Cloud computing – it’s all the rage! Seems like almost everyone is using it. This and digital data storage on remote servers are services that are being promoted as ways to reduce costs as well as to leverage computational capabilities and to facilitate digital data sharing. Generally speaking, cloud computing refers to the use and access of multiple server-based computational resources via a digital network such as the internet. Remote storage refers to services limited to storage and backup of digital data on a third-party server. A third-party server is something that is owned and maintained by someone other than the University. Traditionally, Department of Commerce’s Bureau of Industry and Security (BIS) had advised the transmission and storage (outside of the U.S.) of technology or software controlled under the Export Administration Regulations (EAR) constitutes an export or re-export. Therefore, such transmission or storage could potentially trigger a licensing requirement. Due to the Export Control Reform initiatives and the ever-changing industry of cloud computing and security, the United States government instituted changes for transmission of controlled data for institutions, private and government sectors.
New rules updated treatment of electronically transmitted and stored technology and software. The most significant change under the new rules is the decontrol of sending, taking, and storing of certain encrypted technology or software. Under the new rule, sending, taking, or storing this type of technology or software will not constitute an export if the technology or software is:
Furthermore, the final rule of 2016, includes language which states that “access information,” such as decryption keys, passwords, or other information that allows access to encrypted data sent, taken, or stored under this provision, is subject to the same export control requirements that apply if the data were not encrypted. The EAR also contain an important limitation that releasing decryption keys or other access information that will permit a foreign person access to technology or technical data will constitute an export and be subject to the export control restrictions applicable to the foreign country in question. In addition to maintaining the requisite level of encryption, the university will need to establish ongoing data security practices to take advantage of this provision. Such revisions make feasible a wider variety of cloud computing and cloud storage solutions, and significantly simplify associated compliance with export controls, relative to EAR controlled technology and software. However, the EAR also contain an important limitation that releasing decryption keys or other access information that will permit a foreign person access to technology or technical data will constitute an export and be subject to the export control restrictions applicable to the foreign country in question. In addition to maintaining the requisite level of encryption, institutions will need to establish ongoing data security practices to take advantage of this provision. It is important to keep in mind that these changes do not apply to ITAR controlled technical data, with respect to which restrictions on the use of the cloud have not changed. ITAR data may not be placed on shared infrastructure managed by non-US-Persons or alongside other organizations who do not have a license to export as defined in 22 CFR 120.17 and 22 CRF 120.13. Don’t forget contractual obligations. In addition to the requirement to comply with U.S. export regulations, externally funded research and sponsored projects may contain contractual restrictions on the release of information that could include prohibition on the use of cloud computing services or third-party digital data storage. Failure to comply with contractual restrictions could result in a breach of contract and if the contract is federally funded, possible civil or criminal and penalties may be applied.
If the information is not public knowledge then you should not be using these services at all for your project. Before sharing the information or technology, make sure there are no export restrictions tied to it. Review the terms of the contract / award / grant and then contact the University’s Director, Export Control Compliance for assistance.
As stated earlier, if it is not public knowledge do not use servers that are not owned and maintained by the University. You must read the terms of the agreement carefully. What the provider has probably stated in the agreement is they have a process in place should the system be compromised. Yet, their marketing scheme states that your files will be protected. What you agree to and what they advertise are two different things. No system is 100% secure – even Fort Knox has had a breach in security. This is why it is being stressed that nothing other than what is already considered public knowledge be stored or shared by these online services.
Many shared drives have a large amount of old files on them that are no longer needed. However, some of these files may also need to be retained for record-keeping purposes. Transfer these files onto a department external drive that is kept secure in your department’s repository. Making this a part of your department’s annual process will ensure that unused files are not taking up storage space that is needed for current activities. In most cases, this resolves the shared drive space issue. Otherwise, the head of your department needs to pursue this issue with the administrators who have the authority to make the changes in order to meet your departmental needs.