Table of Contents Table of Contents
Previous Page  111 / 192 Next Page
Information
Show Menu
Previous Page 111 / 192 Next Page
Page Background

Situation

Appropriate Steps

Cloud

computing

• conduct a privacy impact assessment before

entrusting a cloud service provider to handle

personal data that may be sensitive or

confidential

• check with the cloud service providers the

locations/jurisdictions where the data will be

stored

• specify the jurisdictions where personal data

will be stored so that data subjects can

ascertain the level of privacy protection that

the jurisdiction will offer and under what

circumstances law enforcement agencies will

be allowed access to the stored data

• check if the cloud service provider will

subcontract the service to other contractors

and find out whether the controls are

comparable to the level imposed on the cloud

service provider

• find out and/or specify the contractual

remedies in the event of data breach by the

cloud service provider and its subcontractors

• ask the cloud service provider to provide

customised service with security measures

commensurate with the sensitivity of the

personal data entrusted

• find out if there are any independent reviews,

audits and certifications to show the privacy

compliance standard of the cloud service

providers, and understand the scope and

limitation of such reviews, audits and

certifications

• impose contractual duty on cloud service

providers (and their subcontractors where

applicable) to notify data users of any data

breach

• impose contractual duty on cloud service

providers to timely erase personal data and/or

return the personal data to the data users upon

completion/termination of contract

3

“Cloud computing” is generally referred to as a pool of on-demand, shared and configurable computing resources that

can be rapidly provided to customers with minimal management efforts or service provider interaction. The cost model

is usually based on usage and rental, without any capital outlay.