
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 15 Apr 2026 21:12:46 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Reflecting on the GDPR to celebrate Privacy Day 2024]]></title>
            <link>https://blog.cloudflare.com/reflecting-on-the-gdpr-to-celebrate-privacy-day-2024/</link>
            <pubDate>Fri, 26 Jan 2024 12:22:06 GMT</pubDate>
            <description><![CDATA[ On Privacy Day 2024, we answer the EU Commission’s call for reflection on how the GDPR has been functioning by pointing out two ways in which the GDPR has been applied that actually may harm people’s privacy ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2TlioBYVYw9Vryn7Y7QdSr/d5b39462dbd6b9918fb03342296a68d9/Privacy-Day-2024.png" />
            
            </figure><p>Just in time for Data Privacy Day 2024 on January 28, the EU Commission is <a href="https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/14054-Report-on-the-General-Data-Protection-Regulation_en">calling for evidence</a> to understand how the EU’s General Data Protection Regulation (GDPR) has been functioning now that we’re nearing the 6th anniversary of the regulation coming into force.</p><p>We’re so glad they asked, because we have some thoughts. And what better way to celebrate privacy day than by discussing whether the application of the GDPR has actually done anything to improve people’s privacy?</p><p>The answer is, mostly yes, but in a couple of significant ways – no.</p><p>Overall, the GDPR is rightly seen as the global gold standard for privacy protection. It has served as a model for what data protection practices should look like globally, it enshrines data subject rights that have been copied across jurisdictions, and when it took effect, it created a standard for the kinds of privacy protections people worldwide should be able to expect and demand from the entities that handle their personal data. On balance, the GDPR has definitely moved the needle in the right direction for giving people more control over their personal data and in protecting their privacy.</p><p>In a couple of key areas, however, we believe the way the GDPR has been applied to data flowing across the Internet has done nothing for privacy and in fact may even jeopardize the protection of personal data. The first area where we see this is with respect to cross-border data transfers. Location has become a proxy for privacy in the minds of many EU data protection regulators, and we think that is the wrong result. The second area is an overly broad interpretation of what constitutes “personal data” by some regulators with respect to Internet Protocol or “IP” addresses. We contend that IP addresses should not always count as personal data, especially when the entities handling IP addresses have no ability on their own to tie those IP addresses to individuals. This is important because the ability to implement a number of industry-leading cybersecurity measures relies on the ability to do threat intelligence on Internet traffic metadata, including IP addresses.  </p>
    <div>
      <h3>Location should not be a proxy for privacy</h3>
      <a href="#location-should-not-be-a-proxy-for-privacy">
        
      </a>
    </div>
    <p>Fundamentally, good data security and privacy practices should be able to protect personal data regardless of where that processing or storage occurs. Nevertheless, the GDPR is based on the idea that legal protections should attach to personal data based on the location of the data – where it is generated, processed, or stored. Articles 44 to 49 establish the conditions that must be in place in order for data to be transferred to a jurisdiction outside the EU, with the idea that even if the data is in a different location, the privacy protections established by the GDPR should follow the data. No doubt this approach was influenced by political developments around government surveillance practices, such as the revelations in 2013 of secret documents describing the relationship between the US NSA (and its Five Eyes partners) and large Internet companies, and that intelligence agencies were scooping up data from choke points on the Internet. And once the GDPR took effect, many data regulators in the EU were of the view that as a result of the GDPR’s restrictions on cross-border data transfers, European personal data simply could not be processed in the United States in a way that would be consistent with the GDPR.</p><p>This issue came to a head in July 2020, when the European Court of Justice (CJEU), in its “<i>Schrems II</i>” decision<sup>1</sup>, invalidated the EU-US Privacy Shield adequacy standard and questioned the suitability of the EU standard contractual clauses (a mechanism entities can use to ensure that GDPR protections are applied to EU personal data even if it is processed outside the EU). The ruling in some respects left data protection regulators with little room to maneuver on questions of transatlantic data flows. But while some regulators were able to view the <i>Schrems II</i> ruling in a way that would still allow for EU personal data to be processed in the United States, other data protection regulators saw the decision as an opportunity to double down on their view that EU personal data cannot be processed in the US consistent with the GDPR, therefore promoting the misconception that data localization should be a proxy for data protection.</p><p>In fact, we would argue that the opposite is the case. From our own experience and according to recent research<sup>2</sup>, we know that data localization threatens an organization’s ability to achieve <a href="https://www.cloudflare.com/cybersecurity-risk-management/">integrated management of cybersecurity risk</a> and limits an entity’s ability to employ state-of-the-art cybersecurity measures that rely on cross-border data transfers to make them as effective as possible. For example, Cloudflare’s <a href="/cloudflare-bot-management-machine-learning-and-more/">Bot Management product</a> only increases in accuracy with continued use on the global network: it detects and blocks traffic coming from likely bots before feeding back learnings to the models backing the product. A diversity of signal and scale of data on a global platform is critical to help us continue to evolve our bot detection tools. If the Internet were fragmented – preventing data from one jurisdiction being used in another – more and more signals would be missed. We wouldn’t be able to apply learnings from bot trends in Asia to bot mitigation efforts in Europe, for example. And if the ability to identify bot traffic is hampered, so is the ability to block those harmful bots from services that process personal data.</p><p>The need for industry-leading cybersecurity measures is self-evident, and it is not as if data protection authorities don’t realize this. If you look at any enforcement action brought against an entity that suffered a data breach, you see data protection regulators insisting that the impacted entities implement ever more robust cybersecurity measures in line with the obligation GDPR Article 32 places on data controllers and processors to “develop appropriate technical and organizational measures to ensure a level of security appropriate to the risk”, “taking into account the state of the art”. In addition, data localization undermines information sharing within industry and with government agencies for cybersecurity purposes, which is <a href="https://www.enisa.europa.eu/topics/national-cyber-security-strategies/information-sharing">generally recognized as vital</a> to effective cybersecurity.</p><p>In this way, while the GDPR itself lays out a solid framework for securing personal data to ensure its privacy, the application of the GDPR’s cross-border data transfer provisions has twisted and contorted the purpose of the GDPR. It’s a classic example of not being able to see the forest for the trees. If the GDPR is applied in such a way as to elevate the priority of data localization over the priority of keeping data private and secure, then the protection of ordinary people’s data suffers.</p>
    <div>
      <h3>Applying data transfer rules to IP addresses could lead to balkanization of the Internet</h3>
      <a href="#applying-data-transfer-rules-to-ip-addresses-could-lead-to-balkanization-of-the-internet">
        
      </a>
    </div>
    <p>The other key way in which the application of the GDPR has been detrimental to the actual privacy of personal data is related to the way the term “personal data” has been defined in the Internet context – specifically with respect to Internet Protocol or “IP” addresses. A world where IP addresses are always treated as personal data and therefore subject to the GDPR’s data transfer rules is a world that could come perilously close to requiring a walled-off European Internet. And as noted above, this could have serious consequences for data privacy, not to mention that it likely would cut the EU off from any number of global marketplaces, information exchanges, and social media platforms.</p><p>This is a bit of a complicated argument, so let’s break it down. As most of us know, IP addresses are the addressing system for the Internet. When you send a request to a website, send an email, or communicate online in any way, IP addresses connect your request to the destination you’re trying to access. These IP addresses are the key to making sure Internet traffic gets delivered to where it needs to go. As the Internet is a global network, this means it's entirely possible that Internet traffic – which necessarily contains IP addresses – will cross national borders. Indeed, the destination you are trying to access may well be located in a different jurisdiction altogether. That’s just the way the global Internet works. So far, so good.</p><p>But if IP addresses are considered personal data, then they are subject to data transfer restrictions under the GDPR. And with the way those provisions have been applied in recent years, some data regulators were getting perilously close to saying that IP addresses cannot transit jurisdictional boundaries if it meant the data might go to the US. The EU’s recent approval of the EU-US Data Privacy Framework established adequacy for US entities that certify to the framework, so these cross-border data transfers are not currently an issue. But if the Data Privacy Framework were to be invalidated as the EU-US Privacy Shield was in the <i>Schrems II</i> decision, then we could find ourselves in a place where the GDPR is applied to mean that IP addresses ostensibly linked to EU residents can’t be processed in the US, or potentially not even leave the EU.</p><p>If this were the case, then providers would have to start developing Europe-only networks to ensure IP addresses never cross jurisdictional boundaries. But how would people in the EU and US communicate if EU IP addresses can’t go to the US? Would EU citizens be restricted from accessing content stored in the US? It’s an application of the GDPR that would lead to the absurd result – one surely not intended by its drafters. And yet, in light of the <i>Schrems II</i> case and the way the GDPR has been applied, here we are.</p><p>A possible solution would be to consider that IP addresses are not always “personal data” subject to the GDPR. In 2016 – even before the GDPR took effect – the Court of Justice of the European Union (CJEU) established the view in <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:62014CJ0582&amp;from=en"><i>Breyer v. Bundesrepublik Deutschland</i></a> that even dynamic IP addresses, which change with every new connection to the Internet, constituted personal data if an entity processing the IP address could link the IP addresses to an individual. While the court’s decision did not say that dynamic IP addresses are <i>always</i> personal data under European data protection law, that’s exactly what EU data regulators took from the decision, without considering whether an entity actually has a way to tie the IP address to a real person<sup>3</sup>.</p><p>The question of when an identifier qualifies as “personal data” is again before the CJEU: In April 2023, the lower EU General Court ruled in <i>SRB v EDPS</i><sup><i>4</i></sup> that transmitted data can be considered anonymised and therefore not personal data if the data recipient does not have any additional information reasonably likely to allow it to re-identify the data subjects and has no legal means available to access such information. The appellant – the European Data Protection Supervisor (EDPS) – disagrees. The EDPS, who mainly oversees the privacy compliance of EU institutions and bodies, is appealing the decision and arguing that a unique identifier should qualify as personal data if that identifier could <i>ever</i> be linked to an individual, regardless of whether the entity holding the identifier actually had the means to make such a link.</p><p>If the lower court’s common-sense ruling holds, one could argue that IP addresses are not personal data when those IP addresses are processed by entities like Cloudflare, which have no means of connecting an IP address to an individual. If IP addresses are then not always personal data, then IP addresses will not always be subject to the GDPR’s rules on cross-border data transfers.</p><p>Although it may seem counterintuitive, having a standard whereby an IP address is not necessarily “personal data” would actually be a positive development for privacy. If IP addresses can flow freely across the Internet, then entities in the EU can use non-EU cybersecurity providers to help them secure their personal data. Advanced Machine Learning/predictive AI techniques that look at IP addresses to protect against DDoS attacks, prevent bots, or otherwise guard against personal data breaches will be able to draw on attack patterns and threat intelligence from around the world to the benefit of EU entities and residents. But none of these benefits can be realized in a world where IP addresses are always personal data under the GDPR and where the GDPR’s data transfer rules are interpreted to mean IP addresses linked to EU residents can never flow to the United States.</p>
    <div>
      <h3>Keeping privacy in focus</h3>
      <a href="#keeping-privacy-in-focus">
        
      </a>
    </div>
    <p>On this Data Privacy Day, we urge EU policy makers to look closely at how the GDPR is working in practice, and to take note of the instances where the GDPR is applied in ways that place privacy protections above all other considerations – even appropriate security measures mandated by the GDPR’s Article 32 that take into account the state of the art of technology. When this happens, it can actually be detrimental to privacy. If taken to the extreme, this formulaic approach would not only negatively impact cybersecurity and data protection, but even put into question the functioning of the global Internet infrastructure as a whole, which depends on cross-border data flows. So what can be done to avert this?</p><p>First, we believe EU policymakers could adopt guidelines (if not legal clarification) for regulators that IP addresses should not be considered personal data when they cannot be linked by an entity to a real person. Second, policymakers should clarify that the GDPR’s application should be considered with the cybersecurity benefits of data processing in mind. Building on the GDPR’s existing recital 49, which rightly recognizes cybersecurity as a legitimate interest for processing, personal data that needs to be processed outside the EU for cybersecurity purposes should be exempted from GDPR restrictions to international data transfers. This would avoid some of the worst effects of the mindset that currently views data localization as a proxy for data privacy. Such a shift would be a truly pro-privacy application of the GDPR.</p><p><sup>1 </sup>Case C-311/18, Data Protection Commissioner v Facebook Ireland and Maximillian Schrems.</p><p><sup>2</sup> <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4466479">Swire, Peter and Kennedy-Mayo, DeBrae and Bagley, Andrew and Modak, Avani and Krasser, Sven and Bausewein, Christoph, Risks to Cybersecurity from Data Localization, Organized by Techniques, Tactics, and Procedures</a> (2023).</p><p><sup>3</sup> Different decisions by the European data protection authorities, namely the Austrian DSB (December 2021), the French CNIL (February 2022) and the Italian Garante (June 2022), while analyzing the use of Google Analytics, have rejected the relative approach used by the Breyer case and considered that an IP address should always be considered as personal data. Only the decision issued by the Spanish AEPD (December 2022) followed the same interpretation of the Breyer case. In addition, see paragraphs 109 and 136 in <a href="https://www.datenschutzkonferenz-online.de/media/oh/20221205_oh_Telemedien_2021_Version_1_1_Vorlage_104_DSK_final.pdf">Guidelines by Supervisory Authorities for Tele-Media Providers</a>, DSK (2021).</p><p><sup>4</sup> <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A62020TJ0557">Single Resolution Board v EDPS, Court of Justice of the European Union</a>, April 2023.</p> ]]></content:encoded>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[GDPR]]></category>
            <category><![CDATA[Data Privacy Day]]></category>
            <category><![CDATA[Europe]]></category>
            <guid isPermaLink="false">5v4YuiCRLtl4Mb7XqKhYgb</guid>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Towards a global framework for cross-border data flows and privacy protection]]></title>
            <link>https://blog.cloudflare.com/towards-a-global-framework-for-cross-border-data-flows-and-privacy-protection/</link>
            <pubDate>Fri, 27 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ In our third and final blog post leading up to Data Privacy Day, we drill down into the challenges for cross-border data flows, in particular personal data transfers from the EU to the US. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2rmTrPONyF9zs6TgRW7w4s/7bd0c47ea7698d9e23fdc3b70f297f7d/image1-54.png" />
            
            </figure><p>As our societies and economies rely more and more on digital technologies, there is an increased need to share and transfer data, including personal data, over the Internet. Cross-border data flows have become essential to international trade and global economic development. In fact, the digital transformation of the global economy could never have happened as it did without the open and global architecture of the Internet and the ability for data to transcend national borders. As we described in our <a href="/investing-in-security-to-protect-data-privacy/">blog post</a> yesterday, data localization doesn’t necessarily improve data privacy. Actually, there can be real benefits to data security and - by extension - privacy if we are able to transfer data across borders. So with Data Privacy Day coming up tomorrow, we wanted to take this opportunity to drill down into the current environment for the transfer of personal data from the EU to the US, which is governed by the EU’s privacy regulation (GDPR). Looking to the future, we will make the case for a more stable, global cross-border data transfer framework, which will be critical for an open, more secure and more private Internet.</p>
    <div>
      <h3>The privacy challenge to cross-border data flows</h3>
      <a href="#the-privacy-challenge-to-cross-border-data-flows">
        
      </a>
    </div>
    <p>In the last decade, we have observed a growing tendency around the world to ring-fence the Internet and erect new barriers to international data flows, especially personal data. In some cases this has resulted in less choice and poorer performance for users of digital products and services. In other cases it has limited free access to information, and - paradoxically- in some cases this has resulted in even less data security and privacy, which is contrary to the very rationale of data protection regulations. The motives for these concerning developments are manifold, ranging from a lack of trust with regard to privacy protection in third countries, to asserting national security, to seeking economic self-determination.</p><p>In the European Union, for the last few years, even the most privacy-focused companies (like Cloudflare) have faced a drumbeat of speculation and concerns from some hardliner data protection authorities, privacy activists and others about whether data processed by US cloud service providers could really be processed in a manner that complies with the GDPR. Often, these concerns are purely legalistic and fail to take into account the actual risks associated with a specific data transfer, and, in Cloudflare’s case, the essential contribution of our services to the security and privacy of millions of European Internet users. In fact, official guidance from the European Data Protection Board (EDPB) has confirmed that EU personal data can still be processed in the US, but this has become quite complicated since the suspension of the Privacy Shield framework by the European Court of Justice with its 2020 Schrems II judgment: data controllers must use legal transfer mechanisms such as EU standard contractual clauses as well as a host of additional legal, technical and organizational safeguards.</p><p>However, it is ultimately up to the competent data protection authorities to decide whether such measures are sufficient in a case-by-case interpretation. Since these cases are often quite complex, since every case is different, and since there are <a href="https://ec.europa.eu/justice/article-29/structure/data-protection-authorities/index_en.htm">45 data protection authorities across Europe</a> alone, this approach simply doesn’t scale. Further, DPAs - sometimes even within the same EU country (Germany) - have disagreed in their interpretation of the law when it comes to third country transfers. And when it comes to an actual court ruling, it is our experience that the courts tend to be more pragmatic and balanced about data protection than the DPAs are. But it takes a long time and many resources before a data protection case ends up before a court. This is particularly problematic for small businesses that can’t afford lengthy legal battles. As a result, the theoretical threat of a hefty fine from a DPA may create enough of a deterrent for them to stop using services involving third-country data transfers altogether, even if those services provide greater security and privacy for the personal data they process, and make them more productive. This is clearly not in the interest of the European economy and most likely was not the intention of policy-makers when adopting the GDPR back in 2016.</p>
    <div>
      <h3>The good news: there is hope on the horizon</h3>
      <a href="#the-good-news-there-is-hope-on-the-horizon">
        
      </a>
    </div>
    <p>While recent developments will not resolve all the challenges mentioned above, last December, after years of complex negotiations, international policy-makers took two important steps towards restoring legal certainty and trust relating to cross-border flows of personal data.</p><p>On December 13, 2022, the European Commission published its long-awaited <a href="https://commission.europa.eu/document/download/e5a39b3c-6e7c-4c89-9dc7-016d719e3d12_en?filename=Draft%20adequacy%20decision%20on%20EU-US%20Data%20Privacy%20Framework_0.pdf">preliminary assessment</a> that the EU would consider that personal data transferred from the EU to the US under the future EU-US Data Privacy Framework (DPF) enjoys an adequate level of protection in the United States. The assessment follows the recent signing of Executive Order 14086 by US President Biden, which comprehensively addressed the concerns expressed by the European Court of Justice (ECJ) in its 2020 Schrems II decision. Notably, the US government will impose additional limits on US authorities’ use of bulk surveillance methods against non-US citizens and create an independent redress mechanism in the US that allows EU data subjects to exercise their data protection rights. While the Commission’s initial assessment is only the start of an EU ratification process that is expected to take about 4-6 months, experts are very optimistic that it will be adopted at the end.</p><p>Just one day later, the US, along with the 37 other OECD countries and the European Union, adopted a first-of-its kind <a href="https://legalinstruments.oecd.org/en/instruments/OECD-LEGAL-0487">agreement</a> to enhance trust in cross-border data flows between rule-of law democratic systems, by articulating joint principles for safeguards to protect privacy and other human rights and freedoms when governments access personal data held by private entities on grounds of national security and law enforcement. Where legal frameworks require that transborder data flows are subject to safeguards, like in the case of GDPR in the EU, participants agreed to “take into account a destination country’s effective implementation of the principles as a positive contribution towards facilitating transborder data flows in the application of those rules.” (It’s also good to note that, in line with Cloudflare’s mission to help build a better Internet, the OECD declaration recalls members’ shared commitment to a “global, open, accessible, interconnected, interoperable, reliable and secure Internet”).</p>
    <div>
      <h3>The future: a truly global privacy framework</h3>
      <a href="#the-future-a-truly-global-privacy-framework">
        
      </a>
    </div>
    <p>The EU-US DPF and the OECD Declaration are complementary to each other and both mark important steps to restore trust in cross-border data flows between countries that share common values like democracy and the rule of law, protecting privacy and other human rights and freedoms. However, both approaches come with their own limitations: the DPF is limited to personal data transfers from the EU to the US In addition, it cannot be excluded that it will be invalidated by the ECJ again in a few years time, as privacy activists have already announced that they will legally challenge it again. The OECD Declaration, on the other hand, is global in scope, but limited to general principles for governments, which can be interpreted quite differently in practice.</p><p>This is why, in addition to these efforts, we need a stable, multilateral framework with specific privacy protection requirements, which cannot be invalidated unilaterally. One single global certification should suffice for participating companies to safely transfer personal data between participating countries worldwide. The emerging Global Cross Border Privacy Rules (CBPR) certification, which is already supported by several governments from North America and Asia, looks very promising in this regard.</p><p>European policy-makers will ultimately need to decide whether they want to continue on the present path, which risks leaving Europe behind as an isolated data island. Alternatively, the EU could revise its privacy regulation with a view to prevent Europe’s many national and regional data protection authorities from interpreting it in a way that is out of touch with reality. It could also make it interoperable with a global framework for cross-border data flows based on shared values and mutual trust.</p><p>Cloudflare will continue to actively engage with policy-makers globally to create awareness for the practical challenges our industry is facing and to work on sustainable policy solutions for an open and interconnected Internet that is more private and secure.</p><p>Data Privacy Day tomorrow provides a unique occasion for us all to celebrate the significant progress achieved so far to protect users’ privacy online. At the same time, we should use this day to reflect on how regulations can be adapted or enforced in a way that more meaningfully protects privacy, notably by prioritizing the use of security and privacy-enhancing technologies over prohibitive approaches that harm the economy without tangible privacy benefits.</p> ]]></content:encoded>
            <category><![CDATA[Data Privacy Day]]></category>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">1T8I1MOiYEbs4xcZkHqdRB</guid>
            <dc:creator>Sebastian Hufnagel</dc:creator>
        </item>
        <item>
            <title><![CDATA[Navigating the changing data localization landscape with Cloudflare’s Data Localization Suite]]></title>
            <link>https://blog.cloudflare.com/dls-2022/</link>
            <pubDate>Thu, 26 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ We continue to expand and improve our data localization suite to help support our customers who have to comply with data localization requirements ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4EYiLjXGqj15qzzu24PmZ3/bfc3ae0c89d06eede8899add141bf3fc/image1-51.png" />
            
            </figure><p>At Cloudflare, we believe that deploying effective <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cybersecurity</a> measures is the <a href="/investing-in-security-to-protect-data-privacy/">best way to protect</a> the privacy of personal information and can be more effective than making sure that information stays within a particular jurisdiction. Yet, we hear from customers in Europe, India, Australia, Japan, and many other regions that, as part of their privacy programs, they need solutions to localize data in order to meet their regulatory obligations.</p><p>So as we think about Data Privacy Day, which is coming up on January 28, we are in the interesting position of disagreeing with those who believe that data localization is a proxy for better data privacy, but of also wanting to support our customers who have to comply with certain regulations.</p><p>For this reason, we <a href="/introducing-the-cloudflare-data-localization-suite/">introduced our Data Localization Suite</a> (DLS) in 2020 to help customers navigate a data protection landscape that focuses more and more on data localization. With the DLS, customers can use Cloudflare’s powerful global network and security measures to protect their businesses, while keeping the data we process on their behalf local. Since its launch, we’ve had many customers adopt the Data Localization Suite. In this blog post we want to share updates about how we’re making the DLS more comprehensive and easier to use.</p>
    <div>
      <h3>The confusing state of data protection regulations</h3>
      <a href="#the-confusing-state-of-data-protection-regulations">
        
      </a>
    </div>
    <p>We frequently field questions from customers who hear about new local laws or interpretations of existing regulations that seem to limit what they can do with data. This is especially confusing for customers doing business on the global Internet because they have to navigate regulations that suggest customers based in one country can’t use products from companies based in another country, unless extensive measures are put in place.</p><p>We don’t think this is any way to regulate the Internet. As we’ll talk more about in our blog post tomorrow about cross-border data transfers, we’re encouraged to see new developments aimed at establishing a common set of data protections across jurisdictions to make these data transfers more seamless.</p><p>In the meantime, we have the Data Localization suite to help our customers navigate these challenges.</p>
    <div>
      <h3>A recap of how the Data Localization Suite works</h3>
      <a href="#a-recap-of-how-the-data-localization-suite-works">
        
      </a>
    </div>
    <p>We developed DLS to address three primary customer concerns:</p><ol><li><p>How do I ensure my encryption keys stay in my jurisdiction?</p></li><li><p>How can I ensure that application services like caching and <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> only run in my jurisdiction?</p></li><li><p>How can I ensure that logs and metadata are never transferred outside my jurisdiction?</p></li></ol><p>To address these concerns, our DLS has an encryption key component, a component that addresses where content in transit is terminated and inspected, and a component that keeps metadata within a customers’ jurisdiction:</p><p><b>1. Encryption Keys</b>Cloudflare has long offered <a href="https://www.cloudflare.com/ssl/keyless-ssl/">Keyless SSL</a> and <a href="/introducing-cloudflare-geo-key-manager/">Geo Key Manager</a>, which ensure that private SSL/TLS key material never leaves the EU. Customers using our Geo Key Manager can choose for encryption keys to be stored only in data centers in the region the customer specifies. Keyless SSL ensures that Cloudflare never has possession of the private key material at all; Geo Key Manager ensures that keys are protected with cryptographic access control, so they can only be used in specified regions.</p><p><b>2. </b><a href="/introducing-regional-services/"><b>Regional Services</b></a>:Regional Services ensures that Cloudflare will only be able to decrypt and inspect the content of HTTPS traffic inside a customer’s chosen region. When Regional Services is enabled, regardless of which data center traffic first hits on our global network, rather than decrypting it at the first data center, we forward the TCP stream in encrypted form. Once it reaches a data center inside the customer’s chosen region, we decrypt and apply our Layer 7 security measures to prevent malicious traffic from reaching our customers’ websites.</p><p><b>3. </b><a href="/introducing-the-customer-metadata-boundary/"><b>Customer Metadata Boundary</b></a>:With this option enabled, no end user traffic logs (which contain IP addresses) that Cloudflare processes on behalf of our customers will leave the region chosen by the customer. (Currently available only in the EU and US.)</p>
    <div>
      <h3>Expanding Data Localization Suite to new regions</h3>
      <a href="#expanding-data-localization-suite-to-new-regions">
        
      </a>
    </div>
    <p>Although we launched the Data Localization Suite with Europe and America in mind at first, we quickly realized a lot of our customers were interested in versions specific to the Asia-Pacific region as well. In September of last year, we added <a href="/regional-services-comes-to-apac/">support for Regional Services</a> in Japan, Australia, and India.</p><p>Then in December 2022 we announced that Geo Key Manager is now accessible in <a href="/configurable-and-scalable-geo-key-manager-closed-beta/">15 regions</a>. Customers can both allow- and deny-list the regions that they want us to support for fine-grained control over where their key material is stored.</p><p>See also our <a href="/inside-geo-key-manager-v2">technical deep dive</a> about how we built Geo Key Manager v2.</p>
    <div>
      <h3>Making data localization more accessible</h3>
      <a href="#making-data-localization-more-accessible">
        
      </a>
    </div>
    <p>Regional Services and the Customer Metadata Boundary offer important protections for our customers — but they’ve been too hard to use. Both have required manual steps taken by teams at Cloudflare, and have had confusing (or no) public APIs.</p><p>Today, we’re fixing that! We’re excited to announce two big improvements to usability:</p><ol><li><p>Regional Services customers now have a dedicated UI and <a href="https://developers.cloudflare.com/data-localization/regional-services/get-started/#configure-regional-services-via-api">API for enabling Regional Services</a>, accessible straight from the DNS tab. Different regions can now be set on a per-hostname basis</p></li><li><p>Customers who want to use the Metadata Boundary can use <a href="https://developers.cloudflare.com/data-localization/metadata-boundary/get-started/">our self-service API</a> to enable it.</p></li></ol><p>We’re excited about making it easier to use the Data Localization Suite and give customers more control over exactly how to localize which parts of their traffic.</p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>The Data Localization Suite is accessible today for enterprise customers. Please chat with your account representative if you’re interested in using it, and you can <a href="https://developers.cloudflare.com/data-localization/">find more information here</a> about configuring it in our developer docs.</p><p>We have lots more planned for the Data Localization Suite this year. We plan to support many more regions for Regional Services and the Metadata Boundary. We also plan to have full data localization support for all of our Zero Trust products. Stay tuned to the blog for more!</p> ]]></content:encoded>
            <category><![CDATA[Data Privacy Day]]></category>
            <category><![CDATA[Data Localization]]></category>
            <category><![CDATA[Data Localization Suite]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">6Rg92MVxprXul5pDi5Z5tk</guid>
            <dc:creator>Emily Hancock</dc:creator>
            <dc:creator>Jon Levine</dc:creator>
        </item>
        <item>
            <title><![CDATA[Investing in security to protect data privacy]]></title>
            <link>https://blog.cloudflare.com/investing-in-security-to-protect-data-privacy/</link>
            <pubDate>Wed, 25 Jan 2023 15:15:28 GMT</pubDate>
            <description><![CDATA[ With Data Privacy Day just a few days away, we think it’s important to focus on all the ways security measures and privacy-enhancing technologies help keep personal data private and why security ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3MvjsfgDbxmaTvZvF8cEJz/285a60f22fddb1aa6b3d0c43569008f0/image1-47.png" />
            
            </figure><p>If you’ve made it to 2023 without ever receiving a notice that your personal information was compromised in a security breach, consider yourself lucky. In a best case scenario, bad actors only got your email address and name – information that won’t cause you a huge amount of harm. Or in a worst-case scenario, maybe your profile on a dating app was breached and <a href="https://www.classaction.org/blog/bumble-data-breach-class-action-alleges-dating-app-was-negligent-in-handling-vast-amounts-of-user-info#:~:text=The%20case%20argues%20that%20Bumble's,Bumble's%20roughly%20100%20million%20users.">intimate details of your personal life</a> were exposed publicly, with <a href="https://krebsonsecurity.com/2022/07/a-retrospective-on-the-2015-ashley-madison-breach/">life-changing impacts</a>. But there are also more hidden, insidious ways that your personal data can be exploited. For example, most of us use an Internet Service Provider (ISP) to connect to the Internet. Some of those <a href="https://www.ftc.gov/news-events/news/press-releases/2021/10/ftc-staff-report-finds-many-internet-service-providers-collect-troves-personal-data-users-have-few">ISPs are collecting information</a> about your Internet viewing habits, your search histories, your location, etc. – all of which can impact the privacy of your personal information as you are targeted with ads based on your online habits.</p><p>You also probably haven’t made it to 2023 without hearing at least something about Internet privacy laws around the globe. In some jurisdictions, lawmakers are driven by a recognition that the right to privacy is a fundamental human right. In other locations, lawmakers are passing laws to address the harms their citizens are concerned about – data breaches and mining of data about private details of people’s lives  to sell targeted advertising. At the core of most of this legislation is an effort to give users more control over their personal data. And many of these regulations require data controllers to ensure adequate protections are in place for cross-border data transfers. In recent years, we’ve seen an increasing number of regulators interpreting these regulations in a way that would leave no room for cross-border data transfers, however. These interpretations are problematic – not only are they <a href="https://itif.org/publications/2021/07/19/how-barriers-cross-border-data-flows-are-spreading-globally-what-they-cost/">harmful to global commerce</a>, but they also disregard the idea that data might be more secure if cross-border data transfers are allowed. Some regulators instead assert that personal data will be safer if it stays within their borders because their law protects privacy better than that of another jurisdiction.</p><p>So with Data Privacy Day 2023 just a few days away on January 28, we think it’s important to focus on all the ways security measures and privacy-enhancing technologies help keep personal data private and why security measures are so much more critical to protecting privacy than merely implementing the requirements of data protection laws or keeping data in a jurisdiction because regulators think that jurisdiction has stronger laws than another.</p>
    <div>
      <h3>The role of data security in protecting personal information</h3>
      <a href="#the-role-of-data-security-in-protecting-personal-information">
        
      </a>
    </div>
    <p>Most data protection regulations recognize the role security plays in protecting the privacy of personal information. That’s not surprising. An entity’s efforts to follow a data protection law’s requirements for how personal data should be collected and used won’t mean much if a third party can access the data for their own malicious purposes.</p><p>The laws themselves provide few specifics about what security is required. For example, the EU General Data Protection Regulation (“GDPR”) and similar comprehensive privacy laws in other jurisdictions require data controllers (the entities that collect your data) to implement “reasonable and appropriate” security measures. But it’s almost impossible for regulators to require specific security measures because the security landscape changes so quickly. In the United States, state security breach laws don’t require notification if the data obtained is encrypted, suggesting that encryption is at least one way regulators think data should be protected.</p><p>Enforcement actions brought by regulators against companies that have experienced data breaches provide other clues for what regulators think are “best practices” for ensuring data protection. For example, on January 10 of this year, the U.S. Federal Trade Commission entered into a <a href="https://www.ftc.gov/system/files/ftc_gov/pdf/2023185-drizly-combined-consent.pdf">consent order with Drizly</a>, an online alcohol sales and delivery platform, outlining a number of security failures that led to a data breach that exposed the personal information of about 2.5 million Drizly users and requiring Drizly to implement a comprehensive security program that includes a long list of intrusion detection and logging procedures. In particular, the FTC specifically requires Drizly to implement “...(c) data loss prevention tools; [and] (d) properly configured firewalls” among other measures.</p><p>What many regulatory post-breach enforcement actions have in common is the requirement of a comprehensive security program that includes a number of technical measures to protect data from third parties who might seek access to it. The enforcement actions tend to be data location-agnostic, however. It’s not important where the data might be stored – what is important is the right security measures are in place. We couldn’t agree more wholeheartedly.</p><p>Cloudflare’s portfolio of products and services helps our customers put protections in place to thwart would-be attackers from accessing their websites or corporate networks. By making it less likely that users’ data will be accessed by malicious actors, Cloudflare’s services can <a href="https://securityintelligence.com/articles/long-term-impacts-security-breach/">help organizations</a> save millions of dollars, protect their brand reputations, and build trust with their users. We also spend a great deal of time working to develop privacy-enhancing technologies that directly support the ability of individual users to have a more privacy-preserving experience on the Internet.</p><p>Cloudflare is most well-known for its <a href="https://www.cloudflare.com/application-security/">application layer security services</a> – <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewall (WAF)</a>, bot management, DDoS protection, <a href="https://www.cloudflare.com/application-services/products/ssl/">SSL/TLS</a>, Page Shield, and more. As the FTC noted in its Drizly consent order, firewalls can be a <a href="https://www.cloudflare.com/application-services/solutions/">critical line of defense</a> for any online application. Think about what happens when you go through security at an airport – your body and your bags are scanned for something bad that might be there (e.g. weapons or explosives), but the airport security personnel are not inventorying or recording the contents of your bags. They’re simply looking for dangerous content to make sure it doesn’t make its way onto an airplane. In the same way, the WAF looks at packets as they are being routed through Cloudflare’s network to make sure the Internet equivalent of weapons and explosives are not delivered to a web application. Governments around the globe have agreed that these quick security scans at the airport are necessary to protect us all from bad actors. Internet traffic is the same.</p><p>We embrace the critical importance of encryption in transit. In fact, we see encryption as so important that in 2014, Cloudflare introduced Universal SSL to support SSL (and now TLS) connections to every Cloudflare customer. And at the same time, we recognize that blindly passing along encrypted packets would undercut some of the very security that we’re trying to provide. Data privacy and security are a balance. If we let encrypted malicious code get to an end destination, then the malicious code may be used to access information that should otherwise have been protected. If data isn’t encrypted in transit, it’s at risk for interception. But by supporting encryption in transit and ensuring malicious code doesn’t get to its intended destination, we can protect private personal information even more effectively.</p><p>Let’s take another example – In June 2022, <a href="https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html">Atlassian released a Security Advisory</a> relating to a remote code execution (RCE) vulnerability affecting Confluence Server and Confluence Data Center products. Cloudflare <a href="/cloudflare-customers-are-protected-from-the-atlassian-confluence-cve-2022-26134/">responded immediately</a> to roll out a new WAF rule for all of our customers. For customers without this WAF protection, all the trade secret and personal information on their instances of Confluence were potentially vulnerable to data breach. These types of security measures are critical to protecting personal data. And it wouldn’t have mattered if the personal data were stored on a server in Australia, Germany, the U.S., or India – the RCE vulnerability would have exposed data wherever it was stored. Instead, the data was protected because a global network was able to roll out a WAF rule immediately to protect all of its customers globally.</p>
    <div>
      <h3>Global network to thwart global attacks</h3>
      <a href="#global-network-to-thwart-global-attacks">
        
      </a>
    </div>
    <p>The power of a large, global network is often overlooked when we think about using security measures to protect the privacy of personal data. Regulators who would seek to wall off their countries from the rest of the world as a method of protecting data privacy often miss how such a move can impact the security measures that are even more critical to keeping private data protected from bad actors.</p><p>Global knowledge is necessary to stop attacks that could come from anywhere in the world. Just as an international network of counterterrorism units helps to prevent physical threats, the same approach is needed to <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">prevent cyberthreats</a>. The most powerful security tools are built upon identified patterns of anomalous traffic, coming from all over the world. Cloudflare’s global network puts us in a unique position to understand the evolution of global threats and anomalous behaviors. To empower our customers with preventative and responsive <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cybersecurity</a>, we transform global learnings into protections, while still maintaining the privacy of good-faith Internet users.</p><p>For example, Cloudflare’s tools to block threats at the DNS or HTTP level, including <a href="https://www.cloudflare.com/ddos/">DDoS protection for websites</a> and Gateway for enterprises, allow users to further secure their entities beyond customized traffic rules by screening for patterns of traffic known to contain phishing or malware content. We use our global network to improve our identification of vulnerabilities and malicious content and to roll out rules in real time that protect <a href="/waf-for-everyone/">everyone</a>. This ability to identify and instantly protect our customers from security vulnerabilities that they may not have yet had time to address reduces the possibility that their data will be compromised or that they will otherwise be subjected to nefarious activity.</p><p>Similarly, Cloudflare’s <a href="/cloudflare-bot-management-machine-learning-and-more/">Bot Management product</a> only increases in accuracy with continued use on the global network: it detects and blocks traffic coming from likely bots before feeding back learnings to the models backing the product. And most importantly, we minimize the amount of information used to detect these threats by fingerprinting traffic patterns and forgoing reliance on PII. Our Bot Management products are successful because of the sheer number of customers and amount of traffic on our network. With approximately 20 percent of all websites protected by Cloudflare, we are uniquely positioned to gather the signals that traffic is from a bad bot and interpret them into actionable intelligence. This diversity of signal and scale of data on a global platform is critical to help us continue to evolve our bot detection tools. If the Internet were fragmented – preventing data from one jurisdiction being used in another – more and more signals would be missed. We wouldn’t be able to apply learnings from bot trends in Asia to bot mitigation efforts in Europe, for example.</p><p>A global network is equally important for resilience and effective security protection, a reality that the war in Ukraine has brought into sharp relief. In order to keep their data safe, the Ukrainian government was required to <a href="https://www.c4isrnet.com/2022/06/22/how-the-cloud-saved-ukraines-data-from-russian-attacks/">change their laws</a> to remove data localization requirements. As Ukraine’s infrastructure came under attack during Russia’s invasion, the Ukrainian government migrated their data to the cloud, allowing it to be preserved and easily moved to safety in other parts of Europe. Likewise, Cloudflare’s global network played an important role in helping maintain Internet access inside Ukraine. Sites in Ukraine at times came under heavy DDoS attack, even as infrastructure was being destroyed by physical attacks. With bandwidth limited, it was important that the traffic that was getting through inside Ukraine was useful traffic, not attack traffic. Instead of allowing attack traffic inside Ukraine, Cloudflare’s global network identified it and rejected it in the countries where the attacks originated. Without the ability to inspect and reject traffic outside of Ukraine, the attack traffic would have further congested networks inside Ukraine, limiting network capacity for critical wartime communications.</p><p>Although the situation in Ukraine reflects the country’s wartime posture, Cloudflare’s global network provides the same security benefits for all of our customers. We use our entire network to deliver DDoS mitigation, with a  network capacity of over 172 Tbps, making it possible for our customers to stay online even in the face of the largest attacks. That enormous capacity to protect customers from attack is the result of the global nature of Cloudflare’s network, aided by the ability to restrict attack traffic to the countries where it originated. And a network that stays online is less likely to have to address the network intrusions and data loss that are frequently connected to successful <a href="https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/">DDoS attacks</a>.</p>
    <div>
      <h3>Zero Trust security for corporate networks</h3>
      <a href="#zero-trust-security-for-corporate-networks">
        
      </a>
    </div>
    <p>Some of the biggest data breaches in recent years have happened as a result of something pretty simple – an attacker uses a phishing email or social engineering to get an employee of a company to visit a site that infects the employee’s computer with malware or enter their credentials on a fake site that lets the bad actor capture the credentials and then use those to impersonate the employee and log into a company’s systems. Depending on the type of information compromised, these kinds of data breaches can have a huge impact on individuals’ privacy. For this reason, Cloudflare has invested in a number of technologies designed to protect corporate networks, and the personal data on those networks.</p><p>As we noted during our recent <a href="/cio-week-2023-recap/">CIO week</a>, the FBI’s latest <a href="https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf">Internet Crime Report</a> shows that business email compromise and email account compromise, a subset of malicious phishing campaigns, are the most costly – with U.S. businesses losing nearly $2.4 billion. Cloudflare has invested in a number of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> solutions to help fight this very problem:</p><ul><li><p>Link Isolation means that when an employee clicks a link in an email, it will automatically be opened using Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation technology</a> that isolates potentially risky links, downloads, or other zero-day attacks from impacting that user’s computer and the wider corporate network.</p></li><li><p>With our Data Loss Prevention tools, businesses can identify and stop <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">exfiltration of data</a>.</p></li><li><p>Our Area 1 solution identifies <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">phishing attempts</a>, emails containing malicious code, and emails containing ransomware payloads and <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">prevents</a> them from landing in the inbox of unsuspecting employees.</p></li></ul><p>These Zero Trust tools, combined with the use of hardware keys for multi-factor authentication, were key in Cloudflare’s ability to <a href="/2022-07-sms-phishing-attacks/">prevent a breach</a> by an SMS phishing attack that targeted more than 130 companies in July and August 2022. Many of these companies reported the disclosure of customer personal information as a result of employees falling victim to this SMS phishing effort.</p><p>And remember the Atlassian Confluence RCE vulnerability we mentioned earlier? Cloudflare remained protected not only due to our rapid update of our WAF rules, but also because we use our own Cloudflare Access solution (part of our Zero Trust suite) to ensure that only individuals with Cloudflare credentials are able to access our internal systems. Cloudflare Access verified every request made to a Confluence application to ensure it was coming from an authenticated user.</p><p>All of these <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust solutions</a> require sophisticated <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning</a> to detect patterns of malicious activity, and none of them require data to be stored in a specific location to keep the data safe. Thwarting these kinds of security threats aren’t only important for protecting organizations’ internal networks from intrusion – they are critical for keeping large scale data sets private for the benefit of millions of individuals.</p>
    <div>
      <h3>Cutting-edge technologies</h3>
      <a href="#cutting-edge-technologies">
        
      </a>
    </div>
    <p>Cloudflare's security services enable our customers to screen for cybersecurity risks on Cloudflare's network before those risks can reach the customer's internal network. This helps protect our customers and our customers’ data from a range of cyber threats. By doing so, Cloudflare's services are essentially fulfilling a privacy-enhancing function in themselves. From the beginning, we have built our systems to ensure that data is kept private, even from us, and we have made <a href="https://www.cloudflare.com/transparency/h1-2021/">public policy</a> and <a href="https://www.cloudflare.com/cloudflare-customer-dpa/">contractual commitments</a> about keeping that data private and secure. But beyond securing our network for the benefit of our customers, we’ve invested heavily in new technologies that aim to secure communications from bad actors; the prying eyes of ISPs or other man-in-the-middle machines that might find your Internet communications of interest for advertising purpose; or government entities that might want to crack down on individuals exercising their freedom of speech.</p><p>For example, Cloudflare operates part of <a href="/icloud-private-relay/">Apple’s iCloud Private Relay system</a>, which ensures that no single party handling user data has complete information on both who the user is and what they are trying to access. Instead, a user’s original IP address is visible to the access network (e.g. the coffee shop you’re sitting in, or your home ISP) and the first relay (operated by Apple), but the server or website name is encrypted and not visible to either. The first relay hands encrypted data to a second relay (e.g. Cloudflare), but is unable to see “inside” the traffic to Cloudflare. And the Cloudflare-operated relays know only that it is receiving traffic from a Private Relay user, but not specifically who or their client IP address. Cloudflare relays then forward traffic on to the destination server.</p><p>And of course any post on how security measures enable greater data privacy would be remiss if it failed to mention Cloudflare’s privacy-first 1.1.1.1 public resolver. By using <a href="https://1.1.1.1/">1.1.1.1,</a> individuals can search the Internet without their ISPs seeing where they are going. Unlike most DNS resolvers, 1.1.1.1 does not sell user data to advertisers.</p><p>Together, these many technologies and security measures ensure the privacy of personal data from many types of threats to privacy – behavioral advertising, man-in-the-middle attacks, malicious code, and more. On this data privacy day 2023, we urge regulators to recognize that the emphasis currently being placed on data localization has perhaps gone too far – and has foreclosed the many benefits cross-border data transfers can have for data security and, therefore, data privacy.</p> ]]></content:encoded>
            <category><![CDATA[Data Privacy Day]]></category>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">OiQaL75AyNnzr5CWjOljJ</guid>
            <dc:creator>Emily Hancock</dc:creator>
            <dc:creator>Alissa Starzak</dc:creator>
        </item>
        <item>
            <title><![CDATA[Need to keep analytics data in the EU? Cloudflare Zaraz can offer a solution]]></title>
            <link>https://blog.cloudflare.com/keep-analytics-tracking-data-in-the-eu-cloudflare-zaraz/</link>
            <pubDate>Thu, 03 Feb 2022 13:58:05 GMT</pubDate>
            <description><![CDATA[ Zaraz offers a way to use tools like Google Analytics, but doing so with an approach that protects the privacy of personal information and keeps it in the EU ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5kSXFj0Tgq1mTPHL6Bdpbd/14567e87448e778cedfb1270a6945642/unnamed--1--1.png" />
            
            </figure><p>A recent decision from the Austrian Data Protection Authority (<a href="https://www.dsb.gv.at/">the Datenschutzbehörde</a>) has network engineers scratching their heads and EU companies that use Google Analytics scrambling. The Datenschutzbehörde found that an Austrian website’s use of Google Analytics violates the EU General Data Protection Regulation (GDPR) as interpreted by the “Schrems II” case because Google Analytics can involve sending full or truncated IP addresses to the United States.</p><p>While disabling such trackers might be one (extreme) solution, doing so would leave website operators blind to how users are engaging with their site. A better approach: find a way to use tools like Google Analytics, but do so with an approach that protects the privacy of personal information and keeps it in the EU, avoiding a data transfer altogether. Enter <a href="https://dash.cloudflare.com/?to=/:account/:zone/zaraz">Cloudflare Zaraz</a>.</p><p>But before we get into just how Cloudflare Zaraz can help, we need to explain a bit of the background for the Datenschutzbehörde’s ruling, and why it’s a big deal.</p>
    <div>
      <h3>What are the privacy and data localization issues?</h3>
      <a href="#what-are-the-privacy-and-data-localization-issues">
        
      </a>
    </div>
    <p>The GDPR is a comprehensive data privacy law that applies to EU residents’ personal data, regardless of where it is processed. The GDPR itself does not insist that personal data must be processed only in Europe. Instead, it provides a number of legal mechanisms to ensure that GDPR-level protections are available for EU personal data if it is transferred outside the EU to a third country like the United States. Data transfers from the EU to the US were, until the 2020 “Schrems II” decision, permitted under an agreement called the <a href="https://www.privacyshield.gov/welcome">EU-US Privacy Shield Framework</a>.</p><p>The Schrems II decision refers to the July 2020 decision by the Court of Justice of the European Union that invalidated the EU-US Privacy Shield. The Court found that the Privacy Shield was not an effective means to protect EU data from US government surveillance authorities once data was transferred to the US, and therefore that under the Privacy Shield, EU personal data would not receive the level of protection guaranteed by the GDPR. However, the court upheld other valid transfer mechanisms designed to allow EU personal data to be transferred to the US in a way that is consistent with the GDPR that ensure EU personal data won’t be accessed by US government authorities in a way that violates the GDPR. One of those was the use of <a href="https://www.cloudflare.com/cloudflare-customer-scc/">Standard Contractual Clauses</a>, which are legal agreements approved by the EU Commission that enable data transfers – but they can only be used if supplementary measures are also in place.</p><p>Following the Schrems II case, the “NOYB” advocacy group founded by Max Schrems (the lawyer and activist who brought the legal action against Facebook that ultimately ended with the Schrems II ruling) filed 101 complaints against European websites that used Google Analytics and Facebook Connect trackers on the grounds that use of these trackers violates the Schrems II ruling because they send EU personal data to the United States without putting in place sufficient supplementary measures.</p><p>That issue of supplementary measures figured prominently in the Austrian data regulator’s decision. In its decision, the Datenschutzbehörde said that a European company could not use Google Analytics on its Austrian website because Google Analytics was sending the IP addresses of visitors to that website to Google’s servers in the United States. The Datenschutzbehörde reiterated earlier case law out of the EU that IP addresses can be sufficiently linked to individuals and therefore constitute personal data, so the GDPR applies. The regulator also found that IP addresses are not pseudonymous, and that Google doesn’t have sufficient supplementary measures in place to prevent US government authorities from accessing the data. As a result, the regulator found the use of Google Analytics and the transmission of IP addresses to the United States in this case violated the GDPR as interpreted by the Schrems II case.</p>
    <div>
      <h3>Google Analytics decision sets worrisome precedent</h3>
      <a href="#google-analytics-decision-sets-worrisome-precedent">
        
      </a>
    </div>
    <p>It’s important to remember that the Austrian ruling relates to one website’s use and implementation of Google Analytics. It is not a ban on Google Analytics throughout Europe. But is it a harbinger of more sweeping actions from data regulators? Any website might use dozens of third-party tools. If any of the third-party tools are transferring personal data to the US, they could attract the attention of an EU data regulator. Even if those tools are not collecting personal data or sensitive information intentionally, there remains a concern with the use of third-party tools, which evolves from how the Internet is built and operates.</p><p>Every time a user loads a website, those tools load and establish a connection between the end user’s browser and the third-party server. This connection is used for multiple purposes, such as requesting a script, reporting analytics data, or downloading an image pixel. In every such communication, the IP address of the visitor is exposed. This is how communication between a browser and a server has worked over the Internet since the Internet’s infancy.</p><p>The implications of the decision are therefore profound. If other European regulators adopt the Austrian ruling, and its conclusion that even the transfer of truncated IP addresses to the United States could constitute transfers of personal data that violate GDPR, the industry will likely need to fundamentally rethink current Internet architecture and the way IP addresses are used. Cloudflare increasingly believes that we’ll eventually solve these challenges by completely disassociating IP addresses from identity. We’ve partnered with others in the industry to pioneer new protocols like <a href="/oblivious-dns/">Oblivious DNS over HTTPS</a> that divorce IP addresses from content being queried online to help begin to make this future a reality.</p><p>While we can envision this future, our customers need immediate ways to address regulators’ concerns. The <a href="https://almanac.httparchive.org/en/2021/third-parties#fig-4">median website in 2021</a> used 21 third-party solutions on mobile and 23 on desktop. At the <a href="https://almanac.httparchive.org/en/2021/third-parties#fig-4">90th percentile</a>, these numbers climbed to 89 third-party solutions on mobile, and 91 on desktop. Taking into account the Austrian DPA ruling, according to which the EU company itself is responsible for making sure no personal data is transmitted to the United States without proper handling, we can conclude that companies may soon become responsible for every one of their third-party solutions implemented on their website. And since this is a staggering amount of tools, it demands a scalable solution. Luckily, that is exactly what we have built.</p>
    <div>
      <h3>Zaraz’s solution leverages Cloudflare’s global network and Workers platform</h3>
      <a href="#zarazs-solution-leverages-cloudflares-global-network-and-workers-platform">
        
      </a>
    </div>
    <p>Zaraz is a third-party manager, built for speed, privacy and security. With Zaraz, customers can load analytics tools, advertising pixels, interactive widgets, and many other types of third-party tools without making any changes to their code.</p><p>Zaraz loads third party tools on the cloud, using Cloudflare Workers. There are multiple reasons why we chose to build on Workers, and you can read more about it in this <a href="/zaraz-use-workers-to-make-third-party-tools-secure-and-fast/">blog post</a>. By using Workers to offload third-party tools to the cloud and away from the browser, Zaraz creates an extra layer of security and control over Personal Identifiable Information (PII), Protected Health Information (PHI), or other sensitive pieces of information that are often unintentionally passed to third-party vendors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1mxi46XGo4i072f0ftw7yC/6af1062eac8638bcd713178b619022df/image1-2.png" />
            
            </figure><p>In the <i>traditional</i> way of loading third-party tools, either via a Tag Management Software (TMS), a Customer Data Platform (CDP) or by including JavaScript snippets directly in the HTML, the browser always sends requests to the third-party domain. This is problematic for a bunch of reasons, but mainly because even if you wanted to, you can’t hide the user’s IP address. It is revealed with every HTTP request. It is also problematic because those tools execute remote JavaScript resources, and you have almost no visibility over the actions they take in the browser or the data they transmit.</p><p>We can use the Google Analytics example to illustrate the difference. When a website is loading Google Analytics either via Google Tag Manager or directly from the HTML, the browser downloads the <code>analytics.js</code> file that loads Google Analytics. It then sends an HTTP POST request from the browser to Google’s endpoint: <code>https://www.google-analytics.com/collect</code>. Both of these requests reveal the end-user’s IP address and might append to the URL some personal data, such as the Google Client ID, as query parameters for example.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1bWZxnvgilvw6PrUNsmkuq/943310f8ccc5e32d6b4ab3649bb96d3e/image3-3.png" />
            
            </figure><p>In comparison, when you use Zaraz to load Google Analytics, there’s simply no communication at all between the browser and Google’s endpoint. Instead, Zaraz works as an intermediary, and the entire communication is between Zaraz (which runs on Workers servers, isolated from the browser) and the third party. You can think of Zaraz as an extra protection layer between the browser and the third-party endpoint, and this extra layer allows us to include some powerful privacy features.</p><p>For example, Zaraz allows customers to decide whether to transfer an end user's IP address to Google Analytics or not. As simple as that. When configuring a new third-party tool like Google Analytics, you can choose in the tools settings page to hide IP addresses.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4nA1w99BBqIpf1NXlrBhHx/a43c97b468b46674b2059b1e79a9ffc9/image2-1.png" />
            
            </figure><p>You can use this feature currently with Google Analytics and the Facebook Pixel/Conversion API. But with more and more tools opening up their API and allowing server-to-server integrations, we expect the number of tools you can apply this on to grow rapidly.</p><p>A somewhat similar feature Zaraz offers is the Zaraz Data Loss Prevention (DLP) feature, currently used by several of our Enterprise customers. The DLP feature scans every request going to a third-party endpoint to make sure it doesn’t include sensitive information such as names, email addresses, social  security number, credit card numbers, IP addresses, and more. Using this feature, customers can either mask the data or simply be alerted when a tool is collecting such personal data. It gives full visibility and control over the information shared with third parties.</p>
    <div>
      <h3>How Zaraz Can Help with Data Localization</h3>
      <a href="#how-zaraz-can-help-with-data-localization">
        
      </a>
    </div>
    <p>Right now, you might be asking yourself, “wait, but how is Cloudflare different from Google, and won’t end users' logs go to Cloudflare’s US servers as well?” This is a great question, and where the combination of Zaraz with the Cloudflare global network makes us shine. We offer Enterprise customers Zaraz in combination with two powerful features of Cloudflare’s Data Localisation Suite: <a href="/introducing-regional-services/">Regional Services</a>, and the <a href="/introducing-the-customer-metadata-boundary/">Customer Metadata Boundary</a>.</p><p>Cloudflare Regional Services allows you to choose where you want the Cloudflare services to run, including the Zaraz service. To meet your compliance obligations, you may need control over where your data is inspected. Cloudflare Regional Services helps you decide where your data should be handled, without losing the performance benefits our network provides.</p><p>Let’s say you run a website for a European bank. Let’s also assume you enabled the Data Localisation Suite for the EU. When a person in the EU visits your website, an HTTP request is sent to activate Zaraz. Since Zaraz is running in a first-party context, meaning under your own domain, all the Data Localisation settings will apply on it as well. So the network will direct the traffic to the EU, without inspecting its content, and run Zaraz there.</p><p>The EU Customer Metadata Boundary expands the Data Localisation Suite to ensure that a customer’s end-user traffic metadata stays in the EU. “Metadata” can be a scary term, but it’s a simple concept — it just means “data about data.” In other words, it’s a description of activity that happened on our network. Using the EU Customer Metadata Boundary means that this type of metadata would be saved only in the EU.</p><p>And what about the end user’s personal data handled by Zaraz? By default, Zaraz doesn’t log or save any piece of information about the end user, with one exception in the case of error logging. To make our service better, we are saving logs of errors, so we can fix any issues. For customers that are using the Data Localisation Suite, this is something we can toggle off, which means that no log data whatsoever will be saved by Zaraz.</p>
    <div>
      <h3>What Does the Future Hold for Privacy Features?</h3>
      <a href="#what-does-the-future-hold-for-privacy-features">
        
      </a>
    </div>
    <p>Since the <a href="/cloudflare-acquires-zaraz-to-enable-cloud-loading-of-third-party-tools/">Zaraz acquisition</a>, we have been talking to hundreds of Cloudflare enterprise customers, and thousands of users using the beta for the free version of Zaraz. And we have gathered a shortlist of features that we plan to develop in 2022.</p><ul><li><p>The Zaraz Consent Manager. Zaraz is fundamentally changing the way third-party tools are implemented on the web. So, in order to provide our customers with full control over user consent management, we realized we should build our own tool to allow customers to do so easily. The Zaraz consent manager will be fully integrated with Zaraz and will allow customers to take actions according to the user choices in a few clicks.</p></li><li><p>Geolocation Triggers. We are planning to add the option to create <a href="https://developers.cloudflare.com/zaraz/get-started/create-trigger">trigger rules</a> based on an end user’s current location. This means you could configure tools to only load if the user is visiting your site from a specific region. You’d be able to even send specific events or properties according to the end-user’s location. This feature should help global companies to set granular configurations that meet the requirements of their global operations.</p></li><li><p>DLP pattern templates. At the moment, our DLP feature can scan requests going to third-party tools according to the patterns that enterprise customers create themselves. In the near future, we will introduce templates to help customers scan for common PII with more ease.</p></li></ul><p>This is just a taste of what’s coming. If you have any ideas for privacy features you’d like to see, reach out to <a href="#">zaraz@cloudflare.com</a> – we would love to hear from you!</p><p>If you would like to explore the free beta version, please <a href="https://dash.cloudflare.com/?to=/:account/:zone/zaraz">click here</a>. Provided you are an Enterprise customer and want to learn more about Zaraz’s privacy features, please <a href="https://www.cloudflare.com/cloudflare-zaraz-third-party-tool-manager-waitlist">click here</a> to join the waitlist. To join our Discord channel, <a href="https://discord.gg/2TRr6nSxdd">click here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Data Privacy Day]]></category>
            <category><![CDATA[Analytics]]></category>
            <category><![CDATA[Zaraz]]></category>
            <guid isPermaLink="false">7sjFkMUiIg78EGXJ7iMY4Q</guid>
            <dc:creator>Yair Dovrat</dc:creator>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Happy Data Privacy Day!]]></title>
            <link>https://blog.cloudflare.com/privacyday2022/</link>
            <pubDate>Fri, 28 Jan 2022 10:10:05 GMT</pubDate>
            <description><![CDATA[ On this Data Privacy Day, we look back at how events in 2021 shaped the privacy world, and we look ahead to what 2022 may have in store ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4xIST6S8GWKQqBpMnOwosk/330c9edfe3fc2ff60c3b823c0590d852/image1-25.png" />
            
            </figure><p>Happy Data Privacy Day 2022! Of course, every day is privacy day at Cloudflare, but today gives us a great excuse to talk about one of our favorite topics.</p><p>In honor of Privacy Day, we’re highlighting some key topics in data privacy and data protection that helped shape the landscape in 2021, as well as the issues we’ll be thinking about in 2022. The first category that gets our attention is the intersection of <a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">data security</a> and data privacy. At Cloudflare, we’ve invested in privacy-focused technologies and security measures that enhance data privacy to help build the third phase of the Internet, <a href="/internet-privacy/">the Privacy phase</a>, and we expect to double down on these developments in 2022.</p><p>The second category is data localization. While we don’t think you need localization to achieve privacy, the two are inextricably linked in the EU regulatory landscape and elsewhere.</p><p>Third, recent regulatory enforcement actions in the EU against websites’ use of cookies have us thinking about how we can help websites run third-party tools, such as analytics, in a faster, more secure, and more privacy-protective way.</p><p>Lastly, we’ll continue to focus on the introduction of new or updated data protection regulations around the world, as well as regulation governing digital services, which will inevitably have implications for how personal and non-personal data is used and transferred globally.</p>
    <div>
      <h3>Security to ensure Privacy</h3>
      <a href="#security-to-ensure-privacy">
        
      </a>
    </div>
    <p>Cloudflare’s founding mission to help build a better Internet has always included focusing on privacy-first products and services. We’ve <a href="/data-privacy-day-2021-looking-ahead-at-the-always-on-always-secure-always-private-internet/">written before</a> about how we think a key way to improve privacy is to reduce the amount of personal data flowing across the Internet. This has led to the development and deployment of technologies to help personal data stay private and keep data secure from would-be attackers. Examples of prominent technologies include Cloudflare’s 1.1.1.1 public DNS resolver — the <a href="/announcing-1111/">Internet's fastest, privacy-first public DNS resolver</a> that does not retain any personal data about requests made — and <a href="/oblivious-dns/">Oblivious DNS over HTTPs (ODoH)</a> — a proposed DNS standard co-authored by engineers from Cloudflare, Apple, and Fastly that separates IP addresses from queries, so that no single entity can see both at the same time.</p><p>We’re looking forward to continued work on privacy enhancing technologies in 2022, including efforts to generalize ODoH technology to any application HTTP traffic through Oblivious HTTP (OHTTP). Cloudflare is proud to be an active contributor to the Internet Engineering Task Force’s <a href="https://datatracker.ietf.org/doc/charter-ietf-ohai/">OHAI</a> (Oblivious HTTP Application Intermediation) working group where Oblivious HTTP will be developed. Similar to ODoH, OHTTP allows a client to make multiple requests of a server without the server being able to link those requests to the client or to identify the requests as having come from the same client.</p><p>But there are times when retaining identity is important, such as when you are trying to access your employer’s network while working from home — something many of us have become all too familiar with over the past two years. However, organizations shouldn’t have to choose between protecting privacy and implementing <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> solutions to guard their networks from common remote work pitfalls: employees working from home who fail to access their work networks through secure methods or fall victim to phishing and malware attacks.</p><p>So not only have we developed Cloudflare’s Zero Trust Services to help organizations secure their networks, we also went beyond mere security to create privacy-enhancing Zero Trust products. In 2021, the Cloudflare Zero Trust team took a big privacy step forward by building and launching <a href="/pii-and-selective-logging-controls-for-cloudflares-zero-trust-platform/">Selective Logging</a> into Cloudflare Gateway. Cloudflare Gateway is one component of our suite of services that helps enterprises secure their networks. Other components include <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">Zero Trust access</a> for an enterprise’s applications that allows for the authentication of users on our global network and a fast and reliable solution for remote browsing that allows enterprises to execute all browser code in the cloud.</p><p>With Selective Logging, Gateway Admins can now tailor their logs or disable all Gateway logging to fit an enterprise’s privacy posture. Admins can “Enable Logging of only Block Actions,” “Disable Gateway Logging for Personal Information,” or simply “Disable All Gateway Logging.” This allows an enterprise to decide not to collect any personal data for users who are accessing their internal organizational networks. The less personal data collected, the less chance any personal data can be stolen, leaked, or misused. Meanwhile, Gateway still protects enterprises by blocking malware or command &amp; control sites, phishing sites, and other URLs that are disallowed by their enterprise’s security policy.</p><p>As many employers have moved to permanent remote work, at least part-time, Zero Trust solutions will continue to be important in 2022. We are excited to give those employers tools that help them <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">secure their networks</a> in ways that allow them to simultaneously protect employee privacy.</p><p>Of course, we can’t talk about pro-privacy security issues without mentioning the Log4j vulnerability exposed last month. That vulnerability highlighted just how critically important security is to protecting the privacy of personal data. We <a href="/inside-the-log4j2-vulnerability-cve-2021-44228/">explained in depth</a> how this vulnerability works, but in summary, the vulnerability allowed an attacker to execute code on a remote server. This can allow for the exploitation of Java-based Internet facing software that uses Log4j, but what makes Log4j even more insidious is that non-Internet facing software can also be exploitable as data gets passed from system to system. For example, a User-Agent string containing the exploit could be passed to a backend system written in Java that does indexing or data science and the exploit could get logged. Even if the Internet-facing software is not written in Java it is possible that strings get passed to other systems that are in Java allowing the exploit to happen.</p><p>This means that unless the vulnerability is remediated, an attacker could execute code that not only exfiltrates data from a web server but also steal personal data from non-Internet facing backend databases, such as billing systems. And because Java and Log4j are so widely used, thousands of servers and systems were impacted, which meant millions of users’ personal data was at risk.</p><p>We’re proud that, within hours of learning of the Log4j vulnerability, we rolled out new WAF rules written to protect all our customers’ sites (and our own) against this vulnerability. In addition, we and our customers were able to use our Zero Trust product, Cloudflare Access, to protect access to internal systems. Once we or a customer enabled Cloudflare Access on the identified attack surface, any exploit attempts to Cloudflare’s systems or the systems of customers would have required the attacker to authenticate. The ability to analyze server, network or traffic data generated by Cloudflare in the course of providing our service to the huge number of Internet applications that use us helped us better protect all of Cloudflare's customers. Not only were we able to update <a href="/cve-2021-44228-log4j-rce-0-day-mitigation/">WAF rules</a> to mitigate the vulnerability, Cloudflare could use data to identify WAF <a href="/exploitation-of-cve-2021-44228-before-public-disclosure-and-evolution-of-waf-evasion-patterns/">evasion patterns and exfiltration attempts</a>. This information enabled our customers to rapidly identify attack vectors on their own networks and mitigate the risk of harm.</p><p>As we discuss more below, we expect data localization debates to continue in 2022. At the same time, it’s important to realize that, if companies are forced to segment data by jurisdiction or to prevent access to data across jurisdictional borders, it would have been harder to mount the kind of response we were able to quickly provide to help our customers protect their own sites and networks against Log4j. We believe in ensuring both the privacy and security of data no matter what jurisdiction that data is stored in or flows through. And we believe those who would insist on data localization as a proxy for data protection above all else do a disservice to the security measures that are as important as regulations, if not more so, to protecting the privacy of personal data.</p>
    <div>
      <h3>Data Localization</h3>
      <a href="#data-localization">
        
      </a>
    </div>
    <p>Data localization was a major focus in 2021 and that shows no sign of slowing in 2022. In fact, in the EU, the Austrian data protection authority (<a href="https://www.dsb.gv.at/">the Datenschutzbehörde</a>) set quite the tone for this year. It published a decision January 13 stating that a European company could not use Google Analytics because it meant EU personal data was being transferred to the United States in what the regulator viewed as a violation of the EU General Data Protection Regulation (GDPR) as interpreted by the Court of Justice of the European Union’s 2020 decision in the “Schrems II” case.</p><p>We continue to disagree with the premise that the Schrems II decision means that EU personal data must not be transferred to the United States. Instead, we believe that there are safeguards that can be put in place to allow for such transfers pursuant to the EU <a href="https://www.cloudflare.com/cloudflare-customer-scc/">Standard Contractual Clauses</a> (SCCs) (contractual clauses approved by the EU Commission to enable EU personal data to be transferred outside the EU) in a manner consistent with the Schrems II decision. Cloudflare has had <a href="https://www.cloudflare.com/gdpr/introduction/">data protection safeguards</a> in place since well before the Schrems II case, in fact, such as our <a href="https://assets.ctfassets.net/slt3lc6tev37/2RM2ZAb5XJiudjz4QHvth4/b3df347d8a7a629ccd5cadd4f7cfd2f3/BDES-1406_Privacy_Day_Whitepaper_2021.pdf">industry-leading commitments</a> on government data requests. We have updated our <a href="https://www.cloudflare.com/cloudflare-customer-dpa/">Data Processing Addendum</a> (DPA) to incorporate the SCCs that the EU Commission approved in 2021. We also added additional safeguards as outlined in the <a href="https://edpb.europa.eu/news/news/2021/edpb-adopts-final-version-recommendations-supplementary-measures-letter-eu_en">EDPB’s June 2021 Recommendations on Supplementary Measures</a>. Finally, Cloudflare’s services are <a href="/iso-27701-privacy-certification/">certified under the ISO 27701 standard</a>, which maps to the GDPR’s requirements.</p><p>In light of these measures, our EU customers can use Cloudflare’s services in a manner consistent with GDPR and the Schrems II decision. Still, we recognize that many of our customers want their EU personal data to stay in the EU. For example, some of our customers in industries like healthcare, law, and finance may have additional requirements. For these reasons, we developed our Data Localization Suite, which gives customers control over where their data is inspected and stored.</p><p>Cloudflare’s <a href="https://www.cloudflare.com/data-localization/">Data Localization Suite</a> provides a viable solution for our customers who want to avoid transferring EU personal data outside the EU at a time when European regulators are growing increasingly critical of data transfers to the United States. We are particularly excited about the <a href="/introducing-the-customer-metadata-boundary/">Customer Metadata Boundary</a> component of the Data Localization Suite, because we have found a way to keep customer-identifiable end user log data in the EU for those EU customers who want that option, without sacrificing our ability to provide the security services our customers rely on us to provide.</p><p>In 2022, we will continue to fine tune our data localization offerings and expand to serve other regions where customers are finding a need to localize their data. 2021 saw China’s Personal Information Protection Law come into force with its data localization and cross-border data transfer requirements, and we are likely to see other jurisdictions, or perhaps specific industry guidelines, follow suit in 2022 in some form.</p>
    <div>
      <h3>Pro-Privacy Analytics</h3>
      <a href="#pro-privacy-analytics">
        
      </a>
    </div>
    <p>We expect trackers (cookies, web beacons, etc.) to continue to be an area of focus in 2022 as well, and we are excited to play a role in ushering in a new era to help websites run third-party tools, such as analytics, in a faster, more secure, and more privacy-protective way. We were already thinking about privacy-first analytics in 2020 when we launched <a href="/free-privacy-first-analytics-for-a-better-web/">Web Analytics</a> — a product that allowed websites to gather analytics information about their site users without using any client-side code.</p><p>Nevertheless, cookies, web beacons, and similar client-side trackers remain ubiquitous across the web. Each time a website operator uses these trackers, they open their site to potential security vulnerabilities, and they risk eroding the trust of their users who have grown weary of “cookie consent” banners and worry their personal data is being collected and tracked across the Internet. There has to be a better way, right? Turns out, there is.</p><p>As explained in greater detail in <a href="/zaraz-use-workers-to-make-third-party-tools-secure-and-fast/">this blog post</a>, Cloudflare’s Zaraz product not only allows a website to load faster and be more interactive, but it also reduces the amount of third-party code needed to run on a website, which makes it more secure. And this solution is also pro-privacy: it allows the website operator to have control over the data sent to third parties. Moving the execution of the third-party tools our network means website operators will be able to identify if tools are trying to collect personal data, and, if so, they can modify the data before it goes to the analytics providers (for example, strip URL queries, remove IP addresses of end users). As we’ve said so often, if we can reduce the amount of personal data that is sent across the Internet, that’s a win for privacy.</p>
    <div>
      <h3>Changing Privacy Landscape</h3>
      <a href="#changing-privacy-landscape">
        
      </a>
    </div>
    <p>As the old saying goes, the only constant is change. And as in 2021, 2022 will undoubtedly be a year of continued regulatory changes as we see new laws enacted, amended, or coming into effect that directly or indirectly regulate the collection, use, and transborder flow of personal data.</p><p>In the United States for example, 2022 will require companies to prepare for the California Privacy Rights Act (CPRA), which goes into effect January 1, 2023. Importantly, CPRA will have “retrospective requirements”, meaning companies will need to look back and apply rules to personal data collected as of January 1, 2022. Likewise, Virginia’s and Colorado’s privacy laws are coming into force in 2023. And a number of other States, including but not limited to Florida, Washington, Indiana, and the District of Columbia, have proposed their own privacy laws. For the most part, these bills are aimed at giving consumers greater control over their personal data — such as establishing consumers’ rights to access and delete their data — and placing obligations on companies to ensure those rights are protected and respected.</p><p>Meanwhile, elsewhere in the world, we are seeing a shift in data privacy legislation. No longer are data protection laws focusing only on personal data; they are expanding to regulate the flow of all types of data. The clearest example of this is in India, where a parliamentary committee in December 2021 included recommendations that the “Personal Data Protection Bill'' be renamed the “Data Protection Bill'' and that its scope be expanded to include non-personal data. The bill would place obligations on organizations to extend to non-personal data the same protections that existing data protection laws extend to personal data. The implications of the proposed updates to India’s Data Protection Bill are significant. They could dramatically impact the way in which organizations use non-personal data for analytics and operational improvements.</p><p>India is not the only country to propose expanding the scope of data regulation to include non-personal data. The <a href="https://digital-strategy.ec.europa.eu/en/policies/strategy-data">European Union’s Data Strategy</a> aims to provide a secure framework enhancing data sharing with the stated goal that such sharing will drive innovation and expedite the digitalization of the European economy.</p><p>Other data privacy legislation to keep an eye on in 2022 will be Japan’s amendment to its Act on Protection of Personal Information (APPI) and Thailand’s Personal Data Protection Act (PDPA), which will come into force in 2022. Proposed amendments to Japan’s APPI include requirements to be met in order to transfer Japanese personal data outside of Japan and the introduction of data breach notification requirements. Meanwhile, like the GDPR, Thailand’s PDPA aims to protect individuals’ personal data by imposing obligations on organizations that collect, process, and transfer such personal data.</p><p>With all these privacy enhancing technologies and regulatory changes on the horizon, we expect 2022 to be another exciting year in the world of data protection and data privacy. Happy Data Privacy Day!</p> ]]></content:encoded>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Data Privacy Day]]></category>
            <guid isPermaLink="false">h5tp9N7ZRO7K9sVDuLD5a</guid>
            <dc:creator>Emily Hancock</dc:creator>
            <dc:creator>Tilly Lang</dc:creator>
        </item>
    </channel>
</rss>