
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Tue, 07 Apr 2026 23:06:20 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Cloudflare meets new Global Cross-Border Privacy (CBPR) standards]]></title>
            <link>https://blog.cloudflare.com/cloudflare-cbpr-a-global-privacy-first/</link>
            <pubDate>Tue, 28 Jan 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is the first organization globally to announce having been successfully audited against the ‘Global Cross-Border Privacy Rules’ system and ‘Global Privacy Recognition for Processors’. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare proudly leads the way with our approach to <a href="https://www.cloudflare.com/learning/privacy/what-is-data-privacy/">data privacy</a> and the protection of <a href="https://www.cloudflare.com/learning/privacy/what-is-personal-information/">personal information</a>, and we’ve been an ardent supporter of the need for the free flow of data across jurisdictional borders. So today, on Data Privacy Day (also known internationally as Data Protection Day), we’re happy to announce that we’re adding our fourth and fifth privacy validations, and this time, they are global firsts! Cloudflare is the first organisation to announce that we have been successfully audited against the brand new <a href="https://www.globalcbpr.org/privacy-certifications/"><u>Global Cross-Border Privacy Rules (Global CBPRs) for data controllers and the Global Privacy Recognition for Processors (Global PRP)</u></a>. These validations demonstrate our support and adherence to global standards that provide for privacy-respecting data flows across jurisdictions. Organizations that have been successfully audited will be formally certified when the certifications officially launch, which we expect to happen later in 2025. </p><p>Our participation in the Global CBPRs and Global PRP joins our roster of privacy validations: we were one of the first cybersecurity organizations to certify to the international privacy standard <a href="https://blog.cloudflare.com/iso-27701-privacy-certification/"><u>ISO 27701:2019</u></a> when it was published, and in 2022 we also certified to the cloud privacy certification, <a href="https://www.cloudflare.com/trust-hub/compliance-resources/iso-certifications/"><u>ISO 27018:2019</u></a>. In 2023, we added our third privacy validation, undergoing a review by an independent monitoring body in the European Union (EU) and declared to be adherent to the first official GDPR code of conduct — <i>the </i><a href="https://blog.cloudflare.com/cloudflare-official-gdpr-code-of-conduct/"><i><u>EU Cloud Code of Conduct</u></i></a>.</p>
    <div>
      <h3>Why this matters to Cloudflare customers</h3>
      <a href="#why-this-matters-to-cloudflare-customers">
        
      </a>
    </div>
    <p>Taking these privacy certifications together, Cloudflare demonstrates that we are meeting key official privacy validations in 39 jurisdictions around the world, from Australia and Austria to Sweden and the United States. An additional four jurisdictions (United Kingdom, Bermuda, Mauritius, and the Dubai International Finance Centre) are also in the process of joining and recognising the Global CBPR certifications. That's important for Cloudflare customers as it provides reassurance that the privacy practices we have built are recognised by governments around the world.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2RFlkr3Wht9Gu34lv2xxN9/8f3c8e5dc23963614d275dab085cd8ce/unnamed.png" />
          </figure>
    <div>
      <h3>What is the Global CBPR System?</h3>
      <a href="#what-is-the-global-cbpr-system">
        
      </a>
    </div>
    <p>In the last three years, governments across the world have been busy preparing two brand-new international privacy standards. A major milestone was achieved on April 30, 2024 when <a href="https://www.globalcbpr.org/global-cbpr-forum-announces-the-establishment-of-the-global-cbpr-and-global-prp-systems-and-welcomes-new-global-cape-participants/"><u>the Global CBPR System was established</u></a>. The CBPRs are a voluntary, enforceable, international, accountability-based system that facilitates privacy-respecting data flows among members’ economies. They provide a baseline level of privacy protection for consumers through a set of rules on how to handle people’s personal information. This facilitates the free flow of data by upholding consumer privacy across participating members, despite each jurisdiction having their own individual data protection laws.</p><p>The CBPR System was developed by the <a href="https://www.globalcbpr.org/about/membership/"><u>Global CBPR Forum</u></a>, an intergovernmental forum between the governments of Australia, Canada, Japan, Republic of Korea, Mexico, Philippines, Singapore, Chinese Taipei, and the United States. The United Kingdom is also an associate member of the CBPR Forum, as are Bermuda, Mauritius, and the Dubai IFC, signifying their intent to join as full members in the future.</p><p>Over the last year, we have been busy preparing for the launch of the Global CBPR System. On May 1, 2024 — the very first day after the establishment of the system — Cloudflare applied to join. And we have now achieved the major milestone of successfully completing audits against the requirements, meaning we expect to be the first organization in the world to be newly certified to the Global CBPR system, as well as the related Global Privacy Recognition for Processors, when companies can officially be certified, which is expected later in 2025.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5F7HXXU071UJtx68KHGn41/0228087d6420c26802d77c13fafe935c/image1.png" />
          </figure>
    <div>
      <h3>What the Global CBPR System covers</h3>
      <a href="#what-the-global-cbpr-system-covers">
        
      </a>
    </div>
    <p>The Global CBPR System contains a detailed list of fifty requirements that organizations must meet in order to be certified under the scheme. The requirements derive from the nine <b>Global CBPR Privacy Principles</b>, which are consistent with the core principles of the <a href="https://www.oecd.org/"><u>Organisation for Economic Co-operation and Development (OECD)</u></a> <a href="https://www.oecd.org/en/publications/2002/02/oecd-guidelines-on-the-protection-of-privacy-and-transborder-flows-of-personal-data_g1gh255f.html"><u>Guidelines on the Protection of Privacy and Trans-Border Flows of Personal Data</u></a>. The fifty requirements cover how organizations should collect, manage, and safeguard personal information in their custody. Organizations must meet every one of the fifty requirements in order to be Global CBPR certified. The nine principles underlying the requirements are:</p><table><tr><td><p>Preventing Harm</p></td><td><p>Notice</p></td><td><p>Collection Limitation</p></td></tr><tr><td><p>Uses of Personal Information</p></td><td><p>Choice</p></td><td><p>Integrity of Personal Information</p></td></tr><tr><td><p>Security Safeguards</p></td><td><p>Access and Correction</p></td><td><p>Accountability</p></td></tr></table><p><sup><i>The nine Global CBPR Privacy Principles</i></sup></p><p>The Global CBPR certification covers the handling of personal information controlled by the organization, such as the personal details of customers, employees, and job applicants. For Cloudflare, this also includes network information — our observations about how our global cloud platform handles server, network, or traffic data generated by Cloudflare in the course of providing our services.</p><p>The related Global Privacy Recognition for Processors (PRP) certification covers the handling of personal information processed by the organization on behalf of a different organization, usually their customer. The eighteen requirements of the PRP relate to the two privacy principles most relevant when processing this information on behalf of another organization: <i>Security Safeguards and Accountability</i>. For Cloudflare, this covers the processing of data pursuant to the <a href="https://www.cloudflare.com/cloudflare-customer-dpa/"><u>Data Processing Addendum</u></a> we sign with all of our customers, chiefly, the Customer Content flowing across our network and the Customer Logs generated by those data flows. Organizations must meet every one of the eighteen requirements in order to be Global PRP certified.</p>
    <div>
      <h3>A deeper dive into some of the requirements of the Global CBPRs</h3>
      <a href="#a-deeper-dive-into-some-of-the-requirements-of-the-global-cbprs">
        
      </a>
    </div>
    <p>As noted, the key requirements of the Global CBPRs and the Global PRP cover the well-known data protection principles of notice, choice, collection limitation (data minimization), the right of data subject access and correction, providing adequate security, preventing harm, integrity of personal information, accountability, and uses of personal information. There are dozens of requirements that cover these principles, so we’ll just touch on a few of them here.</p><p>Let’s first look at the principle of notice. One of the more obvious requirements from the CBPRs is question 1:</p><p><i>Do you provide clear and easily accessible statements about your practices and policies that govern the personal information described above (a privacy statement)?</i></p><p>Being transparent about the collection and use of personal information is a key principle of privacy and data protection, and transparency is one of Cloudflare’s core commitments. Documenting our practices and policies in regard to how we use personal information allows individuals to decide if they want to provide their information, and that’s why it’s best practice for the privacy notice to be available and visible at the time the information is being collected. Indeed, this concept of providing notice is clear from <a href="https://eur-lex.europa.eu/eli/reg/2016/679/oj/eng#art_13"><u>Article 13 of the EU’s GDPR</u></a>. Cloudflare meets this CBPR requirement by providing a clear and accessible privacy notice visible from the footer of each page on our website. We also provide a link to the notice when we collect personal data such as through a form on a webpage.</p><p>In terms of how we use personal information, question 8 asks:</p><p><i>Do you limit the use of the personal information you collect (whether directly or through the use of third parties acting on your behalf) as identified in your privacy statement?</i></p><p>It has long been a commitment of Cloudflare’s that we only use the personal information we collect for the purposes of providing the services we offer. Our business is built on providing customers with the tools to protect their network applications and to make them faster, more secure, more reliable, and more private. In our <a href="https://www.cloudflare.com/privacypolicy/"><u>Privacy Policy</u></a>, we commit that we will “only share or otherwise disclose your personal information as necessary to provide our Services or as otherwise described in this Policy, except in cases where we first provide you with notice and the opportunity to consent.” And we maintain internal documentation (in keeping with the CBPR’s accountability principle) to document the data we are processing and the purposes for which we process it.</p><p>Another key set of requirements in both the Global CBPRs and the Global PRP have to do with security safeguards. CBPR requirement question 27 asks:</p><p><i>Describe the physical, technical and administrative safeguards you have implemented to protect personal information against risks such as loss or unauthorized access, destruction, use, modification or disclosure of information or other misuses?</i></p><p>The similar requirement in the Global PRP is question 2: </p><p><i>Describe the physical, technical and administrative safeguards that implement your organization’s information security policy.</i></p><p>Cloudflare has implemented an information security program in accordance with the ISO/IEC 27000 family of standards. Details of Cloudflare’s security program are documented in Annex 2 (“Technical and Organizational Security Measures”) of Cloudflare's <a href="https://www.cloudflare.com/cloudflare-customer-dpa/"><u>Customer Data Processing Addendum</u></a>, including the physical, technical and administrative safeguards implemented to protect personal information.</p><p>Related to the Accountability principle, question 46 asks:</p><p><i>Do you have mechanisms in place with personal information processors, agents, contractors, or other service providers pertaining to personal information they process on your behalf, to ensure that your obligations to the individual will be met? </i></p><p>When we have vendors who handle any of our, or our customers’, personal information, we require them to sign a Data Processing Addendum with us. This ensures the commitments we make to our customers in our customer agreements in turn flow through to our vendors, including the security requirements — holding them, and us, accountable.</p>
    <div>
      <h3>More information</h3>
      <a href="#more-information">
        
      </a>
    </div>
    <p>We are excited about the launch of the Global CBPR certifications, expected later in 2025, and we are proud that on this Data Privacy Day, we can yet again demonstrate our commitment to universally held principles for protecting the privacy of personal data.</p><p>You can find more about the Global CBPR System, the Global PRP, download a full copy of the requirements, and keep up to date with related news at <a href="https://www.globalcbpr.org/"><u>globalcbpr.org</u></a>.</p><p>For the latest information about our certifications, please visit our <a href="https://www.cloudflare.com/trust-hub/compliance-resources/"><u>Trust Hub</u></a>. Customers can also find out how to download a copy of Cloudflare’s certifications and reports from the <a href="https://developers.cloudflare.com/fundamentals/get-started/basic-tasks/access-compliance-docs/"><u>Cloudflare dashboard</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/36LV7CkbF5b5IuXN4ZVXZC/77775c3e2791418d87c36d46e755fbbc/image2.png" />
          </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Certification]]></category>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">63yGQGTniOUOFneFLwTb7a</guid>
            <dc:creator>Rory Malone</dc:creator>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Securing Cloudflare with Cloudflare: a Zero Trust journey]]></title>
            <link>https://blog.cloudflare.com/securing-cloudflare-with-cloudflare-zero-trust/</link>
            <pubDate>Tue, 05 Mar 2024 14:00:51 GMT</pubDate>
            <description><![CDATA[ A deep dive into how we have deployed Zero Trust at Cloudflare while maintaining user privacy ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4r1CIssX038rlnrx4n00m8/5893d5cb949bc417ad6eb899c88ebb75/image1-8.png" />
            
            </figure><p>Cloudflare is committed to providing our customers with industry-leading <a href="https://www.cloudflare.com/network-security/">network security solutions</a>. At the same time, we recognize that establishing robust security measures involves identifying potential threats by using processes that may involve scrutinizing sensitive or personal data, which in turn can pose a risk to privacy. As a result, we work hard to balance privacy and security by building privacy-first security solutions that we offer to our customers and use for our own network.</p><p>In this post, we'll walk through how we deployed Cloudflare products like Access and our Zero Trust Agent in a privacy-focused way for employees who use the Cloudflare network. Even though global legal regimes generally afford employees a lower level of privacy protection on corporate networks, we work hard to make sure our employees understand their privacy choices because Cloudflare has a strong culture and history of respecting and furthering user privacy on the Internet. We’ve found that many of our customers feel similarly about ensuring that they are protecting privacy while also securing their networks.</p><p>So how do we balance our commitment to privacy with ensuring the security of our internal corporate environment using Cloudflare products and services? We start with the basics: We only retain the minimum amount of data needed, we de-identify personal data where we can, we communicate transparently with employees about the security measures we have in place on corporate systems and their privacy choices, and we retain necessary information for the shortest time period needed.</p>
    <div>
      <h2>How we secure Cloudflare using Cloudflare</h2>
      <a href="#how-we-secure-cloudflare-using-cloudflare">
        
      </a>
    </div>
    <p>We take a comprehensive approach to securing our globally distributed hybrid workforce with both organizational controls and technological solutions. Our organizational approach includes a number of measures, such as a company-wide Acceptable Use Policy, employee privacy notices tailored by jurisdiction, required annual and new-hire privacy and security trainings, role-based access controls (<a href="https://www.cloudflare.com/learning/access-management/role-based-access-control-rbac/">RBAC</a>), and least privilege principles. These organizational controls allow us to communicate expectations for both the company and the employees that we can implement with technological controls and that we enforce through logging and other mechanisms.</p><p>Our technological controls are rooted in <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust best practices</a> and start with a focus on our Cloudflare One services to secure our workforce as described below.</p>
    <div>
      <h3>Securing access to applications</h3>
      <a href="#securing-access-to-applications">
        
      </a>
    </div>
    <p>Cloudflare <a href="https://www.cloudflare.com/application-services/solutions/">secures access to self-hosted and SaaS applications</a> for our workforce, whether remote or in-office, using our own <a href="https://www.cloudflare.com/learning/access-management/what-is-ztna/">Zero Trust Network Access</a> (ZTNA) service, Cloudflare Access, to verify identity, <a href="/how-cloudflare-implemented-fido2-and-zero-trust/">enforce multi-factor authentication with security keys</a>, and evaluate device posture using the Zero Trust client for every request. This approach evolved over several years and has enabled Cloudflare to more effectively protect our growing workforce.</p>
    <div>
      <h3>Defending against cyber threats</h3>
      <a href="#defending-against-cyber-threats">
        
      </a>
    </div>
    <p>Cloudflare leverages <a href="https://www.cloudflare.com/network-services/products/magic-wan/">Cloudflare Magic WAN</a> to secure our office networks and <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-devices/warp/">the Cloudflare Zero Trust agent</a> to secure our workforce. We use both of these technologies as an onramp to our own <a href="https://www.cloudflare.com/zero-trust/products/gateway/">Secure Web Gateway (also known as Gateway)</a> to secure our workforce from a rise in online threats.</p><p>As we have evolved our hybrid work and office configurations, our security teams have benefited from additional controls and visibility for forward-proxied Internet traffic, including:</p><ul><li><p><b>Granular HTTP controls</b>: Our security teams <a href="https://www.cloudflare.com/learning/security/what-is-https-inspection/">inspect HTTPS traffic</a> to block access to specific websites identified as malicious by our security team, conduct <a href="https://developers.cloudflare.com/cloudflare-one/policies/gateway/http-policies/antivirus-scanning/">antivirus scanning</a>, and apply identity-aware browsing policies.</p></li><li><p><b>Selectively isolating Internet browsing</b>: With <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">remote browser isolated (RBI)</a> sessions, all web code is run on Cloudflare’s network far from local devices, insulating users from any untrusted and malicious content. Today, Cloudflare isolates social media, news outlets, personal email, and other potentially risky Internet categories, and we have set up feedback loops for our employees to help us fine-tune these categories.</p></li><li><p><b>Geography-based logging</b>: Seeing where outbound requests originate helps our security teams understand the geographic distribution of our workforce, including our presence in high-risk areas.</p></li><li><p><b>Data Loss Prevention:</b> To keep sensitive data inside our corporate network, this tool allows us to identify data we’ve flagged as sensitive in outbound HTTP/S traffic and prevent it from leaving the network.</p></li><li><p><b>Cloud Access Security Broker:</b> This tool allows us to monitor our SaaS apps for misconfigurations and sensitive data that is potentially exposed or shared too broadly.</p></li></ul>
    <div>
      <h3>Protecting inboxes with cloud email security</h3>
      <a href="#protecting-inboxes-with-cloud-email-security">
        
      </a>
    </div>
    <p>Additionally, we have deployed our <a href="https://www.cloudflare.com/zero-trust/products/email-security/">Cloud Email Security</a> solution to protect our workforce from increased phishing and <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">business email compromise</a> attacks that we have not only seen directed against our employees, but that are <a href="/2023-phishing-report">plaguing organizations globally</a>. One key feature we use is <a href="/safe-email-links/">email link isolation</a>, which uses RBI and email security functionality to open potentially suspicious links in an isolated browser. This allows us to be slightly more relaxed with blocking suspicious links without compromising security. This is a big win for productivity for our employees and the security team, as both sets of employees aren’t having to deal with large volumes of false positives.</p><p>More details on our implementation can be found in our <a href="https://www.cloudflare.com/case-studies/cloudflare-one/">Securing Cloudflare with Cloudflare One</a> case study.</p>
    <div>
      <h2>How we respect privacy</h2>
      <a href="#how-we-respect-privacy">
        
      </a>
    </div>
    <p>The very nature of these powerful security technologies Cloudflare has created and deployed underscores the responsibility we have to use privacy-first principles in handling this data, and to recognize that the data should be respected and protected at all times.</p><p>The journey to respecting privacy starts with the products themselves. We develop products that have privacy controls built in at their foundation. To achieve this, our product teams work closely with Cloudflare’s product and privacy counsels to practice privacy by design. A great example of this collaboration is the ability to manage personally identifiable information (PII) in the Secure Web Gateway logs. You can choose to <a href="https://developers.cloudflare.com/cloudflare-one/insights/logs/gateway-logs/manage-pii/#exclude-pii">exclude PII from Gateway logs</a> entirely or <a href="https://developers.cloudflare.com/cloudflare-one/insights/logs/gateway-logs/manage-pii/#redact-pii">redact PII from the logs</a> and gain granular control over access to PII with the <a href="https://developers.cloudflare.com/cloudflare-one/roles-permissions/#cloudflare-zero-trust-pii">Zero Trust PII Role</a>.</p><p>In addition to building privacy-first security products, we are also committed to communicating transparently with Cloudflare employees about how these security products work and what they can – and can’t – see about traffic on our internal systems. This empowers employees to see themselves as part of the security solution, rather than set up an “us vs. them” mentality around employee use of company systems.</p><p>For example, while our employee privacy policies and our Acceptable Use Policy provide broad notice to our employees about what happens to data when they use the company’s systems, we thought it was important to provide even more detail. As a result, our security team collaborated with our privacy team to create an internal wiki page that plainly explains the data our security tools collect and why. We also describe the privacy choices available to our employees. This is particularly important for the “bring your own device” (BYOD) employees who have opted for the convenience of using their personal mobile device for work. BYOD employees must install endpoint management (provided by a third party) and Cloudflare’s Zero trust client on their devices if they want to access Cloudflare systems. We described clearly to our employees what this means about what traffic on their devices can be seen by Cloudflare teams, and we explained how they can take steps to protect their privacy when they are using their devices for purely personal purposes.</p><p>For the teams that develop for and support our <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust services</a>, we ensure that data is available only on a strict, need-to-know basis and is restricted to Cloudflare team members that require access as an essential part of their job. The set of people with access are required to take training that reminds them of their responsibility to respect this data and provides them with best practices for handling sensitive data. Additionally, to ensure we have full auditability, we log all the queries run against this database and by whom they are run.</p><p>Cloudflare has also made it easy for our employees to express any concerns they may have about how their data is handled or what it is used for. We have mechanisms in place that allow employees to ask questions or express concerns about the use of Zero Trust Security on Cloudflare’s network.</p><p>In addition, we make it easy for employees to reach out directly to the leaders responsible for these tools. All of these efforts have helped our employees better understand what information we collect and why. This has helped to expand our strong foundation for security and privacy at Cloudflare.</p>
    <div>
      <h2>Encouraging privacy-first security for all</h2>
      <a href="#encouraging-privacy-first-security-for-all">
        
      </a>
    </div>
    <p>We believe firmly that great security is critical for ensuring data privacy, and that privacy and security can co-exist harmoniously. We also know that it is possible to secure a corporate network in a way that respects the employees using those systems.</p><p>For anyone looking to secure a corporate network, we encourage focusing on network security products and solutions that build in personal data protections, like our Zero Trust suite of products. If you are curious to explore <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">how to implement</a> these Cloudflare services in your own organizations, <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/">request a consultation on Zero Trust here</a>.</p><p>We also urge organizations to make sure they communicate clearly with their users. In addition to making sure company policies are transparent and accessible, it is important to help employees understand their privacy choices. Under the laws of almost every jurisdiction globally, individuals have a lower level of privacy on a company device or a company’s systems than they do on their own personal accounts or devices, so it’s important to communicate clearly to help employees understand the difference. If an organization has privacy champions, works councils, or other employee representation groups, it is critical to communicate early and often with these groups to help employees understand what controls they can exercise over their data.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[API Gateway]]></category>
            <category><![CDATA[Zero Trust]]></category>
            <category><![CDATA[Privacy]]></category>
            <guid isPermaLink="false">6l7ydA66mxLvZMpnAgzEhD</guid>
            <dc:creator>Derek Pitts</dc:creator>
            <dc:creator>Ankur Aggarwal</dc:creator>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Reflecting on the GDPR to celebrate Privacy Day 2024]]></title>
            <link>https://blog.cloudflare.com/reflecting-on-the-gdpr-to-celebrate-privacy-day-2024/</link>
            <pubDate>Fri, 26 Jan 2024 12:22:06 GMT</pubDate>
            <description><![CDATA[ On Privacy Day 2024, we answer the EU Commission’s call for reflection on how the GDPR has been functioning by pointing out two ways in which the GDPR has been applied that actually may harm people’s privacy ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2TlioBYVYw9Vryn7Y7QdSr/d5b39462dbd6b9918fb03342296a68d9/Privacy-Day-2024.png" />
            
            </figure><p>Just in time for Data Privacy Day 2024 on January 28, the EU Commission is <a href="https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/14054-Report-on-the-General-Data-Protection-Regulation_en">calling for evidence</a> to understand how the EU’s General Data Protection Regulation (GDPR) has been functioning now that we’re nearing the 6th anniversary of the regulation coming into force.</p><p>We’re so glad they asked, because we have some thoughts. And what better way to celebrate privacy day than by discussing whether the application of the GDPR has actually done anything to improve people’s privacy?</p><p>The answer is, mostly yes, but in a couple of significant ways – no.</p><p>Overall, the GDPR is rightly seen as the global gold standard for privacy protection. It has served as a model for what data protection practices should look like globally, it enshrines data subject rights that have been copied across jurisdictions, and when it took effect, it created a standard for the kinds of privacy protections people worldwide should be able to expect and demand from the entities that handle their personal data. On balance, the GDPR has definitely moved the needle in the right direction for giving people more control over their personal data and in protecting their privacy.</p><p>In a couple of key areas, however, we believe the way the GDPR has been applied to data flowing across the Internet has done nothing for privacy and in fact may even jeopardize the protection of personal data. The first area where we see this is with respect to cross-border data transfers. Location has become a proxy for privacy in the minds of many EU data protection regulators, and we think that is the wrong result. The second area is an overly broad interpretation of what constitutes “personal data” by some regulators with respect to Internet Protocol or “IP” addresses. We contend that IP addresses should not always count as personal data, especially when the entities handling IP addresses have no ability on their own to tie those IP addresses to individuals. This is important because the ability to implement a number of industry-leading cybersecurity measures relies on the ability to do threat intelligence on Internet traffic metadata, including IP addresses.  </p>
    <div>
      <h3>Location should not be a proxy for privacy</h3>
      <a href="#location-should-not-be-a-proxy-for-privacy">
        
      </a>
    </div>
    <p>Fundamentally, good data security and privacy practices should be able to protect personal data regardless of where that processing or storage occurs. Nevertheless, the GDPR is based on the idea that legal protections should attach to personal data based on the location of the data – where it is generated, processed, or stored. Articles 44 to 49 establish the conditions that must be in place in order for data to be transferred to a jurisdiction outside the EU, with the idea that even if the data is in a different location, the privacy protections established by the GDPR should follow the data. No doubt this approach was influenced by political developments around government surveillance practices, such as the revelations in 2013 of secret documents describing the relationship between the US NSA (and its Five Eyes partners) and large Internet companies, and that intelligence agencies were scooping up data from choke points on the Internet. And once the GDPR took effect, many data regulators in the EU were of the view that as a result of the GDPR’s restrictions on cross-border data transfers, European personal data simply could not be processed in the United States in a way that would be consistent with the GDPR.</p><p>This issue came to a head in July 2020, when the European Court of Justice (CJEU), in its “<i>Schrems II</i>” decision<sup>1</sup>, invalidated the EU-US Privacy Shield adequacy standard and questioned the suitability of the EU standard contractual clauses (a mechanism entities can use to ensure that GDPR protections are applied to EU personal data even if it is processed outside the EU). The ruling in some respects left data protection regulators with little room to maneuver on questions of transatlantic data flows. But while some regulators were able to view the <i>Schrems II</i> ruling in a way that would still allow for EU personal data to be processed in the United States, other data protection regulators saw the decision as an opportunity to double down on their view that EU personal data cannot be processed in the US consistent with the GDPR, therefore promoting the misconception that data localization should be a proxy for data protection.</p><p>In fact, we would argue that the opposite is the case. From our own experience and according to recent research<sup>2</sup>, we know that data localization threatens an organization’s ability to achieve <a href="https://www.cloudflare.com/cybersecurity-risk-management/">integrated management of cybersecurity risk</a> and limits an entity’s ability to employ state-of-the-art cybersecurity measures that rely on cross-border data transfers to make them as effective as possible. For example, Cloudflare’s <a href="/cloudflare-bot-management-machine-learning-and-more/">Bot Management product</a> only increases in accuracy with continued use on the global network: it detects and blocks traffic coming from likely bots before feeding back learnings to the models backing the product. A diversity of signal and scale of data on a global platform is critical to help us continue to evolve our bot detection tools. If the Internet were fragmented – preventing data from one jurisdiction being used in another – more and more signals would be missed. We wouldn’t be able to apply learnings from bot trends in Asia to bot mitigation efforts in Europe, for example. And if the ability to identify bot traffic is hampered, so is the ability to block those harmful bots from services that process personal data.</p><p>The need for industry-leading cybersecurity measures is self-evident, and it is not as if data protection authorities don’t realize this. If you look at any enforcement action brought against an entity that suffered a data breach, you see data protection regulators insisting that the impacted entities implement ever more robust cybersecurity measures in line with the obligation GDPR Article 32 places on data controllers and processors to “develop appropriate technical and organizational measures to ensure a level of security appropriate to the risk”, “taking into account the state of the art”. In addition, data localization undermines information sharing within industry and with government agencies for cybersecurity purposes, which is <a href="https://www.enisa.europa.eu/topics/national-cyber-security-strategies/information-sharing">generally recognized as vital</a> to effective cybersecurity.</p><p>In this way, while the GDPR itself lays out a solid framework for securing personal data to ensure its privacy, the application of the GDPR’s cross-border data transfer provisions has twisted and contorted the purpose of the GDPR. It’s a classic example of not being able to see the forest for the trees. If the GDPR is applied in such a way as to elevate the priority of data localization over the priority of keeping data private and secure, then the protection of ordinary people’s data suffers.</p>
    <div>
      <h3>Applying data transfer rules to IP addresses could lead to balkanization of the Internet</h3>
      <a href="#applying-data-transfer-rules-to-ip-addresses-could-lead-to-balkanization-of-the-internet">
        
      </a>
    </div>
    <p>The other key way in which the application of the GDPR has been detrimental to the actual privacy of personal data is related to the way the term “personal data” has been defined in the Internet context – specifically with respect to Internet Protocol or “IP” addresses. A world where IP addresses are always treated as personal data and therefore subject to the GDPR’s data transfer rules is a world that could come perilously close to requiring a walled-off European Internet. And as noted above, this could have serious consequences for data privacy, not to mention that it likely would cut the EU off from any number of global marketplaces, information exchanges, and social media platforms.</p><p>This is a bit of a complicated argument, so let’s break it down. As most of us know, IP addresses are the addressing system for the Internet. When you send a request to a website, send an email, or communicate online in any way, IP addresses connect your request to the destination you’re trying to access. These IP addresses are the key to making sure Internet traffic gets delivered to where it needs to go. As the Internet is a global network, this means it's entirely possible that Internet traffic – which necessarily contains IP addresses – will cross national borders. Indeed, the destination you are trying to access may well be located in a different jurisdiction altogether. That’s just the way the global Internet works. So far, so good.</p><p>But if IP addresses are considered personal data, then they are subject to data transfer restrictions under the GDPR. And with the way those provisions have been applied in recent years, some data regulators were getting perilously close to saying that IP addresses cannot transit jurisdictional boundaries if it meant the data might go to the US. The EU’s recent approval of the EU-US Data Privacy Framework established adequacy for US entities that certify to the framework, so these cross-border data transfers are not currently an issue. But if the Data Privacy Framework were to be invalidated as the EU-US Privacy Shield was in the <i>Schrems II</i> decision, then we could find ourselves in a place where the GDPR is applied to mean that IP addresses ostensibly linked to EU residents can’t be processed in the US, or potentially not even leave the EU.</p><p>If this were the case, then providers would have to start developing Europe-only networks to ensure IP addresses never cross jurisdictional boundaries. But how would people in the EU and US communicate if EU IP addresses can’t go to the US? Would EU citizens be restricted from accessing content stored in the US? It’s an application of the GDPR that would lead to the absurd result – one surely not intended by its drafters. And yet, in light of the <i>Schrems II</i> case and the way the GDPR has been applied, here we are.</p><p>A possible solution would be to consider that IP addresses are not always “personal data” subject to the GDPR. In 2016 – even before the GDPR took effect – the Court of Justice of the European Union (CJEU) established the view in <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:62014CJ0582&amp;from=en"><i>Breyer v. Bundesrepublik Deutschland</i></a> that even dynamic IP addresses, which change with every new connection to the Internet, constituted personal data if an entity processing the IP address could link the IP addresses to an individual. While the court’s decision did not say that dynamic IP addresses are <i>always</i> personal data under European data protection law, that’s exactly what EU data regulators took from the decision, without considering whether an entity actually has a way to tie the IP address to a real person<sup>3</sup>.</p><p>The question of when an identifier qualifies as “personal data” is again before the CJEU: In April 2023, the lower EU General Court ruled in <i>SRB v EDPS</i><sup><i>4</i></sup> that transmitted data can be considered anonymised and therefore not personal data if the data recipient does not have any additional information reasonably likely to allow it to re-identify the data subjects and has no legal means available to access such information. The appellant – the European Data Protection Supervisor (EDPS) – disagrees. The EDPS, who mainly oversees the privacy compliance of EU institutions and bodies, is appealing the decision and arguing that a unique identifier should qualify as personal data if that identifier could <i>ever</i> be linked to an individual, regardless of whether the entity holding the identifier actually had the means to make such a link.</p><p>If the lower court’s common-sense ruling holds, one could argue that IP addresses are not personal data when those IP addresses are processed by entities like Cloudflare, which have no means of connecting an IP address to an individual. If IP addresses are then not always personal data, then IP addresses will not always be subject to the GDPR’s rules on cross-border data transfers.</p><p>Although it may seem counterintuitive, having a standard whereby an IP address is not necessarily “personal data” would actually be a positive development for privacy. If IP addresses can flow freely across the Internet, then entities in the EU can use non-EU cybersecurity providers to help them secure their personal data. Advanced Machine Learning/predictive AI techniques that look at IP addresses to protect against DDoS attacks, prevent bots, or otherwise guard against personal data breaches will be able to draw on attack patterns and threat intelligence from around the world to the benefit of EU entities and residents. But none of these benefits can be realized in a world where IP addresses are always personal data under the GDPR and where the GDPR’s data transfer rules are interpreted to mean IP addresses linked to EU residents can never flow to the United States.</p>
    <div>
      <h3>Keeping privacy in focus</h3>
      <a href="#keeping-privacy-in-focus">
        
      </a>
    </div>
    <p>On this Data Privacy Day, we urge EU policy makers to look closely at how the GDPR is working in practice, and to take note of the instances where the GDPR is applied in ways that place privacy protections above all other considerations – even appropriate security measures mandated by the GDPR’s Article 32 that take into account the state of the art of technology. When this happens, it can actually be detrimental to privacy. If taken to the extreme, this formulaic approach would not only negatively impact cybersecurity and data protection, but even put into question the functioning of the global Internet infrastructure as a whole, which depends on cross-border data flows. So what can be done to avert this?</p><p>First, we believe EU policymakers could adopt guidelines (if not legal clarification) for regulators that IP addresses should not be considered personal data when they cannot be linked by an entity to a real person. Second, policymakers should clarify that the GDPR’s application should be considered with the cybersecurity benefits of data processing in mind. Building on the GDPR’s existing recital 49, which rightly recognizes cybersecurity as a legitimate interest for processing, personal data that needs to be processed outside the EU for cybersecurity purposes should be exempted from GDPR restrictions to international data transfers. This would avoid some of the worst effects of the mindset that currently views data localization as a proxy for data privacy. Such a shift would be a truly pro-privacy application of the GDPR.</p><p><sup>1 </sup>Case C-311/18, Data Protection Commissioner v Facebook Ireland and Maximillian Schrems.</p><p><sup>2</sup> <a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4466479">Swire, Peter and Kennedy-Mayo, DeBrae and Bagley, Andrew and Modak, Avani and Krasser, Sven and Bausewein, Christoph, Risks to Cybersecurity from Data Localization, Organized by Techniques, Tactics, and Procedures</a> (2023).</p><p><sup>3</sup> Different decisions by the European data protection authorities, namely the Austrian DSB (December 2021), the French CNIL (February 2022) and the Italian Garante (June 2022), while analyzing the use of Google Analytics, have rejected the relative approach used by the Breyer case and considered that an IP address should always be considered as personal data. Only the decision issued by the Spanish AEPD (December 2022) followed the same interpretation of the Breyer case. In addition, see paragraphs 109 and 136 in <a href="https://www.datenschutzkonferenz-online.de/media/oh/20221205_oh_Telemedien_2021_Version_1_1_Vorlage_104_DSK_final.pdf">Guidelines by Supervisory Authorities for Tele-Media Providers</a>, DSK (2021).</p><p><sup>4</sup> <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A62020TJ0557">Single Resolution Board v EDPS, Court of Justice of the European Union</a>, April 2023.</p> ]]></content:encoded>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[GDPR]]></category>
            <category><![CDATA[Data Privacy Day]]></category>
            <category><![CDATA[Europe]]></category>
            <guid isPermaLink="false">5v4YuiCRLtl4Mb7XqKhYgb</guid>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Celebrating Australia’s Privacy Awareness Week 2023]]></title>
            <link>https://blog.cloudflare.com/celebrating-australia-privacy-awareness-week-2023/</link>
            <pubDate>Mon, 01 May 2023 18:48:41 GMT</pubDate>
            <description><![CDATA[ Cloudflare proudly sponsored Australian Privacy Awareness Week 2023, championing privacy and security technologies to help customers protect sensitive data, forming the "new privacy basics." ]]></description>
            <content:encoded><![CDATA[ <p></p><p>When a country throws a privacy party, Cloudflare is there! We are proud to be an official sponsor of the Australian Privacy Awareness Week 2023, and we think this year’s theme of “Privacy 101: Back to Basics” is more important now than ever. In recent months, Australians have been hit with the news of massive personal data privacy breaches where millions of Australian citizens' private and sensitive data was compromised, seemingly easily. Meanwhile, the Australian Attorney General released its <a href="https://www.ag.gov.au/integrity/consultations/review-privacy-act-1988">Privacy Act Review Report 2022</a> earlier this year, calling for a number of changes to Australia’s privacy regulations.</p><p>You’re probably familiar with the old-school privacy basics of giving users notice and consent. But we think it’s time for some new “privacy basics”. Thanks to rapid developments in new technologies and new security threat vectors, notice and consent can only go so far to protect the privacy of your personal data. New challenges call for new solutions: security solutions and privacy enhancing technologies to keep personal data protected. Cloudflare is excited to play a role in building and using these technologies to help our customers keep their sensitive information private and enable individual consumers to protect themselves. Investing in and offering these technologies is part of our mission to help build a better Internet – one that is more private and more secure.</p><p>Cloudflare is fully committed to supporting Australian individuals and organizations in protecting their and their users’ privacy. We’ve been in Australia since Sydney became Cloudflare’s <a href="/sydney-australia-cloudflares-15th-data-center/">15th data center</a> in 2012, and we launched our Australian entity in 2019. We support more than 300 customers in Australia and New Zealand, including some of Australia’s largest banks and online digital natives with our world-leading privacy and security products and services.</p><p>For example, Australian tech darling <a href="https://www.canva.com/">Canva</a>, whose online graphic design tool is used by over 35 million people worldwide each month, uses a number of our solutions that help <a href="https://www.cloudflare.com/case-studies/canva/">Canva protect its network</a> from attacks, which in turn ensures that the data of its millions of users is not breached. And we are proud to support <a href="https://citizensgbr.org/">Citizens of the Great Barrier Reef</a>, which is a participant of Cloudflare’s <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>. Through Project Galileo, we’ve helped them to secure their origin server from large bursts of traffic or malicious actors attempting to access the website.</p><p>This is why we’re proud to support Australia’s Privacy Awareness Week 2023, and we want to share our expertise on how to empower Australian organizations in securing and protecting the privacy of their users. So let’s look at a few key privacy basics and how we think about them at Cloudflare:</p><ul><li><p>Minimize the data you collect, and then only use that data for the purpose for which it was collected.</p></li><li><p>Employ reasonable and appropriate security measures — with the bar for what this means going higher every day.</p></li><li><p>Create a culture of privacy by default.</p></li></ul>
    <div>
      <h3>Minimizing personal data in the clear</h3>
      <a href="#minimizing-personal-data-in-the-clear">
        
      </a>
    </div>
    <p>At Cloudflare, we believe in empowering individuals and entities of all sizes with technological tools to reduce the amount of personal data that gets funneled into the data ocean that is the Internet — regardless of whether someone lives in a country with laws protecting the privacy of their personal data. If we can build tools to help individuals share less personal data online, then that’s a win for privacy no matter what their country of residence.</p><p>In 2018, Cloudflare launched the <a href="/announcing-1111/">1.1.1.1 public DNS resolver</a> — the Internet's <a href="https://www.dnsperf.com/#!dns-resolvers">fastest</a>, privacy-first public DNS resolver. Our public resolver doesn’t retain any personal data about web requests. And because we baked anonymization best practices into the 1.1.1.1 resolver when we built it, we were able to demonstrate that we didn’t have any personal data to sell when we asked independent accountants to conduct a <a href="/announcing-the-results-of-the-1-1-1-1-public-dns-resolver-privacy-examination/">privacy examination</a> of the 1.1.1.1 resolver. And when you combine our 1.1.1.1 public resolver with Warp, our VPN, then your Internet service provider can no longer see every site and app you use—even if they’re encrypted. Which means that even if they wanted to, the ISP can’t sell your data or use it to target you with ads.</p><p>We’ve also invested heavily in new technologies that aim to secure Internet traffic from bad actors; the prying eyes of ISPs or other man-in-the-middle machines that might find your Internet communications of interest for advertising purposes; or government entities that might want to crack down on individuals exercising their freedom of speech.</p><p>For example, DNS records are like the addresses on the outside of an envelope, and the website content you’re viewing is like the letter inside that envelope. In the snail mail world, courts have long recognized that the address on the outside of a letter doesn’t deserve as much privacy protection as the letter itself. But we’re not living in an age where the only thing someone can tell from the outside of the envelope are the “to” and “from” addresses and place of postage. The digital envelopes of DNS requests can contain much more information about a person than you might expect. Not only is there information about the sender and recipient addresses, but there is specific timestamp information about when requests were submitted, the domains and subdomains visited, and even how long someone stayed on a certain site. Since these digital envelopes contain so much personal information, we think it’s just as important to encrypt this information as to encrypt the contents of the digital letter inside. This is why we doubled down on <a href="/dns-encryption-explained/">DNS over HTTPS (DoH)</a>.</p><p>But we thought we could go further. We were an early supporter of <a href="/oblivious-dns/">Oblivious DoH (ODoH)</a>. ODoH is a proposed DNS standard — co-authored by engineers from Cloudflare, Apple, and Fastly — that separates IP addresses from queries, so that no single entity can see both at the same time. ODoH requires a proxy as a key part of the communication path between client and resolver, with encryption ensuring that the proxy does not know the contents of the DNS query (only where to send it), and the resolver knowing what the query is but not who originally requested it (only the proxy’s IP address). This means the identity of the requester and the content of the request are unlinkable. This technology has formed the basis of <a href="/icloud-private-relay/">Apple’s iCloud Private Relay system</a>, which ensures that no single party handling user data has complete information on both who the user is and what they are trying to access. Cloudflare is proud to serve as a second relay for Apple Private Relay.</p><p>But wait - there’s more! We’ve also invested heavily in <a href="https://datatracker.ietf.org/doc/draft-ietf-ohai-ohttp/">Oblivious HTTP (OHTTP), an emerging IETF standard</a> and is built upon standard <a href="https://datatracker.ietf.org/doc/html/rfc9180">hybrid public-key cryptography</a>. Our Privacy Gateway service relays encrypted HTTP requests and responses between a client and application server. With Privacy Gateway, Cloudflare knows where the request is coming from, but not what it contains, and applications can see what the request contains, but not where it comes from. Neither Cloudflare nor the application server has the full picture, improving end-user privacy.</p><p>We recently deployed Privacy Gateway for <a href="https://flo.health/">Flo Health Inc</a>., a leading female health app, for the launch of their <a href="https://www.theverge.com/2022/9/14/23351957/flo-period-tracker-privacy-anonymous-mode">Anonymous Mode</a>. With Privacy Gateway in place, all request data for Anonymous Mode users is encrypted between the app user and Flo, which prevents Flo from seeing the IP addresses of those users and Cloudflare from seeing the contents of that request data.</p><p>And in the area of analytics, we’ve developed a privacy-first, free web analytics tool. Popular analytics vendors glean visitor and site data in return for web analytics. With business models driven by ad revenue, many analytics vendors track visitor behavior on websites and create buyer profiles to retarget website visitors with ads. But we wanted to give our customers a better option, so they wouldn’t have to sacrifice their visitors’ privacy to get essential and accurate metrics on website usage. Cloudflare Web Analytics works by adding a JavaScript snippet to a website instead of using client-side cookies or instead of fingerprinting individuals using their IP address.</p>
    <div>
      <h3>Investing in security to protect data privacy</h3>
      <a href="#investing-in-security-to-protect-data-privacy">
        
      </a>
    </div>
    <p>A key “privacy basic” that is also a fundamental element of almost all data protection legislation globally is the requirement to adopt reasonable and appropriate security measures for the personal data that is being processed. And as was the case with the most recent data breaches in Australia, if personal data is accessed without authorization, poor or failed security measures are often to blame.</p><p>Cloudflare's security services enable our customers to screen for cybersecurity risks on Cloudflare's network before those risks can reach the customer's internal network. This helps protect our customers and our customers’ data from a range of cyber threats. By doing so, Cloudflare's services are essentially fulfilling a privacy-enhancing function in themselves. From the beginning, we have built our systems to ensure that data is kept private, even from us, and we have made <a href="https://www.cloudflare.com/transparency/h1-2021/">public policy</a> and <a href="https://www.cloudflare.com/cloudflare-customer-dpa/">contractual commitments</a> about keeping that data private and secure.</p><p>But beyond securing our network for the benefit of our customers, Cloudflare is most well-known for its <a href="https://www.cloudflare.com/application-security/">application layer security services</a> – Web Application Firewall (WAF), bot management, DDoS protection, SSL/TLS, Page Shield, and more. We also embrace the critical importance of encryption in transit. In fact, we see encryption as so important that in 2014, Cloudflare introduced Universal SSL to support SSL (and now TLS) connections to every Cloudflare customer. And at the same time, we recognize that blindly passing along encrypted packets would undercut some of the very security that we’re trying to provide. Data privacy and security are a balance. If we let encrypted malicious code get to an end destination, then the malicious code may be used to access information that should otherwise have been protected. If data isn’t encrypted in transit, it’s at risk for interception. But by supporting encryption in transit and ensuring malicious code doesn’t get to its intended destination, we can protect private personal information even more effectively.</p><p>Let’s take an example – In June 2022, <a href="https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html">Atlassian released a Security Advisory</a> relating to a remote code execution (RCE) vulnerability affecting Confluence Server and Confluence Data Center products. Cloudflare <a href="/cloudflare-customers-are-protected-from-the-atlassian-confluence-cve-2022-26134/">responded immediately</a> to roll out a new WAF rule for all of our customers. For customers without this WAF protection, all the trade secret and personal information on their instances of Confluence were potentially vulnerable to data breach. These types of security measures are critical to protecting personal data. And it wouldn’t have mattered if the personal data were stored on a server in Australia, Germany, the U.S., or India – the RCE vulnerability would have exposed data wherever it was stored. Instead, the data was protected because a global network was able to roll out a WAF rule immediately to protect all of its customers globally.</p><p>Some of the biggest data breaches in recent years have happened as a result of something pretty simple – an attacker uses a <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing</a> email or social engineering to get an employee of a company to visit a site that infects the employee’s computer with malware or enter their credentials on a fake site that lets the bad actor capture the credentials and then use those to impersonate the employee and log into a company’s systems. Depending on the type of information compromised, these kinds of data breaches can have a huge impact on individuals’ privacy. For this reason, Cloudflare has invested in a number of technologies designed to protect corporate networks, and the personal data on those networks.</p><p>As we noted during our <a href="/cio-week-2023-recap/">CIO week</a> earlier this year, the FBI’s latest <a href="https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf">Internet Crime Report</a> shows that business email compromise and email account compromise, a subset of malicious phishing campaigns, are the most costly – with U.S. businesses losing nearly $2.4 billion. Cloudflare has invested in a number of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> solutions to help fight this very problem:</p><ul><li><p>Link Isolation means that when an employee clicks a link in an email, it will automatically be opened using Cloudflare’s Remote Browser Isolation technology that isolates potentially risky links, downloads, or other zero-day attacks from impacting that user’s computer and the wider corporate network.</p></li><li><p>With our Data Loss Prevention tools, businesses can identify and stop exfiltration of data.</p></li><li><p>Our Area 1 solution <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">identifies phishing attempts</a>, emails containing malicious code, and emails containing ransomware payloads and prevents them from landing in the inbox of unsuspecting employees.</p></li></ul><p>These Zero Trust tools, combined with the use of hardware keys for multifactor authentication, were key in Cloudflare’s ability to <a href="/2022-07-sms-phishing-attacks/">prevent a breach</a> by an SMS phishing attack that targeted more than 130 companies in July and August 2022. Many of these companies reported the disclosure of customer personal information as a result of employees falling victim to this SMS phishing effort.</p><p>And remember the Atlassian Confluence RCE vulnerability we mentioned earlier? Cloudflare remained protected not only due to our rapid update of our WAF rules, but also because we use our own Cloudflare Access solution (part of our Zero Trust suite) to ensure that only individuals with Cloudflare credentials are able to access our internal systems. Cloudflare Access verified every request made to a Confluence application to ensure it was coming from an authenticated user.</p><p>All of these Zero Trust solutions require sophisticated machine learning to detect patterns of malicious activity, and none of them require data to be stored in a specific location to keep the data safe. Thwarting these kinds of security threats aren’t only important for protecting organizations’ internal networks from intrusion – they are critical for keeping large scale data sets private for the benefit of millions of individuals.</p>
    <div>
      <h3>How we do privacy at Cloudflare</h3>
      <a href="#how-we-do-privacy-at-cloudflare">
        
      </a>
    </div>
    <p>All the technologies we build are public examples of how at Cloudflare we put our money where our mouth is when it comes to privacy. We also want to tell you about the ways — some public, some not — we infuse privacy principles at all levels at Cloudflare.</p><ul><li><p><i>Employee education and mindset:</i> An understanding of privacy is core to a Cloudflare employee’s experience right from the start. Employees learn about the role privacy and security play in helping to build a better Internet in their first weeks at Cloudflare. During the comprehensive employee orientation, we stress the role each employee plays in keeping the company and our customers secure. All employees are required to take annual data protection training, and we do targeted training for individual teams, depending on their engagement with personal data, throughout the year.</p></li><li><p><i>Privacy in product development</i>: Cloudflare employees take privacy-by-design seriously. We develop products and processes with the principles of data minimization, purpose limitation, and data security always front of mind. We have a product development lifecycle that includes performing privacy impact assessments when we may process personal data. We retain personal data we process for as short a time as necessary to provide our services to our customers. We do not track customers’ end users across sites. We don’t sell personal information. We don’t monetize DNS requests. We detect, deter, and deflect bad actors — we’re not in the business of looking at what any one person (or more specifically, browser) is doing when they browse the Internet. That’s not what we’re about.</p></li><li><p><i>Certifications</i>: In addition to the extensive internal security mechanisms we have in place to protect our customers’ data, we also have become <a href="https://www.cloudflare.com/trust-hub/compliance-resources/">certified under industry standards</a> to demonstrate our commitment to data security. We hold the following certifications: ISO 27001, ISO 27701, ISO 27018, AICPA SOC2 Type II, FedRamp Moderate, PCI DSS 3.2.1, WCAG 2.1 AA and Section 508, C5:2020, and, most recently, the EU Cloud Code of Conduct.</p></li><li><p><i>Privacy-focused response to government and third-party requests for information</i>: Our respect for our customers' privacy applies with equal force to commercial requests and to government or law enforcement requests. Any law enforcement requests that we receive must strictly adhere to the due process of law and be subject to judicial oversight. We believe that U.S. law enforcement requests for the personal data of a non-U.S. person that conflict with the privacy laws of that person’s country of residence (such as Australia’s Privacy Act) should be legally challenged. We commit in our <a href="https://www.cloudflare.com/cloudflare-customer-dpa/">Data Processing Addendum</a> that we will fight government data requests where such a conflict exists. In addition, it is our policy to notify our customers of a subpoena or other legal process requesting their customer or billing information before disclosure of that information, whether the legal process comes from the government or private parties involved in civil litigation, unless legally prohibited. We also publicly report on the types of requests we receive, as well as our responses, in our semi-annual <a href="https://www.cloudflare.com/media/pdf/transparency-report.pdf?1&amp;utm_referrer=https://www.google.com/">Transparency Report</a>. Finally, we publicly list certain types of actions that Cloudflare has never taken in response to government requests, and we commit that if Cloudflare were asked to do any of the things on this list, we would exhaust all legal remedies in order to protect our customers from what we believe are illegal or unconstitutional requests.</p></li></ul>
    <div>
      <h3>And there’s more to come…</h3>
      <a href="#and-theres-more-to-come">
        
      </a>
    </div>
    <p>Cloudflare is committed to fully support Australia’s privacy goals, and we are paying close attention to the current conversations around updating Australia’s privacy law and regulatory structure. And our 2023 roadmap includes focusing on the <a href="https://www.apec.org/about-us/about-apec/fact-sheets/what-is-the-cross-border-privacy-rules-system#:~:text=The%20APEC%20Cross%2DBorder%20Privacy,internationally%2Drecognized%20data%20privacy%20protections.">APEC Cross-Border Privacy Rules (CBPR) System</a> as a way to demonstrate our continued commitment to global privacy and paving the way for beneficial cross-border data transfers.</p><p>Happy Privacy Awareness Week 2023!</p> ]]></content:encoded>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Australia]]></category>
            <guid isPermaLink="false">78Km5HwPx9yyElGpiKt8mj</guid>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Navigating the changing data localization landscape with Cloudflare’s Data Localization Suite]]></title>
            <link>https://blog.cloudflare.com/dls-2022/</link>
            <pubDate>Thu, 26 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ We continue to expand and improve our data localization suite to help support our customers who have to comply with data localization requirements ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4EYiLjXGqj15qzzu24PmZ3/bfc3ae0c89d06eede8899add141bf3fc/image1-51.png" />
            
            </figure><p>At Cloudflare, we believe that deploying effective <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cybersecurity</a> measures is the <a href="/investing-in-security-to-protect-data-privacy/">best way to protect</a> the privacy of personal information and can be more effective than making sure that information stays within a particular jurisdiction. Yet, we hear from customers in Europe, India, Australia, Japan, and many other regions that, as part of their privacy programs, they need solutions to localize data in order to meet their regulatory obligations.</p><p>So as we think about Data Privacy Day, which is coming up on January 28, we are in the interesting position of disagreeing with those who believe that data localization is a proxy for better data privacy, but of also wanting to support our customers who have to comply with certain regulations.</p><p>For this reason, we <a href="/introducing-the-cloudflare-data-localization-suite/">introduced our Data Localization Suite</a> (DLS) in 2020 to help customers navigate a data protection landscape that focuses more and more on data localization. With the DLS, customers can use Cloudflare’s powerful global network and security measures to protect their businesses, while keeping the data we process on their behalf local. Since its launch, we’ve had many customers adopt the Data Localization Suite. In this blog post we want to share updates about how we’re making the DLS more comprehensive and easier to use.</p>
    <div>
      <h3>The confusing state of data protection regulations</h3>
      <a href="#the-confusing-state-of-data-protection-regulations">
        
      </a>
    </div>
    <p>We frequently field questions from customers who hear about new local laws or interpretations of existing regulations that seem to limit what they can do with data. This is especially confusing for customers doing business on the global Internet because they have to navigate regulations that suggest customers based in one country can’t use products from companies based in another country, unless extensive measures are put in place.</p><p>We don’t think this is any way to regulate the Internet. As we’ll talk more about in our blog post tomorrow about cross-border data transfers, we’re encouraged to see new developments aimed at establishing a common set of data protections across jurisdictions to make these data transfers more seamless.</p><p>In the meantime, we have the Data Localization suite to help our customers navigate these challenges.</p>
    <div>
      <h3>A recap of how the Data Localization Suite works</h3>
      <a href="#a-recap-of-how-the-data-localization-suite-works">
        
      </a>
    </div>
    <p>We developed DLS to address three primary customer concerns:</p><ol><li><p>How do I ensure my encryption keys stay in my jurisdiction?</p></li><li><p>How can I ensure that application services like caching and <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> only run in my jurisdiction?</p></li><li><p>How can I ensure that logs and metadata are never transferred outside my jurisdiction?</p></li></ol><p>To address these concerns, our DLS has an encryption key component, a component that addresses where content in transit is terminated and inspected, and a component that keeps metadata within a customers’ jurisdiction:</p><p><b>1. Encryption Keys</b>Cloudflare has long offered <a href="https://www.cloudflare.com/ssl/keyless-ssl/">Keyless SSL</a> and <a href="/introducing-cloudflare-geo-key-manager/">Geo Key Manager</a>, which ensure that private SSL/TLS key material never leaves the EU. Customers using our Geo Key Manager can choose for encryption keys to be stored only in data centers in the region the customer specifies. Keyless SSL ensures that Cloudflare never has possession of the private key material at all; Geo Key Manager ensures that keys are protected with cryptographic access control, so they can only be used in specified regions.</p><p><b>2. </b><a href="/introducing-regional-services/"><b>Regional Services</b></a>:Regional Services ensures that Cloudflare will only be able to decrypt and inspect the content of HTTPS traffic inside a customer’s chosen region. When Regional Services is enabled, regardless of which data center traffic first hits on our global network, rather than decrypting it at the first data center, we forward the TCP stream in encrypted form. Once it reaches a data center inside the customer’s chosen region, we decrypt and apply our Layer 7 security measures to prevent malicious traffic from reaching our customers’ websites.</p><p><b>3. </b><a href="/introducing-the-customer-metadata-boundary/"><b>Customer Metadata Boundary</b></a>:With this option enabled, no end user traffic logs (which contain IP addresses) that Cloudflare processes on behalf of our customers will leave the region chosen by the customer. (Currently available only in the EU and US.)</p>
    <div>
      <h3>Expanding Data Localization Suite to new regions</h3>
      <a href="#expanding-data-localization-suite-to-new-regions">
        
      </a>
    </div>
    <p>Although we launched the Data Localization Suite with Europe and America in mind at first, we quickly realized a lot of our customers were interested in versions specific to the Asia-Pacific region as well. In September of last year, we added <a href="/regional-services-comes-to-apac/">support for Regional Services</a> in Japan, Australia, and India.</p><p>Then in December 2022 we announced that Geo Key Manager is now accessible in <a href="/configurable-and-scalable-geo-key-manager-closed-beta/">15 regions</a>. Customers can both allow- and deny-list the regions that they want us to support for fine-grained control over where their key material is stored.</p><p>See also our <a href="/inside-geo-key-manager-v2">technical deep dive</a> about how we built Geo Key Manager v2.</p>
    <div>
      <h3>Making data localization more accessible</h3>
      <a href="#making-data-localization-more-accessible">
        
      </a>
    </div>
    <p>Regional Services and the Customer Metadata Boundary offer important protections for our customers — but they’ve been too hard to use. Both have required manual steps taken by teams at Cloudflare, and have had confusing (or no) public APIs.</p><p>Today, we’re fixing that! We’re excited to announce two big improvements to usability:</p><ol><li><p>Regional Services customers now have a dedicated UI and <a href="https://developers.cloudflare.com/data-localization/regional-services/get-started/#configure-regional-services-via-api">API for enabling Regional Services</a>, accessible straight from the DNS tab. Different regions can now be set on a per-hostname basis</p></li><li><p>Customers who want to use the Metadata Boundary can use <a href="https://developers.cloudflare.com/data-localization/metadata-boundary/get-started/">our self-service API</a> to enable it.</p></li></ol><p>We’re excited about making it easier to use the Data Localization Suite and give customers more control over exactly how to localize which parts of their traffic.</p>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>The Data Localization Suite is accessible today for enterprise customers. Please chat with your account representative if you’re interested in using it, and you can <a href="https://developers.cloudflare.com/data-localization/">find more information here</a> about configuring it in our developer docs.</p><p>We have lots more planned for the Data Localization Suite this year. We plan to support many more regions for Regional Services and the Metadata Boundary. We also plan to have full data localization support for all of our Zero Trust products. Stay tuned to the blog for more!</p> ]]></content:encoded>
            <category><![CDATA[Data Privacy Day]]></category>
            <category><![CDATA[Data Localization]]></category>
            <category><![CDATA[Data Localization Suite]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">6Rg92MVxprXul5pDi5Z5tk</guid>
            <dc:creator>Emily Hancock</dc:creator>
            <dc:creator>Jon Levine</dc:creator>
        </item>
        <item>
            <title><![CDATA[Investing in security to protect data privacy]]></title>
            <link>https://blog.cloudflare.com/investing-in-security-to-protect-data-privacy/</link>
            <pubDate>Wed, 25 Jan 2023 15:15:28 GMT</pubDate>
            <description><![CDATA[ With Data Privacy Day just a few days away, we think it’s important to focus on all the ways security measures and privacy-enhancing technologies help keep personal data private and why security ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3MvjsfgDbxmaTvZvF8cEJz/285a60f22fddb1aa6b3d0c43569008f0/image1-47.png" />
            
            </figure><p>If you’ve made it to 2023 without ever receiving a notice that your personal information was compromised in a security breach, consider yourself lucky. In a best case scenario, bad actors only got your email address and name – information that won’t cause you a huge amount of harm. Or in a worst-case scenario, maybe your profile on a dating app was breached and <a href="https://www.classaction.org/blog/bumble-data-breach-class-action-alleges-dating-app-was-negligent-in-handling-vast-amounts-of-user-info#:~:text=The%20case%20argues%20that%20Bumble's,Bumble's%20roughly%20100%20million%20users.">intimate details of your personal life</a> were exposed publicly, with <a href="https://krebsonsecurity.com/2022/07/a-retrospective-on-the-2015-ashley-madison-breach/">life-changing impacts</a>. But there are also more hidden, insidious ways that your personal data can be exploited. For example, most of us use an Internet Service Provider (ISP) to connect to the Internet. Some of those <a href="https://www.ftc.gov/news-events/news/press-releases/2021/10/ftc-staff-report-finds-many-internet-service-providers-collect-troves-personal-data-users-have-few">ISPs are collecting information</a> about your Internet viewing habits, your search histories, your location, etc. – all of which can impact the privacy of your personal information as you are targeted with ads based on your online habits.</p><p>You also probably haven’t made it to 2023 without hearing at least something about Internet privacy laws around the globe. In some jurisdictions, lawmakers are driven by a recognition that the right to privacy is a fundamental human right. In other locations, lawmakers are passing laws to address the harms their citizens are concerned about – data breaches and mining of data about private details of people’s lives  to sell targeted advertising. At the core of most of this legislation is an effort to give users more control over their personal data. And many of these regulations require data controllers to ensure adequate protections are in place for cross-border data transfers. In recent years, we’ve seen an increasing number of regulators interpreting these regulations in a way that would leave no room for cross-border data transfers, however. These interpretations are problematic – not only are they <a href="https://itif.org/publications/2021/07/19/how-barriers-cross-border-data-flows-are-spreading-globally-what-they-cost/">harmful to global commerce</a>, but they also disregard the idea that data might be more secure if cross-border data transfers are allowed. Some regulators instead assert that personal data will be safer if it stays within their borders because their law protects privacy better than that of another jurisdiction.</p><p>So with Data Privacy Day 2023 just a few days away on January 28, we think it’s important to focus on all the ways security measures and privacy-enhancing technologies help keep personal data private and why security measures are so much more critical to protecting privacy than merely implementing the requirements of data protection laws or keeping data in a jurisdiction because regulators think that jurisdiction has stronger laws than another.</p>
    <div>
      <h3>The role of data security in protecting personal information</h3>
      <a href="#the-role-of-data-security-in-protecting-personal-information">
        
      </a>
    </div>
    <p>Most data protection regulations recognize the role security plays in protecting the privacy of personal information. That’s not surprising. An entity’s efforts to follow a data protection law’s requirements for how personal data should be collected and used won’t mean much if a third party can access the data for their own malicious purposes.</p><p>The laws themselves provide few specifics about what security is required. For example, the EU General Data Protection Regulation (“GDPR”) and similar comprehensive privacy laws in other jurisdictions require data controllers (the entities that collect your data) to implement “reasonable and appropriate” security measures. But it’s almost impossible for regulators to require specific security measures because the security landscape changes so quickly. In the United States, state security breach laws don’t require notification if the data obtained is encrypted, suggesting that encryption is at least one way regulators think data should be protected.</p><p>Enforcement actions brought by regulators against companies that have experienced data breaches provide other clues for what regulators think are “best practices” for ensuring data protection. For example, on January 10 of this year, the U.S. Federal Trade Commission entered into a <a href="https://www.ftc.gov/system/files/ftc_gov/pdf/2023185-drizly-combined-consent.pdf">consent order with Drizly</a>, an online alcohol sales and delivery platform, outlining a number of security failures that led to a data breach that exposed the personal information of about 2.5 million Drizly users and requiring Drizly to implement a comprehensive security program that includes a long list of intrusion detection and logging procedures. In particular, the FTC specifically requires Drizly to implement “...(c) data loss prevention tools; [and] (d) properly configured firewalls” among other measures.</p><p>What many regulatory post-breach enforcement actions have in common is the requirement of a comprehensive security program that includes a number of technical measures to protect data from third parties who might seek access to it. The enforcement actions tend to be data location-agnostic, however. It’s not important where the data might be stored – what is important is the right security measures are in place. We couldn’t agree more wholeheartedly.</p><p>Cloudflare’s portfolio of products and services helps our customers put protections in place to thwart would-be attackers from accessing their websites or corporate networks. By making it less likely that users’ data will be accessed by malicious actors, Cloudflare’s services can <a href="https://securityintelligence.com/articles/long-term-impacts-security-breach/">help organizations</a> save millions of dollars, protect their brand reputations, and build trust with their users. We also spend a great deal of time working to develop privacy-enhancing technologies that directly support the ability of individual users to have a more privacy-preserving experience on the Internet.</p><p>Cloudflare is most well-known for its <a href="https://www.cloudflare.com/application-security/">application layer security services</a> – <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewall (WAF)</a>, bot management, DDoS protection, <a href="https://www.cloudflare.com/application-services/products/ssl/">SSL/TLS</a>, Page Shield, and more. As the FTC noted in its Drizly consent order, firewalls can be a <a href="https://www.cloudflare.com/application-services/solutions/">critical line of defense</a> for any online application. Think about what happens when you go through security at an airport – your body and your bags are scanned for something bad that might be there (e.g. weapons or explosives), but the airport security personnel are not inventorying or recording the contents of your bags. They’re simply looking for dangerous content to make sure it doesn’t make its way onto an airplane. In the same way, the WAF looks at packets as they are being routed through Cloudflare’s network to make sure the Internet equivalent of weapons and explosives are not delivered to a web application. Governments around the globe have agreed that these quick security scans at the airport are necessary to protect us all from bad actors. Internet traffic is the same.</p><p>We embrace the critical importance of encryption in transit. In fact, we see encryption as so important that in 2014, Cloudflare introduced Universal SSL to support SSL (and now TLS) connections to every Cloudflare customer. And at the same time, we recognize that blindly passing along encrypted packets would undercut some of the very security that we’re trying to provide. Data privacy and security are a balance. If we let encrypted malicious code get to an end destination, then the malicious code may be used to access information that should otherwise have been protected. If data isn’t encrypted in transit, it’s at risk for interception. But by supporting encryption in transit and ensuring malicious code doesn’t get to its intended destination, we can protect private personal information even more effectively.</p><p>Let’s take another example – In June 2022, <a href="https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html">Atlassian released a Security Advisory</a> relating to a remote code execution (RCE) vulnerability affecting Confluence Server and Confluence Data Center products. Cloudflare <a href="/cloudflare-customers-are-protected-from-the-atlassian-confluence-cve-2022-26134/">responded immediately</a> to roll out a new WAF rule for all of our customers. For customers without this WAF protection, all the trade secret and personal information on their instances of Confluence were potentially vulnerable to data breach. These types of security measures are critical to protecting personal data. And it wouldn’t have mattered if the personal data were stored on a server in Australia, Germany, the U.S., or India – the RCE vulnerability would have exposed data wherever it was stored. Instead, the data was protected because a global network was able to roll out a WAF rule immediately to protect all of its customers globally.</p>
    <div>
      <h3>Global network to thwart global attacks</h3>
      <a href="#global-network-to-thwart-global-attacks">
        
      </a>
    </div>
    <p>The power of a large, global network is often overlooked when we think about using security measures to protect the privacy of personal data. Regulators who would seek to wall off their countries from the rest of the world as a method of protecting data privacy often miss how such a move can impact the security measures that are even more critical to keeping private data protected from bad actors.</p><p>Global knowledge is necessary to stop attacks that could come from anywhere in the world. Just as an international network of counterterrorism units helps to prevent physical threats, the same approach is needed to <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">prevent cyberthreats</a>. The most powerful security tools are built upon identified patterns of anomalous traffic, coming from all over the world. Cloudflare’s global network puts us in a unique position to understand the evolution of global threats and anomalous behaviors. To empower our customers with preventative and responsive <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cybersecurity</a>, we transform global learnings into protections, while still maintaining the privacy of good-faith Internet users.</p><p>For example, Cloudflare’s tools to block threats at the DNS or HTTP level, including <a href="https://www.cloudflare.com/ddos/">DDoS protection for websites</a> and Gateway for enterprises, allow users to further secure their entities beyond customized traffic rules by screening for patterns of traffic known to contain phishing or malware content. We use our global network to improve our identification of vulnerabilities and malicious content and to roll out rules in real time that protect <a href="/waf-for-everyone/">everyone</a>. This ability to identify and instantly protect our customers from security vulnerabilities that they may not have yet had time to address reduces the possibility that their data will be compromised or that they will otherwise be subjected to nefarious activity.</p><p>Similarly, Cloudflare’s <a href="/cloudflare-bot-management-machine-learning-and-more/">Bot Management product</a> only increases in accuracy with continued use on the global network: it detects and blocks traffic coming from likely bots before feeding back learnings to the models backing the product. And most importantly, we minimize the amount of information used to detect these threats by fingerprinting traffic patterns and forgoing reliance on PII. Our Bot Management products are successful because of the sheer number of customers and amount of traffic on our network. With approximately 20 percent of all websites protected by Cloudflare, we are uniquely positioned to gather the signals that traffic is from a bad bot and interpret them into actionable intelligence. This diversity of signal and scale of data on a global platform is critical to help us continue to evolve our bot detection tools. If the Internet were fragmented – preventing data from one jurisdiction being used in another – more and more signals would be missed. We wouldn’t be able to apply learnings from bot trends in Asia to bot mitigation efforts in Europe, for example.</p><p>A global network is equally important for resilience and effective security protection, a reality that the war in Ukraine has brought into sharp relief. In order to keep their data safe, the Ukrainian government was required to <a href="https://www.c4isrnet.com/2022/06/22/how-the-cloud-saved-ukraines-data-from-russian-attacks/">change their laws</a> to remove data localization requirements. As Ukraine’s infrastructure came under attack during Russia’s invasion, the Ukrainian government migrated their data to the cloud, allowing it to be preserved and easily moved to safety in other parts of Europe. Likewise, Cloudflare’s global network played an important role in helping maintain Internet access inside Ukraine. Sites in Ukraine at times came under heavy DDoS attack, even as infrastructure was being destroyed by physical attacks. With bandwidth limited, it was important that the traffic that was getting through inside Ukraine was useful traffic, not attack traffic. Instead of allowing attack traffic inside Ukraine, Cloudflare’s global network identified it and rejected it in the countries where the attacks originated. Without the ability to inspect and reject traffic outside of Ukraine, the attack traffic would have further congested networks inside Ukraine, limiting network capacity for critical wartime communications.</p><p>Although the situation in Ukraine reflects the country’s wartime posture, Cloudflare’s global network provides the same security benefits for all of our customers. We use our entire network to deliver DDoS mitigation, with a  network capacity of over 172 Tbps, making it possible for our customers to stay online even in the face of the largest attacks. That enormous capacity to protect customers from attack is the result of the global nature of Cloudflare’s network, aided by the ability to restrict attack traffic to the countries where it originated. And a network that stays online is less likely to have to address the network intrusions and data loss that are frequently connected to successful <a href="https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/">DDoS attacks</a>.</p>
    <div>
      <h3>Zero Trust security for corporate networks</h3>
      <a href="#zero-trust-security-for-corporate-networks">
        
      </a>
    </div>
    <p>Some of the biggest data breaches in recent years have happened as a result of something pretty simple – an attacker uses a phishing email or social engineering to get an employee of a company to visit a site that infects the employee’s computer with malware or enter their credentials on a fake site that lets the bad actor capture the credentials and then use those to impersonate the employee and log into a company’s systems. Depending on the type of information compromised, these kinds of data breaches can have a huge impact on individuals’ privacy. For this reason, Cloudflare has invested in a number of technologies designed to protect corporate networks, and the personal data on those networks.</p><p>As we noted during our recent <a href="/cio-week-2023-recap/">CIO week</a>, the FBI’s latest <a href="https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf">Internet Crime Report</a> shows that business email compromise and email account compromise, a subset of malicious phishing campaigns, are the most costly – with U.S. businesses losing nearly $2.4 billion. Cloudflare has invested in a number of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> solutions to help fight this very problem:</p><ul><li><p>Link Isolation means that when an employee clicks a link in an email, it will automatically be opened using Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation technology</a> that isolates potentially risky links, downloads, or other zero-day attacks from impacting that user’s computer and the wider corporate network.</p></li><li><p>With our Data Loss Prevention tools, businesses can identify and stop <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">exfiltration of data</a>.</p></li><li><p>Our Area 1 solution identifies <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">phishing attempts</a>, emails containing malicious code, and emails containing ransomware payloads and <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">prevents</a> them from landing in the inbox of unsuspecting employees.</p></li></ul><p>These Zero Trust tools, combined with the use of hardware keys for multi-factor authentication, were key in Cloudflare’s ability to <a href="/2022-07-sms-phishing-attacks/">prevent a breach</a> by an SMS phishing attack that targeted more than 130 companies in July and August 2022. Many of these companies reported the disclosure of customer personal information as a result of employees falling victim to this SMS phishing effort.</p><p>And remember the Atlassian Confluence RCE vulnerability we mentioned earlier? Cloudflare remained protected not only due to our rapid update of our WAF rules, but also because we use our own Cloudflare Access solution (part of our Zero Trust suite) to ensure that only individuals with Cloudflare credentials are able to access our internal systems. Cloudflare Access verified every request made to a Confluence application to ensure it was coming from an authenticated user.</p><p>All of these <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust solutions</a> require sophisticated <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning</a> to detect patterns of malicious activity, and none of them require data to be stored in a specific location to keep the data safe. Thwarting these kinds of security threats aren’t only important for protecting organizations’ internal networks from intrusion – they are critical for keeping large scale data sets private for the benefit of millions of individuals.</p>
    <div>
      <h3>Cutting-edge technologies</h3>
      <a href="#cutting-edge-technologies">
        
      </a>
    </div>
    <p>Cloudflare's security services enable our customers to screen for cybersecurity risks on Cloudflare's network before those risks can reach the customer's internal network. This helps protect our customers and our customers’ data from a range of cyber threats. By doing so, Cloudflare's services are essentially fulfilling a privacy-enhancing function in themselves. From the beginning, we have built our systems to ensure that data is kept private, even from us, and we have made <a href="https://www.cloudflare.com/transparency/h1-2021/">public policy</a> and <a href="https://www.cloudflare.com/cloudflare-customer-dpa/">contractual commitments</a> about keeping that data private and secure. But beyond securing our network for the benefit of our customers, we’ve invested heavily in new technologies that aim to secure communications from bad actors; the prying eyes of ISPs or other man-in-the-middle machines that might find your Internet communications of interest for advertising purpose; or government entities that might want to crack down on individuals exercising their freedom of speech.</p><p>For example, Cloudflare operates part of <a href="/icloud-private-relay/">Apple’s iCloud Private Relay system</a>, which ensures that no single party handling user data has complete information on both who the user is and what they are trying to access. Instead, a user’s original IP address is visible to the access network (e.g. the coffee shop you’re sitting in, or your home ISP) and the first relay (operated by Apple), but the server or website name is encrypted and not visible to either. The first relay hands encrypted data to a second relay (e.g. Cloudflare), but is unable to see “inside” the traffic to Cloudflare. And the Cloudflare-operated relays know only that it is receiving traffic from a Private Relay user, but not specifically who or their client IP address. Cloudflare relays then forward traffic on to the destination server.</p><p>And of course any post on how security measures enable greater data privacy would be remiss if it failed to mention Cloudflare’s privacy-first 1.1.1.1 public resolver. By using <a href="https://1.1.1.1/">1.1.1.1,</a> individuals can search the Internet without their ISPs seeing where they are going. Unlike most DNS resolvers, 1.1.1.1 does not sell user data to advertisers.</p><p>Together, these many technologies and security measures ensure the privacy of personal data from many types of threats to privacy – behavioral advertising, man-in-the-middle attacks, malicious code, and more. On this data privacy day 2023, we urge regulators to recognize that the emphasis currently being placed on data localization has perhaps gone too far – and has foreclosed the many benefits cross-border data transfers can have for data security and, therefore, data privacy.</p> ]]></content:encoded>
            <category><![CDATA[Data Privacy Day]]></category>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">OiQaL75AyNnzr5CWjOljJ</guid>
            <dc:creator>Emily Hancock</dc:creator>
            <dc:creator>Alissa Starzak</dc:creator>
        </item>
        <item>
            <title><![CDATA[Need to keep analytics data in the EU? Cloudflare Zaraz can offer a solution]]></title>
            <link>https://blog.cloudflare.com/keep-analytics-tracking-data-in-the-eu-cloudflare-zaraz/</link>
            <pubDate>Thu, 03 Feb 2022 13:58:05 GMT</pubDate>
            <description><![CDATA[ Zaraz offers a way to use tools like Google Analytics, but doing so with an approach that protects the privacy of personal information and keeps it in the EU ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5kSXFj0Tgq1mTPHL6Bdpbd/14567e87448e778cedfb1270a6945642/unnamed--1--1.png" />
            
            </figure><p>A recent decision from the Austrian Data Protection Authority (<a href="https://www.dsb.gv.at/">the Datenschutzbehörde</a>) has network engineers scratching their heads and EU companies that use Google Analytics scrambling. The Datenschutzbehörde found that an Austrian website’s use of Google Analytics violates the EU General Data Protection Regulation (GDPR) as interpreted by the “Schrems II” case because Google Analytics can involve sending full or truncated IP addresses to the United States.</p><p>While disabling such trackers might be one (extreme) solution, doing so would leave website operators blind to how users are engaging with their site. A better approach: find a way to use tools like Google Analytics, but do so with an approach that protects the privacy of personal information and keeps it in the EU, avoiding a data transfer altogether. Enter <a href="https://dash.cloudflare.com/?to=/:account/:zone/zaraz">Cloudflare Zaraz</a>.</p><p>But before we get into just how Cloudflare Zaraz can help, we need to explain a bit of the background for the Datenschutzbehörde’s ruling, and why it’s a big deal.</p>
    <div>
      <h3>What are the privacy and data localization issues?</h3>
      <a href="#what-are-the-privacy-and-data-localization-issues">
        
      </a>
    </div>
    <p>The GDPR is a comprehensive data privacy law that applies to EU residents’ personal data, regardless of where it is processed. The GDPR itself does not insist that personal data must be processed only in Europe. Instead, it provides a number of legal mechanisms to ensure that GDPR-level protections are available for EU personal data if it is transferred outside the EU to a third country like the United States. Data transfers from the EU to the US were, until the 2020 “Schrems II” decision, permitted under an agreement called the <a href="https://www.privacyshield.gov/welcome">EU-US Privacy Shield Framework</a>.</p><p>The Schrems II decision refers to the July 2020 decision by the Court of Justice of the European Union that invalidated the EU-US Privacy Shield. The Court found that the Privacy Shield was not an effective means to protect EU data from US government surveillance authorities once data was transferred to the US, and therefore that under the Privacy Shield, EU personal data would not receive the level of protection guaranteed by the GDPR. However, the court upheld other valid transfer mechanisms designed to allow EU personal data to be transferred to the US in a way that is consistent with the GDPR that ensure EU personal data won’t be accessed by US government authorities in a way that violates the GDPR. One of those was the use of <a href="https://www.cloudflare.com/cloudflare-customer-scc/">Standard Contractual Clauses</a>, which are legal agreements approved by the EU Commission that enable data transfers – but they can only be used if supplementary measures are also in place.</p><p>Following the Schrems II case, the “NOYB” advocacy group founded by Max Schrems (the lawyer and activist who brought the legal action against Facebook that ultimately ended with the Schrems II ruling) filed 101 complaints against European websites that used Google Analytics and Facebook Connect trackers on the grounds that use of these trackers violates the Schrems II ruling because they send EU personal data to the United States without putting in place sufficient supplementary measures.</p><p>That issue of supplementary measures figured prominently in the Austrian data regulator’s decision. In its decision, the Datenschutzbehörde said that a European company could not use Google Analytics on its Austrian website because Google Analytics was sending the IP addresses of visitors to that website to Google’s servers in the United States. The Datenschutzbehörde reiterated earlier case law out of the EU that IP addresses can be sufficiently linked to individuals and therefore constitute personal data, so the GDPR applies. The regulator also found that IP addresses are not pseudonymous, and that Google doesn’t have sufficient supplementary measures in place to prevent US government authorities from accessing the data. As a result, the regulator found the use of Google Analytics and the transmission of IP addresses to the United States in this case violated the GDPR as interpreted by the Schrems II case.</p>
    <div>
      <h3>Google Analytics decision sets worrisome precedent</h3>
      <a href="#google-analytics-decision-sets-worrisome-precedent">
        
      </a>
    </div>
    <p>It’s important to remember that the Austrian ruling relates to one website’s use and implementation of Google Analytics. It is not a ban on Google Analytics throughout Europe. But is it a harbinger of more sweeping actions from data regulators? Any website might use dozens of third-party tools. If any of the third-party tools are transferring personal data to the US, they could attract the attention of an EU data regulator. Even if those tools are not collecting personal data or sensitive information intentionally, there remains a concern with the use of third-party tools, which evolves from how the Internet is built and operates.</p><p>Every time a user loads a website, those tools load and establish a connection between the end user’s browser and the third-party server. This connection is used for multiple purposes, such as requesting a script, reporting analytics data, or downloading an image pixel. In every such communication, the IP address of the visitor is exposed. This is how communication between a browser and a server has worked over the Internet since the Internet’s infancy.</p><p>The implications of the decision are therefore profound. If other European regulators adopt the Austrian ruling, and its conclusion that even the transfer of truncated IP addresses to the United States could constitute transfers of personal data that violate GDPR, the industry will likely need to fundamentally rethink current Internet architecture and the way IP addresses are used. Cloudflare increasingly believes that we’ll eventually solve these challenges by completely disassociating IP addresses from identity. We’ve partnered with others in the industry to pioneer new protocols like <a href="/oblivious-dns/">Oblivious DNS over HTTPS</a> that divorce IP addresses from content being queried online to help begin to make this future a reality.</p><p>While we can envision this future, our customers need immediate ways to address regulators’ concerns. The <a href="https://almanac.httparchive.org/en/2021/third-parties#fig-4">median website in 2021</a> used 21 third-party solutions on mobile and 23 on desktop. At the <a href="https://almanac.httparchive.org/en/2021/third-parties#fig-4">90th percentile</a>, these numbers climbed to 89 third-party solutions on mobile, and 91 on desktop. Taking into account the Austrian DPA ruling, according to which the EU company itself is responsible for making sure no personal data is transmitted to the United States without proper handling, we can conclude that companies may soon become responsible for every one of their third-party solutions implemented on their website. And since this is a staggering amount of tools, it demands a scalable solution. Luckily, that is exactly what we have built.</p>
    <div>
      <h3>Zaraz’s solution leverages Cloudflare’s global network and Workers platform</h3>
      <a href="#zarazs-solution-leverages-cloudflares-global-network-and-workers-platform">
        
      </a>
    </div>
    <p>Zaraz is a third-party manager, built for speed, privacy and security. With Zaraz, customers can load analytics tools, advertising pixels, interactive widgets, and many other types of third-party tools without making any changes to their code.</p><p>Zaraz loads third party tools on the cloud, using Cloudflare Workers. There are multiple reasons why we chose to build on Workers, and you can read more about it in this <a href="/zaraz-use-workers-to-make-third-party-tools-secure-and-fast/">blog post</a>. By using Workers to offload third-party tools to the cloud and away from the browser, Zaraz creates an extra layer of security and control over Personal Identifiable Information (PII), Protected Health Information (PHI), or other sensitive pieces of information that are often unintentionally passed to third-party vendors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1mxi46XGo4i072f0ftw7yC/6af1062eac8638bcd713178b619022df/image1-2.png" />
            
            </figure><p>In the <i>traditional</i> way of loading third-party tools, either via a Tag Management Software (TMS), a Customer Data Platform (CDP) or by including JavaScript snippets directly in the HTML, the browser always sends requests to the third-party domain. This is problematic for a bunch of reasons, but mainly because even if you wanted to, you can’t hide the user’s IP address. It is revealed with every HTTP request. It is also problematic because those tools execute remote JavaScript resources, and you have almost no visibility over the actions they take in the browser or the data they transmit.</p><p>We can use the Google Analytics example to illustrate the difference. When a website is loading Google Analytics either via Google Tag Manager or directly from the HTML, the browser downloads the <code>analytics.js</code> file that loads Google Analytics. It then sends an HTTP POST request from the browser to Google’s endpoint: <code>https://www.google-analytics.com/collect</code>. Both of these requests reveal the end-user’s IP address and might append to the URL some personal data, such as the Google Client ID, as query parameters for example.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1bWZxnvgilvw6PrUNsmkuq/943310f8ccc5e32d6b4ab3649bb96d3e/image3-3.png" />
            
            </figure><p>In comparison, when you use Zaraz to load Google Analytics, there’s simply no communication at all between the browser and Google’s endpoint. Instead, Zaraz works as an intermediary, and the entire communication is between Zaraz (which runs on Workers servers, isolated from the browser) and the third party. You can think of Zaraz as an extra protection layer between the browser and the third-party endpoint, and this extra layer allows us to include some powerful privacy features.</p><p>For example, Zaraz allows customers to decide whether to transfer an end user's IP address to Google Analytics or not. As simple as that. When configuring a new third-party tool like Google Analytics, you can choose in the tools settings page to hide IP addresses.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4nA1w99BBqIpf1NXlrBhHx/a43c97b468b46674b2059b1e79a9ffc9/image2-1.png" />
            
            </figure><p>You can use this feature currently with Google Analytics and the Facebook Pixel/Conversion API. But with more and more tools opening up their API and allowing server-to-server integrations, we expect the number of tools you can apply this on to grow rapidly.</p><p>A somewhat similar feature Zaraz offers is the Zaraz Data Loss Prevention (DLP) feature, currently used by several of our Enterprise customers. The DLP feature scans every request going to a third-party endpoint to make sure it doesn’t include sensitive information such as names, email addresses, social  security number, credit card numbers, IP addresses, and more. Using this feature, customers can either mask the data or simply be alerted when a tool is collecting such personal data. It gives full visibility and control over the information shared with third parties.</p>
    <div>
      <h3>How Zaraz Can Help with Data Localization</h3>
      <a href="#how-zaraz-can-help-with-data-localization">
        
      </a>
    </div>
    <p>Right now, you might be asking yourself, “wait, but how is Cloudflare different from Google, and won’t end users' logs go to Cloudflare’s US servers as well?” This is a great question, and where the combination of Zaraz with the Cloudflare global network makes us shine. We offer Enterprise customers Zaraz in combination with two powerful features of Cloudflare’s Data Localisation Suite: <a href="/introducing-regional-services/">Regional Services</a>, and the <a href="/introducing-the-customer-metadata-boundary/">Customer Metadata Boundary</a>.</p><p>Cloudflare Regional Services allows you to choose where you want the Cloudflare services to run, including the Zaraz service. To meet your compliance obligations, you may need control over where your data is inspected. Cloudflare Regional Services helps you decide where your data should be handled, without losing the performance benefits our network provides.</p><p>Let’s say you run a website for a European bank. Let’s also assume you enabled the Data Localisation Suite for the EU. When a person in the EU visits your website, an HTTP request is sent to activate Zaraz. Since Zaraz is running in a first-party context, meaning under your own domain, all the Data Localisation settings will apply on it as well. So the network will direct the traffic to the EU, without inspecting its content, and run Zaraz there.</p><p>The EU Customer Metadata Boundary expands the Data Localisation Suite to ensure that a customer’s end-user traffic metadata stays in the EU. “Metadata” can be a scary term, but it’s a simple concept — it just means “data about data.” In other words, it’s a description of activity that happened on our network. Using the EU Customer Metadata Boundary means that this type of metadata would be saved only in the EU.</p><p>And what about the end user’s personal data handled by Zaraz? By default, Zaraz doesn’t log or save any piece of information about the end user, with one exception in the case of error logging. To make our service better, we are saving logs of errors, so we can fix any issues. For customers that are using the Data Localisation Suite, this is something we can toggle off, which means that no log data whatsoever will be saved by Zaraz.</p>
    <div>
      <h3>What Does the Future Hold for Privacy Features?</h3>
      <a href="#what-does-the-future-hold-for-privacy-features">
        
      </a>
    </div>
    <p>Since the <a href="/cloudflare-acquires-zaraz-to-enable-cloud-loading-of-third-party-tools/">Zaraz acquisition</a>, we have been talking to hundreds of Cloudflare enterprise customers, and thousands of users using the beta for the free version of Zaraz. And we have gathered a shortlist of features that we plan to develop in 2022.</p><ul><li><p>The Zaraz Consent Manager. Zaraz is fundamentally changing the way third-party tools are implemented on the web. So, in order to provide our customers with full control over user consent management, we realized we should build our own tool to allow customers to do so easily. The Zaraz consent manager will be fully integrated with Zaraz and will allow customers to take actions according to the user choices in a few clicks.</p></li><li><p>Geolocation Triggers. We are planning to add the option to create <a href="https://developers.cloudflare.com/zaraz/get-started/create-trigger">trigger rules</a> based on an end user’s current location. This means you could configure tools to only load if the user is visiting your site from a specific region. You’d be able to even send specific events or properties according to the end-user’s location. This feature should help global companies to set granular configurations that meet the requirements of their global operations.</p></li><li><p>DLP pattern templates. At the moment, our DLP feature can scan requests going to third-party tools according to the patterns that enterprise customers create themselves. In the near future, we will introduce templates to help customers scan for common PII with more ease.</p></li></ul><p>This is just a taste of what’s coming. If you have any ideas for privacy features you’d like to see, reach out to <a>zaraz@cloudflare.com</a> – we would love to hear from you!</p><p>If you would like to explore the free beta version, please <a href="https://dash.cloudflare.com/?to=/:account/:zone/zaraz">click here</a>. Provided you are an Enterprise customer and want to learn more about Zaraz’s privacy features, please <a href="https://www.cloudflare.com/cloudflare-zaraz-third-party-tool-manager-waitlist">click here</a> to join the waitlist. To join our Discord channel, <a href="https://discord.gg/2TRr6nSxdd">click here</a>.</p> ]]></content:encoded>
            <category><![CDATA[Data Privacy Day]]></category>
            <category><![CDATA[Analytics]]></category>
            <category><![CDATA[Zaraz]]></category>
            <guid isPermaLink="false">7sjFkMUiIg78EGXJ7iMY4Q</guid>
            <dc:creator>Yair Dovrat</dc:creator>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Happy Data Privacy Day!]]></title>
            <link>https://blog.cloudflare.com/privacyday2022/</link>
            <pubDate>Fri, 28 Jan 2022 10:10:05 GMT</pubDate>
            <description><![CDATA[ On this Data Privacy Day, we look back at how events in 2021 shaped the privacy world, and we look ahead to what 2022 may have in store ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4xIST6S8GWKQqBpMnOwosk/330c9edfe3fc2ff60c3b823c0590d852/image1-25.png" />
            
            </figure><p>Happy Data Privacy Day 2022! Of course, every day is privacy day at Cloudflare, but today gives us a great excuse to talk about one of our favorite topics.</p><p>In honor of Privacy Day, we’re highlighting some key topics in data privacy and data protection that helped shape the landscape in 2021, as well as the issues we’ll be thinking about in 2022. The first category that gets our attention is the intersection of <a href="https://www.cloudflare.com/learning/cloud/what-is-dspm/">data security</a> and data privacy. At Cloudflare, we’ve invested in privacy-focused technologies and security measures that enhance data privacy to help build the third phase of the Internet, <a href="/internet-privacy/">the Privacy phase</a>, and we expect to double down on these developments in 2022.</p><p>The second category is data localization. While we don’t think you need localization to achieve privacy, the two are inextricably linked in the EU regulatory landscape and elsewhere.</p><p>Third, recent regulatory enforcement actions in the EU against websites’ use of cookies have us thinking about how we can help websites run third-party tools, such as analytics, in a faster, more secure, and more privacy-protective way.</p><p>Lastly, we’ll continue to focus on the introduction of new or updated data protection regulations around the world, as well as regulation governing digital services, which will inevitably have implications for how personal and non-personal data is used and transferred globally.</p>
    <div>
      <h3>Security to ensure Privacy</h3>
      <a href="#security-to-ensure-privacy">
        
      </a>
    </div>
    <p>Cloudflare’s founding mission to help build a better Internet has always included focusing on privacy-first products and services. We’ve <a href="/data-privacy-day-2021-looking-ahead-at-the-always-on-always-secure-always-private-internet/">written before</a> about how we think a key way to improve privacy is to reduce the amount of personal data flowing across the Internet. This has led to the development and deployment of technologies to help personal data stay private and keep data secure from would-be attackers. Examples of prominent technologies include Cloudflare’s 1.1.1.1 public DNS resolver — the <a href="/announcing-1111/">Internet's fastest, privacy-first public DNS resolver</a> that does not retain any personal data about requests made — and <a href="/oblivious-dns/">Oblivious DNS over HTTPs (ODoH)</a> — a proposed DNS standard co-authored by engineers from Cloudflare, Apple, and Fastly that separates IP addresses from queries, so that no single entity can see both at the same time.</p><p>We’re looking forward to continued work on privacy enhancing technologies in 2022, including efforts to generalize ODoH technology to any application HTTP traffic through Oblivious HTTP (OHTTP). Cloudflare is proud to be an active contributor to the Internet Engineering Task Force’s <a href="https://datatracker.ietf.org/doc/charter-ietf-ohai/">OHAI</a> (Oblivious HTTP Application Intermediation) working group where Oblivious HTTP will be developed. Similar to ODoH, OHTTP allows a client to make multiple requests of a server without the server being able to link those requests to the client or to identify the requests as having come from the same client.</p><p>But there are times when retaining identity is important, such as when you are trying to access your employer’s network while working from home — something many of us have become all too familiar with over the past two years. However, organizations shouldn’t have to choose between protecting privacy and implementing <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> solutions to guard their networks from common remote work pitfalls: employees working from home who fail to access their work networks through secure methods or fall victim to phishing and malware attacks.</p><p>So not only have we developed Cloudflare’s Zero Trust Services to help organizations secure their networks, we also went beyond mere security to create privacy-enhancing Zero Trust products. In 2021, the Cloudflare Zero Trust team took a big privacy step forward by building and launching <a href="/pii-and-selective-logging-controls-for-cloudflares-zero-trust-platform/">Selective Logging</a> into Cloudflare Gateway. Cloudflare Gateway is one component of our suite of services that helps enterprises secure their networks. Other components include <a href="https://www.cloudflare.com/learning/access-management/how-to-implement-zero-trust/">Zero Trust access</a> for an enterprise’s applications that allows for the authentication of users on our global network and a fast and reliable solution for remote browsing that allows enterprises to execute all browser code in the cloud.</p><p>With Selective Logging, Gateway Admins can now tailor their logs or disable all Gateway logging to fit an enterprise’s privacy posture. Admins can “Enable Logging of only Block Actions,” “Disable Gateway Logging for Personal Information,” or simply “Disable All Gateway Logging.” This allows an enterprise to decide not to collect any personal data for users who are accessing their internal organizational networks. The less personal data collected, the less chance any personal data can be stolen, leaked, or misused. Meanwhile, Gateway still protects enterprises by blocking malware or command &amp; control sites, phishing sites, and other URLs that are disallowed by their enterprise’s security policy.</p><p>As many employers have moved to permanent remote work, at least part-time, Zero Trust solutions will continue to be important in 2022. We are excited to give those employers tools that help them <a href="https://www.cloudflare.com/products/zero-trust/remote-workforces/">secure their networks</a> in ways that allow them to simultaneously protect employee privacy.</p><p>Of course, we can’t talk about pro-privacy security issues without mentioning the Log4j vulnerability exposed last month. That vulnerability highlighted just how critically important security is to protecting the privacy of personal data. We <a href="/inside-the-log4j2-vulnerability-cve-2021-44228/">explained in depth</a> how this vulnerability works, but in summary, the vulnerability allowed an attacker to execute code on a remote server. This can allow for the exploitation of Java-based Internet facing software that uses Log4j, but what makes Log4j even more insidious is that non-Internet facing software can also be exploitable as data gets passed from system to system. For example, a User-Agent string containing the exploit could be passed to a backend system written in Java that does indexing or data science and the exploit could get logged. Even if the Internet-facing software is not written in Java it is possible that strings get passed to other systems that are in Java allowing the exploit to happen.</p><p>This means that unless the vulnerability is remediated, an attacker could execute code that not only exfiltrates data from a web server but also steal personal data from non-Internet facing backend databases, such as billing systems. And because Java and Log4j are so widely used, thousands of servers and systems were impacted, which meant millions of users’ personal data was at risk.</p><p>We’re proud that, within hours of learning of the Log4j vulnerability, we rolled out new WAF rules written to protect all our customers’ sites (and our own) against this vulnerability. In addition, we and our customers were able to use our Zero Trust product, Cloudflare Access, to protect access to internal systems. Once we or a customer enabled Cloudflare Access on the identified attack surface, any exploit attempts to Cloudflare’s systems or the systems of customers would have required the attacker to authenticate. The ability to analyze server, network or traffic data generated by Cloudflare in the course of providing our service to the huge number of Internet applications that use us helped us better protect all of Cloudflare's customers. Not only were we able to update <a href="/cve-2021-44228-log4j-rce-0-day-mitigation/">WAF rules</a> to mitigate the vulnerability, Cloudflare could use data to identify WAF <a href="/exploitation-of-cve-2021-44228-before-public-disclosure-and-evolution-of-waf-evasion-patterns/">evasion patterns and exfiltration attempts</a>. This information enabled our customers to rapidly identify attack vectors on their own networks and mitigate the risk of harm.</p><p>As we discuss more below, we expect data localization debates to continue in 2022. At the same time, it’s important to realize that, if companies are forced to segment data by jurisdiction or to prevent access to data across jurisdictional borders, it would have been harder to mount the kind of response we were able to quickly provide to help our customers protect their own sites and networks against Log4j. We believe in ensuring both the privacy and security of data no matter what jurisdiction that data is stored in or flows through. And we believe those who would insist on data localization as a proxy for data protection above all else do a disservice to the security measures that are as important as regulations, if not more so, to protecting the privacy of personal data.</p>
    <div>
      <h3>Data Localization</h3>
      <a href="#data-localization">
        
      </a>
    </div>
    <p>Data localization was a major focus in 2021 and that shows no sign of slowing in 2022. In fact, in the EU, the Austrian data protection authority (<a href="https://www.dsb.gv.at/">the Datenschutzbehörde</a>) set quite the tone for this year. It published a decision January 13 stating that a European company could not use Google Analytics because it meant EU personal data was being transferred to the United States in what the regulator viewed as a violation of the EU General Data Protection Regulation (GDPR) as interpreted by the Court of Justice of the European Union’s 2020 decision in the “Schrems II” case.</p><p>We continue to disagree with the premise that the Schrems II decision means that EU personal data must not be transferred to the United States. Instead, we believe that there are safeguards that can be put in place to allow for such transfers pursuant to the EU <a href="https://www.cloudflare.com/cloudflare-customer-scc/">Standard Contractual Clauses</a> (SCCs) (contractual clauses approved by the EU Commission to enable EU personal data to be transferred outside the EU) in a manner consistent with the Schrems II decision. Cloudflare has had <a href="https://www.cloudflare.com/gdpr/introduction/">data protection safeguards</a> in place since well before the Schrems II case, in fact, such as our <a href="https://assets.ctfassets.net/slt3lc6tev37/2RM2ZAb5XJiudjz4QHvth4/b3df347d8a7a629ccd5cadd4f7cfd2f3/BDES-1406_Privacy_Day_Whitepaper_2021.pdf">industry-leading commitments</a> on government data requests. We have updated our <a href="https://www.cloudflare.com/cloudflare-customer-dpa/">Data Processing Addendum</a> (DPA) to incorporate the SCCs that the EU Commission approved in 2021. We also added additional safeguards as outlined in the <a href="https://edpb.europa.eu/news/news/2021/edpb-adopts-final-version-recommendations-supplementary-measures-letter-eu_en">EDPB’s June 2021 Recommendations on Supplementary Measures</a>. Finally, Cloudflare’s services are <a href="/iso-27701-privacy-certification/">certified under the ISO 27701 standard</a>, which maps to the GDPR’s requirements.</p><p>In light of these measures, our EU customers can use Cloudflare’s services in a manner consistent with GDPR and the Schrems II decision. Still, we recognize that many of our customers want their EU personal data to stay in the EU. For example, some of our customers in industries like healthcare, law, and finance may have additional requirements. For these reasons, we developed our Data Localization Suite, which gives customers control over where their data is inspected and stored.</p><p>Cloudflare’s <a href="https://www.cloudflare.com/data-localization/">Data Localization Suite</a> provides a viable solution for our customers who want to avoid transferring EU personal data outside the EU at a time when European regulators are growing increasingly critical of data transfers to the United States. We are particularly excited about the <a href="/introducing-the-customer-metadata-boundary/">Customer Metadata Boundary</a> component of the Data Localization Suite, because we have found a way to keep customer-identifiable end user log data in the EU for those EU customers who want that option, without sacrificing our ability to provide the security services our customers rely on us to provide.</p><p>In 2022, we will continue to fine tune our data localization offerings and expand to serve other regions where customers are finding a need to localize their data. 2021 saw China’s Personal Information Protection Law come into force with its data localization and cross-border data transfer requirements, and we are likely to see other jurisdictions, or perhaps specific industry guidelines, follow suit in 2022 in some form.</p>
    <div>
      <h3>Pro-Privacy Analytics</h3>
      <a href="#pro-privacy-analytics">
        
      </a>
    </div>
    <p>We expect trackers (cookies, web beacons, etc.) to continue to be an area of focus in 2022 as well, and we are excited to play a role in ushering in a new era to help websites run third-party tools, such as analytics, in a faster, more secure, and more privacy-protective way. We were already thinking about privacy-first analytics in 2020 when we launched <a href="/free-privacy-first-analytics-for-a-better-web/">Web Analytics</a> — a product that allowed websites to gather analytics information about their site users without using any client-side code.</p><p>Nevertheless, cookies, web beacons, and similar client-side trackers remain ubiquitous across the web. Each time a website operator uses these trackers, they open their site to potential security vulnerabilities, and they risk eroding the trust of their users who have grown weary of “cookie consent” banners and worry their personal data is being collected and tracked across the Internet. There has to be a better way, right? Turns out, there is.</p><p>As explained in greater detail in <a href="/zaraz-use-workers-to-make-third-party-tools-secure-and-fast/">this blog post</a>, Cloudflare’s Zaraz product not only allows a website to load faster and be more interactive, but it also reduces the amount of third-party code needed to run on a website, which makes it more secure. And this solution is also pro-privacy: it allows the website operator to have control over the data sent to third parties. Moving the execution of the third-party tools our network means website operators will be able to identify if tools are trying to collect personal data, and, if so, they can modify the data before it goes to the analytics providers (for example, strip URL queries, remove IP addresses of end users). As we’ve said so often, if we can reduce the amount of personal data that is sent across the Internet, that’s a win for privacy.</p>
    <div>
      <h3>Changing Privacy Landscape</h3>
      <a href="#changing-privacy-landscape">
        
      </a>
    </div>
    <p>As the old saying goes, the only constant is change. And as in 2021, 2022 will undoubtedly be a year of continued regulatory changes as we see new laws enacted, amended, or coming into effect that directly or indirectly regulate the collection, use, and transborder flow of personal data.</p><p>In the United States for example, 2022 will require companies to prepare for the California Privacy Rights Act (CPRA), which goes into effect January 1, 2023. Importantly, CPRA will have “retrospective requirements”, meaning companies will need to look back and apply rules to personal data collected as of January 1, 2022. Likewise, Virginia’s and Colorado’s privacy laws are coming into force in 2023. And a number of other States, including but not limited to Florida, Washington, Indiana, and the District of Columbia, have proposed their own privacy laws. For the most part, these bills are aimed at giving consumers greater control over their personal data — such as establishing consumers’ rights to access and delete their data — and placing obligations on companies to ensure those rights are protected and respected.</p><p>Meanwhile, elsewhere in the world, we are seeing a shift in data privacy legislation. No longer are data protection laws focusing only on personal data; they are expanding to regulate the flow of all types of data. The clearest example of this is in India, where a parliamentary committee in December 2021 included recommendations that the “Personal Data Protection Bill'' be renamed the “Data Protection Bill'' and that its scope be expanded to include non-personal data. The bill would place obligations on organizations to extend to non-personal data the same protections that existing data protection laws extend to personal data. The implications of the proposed updates to India’s Data Protection Bill are significant. They could dramatically impact the way in which organizations use non-personal data for analytics and operational improvements.</p><p>India is not the only country to propose expanding the scope of data regulation to include non-personal data. The <a href="https://digital-strategy.ec.europa.eu/en/policies/strategy-data">European Union’s Data Strategy</a> aims to provide a secure framework enhancing data sharing with the stated goal that such sharing will drive innovation and expedite the digitalization of the European economy.</p><p>Other data privacy legislation to keep an eye on in 2022 will be Japan’s amendment to its Act on Protection of Personal Information (APPI) and Thailand’s Personal Data Protection Act (PDPA), which will come into force in 2022. Proposed amendments to Japan’s APPI include requirements to be met in order to transfer Japanese personal data outside of Japan and the introduction of data breach notification requirements. Meanwhile, like the GDPR, Thailand’s PDPA aims to protect individuals’ personal data by imposing obligations on organizations that collect, process, and transfer such personal data.</p><p>With all these privacy enhancing technologies and regulatory changes on the horizon, we expect 2022 to be another exciting year in the world of data protection and data privacy. Happy Data Privacy Day!</p> ]]></content:encoded>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Data Privacy Day]]></category>
            <guid isPermaLink="false">h5tp9N7ZRO7K9sVDuLD5a</guid>
            <dc:creator>Emily Hancock</dc:creator>
            <dc:creator>Tilly Lang</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing the Customer Metadata Boundary]]></title>
            <link>https://blog.cloudflare.com/introducing-the-customer-metadata-boundary/</link>
            <pubDate>Tue, 07 Dec 2021 13:59:15 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s Data Localisation Suite now helps customers localise metadata about their HTTP traffic. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Data localisation has gotten a lot of attention in recent years because a number of countries see it as a way of controlling or protecting their citizens’ data. Countries such as Australia, China, India, Brazil, and South Korea have or are currently considering regulations that assert <a href="https://www.cloudflare.com/learning/privacy/what-is-data-sovereignty/">legal sovereignty over their citizens’ personal data</a> in some fashion — health care data must be stored locally; public institutions may only contract with local service providers, etc.</p><p>In the EU, the recent “Schrems II” decision resulted in additional requirements for companies that transfer personal data outside the EU. And a number of highly regulated industries require that specific types of personal data stay within the EU’s borders.</p><p>Cloudflare is committed to helping our customers keep personal data in the EU. Last year, we introduced the <a href="/introducing-the-cloudflare-data-localization-suite/">Data Localisation Suite</a>, which gives customers control over where their data is inspected and stored.</p><p>Today, we’re excited to introduce the Customer Metadata Boundary, which expands the Data Localisation Suite to ensure that a customer’s end user traffic metadata stays in the EU.</p>
    <div>
      <h3>Metadata: a primer</h3>
      <a href="#metadata-a-primer">
        
      </a>
    </div>
    <p>“Metadata” can be a scary term, but it’s a simple concept — it just means “data about data.” In other words, it’s a description of activity that happened on our network. Every service on the Internet collects metadata in some form, and it’s vital to user safety and network availability.</p><p>At Cloudflare, we collect metadata about the usage of our products for several purposes:</p><ul><li><p>Serving analytics via our dashboards and APIs</p></li><li><p>Sharing logs with customers</p></li><li><p>Stopping security threats such as bot or DDoS attacks</p></li><li><p>Improving the performance of our network</p></li><li><p>Maintaining the reliability and resiliency of our network</p></li></ul><p>What does that collection look like in practice at Cloudflare? Our network consists of dozens of services: our Firewall, Cache, DNS Resolver, DDoS protection systems, Workers runtime, and more. Each service emits structured log messages, which contain fields like timestamps, URLs, usage of Cloudflare features, and the identifier of the customer’s account and zone.</p><p>These messages do not contain the <i>contents</i> of customer traffic, and so they do <b>not</b> contain things like usernames, passwords, personal information, and other private details of customers’ end users. However, these logs may contain end-user IP addresses, which is considered personal data in the EU.</p>
    <div>
      <h3>Data Localisation in the EU</h3>
      <a href="#data-localisation-in-the-eu">
        
      </a>
    </div>
    <p>The EU’s General Data Protection Regulation, or GDPR, is one of the world’s most comprehensive (and well known) data privacy laws. The GDPR does <i>not</i>, however, insist that personal data must stay in Europe. Instead, it provides a number of legal mechanisms to ensure that GDPR-level protections are available for EU personal data if it is transferred outside the EU to a third country like the United States. Data transfers from the EU to the US were, until recently, permitted under an agreement called the <a href="https://www.privacyshield.gov/welcome">EU-U.S. Privacy Shield Framework</a>.</p><p>Shortly after the GDPR went into effect, a privacy activist named <a href="https://en.wikipedia.org/wiki/Max_Schrems">Max Schrems</a> filed suit against Facebook for their data collection practices. In July 2020, the Court of Justice of the EU issued the “Schrems II” ruling — which, among other things, invalidated the Privacy Shield framework. However, the court upheld other valid transfer mechanisms that ensure EU personal data won’t be accessed by U.S. government authorities in a way that violates the GDPR.</p><p>Since the Schrems II decision, many customers have asked us how we’re protecting EU citizens’ data. Fortunately, Cloudflare has had <a href="https://www.cloudflare.com/gdpr/introduction/">data protection safeguards</a> in place since well before the Schrems II case, such as our <a href="https://assets.ctfassets.net/slt3lc6tev37/2RM2ZAb5XJiudjz4QHvth4/b3df347d8a7a629ccd5cadd4f7cfd2f3/BDES-1406_Privacy_Day_Whitepaper_2021.pdf">industry-leading commitments</a> on government data requests. In response to Schrems II in particular, we updated our customer <a href="https://www.cloudflare.com/cloudflare-customer-dpa/">Data Processing Addendum</a> (DPA). We incorporated the latest <a href="https://www.cloudflare.com/cloudflare-customer-scc/">Standard Contractual Clauses</a>, which are legal agreements approved by the EU Commission that enable data transfer. We also added additional safeguards as outlined in the <a href="https://edpb.europa.eu/news/news/2021/edpb-adopts-final-version-recommendations-supplementary-measures-letter-eu_en">EDPB’s June 2021 Recommendations on Supplementary Measures</a>. Finally, Cloudflare’s services are certified under the ISO 27701 standard, which maps to the GDPR’s requirements.</p><p>In light of these measures, we believe that our EU customers can use Cloudflare’s services in a manner consistent with GDPR and the Schrems II decision. Still, we recognize that many of our customers want their EU personal data to stay in the EU. For example, some of our customers in industries like healthcare, law, and finance may have additional requirements.  For that reason, we have developed an optional suite of services to address those requirements. We call this our Data Localisation Suite.</p>
    <div>
      <h3>How the Data Localisation Suite helps today</h3>
      <a href="#how-the-data-localisation-suite-helps-today">
        
      </a>
    </div>
    <p>Data Localisation is challenging for customers because of the volume and variety of data they handle. When it comes to their Cloudflare traffic, we’ve found that customers are primarily concerned about three areas:</p><ol><li><p>How do I ensure my encryption keys stay in the EU?</p></li><li><p>How can I ensure that services like caching and <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> only run in the EU?</p></li><li><p>How can ensure that metadata is never transferred outside the EU?</p></li></ol><p>To address the first concern, Cloudflare has long offered <a href="https://www.cloudflare.com/ssl/keyless-ssl/">Keyless SSL</a> and <a href="/introducing-cloudflare-geo-key-manager/">Geo Key Manager</a>, which ensure that private SSL/TLS key material never leaves the EU. Keyless SSL ensures that Cloudflare never has possession of the private key material at all; Geo Key Manager uses Keyless SSL under the hood to ensure the keys never leave the specified region.</p><p>Last year we addressed the second concern with <a href="/introducing-regional-services/">Regional Services</a>, which ensures that Cloudflare will only be able to decrypt and inspect the content of HTTP traffic inside the EU. In other words, SSL connections will only be terminated in the EU, and all of our layer 7 security and performance services will only run in our EU data centers.</p><p>Today, we’re enabling customers to address the third and final concern, and keep metadata local as well.</p>
    <div>
      <h3>How the Metadata Boundary Works</h3>
      <a href="#how-the-metadata-boundary-works">
        
      </a>
    </div>
    <p>The Customer Metadata Boundary ensures, simply, that end user traffic metadata that can identify a customer stays in the EU. This includes all the logs and analytics that a customer sees.</p><p>How are we able to do this? All the metadata that can identify a customer flows through a single service at our edge, before being forwarded to one of our core data centers.</p><p>When the Metadata Boundary is enabled for a customer, our edge ensures that any log message that identifies that customer (that is, contains that customer's Account ID) is not sent outside the EU. It will only be sent to our core data center in the EU, and not our core data center in the US.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/12lcx2Efei67w6jfteXoMN/d3c2c22e54af6bf25d549067e559dae8/image2-14.png" />
            
            </figure>
    <div>
      <h3>What’s next</h3>
      <a href="#whats-next">
        
      </a>
    </div>
    <p>Today our Data Localisation Suite is focused on helping our customers in the EU localise data for their inbound HTTP traffic. This includes our Cache, Firewall, <a href="https://www.cloudflare.com/ddos/">DDoS protection</a>, and Bot Management products.</p><p>We’ve heard from customers that they want data localisation for more products and more regions. This means making all of our Data Localisation Products, including Geo Key Manager and Regional Services, work globally. We’re also working on expanding the Metadata Boundary to include our Zero Trust products like Cloudflare for Teams. Stay tuned!</p> ]]></content:encoded>
            <category><![CDATA[CIO Week]]></category>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[Data]]></category>
            <category><![CDATA[Europe]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">74am2210Vl5UqONcLXY00k</guid>
            <dc:creator>Jon Levine</dc:creator>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Certifying our Commitment to Your Right to Information Privacy]]></title>
            <link>https://blog.cloudflare.com/certifying-our-commitment-to-your-right-to-information-privacy/</link>
            <pubDate>Thu, 29 Jul 2021 13:00:50 GMT</pubDate>
            <description><![CDATA[ Cloudflare recognizes privacy in personal data as a fundamental human right and has taken a number of steps, including certifying to international standards, to demonstrate our commitment to privacy. ]]></description>
            <content:encoded><![CDATA[ <p></p><p><i>Cloudflare recognizes privacy in personal data as a fundamental human right and has taken a number of steps, including certifying to international standards, to demonstrate our commitment to privacy.</i></p><p>Privacy has long been recognized as a fundamental human right. The United Nations included a right to privacy in its <a href="https://www.un.org/en/about-us/universal-declaration-of-human-rights">1948 Universal Declaration of Human Rights</a> (Article 12) and in the <a href="https://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx">1976 International Covenant on Civil and Political Rights</a> (Article 17). A number of other jurisdiction-specific laws and treaties also recognize privacy as a fundamental right.</p><p>Cloudflare shares the belief that privacy is a fundamental right. We believe that our mission to help build a better Internet means building a privacy-respecting Internet, so people don’t feel they have to sacrifice their personal information — where they live, their ages and interests, their shopping habits, or their religious or political beliefs — in order to navigate the online world.</p><p>But talk is cheap. Anyone can say they value privacy. We show it. We demonstrate our commitment to privacy not only in the products and services we build and the way we run our privacy program, but also in the examinations we perform of our processes and products  to ensure they work the way we say they do.</p>
    <div>
      <h2>Certifying to International Privacy and Security Standards</h2>
      <a href="#certifying-to-international-privacy-and-security-standards">
        
      </a>
    </div>
    <p>Cloudflare has a multi-faceted privacy program that incorporates critical privacy principles such as being transparent about our privacy practices, practicing privacy by design when we build our products and services, using the minimum amount of personal data necessary for our services to work, and only processing personal data for the purposes specified. We were able to demonstrate our holistic approach to privacy when, earlier this year, Cloudflare became one of the first organizations in our industry to <a href="/iso-27701-privacy-certification/">certify to a new international privacy standard</a> for protecting and managing the processing of personal data — ISO/IEC 27701:2019.</p><p>This standard took the concepts in global data protection laws like the EU’s watershed General Data Protection Regulation (“GDPR”) and adapted them into an international standard for how to manage privacy. This certification provides assurance to our customers that a third party has independently verified that Cloudflare’s privacy program meets GDPR-aligned industry standards. Having this certification helps our customers have confidence in the way we handle and protect our customer information, as both processor and controller of personal information.</p><p>The standard contains 31 controls identified for organizations that are personal data controllers, and 18 additional controls identified for organizations that are personal data processors.<a href="#footnote1"><sup>[1]</sup></a> The controls are essentially a set of best practices that data controllers and processors must meet in terms of data handling practices and transparency about those practices, documenting a legal basis for processing and for transfer of data to third countries (outside the EU), and handling data subject rights, among others.</p><p>For example, the standard requires that an organization maintain policies and document specific procedures related to the international transfer of personal data.</p><p>Cloudflare has implemented this requirement by maintaining an internal policy restricting the transfer of personal data between jurisdictions unless that transfer meets defined criteria. Customers, whether free or paid, enter into a standard Data Processing Addendum with Cloudflare which is available on the <a href="https://dash.cloudflare.com/login">Cloudflare Customer Dashboard</a> and which sets out the restrictions we must adhere to when processing personal data on behalf of customers, including when transferring personal data between jurisdictions. Additionally, Cloudflare publishes <a href="https://www.cloudflare.com/gdpr/subprocessors/">a list of sub-processors</a> that we may use when processing personal data, and in which countries or jurisdictions that processing may take place.</p><p>The standard also requires that organizations should maintain documented personal data minimization objectives, including what mechanisms are used to meet those objectives.</p>
    <div>
      <h2>Personal data minimization objective</h2>
      <a href="#personal-data-minimization-objective">
        
      </a>
    </div>
    <p>Cloudflare maintains internal policies on how we manage data throughout its full lifecycle, including data minimization objectives. In fact, our commitment to privacy starts with the objective of minimizing personal data. That’s why, if we don’t have to collect certain personal data in order to deliver our service to customers, we’d prefer not to collect it at all in the first place. Where we do have to, we collect the minimum amount necessary to achieve the identified purpose and process it for the minimum amount necessary, transparently documenting the processing in our public <a href="https://www.cloudflare.com/privacypolicy/">privacy policy</a>.</p><p>We’re also proud to have developed a Privacy by Design policy, which rigorously sets out the high-standards and evaluations that must be undertaken if products and services are to collect and process personal data. We use these mechanisms to ensure our collection and use of personal data is limited and <a href="https://www.cloudflare.com/gdpr/introduction/">transparently documented</a>.</p><p>Demonstrating our adherence to laws and policies designed to protect the privacy of personal information is only one way to show how we value the people’s right to privacy. Another critical element of our privacy approach is the high level of security we apply to the data on our systems in order to keep that data private. We’ve demonstrated our commitment to data security through a number of certifications:</p><ul><li><p><b>ISO 27001:2013:</b> This is an industry-wide accepted <a href="https://www.cloudflare.com/learning/security/what-is-information-security/">information security</a> certification that focuses on the implementation of an Information Security Management System (ISMS) and security risk management processes. Cloudflare has been ISO 27001 certified since 2019.</p></li><li><p><b>SOC 2 Type II:</b>  Cloudflare has undertaken the AICPA SOC 2 Type II certification to attest that Security, Confidentiality, and Availability controls are in place in accordance with the AICPA Trust Service Criteria. Cloudflare's SOC 2 Type II report covers security, confidentiality, and availability controls to protect customer data.</p></li><li><p><b>PCI DSS 3.2.1:</b> Cloudflare maintains PCI DSS Level 1 compliance and has been <a href="https://www.cloudflare.com/learning/privacy/what-is-pci-dss-compliance/">PCI compliant</a> since 2014. Cloudflare's <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewall (WAF)</a>, Cloudflare Access, Content Delivery Network (CDN), Time Service, Workers, and Workers KV are PCI compliant solutions. Cloudflare is audited annually by a third-party Qualified Security Assessor (QSA).</p></li><li><p><b>BSI Qualification:</b> Cloudflare has been recognized by the German government's Federal Office for Information Security as a qualified provider of DDoS mitigation services.</p></li></ul><p>More information about these certifications is available on our <a href="https://www.cloudflare.com/trust-hub/compliance-resources/">Certifications and compliance resources page</a>.</p><p>In addition, we are continuing to look for other opportunities to demonstrate our compliance with data privacy best practices. For example, we are following the European Union’s <a href="https://edpb.europa.eu/our-work-tools/our-documents/topic/code-conduct_en">approval of the first official GDPR codes of conduct</a> in May 2021, and we are considering other privacy standards, such as the <a href="https://www.iso.org/standard/76559.html">ISO 27018 cloud privacy</a> certification.</p>
    <div>
      <h2>Building Tools to Deliver Privacy</h2>
      <a href="#building-tools-to-deliver-privacy">
        
      </a>
    </div>
    <p>We think one of the most impactful ways we can respect people’s privacy is by not collecting or processing unnecessary personal data in the first place. We not only build our own network with this principle in mind, but we also believe in empowering individuals and entities of all sizes with technological tools to easily build privacy-respecting applications and minimize the amount of personal information transiting the Internet.</p><p>One such tool is our <a href="/announcing-1111/">1.1.1.1 public DNS resolver</a> — the <a href="https://www.dnsperf.com/#!dns-resolvers">Internet's fastest</a>, privacy-first public DNS resolver. When we launched our 1.1.1.1 resolver, we committed that we would not retain any personal data about requests made using our 1.1.1.1 resolver. And because we baked anonymization best practices into the 1.1.1.1 resolver when we built it, we were able to demonstrate that we didn’t have any personal data to sell when we asked independent accountants to conduct a <a href="/announcing-the-results-of-the-1-1-1-1-public-dns-resolver-privacy-examination/">privacy examination</a> of the 1.1.1.1 resolver. While we haven’t made changes to how the product works since then, if we ever do so in the future, we’ll go back and commission another examination to demonstrate that when someone uses our public resolver, we can’t tell who is visiting any given website.</p><p>In addition to our 1.1.1.1 resolver, we’ve built a number of other privacy-enhancing technologies, such as:</p><ul><li><p>Cloudflare’s Web Analytics, which does not use any client-side state, such as cookies or localStorage, to collect usage metrics, and never ‘fingerprints’ individual users.</p></li><li><p>Supporting <a href="/oblivious-dns/">Oblivious DoH (ODoH)</a>, a proposed DNS standard — co-authored by engineers from Cloudflare, Apple, and Fastly — that separates IP addresses from DNS queries, so that no single entity can see both at the same time. In other words, ODoH means, for example, that no single entity can see that IP address 198.51.100.28 sent an access request to the website example.com.</p></li><li><p><a href="/introducing-universal-ssl/">Universal SSL</a> (now called Transport Layer Security), which we made available to all of our customers, paying and free. Supporting SSL means that we support encrypting the content of web pages, which had previously been sent as plain text over the Internet. It’s like sending your private, personal information in a locked box instead of on a postcard.</p></li></ul>
    <div>
      <h2>Building Trust</h2>
      <a href="#building-trust">
        
      </a>
    </div>
    <p>Cloudflare’s subscription-based business model has always been about offering an incredible suite of products that help make the Internet faster, more efficient, more secure, and more private for our users. Our business model has never been about selling users’ data or tracking individuals as they go about their digital lives. We don’t think people should have to trade their private information just to get access to Internet applications. We work every day to earn and maintain our users’ trust by respecting their right to privacy in their personal data as it transits our network, and by being transparent about how we handle and secure that data. You can find out more about the policies, privacy-enhancing technologies, and certifications that help us earn that trust by visiting the Cloudflare Trust Hub at <a href="https://www.cloudflare.com/trust-hub/">www.cloudflare.com/trust-hub</a>.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><hr /><p><sup>[1]</sup> The GDPR defines a “data controller” as the “natural or legal person (...) or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data”; and a “data processor” as “a natural or legal person (...) which processes personal data on behalf of the controller.”</p> ]]></content:encoded>
            <category><![CDATA[Impact Week]]></category>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Human Rights]]></category>
            <category><![CDATA[Certification]]></category>
            <guid isPermaLink="false">66GXcVU4ItvUEpqzqT7dOL</guid>
            <dc:creator>Emily Hancock</dc:creator>
            <dc:creator>Rory Malone</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare obtains new ISO/IEC 27701:2019 privacy certification and what that means for you]]></title>
            <link>https://blog.cloudflare.com/iso-27701-privacy-certification/</link>
            <pubDate>Wed, 21 Apr 2021 13:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is one of the first organisations in our industry to have achieved ISO/IEC 27701:2019 certification, and the first web performance & security company to be certified to the new ISO privacy standard as both a data processor and controller. ]]></description>
            <content:encoded><![CDATA[ <p></p><p><i>Cloudflare is one of the first organizations in our industry to have achieved ISO/IEC 27701:2019 certification, and the first web performance &amp; security company to be certified to the new ISO privacy standard as both a data processor and controller.</i></p><p>Providing transparency into our privacy practices has always been a priority for us. We think it is important that we do more than talk about our commitment to privacy — we are continually looking for ways to demonstrate that commitment. For example, after we launched the Internet's <a href="https://www.dnsperf.com/#!dns-resolvers">fastest</a>, privacy-first public DNS resolver, 1.1.1.1, we didn’t just publish our commitments to our public resolver users, we engaged an independent firm to make sure we were meeting our commitments, and we blogged about it, publishing <a href="https://www.cloudflare.com/compliance/">their report</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3FlwTPYxCLY4MaxDc4Z3LO/06eadd15c0e93acce0cd9ee2c804dca6/image1-32.png" />
            
            </figure><p>Following in that tradition, today we’re excited to announce that Cloudflare has been certified to a new international privacy standard for protecting and managing the processing of personal data — ISO/IEC 27701:2019. The standard is designed such that the requirements organizations must meet to become certified are very closely aligned to the requirements in the EU’s General Data Protection Regulation (“GDPR”). So this certification provides assurance to our customers that a third party has independently verified that Cloudflare’s privacy program meets GDPR-aligned industry standards.</p>
    <div>
      <h3>What is ISO/IEC 27701:2019?</h3>
      <a href="#what-is-iso-iec-27701-2019">
        
      </a>
    </div>
    <p>The International Organization for Standardization (“ISO”) is an international, nongovernmental organization made up of national standards bodies that develops and publishes a wide range of proprietary, industrial, and commercial standards. In August 2019, ISO published <a href="https://www.iso.org/standard/71670.html">ISO/IEC 27701:2019</a> (“ISO 27701”), a new international privacy standard about protecting and managing the processing of personal data.</p><p>This new standard is a privacy extension to the existing and widespread industry standards ISO/IEC 27001 and ISO/IEC 27002, which were first published by ISO in 2005. They describe how to establish and run an Information Security Management System (“ISMS”), and <a href="https://www.iso.org/the-iso-survey.html">ISO now reports</a> that over 36,000 organizations in 131 countries are currently independently certified as meeting ISO/IEC 27001. Audited ISO certifications are awarded to organizations that have been assessed by an independent, external auditor to meet a specific, published standard. Auditors are also accredited themselves — with the ISO 27000 series of certifications, to published international ISO standards, too.</p><p>The ISO 27701 extension to the ISO/IEC 27001 and ISO/IEC 27002 standards is less than two years old and adapts the ISMS management system concept into the creation of a Privacy Information Management System (“PIMS”). There are requirements to make sure this privacy management system is robust and is also continually improving to meet its defined objectives.</p><p>We are excited about this new certification because ISO 27701 maps to the requirements of the GDPR, the EU’s benchmark-setting, comprehensive data protection regulation. Article 42 of the GDPR encourages:</p><blockquote><p><i>...the establishment of data protection certification mechanisms and of data protection seals and marks, for the purpose of demonstrating compliance with this Regulation of processing operations by controllers and processors.</i></p></blockquote><p>While Article 42 calls for the development of GDPR certifications, no such official certifications exist yet because none have been approved by either of the official bodies — the European Data Protection Board in the EU, or the UK’s Information Commissioner’s Office in respect of the UK GDPR. However, when the ISO 27701 standard was published, it contained an Annex D detailing how the standard maps to the GDPR:</p><blockquote><p><i>This annex gives an indicative mapping between provisions of this document and Articles 5 to 49 except 43 of the General Data Protection Regulation of the European Union. It shows how compliance to requirements and controls of this document can be relevant to fulfil obligations of GDPR.</i></p></blockquote><p>ISO standards often map to — and frequently reference — other international ISO standards, but it’s unusual for them to map to non-ISO standards, especially to one particular region’s regulations. So until the GDPR regulatory bodies adopt an official certification mechanism, ISO 27701 provides an excellent way to demonstrate externally-audited compliance with the regulation.</p>
    <div>
      <h3>What does ISO 27701 mean to Cloudflare customers?</h3>
      <a href="#what-does-iso-27701-mean-to-cloudflare-customers">
        
      </a>
    </div>
    <p>Put simply, the ISO 27701 certification provides assurance to our customers that we have a privacy program that has been assessed by a third party to meet an international industry standard aligned to the GDPR, and that requires us to keep our privacy program under continuous compliance. This certification, in addition to the <a href="https://www.cloudflare.com/resources/assets/slt3lc6tev37/1M1j5uuFDuLTYiZJJDPBag/bda8d591447971b3df2bccf5aa4e0916/Customer_DPA_v.3_1_-_en_1_Oct_2020.pdf">Data Processing Addendum</a> (“DPA”) we make available to our customers in the dashboard, offers our customers multiple layers of assurance that any personal data that Cloudflare processes will be handled in a way that meets the GDPR’s requirements.</p><p><i>Let us do a deeper dive into some of the requirements under ISO 27701</i>The standard contains 31 controls identified for organizations that are personal data controllers, and 18 additional controls identified for organizations that are personal data processors. As Cloudflare’s scope is certifying as both a personal data controller and as a personal data processor of customer information, we had to meet all 49 of these controls.</p><p>The controls are essentially a set of best practices that data controllers and processors must meet in terms of data handling practices and transparency about those practices, documenting a legal basis for processing and for transfer of data to third countries (outside the EU), and handling data subject rights, among others.</p><blockquote><p>Example Requirement 1:<i>Organizations should maintain policy and document specific procedures related to the international transfer of personal data.</i></p></blockquote><p>Cloudflare has implemented this requirement by maintaining an internal policy restricting the transfer of personal data between jurisdictions unless that transfer meets defined criteria. Customers, whether free or paid, enter into a standard Data Processing Addendum with Cloudflare which is available on the <a href="https://dash.cloudflare.com/login">Cloudflare Customer Dashboard</a> and which sets out the restrictions we must adhere to when processing personal data on behalf of customers, including when transferring personal data between jurisdictions. Additionally, Cloudflare publishes <a href="https://www.cloudflare.com/gdpr/subprocessors/">a list of sub-processors</a> that we may use when processing personal data, and in which countries or jurisdictions that processing may take place.</p><blockquote><p>Example Requirement 2:<i>Organizations should maintain documented personal data minimization objectives, including what mechanisms are used to meet those objectives.</i></p></blockquote><p>Cloudflare maintains internal policies on how we manage data throughout its full lifecycle, including data minimization objectives. In fact, our commitment to privacy starts with the objective of minimizing personal data. That’s why, if we don’t have to collect certain personal data in order to deliver our service to customers, we’d prefer not to collect it at all in the first place. Where we do have to, we collect the minimum amount necessary to achieve the identified purpose and process it for the minimum amount necessary, transparently documenting the processing in our public <a href="https://www.cloudflare.com/privacypolicy/">privacy policy</a>.</p><p>We’re also proud to have developed a Privacy by Design policy, which rigorously sets out the high-standards and evaluations that must be undertaken if products and services are to collect and process personal data. We use these mechanisms to ensure our collection and use of personal data is limited and <a href="https://www.cloudflare.com/gdpr/introduction/">transparently documented</a>.</p>
    <div>
      <h3>Cloudflare achieves ISO 27701:2019 Certification</h3>
      <a href="#cloudflare-achieves-iso-27701-2019-certification">
        
      </a>
    </div>
    <p>Cloudflare’s PIMS was assessed by a third-party auditor, A-LIGN in March 2021. Certifying to the ISO 27701 privacy standard is a multi-step process that includes:</p><ul><li><p>understanding and planning for the standard;</p></li><li><p>identifying and adapting the controls the organisation will implement;</p></li><li><p>internally auditing against the requirements;  and</p></li><li><p>externally auditing against the standard (itself a two-stage process)</p></li></ul><p>before finally being certified against the standard by the independent auditor. Once certified, the privacy management system is continually evaluated and improved, with internal and external audits on an ongoing annual basis.</p><p>Cloudflare has been certified as both a data processor and as a data controller of customer information.[¹] This means that Cloudflare is one of the first organisations in our industry to have achieved this standard, and the first web performance &amp; security company to be certified to ISO 27701 as both a data controller and processor. Alongside Cloudflare’s existing ISO 27001:2013 certificate, Cloudflare’s new ISO 27701:2019 certificate is now available for customers to request from their sales representative.</p>
    <div>
      <h3>Cloudflare Certifications</h3>
      <a href="#cloudflare-certifications">
        
      </a>
    </div>
    <p>For more information about our certifications and reports, please visit our privacy and compliance pages — <a href="http://www.cloudflare.com/compliance">www.cloudflare.com/compliance</a>. You can also reach us at <a>compliance@cloudflare.com</a> for any questions.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><hr /><p>[1]The GDPR defines a “data controller” as the “natural or legal person . . . or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data”; and a “data processor” as “a natural or legal person . . . which processes personal data on behalf of the controller.”</p> ]]></content:encoded>
            <category><![CDATA[Certification]]></category>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Compliance]]></category>
            <category><![CDATA[GDPR]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4S1OVCOuwAARsUz5utLbFB</guid>
            <dc:creator>Rory Malone</dc:creator>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Data Privacy Day 2021 - Looking ahead at the always on, always secure, always private Internet]]></title>
            <link>https://blog.cloudflare.com/data-privacy-day-2021-looking-ahead-at-the-always-on-always-secure-always-private-internet/</link>
            <pubDate>Thu, 28 Jan 2021 09:00:00 GMT</pubDate>
            <description><![CDATA[ 2020 was a big year for data protection, so what does 2021 have in store? On Data Privacy Day, we talk about the role data localization and encryption technologies play in data protection. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Welcome to Data Privacy Day 2021! Last year at this time, I was writing about how <a href="/empowering-your-privacy/">Cloudflare builds privacy into everything we do</a>, with little idea about how dramatically the world was going to change. The tragedy of the COVID-19 pandemic has reshaped the way we go about our daily lives. Our dependence on the Internet grew exponentially in 2020 as we started working from home, attending school from home, and participating in online weddings, concerts, parties, and more. So as we begin this new year, it’s impossible to think about data privacy in 2021 without thinking about how an <a href="/internet-privacy/">always-on, always secure, always private Internet</a> is more important than ever.</p><p>The pandemic wasn’t the only thing to dramatically shape data privacy conversations last year. We saw a flurry of new activity on data protection legislation around the globe, and a trend toward data localization in a variety of jurisdictions.</p><p>I don’t think I’m taking any risks when I say that 2021 looks to be another busy year in the world of privacy and data protection. Let me tell you a bit about what that looks like for us at Cloudflare. We’ll be spending a lot of time in 2021 helping our customers find the solutions they need to meet data protection obligations; enhancing our technical, organizational, and contractual measures to protect the privacy of personal data no matter where in the world it is processed; and continuing to develop privacy-enhancing technologies that can help everyone on the Internet.</p>
    <div>
      <h3>Focus on International Data Transfers</h3>
      <a href="#focus-on-international-data-transfers">
        
      </a>
    </div>
    <p>One of the biggest stories in data protection in 2020 was the Court of Justice of the European Union’s decision in the “Schrems II” case (Case C-311/18, <i>Data Protection Commissioner v Facebook Ireland and Maximillian Schrems</i>) that invalidated the EU-U.S. Privacy Shield. The court’s interpretation of U.S. surveillance laws meant that data controllers transferring EU personal data to U.S. data processors now have an obligation to make sure additional safeguards are in place to provide the same level of data protection as the General Data Protection Regulation (“GDPR”).</p><p>The court decision was followed by draft guidance from the European Data Protection Board (EDPB) that created new expectations and challenges for transfers of EU personal data to processors outside the EU pursuant to the GDPR. In addition, the EU Commission issued new draft standard contractual clauses that further emphasized the need for data transfer impact assessments and due diligence to be completed prior to transferring EU personal data to processors outside the EU. Meanwhile, even before the EDPB and EU Commission weighed in, France’s data protection authority, the CNIL, challenged the use of a U.S. cloud service provider for the processing of certain health data.</p><p>This year, the EDPB is poised to issue its final guidance on international data transfers, the EU Commission is set to release a final version of new standard contractual clauses, and the new Biden administration in the United States has already appointed a deputy assistant secretary for services at the U.S. Department of Commerce who will focus on negotiations around a new EU-U.S. Privacy Shield or another data transfer mechanism.</p><p>However, the trend to regulate international data transfers isn’t confined to Europe. India’s Personal Data Protection Bill, likely to become law in 2021, would bar certain types of personal data from leaving India. And Brazil’s Lei Geral de Proteção de Dados (**“**LGPD”), which went into effect in 2020, contains requirements for contractual guarantees that need to be in place for personal data to be processed outside Brazil.</p><p>Meanwhile, we’re seeing more data protection regulation across the globe: The California Consumer Privacy Act (“CCPA”) was amended by a new ballot initiative last year. Countries like Japan, China, Singapore, Canada, and New Zealand, that already had data protection legislation in some form, proposed or enacted amendments to strengthen those protections. And even the United States is considering comprehensive Federal data privacy regulation.</p><p>In light of last year’s developments and those we expect to see in 2021, Cloudflare is thinking a lot about what it means to process personal data outside its home jurisdiction. One of the key messages to come out of Europe in the second half of 2020 was the idea that to be able to transfer EU personal data to the United States, data processors would have to provide additional safeguards to ensure GDPR-level protection for personal data, even in light of the application of U.S. surveillance laws. While we are eagerly awaiting the EDPB’s final guidance on the subject, we aren’t waiting to ensure that we have in place the necessary additional safeguards.</p><p>In fact, Cloudflare has long maintained policies to address concerns about access to personal data. We’ve done so because we believe it’s the right thing to do, and because the conflicts of law we are seeing today seemed inevitable. We feel so strongly about our ability to provide that level of protection for data processed in the U.S., that today we are publishing a paper, “<a href="https://www.cloudflare.com/privacy-and-compliance/">Cloudflare’s Policies around Data Privacy and Law Enforcement Requests</a>,” to describe how we address government and other legal requests for data.</p><p>Our paper describes our policies around data privacy and data requests, such as providing notice to our customers of any legal process requesting their data, and the measures we take to push back on any legal process requesting data where we believe that legal process creates a conflict of law. The paper also describes our public commitments about how we approach requests for data and public statements about things we have never done and, in CEO Matthew Prince’s words, that we “will fight like hell to never do”:</p><ul><li><p>Cloudflare has never turned over our encryption or authentication keys or our customers' encryption or authentication keys to anyone.</p></li><li><p>Cloudflare has never installed any law enforcement software or equipment anywhere on our network.</p></li><li><p>Cloudflare has never provided any law enforcement organization a feed of our customers' content transiting our network.</p></li><li><p>Cloudflare has never modified customer content at the request of law enforcement or another third party.</p></li></ul><p>In 2021, the Cloudflare team will continue to focus on these safeguards to protect <i>all</i> our customers’ personal data.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4JH1gTlP1F84hlrmh5OUFx/9ceda58d8ba871c492d3db08837b56a4/image4-22.png" />
            
            </figure>
    <div>
      <h3>Addressing Data Localization Challenges</h3>
      <a href="#addressing-data-localization-challenges">
        
      </a>
    </div>
    <p>We also recognize that attention to international data transfers isn’t just a jurisdictional issue. Even if jurisdictions don’t require data localization by law, highly regulated industries like banking and healthcare may adopt best practice guidance asserting more requirements for data if it is to be processed outside a data subject’s home country.</p><p>With so much activity around data localization trends and international data transfers, companies will continue to struggle to understand regulatory requirements, as well as update products and business processes to meet those requirements and trends. So while we believe that Cloudflare can provide adequate protections for this data regardless of whether it is processed inside or outside its jurisdiction of origin, we also recognize that our customers are dealing with unique compliance challenges that we can help them face.</p><p>That means that this year we’ll also continue the work we started with our <a href="https://www.cloudflare.com/data-localization/">Cloudflare Data Localization Suite</a>, which we announced during our Privacy &amp; Compliance Week in December 2020. The Data Localization Suite is designed to help customers build local requirements into their global online operations. We help our customers ensure that their data stays as private as they want it to, and only goes where they want it to go in the following ways:</p><ol><li><p>DDoS attacks are detected and mitigated at the data center closest to the end user.</p></li><li><p>Data centers inside the preferred region decrypt TLS and apply services like <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a>, CDN, and Cloudflare Workers.</p></li><li><p>Keyless SSL and Geo Key Manager store private SSL keys in a user-specified region.</p></li><li><p>Edge Log Delivery securely transmits logs from the inspection point to the log storage location of your choice.</p></li></ol>
    <div>
      <h3>Doubling Down on Privacy-Enhancing Technologies</h3>
      <a href="#doubling-down-on-privacy-enhancing-technologies">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to “Help Build a Better Internet,” and we’ve said repeatedly that a privacy-respecting Internet is a better Internet. We believe in empowering individuals and entities of all sizes with technological tools to reduce the amount of personal data that gets funnelled into the data ocean — regardless of whether someone lives in a country with laws protecting the privacy of their personal data. If we can build tools to help individuals share less personal data online, then that’s a win for privacy no matter what their country of residence.</p><p>For example, when Cloudflare launched the  <a href="/announcing-1111/">1.1.1.1 public DNS resolver</a> — the Internet's <a href="https://www.dnsperf.com/#!dns-resolvers">fastest</a>, privacy-first public DNS resolver — we committed to our public resolver users that we would not retain any personal data about requests made using our 1.1.1.1 resolver. And because we baked anonymization best practices into the 1.1.1.1 resolver when we built it, we were able to demonstrate that we didn’t have any personal data to sell when we asked independent accountants to conduct a <a href="/announcing-the-results-of-the-1-1-1-1-public-dns-resolver-privacy-examination/">privacy examination</a> of the 1.1.1.1 resolver.</p><p>2021 will also see a continuation of a number of initiatives that we <a href="/next-generation-privacy-protocols/">announced</a> during Privacy and Compliance Week that are aimed at improving Internet protocols related to user privacy:</p><ol><li><p>Fixing one of the last information leaks in HTTPS through Encrypted Client Hello (ECH), the evolution of Encrypted SNI.</p></li><li><p>Developing a superior protocol for password authentication, OPAQUE, that makes password breaches less likely to occur.</p></li><li><p>Making DNS even more private by supporting Oblivious DNS-over-HTTPS (ODoH).</p></li></ol>
    <div>
      <h3>Encrypted Client Hello (ECH)</h3>
      <a href="#encrypted-client-hello-ech">
        
      </a>
    </div>
    <p>Under the old TLS handshake, privacy-sensitive parameters were negotiated completely in the clear and available to network observers. One example is the Server Name Indication (SNI), used by the client to indicate to the server the website it wants to reach — this is not information that should be exposed to eavesdroppers. Previously, this problem was mitigated through the Encrypted SNI (ESNI) extension. While ESNI took a significant step forward, it is an incomplete solution; a major shortcoming is that it protects only SNI. The <a href="/encrypted-client-hello/">Encrypted Client Hello (ECH)</a> extension aims to close this gap by enabling encryption of the entire ClientHello, thereby protecting <b>all</b> privacy-sensitive handshake parameters. These changes represent a significant upgrade to TLS, one that will help preserve end-user privacy as the protocol continues to evolve. As this work continues, Cloudflare is committed to doing its part, along with close collaborators in the standards process, to ensure this important upgrade for TLS reaches Internet-scale deployment.</p>
    <div>
      <h3>OPAQUE</h3>
      <a href="#opaque">
        
      </a>
    </div>
    <p>Research has repeatedly shown that passwords are hard for users to manage — and they are also a challenge for servers: passwords are difficult to store securely, they’re frequently leaked and subsequently brute-forced. As long as people still use passwords, we’d like to make the process as secure as possible. Current methods rely on the risky practice of handling plaintext passwords on the server side while checking their correctness. One potential alternative is to use <a href="/opaque-oblivious-passwords/">OPAQUE</a>, an asymmetric Password-Authenticated Key Exchange (aPAKE) protocol that allows secure password login without ever letting the server see the passwords.</p><p>With OPAQUE, instead of storing a traditional salted password hash, the server stores a secret envelope associated with the user that is “locked” by two pieces of information: the user’s password (known only by the user), and a random secret key (known only by the server). To log in, the client initiates a cryptographic exchange that reveals the envelope key only to the client (but not to the server). The server then sends this envelope to the user, who now can retrieve the encrypted keys. Once those keys are unlocked, they will serve as parameters for an Authenticated Key Exchange (AKE) protocol, which establishes a secret key for encrypting future communications.</p><p>Cloudflare has been pushing the development of OPAQUE forward, and has released a reference core OPAQUE <a href="https://github.com/cloudflare/opaque-core">implementation in Go</a> and a demo <a href="https://github.com/cloudflare/opaque-ea">TLS integration</a> (with a <a href="https://opaque.research.cloudflare.com/">running version</a> you can try out). A Typescript client implementation of OPAQUE is coming soon.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/HUVstGR6Lt0JnL529KyST/885a9e432adb78dd8a54c4c4fc5e2934/image1-38.png" />
            
            </figure>
    <div>
      <h3>Oblivious DNS-over-HTTPS (ODoH)</h3>
      <a href="#oblivious-dns-over-https-odoh">
        
      </a>
    </div>
    <p>Encryption is a powerful tool that protects the privacy of personal data. This is why Cloudflare has doubled down on its implementation of <a href="/dns-encryption-explained/">DNS over HTTPS (DoH)</a>. In the snail mail world, courts have long recognized a distinction between the level of privacy afforded to the contents of a letter vs. the addressing information on an envelope. But we’re not living in an age where the only thing someone can tell from the outside of the envelope are the “to” and “from” addresses and place of postage. The “digital envelopes” of DNS requests can contain much more information about a person than one might expect. Not only is there information about the sender and recipient addresses, but there is specific timestamp information about when requests were submitted, the domains and subdomains visited, and even how long someone stayed on a certain site. Encrypting those requests ensures that only the user and the resolver get that information, and that no one involved in the transit in between sees it. Given that our digital envelopes tell a much more robust story than the envelope in your physical mailbox, we think encrypting these envelopes is just as important as encrypting the messages they carry.</p><p>However, there are more ways in which DNS privacy can be enhanced, and Cloudflare took another incremental step in December 2020 by <a href="/oblivious-dns/">announcing support for Oblivious DoH (ODoH)</a>. ODoH is a proposed DNS standard — co-authored by engineers from Cloudflare, Apple, and Fastly — that separates IP addresses from queries, so that no single entity can see both at the same time. ODoH requires a proxy as a key part of the communication path between client and resolver, with encryption ensuring that the proxy does not know the contents of the DNS query (only where to send it), and the resolver knowing what the query is but not who originally requested it (only the proxy’s IP address). Barring collusion between the proxy and the resolver, the identity of the requester and the content of the request are unlinkable.</p><p>As with DoH, successful deployment requires partners. A key component of ODoH is a proxy that is disjoint from the target resolver. Cloudflare is working with several leading proxy partners — currently PCCW, SURF, and Equinix — who are equally committed to privacy, and hopes to see this list grow.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7sNi1Sbcfs9uDZntGHHXQV/638feb2a6ca942f20b6ffafea5686fe1/image2-21.png" />
            
            </figure>
    <div>
      <h3><b>Post-Quantum Cryptography</b></h3>
      <a href="#post-quantum-cryptography">
        
      </a>
    </div>
    <p>Even with all of these encryption measures, we also know that everything encrypted with today’s public key cryptography can likely be decrypted with tomorrow’s quantum computers. This makes deploying <a href="https://www.cloudflare.com/learning/ssl/quantum/what-is-post-quantum-cryptography/">post-quantum cryptography</a> a pressing privacy concern. We’re likely 10 to 15 years away from that development, but as our Head of Research Nick Sullivan described in his <a href="/securing-the-post-quantum-world/">blog post in December</a>, we’re not waiting for that future. We’ve been paying close attention to the <a href="https://csrc.nist.gov/Projects/Post-Quantum-Cryptography">National Institute of Standards and Technology (NIST)</a>’s initiative to define post-quantum cryptography algorithms to replace RSA and ECC. Last year, Cloudflare and Google performed the <a href="/the-tls-post-quantum-experiment/">TLS Post-Quantum Experiment</a>, which involved implementing and supporting new key exchange mechanisms based on post-quantum cryptography for all Cloudflare customers for a period of a few months.</p><p>In addition, Cloudflare’s Research Team has been working with researchers from the University of Waterloo and Radboud University on a new protocol called <a href="/kemtls-post-quantum-tls-without-signatures/">KEMTLS</a>. KEMTLS is designed to be fully post-quantum and relies only on public-key encryption. On the implementation side, Cloudflare has developed high-speed assembly versions of several of the NIST finalists (Kyber, Dilithium), as well as other relevant post-quantum algorithms (CSIDH, SIDH) in our CIRCL cryptography library written in Go. Cloudflare is endeavoring to use post-quantum cryptography for most internal services by the end of 2021, and plans to be among the first services to offer post-quantum cipher suites to customers as standards emerge.</p>
    <div>
      <h3>Looking forward to 2021</h3>
      <a href="#looking-forward-to-2021">
        
      </a>
    </div>
    <p>If there’s anything 2020 taught us, it’s that our world can change almost overnight. One thing that doesn’t change, though, is that people will always want privacy for their personal data, and regulators will continue to define rules and requirements for what data protection should look like. And as these rules and requirements evolve, Cloudflare will be there every step of the way, developing innovative product and security solutions to protect data, and building privacy into everything we do.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><p></p> ]]></content:encoded>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Data Localization]]></category>
            <guid isPermaLink="false">2obgCaLFacucryYIYVWfXX</guid>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Empowering Your Privacy]]></title>
            <link>https://blog.cloudflare.com/empowering-your-privacy/</link>
            <pubDate>Tue, 28 Jan 2020 08:00:00 GMT</pubDate>
            <description><![CDATA[ Happy Data Privacy Day! At Cloudflare, our mission is to help build a better Internet, and we believe data privacy is core to that mission. But we know words are cheap — even data brokers who sell your personal information will tell you that “privacy is important” to them.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Happy Data Privacy Day! At Cloudflare, our mission is to help build a better Internet, and we believe data privacy is core to that mission. But we know words are cheap — even data brokers who sell your personal information will tell you that “privacy is important” to them. So we wanted to take the opportunity on this Data Privacy Day to show you how our commitment to privacy crosses all levels of the work we do at Cloudflare to help make the Internet more private and secure — and therefore better — for everyone.</p><p>Privacy on the Internet means different things to different people. Maybe privacy means you get to control your personal data — who can collect it and how it can be used. Or that you have the right to access and delete your personal information. Or maybe it means your online life is protected from government surveillance or from ad trackers and targeted advertising. Maybe you think you should be able to be completely anonymous online. At Cloudflare, we think all these flavors of privacy are equally important, and as we describe in more detail below, we’ve taken steps to address each of these privacy priorities.</p><p>Governments don’t necessarily take the same view on what privacy should mean either. Europe has its General Data Protection Regulation (GDPR), under which people have the right to control how their information is used, and the protection of data is a fundamental right under the EU Charter of Fundamental Rights. The United States takes a consumer-centric approach focusing on deceptive use of information, the sale of information, and privacy from unwarranted government surveillance. Brazil’s privacy law is similar to that of Europe’s, and Canada, New Zealand, Japan, Australia, China, and Singapore (to name a few) have some variation on the theme of a national, comprehensive privacy law.</p><p>Rather than viewing privacy of personal data as an ocean of data to be regulated through the lens of any particular government, we think privacy merits a different approach. To begin with, we don’t think there should be an ocean of personal data. We believe in empowering individuals and entities of all sizes with technological tools to reduce the amount of personal data that gets funneled into the data ocean — regardless of whether you live in a country with laws protecting the privacy of your personal data. If we can build tools to help you share less personal data online, then that’s a win for privacy no matter your privacy priorities or country of residence.</p>
    <div>
      <h3>Technologies that Enable the Privacy of Personal Data</h3>
      <a href="#technologies-that-enable-the-privacy-of-personal-data">
        
      </a>
    </div>
    <p>We’ve said it <a href="https://www.sec.gov/Archives/edgar/data/1477333/000119312519222176/d735023ds1.htm">before</a> — the Internet was not built with privacy and security in mind. But as the Internet has become more essential to daily life and more central to even the most critical corporate and government systems, the world has needed better tools to provide privacy and security for these online functions. When we talk about building a better Internet, for us that means (re)building the Internet with privacy baked in. Since Cloudflare launched in 2010, we’ve released a number of state-of-the-art, privacy-enhancing technologies that can help individuals, businesses, and governments alike:</p><ul><li><p><b>Universal SSL</b>: In 2014, there were 2 million websites that supported encrypted connections. In September of that year we <a href="/introducing-universal-ssl/">introduced universal SSL</a> (now called Transport Layer Security) for all of our customers, paying and free, and overnight we were able to make SSL easily available at scale to the millions of websites that use Cloudflare. Supporting SSL means that we support encrypting the content of web pages, which had previously been sent as plain text over the Internet. It’s like sending your private, personal information in a locked box instead of on a postcard.</p></li><li><p><b>Privacy Pass</b>: Cloudflare supports <a href="/cloudflare-supports-privacy-pass/">Privacy Pass</a>, which lets users prove their identity across multiple sites anonymously without enabling tracking. When people use anonymity services or shared IPs, it makes it more difficult for <a href="https://www.cloudflare.com/learning/security/how-to-secure-a-website/">website protection services</a> like Cloudflare to identify their requests as coming from legitimate users and not bots. To help reduce the friction for these users — which include some of the most vulnerable users online — Privacy Pass provides them with a way to prove they are legitimate across multiple sites on the Cloudflare network. This is done without revealing their identity, and without exposing Cloudflare customers to additional threats from malicious bots.</p></li><li><p><b>ESNI</b>: We announced beta support for encrypted Server Name Identification (ESNI) in 2018. Server Name Identification (SNI) was created to allow multiple websites to exist on the same IP address (something that became necessary with the <a href="/amazon-2bn-ipv4-tax-how-avoid-paying">shortage of IPv4 addresses</a>), but it can reveal which websites users are visiting. As described <a href="/esni/">here</a>, ESNI encrypts the SNI, fixing what has been a glaring privacy hole.</p></li><li><p><b>1.1.1.1 Public DNS Resolver</b>: In 2018, <a href="/announcing-1111/">we announced</a> our public privacy-focused resolver, the 1.1.1.1 Public DNS Resolver (which also turned out to be the world’s fastest public DNS resolver). It was our first consumer product, it’s free, and we built it because we believe that consumers should have the ability to browse the Internet without providers in the middle monitoring user activity. So our public DNS resolver service will never store 1.1.1.1 public DNS resolver users’ IP addresses (referred to as the source IP address) in non-volatile storage, and we anonymize the source IP addresses of 1.1.1.1 public DNS resolver users before logging any data. This way, we have no information about what website a specific user has looked up using the 1.1.1.1 Public DNS Resolver service. We can’t tell who is visiting any given website, and we don’t want to know.</p></li><li><p><b>DNS over HTTPS (DoH)</b>: Using the 1.1.1.1 Public DNS Resolver means that your ISP won’t get all of your browsing data from acting as your DNS resolver, but they will still get it from provisioning those requests unless you encrypt that channel. For those reasons, we added support for <a href="/dns-encryption-explained/">DoH</a>. DNS requests can contain some alarmingly personal data, such as your location, the domains and subdomains you have visited, the time of day requests were submitted, and how long you stayed on certain sites. Encrypting those requests ensures that only the user and the resolver get that information, and that no one involved in the transit in between sees it. In addition to DoH, we’ve partnered with Mozilla to support private web browsing in Firefox. We have also employed query minimization to ensure that those who don't need to access the full URL you are requesting, simply don’t.</p></li><li><p><b>1.1.1.1 Mobile Application with WARP</b>: People are accessing the Internet from their mobile devices more and more, so in 2019 we launched our <a href="/announcing-warp-plus/">1.1.1.1 Mobile Application with WARP</a>. You can enable our mobile application in DNS-only mode to ensure that all of your mobile device's DNS queries are sent to our 1.1.1.1 Public DNS Resolver using either DNS over HTTPS or DNS over TLS. You can also enable WARP in our mobile application, which includes everything from our DNS-only mode and will also route traffic from your device through the Cloudflare network via encrypted tunnels. This means that even if you are accessing websites or mobile applications that are not using HTTPS, the content transmitted to and from your device will be encrypted if you have WARP enabled and will not be sent as plain text over the Internet.  </p></li></ul>
    <div>
      <h3>How We Do Privacy at Cloudflare</h3>
      <a href="#how-we-do-privacy-at-cloudflare">
        
      </a>
    </div>
    <p>The privacy-enhancing technologies we build are public examples of how we put our money where our mouth is when it comes to privacy. We also want to tell you about the ways — some public, some not — we infuse privacy principles at all levels at Cloudflare.</p><ul><li><p><b>Employee Education and Mindset</b>: An understanding of privacy is core to a Cloudflare employee’s experience right from the start. Employees learn about the role privacy and security play in helping to build a better Internet in their first week at Cloudflare. During the comprehensive employee orientation, we stress the role each employee plays in keeping the company and our customers secure. All employees are required to take annual data protection training, which introduces employees to the fundamentals of the <a href="https://www.worldprivacyforum.org/2008/01/report-a-brief-introduction-to-fair-information-practices/">Fair Information Practices</a> (FIPs), GDPR and other applicable laws, and we do targeted training for individual teams, depending on their engagement with personal data, throughout the year.</p></li><li><p><b>Privacy in Product Development</b>: We have built the FIPs and GDPR requirements into product development. Cloudflare employees take privacy-by-design seriously. We develop products and processes with the principles of data minimization, purpose limitation, and data security always front of mind. We have a product development lifecycle that includes performing privacy impact assessments when we may process personal data. We retain personal data we process for as short a time as necessary to provide our services to our customers. We do not cross-track individual Internet users across sites. We don’t sell personal information. We don’t monetize DNS requests. We detect, deter, and deflect bad actors — we’re not in the business of looking at what any one person (or more specifically, browser) is doing when they browse the Internet. That’s not what we’re about.</p></li><li><p><b>Internal Compliance with Privacy Regulations</b>: Even before Europe’s watershed GDPR went into effect in 2018 and the California Consumer Privacy Act (CCPA) took effect earlier this month, we were focusing on how to implement the privacy principles embodied in regulations globally. A key part of this has been to minimize our collection of personal data and to only use personal data for the purpose for which it was collected. We view the GDPR and CCPA as a codification of many of the steps we were already taking: only collect the personal data you need to provide the service you’re offering; don’t sell personal information; give people the ability to access, correct, or delete their personal information; and give our customers control over the information that, for example, is cached on our <a href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/">content delivery network (CDN)</a>, stored in Workers Key Value Store, or captured by our <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">web application firewall (WAF)</a>.</p></li><li><p><b>Security as a Means to Enhance Privacy</b>: We’re a security company, so naturally we view security as a critical element of ensuring data privacy. In addition to the extensive internal security mechanisms we have in place to protect our customers’ data, we also have become certified under industry standards to demonstrate our commitment to data security. <a href="https://www.cloudflare.com/compliance/">We are ISO 27001 and AICPA SOC 2 Type II certified</a>. Cloudflare's SOC 2 Type II report covers security, confidentiality, and availability controls to protect customer data. We also maintain a SOC 3 report which is the public report of Security, Confidentiality, and Availability controls. In addition to this, we comply with our obligations under the EU Directive on Security of Network and Information Systems (NIS).</p></li><li><p><b>Privacy-focused Response to Government and Third-Party Requests for Information</b>: Our respect for our customers' privacy applies with equal force to commercial requests and to government or law enforcement requests. Any law enforcement requests that we receive must strictly adhere to the due process of law and be subject to judicial oversight. We believe that U.S. law enforcement requests for the personal data of a non-U.S. person that conflict with the privacy laws of that person’s country of residence (such as the EU GDPR) should be legally challenged. Consistent with both the <a href="https://www.justice.gov/dag/cloudact">U.S. CLOUD Act</a> and the proceedings in the <a href="https://www.scotusblog.com/case-files/cases/united-states-v-microsoft-corp/">Microsoft Ireland</a> case,  providers like Cloudflare may ask U.S. courts to quash requests from U.S. law enforcement based on such a conflict. In addition, it is our policy to notify our customers of a subpoena or other legal process requesting their customer or billing information before disclosure of that information, whether the legal process comes from the government or private parties involved in civil litigation, unless legally prohibited. We also publicly report on the types of requests we receive, as well as our responses, in our semi-annual  <a href="https://www.cloudflare.com/transparency/updates/">Transparency Report</a>. Finally, we publicly list certain types of actions that Cloudflare has never taken in response to government requests, and we commit that if Cloudflare were asked to do any of the things on this list, we would exhaust all legal remedies in order to protect our customers from what we believe are illegal or unconstitutional requests.</p></li><li><p><b>Bringing Privacy and Security to Vulnerable Entities (Project Galileo)</b>: Since 2014, we have been providing a wide range of security products to important, yet vulnerable, voices on the internet with <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>. Privacy is essential to the more than 900 organizations receiving free services under the Project, as many face threats from powerful adversaries. These organizations range from humanitarian groups and non-profit organizations, to journalism and media sites that are repeatedly flooded with malicious attacks in an attempt to knock them offline.</p></li><li><p><b>Spreading the Message on What We Think Privacy Should Look Like</b>: It isn’t enough to build tools with privacy in mind; we also feel a responsibility to share best practices we have learned and work with policymakers to help them understand the implications of regulation on complex technologies. For example, Cloudflare has actively supported efforts to develop a framework for US Federal privacy standards, urging policymakers to adopt technology-neutral approaches that allow standards to change and improve as technology does. In Europe, we are engaged in the ongoing discussions on the draft ePrivacy Regulation, which aims to enshrine the important principle of confidentiality of communications and guides companies on cookie usage and direct marketing. We are also actively contributing to the EU debate on the draft eEvidence Regulation, which seeks to facilitate cross-border access to data. We believe this initiative must fully respect the EU Charter of Fundamental Rights and the EU data protection framework.</p></li></ul>
    <div>
      <h3>So What’s Next?</h3>
      <a href="#so-whats-next">
        
      </a>
    </div>
    <p>Protecting the privacy of personal data is an ongoing journey. Our approach has never been to check the boxes of compliance and move on. We are continually evaluating how we handle personal data and looking for ways to minimize the amount of personal data we receive. We will continue to be self-critical and examine our own motivations for the technologies we develop. And we will keep working, just as we have for the past ten years, to find new ways to secure privacy and security for our customers and for the Internet as a whole.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div> ]]></content:encoded>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[Privacy]]></category>
            <guid isPermaLink="false">5s04WXqZ1Es0UGzQOlmbJV</guid>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
        <item>
            <title><![CDATA[Sharing more Details, not more Data: Our new Privacy Policy and Data Protection Plans]]></title>
            <link>https://blog.cloudflare.com/more-details-not-more-data/</link>
            <pubDate>Wed, 02 May 2018 16:00:00 GMT</pubDate>
            <description><![CDATA[ I’m excited to announce that today we are launching a new Privacy Policy. Our new policy explains the kind of information we collect, from whom we collect it, and how we use it in a more transparent way.  ]]></description>
            <content:encoded><![CDATA[ <p>After an exhilarating first month as Cloudflare’s first Data Protection Officer (DPO), I’m excited to announce that today we are launching a new Privacy Policy. Our new policy explains the kind of information we collect, from whom we collect it, and how we use it in a more transparent way. We also provide clearer instructions for how you, our users, can exercise your data subject rights. Importantly, nothing in our privacy policy changes the level of privacy protection for your information.</p><p>Our new policy is a key milestone in our GDPR readiness journey, and it goes into effect on May 25 — the same day as the GDPR. (You can learn more about the European Union’s General Data Protection Regulation <a href="/advancing-privacy-protection-with-the-gdpr/">here</a>.) But our GDPR journey doesn’t end on May 25.</p><p>Over the coming months, we’ll be following GDPR-related developments, providing you periodic updates about what we learn, and adapting our approach as needed. And I’ll continue to focus on GDPR compliance efforts, including coordinating our responses to data subject requests for information about how their data is being handled, evaluating the privacy impact of new products and services on our users’ personal data, and working with customers who want to <a href="/keeping-your-gdpr-resolutions/">sign a data protection addendum</a> with us to help with their own GDPR compliance efforts.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ipQ1ra4Rs5s1fxONn6ceX/c5ac25188345f2b32838e0642d1b7e66/Screen-Shot-2018-04-27-at-3.17.49-PM.png" />
            
            </figure><p>Image courtesy of <a href="https://pixabay.com/en/europe-united-europe-flag-united-2021308/">pixabay</a></p><p>We also know there’s a bigger world out there than just the EU. So not only are we implementing GDPR-required measures to our global network to provide a level playing field for all, we are also evaluating and incorporating other jurisdictions’ data protection requirements as needed. This commitment to privacy is core to our mission to help build a better Internet.</p>
    <div>
      <h3>Being a DPO isn’t just about the GDPR</h3>
      <a href="#being-a-dpo-isnt-just-about-the-gdpr">
        
      </a>
    </div>
    <p>As DPO, I’ll be working with Cloudflare’s leadership to fulfill our commitment to privacy by continuing to invest in privacy protections and solutions for our users. This will include working with the business teams to evaluate the privacy impact of new products and services on our users’ personal information, develop tools to help our customers protect the privacy of their website traffic, and innovate solutions — like the DNS resolver 1.1.1.1. — that make the Internet faster and more private for anyone.</p><p>I’ll also be advising our business, engineering, marketing, sales, support, operations, and other teams on global privacy law requirements and working with our Public Policy team to understand the impact legislative or regulatory proposals may have on the privacy and security of our users’ data.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7GMctxtuBsblZL2GVJfmUc/e1645e5837f65c4969f866f031b1908e/37845654022_7c027817b0_k.jpg" />
            
            </figure><p><a href="https://creativecommons.org/licenses/by/2.0/">CC BY 2.0</a> <a href="https://www.flickr.com/photos/159124985@N05/37845654022">image</a> by <a href="https://www.flickr.com/photos/159124985@N05/">jane.boyko</a></p><p>I am thrilled to be part of the talented and dedicated Cloudflare team, and I look forward to working with this ever-expanding Cloudflare community. Have a privacy question or concern? You can reach me at <a>privacyquestions@cloudflare.com</a>.</p><p>P.S. We are committed to communicating transparently on our data protection journey, so we are posting our Privacy Policy on Github. In the event we need to update our Privacy Policy again, you’ll be able to track our changes.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div> ]]></content:encoded>
            <category><![CDATA[Policy & Legal]]></category>
            <category><![CDATA[GDPR]]></category>
            <category><![CDATA[Privacy]]></category>
            <guid isPermaLink="false">19lKTpDADhrjdE1d2GttyL</guid>
            <dc:creator>Emily Hancock</dc:creator>
        </item>
    </channel>
</rss>