Mervinskiy 516

Page 128

DPIA Google G Suite Enterprise for SLM Rijk | 9 July 2020, with update 12 February 2021

processes these data in its role as processor, as well as in its role as joint data controller. The technical research in this DPIA shows that Google also collects Customer Data in sentences and words from the Enhanced Spellingchecker in telemetry data from the Chrome browser. Government organisations should therefore take account of the general prohibition on the processing of special categories of personal data from articles 9 and 10 of the GDPR if they are joint controllers with Google. There is no exception for the processing of these personal data by Google for its own 33 purposes. The only general useful exception in Article 9 GDPR is if the data subject has given explicit consent. However, valid consent is not an option as explained in sections 11.1.1 and 11.2.1 of this DPIA. Article 10 of the GDPR completely prohibits the processing of personal data relating to criminal convictions and offences, if not under the control of official authority or when authorized by Union or member law.

12.1

Transfer of special, sensitive, secret and confidential data to the USA In G Suite Enterprise admins can elect to store Customer Data from certain Core Services only in data centres in the European Union. This choice is not available for the Customer Data from other Core Services, the Google Account, the Additional Services, Support Data and any Diagnostic Data. Those data may therefore be stored anywhere where Google maintains facilities. With regard to the transfer of personal data in Customer Data to the USA, customers can accept the SCC, as described in Section 7. At the time of completion of this DPIA report, all other transfers of personal data outside of the EEA generally relied on the EU-US Privacy Shield. The transfer and storage of personal data in the USA carries a risk of unlawful further processing of personal data (i) through interception or silent orders from USA law enforcement authorities, security agencies and secret services, (ii) through rogue administrators at Google and at subprocessors (only for the Technical Support Services), and (iii) by hostile state actors. The likelihood and impact of these risks are assessed in Section 16.2.12 of this report. To mitigate some of these risks, government organisations can create policy rules to prevent that very confidential or state secret data are processed through cloud services. They could also draft a policy to prohibit the use of directly identifying personal or confidential data in file and path names. Google does not offer separate encryption possibilities for data stored in Drive, but customers may apply their own encryption from other companies before uploading sensitive data to Drive.277 In a whitepaper about encryption, Google explains that data on disks and backup media belonging to customers are always encrypted. Google has a distinct approach to encryption for each system, to mitigate the specific security risks. Google automatically encrypts Customer Data stored on disks in the G Suite product family as it is written to disk with a per-chunk encryption key that is associated with a specific Access Control List. This means that different chunks are encrypted with different encryption keys, even if they belong to the same customer. 278 Technically, this works as follows: “Each chunk key is encrypted by another key known as the wrapping key, which is managed by a Google-wide key management In the G Suite Marketplace, different third-party encryption tools are available, URL: https://gsuite.google.com/marketplace/search/encrypt 278 How Google Uses Encryption to Protect Your Data, G Suite Encryption Whitepaper, URL: https://storage.googleapis.com/gfw-touched-accountspdfs/google-encryption-whitepaper-gsuite.pdf 277

p. 120/162


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Conclusions

2min
page 170

17.4 Google measures 12 February 2021

19min
pages 161-169

16.3 Summary of risks

2min
pages 155-156

16.2 Assessment of Risks

36min
pages 142-154

15.7 Right to file a complaint

0
page 139

15.3 Right to access

5min
pages 136-137

14.3 Assessment of the subsidiarity

2min
page 134

14.1 The principle of proportionality

2min
page 130

14.2 Assessment of the proportionality

8min
pages 131-133

12.1 Transfer of special, sensitive, secret and confidential data to the USA

5min
pages 128-129

11.3 Google’s own legitimate business purposes

5min
pages 126-127

all Diagnostic Data

5min
pages 124-125

Services

22min
pages 116-123

Part B. Lawfulness of the data processing

2min
page 115

8.1 Anonymisation

15min
pages 106-111

6.3 Joint interests

11min
pages 101-105

6.2 Interests of Google

2min
page 100

6.1 Interests of the Dutch government organisations

2min
page 99

5.2 Data processor

5min
pages 88-89

5.3 Data controller

18min
pages 90-96

5.4 Joint controllers

5min
pages 97-98

4.4 Specific purposes Chrome OS and the Chrome browser

2min
page 86

5.1 Definitions

2min
page 87

4.3 Purposes Additional Services and Google Account, when not used in a Core Service

8min
pages 83-85

4.2 Purposes Google

13min
pages 77-82

4.1 Purposes government organisations

2min
page 76

2.5 Types of personal data and data subjects

7min
pages 60-62

3.2 Privacy controls administrators

7min
pages 70-75

3.1 Privacy controls G Suite account for end users

9min
pages 63-69

2.3 Outgoing traffic analysis

8min
pages 52-55

2.4 Results access requests

10min
pages 56-59

2.2 Diagnostic Data

7min
pages 47-51

Related services that may send Customer Data to Google, such as the Feedback form and the Enhanced Spellchecker in the Chrome browser.

4min
pages 13-15

2.1 Definitions of different types of personal data

7min
pages 44-46

Part A. Description of the data processing

0
page 25

The enrolment framework for G Suite Enterprise

2min
pages 42-43

G Suite Core Services, Google Account, Support Services, Additional Services, and Other related services

23min
pages 28-41

Functional Data

2min
page 27

Introduction

7min
pages 16-18

1 Legal framework and contractual arrangements between government organisations and

4min
pages 23-24
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.