7.4. Contract issues

Security conditions 1/7

Challenge

Challenge: signing a contract for e-services in cloud

  • many non-standard problems due to cloud technology
  • very risky from the legal point of view not only technical security risk

Empty promises

  • "reasonable security for your data"
    • open to considerable interpretation and argument, reasonable = low cost for the vendor
  • "industry security standard"
    • what standard? the vendors are likely to indicate irrelevant standards standards often describe the solutions that have already been broken cloud technology is developing so fast that the standards are likely to describe outdated technology (to process of issuing a standard takes a couple of years!)
  • "state-of-the-art security solutions"
    • effectively: this is an excuse for installing insecure solutions (there is nothing better)
    • getting rid of responsibility (we did everything possible, this is you that has taken the risk!)

Security conditions - recommendations 2/7

Necessary elements of a contract

  • "reasonable security for your data"
    • contract must be based on a formal document formalizing the values protected, risk analysis and conditions sufficient to protect the values according to the risks
    • Common Criteria documents may apply   link to CC  
  • "industry security standard"
    • a standard is a double edge sword - it may prohibit some secure solutions. Use standards mainly for ensuring compatibility.
  • "state-of-the-art security solutions"
    • instead of an obligation stating properties of the system at some moment, the service provider should be responsible for any security breaches whenever a flaw becomes known

Third party security control 3/7

Security audits and certification

  • independent security control should be a part of the contract
    • no control and cost optimization \( \Rightarrow \) security flaws
  • obligations regarding audits and certification serve as alibi for decision makers signing a contract
    • however if the control procedures cannot be technically effective, then the decision makers can be accused anyway
  KK Art. 266. 1.    KK Art. 18. 3. 

Runtime security events 4/7

What to do with security relevant events?

  • state in the contract that this is a problem of service provider?
    • No. It can be treated as gross negligence from the legal point of view
  • whom to report? The end users only too?
    • recommendation: an obligation to inform every potential victim should be the vendor's responsibility
see similar obligations: (personal data protection, overview)

e-discovery 5/7

Non-standard access to data

  • the contract describes the services needed now. Is it enough?
    • NO. The user may be trapped into a solution not allowing any extensions for future needs But how to predict the future needs? the future is unpredictable!
  • Can anything help to achieve flexibility?
    • Yes. As much information about the internal organization and architecture of the vendor's solution. White box architectures bring more hope than black box ones.

Free tools for e-discovery

limited resources

Data location 6/7

Requirements for data location

  • cloud technology does not determine explicitly data location, so should we care?
    • YES. Many legal obligations in diverse regulations. e.g. personal data and their export to abroad (see personal data protection subsection)
  • criminal law: crime against information protection   read more 

Contract 7/7

Responsibility for the end-users

  • due to cloud specifics the users are less controlled and may behave in a malicious way or just witlessly, especially when security is concerned
  • who will be responsible for your employees or customers?
  • providers may try to write some statements into the contract instead of installing technical solutions preventing or minimizing consequences,   read more 
  • does the contract oblige you to inform the cloud provider to inform about security accidents/problems and inappropriate actions of end users?   read more 

Unauthorized use, inappropriate use

in case of a public cloud you might be affected by actions of other cloud systems and their users

  • the service provider may try to limit his responsibility for actions of other customers
  • ... instead of strict separation of their access possibilities

Interrupting service

Is it allowed to stop temporarily the service due to important reasons such as security problems?   fact 

Terminating service

You have to be prepared to:

  • going out of business by the cloud provider
  • terminating the contract due to business motivation
      fact 1    fact 2 

\( \Rightarrow \) obligations in the contract for intermediate period and continuity or a shadow cloud by another provider as a backup copy

Jurisdiction

Which country law applies? it is easy to be trapped if the reference is to the legal system of a third country.
Problems:

  • continental versus common law   fact 
  • differences between EU countries (despite harmonization of legal rules)

EU Expert group

Expert Group on Cloud Computing Contracts set up in 2013 by European Commission.

  • The Expert Group was established to assist the Commission in identifying safe and fair contract terms and conditions for cloud computing services for consumers and small firms.
    The group shall take account of existing best market practices in terms and conditions in cloud computing contracts and the protection of individuals with regard to the processing of personal data and on the free movement of such data.




Projekt Cloud Computing – nowe technologie w ofercie dydaktycznej Politechniki Wrocławskiej (UDA.POKL.04.03.00-00-135/12)jest realizowany w ramach Programu Operacyjnego Kapitał Ludzki, Priorytet IV. Szkolnictwo wyższe i nauka, Działanie 4.3. Wzmocnienie potencjału dydaktycznego uczelni w obszarach kluczowych w kontekście celów Strategii Europa 2020, współfinansowanego ze środków Europejskiego Funduszu Społecznego i budżetu Państwa