throbber
Case 6:20-cv-00810-ADA Document 28-15 Filed 12/10/20 Page 1 of 8
`Case 6:20-cv-00810-ADA Document 28-15 Filed 12/10/20 Page 1 of 8
`
`EXHIBIT 15
`EXHIBIT 15
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`
`
`Case 1:20-cv-02658-CJN Document 15-2 Filed 09/23/20 Page 1 of 7Case 6:20-cv-00810-ADA Document 28-15 Filed 12/10/20 Page 2 of 8
`
`
`
`IN THE UNITED STATES DISTRICT COURT
`FOR THE DISTRICT OF COLUMBIA
`
`
`TIKTOK INC. and BYTEDANCE LTD.,
`
`
`Plaintiffs,
`
`
`v.
`
`DONALD J. TRUMP, in his official capacity as
`President of the United States; WILBUR L.
`ROSS, JR., in his official capacity as Secretary
`of Commerce; and U.S. DEPARTMENT OF
`COMMERCE,
`
`
`
`
`
`
`
`Civil Case No. 20-cv-2658
`
`
`
`
`Defendants.
`
`
`
`DECLARATION OF ROLAND CLOUTIER
`
`I, Roland Cloutier, under penalty of perjury, hereby declare as follows:
`
`1.
`
`I am the Global Chief Security Officer (“CSO”) for TikTok Inc.. I joined TikTok
`
`Inc. in April 2020, and my office is in Miami, Florida. Before joining TikTok Inc., I spent ten
`
`years as the Chief Security Officer at Automatic Data Processing (“ADP”), and prior to ADP I
`
`worked for an additional six years as the Chief Security Officer for EMC Corporation. I have also
`
`served as a U.S. Air Force combat security specialist, and an aerospace protection and anti-
`
`terrorism specialist for the Department of Defense.
`
`2.
`
`My responsibilities include providing cyber risk and data security support for both
`
`TikTok Inc. and its corporate parent, ByteDance Ltd. (“ByteDance”).
`
`3.
`
`This Declaration is based upon my personal knowledge and belief and/or upon my
`
`review of business records of TikTok Inc. and ByteDance.
`
`

`

`
`
`Case 1:20-cv-02658-CJN Document 15-2 Filed 09/23/20 Page 2 of 7Case 6:20-cv-00810-ADA Document 28-15 Filed 12/10/20 Page 3 of 8
`
`
`
`A. TikTok User Data Security Safeguards
`
`4.
`
`TikTok is a software application that enables users to create and share short-form
`
`videos that is available on a range of mobile devices. There are two main current versions of the
`
`TikTok application, only one of which is currently made available in the United States. For
`
`purposes of this declaration, I focus on the version of the application that is currently made
`
`available in the United States, which I will refer to as TikTok. (Neither version of TikTok is
`
`offered in China, where ByteDance operates a similar but separate video-sharing platform called
`
`Douyin.)
`
`5.
`
`In my role as CSO, I am responsible for overseeing the security of TikTok user
`
`data. As part of my responsibilities, I am in charge of ensuring that TikTok user data is safeguarded
`
`both when it is in transit (i.e., being transmitted between user devices and TikTok servers) and
`
`when it is being stored by TikTok in the Internet datacenters where we host user data.
`
`6.
`
`A foundation of our data security strategy is the limited scope of the data that
`
`TikTok collects, as described in our Privacy Policy: https://www.tiktok.com/legal/privacy-
`
`policy?lang=en. Among my responsibilities is to test and validate our product to help ensure that
`
`it is not collecting data beyond the categories set out in our Privacy Policy.
`
`7.
`
`With respect to user data in transit, we use industry standard Hypertext Transfer
`
`Protocol Secure (“HTTPS”) to transmit user data in a secure and encrypted manner. This is the
`
`same standard that is used by major U.S. banks and e-commerce platforms to secure their online
`
`transactions.
`
`8.
`
`With respect to user data in storage, TikTok was designed from the ground up to
`
`have a separate network architecture from other ByteDance products and services. TikTok stores
`
`2
`
`

`

`
`
`Case 1:20-cv-02658-CJN Document 15-2 Filed 09/23/20 Page 3 of 7Case 6:20-cv-00810-ADA Document 28-15 Filed 12/10/20 Page 4 of 8
`
`
`
`user data on servers in datacenters in the United States and Singapore.1 We employ logical (i.e.,
`
`software-based) controls to segregate TikTok user data from any other data residing in the
`
`datacenters, and to prevent anyone with physical access to the datacenter from accessing stored
`
`TikTok user data without authorization. These controls include alerts to notify us about any
`
`attempted unauthorized access. As a practical matter, moreover, even if an unauthorized person
`
`were to obtain physical access to a TikTok datacenter, extracting user data would be unfeasible
`
`because user data is “sharded”—i.e., an individual’s user data is broken down into many pieces,
`
`each comprising a fragment of data, and stored across many different servers. We regularly test
`
`and validate these logical controls to help ensure that no unauthorized access takes place. When
`
`the TikTok application stores U.S. user data, it does so in our U.S. and Singapore datacenters, and
`
`does not store any U.S. user data in China.
`
`9.
`
`In addition to these logical controls, we also use industry-standard encryption to
`
`protect certain elements of TikTok user data in storage. Specifically, TikTok uses the key
`
`management service (“KMS”) encryption algorithm (AES 256 GCM) to encrypt names, birthdays,
`
`home addresses, phone numbers, emails, passwords, PayPal account information, phone contact
`
`lists, private videos, direct messages, and the date/time of the user’s log-in history in storage.
`
`10.
`
`It is impossible to decrypt this encrypted user data without a key that has been
`
`generated and managed by our KMS, which is operated by our security team in the United States.
`
`We also have internal controls to prevent keys that decrypt this U.S. user data from being accessed
`
`by ByteDance personnel without authorization. TikTok relies on China-based ByteDance
`
`personnel for certain engineering functions that require them to access encrypted TikTok user data.
`
`According to our Data Access Approval Process, these China-based employees may access these
`
` 1 Apart from these datacenters, user content is temporarily stored by a variety of content delivery
`networks to facilitate its transmission around the world.
`
`3
`
`

`

`
`
`Case 1:20-cv-02658-CJN Document 15-2 Filed 09/23/20 Page 4 of 7Case 6:20-cv-00810-ADA Document 28-15 Filed 12/10/20 Page 5 of 8
`
`
`
`encrypted data elements in decrypted form based on demonstrated need and only if they receive
`
`permission from our U.S.-based team.
`
`11.
`
`In addition to these existing safeguards, we are also in the process of implementing
`
`additional protections to safeguard user data. For fields of user data other than the specific fields
`
`that are currently encrypted, we are in the midst of a project to extend our permission system to
`
`cover these additional fields as well. We are also in the process of creating a new Washington,
`
`D.C.-based Data Defense and Access Assurance team that is designed to advance TikTok’s
`
`capability to manage the enforcement, monitoring, and response to any actual or attempted data
`
`access control violations. The program will include advanced features that will automatically track
`
`and map the flow of user data to ensure conformity with TikTok’s security controls. The program
`
`will also add new capabilities to TikTok’s broader encryption mechanism, including breaking out
`
`more regional access capabilities by country.
`
`12.
`
`To date, there has never been a request from the Chinese government for TikTok
`
`user data, and we would not provide any data if we did receive such a request. Because of our
`
`internal controls governing access to encrypted user data, the only way we can comply with a
`
`request for such customer data is if my team accesses, and produces the relevant customer data.
`
`We would only perform these steps after consulting with the legal team, which is led by our U.S.-
`
`based General Counsel who is American, to ensure the request is valid, but ultimately it is up to
`
`me and my team whether to comply with a request. Because my office is ultimately responsible
`
`for disclosing encrypted user data in response to government requests, any such request for data
`
`from the Chinese government would require approval from my office, which neither I nor my
`
`designees would provide.
`
`4
`
`

`

`
`
`Case 1:20-cv-02658-CJN Document 15-2 Filed 09/23/20 Page 5 of 7Case 6:20-cv-00810-ADA Document 28-15 Filed 12/10/20 Page 6 of 8
`
`
`
`13.
`
`Our data security measures not only protect against inappropriate access to user
`
`data by insiders and unwarranted disclosures to government agencies; they also safeguard against
`
`data breaches, hackers, and other malicious actors. We take pride in our data security architecture,
`
`which has been designed to mitigate the risk of such breaches. In addition to the access control
`
`protections discussed above, we also maintain comprehensive logging functionality that collects
`
`information about the identity of employees who review TikTok user data and whether they were
`
`authorized to access the data. We also have security alerts that kick in automatically based on
`
`trigger points that indicate a security risk—for example, when a large data download occurs, our
`
`security architecture is designed to alert our team and to monitor any such download. Under my
`
`supervision, our security team conducts periodic tests and reviews logs of access to user data to
`
`help ensure that no such breach of our systems has taken place.
`
`B. TikTok’s Source Code Safeguards
`
`14.
`
` Like many multinational corporations, including U.S. corporations, we have
`
`software engineers both in the United States and around the world, including in China. To maintain
`
`the integrity of our source code in light of our global workforce, we have dedicated workflow
`
`systems to make sure that employees must demonstrate a need for information before they can
`
`access source code. Even upon a showing of such a need, the employee still has to obtain
`
`appropriate authorization to access the source code, and security controls embedded in the network
`
`monitor the employee’s review and activities.
`
`15. We also maintain a software development life cycle that involves testing of security
`
`controls at multiple points in the development process to ensure that reliance on China-based
`
`employees does not introduce any security risks to our code. After the design is finalized,
`
`engineers test and validate the security controls included in the design. Then, after the software is
`
`5
`
`

`

`
`
`Case 1:20-cv-02658-CJN Document 15-2 Filed 09/23/20 Page 6 of 7Case 6:20-cv-00810-ADA Document 28-15 Filed 12/10/20 Page 7 of 8
`
`
`
`built, further testing takes place, and an automated code review examines potential threats in the
`
`code and performs quality and security checks that are independent from the engineering process.
`
`Afterwards, additional security testing is independently conducted in the United States, separate
`
`from any China-based engineering functions, and is intended to be an extra protection for the
`
`security of our source code.
`
`16.
`
`As part of our source code integrity processes, we regularly update the software for
`
`the TikTok application, which consumers can download via app store updates. We generally issue
`
`updates approximately once or twice a week, depending on the app store, and many of these
`
`updates include security-related fixes. In addition, whenever needed, we also make available
`
`hotfixes for more urgent security issues outside our regular update process.
`
`17.
`
`Finally, we also leverage independent third-party experts to help ensure that our
`
`standards for the security of our source code are being upheld. We have engaged leading U.S.-
`
`based third party vendors, for example, to conduct assessments for insider threats and assist with
`
`monitoring, implementation, and validation of our security controls. We have also engaged third-
`
`party vendors to perform quality and security checks and conduct intensive code reviews to help
`
`ensure that no back doors exist in TikTok’s source code. As a further protection beyond these
`
`third-party engagements, we have a vulnerability reporting policy that invites external security
`
`researchers to report information about vulnerabilities.
`
`18.
`
`Going forward, as we recently announced on July 29, 2020, we are opening a new
`
`Transparency and Accountability Center for moderation and data practices in Los Angeles and
`
`Washington, D.C., which will enable outside experts to observe TikTok’s moderation policies in
`
`real-time, as well as examine the actual code that drives TikTok’s algorithms. My office will
`
`oversee the code testing process for this Transparency and Accountability Center.
`
`6
`
`

`

`
`
`Case 1:20-cv-02658-CJN Document 15-2 Filed 09/23/20 Page 7 of 7Case 6:20-cv-00810-ADA Document 28-15 Filed 12/10/20 Page 8 of 8
`
`
`
`Pursuant to 28 U.S.C. § 1746 and under penalty of perjury, I affirm that the foregoing facts
`
`are true and correct to the best of my knowledge.
`
`Executed this 19th day of September, 2020.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`______________________
`Roland Cloutier
`
`7
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket