Academia.eduAcademia.edu

Impacts of Cloud Computing (STOA Cloud Computing Del.3)

2014

This report focuses on the impacts of Cloud Computing and the resulting challenges. It is based on an evaluation of the available scientific and industry literature, as well as on expert interviews. It should be mentioned that statements regarding Cloud Computing in reports and media on this are often contradictory. One reason for this is that various definitions are used. Some authors apply "cloud washing" and rename traditional outsourcing or web services. Based on the previous deliverable we focus on common used definitions such as the one from NIST. A second issue is that statements often are based on experts estimation due to lack of reliable time series of data. This explains the great bandwidth of results, which have to be taken with care. Socioeconomic impacts In the chapter on socioeconomic Impacts we present some typical cases of such Cloud Computing, e.g. elastic hosting services by Amazon and Google. We observed that there are several such companies, mostly US-based, which earned revenues between a few hundred million and about US-$ 2 billion, in 2012. Positive impacts which we observed comprise: Cost savings of services of, e.g., 10-20%. Convenience of using services, e.g. by private consumers, but also by employees and small companies. Flexibility, e.g. for hosting a mobile app. Professional security management, relevant for consumers or SMEs. But at the same time there are costs and risks, e.g.: Loss of control over data, loss of confidentiality, and a potential loss of availability. For consumers, costs of mobile roaming, costs of backups in the cloud, etc. Need to control using the Cloud, e.g. dealing with contracts, deletion, and migration. We also observed limits to Cloud Computing. For example, for certain operations, such as in telecommunications or manufacturing control, latency requirements are so high that using remote servers does not appear to be an option. Also, many large corporations already use outsourcing and/or internal load balancing and therefore cannot reap additional benefits. Accordingly, we observed no large layoffs, due to migrating computing services into the cloud. It has been anticipated that using Cloud Computing will lead to general savings of 10%-30% of IT costs. However, it has not been possible to identify empirical studies supporting this. Consequently the significant productivity growth, as estimated by some authors based on this, have to be taken with care. However, this may change in future. Currently, there is a widespread fear that Cloud Computing providers and foreign governments abuse data, that providers go out of business, or suffer from severe outages.

ETAG European Technology Assessment Group ITAS x DBT x FCRI x ISIx IST xITA xTC x Rathenau Impacts of Cloud Computing Report Deliverable No.3 of the STOA Project “Potential and Impacts of Cloud Computing Services and Social Network Sites” Commissioned by STOA and carried out by ETAG Order Form No. IP/A/STOA/FWC/2008-096/LOT4/C1/SC11 Ref.: Framework Contract No. IP/A/STOA/FWC/2008-096/LOT4 Paper prepared by Dr Timo Leimbach (Fraunhofer ISI) Mr Dara Hallinan (Fraunhofer ISI) Dr Arnd Weber (ITAS) Mrs. Maggie Jaglo (ITAS) Dr Leonhard Hennen (ITAS) Dr Michael Nentwich (ITA) Mr Stefan Strauß (ITA) Mr Rasmus Øjvind Nielsen (DBT) Dr Theo Lynn (DCU/IC4) Mr Graham Hunt (DCU/IC4) July 2013 European Technology Assessment Group x x x x x x x x Institute for Technology Assessment and Systems Analysis (ITAS), Karlsruhe Danish Board of Technology (DBT), Copenhagen Catalan Foundation for Research and Innovation (FCRI), Barcelona Fraunhofer Institute for Systems and Innovation Research (ISI), Karlsruhe Institute Society Technology (IST), Brussels Institute of Technology Assessment (ITA), Vienna Rathenau Institute, The Hague Technology Centre AS CR, Prague Contact: Dr Leonhard Hennen (Co-ordinator) Institute for Technology Assessment and Systems Analysis;; Karlsruhe Institute of Technology c/o Helmholtz-Gemeinschaft Ahrstr. 45, D-53175 Bonn [email protected] Project Description Contract number IP/A/STOA/FWC/2008-96/LOT4/C1/SC11 The project is being carried out by the Fraunhofer Institute for Systems and Innovation Research (ISI), Karlsruhe (project co-ordinator); together with the Institute of Technology Assessment (ITA), Vienna; the Institute for Technology Assessment and Systems Analysis (ITAS), Karlsruhe; and the Danish Board of Technology (DBT), Copenhagen, as members of ETAG. Project Leader: Timo Leimbach, Fraunhofer ISI Authors: Dr Timo Leimbach (Fraunhofer ISI) Mr Dara Hallinan (Fraunhofer ISI) Dr Arnd Weber (ITAS) Mrs. Maggie Jaglo (ITAS) Mr Rasmus Øjvind Nielsen (DBT) Dr Theo Lynn (DCU/IC4) Mr Graham Hunt (DCU/IC4) Members of the European Parliament in charge: Mrs Silvia-Adriana Ticau Mr Malcom Harbour STOA staff in charge: Mr Peter Ide-Kostic Submission date: July 31st, 2013 CONTENTS i   Contents Executive Summary 1.   Introduction 1   10   1.1.   Aims of the report 10   1.2.   Structure of the report 11   2.   Socio-economic impacts of Cloud Computing 12   2.1.   Introduction 12   2.2.   Impacts on business user 13   2.2.1.   Positive impacts 13   2.2.2.   Negative impacts 15   2.2.3.   Ambiguous impacts 18   2.2.4.   Discussion and conclusions 18   2.3.   Impacts on private users 18   2.3.1.   Positive impacts 18   2.3.2.   Negative impacts 19   2.3.3.   Ambiguous impacts 20   2.3.4.   Discussion and conclusion 21   2.4.   Impacts on the IT industry 21   2.4.1.   Impacts on the market and industry structure 21   2.4.2.   Impact on innovativeness and business creation 23   2.4.3.   Commoditization and the impact on business models 24   2.4.4.   Discussion and conclusion 24   2.5.   Impacts on economy and society as a whole 25   2.5.1.   Positive impacts 25   2.5.2.   Negative impacts 27   2.5.3.   Ambiguous impacts 28   2.5.4.   Discussion and conclusions 28   2.6.   Conclusions 3.   Security and privacy issues in Cloud Computing 29   31   3.1.   Introduction 31   3.2.   Overall relevance of security and privacy 31   3.2.1.   Security and privacy for businesses 37   3.2.2.   Security and privacy for government 40   3.2.3.   Security and privacy for consumer 41   i 3.2.4.   Discussion and conclusions 43   3.3.   Data security challenges in Cloud Computing 44   3.3.1.   Insider Problem 45   3.3.2.   General Quality of Service Problem 47   3.3.3.   Conclusions 48   3.4.   Cloud computing, privacy and the EU data protection regime 3.4.1.   What is Data Protection – Directive 95/46 50   3.4.2.   Challenges of the Cloud to the Current Data Protection Framework 52   3.4.3.   Data Protection Reform and the Data Protection Regulation 57   3.4.4.   Data Protection Reform and Cloud Computing 58   3.4.5.   Conclusions 64   3.5.   Governance Issues related to data retention and third party access 67   3.5.1.   Introduction 67   3.5.2.   Data retention and 3rd party access to data 67   3.5.3.   Safe Harbour and international harmonization 73   3.5.4.   Discussion and conclusions 75   4.   Contractual issues and challenges of the market competitiveness 77   4.1.   Introduction 77   4.2.   Contractual issues of Cloud Computing 77   4.2.1.   The contract 77   4.2.2.   Common features and issues in Cloud Computing Contracts 78   4.2.3.   Discussion and conclusions 95   4.3.   Issues in market competitiveness 98   4.3.1.   Standards. interoperability, and vendor lock-in 4.3.2.   Market fragmentation 101   4.3.3.   Lack of fast-growing companies 102   4.3.4.   Broadband coverage 105   4.3.5.   Lack of skilled workforce 106   4.3.6.   Discussion and conclusions 107   5.   Conclusions and Outlook 99   111   5.1.   Conclusions 111   5.2.   List of policy options 112   5.2.1.   Provisioning of infrastructures 113   5.2.2.   Mobilizing resources 113   5.2.3.   Adapting the regulatory environment 114   5.2.4.   Legitimation and creation of markets 115   5.2.5.   Encouraging entrepreneurship and competitiveness 117   5.3.   Outlook ii 48   117   Annex: List of Respondents and Events visited 119   References 121   iii Impacts of Cloud Computing ____________________________________________________________________________________________ EXECUTIVE SUMMARY This report focuses on the impacts of Cloud Computing and the resulting challenges. It is based on an evaluation of the available scientific and industry literature, as well as on expert interviews. It should be mentioned that statements regarding Cloud Computing in reports and media on this are often contradictory. One reason for this is that various definitions are used. Some authors apply “cloud washing” and rename traditional outsourcing or web services. Based on the previous deliverable we focus on common used definitions such as the one from NIST. A second issue is that statements often are based on experts estimation due to lack of reliable time series of data. This explains the great bandwidth of results, which have to be taken with care. Socio-economic impacts In the chapter on socio-economic Impacts we present some typical cases of such Cloud Computing, e.g. elastic hosting services by Amazon and Google. We observed that there are several such companies, mostly US-based, which earned revenues between a few hundred million and about US-$ 2 billion, in 2012. Positive impacts which we observed comprise: x Cost savings of services of, e.g., 10-20%. x Convenience of using services, e.g. by private consumers, but also by employees and small companies. x Flexibility, e.g. for hosting a mobile app. x Professional security management, relevant for consumers or SMEs. But at the same time there are costs and risks, e.g.: x Loss of control over data, loss of confidentiality, and a potential loss of availability. x For consumers, costs of mobile roaming, costs of backups in the cloud, etc. x Need to control using the Cloud, e.g. dealing with contracts, deletion, and migration. We also observed limits to Cloud Computing. For example, for certain operations, such as in telecommunications or manufacturing control, latency requirements are so high that using remote servers does not appear to be an option. Also, many large corporations already use outsourcing and/or internal load balancing and therefore cannot reap additional benefits. Accordingly, we observed no large layoffs, due to migrating computing services into the cloud. It has been anticipated that using Cloud Computing will lead to general savings of 10% - 30% of IT costs. However, it has not been possible to identify empirical studies supporting this. Consequently the significant productivity growth, as estimated by some authors based on this, have to be taken with care. However, this may change in future. Currently, there is a widespread fear that Cloud Computing providers and foreign governments abuse data, that providers go out of business, or suffer from severe outages. 1 European Technology Assessment Group (ETAG) ____________________________________________________________________________________________ The effects of the US Patriot Act, the Foreign Intelligence Surveillance Act, and the National Security Letters have been widely discussed in the media. If problems with confidentiality, availability and migration of data could be overcome, however, Cloud Computing would have a much brighter future. Also, the low entry prices of Cloud providers mean that new businesses can easily enter the market and scale their operations. Both effects can influence the future growth of productivity and jobs and therefore justify supportive policy actions today. Regarding the impacts on the IT markets and the IT industry itself it can be stated that Cloud is fast growing segment and will gain of importance in the future. However it might also be that within some years Cloud as segment will merge into new or other market segments, but the underlying technology and models will remain as a part of the future IT landscape. While markets will change, the structure of the industry will not change significantly as it seems now, i.e. the dominance of US based providers will continue. But European policy makers could use their power to support the emergence of providers which provide perfect confidentiality and availability, which could lead at least to rebalance of the industry structure. The analysis of socio-economic impacts shows that there are many positive expectations associated with Cloud Computing. This should be taken with care because they are often based on optimistic estimation on productivity gains. These would require that all obstacles are removed as well as the cost savings can be fully realized. Moreover further research shows that it requires specific framework conditions like education to turn productivity gains and growth also into growth of employment and not the other way around. Achieving both, changing the structure of the industry as well as to realize to potentials of Cloud Computing for Europe need to address barriers and challenges researched in the following. Relevance of privacy and security Security, privacy and data protection remain key concerns with regard to Cloud Computing. However, the ability to act on such concerns is very low for individual users and SMEs, who make up the largest potential user groups. Citizens in general remain unaware of the deeper security implications of adopting cloud services, while many SMEs lack the capacity to carry out proper risk assessments. Both groups are in a very uneven position against cloud providers with regard to knowledge and means for influencing the relation. Large companies and governments demanding greater transparency and more useful contractual arrangements from cloud providers may in some degree act as trail-blazers for the development of societal acceptable relations between cloud providers and users. But selfregulation on the part of industry, such as security standardization, contract standardization and assurance mechanisms, has of yet not been able to deliver an overall image of transparency and trustworthiness. And independent security experts still have substantial concerns with regard to security in the cloud. Societal-level interventions to establish mechanisms for reliability and trustworthiness in the cloud industry in general 2 Impacts of Cloud Computing ____________________________________________________________________________________________ therefore seem to be needed to harvest the overall societal benefits, which the cloud could provide to a society that could trust it. Data security In Chapter 3, key security and privacy issues are discussed. The most important security issue appears to be confidentiality. Currently, no cloud services are available which prevent insiders or governments from reading data. Technical solutions would most likely have to rely on large, mass-manufactured tamper resistant devices using tamper-detecting membranes, or on new cryptographic algorithms. While the latter is a research topic with open outcome, the former could be explored in a study, in order to estimate its costs. Another important security issue concerns the availability of the Internet. Servers may not be accessible in case of denial of service attacks or misrouted Internet traffic. As rare as such instances are, their sheer possibility makes it clear that using several providers in parallel, with easy migration, or local backup procedures, is advisable for critical computations. A third issue are attacks on the servers, or clients, e.g. by malware. As identified in the STOA project on eGovernment security, Europe would benefit from having a reliable, proven computing base, without any scope for zero-day exploits or Trojan horses. Only this way a solid base for future computing can be achieved. This is similar to the US DARPA Crash program. Based on this, high quality applications could be used. Cloud computing, privacy and the EU data protection regime Cloud computing is a development in data processing which opens up a range of economic and social possibilities. However, as with many developments in data processing, it also brings with it the potential to infringe on individual rights. Data protection law is the most significant European legal regime aimed at safeguarding individual rights in the processing of data. It is currently elaborated by Directive 95/46. However, law often reflects the context in which it was drafted. Technological developments – for example cloud computing – can serve to change this context, and accordingly ask questions about the continuing functionality of the law. Accordingly, the section analyzes the problems created by the specificities of cloud computing – as a new form of data processing – for data protection law. There are four core problems identified. 1. The problem of jurisdiction and applicability: One of the core features of cloud computing is that the physical location of the data or service is irrelevant. Data protection law, on the other hand, employs criteria in defining its applicability which are inextricably linked with concepts of location. When data processing is difficult to relate to geographical location, these criteria can be very difficult to apply. 2. The problem of defining roles and responsibilities: The data protection framework relies on categorizing entities involved in data processing as specific sorts of actor. Each form of actor then has roles and responsibilities in ensuring that the requirements of the directive are fulfilled. The complexity of processing in cloud environments and the unique arrangements this has required between cloud provider and cloud client, has brought into question the 3 European Technology Assessment Group (ETAG) ____________________________________________________________________________________________ applicability of the roles and responsibilities imagined by the Directive. 3. The problem of worldwide and continuous data transfer: Cloud computing service provision can utilise service providers, and be called up by service users, located outside the EU. In order to ensure that EU citizens’ data is protected regardless of where they are processed, the Directive puts certain restrictions on the transfer and processing of data outside the EU. Whilst there are exceptions to these restrictions, the cloud computing scenarios in which these exceptions can be applied are limited. This can needlessly prevent the provision of cloud services. 4. The lack of a binding European interpretation mechanism: The above issues remained problematic, as the Directive provided no mechanisms to adapt to them. This was attributable (at least partly) to the fact that the mechanisms designed to interpret the Directive had no binding power at European level. Beginning in 2010, the EU began a process of data protection reform. Recognition of the unsuitability of Directive 95/46 to cloud computing was one of the driving forces behind this reform. In 2012, this process produced a draft Regulation aimed at replacing the Directive. Whilst there may be changes to the text before the Regulation becomes law, the general framework and approach look likely to remain the same. The section thus proceeds by looking at the significance of the changes made by the Regulation. First, as to how they address the problems identified in relation to the Directive 1. The Regulation offers a clarification and expansion of scope: This is aimed at ensuring the application of data protection law is clear and that EU citizens’ data is protected regardless of by whom, or where, it is processed. 2. The Regulation offers a clarification of the distribution of roles and responsibilities: The Regulation moves away from strict definitions of roles, toward a scheme which ensures that the actor best placed to fulfill a controller’s obligation, is the party obliged to fulfill that obligation. 3. The Regulation envisages a revamp of the rules allowing international transfers of data: These are aimed at removing the legal obstructions to transborder data flows, whilst maintaining a high level of protection when personal data leaves the EU. 4. The Regulation institutes a number of novel interpretation mechanisms which will allow the Regulation to be bindingly interpreted at European level: These will provide, in advance, mechanisms aimed at allowing the law to be adapted to meet the challenges posed by any further new developments in data processing. Second, the section addresses how the novel features introduced by the Regulation will affect the provision of cloud services. Three innovations seem of particular importance. 1. The right to be forgotten: This will give the data subject the right to have their personal data deleted and will impose the obligation on the data controller to effectively delete the data. 2. The right to data portability: This will give the right to a data subject to obtain their data in transferrable format. 3. Data protection by design and default: This will create the obligation on the data controller to implement data protection principles throughout the life cycle of a cloud service, from design, through deployment and use. Governance issues related to data retention and enforcement outside the EU While the difficulty of governing cloud computing arising from the plurality of jurisdictions involved is well-known, over the past year the world has gained insight into trans-legal (if not illegal) practices of 3rd party access to data for the purposes of data mining by both private actors and government agencies. This has shown that cloud governance is not only 4 Impacts of Cloud Computing ____________________________________________________________________________________________ about legal frameworks, but also about their enforceability. With the proposed European data protection regulation, the European Commission has taken one step towards a more unilateral approach to upholding European standards of data security and privacy in a globalized economy. This approach has both benefits and drawbacks. On the one hand, more active means of enforcement become available to Europe while providers under the proposed Regulation will be forced to provide greater transparency. As such, the proposed legislation relies less on trust in individual actors than previous frameworks. On the other hand, with this approach Europe moves one step closer to the strong-arm style of diplomacy, which have otherwise been associated with other major world powers. Maintaining this course may well lead to ripples in the EU-US relationship. As Europe debates its data protection approach, it is important to ask difficult questions about the relationship between vested interests and viewpoints being put forth in the debate. European citizens, SME cloud users and government agencies are all at a disadvantage in negotiating terms of service and security practices with major cloud providers. They may need the strong leadership of Europe. Such leadership may additionally help further home-grown European providers of primary cloud services. It might, however, also stifle the growth of secondary providers of cloud-services. Striking the necessary balance between these concerns is no simple matter. To achieve it, is advisable to scrutinize closely the viewpoints in the debate with regard to which interest they serve, to beware of exclusively trust-based solutions to cloud governance issues, and to look further into ways of promotion cloud architectures designed from the beginning for security and privacy. Contractual issues While the discussion of data protection and data retention attracts much attention, there are other contractual issues that also impact the adoption of cloud computing, in particular in business. Typically, the contractual relationship between service providers and their clients is laid out in one or more documents typically comprising commonly the following one: Terms of Service (“TOS”); Service Level Agreement (“SLA”); Acceptable Use Policy (“AUP”), and Privacy Policy. Each of them serves specific purposes and clarifies different issues. The analysis tried to cover the main features including the choice of law, data location (including transfers outside of the EU), Policies for data integrity, availability and security, liability, acceptable user requirements, monitoring and service levels, backup, termination and a few smaller aspects. Beside a description of these contractual features also their consequences are discussed. Similar to the overall situation of Cloud Computing this analysis shows that the related legal framework for the provision of cloud services is complex, fragmented and at early stage of conceptualization due to the multi-tenant nature, the underlying chain of service provision (and the consecutive nexus of contracts) and the reliance on the Internet. This requires that intervention, if even possible, needs to be taken with care. In the current situation the framework mostly favors the cloud service provider, which is shown in many of the following points. 5 European Technology Assessment Group (ETAG) ____________________________________________________________________________________________ First of all, the choice of law and thereby the applicability of EU law is of one important concern, because it provides a greater legal certainty. It is of relevance in particular in the relations to non-EU providers, which often stipulate US law into cloud service contracts disproportionately impacting exclusions and limitations on liability, and indemnifications. Though many of these issues for consumers are addressed by the current draft regulation on data protection, the situation in business differs and need to be addressed in many ways. This goes along with the usage of a language that may not be feasible for clients to meet in the Acceptable Use Policies. Especially the end users are often affected by this, which needs to be addressed by standardizations and simplifications. Regarding the IP issues the analysis showed that there is degree of incompatibility between the current IP frameworks, which are based on geographic location, and the locally independent cloud computing. It refers to many cases such as the user’s development of applications utilizing tools of the Cloud provider or the question of ownership in customization and bug fixes. This may refers to a general set of issues in the current IP scheme and raises the questions if and how these issues should be addressed. In particular the formulation of the AUP also refers to another broad set of contractual issues, which all can result in a lack of trust in Cloud services. This could form one further barrier for the adoption of Cloud. One major reason is the lack of transparency regarding security of data, performance levels and metrics, audit rights, use of metadata, the identity of data processors and subcontractors along the chain of service provision and indeed the location of data in storage, in transit and while being processed. Other major aspects for a possible use of Cloud by consumer and businesses are the perceived redundancy and resilience provided by Cloud offers. Consequently the uncertainty regarding backup policy and the security arrangements, which are often not disclosed, creates further intransparency. In this regard consumer and businesses can only rely on third party certification of security and IT governance policies used by Cloud providers. But the currently most used information system assurance and related trust marks are criticized because of many reasons, including for example limited scope, passive, periodic and retrospective character, or lack of warranties. Consequently there is the need for new trust marks in the cloud computing context, which could have as research suggests positive impacts on the perceived trustworthiness, including influencing respondents’ beliefs about security and privacy, general beliefs about firm trustworthiness, and willingness to provide personal information. Finally there is the issue of the location of data in storage, transit and processing, which was identified as one major concern. One main reason behind this concern is the question of uncertainty regarding the provision of access to third parties, i.e. law enforcement agencies. Though the data retention directive should clarify this at least on the EU level, there are strong differences within the member states. Even more concerns exist regarding the treatment of that in the US, where it is often not possible to know if the data was accessed. Together with the lack of transparency all this increases concerns, so that the underlying issues need to be addressed. 6 Impacts of Cloud Computing ____________________________________________________________________________________________ Competitiveness of the markets The competitiveness of markets is a crucial point for the further development of Cloud Computing in Europe for both, users as well as for providers. Given the fact that Cloud Computing is a two-sided market shaped by network effects, the current development bears some risks for the competitiveness. The reason is that there is the tendency that only a few players will establish strong platforms, which create their own closed ecosystems consisting of a strong user base and a broad numbers of further solutions and applications. In this context the first challenge to competiveness is that a platform owner could create barriers that make it hard to migrate easily to offers of other providers, which would create an effective barrier for competition. These barriers have legal aspects like the issue of contract termination, data portability, etc. as well as technical aspects like standards and interoperability. Possibilities to reduce the risks of such behavior are the clarification of rights related to data portability as well as the support for further measures ensuring better standardization and interoperability of platforms. Due to the fact that many of the currently leading providers are not of European origin, there exists the possibility of creating vivid and competitive market by supporting of a competitive landscape of European providers. The low share of Europe in the worldwide ICT industry, which contradicts its position as the second largest market, is subject of research for a long time. Regarding Cloud Computing there are two major points our analysis has identified and further reviewed. The first one is the fragmentation of the market. It refers to broad set of issues all dealing with challenges to cross-border activities in Europe. As shown by the analysis there are still issues that need to addressed to enforce the creation of a single market for digital services. This includes further reviews of the eCommerce regulations like the case of VAT systems for Cloud services as well as further harmonization of the regulatory framework like in the cases of consumer rights and data protection. Though there many initiatives on going related to these points, some issues that are important in particular from the point of view of Cloud Computing still need to be addressed. The second point related to vivid landscape of European providers is the lack of fast growing European enterprises becoming global player. As shown by many analyses over the last decade there is set of issues that hinder the creation of such companies. In recent time the lack of entrepreneurial activities and culture as well as the role of the state in this process became focus of the discussion. The latter point relates in particular to role of the state as procurer (innovative and normal procurement) as well as to the level of public R6D funding. Beside of specific challenges in all of these areas, the lack of coordinated strategies combining funding and procurement is an issue that needs to be addressed. The first two points refer to low level new business creation and innovation as well as to the lack of venture capital and a related culture supporting both. While there are many activities to increase the level of Venture Capital or stipulate founding activities, which need to be continued like the creation of single European market for venture capital, there is also some point in the question why it did not succeed until now. Some analysis indicate that similar to the lack of a coordinated approach for R&D funding and procurement also a lack of stimulation for a true venture culture. This is an issue that should be explored and if possible addressed. 7 European Technology Assessment Group (ETAG) ____________________________________________________________________________________________ Finally there are two issues, the provisioning of infrastructure and the creation of human capital, which might not directly impact competitiveness. Nevertheless, in a long term perspective both will have a strong impact on the competitiveness due to their character as framework conditions for it. Skilled personnel are fundamental for both, provider of Cloud services as well as their users. Especially the ability of users to exploit the potentials of Cloud and related other emerging technologies like Big Data is fundamental to realize the positive societal and economic benefits of it. Based on the already existing lack of skilled workforce, the further development of the human capital base will strongly impact the competitiveness of Europe in Cloud Computing. The availability of network infrastructure, mobile as well as fixed connections, will play a similar role in the future development. The reason is that Cloud Computing will enable more and more digital business, which will lead to a strong increase in the demand of network. Consequently, it is necessary to develop network infrastructures in a way that enables the realization of the potentials of Cloud Computing. Questions arising from it are the differences in the development between the different regions in Europe, the further need for more advanced network infrastructures and how these should be financed in a fair balance for all relevant stakeholders. Conclusions and policy options Concluding it can be stated that the report shows the potentials of Cloud Computing for Europe. But like most developments in IT the story also has two sides. There is also the risk that these impacts cannot be realised or even worse turn into the other direction, if it is not possible to provide sufficient environment for the uptake of Cloud Computing. This led directly to the analysis of barriers and issues, but already the discussion of the direct impacts as well as overall impacts on economy and society indicate first issues that need to be addressed. The following analysis of challenges and issues also detailed this analysis. In a first set all issues related to data security, the current data protection regime in the EU and it ongoing changes and data retention and enforcement of EU law outside of the EU were addressed. The results show that there are many options ranging from technical development of trusted Cloud platforms or certification schemes up to new approaches like privacy by design or measures as increased cooperation of DPA and international collaboration that can be considered to address the needs of the different stakeholders. While these issues are of relevance of all users of Cloud Computing, the second set is more aimed at two specific points. The first part is directed at the contractual relationships between user and provider. While for consumers many of the issues are addressed with the new draft regulation on data protection, business users in particular need to deal with further points such as IP rights or service and quality levels. The analysis shows a clear need to strengthen the rights of users for example by the standardisation of contracts, certification process or trust marks. Another point is the competitiveness of the market, which addresses issues for the creation of a competitive European Cloud market. Consequently issues addresses partly users as well as providers like standards, interoperability and vendor lock-in or market fragmentation as well as more aspects important for the long term competitiveness such as broadband coverage or the lack of skilled workforce. Finally also specific issues for the competitiveness of European providers are analysed. Due to this broad focus the identified options vary from support of data 8 Impacts of Cloud Computing ____________________________________________________________________________________________ portability rules and interoperability up to industry policy like for example the use of precommercial procurement and infrastructure provision for future network requirements. Overall this leads to broad list of policy options, in total nearly 60, which can help to improve the current state of Cloud Computing in Europe. It is obvious that due to the strong interrelation of the identified issues some identified options emerge from more than one field. Consequently we consolidated the list of options. In course of this process we also reordered according to the approach of a functional analysis in the framework of a technological innovation system, which was introduced in the initial analysis of the previous deliverable. Within the process we identified five clusters of issues split into the following functionalities: x provisioning of infrastructures, which addresses the availability of secure and sufficient technical computing and network infrastructures; x mobilizing resource, which addresses the need for human capital base, i.e. extension of total number as well as enhanced education of developer and user, as well as the need to improve the financial capital situation, i.e. the access to financial capital for innovation and growth; x legitimation and creation of markets, which addresses the need for acceptance of new technologies such as Cloud as well as the support for the creation of a working and competitive market for Cloud; x adapting the regulatory environment, which addresses the needs to adjust and harmonize the legal framework, in particular contractual issues and data protection regime, according to the challenges of Cloud Computing; x encourage entrepreneurship and competition, which addresses the support of entrepreneurial culture and activities as well as a fair competition environment. The full list with remaining 58 policy options can be found in section 5.2. Outlook The aim of the following final phase is to produce a high quality final report that will be considered useful by European decision-makers. Based on this aim the work of the final phase is split up into two main tasks. The first one is the compilation and consolidation of the results of the previous phases. This includes an internal review, the integration of the results of the extra module on social networks sites as well as the integration of additional inputs made by the MEP’s, the STOA secretary or received during the policy workshop. The second task is to take up the policy options identified here as well as further inputs from the policy workshop, presentation and further consultations with experts to derive a set of final policy recommendations for European-decision makers. This includes internal reviews, prioritization and validation of possible options and will result in a concrete set of measures that can be undertaken to foster the potentials of Cloud Computing in Europe. 9 European Technology Assessment Group (ETAG) ____________________________________________________________________________________________ 1. INTRODUCTION 1.1. Aims of the report Many of the controversial discussions on Cloud Computing focus on its possible impacts and related challenges of Cloud Computing. But a short review of them reveals easily that many of the different views on the impacts are caused by different understandings what Cloud Computing is. One general problem is the practice of “cloud washing”, meaning that many companies rename services already offered before to the name “cloud” (Colt 2011, 10), which often leads into uncertainties. Consequently, we want to clarify our understanding of Cloud Computing as laid down in the deliverable on the “Foundations of Cloud Computing”. It shows that the definition of Cloud Computing is an ongoing process driven by different actors with varying interest. Consequently we decided to focus on the current definition by NIST, which state that Cloud Computing is “a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” (Mell/Grance 2011, 2). Additionally the review of service, distribution, revenue and business models showed similar problems. In particular revenue and business models are still in flux and cannot be used for a further, more distinctive classification. Based on this the project focuses on public and with some limitations hybrid Cloud offerings offering services such as IaaS, PaaS, SaaS and some of their variations. In reverse it implies that private Cloud offering, which is technical continuation of previous virtualisation efforts and traditional ITOutsourcing are excluded, but that the boundaries between this can be sometimes blurry. It also means that other services like social network sites or the streaming of video or music are not in the focus, because these services either use different technologies and/or existed in some cases before the term “Cloud” was coined. Both points are also reasons to exclude all kinds of traditional eCommerce services such as online retailing, online booking or similar, though there are nowadays often based on Cloud infrastructures (Leimbach et al. 2013, 7-21). Based on this focus setting one aim of this deliverable is to review the existing literature in order to identify and analyse socio-economic impacts related to Cloud Computing. This includes direct impacts on consumers and business like for example impacts on the productivity or privacy. Above that we will also analyse indirect impacts on the society and economy as a whole. This includes for example impacts on economic growth or job creation as well as societal aspects like sustainability. The second aim of the deliverable is to perform an in-depth analysis of challenges for Cloud Computing like security, privacy or other legal implications. Both, the analysis of impacts as well as of challenges, are based on, but not limited to the results of the initial analysis of drivers and barriers in the previous deliverable, which shows that they are often interrelated. Finally the last aim of the deliverable is to discuss identified policy options, which can help to foster the potentials of Cloud Computing in Europe taking into account business user and consumer needs and expectations 10 Impacts of Cloud Computing ____________________________________________________________________________________________ 1.2. Structure of the report Given these aims the deliverable is structured into three main parts. The first part of the report takes up the discussions of possible direct impacts of Cloud Computing, which is closely related to the initial analysis of drivers for for the adoption and usage of it. As a first step the recent scientific and technical literature will be reviewed to see which direct impacts, positive as well as negative one, are associated with Cloud Computing. This includes direct impacts such as security or privacy on business, public services and consumers. This includes also one part on direct impacts like changes of market structure or business models on the IT industry itself. A further analysis is directed at analysing and assessing these direct impacts. In a second step the overall economic and societal impact of Cloud Computing will be discussed based on a review of the current literature on economic effects in terms of job creation and growth as well as a discussion on further societal impacts such as energy savings or improved public services. The second part of the deliverable is aimed at in-depth analyses of challenges for a further adoption and usage of Cloud Computing in Europe. This part is split into two sections following the initial clustering of challenges in the previous deliverable (Leimbach et al. 2012, 81-85). The first one deals with the challenges related to data security, data protection and privacy as well as data governance, i.e. the challenges related to the location, the transfer and the access to data. All of these points have a high importance for consumers and citizens as well as for business and public administrations. While in many cases this results from the same expectations or needs, it differs and complement each other in other cases. The second sections deals with the challenges of contractual relations like IPR or compliance and challenges for the market competitiveness like technical standards and interoperability. In particular the latter one is mainly of importance for business, but also the first point is often more important for business as for consumers. Although the clustering is mainly based on the results of previous deliverable, each analysis has been supplemented by further desk research and expert interviews. The analysis focuses strongly on the situation in Europe, but given the fact that Cloud Computing is global phenomena we will also take the situation and developments in other regions worldwide, in particular in the US where many of the leading providers are situated, into account as far as possible. Finally the report will conclude with a comprehensive overview and discussion of policy options. These options were either identified during the review of existing documents or result directly from the analysis of the different challenges and impacts. This task will serve as an input for the following final phase of the report dedicated to recommend different policy actions. 11 European Technology Assessment Group (ETAG) ____________________________________________________________________________________________ 2. SOCIO-ECONOMIC IMPACTS OF CLOUD COMPUTING 2.1. Introduction This first part of this deliverable deals with the socio-economic impacts of Cloud Computing that will be analysed based on review and examination of existing literature on it. In a first step the direct impacts of Cloud Computing, in particular on consumers and businesses, will be identified and analysed. This is based on the initial analysis of obstacles and drivers in Deliverable 2, but has been complemented and extended based on the literature, interviews and further case studies. It also includes an appraisal of impacts on the IT industry itself. This is followed in a second step by an analysis of the impacts on economy and society as a whole. This is mainly based on a review of the current literature on economic effects in terms of job creation and growth as well as a discussion on further societal impacts such as energy savings or improved public services. In the remainder of this section we describe some cases of public Cloud Computing services which are typical, according to the literature. There are only few independent case studies available which describe the costs and benefits for the various parties involved, e.g. for the Cloud Computing provider, for the customer and, if applicable, for the private or business end user. An often mentioned case is that of email, which is therefore mentioned below. Other cases describe the benefits of running scalable applications remotely. These brief case studies are presented in order to shed some light on how use cases of Cloud Computing look like which have impacts as described further below. Nuremberg Airport Customer Information Customer Nuremberg Airport Application The airport uses AWS Elastic Cloud Computing, Elastic Load Balancing, Simple Storage Service and CloudFront for handling their web hosting. The access to the homepage through passengers depends very much on season, disruptions etc. and therefore creates peaks, which can be handled with AWS cheaply. Benefit for Low cost: The airport saved 60-70% of IT costs through the use of customer AWS while having high availability in case of peaks. Reference Leclerque 2012 Customer Zotero Application Zotero is a free to use service to organise research and literature. It is Zotero Literature Service available offline and online with the option to synchronisation. It offers collaboration, offline and online access and storage. It uses the AWS Simple Storage Service. Benefit customer for The service is free to use and free of advertisements. It is funded by the United States Institute of Museum and Library Services, the Andrew W. Mellon Foundation, and the Alfred P. Sloan Foundation. References 12 Zotero 2013 Impacts of Cloud Computing ____________________________________________________________________________________________ Viadee Bar Ordering App Customer Viadee Application “Bestellbar”: free mobile app for ordering in restaurants. The app is used by a few restaurants in Münster, Germany. The company uses the Google App Engine. Benefit for The App Engine is cheaper than buying hardware, elastic and fast to customer implement. References Interview with company representative. University Mail Services Customer Many universities, especially in the US. Application Benefit Use of GMail and Drive. for customer Cheaper to use than to operate an e-mail system of their own; wider arrange of services (like calendar or Google Drive) and more storage available. References 2.2. Wimmer 2011 Impacts on business user Here we focus on the general use of Cloud Computing by businesses, including all size of firms and different branches of business. The reviewed literature provides many insights and expected impacts. The estimated numbers regarding some impacts such as cost and revenues vary between the different studies. We will comment on these findings and assess their accuracy. 2.2.1. Positive impacts Real Impacts Cost savings The starting costs for using a cloud service are low, compared to running one’s own servers. This is especially important for start-up companies who don't have the necessary capital, but are in need of one or several servers. It has been difficult to access reliable numbers for those cost savings; the case studies above indicate the nature of some savings. Bradshaw et al. (2012) conducted an online survey with 1056 selected businesses and found that 78% saw cost savings compared to traditional IT services, the average cost savings being between 10% - 19% (Bradshaw et al. 2012, 22). Flexibility Businesses can experiment with and implement new services faster than through traditional IT (Fielder/Brown 2012, 36). Through Cloud Computing services can be implemented faster because there is no time needed to deal with computer hardware and the starting costs are low (Ecorys 2009, 63). For example: If a program developer is hosting an app and needs more computing power than s/he has at hand at the moment, it is easier, faster and cheaper to rent computing power via a cloud service than buying the needed servers (Meyer et al. 2012). 13 European Technology Assessment Group (ETAG) ____________________________________________________________________________________________ Scalability The factor scalability is related to flexibility, but focuses on the demand for computing power. Through cloud services like, e.g. Amazon S3 (Scalable Storage Service) it is easy to adapt the computing power to what is really needed. This is much faster and cheaper than building up a data centre (Meyer et al. 2012, 4). An example is the video hosting service “Vimeo”: If a video is downloaded very often, or if many videos are uploaded, the computing capacity can be increased easily and cheaply (Venkataraman/McArthur 2011). So a startup may start with limited capacity, but can increase capacity very easily and cheaply. If such a company had their own servers, they might have costs for overcapacity, and at the same time might not be able to match demand if it suddenly increases. Professional Security Cloud providers can offer higher security for data than businesses without the necessary IT know-how. Thinking of very small medium sized companies, one can observe that some medium sized ones today have a very professional administration regarding, e.g. attacks and backups. Some, however, do not, and regarding very small ones, certainly IT-security is not one of their core competencies. In other words, SMEs without the highest level of ITmanagement may benefit from professional management in the cloud. Also data can be stored in more than one location and not only in the company itself (Fielder/Brown 2012, 48). This is not to deny that they will then have to deal with issues of transmission security, trust in the Cloud Computing service provider, and the possibility of insiders eavesdropping there. Estimated Impacts Cost Savings This is the most often mentioned impact that Cloud Computing has or is going to have on businesses. Also governments, e.g. local and regional ones, could possibly create significant savings if they use certain specific applications, centrally provided in the Cloud only. IDC did several studies on behalf of the EC, and we quote the final report by Bradshaw et al. (2012) as well an early, partially more detailed version (Cattaneo et al. 2012). The authors conducted an online survey with 1056 selected businesses and found that 78% saw cost savings compared to traditional IT services, the average cost savings being between 10% - 19%, as briefly mentioned above (Bradshaw et al. 2012, 22). The authors use a very broad and somewhat unclear definition of Cloud Computing services as “consumer and business IT products, services, and solutions delivered and consumed in real time over the Internet” and they only focus on public clouds (Bradshaw et al. 2012, 9). They name services like Gmail, Salesforce, Microsoft Azure or Amazon Web Services. These cost savings are not explained by the respondents in any detail , e.g. what cloud services have been used to reduce costs (Cattaneo et al. 2012, 28). It can be assumed, however, that the mentioned cost savings of 10% – 19% derive from services like Gmail or Salesforce, otherwise we would have heard of significantly shrinking IT-departments and IT-service provider staff. The questionnaire appears to be unavailable, but the studies mention that respondents were given exactly such examples. So it appears that those examples were 14 Impacts of Cloud Computing ____________________________________________________________________________________________ given (Cattaneo et al. 20), then respondents were asked whether they use it, and then they were asked for cost savings. It can't be said with certainty that from this cost savings arise in general in such an amount. There is no evidence that 64% of companies saved between 10% or 20% or 30% percent on their entire IT spendings. Against this this background it is unclear what the real cost savings from Cloud Computing are, i.e. the ratio of saved IT-costs to total IT-costs. Hogan et al. (2010) differentiate between three methods of cost savings. They base their findings on proprietary research provided by EMC, but do not describe their methods and findings it in detail. The authors differentiate between (1) IT capital expenditure: servers and computers. Overall 40% can be saved in public clouds, they write. (2) IT labour costs: 31% can be saved in public clouds. 3. IT power and cooling costs. 80% can be saved in public clouds (Hogan et al. 2010, 33). The majority of companies still manage their data on premise or in traditional outsourcing to a nearby data centre. We have not been able to spot any reports according to which IT departments actually shrank by 10% or 20%, the figures provided by IDC, or 30% or 40%, as provided by Hogan et al. Therefore we suggest treating those figures with care. In 2011, the European Commission expected 25% - 50% savings through the adoption of Cloud Computing (European Commission 2011, 1). A year later the Commission is quoting the estimation of cost savings between 10% - 20% (European Commission 2012b, 4), referring to the IDC studies described above. Accordingly, the papers from the European Commission suggest macroeconomic savings of IT-costs between 10% - 30%, apparently based on the same studies. However, there is no clear evidence for such large savings. Time to Market The flexibility and scalability of Cloud Computing can reduce the time that products hit the market. The implementation of new services that rely on computing power or storage can be achieved in a shorter time. An example for this is Dropbox, which was able to grow quickly thanks to using Cloud storage services themselves (Woloszynowicz 2011). Innovation & Creation of Companies Cloud Computing itself is an innovation that already has given the opportunity to create new services and businesses, not only for specialized markets but also for wider consumer use (cf. Ecorys 2009, 67). Many examples for companies that use Cloud Computing can be found, e.g. Airbnb, Ubisoft and Spotify (Amazon 2013b). Especially start-ups that use cloud technology can be innovative. 2.2.2. Negative impacts Real Impacts Loss of Control If a business transmits data into the cloud, it might lose control over it. In Cloud Computing services the user often is in danger of losing control over his or her data. It is often not clear what legal authority would be in charge and how to pursue a trial if needed. The 15 European Technology Assessment Group (ETAG) ____________________________________________________________________________________________ assessment of the security of cloud service providers can be difficult for business users due to its complexity (Robinson et al. 2012, 68). Another factor is that a cloud provider goes out of business and data cannot be accessed anymore (Fielder/Brown 2012, 48). In a study about concerns of businesses surrounding Cloud Computing “loss of control over data” was named by 26% of respondents (Aumasson et al. 2010, 246). They had interviews with over 60 self-selected “experts”. The general anxiety of malicious attacks aimed at cloud providers also increases the fear of loss of control (Borgmann et al. 2012, 11). In 2013 there have been attacks on cloud services (not to be addressed here), e.g. on the cloud service “Evernote” which had 50 million users in 2013 world-wide. The service is used for taking notes. User names and passwords were stolen (Vaughan-Nichols 2013). Summarising one can say that business customers need new competencies to negotiate with a Cloud Computing provider, to control it, to prepare for migration or disasters, etc. Some of these competencies are new, for an SME at least, and some are in the legal realm. Problems with Availability It is crucial for businesses that their services are available; otherwise they can lose customers and revenues. This availability consist of two main points. The first point is the issue of “downtime”, which is crucial in particular for business users. Even if the provider offers to make monetary amends for downtime, the amount of money, reputation etc. lost is often bigger than the bonus provided by the cloud service (Borgmann et al. 2012, 51). “Availability concerns” were named by 25% of the companies interviewed (Aumasson et al. 2010, 246). An example is Amazon: Amazon.com itself was down for one hour in January 2013 which caused Amazon a loss in general retail sales of 5,7$ million and also of reputation and customer satisfaction (Wohlsen 2013). Amazon Web Services had several outages in the last years, e.g. in 2012 the TV-on-demand service “Netflix”, which heavily relies on AWS, was down on Christmas Eve (Cook 2012). In case of an outage of a large provider, more than one company will be affected. Also, cloud service providers do not necessarily have an infrastructure which automatically ensures the availability of backup resources like processing power or that even ensures immediate access to backups of customer data (Schubert/Jefferey 2012, 11-14). The other point is the availability of sufficient bandwidth. Although the access to fast internet connections is growing in Europe, it can still be a problem. Broadband access is available in cities but still not in many rural areas. Since businesses not only reside in cities, this can be a problem for Cloud Computing. It is a challenge to deal with bandwidth limitations (Schubert & Jeffery 2012, 11 and p. ii). The limitation of network capacity makes the use of Cloud Computing for some companies impossible, because the amount of data transferred is too big and would take too long, e.g. it would take 45 days to transfer 10 Tbytes from San Francisco to Amazon in Seattle (Hofmann & Woods 2010, 92). Furthermore, Cloud Computing is not suitable for many services which require high speed, such as in banking, telecommunications or control of machines on the shop floor. 16 Impacts of Cloud Computing ____________________________________________________________________________________________ Liability / Contract Issues The questions that arise with the issues of liability and contract issues are crucial for businesses and are quite difficult to handle. Since Cloud Computing providers are often located in different countries both inside and outside the EU, it is difficult to assess liability (Aumasson et al. 2010, 243). At the moment the laws and regulations cover important aspects of how to deal with liability and contracts. Typically contracts are made at the vendors' discretion, except with large customers. This especially weakens SMEs, since they don't have the resources to properly negotiate terms (Bradshaw et al. 2012, 65). A discussion of cloud contracts can be found at Bradshaw et al. 2010. In some contracts the customers are held responsible if something happens to their data which is not in their power but in the power of the vendor. Since the users are still the owners of the data and not the provider, they are held responsible for what happens to the data. Estimated Impacts Loss of Revenues If the costs of business IT were really reduced by, e.g. 20%, many IT-service-providers, computer-vendors etc. would have significant reductions of revenues. If these savings existed, logically cloud customers would spend less on traditional IT-service providers, servers, etc. It has not been possible to identify any study which shows the significance of such a reduction of revenues. Also in the general IT media, no reports of significant revenue reductions with traditional IT-provision have been found. Therefore we conclude that not only are the effects of revenue reduction with traditional providers small, but also the savings which are earned due to using cloud services. Both appear to be marginal, which is in line with the total revenues of Cloud Computing providers mentioned in Section 2.2. Those in turn partially accrue from new types of businesses, such as app hosting. Loss of Confidentiality This deals with confidential business data and the handling of customer data abroad. For business users this means that they have or should be concerned if their data is secured in a cloud service. The question arises how well data is protected and what kind of data a business user should put in the cloud or not. This is especially important for customer data for which privacy regulations apply. Business critical data, like business secrets, is also an important issue since it is being put on shared infrastructure. Resource sharing makes a difference because traditionally a company which trusted a service provider was given its own server(s). With Cloud Computing, the infrastructure may be shared with competitors, which might bring in new risks. CIOs are particularly aware of it and are concerned about the US Patriot Act (FI3P 2011, 39). The news about the US “Prism” program on the US government eavesdropping on cloud data justify related worries: „We know the FBI has issued tens of thousands of ultra-secret National Security Letters to collect all sorts of data on people… and has been abusing them to spy on cloud-computer users.“ (Schneier 2013b). An earlier European Parliament report had investigated the US-dominated ECHELON system and found that “the purpose of the system is to intercept, at the very least, private and commercial communications“ (European Parliament 2001, p. 11) 17 European Technology Assessment Group (ETAG) ____________________________________________________________________________________________ 2.2.3. Ambiguous impacts Increased Competition The rise of Cloud Computing has increased the competition from outside Europe, for both large companies and SMEs. Through the cheap access to computing power via the cloud, companies from outside the EU “with lower labour costs that may provide cheap and effective standard service solutions in many areas” might enter the market (Ecorys 2009, 11). While this sounds plausible, Ecorys does not provide examples. Ecorys add that many small companies struggle to sell their services and products, especially on markets outside their national boarders, due to a lack of knowledge of how to use new services, without providing details (Ecorys 2009, 11). 2.2.4. Discussion and conclusions As the case studies indicate, the business cases for Cloud Computing currently are limited, but definitely exist. We thus try to provide a realistic, solid picture of what exists today. Currently, there is a lack of independent empirical studies about cost savings. Businesses will have to deal with new types of issues, such as keeping control of the whole process, assuring confidentiality and managing legal issues well. This would mean that if trustworthy Cloud Computing providers emerge, the cost savings in the future could be much larger. The European market in particular might become much larger if Cloud Computing customers could easily identify providers which comply with European legislation, and which do not give data to foreign competitors or governments. This in turn would justify the case of suitable certifications. This way Cloud Computing could have a much larger economic significance in the future and a large effect on traditional ITproviders. 2.3. Impacts on private users Two prominent examples for consumer use are the file hosting service Dropbox and the email and document service Gmail with several million private users worldwide. In December 2012 Dropbox reached 100 million users (Constine 2012). In June 2012 Gmail had 425 million users and 5 million users use Google Drive (Lardinois 2012). Another popular service is Apple's iCloud with 190 million users in October 2012 (Lardinois 2012). Indeed the standard service of web mail is not a new concept and Cloud Computing is more than an e-mail service with a simple web interface. Gmail offers not only a mail account but is also connected to Google Drive. Google drive offers the editing of files and the creating of new files stored in Google Drive. The Apple service iCloud offers the online synchronization of devices and the storage of files. 2.3.1. Positive impacts Convenience Data can be accessed from everywhere and on every internet-enabled device. This can significantly reduce problems with missing backups or files. A related aspect is the synchronisation of data, which can be automated (Kraus 2012, 9). Many applications may not need to be purchased or maintained, as the case of Google Docs shows. Many services can be used: “Consumers can use cloud services to store information (e.g. pictures or e- 18 Impacts of Cloud Computing ____________________________________________________________________________________________ mail) and to use software (e.g. social networks, streamed video and music, and games).” (European Commission 2012b, 4) Low Costs Many services are free (or at least small amounts of data), such as Dropbox, Gmail, Microsoft, Amazon, Evernote, Zotero or Apple iCloud. Of course, there are other “costs” users will face, e.g. the exploitation of data for mailings and advertisements. Also, free services may be designed in a way that they are somewhat clumsy or limited, such that paying for premium services makes them more attractive. 2.3.2. Negative impacts Cost In general Cloud Computing is cheap for consumer as most services are free, although often an upgrade to premium services is possible. As an example, we examined the costs of online backup of 100 GB for three years. We used some prices available in Germany in January 2013. The results can be found in Table 1. Table 1: Comparison of costs of backups: local vs. cloud Device Capacity 2 external hard drives of 160 GB 320 GB Costs 2 x 45,00 € = 90 € each (Amazon 2013a) Dropbox Google Drive 7,5 € per month, i.e. 270 € 100 GB for three years 100 GB 3,8 € per month, 136 € for three years We assumed a user would wish to have two physical backups if not storing in the cloud. Without accounting for electricity costs and network access, and without taking into account how long the online backup may take, the two hard drives cost about 90 €, while the online backup would cost about 50% more (136 € vs. 90 €). Thus we found that storing a larger amount of data in the cloud is more expensive than buying external hard drives. Slowness Availability The upload or download of data can be too slow, it might be too inconvenient, especially for big amounts of data. For example: in a small test, it took 38 minutes to upload 2 GB to Google Drive with a connection speed of 650 MBit/s respectively 80 MB/s, i.e. about 1MB/sec. Another aspect is that Cloud services only work if the consumer is online, if fees for transmitting data are reasonable, and if the quality of the connection is good. E.g. mobile data roaming fees hinder the upload of holiday videos or photos or downloading big amounts of data like videos. Also, in remote or holiday areas, basements, trains etc. connectivity might be low or non-existent. Furthermore, consumers might be put under pressure by the necessity to always be online and to respond immediately, e.g. to e-mails. 19 European Technology Assessment Group (ETAG) ____________________________________________________________________________________________ Dependence on Technology The more services that are being transferred to “the cloud”, the more the consumers will be dependent on technology. This applies to their devices, like smart phones or computers, and also to the Cloud Computing provider. There may be no suitable network access, e.g. when travelling, or on holidays. If a service is down, the consumer can do nothing about it and is stuck. One example is Microsoft's smartphone “Sidekick” which struggled with data loss in 2009 and then closed down in 2011 (Cellan-Jones 2009). This outage was one of the biggest in Cloud Computing history (Cellan-Jones 2009). Also, providers can disappear from the market, their sheer size is no guarantee for survival, as the cases of Enron and Lehman Brothers have shown. Reuse and resale of Information Consumers’ data might be sold or used in other ways. This applies to photos, documents, and personal information or in general everything that the consumers have uploaded. An example is the controversy that developed around the photo service “Instagram” in the year 2012 and its plans to change their terms and conditions of how pictures of users can be used for advertisement and even sold (Pepitone 2012, Schneier 2013a). Instagram had to withdraw their plans after critique by its userbase. A related issue is that information can be used for different purposes than originally intended if a company gets bankrupt or sold. Loss of Data For many private users, any online backup might be better than none. Still, users might lose data if Cloud providers disappear from the market or do not have good backups themselves. Some users of Amazon lost data in 2011 (Blodget 2011). Careful consumers might encrypt data themselves, and even store data with several providers, but this poses new challenges as they need to manage their decryption keys carefully. Loss of Privacy Cloud service providers may wish to use the data, for additional sales, for exchange with their business partners, etc. Insiders might read private data. Recently the photo service “Flickr” made private photos public due to a software problem and was not able to restore the prior links so that users had to manually edit them (Schwartz 2013). Also, governments may read data. Such legislation exists in many countries (Greif 2012). 2.3.3. Ambiguous impacts Consumerisation of IT The use of Cloud Computing services accelerates the reduction of separation between private and work life, which already has been going on for many years. Workers bring their own devices (BYOD) and use their own software or services and thus bypass their company IT-department, e.g. using Dropbox for team work or rent an Amazon server for a few Euros. Work documents can now be accessed either from the home computer or from the mobile device. This puts additional pressure on workers to respond faster and to work more. Workers try to avoid it – only 30% of the interviewed workers say that they like to access private and work e-mails through one device (Kraus 2012, 11). On the other hand, it allows working when travelling and when at home. The pros and cons of this have been 20 Impacts of Cloud Computing ____________________________________________________________________________________________ heatedly discussed with Yahoo!'s management forbidding its employees to work from home (Goldsmith 2013). Change of Lifestyle and Behaviour The use of Cloud Computing services can lead to new ways of how things are being done, like working on mobile devices, exchanging documents and using online collaboration tools (like Google Drive). This change in everyday use can bring advantages to users, but for some it might change their way of living in a negative way. It can lead to a dependency on those services and devices. Users might be absorbed by the new technology. But the increase of offers and customised services can also have a positive impact. 2.3.4. Discussion and conclusion Summarising we see some key advantages, such as the convenience of having data easily available from any Internet-enabled device. Also, consumers use many cloud-based services, such as hosted applications. Problems appear in the following fields: Availability, data losses, costs of network access, loss of privacy, and possible abuse of data for advertisements. 2.4. Impacts on the IT industry Not surprisingly Cloud Computing will also strongly affect the IT industry, in particular the software and IT services, itself. These impacts are manifold, but strongly interrelated. In the following section main aspects of these impacts should be described and analysed. 2.4.1. Impacts on the market and industry structure As outlined before (Leimbach et. al 2012, 33) one experiences some difficulties to assess the impact of Cloud Computing on the market and industry structure for several reasons. One reason is the different markets like the one for public Cloud services, Cloud related consultancy or Cloud technology, which are only partly covered by existing studies. Above that each market survey follows its own methodology, which varies strongly between the different market researcher as well as the market researcher themselves vary the methodology in time. Finally there is the problem of availability of these numbers. One example for these differences are the current market figures of Gartner and IDC for 2012. While IDC estimates revenues of 40 billion $ in 2012, Gartner estimates 110 billion $. Main reason is that Gartner also considers so called Cloud advertising (delivery of ads via cloudbased delivery networks) as well as parts of the some Cloud technologies as part of their forecast, which amounts for nearly 90% of the difference between both. However, most interesting might be that both estimates annual growth rates above 20%, which confirm the strong development of the market (IDC 2012, Gartner 2013). Overall, most of the market researchers therefore agree that the share of Cloud Computing for the overall market will grow in the next years from a few percent at the moment (~35%) to a range of 7-10% (5 years horizon) and 10-20% (10 years horizon) in the next years. Consequently Cloud will develop to an independent, fully-fledged segment of the market. According to their estimations mostly affected is the classical software product segment (including maintaining) as well as specific parts of the IT service market such as 21 European Technology Assessment Group (ETAG) ____________________________________________________________________________________________ IT outsourcing. This also reflects that in particular SaaS (including BPaaS) is and will stay the major segment within Cloud Computing, though in particular IaaS will grow at a higher rate (Leimbach et al. 2012, 34-37, IDC 2012, Gartner 2012). Nevertheless, this development is not a revolution as promised in early phases of Cloud Computing. It is much more an evolution of the market taking up trends that were already discussed before like the orientation towards service-based business models (Cusumano 2004, 36-42). Above that the market researchers also agree that the regional distribution in Cloud Computing follows the patterns of the overall market, i.e. North America is the biggest market also in Cloud Computing, followed by Europe. However some see especially emerging countries like India as strong pursuer in Cloud (Gartner 2013). But the even more important might be that not only the demand side follows the patterns of the existing market, but also the supply side. This includes that the majority of major Cloud players is of US origin. Examples are: x Google: of 50 billion $ total revenues (Trevis 2013) 314 million $ where made with Cloud services (Drive, App Engine, Compute Engine) (Panettieri 2013); x Amazon: the Amazon Cloud offers such as S3 (Storage/Back-up) or EC2 (IaaS) are estimated to have a revenue of around $1.5 – $2 billion in 2012 (Babcock 2013); x Microsoft: the different offers of Microsoft, in particular Microsoft Azure (PaaS) are estimated to generate annual revenues of $ 1 bn (2012/2013; Bloomberg 2013); x Rackspace: it is estimated that out of total yearly revenue of 1 billion $ roughly one third are result of dedicated Cloud services (back up, IaaS, PaaS); x Salesforce: the annual revenue in 2012 was 2.2 billion $ of which most, but not all is related to Cloud services. The most well known offer Salesforce CRM is estimated of generating revenues 731,65 million $ (Streetinsider 2013) This list shows at least two points. Firstly that like in the traditional market for software and IT services US companies dominate. This dominance become even more significant if other aspects like underlying technologies for example hypervisor etc. are also considered. Here companies like VMWare or Citrix dominate clearly, though the virtualisation software of Citrix, i.e. XEN, has been designed in the UK. The second point is that though this companies sum up for maybe a quarter of all revenues, there is a broad landscape of other suppliers for Cloud services. This spectrum reaches from existing global or regional player like SAP, Oracle or Atos and T-Systems, who are latecomers in the market, as well as many small and medium sized enterprises. This varies between the “cloud or digital born” startups like Zimory, blueKiwi, Datameer or even Dropbox or specialised suppliers of software products or IT services, which uses Cloud services as an extension or entrance to their products. Overall it can be stated that Cloud will change the market structure worldwide, but it will not revolutionize the market as some forecast said at the beginning of the hype. At the moment it seems obvious that the industry structure will only change a little, in particular the dominance of US companies in the traditional software and IT markets will continue, which fits to the point that it is not revolution, but more an evolution. 22 Impacts of Cloud Computing ____________________________________________________________________________________________ 2.4.2. Impact on innovativeness and business creation Though most studies that deal with innovation and Cloud Computing focus on the increased ability for innovations and improved time to market for Cloud user, it is obvious that Cloud offers also many new opportunities in the software and IT industry itself. Therefore Cloud offers chances for existing and new IT companies. It is self-evident that in particular the provision of infrastructure for Cloud Computing is in particular a chance for existing companies that already maintain server and data centre infrastructures. One group are data centre provider and hosting companies such as Terremark, Strato or most of the telecommunication providers such as BT or Deutsche Telekom. Others like Amazon may be a surprise at a first glance, but given the fact that the main business requires a worldwide, scalable infrastructure due to seasonal effects it seems reasonable to try to exploit this. Other examples are software product companies who can now create new business opportunities out of their main business by providing new usage models, which may also attract new user. One well known example for this is SAP by Design. Moreover also smaller software companies could also exploit these opportunities by using the infrastructure of other provider such as Amazon. Overall Cloud Computing offers foremost many opportunities for existing software and IT companies, but there also cases where Cloud Computing enables new business and new business models within the IT industry. The most well known example is Dropbox. It started as backup service, founded by two MIT students and became to one of the most famous backup, collaboration and synchronisation companies in the last four years with yearly revenue of more than 200 million $. Though many user (nearly 90%) may only use the free service, it shows that freemium concepts work out (Barret 2011). One major point is that they only use Cloud services of other providers like Amazon and do not have a dedicated own infrastructure. But Dropbox is not the only example, many others in particular provider of app based services for iOS or Android often use Cloud infrastructures provided by third parties. This shed a light on a trend that already began with the spread of utility computing as one of the predecessors of Cloud Computing in the mid 2000s. The overall idea behind it was that companies should focus on their core business while retrieving IT services as an outsourced utility service from an IT service provider. In the first line this idea addressed big user companies, but with the appearance of Cloud Computing and the world of App stores, the concept swept back to the IT and software industry itself in form so called cloud or digital born start ups. One idea behind that is that companies should focus on their core activity like in the case of Dropbox the provision of an easy to use interface for collaboration and synchronisation, but not deal with non-core activities like the provision of data centre infrastructure. This is also reflect in research on new business models for Cloud Computing, which show new type of actors like service aggregators (Leimeister et. al. 2010). However this new approach also contains some challenges. In particular multi sourcing, i.e. the use of multiple suppliers for similar or varying services, creates several challenges regarding legal construction, IPR, compliance or data protection conformity (Duisberg 2011). Moreover other emerging like service brokers such as Zimory, which act as dealing 23 European Technology Assessment Group (ETAG) ____________________________________________________________________________________________ platform between providers and users, could be a solution for it, but until now it is unclear if their role will develop or if they will be eaten up by the dominant market players (Leimeister et. al. 2010). 2.4.3. Commoditization and the impact on business models New business models like aggregators and brokers are one part of wider discussion on the commoditization of IT, i.e. if IT will become an utility comparable to electricity or water. As many other discussions in the context of Cloud it already started in the early 2000s pushed by an article and book of Nicolas Carr, at this time editor of the Harvard Business Review, entitled with the Question “Does IT matter?” (Carr 2003). His main argument was that IT is becoming more and more like an infrastructure and consequently would not be of strategic value anymore. This discussion became enforced by the appearance of Cloud with its typical attributes of scalability and “pay as you go”. Consequently Carr (2009) published a new book that explicitly states that IT or what he called the “information grid” will become an utility like electricity. This argumentation fueled the debate of Cloud critics arguing that Cloud Computing would lead into a cannibalization of the existing IT industry. In particular many IT service provider were afraid that as a service models would influence strongly their value chain, but also classical software producer were often reluctant against it (Giron et al. 2009). But many others also argued against the theory of commoditization of IT. The main arguments were summarized for example by Brynjolfsson et al. (2010). They state that IT and in particular Cloud Computing can’t be easily compared with utilities like electricity because of several differences in the technology and business models. Technical differences they see in speed of innovation, the limits of scalability and the latency challenge of computing. With regard to the business model they state that lacking complementarities, the problems of lock-in and interoperability as well as the security challenges posed by Cloud Computing differ Cloud Computing from electricity. On base of that they conclude that Cloud has not yet reached the state of an utility and that it is open if it ever will be in the future. Overall it is clear that Cloud Computing will impact business models in the software and IT industry, but this development is still in the flux. As outlined before there are many open questions around Cloud, not only for technological, but in particular for business reasons. Consequently it seems clear that Cloud Computing will change the traditional revenue streams and thereby business models in the software and IT industry, but there is still a need of consolidation of revenue models or type of actors. This also implies the question whether the existing ecosystems will exist further, maybe with different centers, or if the overall structure will change in long term (Leimbach et al. 2012, 13-20). Because of that there is until now no proof on the argument of commoditization of IT implying that the market will stagnate or even shrink, but it is also clear that Cloud Computing will not lead to an explosive growth of the overall market. 2.4.4. Discussion and conclusion Concluding it can be stated that Cloud Computing overall provides many opportunities, but also many uncertainties. Nevertheless it will impact the market and industry structure in some ways. 24 Impacts of Cloud Computing ____________________________________________________________________________________________ First of all it is obvious that will become an independent market segment, but it will not revolutionize the other sectors. Moreover it is also possible that over the years Cloud Computing to be taken up with existing or other emerging segments. Nevertheless the technical ideas will remain as a central part of the new IT infrastructure. Secondly, like in all new waves some new players will appear that manage to become global players in the industry. But to achieve this, one major challenge will be to turn their revenues into profit and grow further meanwhile. This is a point, where many failed before. Moreover, it is obviously that many of the existing global players will develop this field of activity and try to maintain their position. One major strategy for that is based on the acquisition of promising small and medium sized enterprises, which either hold relevant Cloud technologies or in particular business services. Examples for this strategy can be found in the US like Oracle as well as in Europe like Atos. Thirdly, as a consequence the industry structure and in particular the dominance of companies based in the US will not change overall. Only in some cases new players may appear or old disappear. From a European perspective this seems critical, because at least to some extent Cloud offers a window of opportunity, but as it seems many problems that hindered European companies to gain more importance like the limited growth potential for start-ups due to lack of unified markets and slower adoption or others did not cease to exist. 2.5. Impacts on economy and society as a whole In this section, as before, we basically list impacts as identified in the available scientific literature. 2.5.1. Positive impacts Creation of Jobs Real In the studies available, no figures for the creation or abolishment of jobs have been provided. Therefore, as an indication, a few figures from Cloud Computing companies are presented. For example, Salesforce and Rackspace, which are purely cloud-based have 8000 and 700 employees, respectively. Some European users of Cloud Computing, such as Spotify and Dailymotion, have 450 and 165 employees. Additionally many existing IT providers have created new units for Cloud Computing, but in these cases it is not possible to differentiate whether the positions created are new jobs or only existing jobs with a new label. The same is valid for user companies. Overall it is certain that there are new jobs among them, but the extent is unclear. Estimates While there is a lack of estimates for real job effects, there are several estimates according to which Cloud Computing will create many new jobs in the future. This is an often named impact of Cloud Computing and its adoption (Wauters et al. 2011, Aumasson et al. 2010, Bradshaw et al. 2012). Estimations are between 1.3 million and 3.8 million new jobs in the 25 European Technology Assessment Group (ETAG) ____________________________________________________________________________________________ EU by 2020, depending on different scenarios regarding changes or no changes in policy (Bradshaw et al. 2012, 9). Another estimation is 1 million jobs (Etro 2010, 108). Bradshaw et al. (2012) write: “Estimating the impact on employment is more complex. Considering only the potential of creation of new jobs, IDC estimates that in the ,Policy-drivenǥ scenario cloud-related workers could exceed 3.8 million, against some 1.3 million in the ,No Interventionǥ scenario. This does not take into account the jobs that would be lost or the workers that would be displaced by cloud-related reorganisation of business processes. The productivity increases driven by cloud efficiencies would most probably create in the short term an overall neutral (or even slightly negative) impact on total EU employment. However, in the medium-long term the overall dynamics of economic growth driven by cloud should result in a positive driver of employment, particularly considering the creation of new SMEs.” (Bradshaw et. al. 2012, 61). So in conclusion the authors say that at first jobs will even out or even slightly decrease, but in the long run the number might increase. Etro stresses that such estimates must be carefully assessed, since there will be an increase in hours worked which not necessarily will be directly transformed to new jobs – employees might also have to work more hours. How hours are directed into jobs is not specified by the author. Over the time this increase of jobs will vanish and will be normalised. Hogan expects 2.3 million new jobs between 2010 and 2015 in the UK, Germany, France, Italy and Spain (Hogan et al. 2010, 7) based on their study for those countries. There are various estimates for the number of future jobs, but surprisingly no attempts and figuring out today’s effect on jobs. The estimates for future jobs do not differentiate between jobs created, jobs lost and net effect. The only study which presents large parts of its method is Etro, who, however, is based on a very optimistic view of developments, see below. Creation of New Businesses Any rise of new jobs is closely connected to the creation of new businesses (SMEs). Etro expects that in wholesale and retail trade 156,000 new firms will be created and in real estate and other business activities 144,000 new SMEs will be created (Etro 2010, 110). The basis is unclear, e.g. it is not explained why the author expects more jobs in real estate, where Cloud Computing might as well mean more concentration. Contribution to GDP In the available studies, there are no estimates for the contribution of Cloud Computing to GPD during the last years. However, there are some forecasts. The study of Etro provides one estimate. He states that the average fixed ICT costs in Europe are 5% of total costs, and hence total ICT costs, including variable costs, are somewhat larger. He states that telecommunications has a large share of ICT costs, with more than 20%, while other industries have smaller shares. He then writes that those costs can be reduced between 1% and 5% (Etro 2009, 190; similarly in Etro 2011). From the way he puts it, it becomes clear that he does not, e.g. mean, 5% of 5%, i.e. 0,25%, but 26 Impacts of Cloud Computing ____________________________________________________________________________________________ apparently he believes that Cloud Computing can reduce the total costs of European firms by 1% to 5%. Feeding this input into his economic model leads to his result that annual GDP might grow between 0.05% and 0.3% with Cloud Computing (Etro 2009, 191). This effect depends crucially on the amount of the fixed ICT costs which would disappear. So if firms continue to need servers on the manufacturing floor (for fast response), computers to conduct banking transactions quickly, laptop computers to work anywhere at any time, then only a much smaller share of computers can be replaced. E.g. in telecommunications, due to low latency requirements, computing cannot be outsourced to a cheap remote server farm. Thus it appears that Etro's initial statement about the cost reductions going with the introduction of Cloud Computing is flawed and therefore his estimation for higher growth are unjustified. Another estimation for the increase of GDP in Europe is 88€ billion to 250€ billion for 2020 annually (Bradshaw et al., 2012, 60). The authors do not describe their method. For the period 2015 – 2020 the cumulative impact could range between €357 billion and €940 billion (non-policy driven scenario versus policy driven scenario) (Bradshaw et al. 2012, 61). But for 6 years, it would be at least 540 billion. The numbers appear inconsistent. Based on Bradshaw et al., the European Commission expects “an overall cumulative impact on GDP of EUR 957 billion [...] by 2020” (European Commission 2012b, 2). 2.5.2. Negative impacts Loss of Jobs It is or was feared that through the new ways of outsourcing that Cloud Computing offers IT jobs would be lost since companies would not need their IT staff anymore after the move into the cloud (Dignan 2011, Schubert/Jeffery 2012, 35). But no such shift has been reported in the available literature, there hasn't been a wave of IT staff that lost their jobs. Apparently only few jobs can be outsourced or can be replaced through the use of the cloud. There are still special tasks that can't be performed online, e.g. working closely with customers, time-critical computations or processing of highly confidential data. Reduction of GDP The reduction of jobs as forecast by Dignan (2011) and Schubert & Jeffery (2012) might lead to a general reduction of costs and prices and hence to a contraction of GDP. No such effect has been reported. Loss of Businesses The reduction of jobs as forecast by Dignan and Schubert & Jeffery might lead to a general reduction of the number of IT services firms, but no such effect has been reported. Dependency on US providers US Cloud Computing providers have a strong global role because the US allowed Internet services relatively early (e.g. because powerful modems were forbidden in Europe to protect proprietary PTT-services) and developed huge economies of scale, as well as companies with significant investment capabilities. Given the above mentioned issues with service quality, privacy etc., and assuming that Cloud Computing will become economically 27 European Technology Assessment Group (ETAG) ____________________________________________________________________________________________ more attractive in the future, European service providers following European regulations would become attractive. Adaptation of Content, Censorship The big cloud providers already censor content and will continue doing so. They adhere to local laws and moral concepts (Van der Velden/Kruk 2012). E.g. Apple removed a Wikileaks App from the App Store in 2010 (Van der Velden/Kruk 2012, 11) although they were not obliged to do so. In 2012 Apple removed an App that showed US drones that hit targets in Pakistan, Yemen and Somalia (Van der Velden/Kruk 2012, 11). 2.5.3. Ambiguous impacts Environmental Aspects (Resources, Energy, Waste) It is very difficult to assess the environmental aspects that come with Cloud Computing: Will it lead to less emissions and energy consumption because companies will outsource their IT to shared resources or will those server farms and networks produce even more emissions? In their study for Greenpeace, Cook & Van Horn stress the difficulty to find clear numbers and make assumptions about emissions coming from the cloud (Cook/Van Horn 2010, 4). Cloud Computing respectively IT innovations can cut emissions; this possible advantage of cloud services is being used in advertisement but it is difficult to evaluate the companies concerning emission output (Cook/Van Horn 2010, 5). Emissions produced by ICT in general will rise unless measures are being taken. But they could also be reduced through smart use of technology which again could lead to a higher consumption in general (FI3P 2011, 105). This issue is complicated and can move both in positive and negative directions. The European Commission considers the access to information, regarding how a product affects the environment, important for consumers (European Commission 2012a, 5). It mentions the positive aspects that Cloud Computing could bring, e.g. saving energy through low-energy data centers and the use of green energy (European Commission 2012b, 4). In all four documents mentioned, no figures on a change of energy consumption because of Cloud Computing have been mentioned. 2.5.4. Discussion and conclusions For the society as a whole, regarding jobs and growth, currently Cloud Computing has little impact at the moment. The estimates provided by Etro appear to be based on very optimistic input variables for cost savings and the emergence of new SMEs. Another point is that the model uses estimated figures on cost savings, because at the moment there is still a lack of precise data. Only longitudinal firm level studies could provide this, which will need some time between the appearance of a technology and its diffusion. As a consequence the results have to be taken with care, in particular because Europe always lagged behind in the diffusion of emerging IT technologies. This is also seen as one reason for the productivity gap between the US and Europe (van Ark 2003). However, in the long run the positive economic effects may increase, but as recent studies shows it also bears risks. 28 Impacts of Cloud Computing ____________________________________________________________________________________________ Brynjolfson and McAffee (2011), two economists from the MIT, have recently shown in their long time analysis of the impact of It technologies on the US economy that in particular job creation will only work out if certain conditions are in place, in particular the availability of infrastructures and higher skilled workforce. The reason is that as shown by their analysis productivity and growth may improve, but that many jobs especially low class jobs were also destroyed by IT diffusion in the long run. Until now this was outweighed by the creation of new more high qualified jobs, but to keep up with the increased speed of diffusion it will require targeted efforts regarding education, infrastructure and the institutional development to achieve a positive return in jobs. Another aspect is that of service provision by US companies. This has significance in terms of jobs and income, government access to data, and even censorship. Consequently it would be desirable to have a vivid and competitive market, which would also contribute to realisation of the positive potentials of Cloud Computing, in particular if cheap, reliable, privacy-protecting European Cloud providers appear. This in turn means that companies may, in the long run, have comparative disadvantages if they will not adopt to such high quality, cheap services. Obvious policy consequences would be to encourage the emergence of European providers with high quality services. Certifications might show law compliance, quality of backups, quality of intrusion detection, etc. 2.6. Conclusions After this review of impacts we see that global revenues from the sales of public cloud services with shared resources are in the range of a few billion $, earned by some vendors, e.g. Amazon. Similarly, both large job growth with Cloud Computing providers and large job reductions in company IT-departments apparently have not yet appeared. Key obstacles are bandwidth, security (especially confidentiality) and outages, next to legal issues such as data protection or contractual relationships. On the other hand, Cloud Computing offers entrepreneurs methods to kick start new businesses as we can see with examples like Air B'n'B, Zotero, the examples mentioned at Amazon or Facebook-Apps that run on Cloud Computing machines. So in sum there appears to be much hype about Cloud Computing. Yet, if obstacles were overcome, economic benefits of resource sharing might be earned. Moreover it also requires that framework conditions are in place that allows realising the benefits of a strong adoption and utilisation. . Therefore we address some obstacles and requirements in other chapters of this report, and intend to evaluate them all at the planned project workshop. Still, some policy options can already be mentioned: x Address bandwidth and availability in rural areas, e.g. through licensing “light”, unlicensed communications with higher reach, or mandatory coverage. x Address costs for network access, such as an abolishment of mobile data roaming fees. x Review the Safe Harbour principle, negotiate conditions for government access or encourage the development of Cloud systems which protect secrets reliably. 29 European Technology Assessment Group (ETAG) ____________________________________________________________________________________________ x Make portability easy, e.g. by enforcing providers to provide interfaces and data formats. x Provide a right to have data deleted. x To encourage the use of provider certification, which show compliance with European regulations. Certifications could also cover quality of backups, quality of intrusion detection, etc. x To encourage the emergence of European providers with high quality services. x Organise a portal for addressing problems with Cloud Computing services. x Address the educational needs caused by Cloud Computing. 30 Impacts of Cloud Computing 3. SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING 3.1. Introduction As shown in our initial analyses of drivers and barriers of Cloud Computing (Leimbach et al. 2012, 83-85) as well as in the previous section on socio-economic impacts, there is one cluster of barriers and impacts focusing on the topics of data security, data location, privacy and trust. These issues have a high importance for all type of users, business and administrative as well as consumer, though the reasons and perspectives might differ. Consequently the next section will try to depicture these reasons and show why these aspects are of importance and what are the related concerns, problems, expectations and challenges in it. The following section will then analyze technical threats and responses to data security. This will be followed by an analysis of the current data protection regime in the EU as well as the ongoing changes from the point of view of Cloud Computing. In the final section will address the question of data location, in particular the question of enforcement of EU standards and laws outside of the union, as well as the question of data access by third parties. 3.2. Overall relevance of security and privacy This section first provides an overview of debates surrounding risks connected to the adoption of cloud computing, interjecting along the way introductory remarks to support the reader’s comprehension of the issues at stake. The section then goes on to highlight particular risks as seen from three main user perspectives, namely businesses, governments and private citizens. The section is meant to provide an introduction to the basic problematic of cloud computing security, the implications of which are explicated in the subsequent sections on security solutions, data protection legislation, competitiveness and international cloud governance. A few years ago, cloud was often branded as a “paradigmatic shift” in ICT development and there was much talk about a “transition to the cloud” implying that cloud computing could and would very rapidly replace most of the existing on-site ICT infrastructure owned by companies, governments and personal users. The key driver for this hype was the idea of cost savings and increased flexibility in ICT infrastructure. These factors remain at the forefront today (Rader 2012, Vanson Bourne 2012, KPMG 2013). However, societal attitudes towards cloud computing seem to be maturing as real-world experiences with the complexities of technological transformation have been harvested by different user groups. In 2012, Gartner placed cloud computing as a whole in the downward-turn part of the Gartner hype-cycle (“the trough of disillusionment”) with a number of concrete cloud applications still being surrounded by the kind of hype leading to a “peak of inflated expectations” (see figure 1 below). In 2013, if we are to follow Gartner’s 2012 predictions, cloud computing as a whole should be moving into the “slope of enlightenment” with concrete services reaching the downward-turn phase. 31 European Technology Assessment Group (ETAG) Such predictions are highly speculative, of course, but worth mentioning here since they seem to fit roughly with the picture drawn by our research for this report. Concrete user experiences are gradually reshaping opinions on the practicalities of cloud computing and the potentials to be harvested from it. From an early phase of naïve assumptions about the cloud providing a “technical fix” for many of the inefficiencies haunting modern knowledgework, a greater awareness of the organizational transformations needed on the part of users to harvest such benefits is apparent in cloud debates involving business and government users. This involves a shift of attention away from the immediate gains from 1to-1 replacement of on-site ICT functions with cloud replicas to the gains to be had from process innovation making use of novel opportunities which cloud technology presents. Positive impacts The positive impacts of adopting cloud computing are generally associated with cost savings out of which comes a lowered threshold for trying out new ICT solutions and a higher degree of organizational flexibility. As shown in section 2 of this report, however, the picture of how such cost savings are harvested, however, is becoming more refined. A first generation of cloud services including cloud-based e-mail, file storage and office applications have naturally played a central role in the formation of personal users’ attitudes towards the cloud. And for businesses and government, access to the raw computing power of giant server farms to support existing types of ICT infrastructure such as websites and databases has also played an important role in cutting cost. Cost savings have thus been harvested by replacing software and hardware as products with service equivalents. But in a second generation of services developed in recent years, providers are providing cloud-based solutions that go much deeper into the workings of organisations, such as accounting, business intelligence, and even ICT support of manufacturing 32 Impacts of Cloud Computing processes (KMPG 2013). Implementing these deeper seated types of solutions demands of organisations that the organisational processes to be facilitated by cloud services are adapted to fit to the limitations of the cloud service – a classic example of technologydriven transformation. A cloud services mature, they thus come into contact with the heavy questions of organisational innovation and transformation and what was originally viewed as an easy fix becomes one element of many in the on-going efforts of organisations to optimize processes. While it may not make sense to expect a general “transition to the cloud” taking place in one fell swoop, still cloud technology will most likely come to take up an ever increasing part of the total ICT infrastructure supporting business, administration, and our daily lives. Security risks The situation, however, is not all roses. The dangers inherent in the centralization of data processing have received explosive attention on the heels of the leaks by NSA contractor Edward Snowden of information about secret surveillance programs in the U.S. and the U.K. According to the Guardian, Snowden has documented a secret program of the U.S. National Security Agency (NSA) entitled PRISM through which the NSA has obtained access without warrants to personal information such as search histories, e-mail contents, file transfers and live chats from users of services provided by Google, Facebook, Apple and other U.S. internet giants (Greenwald and MacAskill 2013a). Followed by a number of other revelations about trans-border intelligence gathering taking place by way of access to the high-speed fibre cables and centralized centres for data storage and communication, which support the information society (e.g. Poitras et. al. 2013), Snowden revelations may have already fundamentally changed public perceptions of the risks/benefit calculus in connection with cloud computing. Even before the Snowden leaks, security and privacy consistently scored among the most prevalent concerns with regard to cloud adoption for businesses and government agencies in Europe as well as for individual citizens (Cattedu and Hogben 2009b; Cattedu 2011; WEF 2011; KPMG 2013). The key argument seems today to turn around the total security value of cloud solutions versus on-site solutions. On one hand, professional cloud providers are more often than not able to provide much more advanced data protection at both software and hardware levels. On the other hand, amassing the data of potentially millions of users in one great cluster of serves all connected via the same hypervisor produces a highly attractive target for hackers, be they individual enthusiasts, political groups, industrial spies or foreign governments. The PRISM scandal only illustrates this point all too well. In the absence of an overarching framework for creating trust in the cloud, coming to a balanced assessment of these issues still rests on the shoulders on the individual CIO of business or governments. Among the top security threats in the cloud are: x Data breaches: While cloud providers are able to uphold much more professional data security than the average cloud user, amassing great amounts of data together in centralized systems also creates a focus point for hackers and spies. So while security 33 European Technology Assessment Group (ETAG) holes will be fixed quicker, the risk associated with them is greater than in ordinary ICT use. x Data loss: Attacks by hackers, accidental erasure by providers, physical catastrophes like fire or earthquakes, and providers going out of service all represent ways in which permanent data loss may be suffered by cloud users. x Hijacking of accounts: Techniques for hijacking electronic communication via phishing or out-right fraud have a long history unconnected to the cloud. But with cloud service use, the gravity of such access gained can be much higher. Cloud-based e-mail accounts, for instance, quickly become the centre for access to almost all other communication channels of a user and thus enable identity theft as well the ill-willed use of users’ online identity. x Denial-of-service: Distributed denial-of-service (DDoS) attacks are a primitive, but effective way of causing disturbances to online communications. By overloading communication channels and computing resources, such attacks slow everything to a grinding halt. While the scalability of the cloud initially creates a greater tolerance at system level for such attacks, DDoS methods are continually evolving. x Management interface (API) compromise: As cloud services evolve into whole ecosystems of services built upon the infrastructure of just a few providers, the security of the interfaces providing access to the systems of those core providers becomes more and more important. x Loss of governance: Perhaps the most key issue in the debate about data protection practices and legislation having to do with the cloud, the basic observation remains true that users lose control of their data (data governance) when transitioning to the cloud. This issue underlies debates about transparency, standardization, and auditability of cloud services as well as information assurance systems. x Malicious insiders: The enormous mass of data stored in clouds represent and unprecedented gathering of information value. Having access to such values creates temptations for exploiting that value by malicious insiders. Beyond the cloak-anddagger scenario – the risk of which is very real – of cloud employees going rogue or becoming moles for outside forces, the “malicious insider” may also be the cloud provider itself exploiting personal data in illicit ways or governments gaining direct access to the cloud. Establishing reliability and trust On the basis of these well-known threats, the question of establishing trust in the cloud has become more and more complicated, continually driving towards a need for societal-level solutions. The process of public and private actors working towards establishing such trust and reliability can been divided in 5 major steps: x Threat identification: Firstly, the agency identified “top security risks” associated with the cloud, which still remain key to the discussion of security in the cloud (see figure 2 below). These risks are identified to act as a framework for understanding cloud-specific security issues. These are not, as documented in by the Cloud Security Alliance (CSA 34 Impacts of Cloud Computing 2013), necessarily the most pressing matters at any given time. But conceptually, they are fundamental to the relationship cloud users enter into with their cloud provider. Other institutions have sought to provide on-going monitoring of security concerns based, among these the CSA mentioned above, the IEEE, and the KPMG consultancy. Until recently, however, no official body had been established to provide European-level CERT (Computer Emergency Response Team) services with regard to the cloud. This was changed in April this year when ENISA was awarded official EU CERT status by the European Parliament, mandating the agency to extend its capacity to counter cyberattacks and to support other European agencies such as Europol’s cyber-crime division as well as national level bodies such as data protection agencies (EP 2013). x Information security assurance: Secondly, ENISA along with others identified the lack of auditability and trustworthy security assurance as a threat to the ability of data controllers (cloud users) to verify the basic security of their data. This represents a fundamental weakness in the total technical and legal data protection situation exists in the relationship between a cloud user and a cloud provider. The lack of clear assurance measures in typical cloud contracts interjects a layer of uncertainty into the risk assessment of the user. And it weakens the ability of users to make a qualified choice between cloud providers’ service offerings. The Article 29 Working Party has in its opinion on cloud computing highlighted the need to create measures to gain greater clarity about data protection measures taken by cloud providers and has in that context welcomed the provisions in Article 26 of the EC’s data protection regulation proposal for making cloud providers more accountable towards users (WP 196: 23). In terms of practical solutions for establishing easy security assurance, and thereby greater transparency and accountability, ENISA has provided an assurance framework (ENISA 2009c) meant to be immediately useful to business leaders and CIOs in assessing security in connection with cloud adoption. The framework was also made to inspire the work of cloud providers attempting to create common standards and European policy makers in their work of providing legal measures and economic incentives for the development of trustworthy cloud solutions. Similar frameworks have been produced by other organizations, both public and private, including the SCAP automated system based on NIST standards, the CloudAudit and Cloud Controls Matrix initiatives under CSA, the ISACA Cloud Computing Management Audit/Assurance Program, and the U.S. Federal Risk and Authorization Management Programme (FedRAMP) aimed at streamlining cloud providers’ authorization as providers to the U.S. government (ITTL 2011). From a European perspective, however none of these initiatives has managed to establish a truly global consensus on assurance standards. For this reason, the European Commission included as a key pillar in its 2012 cloud strategy the commitment to work with industry and relevant public sector actors to establish such a consensus (COM 2012/529). Soft governance alone, however, will not be enough to determine the specific boundaries within which the cloud can develop. The outcome of the on-going negotiations to revise the European data protection directive and the regimes of international data governance collaboration, which accompanies the directive, will play a key role in deciding, which standards of system development and which practices of information security and assurance will shape future developments. x Addressing SME data protection concerns: SMEs are key to the economy and their attitudes and experiences concerning the cloud are thus crucial to the question, which 35 European Technology Assessment Group (ETAG) role the cloud can ultimately come to play as an economic factor. We will look closer at the specific impacts and risks of the cloud on SMEs below. Importantly, ENISA and others (WEF 2010, 2011, EC 2011, IDC 2011) have documented clearly that they are highly concerned about security issues in the cloud and the dangers implied, such as data loss due to failure and security breaches due to system flaws, hackers, industrial espionage. Although cloud providers typically focus on the security upside of the cloud, which is increased professionalism and presumably, scrutiny be foreign governments should now be added to the list. Since SME cloud adoption has been pointed to as a necessary step to reap the society-level economic potential of cloud computing (Etro 2009, 2011, Liebenau et. al. 2012), it becomes particularly pertinent to address such concerns. But at the same time, the lack of capacity in typical SMEs for conducting proper risk assessments accentuates the need for societal-level solutions to cloud security. Individual SMEs will in many cases be unable to utilize even the most standardized assessment and/or auditing systems. They will need security issues to be solved “behind the scenes” so to speak by providers and legislators so as to ensure the provision of fundamentally safer (and more trustworthy) solutions. We will look into such solutions in section 3.3. x Data security for governments: Governments-as-customers make up an especially important category of actors in the development of the cloud. Due to their sheer size and their central role in societal development, adoption of the cloud by government bodies could pop the cork for the society-wide transition to the cloud. But for governments, there are areas where risk vs. benefit calculations, where possible efficiency gains could never truly outweigh the losses suffered in case of security breaches and subsequent malevolent use of information. Such areas include health, financial information, and social services information among others. Technically, these risks are identical to those run by any type of user: data loss We will look closer at examples of such risks below. Due to the severity of risks in this area governments have moved slower than business actors in adopting cloud technology (KPMG 2012). Again, individual risk assessment comes into focus as a key practice necessary for stepwise adoption of cloud services. ENISA (2011) provided guidance for such assessment and for negotiating service-level contracts and assurance conditions with cloud providers. In a similar vein, but with an even more hands-on approach to the safe adoption of cloud services, the U.S. National Institute of Science and Technology (NIST) is currently in the process of creating finalizing its Cloud Computing Security Reference Architecture which will allow individual government organisations to assess the most appropriate cloud services to adopt. From a certain point of view, such security assessments carried out by government bodies and the negotiations with cloud providers which follow from them could act as a crowbar for the establishment of best practices in contracts and assurance practices. This could especially be the case in those countries, where government cloud adoption has been put into an overall systematic, such as in the U.S., the U.K, Japan and to some degree France. All of these countries have so-called G-Cloud initiatives in place, which we will look into in some detail below. But again, the overall legal framework cannot be ignored and individual negotiations seem unable to solve the more fundamental issues of security and privacy. We have thus seen cases in which the Danish and Swedish Data Protection Agencies have denied local government access to proprietary cloud solutions on the basis that risk assessment 36 Impacts of Cloud Computing and security assurance were not possible to the satisfaction of the Agencies based on the information provided by the private cloud providers in questions (refs). Also here, the need for universal standards seems pressing. x Societal level risk assessment: The latest step taken by ENISA in assessing risk associated with cloud computing is to assess the aggregated risk effects on society as a whole from widespread and increasing cloud adoption (Dekker 2012). So far, it seems that ENISA is the only government risk assessment organization to take up this perspective. With the adoption of cloud services by ever more critical sectors of society (key examples are the energy, finance and health sectors) cloud computing in itself comes to take a place in the critical infrastructure of society. Here again, with even greater gravity, we come across the “double-edged sword”-argument: that on the one professional cloud providers are able to employ state-of-the-art security measures; but that on the other hand, such massive concentration of important data hugely increases the impact of breaches and provides an alluring target for malevolent intruders. This last step firmly connects the cloud debate to the debate over public governance of ICT security. Without mandatory incidence reports and continual monitoring, auditing and testing of systems, no real progress can be made towards truly trustworthy cloud services. Such demands can only be made by governments and inter-governmental institutions. At the same time, the widely heard call for standardization is reiterated, since also here the swift and efficient spread of best practices is key to providing users with safe solutions. With the Snowden leaks and the ensuing scandal, the cloud debate is now moving into a more explicitly political phase. The main questions so far have regarded benefits to users and the risks associated with security breaches. The cloud in itself has been viewed as a neutral, purely technical space defined entirely by its utility to users. The possibility of breaches of security and privacy occurring from within the cloud itself has been attributed to the possible acts of the “malicious insider” acting on behalf of outside interests. But now, questions are being raised about the inherent neutrality of cloud providers. Can we in fact trust that cloud providers act first and foremost to serve users? On the one hand, there seems to be a real risk that private information can be monitored by government intelligence (a risk we will look at more closely in section 3.5). On the other hand, the very possibility of such data monitoring within the cloud and the use to be made of it also brings into question the use, cloud providers might themselves make of the data. If cloud data has in fact been subjected to data mining by the U.S. government, can we trust that major cloud providers - themselves cutting-edge experts in data mining – do not make similar, albeit commercially oriented uses of our private data? As recently stated by Vice President Neelie Kroes, we live in an age of “total information” (MEMO/13/654). But will this also prove to be an age of total information abuse? Clearly, the political work to establish and maintain trust in cloud services is only now beginning and cannot clearly be isolated from broader questions of data security in an age of big data and ubiquitous computing. 3.2.1. Security and privacy for businesses Businesses have been the frontrunners in cloud computing uptake, European businesses lacking somewhat behind the more mature U.S. market. KPMG (2013) indicates that while security remains one of the top concerns of IT and business leaders with regard to cloud 37 European Technology Assessment Group (ETAG) computing, it is no longer the top concern (as it was in a 2011 survey by the same company) (KPMG 2013, 14). Ranking as top concerns are now issues of implementation (IT leaders) and business transformation to make use of cloud to realize long-term gains (business leaders). “Gaining real cost savings from the cloud is about more than simply moving from fixed costs to operating costs; the greatest cost savings – and, more importantly, the transformational business benefits – will come from the longer term outcomes such as more efficient processes, more flexible operating models and faster entry into new markets and geographies” (KPMG 2013, 9). Harvesting these long-term benefits will, according to KPMG, demand that IT and business leaders work together over long enough stretches of time and under a strategic perspective focusing on process innovation and transformation. The KPMG survey respondents rank security concerns acting as barriers to cloud uptake and the gravity of each (scored on a 1-5 scale) as follows: x Data loss and privacy risks: 30% (Gravity: 4.19) x General security risks: 26% (Gravity 4.11) x Risk of intellectual property theft: 21% (Gravity: 4.21) x Legal and regulatory compliance: 18% (Gravity 3.95) x System availability and business continuity risks: 16% (Gravity: 4.03) The KPMG survey furthermore indicates that while security remains one among top concerns, it seems no longer to be hindering adoption in terms of real-world behaviour (KPMG 2013, 17). In a European context, this result might not be duplicable as the U.S. cloud market from which respondents were drawn has been faster to mature. It might, however, be indicative of experiences to come for European business users. One last point to note from the KMPG survey is that cloud is being adopted in an increasing breadth of business areas, which rank: HR (57%), IT management (54%), e- mail/collaboration software (53%), sales/marketing (52%), customer care (51%), office tools/productivity (51%), supply chain and logistics (42%), finance and accounting/financial management (41%), business intelligence/analytics (41%), security management (40%), content management (39%), sourcing and procurement (36%), tax (36%), operations/manufacturing (35%). Cattaneo et. al. 2012 clustered a group of barriers to cloud uptake by businesses as follows: x Data jurisdiction and location x Security and Trust x Portability and technology transparency x Business (usefulness, local support/language) x Industrial policy (internet connection speed, taxes) Analysing the relation between these barriers as perceived by survey participants and as indicated by their actual cloud adoption behaviour, the report indicated a high degree of 38 Impacts of Cloud Computing alignment between perceptions and behaviour on the part of large European companies while SMEs were shown to suffer from a disconnect between perceptions and behaviour; SMEs also point to legal jurisdiction/data location and security as main barriers uptake, but behavioural indicators point to evaluation of usefulness and trust as main barriers (Cattaneo 2012, 39). ENISA (2009b, 15) identifies “confidentiality of corporate data” and “privacy” as the two most pressing concerns for SMEs with regard to Cloud Computing use in their businesses. 43 of 64 responses classify “confidentiality of corporate data” as a “showstopper” while 17 of 64 classified it as “very important”. For “privacy”, the same numbers are 31 and 28 out of 66 respectively. Other issues identified by significant portions of respondents (more than two thirds in total) as “showstoppers” or “very important” are: availability of services and/or data; integrity of services and/or data; loss of control of services and/or data; lack of liability of providers in case of security incidents. Issues more often rated to be of “medium importance” by respondents in the survey included: inconsistency between transnational laws and regulations; unclear schemes in the pay per use approach; cost and difficulty of migration to the cloud; intra-cloud migration (i.e. vendor lock-in). ENISA’s report on Critical Cloud Computing (Dekker 2012) notes that still more sectors are adopting cloud services in still more business areas. New sectors adopting cloud services include the finance sector, the transport sector, and the energy sector. These sectors being “critical infrastructure sectors” cloud computing in itself becomes “critical” (Dekker 2012, 4-5). Increased adoption thus leads to a qualitative shift in the significance of cloud security issues, which in the first instance affect individual business users; cumulatively, these issues become issues for the broader society. As cloud services become the underlying infrastructure for more and more Internet based business and public services, daily serving tens of millions of customers and containing their private data, risks associated with failures and breaches – while more manageable due to higher competency levels – become ever more grave. Extensive lobbying by the ICT industry has sought to establish an image of the proposed data protection regulation as being “too burdensome” for enterprises, especially SMEs providing cloud-based products and services such as apps. Areas in focus are the obligations to provide users notice of data breaches, to gain users’ consent for data processing outside of the original agreement, the right to be forgotten, accountability provisions, and more. These are all treated in section 3.5 of this report. On the overall, it is important to take note that this regard for SMEs-as-providers must be balanced against of the above mentioned concerns of SMEs-as-users about security and data protection. Most SMEs are not cloud-providers, but potential users. And under current practices, they stand in a highly uneven position in relation to cloud providers (be they major or minor) with regard to knowledge and the ability to enforce data security. Furthermore, with more and more SMEs adopting cloud services, cloud services enter into the territory of critical infrastructure (Dekker 2012) and as such, into a territory where societal-level demands to uphold certain standards of security is generally accepted. While it is clear that new legislation should not stifle the growth of potentially sound businesses in the cloud industry, the growth of the industry as a whole should on the other hand not be allowed at the 39 European Technology Assessment Group (ETAG) expense of society. The question of who puts burdens onto who should thus be scrutinized carefully before making policy decisions in this area. 3.2.2. Security and privacy for government Governments stand to harvest many of the same benefits as businesses from the adoption of cloud computing services, but due to the different organisational logics in play in public vs. private organisation these benefits typically play a slightly different role. By adopting cloud technology, CIOs in government organisations are relieved of many routine maintenance operations and thus free to focus on development efforts. Depending on budgetary considerations this may lead either to the slimming down of ICT staff or it may lead to more manpower going into ICT-centred innovation projects. Such saving of cost and effort are magnified when cloud services are adopted uniformly across different organisational units, who would otherwise be carrying out duplicated ICT maintenance procedures. Choosing to implement common cloud solutions can furthermore speed up inter-organisational collaboration as formats and procedures are aligned through the mediation of the commonly used technology. The manpower freed up as routine tasks are outsourced to the cloud provider can, as mentioned, be devoted to already existing ideas for innovation projects. But going even further, government organisations may experience the freedom to more flexibly experiment with new types of cloud services, which are relatively cheap to try and typically easy to implement. With this increased flexibility, innovation in government services becomes easier to implement and a greater confidence in carrying out experiments may take root. However, due to the often more critical nature of government services, the obligation to reliably meet set quality criteria may – more often than in the case of businesses outweigh the temptation to enjoy the cost savings and increased flexibility promised by cloud solutions (KMPG 2013). Such considerations also lead government organisations to opt for private or hybrid cloud solutions more often than public clouds. All things being equal, there is a greater degree of (legal) requirements for government organisations to maintain actual control of data security practices and ICT architecture than in the case of private organisations. And minor failings, which might be considered acceptable in connection with the service delivery of some private companies, might in some governmental sectors like energy, health, transport, or defence be entirely unacceptable. This creates an even more pressing need on the part of public sector organisations for quality standardisation and security assurance. Cloud computing is being adopted by different national governments at different rates. On the overall, the public sectors of industrialized nations lack behind the private sector (KPMG 2013). But some countries are spearheading cloud adoption. One strategy is the creation of dedicated government clouds (or “g-clouds”) to provide cloud support for individual government units through some system of centralised provisioning and quality assurance. Countries following this strategy include the U.S., the U.K., France, Japan and Singapore. Another strategy, followed by smaller countries such as the Netherlands and Denmark, is to create commonly strategy for evaluation of cloud offerings and adoption procedures to be implemented locally by individual organisation with the support of one or more centres of excellence in cloud use and implementation. ICT agencies of the Nordic countries have 40 Impacts of Cloud Computing worked to establish collaboration on potential synergies between cloud adoption in the different countries (TemaNord 2011). A similar transnational approach to governmental cloud strategies is being promoted by the European Commission (the European Cloud Partnership) (COM 2012/529). The main security concerns with regard to government cloud adoption have to do with the protection of classified or personal data. In the public sector, assessing and establishing security governance measures can be far more complicated than for many private organisations, since legal compliance with data protection legislation at many different levels of governance must be established. Adding cloud solutions with their possible multisite and multi-national data storage to an already difficult compliance puzzle creates a task of legal compliance assessment, which is beyond the capacity of most individual governmental organisations. Danish and Swedish Danish Protection Agencies have thus recently ruled to stop the use of cloud services by local government organisations precisely due to the lack of established security compliance (Danish Data Protection Agency, decision 2010-52-0138; Swedish Data Inspection Board, decision 263-2011 and follow-up). And symptomatically, while the private cloud provider in the Danish case did in fact provide the required documentation of security practices in order to allow for the assessment of compliance, the local government ultimately chose to abandon the use of the cloud service because of the complications involved. This underscores the need for some central strategy of trail-blazing by centres of excellence or dedicated government agencies to allow for the use of cloud solutions by smaller agencies and organisations. It is also an area in which the question of cloud solutions evolving and entering the territory of critical infrastructure becomes pertinent. Out of government experiences with cloud adoption may arise the need for national and trans-national CIIP overview of cloud adoption strategies (cf. Dekker 2012). 3.2.3. Security and privacy for consumer From a private consumer perspective, the experience of using cloud services is often indistinguishable from using the broader field of web 2.0 user-content driven websites such as YouTube, Flickr or Picasa or social networking sites like Facebook, Twitter or LinkedIn. Using all of these involves online storage of data and content and possible collaboration with other users. For many services in this broader field, cloud technology does in fact provide the underlying infrastructure necessary to run the online services in question. And historically, it was precisely the massive need for scalable resource to support huge internet services like the Google search engine, YouTube and the Amazon web store, which led to the build-up of server capacity and development of virtualization technology that became the cloud. Personal services branded specifically as “cloud” can, however, be functionally differentiated from other second generation internet services. Whereas web 2.0 content sharing sites and social network sites are created to share by default, a key point in the business models of these often free services, cloud services are by default private with the option to share. 41 European Technology Assessment Group (ETAG) Personal cloud services provide the ability to store and access data independently of individual computing devices and across different platforms. They ease the hassle of keeping day-to-day information processing routines in order such as note-taking (e.g. Evernote), photo storage (e.g. iCloud), document research (e.g. Endnote, Zotero), document collaboration (e.g. Podium, Basecamp, Google Docs) and many others. The main advantages for individual users of cloud services are mobility, greater flexibility in choice of services, and greater access to products due to their lower costs. Once adopted, cloud services can easily replace many of those applications that come packaged with the operating systems of individual devices. The advent of cloud services may thus prove to move the personal computing market in the direction of a “slim device – big cloud” paradigm, in which computing devices are delivered more or less empty but with easy access to populating it with the user’s preferred cloud services (Lo 2013). Some speculate that such a shift may in turn lead to the realization of “cognizant computing” (or smart, ubiquitous computing) in which services will come to function automatically across platforms and devices, indeed across entire ecosystems of ICT devices present in our manmade environment (Gartenberg and Ekholm 2012). Back in the real world, however, user experiences of cloud services are still very closely connected to everyday use of laptops, smart phones and tablets. Here, personal communication via e-mail, text messages, chat services and social network sites is a core driver for uptake of the devices themselves, while cloud services are often taken on board as an afterthought to maintain an otherwise highly complicated regime of data storage and application updates (Fielder et. al. 2012). In this market, providers which can supply easy integration between different services, such as Google, Microsoft and Apple, have an edge in comparison with single-service providers. Many users’ choices of adopting specific services are made on a whim and based on convenience. And as both Google and Apple have proved beyond any doubt, nudging users - through the services they have already adopted - into adopting new ones is very effective. Especially in the case of so-called “freemium” service packages, where users pay nothing to use the service, but accept in return that they may be subjected to different kinds of marketing, the incentive for such nudging is very strong. Usage patterns of individual users show very little awareness of this non-monetary price paid for such services as consumers are generally unwilling to pay for cloud services if similar services are made available free of charge by competing providers (Cattaneo et. al. 2012, 52). Interconnected freemium services are where the risks of the cloud for personal users come to the fore. In 2012, Google famously changed its privacy policy to cover at once all its services with a unitary consensus form. At the same time, Google provided itself with the privileges of amassing all information stored or gathered for an individual user through these services in one central databank (or cloud). Google argued plainly that this was simply a matter of convenience and of lowering administrative costs. But observers quickly noted that the added marketing value gained by cross-referencing content data and behavioural data across Google’s many different services is so high that it raises real concerns about who is providing a service for whom – Google for the user or the user for Google? The European data protection commissioners, led by the French CNIL, said that Google’s unified privacy policy was in breach of European data protection legislation and 42 Impacts of Cloud Computing demanded that Google give users more detailed control over how their personal data could or could not be used. (Arthur 2012). After a subsequent update to the privacy policy meant to allay such concerns, the U.K. ICO acting as spokesperson for the European data protection agencies most recently (July 4th 2013) still believes there are “serious questions” about the legality of the policy and that it still does not give users the sufficiently clear information about the use of their data and threatened to bring formal enforcement action against the cloud provider. (ico.org.uk, july 4th) The potential threat to users posed by information amassment practices such as those of Google has to do with the links established between user behaviour and marketing efforts. With more and more personal information deposited in cloud services, the potential for analysing preferences and behavioural patterns grows exponentially. Even with existing technology such as search engine selection and presentation of online advertising based on preferences, the potential for manipulation of online behaviour and the influence of users’ thinking is vast. From a more futuristic point of view, if such technology was coupled with “cognizant computing” able to track across different ICT platforms and ecosystems the realtime behaviour of people, the age of total behaviour manipulation would indeed be on our doorsteps. The case of Google must in this connection be taken as merely exemplary, the company having in many cases acted as trail-blazer for the ICT industry Between the practices of private cloud providers and those of the intelligence community, alleged in the PRISM revelations, there are many overlaps, but also fundamental differences. In both cases, the centralisation of data storage allows for massively informative cross-reference analysis of data and metadata. With big data analysis technology, such cross-referencing can be used to predict behaviour with heretofore unimaginable precision. Such analysis can be applied equally well to individuals and groups of people. The main difference lies in the intent, which for the party is advertising while for the other it is to police citizens’ behaviour. Private cloud providers operating freemium services aim to target audiences for commercial products and to manipulate their opinion formation and buying behaviour with regard to specific products and brands. Intelligence agencies aim to track and possibly prevent criminal behaviour. 3.2.4. Discussion and conclusions Security remains a key concern with regard to cloud computing. However, the ability to act on such concerns is very low for individual users and SMEs, who make up the largest potential user groups. Citizens in general remain unaware of the deeper security implications of adopting cloud services, while many SMEs lack the capacity to carry out proper risk assessments. Both groups are in a very uneven position over against cloud providers with regard to knowledge and means for influencing the relation. Large companies and governments demanding greater transparency and more useful contractual arrangements from cloud providers may in some degree act as trail-blazers for the development of societally acceptable relations between cloud providers and users. But selfregulation on the part of industry, such as security standardization, contract standardization and assurance mechanisms, has of yet not been able to deliver an overall image of transparency and trustworthiness. And independent security experts still have substantial concerns with regard to security in the cloud. Societal-level interventions to 43 European Technology Assessment Group (ETAG) establish mechanisms for reliability and trustworthiness in the cloud industry in general therefore seem to be needed to harvest the overall societal benefits, which the cloud could provide to a society that could trust it. x Societal-level interventions to secure transparent and trustworthy cloud services seem in the light of failure on the part of industry to reach a satisfactory level of self- regulation - to be needed. x When considering regulation of the cloud industry, consider carefully who puts a burden onto whom? Regulators onto cloud service providers, or cloud service providers onto users? Decision-makers should be wary of simple images framing a complex issue to the benefit of one societal minority group. x When debating such regulation, remember that cloud service risks do not apply discretely to the relationships between cloud providers and individual users, but mount and grow to apply to society in the same proportion as cloud technology becomes part of society’s infrastructure. 3.3. Data security challenges in Cloud Computing In the section on impact, some security and privacy issues have already been mentioned, such as: x A possible increase in security, as Cloud Computing providers may have a much more professional security management than a private user or an SME. Also, backups may be made more systematically. x A possible reduction in security, as providers may have outages, may fall victim to insider fraud, may have to provide access to data to governments, may not meet European data protection legislation, may do backups irregularly, may disappear from the market, or reuse and resell information. In this section, we briefly review some main security issues of computing. Those can arise in the three “CIA” subfields of: x Confidentiality x Integrity x Availability Regarding Cloud Computing, one needs to differentiate between consumers, small and medium businesses, large businesses as well as between using public Cloud Computing or local computing (with virtualisation), including outsourcing and private clouds. As the review of impacts has shown, for consumers and small businesses using cloud services may mean that their security needs are addressed professionally by the Cloud Computing provider. However, at the same time new risks become relevant: x A user will depend more on the availability of the network. x A user will depend more on the confidentiality of the communication. 44 Impacts of Cloud Computing x A user will depend more on the reliability of the provider regarding keeping confidentiality, integrity and availability high. In the impact assessment, cases have been mentioned in which cloud services were not available, e.g. Amazon, or in which providers lost data, e.g. in the case of “Sidekick” (Cellan-Jones, 2009). Other cases of potential problems are misrouted Internet communications (BGPmon, 2010) and long-lasting denial of service attacks, as on BASF (RP-online 2011). Regarding availability of services, users may need a backup service, which either means that they use several service providers in parallel, e.g. for service provision or backups, or store copies of data for migration, leading to the issue of having them in a format suitable for processing. The issues of normal backups are considered, e.g. in a Fraunhofer report (Borgmann et al. 2012), who recommend to do local encryption and use several providers. Long-lasting denial of service attacks, providers losing data or going out of business supports the need for backup and local services; as cheap as going Cloud might be, migration to a backup-solution may be needed for any time-critical business. This section aims at focusing on the most severe issue: Is it possible to keep confidential data, such as business secrets or person-related data, reliably confidential, while processing them in the cloud? 3.3.1. Insider Problem In this section we do not regard intrusion by third parties, but reading of data by insiders, such as administrators of the Cloud service provider, or governments. A major issue discussed in this field is that foreign, in particular US service providers, and the US government, might spy on confidential data. While legal experts pointed out that regulations in the US and in Europe are rather similar, e.g. regarding making a court decision mandatory ahead of reading data (Maxwell/Wolf 2012), in the US, there are secret courts and other secret procedures, which apparently led to a wide-range evaluation of data: “We know the FBI has issued tens of thousands of ultra-secret National Security Letters to collect all sorts of data on people ... and has been abusing them to spy on cloudcomputer users.“ (Schneier 2013b). Forbes (2012) reported that eavesdropping even takes place on encrypted data. “The NSA saves all encrypted data it encounters; it might want to devote cryptanalysis resources to it at some later time“ (Schneier 2013b). Cloud Computing providers are not allowed to inform their customers about any eavesdropping and do not have any logging data available for later clarification, as logging gets switched off (Waldmann 2013). Surveys on impact and media reports show that potential users of cloud services are worried that in particular US entities eavesdrop on their data, see, e.g. Bradshaw et al. (2012, 26), Cashin/Schunter (2011), Vehlow (2011) and Bigo et al. (2012). It must be mentioned, however, that data stored privately, e.g. on computers owned by users, are not perfectly protected from eavesdropping either, for two reasons. x There are no provably secure systems. Attackers may exploit vulnerabilities such as zero-day exploits, used prior to antivirus software taking care of them, as in case of the Stuxnet attack (Falliere et al. 2011). 45 European Technology Assessment Group (ETAG) x Hackers may conduct attacks using other means, such as spear phishing, to trick users into executing malware. This happened, e.g., to Coca Cola (Bloomberg 2012), but also RSA was not able to protect itself (Open Hypervisor 2011). So a particularly high level of confidentiality can be achieved with a very professional, and expensive, local administration of systems, or, ideally, with physically separate systems, assuming that eavesdropping facilities have not been built in in the first place, and that no other means of observation are used. Still, using remote computers, not under the control of a private or business user, poses a particular problem for processing in confidentiality, as both insiders as well as possible governments can read data in the clear. In this section a high-level review of approaches to allow confidential remote computing is therefore provided next. Tamper resistance The idea is to use a tamper resistant computer to decrypt data, process them internally, and encrypt the results, for sending them back to the user. For this, a smartcard chip could be used or a somewhat larger hardware security module (HSM). Basically, there is no upper limit to the size, as many devices could be concatenated and as tamper resistant foils could be used, such as a surface enclosure with a sensor layer. Of course, the approach comes with additional costs, but at the same times makes some Cloud Computing-typical savings possible. The tamper resistant module could communicate to the user its brand and trustworthiness, using a remote attestation procedure just like in Trusted Computing. The process is different from typical Trusted Computing with only remote attestation (see, e.g. Curry et al. 2010) in that the tamper resistant enclosure would guarantee the correctness of the system enclosed, based on the module vouching for it, while with a classical Trusted Computing approach, insiders could still physically tamper with the hardware, eavesdrop data, switch logging off, etc. Some researchers stated that tamper resistant hardware is expensive and slow (e.g. Bugiel et al. 2011), but it has not been possible to identify any proof for this. The approach will only work if there is no hidden functionality. This ultimately means that the whole supply chain used in the tamper resistant modules needs to be trustworthy, from components sourced from a reliable production process, to the operating system used, etc. The German research project “Sealed Cloud” appears to go into that direction by using sealed racks and volatile memory for reducing options for attacks by insiders (Sealed Cloud 2013). Project Cumulus4j investigates the related approach to decrypt data only in the main memory and with a multitude of keys, to reduce what administrators can learn (Nightlabs 2013). A step to protect keys in a tamper resistant way can be seen in the offering of Amazon to use HSMs for signing and decrypting (Amazon 2013). It can only be assumed that they do not have a channel to read out keys in the clear. A low-tech approach would be the use of a cage. This is of limited value if providers have access to the data and can provide it to government entities. Relying on tamper resistant enclosures would mean to develop a secure procedure for handing over ownership from one tenant to another. Computers would need to be erased 46 Impacts of Cloud Computing from customer data ahead of any handover. Solutions would also be needed for issues such as cooling and repair. Such issues should be solvable using Trusted Computing technologies. Such f solutions appear not to be available, nor any estimate of their potential costs. It would be an engineering issue to estimate the costs of a large-scale application of these principles. Also, users would need to trust the messages from a remote secure system. Principles of Trusted Computing could also be used if a cloud customer trusts the provider, in particular if no insider reading is assumed (CSA 2011, Santos et al. 2009). Cryptography (Homomorphic encryption) The key idea with homomorphic encryption is to have a remote computer conduct operations on encrypted data in a way that the user can get results and decrypt them for use (Gentry 2009). It has been reported that this works with about 1 bit per second and that the speed is likely be remain low for the next decade (Henrich 2012). Another issue with this approach is that several users may wish to use remote data, e.g. in the design of components for new cars. Hence multi-party computations would be needed. These approaches are research issues with promising, but unclear outcome. 3.3.2. General Quality of Service Problem Beyond the most difficult problem of insider access, Cloud customers who do not have such worries still need to inform themselves what quality of service is offered by a provider. This applies to the general quality of operation, such as anti-virus updates, intrusion testing, backups, downtime etc. In detail, this is a difficult issue as, e.g. often virtualization is used to keep customer data separated. However, any of today’s large system contains errors (Marnau et al. 2011), and Ristenpart et al. (2009) demonstrated that side-channel attacks are possible to intrude one virtual machine from another one. If a European customer wishes to have personal data processed, the issues is whether a provider complies with European legislation, whether processing is done in the EU or Safe Harbor rules can be applied (cf. Berry, Reisman 2012; Article 29 Data Protection Working Party 2012). Some of these issues can be dealt with certification. An auditor can state that a provider manages servers well, complies with legislation, that there is evidence for the application of Safe Harbor rules, etc. Such auditing may need to be done often, if not permanent. Therefore costs of certificates may be in the order of €1 million. Still, if governments or insiders switch logging off, or if providers send fake records to the secure logging memory, the records to be audited will be incomplete. Also, as no proven systems exist, breaches may happen nevertheless. Yet, certifications may confirm that a certain quality level has been observed. For instance, for public institutions using a certified service provider may be useful. An important issue is whether service providers take over liability for breaches, even if they have been certified. As current systems do not have a proven base, development of a highly secure computing base as well as high-quality applications would make sense. A similar effort is undertaken by the US DARPA agency in its “Crash” program (DARPA 2013). In a prior STOA-project, 47 European Technology Assessment Group (ETAG) Heiser presented how a secure kernel could be built and its use made mandatory for government services (Heiser 2013). 3.3.3. Conclusions It appears that today, there are no proven, reliable technical methods to allow confidential remote processing of data, without any known ways of eavesdropping by insiders. However, users often trust a certain service provider nevertheless, in particular when balancing the risk of trusting something remote against the need to trust components anyway as well as local staff. Still, a high assurance level of technically confidential remote computing could significantly boost the use of Cloud Computing. Note that all of the above potential means would in the end need to be implemented properly, which will require secure systems, such as trustworthy hardware, error-free operating systems, protection against side-channel attacks, and high-quality applications. Conclusions and resulting options are: x support measures to provide awareness of the problem of insider reading and of the technical approaches towards solutions, e.g. by producing communications or conducting workshops. x support the development of secure servers, reliably protected against attacks (Heiser 2013). x support research on technical measures against insider reading and their cost efficiency. x consider taking steps towards incentives for use of those new approaches, provide recommendations or even request mandatory use, to trigger the emergence of products as well as to encourage their use once they will be available. x support measures to achieve certification at a lower level, certifying, e.g. that a provider complies with European legislation, that processing takes place only in the EU, that a provider has a certain level of auditing, or that a provider takes responsibility for breaches. x support steps to achieve that Cloud Computing providers which operate solely under European jurisdiction play an increasing role (Bigo et al. 2012). x make it mandatory to notify consumers when a law enforcement request has been made (Fielder/Brown 2012). On a different level, the technical approaches and the above options should be discussed at the planned project workshop. As briefly mentioned, to assure availability, businesses may need to move to a second or local service provider at any time. 3.4. Cloud computing, privacy and the EU data protection regime The processing of data is a double edged sword. On the one hand, it is necessary for the function of information societies. On the other hand, the ability to collect and process data is a powerful tool for interacting with individuals and shaping social relationships. Accordingly, data processing can pose a threat to the fundamental rights of the individual whose data is processed – particularly the right to privacy. The necessity to reconcile these two – apparently competing – dimensions, led to the creation of European data protection 48 Impacts of Cloud Computing law. This area of law is predominantly elaborated by the overarching piece of legislation: Directive 95/46. The Directive applies to any processing of ‘personal data’ (with certain exceptions and limitations). In Article 2(a), the Directive provides a definition for personal data: ‘’[P]ersonal data’ shall mean any information relating to an identified or identifiable natural person ('data subject'); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity’.( Directive 95/46, Article 2) In essence, the concept of personal data is engaged whenever data, or a combination of sets of data, reveal information about a specific, identifiable, person – the ‘data subject’. The Article 29 Working Party elaborate 3 ways in which data can be said to relate to an individual; content (what information the data contain), purpose (what the data are to be used for) or result (that the data processing will have an effect on an individual’s rights or interests).(Article 29 Data Protection Working Party 2007, 9-12) As a vast number of cloud services rely on the processing of ‘personal data’, they fall under the scope of data protection law. However, the Directive was drafted according to a specific perception of the data processing environment it aimed to regulate. This environment was categorized by limited numbers of actors, engaging in easily identifiable and easily locatable, data processing. The networked, continuous nature of cloud processing challenges this conception of the processing environment and accordingly poses challenges to the application of the Directive. This contribution has the following structure. In section 3.3.1., we briefly explain the structure and function of the current data protection framework as elaborated by the Directive. In section 3.3.2, we elaborate on the difficulties faced in applying the Directive to cloud processing – a processing context for which it was not necessarily created. We consider in particular the following: the difficulty of clearly establishing the application and supremacy of European data protection law; the difficulty in identifying actors and allocating them roles and responsibilities; the difficulty with transferring data outside the EU; the difficulty in harmoniously adapting data protection law to deal with technological challenges. In section 3.3.3 we then look toward the future of European data protection, introducing the data protection reform programme and the proposed Data Protection Regulation. Finally in section 3.3.4., we discuss how the features of the Regulation may address the challenges pinpointed in section 3.3.2. and how these changes may impact on cloud computing. On the one hand, there are numerous different types of cloud service. On the other hand, data protection law is extensive and complex. Each cloud service raises specific questions and challenges in relation to data protection law, whilst each aspect of data protection law in turn could be extensively evaluated for its specific applicability and relevance to cloud computing. This contribution does not enter into considering the problems raised by each specific cloud service or engage with the detail of applying each aspect of data protection 49 European Technology Assessment Group (ETAG) law, but remains on an abstract level, addressing the general challenges posed by cloud computing to data protection law. Certain sectors processing data – for example the police – are subject to specific laws. The interaction of each of these areas of law with cloud computing also raises important issues. This contribution will focus on generally applicable data protection law – as elaborated by Directive 95/46. 3.4.1. What is Data Protection – Directive 95/46 Data protection is a fundamental right as laid out in article 8 of the charter of fundamental rights of the European union. 1(European union 2000/C 364/01, Article 8) Data protection law is the field of law which elaborates this right by governing the legitimate use of data relating to an identifiable individual (‘personal data’). The current piece of legislation giving overarching practical expression to data protection law is Directive 95/46.(Directive 95/46/EC) Beneath the Directive however, lies a range of subordinate regulation – for example, certain sectors are subject to specific regulation clarifying data protection rules, for example the telecoms sector – the ePrivacy Directive.(Directive2002/58/EC) The scope of application of the Directive is wide. It applies to almost all data which can be connected to an identifiable individual, to almost all electronic operations concerning this data and can be relied upon against any entity or individual conducting the processing of personal data. Accordingly, whenever personal data are processed in the cloud, data protection law will be relevant. The Directive is limited in its application, however, by qualifications of geographical scope. It may not apply to certain processing actions occurring outside EU territory. It is also limited in application by the former pillar structure of the union, which means that it will not apply to much police use of data. From the 1980s on, member states began to draft data protection legislation. This legislation followed from the recognition that the processing of data could have a significant impact on fundamental rights but that data processing was a vital part of the functioning of modern economic and social systems. The aim of these regulations was, accordingly, to protect fundamental rights (predominantly privacy), while allowing necessary processing of data. Data protection rules at European level followed the presumption that the divergence in data protection legislations between European states would act as an obstacle to the flow of data between member states – which was seen as central to the efficient functioning of the internal market.(Mayer-Schönberger 1997, 229-235) Accordingly, the Directive was drafted with dual goals. These are directly recognised in Article 1, ‘in accordance with this directive, member states shall protect the fundamental rights and freedoms of natural persons, and in particular their right to privacy with respect to the processing of personal data.... member states shall neither restrict nor prohibit the free flow of personal data 1 One can consider the right to data protection as a transparency right. ‘[T]ransparency [rights]…come into play after normative choices have been made, in order to channel the normatively accepted exercise of power through the use of safeguards and guarantees in terms of accountability and transparency’. This form of right is to be juxtaposed to opacity rights – such as privacy – which seek to provide prohibitive, substantive protection and which outright define whether an interference with the individual is acceptable.(Gutwirth et al. 2011, pg 8) 50 Impacts of Cloud Computing between member states for reasons connected with the protection afforded under paragraph 1.’(2002/58/EC, Article 1) In the case of cloud computing, both legislative aims come into play. On the one hand, cloud computing is seen as a key factor in the development of the European economy. Accordingly, it is essential that cloud services are not obstructed from developing or unnecessarily hindered by unnecessary or burdensome regulation. On the other hand, there is no reason that data subjects should be subject to reduced standard of data protection simply because data is processed in the cloud.(European Commission 2012c, 6-8) The Directive functions first by isolating actors, to whom responsibilities and rights can be allocated. Three actors are key: The data subject (to whom data pertains), the data controller (who controls and defines processing) and the data processor (who processes data on behalf of the controller). The directive then lays down obligations to the data controller and processor for the legitimate processing of data. Generally speaking, the controller is expected to process data only when a legitimate ground for processing exists (as laid out in article 7 for normal data and article 8 for sensitive data), for example if that processor has received the consent of the data subject (although this is not the only possibility). Further, in the processing of data, the controller is expected to follow a set of rules for fair processing (laid out predominantly in article 6) – for example the processor must make sure the data are accurate and up to date, that the purpose of processing is specific and legitimate, and that the data collected is adequate, relevant and not excessive in relation to the purpose for which it was collected.(Directive 95/46/EC, Articles 6, 7 and 8) In turn, the data subject is invested with a series of rights – including the right to be informed about the processing of his or her data and the right to inspect or correct data being processed. The controller must make sure these rights are available and accessible for the data subject. The data subject does not always have the right to stop processing. In certain processing contexts, special provisions are engaged. For example if a controller wishes to transfer data outside the EU, they will be obliged to follow the special guidelines related to transfers to third countries laid out in Articles 25 and 26.(Directive 95/46/EC, Articles 25 and 26) Rights and obligations are combined within the directive to create a system under which data processing is not negatively prevented, nor is the data subject invested with a dominant right to informational self-determination. Rather, it constructs a legal framework according to which individuals’ personal data can be processed provided that a certain set of rules and principles are followed. As put by de Hert, “[the data protection framework] relates to procedural justice and to the correct treatment of, and explanation to, registered citizens with the intention to increase their willingness to accept a system in which others (government agencies, companies, private citizens) have the right to process ‘their’ data and take decisions that have an impact on their self-determination where information is concerned”.(De Hert 2009, 17) 51 European Technology Assessment Group (ETAG) Accordingly, when we talk of ‘challenges’ to data protection laws, we talk of data processing contexts in which the systems and definitions which make up data protection law, seem of diminished ability to achieve either one, or both, of the specified legislative aims. Challenges can arise as technological development changes the possibilities and context of data processing, thus bringing into questions the presumptions on which the data protection framework was based. One may view cloud computing as just such a technological development. The Directive was drafted according to a specific perception of the data processing environment it aimed to regulate. This environment was categorized by limited numbers of actors, engaging in easily identifiable and easily locatable, data processing. Cloud computing, on the other hand, is categorized by continuous, networked, processing, which may be very difficult to geographically locate.(Article 29 Data Protection Working Party 2012, 4-6) Accordingly, where the function of the Directive revolves around the assumptions listed above, its relevance in relation to cloud computing can be challenged. Broadly speaking, we can consider four key areas of challenge. 1. The scope and jurisdiction of the Directive is geographically specific. Therefore, cloud computing poses challenges in light of scope and jurisdiction. 2. The definition of roles and responsibilities in the Directive (which are core to ensuring accountability and the protection of rights) was predicated on a limited number of actors engaging in limited transfers. Cloud computing thus poses challenges to these definitions and allocations of responsibility. 3. The Directive defines one set of provisions for data transfer within Europe, and another set of provisions for data transfer outside Europe. These provisions are geographically specific and reliant on the presumption of limited and easily definable data transfers. Therefore, cloud computing poses challenges to these provisions. 4. Challenges 1 to 3 have remained problematic for data protection law as the Directive did not have the inbuilt mechanisms to adapt to the novelty of cloud computing. Cloud computing thus challenges the Directive’s general ability to adapt to novel technological challenges. Each of these challenges will be dealt with in turn. 3.4.2. Challenges of the Cloud to the Current Data Protection Framework Definition of Applicability of European Data Protection law and Jurisdictional Issues The first form of challenge posed by cloud computing to data protection law is that of jurisdiction. In a number of cloud services, the physical location of the data, or the service requested, may not be known to the client, or even to the initial cloud provider. Indeed the provision of cloud services could take place across multiple jurisdictions simultaneously. In fact, information as to the location of the data, or of the data processing activity, may be irrelevant to the provision of the service. However, this information is not irrelevant in the definition of whether, and how, European data protection law applies. In establishing the applicability of European data protection law certain ‘territorial’ criteria determining jurisdiction must be met. These are elaborated in 52 Impacts of Cloud Computing Article 4, which states that EU data protection law applies to activities of the controller – there is no mention of the processor – which is a) is established in one or more EU Member States or b) utilises equipment based on the territory of a Member State. If these criteria are not met, European data protection law does not apply.(Directive 95/46/EC, Article 4) If these jurisdictional criteria are not suitable to ensuring the application of European data protection law, European citizens’ personal data may be processed without engaging the data protection framework. Cloud computing poses this problem. First, in the case of cloud computing, the cloud provider may often be recognized as the data processor, rather than the data controller, despite having significant control over the means of processing. The lack of reference in Article 4 to the processor may lead to situations in which the criteria of Article 4 are not met, despite the logic for the application of the Directive being present. Second, in the case of non-EU controllers, the definition of ‘equipment’ becomes key to defining the applicability of European data protection law. The concept of ‘equipment’ arises from a context in which data processing was done with identifiable and tangible processing ‘equipment’. Cloud processing makes this concept very difficult to apply. First, in networked processing models where processing can be located across numerous actors, defining the location of the ‘equipment’ used may be practically impossible. Second, in cloud processing, even the idea of ‘equipment’ – regardless of how broadly defined - may fail to describe encompass the combination of infrastructure and data flows through which cloud service provision is achieved. (European Data Protection Supervisor 2012, 10-11) Even where the question of application of European data protection law is unproblematic, this does not rule out a conflict of laws arising. Data controllers operating outside the EU may/will also be subject to the laws of the states in which they operate. These laws may also set out a number of obligations on the data controller – for example to turn over certain forms of data to local authorities. These obligations may stand in contrast to the rights of the data subject, or the obligations of the data controller laid out in European data protection law.(Bigo et al. 2012, 44) In relation to controllers established in multiple states in the EU, there may also be problems in determining which Member State’s law is applicable. Directives are specific legal instruments which allow Member States to choose the means and form of their application in national law. This has meant that there are differences between national laws. As interpretation of national laws also happened at national level, there can thus be a significant divergence in relevant rules. Finally, the effectiveness of data protection law relies on the possibility for independent oversight to ensure that data protection rules are followed. Even where the question of application is unproblematic, the location of a data controller outside the EU may make oversight or investigation into a violation of the rules of data protection, or punishment for these transgressions, impossible. 53 European Technology Assessment Group (ETAG) Definition of Roles and Responsibilities The data protection framework relies on categorizing entities involved in data processing as specific sorts of actor. Each form of actor then has roles and responsibilities in ensuring that the requirements of the Directive are fulfilled. Without a clear definition of these actors, there can be no clear allocation of responsibilities. In turn processing may become intransparent or unaccountable. Consequently, it will become very difficult for the data subject to rely on their rights in relation to processing and it may become difficult to conduct meaningful oversight or supervision of the processing operation. There are three key actors defined in Article 2. The data subject is the identifiable natural person to whom any personal data relate (Directive 95/46/EC, Article 2(a)). The data controller is ‘the natural or legal person, public authority, agency or any other body which alone or jointly with others determines the purposes and means of the processing of personal data’ (Directive 95/46/EC, Article 2(d)). The controller is predominantly responsible for making sure that data processing operations are in compliance with data protection law and that obligations toward the data subject are made a reality. In terms of data processing in the cloud, the cloud client is generally held to be the data controller. The data processor is ‘a natural or legal person, public authority, agency or any other body which processes personal data on behalf of the controller’ (Directive 95/46/EC, Article 2(e)). In the cloud, the service provider is held to be the data processor (Directive 95/46/EC, Article 2). Although there is guidance available on the application of these definitions in the cloud environment – for example the cloud client is generally held to be the data controller whilst the cloud provider is generally held to be the data processor – in reality, it can be difficult to identify each actor.(Article 29 Data Protection Working Party 2012, 7-10) It is primarily in the definition and delineation of the roles of data controller and data processor that problems arise. 2(Kuan Hon et al. 2012, 3-13) It has been also been suggested that the provision of cloud services has become so advanced, that it is no longer possible to describe the cloud client as necessarily being in charge of the essential ‘means’ of processing.(European Data Protection Supervisor 2012, 12) Whilst the cloud client may be able to fulfil certain of the duties of the controller – for example ensuring the initial accuracy of data – other duties traditionally allocated to the controller may be more clearly located with those who would, under the rules laid out by the Directive, be conceived of as 2 In relation to the definition of the data subject, the challenges posed specifically by cloud computing are generally minor. However, it has been suggested that the limits on the concept of personal data to generally refer only to ‘natural’, as opposed to ‘legal’ persons, could be a beneficial extension of the scope of data protection law relating to the cloud. 54 Impacts of Cloud Computing processors – for example, ensuring ‘appropriate technical and organizational measures to protect personal data against accidental or unlawful destruction’.(European Parliament/ European Council 1995, Article 17) Even when roles are specifically allocated – for example in a contract between cloud client and provider – these may not match the reality of control. In cloud service contracts, there is often a power imbalance between contracting parties. The cloud client may not have the ability to negotiate terms of service – for example when standard contracts are used – or may be in a weakened negotiating position. In this case the distribution of roles and responsibilities may be unsuitable for the cloud client’s activity or be practically impossible to execute. Worldwide and Continuous Data Transfer (Data Transfers Outside the EU) Cloud service providers may utilise infrastructure and sub-contracted providers located in multiple geographical locations. In turn, there may need to be the facility to make data available for the cloud service user to access data irrelevant of location. Accordingly, cloud service providers may rely on continuous, worldwide, flows of data. Where the cloud provider, infrastructure, or client, is EU based, this will necessitate data transfers of personal data from within, to outside, the EU. In order to ensure that citizens’ data remain protected even when transferred outside the EU, the Directive imposes certain restrictions on transfers. The Directive lays out a number of possibilities for the legitimate transfer of data to third countries. First, data may be transferred to outside the EU should the Commission decide that the legal framework in the third state provides an ‘adequate’ level of protection (Article 25). The EU-US Safe Harbor scheme also belongs under this category. US companies which certify that they adhere to certain data processing principles are viewed to offer adequate protection and may thus have data transferred to them.(Directive 95/46/EC, Article 25) Second, the Directive allows transfers to third countries to take place should they fall under any one of a list of exceptions to the general prohibition on transfer (Article 26(1)). (Directive 95/46/EC, Article 26 (1)) Third, transfers may take place provided that it is subject to a contract between two controllers or a controller and a processor. Contracts must stipulate that data protection principles are to be followed in any processing operation (Article 26(2)). If cloud provision involves a longer chain of supply, each contract between further processors should ensure the same level of protection.( Directive 95/46/EC, Article 26 (2)) Fourth, transfers may occur based on Binding Corporate Rules. These rules define standard data processing practise within a company or group of company operating multinationally.(Article 29 Data Protection Working Party 2013) 55 European Technology Assessment Group (ETAG) However, the Directive was drafted with the presumption that international transfers would be limited, linear and easy to track. Accordingly the application of each of these options has drawbacks when applied to the networked environment of the cloud. First, only a very limited number of countries currently qualify as ‘adequate’. The conduct of an investigation into the ‘adequacy’ of a state’s laws can take significant time and only a certain, limited, number of ‘adequacy’ investigations are foreseen each year. Until adequacy has been confirmed, transfers cannot legitimately be made to that country on this ground. Further, as adequacy findings are limited in geographical scope. This means they may not be suitable to legitimate all transfers within an international cloud environment. The Safe-Harbour agreement suffers not only from the above territorial limitation, but also from a lack of oversight and enforcement mechanisms. The fact that companies are permitted to self-certify under this arrangement raises issues as to the protection it offers European citizens’ in fact. Second, whilst it may appear that a number of the exceptions laid out in Article 26 may be applicable to cloud computing, the Article 29 Working Party – the primary group responsible for interpreting data protection rules at European level – have concluded that Article 26 exceptions may only be relied upon in the case that data transfers are neither recurrent, nor massive or structural – criteria under which most cloud services can be seen to fit. Third, Binding Corporate Rules, whilst offering a good solution when processing remains within a certain organization, are of less relevance should processing take place across multiple companies. Finally, the only way for contractual clauses to certainly meet the requirements of the Directive is for them to be standard contractual clauses as clarified by the Commission (although there is some small room for cloud providers to tailor these according to necessity and experience). There are only a limited number of standard contractual clauses and these have been tailored for certain situations. Considering the growing variety of cloud services and their constant development, it is uncertain as to whether pre-approved standard clauses will always be applicable. There are no standard clauses, for example, aimed at the transfer of data from a processor within the EU, to a processor outside the EU. The use of standard clauses outside the situations they were designed for may result in irrelevant, unfair or impossible distributions of responsibility.(European Data Protection Supervisor 2012, 16-20) No Binding Interpretation Mechanism The challenges in applying the Directive to cloud computing were caused partially by the fact that cloud computing represented an alteration in the way data was processed. They remained challenges due to the fact that data protection law did not have the capacity to effectively adapt to these changes (COM 2010/609/EC, 1-4). 56 Impacts of Cloud Computing Whilst this was partly due to the rigidity of the terms and concepts of the Directive itself, it was also due to the fact that the mechanisms foreseen for interpreting the Directive at European level were weak. Although there is a European level body responsible for providing European level interpretation – the Article 29 Working Party – its guidance is not binding. Although interpretation can happen at Member State level, the power of the national data protection authorities was limited and national level interpretation had the counterproductive effect of leading to divergent approaches across Member States – fragmenting the European data protection law. 3.4.3. Data Protection Reform and the Data Protection Regulation Since the drafting of the Directive, there have been significant changes in the regulatory landscape. The technological background to the drafting of the Directive has changed. The speed, scale and mobility of data collection and sharing have increased tremendously, while data processing has gained significance in defining the relationship between individuals and social and economic entities. The legal context has also changed. The use of a Directive as the instrument of regulation was seen to have failed in its goal to harmonize protection standards. Equally, the Directive is no longer seen to reflect the European legal architecture of which it forms a part. The signing into force of the Lisbon treaty represented a moment of particular importance. In particular, Lisbon elevated the European Charter, which specifically lists data protection as a fundamental right, to the highest status of EU law.(COM 2012/0011/EC (COD), 1-2) Accordingly, in 2009, the Commission began an investigation into the reform of data protection regulation. This process of consultation and reform was punctuated by two key pieces of documentation. First, the ‘Communication on a comprehensive approach on personal data protection in the European Union’ in November 2010 – broadly detailing areas of concern and points of reform.(COM 2010/609/EC) Second, the ‘Proposal for a Regulation…on the protection of individuals with regard to the processing of personal data and on the free movement of such data’ in January 2012 – representing the culmination of the reform process and intended as a replacement to Directive 95/46.( COM 2012/0011/EC (COD)) At each step of the process, the challenges posed by cloud computing were noted as key factors driving, and to be addressed by, the reform – with cloud computing being mentioned 22 times in the Impact Assessment conducted prior to the Regulation.(European Commission 2012a) The overall goals of the proposed Regulation remain essentially unchanged from those of Directive 95/46. The new Regulation still essentially seeks to protect the rights of the data subject and to guarantee the free flow of data between Member States. However, considering the new legal positioning of data protection within the EU aequis, the focus has shifted comparatively toward the protection of the citizen. The choice of a Regulation 57 European Technology Assessment Group (ETAG) means that the proposed framework will be directly applicable in all Member State legal systems – no need for national transposition. In structure and content, the prevailing mood is also that of continuity. In structure, the Regulation still aims at the provision of procedural justice through a framework in which different interests can be evaluated and balanced. In content, the Regulation retains all the concepts and principles and many of the definitions, which defined Directive 95/46. Despite general continuity, there is innovation. On the one hand, this manifests in the strengthening of the pre-existing rights of the data subject – for example in an increased focus on transparency and a clarification of uncertain concepts, such as ‘consent’ – and in alleviating the administrative burden on the data controller and replacing it with a heightened responsibility requirement – for example with the introduction of the principle of accountability and a reduction in notification requirements. On the other hand, certain specific innovative features have been introduced – for example the introduction of privacy by design principles, the right to be forgotten and the right to data portability. It is important to note that our point of reference is the current draft of the proposed Regulation. This is only the first draft in a legislative process which may undergo significant change. The Regulation is currently being debated and will be subject to a continued process of revision – being passed back and forth between Commission, Parliament and Council before final adoption. At the moment, the draft is awaiting a final vote before the European Parliament – with over 3000 amendments from the current draft having been proposed. It is unsure when the new legislation will finally enter into force, or which changes it will undergo before that point. 3.4.4. Data Protection Reform and Cloud Computing Clarification of Scope and Applicability of European Data Protection Law The Regulation goes beyond the Directive and introduces two novel concepts which will serve to both clarify the application of data protection law, and to broaden its territorial scope. This is aimed at ensuring that the processing of EU citizens’ personal data is always subject to EU data protection standards. First, in Article 3, the Regulation clarifies that even the establishment of a processor on Member State territory will trigger applicability. Given that the cloud provider may be regarded as the data processor, this clause will remove any doubt as to the application of the Regulation to any cloud service in the situation that either cloud client or cloud provider is established inside the EU. Second, also in Article 3, the Regulation clarifies that ‘offering goods or services to’ or ‘monitoring the behaviour of’ data subjects inside the EU, will also trigger applicability. In the event that the cloud provider is established outside the EU, the fact that they offer cloud services to data subjects within the EU will mean that EU data protection rules could apply.(COM 2012/0011/EC (COD), Article 3) 58 Impacts of Cloud Computing It has been observed, however, that many cloud providers located outside the EU do not target services at individuals, but rather at businesses or organizations. A strict interpretation of Article 3 would mean that the Regulation would not apply to such providers – only a natural personal can qualify as a data subject. However, the fact that the cloud client was a business or organisation would not necessarily mean that the personal data of EU data subjects were not being processed. There have been suggestions that the language of the Article should be changed to extend the scope of the Regulation to cover this situation.(European Data Protection Supervisor 2012, 11) Equally, simply extending the scope of application of the Regulation does not necessarily ensure compliance or ensure that European data protection law will be followed if this conflicts with other states’ laws. Finally, clarification of questions of applicability, do not resolve issues relating to the transparency of extraterritorial processing operations or to the supervision and enforcement of extraterritorial controllers or processors. Clarification of Roles and Responsibilities The Regulation aims to readjust the definition of actors and roles. Changes focus primarily around attempts to more clearly locate the actor which truly ‘controls’ processing, as data controller. First, in Article 4(5), the Regulation states that ‘the controller [is he/she who] alone or jointly with others determines the purposes, conditions and means of the processing’.(European Commission 2012b, Article 4 (5)) The Regulation thus introduces the idea that controllership can be determined through control over the conditions’ of processing. The EDPS suggests that this would allow controllership to be allocated more easily to the cloud provider – as the entity which creates the conditions of processing’.(European Data Protection Supervisor 2012, 12-14) Second, in Article 24, the Regulation clarifies that, should there be more than one identifiable controller, there must be an arrangement made between the controllers so as to ensure data protection rules are followed and data subjects’ rights are guaranteed – accountability and responsibility arrangements must be made clear and transparent.(European Commission 2012b, Article 24) As the cloud client is normally regarded as the controller, any definition of cloud provider as controller will lead to this situation of joint-control. The Regulation confirms that any arrangement establishing joint control ought to distribute responsibilities in line with the reality of control over processing. This should ensure not only that data subjects’ rights are effectively protected, but that responsibility for ensuring their protection lies with the best entity best placed to do this. The EDPS notes, however, that there may still be imbalances in power between cloud provider and cloud client. These imbalances may still prevent a balanced and accurate distribution of responsibilities. The use of standard contractual clauses is proposed as a 59 European Technology Assessment Group (ETAG) solution, but these will not always be relevant.(European Data Protection Supervisor 2012, 13) Following a more targeted allocation of roles, the Regulation – in Article 22, directly – also generally increases the responsibly and accountability of data controllers and processors. In this regard, the Regulation also introduces a number of novel requirements which will be of relevance to cloud services. For example, the controller will now be obliged to follow privacy by design principles (to integrate privacy and data protection into the design and deployment of technologies and organisational systems) (Article 23), to implement data security measures to ensure that data are adequately protected (Article 30) and, in certain cases, to conduct a data protection impact assessment to isolate and minimize privacy and data protection risks in advance (DPIA) (Article 33). Should there be a breach of data security, the controller will be obliged to inform the data subject under the data breach notification rules (Articles 31 and 32).(COM 2012/0011/EC (COD), Articles 22, 23, 30, 31, 32 and 33) The controller will also be responsible for making a novel set of data subject rights a reality. The right to data portability (the right to transport data across comparable services – Article 18) and the right to be forgotten (the right to have data erased when processing is no longer required/no longer legitimate – Article 17) are perhaps the most likely to be important. The relevance of certain of these novel rights to cloud computing scenarios will be expanded upon below.(COM 2012/0011/EC (COD), Articles 17 and 18) Whilst these novel accountability and responsibility requirements have been positively received, there have been doubts raised as to their efficacy and practicality. The lack of clarity in relation to what these requirements mean in practise may lead to a situation in which each data controller defines for themselves whether they have fulfilled their obligations. Accordingly, obligations may have been met on paper, but not in reality. Key to success will be the clarity of the interpretative work which will follow the adoption of the Regulation. International Data Transfers The Regulation still imposes limits on the legitimate transfers of personal data outside the EU. However, whilst maintaining the options listed in the Directive, the Regulation also proposes certain changes aimed at maintaining protection for data subjects, whilst loosening the formalities which could make it difficult for cloud providers to operate in line with data protection law. First, the regime proposed in the Regulation demands that both controllers and processors secure legitimation for transfers (Article 42(1)) (COM 2012/0011/EC (COD),Article 42 (1)). Second, in Article 42, the use of contractual clauses to legitimate data transfer is elaborated. The possibility to use standard clauses remains – although these are still limited in number and applicability. However, in Article 42(2)(d) the Regulation also legitimizes the use of ‘ad hoc’ contractual clauses. These are ‘contractual clauses 60 Impacts of Cloud Computing [concluded privately] between the controller or processor and the recipient of the data’. Although these clauses must be checked and authorized by the relevant supervisory authority according to Article 34(1) and would be subject to minimum guarantees, their presence in the Regulation will introduce considerable flexibility. Controllers would no longer need to rely on template standard clauses drafted by the Commission – which could be partially, or fully, unsuitable. (COM 2012/0011/EC (COD), Article 42(2)(d) and Article 34(1)) Finally, in Article 43, a detailed mechanism for the use of BCRs is specifically elaborated (not the case in the Directive). Although BCRs were originally designed to facilitate international transfers intra-group, Article 43(2)(c) innovatively allows the extension of BCRs to external sub-processors. This may prove useful for numerous forms of cloud computing. It must be noted however, that the specifics of BCR application to external subprocessors requires further clarification.(European Commission 2012b, Article 43) There are however, certain criticisms of the approach elaborated in the Regulation. First, whilst the Regulation may aim at greater flexibility, many of the mechanisms for allowing international transfers still require prior confirmation from the Commission – for example adequacy rulings and standard contractual clauses – whilst others will require significant interpretation or elaboration before they become effective – for example, BCRs relating to external sub-processors. How successful these aspects of the Regulation are, will depend on how effectively and quickly implementing work can be carried out. Second, the Regulation still relies on the concept of a data ‘transfer’ to engage the necessity to legitimate data flows outside the EU. There is no clear definition of ‘transfer’ in the Regulation. The EDPS suggests that this may be problematic in networked cloud environments, in which data is not only being actively transferred, but may also be being made available, to numerous countries simultaneously. DPAs and Binding European Interpretation The Regulation introduces a number of features aimed at ensuring legislative flexibility and European level harmony. These changes are designed so that the Regulation may adapt to future developments in data processing – for example, future developments in cloud processing. First, the Commission retains specific power to specify and clarify the meaning and application of a number of concepts and definitions. The legal instruments used to do this are delegated and implementing acts and are listed in Articles 86 and 87. The use of these powers will allow the Commission to directly offer central, and binding, guidance on how to apply the Regulation to novel situations of data processing. It must be noted however, that the quantity and role of delegated and implementing acts imagined in the Regulation has come under heavy criticism. Second, the Regulation imagines a central, binding, mechanism for the resolution for the interpretation of the law. This can be used when there are disagreements between DPAs as to the approach to be taken regarding interpretation of data protection law, or when novel 61 European Technology Assessment Group (ETAG) challenges arise. This mechanism is referred to as the consistency mechanism and is laid out in Articles 57-63.(COM 2012/0011/EC (COD), Articles 57-53) Novel Data Protection Mechanisms in the Regulation In addition to the changes elaborated above, the Regulation introduces certain other innovations. Whilst these innovations do not necessarily follow from the challenges cloud computing poses data protection, certain of them may have implications for the provisions of cloud services. The most relevant of these are elaborated below. 3 The Right to be Forgotten (Article 17 of the Regulation) The right to be forgotten is not totally new and can trace its roots to the right to erasure in the Directive. However, the right as it appears in the Regulation is considerably stronger than its predecessor. Article 17 gives the data subject a; ‘right to obtain from the controller the erasure of personal data relating to them and the abstention from further dissemination of such data’ if that controller no longer has a legitimate reason to retain the data. In this regard, Article 17 makes the controller responsible not only for deleting data, but also for taking ‘all reasonable steps…to inform third parties which are processing such data…to erase any links to, or copy or replication of that personal data’. This will place a heavy burden on any cloud provider (or client) deemed to be processing personal data (COM 2012/0011/EC (COD), Article 17) There remain, however, a number of uncertainties associated with Article 17. Practically, it may be technically difficult, or impossible to comply with the provision. Equally, it may be impossible to define and contact all parties who may have copies of the data. In these situations, what the controller must do to discharge their obligations is unclear. On a more theoretical level, the ideas and thresholds within this right remain unclear. Perhaps most importantly, what does ‘all reasonable steps’ encompass? How far will data controllers need to go to fulfil their obligations under this Article? Finally, it is unclear what the obligations of the third parties are – given that they have been informed of the request to delete by the data controller, must they follow this request? The Right to Data Portability (Article 18 of the Regulation) Article 18 represents one of the truly innovative features of the Regulation. In Article 18(1) the data subject is given the right to ‘obtain from the controller a copy of data...in an electronic form which is commonly used and allows for further use by the data subject’. In Article 18(2) the data subject is given the right ‘to transmit those personal data and any other information provided by the data subject and retained by an automated system, into another one, in an electronic format which is commonly used’. This right will have significance for cloud services – particularly those who use proprietary/unique data formats - as it will require the service to be able to provide a copy of that data in a transferrable format. In this regard, Article 18(3) states that: ‘The Commission may specify the 3 It should also be noted that, due to their novelty, the precise application and consequence of these provisions is still unclear and that they are likely tob e subject to considerable debate in the current legislative process – their final form may thus differ from the form commented upon in this contribution. 62 Impacts of Cloud Computing electronic format referred to in paragraph 1 and the technical standards and modalities pursuant to paragraph 2’.(COM 2012/0011/EC (COD), Article 18) Once again, however, there are a number of uncertainties related to the Article. Importantly, the relationship between Article 18 and other Articles allowing the data subject to obtain information related to data processing and deletion requires clarification. The Article has also been subject to certain criticism. For example, it has been suggested that the Commission is not best placed to determine the specificities of a commonly used format. Indeed, it has been suggested that the central regulation of a commonly used format would be problematic in relation to the principle of ‘technological neutrality’ on which data protection law supposedly stands. Data Protection by Design and Default (Article 23 of the Regulation) Article 23(1) states: ’Having regard to the state of the art and the cost of implementation, the controller shall, both at the time of the determination of the means for the processing and at the time of processing itself, implement appropriate technical and organisational measures and procedures in such a way that the processing will meet the requirements of this Regulation and ensure the protection of the rights of the data subject’. This Article has explicitly created an obligation on the controller to take data protection rules and principles into account at each step in the technical design and deployment of a data processing system. It also requires that data protection principles are taken into account in the development of organisational systems supporting and surrounding data processing. Article 23(2) follows this up with a further obligation: ‘The controller shall implement mechanisms for ensuring that, by default, only those personal data are processed which are necessary for each specific purpose…and that personal data are not made accessible to an infinite number of individuals’. This Article has created the obligation for controllers to ensure that, in any instance where a technology could be privacy infringing, the minimum possible level of privacy infringement is set as the default.( COM 2012/0011/EC (COD), Article 23) These provisions are not directly targeted at software or hardware designers, or at other links in the cloud service deployment chain. However, as controllers will be under an obligation only to use and deploy services which allow them to adhere to their obligations under Article 23, it would seem likely that ‘obligations of controllers are likely to create some incentives for the market of relevant goods and services’. Equally, the provisions are not targeted at data processors. However, controllers will be obliged only to engage data processors who can ensure data protection standards (see above). Through this requirement, it is expected that processors, too, will be bound. Whilst the idea behind these provisions is relatively clear, how they will function in practise is uncertain. Practically, it uncertain as to precisely what lengths the controller must go to in order to fulfil their obligations under Article 23. For example, how much ‘regard to the state of the art’ is enough? Nor is it clear what the consequences for failure to fulfil these obligations will be. Whilst the Commission has given itself the power, in Articles 23(3) and (4), to further specify technologies and criteria clarifying the obligations laid out in 23(1) and (2), whether they are best placed to do this, and how effective they will be, remains to be seen. Theoretically, the relationship between the obligations in Article 23, and other 63 European Technology Assessment Group (ETAG) obligations relating to the need to preserve privacy in data processing, needs to be clarified. For example, one could ask: what obligations are created by Article 23(2) which differ from, or are unique in relation to, those laid down by Article 5(c) – the obligation on the controller to only collect as much data as is necessary for the task at hand? (COM 2012/0011/EC (COD), Article 5) 3.4.5. Conclusions Cloud computing challenges a number of the presumptions at the foundation of European data protection law. Directive 95/46 is based on locating certain definable actors, and allocating them specific roles. The networked nature of cloud services makes the identification of who is doing what (and who has what control) in relation to a processing operation difficult. The Directive is also based on the presumption that data transfers/processing operations would have single, easily identifiable, locations. In cloud services, the networks of actors and the continuous flows of data between them make isolating the geographical location of either data or service very difficult. Unfortunately, the Directive lacked the interpretation and adaption mechanisms required to deal with these challenges. As a consequence, the Directive could be awkward to apply in cloud processing scenarios. As a result, the level of data protection in the cloud could not always be ensured, whilst unnecessary barriers to the provision, and innovation, of cloud services, remained. The proposed Data Protection Regulation takes a number of steps toward remedying these issues. On the one hand, in order to ensure a high standard of data protection, it clarifies the scope of application of European data protection law and the roles of actors (whilst strengthening their accountability and responsibility). On the other hand, it loosens formalistic rules and bureaucratic requirements, allowing development and innovation in cloud services – for example by loosening the rules on international transfers of data. Finally, it elaborates European level interpretation mechanisms which should allow the Regulation the flexibility to deal with future challenges posed by advances in cloud processing. The progress made by the Regulation in addressing the key issues raised by cloud computing has received significant positive comment. However, this is not to say that uncertainties and problems do not remain. First, it remains to be seen how the legislative process will progress, what the final results of this process will be and when the final version will eventually enter into law. As mentioned above, we are dealing only with the first draft of the Regulation. The Regulation is currently being debated and will be subject to a continued process of revision – being passed back and forth between Commission, Parliament and Council before final adoption. At the moment, the draft is awaiting a final vote before the European Parliament. Due to the breadth and significance of the issues involved the reform proposals have been subject to unprecedented lobbying and advocacy activity. Currently, over 3000 (according to some sources now 4000) reform proposals sit before the Parliament. 4 The scale of interest the 4 http://euobserver.com/justice/120867, ‘EU wants data protection bill by May 2014’, (last consulted 17.07.2013). 64 Impacts of Cloud Computing proposals have generated have served to repeatedly delay the date of the orientation vote before the Parliament from early 2013 to what will now may be sometime in September or October 2013. 5 Second, it is very possible that the application of the rules of the Regulation will produce a very different result in practice, to that which one might imagine from reading the text of the proposed Regulation. The law on the page only takes on substance when it begins to be used in practise. There are, accordingly, numerous factors which will yet play a role in shaping the Regulation. First, the Regulation is one piece of legislation, operating at one legal level (the European level), how it will interact in practise with other areas of legislation, and with other levels of law (for example national systems), remains to be seen. Second, the behaviours and mentalities of the actors touched by the Regulation will be significant. Questions such as the following are highly uncertain, and highly significant: How will cloud consumers respond to the rules – will they choose to enforce their rights? Will cloud providers view the rules as a procedural burden, or as essential to maintaining trust in the cloud, and in cloud services? How will DPAs engage with their new sanctioning powers – will they take a hard, or soft approach to rule violations? Finally, with the further development of the technologies, infrastructures and capabilities of cloud computing, it is almost certainly the case that new issues will emerge which will require interpretation and flexibility within the legislation. Whether the structure proposed is up to the task, remains to be seen Finally, when looking at the approach of the legislation, there are problems which appear to remain unaddressed. One area of particular concern is that of application, oversight and enforcement of data processing taking place outside the EU. Despite the best attempts of the legislator to address the problems, the Regulation remains a piece of EU law. It is accordingly difficult to see how true application, oversight and enforcement can be achieved when processing is carried out on territories where EU law has little, even no, claim to sovereignty. In this respect, it is not so much the Regulation, or even data protection law, which is the cause of the problem, but a much deeper rift between the concept of legal sovereignty and the properties of information. Bearing the above in mind, it is clear that there are a number of uncertainties related to the future interaction of cloud computing and data protection. However, there are a number of policy options that can be suggested. Recognizing the fact that the current Directive has certain critical flaws in relation to the regulation of cloud computing, recommended options could be: x Support the current process of data protection law reform x Support the choice of a Regulation as the proposed legal instrument replacing the Directive. 5 http://euobserver.com/tickers/120557, ‘Vote on draft EU data protection regulation postponed, again’, (last consulted 17.07.2013). 65 European Technology Assessment Group (ETAG) Recognising that data protection and privacy are fundamental rights in the European legal order, and that trust that these rights will not be violated though the use of cloud services will be essential for the continued uptake of cloud services, recommended options could be: x Support the strengthening of pre-existing individual rights in the proposed Regulation x Support the integration of the range of new rights offering further control to the data subject over their personal data – for example the ‘right to be forgotten’ and the ‘right to data portability’ x Support the novel obligations on the data controller in adhering to data protection law – for example, ‘data protection by design and default’ and the fact based approach to the concept of the ‘co-controller’. Recognising that cloud providers, on the other hand, require certainty in the law in order to apply it, and that bureaucracy can impede progress without adding to the protection of rights, recommended options could be: x Support further clarifications of principles related to data protection and cloud computing x Support the accountability principle and be cautious with European level ‘command and control’ approaches. x Support less rigorous consultation and notification requirements Recognizing that cloud computing will continue to develop as a technology, and that this has in the past, and will in the future, pose novel challenges to data protection law, recommended options could be: x Support the creation of European level consistency and interpretation mechanisms x Support the creation of the European Data Protection Board x Support increased cooperation and consistency between European DPAs Considering that, for data protection law to work, it requires oversight and enforcement mechanisms, recommended options could be: x Support the fines mechanism proposed in the Regulation x Simultaneously, support the discretionary power of National DPAs in the fining process Considering that cloud computing will be an increasingly global endeavour, recommended options could be: x Support proposals which allow justified international flows of data, whilst not risking the rights of citizens. x Reconsider approaches which have perhaps not achieved all they promised up to now – for example Safe Harbour x Look into further possibilities to ensure the jurisdictional applicability of European data protection law, when European citizens or services are involved x Look into methods of oversight and enforcement when European data protection law should apply, but data is being processed abroad. 66 Impacts of Cloud Computing 3.5. Governance Issues related to data retention and enforcement outside of the EU 3.5.1. Introduction Cloud computing adoption has been slowed by a number of different factors having to do with the uncertainty surrounding data protection practices, which together translate into a lack of trust in the cloud (Robinson 2011). A lack of transparency on the part of many private cloud providers have made businesses and governments uncertain about their risk management situation and have caused individual users to be vary whether their right to privacy is suitable protected by cloud providers. Since cloud providers as a group have proven unable to meet these concerns on their own initiative, international level governance interventions have become necessary (Com 2012/609/EC). At this level of decision-making, however, the ambitions of cloud providers to build up truly global cloud services run into the reality that the world economy, although increasingly globalized, is neither without borders nor subject to any uniform governance regime. While political decision-makers in the U.S, Europe and Asia seem to want to support the development of universally available, trustworthy cloud services, historically conditioned differences in approaches to the governance of information and economics produce difficulties in the formulation of common governance measures. Furthermore, with the recent Snowden leaks indicating unwarranted access being given to the NSA to private information stored in cloud servers (Guardian 2013) and data from national security agencies being pooled illicitly (Spiegel 2013), the underlying issues of trust between governments has added considerably to these difficulties. This section of the report aims to explicate some of the areas of difficulty within international cloud governance with a special emphasis on those issues that stand in the way of such international governance living up to European standards of data protection and privacy. 3.5.2. Data retention and 3rd party access to data Provisions to oblige telecoms ad internet service providers to retain communication data and/or meta-data have been implemented in the U.S. with the Patriot Act and in the E.U. with the Data Retention Directive. The purpose of these provisions is to support law enforcement and intelligence agencies in their pursuit of terror-related activity. Under the same provisions, these agencies are therefore mandated to gain access when warranted to secret data, including personal data and business secrets. However, with cloud computing it is no longer necessary to have provisions for data retention since data storage is at the very heart of the services provided. This means that 3rd party access to secret data will take place under different conditions. In classic data security thinking, the data controller (the user) of any cloud service carries the ultimate responsibility for data security. As we have seen in section 3.3 above, however, with the opaqueness of security practices of many cloud providers, it becomes impossible for users to assess with any confidence the quality and characteristics of the data security regime they would enter into with the adoption of any given cloud service. 67 European Technology Assessment Group (ETAG) Open-source cloud services provide a higher degree of transparency with regard to the software architecture upon which they rely. But transparency in this regard does not automatically translate into a similar openness with regard to security practices around staff screening and physical protective measures, and it does not touch upon an element essential to the cloud, namely the diffusion of data placement. A key element to data security management is to always know the physical location of data. This is a cornerstone of risk assessment. It is also key to the ability to retrieve and relocate data to protect it from intruders. But with a cloud architecture, data location changes dynamically according to the current workload of the cloud system. This means that at any one time a given user’s data can move from one virtual server to another across different sections of a server park or even between different storage facilities possibly located in different countries. Most likely, the cloud architecture will make use of redundancy and store data in several different locations at once. All in all, the complexity (or impossibility) of establishing data location adds up the impossibility for cloud users of upholding a second cornerstone of data security, namely controlling, or even verifying, who gains access to the data in question. This constitutes the technical basis upon which a number of governance issues arise having to do with 3rd party access to data and the retention of data beyond the control of the user. By constructing an opaque system of data storage, cloud technology lends itself to being misused as a tool for mass surveillance by governments as well as data mining by private corporations. While data retention legislation was necessary before traditional e-mail messaging and phone communications would store by ISPs and Telecoms, cloud computing services in many case store all information flows by default, making them prime tools for subsequent data analysis by 3rd parties. The in-built data retention in cloud computing makes it technically possible for governments to access ever larger and more complete sets of personal data and communication along with the meta-data describing connections of communication between individuals. One document, leaked by Edward Snowden to the Guardian dating April 2013, seemingly documents that the NSA with its PRISM program had created a system for gaining direct access to e-mails, chats, videos, photos, stored data, file transfers, phonecalls via the Internet (VoIP), video conferences, and social networking activities from users of cloud services provided by Microsoft, Google, Yahoo!, Facebook, YouTube, Skype, AOL and Apple with more providers to “come online”. What this last phrase meant was initially unclear as providers denied all knowledge of the system, implying that PRISM enables access without consent (Greenwald and MacAskill 2013). However, a group of the cloud providers involved have later revealed that they were in fact acting under a so-called FISA order (described below) and compelled by a “gag order” to keep silent about their involvement (Ashford 2013a, 2013b). Another leaked document seems to reveal practices by the British intelligence agency, GCHQ, of tapping and storing for up to 30 days the total flow of data through fibre-optic cables connecting the North America and Europe, including phone calls, e-mails, Facebook postings and more. (MacAskill et. al. 2013) Although such practices are do not directly make use of weaknesses in cloud architectures, it is very likely that storing and sifting through such enormous amounts of data relies on cloud computing solutions. And a third leak to der Spiegel shows how a collaboration program between 68 Impacts of Cloud Computing national intelligence services, who are each in themselves legally prohibited from spying on their own nationals, nevertheless enables the creation a matrix system of information gathering (‘Boundless Informant’), which makes information available to any of the involved agencies about citizens in any country (Poitras et. al. 2013). The general tendency in these revelations is illustrated by a quote, brought both in the Guardian and Spiegel of U.S. Chief of Cyber Command, Keith Alexander, who supposedly asked rhetorically: “Why can’t we collect all the signals all the time” during a visit to his British counter-part in 2008. The emergence of such thinking coincides precisely with the advent of cloud computing as a technical space of possibility. And it indicates a clear intention on the part of intelligence agencies to make full use of those possibilities. The first question to be asked in the wake of the Snowden leaks has to do with the legality of such total surveillance practices. Especially pertinent is the underlying issue of legality within different jurisdictions. Within the articles referred to above, the impression is given that the Tempora program – although controversial – may in fact be setup in compliance with U.K. regulations and that the Boundless Information system seems simply to make clever use of legal provision use for transnational cooperation. These provisions are typically included in Mutual Legal Assistance Treaties (MLATs) between individual countries. One example of such a treaty is the German-US Mutual Legal Assistance Treaty in Criminal Matters with the United States (2003) and the subsequent Supplementary Treaty to the Mutual Legal Assistance Treaty in Legal Matters with the United States, both of which entered into force in 2009 (Maxwell and Wolf 2012). In the case of PRISM, the matter of legality is disputed. Some hold that the U.S. Foreign Intelligence Surveillance Act provides a legal basis for a broad range of surveillance of citizens from outside the U.S. by U.S. government agencies and therefore puts PRISM within the boundaries of U.S. law (e.g. Rauhofer and Bowden 2013). Others, however, argue that while PRISM may only “target” foreigners, the practices of dragnet surveillance involved will necessarily lead investigators to “acquire incidentally” an extraordinary mass of personal data belonging to U.S. citizens putting the program at odds with the U.S. constitution (Kaminiski 2013). In Europe, the question of legality goes even deeper. European cloud providers were quick to see a silver lining in the PRISM revelations, profiling themselves as “privacy friendly” over against U.S. based cloud providers with reference to the differences in U.S. and E.U. data protection legislation (Abboud and Sandle 2013). The U.S. Patriot Act with its provisions for data retention and access by law enforcement has especially been singled out as putting U.S. data protection in a class lower than that enjoyed by European citizens. But this view in fact does not provide a faithful picture of the state of legislation in the E.U. versus that in the U.S. For while it may be argued that the original Data Protection Directive of 1995 went further in some crucial respects than contemporary U.S. data protection legislation, the European Data Retention Directive may very well have levelled out those differences. On white paper (Maxwell and Wolf 2012)compares government access to data across a number of different jurisdictions (see figure below) and shows that the U.S. government in fact does not have wider allowances than European governments. In a European country a citizen – according to the white paper – is less likely to be notified of privacy breaches by government than in the US. The co-existence of the Data Protection Directive and the Data Retention Directive along with national provisions for government 69 European Technology Assessment Group (ETAG) authorities’ access to retained data seems therefore to present a legal paradox, which the Irish High Court and Austrian Constitutional Court recently sought to unravel by testing the Data Retention Directive’s legality at the European Court of Justice. A decision is expected toward the end of the year (EDRI 2013). Table 2: Governmental authorities’ access to data in the cloud. Source: Maxwell and Wold, 2012. Key to the discussion about “privacy-friendly” jurisdictions is an understanding of the powers bestowed – or not bestowed – on government agencies by the U.S. Patriot Act of 2001. It is erroneously believed by many that the Patriot Act created new, invasive powers for such agencies to gather personal and secret information. The reality is, however, that most of these powers existed already and that they were – and remain – limited by the U.S. Constitution (Maxwelll and Wolf, op. cit.). So just as in the case of Europe, there is an underlying legal paradox, which hopefully the lawsuits mentioned above will help to clear 70 Impacts of Cloud Computing up. Even within the confines of the Patriot Act itself, however, government agencies are still bound by burden of proof and not legally empowered to gain access to cloud data (or any other kind of personal data). Specific provisions outside the Patriot Act for gaining access to data include provisions within the 1978 Foreign Intelligence Surveillance Act for so-called FISA orders, which must be issued by a judge. These orders give access to content data in cases where there is reason to believe that access to the data will help unveil international terrorism or spying. FISA orders could be given before the Patriot Act, but the Patriot Act added a “gag order” disallowing telecoms and ISPs served with such an order from disclosing the existence or content of the order. As already mentioned, this “gag order” was the reason behind initial denials by major cloud providers of having had knowledge of the PRISM program,This illustrates the opaqueness created by legislation in this area. Government investigators may themselves issue National Security Letters (NSL’s) directly to telecoms and ISPs in order to gain access to meta-data, which is most likely to the mechanism used in the Verizon-scandal. The possibility of issuing such letters had also been part of the arsenal of investigative mechanisms before the Patriot Act, but its use seems to have been expanded after the passing of the Patriot Act which also here added a “gag order” as well as allowing agencies other than the FBI – including the CIA and the NSA – to issue such orders. FISA orders and NSL letters, the range of their use and their constitutional legality, are at the heart of the on-going controversy regarding U.S. data access in telecoms, internet services and clouds. The question is whether these powers of investigation in fact go much further than those used by the European law enforcement and intelligence communities? Comparing the powers of investigation granted to U.S. investigators with similar provisions in the E.U. must firstly take place at national level, since national level implementations of the European data protection directive have taken various courses in the different member states (Korff and Brown 2010). In Denmark, for instance, it is legal for cloud providers to voluntarily provide customer data to government investigators or a police investigation, which counts as a valid reason to break the obligation to protect personal data (Maxwell and Wold, op. cit.). Even though provisions for forcing such data sharing are bound to classical search warrants issued by a judge, which could create the image of much stricter data protection legislation, the legality of voluntary sharing (which remains illegal in the U.S.) creates a highly opaque juridical situation in which we can only guess what would produce such volition on the part of cloud providers, ISPs and telecoms. In France, efforts have been made since the 1980’s to coordinate at central, national level efforts to counter terrorism. Overcoming the institutional disparities, which in the U.S. still acts as a brake on domestically based investigation efforts, the Unité de coordination de la lutte anti-terroriste (the coordination unit of fight against terrorists) was founded in 1984 coordinate domestic and foreign intelligence gathering, and in 2008 the Central Directorate of Domestic Intelligence was created in which the state police and the anti-terrorism and counterespionage units of the Ministry of the Interior were merged (Erlanger 2012). This higher level of coordination is necessary in order to utilize the relatively limited resources of French investigative agencies, which traditionally rely more on manpower and physical actions than computing analysis. In order to obtain data stored in clouds, government investigators can either obtain classical search warrants or they can under certain circumstances directly issue request letters to the cloud provider requiring that the provider 71 European Technology Assessment Group (ETAG) produce customer data relating to a criminal investigation (Maxwell and Wolf, op. cit.). French law also does not prohibit voluntary sharing of information by cloud providers, nor does it oblige cloud providers to inform customers if information is shared. It should be obvious from these examples that data stored in clouds on European soil are not necessarily safer than in the U.S. on juridical grounds. The real difference lies in the concrete practices of the intelligence communities in each country. The second question to be addressed, then, is the issue of the desirability of the practices revealed. While many have been quick to speak out against revelations that communications in and out of the European Parliament have been recorded (Hecking and Schulz 2013) and to decry the spying practices of NSA and GCHQ, the underlying issue of balancing trade-offs between privacy and security remains. The arguments here are classical and not specific to cloud computing. From a law enforcement point-of-view, access to more data gives a higher likelihood of prevention of crime and terrorism. From a privacy point-of-view, the mechanisms and laws put in place to allow for such access are seen as dangerous in themselves given the risk of mission-creep, which it is feared can lead to the on-going escalation of surveillance far beyond what would be politically acceptable. This discussion goes to the very core of the open society and the nature of democracy and will likely be intensified on the basis of the Snowden leaks and subsequent political reactions. The third question to be asked, which one might fear being overlooked, is whether or not it is technically possible to prevent such massive surveillance practices given the interconnected nature of the information society and the rise of cloud computing and big data. Proponents of “privacy by design” (PbD) hold that true privacy protection can only be upheld through conceptions of information processing and data security fundamentally different from those which structure ICT development today. The Information and Privacy Commissioner of Ontario, Canada, has put forth a list of PbD principles among which is to keep ICT design user centric and to allow for strong online identity protection. Section 3.3. of this report covers some of the technical options for achieving such protection. The point of raising these issues here is to underscore the difficulty of establishing actually trustworthy cloud services by setting up legal boundaries to organizations’ behaviour while at the same time allowing for the opaqueness of cloud providers’ practices and the secrecy of intelligence agencies’ behaviour. From this point of view, the real battle over the conditions for privacy lies not in privacy legislation, but in the standardization regimes covering cloud computing. Without going too deeply into the conceptual questions underlying standardization of cloud services, it is worth noting here the existence of what may prove to be paradigmatic developments in the basic approaches of the data security research community. These basic developments can be of direct relevance to the political strategies There are those who argue that the basic objectives of data security – to prevent access to data from outsiders or, if this fails, to prevent data from becoming comprehensible through encoding or encryption – has become outdated with the digital interconnection of the world. From a system design point of view, we should assume instead that all data – once given over to interconnected databases – is already lost. What matters, then, is to make the data worthless to the unwelcomed reader. Most relevant to solving this issue is still the 72 Impacts of Cloud Computing protection approach covered in section 3.3. But there are those who argue instead for a fundamental change in how we handle online identities and for the empowerment of users in this respect. Instead of centralized identity management and authorization systems which users need to trust in order to access online resources, a societally wiser approach might be to place users’ identify management with themselves, outside the systems they wish to access, thereby creating a radically de-centralized information society. Again, such debates fall outside the scope of this report. The European research projects FIDIS and HYDRA are recommendable sources of learning on the subject. The point here is simply to outline the oppositional forces drawing policy either in the direction of more centralized solutions with trust in providers as the core component for fluent system behaviour or in the direction of decentralized, user-centric solutions based on an inherent distrust of centralized systems and a greater trust in the judgment of individual users. The forces pushing for the former approach are strong, while the latter draws only limited attention in spite of its greater resonance with ideals of open society. Political decision-makers need to be clear about which direction they want to draw governance developments. 3.5.3. Safe Harbour and international harmonization With the legal and practical complexities surrounding the twin questions of data retention and 3rd party access to data, the issues of extending the EU-US Safe Harbour data protection collaboration and further effort towards international harmonization of legal frameworks must be viewed in the light of reality rather than in the glow of idealist readings of European data protection policy interpreting a priori as “better”. Collaboration on data sharing in support of law enforcement has shown repeatedly that the U.S. and European governments speak very different languages when it comes to defining such core terms as “law enforcement”, “law enforcement authority”, “intelligence” and “intelligence agency” (De Busser 2010). From the point of view of the European Commission, law enforcement and intelligence operations are clearly separated, but this is not the case for the U.S. We might add that also European member states, as shown above, do not necessarily make the same sharp distinction as the EC. The reason for this might simply be that the E.C. – unlike national governments – is not involved at the same time involved in police activity and international intelligence gathering and thus does has not been forced to deal with the overlap of interests and competencies that arise for national governments. This interpretation at least would make sense of the increasingly entrenched difference in approach to bi-lateral data exchange and data protection collaboration where the EC on its part pursues a universal understanding and governance of core terms, preferably through the intermediation of international bodies like the Council of Europe or the United Nations, while the U.S. government pursues the real-political goal of gaining trouble-free access to foreign law enforcement and intelligence data. As there are good reasons for national-level European intelligence agencies to pursue similar interests, it is important to notice the difference between the total sums of interests on the two sides of the Atlantic. In the U.S., the law enforcement and intelligence communities have interests in the establishment of international legal frameworks allowing for the unhindered flow of data between countries which overlap directly with the interests of U.S. based cloud providers and their European daughter companies. With the business models of some cloud providers being based largely on the unhindered mining of the 73 European Technology Assessment Group (ETAG) personal data of users for commercial purposes, this overlap in interests extends also to the legal frameworks regulating 3rd party access to data. In Europe, the absence of large, home-grown cloud providers means that this overlap in interests is not directly duplicated. Outside of the EC, national intelligence and law enforcement agencies will most likely pursue legal solutions similar to those of their U.S. counterparts. But without the simultaneous existence of similar interests from cloud providers, European policy makers cannot at national nor at European level pursue with the same confidence the logic of boundless information as the U.S. government. The extreme valuations of U.S. cloud giants on the stock market has very little to do with their physical assets or the value they derive from end-users as many of them derive none. What drives these valuations is rather the understanding that the immense amount of personal data turned over to these providers will in some way or other always be commercially exploitable and that, given the weakness of current governance regimes, these values are readily available for any company able to deliver immediate utility and gratification to users (Lanier 2013). From an industrial policy point-of-view, it is nonsensical to hand over such values harvested from European citizens. From this point of view, it would be recommendable for European decision-makers to work actively for a regime of strong data protection centred around European jurisdiction in order to foster a lively European cloud industry bound to uphold real-world data protection practices and with a more healthy long-term contribution to the real economy (see also Bigo et. al. 2012). Applying these reflections to the issue of extending the Safe Harbour agreement with the U.S., one must first and foremost focus on the enforceability of any collaborative data protection regime. As we have seen above, 3rd party access to personal data is of great value to the entity accessing that data – that entity being public or private. Since such access takes place in a legal grey zone, it is unwise to leave the matter of compliance to Safe Harbour principles up to trust in the cloud provider. The original Safe Harbour agreement between the EU and the U.S. was made in order for U.S. businesses to gain access to European markets without having to go through the same processes of registration with national data protection agencies as Europe-based businesses and to circumvent the fragmented data protection policy implementations made by individual member states. Once deemed to uphold “adequate” standards of data protection, U.S. providers of internet services would have access on equal footing to markets in all member states. Such adequacy means to uphold the basic principles of data protection of the European directive, for instance the obligation to inform users about access granted to 3rd parties or data processing done for other purposes than those originally agreed to by the user. In effect, these principles would most likely prevent the legality of many uses of personal data by providers of advertising-driven services delivered. Critics have, however, have long maintained that the enforcement regime around the Safe Harbour agreement is much too weak to guarantee real-world compliance (EDRi 2012). Safe Harbour is a selfcertification scheme through which companies certify the own compliance with the scheme’s principles. Investigations based on user complaints take place under the jurisdiction of the company’s home country and is first and foremost carried out by privatesector dispute resolution organisations. Ultimately, of course, such self-compliance mechanisms are subject to enforcement by government authorities, primarily the Federal 74 Impacts of Cloud Computing Trade Commission. But in the light of the recent Snowden revelations, a general trust in this mode of layered enforcement becomes difficult to maintain, and there are serious indications that the Safe Harbour principles are not enforced in substance (Nielsen 2013). The proposed Data Protection Regulation in its original form aims squarely at mending the combined deficiencies of enforceability of the Data Protection Directive and the Safe Harbour agreement. In parallel with recent and upcoming legislation on the same topic in other countries such as Australia and Singapore, the EC proposal includes the notion of extraterritorial reach of the legislation, i.e. the automatic applicability of the Regulation to any organisation processing data as part of the provision of products or services to citizens or organisations within the EU. At the same time, the proposal aiming at the creation of a Regulation rather than a Directive means that the proposed rules would apply uniformly across Europe without having to be implemented at national level. The proposal thus aims to kill two birds with one stone, achieving at once a unified European digital market and more serious measures to ensure the protection of the personal data of European citizens. One important detail with regard to the enforceability of the proposed rules is the inclusion of a sliding scale of fines for data protection and privacy breaches of up to 2% of yearly turnover. Such enforcement measures, along with more detailed demands for documentation of data protection practices, seem to represent a step forward in comparison with the Directive (Brodies 2012). With regard to international harmonization, the EC regulation proposal intends for Europe to “take the lead” for global data protection standards (EC 2012), which is more readily possible through the proposed construction of European legislation with extraterritorial reach than similar positions have been in earlier negotiations in which EU leadership has relied more on the construction of international legal frameworks. With the construction of legislation with extraterritorial reach, there is the possibility of making principles similar to those of international conventions count in those internet interactions, which involves European citizens and business. However, there is of course a balance to be struck concerning the possible conflicts with other national legal frameworks, not only in the U.S. (Kuner et. al., 2013). Nevertheless, going down the path of legislation with extraterritorial reach means that the EC has in effect found a way to speak a foreign policy language much more akin to those of the U.S. and other major powers without compromising the core ethical stance of European data legislation from the beginning. Given the importance of maintaining these principles from both a human rights and a European industrial policy perspective, it becomes important in the parallel negotiations of a free trade agreement with the U.S. not to fall into the trap of trading off ethics on the one hand against potential growth on the other. In the case of cloud computing it seems quite clear that these often opposing interests overlap. 3.5.4. Discussion and conclusions The difficulty of governing cloud computing due to the plurality of jurisdictions involved is well-known and has been at the basis of discussions about the revision of data protection legislation both in Europe and internationally. Over the past year, however, the world has gained insight into trans-legal (if not illegal) practices of 3rd party access to data for the purposes of data mining by both private actors and government agencies. This insight has shown that cloud governance is not only about legal frameworks, but also about their 75 European Technology Assessment Group (ETAG) enforceability. With the extraterritorial reach of the proposed European data protection regulation, the European Commission has taken one step away from its previous reliance on international agreements in this area towards a more unilateral approach to upholding European standards of data security and privacy in a globalized economy. This approach has both benefits and drawbacks. On the one hand, more active means of enforcement become available to Europe while providers under the proposed Regulation will be forced to provide greater transparency. As such, the proposed legislation relies less on trust in individual actors than previous frameworks such as the Safe Harbour agreement. On the other hand, with this approach Europe moves on step closer to the strong-arm style of diplomacy, which have otherwise been associated with other major world powers, especially the U.S. Taking this step puts negotiations about international data protection legislation on the same table as other international relations issues such as the proposed free trade agreement between the EU and the U.S. It is important in this context to ask difficult questions about the relationship between vested interests and viewpoints being put forth in the debate. The US cloud industry, for instance, may share an interest with the US government in weakening European cloud governance and/or its international applicability. Such an interest might be shared by some member state intelligence agencies, although they do not make up a strong voice in the public debate about these issues. But European citizens, SME cloud users and government agencies, all of which are at a disadvantage in negotiating terms of service and security practices with major cloud providers, may in fact need exactly the strong leadership of Europe. Such leadership may additionally help further home-grown European providers of primary cloud services. It might, however, also stifle the growth of secondary providers of app-based services. Striking the necessary balance between these concerns is no simple matter. Simple answers should therefore be viewed with some suspicion. On the basis of these observations, decision-makers may wish to: x Scrutinize viewpoints put forth in the debate to see whose interests they serve. x Be especially wary of exclusively trust-based solutions to cloud governance issues. x Look further into ways of promoting cloud architectures designed from the beginning to secure data security and privacy through design rather than trust or legislation. 76 Impacts of Cloud Computing 4. CONTRACTUAL ISSUES AND MARKET COMPETITIVENESS 4.1. CHALLENGES OF THE Introduction The first section of this chapter will analyse the regulatory environment in a wider sense, i.e. in particular the questions of jurisdiction, customer rights and the contractual relationship as whole including for example Service Level Agreements (SLA), which was identified by the initial analysis of drivers and barriers as another focal point (Leimbach et al. 2012, 83-84). Strongly related to these issues are the question of vendor lock-in, where legal and technical aspects like interoperability work together. While the first is of importance for both, business users as well as consumers, the latter one is in particular of importance for business in general. Because vendor lock-in can create a barrier for competitiveness of the market for users as well as competitors by establishing barriers to change and market entrance. Therefore the second part of the chapter will examine this as well as more general challenges issues for the competitiveness of European suppliers like the fragmented markets or the lack of fast growing enterprises. 4.2. Contractual issues of Cloud Computing This section provides a high level overview of contractual issues relating to cloud service provision and a discussion of some of the possible consequences of such issues. Where applicable, the relevant European legislation is discussed, however national legislation is not. It should be noted that this section does not discuss the treatment of data, and specifically the handling of personal data, in detail as this is dealt with separately in a separate section (see chapter 3.4). Rather this section provides a general overview of a wide range of commonly found contractual clauses between cloud service providers and their clients including choice of law, IP issues, terms of service, and acceptable use. While the issue of data protection attracts much attention and debate, other contractual issues also impact the adoption of cloud computing and are discussed herein. It should be noted that no view on the enforceability of specific contractual provisions is provided. The remainder of the paper is laid out as follows. The first part provides an overview of the general documents that make up contracts for cloud service provision. The second part discusses common features and related issues in Cloud service contracts. It ends with a discussion of some of the business consequences of cloud service contracts and resulting policy options on the European level. 4.2.1. The contract The contractual relationship between cloud service providers and their clients is laid out in one or more documents typically comprising: x A Terms of Service (“TOS”) - the TOS contains provisions concerning the overall relationship between a cloud service provider and a client. Section 4.3 will discuss these provisions in greater detail. 77 European Technology Assessment Group (ETAG) x A Service Level Agreement (“SLA”) – details the level of service to be provided and typically includes mechanisms for auditing service delivery and compensating clients for underperformance. Common features of SLAs are discussed briefly in section 4.3. x An Acceptable Use Policy (“AUP”) – a policy designed to protect cloud service providers from the actions of clients typically detailing uses of the service that are prohibited. AUPs are discussed in greater details section 4.3. x A Privacy Policy – a policy detailing the cloud service provider’s policy for handling and protecting personal data typically in line with the data protection law requirements. Recent research notes three distinctions in terms and conditions governing cloud service provision (Bradshaw et al, 2010): 1) Free v Paid Services: The obligations of the cloud service provider are likely to be in proportion to the consideration by a customer. Within paid services, terms and conditions typically fall in to those offering standard-form contracts and those subject to negotiation. The latter typically are limited to those prospective customers with sufficient bargaining power e.g. public sector organisations and large corporations, typically multinational corporations. 2) US v EU Legal Jurisdiction: Those service providers asserting their terms and conditions under the US had more extensive disclaimers of warranty or limitations of liability that those asserting governance under an EU member state. 3) IaaS v SaaS: There is less variance in the terms and conditions offered by IaaS than SaaS; IaaS services are more similar than SaaS. 4.2.2. Common features and issues in Cloud Computing Contracts Choice of Law The nature of cloud computing assumes that data will be stored across multiple data centres used by a cloud service provider. This can introduce a degree of jurisdictional uncertainty unless (and even if) stated in the TOS. Data may be transmitted, stored and processed across multiple jurisdictions so seamless that the end user, and indeed the cloud service provider (due to the chain of service provision) may not know where data resides at any given point in time. Of 31 terms and conditions analysed, Bradshaw et al (2010) noted that 15 mandate the law of a particular US state, most commonly California, as the jurisdiction of choice. A further 11 explicitly stated the law of an EU member state and five the either the customer’s local law or no choice of law. The jurisdiction for settling disputes is typically similar to the applicable law. The choice of US State law provides certain advantages to cloud service provider. For example, US courts are more likely to recognise disclaimers and limit liabilities as stated in Terms of Service. In addition, legal costs are much higher in the US thus providing a disincentive to EU firm, and particular consumers and SMEs, in taking legal action. 78 Impacts of Cloud Computing The applicable legal rules to establishing applicable law to contractual obligations in the EU can be found in the Rome I Regulations (Regulation 593/2008/EC). 6 Article 3 recognises that a contract shall be governed by the law chosen by the Parties subject to the existence and validity of the consent of the parties. Where the applicable law to the contract has not been chosen in accordance with Article 3, Article 4 of the Regulations provides a means of determination of choice of law. Article 4(1)(b) states: “a contract for the provision of services shall be governed by the law of the country where the service provider has his habitual residence” Article 4(1) also provides for the franchisors and distributors in a similar manner. Where the contract is not covered by Article 4(1) or where the elements of the contract would be covered by more than one. Article 4(2) provides that the contract shall be governed by the law of the country where the party required to effect the characteristic performance of the contract has his habitual residence. Notwithstanding these provisions, Article 4(3) states:“Where it is clear from all the circumstances of the case that the contract is manifestly more closely connected with a country other than that indicated in paragraphs 1 or 2, the law of that other country shall apply.” Similarly, Article 4(4) states: “Where the law applicable cannot be determined pursuant to paragraphs 1 or 2, the contract shall be governed by the law of the country with which it is most closely connected.” Establishing a real and substantial connection between the jurisdiction and the parties involved can be interpreted widely. Some considerations in choice of law for cloud service provision may include: x What is the nature and quality of their commercial activity in the jurisdiction? x Is the sale of services passive or active e.g. is the cloud service provider actively aware that they are making sales to resident of a particular jurisdiction? x What jurisdiction are the paying customers or end users resident or domiciled in? x Where is the cloud service consumed? x Where is the data located? Where are the data centres located? x Where is the cloud service provider located? Does the cloud service provider have any business presence in the jurisdiction? x Does the cloud service provider advertise, market or solicit business in the jurisdiction? Article 6 of the Regulations provide specifically for consumer contracts and would generally apply the country in which the consumer has their habitual residence. Bradshaw et al (2010) note that a number of cloud service providers seek relatively short limitation periods 6 For legal rules relating to the choice of court having jurisdiction in civil or commercial disputes within the EU, the so-called ‘Brussels Regime” recast in 2012 applies (REGULATION (EU) No 1215/2012 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 12 December 2012 on jurisdiction and the recognition and enforcement of judgments in civil and commercial matters). While the original Brussels Regime only applied to individuals domiciled in the European Economic Area (EEA) or Switzerland. However, the 2012 Regulation also sets out rules applicable to suing individuals domiciled elsewhere. 79 European Technology Assessment Group (ETAG) in which a customer must bring a claim in respect of a service. Consumers are likely to be protected from such limitations EU consumer protection legislation 7. Data Location and Transfer to Countries outside of the EEA To achieve operational efficiencies and other technical and business objectives, cloud service providers will transfer data to different data centres. These locations may be located in different jurisdictions including outside of the EEA. Depending on the complexity of the chain of service provision, the identification and maintenance of an exact location on data may be difficult. Concerns are multi-fold and include the location of the data in storage, when processed and in transit. The applicable legal rules on data protection in the EU can be found in the Data Protection Directive (Directive 95/46/EC). This Directive was introduced in 1995 to harmonise the laws on data protection across the EU member states. On 25 January 2012, the European Commission unveiled a draft European General Data Protection Regulation that will supersede the Data Protection Directive however this is out-of-scope for this paper. Currently, Article 25(1) states: “The Member States shall provide that the transfer to a third country of personal data which are undergoing processing or are intended for processing after transfer may take place only if, without prejudice to compliance with the national provisions adopted pursuant to the other provisions of this Directive, the third country in question ensures an adequate level of protection.” Article 26(1) provides for a number of derogations including where: “(a) the data subject has given his consent unambiguously to the proposed transfer; or (b) the transfer is necessary for the performance of a contract between the data subject and the controller or the implementation of precontractual measures taken in response to the data subject's request; or (c) the transfer is necessary for the conclusion or performance of a contract concluded in the interest of the data subject between the controller and a third party; or (d) the transfer is necessary or legally required on important public interest grounds, or for the establishment, exercise or defence of legal claims; or (e) the transfer is necessary in order to protect the vital interests of the data subject; or (f) the transfer is made from a register which according to laws or regulations is intended to provide information to the public and which is open to consultation either by the public in general or by any person who can demonstrate legitimate interest, to the extent that the conditions laid down in law for consultation are fulfilled in the particular case.” Even where the Article 26(1) derogations are not met, Cloud service providers may still be able to transfer data to a third country. The Council and the European Parliament have given the European Commission the power to determine, on the basis of Article 25(6) of Data Protection Directive whether a third country ensures an adequate level of protection by reason of its domestic law or of the international commitments it has entered into. To 7 Annex to Council Directive 93/13/EEC of 5 April 1993 on Unfair Terms in Consumer Contracts 80 Impacts of Cloud Computing date, the European Commission has so far recognised the following for inclusion on the socalled ‘White List’: Andorra, Argentina, Australia, Canada, Switzerland, the Faeroe Islands, Guernsey, the State of Israel, the Isle of Man, and Jersey as providing adequate protection. In addition, the Commission has also recognised the US Department of Commerce's Safe Harbour international privacy principles, and the transfer of Air Passenger Name Record data to the United States' Bureau of Customs and Border Protection as providing adequate protection. The former includes the transfer of personal data to US organisations that have signed up to the Safe Harbour international privacy principles agreed between the US and the EU. Under Article 26(4) of the Data Protection Directive the European Commission can decide that certain standard contractual clauses offer sufficient safeguards as required by Article 26 (2). By incorporating the standard contractual clauses into a contract, cloud service providers (acting as Data Controllers) established in the EEA can legally transfer personal data to a Data Controller or to data processors established in a country not ensuring an adequate level of data protection 8. A third mechanism, Binding Corporate Rules (BCRs), is available to transfer data to countries not ensuring an adequate level of data protection. Unlike the White List or Model Clauses, the BCRs are not decided upon by the European Commission. The BCRs are internal rules (such as a Code of Conduct) adopted by multinational group of companies which define its global policy with regard to the international transfers of personal data within the same corporate group to entities located in countries which do not provide an adequate level of protection. 9 They were designed by the Article 29 Working Party to complement the Safe Harbour international privacy principles, which only apply to US organisations and the EU Model Contract Clauses. BCRs are required to be approved by the data protection authority in the EU Member States in which the organisation will rely on the BCRs. Organisations intending to adopt a BCR will appoint a lead authority, typically where their European headquarters is located or where their data protection responsibilities lie however this is not always the case. A mutual recognition procedure has been agreed whereby once the lead authority considers that a BCR meets the requirements as set out in the working papers, the data protection authorities under mutual recognition accept this opinion as sufficient basis for providing their own national permit or authorisation for the BCR, or for giving positive advice to the body that provides that authorisation. To date, 21 countries are part of the mutual recognition procedure: Austria, Belgium, Bulgaria, Cyprus, Czech Republic, Estonia, France, Germany, Iceland, Ireland, Italy, Latvia, Liechtenstein, Luxembourg, Malta, the Netherlands, Norway, Slovakia, Slovenia, Spain, and the United Kingdom. In their review of terms and conditions, Bradshaw et al (2010) noted that the majority of service providers studied did not address the location of data storage, processing and transit adequately. Furthermore, unless the service provider is operating its own secure infrastructure, this may not be possible or economically feasible. While the Data Protection 8 http://ec.europa.eu/justice/data-protection/document/international-transfers/transfer/index_en.htm 9 http://ec.europa.eu/justice/data-protection/document/international-transfers/binding-corporate-rules/ 81 European Technology Assessment Group (ETAG) Directive and specifically Articles 25 and 26, provide a strong legal basis for controlling the export of data outside of the EU, commentators have noted that this may not be an adequate disincentive to non-EU government authorities. Data Integrity and Availability Data integrity refers to maintaining and assuring the accuracy and consistency of data over its entire life-cycle (Boritz 2005). Many clients consider using the cloud as they perceive the cloud to be a safe method of backing up data. With this in mind, data integrity and availability go to the core of consumer expectations. Bradshaw et al (2010) found that the majority of cloud service providers surveyed included clauses in their terms and conditions, which placed the responsibility for preserving data integrity with the client. While a number of service providers surveyed stated that they would use ‘best efforts’ but nonetheless disclaimed responsibility for data integrity. Article 17 of the Data Protection Directive (Directive 95/46/EC) requires that Member States provide that:“…data controllers to implement appropriate technical organizational measures to protect personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing. Having regard to the state of the art and the cost of their implementation, such measures shall ensure a level of security appropriate to the risks represented by the processing and the nature of the data to be protected.” Article 17(2) requires data controllers to choose data processors with sufficient guarantees in respect of the technical security and organisational measures governing the processing and compliance those measures. Any such processing must be governed by a contract stipulating that the processor shall act only on instructions from the controller. At least, for personal data it would seem that cloud service providers have obligations however this is not clear for business data which may be contractually disclaimed. This is consistent with recent findings by Hon et al (2012) in negotiated cloud service contracts. Data availability is the extent to which an organization’s full set of computational resources is accessible and usable (Jansen/Grance, 2011). Availability can be impacted by both temporary and prolonged outages; denial of service attacks and scheduled maintenance (Jansen/Grance, 2011). Availability is typically dealt with in SLAs however is typically disclaimed and remedies limited to service credits. Security of Data McDonagh (2012) identifies two areas of law with respect to the security of data in the cloud: x Obligations under data protection legislation x Access to date for law enforcement purposes 82 Impacts of Cloud Computing For the purpose of the Data Protection Directive, the cloud client can typically be considered the ‘data controller’ and the cloud service provider the ‘data processor’. Article 17 of the Data Protection Directive requires the data controller to: “…implement appropriate technical and organizational measures to protect personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.” The data controller must ensure a level of security appropriate to the risks represented by the processing and the nature of the data taking in to account the state of the art and the cost of implementation. While no guidance is given on specific security measures, it is clearly expected to be proportionate to the sensitivity of the data being processed. Article 17 (2) requires the data controller to choose a processor: “…providing sufficient guarantees in respect of the technical security measures and organizational measures governing the processing to be carried out, and must ensure compliance with those measures.” The contract between the data controller and data processor must stipulate that the processor shall act only on instructions from the controller and that the obligations on the data controller under the Directive are also incumbent on the processor. Clients of cloud service providers may wish to consider the security of data not only in storage but while being processed and in transit and specifically require the cloud service provider to encrypt the data in such instances. The Article 29 Working Group provide a detailed list of 14 safeguards relating to the controller-processor relationship. 10 There are significant practical issues with compliance with these requirements in a multitenant cloud environment. While the data controller is responsible for the security measures, it would be extremely difficult for a cloud service provider to accommodate multiple discrete security policies from clients on a shared service. Hon et al (2012) note that cloud service providers in negotiated contracts generally refused to adopt client policies or adapt their own. Rather, they specifically based on the security policy on industry best practices while reserving rights to change their own policy unilaterally. The use of industry certifications including PCI-DSS, ISO27001, SAS70 and COBIT5 are common assurances for security in IT and increasingly cloud computing and clients may contractually require cloud service providers to maintain these certifications. While these certifications are gaining greater traction in cloud computing and involve regular audits by third parties, cloud service providers are unlikely to contractually agree to audits by clients or third party auditors nominated by clients. This area is further complicated depending on the complexity of the chain of service provision and the use of the Internet as a transport mechanism in cloud computing. Hon et al (2012) note that many standard terms of cloud service providers did not require security incidents to be reported to clients or end users however noted that providers were typically agreeable to negotiating such service provision. 10 Article 29 Data Protection Working Party, Opinion 05/2012 on Cloud Computing, European Commission 83 European Technology Assessment Group (ETAG) Access to data may be provided for law enforcement purposes in a number of ways. Contractually, Bradshaw et al (2010) noted that the overwhelming majority of cloud service providers state that they will disclose data in response to a valid court order. Others may provide procedural safeguard by providing advance notice, if possible. It should be noted that Bradshaw et al (2010) do note other cases with lower disclosure thresholds. Cloud service providers, particularly in negotiated contracts, may address the issue by providing that they will not provide access unless instructed by the client however any such contractual arrangements must operate against the backdrop of the applicable legislative framework for access to data for law enforcement purposes and such a provision would therefore carry little weight (McDonagh 2012). The Council of Europe Cybercrime Convention is an international treaty on crimes committed via the Internet and other computer networks. The objective of the treaty is to pursue a common criminal policy aimed at the protection of society against cybercrime, especially by adopting appropriate legislation and fostering international co-operation. The treaty deals particularly with infringements of copyright, computer-related fraud, child pornography and violations of network security. It also sets out such procedural law issues including expedited preservation of stored data (Article 16), expedited preservation and partial disclosure of traffic data (Article 17), production order (Article 18), search and seizure of computer data (Article 19), real-time collection of traffic data (Article 20), and interception of content data (Article 21). Chapter III outlines details on international cooperation. While the treaty has been ratified by the majority of the Member States of the Council of Europe, 12 have not including the Czech Republic, Greece, Ireland, Luxembourg and Sweden. Notwithstanding the Council of Europe Cybercrime Convention, the actions of law enforcement officials must interpreted against the backdrop of the European Convention on Human Rights protections such as those concerning the right to privacy and the right to fair procedures. Law enforcement official may also be able to access data for law enforcement purposes under the Data Retention Directive (Directive 2006/24/EC). While originally drafted against a telecommunications backdrop certain envisaged services are now delivered by cloud service providers. As such the Directive may impose requirements on the cloud service provider to store citizens' telecommunications data for six to 24 months. Under the directive the police and security agencies will be able to request access data relating to communications provided a court has granted permission. In the context of the Data Retention Directive, a ‘service provider’ is: “..a person who is engaged in the provision of a publicly available communications service or a public communications network by means of a fixed line or mobile telephones or the internet.” Services such as email clearly fall within this definition. ‘Data’ refers to traffic data or location data but not the content of the communications. Law enforcement agencies may also be able to gain access to data through a variety of legal mechanisms including Mutual Legal Assistance Treaties (MLATs) – bilateral agreements between EU member states and the US to exchange information required for lawful investigative purposes – and a variety of US mechanisms. The latter have been the 84 Impacts of Cloud Computing subject of some controversy and while beyond the scope of this paper include provisions under the US Patriot Act, the US Electronic Communications Privacy Act, Foreign Intelligence Surveillance Orders, National Security Letters as well as traditional mechanisms. IP Issues Cloud services will typically include the storage, processing and transport of data. Much of this data will be protected by copyright, known in copyright law as “works”, which may be owned by the client, third parties, or the service provider. Central to any IP infringement claim will be the claimant’s ability to establish: x That IP rights exists in the works at issue; x That the claimant owns the IP; x That the IP has been infringed; and, x That none of the defences for infringement apply. Cloud service providers typically provide non-public resources for use by customers which are distributed, seamless and invisible to end users. These resources are typically provided under agreements to ensure security and privacy. Thus investigating the processes, software and physical infrastructure of a cloud service provider is significantly more difficult than traditional on-premise software. This sub-section provides a brief overview of some of the applicable legal rules in the EU that impact cloud computing with an emphasis on copyright, patents and trade secrets. Copyright Copyright law in the European Union comprises a number of directives, which while the member states are obliged to enact into their national laws allowed for significant derogations, and by the judgments of the Court of Justice of the European Union, that is the European Court of Justice and the General Court. A detailed consideration of copyright law is beyond the scope of this report however the main features will be discussed. The applicable legal rules on copyright protection in the EU can be found in a number of directives including: x Council Decision of 16 March 2000, on the approval on behalf of the European Community of the WIPO Copyright Treaty and the WIPO Performances and Phonograms Treaty x Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases x Directive 2001/29/EC of the European Parliament and of the Council of 22 May 2001 on the harmonisation of certain aspects of copyright and related rights in the information society) x Directive 98/84/EC of the European Parliament and of the Council of 20 November 1998 on the legal protection of services based on, or consisting of, conditional access 85 European Technology Assessment Group (ETAG) x Directive 2006/116/EC of the European Parliament and of the Council of 12 December 2006 on the term of protection of copyright and certain related rights (codified version). x Directive 2009/24/EC of the European Parliament and of the Council of 23 April 2009 on the legal protection of computer programs x Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on certain legal aspects of information society services, in particular electronic commerce, in the Internal Market Various types of material are recognised in EU law in which copyright can subsist including literary works (including computer programs 11), film, sound recordings, artistic works, and original databases, 12 all of which can be stored, processed and transported in the cloud. Copyright will subsist in works of the kind listed only if they are original and copyright is acquired automatically on generation. The author of a copyright work is the first owner of copyright in that work (unless the work is created in the course of employment, in which case the owner of the copyright is the employer) but he or she can assign that ownership to another person. Articles 1 and 2 of the 2006 Copyright Directive sets the term of protection of copyright for a literary, artistic, cinematographic or audio-visual works at 70 years from the death of the author of the work or the death of the last surviving author in the case of a work of joint ownership or the date on which the work was lawfully made available to the public if it is anonymous or was produced under a pseudonym. The term of protection for related rights (e.g. those of performers) is set at 50 years. 13 Copyright gives the owner certain exclusive rights to do certain things in relation to the work, including reproduction, communication and distribution 14. Anyone else who does any of these things (known as the acts restricted by copyright) without the permission of the owner, infringes copyright and may be subject to legal proceedings taken by the owner for that infringement. Article 5 of the Copyright Directive provides certain exceptions and limitations in respect of alleged infringement of copyright including the temporary reproduction of a work for transmission in a network between third parties by an intermediary or for a lawful use of no economic consequence, reproduction for the purposes of research or private study, review or the reporting of current events, criticism, public security, educational use, library use and use for the purposes of public administration. 15 A person sued for copyright infringement may claim that copyright does not subsist in the work in question, or that the act complained of does not fall within the scope of the restricted acts, or that the act complained of was not carried out in relation to a substantial part of the work. The liability of cloud service providers for illegal content uploaded by their clients is dealt with by the Copyright Directive and the Electronic Commerce Directive (Directive 11 Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases 12 Directive 2009/24/EC of the European Parliament and of the Council of 23 April 2009 on the legal protection of computer programs 13 Directive 2006/116/EC of the European Parliament and of the Council of 12 December 2006 on the term of protection of copyright and certain related rights 14 15 Article 2,3 and 4 Article 5 86 Impacts of Cloud Computing 2000/31/EC). The Copyright Directive requires Member States to provide adequate legal protection against services which (a) are promoted, advertised or marketed for the purpose of circumvention of, or (b) have only a limited commercially significant purpose or use other than to circumvent, or (c) are primarily designed, produced, adapted or performed for the purpose of enabling or facilitating the circumvention of, any effective technological measures. Similar protection is required against services that remove or alter electronic rights-management information. The Electronic Commerce Directive (Directive 2000/31/EC) sets up an Internal Market framework for electronic commerce, which provides legal certainty for business and consumers alike. It establishes harmonised rules on issues such as the transparency and information requirements for online service providers, commercial communications, electronic contracts and limitations of liability of intermediary service providers. Central to the E-commerce Directive is the definition of information society services: “…any service normally provided for remuneration, at a distance, by means of electronic equipment for the processing (including digital compression) and storage of data, and at the individual request of a recipient of a service.” The majority of cloud services clearly fall within this definition however one might argue that free services are not depending on one’s view of remuneration and “individual requests of a recipient of a service”. Articles 12-14 of the E-commerce Directive (Directive 2000/31/EC) establish precisely defined limitations on the liability of internet intermediaries providing services consisting of mere conduit, caching and hosting. The conditions under which a hosting provider is exempted from liability, as set out at Article 14(1)(b) constitute the basis for the development of notice and take down procedures for illegal and harmful information by stakeholders. It should be noted that these exemptions apply only in respect of liability for damages, leaving open the possibility that an injunction can be secured to stop the activity in question. The capacity of a cloud service provider to avail of the exemptions under the E-commerce Directive will depend on the nature of cloud service being provided and it is certainly far from clear. Paragraph 43 provides: “A service provider can benefit from the exemptions for ‘mere conduit’ and for ‘caching’ when he is in no way involved with the information transmitted; this requires among other things that he does not modify the information that he transmits; this requirement does not cover manipulations of a technical nature which take place in the course of the transmission as they do not alter the integrity of the information contained in the transmission.” Article 12 is clear, the service provider must not have initiated the transmission, it must not have selected the recipient of the transmission, and it must not have selected or modified the transferred information. Similarly to avail of the exemption for caching, the service provider will be exempt if the sole purpose of the service is to make more efficient the information's onward transmission to other recipients of the service upon their request, on condition that (a) the provider does not modify the information; (b) the provider complies 87 European Technology Assessment Group (ETAG) with conditions on access to the information; (c) the provider complies with rules regarding the updating of the information, specified in a manner widely recognised and used by industry; (d) the provider does not interfere with the lawful use of technology, widely recognised and used by industry, to obtain data on the use of the information; and (e) the provider acts expeditiously to remove or to disable access to the information it has stored upon obtaining actual knowledge of the fact that the information at the initial source of the transmission has been removed from the network, or access to it has been disabled, or that a court or an administrative authority has ordered such removal or disablement. Article 14 requires that to attract protection under the exemption relating to hosting that (a) the provider does not have actual knowledge of illegal activity or information and, as regards claims for damages, is not aware of facts or circumstances from which the illegal activity or information is apparent; or (b) the provider, upon obtaining such knowledge or awareness, acts expeditiously to remove or to disable access to the information. In each of these exemptions, the conceptualisation of the service being provided would seem to be more simplistic than the typical cloud service, and specifically SaaS services. The hosting exemption as outlined in Article 14 is likely to have greater application in cloud service provision however this depends on the extent of ‘authority’ and ‘control’ reserved by the cloud service provider. An emerging issue relates to the ownership of metadata and other information generated from the interaction of the clients and their end users with the cloud service. Reed (2010) posits that information generated by the cloud service provider for its own internal purposes will belong to the provider 16. However, if the metadata or information contains client data protected under copyright, the client may have an infringement claim – if the client is aware of such use at all. Reed (2010) suggests that cloud service providers need to pay careful attention that they do not take unfair advantage of clients nor infringe copyrighted works. Contracts should state clearly whether such data is being collected and for what use. Patents and Trade Secrets A patent is a legal title that can be granted for any invention having a technical character provided that it is new, involves an inventive step and is susceptible of industrial application. A patent gives the owner the right to prevent others from making, using or selling the invention without permission. European patent law is comparatively fragmented compared to European copyright law. It includes national patent laws, the Strasbourg Convention of 1963, the European Patent Convention of 1973, and a number of European Union directives and regulations in countries which are party to the European Patent Convention. Unlike copyright, you must apply for a patent. An application for a patent can be submitted in discrete Member states or can be examined centrally at the European Patent Office. Applicants must then have that patent validated in each European country and in some instances, translated in to the local language. As such, each patent is subject to legal interpretation and determination for validity and infringement in each discrete country. In December 2012, 25 EU Member 16 Reed, C. (2010) Information Ownership in the Cloud. Queen Mary School of Law Legal Studies Research Paper No. 45/2010. 88 Impacts of Cloud Computing States (except Spain and Italy) agreed to participate to create unitary patent protection. In February 2012, 25 countries (except Poland and Spain) agreed to establish a Unitary Patent Court across the EU territory. As yet, these initiatives have not been ratified. It is noteworthy that the European Parliament rejected a common position relating to the patentability of computer-implemented inventions in 2005. A number of contractual issues regarding patents are pertinent to cloud computing. It is possible that cloud service provider either infringes or enables infringement of a patent through its service. As much of the technical workflow processes are hidden from clients in a cloud service, such infringement may be difficult for a patent holder to prove. While cloud service provider AUPs often include infringement of intellectual property as an unauthorised use, one might equally posit that the cloud service provider should warrant they do not infringe third party patents and indemnify their clients (and their customers) against any liabilities associated with such infringement. A trade secret means information that is the subject of efforts that are reasonable under the circumstances to maintain its secrecy. Cloud service provision often involves the subcontracting of multiple layers of IT infrastructure by both customers and services providers. Where the primary cloud service provider sub-contracts IT infrastructure to one or more sub-contracting third parties not privy to the initial agreement with the client, issues may be raised in relation to trade secrets and confidential information generally. In addition to civil (and indeed in some instances criminal) liabilities in the event of disclosure, distribution of confidential information relating to an alleged invention may constitute a form of public knowledge of prior art; such disclosure even to a small group of third parties, in the absence of affirmative steps to conceal, may invalidate a patent. Hon et al (2012) identify a number of IP areas where care should be taken by parties entering in to contracts relating to cloud service provision. Standard terms may not address IP ownership for applications developed by clients or end users on a cloud service provider’s IaaS or PaaS platform and using a cloud service provider’s integration tools. Similarly, where clients or end users suggest or actually implement improvements or bug fixes, it may not be clear where IP ownership lies. Hon et al (2012) also identifies the issue of license entitlement as potentially inadequately covered area. Clients may wish to clarify whether services that include application licenses are addressed in the contract and similarly cloud service providers may wish to clarify that clients are entitled to install, configure and use third party applications. Liability and Indemnities The IT industry has a long tradition of attempting to minimise the provider’s liability for any loss, direct, indirect or consequential, that may arise from the provision of the service. A number of common features of such contracts include exclusions of indirect and consequential losses, setting low liability caps and excluding all liability. In some instances, IT providers will not exclude key types of general liability e.g. personal injury, damage to physical property, IP infringement or unlawful acts. While relevant, the key concerns of organisations entering in to contracts for cloud services relate to losses associated with 89 European Technology Assessment Group (ETAG) misuse of data including personal data, service interruptions or failure, and data integrity or loss. As discussed in section 2, cloud service provider choosing a US state as the applicable law may do so to limit exposure for direct liability for damage cause to the client or their end users by the cloud service provider. Bradshaw et al (2010) noted that all US-based providers surveyed sought to deny liability for damage as far as possible whereas EU-based providers excluded such liability only for force majeure and similar instances. With regards to indirect liability such as indirect, consequential or economic breaches by the provider, disclaimers are more common across both sets of providers (Bradshaw et al, 2010). Bradshaw et al (2010) also identified that the majority of service providers sought to limit the extent of any damages that the service provider might be found liable and in many cases limit compensation to service credits. The majority of cloud service providers also seek indemnifications from clients against any claim against the provider arising from the client’s use of the service. Hon et al (2012) note that for negotiated contracts, those clients who were in a position to negotiate their contracts, sought (and in some cases succeeded) to avoid such clauses relating to liability and indemnification. Hon et al (2012) noted that a compromise was that cloud service providers could terminate or suspend the service with sufficient prior notice for clients to investigate and terminate the relevant account if necessary. Despite service provider attempts to disclaim liability, EU law typically does not allow service providers to contractually avoid liability in the same way the US legal system might. Under Article 23 of the Data Protection Directive addresses the issue of compensation for persons suffering damage as a result of an unlawful processing operation or of any act incompatible with the national provisions adopted pursuant to the Directive. Persons suffering such damage are entitled to compensation from the data controller unless the data controller can provide that they are no responsible for the event giving rise to the damage. Under the current Data Protection Directive, the data controller is responsible for the processing carried out by the data processor. The proposed revisions to the Data Protection Directive will apply obligations directly to the data processor and such obligations shall be governed by a contract that shall address technical or organisational measures, impact assessment, records relating to processing activities and notification of breaches. Article 26 of the proposed revisions also explicitly states that a data processor who processes personal data other than instructed by the data controller shall be considered as the data controller and become fully liable as if he had acted on his own behalf. With regard to failures to meet performance levels in cloud service agreements can result in significant losses for clients. UK case law has found that attempts to exclude defined losses consequential on failure may not insulate the service provider from wider liability for such losses. 17 17 GB Gas Holdings v Accenture [2009] EWHC 2966 (Comm) 90 Impacts of Cloud Computing Acceptable Use Requirements Acceptable use policies (AUPs) are a widely used deterrence mechanism used by cloud service providers to protect them in the event of misconduct by their clients or customers of clients. Typically, the AUP specifies uses of the service that are prohibited. Common prohibited activities listed in AUPs include use of the service for: x bulk unsolicited commercial email, fraud, gambling, hacking into other systems, hosting or distributing viruses; x hosting content that is obscene, defamatory or such as to promote discrimination or incite hatred; and, x any illegal or unauthorised activity including infringement of intellectual property of others. Bradshaw et al (2010) note that AUPs for cloud service providers are largely homogenous in the set of activities and behaviours prohibited. Many AUPs use language that may not be feasible for clients to meet. For example, some AUPs require the client to ‘ensure’, ‘use best efforts’ or ‘commercially reasonable efforts’ to ensure that end users comply with service providers AUPs and TOS’. Where clients, such as higher education institutions, have multiple customer constituents, some of whom are employees (e.g. administrative staff and faculty) and some are not (e.g. students), alternative language or process may be more appropriate e.g. that the client should inform customers or customers of clients should be required to accept AUPs and TOS before using the service. Where AUPs (and indeed TOS) require clients to affirmatively preventing ‘all’ ‘unauthorised’ or ‘inappropriate’ use as per the examples cited previously, again it is possibly more reasonable to expect clients to seek to prevent those ‘unauthorised’ or ‘inappropriate’ activities that are ‘material’ and of which the client is aware of. Unfair Terms and Distance Selling The EU Unfair Term Directive (Directive 93/13/EC) requires that contracts must be drafted in such a way to prevent the imposition of unfair terms that are likely to deprive consumer rights. The Unfair Contract Terms Directive introduces a notion of "good faith" in order to prevent significant imbalances in the rights and obligations of consumers on the one hand and sellers and suppliers on the other hand. Terms that are found unfair under the Directive are not binding for consumers. Article 5 of the Directive also requires contract terms to be drafted in plain and intelligible language and states that ambiguities will be interpreted in favour of consumers. It should be noted that while the Unfair Contract Term Directive focuses on consumers, national courts have also found contractual terms to be unfair for small businesses. Similarly the Distance Selling Directive mandates the provision of certain information to the consumer including the identity of the supplier, the supplier’s address, the main characteristics of the goods and services, and the price of the goods or services including taxes. Article 4(2) of the Directive specifically highlights the requirement for the supplier to 91 European Technology Assessment Group (ETAG) provide such information in a “…clear and comprehensible manner in any way appropriate to the means of distance communication used.” Service Levels and Performance The SLA details the level of service to be provided and typically includes mechanisms for auditing service delivery and compensating clients for underperformance. SLAs typically contain the following however certain elements may be addressed elsewhere in the TOS: x a list of services to be delivered including a definition of each service; x service performance targets which specify the standard of service to be provided under the agreement; x an auditing mechanism with respect to service delivery; and, x a compensatory mechanism for compensating clients in the event of underperformance. The service levels will vary by service, negotiation and often by price. Common exclusions in the calculation of service performance (and compensation) included downtime for scheduled maintenance and any factor outside the cloud service provider’s immediate control. SLAs are often provided by reference to the cloud service provider’s website and are subject to change this requiring monitoring by the client. While clients can monitor service performance, this is often not the case and thus they rely on the monitoring of the cloud service provider. Variation of Contract Terms Bradshaw et al (2010) found that many cloud service providers typically reserved the right to change certain or all contract terms unilaterally in their standard form contracts. This is unsurprising in commoditised services and particularly SaaS contracts. Such variation may be communicated by reference to an updated version on the cloud service provider’s website, particularly if in relation to a free service. In such an instance, continued use is considered tantamount to acceptance. Hon et al (2012) note that in negotiated contracts, clients may negotiate that cloud service providers cannot make changes to core aspects without notification and have included a break clause if changes were deemed materially detrimental to their service. Monitoring The cloud service provider may include provisions to monitor client cloud services and data although non-inclusion does not signal that they do not monitor. Some client service providers may monitor customer’s use in terms of nature and pattern of use for performance purposes. Others may declare that they monitor customer uploads and use both for performance purposes but also for enforcement of the AUP. 92 Impacts of Cloud Computing Backup As can be seen from the discussion elsewhere in this paper, cloud service providers may not warrant data integrity and may attempt to limit liability in the case of service failure including data loss or corruption. While cloud service providers may indeed back-up their systems and the their client’s data regularly, many will not warrant to do so particularly free services. In some instances, Bradshaw et al (2010) and Hon et al (2012) cite situations where cloud service providers emphasise that the client or both the client and the service provider are responsible for backups. Dispute Settlement Contracts for cloud service provision will typically include a provision for dispute settlement. As discussed in section 2, the jurisdiction for dispute settlement or arbitration will typically be the same as that selected under the choice of law provisions. Cloud service providers that include clauses imposing arbitration would seem to be in the minority in standard cloud service contracts (Bradshaw et al. 2010). Where such clauses are imposed, they may be region-specific, either targeting specific regions where disputes are judged to be more likely or seek to conduct the arbitration under rules of an arbitration association in the jurisdiction stated under the choice of law. It should be noted that in March 2013, the European Parliament voted to support new legislation on Alternative Dispute Resolution (ADR) and Online Dispute Resolution (ODR). The Directive is expected to give all EU consumers the chance to resolve their disputes without going to court, regardless of product or service type or place of purchase. In order to address the particular needs of online consumers, the Regulation on Consumer ODR will create an EU-monitored online platform which will allow disputes to be resolved online and within a set period of time. These new initiatives are particularly relevant to consumerfocussed cloud services. Termination Contractual issues on termination fall into a number of categories depending on whether the contract comes to a natural and expected conclusion or is terminated due to some breach of contract. The contractual documents will set out the term of the service and will typically make provision for termination events and the handling of the client’s data after the contract with the service provider ends. Key considerations include: x Setting the term of service and (non-) renewal of service x Defining termination events x Data preservation following termination x Data deletion following termination x Data transfer on termination The length of an initial term depends on cloud service with negotiated agreements typically having longer terms. Use of auto-renewal clauses are common and typically involve an 93 European Technology Assessment Group (ETAG) advance notification system. Some negotiated contracts may seek longer terms with guaranteed renewals for reasons including continuity of service and guaranteed pricing. In addition to expiry, cloud service contracts usually specify a number of termination events. Material breach including breach arising from the activities outlined in the AUP and non-payment are common. Other events of specific relevance to organisation contracting cloud services are insolvency, acquisition or compliance with regulator requests. Insolvency is a specific termination event that is typically addressed however the cloud service providers may not necessarily provide adequate detail on how client service continuity or treatment of data will be addressed. In the event of insolvency, clients should consider whether provisions for the return of data in the event of the winding up of the provider. It is unclear whether these provisions could be enforceable as against a receiver (McDonagh 2012). The acquisition of the cloud service provider or even change of control is typically not addressed. Some clients may seek to include such a term particularly where the acquirer or new shareholder is a competitor although this may reduce the attractiveness of the cloud service provider. Finally, in heavily regulated sectors, clients may require the option of termination where such termination is requested by a regulator, government agency or such similar third party. The treatment of data on termination is a key issue and is often cited as primary factor in vendor lock-in concerns. There are three main issues: x data / application preservation following termination – the client will want to ensure that they have a reasonable amount of time to gain access to their data / applications and transfer this data / application to a new service, if appropriate; x data transfer - the client may want support transferring their data or applications to a new service; and, x data deletion following termination – the client will want to ensure that their data or application has been deleted from the cloud service following termination. Bradshaw et al. (2010) note that cloud service providers deal with data preservation following termination in three ways namely, by provision of a grace period at the end of a service contract, immediate deletion at the end of service agreement or through a hybrid approach neither obligating to preserve data but not undertaking to delete data and offering a grace period at their discretion. For negotiated contracts, agreement on data preservation is essential. It should be noted that Bradshaw et al. (2010) also identified other approaches, primarily relating to free services, including Facebook’s preservation of deceased member accounts and Zoho’s reservation of rights to terminate ‘inactive’ accounts. The requirements under the Data Retention Directive, as discussed earlier, may also apply here. A commonly cited issue by clients of cloud computing services is support for data, and indeed application, transfer in the event of termination. Whilst many cloud service providers provide tools and processes for on-boarding clients, the transfer of data and applications on termination is a different matter altogether. Whilst Hon et al. (2012) note that in negotiated cloud service contracts, some cloud service providers will commit to 94 Impacts of Cloud Computing return users’ data in a standard format (and some routinely do so during the contract e.g. Salesforce.com), most providers do not provide assistance in transfer and if so require payment. Migration out of one cloud to another or elsewhere is stifled by a number of migration and interoperability issues and serves to exacerbate concerns regarding vendor lock-in. It should be noted that not all portability issues are initiated by the service provider. In some instances, clients require customisation that results in migration and portability issues. Clients typically wish to ensure that their data has been deleted following the termination of an agreement. This may include, but often is not explicitly stated, replicated data for the purpose of system performance (incl. caching) and metadata. 4.2.3. Discussion and conclusions The legal framework for the provision of cloud services is at an early stage of conceptualisation and current heavily favours the cloud service provider. It covers a wide remit of scenarios and is complicated by the multi-tenant nature, underlying chain of service provision (and the nexus of contracts that this represents) and the reliance on the Internet. The applicability of EU law is of concern to both consumers and businesses. Greater legal certainty is required for determining when a non-EU provider can be considered ‘established in the EU.’ The choice of law is critical. The stipulation of US law by many cloud service providers impacts cloud service contracts disproportionately impacting exclusions and limitations on liability, and indemnifications. While current plans for reform on data protection regulation will address many issues, awareness campaigns would help businesses understand the implications of choice of law on their rights. Similarly the location of data in storage, transit and processing has been identified as a concern by numerous studies and most recently the IDC study for the Commission. While some providers, notably Amazon.com and Microsoft, will provide assurance on storage and processing, this is far from the norm. x Support of proposals for the provision and funding of standardised technical approaches and tools to support the provision of greater transparency on the location of data within the cloud. The reservation of rights to vary the provisions of agreements introduces uncertainty. The use of updates via websites without notification exacerbates this uncertainty. x Support of proposals to stipulate minimum requirements regarding changes to the provisions of contracts, the notification of such changes and remedies for those clients for whom the changes are material. The use of Acceptable Use Policies requires greater scrutiny. The language used may not be feasible for clients to meet depending on where they are situated along the chain of service provision and particularly where the clients are at arms-length from end users. 95 European Technology Assessment Group (ETAG) x Encourage standardisation in this area and support proposals for model clauses and language for Acceptable Use Policies. There is uncertainty over IP ownership in a number of cloud computing instances. These include ownership of IP where applications are developed by clients or end users on a cloud provider’s IaaS or PaaS platform using the cloud service provider’s tools and ownership of improvements or bug fixes on cloud services. There is a degree of incompatibility between the current IP frameworks and cloud computing; the former is largely based on geographic location whereas the latter is not. Legislation needs to consider whether a more proactive role in addressing IP issues in and of the cloud is needed and also advisable. The extent of change introduced by cloud computing should not be underestimated and one might argue that cloud computing highlights the need for systemic revision of the IP system. While discussions are ongoing in relation to the Copyright Directive, cloud computing impacts a wider set of IP. x Consider a comprehensive review of IP law across the EU and support proposals for model clauses addressing the issues outlined. The Commission has identified that trustworthiness, or rather the lack thereof, is a major barrier to the adoption of cloud computing. Many of the contractual provisions considered standard in cloud services contracts lack transparency, which is recognised as a key element in the fair and legitimate processing of personal data. These include lack of transparency in relation to the security of data, performance levels and metrics, audit rights, use of metadata, the identity of data processors and subcontractors along the chain of service provision and indeed the location of data in storage, in transit and while being processed. x Support of optional proposals for measures that might be taken to provide greater transparency for businesses. These may include the development of technical tools for assurance and accountability, for use by various stakeholders including end users, regulators and the service providers. Many consumers and businesses make use of cloud computing services due to the perceived redundancy and resilience provided by the cloud. The uncertainty regarding backups is of concern and goes to the core of trust in cloud services. x Encourage stipulating minimum requirements for provisions relating to backups of cloud services, which introduce certainty. x Support of proposals for soft actions including awareness campaigns to address this issue. Many cloud service providers will not provide full disclosure on their security arrangements. Those providing enterprise cloud services relay on third party certification of their security and IT governance policies. Conventional information system assurance (and associated trustmarks) have been subject to criticism for being (i) largely reliant on human 96 Impacts of Cloud Computing intervention (with limited capacity), (ii) limited in scope, (iii) passive, periodical and retrospective, (iv) lacking transparency due to reliance on internal monitoring, (v) lacking warranties and (vi) subject to co-optation risk (Schouten 2012, Endeshaw 2012). x Support of proposals for the development of EU cloud-specific certification and the adoption by public sector organisations within the EU. Policymakers, academia and industry have called for research on trustmarks in the cloud computing context (Lynn et al. 2013, IAMCP 2011, Global Access Partners 2011, Robinson et al. 2010). Research suggests that trustmarks have the greatest effect on perceived trustworthiness in an Internet context (when compared to objective-source third-party ratings and advertising-derived implications), influencing respondents’ beliefs about security and privacy, general beliefs about firm trustworthiness, and willingness to provide personal information (Aiken/Boush 2006). Next generation trustmark systems address the failings in traditional assurance based systems and trustmarks by providing an active dynamic trustmark that could provide continuous machine-based evidence that cloud services meet the trustmark requirements consistently and repeatedly (Lynn et al. 2013). x Support for proposals for technical tools and funding for the development of an EU-wide trustmark for cloud computing. In addition to increasing transparency on service quality, this may serve to distinguish EU cloud computing services from those offered in third countries. There is uncertainty regarding the provision of access of data to law enforcement agencies. Existing legislation is not uniformly applied across the EU and was not drafted with cloud computing in mind e.g. the Data Retention Directive. There is considerable perceived legal uncertainty with regards to the disclosure of personal data to a third country. This would seem to be particularly the case with regards to the US and specifically the use of National Security Letters, which limits the ability of service providers to reveal that they have received a disclosure order. Uncertainty is further exacerbated by the complexity and lack of transparency in the chain of service provision in cloud computing. It may be difficult to determine which legal jurisdiction applies in any given circumstance. x Consider support of proposals that address issues relating to jurisdictional uncertainty. This may include supporting initiatives to stipulate compliance with EU law where the client (and the end users) are based in the EU, minimum requirements regarding the disclosures to a third country and obligatory use of MLATs. In addition, the Parliament may wish to consider supporting awareness campaigns to address uncertainty in relation to US measures. Finally, it should be stated that the Cloud Computing landscape is complex, fragmented and at an early stage of conceptualisation. Therefore, policy intervention in the contractual relationship between parties and particularly organisations is limited and needs to be taken with care. 97 European Technology Assessment Group (ETAG) 4.3. Issues in market competitiveness The competitiveness of markets is a crucial point for the further development of Cloud Computing in Europe. In a first line it is crucial for users, who would benefit from competitive markets in terms of price and variety of offers, but also for service or product providers who would benefit from a broad set of applications. But as shown in the previous sections the situation of the market today is ambiguous. On the one hand there are many small and medium sized companies offering services based on Cloud technologies. On the other hand there is a handful of global players, mostly of US origin, which already gained important share of the market. Based on the fact that that Cloud is like other markets for software and IT services a two-sided market shaped by network effects, this situation bears some risks for the competitiveness of the market. Because in such markets there is due to the networks effects the tendency that only a few players will establish strong platforms, which create their own closed ecosystems consisting of a strong user base on the one side and a broad numbers of other service providers offering further solutions and applications for the platform (Veugelers et al. 2012, 18-19). Though such a system can have advantages for both sides, the problem is that the platform owner can misuse its power. That in particular in the IT sector such a tendency exist is shown by the historical cases of IBM in the 1970s, Microsoft in the 1990s or the current discussion on the dominance of Google in the search engine and advertising market. The first direct issue is that a platform owner could create barriers, technical and legal, that makes it hard to migrate easily to offers of other providers. This problem of vendor lock-in will be dealt in the first part of the section. While parts of legal problems were already addressed in the previous section (see 4.2), we will here based on this results supplement it with the related technical issues of standardisation and interoperability. Beside the direct customer impact the vendor lock-in would also impact other competitors by creating additional market entry barriers. From an overall point of view this situation could also implicates some issues. A first point is that that such a situation of few dominating platform owners could lead to the fact that positive economic and societal impacts could diminish or even turned into the opposite. From a European perspective this is especially critical since many of the big players at the moment are not of European origin. One way to answer this would be the creation of regulatory framework mitigating the risk of such a behaviour. As shown in the previous sections some steps towards this situation are already undertaken, for example the question of data portability (see 3.4 and 4.2). However another way is to create a vivid and competitive market environment as well as the creation and support of a competitive landscape of European providers. However, since the raise of the software and IT industry, there is the challenge that the European IT industry is underrepresented. Though Europe is the second biggest market for IT worldwide, the number of European companies among the biggest one hundred is low, depending on the definition and scope between a few to a maximum around 15 (Aumasson et al. 2010, 208-210). Over the last decades many initiatives were started on national or the European level to change this situation, but none of them changed the situation significantly. In particular since first internet boom around 2000 the question, why in particular no new fast-grown players like Google, Amazon etc., which used the potential of disruptive innovations in the industry, emerged in Europe, was placed in the focus of the 98 Impacts of Cloud Computing discussion (Veugelers 2009, Aumasson et al. 2010, Veugelers et al. 2012). There are two reasons to focus on the lack of fast-growing companies in the second part of this section. On the one hand Cloud is still an emerging segment with a potential for disruptive innovations in technology and business, so that especially here is chance left to improve the competitiveness. On the other hand the topic refers as recent analysis has shown (Veugelers et al. 2012) many of the most often named challenges in the past. The following section will deal with a topic which is also strongly related to these issues, namely the fragmentation of markets in Europe. But given the fact that it encompasses also other issues and that it has also an importance for the creation of competitive market, we will deal with in the third part. Finally there are two issues that were mentioned already in previous sections, the provisioning of infrastructure and the creation of human capital. At a first glance both are not directly competitiveness issues, but in longer perspective these two factors will have a strong impact on the competitiveness. Skilled and trained employees are fundamental for both, provider of cloud solutions as well as their users. Especially the ability of users to exploit the potentials of Cloud and related other emerging technologies like Big Data will enable to realise the positive societal and economic benefits of it. Consequently the availability of human capital is strongly impacting the competitiveness, especially since there is already a discussion on the lack of skilled workforce. Similar to that the availability of network infrastructure, mobile as well as flat wired connections, will impact in the long run the competitiveness of the market. The reason is that Cloud Computing will enable more and more digital business, which will lead to a strong increase in the demand of network. There it is necessary to develop these infrastructures further in order to realise the benefits. The resulting challenges in both areas, human capital as well as infrastructure provision will be addressed in the two last parts of section. It will conclude with a discussion including the description of possible policy options. 4.3.1. Standards. interoperability, and vendor lock-in The issue of standards, interoperability and vendor lock-in exist since the early days of the computer business. Nevertheless many studies in the recent years underline that this complex of topics is still of high relevance and may even gain more importance due to Cloud Computing (f.e. Aumasson et al. 2010, 191-198, Ecorys 2010, ESA 2009). The reason is that one way to exploit the full potential of Cloud is either to change providers according to needs and priorities like price and service offers or to combine different solutions to get the best combination of different applications. To do so it would require that standards and interoperability is given by all providers, but as shown this is often not the case. Moreover some providers try to control their own proprietary software world by restrictive IPR use or non-disclosure of specifications. This might have negative consequences for users, who experience a vendor lock-in, as well as for other providers, who are not able to offer interoperability of their own solutions. Vendor Lock-in refers to a situation in which a customer is dependent on a vendor for products and services such that he or she cannot switch to another provider without suffering substantial costs and thus are locked in to continuing the relationship with that vendor (Zhu/Zhou 2011). Software vendors can lock-in customers by designing software 99 European Technology Assessment Group (ETAG) incompatible with those of other vendors, using closed architectures or proprietary standards that lack interoperability with other software vendors, and by licensing the software under exclusive conditions (Kucharik 2003). Lock-in may be a deliberate strategy of the software vendor as it reduces the bargaining power of the customer by increasing switching costs thus providing the software vendor with a possible competitive advantage. Similarly, customer-driven customisation may result in lock-in as the customisation impacts interoperability. It is clear from our review of literature in this area and the legal landscape that a number of factors contribute to vendor lock-in in the cloud computing context and specifically in the case of data and application transfer on termination. Here the client may be at a disadvantage as a result of contractual terms - the threat of immediate deletion, short grace periods or lack of migration assistance – or for technical reasons. The former has been discussed earlier in section 3.14. A number of technical factors may contribute to exacerbating the impact of these contractual provisions including data lock-in and application lock-in. Data lock-in can arise where cloud service providers do not provide export tools or support the export of data in a non-proprietary format. While many SaaS providers provide tools for common data formats, this is typically not the case with PaaS providers where the onus is more likely to be on the customer to develop and create appropriate export routines. Application lock-in typically occurs where an application has been designed for or customised for a specific customer. In PaaS environments, the runtime environment may be customised to meet the service provider requirements. The customer software developers may customise their applications to address these customisations. In IaaS environments, lock-in complexity is exacerbated. IaaS providers using hypervisor-based virtual machines often bundle the software and VM metadata together for portability within the IaaS provider’s cloud. Furthermore, depending on the IaaS offering, the data stores may vary widely. Application-level dependence on specific policy features would further limit migration. These factors, combined with discrete data portability issues, can result in increased complexity for migration to other IaaS providers. Vendor lock-in introduces higher costs associated with software and data migration and in some instances end user training. While using a full-service provider reduces the risk associated with the chain of service provision, often inherent in the cloud service provision, it also may have the effect of compounding lock-in and increasing switching costs. Open standards for data (including metadata) portability, data stores (including policies), applications and API calls would reduce the impact of lock-in. However, cloud service providers may not have sufficient incentives to support such open standards and in fact, may have as already indicated incentives to do the opposite. Changing this situation is quite difficult. The point is that standardization processes from a European perspective are difficult, because normally international and national standardisation bodies are often far behind the dynamic development within the IT industry. As a consequence a few global players, mostly of US origin, are able to introduce their own de facto standards. For European companies the only choice left is to follow these developments, but which is particular very difficult in the early stage of a development because the choice is exacerbated by multiple proposals for standards. Additionally many 100 Impacts of Cloud Computing institutions that deal with standardisation beside the official national bodies like the different IEEE WG are also dominated by American companies. Only a few Europeans are able to participate in these bodies, which led to a difficult development. On the one hand the influence of the few Europeans is limited. On the other hand they also pursue different, contradictory strategies, i.e. either promoting market and proprietary standards or open standards. Overall this creates a situation where standards for data or software migration are hard to achieve. Similar to the situation regarding standards the situation for interoperability, i.e. the ability to communicate and interact with other systems is also problematic. This topic is in particular an important issue for Cloud providers, because to offer their specific solutions it is required that it can be used in cooperation with different other solutions. An example for this problem would be an industry-specific extension for an enterprise application. Given the fact that this market is dominated by a few players, which only offer limited insight, the company would need to develop several specific programming interfaces (if even possible), which would either increase their costs by doing so or limit their potential by focusing maybe on one platform owner. Overall this is limitation of competition and hinders the creation of new products and services based on such solutions (Nessi 2008, ESA 2009). 4.3.2. Market fragmentation The fragmentation of the European market is in general an issue for both, users as well as providers of Cloud Computing. Nevertheless, in the past the discussion on the fragmentation with respect to IT often focussed on the disadvantages resulting from it for the competitiveness of the European providers (Aumasson et al. 2010, 218-226, Mowery 1996, Steinmueller 2004). Despite of that it is also an issue for users, business user as well as consumer, because it also relate to issues like the fragmentation of the regulatory framework. During the time many problems were discussed including socio-cultural aspects such as language barriers or mentality. However since parts of this broad spectrum are already addressed for example by the discussion of the draft regulation on data protection, we focus here on challenges of cross-border operations between the different member states beyond that. It includes in particular cross-border payments and transactions as well the harmonization of the regulatory framework. The problems within cross-border transactions and payments comprise a range of issues. Many of them were already addressed by the Commerce directive (Directive 2000/31). Though some points are already addressed and other like the single payment area (SEPA) are on their way, there are two issues left. Firstly there are a few challenges that are specifically posed by Cloud Computing. Secondly there are other points where due to different implementations by the member states, problems can occur. A good example for the first is the case of the VAT regulations in case of European provider and European customer situated in different countries, while the data processing and delivery may take place in further countries. In such cases the different regulations and the complexity of the system can lead to difficulties, in particular for small or medium sized companies with low experiences and formal structure, i.e. legal department. Some argue that this seems to be no problem for US companies entering the European markets, which is at least partly true. However as long as they only operate from the US, which most small firms do, the sales 101 European Technology Assessment Group (ETAG) taxes, the counterpart to VAT, are raised and cannot be reclaimed. In case of other US firms that also open operations in Europe like Amazon or Google, it must be stated that they often mange to achieve a certain size before they do that. This includes also legal and tax departments, which are as shown by recent discussions, very firm with the specific characteristics of the European tax system and its loop holes. Overall it shows that there are things left that need to be clarified, though the Commission decided against an update of the directive (EC COM 200/942). It might be sensefull to review this and address in a further process specific points with relevance for Cloud Computing.The letter point relates to further harmonisation of the regulatory background. A first step regarding this is the planned regulation on data protection, which will create a harmonisation within the member states. Other parts relate to the consumer protection and consumer rights, where the new directive was recently adopted (Directive 2011/83/EU). Here strong collaboration and further harmonisation in the implementation process of the member states would help to increase legal certainty for both, users as well as providers. Finally there are further activities planned that would support the further harmonisation such as the Common European Sales Law (COM 2011/635/EC). Also here the particular needs of a single market for digital services need to be addressed. Beyond this it should maybe also noted in this context that cultural diversity in terms of languages or mentality should be not only considered as problem for several reasons. Though the US may have a common language the culture varies strongly between the northern and southern parts as well as the western and eastern parts. Moreover diversity can also create innovation as shown by the example of Skype, which was invented to circumvent the diversity of the European telecommunication system. Overall it shows that diversity is also a chance, if it is perceived in the right way. 4.3.3. Lack of fast-growing companies The lack of innovative, fast-growing enterprises refers to “overaging” of European companies even in high tech sectors, i.e. the fact that the majority of European companies are in average older than in the US. This is considered to be another reason for the lagging behind of Europe in the productivity growth (Phillipon/Veron 2009).Similar to the market fragmentation it addresses a broad set of issues, but in opposite to it they mainly deal with challenges and issues for providers, less for customers. Nevertheless, both are strongly intertwined. However, the set of issues and challenges addressed in th is discussion includes the lack of entrepreneurial activities in Europe, the role of the state in supporting companies, in particular by public R&D spending and procurement, as well as the lack of capital for financing growth and innovation, especially the lack of venture capital. Additionally the discussion is also often enlarged by a general discussion on the entrepreneurial culture, which summarise these aspects, but also includes other points like the regulatory framework and the resulting market fragmentation as a barrier. Regarding the lack of entrepreneurial activities the many analysis show that the level in Europe is not as high as in the US or other world regions (Aumasson et al. 184-185). Detailed analyses even show that the differences between the member states vary strongly (Eurobarometer 2010), which cannot easily be explained. But as other research shows the number varies lso strongly in time, depending on the development of the overall economy 102 Impacts of Cloud Computing and other factors. Finally there is also the argument that the difference is not big enough to explain the overall lack and may not address the right problems with regard to the share of fast growing companies (Veugelers/Cincera 2010). Beside market fragmentation they identify further reasons like the missing link between the actors in the European innovation system, in particular science and business, the lacking role of the state as intermediary between actors, the lack of competition between young and old companies as well as the lack of financial capital (Veugelers et al. 2012, 9-12). These are considered as main reasons why promising companies either fail to grow beyond a certain size, that they fail or that they are taken over either older European or US companies. A first point that is often discussed with regard to the missing link of actors is the low level of R&D spending, in particular the business R&D spending, where Europe significantly lags behind the US. In particular the software and IT service as well as the internet sector, which are fundamental for Cloud Computing, are affected by it (Turlea et al. 2010, 75; Turlea et al. 2011, 55). The other point discussed is the role the state as an intermediary between the actors. This discussion refers in particular to its ability as one of the main procures in the field, becaus the state, governments and public bodies, are responsible for round about 20% of the market volume in IT services and software within the EU member states (Aumasson et al. 2010, 231-240). This resulting market power could be used to reinforce technological and economic developments desired. This is clearly done in the US, where the Cloud first policy implemented by the current government sets a clear sign for Cloud Computing. Overall there are two measures, normal procurement and precommercial procurement, which could be used in this context. In particular pre-commercial procurement is seen as a possibility to create a link between science and business. Moreover some describe it also as mean to bridge what is identified as the “valley of death” between innovation and market success for innovative companies (Wessner 2008). In many cases the literature refers here to the SBIR program in the US, where the state as procurer offers small companies the chance to develop innovative solutions desired by public agencies. Beside the the financial R&D support the program is also directed at helping the companies to find further funding in a later stage by a close integration of venture capital companies (Wessner 2008). Though this is a very successful example, the question if and how such pre-commercial procurement could be used in Europe is still point of discussions (Edler 2011, OECD 2011). Normal procurement processes are more likely to be used for other other purposes. As already indicated with the example of the Cloud first principle it can be especially used to reinforce technological and economic developments desired. This plays in particular in the field of standardisation and interoperability, as mentioned in the related section before. In Europe this possibility is recognized and for example the recently launched European Cloud Platform which is aimed at a joint procurement of Cloud Computing solutions in the public Sector (COM 2012/529/EC), addresses this topic. Additionally there are also activities with regard to the promotion of pre-commercial procurement. A first step was the adoption of a communication (COM 2007/799/EC) in 2007, which recommend the implementation of such mechanism in the EU member states. But since the use of it is still low and many legal aspects were mentioned two new proposals (COM 2011/896/EC and COM 2011/895/EC) where launched, which are aimed at replacing the existing public procurement directives in order to ease the implementation of pre-commercial procurement schemes within the member states. Both 103 European Technology Assessment Group (ETAG) are still under negotiations. Moreover also further activities are announced with respect to the coming Horizon 2020 program. Already in the currently closing 7th framework program some initiatives such as the introduction of public-private partnerships were started, which are aimed to raise the company level R&D spending. The second one is the lack of financial capital, which refers the founding and growth of companies. In most cases it refers to at least two points: Firstly the restrictions to receive external financing from banks or other sources, and secondly to the lack of venture capital. While the first one is at the moment even more problematic, the latter one exists as topic in the European innovation policy for a long time. Analysis show that the level of VC spending in Europe is in total as well as per employee in the lower in the IT sector than in the US (Schleife et al. 2012, 32-33). Moreover there are analyses arguing that European VC was often invested in wrong directions (Weber et al. 2011), only focus on later stage investments as well as the argument that Europe lacks of promising investments (Fransman 2011). Most recently Veugelers et al. (2012, 25-35) showed empirical evidences that the lack of particular venture capital impacts the performance of the ICT sector in Europe. However, based on earlier studies it also addresses the point that not only companies in the early stage suffer from it, but also in particular that fast growing companies also faces problems to finance their growth Cincera/Veugelers 2010). Given the importance and attention, which is paid to the topic, it is not surprising that there are already several efforts to boost the European market for venture capital in the making. Recently the Commission addressed the problem in three communications (Small Business Act (COM (2008/349/EC), Innovation Union (COM 2010/546/EC), Single Market (COM 2010/648/EC) announcing activities towards a single European venture capital market, increase the access to finance for innovators or the continuation of the risk-sharing financial facilities. Parts like the RSFF (risk sharing financial facilities) are already implemented or on their way as the proposal for new regulatory regime for venture capital shows, but mostly only in early stages. However, since the topic exist for a long time and also many initiatives were undertook before, but the situation did not really improve, one could raise the question if there are factors influencing this. Some research indicate that beside legislative and financial support, further aspects like the entrepreneurial culture including a venture capital and business angel culture also play an important role (Fransmann 2011). With regard to this the example of Israel might show that more is needed to establish such a culture. This process began back in the late 1960s and 1970s, when Israel started a programme for high-tech industries, especially in the defence sector. Subsequently, policies were implemented which targeted a larger human capital base, improved scientific quality and strengthened science-industry relations. While at this time it was focused on defense related activities, the focus shifted to other industries after the economic crisis of the 1980s. The activities were then steered by the newly founded Office of the Chief Scientist (OCS), which aimed at supporting high-tech companies throughout the whole life cycle. This office launched several programmes of which the YOZMA programme, which was aimed at creating a venture capital market, turned out to be a huge success. But also other programs aimed for example at pre-commercial procurement and increasing scienceindustry relations, were successful (Breznitz 2006; Breznitz 2007). This shows that the 104 Impacts of Cloud Computing problem can be only addressed by a holistic approach taking into account the whole life cycle of a company as well as the whole value chain of the industry and innovation system. 4.3.4. Broadband coverage As already outlined in section 2.2 and 2.4 availability is a crucial precondition for the success of Cloud Computing. One major aspect of availability is the existence of enough bandwidth capacity. Since the broadband penetration is one major pillar of activities of the EU and its member states in the recent years, it is not surprising that Europe overall has made some progress in the overall penetration with fixed and mobile broadband. However a closer look reveals some critical details. First of all the penetration varies strongly between the different member states in Europe as well as in the member states itself. In particular rural areas clearly less well connected than cities (EC 2013, 46). This creates an imbalance in leveraging the benefits of Cloud between the different regions in Europe. Maybe even more critical is another. Though the number of so called Next generation Access, which are capable of 30 Mbps and more raised in the last years up to 20,3% of all fixed line access, the share of FTTB/H (Fiber to the building/home) only amounts for 25,8% within the NGA lines, i.e. only 5,1% of all. In that regard Europe lags behind other world regions (Japan 42%, South Korea 58%, US 9%). The critical issue here is that other NGA technologies like vDSL or Docsis 3.0 only have limited perspective in further grow of bandwidth behind 100 Mbps, but in the long run the vision of broad adoption and heavy utilization of Cloud Computing as needed to realise the positive benefits pose the questions if the current bandwidth development will be sufficient for these future requirements. Though the coverage in high speed mobile access is little better with 26,2% coverage of LTE in Europe (EC 2013, 72), the question remains if it will be sufficient for future requirements. Overall there is no clear answer to that in the current literature in terms of clear forecasts, which bandwidth for fixed and mobile networks is needed, but there is the tendency to state that the current bandwidth is not sufficient for a heavy and foremost data-intensive utilisation of Cloud Computing as foreseen in many use cases like Big Data applications. Therefore the question is raised how to continue with the further broadband deployment. In particular the further deployment of FTTB/H technologies would require a high amount of further investments, which might be the reason why some telecommunication providers try to exploit the existing infrastructures such as DSL as much as possible. But if they are forced to proceed this shift towards new technologies, it might be that questions arises how to finance this. One solution could be either to increase prices for customers or they could try to claim usage fees from provider of services using the infrastructure. Both is from an overall view not desirable. The first way would maybe lead into digital divide within the society and presumably thereby led into a lower utilisation of Cloud Computing. The consequences of the latter approach are discussed quite controversial within the debate on net neutrality (EFI 2011, Heng 2011). Though in particular the effects on emerging and innovate service offers are one major point of this controversial, which could not be totally solved until now, the effects of such approach could also negative effects on the competitiveness of the market and thereby on the overall potentials and impacts of Cloud Computing. Nevertheless, there is also the legitimate question how the telecommunication 105 European Technology Assessment Group (ETAG) providers should finance the further development. All these points need to be addressed in the future planning for broadband infrastructure in Europe. 4.3.5. Lack of skilled workforce Similar to the case of network infrastructure the development of the human capital base is a factor, which is in a mid and long term perspective a necessary framework condition that influences strongly the competitiveness of Europe in Cloud Computing. As shown in previous sections (see 2.6) a sufficient level of skilled workforce is essential to realize the positive impacts of it, because only a continuously skilled workforce will ensure that the IT industry itself is capable to develop new solutions in the emerging field of Cloud Computing and related areas like Big Data, which could work as one driver for the utilization of it. Moreover these new solutions do not only require skilled developers, they also require skilled and literate IT users, which is able to fully exploit the potentials offered (Aumasson et al. 2010, 263-272). Due to the fact that the shortage of literate professionals, IT developers as well as skilled users, is not only a recurring claim of the different industry associations, but also well researched by many studies on the member state or EU level (Korte et al. 2009), there is not a need for more awareness regarding the general problem. Moreover many initiatives are already aimed at addressing the problems. This includes the e-skills program of DG Enterprise, which exists since the mid 2000, addressing the increase of skilled IT labour force. Above that the pillar six of the Digital Agenda is also dedicated to fight computer illiteracy and labour shortage, including increasing the share of women in IT labour force and consumer education. Though this is already a broad spectrum, there is a need for a further increase of workforce, which may require new approaches how to enlarge the the skilled workforce in alternative ways. Consequently there is need to evaluate how other countries and regions deal with this problem. Another point is that the Digital Agenda addresses the need to include more women, but there might be also other groups that could be better included. Examples are the growing number of elderly people, which are often considered as “too old” (digital emigrants), or young students, that stopped formal IT education at a university or similar institution. While the potential of first could be for example addressed by increased measures for lifelong learning especially in IT, the latter one could be addressed by special programs that offer the chance to receive another formal degree of education related to IT. Finally there is also still a group of less formal educated, young people, which may have an affinity to IT that could be addressed. Another final point is that there is lack of knowledge how the requirements for skills will change in the next years. It refers to two points. The first is the change of requirements caused by Cloud Computing and other technologies such as Big Data. A first approach was done by a study commissioned by the European Commission in 2011, which clearly underlines the changing requirements due to Cloud Computing and the resulting need for more support in the creation of such skills, in particular for SME using Cloud Computing (Laugesen et al. 2011). Though this is partly reflected in the current IT literacy programs like e-skills program, there is a need for further research due to the fast moving character of Cloud Computing. The second point is the possible change of skills requirements caused by a growing number of young people that are familiar with all kinds of digital technologies. 106 Impacts of Cloud Computing This may also impact skills requirement in future, in particular for example regarding data protection or similar challenges related to Cloud. 4.3.6. Discussion and conclusions Concluding we can state that the market competitiveness for Cloud Computing in Europe shows some significant issues that need to be addressed. But as also outlined we focused on the most important one’s from our perspective, but there are others, which are partly interrelated to the issues discussed here. In the following we will shortly summarize and discuss the results of the analysis and present options how the identified challenges could be addressed. The issues analysed can be differentiated according to their way of impacting the competitiveness. It is obvious that vendor lock-in, standards and interoperability have clear direct impact on the competitiveness for both, users as well as suppliers. In case of the fragmented market have a direct impact, but as outlined in the analysis it also touches points that have a more indirect impact on the market. Nevertheless, all points also are relevant for users/customers as well as provider. In this perspective the lack of fastgrowing companies, which similar to market fragmentation refers to broader set of challenges like the level of R&D or procurement policies, is mostly related to the providers and their competitiveness, in particular European providers. The impact for users/customers is clearly indirect, because the increased competitiveness could lead to better offers, but it is not necessarily the case. Finally the infrastructure and human capital only have an indirect impact and can be considered as foundations for the overall competitiveness in the digital world. But as shown by the analysis there are clear links underlining their particular importance for the further uptake and thereby competitiveness in Cloud Computing for Europe. In case of vendor lock-in, standards and interoperability the reduction of choice for customers and the resulting decrease of competition among providers are obvious negative impacts. Though concentration processes are not fully avoidable, especially in markets shaped by network effects and also reduces for example search costs, it is necessary to limit the possible negative aspects by addressing the related issues. One possibility is the contractual question of data portability and the time the provider needs to keep the data (retention) if a customer wants to change. Though it is addressed for personal data within the draft regulation (see 3.4), but there is need also for other business data. Another way to do so is to support standardisation and interoperability. In particular the problem of the low speed of official standardisation in ICT was also addressed with the new regulation on standardisation adopted in 2012 (Regulation 2012/1052/EC). However the implementation in particular in the area of ICT will require further efforts, in particular the inclusion of the industry driven bodies. Further important steps are the introduction of an European Interoperability Framework and Strategy (COM 2010/744/EC). But this also needs to be implemented. From that point of view the following policy options can be considered: x Support of proposals to stipulate minimum requirements regarding data portability and retention periods to support migration. 107 European Technology Assessment Group (ETAG) x Support of proposals for soft actions including awareness campaigns, technical support tools and funding thereof. x Support for the implementation of the EIIF by implementation in public procurement processes x Support of participation of European member, in particular from SME, in industry driven standard bodies Market fragmentation includes many aspects ranging from the regulatory framework to socio-cultural aspects. As outlined are some already addressed in other sections of this report, while others like cultural diversity, beside the fact that is unclear how to address them directly, maybe should be not only considered as problem, but also a chance for Europe. Nevertheless there are a still many points left where the analysis showed the need and possibilities of actions. Among others there are many things like for example the VAT system, payment systems or others that still can form a barrier for cross-border activities. Though there are addressed by the eCommerce directive and the Commission decided after a review not to update, there a still issues left as indicated by the Commission (COM 2011/942/EC). Other areas that need to be addressed are the harmonisation of the regulatory framework. This is partly ongoing via the planned draft regulation on data protection. Above that the recently adopted consumer rights directive should help to harmonize this area, though it will require efforts to implement it in the Memeber states. Finally further aspects are the support of further ongoing activities aimed at the creation of a real single market such as the Common Sales Law is necessary. The resulting policy options are: x Address the issue of Cloud specific aspects within the eCommerce directive. x Support the harmonization of data protection rules through the establishment of a common regulation. x Support of the implementation of the consumer rights directive. x Explore and support further options to create a single market for digital services, e.g. the Common European Sales Law. Similar to the market fragmentation the lack of fast-growing enterprises refers to a broad set of issues, but in opposite to it they mainly deal with challenges and issues for providers, less for customers. Nevertheless, both are strongly intertwined. The spectrum in that case reaches from the lack of entrepreneurial activities in Europe, the role of the state, i.e. public R&D spending and procurement and aspects like the lack of capital for financing growth and innovation. Overall this is seen often as lack of entrepreneurial culture, which then often includes aspects like the regulatory framework, which are here covered in the section of market fragmentation. Regarding the lack of entrepreneurial activities the analysis has shown that the level might be lower as in other world regions, but that overall the difference is not as significant as sometimes described. However there are considerable differences between the member states, which cannot easily be explained. But as further shown it might be not only a problem of founding new enterprises and or the innovation of new products and services. However, there are some enterprises that may have the potential, but that they do not grow big enough for different reasons. The result is that the majority of European companies are in average older than in the US. Reasons are that the 108 Impacts of Cloud Computing promising companies either fail to grow beyond a certain size, that they fail or that they are taken over either older European or US companies. Market fragmentation is, as outlined before, seen as one reason, but there might be also other points. But also the lack of a sufficient capital for growth is also considered to be another reason for this development, because many of these companies are either not able to finance the so called “valley of death” between innovation and market success or they are not able to finance the continuous fast growth. This refers to two points. The first one is the role of state, which can use public R&D funding, which is particular in the software and internet sector very low, as one mean to bridge this gap. But in recent discussions the role of the state as procurer, i.e. in form of innovative procurement as well as normal procurement, has gained more significance (Veugelers et al. 2012). The second one is the lack of venture capital in Europe, which is similar to the market fragmentation one of the most often mentioned problems. In the case of the procurement the Commission launched several initiatives, but there is still a great variety in Europe left. In the latter case there were many new initiatives in the recent years, including the RSFF as well as regulatory measures to improve the European VC markets, but the effect until now is not obvious. It might be that beside legislative and financial support, further aspects like the entrepreneurial culture including a venture capital and business angel culture also play an important role (Fransmann 2011). Examples are other countries like Israel, which showed that in particular that a strategic use of measures was a key success factor. Based on that possible policy options are x Support the further integration of single European venture capital market. x Explore possibilities to support young companies to grow rapidly beyond national borders. x Support soft measures to increase entrepreneurial activities, including such measures as promotion of “second chance”. x Support soft measures to stimulate the growth of a European culture for entrepreneurship. x Address the issue of a coherent policy framework combining measures in support of the Cloud and other digital industries (strategic industrial policy). x Address the issues of a missing link between public R&D funding and public procurement, in particular innovative procurement on the EU and member state level. In case of the infrastructure provision the analysis has clearly shown that though there are many progresses made regarding the broadband coverage and penetration in the EU, there is still a need for more. The vision of a society utilizing Cloud Computing will raise future requirements regarding coverage and penetration that in mid and long term perspective cannot be solved with the development as it is shown today. Consequently, there is need to address the identified issues in different ways. The first issue is the problem of imbalanced development in Europe, where the differences between and within member states vary partly strongly. The second issue is the question how to develop the NGA technologies in a manner that it will fit to the needs arising from Cloud Computing and related or similar trends. Finally there is the challenge how to finance the costs of a further development of network infrastructures under a fair balance between the needs of the telecommunication 109 European Technology Assessment Group (ETAG) providers on the one side and user, end users as well as service providers, on thither side. Options addressing these points are: x Address the issue of imbalance in broadband coverage and penetration in between and within the member states, in particular the problem of rural areas. x Support the review of the current broadband strategy beyond 2020 against the background of the needs resulting from a growing utilization of Cloud Computing. x Support the review of best practice in other countries to establish an FTTB/H infrastructure. x explore the problem of financing future infrastructures ensuring a fair balance of interests for all stakeholders. Finally the case of human capital also underlines the need that achieving and maintaining a leading role in a mid and long term perspective requires adequate framework conditions. In particular for Cloud and related technologies like Big Data, which could work as one driver for the utilization of it, require more and more literate professionals. But as shown this requirement is limited to developers, it also exist on the side of users. This raises the risk that there will be an increasing race for qualified persons between the both sides, which in the long run may impact the overall competitiveness of the economy as a whole. Given the fact that there is already a lack of qualified personnel identified in Europe, there is strong need for further actions in future. Possible options are: x Support the integration of skills requirements of emerging segments like Cloud Computing or big Data within the existing literacy programs. x Address the need of further measures to increase the number of qualified persons. x Support the implementation of programs dealing with the inclusion of groups less represented in the IT workforce such as women, elderly people or young people with less formal education. 110 Impacts of Cloud Computing 5. CONCLUSIONS AND OUTLOOK 5.1. Conclusions Concluding it can be stated that the report shows the potentials of Cloud Computing for Europe. In particular regarding employment, creation of new businesses and economic growth there are indications that Cloud Computing and related developments like the trend towards mobile usage, consumerization or Big Data can create positive impacts for Europe. But like most developments in IT the story also has two sides. Because as shown in the further analysis there is the risk that these impacts cannot be realised or even worse turn into the other direction, if it is not possible to provide sufficient environment for the uptake of Cloud Computing. The quest for such an environment leads directly to analysis of barriers and issues, but already the discussion of the direct impacts on consumer as well as business on administrative users and the overall impacts on economy and society already indicate first issues, which can be derived from the different expected impacts and that need to be addressed. This includes general topics like the availability of broadband up to specific measures suited to address specific negative impacts like a loss of privacy by measures such as a right to deletion and others. Based on this initial analysis and taken into account the work of the previous deliverable as well as further research (literature review, interviews, workshops etc.) the analysis focussed in the following on a set of issues identified as main barriers. The first broad complex dealt with questions of security, privacy and data governance. The analysis of all specific fields shows clear issues that need to be addressed. Regarding the data security it shows a clear need for further research on the technical security for Cloud Computing as well as the need to improve certification of it. Furthermore the support of providers aligning to that could be an option. In opposite to that the question of the data protection regime is already addressed by a new draft regulation. It addresses main points, but due to the ongoing status final could not be made, but several options were identified dealing with important aspects of it. Also in the case of data retention data and third party access the uncertainties create a need for further actions, because otherwise the current concerns cannot be resolved. Similar to this is the enforcement of EU standards outside the EU another major issue, where the current measures are not suited to address the existing concerns. Consequently international harmonisations as well as a review of existing agreements are possible policy options. Beyond the e measures of the draft regulation many other contractual issues exist, mainly caused by the early stage of development of the contractual relationships and the resulting favourable conditions for provider. As shown by the analysis this refers to issues ranging from the choice of law or IP rights to service and quality issues or the termination of the contracts, which can be addressed by different policy options such as standardisation of contracts, certification process or trust marks. Related to that is the issue of the competitiveness of the markets. Here the analysis showed that legal aspects on data portability and contract termination as well as technical aspects like lack of standards and interoperability can create a vendor lock-in, which can be addressed by policy options such as awareness raising or supporting interoperability in public procurement. Another point to 111 European Technology Assessment Group (ETAG) improve the competitiveness is the market fragmentation, which could be addressed as shown by the analysis by a harmonization of regulations such as data protection, the review of the eCommerce directive and other measures directed towards the creation of single market for digital services. From the perspective of the competitiveness of the European Cloud provider one major issue is the lack of global player in Cloud, in particular fast-growing, innovative companies. As the analysis showed this has different, partly interrelated reasons, which can be addressed in several ways. Possible options are the connection of R&D funding and procurement, the support of entrepreneurial culture or coherent policy industry policy framework. Beside these more specific issues, the analysis also showed that with broadband coverage as well as the shortage of skilled workforce two more general framework conditions will in the long run impact the realisation of the potentials of Cloud Computing. In case of the broadband coverage the analysis showed the need to address the imbalance of regions, in particular in rural areas, as well as the exploration and adjustment to future requirements are main points. Regarding the lack of skilled workforce the needs of the IT industry as well as the user industries needs to be addressed by measures for the enhanced education and a further expansion of the workforce itself. Overall this leads to broad list of policy options, in total nearly 60, which can help to improve the current state of Cloud Computing in Europe. 5.2. List of policy options It is obvious that due to the strong interrelation of the identified issues some identified options emerge from more than one field. Consequently there is a need to consolidate the list of options. In course of this process we also reordered according to the approach of a functional analysis in the framework of a technological innovation system, which was introduced in the initial analysis of the previous deliverable. Though this also bears some challenges, the integrated approach allows a better understanding of problems and resulting options. Within the process we identified five clusters of issues split into the following functionalities: x provisioning of infrastructures, which addresses the availability of secure and reliable technical network infrastructures; x mobilizing resource, which addresses the need for human capital base, i.e. extension of total number as well as enhanced education of developer and user, as well as the need to improve the financial capital situation, i.e. the access to financial capital for innovation and growth; x legitimation and creation of markets, which addresses the need for acceptance of new technologies such as Cloud as well as the support for the creation of a working and competitive market for Cloud; x adapting the regulatory environment, which addresses the needs to adjust and harmonize the legal framework, in particular contractual issues and data protection regime, according to the challenges of Cloud Computing; x encourage entrepreneurship and competition, which addresses the support entrepreneurial culture and activities as well as a fair competition environment. 112 of Impacts of Cloud Computing 5.2.1. Provisioning of infrastructures Sufficient infrastructures This section comprises options based on the results of section 2 and 4.3 dealing with current and future needs arising from a growing utilisation of Cloud Computing. x Address the issue of imbalance in broadband coverage and penetration in-between and within the member states, in particular the problem of rural areas, e.g. through licensing “light”, unlicensed communications with higher reach, or mandatory coverage. x Support the review of the current broadband strategy beyond 2020 against the background of the needs resulting from a growing utilization of Cloud Computing. x Support the review of best practice in other countries to establish an FTTB/H infrastructure. x Explore the problem of financing future infrastructures ensuring a fair balance of interests for all stakeholders. Secure infrastructures Beside the question of sufficient infrastructures the need for technical secure infrastructures is another important aspect. Section 3, especially section 3.3, and parts of section 4 underline the importance of the topic for the acceptance of Cloud Computing. x Support measures to provide awareness of the problem of insider reading and of the technical approaches towards solutions, e.g. by producing communications or conducting workshops. x Support the development of secure servers, reliably protected against attacks. x Support research on technical measures against insider reading and their cost efficiency. x Consider taking steps towards incentives for use of those new approaches, provide recommendations or even request mandatory use, to trigger the emergence of products as well as to encourage their use once they will be available. x Support measures to achieve certification at a lower level, certifying, e.g. that a provider complies with European legislation, that processing takes place only in the EU, that a provider has a certain level of auditing, or that a provider takes responsibility for breaches. x Support steps to achieve that Cloud Computing providers which operate solely under European jurisdiction play an increasing role. 5.2.2. Mobilizing resources Developing human capital As outlined in the report the development of the human capital base is in the long term one essential framework condition to ensure that the positive impacts of Cloud Computing will realize for Europe. Given the already existing constraints, but also the current measures to address it, possible policy options should be directed into two dimensions: Firstly, increase the size of the workforce, and secondly, to improve the quality of education, i.e. adjusting it to the future needs. 113 European Technology Assessment Group (ETAG) x Address the need of further measures to increase the number of qualified persons, in particular by exploring best practices in other regions. x Support the implementation of programs dealing with the inclusion of groups less represented in the IT workforce such as women, elderly people or young people with less formal education. x Support the further integration of skills requirements of emerging segments like Cloud Computing or Big Data within the existing literacy programs. Improving financial capital situation The financial capital situation is an important brick stone for the creation and growth of companies. As shown by the analysis in section 4.3 there exist a lack of it in Europe, which is one factor hindering the emergence of European based global players. Therefore policy option that addresses these issues will help the increase the competiveness of the European IT industry, which is also addressed in a later part of this section. x Support the further integration of single European venture capital market. x Explore possibilities to support young companies to grow rapidly beyond national borders. 5.2.3. Adapting the regulatory environment Adjustment of the data protection regime As shown there is a strong need to adjust the current data protection regime in the EU to requirements of the Cloud Computing. This adjustment is already ongoing; in particular the draft regulation on data protection addresses many issues. Since it is still under negotiation, it is not easy to make a final assessment, but resulting from the current state we see the following options. x Support the current process of data protection law reform. x Support the choice of a Regulation as the proposed legal instrument replacing the Directive. x Support the strengthening of pre-existing individual rights in the proposed Regulation. x Support the integration of the range of new rights offering further control to the data subject over their personal data – for example the ‘right to be forgotten’ and the ‘right to data portability’. x Support the novel obligations on the data controller in adhering to data protection law – for example, ‘data protection by design and default’ and the fact based approach to the concept of the ‘co-controller’. x Support further clarifications of principles related to data protection and cloud computing x Support the accountability principle and be cautious with European level ‘command and control’ approaches. x Support less rigorous consultation and notification requirements. x Support the creation of European level consistency and interpretation mechanisms. x Support the creation of the European Data Protection Board. 114 Impacts of Cloud Computing x Support increased cooperation and consistency between European DPAs. x Support the fines mechanism proposed in the Regulation. x Simultaneously, support the discretionary power of National DPAs in the fining process. x Support proposals which allow justified international flows of data, whilst not risking the rights of citizens. x Reconsider approaches which have perhaps not achieved all they promised up to now – for example Safe Harbour. x Look into further possibilities to ensure the jurisdictional applicability of European data protection law, when European citizens or services are involved. x Look into methods of oversight and enforcement when European data protection law should apply, but data is being processed abroad. Creating a balanced framework for contractual relations The analysis of contractual issues showed that the current state in contractual relations between user and provider is unbalanced. Though some parts especially for consumers are addressed in the current draft regulation on data protection, there are other issues that in particular for small and medium businesses are of importance. As analysed by section 4.2 this results in the following policy options. x Support of proposals for the provision and funding of standardised technical approaches and tools to support the provision of greater transparency on the location of data within the cloud. x Support of proposals to stipulate minimum requirements regarding changes to the provisions of contracts, the notification of such changes and remedies for those clients for whom the changes are material. x Encourage standardisation in this area and support proposals for model clauses and language for Acceptable Use Policies. x Consider a comprehensive review of IP law across the EU and support proposals for model clauses addressing the issues outlined. x Support of optional proposals for measures that might be taken to provide greater transparency for businesses. These may include the development of technical tools for assurance and accountability, for use by various stakeholders including end users, regulators and the service providers. x Encourage stipulating minimum requirements for provisions relating to backups of cloud services, which introduce certainty. x Support of proposals for soft actions including awareness campaigns to address this issue. 5.2.4. Legitimation and creation of markets Creation of trust Trust is a major issue regarding the acceptance and adoption of Cloud Computing by all stakeholders. Therefore the lack of it can create an important barrier for the legitimation and thereby to the creation of a market for Cloud Computing in Europe. As shown throughout several sections including 2.6 and 4.2 there is a need to address issues in order 115 European Technology Assessment Group (ETAG) to increase the trust into Cloud Computing. Many of these identified actions have clear interrelations to the data protection and data governance. x Support of proposals for the development of EU cloud-specific certification and the adoption by public sector organisations within the EU. x Support for proposals for technical tools and funding for the development of an EU-wide trust mark for cloud computing. In addition to increasing transparency on service quality, this may serve to distinguish EU cloud computing services from those offered in third countries. x Make it mandatory to notify consumers when a law enforcement request has been made. x Review the Safe Harbour principle, negotiate conditions for government access, x Consider encouraging the use of provider certification which shows compliance with European regulations. x Organise a portal for addressing problems with Cloud Computing services. x Scrutinize viewpoints put forth in the debate to see whose interests they serve. x Be especially wary of exclusively trust-based solutions to cloud governance issues. x Look further into ways of promoting cloud architectures designed from the beginning to secure data security and privacy through design rather than trust or legislation. Foster the creation of a market for Cloud Computing Another major issue for the adoption of Cloud Computing and the realisation of its positive impacts in terms of cost savings or flexibility is the existing of working and moreover also competitive market. As outline in section 2.6 and 4.3 this is essential, but also difficult endeavour. The analysis showed that there is set of policy options, which can be divided into two areas. The first one deals with reduction of barriers for cross-border operations in Europe. The second set of options is aimed at ensuring and increasing the overall competition. Both should help to create a vivid and competitive market for Cloud Computing in Europe. x Address the issue of Cloud specific aspects within the eCommerce directive. x Support the harmonization of data protection rules through the establishment of a common regulation. x Support of the implementation of the consumer rights directive. x Explore and support further options to create a single market for digital services, e.g. the Common European Sales Law. x Address costs for network access, such as an abolishment of mobile data roaming fees. x Support of proposals to stipulate minimum requirements regarding data portability, e.g. by enforcing providers to provide interfaces and data formats, and retention periods to support migration. x Support of proposals for soft actions including awareness campaigns, technical support tools and funding thereof for data portability and vendor lock-in. x Support for the implementation of the EIIF by implementation in public procurement processes to increase the diffusion of interoperable solutions. 116 Impacts of Cloud Computing 5.2.5. Encouraging entrepreneurship and competitiveness Encouraging entrepreneurial activities Entrepreneurial activities are at the core of an industry. Therefore it is essential to encourage and support entrepreneurial activities, in particular ones aimed at innovative and disruptive developments. As outlined in sections 2.4, 2.6 and 4.3 the following options are possible to achieve this. x Support soft measures to increase entrepreneurial activities, including such measures as promotion of “second chance”. x Support soft measures to stimulate the growth of a European culture for entrepreneurship. x Encourage the emergence of European providers with high quality services. Support the competitiveness of European Cloud industry While addressing the entrepreneurial activities is a first step to achieve a lively European provider landscape, the other crucial part is the further support of it in order to gain a greater share of the market. As outlined in several sections the state can support this effort by taking an active role. Policy options for that are presented in the following. x Address the issue of a coherent policy framework combining measures in support of the Cloud and other digital industries (strategic industrial policy). x Support of participation of European member, in particular from SME, in industry driven standard bodies. x Address the issues of a missing link between public R&D funding and public procurement, in particular innovative procurement on the EU and member state level. x Encourage the use of provider certification which shows compliance with European regulations. Certifications could also cover quality of backups, quality of intrusion detection, etc. 5.3. Outlook The overall aim of the forthcoming final phase is to produce a high quality final report that will be considered useful by European decision-makers. Based on this aim the work of the final phase is split up into two main areas. The first part will focus on the compilation and consolidation of the results of the previous phases. This includes an internal review of all findings of the project as well as the integration of the results of the extra module on social networks sites. Above that we will also review the results of the policy workshop that will take place October, 2nd in Brussels as part of the European Innovation Summit as well as the integration of further comments by MEP’s and the STOA secretary resulting from the presentations of results at the STOA panel on October, 10th in Strasbourg. Based on this exercise the consortia will deliver concise version of the previous deliverables as one of the two main parts of the final report. 117 European Technology Assessment Group (ETAG) The second part of the final report will take up the policy options identified here as well as further inputs from the policy workshop, presentation and further consultations with experts to derive a set of final policy recommendations for European-decision makers. For this purpose we will perform an internal review of all policy options derived from our indepth analysis in this deliverable as well as of all further inputs from the policy workshop and other inputs, i.e. interviews or conference/workshop visits. The resulting list of policy options will be subject of a two-fold validation process. In a first step we analyze to what extent current and announced policy actions overlap with our options in order to avoid duplications. Moreover this also serves the purpose concretize individual options. This will lead to a final set of concrete measures. In the second step identified will be clustered and prioritized according to their possible impacts on the uptake of Cloud Computing in Europe. This will result then in a concrete set of measures that can be undertaken to achieve this overall goal. 118 Impacts of Cloud Computing ANNEX: LIST OF RESPONDENTS AND EVENTS VISITED Within the project and related activities a number of workshops and conferences were attended, respectively organised, by the contractors. This includes: x Cloudzone, Karlsruhe 10.-11.05.2012 x Intel European Research and Innovation Conference, Barcelona 22. - 23.10.2012 x 19th ITS Biennial Conference, Bangkok 2012 x CloudConf, München 26.-27.11.2012 x KA-IT-Sicherheitsinitiative: „Cloud kommt von Klauen. Oder?“, “ Karlsruhe 5.10.2012 x ETTIS project: „Scenarios for the future cyber security in Europe”, Frankfurt 27.28.11.2012* x The Computers, Privacy and Data Protection (CPDP): Data protection reloaded, Brussels, 23.-25-01.2013* x KA-IT-Sicherheitsinitiative: “Cloud, aber sicher!! Karlsruhe 15.5.2013 x IFIP Summer School 2013: "Privacy and Identity Management for Emerging Services and Technologies, Nijmegen 17.-21.06.2013 x CAST Forum SOA und Cloud Security, Darmstadt 27.06.2013 x Roadmap for Cloud Computing for the Beijing Academy of Science and Technology, Karlsruhe, 22.-23.07.2013* Workshop and conferences marked (*) were carried out by one of the contractors. Individuals communicated with (f.e. explorative interviews, consultation via mail etc.) include: x Eli Noam, Columbia University x Philip Schmolling, Yunicon x Matthias Schunter, Intel x Tobias Voss, Viadee x Gertjan Boulet, CEPS x Michael Waidner, Fraunhofer SIT x Stephan Engberg, Priway x Søren Duus Østergaard, Duus Communications x Henrik Hasselbach, IBM Denmark x Nina Nørregaard, IBM Denmark x Michael Friedewald, Fraunhofer ISI x Bernd Carsten Stahl, De Montfort University * x Gino Brunetti, Softwarespitzencluster x Anna Fielder, Civic Consulting* x Niels Madelung, Danish Standard / ISO-DK* x Carsten Kestermann, Software AG x Marnix Dekker, ENISA* x Ken Ducatel, DG Connect* x Henning Mortensen, The Danish Industry Association* x Bernhard Löwe, KIT-IKS 119 European Technology Assessment Group (ETAG) x Li Ling, Beijing Academy of Science and Technology Interviews marked (*) were carried out under the FP7-financed research project EST Frame, which researches Cloud Computing as case study for TA methodology. Due to the cancellation of the originally intended workshop during the current phase further interviews and communications related to the policy options will take place in the advent or aftermath of the policy workshop scheduled for October, 2nd in Brussels. 120 Impacts of Cloud Computing REFERENCES x Abboud/Sandle (2013): European cloud computing firms see silver lining in PRISM scandal. Retrieved from http://news.yahoo.com/analysis-european-cloud-computingfirms-see-silver-lining-125322771.html, Reuters 06/17/2013. x Aiken, K., Boush, D. (2006): “Trustmarks, objective-source ratings, and implied investments in advertising: investigating online trust and the context-specific nature of internet signals.” In Journal of the Academy of Marketing Science, vol. 34(3), pp 308323. x Alleweldt, F., Kara, S. (2011): Consumer market study on the functioning of ecommerce and Internet marketing and selling techniques in the retail of goods. Retrieved from http://ec.europa.eu/consumers/consumer_research/market_studies/docs/study_ecomm erce_goods_en.pdf, 07/23/2013. x Amazon (2013): AWS CloudHSM.http://aws.amazon.com/de/cloudhsm/07/14/2013 x Amazon (2013a): Price of external harddrive. http://www.amazon.de/gp/product/B0034G51XS/ref=noref?ie=UTF8&psc=1&s=comput ers, 07/23/2013. x Amazon (2013b): Case Studies. Retrieved from https://aws.amazon.com/en/solutions/case-studies/, 07/23/2013. x Arthur, C. (2012): Google privacy policy slammed by EU data protection chiefs, Guardian, 10/16/2012. x Article 29 Data Protection Working Party (2007): Opinion 4/2007 on the concept of personal data: WP 136. x Article 29 Data Protection Working Party (2012): Opinion 05/2012 on Cloud Computing: WP 196. x Article 29 Data Protection Working Party (2013): Explanatory Document on the Processor Binding Corporate Rules: WP 204. x Article 29 Data Protection Working Party: Opinion 05/2012 on Cloud Computing. 2012. http://ec.europa.eu/justice/data-protection/article-29/documentation/opinionrecommendation/files/2012/wp196_en.pdf, 07/23/2013. x Ashford, W. (2013a): Technology companies call for more transparency over data requests. ComputerWeekly.com, Wednesday 12. June 2013 x Ashford, W. (2013b): Yahoo wants FISA objections revealed. ComputerWeekly.com, Thursday 11. July 2013. x Aumasson, A., Bonneau, V., Leimbach, T., & Gödel, M. (2010): Economic and Social Impact of Software & Software-Based Services. D5–Final Report. Retrieved from http://www.crosportal.eu/sites/default/files/25_Study%20on%20Economic%20and%20social%20impac t%20of%20Software.pdf, 07/23/2013. x Aumasson, Arnold/Bonneau, Vincent/Leimbach, Timo/Gödel, Moritz (2010): Economic and Social Impact of Software & Software-Based Services. D5 – Final Report, Paris (Smart 2009/0041) (http://cordis.europa.eu/fp7/ict/ssai/docs/study-sw-reportfinal.pdf). 121 European Technology Assessment Group (ETAG) x Babcock, C. (2013): Amazon’s Cloud Revenues, Examined. Retrieved from http://www.informationweek.com/cloud-computing/infrastructure/amazons-cloudrevenues-examined/240145741, 07/23/2013. x Barret, Victoria (2011): Dropbox: The Inside Story Of Tech's Hottest Startup, in: Forbes online, October 18,2011, (http://www.forbes.com/sites/victoriabarret/2011/10/18/dropbox-the-inside-story-oftechs-hottest-startup/). x Berry, R., & Reisman, M. (2012): Policy Challenges of Cross-Border Cloud Computing. Retrieved from http://serviceorientedarchitecturesoa.net/goto/http://www.usitc.gov/journals/policy_ch allenges_of_cross-border_cloud_computing.pdf, 07/23/2013. x Berry, R., Reisman, M. (2012): Policy Challenges of Cross-Border Cloud Computing.http://www.usitc.gov/journals/policy_challenges_of_crossborder_cloud_computing.pdf, 07/23/2013. x BGPmon (2010): Chinese IPS hijacks the Internet.http://bgpmon.net/?p=282, 07/23/2013. x Bigo et. al. (2012): Fighting cybercrime and protecting privacy in the cloud. Study for the European Parliament’s Policy Deparment C: Citizens’ Rights and Constitutional Affairs. PE 462.509. x Bigo, D., Boulet, G., Bowden, C., Carrera, S., Jeandesboz, J. and Scherrer, A. (2012): Fighting cyber crime and protecting privacy in the cloud: Report for the European Parliament. x Bigo, Didier et al.(2012): Fighting cyber crime and protecting privacy in the cloud. Study on behalf of the European Parliament. http://www.europarl.europa.eu/committees/en/studiesdownload.html?languageDocume nt=EN&file=79050, Bruessels 07/23/2013. x Blodget, H. (2011): Amazon’s Cloud Crash Disaster Permanently Destroyed Many Customers’ Data. Retrieved from http://articles.businessinsider.com/2011-0428/tech/29958976_1_amazon-customer-customers-data-data-loss, 07/23/2013. x Bloomberg (2012): Coke Gets Hacked And Doesn’t Tell Anyone. http://www.bloomberg.com/news/2012-11-04/coke-hacked-and-doesn-t-tell.html, 07/23/2013. x Bloomberg (2013): Microsoft Azure Sales Top $1 Billion Challenging Amazon. April 30, 2013. http://www.bloomberg.com/news/2013-04-29/microsoft-azure-sales-top-1billion-challenging-amazon.html, 07/23/2013. x Bloomfield A. (2013): ACLU NSA Lawsuit: PRISM Violates the First and Fourth Amendments of the Constitution. Policymic. Retrieved from http://www.policymic.com/articles/48195/aclu-nsa-lawsuit-prism-violates-the-first-andfourth-amendments-of-the-constitution, 07/30/2013. x Borgmann, M., Hahn, T., Herfert, M., Kunz, T., Richter, M., Viebeg, U., & Vowé, S. (2012): On The Security of Cloud Storage Services. Retrieved from https://www.sit.fraunhofer.de/fileadmin/dokumente/studien_und_technical_reports/Clo ud-Storage-Security_a4.pdf, 07/23/2013. x Borgmann, M., Hahn, T., Herfert, M., Kunz, T., Richter, M., Viebeg, U., Vowe, S. (2012): On the Security of Cloud Storage Services. 122 Impacts of Cloud Computing https://www.sit.fraunhofer.de/de/angebote/projekte/cloud-studie/, Darmstadt 07/23/2013. x Boritz, J. (2005): “IS practitioners' views on core concepts of information integrity.” In x Bradshaw et. al. (2012): Quantitative Estimates of the Demand for Cloud Computing in International Journal of Accounting Information Systems, vol. 6(4), pp 260-279. Europe and the Likely Barriers to Uptake, IDC. x Bradshaw, D., Folco, G., Cattaneo, G., & Kolding, M. (2012): Quantitative Estimates of the Demand for Cloud Computing in Europe and the Likely Barriers to Up- take SMART 2011/0045 D4 – Final Report. EC. Retrieved from http://ec.europa.eu/information_society/activities/cloudcomputing/docs/quantitative_es timates.pdf, 07/23/2013. x Bradshaw, S., Millard, C., Walden, I. (2011): “Contracts for clouds: comparison and analysis of the Terms and Conditions of cloud computing services.” In International Journal of Law and Information Technology, vol. 19, pp 187-223. x Breznitz, D. (2006): The Israeli Software Industry, in: Arora, A; Gambardella, A. (2006): From Underdogs to Tigers: The Rise and Grow of the Software Industry in Brazil, China, India, Ireland, and Israel. Oxford: OUP, 72-98. x Breznitz, D. (2007): Innovation and the State, New Haven: Yale University Press. x Brodies (2012): Data Protection: What price harmonization? Brodies.com, 07/30/2013. x Brynjolfsson, E. Paul Hofmann, John Jordan( 2010): Cloud Computing and Electricity: Beyond the Utility Model, Communications of the ACM, Vol. 53, No. 5, 32-34. x Brynjolfsson, Erik, McAfee, Andrew (2011): Race against the machine, Lexington. x Bugiel, S., Nürnberger, S., Sadeghi, A.-R., Schneider, T. (2011): "TwinClouds - Secure Cloud Computing with Low Latency". Communications and Multimedia Security (CMS'11). http://www.infsec.cs.uni-saarland.de/~bugiel/publications/pdfs/bugiel11cms.pdf, 07/23/2013. x Cachin, C., Schunter, M. (2011): A Cloud You Can Trust How to ensure that cloud computing’s problems—data breaches, leaks, service outages—don’t obscure its virtues, IEEE Spectrum, pp 28-51. http://spectrum.ieee.org/computing/networks/a-cloud-you-can-trust/0, 07/23/2013. x Carr, Nicolas G. (2003): IT doesn’t matter, in: Harvard Business Review, 5 (2003), 4149. x Carr, Nicolas G. (2004): Does IT matter?, Boston. x Carr, Nicolas G. (2009): The Big Switch: Our New Digital Destiny, New York. x Cattaneo, G., Kolding, M., Bradshaw, D., & Folco, G. (2012): Quantitative Estimates of the Demand for Cloud Computing in Europe and the Likely Barriers to Take-up SMART 2011/0045 D2 – Interim Report – Statistical Annex. EC. Retrieved from http://cordis.europa.eu/fp7/ict/ssai/docs/study45-d2-interim-statisticalannex.pdf, 07/23/2013. x Cattedu (2011): Security and Resilience in Governmental Clouds. Making an informed decision. ENISA. x Cattedu and Hogben (2009a): Cloud Computing. Benefits, risks and recommendations for information security. ENISA. x Cattedu and Hogben (2009b): An SME perspective on Cloud Computing - Survey. ENISA x Cattedu and Hogben (2009c): Cloud Computing. Information Assurance Framework. ENISA. 123 European Technology Assessment Group (ETAG) x Cellan-Jones, R. (2009): The Sidekick Cloud Disaster. Retrieved from http://www.bbc.co.uk/blogs/technology/2009/10/the_sidekick_cloud_disaster.html, 07/23/2013. x Cincera, M./ Veugelers, R. (2010): Young leading innovators and the EU's R&D Intensity Gap (Breughel Policy Brief 2010/09), Brussels. x Constine, J. (2012): Soleio, Veteran Facebook Designer Behind The Like Button, Joins Dropbox Team. Retrieved from http://techcrunch.com/2012/12/06/soleio-dropbox/, 07/23/2013. x Cook, G., & Van Horn, J. (2010): How Dirty is your data? A Look at the Energy Choices That Power Cloud Computing. Retrieved from http://www.greenpeace.org/international/Global/international/publications/climate/201 1/Cool%20IT/dirty-data-report-greenpeace.pdf, 07/23/2013. x Cook, J. (2012): Outage at Amazon Web Services takes down Netflix on Christmas Eve. Retrieved from http://www.geekwire.com/2012/amazon-web-services-outage-takesnetflix-christmas-eve/, 07/23/2013. x CSA (2013): The Notorious Nine. Cloud Computing Top Threats in 2013. Cloud Security Alliance, Top Threats Working Group. x CSA: Quick Guide to the Reference Architecture. 2011. https://cloudsecurityalliance.org/wp-content/uploads/2011/10/TCI_Whitepaper.pdf x Curry, Sam et al (2010): Infrastructure security: Getting to the bottom of compliance in the cloud. RSA Security Brief. http://www.rsa.com/innovation/docs/CCOM_BRF_0310.pdf, 07/23/2013. x Cusumano, M. (2004): The business of software, Cambridge/Mass. x DARPA (2013): Information Innovation Office. http://www.darpa.mil/Our_Work/I2O/Programs/Cleanslate_design_of_Resilient_Adaptive_Secure_Hosts_%28CRASH%29.aspx, access 17.3.2013. x De Busser, E. (2012): The Adequacy of an EU-US Partnership, in: Gurthwirth et. al. (Eds.): European Data Protection: In Good Health? Springer Science+Business Media 2012. x De Hert, P. (2009): Citizens' Data and Technology: An optimistic perspective: Dutch Data Protection Authority, The Hague. x Dekker, M.A.C. (2012): Critical Cloud Computing. A CIIP perspective on cloud computing services. Version 1.0, December 2012. ENISA x Dignan, L. (2011): Cloud Computing’s real creative destruction may be the IT workforce. Retrieved from http://www.zdnet.com/blog/btl/cloud-computings-realcreative-destruction-may-be-the-it-workforce/61581, 07/23/2013. x Duisberg, A. (2011): Gelöste und ungelöste Rechtsfragen im IT-Outsourcing und Cloud Computing, in: Picot, A. et al. (Eds.): Trust in IT, Heidelberg, 49-70. x Ecorys (2010): The competiveness of EU SME’s in the ICT service sector. Rotterdam x Ecorys. (2009): FWC Sector Competitiveness Studies - Competitiveness of the EU SMEs in the ICT services industry_final report. Retrieved from http://www.pedz.unimannheim.de/daten/edz-h/gdb/09/study_report_ict_services_en.pdf, 07/23/2013. x Edler, J. (2010): Demand Oriented Innovation Policy, in: Smits, R./Kuhlmann, S/Shapira, P. (Eds.): The Co-Evolution of Innovation Policy – Innovation Policy Dynamics, Systems and Governance, Cheltenham. 124 Impacts of Cloud Computing x EDRI (2013): European Court of Justice Data Retention Cases To Be Heard On 9 July. http://www.edri.org/edrigram/number11.13/ecj-data-retention-case-9-july-2013, EDRigram newsletter, No. 11, 07/03/2013. x EFI (2011): Gutachten zu Forschung, Innovation und technologischer Leistungsfähigkeit Deutschlands 2011, Berlin. x Endeshaw, A. (2001): “The Legal Significance of Trustmarks.” In Information & Communications Technology Law, vol. 10(2), pp 203-230. x EP (2013): ENISA: A new mandate to face the challenges of network and information security. European Parliament. Europarl.Europa.EU, REF: 20130416IPR07353. x Erlanger, S. (2012): Fighting Terrorism, French-Style, New York Times, 03/30/2012. x ESA (2009) European Software Industry: looking for a competitive advantage. European Software Association. Brussels. (Phillipon/Veron 2009) x ESA (2009): European Software Industry: looking for a competitive advantage. European Software Association. Brussels. x Etro, F. (2009): The economic impact of Cloud Computing on business creation, employment and output in Europe. Retrieved from http://www.uitgeverijacco.be/download/nl/23707917/file/rbe-2009-2-web-4the_economic_impact_of_cloud_computing_on_business_creation__employment_and_o utput_in_europe.pdf, 07/23/2013. x Etro, F. (2009): The Economic Impact of Cloud Computing on Business Creation, Employment and Output in Europe. Draft version, May 2009. x Etro, F. (2010): The economic consequences of the diffusion of Cloud Computing. the Global Information Technology Report, 2010, 107–112. Retrieve from http://networkedreadiness.com/gitr/main/fullreport/files/Chap1/1.9.pdf, 07/23/2013. x Etro, F. (2011): The Economics of Cloud Computing. Paper presented at the Annual Conference on Anti-trust Law 2011: The Future of European Competition Law in Hightech Industries. x Etro, Federico (2011): The Economics of Cloud Computing, IUP Journal of Managerial Economics, Vol. IX, 2, pp. 7-22, http://www.intertic.org/Policy%20Papers/Report.pdf, 07/23/2013. x European Commission (2007): Pre-commercial Procurement: Driving innovation to x European Commission (2008): “Think Small First”. A “Small Business Act” for Europe ensure sustainable high quality public services in Europe : COM 2007/799/EC :COM 2008/349/EC x European Commission (2010): A comprehensive approach on personal data protection x European Commission (2010): Europe 2020 Flagship Initiative Innovation Union: COM in the European Union: COM (2010) 609 final. 2010/546/EC. x European Commission (2010): Towards interoperability for European public services: COM 2010/744/EC. x European Commission (2011): A coherent framework for building trust in the Digital Single Market for e-commerce and online services: COM 2011/942/EC. x European Commission (2011): Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on public procurement: COM 2011/896/EC 125 European Technology Assessment Group (ETAG) x European Commission (2011): Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on a Common European Sales Law: COM 2011/635/EC. x European Commission (2011): Recommendations on the review of directive 95/46/EC. Annex 1. Retrieved from http://ec.europa.eu/information_society/activities/cloudcomputing/docs/annexindustryrecommendations-ccstrategy-nov2011.pdf, 07/23/2013. x European Commission (2012): A European Consumer Agenda - Boosting confidence and growth. Retrieved from http://ec.europa.eu/consumers/strategy/docs/consumer_agenda_2012_en.pdf, 07/23/2013. x European Commission (2012): Impact Assessment Accompanying the General Data Protection Regulation: SEC (2012) 72 final. x European Commission (2012): Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation): COM 2012/0011 (COD). x European Commission (2012): Unleashing the Potential of Cloud Computing in Europe: COM(2012) 529 final. x European Commission (2013): Digital Agenda Scoreboard 2013, Brussels. x European Data Protection Supervisor (2012): Opinion of the European Data Protection Supervisor on the Commission's Communication on "Unleashing the potential of Cloud Computing in Europe. x European Parliament & European Council (1993): On unfair terms in consumer contracts: Directive 93/13/EEC. x European Parliament & European Council (1995): On the Protection of individuals with regard to the processing of personal data and on the free movement of such data: Directive 95/46/EC. x European Parliament & European Council (1995): On the protection of individuals with regard to the processing of personal data and on the free movement of such data: Directive 95/46/EC. x European Parliament & European Council (1996): On the legal protection of data-bases: Directive 96/9/EC. x European Parliament & European Council (2000): On certain legal aspects of information society services, in particular electronic commerce, in the Internal Market: Directive 2000/31/EC. x European Parliament & European Council (2002): Concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications): 2002/58/EC. x European Parliament & European Council (2006): on the retention of data processed in connection with the provision of public electronic communication services: Di-rective 2006/24/EC. x European Parliament & European Council (2006): On the term of protection of copy- x European Parliament & European Council (2008): On the law ap-plicable to contractual right and certain related rights: Directive 2006/116/EC. obligations: Regulation 593/2008/EC. 126 Impacts of Cloud Computing x European Parliament & European Council (2009): On the legal protection of computer programs: Directive 2009/24/EC. x European Parliament & European Council (2011): On consumer rights: Directive x European Parliament & European Council (2012): On European standardisation: 2011/83/EC. Regulation 2012/1052/EC. x European Parliament (2001): Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI)). 07/11/2001. http://www.europarl.europa.eu/sides/getDoc.do?pubRef=//EP//NONSGML+REPORT+A5-2001-0264+0+DOC+PDF+V0//EN&language=EN x European Patent Office (1973): European Patent Convention (EPC 1973). x European Union (2002): Charter of Fundamental Rights of the European Union: Official Journal of the European Communities: 2000/C 364/01. x Falliere, Nicolas; O Murchu, Liam; and Chien, Eric (2011): W32.Stuxnet Dossier, Version 1.4, Symantec Security Response, available at http://securityresponse.symantec.com/en/id/content/en/us/enterprise/media/security_r esponse/whitepapers/w32_stuxnet_dossier.pdf, 07/23/2013. x Fenn and Raskino (2012): Gartner’s Hype Cycle Special Report for 2012. Gartner x FI3P (2011): The European internet industry and market. Deliverable 2. Retrieved from Research. http://www.fi3p.eu/assets/pdf/FI3P%20D2%20%20EU%20Internet%20Industry%20and%20Market_Final.pdf, 07/23/2013. x Fielder et al. (2012): Cloud Computing Study. For the European Parliament’s Committee on Internal Market and Consumer Protection. IP/A/IMCO/ST/2011-18. x Fielder, A., & Brown, I. (2012): Cloud Computing. Study. EC. Retrieved from http://www.europarl.europa.eu/committees/en/studiesdownload.html?languageDocume nt=EN&file=73411, 07/23/2013. x Forbes (2012): NSA's New Data Center And Supercomputer Aim To Crack World's Strongest Encryption. http://www.forbes.com/sites/andygreenberg/2012/03/16/nsasnew-data-center-and-ultra-fast-supercomputer-aim-to-crack-worlds-strongest-crypto/, 07/23/2013. x Fransman, M. (2011): The evolving ICT industry in Asia and the implications for Europe, Sevilla. x Gartenberg and Ekholm (2012): Market insight: Consumer Apps and Services Will x Become More Aware and Less Visible. Gartner. Gartner (2012): Gartner Says Worldwide Cloud Services Market to Surpass $109 Billion in 2012, Stamford (http://www.gartner.com/it/page.jsp?id=2163616). x Gartner Inc. (2010): Gartner Says Worldwide Cloud Services Market to Surpass $68 Billion in 2010. Retrieved from http://www.gartner.com/newsroom/id/1389313, 07/23/2013. x Gentry, C. (2009): Fully homomorphic encryption using ideal lattices. Proceedings of the 41st annual ACM symposium on Theory of computing. http://www.cs.cmu.edu/~odonnell/hits09/gentry-homomorphic-encryption.pdf, 07/30/2013. 127 European Technology Assessment Group (ETAG) x Giron, Frederic et al. (2009): The European Software and Software Based Services Industry, Brüssel. x Global Access Partners (2011): Task Force on Cloud Computing Final Report: http://www.globalaccesspartners.org/Cloud-Computing-GAP-Task-Force-Report-May2011.pdf, 07/23/2013. x Goldsmith, B. (2013): Yahoo memo sparks debate on pros and cons of working at home. Reuters. London. Retrieved from http://www.reuters.com/article/2013/02/26/usworkplace-flexibility-idUSBRE91P0S720130226, 07/23/2013. x Google 1 (2013): http://www.google.com/enterprise/apps/education/customers.html, 07/23/2013. x Greenwald and MacAskill (2013): NSA Prism program taps in to user data of Apple, x Greenwald, G (2013): NSA collecting phone records of millions of Verizon customers Google and others. The Guardian, 07/07/2013. daily. The Guardian, 06/06/2013. x Greif, B. (2012): Reporter ohne Grenzen stuft zwölf Staaten als Feinde des Internets ein. x Gutwirth, S., Gellert, R., Bellanova, R., Friedewald, M., Schütz, P., Wright, D., Mordini, E. and Venier, S. (2011): Legal, social, economic and ethical conceptualisations of privacy and data protection: Prescient Project, Deliverable 1. x Hecking and Schulz (2013): Spying “Out of Control”: EU Official Questions Trade Negotiations. Spiegel International, 06/30/2013. x Heiser, Gernot (2013): Protecting eGovernment Against Attacks. White Paper presented at STOA conference on eGovernment security. http://www.europarl.europa.eu/stoa/cms/home/events/workshops/egovernment, Brussels, 02/19/2013. x Heng, S. (2011), “ Netzneutralität. Innovation und Differenzierung keine Antipoden” Deutsche Bank Research Paper, Frankfurt. x Henrich, Christian (2012): Statement at Karlsruher IT-Sicherheitsinitiative 5/10/2012. x Hoffmann et. al. (2008): Towards Semantic Resolution of Security in Ambient Environments in: Mana and Rudolph (Eds.): Developing Ambient Intelligence. Proceedings of the International Conference on Ambient Intelligence Developments (AmI.d’07). Springer Verlag, Berlin, 2008. x Hofmann, P., & Woods, D. (2010): Cloud Computing: The limits of public clouds for business applications. Internet Computing, IEEE, 14(6), 90–93. x Hogan, O., Mohamed, S., McWilliams, D., & Greenwood, R. (2010): The Cloud Dividend Part One. The economic benefits of Cloud Computing to business and the wider EMEA economy. Retrieved from http://uk.emc.com/collateral/microsites/2010/clouddividend/cloud-dividend-report.pdf, 07/23/2013. x Hon, W., Millard, C., Walden, I. (2012): “Negotiating Cloud Contracts: Looking at x IDC (2012): IDC Forecasts Public IT Cloud Services Spending Will Approach $100 Billion Clouds from Both Sides Now.” In Stanford Law Review, vol. 16, pp 79-125. in 2016, Generating 41% of Growth in Five Key IT Categories, Framingham, (http://www.idc.com/getdoc.jsp?containerId=prUS23684912#.UPVtJ_IWnCc). x International Association of Microsoft Channel Partners (2011): “'Trustmark' Proposal for Cloud Service Providers”. Presentation at 5th Call for Proposals. 128 Impacts of Cloud Computing x ITTL (2011): Cloud audit & assurance. The Danish Internet and Telecommunication Agency (IT & Telestyrelsen). Retrieved January 2013 from: digitaliser.dk/resource/703330 x Jansen, W., Grance, T. (2011): “Guidelines on Security and Privacy in Public Cloud Computing. Special Publication.” National Institute of Standards and Technology, U.S. Department of Commerce. x Kalenda, F. (2013): Amazon Web Services macht 2013 etwa 3,8 Millarden Dollar Umsatz. Retrieved from http://www.zdnet.de/88138507/analyst-amazon-web-servicesmacht-2013-38-mrd-dollar-umsatz/, 07/23/2013. x Kaminiski, M. (2013): PRISM’s legal basis: How we got here, and what we can do to get back. The Atlantic, June 7th. x Korff and Brown (2010): New Challenges To Data Protection. Study commissioned by the European Commission’s DG JFS. x Korte, Werner B. et al. (2009): Anticipating the development of the supply and demand for e-Skills in Europe 2010-2015, Brussels. x KPMG (2012): Exploring the Cloud. A Global Study of Governments’ Adoption of Cloud. KPMG International. x KPMG (2013): The Cloud Takes Shape. Global Cloud Survey – The Implementation Challenge. KMPG International. Retrieved May 2012 from http://www.google.dk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&ved=0 CDkQFjAB&url=http%3A%2F%2Fwww.kpmg.com%2FFR%2Ffr%2FIssuesAndInsights% 2FArticlesPublications%2FDocuments%2Fthe-cloud-takesshape.pdf&ei=DRb1UbTYNcSQ4gTWh4CgAQ&usg=AFQjCNEwrTqhruWts9hq0TeNYk0SYZ A_5A&sig2=Rnr40bfxw9-DT-TRFuig6g&bvm=bv.49784469,d.bGE. x Kraus, M. (2012): Cloud Computing und Consumerization of IT in Deutschland 2012. IDC. Retrieved from http://www.microsoft.com/germany/msdn/aktuell/news/show.mspx?id=msdn_de_4593 4, 07/23/2013. x Kraus, M., & Zacher, M. (2012): Cloud Computing in Deutschland 2012. DeploymentModelle und Management, Integration, Security und Compliance im Fokus. IDC. Retrieved from http://www.kaspersky.com/de/downloads/pdf/idc_executive_brief_mc_cloud_computin g_2012_kaspersky.pdf, 07/23/2013. x Kuan Hon, W., Millard, C., & Walden, I. (2012): Who is responsible for 'personal data' in cloud computing? - The cloud of unknowing, Part 2: International Data Privacy Law, vol. 2 no. 2, pp. 3-18. x Kucharik, A. (2003): Vendor lock-in, part 1 Proprietary and lock-in not necessarily synonymous. Retrieved June 15, 2013, from Search Open Source: http://searchenterpriselinux.techtarget.com/news/913129/Vendor-lock-in-part1Proprietary-and-lock-in-not-necessarily-synonymous, 07/23/2013. x Kuner et. al. (2013): The extraterritoriality of data privacy laws – an explisve issue yet to detonate in: International Data Privacy Law, 2013, Vol. 3, No. 3. x Lanier, J. (2013): You are not a gadget… An interview with Jaron Lanier. x Lardinois, F. (2012): Apple’s iCloud Now Has Over 190M Users, Up From 150M Last Jaronlanier.com/polecongadgetqa.html, 07/30/2013. Quarter And Seeing Steady Growth. Retrieved from 129 European Technology Assessment Group (ETAG) http://techcrunch.com/2012/10/25/apples-icloud-now-has-190-million-users/, 07/23/2013. x Lardinois, F. (2012): Gmail Now Has 425 Million Users, Google Apps Used By 5 Million Businesses And 66 Of The Top 100 Universities. Retrieved from http://techcrunch.com/2012/06/28/gmail-now-has-425-million-users-google-appsused-by-5-million-businesses-and-66-of-the-top-100-universities/, 07/23/2013. x Laugesen, Nicolai S.(2011): Cloud Computing, Cyber Security and Green IT. The impact x Leclerque, K. (2012): Public Cloud-Nutzung in Deutschland - Fallstudie Airport on e-Skills requirements, Copenhagen. Nürmberg Infopark. PAC. x Leimbach, T. et. al (2012): Foundations of Cloud Computing, Karlsruhe. x Leimeister, S./Riedl, C./Böhm, M./ Krcmar, H. (2010): The Business Perspective of Cloud Computing: Actors, Roles, and Value Networks, in: Proceedings of 18th European Conference on Information Systems (ECIS 2010) Paper 56. (http://aisel.aisnet.org/ecis2010/56). x Liebenau et. al. (2012): Modeling the Cloud. Employment effects in two exemplary sectors in the United States, the United Kingdom, Gemany and Italy. LSE Enterprise. x Lo, P. (2013): Cloud computing is about to get personal , Network World June 06, 2013 10:32 AM ET. x Lynn, T., Healy, P., McClatchey, R., Morrison, J., Pahl, C., Lee, B. (2013): “The case for cloud service trustmarks and assurance-as-a-service”. In: International Conference on Cloud Computing and Services Science 8-10 May 2013, Aachen, Germany: http://doras.dcu.ie/18357/1/CLOSER_2013_Paper_Case_for_Cloud_Service_Trustmarks _and_Assurance_as_a_service_115_10-03-13b.pdf, 07/23/2013. x MacAskill et. al. (2013): GCHQ taps fibre-optic cables for secret access to world’s communication. The Guardian, 07/21/2013. x Marnau, N., Schirmer, N., Schlehahn, E., Schunter, M. (2011): TClouds. Herausforderungen und erste Schritte zur sicheren und datenschutzkonformen Cloud. Datenschutz und Datensicherheit; Volume 35; Number 5; 333-337. http://www.springerlink.com/content/3664g67412449j52/fulltext.pdf, 07/23/2013. x Maxwell and Wolf (2012): A Global Reality: Governmental Access to Data in the Cloud. x Maxwell, W., Wolf, W. (2012): A global reality: Governmental Access to Data in the A comparative study of ten international jurisdictions. A Hogan Loells White Paper. Cloud. Maxwell_Revised Government Access to Cloud Data Paper. http://www.hoganlovells.com/hogan-lovells-revealing-study-about-governmentalaccess-to-data-in-the-cloud-detailed-in-white-paper-released-at-brussels-program-0523-2012/ RP-online: Hackerangriff: Bayer hält stand (2011): http://www.rponline.de/bergisches-land/leverkusen/nachrichten/hackerangriff-bayer-haelt-stand1.1322513, 07/05/2013. x Mayer-Schönberger, V. (1997): Generational Development of Data Protection in Europe in: Technology and Privacy, Agre, P. and Rotenberg, M. (eds.), MIT Press, Cambridge, MA, pp. 219-242. x McDonagh, M. (2012): “Review of the Regulatory and Legal Environment for Cloud Computing in the EU” Irish Centre for Cloud Computing and Commerce. 130 Impacts of Cloud Computing x McGee, K. (2011): The 2011 Gartner Scenario: Current States and Future Directions of the IT Industry. Gartner Inc. Retrieved from https://noppa.tkk.fi/noppa/kurssi/t128.5300/luennot/T-128_5300_gartner.pdf, 07/23/2013. x Meyer, D. (2013): Privacy activists sue UK government over PRISM and Tempora. Gigaom. Retrieved from http://gigaom.com/2013/07/08/privacy-activists-sue-ukgovernment-over-prism-and-tempora/, 07/30/2013. x Meyer, T., Simsek-Graf, C., & Sanna, D. (2012): Heiter statt wolkig. Softwaretest in der Cloud. Retrieved from http://www.sigsdatacom.de/fileadmin/user_upload/zeitschriften/os/2012/Testing/meyer_simsek_sanna _OS_Testing_2012_kj7r.pdf, 07/23/2013. x Miller, C.C. (2013): Tech Companies Concede To Surveillance Program. New York x Morgan, T. P. (2012): Amazon’s S3 object count kisses 1 trillion. Retrieved from Times, 07/07/2013. http://www.theregister.co.uk/2012/04/09/amazon_aws_s3_objects/, 07/23/2013. x Mowery, David (1996) (Hrsg.): The international Computer Software Industry, Oxford. x Nessi (2008): A NESSI Position Paper: European Software Strategy. Brussels. x Nielsen, N. (2013): EU questions decade-old US data agreement, EUObserver.com. http://euobserver.com/justice/120919, 07/22/2013. x x Nightlabs (2013): http://www.cumulus4j.org/latest-stable/de/, 06/21/2013. Nordic Council of Ministers (2011): Nordic Public Sector Cloud Computing - a discussion paper. TemaNord 2011:566. x Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues: Towards Trusted Cloud Computing,Proceedings of the Workshop On Hot Topics in Cloud Computing (HotCloud), San Diego, CA, June 2009. http://www.mpisws.org/~gummadi/papers/trusted_cloud.pdf x OECD (2011): Demand Side Innovation Policy: Theory and Practice in OECD Countries”, Paris. x Open Hypervisor (2011): Isolating Spears. http://www.openhypervisor.org/index.php/HPvisor/news/, 07/28/2011. x Panettieri, J. (2013): Google Apps, Enterprise Cloud Revenues $1B In 2013. Retrieved from http://talkincloud.com/cloud-services-providers/google-apps-enterprise-cloudrevenues-1b-2013, 07/23/2013. x Pepitone, J. (2012): Instagram can now sell your photos for ads. Retrieved from http://money.cnn.com/2012/12/18/technology/social/instagram-sellphotos/index.html?iid=s_mpm#comments, 07/23/2013. x Poitras et. al. (2013): How the NSA Targets Germany and Europe. Spiegel International, July 1st 2013. x Rader, D. (2012): Case - How cloud computing maximizes growth opportunities for a firm challenging established rivals in: Strategy and Leadership, Vol. 40, No. 3. pp. 3643. Emerald Group Publishing Ltd. x Rannenberg et al. (Eds.) (2009): The Future of Identity in the Information Society. Challenges and Opportunities. Springer Verlag, Berlin. x Rauhofer and Bowden (2013): Protecting their own: Fundamental rights implications for EU data sovereignty in the cloud. Paper presented at the Berkeley Center for Law and Technology Privacly Law Scholars Conference, 6-7 June 2013. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2283175 131 European Technology Assessment Group (ETAG) x Reed, C. (2010): “Information ‘Ownership’ in the Cloud.” Queen Mary University of London, School of Law Legal Studies Research Paper No 45/2010. x x Reichmann, A. (2011): File Storage Costs Less In The Cloud Than In-House. Forrester. Ristenpart, T., Tromer, E., Shacham, H., Savage, S. (2009): Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. ACM Conference on Computer and Communications Security: 199-212. x Robinson et. al. (2010): The Cloud. Understanding the Security, Privacy and Trust Challenges. RAND Europe for the European Commission, DG InfSo. x Robinson, N., Valeri, L., Cave, J., Starkey, T. Graux, H., Creese, S., Hopkins, P. (2010): “The Cloud: Understanding the Security, Privacy and Trust Challenges” Report prepared for Unit F.5, Directorate-General Information Society and Media, European Commission: http://cordis.europa.eu/fp7/ict/security/docs/the-cloud-understanding-security-privacytrust-challenges-2010_en.pdf, 07/23/2013. x Robinson, N., Valeri, L., Cave, J., Starkey, T., Graux, H., Creese, S., & Hopkins, P. (2010): The Cloud: understanding the security, privacy and trust challenges. Privacy and Trust Challenges. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2141970, 07/23/2013. x Schleife, K. et al. et al. (2012): Wachstumshemmnisse für kleinere und mittlere Unternehmen am Beispiel der IT-Branche, Berlin. x Schneier, B. (2013): Terms of Service as a Security Threat. Retrieved from http://sysinfosec.net/article.php/20130117081339726#4, 07/23/2013. x Schneier, B. (2013b): Government Secrets and the Need for Whistleblowers. CRYPTOGRAM Newsletter, June 15, 2013. x Schneier, B. (2013c): Protecting E-Mail from Eavesdropping. CRYPTO-GRAM Newsletter, June 15, 2013. x Schneier, Bruce (2013): Government Secrets and the Need for Whistleblowers. CRYPTO-GRAM Newsletter, 06/15/2013. x Schonfeld, E. (2011): Netflix Now The Largest Single Source of Internet Traffic In North America TechCrunch. Retrieved from http://techcrunch.com/2011/05/17/netflix-largestinternet-traffic/, 07/23/2013. x Schouten, E. (2012): “Auditable Cloud Services and Industry Compliance.” In Wired, x Schubert (2011): The Future of Cloud Computing – Opportunities for European Cloud 11/2012. Computing Beyond 2010, European Commission, Expert Group Study. x Schubert, L., & Jeffery, K. (2012): Advances in clouds. Research in future Cloud Computingf. Retrieved from http://cordis.europa.eu/fp7/ict/ssai/docs/future-cc-2mayfinalreport-experts.pdf, 07/23/2013. x Schulzki-Haddouti, C. (2012): Wild Wild Cloud: Datenschutzkontrolle unmöglich. Retrieved from http://futurezone.at/netzpolitik/10436-wild-wild-clouddatenschutzkontrolle-unmoeglich.php, 07/23/2013. x Schwartz, M. J. (2013): Flickr Bug Revealed Private Photos To Public. Retrieved from http://www.informationweek.com/security/privacy/flickr-bug-revealed-private-photosto-pu/240148386, 02/12/2013. x Sealed Cloud (2013): http://www.sealedcloud.de/?page_id=8, 07/13/2013. x Steinmueller (2004): The European Software sectoral system of innovations. In: Malerba, F. (ed.): Sectoral Systems of Innovations, Cambridge, 193-241. 132 Impacts of Cloud Computing x Streetinsider (2013): Salesforce. Retrieved from http://www.streetinsider.com/Earnings/Salesforce.com+%28CRM%29+Lower+Despite +Q2+Top+and+Bottom-Line+Beat%2C+Q3+EPS+Guidance+Falls+Short+But+FY+InLine/7683268.html, 07/13/2013. x Taft, D. K. (2012): Microsoft Sees Revenue Growth on Server and Tools as Xbox Drops. Retrieved from http://www.eweek.com/c/a/Windows/Microsoft-Sees-Revenue-Growthon-Server-and-Tools-as-Xbox-Drops-686610/, 07/23/2013. x Trevis (2013): Google: Number of Gmail Users. Retrieved from http://www.trefis.com/company?hm=GOOG.trefis&division=0781&driver=0883&from= pdf&scroll=1#/GOOG/n-0781/0875?c=top&from=rhs, 07/23/2013. x Turlea, A. et al. (2010): The 2010 report on R&D in ICT in the European Union, Seville. x Turlea, A. et al. (2011): The 2011 report on R&D in ICT in the European Union. Seville. x United States (1986): Electronic Communications Privacy Act of 1986 (ECPA, Pub.L. 99508, 100 Stat. 1848, enacted October 21, 1986, codified at 18 U.S.C. §§ 2510–2522). x United States (2001): USA Patriot Act (U.S. H.R. 3162, Public Law 107-56), Title V, Sec 505. Amended 18 U.S.C. § 2709(b). x van Ark, B. et al. (2003): ICT and productivity in Europe and the United States. Where do the differences come from? In: CESinfo 3(2003), 295-318. x Vanson Bourne (2012): The Business Impact of the Cloud. According to 460 Senior Financial Decision-Makers. Vanson Bourne. Retrieved July 2013 from http://www.google.dk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&ved=0CEIQFjAC &url=http%3A%2F%2Fstatic.ziftsolutions.com%2Ffiles%2F8a57cb7d3e5aa0dd013e61c 646bb1d58.pdf&ei=_BT1Ucy7NOOQ4AT_6YD4Dw&usg=AFQjCNEo3DLi66SynXZ5ehn40 mWW08ou_Q&sig2=27v-Dt9A8Z2fagRrAf0_WQ&bvm=bv.49784469,d.bGE&cad=rja x Vaughan-Nichols, S. J. (2013): Evernote hacked, forces password reset. Retrieved from http://www.zdnet.com/evernote-hacked-forces-password-reset-7000012045/, 07/23/2013. x Vehlow, M. (2011): PwC study: Cloud Computing in the Middle Market. http://www.pwc.de/de/mittelstand/cloud-computing-im-mittelstand.jhtml, 07/23/2013. x Venkataraman/McArthur (2011): Vimeo EC2 transcoding. Retrieved from http://de.slideshare.net/ptrmcrthr/vimeo-ec2, 07/23/2013. x Veugelers, R. (2009): “A lifeline for Europe's young radical innovators”. Bruegel Policy Brief, 2009/01. x Veugelers, R. et al. (2012): Lessons for ICT Innovative Industries. Three Experts’ Positions on Financing, IPR and Industrial Ecosystems, Seville. x Waldmann, U. (2013): Comment at CAST Forum, 06/27/2013. x Wauters, P., Declercq, K., Van der Peijl, S., Davies, P. (2011): Study on cloud and service oriented architectures for e-government. final report. Deloitte. Retrieved from https://ec.europa.eu/digital-agenda/sites/digital-agenda/files/smart20100074finalreport.pdf, 07/23/2013. x Weber, Arnd; Haas, Michael; Scuka, Daniel: Mobile Service Innovation: A European Failure. Telecommunications Policy, Volume 35, Issue 5, June 2011, 469-480 x WEF (2010): Exploring the Future of Cloud Computing. Riding the next wave of technology-driven transformation. World Economic Forum in partnership with Accenture. 133 European Technology Assessment Group (ETAG) x WEF (2011): Advancing Cloud Computing: What to do now? Priorities for Industry and Government. World Economic Forum in partnership with Accenture. x Wessner, Charles (2008): Assessment of the Small Business Innovation Research x Wimmer, B. (2011): Uni Salzburg liegt in Googles Händen. Retrieved from Program, Washington, D.C. http://futurezone.at/netzpolitik/69-uni-salzburg-liegt-in-googles-haenden.php, 07/23/2013. x Wohlsen, M. (2013): Amazon Crash Could Cost A Lot More Than 400,000 Pairs of Unsold Underwear. Retrieved from http://www.wired.com/business/2013/02/amazoncrash-unsold-underwear/, 07/23/2013. x Woloszynowicz, M. (2011): The Economics of Dropbox. http://www.w2lessons.com/2011/04/economics-of-dropbox.html, 07/23/2013. x Yahoo Finance (2013): Rackspace Hosting, Inc. (RAX). Retrieved from http://finance.yahoo.com/q/ks?s=rax, 07/23/2013. x Zhu, K., Zhou, Z. (2011): “Lock-In Strategy in Software Competition: Open-Source Software vs. Proprietary Software.” In Information Systems Research, Article in Advance, pp 1-10. x 134 Zotero (2013): http://www.zotero.org/ Access June 14, 201, 07/23/2013.