Privacy Ref Blog

Privacy and the Cloud

Cloud computing provides an opportunity for businesses to lower costs and increase their computing infrastructure’s flexibility. When utilizing a cloud service provider for additional storage, computing power, or a full application you should look into the privacy implications as these are multidimensional.

Let’s start with some privacy basics

Two major concerns for privacy can be summarized as “who can access information” and “how the information can be used”. Below are some basic questions to consider when working with a cloud provider that address these items.

What is the cloud provider doing with your information?
Your organization remains responsible for the protection and use of any personal information you collect regardless of where it is held or who holds the data. If you store information in the cloud, is your vendor using it for their own purposes? Are they gathering statistics about your information and using that data for marketing purposes? Is your cloud application vendor doing any passive data collection from your customers? The essential question becomes “does the cloud vendor comply with your privacy policies and notice for the collection, protection, and use of personal information?”

How are other organizations precluded from seeing your information?
Stating the obvious, cloud computing vendors provide shared environments. In addition to shared computing resources and storage this may also imply shared backups, shared operational procedures, and shared support personnel. How has the cloud provider crafted their operational procedures and policies so that your information is not only protected during the normal run of business but during non-standard events? Is there a possibility that your data may be restored to another client’s data space? Could a service person send an email with your information to another client? Any unauthorized access to your information may be considered a data breach even if it was simply human error.

What privacy training have the cloud provider’s employees received?
The performance of any privacy program must rely on an organization’s members to understand how to properly protect information. This raises the question of how the cloud provider’s staff has been trained. Does their training meet your standards? Is there an awareness program in place that supports the training? If there is gap between the vendor’s training and your organization’s requirements, how will that be bridged?

Some privacy legal considerations

There are also legal implications that must be considered when using a cloud provider.

Where is the data is located?
Many jurisdictions have data export laws which require compliance.  For example, if the data subject is in Europe and the data is in the cloud, is the information considered to be exported?

Where is the data is located (Part 2)?
Knowing where a data breach occurs is part of the process of determining what the legal requirements are for a response to that breach. Will your cloud provider be able to tell you where the data breach geographically occurred?

Was your data breached?
If there is a breach of the cloud provider’s systems, how will the provider know what data was accessed? How will you be notified of a breach and in what time frame?  These first two questions are another part of understanding and complying with legal requirements in response to a data breach. If the cloud vendor cannot positively identify the information that was lost in a breach, will you need to notify your customers even though your data may not have been accessed?

Be sure to vet your cloud vendors before engaging their services

I have seen many organizations begin to take advantage of cloud services before the vendor has been fully vetted. This frequently happens when a department other than Information Technology sees an opportunity to get something done quickly and cheaply without having to get IT involved. These departments may not recognize that the risks and potential costs of their selected approach may outweigh the short term benefit they receive.

The items above are a foundation for reviewing a cloud provider. Before moving to a cloud model, a privacy professional should be consulted to confirm that your business may not be inadvertently assuming a high level of risk and potentially be negatively impacted.

  • author's avatar

    By: Bob Siegel

    Bob Siegel, the founder and President of Privacy Ref, Inc., has extensive professional experience in the development and improvement of privacy policies and procedures, the definition of performance metrics to evaluate privacy maturity, and the evaluation of compliance. He utilizes a combination of alignment, adaptability, and accountability strategies to guide organizations in achieving their privacy goals.

    He is a Fellow of Information Privacy (FIP) and a Certified Information Privacy Professional, awarded from the International Association of Privacy Professionals, with concentrations in U.S. private-sector law (CIPP/US), US public sector law (CIPP/G), European law (CIPP/E), and Canadian law (CIPP/C). He is also a Certified Information Privacy Manager (CIPM) and Privacy Technologist (CIPT).

    Siegel is a member of the IAPP faculty, has served on the Certification Advisory Board for the CIPM program the Publications Advisory Board.

    Siegel also writes the blog “Operational Privacy” on

  • author's avatar

  • author's avatar

    Preparing your customer-facing staff
    Automation for Privacy
    Don’t Forget Basic Communication
    Top 6 Things For GDPR Procrastinators To Do
    Using GDPR as a framework for your privacy program (even if you are not in scope)

    See all this author’s posts

Privacy Ref provides consulting and assessment services to build and improve organizational privacy programs. For more information call Privacy Ref at (888) 470-1528 or email us at

Posted on June 5, 2013 by Bob Siegel
Tags: , , , ,

« »

No Responses

Comments are closed.

« »

Subscribe to our mailing list

Please fill out the form below.


Want to find out more?

Simply go to the contact page, fill out the form, and someone from Privacy Ref will be in touch with you. You can also send an email to or call (888) 470-1528.


April 16, 2018

IAPP Training Classes
Privacy Ref is proud to announce that we are an official training partner of the IAPP. You now have the opportunity to learn from one of our knowledgeable privacy professionals using the most respected training content in the industry. The robust interactive training offered, aids in the understanding of critical privacy concepts. The contents of the courses are integral to obtaining your privacy certifications and to educate your new team. Learn more here.

Latest Blog Posts

November 12, 2018

My path towards privacy
My path towards a career in the privacy field was a circuitous route. As a perennially engaged Political Organizer and activist, information privacy and data management would not have been the most obvious path for my next endeavor. However, after serving on a campaign that featured the most famous political data breach in history, privacy and the importance of data management came crashing into my life. Continue reading this post...

November 2, 2018

A few weeks ago, I made it to Austin, TX for the Privacy Security and Risk Conference being held by the IAPP. As always, it was a great conference with pros and those who have only just begun as privacy professionals. One of the most interesting aspects of the conference was the focus on the newest US based privacy regulation, the California Consumer Protection Act. While not being in California, it was obviously the center of the conversation as many eyed this upcoming regulation as the next possible GDPR. Continue reading this post...

Other Recent Posts