Revision of 11 November 2009

Introduction

Cloud computing is a vague term typically used to refer to a technical arrangement under which users store their data on remote servers under the control of other parties, and rely on software applications stored and perhaps executed elsewhere, rather than on their own computers. The term encompasses a variety of services, which are variously of long standing (including email), long-promised (including ‘software as a service’), andrelatively new.

There are many potential benefits with such arrangements. Forexample:

  • The user can access the same set of applications, and the same data, regardless of location, and regardless of which hardware they use (such as computers, PDAs and mobile phones, including both their own hardware and devices borrowed from other individuals and organisations)
  • Several users can access and share the same applications and data, which assists in collaborative work
  • Backup and recovery is delegated to a service-provider, which presumably enhances its reliability
  • Licensing of software and third-party data can be simplified
  • Complex tasks can be performed on relatively small devices by depending on more powerful remote servers

At the same time, cloud computing is associated with severe risks in the areas of service and data integrity, consumer rights, security and privacy. ThisPolicy Statement addresses only the APF’s area of competency, privacy.

Key Concerns

The Australian Privacy Foundation has serious concerns about cloud computing:

  • Cloud Computing is an immature and obscure technology with unknown risks. This meansthat:
    • providers of cloud computing products:
      • must undertake a Privacy Impact Assessment (PIA) before launching their product
      • must ensure that users of their products have easy access to clear and comprehensive information about the privacy and security risks involved in using the product
      • must ensure that users of their products can keep control over the use and disclosure of their personal information, including through accessible and clear privacy options
    • user organisations must undertake a PIA before adopting cloud computing techniques in relation to personal data, and must not use such services unless they can ensure that privacy and security risks are satisfactorily addressed, and privacy laws are complied with
    • individuals using cloud computing products must ensure they are aware of the privacy and security risks associated with using the product, and take those risks into account when deciding whether to use it
  • In many models of cloud computing, data may be moved outside Australia to other countries resulting in a significant loss of privacy protections. In such cases:
    • providers of cloud computing products
      • must inform users of the arrangements in relation to transmission and storage of data, prior to the commencement of the service
      • must ensure that security and privacy are appropriately protected, and privacy laws complied with
      • in the case of cloud computing schemes targeted at Australians, must allow the user the choice of having personal data stored in Australia only
    • user organisations must ensure that privacy and security risks are satisfactorily addressed, and privacy laws complied with, and hence must not implement cloud computing techniques where the provider is unable to preclude transmission or storage in jurisdictions that do not have equivalent privacy laws
    • individual users of cloud computing products must carefully assess whether the use of the product justifies the risk of losing the privacy protection afforded under Australian law
  • User organisations considering the use of cloud computing techniques for personal data must take full responsibility for ensuring that the service-provider:
    • applies appropriate security measures to the transmission and storage of the data – taking into account the fact that cloud computing products represent ‘honey-pots’ of data that inevitably attract hackers
    • does not use or disclose the data, other than as authorised by the organisation or required by law
  • Individual users of cloud computing products must appreciate that:
    • network-connection may not be reliable
    • access to the service may not be reliable
    • data flows may be subject to interception, and the service-provider may fail to provide security for data transmission commensurate with its sensitivity
    • the remote data storage may be subject to unauthorised accesses – by insiders, and because cloud computing products represent ‘honey pots’ of data that inevitably attract hackers – and the service-provider may fail to provide security for data storage commensurate with its sensitivity
    • the service-provider may block access to or use of the data (e.g. because of a dispute over payment)
    • the service-provider may use the data for their own purposes
    • the service-provider may disclose the data
    • the service-provider may lose the data
    • the service-provider may not support extraction or transfer of the data in a format suitable to the user
  • Regulatory agencies must take proactive steps to investigate and assess the security and privacy risks of using cloud computing, and to educate the public about these risks

Conclusions

While cloud computing has potentially valuable applications, it also gives rise to serious security and privacy risks. It is crucially importantthat:

  • providers of cloud computing products act responsibly
  • organisational users of cloud computing take full responsibility for protection of personal data
  • individual users of cloud computing products be aware of the risks involved
  • regulatory agencies take prompt steps to ensure appropriate, but not unduly intrusive or expensive, regulation of the technologies and practices underlying cloud computing

Resources

Cavoukian A. (2009) ‘Privacy in the clouds: A white paper on privacy and digital identity’ Information and Privacy Commissioner ofOntario, 2009

EPIC (2009) ‘Resources on Cloud Computing’ ElectronicPrivacy Information Center, Washington DC, 2009

Robert Gellman (2009) ‘Cloud Computing and Privacy’ WorldPrivacy Forum [an industry assocation], 2009

Leslie Harris (2009) ‘Perils in the Privacy Cloud’ ABCNews, 15 Sep 2009

Rosalie Marshall (2008) ‘Experts urge caution on cloud computing’ SecureComputing Magazine, 14 October 2008

Mather T., Kumaraswamy S. & Latif S. (2009) ‘Cloud Security and Privacy:An Enterprise Perspective on Risks and Compliance ‘ O’Reilly Media, 2009

MS (2009a) ‘Securing Microsoft’s Cloud’ Microsoft, May 2009

MS (2009b) ‘Privacy in the Cloud Computing Era – A Microsoft Perspective’Microsoft, November 2009