0%

Book Description

Applying the Data Protection Act to the Cloud The UK’s Data Protection Act 1998 (DPA) applies to the whole lifecycle of information, from its original collection to its final destruction. Failure to comply with the DPA’s eight principles could lead to claims for compensation from affected individuals and financial penalties of up to £500,000 from the Information Commissioner’s Office, not to mention negative publicity and reputational damage. An expert introduction More than 85% of businesses now take advantage of Cloud computing, but Cloud computing does not sit easily with the DPA. Data Protection and the Cloud addresses that issue, providing an expert introduction to the legal and practical data protection risks involved in using Cloud services. Data Protection and the Cloud highlights the risks an organization’s use of the Cloud might generate, and offers the kind of remedial measures that might be taken to mitigate those risks. Topics covered include: Protecting the confidentiality, integrity, and accessibility of personal data Data protection responsibilities The data controller/data processor relationship How to choose Cloud providers Cloud security – including two-factor authentication, data classification, and segmentation The increased vulnerability of data in transit The problem of BYOD (bring your own device) Data transfer abroad, US Safe Harbor, and EU legislation Relevant legislation, frameworks, and guidance, including: the EU General Data Protection Regulation Cloud computing standards the international information security standard, ISO 27001 the UK Government’s Cyber Essentials scheme and security framework CESG’s Cloud security management principles guidance from the Information Commissioner’s Office and the Open Web Application Security Project (OWASP) Mitigate the security risks Mitigating security risks requires a range of combined measures to be used to provide end-to-end security. Moving to the Cloud does not solve security problems, it just adds another element that must be addressed. Data Protection and the Cloud provides information on how to do so while meeting the DPA’s eight principles. About the author With a background in IT focussed on CRM and other information management applications, Paul Ticher has worked on data protection for over 20 years. He is now a well-known consultant on the topic, mainly to non-profit organizations , and specialises in work with charities and voluntary organizations . Paul is the author of the standard work Data Protection for Voluntary Organisations (now in its third edition) as well as materials for ITGP and other publishers. He also carries out data protection reviews and delivers training and webinars on the topic. Learn how to move to the Cloud and still meet the DPA’s principles – buy this book today!

Table of Contents

  1. Cover
  2. Title
  3. Copyright
  4. Contents
  5. Introduction
  6. Chapter 1: Background – The Data Protection Principles
    1. Data protection principles
  7. Chapter 2: The Data Controller/Data Processor Relationship
    1. Data Controller/Data Processor contracts
  8. Chapter 3: Security (Seventh Data Protection Principle)
    1. Confidentiality, integrity and availability
    2. Data in transit and at rest
    3. Security in the cloud
  9. Chapter 4: Mitigating Security Risks in the Cloud
    1. Cyber Essentials
    2. Access controls
    3. Other guidance and recommendations
  10. Chapter 5: Transfers Abroad (Eighth Data Protection Principle)
    1. Safe Harbor
  11. Chapter 6: Other Data Protection Principles
    1. First Data Protection Principle (Fairness, Transparency and Choice)
    2. Second Data Protection Principle (Specified and limited purposes)
    3. Third Data Protection Principle (Adequate, Relevant and not Excessive)
    4. Fourth Data Protection Principle (Accuracy)
    5. Fifth Data Protection Principle (Limited retention)
    6. Sixth Data Protection Principle (Data Subject rights)
  12. Chapter 7: Other legal and technical implications for cloud contracts
    1. Overriding jurisdictions
    2. Responding to breaches
  13. Chapter 8: Enforcement
  14. Chapter 9: The proposed new EU Regulation and other measures
  15. Chapter 10: Checklist
  16. References
  17. ITG Resources
3.22.249.158