Data Security – Cloud and Outsourcing

Lubbock Fine, 8 November 2019

Placeholder image

Many companies are now completely reliant on the data stored on their network servers, PCs, laptops, mobile devices or in the cloud. Some of this data is likely to contain either personal information and/or confidential company information.

We have a related factsheet which covers the conventional data security considerations.

Here we look at some of the issues to consider when reviewing the security of your computer systems, and how to minimise the risks of data loss within the cloud and where some or all services are outsourced.

Whilst cloud data storage and outsourcing can often be more secure than using internal resources, there are some additional things to bear in mind when some, or all, of your data is not held on-site.

Audit use and storage of personal data

Consider the potentially sensitive and confidential data which is stored in the cloud by your business.

Find out what is happening to data and what controls are in place to prevent accidental or deliberate loss of this information.

Risk analysis and risk reduction 

So the key question is – If all or some of this data is lost who could be harmed and in what way?

When that is known, then steps to mitigate the risks of data loss must be taken. Here are some steps which can be undertaken to reduce the risk of data loss:- 

  • Ensure that the cloud provider or outsourcer will not share your data with a third party
  • Check in what countries the data will be stored and processed – as this could have Data Protection implications
  • Ensure that you can take local backup copies of your data
  • A data subject has the same rights of access wherever data is being stored, so ensure that a subject access request can be facilitated
  • Try to minimize the amount of personal data stored in the cloud or with a third party
  • What happens if the provider becomes insolvent? Have a contingency plan in place
  •  Is the data encrypted – if so have you got access to the keys and who else has access to the keys?

There are many resources available, but we have included two examples here:- 

https://www.cesg.gov.uk/cloud-security-collection 

https://ico.org.uk/media/for-organisations/documents/ 1540/ cloud_computing_guidance_for_organisations.pdf 

How can we help

Please contact us if you require help in the following areas:

  • performing a security/information audit
  • reviewing cloud and outsourcing/third party agreements
  • training staff in security principles and procedures.