Cloud Safety and Privacy in Europe
|
|
- Diana Freeman
- 3 years ago
- Views:
Transcription
1 EU-anchored Cloud Technological solution for the legal and political problem Primarily for (semi-)governments and academia Valer Mischenko (NLnet Foundation, Amsterdam)
2 Shiny side cost reduction scalability accessibility location independency reliability elasticity CONVENIENCE +++ Dark side privacy is not guaranteed deletion of data is unthinkable (potential) abuse of data vendor lock-in (private APIs) audit is not possible (closed APIs) intransparent security intrusion of third parties / data capture unobservable legal uncertainty in case of 'issues' NO CONTROL
3 Europe has problems with Cloud Report of Directorate-General for Internal Polices of the EP Fighting cybercrime and protecting privacy in the cloud : The challenges of privacy and data protection in a cloud context are clearly underestimated, if not ignored American FISAA:... has very strong implications on EU data sovereignty and the protection of its citizens rights Data Protection offences should be recognized as a type of Cybercrime
4 Usability of cloud Freedom of choice Social and legal responsibility Consumer Corporate Government and academia How to help the most disadvantaged?
5 How to approach? Data-Logistic Company: exclusively within the EU bound exclusively to the EU laws data transport, storage and processing transparent: open code and procedures Fair Cloud foundation Min 51% shares with the foundation on the top unsellable profit to the foundation for mission assurance & technology improvement EU Data Logistic Ltd
6 Market proposition Guarantee! Subject only to the EU laws Guarantee! The company does not change course and continues to do what it promised Processing of data strictly separated from storage The company does not know what data is stored, only the (temporary) location of the data EU Data Logistic Ltd
7 Market place Volume: ~10 bln public services in the EU in 2013 Growth: with duble figures per year (18,5% in 2013) Revenue sources: data-logistic services enabling client side processing encryption
8 Use of open technological paradigms Encryption Unhosted HTML5 + NoScript transparent no lock-in open where possible
9 Encryption With end-to-end encryption some sharing functionality to be reviewed Sharing and encryption still possible, but difficult for 'normal' user should really be simple Difficult to revoke access to data if keys were already issued Possibly other problems that we can not overlook now Even if encryption problems are resolved, European cloud is indispensable as other attacks possible besides those on data content Therefore you better keep your data within one legal zone!
10 There were legal ambiguities Is a purely European cloud legally possible? I.e. where only the EU legislation applies? Is it possible for the EU governments to use such purely European service provider in their procurement process? Is it possible for the EU governments to exclude non-eu suppliers from the procurement process on the basis of non-compliance with the EU-laws? Research results of the University of Tilburg : Yes! Yes! Yes!
11 Results of the University of Tilburg research: 3 x Yes under conditions that: All cloud computing services are being provided within the EU The service providers and subcontractors have EU nationality Operate only within the EU In this case, the governments comply with the (European) conditions for procurement The way to building a genuine European cloud is free now
12 EU future in the Cloud? One week ago on Dutch television, Judith Sargentini, member of the European Pariament: We, Europeans, can only guarantee our sovereignty with EuropaCloud. Meaning an ecosystem of rules, services and providers which embodies what we Europeans find important: data protection, privacy, freedom of expression, transparency, decentralized storage and energy efficiency. We can use these values as a unique selling point.
13 EU future in the Cloud? The very last sentence of the report Fighting cybercrime and protecting privacy in the cloud : A target could be that by 2020, 50% of EU public services should be running on Cloud infrastructure solely under EU jurisdictional control.
14 This is an invitation to NRENs: What's needed: Let's build the EU-anchored Cloud Participate in setting up the Fair Cloud Foundation Development of a data logistics platform EU-wide set up and testing Commercially available storage and processing power What you get: Usage of trully European cloud Funds from the Fair Cloud Foundation Sale of excessive storage and processing Fame :-)
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
More informationThe Future of Cloud Computing: Elasticity, Legacy Support, Interoperability and Quality of Service
The Future of Cloud Computing: Elasticity, Legacy Support, Interoperability and Quality of Service Introduction and overview of the workshop Alex Delis and Michael Pantazoglou, University of Athens www.sucreproject.eu
More informationEuroCloud Star Audit. A strong partnership that provides you with a competitive advantage
EuroCloud Star Audit A strong partnership that provides you with a competitive advantage Strong and advantageous? 5 topics to consider 99% of all organisations are SME, with little internal Know- how.
More informationCCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING
CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE response regarding the European Commission Public Consultation on Cloud Computing The Council of Bars and Law
More informationThe PerspecSys PRS Solution and Cloud Computing
THE PERSPECSYS KNOWLEDGE SERIES Solving Privacy, Residency and Security in the Cloud Data Compliance and the Enterprise Cloud Computing is generating an incredible amount of excitement and interest from
More informationBoosting Productivity and Innovation Through. Public Sector Compliant Cloud Services
Boosting Productivity and Innovation Through Public Sector Compliant Cloud Services dr. Mišo Vukadinović IT and e-services Directorate Ministry of the Interior, Slovenia September 26, 2014 Agenda Cloud
More informationSecure Data Sharing and Processing in Heterogeneous Clouds. Bojan Suzic, Graz University of Technology
Secure Data Sharing and Processing in Heterogeneous Clouds Bojan Suzic, Graz University of Technology 1 Presentation Outline SUNFISH Project Cloud Service for Public Administration Practical Approach Data
More informationThe NREN cloud strategy should be aligned with the European and national policies, but also with the strategies of the member institutions.
4 External influences PESTLE Analysis A PESTLE analysis is a useful tool to support the investigation and decision process relating to cloud services. PESTLE in general covers Political, Economic, Social,
More informationAlign Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION
More informationFTP-Stream Data Sheet
FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control
More informationStrategic approach to cloud computing deployment
Strategic approach to cloud computing deployment Slavko Gajin, (GN3plus, SA7T1) Datacenter IaaS workshop 2014 11-12. September, 2014 Cloud and NRENs Cloud is the latest big thing affecting NREN users Do
More informationTHE CLOUD: OPPORTUNITIES AND ISSUES
THE CLOUD: OPPORTUNITIES AND ISSUES OF IMMATERIALITY Alberto Pera Partner, Gianni Origoni Grippo Cappelli & Partners THE CLOUD IS A NO-LAND TERRITORY Data can be accessed and processed from anywhere via
More informationThe role of standards in driving cloud computing adoption
The role of standards in driving cloud computing adoption The emerging era of cloud computing The world of computing is undergoing a radical shift, from a product focus to a service orientation, as companies
More informationClaranet cloud market report 2011
Claranet cloud market report 2011 For more information: claranet.co.uk - twitter.com/claranet To book an appointment or to discuss our cloud services: Call us: 0845 355 2000 - Email: business@claranet.co.uk
More informationCloud Computing. by Civic Consulting (research conducted October 2011 January 2012)
Cloud Computing by (research conducted October 2011 January 2012) for the European Parliament, DG Internal Policies of the Union, Directorate A (Economic and Scientific Policy); presentation for the EP
More informationBRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS
BRITISH COUNCIL DATA PROTECTION CODE FOR PARTNERS AND SUPPLIERS Mat Wright www.britishcouncil.org CONTENTS Purpose of the code 1 Scope of the code 1 The British Council s data protection commitment and
More informationCloud Computing. Bringing the Cloud into Focus
Cloud Computing Bringing the Cloud into Focus November 2011 Introduction Ken Cochrane CEO, IT/NET Partner, KPGM Performance and Technology National co-leader IT Advisory Services KPMG Andrew Brewin Vice
More informationTopics. Images courtesy of Majd F. Sakr or from Wikipedia unless otherwise noted.
Cloud Computing Topics 1. What is the Cloud? 2. What is Cloud Computing? 3. Cloud Service Architectures 4. History of Cloud Computing 5. Advantages of Cloud Computing 6. Disadvantages of Cloud Computing
More informationCloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
More informationData Privacy in the Cloud E-Government Perspective
Data Privacy in the Cloud E-Government Perspective Herbert Leitold; EGIZ, A-SIT International Cloud Symposium 2011, Panel on Data Privacy and the Role Policy Plays in Defining Trust Requirements Ditton
More informationCloud Computing Risk and Rewards
Cloud Computing Risk and Rewards John Lazarine Vice President and Chief Audit Executive Mark Salamasick Director of Center for Internal Auditing For Dallas CPA Society Convergence 2013 May 8, 2013 John
More informationIndicative Requirements for Cloud Service Providers. connect communicate collaborate
Requirements Document Cloud Services connect communicate collaborate www.geant.net This document has been produced with the financial assistance of the European Union. The contents of this document are
More informationHow to handle data privacy issues in the car industry
How to handle data privacy issues in the car industry Björn Kjellén Chief information security officer (CISO) introduction The Automotive industry is now delivering vehicles with connectivity for exchange
More informationCloud Computing: Contracting and Compliance Issues for In-House Counsel
International In-house Counsel Journal Vol. 6, No. 23, Spring 2013, 1 Cloud Computing: Contracting and Compliance Issues for In-House Counsel SHAHAB AHMED Director Legal and Corporate Affairs, Microsoft,
More informationSATURDAY, FEBRUARY 28, 2015 CLE 10 (Ethics) 9:30 a.m. 10:30 a.m. Moving to the Cloud - Identifying & Managing Legal, Ethical and Compliance Risks
SATURDAY, FEBRUARY 28, 2015 CLE 10 (Ethics) 9:30 a.m. 10:30 a.m. Moving to the Cloud - Identifying & Managing Legal, Ethical and Compliance Risks Moving to the Cloud - Identifying & Managing Legal, Ethical
More informationSecuring the Cloud with IBM Security Systems. IBM Security Systems. 2012 IBM Corporation. 2012 2012 IBM IBM Corporation Corporation
Securing the Cloud with IBM Security Systems 1 2012 2012 IBM IBM Corporation Corporation IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns
More informationCLOUD COMPUTING Contractual and data protection aspects
CLOUD COMPUTING Contractual and data protection aspects Cloudscape VI 25 February 2014, Bruxelles Paolo Balboni Ph.D., Founding Partner, ICT Legal Consulting Domenico Converso LL.M., Senior Associate,
More informationThe State of Data Security Intelligence. Sponsored by Informatica. Independently conducted by Ponemon Institute LLC Publication Date: April 2015
The State of Data Security Intelligence Sponsored by Informatica Independently conducted by Ponemon Institute LLC Publication Date: April 2015 Ponemon Institute Research Report The State of Data Security
More informationThe problem of cloud data governance
The problem of cloud data governance Vasilis Tountopoulos, Athens Technology Center S.A. (ATC) CSP EU Forum 2014 - Thursday, 22 nd May, 2014 Focus on data protection in the cloud Why data governance in
More informationManaging Cloud Computing Risk
Managing Cloud Computing Risk Presented By: Dan Desko; Manager, Internal IT Audit & Risk Advisory Services Schneider Downs & Co. Inc. ddesko@schneiderdowns.com Learning Objectives Understand how to identify
More informationPrivate Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Private Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Cloud computing has completely transformed the way business organizations
More informationINTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
More informationCloud Computing Risks in Financial Services Companies: How Attorneys Can Best Help In An Increasingly SaaS-ified World
Cloud Computing Risks in Financial Services Companies: How Attorneys Can Best Help In An Increasingly SaaS-ified World July 30, 2015 Sutherland Webinar Michael Steinig 202.383.0804 Michael.Steinig@sutherland.com
More informationMicrosoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
More informationSmart Borders and Law Enforcement Access: Legitimacy, Effectiveness, and Proportionality
Interparliamentary committee meeting European Parliament National Parliaments Smart Borders Package: European Challenges, National Experiences, the way ahead 23-24 February 2015 Smart Borders and Law Enforcement
More informationA Comparison of PaaS clouds with a Detailed Reference to Security and Geoprocessing Services
A Comparison of PaaS clouds with a Detailed Reference to Security and Geoprocessing Services Department of Computer Science presented at the 1 st International Workshop on Pervasive Web Mapping, Geoprocessing
More informationThe Data Melting Pot Computing in the Cloud. Becky Pinkard Manager, Security Operations Centres Research In Motion
The Data Melting Pot Computing in the Cloud Becky Pinkard Manager, Security Operations Centres Research In Motion Notable Quotes January 2010, Mark Zuckerberg (Facebook founder): People have really gotten
More informationHARNESSING THE POWER OF THE CLOUD
HARNESSING THE POWER OF THE CLOUD Demystifying Cloud Computing Everyone is talking about the cloud nowadays. What does it really means? Indeed, cloud computing is the current stage in the Internet evolution.
More informationAlign Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:
More informationCloud Computing for Forest Fire Management. Dr. Nikos Athanasis, Prof. Kostas Kalabokidis University of the AEGEAN
Cloud Computing for Forest Fire Management Dr. Nikos Athanasis, Prof. Kostas Kalabokidis University of the AEGEAN SUCRE Workshop: Open Source Clouds in the public sector, 16-17/04/2013 Agenda Challenges
More informationCloud Vendor Benchmark 2014 A Comparison of Software Vendors and Service Providers
Cloud Vendor Benchmark 2014 A Comparison of Software Vendors and Service Providers Cloud Vendor Report Executive Summary of the Cloud Vendor Benchmark 2014 for Cloud Leader 2014 Trend Micro Incorporated
More informationCloud computing: benefits, risks and recommendations for information security
Cloud computing: benefits, risks and recommendations for information security Dr Giles Hogben Secure Services Programme Manager European Network and Information Security Agency (ENISA) Goals of my presentation
More informationMicrosoft Pty Ltd. Australian Financial System Inquiry: Response to request for further submissions
Microsoft Pty Ltd Australian Financial System Inquiry: Response to request for further submissions August 2014 1 Response in relation to Chapter 9 of the Interim Report Microsoft is pleased to respond
More informationCONTROLLING DATA IN THE CLOUD: OUTSOURCING COMPUTATION WITHOUT OUTSOURCING CONTROL
CONTROLLING DATA IN THE CLOUD: OUTSOURCING COMPUTATION WITHOUT OUTSOURCING CONTROL Paper By: Chow, R; Golle, P; Jakobsson, M; Shai, E; Staddon, J From PARC & Masuoka, R And Mollina From Fujitsu Laboratories
More informationGovernment Use of Cloud Computing Legal Challenges
Government Use of Cloud Computing Legal Challenges Liesbeth Hellemans Liesbeth.hellemans@law.kuleuven.be ICRI/CIR KU Leuven IAPP Europe Data Protection Congress Agenda 1. Cloud for Europe project 2. Legal
More informationDigital Agenda for Europe Cartagena de Indias, September 1, 2015
Digital Agenda for Europe Cartagena de Indias, September 1, 2015 Javier Huerta Bravo From the Digital Agenda (2010)... Commission ICT strategy for 2010-2020 Problems identified: Lack of investment in networks
More informationKaterina Apostolaki, kapo@intracom.gr Marketing Manager
Cloud for Telcos Katerina Apostolaki, kapo@intracom.gr Marketing Manager As an introduction Broadband is refered as a network infrastructure capable of reliably delivering diverse convergent services through
More informationCLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES:
CLOUD COMPUTING FOR SMALL- AND MEDIUM-SIZED ENTERPRISES: Privacy Responsibilities and Considerations Cloud computing is the delivery of computing services over the Internet, and it offers many potential
More informationGovernance and the cloud
Governance and the cloud Governance and the cloud Introduction After a few of years of hype, cloud is now becoming part of the mainstream enterprise it landscape. As with any technology or technology model,
More informationCloud Computing Risks & Reality. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com
Cloud Computing Risks & Reality Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com What is Cloud Security The quality or state of being secure to be free from danger & minimize risk To be protected from
More informationAllison Stanton Director of E-Discovery U.S. Department of Justice, Civil Division
Allison Stanton Director of E-Discovery U.S. Department of Justice, Civil Division Jason R. Baron Director of Litigation National Archives and Records Administration 1 Overview Cloud Computing Defined
More informationTufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:
More informationCloud Computing in Higher Education: A Guide to Evaluation and Adoption
Cloud Computing in Higher Education: A Guide to Evaluation and Adoption Executive Summary Public cloud computing delivering infrastructure, services, and software on demand through the network offers attractive
More informationCloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
More informationQuestionnaire on the European Data-Driven Economy
Questionnaire on the European Data-Driven Economy Questionnaire Following the Commission Communication COM2014(442) 'Towards a thriving data-driven economy', the Commission launched in January 2015 a targeted
More informationSecond Cyber Security Summit, November 11, 2013 in Bonn Final communique
Second Cyber Security Summit, November 11, 2013 in Bonn Final communique On November 11, the Cyber Security Summit was held for the second time in Bonn at the invitation of the Munich Security Conference
More informationType of Personal Data We Collect and How We Use It
Philips Lumify App Privacy Notice This Privacy Notice was last changed on September 1, 2015. Philips Electronics North America Corporation ("Philips") strongly believes in protecting the privacy of the
More informationCHOOSING THE RIGHT CLOUD COMPUTING SOLUTION FOR YOU
CHOOSING THE RIGHT CLOUD COMPUTING SOLUTION FOR YOU ABSTRACT Dan Smedescu This article provides an introduction to cloud computing and choosing a vendor. The first part includes definitions and service
More informationPRIVACY & DATA PROTECTION ANNUAL REPORT
2012 2013 PRIVACY & DATA PROTECTION ANNUAL REPORT CONTENTS 2 Leading the Way 4 A Strong Privacy Advocate 7 Protecting Our Customers 16 The Mobile Revolution PREFACE by Dr. Larry Ponemon Chairman & Founder,
More informationAARNet submission to the Australian Computer Society Cloud Protocol Discussion Paper. James Sankar, Alex Reid August 2013
AARNet submission to the Australian Computer Society Cloud Protocol Discussion Paper James Sankar, Alex Reid August 2013 AARNet, Australia's Academic and Research Network (AARNet) is the not- for- profit
More informationWhite Paper on CLOUD COMPUTING
White Paper on CLOUD COMPUTING INDEX 1. Introduction 2. Features of Cloud Computing 3. Benefits of Cloud computing 4. Service models of Cloud Computing 5. Deployment models of Cloud Computing 6. Examples
More informationInternational Working Group on Data Protection in Telecommunications
International Working Group on Data Protection in Telecommunications 675.44.8 24 April 2012 Scope Working Paper on Cloud Computing - Privacy and data protection issues - Sopot Memorandum - 51 st meeting,
More informationA clearer view. Security, compliance, and the cloud
A clearer view Security, compliance, and the cloud 2 A Clearer View ecurñ This document examines the current regulatory climate around the cloud and explains what to look for from a security standpoint
More informationBig Data Analytics Service Definition G-Cloud 7
Big Data Analytics Service Definition G-Cloud 7 Big Data Analytics Service Service Overview ThinkingSafe s Big Data Analytics Service allows information to be collected from multiple locations, consolidated
More informationPersonal information, for purposes of this Policy, includes any information which relates to an identified or an identifiable person.
PART I: INTRODUCTION AND BACKGROUND Purpose This Data Protection Binding Corporate Rules Policy ( Policy ) establishes the approach of Fluor to compliance with European data protection law and specifically
More informationyvette@yvetteagostini.it yvette@yvetteagostini.it
1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work
More informationMoving Applications To Cloud
Whitepaper Jaya Arvind Krishna Mandira Shah Determining and implementing an IT strategy for any enterprise involves deliberating if current or new applications can be offered via the Cloud. The purpose
More informationHow to Choose a Cloud Backup Delivery Platform.
How to Choose a Cloud Backup Delivery Platform. A Guide for MSPs. RecoverYourCool.com A Guide for MSPs Page 1 How to Choose a Cloud Backup Delivery Platform. A Guide for MSPs. Cloud backup is increasingly
More informationIncrease transparency & control for user (personal) data Strenghten applicability of EU law - limit abuse of jurisdiction ( forum shopping )
Privowny welcomes the opportunity to respond to the European Commission DG JUSTs consultation on the review of the data protection framework. Privowny is at the forefront of technology, introducing a new
More informationHow To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
More informationCRN Cloud Computing Forum 2012 5 Tips for Choosing the right cloud partner
CRN Cloud Computing Forum 2012 5 Tips for Choosing the right cloud partner 14 th June 2012 Andy Burton Chairman, Cloud Industry Forum andy@cloudindustryfroum.org Backdrop: 2012 Cloud Market Organisations
More informationPRESENTATION TOPICS 2/27/2014. Why Update Policies? 21st Century Best Practices for Information Governance & Policies. Why update policies??
21st Century Best Practices for Information Governance & Policies Presented by: John Isaza, CEO- Information Governance Solutions, LLC Partner - Rimon PC ARMA NOVA Chapter Friday, February 28, 2014 12:30
More informationBUSINESS MANAGEMENT SUPPORT
BUSINESS MANAGEMENT SUPPORT Business disadvantages using cloud computing? Author: Maikel Mardjan info@bm-support.org 2010 BM-Support.org Foundation. All rights reserved. EXECUTIVE SUMMARY Cloud computing
More informationMobile Devices Policy
Mobile Devices Policy Item Policy description Division Director Contact Description Guidelines to ensure that mobile devices are deployed and used in a secure and appropriate manner. IT Services and Records
More informationAcquia Comments on EU Recommendations for Data Processing in the Cloud
Acquia Comments on EU Recommendations for Data Processing in the Cloud Executive Summary On July 1, 2012, European Union (EU) data protection regulators provided guidelines for service providers processing
More informationAstaro Services AG Rheinweg 7, CH-8200 Schaffhausen. Supplementary data protection agreement. to the license agreement for license ID: between
Astaro Services AG Rheinweg 7, CH-8200 Schaffhausen Supplementary data protection agreement to the license agreement for license ID: between...... represented by... Hereinafter referred to as the "Client"
More informationStatement of Procurement Conduct
Statement of Procurement Conduct December 2014 Copyright of Western Power Any use of this material except in accordance with a written agreement with Western Power is prohibited. Introduction Western Power
More informationEmerging legal issues in Cloud Computing Clouds on the horizon?
Emerging legal issues in Cloud Computing Clouds on the horizon? id law partners / BGMA Malcolm Bain WHO AM I? Malcolm Bain English Solicitor, Spanish lawyer Founding partner id law partners, boutique IP/IT
More informationThe NREN s core activities are in providing network and associated services to its user community that usually comprises:
3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of
More informationHow To Decide If You Should Buy Cloud Computing For Government
Cloud Services Common Assessment and Considerations Date: June 2011 Department: Technology and Systems Governance Version: 2.0 Unclassified Malta Information Technology Agency, Gattard House, National
More informationA guide to affilinet s tracking technology
A guide to affilinet s tracking technology Content Introduction 1 What s covered in this Paper? 1 1. Why does affilinet use cookies? 1 Figure 1 the Commercial Model for Performance Marketing 1 2. How does
More informationWhat Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp.
What Every User Needs To Know Before Moving To The Cloud LawyerDoneDeal Corp. What Every User Needs To Know Before Moving To The Cloud 1 What is meant by Cloud Computing, or Going To The Cloud? A model
More informationIntel Enhanced Data Security Assessment Form
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
More informationNATO s Journey to the Cloud Vision and Progress
NATO s Journey to the Cloud Vision and Progress Dr Peter J. Lenk 2 Definitions of the Cloud A large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted,
More informationAskAvanade: Answering the Burning Questions around Cloud Computing
AskAvanade: Answering the Burning Questions around Cloud Computing There is a great deal of interest in better leveraging the benefits of cloud computing. While there is a lot of excitement about the cloud,
More informationCloud Computing Flying High (or not) Ben Roper IT Director City of College Station
Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station What is Cloud Computing? http://www.agent-x.com.au/ Wikipedia - the use of computing resources (hardware and software)
More informationTO GAS TRANSMISSION OPERATOR GAZ-SYSTEM S.A.
TO GAS TRANSMISSION OPERATOR GAZ-SYSTEM S.A. CONTENTS INTRODUCTION 2 Our commitments and values 2 Objectives 3 Scope 3 Application 4 Compliance 4 Cooperation with Suppliers 5 TO GAS TRANSMISSION OPERATOR
More informationOffice of the Chief Information Officer
Office of the Chief Information Officer Online File Storage BACKGROUND Online file storage services offer powerful and convenient methods to share files among collaborators, various computers, and mobile
More informationPrivacy in the Cloud A Microsoft Perspective
A Microsoft Perspective November 2010 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft
More informationOWASP Chapter Meeting June 2010. Presented by: Brayton Rider, SecureState Chief Architect
OWASP Chapter Meeting June 2010 Presented by: Brayton Rider, SecureState Chief Architect Agenda What is Cloud Computing? Cloud Service Models Cloud Deployment Models Cloud Computing Security Security Cloud
More informationTime better spent. Take your organisation somewhere new with Fujitsu Mobile Business Solutions. Reshaping ICT, Reshaping Business
Time better spent Take your organisation somewhere new with Fujitsu Mobile Business Solutions. Reshaping ICT, Reshaping Business Welcome to What would it mean to your organisation if your people were able
More informationPublic Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
More informationCLOUD COMPUTING An Overview
CLOUD COMPUTING An Overview Abstract Resource sharing in a pure plug and play model that dramatically simplifies infrastructure planning is the promise of cloud computing. The two key advantages of this
More informationCloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
More informationWhat Is The Cloud And How Can Your Agency Use It. Tom Konop Mark Piontek Cathleen Christensen
What Is The Cloud And How Can Your Agency Use It Tom Konop Mark Piontek Cathleen Christensen Video Computer Basics: What is the Cloud What is Cloud Computing Cloud Computing Basics The use of the word
More informationPrivacy and security in the cloud
Privacy and security in the cloud Challenges and solutions for our future information society Panel Building trust the technical challenges World Summit on the Information Society Forum 25-29 May 2015
More informationOverview. What are operational policies? Development, adoption, implementation
Practical Geospatial Policies: Resolving Operational Issues to Optimize Your SDI Ed Kennedy Hickling Arthurs Low Corporation and Cynthia Mitchell and Simon Riopel Division, Natural Resources Canada Overview
More informationWWRF Cloud Implications to Security, Privacy, and Trust
ITU-T Workshop on Addressing security challenges on a global scale 06.+07.12.2010, Geneva WWRF Cloud Implications to Security, Privacy, and Trust Mario Hoffmann Chair WWRF Working Group 7 Security & Trust
More information