A statement from Alexander Zeyss, CFO DRACOON GmbH
Regensburg, January 25, 2018 – While companies, public institutions and public authorities in Germany are preparing for the forthcoming citizen-friendly Data Protection Regulation (EU GDPR), a contrasting movement is emerging in the US. At the end of June, the US Supreme Court is to decide whether in the future, US investigators will be granted access to all citizen and company data. Specifically, this decision concerns a lawsuit with Microsoft. The company is to provide investigators with data that it has stored outside of the US. In fact, in the future, it could no longer play a role in which country this data is stored, and which laws prevail there. Instead, it could be enough for the company managing the data to be active in the US.
If the US Department of Justice actually agrees to global data access, it would be the equivalent to a declaration of war on Europe in the field of data protection. Presumably, the American way of “Big Brother is Watching You Everywhere” would mean the end of the use of American cloud services for European companies, as these would then conflict with European law – a severe blow to Microsoft products such as Office 365, OneDrive and Azure.
Freedom through data sovereignty
Secure software that protects intellectual property against criminals, spies, and governments is the future of a free society and a cornerstone of DRACOON. As one of the fastest-growing SaaS companies in Germany, we are leading the fight for data protection. Thanks to the world’s leading encryption technology, secure data transfer is always guaranteed, as is the principle of zero-knowledge: only the user retains data sovereignty.
It remains to be seen how the Supreme Court will decide on privacy in the cloud in a few months. However, users should already be aware that only an uncompromisingly secure enterprise file sharing solution without backdoors1) can guarantee the security of the data with a 100% certainty.
1) “Backdoor” (also called a trapdoor or backdoor) is a piece of software (often built in by its author) that allows users to gain access to the computer or to otherwise protected functions of a computer program by bypassing the normal access security.