A Board and Executive Officers’ Guide
Technical, legal and risk governance issues
around data hosting and jurisdiction.

Data Sovereignty
and the Cloud

$37
billion
in 2013

88%
88% of organisations have at
least one data breach each year.

The Australian e-commerce market
continues to grow; increasing to
over $37 billion in 2013.

9%

36%
&

Ponemon reveals that corporate
security professionals are involved in
the vetting process for cloud providers
an alarming 9% of the time.

between

31%

62%

20%

Between 36% and 62% say that their data
breaches involved mistakes by third parties
such as outsourcers and cloud providers.

31% of companies spend
20% budget on cloud

Ten commandments
I

II

III

IV

V

NATIONAL LAW

LOCAL LAW

INTERNATIONAL
LAW

INSURANCE

DATA PROFILE

Thou shalt check
whether your cloud
service provider has
extended its insurance
policy so that it also
includes cover for your
data; not all clouds are
created equal.

Thou must
acknowledge it is
not the application,
but the data which
needs to be profiled
and classified so a
policy can automate
its residence within a
hybrid cloud.

Thou must be aware
that information stored
in a cloud environment
can conceivably be
subject to more than
one nation’s laws.

Thou must remember
that the onus is on the
business, to ensure
the cloud provider
used complies with
local laws.

Thou must
remember, by nature
a cloud computing
environment
invites international
considerations.

VI

VII

VIII

IX

X

DATA
SOVEREIGNTY

PRIVACY RULES
APPLICATION

INTERNATIONAL
TREATIES

FOREIGN
VENDORS

PRIVACY ACT

Thou shalt investigate
and formulate criteria
that determine what
information should be
housed in Australia
or exclusively under
Australian control.

Thou shalt investigate
whether ‘personal
information’ really
needs to be stored
in identifiable form,
since permanent
de-identification can
mean privacy rules no
longer apply.

Thou should know
the US has entered
into mutual legal
assistance treaties
with over 50 countries.

Thou must be aware a
foreign owned vendor
may be subject to
their country’s laws,
even if they operate
in Australia.

Thou should note the
ramifications of the
revised Privacy Act
coming into effect
in 2014, where it is
not stipulated that
foreign providers must
comply with Australian
Privacy Law.

What to look for when
selecting a cloud provider
Financial Condition
Disaster Recovery Plans
Insurance Coverage
Methods for Preventing Unauthorised Access
or Introduction of Malicious Code
Experience with the Customer’s Systems
Infrastructure
Breach Notification Protocols
Data Centre Locations
Security Procedures
Record of Reliability
Similar Practices
Hiring Practices

More Related Content

PPT
Mang vpn
PPTX
What is AWS?
PPTX
Cloud 101 - What is the Cloud?
PPTX
Microsoft azure
PPT
Cloud computing
PPTX
Cloud computing
PDF
AWS
DOC
cloud computing documentation
Mang vpn
What is AWS?
Cloud 101 - What is the Cloud?
Microsoft azure
Cloud computing
Cloud computing
AWS
cloud computing documentation

What's hot (20)

PDF
Báo cáo phân tích thiết kế mạng
PDF
Cloud storage
PDF
Migrating to Cloud - A Step by Step
PPTX
Cloud Computing & CloudStack Open Source
PPTX
Windows Azure Virtual Machines
PDF
Kubernetes Concepts And Architecture Powerpoint Presentation Slides
PPTX
Cloud computing
PPTX
All about paas_iaas_saas_29.01.2015
PDF
AWS 101: Introduction to AWS
PPTX
5 BENEFITS OF HYBRID CLOUD
PPTX
Understanding cloud with Google Cloud Platform
PPTX
Cloud Computing and Microsoft Azure
PPSX
Cloud computing
PPTX
21- Self-Hosted Integration Runtime in Azure Data Factory.pptx
PDF
Presentation điện toán đám mây
PPTX
Cluster computing
PDF
Serverless Architecture GCP In Production
PDF
Cloud Deployment Report
PPTX
Introduction to Cloud Data Center and Network Issues
PPTX
Why to Cloud Native
Báo cáo phân tích thiết kế mạng
Cloud storage
Migrating to Cloud - A Step by Step
Cloud Computing & CloudStack Open Source
Windows Azure Virtual Machines
Kubernetes Concepts And Architecture Powerpoint Presentation Slides
Cloud computing
All about paas_iaas_saas_29.01.2015
AWS 101: Introduction to AWS
5 BENEFITS OF HYBRID CLOUD
Understanding cloud with Google Cloud Platform
Cloud Computing and Microsoft Azure
Cloud computing
21- Self-Hosted Integration Runtime in Azure Data Factory.pptx
Presentation điện toán đám mây
Cluster computing
Serverless Architecture GCP In Production
Cloud Deployment Report
Introduction to Cloud Data Center and Network Issues
Why to Cloud Native
Ad

Similar to Data Sovereignty and the Cloud (20)

PDF
Securing data in the cloud: A challenge for UK Law Firms
PPT
FTC Protecting Info A Guide For Business Powerpoint
PPT
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
PDF
Infographic : What's going to change with the GDPR (2018)
PPT
Cutting To The Chase: Cloud From A Customers Perspective
PDF
Cloud security - Publication
PDF
Regulatory Changes and Data Privacy in 2024.pdf
PDF
Are you prepared for information compliance
PDF
The Hidden Dangers of Foreign Ips, Why Data Sovereignty Matters Now More Than...
PDF
The Hidden Dangers of Foreign Ips, Why Data Sovereignty Matters Now More Than...
PPT
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
PPTX
Advanced PII / PI data discovery and data protection
PDF
DATA SAFEGUARD INC.- WHITE PAPER
PPTX
EU GDPR - 12 Steps To Compliance
PPT
Contracting in the Cloud by Tammy Bortz
PDF
DATA Working Group - Consumer Best Practices
PDF
Security, GDRP, and IT outsourcing: How to get it right
PDF
Master Data in the Cloud: 5 Security Fundamentals
PPTX
Cybersecurity and Data Privacy Whistleblower Protections
PDF
Enterprise Ready for Amazon Web Services
Securing data in the cloud: A challenge for UK Law Firms
FTC Protecting Info A Guide For Business Powerpoint
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
Infographic : What's going to change with the GDPR (2018)
Cutting To The Chase: Cloud From A Customers Perspective
Cloud security - Publication
Regulatory Changes and Data Privacy in 2024.pdf
Are you prepared for information compliance
The Hidden Dangers of Foreign Ips, Why Data Sovereignty Matters Now More Than...
The Hidden Dangers of Foreign Ips, Why Data Sovereignty Matters Now More Than...
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Advanced PII / PI data discovery and data protection
DATA SAFEGUARD INC.- WHITE PAPER
EU GDPR - 12 Steps To Compliance
Contracting in the Cloud by Tammy Bortz
DATA Working Group - Consumer Best Practices
Security, GDRP, and IT outsourcing: How to get it right
Master Data in the Cloud: 5 Security Fundamentals
Cybersecurity and Data Privacy Whistleblower Protections
Enterprise Ready for Amazon Web Services
Ad

Recently uploaded (20)

PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
SaaS reusability assessment using machine learning techniques
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Training Program for knowledge in solar cell and solar industry
Co-training pseudo-labeling for text classification with support vector machi...
Comparative analysis of machine learning models for fake news detection in so...
NewMind AI Weekly Chronicles – August ’25 Week IV
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
SGT Report The Beast Plan and Cyberphysical Systems of Control
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
future_of_ai_comprehensive_20250822032121.pptx
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
Rapid Prototyping: A lecture on prototyping techniques for interface design
SaaS reusability assessment using machine learning techniques
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Data Virtualization in Action: Scaling APIs and Apps with FME
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf

Data Sovereignty and the Cloud

  • 1. A Board and Executive Officers’ Guide Technical, legal and risk governance issues around data hosting and jurisdiction. Data Sovereignty and the Cloud $37 billion in 2013 88% 88% of organisations have at least one data breach each year. The Australian e-commerce market continues to grow; increasing to over $37 billion in 2013. 9% 36% & Ponemon reveals that corporate security professionals are involved in the vetting process for cloud providers an alarming 9% of the time. between 31% 62% 20% Between 36% and 62% say that their data breaches involved mistakes by third parties such as outsourcers and cloud providers. 31% of companies spend 20% budget on cloud Ten commandments I II III IV V NATIONAL LAW LOCAL LAW INTERNATIONAL LAW INSURANCE DATA PROFILE Thou shalt check whether your cloud service provider has extended its insurance policy so that it also includes cover for your data; not all clouds are created equal. Thou must acknowledge it is not the application, but the data which needs to be profiled and classified so a policy can automate its residence within a hybrid cloud. Thou must be aware that information stored in a cloud environment can conceivably be subject to more than one nation’s laws. Thou must remember that the onus is on the business, to ensure the cloud provider used complies with local laws. Thou must remember, by nature a cloud computing environment invites international considerations. VI VII VIII IX X DATA SOVEREIGNTY PRIVACY RULES APPLICATION INTERNATIONAL TREATIES FOREIGN VENDORS PRIVACY ACT Thou shalt investigate and formulate criteria that determine what information should be housed in Australia or exclusively under Australian control. Thou shalt investigate whether ‘personal information’ really needs to be stored in identifiable form, since permanent de-identification can mean privacy rules no longer apply. Thou should know the US has entered into mutual legal assistance treaties with over 50 countries. Thou must be aware a foreign owned vendor may be subject to their country’s laws, even if they operate in Australia. Thou should note the ramifications of the revised Privacy Act coming into effect in 2014, where it is not stipulated that foreign providers must comply with Australian Privacy Law. What to look for when selecting a cloud provider Financial Condition Disaster Recovery Plans Insurance Coverage Methods for Preventing Unauthorised Access or Introduction of Malicious Code Experience with the Customer’s Systems Infrastructure Breach Notification Protocols Data Centre Locations Security Procedures Record of Reliability Similar Practices Hiring Practices