueMejdoubi Amal
 
Cours de finances_publiques-1
Cours de finances_publiques-1Cours de finances_publiques-1
Cours de finances_publiques-1rajaa224
 

Destaque (20)

Biometrics - Basics
Biometrics - BasicsBiometrics - Basics
Biometrics - Basics
 
Presentation deek-ige-original
Presentation   deek-ige-originalPresentation   deek-ige-original
Presentation deek-ige-original
 
sorbonne entreprenariat
sorbonne entreprenariat sorbonne entreprenariat
sorbonne entreprenariat
 
Les agrégats de la comptabilité national
Les agrégats de la comptabilité nationalLes agrégats de la comptabilité national
Les agrégats de la comptabilité national
 
Comptabilité nationale pratiques
Comptabilité nationale pratiquesComptabilité nationale pratiques
Comptabilité nationale pratiques
 
Cours comptabilite-gestion ahsan cours et exercices
Cours comptabilite-gestion ahsan cours et exercicesCours comptabilite-gestion ahsan cours et exercices
Cours comptabilite-gestion ahsan cours et exercices
 
Recherche cours de comptabilite analytique
Recherche cours de comptabilite analytiqueRecherche cours de comptabilite analytique
Recherche cours de comptabilite analytique
 
Mécanismes de transmission de la politique monétaire.
Mécanismes de transmission de la politique monétaire.Mécanismes de transmission de la politique monétaire.
Mécanismes de transmission de la politique monétaire.
 
Cryptographie quantique
Cryptographie quantiqueCryptographie quantique
Cryptographie quantique
 
Cours CyberSécurité - Infrastructures Critiques
Cours CyberSécurité - Infrastructures CritiquesCours CyberSécurité - Infrastructures Critiques
Cours CyberSécurité - Infrastructures Critiques
 
les Formules de calcul des agrégats de la comptabilité nationale
les Formules de calcul des agrégats de la comptabilité nationaleles Formules de calcul des agrégats de la comptabilité nationale
les Formules de calcul des agrégats de la comptabilité nationale
 
Monnaie
MonnaieMonnaie
Monnaie
 
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorismeCours CyberSécurité - CyberGuerre & CyberTerrorisme
Cours CyberSécurité - CyberGuerre & CyberTerrorisme
 
Speak English
Speak EnglishSpeak English
Speak English
 
Intelligence Artificielle - Algorithmes de recherche
Intelligence Artificielle - Algorithmes de rechercheIntelligence Artificielle - Algorithmes de recherche
Intelligence Artificielle - Algorithmes de recherche
 
Technique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSATechnique de Cryptographie AES, DES et RSA
Technique de Cryptographie AES, DES et RSA
 
Cours de-fiscalite-avec-exercices-corriges
Cours de-fiscalite-avec-exercices-corrigesCours de-fiscalite-avec-exercices-corriges
Cours de-fiscalite-avec-exercices-corriges
 
Initiation à la comptabilité bancaire
Initiation à la comptabilité bancaireInitiation à la comptabilité bancaire
Initiation à la comptabilité bancaire
 
Comptabilite-analytique
 Comptabilite-analytique Comptabilite-analytique
Comptabilite-analytique
 
Cours de finances_publiques-1
Cours de finances_publiques-1Cours de finances_publiques-1
Cours de finances_publiques-1
 

Semelhante a Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013

Iia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V FinalIia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V FinalDanny Miller
 
Security in cloud (and grid) computing Overview
Security in cloud  (and grid) computing OverviewSecurity in cloud  (and grid) computing Overview
Security in cloud (and grid) computing OverviewTawanda Douglas Muringani
 
W3 presentation gfii 6 dec 2013
W3   presentation gfii 6 dec 2013W3   presentation gfii 6 dec 2013
W3 presentation gfii 6 dec 2013Bernard Odier
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 EuroCloud
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Mark Skilton
 
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...Danny Miller
 
Cloud Computing introduction by saransh
Cloud Computing introduction by saranshCloud Computing introduction by saransh
Cloud Computing introduction by saranshSaransh Agarwal
 
ACS cloud discussion paper
ACS cloud discussion paperACS cloud discussion paper
ACS cloud discussion paperRoland Padilla
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentationAdrian Hall
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 

Semelhante a Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013 (20)

Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
Iia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V FinalIia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V Final
 
Security in cloud (and grid) computing Overview
Security in cloud  (and grid) computing OverviewSecurity in cloud  (and grid) computing Overview
Security in cloud (and grid) computing Overview
 
W3 presentation gfii 6 dec 2013
W3   presentation gfii 6 dec 2013W3   presentation gfii 6 dec 2013
W3 presentation gfii 6 dec 2013
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...Identity privacy and data protection in the cloud – what is being done is it ...
Identity privacy and data protection in the cloud – what is being done is it ...
 
CLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEWCLOUD STEGANOGRAPHY- A REVIEW
CLOUD STEGANOGRAPHY- A REVIEW
 
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
 
Cloud Computing introduction by saransh
Cloud Computing introduction by saranshCloud Computing introduction by saransh
Cloud Computing introduction by saransh
 
ACS cloud discussion paper
ACS cloud discussion paperACS cloud discussion paper
ACS cloud discussion paper
 
B017660813
B017660813B017660813
B017660813
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Introduction au Cloud computing
Introduction au Cloud computingIntroduction au Cloud computing
Introduction au Cloud computing
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentation
 
Cloud Computing in Laymen terms
Cloud Computing in Laymen termsCloud Computing in Laymen terms
Cloud Computing in Laymen terms
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 

Último

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 

Último (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 

Cloud & Privacy - Lecture at University Paris Sud - March 18th, 2013

  • 1. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 1
  • 2. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  Quick Wording Overview }  Quick Technology Overview }  Privacy Stakes }  Legal & Regulations Concerns }  Q&A 2
  • 3. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 3 “Asking Google to educate consumers about privacy is like asking the fox to teach the chickens how to ensure the security of their coop” Consumer Watchdog, March 2013
  • 4. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  Cloud }  CSP – Cloud Service Provider }  SOA (Service Oriented Architecture), WOA (Web Oriented Architecture) }  Web Services, XML }  SLA – Service Level Agreement }  BYOD (« Bring Your Own Device ») }  Virtualization, Virtual Machines }  Scalability, Resource Sharing, Metering }  Security / Safety/ Availability / Resilience / Privacy }  CIA (Confidentiality Integrity and Availability) }  Encryption, PKI }  Auditability }  Compliance (PCI-DSS, HIPAA, ISO/IEC 27001) 4
  • 5. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 5 Mainframe Client-Server Web SOA Cloud 1980   1990   2000   2010   1970  
  • 6. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  Many Services : CPUs, Storage, Middleware, Backup, Translation, Payroll… }  On demand service: just a few minutes needed so that resources may be rent and available }  Wide access: no bandwidth limits (basically…) }  Metering service: pay as you consume, cost- effectiveness, no resources waste }  Effective scalability: Quick, cost-effective and efficient down- or up-sizing }  Resource-sharing: Cost reduction 6 Source:  NIST  
  • 7. Examples }  Microsoft Office 365 }  Salesforce.com }  Google Apps }  Microsoft Azure }  Amazon EC2, S3 }  Google App Engine }  Microsoft Azure }  Amazon EC2 }  Oracle IaaS 7
  • 8. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 8 Legacy Infrastructure (as a Service) Platform (as a Service) Storage Servers Network OS Middleware Virtualization Data Applications Runtime Storage Servers Network OS Middleware Virtualization Data Applications Runtime CoudProvider-managed CoudProvider-managed Customer-managed Customer-managed Storage Servers Network OS Middleware Virtualization Applications Runtime Data Software (as a Service) CoudProvider-managed Storage Servers Network OS Middleware Virtualization Applications Runtime Data Customer-managed
  • 9. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  Private Cloud: ◦  Infrastructure Owned or Rented by Customer ◦  Internal or External to Customer Premises }  Community Cloud: ◦  Shared Infrastructure by a specific business or academics community or by a State ◦  Internal or External to community members Premises }  Public Cloud: ◦  Infrastructure owned by the Cloud Service Provider ◦  Rented by Customer to the Provider }  Hybrid Cloud: ◦  Mixed Cloud Services with data exchange and applications portability 9
  • 10. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 0.0%$ 10.0%$ 20.0%$ 30.0%$ 40.0%$ 50.0%$ 60.0%$ 70.0%$ 80.0%$ Security$ Perform ance$Availability$ Hard$to$Integrate$ Hard$to$Custom ize$ CostFEffecIve?$ Back$inFhouse?$ Regulatory$Com pliance$ Source:(IDC(2008(Summer( 10
  • 11. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  More than 60% of cloud users think the above types of information are too risky to be implemented into the cloud: ◦  Intellectual Properties ◦  Financial Information ◦  Health Information ◦  Employee Records }  As amazing as it may sound, only 39% are skeptic about storing ‘credit card information’ (data collected before Sony Network hack) 11
  • 12. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  Security is not a competitive advantage }  It’s customer’s responsability to secure the cloud }  Applications have to be evaluated for security threats prior to deployment in the cloud }  Less than 10% of Opex & Capex is dedicated to security }  Customers are interested by the cloud because of lower cost and faster deployment not security nor regulation compliance like privacy 12
  • 13. Most often used Less often used }  Firewalls }  Anti-virus and anti- malware }  Encryption for data in motion }  Patch management }  Log management }  Single sign-on }  Data loss prevention }  Correlation or event management }  Access governance systems }  Encryption for wireless communication 13
  • 14. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 14
  • 15. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  80% of survey respondents access cloud applications for business purposes via their smartphones }  71% do so via a tablet }  and 81% use a non-company computer }  71% admitted to accessing cloud applications, such as Dropbox or Google Drive, that have not been sanctioned by their IT department.  
 OneLogin – 2013 Survey 15
  • 16. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  Provisioning, Directory Synchronization & Identity Management Issues at large scale }  Certificate and Key Revocation }  Single Point of Failure : Connection between The Cloud Provider and the Customer }  Full-Private Encryption (aka data non ‘readable’ by Cloud Provider) is VERY difficult (homomorphic encryption…) }  Cloud Usage by Hackers and Cybercrime (Amazon Case) ! ◦  Password Cracking by brute force ◦  DDoS Attacks ◦  Captcha Cracking ◦  IP Blacklisting 16
  • 17. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  Lifecycle of Cloud Technologies }  Lifecycle of Cloud Provider }  Contract lock-in, destroying or sanitizing information at the end of the service relationship }  Encryption (who owns/manages the keys ?) }  Compliance Management }  Legal Issues (foreign court orders or subpoenas, foreign agencies warrants) }  Data Retention }  Multiple-Countries Location
 (Sub-contracting to low-cost countries) }  Data and Goodwill Ownership }  Sweet Target for Hackers and Cybercrime }  Massive Crash due to cyber-attacks or one major failure 17
  • 18. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  An average cloud customer typically cannot visit a cloud data centre and perform an audit on all of their infrastructure components across multiple data centres }  The audit itself could also violate the privacy of other cloud customers, and thus the EDPD, by exposing and identifying private data, as the auditors would have to access the entire cloud infrastructure }  Virtualization (cross-hardware, cross-data centre, cross-countries) makes audit and privacy regulations compliance a nightmare 18
  • 19. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  Search – Yahoo or Google keep your data for 18 months ! }  Webmail – Google goes through every word of every Gmail that’s sent or received to sell targeted ads. }  Google Docs }  Street View (Wifi traffic and pwd scans… hum ?) }  Conference Management Systems - very used in academic research community with document sharing (papers, reviews, patent drafts) FREE SERVICE DOES NOT EXIST ! 19
  • 20. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  The data controller (CIL) differs upon cloud model: ◦  Private cloud: If the organisation is using a private cloud there can only be one data controller as they have control over how the data is processed in the cloud. ◦  Community cloud: The likelihood of more than one data controller accessing the cloud service is high. The cloud provider is the data processor and there are many cloud customers/organisations sharing data through the cloud. In this circumstance the roles and shared responsibilities of each data controller need to be clear. ◦  Public cloud: The role of the data controller/organisation becomes more complicated as the organisation will have very little control over the operations of the cloud provider.
 BUT the organisation is still responsible for the data they choose to process in this way and remain the data controller. 20
  • 21. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  Data Assessment and Categorization (minimum on a yearly base)
 Not all data needs to be in the cloud }  Privacy Assessment (customers, business partners and employees data) }  Cloud users awareness about data in the Cloud }  Monitoring and Auditing (minimum on a yearly base)
 Confidence and Compliance are built on Control }  WRITTEN CONTRACT (prohibit online license agreements which dynamic evolve and change for ‘enhancing customer experience’…) 21
  • 22. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  The Foreign Intelligence Surveillance Act of 1978 prescribes procedures for requesting judicial authorization for electronic surveillance and physical search of persons engaged in espionage or international terrorism against the United States on behalf of a foreign power. }  The Stored Communications Act of 1986 is a law that addresses voluntary and compelled disclosure of "stored wire and electronic communications and transactional records" held by third-party internet service providers (ISPs) }  Patriot Act - Signed by President George W. Bush on October 26, 200, renew by President Bush on March 9, 2006 }  The Foreign Intelligence Surveillance Act Amendment Act (FISAA - 2008) allows US authorities to spy on cloud data that includes Amazon Cloud Drive, Apple iCloud and Google Drive. 22
  • 23. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  The US law allows American agencies to access all private information stored with firms within Washington’s jurisdiction, without a warrant, if the information is felt to be in the US interests. }  That means any company with a presence in the US and regardless of where the data is stored or the existence of any conflicting obligations under the laws where the data is located }  Some US-based cloud services and hosting companies might not be able to comply with the EDPD : customers whose private data should have been disclosed under FISA won’t be always notified (which is not compliant with EC directives) 23
  • 24. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  The famous 95/46/EC Directive }  The European Data Protection Directive requires companies to inform users when they disclose personal information }  There are clauses in the Directive that allow data to be stored outside of the EU }  Evolution in progress since 2012 ; but strong lobbying against data breach notification enforcement and data aggregation processing restrictions 24
  • 25. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  The U.S.-EU Safe Harbor Framework provides guidance for U.S. organizations on how to provide adequate protection for personal data from the EU as required by the European Union's Directive on Data Protection. }  Participation is voluntary }  Based on principles agreed by Directive 95/46 (October, 1995) }  Five major points : ◦  Data owner has been informed of data processing and transfer ◦  Data owner can revoke the rights he granted. ◦  Explicit agreement ◦  Access and change right (aka droit d’accès et de rectification) ◦  Data security (confidentiality, integrity, availability) 25
  • 26. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  Payment card security standards body PCI Security Standards Council (PCI SSC) has released new guidance for merchants using cloud-based systems for customer payment data }  “Many merchants mistakenly believe that if they outsource everything to a cloud service provider, much of of the responsibility goes away for being PCI compliant –  unfortunately, that’s simply not the case,” Bob Russo, general manager at the PCI Security Standards Council “A merchant needs to ensure that a cloud services provider is PCI- compliant not just for its own piece, but for the entire spectrum, including what that provider is specifically doing for the merchant.” 26
  • 27. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  TFTP (Terrorist Financing Tracking System)/ SWIFT (28 Juin 2010) }  Europol in charge of }  Audit conducted by Europol in Nov 2010, with warning report issued in March 2011 }  Too generic requests are made by US (Dpt of Treasury) but acknowledged by Europol }  So generic, it’s impossible to confirm these requests are compliant with European Data Protection Directives 27
  • 28. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  Nova Scotia Case - As part of a criminal prosecution in US, the Court requested that the US subsidiary disclosed documents stored in Cayman Islands. }  Valetta Case – Australian subsidiary of this Maltin bank was summoned by australian Court to disclose documents stored in Malta 28
  • 29. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 29 Source:  h-p://geekandpoke.typepad.com/  
  • 30. Master Droit Innovation Communication Culture - Franck Franchin - © 2013 }  Foreign Intelligence Surveillance Act (http://www.gpo.gov/fdsys/pkg/BILLS-110hr6304enr/ pdf/BILLS-110hr6304enr.pdf) }  Patriot Act (http://www.justice.gov/archive/ll/highlights.htm) }  European Data Protection Directive (http://eur-lex.europa.eu/smartapi/cgi/sga_doc? smartapi!celexplus!prod!CELEXnumdoc&lg=FR&numdoc=31995L0046) }  Safe Harbor (https://safeharbor.export.gov/list.aspx) }  European Parliament – “Fighting Cyber crime and protecting privacy in the cloud” ( http://www.europarl.europa.eu/committees/en/studiesdownload.html? languageDocument=EN&file=79050) }  CSA (Cloud Security Alliance) – “Privacy Level Agreement – PLA” (http://) }  Cloud Computing in Higher Education and Research Institutions and the USA Patriot Act (http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2181534) 30