SlideShare une entreprise Scribd logo
1  sur  12
Martin Dubois, LL.B., CISSP
Principal Information Security Analyst
Oracle Corporation
ON SE TOURNE MAINTENANT VERS L’OFFRE “CLOUD”.
TRÈS POPULAIRE.
TYPIQUEMENT DU SAAS (SOFTWARE AS A SERVICE).
EXCLUANT LE PAAS (PLATFORM AS A SERVICE).
SCENARIO DE TRAVAIL = UNE RELATION TRIPARTITE
ENTRE UN INDIVIDU (DATA SUBJECT), UN TIERS
RECEVANT L’INFORMATION DE L’INDIVIDU ET
L’EXPLOITANT (LE CLIENT) ET LE FOURNISSEUR DE
SERVICE (CLOUD SERVICE PROVIDER).
SCÉNARIO IMPLIQUANT L’EXTERNALISATION DE
DONNÉES PERSONNELLES.


PRINCIPALE PROBLÉMATIQUE PROPRE AUX RISQUES
JURIDIQUES ET RÉGLEMENTAIRES LORS DE
L’ENTREPOSAGE DANS UN ENVIRONNEMENT
NUAGIQUE (EXTERNALISATION D’UN SERVICE
LOCAL VERS UN SERVICE NUAGIQUE) =

TRANSLATION DE CERTAINES OBLIGATIONS
DU DATA CONTROLLER VERS LE DATA
PROCESSOR.


EXEMPLE DE LOI APPLICABLE AU DATA CONTROLLER AYANT UN IMPACT DIRECT
SUR LE FOURNISSEUR DE SERVICES = LOI ALBERTAINE

CITATION :
ALBERTA’S PERSONAL INFORMATION PROTECTION ACT REQUIRES THAT, UPON
REQUEST, TRUSTEE (SERVICE PROVIDER) TO PROVIDE TO ANY DATA SUBJECT
(INDIVIDUALS) INFORMATION IN RELATION TO THE USE AND DISCLOSURE OF
THAT SUBJECT’S PERSONAL INFORMATION.
ACCESS TO RECORDS AND PROVISION OF INFORMATION
24(1) AN INDIVIDUAL MAY, IN ACCORDANCE WITH SECTION 26, REQUEST AN
ORGANIZATION
(A) TO PROVIDE THE INDIVIDUAL WITH ACCESS TO PERSONAL INFORMATION ABOUT
THE INDIVIDUAL, OR
(B) TO PROVIDE THE INDIVIDUAL WITH INFORMATION ABOUT THE USE OR
DISCLOSURE OF PERSONAL INFORMATION ABOUT THE INDIVIDUAL.
(1.2) ON THE REQUEST OF AN APPLICANT MADE UNDER SUBSECTION (1)(B), AND
TAKING INTO CONSIDERATION WHAT IS REASONABLE, AN ORGANIZATION MUST,
IF THE ORGANIZATION HAS IN ITS CUSTODY OR UNDER ITS CONTROL A RECORD
CONTAINING PERSONAL INFORMATION ABOUT THE APPLICANT DESCRIBED IN
THE REQUEST, PROVIDE THE APPLICANT WITH
(A) INFORMATION ABOUT THE PURPOSES FOR WHICH THE PERSONAL INFORMATION
HAS BEEN AND IS BEING USED BY THE ORGANIZATION, AND
(B) THE NAMES OF THE PERSONS TO WHOM AND CIRCUMSTANCES IN WHICH THE
PERSONAL INFORMATION HAS BEEN AND IS BEING DISCLOSED.


PII  = DONNÉES CONFIDENTIELLES…



PII; CE QUE CE N’EST PAS…



PII = BIEN IMMATÉRIEL…MAIS « BIEN »
QUAND MÊME.



QUI DIT « BIEN », DIT DROIT DE
PROPRIÉTÉ SUR LE BIEN.












LE PROPRIÉTAIRE VÉRITABLE DU PII =
TOUJOURS LE DATA SUBJECT
LE « PROPRIÉTAIRE » SUBSÉQUENT (LE
PRESTATAIRE DE SERVICES) N’EST EN FAIT
QU’UN FIDUCIAIRE ET DOIT AGIR EN
RESPECTANT LES DROITS DU DATA SUBJECT
SUR SON BIEN…LE PII
LE FAISCEAU DES SOUS-DROITS ASSOCIÉS À LA
PROPRIÉTÉ D’UN BIEN, MÊME IMMATÉRIEL :
USUS : USAGE LÉGAL D’UN BIEN (LA LIBERTÉ
DE L’UN DÉBUTE OU CELLE DE L’AUTRE SE
TERMINE)
FRUCTUS : LES « FRUITS » QUI
PROVIENNENT DU BIEN ET LEUR USUS ET
ABUSUS.
ABUSUS : SE DÉPARTIR DU BIEN, LE
DÉTRUIRE, LE MODIFIER…






CES DROITS SONT ISSUS DE LOIS QUI SONT
TOUJOURS ASSOCIÉES À DES TERRITOIRES
GÉOGRAPHIQUEMENT DÉFINIS.
POUR UN MÊME SYSTÈME NUAGIQUE,
PLUSIEURS JURIDICTIONS DIFFÉRENTES
POURRAIENT S’APPLIQUER ET DONC UNE
MULTITUDE DE LOIS QUI POURRAIENT ÊTRE
ÉTRANGÈRES.
LA MISE EN APPLICATION DES DROITS
DÉCOULANT D’UNE LOI DÉPEND DU SITUS
DES DONNÉES ET/OU DE LA NATIONALITÉ
DU DATA SUBJECT.








UN DROIT DU FAISCEAU EST PARTICULIÈREMENT EN
CAUSE : L’USUS.
IL EST CONFIÉ AU TIERS QUI EXPLOITE
L’ENVIRONNEMENT NUAGIQUE. MAIS QU’À DES
CONDITIONS DÉNONCÉES ET BIEN COMPRISES PAR
LE DATA SUBJECT…ET QUE SUITE À LA SOUMISSION
D’UN CONSENTEMENT « LIBRE ET ÉCLAIRÉ ».
« LIBRE ET ÉCLAIRÉ » = SANS PRESSION, AVEC
TOUTE L’INFORMATION REQUISE POUR POUVOIR
CONSENTIR. OBLIGATION DE DÉCLARATION TRÈS
VASTE DE L’USAGE DU PII PAR LE PRESTATAIRE.
D’OÙ LES TRÈS IMPORTANTES QUESTIONS DE LA
DÉFINITION DU « LIEU » DE L’INFORMATION
(WHERE IS MY DATA?) ET DE « QUI » AURA ACCÈS
AU PII PENDANT LE CYCLE DE VIE DE L’INFO DANS
L’ENVIRONNEMENT NUAGIQUE.


PATRIOT ACT



DISASTER RECOVERY DOIT ÊTRE INCLUS
DANS LE SCÉNARIO.



SERVICES ACCESSOIRES COMME AKAMAI.
PISTE DE SOLUTIONS :


READY FOR THE CLOUD??



NE PAS COLLIGER D’INFO PERSO.



COLLECTION DE L’INFO MINIMALE! CHAQUE DATA
SET = POSSIBLE FUITE = PROBLÈMES ET $.



BON ENCADREMENT JURIDIQUE ET CONTRACTUEL
AVEC LES DATA SUBJECTS = CONSENTEMENTS…


EXEMPLES (SPLASH SCREEN) MAIS AVEC LE MOYEN DE
TOUJOURS DÉMONTRÉ L’ACCEPTATION DES
CONDITIONS.



“DUE DILIGENCE” DU PRESTATAIRE DE SERVICES
NUAGIQUES ET LES SOUS-TRAITANTS/SOUSCONTRACTANTS.


ÊTRE CERTIFIÉ OU AUDITÉ (ET EXIGER CECI DU
PRESTATAIRE DE SERVICES): SAFE HARBOR, TRUST-E,
CLOUD SECURITY ALLIANCE, ISO 27001, ETC…



AU MOINS: SSAE 16 TYPE II SOC 1



SI ON DOIT COLLIGER, ALORS CONSERVER LE MOINS
LONGTEMPS POSSIBLE ET POUVOIR DÉMONTRER QUE
L’INFORMATION A ÉTÉ DÉTRUITE DE MANIÈRE ADÉQUATE.



ENCODAGE EST BIEN, MAIS MÊME L’INFO ENCODÉE EST
JUGÉE COMME INFO CONFIDENTIELLE ET SOUMISE AUX
LOIS, TRAITÉS, DIRECTIVES ET RÈGLEMENTS APPLICABLES.
Questions

Contenu connexe

En vedette (8)

Making pentesting sexy ossams - BSidesQuebec2013
Making pentesting sexy ossams - BSidesQuebec2013Making pentesting sexy ossams - BSidesQuebec2013
Making pentesting sexy ossams - BSidesQuebec2013
 
волонтерський рух
волонтерський рухволонтерський рух
волонтерський рух
 
Tassos Vamvakidis-Piraeus Container Terminal S.A the South East Gate of Europe
Tassos Vamvakidis-Piraeus Container Terminal S.A  the South East Gate of EuropeTassos Vamvakidis-Piraeus Container Terminal S.A  the South East Gate of Europe
Tassos Vamvakidis-Piraeus Container Terminal S.A the South East Gate of Europe
 
10 Greek Maritime Cluster Research Results Recession and Maritime Activities
10 Greek Maritime Cluster Research Results Recession and Maritime Activities10 Greek Maritime Cluster Research Results Recession and Maritime Activities
10 Greek Maritime Cluster Research Results Recession and Maritime Activities
 
Manolis Makris-"Kalimera" Cruise Shiping
Manolis Makris-"Kalimera" Cruise ShipingManolis Makris-"Kalimera" Cruise Shiping
Manolis Makris-"Kalimera" Cruise Shiping
 
Investigating at the speed of compromise - BSidesQuebec2013
Investigating at the speed of compromise - BSidesQuebec2013Investigating at the speed of compromise - BSidesQuebec2013
Investigating at the speed of compromise - BSidesQuebec2013
 
Pulpo book
Pulpo bookPulpo book
Pulpo book
 
Animals salvatges
Animals salvatgesAnimals salvatges
Animals salvatges
 

Similaire à L'information personnelle numérique - BSidesQuebec2013

Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsAntigone Peyton
 
Semantic blockchain
Semantic blockchainSemantic blockchain
Semantic blockchainBen Gardner
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detectiongaurav kumar
 
Rimon - CLE on Cloud Lawyering for PAABA
Rimon - CLE on Cloud Lawyering for PAABARimon - CLE on Cloud Lawyering for PAABA
Rimon - CLE on Cloud Lawyering for PAABAYaacov Silberman
 
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfData leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfnaresh2004s
 
dataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxdataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxnaresh2004s
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverPJStarr
 
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...dmenken60
 
Confessions of an Architect
Confessions of an ArchitectConfessions of an Architect
Confessions of an ArchitectJeff Jonas
 
Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016Bob Radvanovsky
 
Deep Learning in Security - Examples, Infrastructure, Challenges, and Suggest...
Deep Learning in Security - Examples, Infrastructure, Challenges, and Suggest...Deep Learning in Security - Examples, Infrastructure, Challenges, and Suggest...
Deep Learning in Security - Examples, Infrastructure, Challenges, and Suggest...DataWorks Summit
 
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...itnewsafrica
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionSean Whalen
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industryCloudMask inc.
 
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)Denodo
 
Importance of Information Security in Organisations | Cyberroot Risk Advisory
Importance of Information Security in Organisations | Cyberroot Risk AdvisoryImportance of Information Security in Organisations | Cyberroot Risk Advisory
Importance of Information Security in Organisations | Cyberroot Risk AdvisoryCR Group
 
October 2007 Icle Presentation Final
October 2007 Icle Presentation   FinalOctober 2007 Icle Presentation   Final
October 2007 Icle Presentation FinalDavid Cassidy
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 

Similaire à L'information personnelle numérique - BSidesQuebec2013 (20)

Patrick armstrong athens
Patrick armstrong athensPatrick armstrong athens
Patrick armstrong athens
 
Big Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy ImplicationsBig Data, Cloud Computing, and Privacy Implications
Big Data, Cloud Computing, and Privacy Implications
 
Semantic blockchain
Semantic blockchainSemantic blockchain
Semantic blockchain
 
Data leakage detection
Data leakage detectionData leakage detection
Data leakage detection
 
Rimon - CLE on Cloud Lawyering for PAABA
Rimon - CLE on Cloud Lawyering for PAABARimon - CLE on Cloud Lawyering for PAABA
Rimon - CLE on Cloud Lawyering for PAABA
 
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdfData leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
Data leakage detbxhbbhhbsbssusbgsgsbshsbsection.pdf
 
dataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptxdataleakagedetection-1811210400vgjcd01.pptx
dataleakagedetection-1811210400vgjcd01.pptx
 
MindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no coverMindingTheCloud_NPR_Sum2014-no cover
MindingTheCloud_NPR_Sum2014-no cover
 
Presentation1
Presentation1Presentation1
Presentation1
 
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...
 
Confessions of an Architect
Confessions of an ArchitectConfessions of an Architect
Confessions of an Architect
 
Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016
 
Deep Learning in Security - Examples, Infrastructure, Challenges, and Suggest...
Deep Learning in Security - Examples, Infrastructure, Challenges, and Suggest...Deep Learning in Security - Examples, Infrastructure, Challenges, and Suggest...
Deep Learning in Security - Examples, Infrastructure, Challenges, and Suggest...
 
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
Dr Nishal Khusial: Cyber Security- Common Threats, Attacks, Awareness and Bes...
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
 
Importance of Information Security in Organisations | Cyberroot Risk Advisory
Importance of Information Security in Organisations | Cyberroot Risk AdvisoryImportance of Information Security in Organisations | Cyberroot Risk Advisory
Importance of Information Security in Organisations | Cyberroot Risk Advisory
 
October 2007 Icle Presentation Final
October 2007 Icle Presentation   FinalOctober 2007 Icle Presentation   Final
October 2007 Icle Presentation Final
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 

Dernier

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

L'information personnelle numérique - BSidesQuebec2013

  • 1. Martin Dubois, LL.B., CISSP Principal Information Security Analyst Oracle Corporation
  • 2. ON SE TOURNE MAINTENANT VERS L’OFFRE “CLOUD”. TRÈS POPULAIRE. TYPIQUEMENT DU SAAS (SOFTWARE AS A SERVICE). EXCLUANT LE PAAS (PLATFORM AS A SERVICE). SCENARIO DE TRAVAIL = UNE RELATION TRIPARTITE ENTRE UN INDIVIDU (DATA SUBJECT), UN TIERS RECEVANT L’INFORMATION DE L’INDIVIDU ET L’EXPLOITANT (LE CLIENT) ET LE FOURNISSEUR DE SERVICE (CLOUD SERVICE PROVIDER). SCÉNARIO IMPLIQUANT L’EXTERNALISATION DE DONNÉES PERSONNELLES.
  • 3.  PRINCIPALE PROBLÉMATIQUE PROPRE AUX RISQUES JURIDIQUES ET RÉGLEMENTAIRES LORS DE L’ENTREPOSAGE DANS UN ENVIRONNEMENT NUAGIQUE (EXTERNALISATION D’UN SERVICE LOCAL VERS UN SERVICE NUAGIQUE) = TRANSLATION DE CERTAINES OBLIGATIONS DU DATA CONTROLLER VERS LE DATA PROCESSOR.
  • 4.  EXEMPLE DE LOI APPLICABLE AU DATA CONTROLLER AYANT UN IMPACT DIRECT SUR LE FOURNISSEUR DE SERVICES = LOI ALBERTAINE CITATION : ALBERTA’S PERSONAL INFORMATION PROTECTION ACT REQUIRES THAT, UPON REQUEST, TRUSTEE (SERVICE PROVIDER) TO PROVIDE TO ANY DATA SUBJECT (INDIVIDUALS) INFORMATION IN RELATION TO THE USE AND DISCLOSURE OF THAT SUBJECT’S PERSONAL INFORMATION. ACCESS TO RECORDS AND PROVISION OF INFORMATION 24(1) AN INDIVIDUAL MAY, IN ACCORDANCE WITH SECTION 26, REQUEST AN ORGANIZATION (A) TO PROVIDE THE INDIVIDUAL WITH ACCESS TO PERSONAL INFORMATION ABOUT THE INDIVIDUAL, OR (B) TO PROVIDE THE INDIVIDUAL WITH INFORMATION ABOUT THE USE OR DISCLOSURE OF PERSONAL INFORMATION ABOUT THE INDIVIDUAL. (1.2) ON THE REQUEST OF AN APPLICANT MADE UNDER SUBSECTION (1)(B), AND TAKING INTO CONSIDERATION WHAT IS REASONABLE, AN ORGANIZATION MUST, IF THE ORGANIZATION HAS IN ITS CUSTODY OR UNDER ITS CONTROL A RECORD CONTAINING PERSONAL INFORMATION ABOUT THE APPLICANT DESCRIBED IN THE REQUEST, PROVIDE THE APPLICANT WITH (A) INFORMATION ABOUT THE PURPOSES FOR WHICH THE PERSONAL INFORMATION HAS BEEN AND IS BEING USED BY THE ORGANIZATION, AND (B) THE NAMES OF THE PERSONS TO WHOM AND CIRCUMSTANCES IN WHICH THE PERSONAL INFORMATION HAS BEEN AND IS BEING DISCLOSED.
  • 5.  PII  = DONNÉES CONFIDENTIELLES…  PII; CE QUE CE N’EST PAS…  PII = BIEN IMMATÉRIEL…MAIS « BIEN » QUAND MÊME.  QUI DIT « BIEN », DIT DROIT DE PROPRIÉTÉ SUR LE BIEN.
  • 6.       LE PROPRIÉTAIRE VÉRITABLE DU PII = TOUJOURS LE DATA SUBJECT LE « PROPRIÉTAIRE » SUBSÉQUENT (LE PRESTATAIRE DE SERVICES) N’EST EN FAIT QU’UN FIDUCIAIRE ET DOIT AGIR EN RESPECTANT LES DROITS DU DATA SUBJECT SUR SON BIEN…LE PII LE FAISCEAU DES SOUS-DROITS ASSOCIÉS À LA PROPRIÉTÉ D’UN BIEN, MÊME IMMATÉRIEL : USUS : USAGE LÉGAL D’UN BIEN (LA LIBERTÉ DE L’UN DÉBUTE OU CELLE DE L’AUTRE SE TERMINE) FRUCTUS : LES « FRUITS » QUI PROVIENNENT DU BIEN ET LEUR USUS ET ABUSUS. ABUSUS : SE DÉPARTIR DU BIEN, LE DÉTRUIRE, LE MODIFIER…
  • 7.    CES DROITS SONT ISSUS DE LOIS QUI SONT TOUJOURS ASSOCIÉES À DES TERRITOIRES GÉOGRAPHIQUEMENT DÉFINIS. POUR UN MÊME SYSTÈME NUAGIQUE, PLUSIEURS JURIDICTIONS DIFFÉRENTES POURRAIENT S’APPLIQUER ET DONC UNE MULTITUDE DE LOIS QUI POURRAIENT ÊTRE ÉTRANGÈRES. LA MISE EN APPLICATION DES DROITS DÉCOULANT D’UNE LOI DÉPEND DU SITUS DES DONNÉES ET/OU DE LA NATIONALITÉ DU DATA SUBJECT.
  • 8.     UN DROIT DU FAISCEAU EST PARTICULIÈREMENT EN CAUSE : L’USUS. IL EST CONFIÉ AU TIERS QUI EXPLOITE L’ENVIRONNEMENT NUAGIQUE. MAIS QU’À DES CONDITIONS DÉNONCÉES ET BIEN COMPRISES PAR LE DATA SUBJECT…ET QUE SUITE À LA SOUMISSION D’UN CONSENTEMENT « LIBRE ET ÉCLAIRÉ ». « LIBRE ET ÉCLAIRÉ » = SANS PRESSION, AVEC TOUTE L’INFORMATION REQUISE POUR POUVOIR CONSENTIR. OBLIGATION DE DÉCLARATION TRÈS VASTE DE L’USAGE DU PII PAR LE PRESTATAIRE. D’OÙ LES TRÈS IMPORTANTES QUESTIONS DE LA DÉFINITION DU « LIEU » DE L’INFORMATION (WHERE IS MY DATA?) ET DE « QUI » AURA ACCÈS AU PII PENDANT LE CYCLE DE VIE DE L’INFO DANS L’ENVIRONNEMENT NUAGIQUE.
  • 9.  PATRIOT ACT  DISASTER RECOVERY DOIT ÊTRE INCLUS DANS LE SCÉNARIO.  SERVICES ACCESSOIRES COMME AKAMAI.
  • 10. PISTE DE SOLUTIONS :  READY FOR THE CLOUD??  NE PAS COLLIGER D’INFO PERSO.  COLLECTION DE L’INFO MINIMALE! CHAQUE DATA SET = POSSIBLE FUITE = PROBLÈMES ET $.  BON ENCADREMENT JURIDIQUE ET CONTRACTUEL AVEC LES DATA SUBJECTS = CONSENTEMENTS…  EXEMPLES (SPLASH SCREEN) MAIS AVEC LE MOYEN DE TOUJOURS DÉMONTRÉ L’ACCEPTATION DES CONDITIONS.  “DUE DILIGENCE” DU PRESTATAIRE DE SERVICES NUAGIQUES ET LES SOUS-TRAITANTS/SOUSCONTRACTANTS.
  • 11.  ÊTRE CERTIFIÉ OU AUDITÉ (ET EXIGER CECI DU PRESTATAIRE DE SERVICES): SAFE HARBOR, TRUST-E, CLOUD SECURITY ALLIANCE, ISO 27001, ETC…  AU MOINS: SSAE 16 TYPE II SOC 1  SI ON DOIT COLLIGER, ALORS CONSERVER LE MOINS LONGTEMPS POSSIBLE ET POUVOIR DÉMONTRER QUE L’INFORMATION A ÉTÉ DÉTRUITE DE MANIÈRE ADÉQUATE.  ENCODAGE EST BIEN, MAIS MÊME L’INFO ENCODÉE EST JUGÉE COMME INFO CONFIDENTIELLE ET SOUMISE AUX LOIS, TRAITÉS, DIRECTIVES ET RÈGLEMENTS APPLICABLES.