Mervinskiy 516

Page 100

DPIA Google G Suite Enterprise for SLM Rijk | 9 July 2020, with update 12 February 2021

Furthermore, G Suite Enterprise enables administrators to encrypt information on end-user devices. Especially on mobile devices, such encryption is required to minimise the risks of data breaches. In contrast with the above-mentioned interests in the use of cloud providers, Dutch government organisations have a security and geopolitical interest in storing data in local data centres or, alternatively, in a limited number of data centres in the EU. The Ministry of Defence even has a military state sovereignty interest to only store data in a sovereign cloud.

6.2

Interests of Google Google has a strong financial and economic interest in selling customers a monthly cloud-based subscription service in order to increase its revenue. Google also has an interest in using the data it collects or otherwise obtains through the provision of the G Suite services for many different purposes. Many of the 33 purposes in Google’s (consumer) Privacy Policy represent Google’s interest in using data, for example ‘Develop new products and features’ (purpose 5), ‘Use cookies for many purposes’ (purpose 29) and ’Performing research’. Google has a business and marketing interest in differentiating between its consumer advertising revenue-based business model, and its corporate cloud subscriptionbased business model. In Google’s Cloud Privacy Principles217, Google promises, amongst others, not to process Customer Data for advertising, and to allow customers to control what happens with their data. Google competes with Microsoft, that has similar offerings for consumer and business productivity software. Google has business and economic interests in continuing to improve and develop its services and products to stay competitive. As a cloud provider, Google has a strong interest in promoting the security of its services to convince potential customers of the reliability and impenetrability of its services. Google writes: “Google employs more than 500 full-time security and privacy professionals, who are part of our software engineering and operations division. Our team includes some of the world’s foremost experts in information, application and network security.”218 Google also writes that this “security team actively scans for security threats using commercial and custom tools, penetration tests, quality assurance (QA) measures and software security reviews.”219 Google has a commercial interest in attracting customers at a young age. The longer a user uses the same e-mail address, the higher the switching costs. The UK supervisory authority Ofcom for example has warned British telecom providers that most people are being put off switching providers to get better deals, because of the hassle of losing their email addresses.220 Google attracts end users in the Netherlands at a very young age. According to the central IT support and procurement organisation for primary and secondary schools in the Netherlands, Kennisnet, Google has a market share of 70% with the ‘free’ services G Suite for

Google, Privacy, Google Cloud Trust Principles, URL: https://cloud.google.com/security/privacy 218 Google, Google Cloud Security and Compliance, URL: https://gsuite.google.com/learn-more/security/security-whitepaper/page-2.html 219 Idem. 220 BBC News, 22 February 2020, Email address charges branded 'daylight robbery', URL: https://www.bbc.com/news/business-51571275 217

p. 92/162


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Conclusions

2min
page 170

17.4 Google measures 12 February 2021

19min
pages 161-169

16.3 Summary of risks

2min
pages 155-156

16.2 Assessment of Risks

36min
pages 142-154

15.7 Right to file a complaint

1min
page 139

15.3 Right to access

5min
pages 136-137

14.3 Assessment of the subsidiarity

2min
page 134

14.1 The principle of proportionality

2min
page 130

14.2 Assessment of the proportionality

8min
pages 131-133

12.1 Transfer of special, sensitive, secret and confidential data to the USA

5min
pages 128-129

11.3 Google’s own legitimate business purposes

5min
pages 126-127

all Diagnostic Data

5min
pages 124-125

Services

22min
pages 116-123

Part B. Lawfulness of the data processing

2min
page 115

8.1 Anonymisation

15min
pages 106-111

6.3 Joint interests

11min
pages 101-105

6.2 Interests of Google

2min
page 100

6.1 Interests of the Dutch government organisations

2min
page 99

5.2 Data processor

5min
pages 88-89

5.3 Data controller

18min
pages 90-96

5.4 Joint controllers

5min
pages 97-98

4.4 Specific purposes Chrome OS and the Chrome browser

2min
page 86

5.1 Definitions

2min
page 87

4.3 Purposes Additional Services and Google Account, when not used in a Core Service

8min
pages 83-85

4.2 Purposes Google

13min
pages 77-82

4.1 Purposes government organisations

2min
page 76

2.5 Types of personal data and data subjects

7min
pages 60-62

3.2 Privacy controls administrators

7min
pages 70-75

3.1 Privacy controls G Suite account for end users

9min
pages 63-69

2.3 Outgoing traffic analysis

8min
pages 52-55

2.4 Results access requests

10min
pages 56-59

2.2 Diagnostic Data

7min
pages 47-51

Related services that may send Customer Data to Google, such as the Feedback form and the Enhanced Spellchecker in the Chrome browser.

4min
pages 13-15

2.1 Definitions of different types of personal data

7min
pages 44-46

Part A. Description of the data processing

1min
page 25

The enrolment framework for G Suite Enterprise

2min
pages 42-43

G Suite Core Services, Google Account, Support Services, Additional Services, and Other related services

23min
pages 28-41

Functional Data

2min
page 27

Introduction

7min
pages 16-18

1 Legal framework and contractual arrangements between government organisations and

4min
pages 23-24
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Mervinskiy 516 by Олексій Мервінський - Issuu