EUROPEAN CLOUD COMPUTING The European cloud as the solution for governments to be able to make use of cloud computing services without fearing unauthorized US disclosure Master Thesis Law and Technology Tilburg University Jort de Jong S142380 January 18th 2013 Prof. dr. R.E. Leenes A study requested by Stichting NLnet 1 European cloud computing The European cloud as the solution for governments to be able to make use of cloud computing without fearing unauthorized US disclosure 2 Table of contents 1. Introduction 4 1.1. Cloud computing 4 1.2. The problem 6 1.3. Research question 8 2. Applicable law 11 2.1. Privacy and data protection 11 2.2. Data Protection Directive 13 2.3. Scope and application of the Directive 14 2.4. Principles of the Directive 20 2.5. Cloud computing 22 2.6. Challenging US law 23 2.7. Access to data in the European Union 33 2.8. Conclusion 35 3. Towards a European Cloud 3.1. 37 Exclusive jurisdiction 37 3.1.1. International jurisdiction and its bases: a general introduction 37 3.1.2. The American view on jurisdiction and its bases 43 3.1.2.1. Territoriality 44 3.1.2.2. Personality 45 3.1.2.3. Other bases 47 3.1.2.4. Excluding the US 47 3.2. Mutual Legal Assistance Treaties 48 3.3. Conclusion 52 4. The European cloud and public procurement issues 4.1. European public procurement rules 54 54 4.1.1. Sources of European public procurement 55 4.1.2. The principles of European public procurement 57 4.1.3. The obligation to follow European public procurement rules 58 4.1.4. The procedures for selection 60 4.2. European procurement rules and the European cloud 62 4.3. WTO Government Procurement Agreement 67 4.4. Conclusion 68 5. The European cloud: the solution? 69 6. Conclusion 71 7. Bibliography 75 8. Appendix I: a selection of relevant sections of the United States Code 86 9. Appendix II: text on procurement law by R. Westerdijk 101 3 1.dIntroduction Cloud computing is hip, hot and happening. Almost everybody in this Western society is making use of it. Just think about your e-mail service: Microsoft’s Hotmail or Google’s Gmail. But also social media sites like Facebook, Linked-in, Twitter. Or what did you think about Google Docs or Dropbox? All these applications are examples of cloud computing, and there are a lot more to name. This thesis is about cloud computing. It is even more about the legal possibilities to create a ‘European cloud’. But before going into the depth of the central research question of this thesis, a short introduction to the general topic of cloud computing will be given. 1.1 Cloud computing This relatively new 1 method of offering services derived its name from the icon that is often used to indicate a network or the Internet. Cloud computing should thus be understood as using computers in a network.2 A more specific and often used working definition is given by the National Institute of Standards and Technology (NIST) of the United States, stating that cloud computing is: “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” 3 Although this definition will not bring universal happiness 4, it does address the main characteristics of cloud computing, stressing the fact that the offered services can be used in a flexible, efficient and readily-accessible manner. These characteristics make cloud computing rather different from for example traditional IT outsourcing arrangements, which typically involve negotiated contracts in which the service offered is narrowly specified and a specific set of 1 From a purely technological view point cloud computing is not new at all. It is based on the old principle of time sharing, which has been applied in many ways in the early days of computer technology when several end-users had to make use of large, expensive and scarce mainframes. 2 L. Ferreira Pires, ‘ Wat is Cloud computing?’, Computerrecht 2011/63. 3 National Institute of Standards and Technology, ‘The NIST Definition of Cloud Computing’, September 2011, NIST SP 800-145 published on line on: http://rszt.pmmk.pte.hu/uploads/8f/23/8f23a309550830fa62395163ecec6fd3/nist_SP800-145.pdf Last checked: April 2012. 4 Other definitions that give a clear view on the meaning of cloud computing can be found in for example the article ‘ Cursing the Cloud (or) Controlling the Cloud?’ by N. Ismail, Computer Law & Security Review 27/3, June 2011 p. 252; or in S. Bradshaw, C. Millard and I. Walden, ‘Contracts for Clouds: Comparison and Analysis of the Terms and Conditions of Cloud Computing Services’, Queen Mary University of London, School of Law, September 1st 2010, p. 3-7. 4 infrastructure (e.g. servers) will be set aside for the customer’s use. Cloud computing just distinguishes itself from that form of outsourcing by offering the possibility of rapidly and dynamically adjusting the quantity of IT resources to the fluctuating demand of the customer, leading to a pay-per-use system. 5 In regard to the offered services a distinction is generally made between three service models in which three parties, the cloud provider, application provider and consumer, are involved: software-as-a-service (SaaS), platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS). SaaS concerns the offer and use of applications through Internet (the cloud) like e-mail services (Hotmail) or office-like applications (Google Docs), PaaS offers the consumer the possibility to create and then use applications on the cloud (Google Apps) and IaaS holds the provision of the capability to the customer of fundamental computing resources where the consumer is able to deploy and run arbitrary software (Amazon EC2).6 7 Another common distinction that is made (also used by NIST in its definition paper) has to do with the accessibility of the cloud. The so called deployment models are characterized by the NIST as follows (in short): a private cloud when the infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers; a community cloud when the infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns; a public cloud when the infrastructure is provisioned for open use by the general public; and last a hybrid cloud when the infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability. 8 The possibilities of cloud computing in all its variety offer several advantages. Business companies can diminish the burden of buying, installing, maintaining and controlling IT-structures, by bringing their systems into the cloud. This makes cloud computing very cost-effective. Besides, because of the easy adjustment of the resources when needed, cloud computing is preeminently decent for companies that have to deal with high peaks in their IT-capacity. In that 5 S. Bradshaw, C. Millard and I. Walden, ‘Contracts for Clouds: Comparison and Analysis of the Terms and Conditions of Cloud Computing Services’, Queen Mary University of London, School of Law, September 1st 2010. 6 See note 3. 7 See note 2 . 8 See note 3. 5 perspective, cloud computing is often seen as an important element of greencomputing, the solution for the increase of the use of energy (and thus the decrease of CO2 emissions). 9 The above mentioned benefits make cloud computing a trending topic in the field of IT today. This is not only shown by the fact that the on line search engine Google gives 238 million hits in less than two tenths of a second when the words ‘cloud computing’ are given, but comes clear by just looking at other mere facts. To name just a few: Microsoft did spend 90 % of its total budget for Research & Design in 2011 on cloud computing10, AMD’s global cloud computing study shows that 70 % of organizations worldwide are either using or evaluating cloud computing today already of which percentage 63 % estimates the worth of its storage of data in the cloud over $250,000 11 and last (but not least) a recently published IBM study subscribing aforementioned figures, states that the number of enterprises turning to cloud computing to revamp existing business models will more than double in the next three years, as business leaders move to capitalize on the rapid availability of data and the growing popularity of social media 12. In the Netherlands, there even is a television program broadcasted completely devoted to the upcoming phenomenon, trying to give businesses insight into the (dis)advantages of using ‘the cloud’. 13 1.1. The problem Cloud computing in its rise is however not undisputed. Several challenges make that one should be careful when using cloud computing. In particular safety and privacy issues deserve our attention, as with the outsourcing of the processing/storage of data, the cloud provider has the possibility to look into or even manipulate the information. Also the accessibility of the cloud (and the data stored inside) for third parties (other than the cloud provider and the consumer) should be taken into account. In this perspective the physical location of the data is also of importance, as it is part of the idea of cloud computing that data is stored at a central place, or even moved 9 See note 2. 10 http://www.forbes.com/sites/kevinjackson/2011/04/19/cloud-to-command-90-of-microsofts-rd-budget/ Last checked: April 2012. 11 http://blogs.amd.com/work/2011/05/31/mind-the-gap-%E2%80%93-the-rise-of-cloud-computing/ Last checked: April 2012. For an overview of the inforgraphics see: http://blogs.amd.com/work/amd-2011-globalcloud-computing-adoption-attitudes-and-approaches-study-infographics/ Last checked: April 2012. 12 IBM Institue for Business Values, ‘ The power of cloud; Driving business model innovation’, February 2012, published on line on: http://public.dhe.ibm.com/common/ssi/ecm/en/gbe03470usen/GBE03470USEN.PDF Last checed: April 2012. 13 ‘It-next’, broadcasted on RTL Z each Saturday in the beginning of 2012. See the website: http://www.rtl.nl/programma/itnext/home/. Last checked: December 2012. 6 between several servers, often not even close to the geographical location of the user, who does not have any control over the position of the data once brought into the cloud. 14 Besides, most cloud providers are originally American, make use of storage servers on American soil and thus have to obey US laws. Questions are raised whether the use of cloud computing is allowed according to the laws of the European Union regarding data protection when personal data are concerned 15. Specifically in case of the use of cloud computing by governmental bodies which process highly confidential data (of citizens), it is of great importance that the information in the cloud is kept safe (i.e. in accordance with data protection rules) and only accessible for entitled parties. In regard to this matter of data protection should be noticed that it is presumed that the United States of America (USA) have a less strict regime regarding privacy and data protection than the European Union. Besides, since the ‘war on terror’ has started (after the attacks on the World Trade Center in New York on 9/11) the USA have adopted several laws which should help governmental bodies (intelligence agencies) to prevent terrorists attacks. The USA PATRIOT ACT 16 (which is an acronym for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism) can be considered as the most influential and thus the most important one. This act gives far reaching authorization for all kinds of methods used for detecting and preventing acts of terrorism, and seriously constrains the constitutionally embodied right of judicial review. 17 In Dutch parliament (and in similar cases in Denmark and Norway18) a discussion is going on whether or not cloud computing should be an option for governmental bodies, when it is clearly possible that the US government will have instant access to the (confidential) data stored on line on the base of the USA PATRIOT Act. 19 This is not only a problematic situation for governments, 14 See note 2. 15 Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. 16 Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act), Public Law 107-56, October 26th 2001. 17 P.L. Bal, ‘De USA Patriot Act I en II; Ongekende uitbreiding van bevoegdheden in de strijd tegen het terrorisme’, Strafblad, 2004, p. 279. 18 A. de Haes, ‘Noorse privacywaakhond verbiedt Google Apps’, 26 januari 2012, published on: webwereld.nl/nieuws/109323/noorse-privacywaakhond-verbiedt-google-apps.html Last checked: April 2012. 19 R. Schoenmaker, ‘Minister weet niet waar Nederlandse data blijft’, 10 september 2011, published on: http://webwereld.nl/nieuws/107879/minister-weet-niet-waar-nederlandse-data-blijft.html and R. Schoenmaker, ‘Uitsluiting Microsoft bij aanbesteding overheid’, 14 september 2011 published on: http://webwereld.nl/nieuws/107924/uitsluiting-microsoft-bij-aanbestedingen-overheid.html and R. 7 but also for (American) cloud providers. It is presumed that these last ones will often have to obey US laws and therefore are obliged to share cloud information on demand of the American government without notifying the consumer (which could for example be a European government), but probably will (as they (have to) comply with US law) infringe European Union privacy and data protection laws. 20 1.3 Research question The Dutch NLnet Foundation 21, which has been financially supporting organizations and people that contribute to an open information society since 1997 (in Dutch: Stichting NLnet), has also raised questions concerning the use of cloud computing by (semi-)governmental bodies in regard to the possibilities of the American government to peek into the stored data. The NLnet Foundation is looking for a solution which makes it possible for (semi-)governmental bodies to make use of the advantages of cloud computing without the risk of losing (highly) confidential data to third parties, in particular foreign governments (like the USA). The foundation came up with an initiative to create within the existing infrastructure a purely ‘European cloud’, which means as much as that the cloud would be under European jurisdiction only (so just laws of the (Member States of the) European Union (EU) do apply). This way there would be no problem for cloud service provider complying to European privacy and data protection rules and consequently there would be no risk that the American government could search the stored data (without notification). Such a European cloud would be technically possible. The only question left however deals with the legal possibilities of creating and then using such a European cloud. The foundation has addressed me to do a research concerning this question. This thesis is the result of the research and aims at giving an answer to the question Is it legally possible to provide a purely European cloud service, meaning that only European authorities do have jurisdiction and solely European rules apply, and subsequently is it legally permissible that European (semi-)governments will make use of merely this European cloud (so beforehand excluding all other (non-purely-European) cloud providers)? Schoenmaker, ‘Geen extra eisen tegen amerikaans datagraaien’, 17 september 2011 published on: http://webwereld.nl/nieuws/107960/-geen-extra-eisen-tegen-amerikaans-datagraaien-.htmll. Last checked: April 2012. 20 R. Schoenmaker, ‘Kabinet moet einde maken aan datagraaien VS’, 2 februari 2012, published on: webwereld.nl/nieuws/109390/-kabinet-moet-einde-maken-aan-datagraaien-vs-.html. Last checked: April 2012. 21 www.nlnet.nl. 8 It is important to stress the fact that the mentioned European cloud service (and its provider) will only and exclusively be under the jurisdiction of the European Union and its Member States, and thus will have nothing to do with other than EU jurisdictions. Non-purely European cloud providers then are providers which do not or not solely fall under EU jurisdiction as described. I remark at this point already, that the NLnet Foundation aims at creating a cloud computing service by making use of the existing IT-infrastructure. The possibility of governments setting up their own private cloud within their network (by adding complete server centers to their internal network), is therefore excluded. This way of creating a ‘government cloud’ does hamper the essentials of the original idea of cloud computing (which is mainly an outsourcing business) too much. It is for example questionable whether it is cost-efficient when governments have to purchase the actual hard ware to the extent of their maximum needed capacity while most of the time the maximum capacity is not needed. So the focus is on outsourcing, making use of cloud computing services which are not exclusively accessible for that government. Nonetheless, taking into account the requirements as discussed before, it could be the outcome that the most ‘true’ form of a cloud service (the public cloud), which might also be economically the most advantageous, is not attainable. Besides, another deployment model (like the private cloud) is not necessarily economically less advantageous. That depends (inter alia) on the use of the cloud computing services and the steadiness of the needed capacity (when there is very little or no fluctuation, on-demand adjustment of resources is not required). It is however beyond the scope of this thesis to determine which deployment model of cloud computing services suits governments best, neither shall I discuss the question whether the use of cloud computing services by governments is at all desirable (taking into account other relevant (risk) factors). To answer the proposed research question, four sub questions have been formulated. Sub question 1: What laws of privacy and data protection do apply on cloud services which are offered and used within the European Union and how are these laws challenged by foreign, more specific, American laws? This first question to be answered under chapter 2 ‘The conflict of applicable laws: EU vs. US’, should give an overview of the applicable law on provided cloud services, in particular the rules regarding data protection. Furthermore, the question aims at getting an insight in the current situation and the problem, namely that is presumed that the American government claims to have jurisdiction over (the information in) the cloud and therefore would have the possibility to see into the data on first demand on the base of the USA PATRIOT Act, while the (legislation in the 9 countries of the) European Union and its member states would not allow American access to the data, but could not prevent it either (like stated in this Introduction earlier). Sub question 2: How can the jurisdiction under which a cloud service (and the data stored inside the cloud) falls, be limited to the European Union and its Member States and can this legally be done? This second question builds on the first question and should lead to an answer concerning the (im)possibility to exclude the jurisdiction of other (foreign) countries but the European Union and its Member States. In this perspective attention will be paid to international legal aspects concerning jurisdiction. This matter will be dealt with in chapter 3 ‘Towards a European cloud’. Sub question 3: Is it possible that (semi-)governments make use of cloud computing on such terms and conditions that only purely European clouds services are contracted? This sub question deals with the rules on (public) procurement, more specific the (im)possibilities that procurement law offers to exclude certain cloud providers in advance, just because they cannot guarantee the exclusion of the jurisdiction of the USA (in other words: because they are not purely European). The answer to sub question 3 can be found under chapter 4 ‘The European cloud and public procurement issues’. The fifth chapter ‘The European cloud: the solution?’ will then shortly review the idea of a European cloud in a broader (non-legal) perspective. Moreover a final answer to the research question will be given under chapter 6 ‘Conclusion’. 10 2. The conflict of applicable laws: EU vs. US As put forward in the introduction, several laws of different countries (can) apply on information which is stored in a cloud. These diverse legal regimes can conflict with each other. The borderless nature of the internet makes it hard to determine which rules do have effect. In this chapter I will discuss how privacy and data protection rules concern cloud computing. In doing so, I will answer the question which data protection laws do apply when cloud computing services are used by a European legal subject (be it a citizen, business company or (semi-)governmental body), what these laws look like, and how they can be challenged by foreign laws. In this regard I stress the fact that, due to the fact that cloud computing providers are mainly established in the US, I will only discuss the United States of America and its most relevant laws (especially the USA PATRIOT Act) as foreign country / law. 2.1. Privacy and data protection Back in 1890, Samuel Warren and Louis Brandeis were the first to address a ‘right to be left alone’ in their article ‘The right to privacy’. 22 Since then, the world has changed as technology evolved and so did the term privacy itself, although the basic concept of privacy is still valid 23. These days one could not imagine our information society without the existence of a privacy right, being one of the fundamental rights closely related to one’s personal freedom. Privacy however, is a rather general term which consists of several rights. The most obvious of these would be the right to respect for the integrity of the human body, but also the right to determine with whom one holds relationships (which also means the right to be left alone) and the protection of the space of living (like a home) are covered by this term. Finally, from the 1960’s on, as a result of the combination of two principal and common elements of postindustrial society, bureaucracy and information technology, which has created both quantitative and qualitative changes in the ways that public and private organizations treat personal information, the need for “information privacy” or “data protection”, as a way to control and restrict the implications of these changes for the personal privacy of citizens, has quickly increased. 24 Nowadays, taken into account that the rapid expansion of the Internet has created a world in which data collection and storage has become so inexpensive and easy 25 that it forms a business market of its own with 22 S. Warren and L. Brandeis, ‘The Right to Privacy’, Harvard Law Review, volume 4, December 15th 1890. 23 N. Robbinson and others, ‘Review of the European Data Protection Directive’, Cambridge: RAND 2009, p. 1. This research was sponsored by the Information Commissioner’s Office. 24 C. Bennett, Regulating privacy; Data protection and public policy in Europe and the United States, Cornell University Press 1992, p. 2-3. 11 companies gaining enormous value 26, data protection is undisputedly seen as one of the major components of privacy. The right to privacy has taken a prominent position in the European legal systems and can be found in both international and national laws. The European Convention on Human Rights (ECHR) holds in article 8 the right to respect of one’s private and family life, home and communications. 27 Although all member states of the European Union are party to the ECHR, they are, since the ratification of the Lisbon Treaty, also bound by the Charter of Fundamental Rights of the European Union (the Charter), which states in article 7 in almost the same wording as the ECHR a right to respect of one’s privacy. In article 8 however, the Charter even gives a specific provision regarding the protection of personal data.28 These general provisions of the Charter concerning the right to privacy and data protection stand at the base of a specific legal framework consisting of regulations from the EU. The most important piece of regulation in this regard, is the general directive concerning the processing of personal data (in short the Data Protection Directive or the Directive) 29. This Directive gives a detailed regulation about the lawful processing of personal data in general, a regulation about special categories of processing of personal data, and rules regarding the transfer of personal data to other (non-EU) countries. In doing so, the directive tries to achieve fair and equitable uses of information. 30 It should be noted that, although the Data Protection Directive may be the most important piece of regulation for the subject of this thesis, other European regulations exists which do concern the processing of data. In this regard the Directive 2002/58 EC concerning privacy and the processing of personal data in electronic communications (E-privacy Directive) 31 and the 25 J. Strauss, K.S. Rogerson, ‘Policies for online privacy in the United States and the European Union’, Telematics and Informatics 19 (2002), p. 174-175. 26 For example Facebook, having an estimated worth of over 100 billion US Dolllar according to the value of its shares ($38) when debuting on the New York Stock Exchange. Even though this value was too optimistic (as it instantly decreased), Facebook still has a major value (far more than other big and experienced players like HP or DELL). See http://finance.yahoo.com/news/10-huge-companies-facebooknow-210700763.html. Last checked October 2012. 27 See for the ECHR: http://www.echr.coe.int/NR/rdonlyres/D5CC24A7-DC13-4318-B4575C9014916D7A/0/CONVENTION_ENG_WEB.pdf. Last checked: May 2012. 28 See for the Charter: http://eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:C:2010:083:0389:0403:EN:PDF (in English). 29 Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. 30 See note 25, p. 177. 12 Directive 2006/24 EC concerning data retention 32, should be mentioned. I will however not fully review these Directives as they are (as a whole) of less relevance in the light of this thesis. Of course I will refer to them when needful. Last but not least, the Dutch constitution provides a right to protection of the private life of individuals under article 10 33. Furthermore the Dutch legislator implemented the EU Directive on privacy and data protection into Dutch law resulting in the ‘Protection of Personal Data Act’ 34. 2.2. Data Protection Directive In 1995 the EU truly entered the field of data protection by adopting the Data Protection Directive which is based on earlier initiatives like the ‘Guidelines on the Protection of Privacy and Transborder flows of Personal Data’ 35 which were adopted by the Organization for Economic Cooperation and development (OECD) in 1980, the ‘Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data’ 36 adopted by de Council of Europe (CoE) in 1981, and the in 1990 published ‘Guidelines for the Regulation of Computerized Personal Data Files’ 37 of the United Nations (UN). 38 The Directive, which is currently subject of a revision as a part of which the EU Commission has proposed a comprehensive reform which ultimately has to lead to a single Regulation 39, is a great 31 Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). 32 Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data genereated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC. 33 See for (more information about) the Dutch Constitution www.denederlandsegrondwet.nl (in Dutch). 34 Wet van 6 juli 2000, houdende regels inzake de bescherming van persoonsgegevens (Wet Bescherming Persoonsgegevens). 35 OECD Coucil, Guidelines on the Protection of Privacy and Trans-border flows of Personal Data, 23 September 1980, available at: http://www.oecd.org/document/18/0,3746,en_2649_34223_1815186_1_1_1_1,00.html Last checked: May 2012. 36 Coucil of Europe, Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data, 28 January 1981, available at: http://conventions.coe.int/Treaty/Commun/QueVoulezVous.asp?NT=108&CL=ENG Last checked: May 2012. 37 UN General Assembly, Guidelines for the Regulation of Computerized Personal Data Files, 14 December 1990, available at: http://www.unhcr.org/refworld/docid/3ddcafaac.htm Last checked: May 2012. 38 M. Birnhack, ‘The EU Data Protection Directive: an engine of a global regime’, Computer Law & Security Report 24 (2008), p.511. 13 attempt to serve the (conflicting) goals of protecting data subjects and facilitating free trade especially within the internal market of the EU. 40 However, instead of presenting these goals as conflicting, the Directive ties them together as is made clear in recitals 3 and 7 which state in short that personal data can (and should) only flow freely across Member States when the fundamental rights of individuals will be safeguarded within all these Member States. It is therefore not surprising that the first article of the Directive holds the obligation of the Member States to protect the privacy of individuals with respect to the processing of personal data, directly followed by the prohibition of the Member States to restrict or prohibit the flow of data between Member States for reasons connected with the level of protection of such data. 2.3 Scope and application of the Directive As the Directive only offers protection to the processing of personal data (article 3), these terms are defined in article 2. ‘Personal data’ is clarified as any information relating to an identified or identifiable natural person i.e. data subject. 41 Further clarification can be derived from the opinions of the Working Party on the Protection of Individuals with regard to Processing of Personal Data. This so called Article 29 Working Party (29 WP) is constituted by article 29 of the Directive and has primarily the task to advise the European Commission about uniform application, interpretation and enactment of the Directive, and in general about the level of data protection within the EU (article 30 of the Directive). The Article 29 WP published a detailed document about the definition of ‘personal data’, which shows that it is not always obvious whether or not in some cases information should be declared as information which (possibly) identifies a natural person.42 On the basis of the mentioned document, the conclusion can be drawn that the 29 WP favors a broad definition of ‘personal data’, which makes many data personal data. Just to name a few: personal names, e-mail addresses, ip-adresses, identification numbers, unique combinations of 39 As this Regulation is only a proposal so far, the Directive will be subject of this thesis. Besides, the key principles as known in the Directive will not be subject to change, although some rights will be strengthened. More information about the proposed Regulation can be found on: http://ec.europa.eu/justice/newsroom/data-protection/news/120125_en.htm (lasted checked: May 2012). 40 Which is shown by the recitals of the Directive, referring to both the right to privacy (recitals 2, 9-11, 68) and economic and social progress and trade expansion (recitals 2, 56). 41 Artilcle 2 under a of the Directive. 42 Article 29 Data Protection Working Party, ‘Opinion 4/2007 on the concept of personal data’. 01248/07/EN, WP 136. Accessible via: http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2007/wp136_en.pdf. Last checked: June 2012. 14 data like address, age and profession, and even cookies. 43 In case of European (semi-) governmental bodies using cloud computing services, it is, due to this broad definition, inevitable that personal data (concerning employees, officials, citizens etc.) is stored in the cloud. ‘Processing’ of personal data is another broad term meaning any operation or set of operations which is performed on personal data, whether or not by automatic means such as collection, recording, organization, storage, adoption, alteration, retrieval, consultation etc, ex article 2 under b of the Directive. It is evident that storing personal data in a cloud is covered by this definition. Because of its legal status, the provisions in the Directive do not have any direct legal effect. The Member States therefore need to implement these laws into national legislation. In the Netherlands for example, this has led to the Protection of Personal Data Act. 44 Although the Directive, which gives a framework of minimum harmonization, makes sure that the national legislation of all Member States provides an adequate level of data protection, a certain margin of appreciation is left to the Member States to create the specific conditions of its data protection regime. This off course leads to differences between the Member States. As the Directive only applies through national laws, and these laws can differ per Member State (although they are harmonized at a basic level), the question arises, particularly in case of transborder data processing (which is mostly the case when using cloud computing services), which (national) legislation is applicable on the processing of personal data. The Directive gives the answer to this question in article 4 which is titled ‘National law applicable’. This article however, does not only give a regulation about the applicable (national) data protection legislation within the internal market of the EU (being a mere choice of law provision, i.e. a provision limited to the question of which EU Member State data protection law applies to a particular act of data processing), but is also claimed to have extraterritorial effect: applicability of a certain Member State’s law to non-EU parties, expanding the jurisdiction of that Member State. 45 43 These examples are drawn from the whitepaper ‘De wolk in het onderwijs; privacy aspecten bij cloud computing services’, a research conducted by TILT (Tilburg Institute for Law, Technology, and Society) commissioned by SURFnet/Kennisnet, p. 17. 44 See note 34. 45 C. Kuner, ‘Data Protection Law and International Jurisdiction on the Internet (Part 1)’, International Journal of Law and Information Technology Vol. 18, No. 2 (Oxford University Press 2010), published 11 March 2010, p. 180; but also: Article 29 Data Protection Working Party, ‘Opinion 8/2010 on applicable law’ 0836-02/10/EN WP 179. Accessible via: http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/wp179_en.pdf. 15 The provision states that the data protection laws of the Member State apply, in which the controller of the data is physically (‘the processing is carried out in the context of activities of an establishment’ article 4 under 1a) or legally (‘the controller is not established on the Member State’s territory, but in a place where its national law applies by virtue of international public law’ article 4 under 1b) located, or, if the controller is located outside the EU, in which the equipment, automated or otherwise, is situated which is used by the controller for the purpose of processing the data (article 4 under 1c). The place of processing (i.e. the place where the data is stored) is according to the provision not of relevance, nor is the nationality or the place of habitual residence of the data subject. It is the location of the establishment of the controller which determines the applicability of the law – or if the controller does not reside within the EU, the location of the equipment used by the controller for the purpose of processing the data. 46 This clear connection between controller and applicable law should be a guarantee of effectiveness and enforceability, especially in a context in which it is hardly possible to determine the exact location of a file, as will often be the case with cloud computing.47 The big question then is, who is the ‘controller’ of the data? Article 2 under d of the Directive defines the term controller as the natural or legal person, public authority, agency or any other body which alone or jointly with others determines the purposes and means of the processing of personal data. The Article 29 WP has clarified this definition in one of its opinions, stating that the determination of the purpose of the processing is a key issue which is always done by the controller. The determination of the means can however be delegated (to a certain extent) to the data processor as it concerns technical or organizational aspects like which hardware or software shall be used. Other issues are inherently and traditionally reserved to the determination of the controller such as which data shall be processed, how long they shall be processed, and who shall have access to them. 48 The opinion further states that, as is laid down in the Directive, the controller is responsible for the correct processing of the data and needs to ensure that the obligations which are laid down in the data protection legislation (the Directive) are fulfilled. It is however possible that two or more parties need be regarded as controller, although (depending on the actual influence and input) 46 We will soon find out that the E-privacy Directive does concern an essential issue in this regard, namely the use of cookies. I will discuss this later. 47 Article 29 Data Protection Working Party, ‘Opinion 8/2010 on applicable law’ 0836-02/10/EN WP 179. Accessible via: http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/wp179_en.pdf. Last checked: June 2012. 48 Article 29 Data Protection Working Party, ‘Opinion 1/2010 on the concepts of “controller” and “processor”’ 00264/10/EN WP 169. Accessible via: http://ec.europa.eu/justice/policies/privacy/docs/wpdocs/2010/wp169_en.pdf. Last checked: June 2012. 16 the extent of liability can differ. When another party (legally independent of the controller) only processes the personal data on behalf of the controller, it is recognized as a mere ‘processor’ 49 (which is defined as such in article 2 under e of the Directive). Although the distinction between ‘controller’ and ‘processor’ seems fairly clear at first sight, it can be rather difficult to distinguish them in case of cloud computing. One might think it is obvious that the ‘customer’/end-user (being an individual or a business (group)/governmental body) is the controller of the data and the cloud service provider a mere processor. Nevertheless, it is no exception if the cloud service provider determines certain means and sometimes even the purposes of the processing and thus acting as a controller. In the view of the nature of the cloud services, which may be made clear in a contract, it should be determined case-by-case what role is played, as that role implies which duties, obligations and relevant liabilities are carried. 5051 In its opinion of late 2010 which is an elaboration on the applicable law, the 29 WP also gave its view on the interpretation of article 4 in regard to the question what an ‘establishment’ 52 of the controller (article 4 under 1a) means. Uncertainty had arisen whether such an establishment had to be understood as a head quarters only (narrow interpretation), or just any establishment (broad interpretation).53 The 29 WP ended this discussion by confirming the broad interpretation, explicitly acknowledging the fact that it could be possible that the laws of different Member States apply at the same time. The purpose of this broad scope of application is primarily to ensure that individuals are not deprived of the protection to which they are entitled under the Directive, and, at the same time, to prevent circumvention of the law. The 29 WP however, does acknowledge the advantages of a ‘country of origin principle’, which means that all establishments of a controller within the EU are subject to the legislation of the Member State in which the head quarters is established, but states that this principle can only be followed when all national laws are truly harmonized including harmonization of safety obligations. 54 49 The processor has, according to article 17 of the Directive, also some obligations regarding safety measures. 50 P. Balboni, Data Protection and Data Security Issues Related to Cloud Computing in the EU, Tilburg University Legal Studies Working Paper Series, no. 022/2010, August 2010, p. 6-7. 51 The difficulty of determining the roles played by different parties in a cloud computing scenario is also clearly illustrated in: R. Leenes, ‘Who Controls the Cloud?’, IDP. Revista de Internet, Derecho y Política no. 11 (2010), published December 2010. 52 The definition of the term ‘establishment’ has to be determined in conformity with the case law of the European Court of Justice which gave a definition already in Case C-221/89 Factorame (1991) ECR 13905. 53 This discussion did also take place in the Netherlands and was clearly described by C. Cuijpers in ‘Toepasselijk privacyrecht in de wolk’, Computerrecht 2011/65 (in Dutch). 54 See note 42. 17 Like stated earlier, the Directive can also be applicable on the processing of personal data when the controller is not (physically nor legally) located in the EU. Article 4 under 1c gives a regulation which extends the scope of the Directive outside the EU when equipment is used for gathering/processing personal data which is located on EU territory (meaning on territory of EU Member States). Such equipment is quickly associated with computers, servers, inquiries etc. The interpretation of the 29 WP55 does however cover a broader collection of tools. All human and technical intermediaries seem to be concerned, including cookies56 and java scripts.57 This broad scope of the EU Data Protection Directive has not been undisputed, in particular in cases concerning the Internet. Christopher Kuner points out that for example US government officials have claimed that European data protection law has extraterritorial effect, and business groups have complained about assertions of jurisdiction under the EU Directive, leading to disputes with European data protection authorities (DPAs, article 28 of the Directive) about the jurisdictional scope of EU data protection law. 58 Bernhard Maier points out that article 4 of the Directive is technically just a choice of law provision instead of one allocating jurisdiction to national courts and DPAs. In his view, article 28 of the directive, more precisely article 28 under 6, does the latter, determining that each DPA (each country has his own) is to have jurisdiction over data processing occurring on its own territory, and that there is no authority for a DPA to exercise jurisdiction except on its own territory. Furthermore, DPAs are expected to cooperate with one another to the extent necessary for the performance of their duties. In doing so, they prevent the simultaneous exposure to multiple jurisdiction, as well as they emphasize cooperation to promote trust, confidence and of course effective enforcement. 59 Kuner however, refers to article 4 of the Directive as the example of the close interface between jurisdiction and choice of law. According to this author, article 28 under 6 seems to be as much 55 Article 29 Data Protection Working Party, ‘Working document on determining the international application of EU data protection law to personal data processing on the Internet by non-EU based web sites’ WP 56, 5035/01/EN/Final, adopted on 30 May 2002. More recently: Article 29 Data Protection Working Party, ‘Opinion 1/2008 on data protection issues related to search engines’, WP 148, 00737/EN, adopted on 4 April 2008. 56 The view of the Article 29 WP corresponds with the regulation of cookies and spyware as laid down in articles 5 (3) and 13 of the E-privacy Directive. 57 C. Cuijpers in ‘Toepasselijk privacyrecht in de wolk’, Computerrecht 2011/65. 58 C. Kuner, ‘Data Protection Law and International Jurisdiction on the Internet (Part 1), International Journal of Law and Information Technology, vol. 18 no.2, Oxford University Press 2010, published on 11 March 2010, p. 177. 59 B. Maier, ‘How Has the Law Attempted to Tackle the Borderless Nature of the Internet?’, International Journal of Law and Information Technology, Vol. 18 no. 2, Oxford University Press 2010, published 15 March 2010, p. 158. 18 about allocating the jurisdiction of the EU DPAs among themselves as it is about determining what the proper boundaries of international jurisdiction under the Directive be. He states furthermore that DPAs often (incorrectly) equate jurisdiction and choice of law, but concludes that in the context of data protection law, both rules may serve much the same purpose.60 As article 4 does set up a structure for determining whether a Member State’s law applies, Maier agrees that it is therefore relevant to the discussion of adjudicative competence. 61 Maier criticizes the expansive interpretation of the underlying concepts (‘personal data’, ‘controller’, ‘equipment’ etc.) of data protection law, which have the effect of making the whole Internet subject to EU law. He underlines the issue of ‘regulatory overreaching’. Quoting Bygrave 62, Maier states that such a practice comprises situations ‘in which rules are expressed so generally and non-discriminatingly that they apply prima facie to a large range of activities without having much of a realistic chance of being enforced’. To make things more concrete, Maier points out that ultimately, the result of cookies being considered ‘equipment’ is that any entity operating online and using cookies will, regardless of the location of its establishment, (also) be subject to European data protection law, which will lead to problems like unforeseeability, unpredictability and liability under a multitude of legal systems. 63 On the other hand Maier acknowledges that the broad interpretation (and thus the wide scope) of the Directive enables the Member States to optimally protect their individuals. 64 This strong protective element to data protection law, which derives from its origins in human rights law and which is referred to by the 29 WP in its opinion on the applicability of the Directive 65, is also seen by Kuner as the main reason why courts and DPAs are often concerned with ensuring that personal data are not deprived of the protection of their national law (even) once they are transferred outside their territory. He notes that, while enforcement actions can usually not be taken against the entity processing the data once they have been transferred to a foreign country, DPAs may assert that the processing abroad should be conducted under its own law (choice of law), even if there is little or no chance of that law being enforced (jurisdiction). In other words: by declaring EU law applicable to the processing of data transferred, the assertion of regulatory 60 See note 58, p. 179-180 61 See note 59, p. 159. 62 L. Bygrave, ‘European Data Portection - Determining Applicable Law Pursuant to European Data Protection Legislation’, 2002 16 C.L.S.R., p. 255. 63 See note 59, p. 161. 64 See note 59, p. 162. 65 Article 29 Data Protection Working Party, ‘Working document on determining the international application of EU data protection law to personal data processing on the Internet by non-EU based web sites’ WP 56, 5035/01/EN/Final, adopted on 30 May 2002, p. 3-5. 19 authority over these data is allowed without having the entity processing be subject to any legal power of the EU Member States. So instead of asserting jurisdiction, declaring its own law applicable to the processing of data, is used to protect the individuals of a EU Member State against privacy infringements 66, albeit of a more symbolic character. Chapter 3 will provide more insight in these jurisdictional issues. 2.4 Principles of the Directive If it is clear that the Directive does apply, it gives certain basic rights to the data subject with respect to his or her personal data, while requiring data controllers (and to a lesser extent processors) to follow rules and restrictions with respect to the processing of these personal data. The principles with which controllers must comply when processing personal data, are laid down in article 6 of the Directive and require that the data must be: - processed fairly and lawfully; - collected for specified, explicit and legitimate purposes and not further processed in a way incompatible with those purposes; - adequate, relevant and not excessive in relation to the purposes for which they are collected and/or further processed; - accurate and, where necessary, kept up to date; - kept in a form which permits identification of data subjects for no longer than is necessary for the purpose for which data were collected or for which they are further processed; In the articles following article 6 of the Directive these principles are specified in a way that data can only be processed lawfully after having obtained the data subject’s unambiguous consent (or without its consent when one of the other criteria listed is met) 67, the data subject is provided with the necessary information before the processing of the personal data68, appropriate technical and organizational security measures to protect personal data against accidental loss, alteration, unauthorized disclosure or access, and against all other unlawful forms of processing are implemented, and, if made use of a processor, making sure the processor provides sufficient guarantees in respect of the technical security measures and organizational measures governing the processing to be carried out, and ensuring compliance with those measures. 66 See note 58, p. 180-181. 67 Article 7 of the Directive. 68 Article 10 and 11 of the Directive. 69 Article 17 of the Directive. 20 69 The Directive does however provide for an opportunity to limit the scope of the principles relating to the quality of the data, information to be given to the data subject, right of access and the publicizing of processing in order to safeguard aspects such as national security, defense, public security, the prosecution of criminal offences, an important economic or financial interest of the Member State or of the EU, or the protection of the data subject.70 Last but not least, on the base of article 25 of the Directive the controller is prohibited to transfer personal data outside the territory of the EU Member States for processing, unless the third country (Non-EU Member State) provides for an adequate level of protection , the data subject has given his consent unambiguously to the proposed transfer or under the condition that other procedures are in place as per article 26 of the Directive (for example ‘model contracts for transfer of personal data to third countries’, the ‘safe harbor principles’ (for the US) or ‘binding corporate rules’). Personal data may thus not be transferred to a country outside the EU with the consequence that the strict regime of data protection as offered by the Directive will be circumvented. Whether a third country ensures adequate protection is assessed in accordance with applicable data protection laws. The EU Commission can determine that a third country does provide an adequate level of protection (either as a whole or for specific areas within its territory). Member States are bound by such a decision of the Commission. So far, only a few countries have been recognized providing an adequate level of protection, namely Andorra, Argentina, Australia, Canada (if the data recipient is subject to the Canadian Personal Information Protection and Electronic Documents Act), Faeroe Islands, Guernsey, the Isle of Man, Israel, Jersey and Switzerland. 71 The USA is only found adequate if the data recipient subscribes to the US Department of Commerce’s Safe Harbor Privacy Principles. 72 These ‘safe harbor principles’ are an agreement between the EU Commission and the US Government and function as a security label. Any company which is subject to the jurisdiction of the Federal Trade Commission (FTC) may participate in the scheme. The US Department of Transport is also recognized as a government enforcement body, so air carriers and ticket agent 70 http://europa.eu/legislation_summaries/information_society/data_protection/l14012_en.htm. Last checked: September 2012. 71 A list with the decisions of the Commission on the adequacy of the protection of personal data in third countries, can be found on http://ec.europa.eu/justice/policies/privacy/thridcountries/index_en.htm. Last checked: May 2012. 72 R. Jones and D. Tahri, ‘An overview of EU data protection rules on use of data collected online’, Computer Law & Security Review, 27 (2011), p. 635. 21 are permitted to join in. Participation is voluntarily and reached by declaring that they conform to and comply with the safe harbor principles. Once they self-certify, companies are automatically authorized to accept personal data transfers from the EU and do not need to achieve further approval of the data protection agency or compliance with other regulatory requirements. Recent research has shown though, that a lack of oversight by the US Department of Commerce (which is burdened with that task) has led to fraud resulting in the use of the security label by several US companies without them fulfilling the conditions set by the principles or even without subscription to the scheme. 73 2.5. Cloud computing In July 2012, the Article 29 WP presented its opinion on cloud computing.74 In this opinion the Working Party analyzes the applicable law and obligations for controllers in the European Economic Area (EEA) and for cloud service providers with clients in the EEA. In doing so, the opinion outlines how the wide scale deployment of cloud computing services can trigger a number of data protection risks.75 The main conclusion of the opinion is that business companies or public bodies who wish to use cloud computing services, should conduct a thorough risk analysis to ensure that the principles of the EU legislation on data protection are respected. According to the Working Party, key elements in deciding whether or not to adopt such a service should be security, transparency and legal certainty. 76 The opinion focuses mainly on the general issues which are related to cloud computing in specific, like the risks of the sharing of resources with other parties, the risk of lack of transparency of an outsourcing chain consisting of (sub)processors, and the lawfulness of data transfers outside the EEA. Nevertheless, the opinion does not elaborate on the problems which might arise when the processed data are (or become) subject to yet another legal regime, like that of the United States of America. The 29 WP does however acknowledge this issue, showing concern about the absence of a provision in the Commission proposal for a Regulation prohibiting controllers operating in the EU from disclosing personal data to a third country if so requested by a third country’s judicial or administrative authority, unless this is expressly authorized by an international agreement or provided for by mutual legal assistance treaties or approved by a supervisory authority. 77 Later on, I will elaborate on this matter more extensively. 73 See note 57. 74 Article 29 Data Protection Working Party, ‘Opinion 05/2012 on cloud computing’. 01037/12/EN, WP 196. Accessible via: http://ec.europa.eu/justice/data-protection/article-29/documentation/opinionrecommendation/files/2012/wp196_en.pdf. Last checked: November 2012. 75 Ibid., p. 2. 76 Ibid. 77 Ibid., p. 23. 22 2.6. Challenging US law Up till now I only discussed the EU Data Protection Directive as being applicable on the (personal) data stored in a cloud. This may however not be the only relevant law regime in case of cloud computing. Although the Directive declares itself applicable in (almost) any case in which cloud computing services are used by a European legal subject (whether it is a EU citizen, business (group) or governmental body) and personal data are processed (which is nearly always the case, as mentioned above), other laws of other countries may affect the data (processing) too. Many times these laws do not concern the data processing as such (like the Directive), neither do they provide a (strict) regime of data protection (the lack of which is the reason why the Directive prohibits data transfers to third countries), but otherwise they can still be of relevance because they can affect the accessibility or disclosure of the information. Because of the nature of cloud computing, namely that data is stored on several servers throughout the entire world, the legal frameworks of every country could be relevant. Nevertheless, this thesis does not aim at getting insight in all legal frameworks concerning privacy and data protection in regard to cloud computing around the world. In the light of the research question as presented in the ‘Introduction’ plus the fact that most cloud service providers have an American origin and make use of ‘server farms’ 78 which stand on US soil, I will focus on US law only. To begin with US privacy regulation. Whereas EU law identifies privacy as a fundamental right, US law conceives of privacy as one interest among others. 79 Unlike the situation in the EU, privacy is not explicitly protected by the Constitution of the US. Americans however, have traditionally considered privacy a valued right. The government did pass some laws specifically guarding individual privacy, but historically Americans have been more concerned with government violations of privacy than with private sector intrusions. 80 This thought reflects in the Fourth Amendment of the Constitution, which should form a shield to protect citizens against unnecessary and too radical restrictions of their privacy by stating that ‘the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon 78 The term ‘server farm’ is used to refer to a collection of servers (hard ware) that are connected, and thus has a total capacity that is far beyond the capacity of a regular/singular computer, and which forms part of a network (often the Internet). Server farms are yet to be seen as major hard drives which can be used by computers who are connected to the network they are part of, for example to store data on. 79 A. Raul, E. McNIcholas and E. Jillson, ‘Reconciling European Data Privacy Concerns with US Discovery Rules: Conflict and Comity’, G.C.L.R. issue 3 2009, p. 119-120. 80 J. Strauss, K. Rogerson, ‘Policies for online privacy in the United States and the European Union’, Telematics and Informatics vol. 19 (2002), p.175. 23 probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.’ 81 The scope of the protection offered by the Fourth Amendment is however limited. Firstly because of the fact that it only concerns ‘searches and seizures’ (in a criminal investigation). Secondly because it only protects US citizens and US residents, as was declared by the US Supreme Court. 82 Hence, non-US citizens which do not reside within the US may not rely on it. 83 To date the US have not chosen for a federal approach of data protection on the base of a single piece of law comparable to the EU Directive (and alike the Fourth Amendment concerning ‘search and seizures’). It has rather taken a sectoral approach, relying on a combination of legislation, regulation and self-regulation. Consequently, the (scarce) legislation on data protection has been ad hoc and piecemeal. The result is a highly variable pattern across sectors, in which some operate to the standard of the EU Directive, while others fall far short of it. 8485 It is however not only this lack of structural data protection legislation in the US that is of great concern in regard to the use of cloud computing by EU subjects, as other US laws which may be applicable can demand actions of controllers or processors of data that are not in line with the principles as prescribed by the EU Directive. In that manner, deliberately created US legislation challenges EU law and puts the person(s) responsible for the processing of information in a rather difficult position. One of these laws 86 which is often called 87 to challenge (the principles of) the EU Directive is the USA PATRIOT ACT (Patriot Act). This acronym for Uniting and Strengthening America by 81 Text and back ground information about the Constitution can be found on: http://caselaw.lp.findlaw.com/data/constitution/amendment04/ 82 United States v. Verdugo-Urquidez, 494 U.S. 259, 265 (1990). 83 See note 80. 84 P. Carroll, ‘Standards of Data Protection’, Computer Fraud & Security vol. 2012 issue 2, February 2012, p. 5-7. 85 A clear view on the differences between the US approach and the EU approach on data protection is found in S. Hinde, ‘Privacy Legislation: a comparison of the US and European approaches’, Computer & Security vol. 22 issue 5, July 2003, p. 378-387. 86 For the sake of completeness I have to mention that the Patriot Act is not the only law that challenges EU law. The US discovery rules which apply in a civil litigation do also raise concern. This problem is described in: ‘A. Raul, E. McNicholas and E. Jillson, ‘Reconciling European Data Privacy Concerns with US Discovery Rules: Conflict and Comity’, Global Competition Litigation Review Issue 3, 2009. 87 See for example: C. Cuijpers in ‘Toepasselijk privacyrecht in de wolk’, Computerrecht 2011/65; and the whitepaper ‘De wolk in het onderwijs; privacy aspecten bij cloud computing services’, a research conducted by TILT (Tilburg Institute for Law, Technology, and Society) commissioned by SURFnet/Kennisnet; or: A. 24 Providing Appropriate Tools Required to Intercept and Obstruct Terrorism 88, is a reaction to the 9/11 attacks on the Twin Towers of the World Trade Center in New York. The Patriot Act is a complex piece of legislation which provides far reaching powers to the federal police, department of justice and intelligence agencies with respect to counter-terrorism law enforcement, trying to strike a balance between national security and the protection of rights of individuals. It was adopted by a great majority of the American Congress and signed by the president George W. Bush on the 26th of October 2001. The Act holds provisions which amend or complement more than 15 existing laws 89 concerning several subjects in different fields of law, such as immigration, money laundering, border protection, intelligence sharing (between governmental institutions), and the prosecution of terrorists. 90 Many provisions of the Patriot Act were, due to their controversial character, set to expire within five years (so called ‘sunset’ provisions). 91 Therefore, the USA PATRIOT Act Improvement and Reauthorization Act92 was (needed to be) adopted in 2005 which extended the validity of most provisions (while at the same time some changes were made concerning some provisions which raised questions of (un)constitutionality 93). President Obama extended the validity of the key provisions of the Patriot Act with four years again in 2011.94 95 Engelfried, ‘Waarom is de Patriot Act nou eigenlijk een problem voor cloudgebruikers?’, published 17 October 2011 on http://www.hostingrecht.nl/telecommunicatie/waarom-is-de-patriot-act-nou-eigenlijk-eenprobleem-voor-cloudgebruikers/ (last checked June 2012). But also: Z. Whittaker, ‘Case study: How the USA PATRIOT Act can be used to access EU data’ published 26 April 2011 on http://www.zdnet.com/blog/igeneration/case-study-how-the-usa-patriot-act-can-be-used-to-access-eudata/8805 (last checked June 2012). 88 Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of October 2001, Pub. L. No. 107-56, 115 Stat. 272, available at http://frwebgate.access.gpo.gov/cgibin/getdoc.cgi?dbname=107_cong_public_laws&docid=f:publ056.107.pdf Last checked: May 2012. 89 To name just a few: Foreign Intelligence Surveillance Act (FISA); Federal wiretap laws; Electronic Communications Privacy Act of 1986 (ECPA); Computer Fraud and Abuse Act (CFAA); Family Education Rights and Privacy Act (FERPA). 90 P. Bal, ‘De USA Patriot Act I en II; ongekende uitbreiding van bevoegdheden in de strijd tegen het terrorisme’, Strafblad 2004, p. 279-280. 91 J. Kollar, ‘USA PATRIOT Act, the Fourth Amendment, and Paranoia: Can They Read this While I’m Typing?’, Journal of High Technology Law 67 (2004), p. 74. 92 USA PATRIOT Improvement and Reauthorization Act of 2005, Public Law No. 109-177, 120 Stat. 192. 93 Section 505 of the Patriot Act. See for example: Doe v. Ashcroft, Southern District of New York, 29 September 2004, 04CV2614. 94 ‘Patriot Act Extension Signed By Obama’, published 27 May 2011 on http://www.huffingtonpost.com/2011/05/27/patriot-act-extension-signed-obama-autopen_n_867851.html 95 The PATRIOT Sunsets Extensions Act of 2011 (H.R. 514) Public Law. 112-14 (May 26th 2011). 25 Because of its massive scope and reach, which can and will not be dealt with in the context of this thesis 96, the Patriot Act soon became a ‘flashpoint of controversy in the contemporary civil liberties lexicon’ 97, constraining several civil rights. This controversy is mainly due to the fact that significant changes were made to the Foreign Intelligence Surveillance Act (FISA: Title 50 USC § 1801-1885c) 98, blurring the line between foreign intelligence activities and the ‘usual’ prosecution of (conventional) domestic crimes. Besides, the Patriot Act greatly expanded the statutory authority to require disclosure of records or any tangible object to federal investigators while making it a crime to report that the disclosure had been requested and/or made. 99 In particular the use of National Security Letters and FISA orders changed due to the USA PATRIOT Act. 100 Based on the FISA, it was already possible for US investigative institutions (CIA and FBI) to gather information about activities of non-US citizens (especially foreign powers/agents) via so called FISA orders. This information is not meant to be used in court to prove criminal matters, which implies that the US government does not need to have any clue of a probable cause to justify the collection of the information.101 Judicial review is provided by special FISA courts (FISC), but the review is very minimal and it most often takes place in secret. The persons concerned do usually not even get to know that they are subject to an investigation. 102 The Patriot Act, inter alia section 215, expands the scope of the use of FISA orders ex Section 1861 of Title 50 USC (concerning the collection of business records in case of suspicion of espionage or terrorism), which means that the judicial review in many more cases is minimized, probable cause is no longer needed, and the scope of materials sought for is enlarged to ‘any tangible things’, which includes books, records, papers, floppy disks, data tapes, computers and 96 To get an insight in the provisions of the USA PATRIOT Act and the way it enhances law enforcement (providing far reaching powers to investigative institutions), see: P. Bal, ‘De USA Patriot Act I en II; ongekende uitbreiding van bevoegdheden in de strijd tegen het terrorisme’, Strafblad 2004 p. 279-288; or: J. Kollar, ‘USA PATRIOT Act, the Fourth Amendment, and Paranoia: Can They Read this While I’m Typing?’, Journal of High Technology Law 67 (2004), p. 67-94. 97 See note 91, p. 67-68. 98 Foreign Intelligence Surveillance Act of 1978, Public Law 95-511 October 25, 1978, 92 Stat. 1783. 99 P. Swire, ‘The System of Foreign Intelligence Surveillance Law’, George Washington Law Review vol. 72 (2004), freely accessible via: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=586616 (lasted checked: June 2012), p. 5. 100 The relevant sections of United States Code as referred to in the upcoming pages are not integrally included in this text. A selection of the provisions can be found in Appendix I of this thesis. 101 See note 90, p. 282. 102 Ibid. 26 their hard drives, and any type of record in any format. 103 Besides, the mentioned FISA orders can now be used even if the gathering of information is not the primary goal, but just a significant factor. That way the division between counterintelligence and the more straightforward criminal investigation (of domestic crimes) has faded. 104 This expansion of the FISA powers mainly affects American citizens, because by using FISA orders the requirements set in the Fourth Amendment of the Constitution (concerning searches and seizures) are easily circumvented. 105 Non-US citizens could already not rely on the protection offered by the Constitution. Another controversial measure that was introduced by the USA PATRIOT Act, is the expansion of the use of National Security Letters (NSLs), often holding the requirement of nondisclosure and therefore also called ‘gag-orders’. This is arranged in section 505 of the Patriot Act, which led to much discussion about the constitutionality of NSLs. 106 National Security Letters are tools given by several laws to the FBI, inter alia the Electronic Communications Privacy Act (ECPA: Title 18 USC § 2510-2522, §2701-2712, §3121-3127)107, to request certain information. As a result of the cumulative effect of the NSL authorities provided for in the mentioned laws, the FBI is granted access to subscriber information, toll billing records, electronic subscriber information, electronic communications transactional records, financial records, identification of financial institutions and consumer identifying information.108 Section 505 of the Patriot Act, amending Section 2709 (b) of Title 18 USC, provides a regulation according which the FBI can demand disclosure of information about users from Internet service providers through a NSL 109, which lead to a dramatic rise in the range and frequency of the uses of NSLs. 110 103 Title II of the USA PATRIOT Act. 104 See note 91, p. 84-86. 105 See note 90, p. 282. 106 U. Gorham-Ocilowski and P. Jaeger, ‘National Security Letters, the USA PATRIOT Act, and the Constitution: The tensions between national security and civil right’, Government Information Quarterly vol 25, issue 4, October 2008. 107 Electronic Communications Privacy Act of 1986, Pub.L. 99-508, 100 Stat. 1848, enacted October 21, 1986. Other laws which grant the FBI authority to use NSLs are the Right to Financial Privacy Act, National Security Ac and the Fair Credit Reporting Act. 108 See note 106. 109 See note 90, p. 282. 110 See note 106. 27 At first, such a demand for information could only be given when there was a suspicion of espionage and the issuance was approved for by the FBI headquarters. The Patriot Act took away both requirements in a way that an individualized suspicion was no longer needed, the case did no longer need to concern espionage and FBI headquarters’ approval was no longer required in all cases. The FBI does not need to have a judicial authorization to send a National Security Letter, neither can the order be appealed in court. And of course, the Internet service provider is deemed to keep the disclosure of information secret. 111 Section 505 came under fire because it was seen as a violation of the First and Fourth Amendment of the Constitution: it limited the free speech through the requirement of nondisclosure (secrecy); it did not provide an opportunity for judicial review (prior to the issuance of a NSL or even afterwards); and the government could get a NSL too easily, more specific because of the fact that no individualized suspicion was needed. In Doe v. Ashcroft 112 the court acknowledges that Section 2709 of the ECPA was alien to the First and Fourth Amendment. Hence the court suggested that the NSL statutes could not withstand constitutional scrutiny unless more explicit provisions were made for judicial review and permissible disclosure by recipients. 113 Through the Reauthorization Act the US government amended the regulation concerning NSLs, trying to take away the conflict with the Constitution by introducing (in Section 115) a possibility for the recipient of a NSL to petition the US district court ‘for an order modifying or setting aside the request’. Such an order will be given by the courts if complying to the request would be unreasonable, oppressive, or otherwise unlawful.114 Furthermore section 116 of the Reauthorization Act puts limits to the nondisclosure in a way that disclosure of the request remains prohibited when doing so ‘may endanger the national security of the US, interfere with a criminal, counterterrorism, or counterintelligence investigation, interfere with diplomatic relations, or endanger the life or physical safety of any person.’ This means that when nondisclosure is deemed necessary by the authorities, a nondisclosure order should be attached to the NSL. This nondisclosure order could be appealed too. 115 111 See note 90, p. 282. 112 See note 93. 113 See note 106. 114 Ibid. 115 Ibid. 28 Critics however do state that the changes which are brought forward by the Reauthorization Act have not effectively eliminated the constitutional shortcomings of the USA PATRIOT Act. There still is no prior judicial review. Moreover, it is unlikely that a court would overturn a request on the ground that it is unreasonable or oppressive, and in case of petition for judicial review of a nondisclosure order, the court has no authority to actually weigh factors in determining whether a gag is appropriate.116 Moreover, critics stress the fact that the Reauthorization Act did not raise the bar in terms of the showing required before issuance of a NSL. They urge that at least specific and articulable facts that the individual is a terrorist or is reasonably suspected of being associated with such a person in suspicious circumstances, should be required before issuing a NSL. 117 Although the Patriot Act has been made an icon of the far reaching expansion (of the scope of) investigative powers of American intelligence agencies, the recently published IViR-report118 justly indicates that other pieces of legislation greatly contribute to the increase of investigation rights too. The most important act in this regard, providing the most radical (alteration of) regulation, is the FISA Amendments Act (FAA) 119, which introduced a new regulation regarding the right to collect data of non-US citizens residing outside the US by US foreign intelligence agencies for the sake of national security. This Section 1881 of Title 50 USC is applicable to different kinds of electronic communication services, including telecommunication services, electronic communication services and remote computing services. The latter means, according to Section 2711 (2) of Title 18 USC, ‘the provision to the public of computer storage or processing services by means of an electronic communications system’. Hence it includes cloud computing services. 120 Section 1881 of Title 50 USC differs from Section 1861 of Title 50 USC which was altered by the Patriot act as mentioned before, in a way that it offers a broader definition of foreign intelligence information that can be collected. It focuses on the gathering of foreign data in general, not just 116 Ibid. 117 Ibid. 118 J. van Hoboken, A. Arnbak, N. van Eijk and N. Kruijsen, ‘Cloud diensten in hoger onderwijs en onderzoek en de USA patriot act’, a research report commissioned by IViR, University of Amsterdam, September 2012. To be found on: http://www.surfsites.nl/cloud/download/Clouddiensten_in_HO_en_USA_Patriot_Act.pdf, last checked October 2012. 119 Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 (H.R. 6304), Public Law 110-261 July 10 2008, 122 Stat. 2436. Reauthorized by FAA Reauthorization Act of 2012 (H.R. 5949), Public Law September 11 2012, 120 See note 118, p. 16. 29 on the collection of business records in case of suspicion of espionage or terrorism. The legal definition of foreign intelligence information 121 is extensive, including information about foreign powers or regions regarding national defense, national security or acts of US foreign affairs. Besides, the gathering of such information need not be the primary goal, nor does the subject of investigation need to be a foreign power, like a terrorist or foreign spy. 122 It does not even have to concern a suspicious individual, but can also affect NGO’s or geographical regions. 123 The few safeguards against abusive use of the possibilities offered by Section 1881 of Title 50 USC 124, are designed to make sure that the protection offered by the Constitution is not hampered. As mentioned earlier, only US citizens and US residents are covered by the Constitution. Hence, non-US citizens residing outside the US do not get any (significant) legal protection.125 In short aforementioned comes down to the expansion of the possibilities of federal investigative institutions to gather information, like stored data in a cloud, on non-US as well as US persons by broadening the definitions of ‘terrorism’ and by lowering the conditions for using wire taps and conducting searches and seizures, while at the same time judicial oversight is diminished to an absolute minimum and secrecy is often required of all persons involved. 126 Therefore the US government is assumed to have easy access to data which is stored in a cloud by simply demanding (in some cases even without a court order) the cloud service provider to disclose such data in the context of an(y) investigation, without the person concerning the data (the data subject) getting to know about this (unauthorized) disclosure.127 121 Section 1801 (d) of Title. 50 USC. 122 Section 1801 (a) of Title 50 USC. 123 See note 118, p. 19. 124 The safeguards mainly exist out of review by the FISC (FISA Court) on certain points. 125 See note 118, p.18-19. 126 See note 90. 127 Whitepaper ‘De wolk in het onderwijs; privacy aspecten bij cloud computing services’, a research conducted by TILT (Tilburg Institute for Law, Technology, and Society) commissioned by SURFnet/Kennisnet, p. 23 and 42; C. Cuijpers in ‘Toepasselijk privacyrecht in de wolk’, Computerrecht 2011/65; Z. Whittaker, ‘Case study: How the USA PATRIOT Act can be used to access EU data’, published 26 April 2011 on: http://www.zdnet.com/blog/igeneration/case-study-how-the-usa-patriot-act-can-be-usedto-access-eu-data/8805?pg=6&tag=content;siu-container. Last checked: June 2012. 30 The US government128 as well as some authors, on the other hand, point out that the Patriot Act is not at all the ‘executive grab for power’ 129 that others portray it as. Maxwell and Wolf subscribe to the view that most of the investigatory methods in the Patriot Act were already available long before it was enacted, but acknowledge the expansion. Moreover, they stress the fact that these investigative tools had, and still have under the Patriot Act, limitations imposed by the US Constitution and by statute to prevent abuse. Furthermore these authors point out that on the base of legislation, the US government does not have access to data stored in a cloud more easily than any other government (including EU governments) in the world.130 131 In the next paragraph I will pay short attention to the possibilities to access data in the European Union. Dinh underlines the fact that the Patriot Act is to be understood as a necessary tool to fight terrorism while observing the cherished liberties of Americans. In his view the Patriot Act succeeds in striking this balance, by improving the cooperation between US investigation agencies, expanding their powers while restraining them. 132 One can strongly argue that fighting terrorism is a noble and respectable goal. States will of course need to have the powers to prevent what happened on 9/11. And of course, citizens are willing to help reach that goal. But at what cost? In essence, the Patriot act is just a piece of anti-terrorist legislation as any other. A tool to prevent America from another horror. But it is one that comes with a high price. When a government needs to fight against something as abstract as terrorist organizations, they must be able to fight against anything and anyone. The Patriot Act provides the tools to do just that. Eventually, anyone can be a terrorist, and if you are not, why would you have anything to hide? In his essay 133 Daniel Solove shows that the assumption that lays at the base of just this question, namely that privacy is about hiding a wrong, holds a too narrow conception of privacy. 128 There even is a government website to distinguish between ‘myths’ and ‘facts’ concerning the USA PATRIOT Act: http://www.justice.gov/archive/ll/subs/u_myths.htm. 129 V. Dinh, ‘USA Patriot Act’, German Law Journal vol. 5, no. 5 2004, p. 467. 130 W. Maxwell and C. Wolf, A Hogan Lovells White Paper; A Global Reality: Governmental Access to Data in the Cloud, published 23 May 2012. 131 These authors direct to the existence of Mutual Legal Assistance Treaties (MLATs). I will discuss MLATs in the next chapter. 132 See note 118. 133 D. Solove, ‘ “I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy’, San Diego Law Review vol. 44 2008, p. 745. 31 Instead of pointing to things that people do actually want to hide, the author ‘reveals the flaw of the nothing to hide argument at its roots.’ 134 Solove remarks that instead of thinking of privacy as a form or a right of concealment or secrecy, which has a relatively low value in comparison to (national) security, it should be understood ‘as a set of family resemblances.’ 135 This means that privacy is not reducible to one singular essence; it is a plurality of different things that do not share one element in common but that nevertheless bear a resemblance to each other. Due to this pluralistic view on privacy, the (social) value of privacy is different depending upon which particular problem or harm is being protected.136 In regard to investigative powers of US government authorities, Solove demonstrates that concealment of bad things is just one among many problems, pointing to possible chilling effects of ‘dataveillance’, lack of transparency which makes it impossible to know what information is (all together) known, the absence of a possibility to know about how the information is used, as well as being barred from being able to access and correct errors in the data, and the problem of ‘secondary use’: the potential future uses of any piece of personal information.137 Furthermore Solove notes that although most privacy problems lack dead bodies as well as a major spill (most often they are the result of a slow series of relatively minor acts which gradually add up), they are still harmful, involving violations of trust within a relationship as well as power imbalances.138 So I am willing to believe the best, namely that the US government can be trusted and will use our personal information confidentially, in a proper manner and only for the right reasons. Yet still the conclusion may be drawn that it might not be necessary to place any government in a position that it can just as easy as that look into our lives. Knowledge, even seemingly trivial, leads to power and power can be used in a wrong way. Therefore, and in Europe this thought might be stronger than anywhere else in the world, the governments should remain at a proper distance from the people as long as there is no good reason (i.e. probable cause) to interfere. 134 See note 133, p. 764. 135 See note 133, p. 756. 136 See note 133, p. 763. 137 See note 133, p. 764-767. 138 See note 133, p. 770. 32 The same conclusion is also drawn by Solove at the end of his essay. 139 Remaining at a proper distance in this sense does not (necessarily) have to mean that a particular government information collection activity should be barred, but does imply a certain – sufficient - degree of transparency, accountability and oversight in such cases. The question is, does the USA PATRIOT Act keep the government at a great enough distance? Based on the information given in this paragraph, I would have to answer no. Due to the enormous scope of the provisions, the nondisclosure requirements and the minimal judicial oversight, it is my opinion that the US government does not succeed in reaching a sufficient level of transparency, accountability and (judicial) supervision in the way it uses its far reaching investigative powers, at least in case non-US citizens residing outside the US are concerned. 2.7. Access to data in the European Union The attribution of far reaching powers to investigative authorities in the USA is not unique in the world. In the European Union, authorities are entitled to do much of the same. The Data Protection Directive which I discussed earlier, also acknowledges situations in which authorities demand disclosure of data. 140 There are however some differences. I started this chapter with the notion that the right to privacy has taken a prominent position in the European legal systems and that it can be found in both international and national laws. Article 8 of the European Convention on Human Rights (ECHR) should be seen as the most important one in this regard. This provision is always applicable to acts within the jurisdiction of the countries which are party to the ECHR (which are (at least) all Member States of the European Union), regardless citizenship, origin or residence. So its protection has, in contrast with the protection offered by the Fourth Amendment, a very wide range. Besides, the prominence of the right to privacy on the European continent, is shown by the fact that each infringement of one’s privacy should be ruled by law. So the right to privacy must be understood as a given, the infringement of it as the exception. In the US on the contrary, one’s privacy - in case the Fourth Amendment does not give shelter - is only protected when ruled so by law. 141 I must however remark that the US Supreme Court does recognize a general right to 139 See note 133, p. 771. 140 Data may be disclosed without the unambiguous consent of the data subject on the base of an obligation prescribed by law ex art. 16 of the Directive. 141 See note 118, p 23. 33 privacy in the Constitution, although the Constitution does not hold such a right explicitly. 142 This right to privacy (perhaps due to the fact that it lacks a clear basis in the Constitution) is yet less prominent than its European counterpart. The condition that infringements of article 8 ECHR (i.e. privacy infringements) should be ruled by law, is created by the European Court of Human Rights (ECtHR) in its massive case law. The court has provided a set of criteria which should be met to legitimize the infringement. To be legitimate, an infringement should be (1) in accordance with the law, (2) pursue a legitimate aim and (3) be necessary in a democratic society. 143 By doing so the ECtHR obliges European governments to lay down investigative powers and safeguards regarding government access to data and the content of communication in legislation. 144 The Court justifies these strict conditions by stating that society should be informed about privacy infringements by governments, that governments should be able to solidly justify the public interest of data mining, and that citizens should be able to defend themselves against government access.145 Opposite the privacy legislation stand the European rules providing investigative tools, which interfere with the right of privacy. Although regulation of information disclosure abilities of authorities has become possible since the ratification of the Lisbon Treaty, the European Union has not taken any action in this field yet. Up till now, each Member State makes its own rules regarding this subject (which are of course still subject to binding European rules like article 8 ECHR). 146 It is however beyond the scope of this thesis to give a detailed overview of the legal possibilities to demand disclosure of information of all Member States of the EU. The authors of the IViR report nevertheless note that the legal possibilities to gather information in the EU are similar to the abilities in the US, pointing to the examples of systematic monitoring of cross-border telecommunication without court order in Sweden and the proposed Communications Data Bill in the United Kingdom, providing far reaching powers to demand disclosure of Internet data. 147 It is 142 Griswold v. Connecticut, 381 U.S. 479 (1965). 143 See for example ECtHRM 26 April 1979 (Sunday Times v. UK). 144 See for example ECtHRM 1 July 2008 (Liberty v. UK). 145 See note 118, p. 22-23. 146 Ibid. 147 See note 118, p. 24. 34 important in this respect to stress the fact that however far reaching legal possibilities may be created by Member States, the overarching strong European privacy regime ultimately governed by article 8 of the ECHR is ever present, offering protection against and prevention from unjustified (abusive) use of privacy infringing investigation methods by ensuring a basic (yet high) level of transparency, accountability and judicial oversight. Furhtermore, the IViR report, in regard to European corporation in this field, rightfully points to the review of the Data Protection Directive, which is proposed to be replaced by a Regulation.148 In this perspective the Article 29 Working Party remarks in its Opinion concerning cloud computing in regard to access to personal data for national security and law enforcement purposes the following: ‘It is of the utmost importance to add to the future Regulation that controllers operating in the EU must be prohibited from disclosing personal data to a third country if so requested by a third country’s judicial or administrative authority, unless this is expressly authorized by an international agreement or provided for by mutual legal assistance treaties or approved by a supervisory authority.’ 149 Such a prohibition is however not included in the latest proposal for a new Regulation 150, although earlier versions did hold such a provision. 151 The Working Party is aware of this gap in the Regulation and stresses the need to include the obligatory use of Mutual Legal Assistance Treaties (MLATs), which will be the center of attention at the end of the next chapter, in case of disclosures not authorized by Union or Member States Law. 152 2.8. Conclusion Based on the information given in this chapter, the conclusion may be drawn that the USA PATRIOT Act, although I cannot find any direct clues which point in the direction of ‘abusive use’ 148 See note 118, p. 23. 149 See note 74, p. 23. 150 European Commission, Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), Brussels, 25 January 2012, COM (2012) 11 final, 2012/0011 (COD). 151 Article 42 of the proposed Regulation version 56. European Commission, Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), version 56, 29 November 2011 (leaked draft), http://www.statewatch.org/news/2011/dec/eu-com-draft-dp-reg-inter-serviceconsultation.pdf. Last checked: November 2012. 152 See note 74, p.23. 35 of the power laid down therein by the US government 153, seems to provide too short a distance between the people (especially non-US citizens residing outside the US) and their privacy on the one hand and the government and its fight against crime and terrorism on the other. Further research would however be necessary to give a more exact answer to the question whether or not the basic principles of the EU legislation concerning privacy and data protection are actually infringed by the US government due to the powers attributed to US authorities through antiterrorism legislation like the Patriot Act. For now I would conclude that the lack of transparency on US side on the use of the possibility to request disclosure of certain data in a cloud, which is foremost caused by the requirement of secrecy of disclosure combined with the minimal judicial oversight, makes it hardly possible to determine whether or not the actual use of the powers provided by the USA PATRIOT Act are in line with the EU perception of the need to protect individuals against privacy infringements. The obligation for both private and public parties to account for privacy infringing acts is the key element of the European idea of privacy and data protection. As long as the US government is not clear (transparent) about the exact use of the possibilities offered by their anti-terrorism legislation, there is no way they can account for any of it, nor can they be held accountable. Due to this lack of accountability the US government shows great disrespect for the valuable interests of (its) citizens. Therefore, in my opinion, it is justified to suppose that the Patriot Act offers the possibility to access data which is not in conformity with EU morals and thus – although the EU Directive provides that data may be disclosed without the unambiguous consent of the data subject on the base of an obligation prescribed by law 154 – conflicting with the EU Directive. As the Patriot Act is a US law, it will of course only have legal effect within the US jurisdiction, so the data must then in any way be within this US jurisdiction. These jurisdictional issues will be dealt with in the next chapter. 153 Which is directly related to the fact that in most cases absolute secrecy is required from the parties involved. 154 Article 16 of the Directive. 36 3. Towards a European cloud In the previous chapter we saw that different laws can be applicable on data which is processed in case of cloud computing. Moreover, these laws can conflict with each other, especially taken into account that the European laws concerning data protection provide (and therefore also require) a high level of protection which is not at all times met by laws of other countries. When a European legal subject wants to make use of cloud computing services in a truly safe manner, meaning that its data are at least given the minimum protection required by the European Union, there should be no way that foreign governments, especially the United States of America, could have legal access to data stored in the cloud based on their own - in this case American – legislation (instead of European rules). Therefore, it is time to focus on the core question of this thesis: what criteria should a cloud computing service meet to make sure that European governments could make use of it without the fear of foreign (non-EU) countries (especially the United States of America on the base of its USA PATRIOT Act) glancing through the stored data without authorization of the rightful owner(s). This question shall be answered in the upcoming chapter. First I will focus on the question how a ‘clash’ of laws can be prevented. In other words: is it possible to create a cloud computing service which is subject to a single legal regime, namely that of the European Union (or at least that of its member states)? In this regard I will discuss the rules of (international) jurisdiction. 3.1. Exclusive jurisdiction The first question to be answered is clear: is it possible to exclude all jurisdictions but the jurisdiction(s) of the member states of the European Union which I will from now refer to as ‘European jurisdiction’ 155. 3.1.1. International jurisdiction and its bases: a general introduction To answer this question, we first have to look into the concept of jurisdiction itself. It all starts with the mutual respect of states to their sovereignty and the absence of interference with aspects by which sovereignty is manifested by other states. ‘Territoriality to that extent is an inevitable 155 I again stress the fact that there is no such thing as ‘European jurisdiction’. The European Union as such has no jurisdiction of its own, only the jurisdiction of the countries which are part of it. European jurisdiction is therefore a fiction only used in this thesis to easily refer to a jurisdiction which is limited to the whole of jurisdictions of the Member States of the European Union. 37 consequence of sovereign equality of states and peaceful coexistence’ as stated by Sachdeva.156 Reasons of political practicality and the idea of absolute boundaries and sovereign power within them, were accordingly at the roots of jurisdictional principles. 157 It is therefore not surprising that professor Kooijmans starts its description of the concept of jurisdiction with an explanation of territorial jurisdiction: the exclusive power of a state to govern its territory by setting, implementing and enforcing rules, which has to be understood as a component of the sovereignty of state. Although there are some limitations158 in regard to the scope of this exclusive jurisdiction, each state has the right to rule its territory and all people who reside within regardless their nationality conform its own discretion. 159 Kuner also starts his essay about the issue of (international) jurisdiction in data protection law with territoriality as a jurisdictional base. He points out that jurisdiction under this principle is based on acts that have been committed within the territoriality of the state in question, but also remarks that acts which are initiated abroad but completed within the territory of the state, or if a constitutive element of the conduct occurred within the territory, can give a sufficient base to claim jurisdiction.160 Although the Internet complicates the application of the territoriality principle (since it is a truly borderless world which refuses to accord to the (traditional) geopolitical boundaries 161 and therefore makes it hardly possible to determine the exact location where an online action has occurred), it (still) plays a major role in data protection law according to Kuner. He finds his belief amplified by article 4 under 1c of the DPD, which should be seen as an expression of the objective territoriality principle since it declares the European rules of data protection applicable on the basis of a performance of an act (the use of equipment) occurring within the EU. Territoriality however, although it might be the most common jurisdictional base, is not the only possible foundation of jurisdiction. But before looking into the other bases on which jurisdiction can be claimed, we will first shortly discuss the term jurisdiction. 156 A.M. Sachdeva, ‘International Jurisdiction In Cyberspace: A Comparative Perspective’, C.T.L.R., 2007, p. 246. 157 Ibid. 158 For example: the resolution of the General Assembly of the United Nations 2625 (XXV) of October 24th 1970, concerning the prohibition of a state to use its territory to organize activities which aim to disturb the order or bring down the government of another state; or: the exclusion of jurisdiction over representatives of another state; or: the transfer of certain parts of jurisdiction to a higher unity, like the transfer of legislative powers to the European Union by its member states. 159 P.H. Kooijmans, Internationaal publiekrecht in vogelvlucht, Kluwer: Deventer 2002, p. 40. 160 See note 58, p. 188. 161 See note 156, p. 245. 38 At the top of the previous page I gave a short description about (territorial) jurisdiction as given by professor Kooijmans. He describes jurisdiction as the right of a state to prescribe, give effect to, and adjudicate upon violations of, normative standards for regulation of human conduct. It simultaneously defines the legitimate scope of governmental powers. 162 From this definition, one can derive that the term jurisdiction is threefold. Although there is some overlap between the three elements, (international) jurisdiction is often divided into legislative, adjudicative and enforcement jurisdiction. Legislative jurisdiction covers the right of a state to make legislation and to declare those laws applicable to certain cases. These cases can even involve a foreign element. Therefore Kuner, in my opinion correctly, remarks that legislative jurisdiction is rather concurrent instead of exclusive. 163 Sachdeva points out that the legislative jurisdiction of a state is however not unlimited, for no legislature may be deemed to have intended to prescribe a conduct for the enforcement of which it has no means or basis and whose recognition beyond its own (political) boundaries is itself doubtful. 164 On the other hand, one could say that the appliance of legislation, although enforcement beyond the borders is not possible, can have symbolic value. 165 In addition to legislative jurisdiction, there is the so called adjudicative jurisdiction, concerning the power of a sovereign, acting through its judicial organ, to hear disputes and to render judgments binding upon the parties thereto. 166 In other words: adjudicative jurisdiction determines whether a court of a state has competence to take notice of a dispute or prosecution. In case of data protection this could be a European DPA deciding a complaint brought by an individual located in the EU concerning the unlawful processing of its personal data by an entity located within or even outside the EU. 167 Last but not least, there is enforcement jurisdiction. This category ‘concerns not the law prescribed by a state to regulate acts (even outside its own territory), but the lawfulness of the 162 See note 156, p. 246-247. 163 See note 58, p. 184. 164 See note 156, p. 247. 165 In this regard I point out that in cases concerning non-EU nationals residing outside the territory of the EU Member States, article 4 under 1c DPD offers a more symbolic protection, as enforcement jurisdiction is not at hand. 166 See note 156, p. 247. 167 The example is drawn from Kuner (see note 58, p. 184). 39 state’s own act to give effect to such regulation’. 168 In other words: enforcement jurisdiction embodies the power to give action to the regulation prescribed. Enforcement jurisdiction is in regard to the subject of this thesis and the question stated at the beginning of this chapter, the most important of the three forms, as the United States claims jurisdiction to enforce its laws (i.e. demand disclosure of data). Therefore, one should bear in mind that when speaking in the following of jurisdiction, at least enforcement jurisdiction is meant. It seems obvious that a state has complete jurisdiction (meaning all three forms of jurisdiction) within its own territory. However, when a state claims jurisdiction outside its territory on another base, ‘complete jurisdiction’ is not a given, for specifically enforcement jurisdiction outside the territory (especially in case the territory of another state is involved) is rare and at least ‘tricky’, as it directly interferes with the sovereignty of and thus the respect for another state. The famous Yahoo!-case illustrates this issue of the tension between extraterritorial jurisdiction and (un)enforceability very clearly. 169 In this case the French supreme court ordered Yahoo!, a US Internet portal, to take such measures that French users could no longer buy Nazi memorabilia via online auctions on the company’s US-website as the visualization in France of the objects in question is forbidden under French law. This court order, was however declared unenforceable by the US District Court of California because (to put it short and simple) the French court could according to the US court not regulate the activities of a US corporation within the US on the basis that such activities can be accessed by Internet users in France. Therefore Maier rightfully remarks that the Yahoo-case is ‘a good example of the legal intricacies involved in a state in determining its jurisdiction over an act originating in another state.’ 170 Then back to the foundations of jurisdiction. What other bases than territoriality can be used to claim (a form of) jurisdiction? A second principle (as the territoriality principle is the first) under which jurisdiction can be claimed is personality (or nationality). It comes in two different forms: the active personality principle and the passive personality principle. The former means that jurisdiction is asserted by the state of nationality of the perpetrator, the latter of the victim. Hence, the personality principle (no matter which form) takes citizenship as a starting point to attribute jurisdiction. 168 See note 156, p. 247. 169 UEJF et LICRA v. Yahoo! Inc. et Yahoo France, Tribunal de Grande Instance de Paris, NO RG: 00/05308, November 20, 2000. This case is reviewed by Bernhard Maier in its article ‘How Has the Law Attempted to Tackle the Borderless Nature of the Internet?’, International Journal of Law and Information Technology vol. 18, no. 2, Oxford: Oxford University Press 2010, p. 145. 170 Idem, p. 146. 40 It is mainly used in criminal law, and mostly only in regard to the most violent of crimes, but can be of relevance in other legal areas as well like taxation, voting entitlements and diplomatic protection 171 (of course the terms ‘perpetrator’ and ‘victim’ then ask for a different interpretation). In the Netherlands for example, the active personality principle is valid in regard to some crimes which concern the security of the state and the royal dignity. Moreover, the Dutch criminal courts have competence to rule about crimes (not offences) which are committed outside the state boundaries if those acts are also punishable according to the laws of the state in which the crimes are committed. Hence, when a crime is committed outside the Dutch territory by a Dutch citizen, there will nearly always be concurrent jurisdiction. However, the state of nationality can only effectuate its jurisdiction when the citizen returns to its ‘home country’. 172 The passive personality principle is on the other hand not undisputed, even rather controversial. Many states deny this basis for asserting jurisdiction, and the Dutch legislator for instance has shown much abstention in regard to the applicability of this principle.173 In general it can be concluded that the application of the passive personality principle as such is still internationally disputed, but it has been accepted in case of prosecution of crimes which are recognized as such by international law. 174 Kuner gives an example of the personality principle in data protection law: the Greek legislator extended the jurisdiction of the Greek DPA over data controllers outside of Greece who processed data on Greek residents, by requiring them to appoint a representative in Greece who would be legally liable for such data processing. However, this Greek provision was changed in 2006 after objections made by the European Commission. 175 Furthermore, Kuner points at the Asia Pacific Economic Cooperation Privacy Framework 176 which protects personal data transferred outside the APEC Member State where they were collected by using the principle of ‘accountability’, meaning that the original collector of the personal data remains accountable for compliance with the original privacy framework that applied when and 171 See note 58, p. 188 172 See note 159, p. 58-59. 173 A form of application can be found in for example article 4 and 10 under O of the Dutch Criminal Code and article 3 under 2 and 4 of the Act on War Crimes. 174 See note 159, p. 59-60. 175 See note 58, p. 188-189. 176 See for more information about the APEC Privacy Framework: http://www.apec.org/About-Us/AboutAPEC/Fact-Sheets/APEC-Privacy-Framework.aspx. (Last checked: June 2012). Full text of the framework can be found on: http://www.apec.org/About-Us/About-APEC/Fact-Sheets/APEC-Privacy-Framework.aspx. (Last checked: June 2012). 41 where the data was collected, regardless of the other organizations or countries to which the personal data is transferred subsequently. That way, the applicable data protection provisions at the moment and place of collection, are ‘attached’ to the collected data and continue to be applicable as the data are transferred abroad. In other words: the nationality of the person of which personal data is collected or at least the nationality of the personal data itself (being the nationality of the state in which the data are collected), I note that these two will not necessarily be the same (but most of time they will be), will determine the applicable law. 177 Even more controversial than the passive personality principle is the effects doctrine, under which jurisdiction is based on the fact that conduct outside a state has effects within the state. Kuner describes the basic problem of this doctrine by quoting Michaels: ‘in a globalized economy, everything has an effect on everything’. 178 179 Kuner continues by stating that although article 4 under 1c of the DPD seems to apply the objective territoriality principle, it focuses not on the use of equipment per se, but on preventing data controllers from evading EU rules by relocating outside the EU. He concludes that, as article 4 under 1c also has a focus on the effect produced in the EU by data processing outside the EU, and the protection of EU citizens, this provision can also be viewed as an application of the effects doctrine. 180 In my opinion however, article 4 under 1c has to be understood as an attempt to achieve a similar effect as the principle of accountability as put down in the APEC Privacy Framework (as mentioned before) including a way to determine the location of collection of the personal data when occurring via the Internet by bringing in the ‘use of equipment’ phrase. To me, article 4 under 1c should therefore be seen, besides the application of the objective territoriality principle, as the application of the (passive) personality principle instead. Due to the ‘use of equipment’ condition, data of (European) citizens that are gathered within the European Union (with the help of equipment on EU soil, for example a computer physically located in Italy with Internet connection making use of cookies) are automatically marked as EU data and consequently subject to EU legislation (the Data Protection Directive). So the origin of the data, being the place where they were collected (in this case the European Union), defines what laws do apply. In addition I remark once more that the application of article 4 under 1c DPD on non-EU nationals has a more symbolic function, as enforcement will be challenging. 177 See note 58, p. 189. 178 R. Michaels, ‘Territorial jurisdiction after territoriality’, in: P. Slot and M. Bulterman (eds.), Globalisation and Jurisdiction, Kluwer Law International 2004. 179 See note 58, p. 190. 180 Idem. 42 The last relevant base of jurisdiction is found in the protective principle. This is again a jurisdictional base which is mainly used in criminal law and in case of real endangerment of the security of the state. The Dutch Criminal Code for example, has a provision which allows the Dutch court to take notice of committed crimes by foreigners (others than Dutch citizens) outside Dutch territory which endanger the security of the state or in case of the use of counterfeit Dutch money. 181 182 Kuner adds that such jurisdiction would normally not include data protection violations. In addition he states that under the protective principle the focus is on protection of the state instead of the protection of the individuals. Data protection laws are meant to offer protection to the latter. However, EU member states seem to interpret the protective principle extensively, so that it does resemble an application of the objective territoriality or the effects doctrine. The Article 29 WP has even explicitly indicated that the protection of individuals inside the EU is one of the core purposes of article 4 under 1c. 183 It seems thus justified to conclude that the function of this provision is largely to protect individuals in the EU, even if that does not fulfill the traditional criteria of protective jurisdiction.184 3.1.2. The American view on jurisdiction and its bases The above shows that states can claim jurisdiction over certain acts, objects or persons on different bases which are not all undisputed. When speaking of the applicability of the USA PATRIOT Act, these rules of jurisdiction determine if and in what way the American government is to give effect to the provisions laid down in this piece of legislation. In regard to the problematic relation between the European legislation concerning privacy and data protection and the aforementioned USA PATRIOT Act, as described in the previous chapter, the question arises whether it is possible to create a cloud service which is only subject to the ‘European jurisdiction’, meaning the explicit exclusion of the American jurisdiction and so the applicability of the USA PATRIOT Act. The answer to this question should be (in proper American): ‘yes we can’. As we have seen, jurisdiction can effectively be claimed on several bases. When limiting the possibilities of other 181 Article 4 Dutch Criminal Code. 182 See note 159, p. 60. 183 Article 29 Working Party, ‘Working document on determining the international application of EU data protection law to personal data processing on the Internet by non-EU based websites’(WP 56, 30 May 2002). 184 See note 57, p. 191. 43 sovereign states (non EU Member States) to successfully put a jurisdictional claim on any subject (in the light of this thesis a cloud computing service including the data stored in the cloud), these jurisdictional bases need to be absent. In the concrete this means that a ‘European cloud’ 185, which leaves no room for other states (non EU Member States) to claim jurisdiction, should be constructed. This European cloud should meet certain conditions to guarantee the exclusion of other jurisdictions than the European jurisdiction. These conditions can be derived from the jurisdictional bases described earlier in this chapter in combination with the perception of these bases in foreign countries. As this thesis focuses on excluding the US from having jurisdiction over a cloud service, I will only deal with the way the US sees its jurisdictional reach. 3.1.2.1. Territoriality A first necessity strikes as rather evident: the cloud computer service should be entirely located within the European Union, so on the territory of its Member States. The territoriality principle is a strong and probably the most obvious ground to base jurisdiction on. Therefore, when the cloud service with all its components, is exclusively located within the European Union, the territoriality principle cannot form a basis on which non EU Member States, like the US, may rely. The location of the cloud service does not only mean the location of the office of the service provider. The stored content could not leave the territory of the EU member states at all. So the used servers on which the information is stored (the actual ‘cloud’) should be located within the territory of the European Union too. 3.1.2.2. Personality Next, this cloud service should be provided by purely European cloud service providers which only collaborate with purely European subcontractors. ‘Purely European’ means that a company (in this case a cloud service provider) has no (in)direct legal ties with foreign (non-EU) companies. Let me make this clear with an example. Google Inc. is an originally American company and main corporation of the Google entity with its headquarters (so called Googleplex) in Mountain View, California in the United States of America. Beside the headquarters, Google has over 70 offices in 40 different countries. In each country where Google has an office, it has its own Google business company. So in the Netherlands 185 The term ‘European cloud’ is used to refer to a cloud service which is only subject to the ‘European jurisdiction’. 44 there is Google Nederland B.V. and in the UK there is Google UK Ltd. All these Google corporations in different countries do however not stand alone, but are legally ‘tied’ to the main corporation Google Inc. In fact, Google Inc. is the owner of all ‘subsidiary’ Google companies. 186 Although Google Nederland B.V. is a Dutch company, founded according to Dutch law and located in Amsterdam, it is not ‘purely’ European as it is an incorporation of Google Inc. It is rather just a part of a bigger entity which is undoubtedly a US company. Even if Google Inc. would originally be a European company, which now has its headquarters or even just a subsidiary or office in the US, Google cannot be seen as purely European. For that matter, it is necessary that the company is founded and located within the European Union alone. Why is it that important that the cloud service providers and all its subcontractors are purely European? This has everything to do with the American conception of the personality principle as a jurisdictional basis, which I will now explain. According to American law personal (adjudicatory) jurisdiction can be based on citizenship (active/passive personality principle as explained under 3.1.1.), consent or waiver. In case of a non-resident, citizenship will not apply. The non-resident can however consent to the authority’s jurisdiction (which is often the case in business contracts, when parties agree on the jurisdiction of a certain court). Furthermore, when a non-resident does not (actively) object to the jurisdictional claim (of a court), it is assumed to waive that right, as a result of which jurisdiction over him or her is inevitable. Jurisdiction based on consent and waiver however, is mostly limited to cases concerning adjudicatory jurisdiction, so the jurisdiction of a court to hear and rule a case.187 In case of enforcement jurisdiction it is my view (although already unlikely that a nonresident would consent or not object) that consent and waiver seem to provide an insufficient base for a jurisdictional claim. With citizenship as the first base of jurisdiction, it is obvious that US nationals (including business companies) are subject to US jurisdiction. Even this rather clear criterion however, can cause problematic situations. Maxwell and Wolf point out in their White Paper that significant discussion is going on today about the power of a government to demand a party in its jurisdiction to disclose information or data stored in a cloud, which is physically located in another jurisdiction. In addition they remark that, like many other countries, the US has taken the position that it can base a request for disclosure of data from any cloud server located anywhere in the world on its 186 This information can be derived from the Google web site: http://www.google.com/about/company/facts/locations/. Last checked: August 2012. 187 Http://www.lexisnexis.com/lawschool/study/outlines/html/civpro/civpro02.htm. Last checked: November 2012. 45 own legislation, as long as the cloud service provider is subject to US jurisdiction. 188 This is an application of the (active) personality principle, as a cloud service provider is subject to US jurisdiction when the entity is based (and/or founded according to US law) in the US (as it is then a US company) or has a subsidiary or office in the US. The US Supreme Court made already clear in Pennoyer v. Neff 189 that an out-of-state-resident could be brought under a state’s jurisdiction when it can be found and served within that state. 190 Furthermore in United States v. Bank of Nova Scotia, the court decided against the Bank of Nova Scotia, who refused to respond to a request from the US authorities for banking information because the information was kept in the Bahamas or Cayman Islands and granting access to this information would break Bahamian or Cayman banking secrecy laws. The court held that ‘the foreign origin of the subpoenaed documents should not be a decisive factor. The nationality of the Bank is Canadian, but its presence is pervasive in the United States 191 (…) It cannot expect to avail itself of the benefits of doing business here without accepting the concomitant obligations.’ 192 Sachdeva discusses the ‘active personality principle’ as a US base of jurisdiction too. She remarks that the law of personal jurisdiction has followed the changes of a more global and mobile society, relying on a sufficient nexus between the res (the legal subject, for example the cloud service provider) and the forum (the court representing the law). This led to an approach which constitutes jurisdiction based on the ‘minimum contacts’ of the out-of-state party. This rule of ‘minimum contact’ was first introduced by the US Supreme Court in International Shoe v. Washington 193 . The criterion determines that to subject a party to personal jurisdiction ‘if he be not present within the territory of the forum, he have certain minimum contacts with it such that the maintenance of the suit does not offend traditional notions of fair play and substantial justice.’ So when determining whether personal jurisdiction can be exercised over a party, both the amount and nature of the party’s contacts with the state should be considered. 194 Besides, the legal subjects making use of the cloud services (so not the providers but the customers, whether these are natural persons, business companies or (semi)governments) cannot be of any other nationality than one of the nationalities of the Member States of the EU. 188 W. Maxwell and C. Wolf, A Hogan Lovells White Paper; A Global Reality: Governmental Access to Data in the Cloud, published 23 May 2012. 189 Pennoyer v. Neff, 95 U.S. 714 (1877). 190 See note 178. 191 The Bank of Nova Scotia had a US branch with numerous offices throughout the entire country. 192 United States v. Bank of Nova Scotia, 740 F.2d 817 (11th Cir. 1984). 193 International Shoe v. Washington, 326 U.S. 310 (1945). 194 See note 156, p. 248-249. 46 Otherwise, according to the (passive) personality principle, although internationally very controversial, the US could still claim jurisdiction over data stored in a cloud regarding the processing of data of American subjects. 195 Furthermore, the fact that American citizens would make use of the cloud computing services, directly affects the (active) personality principle, more specific the minimum contact doctrine. 3.1.2.3. Other bases Finally, the effects doctrine and the protective principle as bases for jurisdiction can hardly be excluded just by designing a European cloud, nor could any other typical cloud service or any offline storage system. Besides, both are rather controversial and not really suitable in cases of data protection, so that a government planning to give effect to its powers based on for example the effects doctrine, will first have to build a very strong case (of evidence) to defend its motives and actions. But if suspicions are raised and on the base of known evidence it is likely that, for example, a terrorist action is planned of which essential information is stored in a European cloud, the US government could gather this information via other ways which are far less controversial. 3.1.2.4. Excluding the US So in the end, based on aforementioned, the following criteria should be met to successfully exclude a US jurisdictional claim: - the cloud computing service is physically entirely located within the territory of the EU Member States - the cloud service provider solely has the nationality of one of the Member States of the EU - the cloud service provider contracts only with subcontractors who solely have the nationality of one of the Member States of the EU and who only and exclusively operate within the territory of the Member States of the EU - the cloud service provider operates only and exclusively within the territory of the Member States of the EU - the cloud service provider only processes data of legal persons who solely have the nationality of one of the Member States of the EU 195 I remark that this situation shows some similarities with the former Greek provision brought forward by Kuner, which I discussed earlier. 47 3.2.Mutual legal assistance treaties Even if just European Union member states can successfully claim jurisdiction, in other words all jurisdictional bases for non-EU member states are absent and thus the American government cannot successfully demand disclosure of data stored in a European cloud on the basis of its own legislation like the USA PATRIOT Act, there still is a (legal) possibility for the United States’ government (as well as for other countries) to get disclosure of certain data when necessary (i.e. in case of criminal matters). In combating crime states are more often confronted with the need for help of other states as new technologies make cross border or transnational crimes flourish. Bilateral agreements between countries make it possible to request this help and to form a weapon against criminals. These agreements are called Mutual Legal Assistance Treaties, in short MLATs. The Senate Executive Report 110-13 which accompanies several bilateral treaties between the USA and the Member States of the EU (among which also the Netherlands 196) and the mutual legal assistance treaty between the USA and the EU (as a whole) 197 gives an excellent definition: ‘MLATs are international agreements that establish a formal, streamlined process by which States may gather information and evidence in other countries for use in criminal investigations and prosecutions. While the specific provisions of MLATs vary, they generally obligate treaty partners to take steps on behalf of a requesting treaty partner when certain conditions are met. MLATs typically contain provisions concerning the sharing of collected information between parties, locating and identifying persons and potential witnesses within the parties' territories, the taking of depositions and witness testimony, and the serving of subpoenas duces tecum on behalf of a requesting treaty party.’ 198 This definition makes the purpose of MLATs very clear: making collaboration between states in regard to their (common) fight against crime easier. It means that states who enter into such an agreement, are mutually obliged to take efforts and disclose information (what kind of efforts should be taken and / or what kind of information should be shared is subject to the exact provisions in the MLAT) at request of one of these states. 196 Treaty between the Kingdom of the Netherlands and the United States of America concerning the mutual legal assistance in criminal matters (Verdrag tussen het Koninkrijk der Nederlanden en de Verenigde Staten van Amerika aangaande wederzijdse rechtshulp in strafzaken), the Hague , June 12 1981, to be found on: http://wetten.overheid.nl/BWBV0001033/geldigheidsdatum_03-09-2012 (in Dutch). Last checked: July 2012. 197 Agreement on mutual legal assistance between the European Union and the United States of America, to be found on: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2003:181:0034:0042:EN:PDF. Last checked July 2012. 198 Senate Executive Report 110-13, which can be found on: http://www.gpo.gov/fdsys/pkg/CRPT110erpt13/html/CRPT-110erpt13.htm. Last checked: August 2012. 48 Maxwell and Wolf use the existence of MLATs as an argument that subscribes their view, namely that it does not matter in which jurisdiction data (which is stored in a cloud) is located. They conclude that, due to MLATs, foreign governments (and not only the United States of America) can get the information located in another state anyway. Although it is true that MLATs offer the opportunity to request the sharing of data located in another state (that is even their sole purpose) and the grounds on which such a request can be refused are very limited, they do provide a higher level of protection against unlawful or unjustified disclosure of information, and even more relevant they create more transparency and openness. I will now explain what I mean by this. The big difference between a request for information based on a MLAT and an action based on a jurisdictional claim is that in the first case the requesting state will have to provide the requested state with rather specific information about the nature of the procedure for which the information is needed, the reasons why the information is needed and what kind of information it is looking for. These are formal standards which have to be met for the request being granted. 199 That way, the requested state gets to know exactly what information need to be shared and also gets to know the purpose of the information sharing. Besides, it is the requested state (not the requesting state) that demands disclosure of the information from for example the cloud service provider, which then passes on the selected information to the requesting state. So, a request for information does not at all mean that the requesting state can just ‘look around’ by itself. It will have to specify the information needed to receive just that information from the authorities of the requested state. 200 Moreover, a request based on a MLAT can be refused, although on very limited grounds. Article 10 of the MLAT between the Netherlands and the USA gives an enumeration of these limitations. Two grounds for denial are relevant in the light of this thesis: - the execution of the request may lead to endangerment of the state security or other genuine interests of the requested state - the request does not meet the formal standards put down in the treaty (art. 13) So, states never have to grant requests which are unnecessary and too vague, and they do not have to provide the other state with state secrets or documents which contain highly confident information which could bring the state or its interests into danger. It is at least doubtful whether a 199 See for an example of such requirements art. 13 of the MLAT between the Netherlands and the USA (as referred to in note 195). 200 The IndyMedia case however shows another practice as will be discussed later on. 49 state would take these interests of another state into account when acting itself on a jurisdictional claim. The famous ‘IndyMedia’ (IMC) case shows however that the use of MLATs is less sophisticated than the provisions of the treaties suggest. On October 7, 2004 over 20 websites administered by the Independent Media Center were taken off-line as a result of the seizing of two servers. Those servers, physically located in London (UK), were hosted by Rackspace Managed Hosting, an Internet hosting company based in San Antonio (USA). After receiving a subpoena from a requesting US agency, Rackspace cooperated by acting in compliance with the court order. 201 Afterwards it became clear (via court proceedings of IMC) that Italy had requested the US through a MLAT for assistance in obtaining records of log files in relation to the creation and updating of the web spaces of specific URLs during the period in which a number of attacks on European officials using explosives in delivery packages had occurred. The US officials did not just seize the records requested, but the two complete servers with their content and provided them to Italy. 202 Besides, this case makes (again) clear that at least the US does not use MLATs when it can act upon its own (although controversial and internationally doubtful) jurisdictional claim. The US did not request the United Kingdom via a MLAT to provide the information sought for (forwarding the request of Italy), but seized the data itself on the basis of its jurisdiction (Rackspace Managed Hosting was a US company with offices in the UK). 203 As sovereign states are free to determine the conditions of a MLAT between them, it is possible that the scope of such an agreement (now or in the future) is broader and/or the provisions stricter than the rather specific and relatively narrow MLATs between the USA and the Netherlands or the USA and the European Union: covering more subjects or leaving less room to the requested state to review the necessity and/or range of the request itself.204 201 G. Hosein, ‘International co-operation gone awry – what happened to Indymedia?’, published on: https://www.privacyinternational.org/blog/international-co-operation-gone-awry-what-happened-toindymedia. Last checked: November 2012. This article is an excerpt from a chapter of the book: Cybrercrime and jurisdiction: a global survey, edited by B. Koops and S. Brenner, published in 2006 by T.M.C. Asser Press. 202 Ibid. 203 Ibid. 204 Beside possible bilateral agreements which cover more/other subjects than the treaties referred to, several multilateral treaties exist which provide for some kind of mutual judicial aid different from the assistance provided for in the mentioned treaties. To name just a few (without going into detail): the Vienna Convention on Consular Relations; the Hague Convention on the Service Abroad of Judicial and ExtraJudicial Documents in Civil and Commercial Matters; the Hague Convention on the Taking of Evidence Abroad in Civil and Commercial Matters; the Hague Convention Abolishing the Requirement for Legalization of Foreign Public Documents. These treaties are however of less significance regarding the topic of this thesis than treaties concerning legal assistance in criminal matters. 50 It seems obvious that such differences in what is provided for in MLATs, directly affect the extent of the discretion left to the requested state to review the request and to decide whether not to cooperate. I could for example imagine that countries who have to rely on each other very often (for instance because they are neighbors), both can profit from closer cooperation which might be established by enlarging the scope of the MLAT, reducing the formalities and/or limiting the grounds of refusal. 205 In regard to the question stated at the beginning of this chapter, this means that the level of cooperation between countries based on a MLAT (which is affected by the scope of the agreement, the required formalities and the grounds of refusal) determines the degree of accessibility of the data stored in a cloud by third countries. This level may vary per treaty and per country. This variation in the scope of MLATs, is of special interest in case of cloud computing because of the fact that data in a cloud can be stored on servers throughout the entire world, and in case of a European cloud throughout the entire European Union. When making use of such a European cloud, I could well be that data that belongs to a Dutch governmental institution, is in fact stored on a server in Germany. What if US authorities address German authorities with the request to disclose information which turns out to be confidential data of the Dutch government? I could imagine that the German authorities treat such a request less prudent than the Dutch authorities would have. Besides, the Dutch government is of course not involved in the drafting of MLATs between Germany and any other state. Therefore it might be that the MLAT between Germany and the US has a broader scope than the MLAT between the Netherlands and the US, as a result of which the German authorities will grant the US access to the data. In both scenario’s, the request will not even pass Dutch authorities. In other words: the Dutch authorities would be completely sidelined and the MLAT between the Netherlands and the US easily circumvented. It is however questionable whether this theoretical fear, will translate into an actual threat. When the US government would want to peek into data of the Dutch government which is stored in a cloud, they would first have to find out on which server the data are stored. In cloud computing, most of the times the controller nor the processor do know the exact location of the data, let alone a third party like the US government. Besides, I think we may assume that (in contrast to the suggestion of aforementioned example with Germany) no Member State of the European will blindly and without objection disclose (confidential) information to US authorities. 205 The Benelux (Belgium, the Netherlands and Luxemburg) and the European Union itself can be seen as examples of such cooperation. 51 Anyway, to completely eliminate the possibility of ‘MLAT-shopping’, as a result of which Member States would (have to) disclose (confidential) governmental information (of other Member States) to third country authorities, fully harmonizing the (provisions of) MLATs of the EU Member States (or replacing all bilateral MLATs between Member States and third countries by MLATs to which the European Union (representing all Member States) is party) would be a necessary step. 206 These new treaties should stress the need for mutual legal assistance by providing tools to cooperate while at the same time ensuring a sufficient level of protection regarding the disclosure of (confidential) personal and government data. Furthermore, in this scenario I deem necessary that eventually an EU authority should play a central/supervisory role in the handling of all MLATrequests addressed to (one of) the Member States. This authority should audit the execution of the requests to assure that the protection offered by the treaties is not just an empty formality. I doubt whether the Member States are willing to go this far on short term. In the end the conclusion may be drawn that MLATs indeed are an important constraint on the possibility to create an exclusive ‘EU-jurisdiction’. However, they do not offer a license to freely look into all kinds of information located in another jurisdiction, and therefore, by providing some guarantees, make it possible to ensure a higher level of protection. On the other hand, the Indymedia case shows that their practical use is less prudent than one may have believed. On the other hand, when it is governmental information that is requested by another state, it may be assumed that the requested state will be more mindful. 207 Finally, in regard to cloud computing in specific, an important notion should be made: MLATs do not provide an easier way to get to data stored in a cloud than data stored differently (whether online or offline). At this moment in time, requests based on MLATs already occur and these requests for information (whether it is stored online or offline) need to be treated equally. The actual physical location of the data can however (as mentioned above) lead to the situation that requests are not addressed to the Member State that owns the data, but to the Member State that just has jurisdiction over them. 3.3 Conclusion To prevent foreign governments from making use of their own legislation to grant themselves access to data certain governmental data stored in a cloud, it could be necessary to limit the jurisdiction to which a cloud service is subject to a single legal regime. This chapter proves that it is possible to limit that jurisdiction to the ‘European jurisdiction’, excluding all other jurisdictions 206 The earlier mentioned MLAT between the EU and the US is a beginning of such (minimum) harmonization, as it provides for the application of certain rules in addition to the existing MLATs between the individual Member States and the US. 207 But I once more notice that it is, within the concept of a European cloud, not always the case that the requested state is also the ‘owner’ of the data sought for. 52 especially the jurisdiction of the United States of America. Such an exclusive jurisdiction can only be realized when certain conditions are met: the absence of any base on which other countries could claim to have jurisdiction over ‘the cloud’. Firstly, the cloud should be entirely located within the territory of the European Union. Secondly, the cloud service providers should be purely European. Finally, the users of the cloud service should be solely of the nationality of one of the member states of the European Union as well. When these requirements are fulfilled, the US has no (respected) legal ground to claim jurisdiction. Nevertheless, even without jurisdiction, states can demand disclosure of information if needed in case of a criminal investigation. So called MLATs prescribe when and what kind of information should be provided by the requested state. However, although states do not always proceed accordingly, the procedures in case of a request based on a MLAT provide enough safeguards against unnecessary and unlawful disclosure of information. Besides, MLATs do not affect data stored in a cloud differently than data that is stored otherwise. 53 4. The European Cloud and procurement issues At the beginning of the previous chapter I asked the core question of this thesis. Subsequently I answered the first part of this question by discussing the rules of international jurisdiction: is possible to create a cloud computing service that excludes all but the European jurisdiction? Yes, it is possible to design a cloud computing service which is subject to the ‘European jurisdiction’ only. To reach that goal certain conditions should be met, namely that the ‘cloud’ and thus the data are at all times physically located on EU territory, the cloud service providers (and the subcontractors) are originally and ‘purely’ European and the users of the cloud computing service are ‘purely’ European too. Hence, it is clear what kind of cloud services European governments could make use of. But is it legally possible for governments to link such a set of conditions to their demand for cloud computing services? In this chapter I will provide an answer to that question as I will discuss the rules of public procurement to which governments are bound when entering into a contract with a (cloud) service provider. But before doing so, I like to address one more remark. As mentioned in the third paragraph of the Introduction, this thesis aims at looking at the legal possibilities for governments to use a cloud computing service within the existing IT-infrastructure. Therefore the idea of governments setting up their own clouds (which results in the creation of a private cloud), although such a cloud could ensure the protection sought for (without having as much trouble of putting all kinds of requirements on cloud service providers), is excluded. For the aim of this thesis, a private cloud would hamper the essentials of cloud computing in optima forma too much. 4.1. European public procurement rules When a government wants to enter into a contract to purchase certain goods or services (like buildings, computers, coffee, anything actually) it is bound by certain rules to prevent corruption and unfair competition. Besides, these rules try to raise competition so that the public money is spent well (best value for money) 208. To reach that goal, the rules prescribe how the purchasing governmental body should find a contracting party. This process of finding a contracting party is called (public) procurement. 208 See for example: ‘Public procurement: Commission calls on Slovakia to respect EU rules for electronic toll collection contracts’, Press Releases, Brussels 30 September 2010, IP/10/1244. To be found on: http://europa.eu/rapid/pressReleasesAction.do?reference=IP/10/1244&format=HTML&aged=0&language=e n&guiLanguage=en. Last checked September 2012. 54 4.1.1. Sources of European public procurement In the European Union, the rules of public procurement are mainly laid down in the procurement directives (and the national laws which are conversions thereof), but the provision of the EC Treaty 209 (hereinafter: the Treaty) concerning the internal market (free movement of goods, persons and services) are of relevance too. 210 Since march 2004, when the old procurement directives were thoroughly revised, there have been two procurement directives: Directive 2004/17 211 that concerns the coordination of procurement procedures of entities operating in the water, energy, transport and postal service sectors (the so called ‘special sectors Directive), and the general Directive 2004/18 212 (hereafter: General Directive or just Directive) concerning the coordination of procurement procedures for the award of public works contracts, public supply contracts and public service contracts. Peter Trepte remarks that the Directives do not seek to impose a new common regulatory regime on the member states in the field of procurement. The Directives rather limit their scope to those measures required for the coordination exercise and permit the member states to maintain or adopt substantive and procedural rules to the extent that these are not in conflict with the Directives of Treaty provisions.213 In the Netherlands, both Directives are implemented through two ‘general measures of governance’ or decrees (in Dutch: ‘algemene maatregelen van bestuur’ or amvb’s) based on the ‘Dutch Framework Act EEC-provisions’ 214: the Decree public procurement rules 215 and the 209 The Treaty on establishing the European Community, known as the Treaty of Rome 1957, as amended by the Single European Act 1986, the Treaty of Maastricht 1992, officially known as the Treaty on European Union (TEU), the Treaty of Amsterdam 1997, the Treaty of Nice 2001 and the Treaty of Lisbon 2007. 210 E.H Pijnacker Hordijk e.a., Aanbestedingsrecht; Handboek van het Europese en het Nederlandse Aanbestedingsrecht, Den Haag: Sdu Uitgevers bv 2004, p. 12. 211 Directive 2004/17/EC of the European Parliament and of the Council of 31 March 2004 on the coordination of procedures of entities operating in the water, energy, transport and postal service sectors. This Directive can be found on: http://eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=CONSLEG:2004L0017:20100101:EN:PDF. 212 Directive 2004/18/EC of the European Parliament and of the Council of 31 March 2004 on the coordination of procedures for the award of public works contracts, public supply contracts and public service contracts. This Directive can be found on: http://eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2004:134:0114:0240:EN:PDF. 213 P. Trepte, Public Procurement in the EU; a practioner’s guide, Oxford: Oxford University Press 2007, p. 2. 214 Dutch Act of 31 March 1993, Stb. 1992, 212, to execute the EEG-measures in regard to the public procurement procedures for the award of public works contracts, public supply contracts and public service contracts. (In Dutch: Wet van 31 maart 1993, Stb. 212, tot uitvoering van EEG-maatregelen inzake het 55 Decree procurement rules for special sectors 216. These decrees are practically direct implementations of the Directive, and (therefore) momentarily subject to revision. 217 The old ‘Framework Act’ is also being revised. Recently the Dutch Parliament enacted the new Procurement Act 2012, which will probably enter into force in (early) 2013. 218 Based on the mentioned Decrees, the government has developed certain policies219 and terms of use 220 which are necessary in determining what and how procurement rules should be applied. Besides the procurement rules based on the two mentioned Directives, there is Directive 2007/66 221 which sets forth the rules for review and enforcement of public procurement rules. In regard to the subject of this thesis i.e. the possibility for European governments to use cloud computing services, I will only focus on the rules of public procurement as laid down in the general Directive 2004/18. But first I will pay short attention to a few provisions of the EC Treaty which are applicable to procurement. Although the Treaty does not contain any explicit provisions concerning public procurement, it does provide rules which affect public procurement within the European Union. Article 12 of the Treaty states that ‘any discrimination on grounds of nationality shall be prohibited’. This non-discrimination provision embodies a standard of national treatment which requires that regardless of their nationality, people, companies or governmental bodies should be treated completely equal in a situation that is governed by Community law, according to the Court of Justice.222 Non-Community nationals cannot rely on it, unless they are resident in any of the member states, meaning that subsidiaries and branch offices of non-Community companies do plaatsen van opdrachten voor de levering van producten, de uitvoering van werken en de verrichting van diensten). 215 Stb. 2005, 408. 216 Stb. 2005, 409. 217 http://www.rijksoverheid.nl/onderwerpen/aanbesteden/regelgeving-aanbestedingen. Last checked: September 2012. 218 A first attempt to realize a General Procurement Act failed in 2008. See for up to date information: http://www.rijksoverheid.nl/onderwerpen/aanbesteden/nieuwe-aanbestedingsregels. Last checked: December 2012. 219 For example: Beleidsregels aanbesteding van werken 2005, Stcrt. 2005, 207. 220 For example: Aanbestedingsreglement Werken 2012, which can be found on: http://www.rijksoverheid.nl/documenten-en-publicaties/rapporten/2012/07/10/aanbestedingsreglementwerken-2012.html. Last checked September 2012. 221 Directive 2007/66/EC of the European Parliament and of the Council of 11 December 2007, amending Council Directives 89/665/EEC and 92/13/EEC with regard to improving the effectiveness of review procedures concerning the award of public contracts. 222 Case 186/87 Ian William Cowan v Trésor Public 1989 ECR 195 at 219. 56 profit the protection given by article 12.223 Besides, the role of article 12 (lex generalis) is limited, because the more specific rules on public procurement (the Directives, i.e. legis specialis) already cover this issue. Furthermore the provisions concerning the free movement of goods (art. 28 and 29 EC-Treaty), free movement of employees (art. 39 EC-Treaty), the freedom of establishment (art. 43 ECTreaty) and the freedom to provide services (art. 49 EC-treaty) have repeatedly been appealed to in cases concerning public procurement. 224 4.1.2.The principles of European public procurement As mentioned before, the government is in many ways a special contracting party. The interests involved are in many cases of high value and need to be of constant quality. Besides, the acquisition of certain works, supplies or services should occur objectively, preventing unjustified state aid, corruption and unfair competition. The main principles of public procurement law have to secure a fair acquisition by governments or public bodies. Westerdijk 225 names four core principles of public procurement which are in his view of ‘paramount importance’, these are the principles of: - Equal competition - Transparency - Non-discrimination - Proportionality. These basic principles firstly aim at creating a level playing field for suppliers to have a real chance of entering into a contract with government bodies (equal competition). Furthermore the principle of transparency determines that governments, when starting a procedure to get into a contract, should make their requests for proposal public, and within the procedure, obliges the contracting authorities to explicitly set forth which conditions they wish to apply during the proceedings. Besides they are obliged to treat each tenderer in an equal manner (nondiscrimination), and the criteria used to determine the selection of the suppliers and the award of 223 See note 213, p. 6. 224 I refer to a good overview of procurement cases in which these provisions were infringed, given by Pijnacker Hordijk and others. See note 210, p. 12. 225 R. Westerdijk, ‘Open Standards and open source software v. public procurement’, p. 10. This text is attached to this thesis under Appendix II. 57 the contract should be proportionate to the scope and context of the contract at hand (principle of proportionality). 226 Pijnacker Hordijk underlines that the Court of Justice of the EU (former Court of Justice of the EC) considers the principle of equal treatment of tenderers to be the basic principle of public procurement law, as follows from the decision in the case C-243/89 227. The Court of Justice then declared that the principle of equal treatment, although not explicitly mentioned in the (former) Directive, flows from the main goal of the Directive, namely to create fair competition in the field of government acquisitions. In addition, the author refers to the case C-87/94 228 of the Court of Justice as the introduction of the transparency principle.229 Both principles are incorporated in the ‘new’ (current) Directives.230 The principle of non-discrimination is also clearly seen in article 23 of the General Directive which concerns the technical specifications. These specifications play an important role for the definition of the scope of the public contract, as they set out and describe in an equal and open manner which technical solution is sought. Article 23 provides that they shall be clearly documented and must ‘afford equal access for tenderers and not have the effect of creating unjustified obstacles to the opening up of public procurement to competition.’ 4.1.3. The obligation to follow European public procurement rules The General Directive (the Directive) itself contains provisions which determine the scope of its rules. In this regard, article 1 is particularly of relevance as it provides several definitions of key concepts of the Directive. The entities identified by the Directive to follow its rules, are by article 1 sub 9 of the Directive defined as ‘the State, regional or local authorities, bodies governed by public law, associations formed by one or several of such authorities or one or several of such bodies governed by public law.’ A ‘body governed by public law’ is further described as ‘any body (a) established for the specific purpose of meeting needs in the general interest, not having an industrial or commercial character; (b) having legal personality; and (c) financed, for the most part, by the State, regional 226 Ibid. 227 Case C-243/89 Commission v. Denmark (Storebaelt), Court of Justice of the EC, 22 June 1993. 228 Case C-87/94 Commission v. Belgium (Waalse bussen), Court of Justice of the EC, 25 April 1996. 229 See note 208, p. 30-31. 230 Art. 2 of the General Directive and art. 10 of the Special Sectors Directive. 58 or local authorities, or other bodies governed by public law, or subject to management supervision by those bodies; or having an administrative, managerial or supervisory board, more than half of whose members are appointed by the State, regional or local authorities, or by other bodies governed by public law.’ 231 Moreover, public procurement rules are only to be followed for the award of public contracts. Article 1 sub 2 under a of the Directive gives a definitions of such contracts, stating that ‘public contracts are contracts for pecuniary interest concluded in writing between one or more economic operators and one or more contracting authorities and having as their object the execution of works, the supply of product or the provision of services within the meaning of this Directive.’ 232 Within the scope of this thesis, I will only deal with public service contracts, which are also defined in article 1 sub 2 under d of the Directive as ‘public contracts other than public works or supply contracts having as their object the provision of services referred to in Annex II.’ 233 Important in this regard is that article 20 of the Directive determines that the full set of public procurement rules applies to the acquisition of services listed in Annex II A only. Computer and related services are indeed listed in Annex II A, so that the procurement rules as laid down in the Directive do fully apply. 234 When it is clear that a contracting authority which falls within the scope of the Directive and ditto public contract235 are concerned, one should determine whether the estimated value (exclusive of value added tax) equals or surpasses the threshold amount set out for the kind of contract. 236 These threshold amounts are set each two years in a Regulation of the European Commission. Regulation 1251/2011 237 holds the thresholds for public contracts for the years 2012 and 2013: - EUR 130.000,- for central governments conform Annex IV (art. 7a of the Directive) - EUR 200.000,- for all other contracting authorities (art. 7b of the Directive). 231 Art. 1 sub 9 of the General Directive. 232 Art. 1 sub 2 under a of the General Directive. 233 Art. 1 sub 2 under d of the General Directive. 234 Art. 20 of the General Directive. Services which are not listed in Annex II A (but in Annex II B instead) are subject to a less strict regime provided by the Directive ex art. 21 of the General Directive. 235 Certain types of contracts are explicitly excluded by the Directive, see art. 10 and art. 12-18 of the General Directive. 236 Art. 7 of the General Directive. 237 Commission Regulation (EC) No 1251/2011 of 20 November 2011 amending Directives 2004/17/EC, 2004/18/EC and 2009/81/EC of the European Parliament and of the Council in respect of their application thresholds for the procedures for the award of contracts, Official Journal L 319/43 of 2 December 2011. 59 Pijnacker Hordijk points out, however, that even though the Directive is not applicable (because the value of the contract is below the threshold, the contracting authority does not qualify or the public contract itself is outside the scope of the Directive) the Court of Justice of the EC has declared that the contracting authority is ‘bound to comply with the fundamental rules of the Treaty, in general, and the principle of non-discrimination on the ground of nationality, in particular, that principle implying, in particular, an obligation of transparency in order to enable the contracting authority to satisfy itself that the principle has been complied with. That obligation of transparency which is imposed on the contracting authority consists in ensuring for the benefit of any potential tenderer, a degree of advertising sufficient to enable the services market to be opened up to competition and the impartiality of procurement procedures to be reviewed.’ 238 The Commission has further described this obligation in a Commission Interpretative Communication of 2006 239, which sets out guidelines on how to apply these principles. The view of the Commission is however not undisputed. Pijnacker Hordijk defends a strict(er) interpretation of the obligation described by the Court of Justice. Unfortunately, it is beyond the scope of this thesis to go deeper into this matter. 240 4.1.4. The procedures for selection The award of a public contract which is subject to the rules laid down in the General Directive, normally follows the ‘open’ or the ‘restricted’ procedure. It is up to the contracting authority to choose one of these procedures.241 The open procedure comes down to the following. Upon publication of the prescribed notice, suppliers send in one package providing information with respect to their own identity (which is relevant for the selection) as well as their offer. 242 The restricted procedure differs from the open procedure in a way that suppliers, upon publication of the prescribed notice, send in only information with respect to their identity. Subsequently, the contracting authority makes a selection based on the information provided by the tenderers and 238 Case C-324/98 Telaustria, Court of Justice of the EC, 7 December 2000, paragraphs 60-63. 239 Commission Interpretative Communication on the Community law applicable to contract awards not or not fully subject to the provisions of the Public Procurement Directives (2006/C 179/02), Official Journal C 179/2 of 1 August 2006. 240 See note 210, p. 34-35 and 99. 241 Art. 28 of the General Directive. 242 Art. 1 sub 11 under a of the General Directive. 60 invites at least five 243 suppliers to submit an offer. Only the invited suppliers may submit an offer. 244 In very specific situations, which are restrictively prescribed in the Directive, other procedures can be followed. These are the competitive dialogue (art. 29), the negotiated procedure with prior publication of contract notice (art. 30), and the negotiated procedure without prior publication of contract notice (art. 31). In case of particularly complex contracts (i.e. contracts where the contracting authority is not objectively able to define the technical means capable of satisfying its needs or objectives, and / or is not objectively able to specify the legal and / or financial make-up of a project245) the competitive dialogue can be used. This procedure is similar to the restricted procedure, but after the selection of a minimum of three 246 candidates there is a dialogue phase prior to the submission of the tenders. If the negotiated procedure with or without the publication of contract notice is followed, the contracting authority can get into negotiation with the tenderer(s) of its choice to determine the specifications and terms of the contract. Under the General Directive, these procedures can however only be used in very specific (and strict) situations given in the articles 30 and 31 of the Directive. Whatever procedure may be followed, the goal is the same: selection of a tender to award the public contract to. The first selection to be made, is the determination of the contracting authority whether a supplier is suitable to enter into a public contract. Therefore it is important that the candidates supply sufficient information about their identity. With this information in mind, the selection occurs based on the criteria for qualitative selection which are laid down in artt. 45-52 of the General Directive. These concern the so called mandatory exclusion criteria (participation in a criminal organization, corruption, fraud or money laundering)247, optional exclusion criteria (for example bankruptcy) 248, and criteria establishing the suitability of the candidate or tenderer with 243 Art. 44 sub 3 of the General Directive. 244 Art. 1 sub 11 under b of the General Directive. 245 Art. 1 sub 11 under c of the General Directive. 246 Art. 44 sub 3 of the General Directive. 247 Art. 45 sub 1 of the General Directive. 248 Art. 45 sub 2 of the General Directive. 61 regard to its economic and financial standing 249 as well as its technical and / or professional ability. 250251 After the qualitative selection, the contracting authority has to decide to which tenderer the contract will be awarded. The contract award criteria are laid down in article 53 of the General Directive, which leaves no room for any discussion: the contract is awarded to either - the most economically advantageous tender, or - the lowest price only. The most economically advantageous tender must be determined form the view point of the contracting authority making use of various criteria linked to the subject-matter of the contract, like quality, price, technical merit, aesthetic and functional characteristics, environmental characteristics, running costs, cost-effectiveness, after-sales service and technical assistance, delivery date and delivery period or period of completion. 252 When the contract is awarded to the most economically advantageous tender, the contracting authority has to specify in the contract notice or in the contract documents the relative weighting which it gives to the criteria used (transparency). 253 That way, candidates or tenderers know the relevant (or even decisive) factors in advance. Westerdijk points out that for ICT related public service contracts (like an arrangement for cloud computing services) the criterion of the most economically advantageous award is commonly used. The contracting party thus has some freedom to establish the criteria of its choosing as long as these are relevant and proportionate to the subject matter. He furthermore remarks that courts will only marginally test such choice. 254 4.2. European procurement rules and the European cloud Now that we have seen (in a nut shell) how public procurement works, it is time to concentrate on the main question of this chapter. Bearing in mind the European procurement rules, is it possible 249 Art. 47 of the General Directive. 250 Art. 48 of the General Directive. 251 See note 225, p. 13. 252 Art. 53 sub 1 under a of the General Directive. 253 Art. 53 sub 2 of the General Directive. 254 See note 225, p. 14. 62 for European governments to seek for a cloud computing service which meets the requirements as set in the previous chapter, namely that of the European cloud. The most important requirement in this regard, is the need for the providers of the cloud computing service, as well as the (sub)contractors which play a key part in making the cloud service possible, to be ‘originally and purely European’. This comes down to the exclusion of all providers which are (also) (in)directly subject to another jurisdiction than just that of the member states of the European Union. The American jurisdiction in particular. It seems obvious that such a criterion is at odds with the principle of nondiscrimination which is, as we have seen, a key element of public procurement law. Before considering the (tense) relationship between the criterion of being ‘purely European’ and the principles found in the procurement Directives, the question must be answered how this condition should be qualified. It is most likely to describe it as one of the technical specifications of the requested service, namely that the offered cloud computing service needs to secure that the data stored are solely subject to the jurisdiction of the European Union (its member states), so to prevent the possibility of foreign (non-EU) countries, especially the USA, to demand disclosure of the data on the basis of their own legislation. I remark that of course all kind of other (technical) specifications about the exact design of the (cloud computing) service need to be added. When formulated like above in the contract notice, the condition of exclusive jurisdiction seems transparent to me. It gives a clear and open view on the requirements of the service demanded by the contracting authority, which are known by all candidates. It is however at least doubtful whether the mentioned criterion is non-discriminatory and proportionate (and thus in line with the legislation of the European Community in general and the General Directive in specific). Article 23 of the General Directive states that a technical specification may not create ‘unjustified obstacles in the opening up of public procurement to competition’ and therefore must afford equal access for all tenderers. 255 Furthermore the General Directive prohibits an unequal treatment and discriminatory approach of candidates in article 2, which is supported by the general non-discrimination clause of article 12 of the Treaty which provides the equal treatment of people (including businesses) regardless of their nationality. The specialty (and at the same time the difficulty) of the mentioned condition is that it does not initiate direct discrimination on the ground of nationality, but indirectly. Although the requirement that the exclusion of all but the ‘European jurisdiction’ is guaranteed is in itself non255 Art. 23 sub 2 of the General Directive. 63 discriminatory), it does imply for instance, as set out in the previous chapter, the necessity of a purely European provider. Hence some candidates drop out or have actually never (had) a real chance due to reasons connected to their nationality or working area. That seems however not always problematic, as Community law does not primarily 256 aim for protecting non-Community members (third country nationals). 257 Subsidiaries from companies with a non-EU nationality or EU-based companies with subsidiaries in non-EU countries on the other hand, certainly do fall within the protecting scope of Community law and thus may rely on EU legislation. Still I strongly doubt whether such companies, which cannot fulfill the obligation to exclude foreign (American) jurisdiction in regard to the offered cloud computing service, can successfully appeal to the non-discrimination clauses of European legislation, in regard to procurement law especially art. 2 and art. 23 of the General Directive . First of all, these provisions must be interpreted in the light of Community law as a whole and in connection with article 12 of the Treaty in particular. Then one has to acknowledge that the aim of the non-discrimination principle within EU-law is, has been and will be to prevent the creation of unjustified obstacles which hamper the accomplishment of the common internal market. 258 Hublet remarks that the principle that is in the first place a condition sine qua non for the creation of the this market and that holds that neither the nationality of individuals nor the origin of goods, services or capital should be relevant criteria for its development, should be considered a keystone of the system of European integration. 259 With this idea behind the non-discrimination principle in mind, it is not astonishing that both in doctrine 260 and in case law of the Court of Justice of the European Union 261, regardless of the 256 The view that so called third country nationals do not fall within the protecting scope of the nondiscrimination principle (concerning grounds of nationality) of EU law (art. 12 of the Treaty) is under discussion. For example in the article ‘The scope of Article 12 of the Treaty of the European Communities vis-à-vis Third Country Nationals: Evolution at Last?’ (see note 52), the author challenges the ‘classical interpretation’ of the scope of application of article 12 of the Treaty. It is however beyond the scope of this thesis to have an in-depth analysis on this subject. 257 See note 222. 258 In this regard it is meaningful that the prohibition to discriminate on grounds of nationality was already present in the text of the Treaty of Rome of 1957 (formerly article 4) in the exact same wording as nowadays (article 12). 259 C. Hublet, ‘The Scope of Article 12 of the Treaty of the European Communities vis-à-vis Third-Country Nationals: Evolution at Last?’, European Law Journal vol. 15, no. 6, November 2009 (Blackwell Publishing 2009), p. 758. 64 unconditional text in article 12 of the Treaty, the possibility of justification of direct or indirect discrimination on the ground of nationality, is confirmed. When specifically looking at public procurement law (as a subject of Community law) and its specific goals (i.e. to forestall corruption and fraud and at the same time raising competition to get best value for money), the same can be concluded. In cases concerning (discriminating) technical specifications article 23 of the General Directive explicitly states that no such specification will be required, that the equal access of tenderers is constrained or unjustified obstacles to the opening up of public procurement to competition are created. So, the distinction that is indirectly made on the basis of nationality, namely the condition that the tenderer can guarantee that all but the European jurisdiction are excluded (hence the exclusion of non-purely European tenderers), would thus not be discriminatory, other than when it cannot be objectively and reasonably justified. Question is whether or not the specification in casu is objectively and reasonably justified. Answering that question, the Court of Justice of the EU always begins with considering that it is settled case law that comparable situations should not be treated unequally and that different situations should not be treated equally. It then adds that such treatment may however be justified only if it is based on objective considerations independent from the nationality of the persons concerned and is proportionate to the objective being legitimately pursued.262 Aforementioned is the objective justification test. It has two key elements: is there a legitimate aim to discriminate, in other words ‘a good reason why to discriminate’, and furthermore are the means chosen proportionate? Proportionality is defined by the Court of Justice of the EU in various cases (not necessarily concerning discrimination on the basis of nationality and/or public procurement). 263 It constitutes two criteria: firstly do the means chosen successfully achieve the aim of the discrimination, and 260 See for example J. Gerards, ‘Discrimination grounds’, in D Schiek, L. Waddington, M. Bell, Cases, Materials and Text on National Supranational and International Non-Discrimination Law, Hart Publishing, 2007, p. 33 and 64. 261 See for instance: Case C-323/95 of the Court of Justice of the EC Hayes [1996] ECR I-4661; Case C85/96 of the Court of Justice of the EC Maria Martinez [1998] ECR I-2691; Case C-164/07 of the Court of Justice of the EU Wood [2008] ECR I-4143. 262 See for example Case C-148/02 Garcia Avello [2003] ECR I-11613, paragraph 31. 263 For example: Case C-170/84 of the Court of Justice of the EC 13 May 1986, paragraph 37. Although this case concerns discrimination on the ground of sex in employment, it provides the view of the court on the objective justification test which is the same in all cases of discrimination. 65 secondly is the discriminating factor necessary and proportionate to reach the legitimate goal which is pursued (no other, less radical possibility is at hand). Applying all this to the procurement issue raised in this thesis, I come to the following conclusion. The aim of the requirement or technical specification to guarantee the exclusion of all but the European jurisdiction, is to (absolutely) secure the safety and confidentiality of the data which are eventually processed by the cloud computing service and its provider (data stored in the cloud), and in doing so fully complying with the European legislation which reflects the European view on the need for privacy of individuals. In my view, that is an objective and legitimate purpose. It answers to a real need of European governments, namely to benefit from the advantages offered by cloud computing services in a truly safe manner. Besides, the means chosen (i.e. the requirement to guarantee the exclusion of foreign jurisdiction and thus excluding non-purely European providers) is suitable to achieve that aim and furthermore the only possible way to go. 264 Article 23 of the General Directive states, as an equivalent of the proportionality test designed by the Court of Justice of the EU, that technical specification which lead to difficulties because of factors of nationality (for example when a Dutch standard is used, this might affect the possibilities of foreign tenderers due to their ability to perform according to this specific standard) need to be accompanied by the words ‘or equivalent’. One could therefore say that the requirement to guarantee the exclusion of foreign jurisdictions does not necessarily have to include the exclusion of foreign (American) or European tenderers who are themselves subject to such a foreign jurisdiction. If these candidates can effectively guarantee that the cloud computing service is provided in such a way that foreign governments cannot execute their jurisdiction, in other words when the cloud is located entirely on European soil and that at all costs they will not yield in case of a request concerning disclosure of processed data from foreign governments. The problem however in my opinion, is that these providers cannot effectively guarantee such exclusion of jurisdiction. Due to the fact that they are intensely connected to the American market and thus obtain a position in which they are (economically) dependent on it, they lack the possibility to ignore the American government at all costs and so form an easy target. Moreover, even if the cloud service provider is persistent, the American government could on the ground of their jurisdictional claim, collect the data itself (even without the permission of the service provider). Last but not least, the exclusion of certain providers based on their nationality, origin or global working field, does not particularly infringe the primary goals and corresponding principles of 264 As is made clear in the previous chapter. 66 procurement law, like promoting competition and preventing corruption and fraud. The exclusion leaves room for (purely) European providers within the boundaries of the request, to enter into competition and thus for governments to get best value for money. And as long as the requirements are made public openly and clearly in the contract notice, so that all possible candidates know what is requested, there is no reason to believe that the principle of transparency is constrained. In case the Court of Justice of the European Union would take a different approach in the future, ruling that exclusion of non-purely European cloud service providers is prohibited (a view point I would certainly not subscribe), or in case there would be no cloud service provider who can meet the specific requirements, governments setting up their own (private) clouds (with in-house expertise) would be the only way to go. Although bound to public procurement rules when purchasing the needed hard ware to do so, they will probably not be confronted with - and restrained by - dubious (or debatable) grounds of discrimination. 4.3. WTO Government Procurement Agreement For the sake of completeness, I have to mention that next to the European public procurement rules as laid down in the General Directive and the Special Sectors Directive, European public procurement is also governed by the WTO Government Procurement Agreement of 1994265 (hereinafter: GPA). Just like the European Directives, the GPA gives rules on how contracting authorities (or ‘entities’ in the wording of the GPA) should purchase public works, public services or public supplies. On main lines the regulation in the GPA is similar to that of the EU Directives 266, which is a necessity for the European Union being bound to it. For that reason, I will not discuss the GPA extensively. But as the WTO and thus the GPA tries to stimulate international trade, it provides for equal treatment of tenderers from all countries which are party to the agreement. That way the GPA enlarges the scope of the European legislation to all countries (among which the member states of the EU) party to the GPA. This means that the tenderers from the USA (which is party to 265 WTO Government Procurement Agreement of 1994 (Uruguay Round), PB 1994, L 336/273. The Council of the European Union ratified the agreement, so that the entire European Union (inter alia the Netherlands) is bound by its rules: Council Decision 94/800/EC of 22 December 1994 concerning the conclusion on behalf of the European Community, as regards matters within its competence, of the agreements reached in the Uruguay Round multilateral negotiations (1986-1994). 266 Pijnacker Hordijk remarks that there are several (minor) differences among which a few are doubtful. See note 210, p. 10-11. I will not discuss these in the light of this thesis. 67 the GPA 267) must be treated in a non-discriminatory way, meaning that they must be treated equally to European Union nationals. 268 There is however no reason to presume that the objective justification of the exclusion of certain tenderers as described above, would not be sufficient under GPA law. So the conclusion can be drawn that, even though US companies can engage in procurement procedures in the European Union on the same terms as EU companies, the GPA does not prohibit indirect discrimination on the ground of nationality as long as it is objectively justified. 269 4.3. Conclusion This chapter aimed at getting a general insight in public procurement rules which govern contracting authorities when purchasing public works, public supplies or public services. It specifically tried to answer the question whether it is legally possible for European governments to give effect to their wish to make use of cloud computing services in a truly safe manner within the existing IT-infrastructure. Taking into account the reasons why the exclusion on the ground of nationality or origin is made and the fact that it does not affect the primary goals of procurement law like promoting competition and preventing corruption and fraud, it is my view that European contracting authorities are free, when wishing to make use of cloud computing services, to require that the provider can guarantee that the data stored in the cloud (and thus the cloud itself) are subject to the ‘European jurisdiction’ only. It is my opinion that such a treatment endures the ‘objective justification test’ which is designed by the Court of Justice of the EU, at least when it is made clear that otherwise (when the data is also subject to the jurisdiction of non-EU Member States) the data is not offered the protection required according to European rules. 267 A list of countries which are party to the GPA can be found on: http://www.wto.org/english/tratop_e/gproc_e/memobs_e.htm#parties. Last checked: September 2012. 268 Article III of the GPA. 269 Article VI of the GPA which contains a similar regulation concerning technical specifications as art. 23 of the General Directive. 68 5. The European cloud: the solution? At the end of this thesis, but before drawing the general conclusion answering the central research question given in the Introduction, I would like to consider the motives for a European cloud once more. The NLnet foundation brought forward the question whether it would be possible to create a cloud computing service which would ensure that the stored data would remain out of foreign (American) hands under all conditions, so that EU governments could use cloud computing services for the processing of their (highly confidential) data without fearing unauthorized disclosure of these data to third parties (US government). When confronted with such a problem, one can of course look at the existing legal framework and try to find solutions within. That is what this study is about. It shows that an exclusive European cloud service can be achieved, but it is one with all kind of (difficult) restrictions. One can therefore raise questions whether this problem can be solved legally, when the cause of the problem, (a feeling of) great mistrust, may be at a whole other level. Although the European Commission recognizes both the high potential of the cloud and the risks involved, it looks for a possibility to ‘ensure a high level of protection without falling into the trap that would restrict users to only a European cloud.’ 270 According to the Commission, as well as many authors, the free flow of data across continents is necessary to provide access to the best cloud services regardless of geography. Besides, a ‘balkanized system’ of clouds around the world constrains the essence of the success of the Internet (globalization) and would forestall enjoying the full benefits of cloud computing.271 In fact, it is quite obvious that the idea of limited cloud services is rather incompatible with the borderless nature of the Internet (which is a great part of both successes). The Vice-President of the European Commission responsible for the Digital Agenda for Europe, the Dutch Neelie Kroes, therefore presented the so called ‘European Cloud Strategy’ late September 2012. 272 In this document, the EU Commission sets out the high potential of using the 270 These are the words of vice-president of the EU commission, Justice commissioner Vivian, drawn from her speech of 7 December 2011 ‘Privacy in the Cloud: Data Protection and Security in Cloud Computing’ (SPEECH/11/859) can be found on http://europa.eu/rapid/press-release_SPEECH-11-859_en.htm. Last checked: November 2012. 271 C. Wolf and W. Maxwell ‘Dangerous assumptions about clouds’, CSO 31 July 2012, published online on: http://www.csoonline.com/article/712565/dangerous-assumptions-about-clouds?page=1. Last checked: November 2012. 272 Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, Unleashing the potential of cloud computing in 69 cloud 273, and subsequently provides the key areas where action is needed to be taken. In this regard, the Commission pays special attention to the possibilities for cloud computing to lower public costs, push the public benefits up by providing the opportunity to enjoy full electronic public services instead of a paper bureaucracy. Thus giving a broader base for economic activity involving the entire population. 274 The Commission reckons that creating trust in cloud solutions is of utmost importance to reach its full potential. In this regard the report mentions three key actions:275 - cutting through the jungle of standards; - safe and fair contract terms and conditions; - establishing a European Cloud Partnership to drive innovation and growth from the public sector. In addition to these actions concerning stimulation of the European single market, the report mentions that, without barriers to stop cloud computing services at geographical borders, there is a need to look beyond the EU at the wider international situation. The commission shows to be aware of the need to reinforce international dialogue on safe and seamless cross-border use, and specifically mentions data protection and the access to data by foreign law enforcement agencies and the use of MLATs as a key theme to be dealt with. 276 So instead of raising a wall by putting restrictions to the key elements (use, location and provider) of cloud computing services 277, barring it from living up to its full potential, building trust and using diplomatic ways to ensure a sufficient level of data protection may be a more fruitful solution to the problem. In my view it might be the only possible solution. Both the US and the EU are among the leading players on the world market. That way they are more or less convicted to each other, as the US needs the EU and vice versa. To keep their economies up and running, trans-continental trade and cooperation is crucial. In such a relationship, there is no place for mistrust. Therefore I think Europe, Brussels, 27 September 2012, COM(2012), 529 final. To be found on: http://ec.europa.eu/information_society/activities/cloudcomputing/docs/com/com_cloud.pdf. Last checked: November 2012. 273 In the report, figures are mentioned of an estimated increase of GDP with € 250 billion in 2020, translating into the creation of 2,5 million jobs (p.6). 274 See note 272, p. 5. 275 See note 272, p. 10. 276 See note 272, p. 16 277 Alike the European cloud which has been discussed in this thesis. 70 that keeping up the international dialogue between the EU and the US (and other countries as well) for discussing matters like data protection and law enforcement, is of utmost importance. Ultimately such dialogue could (or should) lead to a(n) (in)formal agreement on how to cope with such issues. Besides, the legal possibilities to keep the US government from access to data stored in a cloud, could only prevent unauthorized disclosure of data to a certain level. Technical tools, like encryption of data can (and should) also help to secure the confidentiality of the information stored on line. However, complete foreclosure probably is an illusion. When the American government really suspects important data to be stored in a European cloud, it will most likely find a legal or illegal way to get possession over that information. I am truly convinced that the EU and the US have enough confidence in, and mutual respect for each other to make sure that European legal subjects can use cloud computing service without the fear of unauthorized disclosure 278, while at the same time the US can remain in the position to get access to data stored in a cloud when there is actual reason to. 279 It should not be up to these two major players alone The complete international community should discuss the issue at stake: the possible conflicting interests of data protection and legal enforcement. The United Nations could function as a platform to make such discussion possible. Maybe the installment of an international (UN) agency that reviews law enforcement in the light of data protection and vice versa (extorting accountability), can eventually bring this problem to rest. 278 In this regard I would like to point to the Consumer Data Privacy Bill of Rights which was presented by President Obama on 23 February 2012, which shows that the US is aware of the importance of privacy protection of consumers. See: http://www.whitehouse.gov/sites/default/files/privacy-final.pdf. Last checked: November 2012. 279 In this regard, MLATs already fulfill this need. But one could imagine other measures. 71 6. Conclusion In Europe, questions are raised about cloud computing in relation to data protection and access to data by third parties. The Dutch NLnet foundation, also having concerns on this matter and the USA PATRIOT Act in specific, requested a research into the legal feasibility of the use of a European cloud by European (semi-)governments. Such a European cloud would be technically possible and should keep the US government from having easy access to the data stored within on the base of its own Patriot Act. Based on the information given in the second chapter, the conclusion may be drawn that privacy and data protection take a prominent place in the European Union. Privacy is regarded as a fundamental right and the Data Protection Directive, which is proposed to be replaced soon by a new Regulation, offers a high level of protection inter alia against disclosure of processed personal data without the unambiguous consent of the data subject. In the US on the other hand, privacy is seen as one interest among others. They have not chosen for a federal approach of data protection on the base of a single piece of law comparable to the EU Directive. It is however not just this lack of regulation that raises concerns. The complex anti-terrorism laws introduced after the horrors of 9/11, which are symbolized by the USA PATRIOT Act, have expanded investigative powers, lowering the standards for issuance of an order and minimizing the judicial review, while at the same time enlarging the scope of materials sought for. Based on these laws, it is assumed that the US has (too) easy access to data stored in a cloud. Although I did not find any direct clues pointing in the direction of abusive use of the powers laid down therein by the US government, the US anti-terrorism legislation does seem to provide too short a distance between the people and their privacy on the one hand, and the government and its fight against crime and terrorism on the other. Further research would however be necessary to give a more exact answer to the question whether or not the basic principles of the EU legislation concerning privacy and data protection are infringed by the powers attributed to US authorities through anti-terrorism legislation like the Patriot Act. For now, I would conclude that the lack of transparency on US side on the use of the possibility to request disclosure of certain data in a cloud, which is foremost caused by the requirement of secrecy of disclosure combined with the minimal judicial oversight, makes it hardly possible to determine whether or not the actual use of the powers provided by the USA PATRIOT Act are in line with the EU perception of the need to protect individuals against privacy infringements. The 72 obligation for both private and public parties to account for privacy infringing acts is the key elements of the European idea of privacy and data protection. As long as the US government is not clear (transparent) about the exact use of the possibilities offered by their anti-terrorism legislation, there is no way they can account for any of them, nor can they be held accountable. Due to this lack of accountability the US government shows great disrespect for the valuable interests of (its) citizens. Therefore, in my opinion, it is justified to (at least) suppose that the Patriot Act offers the possibility to access data which is not in conformity with EU morals and thus – although the EU Directive provides that data may be disclosed without the unambiguous consent of the data subject on the base of an obligation prescribed by law – conflicting with the EU Directive. Against this back ground, the central research question of this thesis was raised by the Dutch NLnet foundation: Is it legally possible to provide a purely European cloud service, meaning that only European authorities do have jurisdiction and solely European rules apply, and subsequently is it legally permissible that European (semi-)governments will make use of merely this European cloud (so beforehand excluding all other (Non-purely-European) cloud providers)? The third chapter provides the answer to the first part of this question, namely whether it is legally possible to exclude all but the European jurisdiction over a cloud service, as a result of which foreign governments cannot grant themselves access to data stored in the cloud on the basis of their own legislation. It is possible create a cloud service which is only subject to the ‘European jurisdiction’, excluding all other jurisdictions especially the jurisdiction of the United States of America. Such an exclusive jurisdiction can however only be realized when certain conditions are met: the absence of any base on which other countries could claim to have jurisdiction over ‘the cloud’. These requirements are: - the cloud computing service is physically entirely located within the territory of the EU Member States; - the cloud service provider solely has the nationality of one of the Member States of the EU; - the cloud service provider contracts only with subcontractors who solely have the nationality of one of the Member States of the EU and who only and exclusively operate within the territory of the Member States of the EU; 73 - the cloud service provider operates only and exclusively within the territory of the Member States of the EU; - the cloud service provider only processes data of legal persons who solely have the nationality of one of the Member States of the EU. When these requirements are fulfilled (which will not at all be easy), the US has no (respected) legal ground to claim jurisdiction. Nevertheless, even without jurisdiction, states can demand disclosure of information if needed in case of a criminal investigation. So called MLATs prescribe when and what kind of information should be provided by the requested state. However, although states do not always proceed accordingly, which is perfectly shown by the IndyMedia case, the procedures in case of a request based on a MLAT provide enough safeguards against unnecessary and unlawful disclosure of information. Besides, MLATs do not affect data stored in a cloud differently than data that is stored otherwise (offline). The fourth chapter then aims at getting a general insight in public procurement rules which govern contracting authorities when purchasing public works, public supplies or public services. It specifically tried to answer the question whether it is legally possible for European governments to give effect to their wish to make use of cloud computing services in a truly safe manner. Taking into account the reasons why the exclusion on the ground of nationality or origin is made and the fact that it does not affect the primary goals of procurement law like promoting competition and preventing corruption and fraud, it is my view that European contracting authorities are free, when wishing to make use of cloud computing services, to require that the provider can guarantee that the data stored in the cloud (and thus the cloud itself) are subject to the ‘European jurisdiction’ only. It is my opinion that such a treatment should endure the ‘objective justification test’ which is designed by the Court of Justice of the EU, at least when it is made clear that otherwise (when the data is also subject to the jurisdiction of non-EU Member States) the data is not offered the protection required according to European rules. The central research question of this thesis can therefore be answered positively. It is possible to create a European cloud and the international public procurement rules do allow the necessary discrimination on the ground of nationality when it is objectively justified, which is in my view the case. It is however at least questionable whether this problem, which presumes a great feeling of mistrust, can best be solved within the existing legal framework and at what cost. Instead of closing the gates, I support the initiatives of the EU Commission: keeping the dialogue between the EU and the US alive, discussing the matters of data protection and access to data by foreign law enforcement agencies. 74 7. Bibliography List of used literature P. Bal, ‘De USA Patriot Act I en II; Ongekende uitbreiding van bevoegdheden in de strijd tegen het terrorisme’, Strafblad, 2004. P. Balboni, Data Protection and Data Security Issues Related to Cloud Computing in the EU, Tilburg University Legal Studies Working Paper Series, no. 022/2010, August 2010. C. Bennett, Regulating privacy; Data protection and public policy in Europe and the United States, Cornell University Press 1992. M. Birnhack, ‘The EU Data Protection Directive: an engine of a global regime’, Computer Law & Security Report 24 (2008). S. Bradshaw, C. Millard and I. Walden, ‘Contracts for Clouds: Comparison and Analysis of the Terms and Conditions of Cloud Computing Services’, Queen Mary University of London, School of Law, September 1st 2010 L. Bygrave, ‘European Data Portection - Determining Applicable Law Pursuant to European Data Protection Legislation’, C.L.S.R no. 16, 2002. P. Carroll, ‘Standards of Data Protection’, Computer Fraud & Security vol. 2012 issue 2, February 2012. C. Cuijpers in ‘Toepasselijk privacyrecht in de wolk’, Computerrecht 2011/65. V. Dinh, ‘USA Patriot Act’, German Law Journal vol. 5, no. 5 2004. A.dEngelfried, ‘Waarom is de Patriot Act nou eigenlijk een problem voor cloudgebruikers?’, published 17 October 2011 on http://www.hostingrecht.nl/telecommunicatie/waarom-is-de-patriotact-nou-eigenlijk-een-probleem-voor-cloudgebruikers/. L. Ferreira Pires, ‘ Wat is Cloud computing?’, Computerrecht 2011/63. J. Gerards, ‘Discrimination grounds’, in D Schiek, L. Waddington, M. Bell, Cases, Materials and Text on National Supranational and International Non-Discrimination Law, Hart Publishing, 2007. 75 U. Gorham-Ocilowski and P. Jaeger, ‘National Security Letters, the USA PATRIOT Act, and the Constitution: The tensions between national security and civil right’, Government Information Quarterly vol 25, issue 4, October 2008. A. de Haes, ‘Noorse privacywaakhond verbiedt Google Apps’, 26 januari 2012, published on: webwereld.nl/nieuws/109323/noorse-privacywaakhond-verbiedt-google-apps.html. S. Hinde, ‘Privacy Legislation: a comparison of the US and European approaches’, Computer & Security vol. 22 issue 5, July 2003. J. van Hoboken and others, ‘Cloud diensten in hoger onderwijs en onderzoek en de USA patriot act’, a research report commissioned by IViR, University of Amsterdam, September 2012. G. Hosein, ‘International co-operation gone awry – what happened to Indymedia?’, published on: https://www.privacyinternational.org/blog/international-co-operation-gone-awry-what-happenedto-indymedia. C. Hublet, ‘The Scope of Article 12 of the Treaty of the European Communities vis-à-vis ThirdCountry Nationals: Evolution at Last?’, European Law Journal vol. 15, no. 6, November 2009 (Blackwell Publishing 2009). IBM Institue for Business Values, ‘ The power of cloud; Driving business model innovation’, February 2012, published online on: http://public.dhe.ibm.com/common/ssi/ecm/en/gbe03470usen/GBE03470USEN.PDF N. Ismail, ‘Cursing the Cloud (or) Controlling the Cloud?’, Computer Law & Security Review 27/3, June 2011. R. Jones and D. Tahri, ‘An overview of EU data protection rules on use of data collected online’, Computer Law & Security Review, 27 (2011). J. Kollar, ‘USA PATRIOT Act, the Fourth Amendment, and Paranoia: Can They Read this While I’m Typing?’, Journal of High Technology Law 67 (2004). P.H. Kooijmans, Internationaal publiekrecht in vogelvlucht, Kluwer: Deventer 2002. 76 B. Koops and S. Brenner, Cybrercrime and jurisdiction: a global survey, T.M.C. Asser Press 2006. C. Kuner, ‘Data Protection Law and International Jurisdiction on the Internet (Part 1)’, International Journal of Law and Information Technology Vol. 18, No. 2 (Oxford University Press 2010), published 11 March 2010. W. Maxwell and C. Wolf, A Hogan Lovells White Paper; A Global Reality: Governmental Access to Data in the Cloud, published 23 May 2012. R. Leenes, ‘Who Controls the Cloud?’, IDP. Revista de Internet, Derecho y Política no. 11 (2010). National Institute of Standards and Technology, ‘The NIST Definition of Cloud Computing’, September 2011, NIST SP 800-145. B. Maier, ‘How Has the Law Attempted to Tackle the Borderless Nature of the Internet?’, International Journal of Law and Information Technology, Vol. 18 no. 2, Oxford University Press 2010, published 15 March 2010. R. Michaels, ‘Territorial jurisdiction after territoriality’, in: P. Slot and M. Bulterman (eds.), Globalisation and Jurisdiction, Kluwer Law International 2004. ‘Patriot Act Extension Signed By Obama’, published 27 May 2011 on http://www.huffingtonpost.com/2011/05/27/patriot-act-extension-signed-obamaautopen_n_867851.html. E.H Pijnacker Hordijk e.a., Aanbestedingsrecht; Handboek van het Europese en het Nederlandse Aanbestedingsrecht, Den Haag: Sdu Uitgevers bv 2004. ‘Public procurement: Commission calls on Slovakia to respect EU rules for electronic toll collection contracts’, Press Releases, Brussels 30 September 2010, IP/10/1244. A. Raul, E. McNIcholas and E. Jillson, ‘Reconciling European Data Privacy Concerns with US Discovery Rules: Conflict and Comity’, G.C.L.R. issue 3 2009, p. 119-120. 77 V. Reding, ‘Privacy in the Cloud: Data Protection and Security in Cloud Computing’ (SPEECH/11/859) can be found on http://europa.eu/rapid/press-release_SPEECH-11859_en.htm.. N. Robbinson and others, ‘Review of the European Data Protection Directive’, Cambridge: RAND 2009. This research was sponsored by the Information Commissioner’s Office. A.M. Sachdeva, ‘International Jurisdiction In Cyberspace: A Comparative Perspective’, C.T.L.R., 2007, p. 246. R. Schoenmaker, ‘Minister weet niet waar Nederlandse data blijft’, 10 september 2011, published on: http://webwereld.nl/nieuws/107879/minister-weet-niet-waar-nederlandse-data-blijft.html. R. Schoenmaker, ‘Uitsluiting Microsoft bij aanbesteding overheid’, 14 september 2011 published on: http://webwereld.nl/nieuws/107924/uitsluiting-microsoft-bij-aanbestedingen-overheid.html. R.Schoenmaker, ‘Geen extra eisen tegen amerikaans datagraaien’, 17 september 2011 published on: http://webwereld.nl/nieuws/107960/-geen-extra-eisen-tegen-amerikaansdatagraaien-.html. R. Schoenmaker, ‘Kabinet moet einde maken aan datagraaien VS’, 2 februari 2012, published on: webwereld.nl/nieuws/109390/-kabinet-moet-einde-maken-aan-datagraaien-vs-.html. D. Solove, ‘ “I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy’, San Diego Law Review vol. 44 2008. J. Strauss, K.S. Rogerson, ‘Policies for online privacy in the United States and the European Union’, Telematics and Informatics 19 (2002). P. Swire, ‘The System of Foreign Intelligence Surveillance Law’, George Washington Law Review vol. 72 (2004). P. Trepte, Public Procurement in the EU; a practioner’s guide, Oxford: Oxford University Press 2007. S. Warren and L. Brandeis, ‘The Right to Privacy’, Harvard Law Review, volume 4, December 15th 1890. 78 Whitepaper ‘De wolk in het onderwijs; privacy aspecten bij cloud computing services’, a research conducted by TILT (Tilburg Institute for Law, Technology, and Society) commissioned by SURFnet/Kennisnet. R. Westerdijk, ‘Open Standards and open source software v. public procurement’. Z. Whittaker, ‘Case study: How the USA PATRIOT Act can be used to access EU data’ published 26 April 2011 on http://www.zdnet.com/blog/igeneration/case-study-how-the-usa-patriot-act-canbe-used-to-access-eu-data/8805. C. Wolf and W. Maxwell ‘Dangerous assumptions about clouds’, CSO 31 July 2012, http://www.csoonline.com/article/712565/dangerous-assumptions-about-clouds?page=1. Last checked: November 2012. List of used web sites http://www.apec.org/About-Us/About-APEC/Fact-Sheets/APEC-Privacy-Framework.aspx. http://blogs.amd.com/work/2011/05/31/mind-the-gap-%E2%80%93-the-rise-of-cloud-computing/. http://blogs.amd.com/work/amd-2011-global-cloud-computing-adoption-attitudes-andapproaches-study-infographics/. http://caselaw.lp.findlaw.com/data/constitution/amendment04/. http://www.denederlandsegrondwet.nl http://ec.europa.eu/justice/newsroom/data-protection/news/120125_en.htm. http://ec.europa.eu/justice/policies/privacy/thridcountries/index_en.htm. http://europa.eu/legislation_summaries/information_society/data_protection/l14012_en.htm. http://europa.eu/rapid/pressReleasesAction.do?reference=IP/10/1244&format=HTML&aged=0&la nguage=en&guiLanguage=en. http://finance.yahoo.com/news/10-huge-companies-facebook-now-210700763. 79 http://www.forbes.com/sites/kevinjackson/2011/04/19/cloud-to-command-90-of-microsofts-rdbudget/. http://www.google.com/about/company/facts/locations/. http://www.justice.gov/archive/ll/subs/u_myths.htm. http://www.lexisnexis.com/lawschool/study/outlines/html/civpro/civpro02.htm. http://www.nlnet.nl. http://www.rijksoverheid.nl/documenten-enpublicaties/rapporten/2012/07/10/aanbestedingsreglement-werken-2012.html. http://www.rijksoverheid.nl/onderwerpen/aanbesteden/nieuwe-aanbestedingsregels. http://www.rijksoverheid.nl/onderwerpen/aanbesteden/regelgeving-aanbestedingen. http://www.whitehouse.gov/sites/default/files/privacy-final.pdf. http://www.wto.org/english/tratop_e/gproc_e/memobs_e.htm#parties. List of used case law Court of Justice of the EU Case C-170/84 of the Court of Justice of the EC 13 May 1986. Case C-186/87 Ian William Cowan v Trésor Public, Court of Justice of the EC, 2 February 1989. Case C-221/89 of the Court of Justice of the EC Factorame (1991) ECR 1-3905. Case C-243/89 Commission v. Denmark (Storebaelt), Court of Justice of the EC, 22 June 1993. Case C-323/95 of the Court of Justice of the EC Hayes [1996] ECR I-4661. Case C-87/94 Commission v. Belgium (Waalse bussen), Court of Justice of the EC, 25 April 1996. 80 Case C-85/96 of the Court of Justice of the EC Maria Martinez [1998] ECR I-2691. Case C-324/98 Telaustria, Court of Justice of the EC, 7 December 2000. Case C-148/02 of the Court of Justice of the EU Garcia Avello [2003] ECR I-11613. Case C-164/07 of the Court of Justice of the EU Wood [2008] ECR I-4143. European Court of Human Rights ECtHRM 26 April 1979 (Sunday Times v. UK). ECtHRM 1 July 2008 (Liberty v. UK). France UEJF et LICRA v. Yahoo! Inc. et Yahoo France, Tribunal de Grande Instance de Paris, NO RG: 00/05308, November 20, 2000. US Pennoyer v. Neff, 95 U.S. 714 (1877). International Shoe v. Washington, 326 U.S. 310 (1945). Griswold v. Connecticut, 381 U.S. 479 (1965). United States v. Bank of Nova Scotia, 740 F.2d 817 (11th Cir. 1984). United States v. Verdugo-Urquidez, 494 U.S. 259, 265 (1990). Doe v. Ashcroft, Southern District of New York, 29 September 2004, 04CV2614. 81 List of used legal and policy instruments Netherlands Dutch Act of 31 March 1993, Stb. 1992, 212, to execute the EEG-measures in regard to the public procurement procedures for the award of public works contracts, public supply contracts and public service contracts. Dutch Act of 6 July 2000, Stb. 2000, 302, concerning rules with regard to the protection of personal data (Wet Bescherming Persoonsgegevens). Dutch Decree of 1 December 2005, Stb. 2005, 408, concerning the rules of general public procurement (Boa). Dutch Decree of 1 December 2005, Stb. 2005, 409, concerning the rules of public procurement for the special sectors (Bass). Policy rules concerning public procurement for the award of a pulbic works contracts of 2005, Stcrt. 2005, 207. Treaty between the Kingdom of the Netherlands and the United States of America concerning the mutual legal assistance in criminal matters (Verdrag tussen het Koninkrijk der Nederlanden en de Verenigde Staten van Amerika aangaande wederzijdse rechtshulp in strafzaken), the Hague , June 12 1981. EU Agreement on mutual legal assistance between the European Union and the United States of America, to be found on: http://eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2003:181:0034:0042:EN:PDF. Article 29 Working Party, ‘Working document on determining the international application of EU data protection law to personal data processing on the Internet by non-EU based websites’(WP 56, 30 May 2002). Article 29 Data Protection Working Party, ‘Opinion 4/2007 on the concept of personal data’. 01248/07/EN, WP 136. 82 Article 29 Data Protection Working Party, ‘Opinion 1/2008 on data protection issues related to search engines’, WP 148, 00737/EN. Article 29 Data Protection Working Party, ‘Opinion 1/2010 on the concepts of “controller” and “processor”’ 00264/10/EN WP 169. Article 29 Data Protection Working Party, ‘Opinion 8/2010 on applicable law’ 0836-02/10/EN WP 179. Article 29 Data Protection Working Party, ‘Opinion 05/2012 on cloud computing’. 01037/12/EN, WP 196. Charter of fundamental rights of the European Union of 18 December 2000, 2000/C 364/01. Commission Interpretative Communication on the Community law applicable to contract awards not or not fully subject to the provisions of the Public Procurement Directives (2006/C 179/02), Offical Journal C 179/2 of 1 August 2006. Commission Regulation (EC) No 1251/2011 of 20 November 2011 amending Directives 2004/17/EC, 2004/18/EC and 2009/81/EC of the European Parliament and of the Council in respect of their application thresholds for the procedures for the award of contracts, Official Journal L 319/43 of 2 December 2011. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, Unleashing the potential of cloud computing in Europe, Brussels, 27 September 2012, COM(2012), 529 final. Council Decision 94/800/EC of 22 December 1994 concerning the conclusion on behalf of the European Community, as regards matters within its competence, of the agreements reached in the Uruguay Round multilateral negotiations (1986-1994). Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications). 83 Directive 2004/17/EC of the European Parliament and of the Council of 31 March 2004 on the coordination of procedures of entities operating in the water, energy, transport and postal service sectors. Directive 2004/18/EC of the European Parliament and of the Council of 31 March 2004 on the coordination of procedures for the award of public works contracts, public supply contracts and public service contracts. Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC. Directive 2007/66/EC of the European Parliament and of the Council of 11 December 2007, amending Council Directives 89/665/EEC and 92/13/EEC with regard to improving the effectiveness of review procedures concerning the award of public contracts. European Commission, Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), version 56, 29 November 2011 (leaked draft). European Commission, Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), Brussels, 25 January 2012, COM (2012) 11 final, 2012/0011 (COD). Treaty on establishing the European Community, known as the Treaty of Rome 1957, as amended by the Single European Act 1986, the Treaty of Maastricht 1992, officially known as the Treaty on European Union (TEU), the Treaty of Amsterdam 1997, the Treaty of Nice 2001 and the Treaty of Lisbon 2007. Council of Europe Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data of the Council of Europe of 28 January 1981. 84 European convention on human rights of the Council of Europe of 4 November 1950, US Foreign Intelligence Surveillance Act of 1978, Public Law 95-511 October 25, 1978, 92 Stat. 1783. Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 (H.R. 6304), Public Law 110-261 July 10 2008, 122 Stat. 2436. FAA Reauthorization Act of 2012 (H.R. 5949), Public Law September 11 2012. Senate Executive Report 110-13. The PATRIOT Sunsets Extensions Act of 2011 (H.R. 514) Public Law. 112-14 (May 26th 2011). Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of October 2001, Pub. L. No. 107-56, 115 Stat. 272. USA PATRIOT Improvement and Reauthorization Act of 2005, Public Law No. 109-177, 120 Stat. 192. Other international organizations OECD Coucil, Guidelines on the Protection of Privacy and Trans-border flows of Personal Data, 23 September 1980. Resolution of the General Assembly of the United Nations 2625 (XXV) of October 24th 1970, concerning the prohibition of a state to use its territory to organize activities which aim to disturb the order or bring down the government of another state. UN General Assembly, Guidelines for the Regulation of Computerized Personal Data Files, 14 December 1990. WTO Government Procurement Agreement of 1994 (Uruguay Round), PB 1994, L 336/273. 85 Appendix I: selection of relevant sections of the United States Code 18 USC § 2709 - Counterintelligence access to telephone toll and transactional records (a) Duty to Provide.— A wire or electronic communication service provider shall comply with a request for subscriber information and toll billing records information, or electronic communication transactional records in its custody or possession made by the Director of the Federal Bureau of Investigation under subsection (b) of this section. (b) Required Certification.— The Director of the Federal Bureau of Investigation, or his designee in a position not lower than Deputy Assistant Director at Bureau headquarters or a Special Agent in Charge in a Bureau field office designated by the Director, may— (1) request the name, address, length of service, and local and long distance toll billing records of a person or entity if the Director (or his designee) certifies in writing to the wire or electronic communication service provider to which the request is made that the name, address, length of service, and toll billing records sought are relevant to an authorized investigation to protect against international terrorism or clandestine intelligence activities, provided that such an investigation of a United States person is not conducted solely on the basis of activities protected by the first amendment to the Constitution of the United States; and (2) request the name, address, and length of service of a person or entity if the Director (or his designee) certifies in writing to the wire or electronic communication service provider to which the request is made that the information sought is relevant to an authorized investigation to protect against international terrorism or clandestine intelligence activities, provided that such an investigation of a United States person is not conducted solely upon the basis of activities protected by the first amendment to the Constitution of the United States. (c) Prohibition of Certain Disclosure.— (1) If the Director of the Federal Bureau of Investigation, or his designee in a position not lower than Deputy Assistant Director at Bureau headquarters or a Special Agent in Charge in a Bureau field office designated by the Director, certifies that otherwise there may result a danger to the national security of the United States, interference with a criminal, counterterrorism, or counterintelligence investigation, interference with diplomatic relations, or danger to the life or physical safety of any person, no wire or electronic communications service provider, or officer, employee, or agent thereof, shall disclose to any person (other than those to whom such disclosure is necessary to comply with the request or an attorney to obtain legal advice or legal assistance with respect to the request) that the Federal Bureau of Investigation has sought or obtained access to information or records under this section. (2) The request shall notify the person or entity to whom the request is directed of the nondisclosure requirement under paragraph (1). (3) Any recipient disclosing to those persons necessary to comply with the request or to an attorney to obtain legal advice or legal assistance with respect to the request shall inform such person of any applicable nondisclosure requirement. Any person who receives a disclosure under this subsection shall be subject to the same prohibitions on disclosure under paragraph (1). (4) At the request of the Director of the Federal Bureau of Investigation or the designee of the Director, any person making or intending to make a disclosure under this section shall identify to the Director or such designee the person to whom such disclosure will be made or to whom such disclosure was made prior to the request, except that nothing in this section shall require a person to inform the Director or such designee of the identity of an attorney to whom disclosure was made or will be made to obtain legal advice or legal assistance with respect to the request under subsection (a). (d) Dissemination by Bureau.— The Federal Bureau of Investigation may disseminate information and records obtained under this section only as provided in guidelines approved by the Attorney General for foreign intelligence collection and foreign counterintelligence investigations conducted by the Federal Bureau of Investigation, and, with respect to dissemination to an agency of the United States, only if such information is clearly relevant to the authorized responsibilities of such agency. (e) Requirement That Certain Congressional Bodies Be Informed.— On a semiannual basis the Director of the Federal Bureau of Investigation shall fully inform the Permanent Select Committee on Intelligence of the House of Representatives and the Select Committee on Intelligence of the 86 Senate, and the Committee on the Judiciary of the House of Representatives and the Committee on the Judiciary of the Senate, concerning all requests made under subsection (b) of this section. (f) Libraries.— A library (as that term is defined in section 213(1) of the Library Services and Technology Act (20 U.S.C. 9122 (1)), the services of which include access to the Internet, books, journals, magazines, newspapers, or other similar forms of communication in print or digitally by patrons for their use, review, examination, or circulation, is not a wire or electronic communication service provider for purposes of this section, unless the library is providing the services defined in section 2510 (15) (“electronic communication service”) of this title. 50 USC § 1801 – Definitions As used in this subchapter: (a) “Foreign power” means— (1) a foreign government or any component thereof, whether or not recognized by the United States; (2) a faction of a foreign nation or nations, not substantially composed of United States persons; (3) an entity that is openly acknowledged by a foreign government or governments to be directed and controlled by such foreign government or governments; (4) a group engaged in international terrorism or activities in preparation therefor; (5) a foreign-based political organization, not substantially composed of United States persons; (6) an entity that is directed and controlled by a foreign government or governments; or (7) an entity not substantially composed of United States persons that is engaged in the international proliferation of weapons of mass destruction. (b) “Agent of a foreign power” means— (1) any person other than a United States person, who— (A) acts in the United States as an officer or employee of a foreign power, or as a member of a foreign power as defined in subsection (a)(4) of this section; (B) acts for or on behalf of a foreign power which engages in clandestine intelligence activities in the United States contrary to the interests of the United States, when the circumstances of such person’s presence in the United States indicate that such person may engage in such activities in the United States, or when such person knowingly aids or abets any person in the conduct of such activities or knowingly conspires with any person to engage in such activities; (C) engages in international terrorism or activities in preparation therefore; (D) engages in the international proliferation of weapons of mass destruction, or activities in preparation therefor; or (E) engages in the international proliferation of weapons of mass destruction, or activities in preparation therefor for or on behalf of a foreign power; or (2) any person who— (A) knowingly engages in clandestine intelligence gathering activities for or on behalf of a foreign power, which activities involve or may involve a violation of the criminal statutes of the United States; (B) pursuant to the direction of an intelligence service or network of a foreign power, knowingly engages in any other clandestine intelligence activities for or on behalf of such foreign power, which activities involve or are about to involve a violation of the criminal statutes of the United States; (C) knowingly engages in sabotage or international terrorism, or activities that are in preparation therefor, for or on behalf of a foreign power; (D) knowingly enters the United States under a false or fraudulent identity for or on behalf of a foreign power or, while in the United States, knowingly assumes a false or fraudulent identity for or on behalf of a foreign power; or (E) knowingly aids or abets any person in the conduct of activities described in subparagraph (A), (B), or (C) or knowingly conspires with any person to engage in activities described in subparagraph (A), (B), or (C). (c) “International terrorism” means activities that— (1) involve violent acts or acts dangerous to human life that are a violation of the criminal laws of the United States or of any State, or that would be a criminal violation if committed within the jurisdiction of the United States or any State; (2) appear to be intended— 87 (A) to intimidate or coerce a civilian population; (B) to influence the policy of a government by intimidation or coercion; or (C) to affect the conduct of a government by assassination or kidnapping; and (3) occur totally outside the United States, or transcend national boundaries in terms of the means by which they are accomplished, the persons they appear intended to coerce or intimidate, or the locale in which their perpetrators operate or seek asylum. (d) “Sabotage” means activities that involve a violation of chapter 105 of title 18, or that would involve such a violation if committed against the United States. (e) “Foreign intelligence information” means— (1) information that relates to, and if concerning a United States person is necessary to, the ability of the United States to protect against— (A) actual or potential attack or other grave hostile acts of a foreign power or an agent of a foreign power; (B) sabotage, international terrorism, or the international proliferation of weapons of mass destruction by a foreign power or an agent of a foreign power; or (C) clandestine intelligence activities by an intelligence service or network of a foreign power or by an agent of a foreign power; or (2) information with respect to a foreign power or foreign territory that relates to, and if concerning a United States person is necessary to— (A) the national defense or the security of the United States; or (B) the conduct of the foreign affairs of the United States. (f) “Electronic surveillance” means— (1) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire or radio communication sent by or intended to be received by a particular, known United States person who is in the United States, if the contents are acquired by intentionally targeting that United States person, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes; (2) the acquisition by an electronic, mechanical, or other surveillance device of the contents of any wire communication to or from a person in the United States, without the consent of any party thereto, if such acquisition occurs in the United States, but does not include the acquisition of those communications of computer trespassers that would be permissible under section 2511 (2)(i) of title 18; (3) the intentional acquisition by an electronic, mechanical, or other surveillance device of the contents of any radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes, and if both the sender and all intended recipients are located within the United States; or (4) the installation or use of an electronic, mechanical, or other surveillance device in the United States for monitoring to acquire information, other than from a wire or radio communication, under circumstances in which a person has a reasonable expectation of privacy and a warrant would be required for law enforcement purposes. (g) “Attorney General” means the Attorney General of the United States (or Acting Attorney General), the Deputy Attorney General, or, upon the designation of the Attorney General, the Assistant Attorney General designated as the Assistant Attorney General for National Security under section 507A of title 28. (h) “Minimization procedures”, with respect to electronic surveillance, means— (1) specific procedures, which shall be adopted by the Attorney General, that are reasonably designed in light of the purpose and technique of the particular surveillance, to minimize the acquisition and retention, and prohibit the dissemination, of nonpublicly available information concerning unconsenting United States persons consistent with the need of the United States to obtain, produce, and disseminate foreign intelligence information; (2) procedures that require that nonpublicly available information, which is not foreign intelligence information, as defined in subsection (e)(1) of this section, shall not be disseminated in a manner that identifies any United States person, without such person’s consent, unless such person’s identity is necessary to understand foreign intelligence information or assess its importance; (3) notwithstanding paragraphs (1) and (2), procedures that allow for the retention and dissemination of information that is evidence of a crime which has been, is being, or is about to be committed and that is to be retained or disseminated for law enforcement purposes; and 88 (4) notwithstanding paragraphs (1), (2), and (3), with respect to any electronic surveillance approved pursuant to section 1802 (a) of this title, procedures that require that no contents of any communication to which a United States person is a party shall be disclosed, disseminated, or used for any purpose or retained for longer than 72 hours unless a court order under section 1805 of this title is obtained or unless the Attorney General determines that the information indicates a threat of death or serious bodily harm to any person. (i) “United States person” means a citizen of the United States, an alien lawfully admitted for permanent residence (as defined in section 1101 (a)(20) of title 8), an unincorporated association a substantial number of members of which are citizens of the United States or aliens lawfully admitted for permanent residence, or a corporation which is incorporated in the United States, but does not include a corporation or an association which is a foreign power, as defined in subsection (a)(1), (2), or (3) of this section. (j) “United States”, when used in a geographic sense, means all areas under the territorial sovereignty of the United States and the Trust Territory of the Pacific Islands. (k) “Aggrieved person” means a person who is the target of an electronic surveillance or any other person whose communications or activities were subject to electronic surveillance. (l) “Wire communication” means any communication while it is being carried by a wire, cable, or other like connection furnished or operated by any person engaged as a common carrier in providing or operating such facilities for the transmission of interstate or foreign communications. (m) “Person” means any individual, including any officer or employee of the Federal Government, or any group, entity, association, corporation, or foreign power. (n) “Contents”, when used with respect to a communication, includes any information concerning the identity of the parties to such communication or the existence, substance, purport, or meaning of that communication. (o) “State” means any State of the United States, the District of Columbia, the Commonwealth of Puerto Rico, the Trust Territory of the Pacific Islands, and any territory or possession of the United States. (p) “Weapon of mass destruction” means— (1) any explosive, incendiary, or poison gas device that is designed, intended, or has the capability to cause a mass casualty incident; (2) any weapon that is designed, intended, or has the capability to cause death or serious bodily injury to a significant number of persons through the release, dissemination, or impact of toxic or poisonous chemicals or their precursors; (3) any weapon involving a biological agent, toxin, or vector (as such terms are defined in section 178 of title 18) that is designed, intended, or has the capability to cause death, illness, or serious bodily injury to a significant number of persons; or (4) any weapon that is designed, intended, or has the capability to release radiation or radioactivity causing death, illness, or serious bodily injury to a significant number of persons. 50 USC § 1861 - Access to certain business records for foreign intelligence and international terrorism investigations (a) Application for order; conduct of investigation generally (1) Subject to paragraph (3), the Director of the Federal Bureau of Investigation or a designee of the Director (whose rank shall be no lower than Assistant Special Agent in Charge) may make an application for an order requiring the production of any tangible things (including books, records, papers, documents, and other items) for an investigation to obtain foreign intelligence information not concerning a United States person or to protect against international terrorism or clandestine intelligence activities, provided that such investigation of a United States person is not conducted solely upon the basis of activities protected by the first amendment to the Constitution. (2) An investigation conducted under this section shall— (A) be conducted under guidelines approved by the Attorney General under Executive Order 12333 (or a successor order); and (B) not be conducted of a United States person solely upon the basis of activities protected by the first amendment to the Constitution of the United States. (3) In the case of an application for an order requiring the production of library circulation records, library patron lists, book sales records, book customer lists, firearms sales records, tax return records, educational records, or medical records containing information that would identify a 89 person, the Director of the Federal Bureau of Investigation may delegate the authority to make such application to either the Deputy Director of the Federal Bureau of Investigation or the Executive Assistant Director for National Security (or any successor position). The Deputy Director or the Executive Assistant Director may not further delegate such authority. (b) Recipient and contents of application Each application under this section— (1) shall be made to— (A) a judge of the court established by section 1803 (a) of this title; or (B) a United States Magistrate Judge under chapter 43 of title 28, who is publicly designated by the Chief Justice of the United States to have the power to hear applications and grant orders for the production of tangible things under this section on behalf of a judge of that court; and (2) shall include— (A) a statement of facts showing that there are reasonable grounds to believe that the tangible things sought are relevant to an authorized investigation (other than a threat assessment) conducted in accordance with subsection (a)(2) to obtain foreign intelligence information not concerning a United States person or to protect against international terrorism or clandestine intelligence activities, such things being presumptively relevant to an authorized investigation if the applicant shows in the statement of the facts that they pertain to— (i) a foreign power or an agent of a foreign power; (ii) the activities of a suspected agent of a foreign power who is the subject of such authorized investigation; or (iii) an individual in contact with, or known to, a suspected agent of a foreign power who is the subject of such authorized investigation; and (B) an enumeration of the minimization procedures adopted by the Attorney General under subsection (g) that are applicable to the retention and dissemination by the Federal Bureau of Investigation of any tangible things to be made available to the Federal Bureau of Investigation based on the order requested in such application. (c) Ex parte judicial order of approval (1) Upon an application made pursuant to this section, if the judge finds that the application meets the requirements of subsections (a) and (b), the judge shall enter an ex parte order as requested, or as modified, approving the release of tangible things. Such order shall direct that minimization procedures adopted pursuant to subsection (g) be followed. (2) An order under this subsection— (A) shall describe the tangible things that are ordered to be produced with sufficient particularity to permit them to be fairly identified; (B) shall include the date on which the tangible things must be provided, which shall allow a reasonable period of time within which the tangible things can be assembled and made available; (C) shall provide clear and conspicuous notice of the principles and procedures described in subsection (d); (D) may only require the production of a tangible thing if such thing can be obtained with a subpoena duces tecum issued by a court of the United States in aid of a grand jury investigation or with any other order issued by a court of the United States directing the production of records or tangible things; and (E) shall not disclose that such order is issued for purposes of an investigation described in subsection (a). (d) Nondisclosure (1) No person shall disclose to any other person that the Federal Bureau of Investigation has sought or obtained tangible things pursuant to an order under this section, other than to— (A) those persons to whom disclosure is necessary to comply with such order; (B) an attorney to obtain legal advice or assistance with respect to the production of things in response to the order; or (C) other persons as permitted by the Director of the Federal Bureau of Investigation or the designee of the Director. (2) (A) A person to whom disclosure is made pursuant to paragraph (1) shall be subject to the nondisclosure requirements applicable to a person to whom an order is directed under this section in the same manner as such person. 90 (B) Any person who discloses to a person described in subparagraph (A), (B), or (C) of paragraph (1) that the Federal Bureau of Investigation has sought or obtained tangible things pursuant to an order under this section shall notify such person of the nondisclosure requirements of this subsection. (C) At the request of the Director of the Federal Bureau of Investigation or the designee of the Director, any person making or intending to make a disclosure under subparagraph (A) or (C) of paragraph (1) shall identify to the Director or such designee the person to whom such disclosure will be made or to whom such disclosure was made prior to the request. (e) Liability for good faith disclosure; waiver A person who, in good faith, produces tangible things under an order pursuant to this section shall not be liable to any other person for such production. Such production shall not be deemed to constitute a waiver of any privilege in any other proceeding or context. (f) Judicial review of FISA orders (1) In this subsection— (A) the term “production order” means an order to produce any tangible thing under this section; and (B) the term “nondisclosure order” means an order imposed under subsection (d). (2) (A) (i) A person receiving a production order may challenge the legality of that order by filing a petition with the pool established by section 1803 (e)(1) of this title. Not less than 1 year after the date of the issuance of the production order, the recipient of a production order may challenge the nondisclosure order imposed in connection with such production order by filing a petition to modify or set aside such nondisclosure order, consistent with the requirements of subparagraph (C), with the pool established by section 1803 (e)(1) of this title. (ii) The presiding judge shall immediately assign a petition under clause (i) to 1 of the judges serving in the pool established by section 1803 (e)(1) of this title. Not later than 72 hours after the assignment of such petition, the assigned judge shall conduct an initial review of the petition. If the assigned judge determines that the petition is frivolous, the assigned judge shall immediately deny the petition and affirm the production order or nondisclosure order. If the assigned judge determines the petition is not frivolous, the assigned judge shall promptly consider the petition in accordance with the procedures established under section 1803 (e)(2) of this title. (iii) The assigned judge shall promptly provide a written statement for the record of the reasons for any determination under this subsection. Upon the request of the Government, any order setting aside a nondisclosure order shall be stayed pending review pursuant to paragraph (3). (B) A judge considering a petition to modify or set aside a production order may grant such petition only if the judge finds that such order does not meet the requirements of this section or is otherwise unlawful. If the judge does not modify or set aside the production order, the judge shall immediately affirm such order, and order the recipient to comply therewith. (C) (i) A judge considering a petition to modify or set aside a nondisclosure order may grant such petition only if the judge finds that there is no reason to believe that disclosure may endanger the national security of the United States, interfere with a criminal, counterterrorism, or counterintelligence investigation, interfere with diplomatic relations, or endanger the life or physical safety of any person. (ii) If, upon filing of such a petition, the Attorney General, Deputy Attorney General, an Assistant Attorney General, or the Director of the Federal Bureau of Investigation certifies that disclosure may endanger the national security of the United States or interfere with diplomatic relations, such certification shall be treated as conclusive, unless the judge finds that the certification was made in bad faith. (iii) If the judge denies a petition to modify or set aside a nondisclosure order, the recipient of such order shall be precluded for a period of 1 year from filing another such petition with respect to such nondisclosure order. (D) Any production or nondisclosure order not explicitly modified or set aside consistent with this subsection shall remain in full effect. (3) A petition for review of a decision under paragraph (2) to affirm, modify, or set aside an order by the Government or any person receiving such order shall be made to the court of review 91 established under section 1803 (b) of this title, which shall have jurisdiction to consider such petitions. The court of review shall provide for the record a written statement of the reasons for its decision and, on petition by the Government or any person receiving such order for writ of certiorari, the record shall be transmitted under seal to the Supreme Court of the United States, which shall have jurisdiction to review such decision. (4) Judicial proceedings under this subsection shall be concluded as expeditiously as possible. The record of proceedings, including petitions filed, orders granted, and statements of reasons for decision, shall be maintained under security measures established by the Chief Justice of the United States, in consultation with the Attorney General and the Director of National Intelligence. (5) All petitions under this subsection shall be filed under seal. In any proceedings under this subsection, the court shall, upon request of the Government, review ex parte and in camera any Government submission, or portions thereof, which may include classified information. (g) Minimization procedures (1) In general Not later than 180 days after March 9, 2006, the Attorney General shall adopt specific minimization procedures governing the retention and dissemination by the Federal Bureau of Investigation of any tangible things, or information therein, received by the Federal Bureau of Investigation in response to an order under this subchapter. (2) Defined In this section, the term “minimization procedures” means— (A) specific procedures that are reasonably designed in light of the purpose and technique of an order for the production of tangible things, to minimize the retention, and prohibit the dissemination, of nonpublicly available information concerning unconsenting United States persons consistent with the need of the United States to obtain, produce, and disseminate foreign intelligence information; (B) procedures that require that nonpublicly available information, which is not foreign intelligence information, as defined in section 1801 (e)(1) of this title, shall not be disseminated in a manner that identifies any United States person, without such person’s consent, unless such person’s identity is necessary to understand foreign intelligence information or assess its importance; and (C) notwithstanding subparagraphs (A) and (B), procedures that allow for the retention and dissemination of information that is evidence of a crime which has been, is being, or is about to be committed and that is to be retained or disseminated for law enforcement purposes. (h) Use of information Information acquired from tangible things received by the Federal Bureau of Investigation in response to an order under this subchapter concerning any United States person may be used and disclosed by Federal officers and employees without the consent of the United States person only in accordance with the minimization procedures adopted pursuant to subsection (g). No otherwise privileged information acquired from tangible things received by the Federal Bureau of Investigation in accordance with the provisions of this subchapter shall lose its privileged character. No information acquired from tangible things received by the Federal Bureau of Investigation in response to an order under this subchapter may be used or disclosed by Federal officers or employees except for lawful purposes. 50 USC § 1881 - Definitions (a) In general The terms “agent of a foreign power”, “Attorney General”, “contents”, “electronic surveillance”, “foreign intelligence information”, “foreign power”, “person”, “United States”, and “United States person” have the meanings given such terms in section 1801 of this title, except as specifically provided in this subchapter. (b) Additional definitions (1) Congressional intelligence committees The term “congressional intelligence committees” means— (A) the Select Committee on Intelligence of the Senate; and (B) the Permanent Select Committee on Intelligence of the House of Representatives. (2) Foreign Intelligence Surveillance Court; Court The terms “Foreign Intelligence Surveillance Court” and “Court” mean the court established under section 1803 (a) of this title. 92 (3) Foreign Intelligence Surveillance Court of Review; Court of Review The terms “Foreign Intelligence Surveillance Court of Review” and “Court of Review” mean the court established under section 1803 (b) of this title. (4) Electronic communication service provider The term “electronic communication service provider” means— (A) a telecommunications carrier, as that term is defined in section 153 of title 47; (B) a provider of electronic communication service, as that term is defined in section 2510 of title 18; (C) a provider of a remote computing service, as that term is defined in section 2711 of title 18; (D) any other communication service provider who has access to wire or electronic communications either as such communications are transmitted or as such communications are stored; or (E) an officer, employee, or agent of an entity described in subparagraph (A), (B), (C), or (D). (5) Intelligence community The term “intelligence community” has the meaning given the term in section 401a (4) of this title. 50 USC § 1881a - Procedures for targeting certain persons outside the United States other than United States persons (a) Authorization Notwithstanding any other provision of law, upon the issuance of an order in accordance with subsection (i)(3) or a determination under subsection (c)(2), the Attorney General and the Director of National Intelligence may authorize jointly, for a period of up to 1 year from the effective date of the authorization, the targeting of persons reasonably believed to be located outside the United States to acquire foreign intelligence information. (b) Limitations An acquisition authorized under subsection (a)— (1) may not intentionally target any person known at the time of acquisition to be located in the United States; (2) may not intentionally target a person reasonably believed to be located outside the United States if the purpose of such acquisition is to target a particular, known person reasonably believed to be in the United States; (3) may not intentionally target a United States person reasonably believed to be located outside the United States; (4) may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States; and (5) shall be conducted in a manner consistent with the fourth amendment to the Constitution of the United States. (c) Conduct of acquisition (1) In general An acquisition authorized under subsection (a) shall be conducted only in accordance with— (A) the targeting and minimization procedures adopted in accordance with subsections (d) and (e); and (B) upon submission of a certification in accordance with subsection (g), such certification. (2) Determination A determination under this paragraph and for purposes of subsection (a) is a determination by the Attorney General and the Director of National Intelligence that exigent circumstances exist because, without immediate implementation of an authorization under subsection (a), intelligence important to the national security of the United States may be lost or not timely acquired and time does not permit the issuance of an order pursuant to subsection (i)(3) prior to the implementation of such authorization. (3) Timing of determination The Attorney General and the Director of National Intelligence may make the determination under paragraph (2)— (A) before the submission of a certification in accordance with subsection (g); or (B) by amending a certification pursuant to subsection (i)(1)(C) at any time during which judicial review under subsection (i) of such certification is pending. (4) Construction 93 Nothing in subchapter I shall be construed to require an application for a court order under such subchapter for an acquisition that is targeted in accordance with this section at a person reasonably believed to be located outside the United States. (d) Targeting procedures (1) Requirement to adopt The Attorney General, in consultation with the Director of National Intelligence, shall adopt targeting procedures that are reasonably designed to— (A) ensure that any acquisition authorized under subsection (a) is limited to targeting persons reasonably believed to be located outside the United States; and (B) prevent the intentional acquisition of any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States. (2) Judicial review The procedures adopted in accordance with paragraph (1) shall be subject to judicial review pursuant to subsection (i). (e) Minimization procedures (1) Requirement to adopt The Attorney General, in consultation with the Director of National Intelligence, shall adopt minimization procedures that meet the definition of minimization procedures under section 1801 (h) of this title or section 1821 (4) of this title, as appropriate, for acquisitions authorized under subsection (a). (2) Judicial review The minimization procedures adopted in accordance with paragraph (1) shall be subject to judicial review pursuant to subsection (i). (f) Guidelines for compliance with limitations (1) Requirement to adopt The Attorney General, in consultation with the Director of National Intelligence, shall adopt guidelines to ensure— (A) compliance with the limitations in subsection (b); and (B) that an application for a court order is filed as required by this chapter. (2) Submission of guidelines The Attorney General shall provide the guidelines adopted in accordance with paragraph (1) to— (A) the congressional intelligence committees; (B) the Committees on the Judiciary of the Senate and the House of Representatives; and (C) the Foreign Intelligence Surveillance Court. (g) Certification (1) In general (A) Requirement Subject to subparagraph (B), prior to the implementation of an authorization under subsection (a), the Attorney General and the Director of National Intelligence shall provide to the Foreign Intelligence Surveillance Court a written certification and any supporting affidavit, under oath and under seal, in accordance with this subsection. (B) Exception If the Attorney General and the Director of National Intelligence make a determination under subsection (c)(2) and time does not permit the submission of a certification under this subsection prior to the implementation of an authorization under subsection (a), the Attorney General and the Director of National Intelligence shall submit to the Court a certification for such authorization as soon as practicable but in no event later than 7 days after such determination is made. (2) Requirements A certification made under this subsection shall— (A) attest that— (i) there are procedures in place that have been approved, have been submitted for approval, or will be submitted with the certification for approval by the Foreign Intelligence Surveillance Court that are reasonably designed to— (I) ensure that an acquisition authorized under subsection (a) is limited to targeting persons reasonably believed to be located outside the United States; and (II) prevent the intentional acquisition of any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States; 94 (ii) the minimization procedures to be used with respect to such acquisition— (I) meet the definition of minimization procedures under section 1801 (h) or 1821 (4) of this title, as appropriate; and (II) have been approved, have been submitted for approval, or will be submitted with the certification for approval by the Foreign Intelligence Surveillance Court; (iii) guidelines have been adopted in accordance with subsection (f) to ensure compliance with the limitations in subsection (b) and to ensure that an application for a court order is filed as required by this chapter; (iv) the procedures and guidelines referred to in clauses (i), (ii), and (iii) are consistent with the requirements of the fourth amendment to the Constitution of the United States; (v) a significant purpose of the acquisition is to obtain foreign intelligence information; (vi) the acquisition involves obtaining foreign intelligence information from or with the assistance of an electronic communication service provider; and (vii) the acquisition complies with the limitations in subsection (b); (B) include the procedures adopted in accordance with subsections (d) and (e); (C) be supported, as appropriate, by the affidavit of any appropriate official in the area of national security who is— (i) appointed by the President, by and with the advice and consent of the Senate; or (ii) the head of an element of the intelligence community; (D) include— (i) an effective date for the authorization that is at least 30 days after the submission of the written certification to the court; or (ii) if the acquisition has begun or the effective date is less than 30 days after the submission of the written certification to the court, the date the acquisition began or the effective date for the acquisition; and (E) if the Attorney General and the Director of National Intelligence make a determination under subsection (c)(2), include a statement that such determination has been made. (3) Change in effective date The Attorney General and the Director of National Intelligence may advance or delay the effective date referred to in paragraph (2)(D) by submitting an amended certification in accordance with subsection (i)(1)(C) to the Foreign Intelligence Surveillance Court for review pursuant to subsection (i). (4) Limitation A certification made under this subsection is not required to identify the specific facilities, places, premises, or property at which an acquisition authorized under subsection (a) will be directed or conducted. (5) Maintenance of certification The Attorney General or a designee of the Attorney General shall maintain a copy of a certification made under this subsection. (6) Review A certification submitted in accordance with this subsection shall be subject to judicial review pursuant to subsection (i). (h) Directives and judicial review of directives (1) Authority With respect to an acquisition authorized under subsection (a), the Attorney General and the Director of National Intelligence may direct, in writing, an electronic communication service provider to— (A) immediately provide the Government with all information, facilities, or assistance necessary to accomplish the acquisition in a manner that will protect the secrecy of the acquisition and produce a minimum of interference with the services that such electronic communication service provider is providing to the target of the acquisition; and (B) maintain under security procedures approved by the Attorney General and the Director of National Intelligence any records concerning the acquisition or the aid furnished that such electronic communication service provider wishes to maintain. (2) Compensation 95 The Government shall compensate, at the prevailing rate, an electronic communication service provider for providing information, facilities, or assistance in accordance with a directive issued pursuant to paragraph (1). (3) Release from liability No cause of action shall lie in any court against any electronic communication service provider for providing any information, facilities, or assistance in accordance with a directive issued pursuant to paragraph (1). (4) Challenging of directives (A) Authority to challenge An electronic communication service provider receiving a directive issued pursuant to paragraph (1) may file a petition to modify or set aside such directive with the Foreign Intelligence Surveillance Court, which shall have jurisdiction to review such petition. (B) Assignment The presiding judge of the Court shall assign a petition filed under subparagraph (A) to 1 of the judges serving in the pool established under section 1803 (e)(1) of this title not later than 24 hours after the filing of such petition. (C) Standards for review A judge considering a petition filed under subparagraph (A) may grant such petition only if the judge finds that the directive does not meet the requirements of this section, or is otherwise unlawful. (D) Procedures for initial review A judge shall conduct an initial review of a petition filed under subparagraph (A) not later than 5 days after being assigned such petition. If the judge determines that such petition does not consist of claims, defenses, or other legal contentions that are warranted by existing law or by a nonfrivolous argument for extending, modifying, or reversing existing law or for establishing new law, the judge shall immediately deny such petition and affirm the directive or any part of the directive that is the subject of such petition and order the recipient to comply with the directive or any part of it. Upon making a determination under this subparagraph or promptly thereafter, the judge shall provide a written statement for the record of the reasons for such determination. (E) Procedures for plenary review If a judge determines that a petition filed under subparagraph (A) requires plenary review, the judge shall affirm, modify, or set aside the directive that is the subject of such petition not later than 30 days after being assigned such petition. If the judge does not set aside the directive, the judge shall immediately affirm or affirm with modifications the directive, and order the recipient to comply with the directive in its entirety or as modified. The judge shall provide a written statement for the record of the reasons for a determination under this subparagraph. (F) Continued effect Any directive not explicitly modified or set aside under this paragraph shall remain in full effect. (G) Contempt of Court Failure to obey an order issued under this paragraph may be punished by the Court as contempt of court. (5) Enforcement of directives (A) Order to compel If an electronic communication service provider fails to comply with a directive issued pursuant to paragraph (1), the Attorney General may file a petition for an order to compel the electronic communication service provider to comply with the directive with the Foreign Intelligence Surveillance Court, which shall have jurisdiction to review such petition. (B) Assignment The presiding judge of the Court shall assign a petition filed under subparagraph (A) to 1 of the judges serving in the pool established under section 1803 (e)(1) of this title not later than 24 hours after the filing of such petition. (C) Procedures for review A judge considering a petition filed under subparagraph (A) shall, not later than 30 days after being assigned such petition, issue an order requiring the electronic communication service provider to comply with the directive or any part of it, as issued or as modified, if the judge finds that the directive meets the requirements of this section and is otherwise lawful. The judge shall 96 provide a written statement for the record of the reasons for a determination under this paragraph. (D) Contempt of Court Failure to obey an order issued under this paragraph may be punished by the Court as contempt of court. (E) Process Any process under this paragraph may be served in any judicial district in which the electronic communication service provider may be found. (6) Appeal (A) Appeal to the Court of Review The Government or an electronic communication service provider receiving a directive issued pursuant to paragraph (1) may file a petition with the Foreign Intelligence Surveillance Court of Review for review of a decision issued pursuant to paragraph (4) or (5). The Court of Review shall have jurisdiction to consider such petition and shall provide a written statement for the record of the reasons for a decision under this subparagraph. (B) Certiorari to the Supreme Court The Government or an electronic communication service provider receiving a directive issued pursuant to paragraph (1) may file a petition for a writ of certiorari for review of a decision of the Court of Review issued under subparagraph (A). The record for such review shall be transmitted under seal to the Supreme Court of the United States, which shall have jurisdiction to review such decision. (i) Judicial review of certifications and procedures (1) In general (A) Review by the Foreign Intelligence Surveillance Court The Foreign Intelligence Surveillance Court shall have jurisdiction to review a certification submitted in accordance with subsection (g) and the targeting and minimization procedures adopted in accordance with subsections (d) and (e), and amendments to such certification or such procedures. (B) Time period for review The Court shall review a certification submitted in accordance with subsection (g) and the targeting and minimization procedures adopted in accordance with subsections (d) and (e) and shall complete such review and issue an order under paragraph (3) not later than 30 days after the date on which such certification and such procedures are submitted. (C) Amendments The Attorney General and the Director of National Intelligence may amend a certification submitted in accordance with subsection (g) or the targeting and minimization procedures adopted in accordance with subsections (d) and (e) as necessary at any time, including if the Court is conducting or has completed review of such certification or such procedures, and shall submit the amended certification or amended procedures to the Court not later than 7 days after amending such certification or such procedures. The Court shall review any amendment under this subparagraph under the procedures set forth in this subsection. The Attorney General and the Director of National Intelligence may authorize the use of an amended certification or amended procedures pending the Court’s review of such amended certification or amended procedures. (2) Review The Court shall review the following: (A) Certification A certification submitted in accordance with subsection (g) to determine whether the certification contains all the required elements. (B) Targeting procedures The targeting procedures adopted in accordance with subsection (d) to assess whether the procedures are reasonably designed to— (i) ensure that an acquisition authorized under subsection (a) is limited to targeting persons reasonably believed to be located outside the United States; and (ii) prevent the intentional acquisition of any communication as to which the sender and all intended recipients are known at the time of the acquisition to be located in the United States. (C) Minimization procedures 97 The minimization procedures adopted in accordance with subsection (e) to assess whether such procedures meet the definition of minimization procedures under section 1801 (h) of this title or section 1821 (4) of this title, as appropriate. (3) Orders (A) Approval If the Court finds that a certification submitted in accordance with subsection (g) contains all the required elements and that the targeting and minimization procedures adopted in accordance with subsections (d) and (e) are consistent with the requirements of those subsections and with the fourth amendment to the Constitution of the United States, the Court shall enter an order approving the certification and the use, or continued use in the case of an acquisition authorized pursuant to a determination under subsection (c)(2), of the procedures for the acquisition. (B) Correction of deficiencies If the Court finds that a certification submitted in accordance with subsection (g) does not contain all the required elements, or that the procedures adopted in accordance with subsections (d) and (e) are not consistent with the requirements of those subsections or the fourth amendment to the Constitution of the United States, the Court shall issue an order directing the Government to, at the Government’s election and to the extent required by the Court’s order— (i) correct any deficiency identified by the Court’s order not later than 30 days after the date on which the Court issues the order; or (ii) cease, or not begin, the implementation of the authorization for which such certification was submitted. (C) Requirement for written statement In support of an order under this subsection, the Court shall provide, simultaneously with the order, for the record a written statement of the reasons for the order. (4) Appeal (A) Appeal to the Court of Review The Government may file a petition with the Foreign Intelligence Surveillance Court of Review for review of an order under this subsection. The Court of Review shall have jurisdiction to consider such petition. For any decision under this subparagraph affirming, reversing, or modifying an order of the Foreign Intelligence Surveillance Court, the Court of Review shall provide for the record a written statement of the reasons for the decision. (B) Continuation of acquisition pending rehearing or appeal Any acquisition affected by an order under paragraph (3)(B) may continue— (i) during the pendency of any rehearing of the order by the Court en banc; and (ii) if the Government files a petition for review of an order under this section, until the Court of Review enters an order under subparagraph (C). (C) Implementation pending appeal Not later than 60 days after the filing of a petition for review of an order under paragraph (3)(B) directing the correction of a deficiency, the Court of Review shall determine, and enter a corresponding order regarding, whether all or any part of the correction order, as issued or modified, shall be implemented during the pendency of the review. (D) Certiorari to the Supreme Court The Government may file a petition for a writ of certiorari for review of a decision of the Court of Review issued under subparagraph (A). The record for such review shall be transmitted under seal to the Supreme Court of the United States, which shall have jurisdiction to review such decision. (5) Schedule (A) Reauthorization of authorizations in effect If the Attorney General and the Director of National Intelligence seek to reauthorize or replace an authorization issued under subsection (a), the Attorney General and the Director of National Intelligence shall, to the extent practicable, submit to the Court the certification prepared in accordance with subsection (g) and the procedures adopted in accordance with subsections (d) and (e) at least 30 days prior to the expiration of such authorization. (B) Reauthorization of orders, authorizations, and directives If the Attorney General and the Director of National Intelligence seek to reauthorize or replace an authorization issued under subsection (a) by filing a certification pursuant to subparagraph (A), that authorization, and any directives issued thereunder and any order related thereto, shall 98 remain in effect, notwithstanding the expiration provided for in subsection (a), until the Court issues an order with respect to such certification under paragraph (3) at which time the provisions of that paragraph and paragraph (4) shall apply with respect to such certification. (j) Judicial proceedings (1) Expedited judicial proceedings Judicial proceedings under this section shall be conducted as expeditiously as possible. (2) Time limits A time limit for a judicial decision in this section shall apply unless the Court, the Court of Review, or any judge of either the Court or the Court of Review, by order for reasons stated, extends that time as necessary for good cause in a manner consistent with national security. (k) Maintenance and security of records and proceedings (1) Standards The Foreign Intelligence Surveillance Court shall maintain a record of a proceeding under this section, including petitions, appeals, orders, and statements of reasons for a decision, under security measures adopted by the Chief Justice of the United States, in consultation with the Attorney General and the Director of National Intelligence. (2) Filing and review All petitions under this section shall be filed under seal. In any proceedings under this section, the Court shall, upon request of the Government, review ex parte and in camera any Government submission, or portions of a submission, which may include classified information. (3) Retention of records The Attorney General and the Director of National Intelligence shall retain a directive or an order issued under this section for a period of not less than 10 years from the date on which such directive or such order is issued. (l) Assessments and reviews (1) Semiannual assessment Not less frequently than once every 6 months, the Attorney General and Director of National Intelligence shall assess compliance with the targeting and minimization procedures adopted in accordance with subsections (d) and (e) and the guidelines adopted in accordance with subsection (f) and shall submit each assessment to— (A) the Foreign Intelligence Surveillance Court; and (B) consistent with the Rules of the House of Representatives, the Standing Rules of the Senate, and Senate Resolution 400 of the 94th Congress or any successor Senate resolution— (i) the congressional intelligence committees; and (ii) the Committees on the Judiciary of the House of Representatives and the Senate. (2) Agency assessment The Inspector General of the Department of Justice and the Inspector General of each element of the intelligence community authorized to acquire foreign intelligence information under subsection (a), with respect to the department or element of such Inspector General— (A) are authorized to review compliance with the targeting and minimization procedures adopted in accordance with subsections (d) and (e) and the guidelines adopted in accordance with subsection (f); (B) with respect to acquisitions authorized under subsection (a), shall review the number of disseminated intelligence reports containing a reference to a United States-person identity and the number of United States-person identities subsequently disseminated by the element concerned in response to requests for identities that were not referred to by name or title in the original reporting; (C) with respect to acquisitions authorized under subsection (a), shall review the number of targets that were later determined to be located in the United States and, to the extent possible, whether communications of such targets were reviewed; and (D) shall provide each such review to— (i) the Attorney General; (ii) the Director of National Intelligence; and (iii) consistent with the Rules of the House of Representatives, the Standing Rules of the Senate, and Senate Resolution 400 of the 94th Congress or any successor Senate resolution— (I) the congressional intelligence committees; and (II) the Committees on the Judiciary of the House of Representatives and the Senate. 99 (3) Annual review (A) Requirement to conduct The head of each element of the intelligence community conducting an acquisition authorized under subsection (a) shall conduct an annual review to determine whether there is reason to believe that foreign intelligence information has been or will be obtained from the acquisition. The annual review shall provide, with respect to acquisitions authorized under subsection (a)— (i) an accounting of the number of disseminated intelligence reports containing a reference to a United States-person identity; (ii) an accounting of the number of United States-person identities subsequently disseminated by that element in response to requests for identities that were not referred to by name or title in the original reporting; (iii) the number of targets that were later determined to be located in the United States and, to the extent possible, whether communications of such targets were reviewed; and (iv) a description of any procedures developed by the head of such element of the intelligence community and approved by the Director of National Intelligence to assess, in a manner consistent with national security, operational requirements and the privacy interests of United States persons, the extent to which the acquisitions authorized under subsection (a) acquire the communications of United States persons, and the results of any such assessment. (B) Use of review The head of each element of the intelligence community that conducts an annual review under subparagraph (A) shall use each such review to evaluate the adequacy of the minimization procedures utilized by such element and, as appropriate, the application of the minimization procedures to a particular acquisition authorized under subsection (a). (C) Provision of review The head of each element of the intelligence community that conducts an annual review under subparagraph (A) shall provide such review to— (i) the Foreign Intelligence Surveillance Court; (ii) the Attorney General; (iii) the Director of National Intelligence; and (iv) consistent with the Rules of the House of Representatives, the Standing Rules of the Senate, and Senate Resolution 400 of the 94th Congress or any successor Senate resolution— (I) the congressional intelligence committees; and (II) the Committees on the Judiciary of the House of Representatives and the Senate. 100 Appendix II: text on procurement law by R. Westerdijk 101
© Copyright 2026 Paperzz