By Jim Runsten

The key piece of Swedish legislation regarding handling of personal data is the Swedish Personal Data Act (the act). The act sets out certain requirements for any parties engaging in such activity. As more and more public and private entities are considering the use of so-called “cloud services,” and the data processed or stored often comprises personal data, there are good reasons to pinpoint the requirements imposed by the act on the party handling personal data. The Swedish Data Inspection Board has as recently as September 2011 published a general statement concerning the processing of personal data in cloud services, the essence of which is summarized here.

At the outset, it is important to note that, for the purposes of the act, the party engaging a cloud provider is always the “Data Controller,” even when the actual processing is done by the cloud service provider or its subcontractors. The provider and its subcontractors take the role as the Data Controller’s “Data Processors,” but the responsibility for compliance with the act and other laws remains with the Data Controller.

The responsibilities for the Data Controller can be divided into the following five main categories:

Legality verification

Under the act, the Data Processor may only process personal data in accordance with instructions from the Data Controller. Since providers of cloud services often stipulate the terms of their services themselves, the Data Controller must assess whether these terms are in accordance with the requirements of the act before transferring the personal data to the cloud service provider. Such assessment must determine, amongst other things, whether there is a risk that the data will be used for other purposes than originally intended, whether the data may legally be transferred to a third country and whether the terms offered are sufficient to fulfil the demands on a data processor agreement. It remains the responsibility of the Data Controller to ensure that such agreement is entered into with the cloud service provider.

Risk and vulnerability analysis

The demands placed on the cloud service provider through the act vary depending on the level of risk involved in the data processing, and higher integrity risks means higher demands on security. The Data Controller must conduct a risk and vulnerability analysis and decide whether it is possible to engage the cloud service provider. There are multiple well-established methods of conducting a risk and vulnerability analysis. One method involves using checklists; however caution should be observed in using such lists, as the list may not always be adapted to the cloud service in question.  

Personal data processor agreements

The Data Controller must usually ensure that there is a personal data processor agreement in place that complies with the requirements of the act. The personal data processor agreement is either entered into by signing an agreement with each company that processes personal data on behalf of the Data Controller or by agreeing to give a company a general mandate to engage sub-processors for the processing. If such mandate is given, the subcontractor’s agreement must clearly set out that the sub-processor is subject to the same obligations as the Personal Data Processor engaged by the Data Controller.

The Data Inspection Board also states the data processor agreement must be distinguishable form the other terms of the agreement and that the Data Processor must not be able to unilaterally change the terms of the data processor agreement. In order for the terms to be distinguishable, it would seem that they should be separate and not interwoven in other clauses of an agreement.

Furthermore, it is stated that the requirement for a data processor agreement could include that the processor agreement shall contain a number of obligations on the Data Processor, e.g. that the Data Processor is obligated to abide by Swedish law in the processing; that it is obligated to implement adequate security measures in accordance with the act; that data may only be processed in accordance with the Data Controller’s instruction, as well as ensuring that the Data Controller has the chance to confirm that the various obligations are followed. However, stating that the requirement could mean that the agreement shall set out the now-mentioned obligations leaves a great deal of uncertainty as to whether this is a requirement and, in essence, the statement seems to give precious little guidance in this respect.

The Data Inspection Board also mentions that there may be exemptions from the requirement to have a data processor agreement where such an agreement would not add any value to the protection of the integrity, e.g. where the data stored is identical with data legally published on the Internet. However, to ascertain beforehand when such an exemption would apply could in other cases be more problematic, and it would still seem prudent to implement a data processor agreement in case of any uncertainty.  

Control over personal data processors

The Data Controller has to be able to establish that all Data Processors take the appropriate security measures. The more sensitive the data being processed, the greater the requirement to examine the Data Processors will be. The Data inspection Board predicts that with regards to cloud services, this requirement may be difficult to uphold where sensitive data is concerned, as data may be transferred between subcontractors and countries.

Third country issues

Finally, if the personal data will be processed by Data Processors in countries outside the EU/EEA, the Data Controller must ensure that one of the exceptions from the act’s prohibition of transfer to third countries is applicable, e.g. consent, standard agreement terms or that the recipient is Safe Harbour certified.

It still remains to be seen whether all of the above requirements set out by the Swedish Data Inspection Board can realistically be achieved by service providers of cloud services aspiring to provide a standardised cloud service throughout the globe with as little tailoring for specific markets as possible.

Jim Runsten is partner/advokat at Bird & Bird in Stockholm.


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

Latin America Dashboard Digest

A roundup of the top privacy news from Latin America

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Get more News »

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find a KnowledgeNet Chapter Near You

Talk privacy and network with local members at IAPP KnowledgeNet Chapter meetings, taking place worldwide.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

The Privacy Core™ Library Has Evolved

Privacy Core™ e-learning essentials just expanded to include seven new units for marketers. Keep your data safe and your staff in the know!

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

Upcoming Web Conferences

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Team

Get your team up to speed on privacy by bringing IAPP training to your organization.

Let’s Get You DPO Ready

There’s no better time to train than right now! We have all the resources you need to meet the challenges of the GDPR.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

FIP Designation

Recognizing the advanced knowledge and issue-spotting skills a privacy pro must attain in today’s complex world of data privacy.

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.


The IAPP’S CIPP/E and CIPM are the ANSI/ISO-accredited, industry-recognized combination for DPO readiness. Learn more today.

Learn more about IAPP certification »

Are You Ready for the GDPR?

Check out the IAPP's EU Data Protection Reform page for all the tools and resources you need.

IAPP-OneTrust PIA Platform

New U.S. Government Agency privacy impact assessments - free to IAPP members!

IAPP Communities

Meet locally with privacy pros, dive deep into specialized topics or connect over common interests. Find your Community in KnowledgeNet Chapters, Sections and Affinity Groups.

Privacy Vendor List

Find a privacy vendor to meet your needs with our filterable list of global service providers.

More Resources »

Europe Data Protection Intensive 2017

The Intensive is sold out! But cancellations do happen—so hurry and get on the wait list in case more seats become available.

Global Privacy Summit 2017

The world’s premier privacy conference returns with the sharpest minds, unparalleled programs and preeminent networking opportunities.

Canada Privacy Symposium 2017

The Symposium returns to Toronto this spring and registration has opened! Take advantage of Early Bird rates and join your fellow privacy pros for another stellar program.

The Privacy Bar Section Forum 2017

The Privacy Bar Section Forum returns to Washington, DC April 21, delivering renowned keynote speakers and a distinguished panel of legal and privacy experts.

Asia Privacy Forum 2017

The Forum returns to Singapore for exclusive networking and intensive education on data protection trends and challenges in the Asia Pacific region. Call for Speakers open!

Privacy. Security. Risk. 2017

This year, we're bringing P.S.R. to San Diego. The Call for Speakers is now open. Submit today and be a part of something big! Submission deadline: February 26.

Europe Data Protection Congress 2017

European policy debate, multi-level strategic thinking and thought-provoking discussion. The Call for Speakers is open until March 19.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»