Mostrando postagens com marcador PATRIOT ACT. Mostrar todas as postagens
Mostrando postagens com marcador PATRIOT ACT. Mostrar todas as postagens

quinta-feira, 3 de janeiro de 2013

Google finta pagamento de 1.500 milhões em impostos

1671030-slide-google-datacenter-tech-05

Da Agência Financeira,  Portugal 10/12/2012

Gigante da Internet transferiu 7,6 mil milhões de euros de receitas para paraíso fiscal

A Google conseguiu fintar o pagamento de dois mil milhões de dólares - pouco mais de 1.500 milhões de euros - em impostos e taxas no ano passado.
Tudo graças à transferência de 9,8 mil milhões de dólares (7,6 mil milhões de euros) de receitas para uma subsidiária com sede no arquipélago britânico das Bermudas.
O valor transferido para este paraíso fiscal foi praticamente o dobro do total que a Google ali depositou três anos antes, segundo os dados da Bloomberg.
Nas Bermudas, não há tributação sobre o lucro corporativo, o que fez com que o gigante da Internet conseguisse cortar quase para metade a sua taxa de imposto global em 2011.
Para se ter uma ideia da dimensão do dinheiro transferido para as Bermudas, equivale a 80% do lucro total da empresa, antes de impostos, no ano em análise.
A propósito, foi divulgado recentemente um relatório crítico sobre as práticas de algumas multinacionais. França, Reino Unido, Itália e Austrália estão já a investigar estas manobras do Google e de outras empresas.
No caso do
Reino Unido, a unidade britânica da Amazon fez um volume de negócios de 207 milhões de libras (255 milhões de euros) em 2011, mas só pagou 1,8 milhões (2,2 milhões de euros) de IRC no país, enquanto a Google pagou seis milhões de libras (7,4 milhões de euros) sobre rendimentos de 396 milhões de libras (488 milhões de euros) no mesmo ano.
Picture source:Google Search. Google datacenter

terça-feira, 18 de dezembro de 2012

British banks pay big for BSA/AML violations

Dorsey & Whitney LLP Greg Pulles and Brent YlvisakerUnited Kingdom, USA

December 18 2012 from ACC Association for Corporate Counsels

fincen_logo_300x220Two British banks recently agreed to pay significant penalties to settle allegations of violations of the Bank Secrecy Act and U.S. sanctions programs, with deficiencies in each bank’s Bank Secrecy Act/anti-money laundering (“BSA/AML”) compliance program underlying each case. On December 10, Standard Chartered Bank (“SCB”) reached a $132 million settlement with the Office of Foreign Assets Control (“OFAC”). On December 11, HSBC reached a collective settlement with the Financial Crimes Enforcement Network, the Department of Justice, OFAC, the Federal Reserve Board and the Office of the Comptroller of Currency, with penalties assessed against HSBC totaling more than $1.9 billion.

The SCB settlement arose primarily out of SCB’s dealings with Iranian banks and entities. OFAC’s director states the SCB settlement was the result of an investigation into SCB’s “attempts to violate U.S. sanctions programs through the ‘stripping’ from payment messages of critical information.” OFAC alleged that SCB had interfered with the implementation of U.S. economic sanctions through such practices as “omitting or removing material references to U.S.-sanctioned locations or entities from payment messages sent to U.S. financial institutions,” “replacing the names of ordering customers on payment messages” and “sending payment messages to or through the United States without references to locations or entities implicating U.S. sanctions.”

SCB’s London office had released a Quality Operation Procedure which instructed London payments staff on the omission of the bank identifying code of Iranian remitting banks and had instructed staff to use cover payment to effect Iranian bank payments. As early as 2005, SCB’s head of legal compliance had expressed concern over these procedures. SCB’s Dubai office operated USD accounts for a number of Iranian banks and customers and “did not have adequate controls in place to prevent prohibited payments from being sent through the United States . . . nor did it have adequate controls in place to ensure” payments contained the information necessary for U.S. correspondents to assess the transfers. Electronic funds transfers were also processed for the benefit of persons in Burma, Sudan and Libya and for “specially designated narcotics traffickers.” SBC voluntarily disclosed the apparent violations and cooperated with OFAC in conducting a historical review of transactions.

The settlement against HSBC represents the largest bank settlement in U.S. history. HSBC was accused of “deliberately channel[ling] hundreds of millions of dollars” of prohibited transactions through its U.S. arm by “laundering money from Mexican drug trafficking and processing banned transactions on behalf of Iran, Libya, Sudan and Burma.” U.S. Assistant Attorney General Lanny Breuer characterized HSBC’s conduct as “stunning failures of oversight.” Federal regulators found that HSBC had “failed to adopt and implement a program that adequately covers the required BSA/AML program elements, including, in particular, internal controls for customer due diligence, procedures for monitoring suspicious activity, and independent testing” and had “severely understaffed its AML compliance function.”

Some of the “critical deficiencies” in HSBC’s compliance program highlighted by federal regulators include:

  • Excluding wire transfers initiated from customers in countries risk rated as “standard” or “medium” from its automated BSA/AML monitoring. 
  • Inadequate collection and analysis of customer due diligence (“CDD”) information, including not collecting or maintaining CDD or enhanced due diligence information for Group Entities. 
  • Not performing BSA/AML monitoring for banknote transactions with Group Entities (HSBC’s foreign affiliates). 
  • Inadequate monitoring of the accounts and funds transfer activity of Group Entities and correspondents. 
  • Unwarranted reliance on Group Entities following HSBC’s BSA/AML policies. 
  • Not appropriately designating customers as “high-risk” for purposes of BSA/AML monitoring. 
  • Failing to report suspicious activity on time, caused by inadequate procedures to ensure the timely reporting of suspicious activity and inadequate staffing and procedures in the alert investigations unit that resulted in a significant backlog of alerts. 
  • The closure of alerts based on ineffective review.

A “look-back” review of account and transaction activity resulted in the late-filing of 890s SARs concerning activity in the amount of $6.34 billion. Federal regulators stated that HSBC “benefited from [the BSA/AML] violations of law by conserving funds it should have expended in order to maintain a robust BSA/AML compliance program.” HSBC has now spent more than $200 million to improve its money-laundering prevention policies.

SCB and HSBC join a list of other foreign banks operating in the U.S. (including Credit Suisse, Barclays and Lloyds) that have made payments to settle allegations of BSA/AML violations since 2009.

These recent settlements serve as an important reminder that foreign banks with U.S. subsidiaries are subject to U.S. laws and regulations, including BSA/AML regulations, and that violations of such laws are treated very seriously. The settlements also demonstrate that it is imperative for all financial institutions subject to U.S. law to develop and effectively implement a robust BSA/AML compliance program.

A public statement by OFAC regarding the SCB settlement can be found here:

Public statements by federal regulators concerning the HSBC settlement can be found here:

Too big to jail? HSBC executives avoid money laundering charges

18 DEC, 2012, 02.03PM IST, AP The Economic Time

xadrezNEW YORK: When the Justice Department announced its record $1.9 billion settlement against British bankHSBC last week, prosecutors called it a powerful blow to a dysfunctional institution accused of laundering money for Iran, Libya and Mexico's murderous drug cartels.
But to some former federal prosecutors, it was only the latest case of the government stopping short of bringing criminal
money laundering charges against a big bank or its executives, at least in part on the rationale that such prosecutions could be devastating enough to cause such banks to fail.
They say it sounds a lot like the "too big to fail" meme that kept big but sickly banks alive with the support of taxpayer-funded bailouts. In these cases, they call it, "Too big to jail."
"Shame on the Department of Justice. Shame on them," said Jimmy Gurule, a former federal prosecutor who teaches law at the University of Notre Dame.
"These are actions that facilitated major international
drug cartels to continue their operations," he said. "Now, if that doesn't justify criminal prosecution, I can't imagine a case that would."
Oregon Democratic Sen. Jeff Merkley shot off a letter to U.S. Attorney Eric Holder after the HSBC settlement, saying the government "appears to have firmly set the precedent that no bank, bank employee, or bank executive can be prosecuted even for serious criminal actions if that bank is a large, systemically important financial institution."
Neil Barofsky, the former inspector general of the government's Troubled Asset Relief Program and a former federal prosecutor in New York, warned that big banks could interpret the Justice Department's leniency as "a license to steal."
Since 2009, several European banks have paid heavy settlements related to allegations they moved money for people or companies on the U.S. sanctions list: Switzerland's Credit Suisse, $536 million; British bank Barclays, $298 million; British bank Lloyds, $350 million; Dutch bank ING, $619 million; and the Royal Bank of Scotland, $500 million for alleged money laundering at Dutch bank ABN Amro.
While those cases involved deals with such countries as Iran, Libya, Cuba and Sudan, the HSBC case was notable for the government's allegation that the bank also helped launder $881 million in drug-trafficking proceeds for Mexican drug cartels.
As bad as those allegations were, prosecutors say they could not prove HSBC executives conspired to aid drug organizations or rogue nations. Breakdowns in security controls within the company had occurred gradually, over decades, with a motive of increasing profits rather than committing crimes, prosecutors said.
Prosecutors also expressed fear of "collateral consequences" _ that going further could have sunk a company that employs tens of thousands of people and is tied tightly to the economies of the roughly 80 countries where it does business.
Such a collapse has happened in white-collar prosecutions before, most notably in 2002 when the huge accounting firm Arthur Andersen was convicted for destroying Enron-related documents before the energy giant's collapse. It was forced to surrender its accounting license and to stop conducting public audits. Only after 85,000 people worldwide lost their jobs did the court case ultimately play out, with the Supreme Court overturning the conviction too late to save the doomed Chicago-based business

Picture source: Google Search.

sexta-feira, 14 de dezembro de 2012

Patriot Act can "obtain" data in Europe, researchers say

By ZACK WHITTAKER / CBS NEWS/ December 4, 2012, 3:59 PM

US-Dept-of-Homeland-Security-610x343LONDON - European data stored in the "cloud" could be acquired and inspected by U.S. law enforcement and intelligence agencies, despite Europe's strong data protection laws, university researchers have suggested.

The research paper, titled "Cloud Computing in Higher Education and Research Institutions and the USA Patriot Act," written by legal experts at the University of Amsterdam's Institute for Information Law, support previous reports that the anti-terror Patriot Act could be theoretically used by U.S. law enforcement to bypass strict European privacy laws to acquire citizen data within the European Union.

The Patriot Act, signed into law in 2001, granted some new powers to U.S. authorities, but it was mainly a "framework law" that amended and strengthened a variety of older laws, such as the Foreign Intelligence Services Act (FISA) and the Electronic Communications Privacy Act (ECPA).

"Most cloud providers, and certainly the market leaders, fall within the U.S. jurisdiction either because they are U.S. companies or conduct systematic business in the U.S.," Axel Arnbak, one of the authors of the research paper, told CBS News.

Play VIDEO

Obama signs extension of Patriot Act

"In particular, the Foreign Intelligence Surveillance Amendments (FISA) Act makes it easy for U.S. authorities to circumvent local government institutions and mandate direct and easy access to cloud data belonging to non-Americans living outside the U.S., with little or no transparency obligations for such practices -- not even the number of actual requests."

This holds true for requests targeted at non-U.S. individuals and for entire business records, he added.

Dutch vice-chair of the European Parliament's civil liberties committee Sophie in 't Veld welcomed the research, adding that it "provided further evidence" to support the theory.

She told CBS News, however, that the European Commission's proposals for new data protection rules will not solve the potential conflicts posed by third country law and the lengthy period of time in which EU laws become ratified, "would not be a reason to let the situation be for several years to come."

Information security, privacy and data protection lawyer Bryan Cunningham, who worked under both democratic and republican administrations, most recently as deputy legal advisor to former U.S. National Security Advisor Condoleezza Rice under President George W. Bush, told CBS News that this "important report" should "help correct a widespread post-9/11 misconception," that the Patriot Act and related legislation, "provided vast new powers for the U.S. government to gain access to sensitive communications and data of non-U.S. persons."

The research resurfaces questions about the security and sovereignty of citizen and government data in an ever-connected global and borderless online world. It also supports a ZDNET report that European data protection rules do not protect EU citizens' data against extra-territorial third country law, such as that of the United States.

Months after the research was published, Microsoft U.K. managing director Gordon Frazer was the first to publicly admit that the software giant could not guarantee that European citizen data stored in EU-based data centers would not leave the European Union under any circumstances, including under a Patriot Act request.

"Neither can any other company," Frazer noted.

Frazer's disclosure triggered outrage among politicians in the European Parliament. Subsequently a number of European member state governments began to question their own cloud service provisions, and in some cases banned U.S. providers from offering IT and computing services in their countries.

U.K.-based defense giant BAE Systems in the past year reneged on plans to adopt Microsoft's cloud-based services, citing fears that critical national defense secrets could land in U.S. hands.

The Dutch government is also investigating a potential conflict with third country law in regards to personal citizen passport data. Dutch social-liberal party D66raised questions in the country's parliament after suspicions arose that U.S. authorities could potentially access Dutch fingerprint and facial scans for passports because the North Holland-based company Morpho is owned by parent company Safran, which conducts systematic business in the U.S."

U.S. jurisdiction "extends to companies"

Cloud computing is the storing of documents, photos, music and files online. Governments, in possession of citizen data along with their own national security secrets, are increasingly utilizing cloud services for internal government communications, hosting documents and enabling the sharing of vast amounts of data between government departments.

Companies, schools and universities that wish to keep their data in their home jurisdiction -- governments, most of all -- the cloud poses a new set of risks.

Because most major cloud providers, such as Apple, Amazon, Google and Microsoft, are based in the U.S., the study was focused on the provisions under U.S. law, particularly in reference to the Patriot Act, signed in 2001, and the Foreign Surveillance Intelligence Act (FISA), originally signed into law in 1978 and last amended in 2008 by Congress.

Facebook is, basically, a giant cloud-based service, that can store your photos, videos, and other content, which is available from almost any device in the world.

/ AP PHOTO/TOBY TALBOT

The researchers explain that businesses, schools and universities located outside the United States -- including foreign governments -- which use cloud services offered by a company that conducts business in the U.S., could be forced by U.S. law enforcement to transfer data to U.S. territory for inspection by law enforcement agencies.

"In the U.S. legal framework, there is a legal doctrine called 'extra-territorial jurisdiction'. This implies that cloud providers operating anywhere in the EU, or anywhere in the world for that matter, have to comply with data requests from U.S. authorities as soon as they fall under U.S. laws," said Arnbak.

"These laws, including the Patriot Act, apply as soon as a cloud service conducts systematic business in the United States. It's a widely held misconception that data actually has to be stored on servers physically located in the U.S."

If they are forced to hand over EU-stored data back to the U.S., the company could be found in breach of EU law, even if is covered by both EU and U.S. legal jurisdictions.

"The key criterion in this respect is whether the cloud provider conducts systematic business in the United States, for example because it is based there or is a subsidiary of a U.S.-based company that controls the data in question," the researchers write.

Because non-U.S. residents are not protected from unwarranted searches under the Fourth Amendment, the researchers warn that this "gives the U.S. government entities concerned the statutory power to gather data on a large scale about non-U.S. citizens located abroad. And, legal protection under specific U.S. laws applies primarily to U.S. citizens and residents."

However, under FISA -- amended by the Patriot Act in October 2001, just a month after the September 11 terrorist attacks -- foreigners were not the only group immune to unwarranted searches, the Fourth Amendment notwithstanding.

"The Bush administration had intercepted the communications of Americans without obtaining a judicial warrant. The New York Times had carried reports on this from late 2005," the researchers write.

The Patriot Act also added powers to FISA which, "enables the FBI to request access to business records for an investigation into espionage and terrorism involving both U.S. and non-U.S. persons."

However, while the researchers warn that U.S. law extends beyond the reach of its borders, figures relating to requests do not exist in the public domain.

The common misconception, according to the researchers,  is that FISA gives the U.S. "unrestricted" or "unprecedented" access to data outside the country. FISA warrants do go through a "special court known as the Foreign Intelligence Surveillance Court (FISC)." The role of the court is to, "review the acquisition of intelligence information in this way if U.S. government entities require the assistance of electronic communication service providers for this purpose."

This keeps highly sensitive requests for foreign data, under the premise of keeping terrorism-scale investigations secret, out of the public eye. Because FISA courts hold national security secrets and details of ongoing terrorism investigations, the researchers say the data can't and shouldn't be published.

"Given the nature of intelligence work, it is not possible to gain insight into actual requests for information by the U.S. authorities, other than a description of the general legal framework," the researchers write.

EU citizens "at risk" from FISA, Patriot Act

While most Americans are aware of the Patriot Act and its wide-ranging provisions for domestic security, its role outside the U.S. border remains widely unknown.

While the researchers focused their efforts on the data protection of cloud users in higher education in the Netherlands, in speaking to CBS News, Arnbak warned that the concern over the ability of third countries accessing data stored in the European Union was not limited to the Netherlands, but that it "certainly" extends to the 27 member state bloc, and even outside the European Union.

"The risk of data access by U.S. authorities to cloud data is realistic, and should form an integral part in any decision making process to move data into the cloud," he said.

Because the Netherlands is a member of the European Union, the country's data protection laws originally stemmed from a wider directive from the European Commission.

Ratified in 1995, the EU Data Protection Directive must have been subsequently implemented into the legal systems of all member states by 1998. Therefore, every EU member state has the same foundation framework for data protection and privacy as each other, giving member state governments to expand upon the base principles and allowing data to freely flow across member states' borders, just as EU citizens have the right to do.

Play VIDEO

Audit Raps FBI On Privacy

"This concerns anyone with an interest in autonomy and control over access to data -- governments, businesses, non-profits and consumers alike. That's why the current debate on electronic heath records in The Netherlands is both fascinating and very serious. It appears that nobody has looked into this risk, before investing millions of taxpayers money to build these systems," Arnbak said.

He noted that businesses and governments alike, despite the additional costs, should consider in-house solutions instead of moving to the cloud. "If data is processed in-house, institutions will at the very least know of such investigations at an early stage."

Cunningham says, "There remains no credible way -- short, perhaps, of end-to-end encryption with the data provider holding the only key -- to assure confidentiality and security for cloud-stored data, whether stored in the United States or elsewhere."

"Governments and institutions seeking such privacy and security protections should, at least for now, stick to storing their own data or, perhaps, implementing national cloud solutions with robust privacy and security protections."

Because the U.S. government has "ample possibilities to request data from foreign (in this case Dutch) users of the cloud," the researchers claim, "it grants [authorities] to retrieve information on a large scale, including access to complete data sets."

"In other words, these agencies may obtain information not only about a student who could pose a threat to U.S. national security but also about a student who makes an appointment in good faith through email with a person suspected by U.S. authorities of drug trafficking," the researchers assert.

But this also extends outside the Netherlands to countries both in and outside the European Union. "From the U.S. legal perspective, Dutch users of cloud-based computing services therefore enjoy the same degree of [U.S.] constitutional protection as North Koreans," the study says.

However, the U.S. is not alone with laws reminiscent of FISA or the Patriot Act. The researchers note that such wide-ranging provisions able to access cloud-stored data outside of their respective jurisdictions are not limited to the U.S. And continue to say, "Other nation states, including the Netherlands, have comparable provisions in place for access to data in the context of law enforcement and national security."

For instance, the report notes the Dutch Intelligence and Security Services Act, which give the Dutch security and intelligence services, "the power to process the personal data of a wide range of persons." One of the sections of the law specifically carries FISA-like provisions in the Netherlands, which, "authorizes them to carry out, using a technical aid, targeted tapping, reception, recording and interception of any form of conversation, telecommunication or data transfer by means of an automated activity, irrespective of where this takes place."

Similarly, the Canadian Anti-Terrorism Act "replicates" much of the provisions in the U.S.' Patriot Act. Ontario's Information and Privacy Commissioner Ann Cavoukian said in a recent report that the Act's provisions are part of the normal data-sharing process between governments.

"You can outsource services, but you cannot outsource accountability," Cavoukian says.

"Legal provisions regulating data access for intelligence and law enforcement purposes will exist in all democracies," Arnbak says.

Cunningham warns that large, multinational, private cloud companies could pose a greater risk to private and sensitive citizen data than governments.

"Many intelligence services around the world, particularly in non-democratic countries, have no effective legal restrictions whatsoever, and are aggressively collecting massive amounts of sensitive personal, government, and commercially valuable information around the world," Cunningham says.

"Particularly with the rise of large, lightly-regulated cloud data storage providers, private, multinational companies actually may have more access to sensitive, personal data than national governments." Cunningham continues to say, such firms "assert far more authority to combine and data-mine such data for their own purposes than would the government be permitted under U.S. law."

"And, whether or not such companies would intend to misuse such data, they are far from immune from ill-motivated insiders and external hacking activities, by individuals, criminal groups, and foreign governments."

As a result, many countries can also theoretically acquire data stored by companies in another country without a mutual legal assistance request -- used by governments to request help in obtaining evidence from another jurisdiction to assist in investigations in another -- if the company is required by that country's domestic law to assist, in spite of any protection offered by a third country's legal system.

This could include cloud-stored medical data, financial information provided by banks, and business documents or corporate secrets, all the way down to an ordinary user's cloud-stored iTunes music collection or the cloud-stored photos taken on a recent vacation.

Because the U.S. is home to the global powerhouses that run major cloud services -- not limited to Apple, Amazon, Google and Microsoft -- the research increases the scope of relevance to cloud users. Conversely, the report notes that the company may not have to be headquartered in the U.S. to be supposedly susceptible to a data access request.

"If a company has a subsidiary or branch in the United States, it may be assumed that such jurisdiction exists, but jurisdiction may also exist in other more complex cases," the researchers assert.

Authorities, however, are more likely to be interested in the electronic communications between two or more persons, rather than a citizen's recent holiday photos.

In the case of cloud-stored email, which many businesses, schools, universities and ordinary citizens use, this can be hosted by an EU-based subsidiary of a U.S.-based parent company. U.S. residents enjoy not only Fourth Amendment protection from unwarranted searches, but also additional protection from the Electronic Communications Privacy Act (ECPA) and the Stored Communications Act (SCA), which regulates the U.S. government's access to electronically stored data, such as email, in criminal investigations.

Play VIDEO

Petraeus scandal developments

One of the strongest legal protections, the researchers note, under the SCA is the provision that requires U.S. authorities to request a search warrant from a judge, based on grounds of reasonable suspicion, if email is less than 180 days old. This law recently came to light after the recent resignation of Gen. David Petraeus, the former director of the Central Intelligence Agency. A warrant from only a federal prosecutor is required to acquire emails that are older than six months.

However, if U.S. federal authorities requested foreign citizen data, they would not receive protection under the Fourth Amendment, nor would the receive any protection from the ECPA or the SCA, because, "the position remains that if a person whose records have been requested is not a U.S. person and is not located in the United States, he cannot invoke the protection of the Fourth Amendment," the research states.

The academics warn that, while in some cases, contracts can be offered to cloud customers; these do not override judicial requests by third countries. "The possibility that foreign governments request information is a risk that cannot be eliminated by contractual guarantees."

Did EU laws ever protect against third country snooping?

The EU's Data Protection Directive 1995 states that EU personal data may only be transferred outside the 27 member state bloc if that country provides guarantees that the data will be given an adequate level of protection.

Data stored in the European Union freely flows to the U.S. so long as the company or government department receiving the data adheres to the EU's Safe Harbor Principles, which were set up between the U.S. government and the European Union after the EU data and privacy laws were first ratified in 1995. The rules help U.S. recipients of EU observe basis EU data protection rules in order to prevent data loss or accidental data disclosure by U.S. companies receiving EU data.

However, the Patriot Act, signed into law in 2001, granted some new powers to U.S. authorities, but it was mainly a 'framework law' that amended and strengthened a variety of older laws, such as FISA and ECPA. The 2001 Act has since been amended numerous times to extend its powers. FISA, which provides authorities to acquire cloud-stored data in foreign countries and jurisdictions, was first signed into law in 1978, and has also been amended numerous times to keep up to date with current technological trends.

While suggesting that the Patriot Act's bypassed the protection of European data by the EU Data Protection Directive, allowing data to be potentially transferred outside the EU via a U.S.-based company, one former U.S. government lawyer noted that the Patriot Act did not substantially change how the U.S. government acquires data for intelligence purposes.

ZDNET's report suggests that the Patriot Act's "negated" the protection of European data by the EU Data Protection Directive, allowing data to be potentially transferred outside the EU via a U.S.-based company.  Politicians in the European Union raised questions over laws that may affect their own nation's legal system.

Cunningham told CBS News that with appropriate judicial or other government procedures, "U.S. law enforcement and security authorities remain, as they were before the Patriot Act, able to lawfully collect both the substance of electronic communications and telephone toll, e-mail, and other business records, both of U.S. persons and those of other countries, without resort to mutual legal assistance or other international agreements and procedures."

"This is particularly true when such data is held by companies physically located in, or with substantial business connections to, the United States," he continues.

U.K., Netherlands raise concerns over cloud legal issues

There are already existing agreements and data-sharing arrangements between EU member states and non-member states, such as the U.S., the issues relating FISA and the Patriot Act notwithstanding. Without it, most Europeans would not even be allowed to step on an airplane bound for the U.S.

Mutual legal assistance (MLA) agreements exist between various nations, which conform with EU data protection and privacy laws, in order assist nations outside both within and outside the 27 member state bloc in criminal investigations. For instance, the U.S., Australia, or any other country with an MLA agreement with the Netherlands can request data on a Dutch citizen data, just as the Netherlands can in return.

Apple's cloud services allows you to access your documents from any Apple device or computer with an Internet connection.

/DONALD BELL/CNET

"If U.S. government agencies have no jurisdiction over an entity operating in the Netherlands, they may submit a request for mutual assistance under such agreements," the researchers state.

"But in the borderless cloud, in which activities are in the U.S., there is "no clear obligation under U.S. law for the U.S. government to rely on such agreements when seeking access to data on non-U.S. persons."

Also, passenger name record (PNR) data sharing agreements between the EU and Australia, Canada and the U.S., not only allow citizens to travel between those countries, but also help those authorities fight transnational crime.

PNR data includes personal and sensitive citizen data, such as their name, gender, date of birth and nationality. It can also include "racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership or concerning the health or sex life," according to the European Commission, but notes that PNR data "rarely contain sensitive data of this kind."

When the EU-U.S. PNR agreement came up for renewal, in 't Veld was appointed the "rapporteur," or the person chosen by the European Parliament to investigate the agreement. After many months of negotiations, with the previously debated EU-Australia PNR agreement set as an "acceptable" agreement, in her words, in 't Veld ultimately recommended that the European Parliament reject the EU-U.S. PNR deal citing privacy fears relating to the disclosure of EU citizen data to U.S. authorities.

The U.S.-EU PNR agreement passed with a significant minority opposing the deal, but by the she had distanced herself from the report that she recommended should be rejected.

"The U.S. may also use the data for other, less-explicitly defined purposes such as immigration and border controls," she warned in her findings.

"The decision of the European Parliament does not reflect my recommendation. Therefore I choose to distance myself from it." If the agreement was not signed, it may have meant "the visa privileges for European travellers to the U.S. fell," in 't Veld noted, or the disallowing of EU citizens to travel to the U.S.

Play VIDEO

Lawmakers On NSA Controversy

Beyond the European Parliament, other EU member states are warning their respective parliaments and governments that the reach of third country laws could extend beyond their reach as a result of the borderless "cloud."

The U.K. parliament recently outlined its plans to move to the cloud, but worries regarding the Patriot Act spurred on two opposition members of Parliament to question the proposals.

John Thurso, chair of the U.K. Parliament's Finance and Services Committee, suggested in a recent debate in the U.K.'s House of Commons discussing the cost-efficiency of Parliament, that all parliamentary members should "move to a more cloud-based system." (The full video can be found on the BBC's Democracy Live Web site.)

However, another politician interjected, who mentioned that committee members are currently using iPads, stated that they "cannot put information on the cloud on the basis that servers for Apple products are based in the U.S. and therefore covered by the Patriot Act."

Thurso retorted: "The committee is not yet engaged on the Patriot Act." Former minister under the previous Labour government Angela Eagle, who was responsible for the early planning of the 2011 census, also questioned Thurso to "ensure when we do get a cloud finally, its storage will be in the U.K."

In the Netherlands, the government is under increasing scrutiny over unrest surrounding the country's electronic patient records system.

The patient records are operated by a Dutch subsidiary of U.S. parent company CSC, though the data is stored on servers in the Netherlands. However, VZVZ director Edwin Velzel, whose company is behind the setting up of the system, told Dutch television earlier this month that unless CSC can give assurances that it is not subject to the Patriot Act, the contract will be withdrawn.

Arnbak highlighted possible problems with the Dutch passport system. He told CBS News in an email: "In order to obtain a passport, all Dutch citizens need to provide fingerprints to the government. Morpho, a company that falls under U.S. jurisdiction, was contracted to process these fingerprints, which are thus stored somewhere in the cloud and within reach of U.S. authorities under the Patriot and FISA Acts."

"When this hit the news in the Netherlands, it logically caused considerable social unrest," he said.

Dutch Home Affairs minister Liesbeth Spies said in a briefing to members of the Dutch parliament that she could not rule out U.S. authorities accessing Morpho's database of passport data.

In 't Veld told CBS News that the governments who have been confronted such issues "tend to deny the problem, or -- when they can no longer deny it -- just duck the issue by making vague promises about 'speaking to the U.S. authorities.'"

"Frankly, I wouldn't know what there is to discuss. The only relevant question is: do European and [member state] authorities feel responsible for enforcing EU law on EU territory, and protecting EU citizens, or do they not?"

Europe's next steps: Secure the European cloud

The potential conflicts between U.S. anti-terror laws and EU data protection law, as described by the researchers at the University of Amsterdam could be solved with the upcoming EU Data Protection Regulation, which was proposed by the European Commission in January.

Speaking in the European Parliament's upper house chamber earlier this year, EU Justice Commissioner Viviane Reding noted there was not enough clarity in the existing data protection and privacy laws, and that the final any international disputes regarding the impact of third country legislation on EU laws would be up to the International Court of Justice, the so-called "World Court," in The Hague.

Viviane Reding, EU Justice Commissioner, who is overseeing the new EU data protection laws.

/ THE COUNCIL OF THE EUROPEAN UNION

But, she said, she was confident that the draft Data Protection Regulation, published earlier this year in January, would "bring further legal clarity."

Some members of the European Union's upper house, the European Parliament remain skeptical that the new "one-size-fits-all" law will not offer sufficient protections against U.S. or any other third country law.

In 't Veld, who has been particularly vocal in the European Parliament regarding data protection and concerns of third country law impacting European citizens, told CBS News that the European Commission continues to deny the potential conflict between the two continents.

"I do not think it will lead to a change in policies in the short term. The problem is not that governments and the Commission are not aware of the problem. We have brought it to their attention ad nauseam. The real problem is they have no interest in addressing it."

In 't Veld noted in a 2011 letter to Reding that, "EU based companies are currently facing U.S. subpoenas under the Patriot Act." She added: "They are obliged to submit data stored in Europe to U.S. authorities, thereby probably violating EU laws." Because these firms have operations in the U.S., she described it as "very difficult" for them to refuse to comply with a U.S. subpoena.

"I really wonder if the authorities will be just as lax when they realize other countries can and will do the same -- China, for example. The passivity of Commission and [member state] governments sets a very bad precedent. They are failing their citizens."

A European Commission spokesperson told CBS News in an emailed statement: "The high standards which we give to our citizens must also be transferred when there is an exchange of data with third countries."

"We in the Commission take this question very seriously, because the Commission believes and supports the principle that, in international public law, a legal act which is enacted by a third country cannot be directly and automatically applied in the territory of the EU unless -- exceptionally -- Union law or Member State law explicitly recognises the facts of such an act in their respective jurisdiction."

The Commission also explained that existing legal channels -- such as mutual legal assistance requests -- must be used:

"No legal acts of a third country as such can legally overrule the relevant EU legislation or Member State legislation, and this includes data protection rules. Any processing of personal data in the EU has to respect the applicable EU data protection law. If, for example, a U.S. law enforcement authority requires information from companies operating in the European Union, whatever the nationality of those companies, they have to use existing channels of cooperation and mutual legal assistance agreements."

"This issue also applies when personal data are transferred by an EU company to a company in the U.S. and when the data are subsequently processed for law enforcement purposes."

Arnbak argues that a real solution to the concern over third country laws can only be found at an international legal and political stage.

"It is important to realize that government access to cloud data is not a data protection issue," Arnbak says. "Having to comply with a data access request from the government is not something that you can exclude yourself from in a legal contract: you either comply as a cloud provider, or you face prosecution."

"The fact that the important cloud providers of today will have to comply with U.S. legal requirements, while non-Americans living outside the U.S. cannot claim the legal protection that their domestic law provides for, constitutes a gap in legal protection that can only be solved by governments engaging with each other at the international level."

Arnbak resonated in 't Veld's concerns about the cloud. He said that the European Commission should be, "open and frank about the wide gap in legal protection for Europeans in the U.S. cloud and either demand that these concerns are addressed through an EU-U.S. approximation of laws, or stimulate alternatives that lower the dependency of European customers on U.S. entities."

Related Posts Plugin for WordPress, Blogger...