Cloud Computing Consumer Protocol

Size: px
Start display at page:

Download "Cloud Computing Consumer Protocol"

Transcription

1 78 Sidaway St Chapman ACT 2611 AUSTRALIA Tel: Roger.Clarke@xamax.com.au August 2013 Mr A. Redman Head of Policy and External Affairs Australian Computer Society Inc. Dear Adam Re: Cloud Computing Consumer Protocol Thank you for your time on 30 July. As presaged, I attach my company's submission on the above matter. Much of it is intended to clarify the Protocol's purpose and audience, and ensure effective communication to that audience. However, I draw particular attention to several of the specific Submissions. Unless they are addressed, the Protocol will be of no benefit to anyone. The three critical Submissions are: (13) The section on disbenefits and risks needs to: identify and calmly and soberly explain all of the many factors that give rise to a lack of trust and confidence identify and analyse existing safeguards identify additional safeguards that are needed in order to solve the remaining problems, and phrase the additional safeguards in ways that generate momentum among serviceproviders, industry associations, policy agencies and regulators towards the delivery of solutions (15) The Protocol needs to contain substantive Undertakings by service-providers, well beyond disclosures, in respect of the 13 factors listed on pp of the Discussion Paper (16) The Undertakings need to be comprehensive, such that all factors that represent significant disbenefits, risks, and trust and confidence barriers are the subject of substantive Undertakings by service-providers If any clarifications are needed, I would of course be pleased to provide them. Thank you for your consideration. Yours sincerely Roger Clarke FACS Director Xamax Consultancy Pty Ltd

2 Submission to the Australian Computer Society Cloud Computing Consumer Protocol Xamax Consultancy Pty Ltd 78 Sidaway St Chapman ACT 2611 AUSTRALIA 12 August 2013 Xamax Consultancy Pty Ltd, 2013

3 Submission re Cloud Computing Consumer Protocol Executive Summary It is not appropriate for the Protocol to be prepared in the form envisaged in the Discussion Paper. It is not appropriate for the Protocol to adopt or reflect the NZ CloudCode v.2.0. It is submitted that the following matters need to be addressed: (1) The scope of the Protocol needs to be clarified, in particular in relation to the market segment(s) whose interests are being addressed (2) The content and expression need to be aligned with the scope and purpose (3) The title of the document needs to communicate its purpose (4) The content needs to reflect the needs of the relevant market segment(s) (5) The expression needs to avoid marketing style, and speak to the target audience (6) The definition of cloud computing needs to be accessible, but also of sufficient depth, and consistent with industry norms (7) The information provided about the various categories of service model needs to be accessible, but also consistent with industry norms (8) The Protocol needs to make clear whether it is applicable to all of the various categories of service-model, or to what extent it applies to each of them (9) The potential benefits of cloud computing need to be presented in a balanced manner, avoid marketing-speak, and include complementary discussion of the conditions that must exist for each benefit to actually be achieved (10) The list of potential benefits needs to be reviewed to ensure comprehensiveness (11) The notion of 'barriers' needs to be replaced with notions such as 'disbenefits' and 'risks' (12) The list of disbenefits and risks needs to be reviewed to ensure comprehensiveness (13) The section on disbenefits and risks needs to identify and calmly and soberly explain all of the many factors that give rise to a lack of trust and confidence, identify and analyse existing safeguards, identify additional safeguards that are needed in order to solve the remaining problems, and phrase the additional safeguards in ways that generate momentum among service-providers, industry associations, policy agencies and regulators towards the delivery of solutions (14) The Protocol needs to contain an outline of a process for the assessment by users of their requirements, an outline of a process for the evaluation by users of cloudsourcing proposals, checklists of factors to be considered, circumstances in which each factor is of particular importance, and an indication of categories of application for which cloudsourcing may be appropriate, even where disbenefits and risks are not satisfactorily addressed by safeguards (15) The Protocol needs to contain substantive Undertakings by service-providers, well beyond disclosures, in respect of the 13 factors listed on pp of the Discussion Paper (16) The Undertakings need to be comprehensive, such that all factors that represent significant disbenefits, risks, and trust and confidence barriers are the subject of substantive Undertakings by service-providers (17) The Protocol needs to include an undertaking by service-providers to operate a complaintshandling scheme that is consistent with relevant Standards, including AS ISO , and good industry practices, provide for an independent complaints-handler that operates a scheme that is also consistent with such Standards and practices, and provide that complaints must first be submitted to the relevant service-provider (18) Adoption of the NZ Cloud Code would not satisfy the aims of the present initiative Xamax Consultancy Pty Ltd, August 2013

4 Submission 1. Introduction Cloudsourcing is claimed by its proponents to offer considerable advantages over both insourcing and more conventional forms of outsourcing. Its use is growing, but there is considerable evidence of reticence, in government, among small and medium business enterprises, and among consumers. The Australian Government has a National Cloud Computing Strategy, which includes the development of a voluntary 'cloud computing consumer protocol', intended to be operational by January The Protocol is intended to document undertakings by service-providers, in order to overcome the lack of trust and confidence that is holding back adoption of cloud computing. The Australian Computer Society (ACS) has carriage of the matter, and issued a Discussion Paper in July 2013, for response by 5 August This document is a response to that Discussion Paper. It draws heavily on the author's prior consultancy and research work, which are reflected in a series of published papers listed in the Appendix to this document. 2. Design Criteria for a Protocol In order to achieve its purpose, such a Protocol needs to satisfy a number of criteria. A Protocol of this nature needs to: be oriented to the needs of the relevant market segments be informative for, and accessible by, the relevant individuals in those market segments be realistic and balanced in its content and presentation provide guidance on the evaluation process that adopters need to undertake reflect the insights of the risk assessment and risk management disciplines clearly identify problems, and generate momentum towards solutions to them 3. The Framing of the Project This section considers generic aspects of the project to prepare a Protocol. 3.1 Scope There is a lack of clarity about the market segment(s) whose interests are to be addressed: the Protocol's working title includes the word 'consumer' the introductory text on p. 3 refers to "users... particularly small businesses, not-for-profits (NFPs) and consumers", which appears from a passage on p. 5 to have been adopted from the government's National Cloud Computing Strategy the purpose statement on p. 3 refers to "users" the section 5 heading refers to "SMEs", and the discussion of benefits on pp. 8-9 is couched in terms of relevance to small businesses ('lower time to market', 'global competition', 'competitive edge', 'barriers to capital'), and to a small extent NFPs ('productivity'), but in most cases not to consumers Xamax Consultancy Pty Ltd, Version of 12 August 2013

5 (1) The scope of the Protocol needs to be clarified, in particular in relation to the market segment(s) whose interests are being addressed (2) The content and expression need to be aligned with the scope and purpose The Protocol is intended to embody undertakings by cloud computing service-providers, for the benefit of organisations and/or individuals in some market segment or segments. It is confusing for the Protocol to carry the name of a market segment (currently 'Consumer'). It would be much clearer if the Protocol were called something like a 'Cloud Computing Service-Provider Protocol', perhaps with a short, alternative name such as the 'CloudCode' term adopted in NZ. The market segment whose interests the Protocol addresses would then be spelt out in the opening lines of the document. (3) The title of the document needs to communicate its purpose 3.2 Balance The Discussion Paper reads as though the Protocol is to be written for service-providers. The text is imbued with marketing-driven statements that 'pump' or 'boost' cloud computing. (4) The content needs to reflect the needs of the relevant market segment(s) (5) The expression needs to avoid marketing style, and speak to the target audience 4. The Information Provided Within the Protocol This section considers the information that the Discussion Paper envisages the Protocol will contain. 4.1 Definitions The definition of cloud computing on p. 7, although suitably comprehensible, does not convey the difference between cloudsourcing and conventional forms of outsourcing. An approach along the lines of the following extracts from Clarke (2013) is suggested instead: In conventional outsourcing, a service-provider hosts equipment that supports a relevant stack of software, and stores and maintains data. In cloud computing, the service-provider changes the focus of the offer from the equipment to the processes. Those processes may be run in any of a wide range of devices, and the location of those devices is determined by the needs of the service-provider, not those of the customer. The service-provider scales the number of processes and storage capacity to meet the customer's varying needs over hourly, daily, monthly and/or annual cycles, to reflect growth and decay factors, and in the face of demand uncertainty. The service-provider may offer a tariff based on usage, because instead of unused capacity being locked up in hosts that have been pre-allocated to a customer, the service-provider can make more efficient use of the available computing resources. Xamax Consultancy Pty Ltd, Version of 12 August 2013

6 The definition in the NZ CloudCode v.2.0 of July 2013 is technically clear and appropriate, but may not communicate as effectively with the intended readers as an approach such as that suggested above. (6) The definition of cloud computing needs to be accessible, but also of sufficient depth, and consistent with industry norms The definitions of PaaS and SaaS on p. 7 are not consistent with my understanding of industry norms. My understanding is as follows (Clarke 2013): Infrastructure as a Service (IaaS) refers to the provision of a bare (but virtualised) machine, without software or with little more than a specific operating system and version. Amazon's EC2 and Rackspace were early movers in a marketspace that is becoming densely populated Platform as a Service (PaaS) offers a configured platform on which organisations can develop and/or install their applications. Sub-categories include: proprietary platforms, such as Microsoft Windows Azure standards-based services that provide specific application development and/or execution environments, such as Ruby or PHP extensibility and customisation features in SaaS offerings such as Salesforce Software as a Service (SaaS) makes specific application software available. SaaS is targeted at organisations of all sizes as an alternative to applications running on the organisation's own hosts, or on their employees' workstations. Examples include Salesforce, Google Gmail, Zoho, Google Apps, MS Office 365, Dropbox and MYOB LiveAccounts. SaaS is also offered directly to consumers, e.g. Zoho, Gmail, Google Docs, Dropbox. (7) The information provided about the various categories of service model needs to be accessible, but also consistent with industry norms (8) The Protocol needs to make clear whether it is applicable to all of the various categories of service-model, or to what extent it applies to each of them 4.2 Benefits The section on Benefits on pp. 8-9 is written with a rose-coloured hue. (9) The potential benefits of cloud computing need to: be presented in a balanced manner avoid marketing-speak, and include complementary discussion of the conditions that must exist for each benefit to actually be achieved The section on Benefits on pp. 8-9 omits some benefits that are identified in Clarke (2012) at (10) The list of potential benefits needs to be reviewed to ensure comprehensiveness 4.3 Barriers The section on Barriers on pp is wrongly pitched. Service-providers are interested in barriers to adoption. But these are not terms of relevance to small organisations and consumers, who are instead concerned about Disbenefits (or 'Financial and Other Costs') and Risks. Xamax Consultancy Pty Ltd, Version of 12 August 2013

7 (11) The notion of 'barriers' needs to be replaced with notions such as 'disbenefits' and 'risks' The section on Barriers on pp omits a great many important Disbenefits and Risks. See the comprehensive list published in Clarke (2010, 2012), and specifically at (12) The list of disbenefits and risks needs to be reviewed to ensure comprehensiveness The section on Barriers on pp reads as an excusatory piece, and is focussed on allaying fears, rather than on providing useful information for small organisations and consumers. (13) The section on disbenefits and risks needs to: identify and calmly and soberly explain all of the many factors that give rise to a lack of trust and confidence identify and analyse existing safeguards identify additional safeguards that are needed in order to solve the remaining problems, and phrase the additional safeguards in ways that generate momentum among service-providers, industry associations, policy agencies and regulators towards the delivery of solutions 4.4 Guidance The text as it stands could be seen to be irresponsibly goading small organisations and consumers into adopting cloudsourcing, whether or not it is appropriate for them to do so. The Directors of incorporated organisations have a legal obligation to their shareholders or members to make reasoned decisions, and hence to identify and evaluate options. Clarke (2012) provides a framework for evaluation, and Clarke (2013) specifically examines data risks. Even consumers owe it to themselves, but sometimes also to their families and householders, to take at least a modicum of care with such things as their address books, financial and taxation information, family history and scans of family photographs. Clarke (2011) provides a framework for the assessment of consumer needs and the evaluation of particular services. As presently contemplated, the document fails to communicate this need, and fails to provide guidance. (14) The Protocol needs to contain: an outline of a process for the assessment by users of their requirements an outline of a process for the evaluation by users of cloudsourcing proposals checklists of factors to be considered circumstances in which each factor is of particular importance, and an indication of categories of application for which cloudsourcing may be appropriate, even where disbenefits and risks are not satisfactorily addressed by safeguards Xamax Consultancy Pty Ltd, Version of 12 August 2013

8 5. The Undertakings For an instrument of this nature to have much impact, it has to be not merely a glossy document released with a fanfare. It must provide, and be seen to provide, concrete assurances to the relevant market segments, which address the impediments to adoption, and thereby generate confidence. The undertakings that the Discussion Paper contemplates service-providers giving to small organisations and consumers are expressed within a section headed 'Disclosures' rather than 'Undertakings' (pp ). And 10 of the 13 heads are indeed limited to disclosure. Disclosure is of value. On the other hand, some of the disclosures are required by law, and many are little more than statements that 'there's a problem here'. This will not achieve confidence or trust. For only 3 of the 13 heads are substantive undertakings contemplated. These are: 3. Security: "a good set of standards and practice" and "security standards and platforms... accredited to or [complied] with" 7. SLA and Support: "standard support mechanisms and SLAs" 9. Data Portability: "data portability is a prerequisite for users..." However, the wording is hedged in ways that reduce them from an undertaking to a mere aspiration: 3. Security is undermined by the use of the qualifier 'could' 7. SLA and Support is undermined by the use of the qualifier 'could' 9. Data Portability contains no actual commitment (15) The Protocol needs to contain substantive Undertakings by service-providers, well beyond disclosures, in respect of the 13 factors listed on pp of the Discussion Paper Further, there are many disbenefits and risks that are omitted from the list on pp A cursory scan of Clarke (2012) identifies the following further heads: Reliability (Availability, Accessibility, Robustness, Resilience, Recoverability) Accessibility Data Survival Forward-, Backward- and Lateral Compatibility Warranties and Indemnities in relation to the Service Legal Jurisdiction Changes to the Service Auditability Management of Incidents and Complaints A cursory scan of ACCAN (2012) identifies the following further heads: Accessibility for All Consumers Privacy (e.g. the current list omits at least Collection, and Subject Access and Correction) Redress Simplicity of Presentation of the Service Consumer Protection Standards Xamax Consultancy Pty Ltd, Version of 12 August 2013

9 (16) The Undertakings need to be comprehensive, such that all factors that represent significant disbenefits, risks, and trust and confidence barriers are the subject of substantive Undertakings by service-providers 6. The Code Complaints Process The Discussion Paper on pp discusses a Complaints process. It is unclear whether these complaints are to be made to the service-provider or to some other party, and if some other party, then: how that other party is to be constituted whether it is required that the complaint first be submitted to the service-provider (17) The Protocol needs to: include an undertaking by service-providers to operate a complaints-handling scheme that is consistent with relevant Standards, including AS ISO , and good industry practices provide for an independent complaints-handler that operates a scheme that is also consistent with such Standards and practices, and provide that complaints must first be submitted to the relevant serviceprovider 7. The NZ CloudCode Based on a brief review of the NZ CloudCode v.2.0 of July 2013, it is clear that the document suffers many of the same deficiencies as an Australian Protocol would if it followed the line of thinking in the Discussion Paper. In particular: the undertakings are about disclosure and nothing more (p. 1, p. 2 at 1.2, p. 3 at 3.1). For example: 5.4 Security does not require adoption of any standard, or certification, or audit 5.9 SLA and Support does not specify a standard, but merely requires disclosure of whatever the service-provider's normal offering is which is a requirement of contract law in any case 5.13 Customer Engagement does not require auditability or the existence of a Privacy Policy Statement, but merely a statement about whether or not they are provided 5.15 Data Breaches does not require notification of data breaches 5.16 Law Enforcement is not merely empty, but also objectionable, because it contemplates compliance with mere 'requests', whether or not accompanied by a legal authority such as a court order or search warrant the Complaints Mechanism is only about false statements, not about breaches of substance, and the Complaints-Handler may suppress reports on breaches the last of the Core Principles undermines the vital function of the Code to generate momentum towards solutions to problems. This is because it places a high value on limiting compliance costs (p. 2); whereas safeguards to overcome significant user disbenefits and risks, and enhance confidence and trust, will inevitably cost money Xamax Consultancy Pty Ltd, Version of 12 August 2013

10 The NZ CloudCode would have only a very marginal positive impact on confidence and trust, because the obligations entered into by signatories are very limited, and many of them are already legal requirements in any case. (18) Adoption of the NZ Cloud Code would not satisfy the aims of the present initiative 8. The Role of the A.C.S. The issues identified above are serious in their own right. A further consideration is whether it is appropriate for the ACS to adopt positions of the kinds contemplated in the Discussion Paper. It would have been unsurprising if a document of this kind had emanated from an industry association such as AIIA or IIA. ACS, on the other hand, is a professional association not an industry association, and the ACS Code begins with: 1. The Primacy of the Public Interest You will place the interests of the public above those of personal, business or sectional interests. Several of the changes proposed in the above submissions are accordingly of the nature of imperatives rather than optional measures, necessary in order to adjust the ACS's role in this matter to one consistent with its mission. Conclusions It is not appropriate for the Protocol to be prepared in the form envisaged in the Discussion Paper. It is not appropriate for the Protocol to adopt or reflect the NZ CloudCode v.2.0. It is very important that the matters identified in the numbered submissions above be addressed. Xamax Consultancy Pty Ltd, Version of 12 August 2013

11 Appendix: Resources The analysis in this paper is based on consultancy and research undertaken by the author over the last 5 years, and documented in a series of papers, which are indexed at: The most relevant of the papers to the question of a Consumer Protocol are these: Clarke R. (2010) 'User Requirements for Cloud Computing Architecture' Proc. 2nd International Symposium on Cloud Computing, Melbourne, May 2010, Published in Parashar M. & Buyya R. (2010) Proc. 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, Melbourne, Australia, May 2010, pp , at Clarke R. (2011) 'The Cloudy Future of Consumer Computing' Proc. 24th Bled econference, June 2011, at Clarke R. (2012) 'A Framework for the Evaluation of CloudSourcing Proposals' Proc. 25th Bled econference, June 2012, at Clarke R. (2013) 'Data Risks in the Cloud Forthcoming, Journal of Theoretical and Applied Electronic Commerce Research 8, 4 (Dec 2013), at See also: ACCAN (2012) 'What consumers need from cloud computing' Position Statement, Australian Communications Consumers Action Network, 11 December 2012, at Xamax Consultancy Pty Ltd, Version of 12 August 2013

Cloud Computing Consumer Protocol. ACS Cloud Discussion Paper July 2013

Cloud Computing Consumer Protocol. ACS Cloud Discussion Paper July 2013 Cloud Computing Consumer Protocol ACS Cloud Discussion Paper July 2013 ACS Cloud Protocol Discussion Paper July 2013 2 CONTENTS SECTION PAGE 1. Introduction and Purpose 3 2. Structure and Timelines 3 3.

More information

Cloud Computing Consumer Protocol

Cloud Computing Consumer Protocol Cloud Computing Consumer Protocol Submission by the Australian Communications Consumer Action Network to the Australian Computer Society 16 August 2013 Australian Communications Consumer Action Network

More information

Microsoft appreciates the opportunity to respond to the Cloud Computing Consumer Protocol: ACS Discussion Paper July 2013 (the protocol).

Microsoft appreciates the opportunity to respond to the Cloud Computing Consumer Protocol: ACS Discussion Paper July 2013 (the protocol). Microsoft Submission to ACS Cloud Protocol Discussion Paper General Comments Microsoft appreciates the opportunity to respond to the Cloud Computing Consumer Protocol: ACS Discussion Paper July 2013 (the

More information

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009

Cloud Computing 159.735. Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Cloud Computing 159.735 Submitted By : Fahim Ilyas (08497461) Submitted To : Martin Johnson Submitted On: 31 st May, 2009 Table of Contents Introduction... 3 What is Cloud Computing?... 3 Key Characteristics...

More information

ACS CLOUD COMPUTING CONSUMER PROTOCOL. Response from AIIA

ACS CLOUD COMPUTING CONSUMER PROTOCOL. Response from AIIA ACS CLOUD COMPUTING CONSUMER PROTOCOL Response from AIIA AUGUST 2013 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing multinational and domestic

More information

AARNet submission to the Australian Computer Society Cloud Protocol Discussion Paper. James Sankar, Alex Reid August 2013

AARNet submission to the Australian Computer Society Cloud Protocol Discussion Paper. James Sankar, Alex Reid August 2013 AARNet submission to the Australian Computer Society Cloud Protocol Discussion Paper James Sankar, Alex Reid August 2013 AARNet, Australia's Academic and Research Network (AARNet) is the not- for- profit

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

CPNI VIEWPOINT 01/2010 CLOUD COMPUTING

CPNI VIEWPOINT 01/2010 CLOUD COMPUTING CPNI VIEWPOINT 01/2010 CLOUD COMPUTING MARCH 2010 Acknowledgements This viewpoint is based upon a research document compiled on behalf of CPNI by Deloitte. The findings presented here have been subjected

More information

COMMUNICATIONS ALLIANCE LTD

COMMUNICATIONS ALLIANCE LTD COMMUNICATIONS ALLIANCE LTD Communications Alliance Response to ACS Discussion Paper on a Potential Cloud Computing Consumer Protocol - 1 - TABLE OF CONTENTS INTRODUCTION 2 SECTION 1 OVERVIEW OF RESPONSE

More information

AUSTRALIAN INDUSTRY GROUP SUBMISSION to. Australian Computer Society. Discussion paper on the Cloud Computing Consumer Protocol

AUSTRALIAN INDUSTRY GROUP SUBMISSION to. Australian Computer Society. Discussion paper on the Cloud Computing Consumer Protocol AUSTRALIAN INDUSTRY GROUP SUBMISSION to Australian Computer Society Discussion paper on the Cloud Computing Consumer Protocol 6 September 2013 EXECUTIVE SUMMARY The Australian Industry Group (Ai Group)

More information

Securing The Cloud With Confidence. Opinion Piece

Securing The Cloud With Confidence. Opinion Piece Securing The Cloud With Confidence Opinion Piece 1 Securing the cloud with confidence Contents Introduction 03 Don t outsource what you don t understand 03 Steps towards control 04 Due diligence 04 F-discovery

More information

Supplementary Policy on Data Breach Notification Legislation

Supplementary Policy on Data Breach Notification Legislation http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 4 May 2013 Supplementary Policy on Data Breach Notification Legislation Introduction It has been reported

More information

HARNESSING THE POWER OF THE CLOUD

HARNESSING THE POWER OF THE CLOUD HARNESSING THE POWER OF THE CLOUD Demystifying Cloud Computing Everyone is talking about the cloud nowadays. What does it really means? Indeed, cloud computing is the current stage in the Internet evolution.

More information

Quick guide: Using the Cloud to support your business

Quick guide: Using the Cloud to support your business Quick guide: Using the Cloud to support your business This Quick Guide is one of a series of information products targeted at small to medium sized enterprises (SMEs). It is designed to help businesses

More information

yvette@yvetteagostini.it yvette@yvetteagostini.it

yvette@yvetteagostini.it yvette@yvetteagostini.it 1 The following is merely a collection of notes taken during works, study and just-for-fun activities No copyright infringements intended: all sources are duly listed at the end of the document This work

More information

Draft Australian Privacy Principles (APP) Guidelines first tranche

Draft Australian Privacy Principles (APP) Guidelines first tranche The Association of Superannuation Funds of Australia Limited ABN 29 002 786 290 ASFA Secretariat PO Box 1485, Sydney NSW 2001 p: 02 9264 9300 (1800 812 798 outside Sydney) f: 1300 926 484 w: www.superannuation.asn.au

More information

Orchestrating the New Paradigm Cloud Assurance

Orchestrating the New Paradigm Cloud Assurance Orchestrating the New Paradigm Cloud Assurance Amsterdam 17 January 2012 John Hermans - Partner Current business challenges versus traditional IT Organizations are challenged with: Traditional IT seems

More information

Cloud Computing Technology

Cloud Computing Technology Cloud Computing Technology The Architecture Overview Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda What is Cloud Computing? Case Study Service Model Architectures

More information

Contracting for Cloud Computing

Contracting for Cloud Computing Contracting for Cloud Computing Geofrey L Master Mayer Brown JSM Partner +852 2843 4320 geofrey.master@mayerbrownjsm.com April 5th 2011 Mayer Brown is a global legal services organization comprising legal

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

Microsoft Pty Ltd. Australian Financial System Inquiry: Response to request for further submissions

Microsoft Pty Ltd. Australian Financial System Inquiry: Response to request for further submissions Microsoft Pty Ltd Australian Financial System Inquiry: Response to request for further submissions August 2014 1 Response in relation to Chapter 9 of the Interim Report Microsoft is pleased to respond

More information

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management

The Cloud at Crawford. Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Evaluating the pros and cons of cloud computing and its use in claims management The Cloud at Crawford Wikipedia defines cloud computing as Internet-based computing, whereby shared

More information

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages

Outline. What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages Ivan Zapevalov 2 Outline What is cloud computing? History Cloud service models Cloud deployment forms Advantages/disadvantages 3 What is cloud computing? 4 What is cloud computing? Cloud computing is the

More information

Cloud Computing An Elephant In The Dark

Cloud Computing An Elephant In The Dark Cloud Computing An Elephant In The Dark Amir H. Payberah amir@sics.se Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Cloud Computing 1394/2/7 1 / 60 Amir

More information

Cloud Computing. What is Cloud Computing?

Cloud Computing. What is Cloud Computing? Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited

More information

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS International Journal of Computer Engineering and Applications, Volume VIII, Issue II, November 14 FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS Saju Mathew 1, Dr.

More information

Cloud Computing Services and its Application

Cloud Computing Services and its Application Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its

More information

Cloud Computing: The Next Computing Paradigm

Cloud Computing: The Next Computing Paradigm Cloud Computing: The Next Computing Paradigm Ronnie D. Caytiles 1, Sunguk Lee and Byungjoo Park 1 * 1 Department of Multimedia Engineering, Hannam University 133 Ojeongdong, Daeduk-gu, Daejeon, Korea rdcaytiles@gmail.com,

More information

ACCC/ASIC 'Debt collection guideline for collectors and creditors' publication review

ACCC/ASIC 'Debt collection guideline for collectors and creditors' publication review 1 November 2012 Mr Richard Weksler Assistant Director Compliance Strategies Branch Australian Competition & Consumer Commission Level 35 360 Elizabeth Street MELBOURNE VIC 3000 By email: richard.weksler@accc.gov.au

More information

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station

Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station Cloud Computing Flying High (or not) Ben Roper IT Director City of College Station What is Cloud Computing? http://www.agent-x.com.au/ Wikipedia - the use of computing resources (hardware and software)

More information

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013

Cloud Computing in the Enterprise An Overview. For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise An Overview For INF 5890 IT & Management Ben Eaton 24/04/2013 Cloud Computing in the Enterprise Background Defining the Cloud Issues of Cloud Governance Issue of Cloud

More information

Public Consultation regarding Data Sharing and Governance Bill. Contribution of Office of the Data Protection Commissioner

Public Consultation regarding Data Sharing and Governance Bill. Contribution of Office of the Data Protection Commissioner Submission of the Office of the Data Protection Commissioner (DPC) on the data-sharing and Governance Bill: - Policy Proposals (dated the 1 st of August 2014) Public Consultation regarding Data Sharing

More information

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges.

Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. Cloud Computing Service Models, Types of Clouds and their Architectures, Challenges. B.Kezia Rani 1, Dr.B.Padmaja Rani 2, Dr.A.Vinaya Babu 3 1 Research Scholar,Dept of Computer Science, JNTU, Hyderabad,Telangana

More information

Higher National Unit specification: general information

Higher National Unit specification: general information Higher National Unit specification: general information Unit code: H179 34 Superclass: CE Publication date: March 2012 Source: Scottish Qualifications Authority Version: 01 Unit purpose This Unit is intended

More information

DISCLOSURE STATEMENT PREPARED BY

DISCLOSURE STATEMENT PREPARED BY DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

CLOUD COMPUTING An Overview

CLOUD COMPUTING An Overview CLOUD COMPUTING An Overview Abstract Resource sharing in a pure plug and play model that dramatically simplifies infrastructure planning is the promise of cloud computing. The two key advantages of this

More information

Teaching the Business Management Study Design 2010 2014

Teaching the Business Management Study Design 2010 2014 Teaching the Business Management Study Design 2010 2014 Key Knowledge and Key Skill Changes This document will address some of the key changes to the key knowledge and key skills statements in the 2010

More information

Design of Cloud Services for Cloud Based IT Education

Design of Cloud Services for Cloud Based IT Education www.jitae.org Journal of Information Technology and Application in Education Vol. 3 Iss. 3, September 2014 doi: 10.14355/jitae.2014.0303.03 Design of Cloud Services for Cloud Based IT Education Li Chao

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

The Magazine for IT Security. May 2010. issue 3. sör alex / photocase.com

The Magazine for IT Security. May 2010. issue 3. sör alex / photocase.com The Magazine for IT Security May 2010 sör alex / photocase.com free digital version made in Germany issue 3 Luiz Fotolia.com Clouds or storm clouds? Cloud Computing Security by Javier Moreno Molinero Gradually,

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Cloud Computing Today David Hirsch April 2013 Outline What is the Cloud? Types of Cloud Computing Why the interest in Cloud computing today? Business Uses for the Cloud Consumer Uses for the Cloud PCs

More information

Cloud Computing - Starting Points for Privacy and Transparency

Cloud Computing - Starting Points for Privacy and Transparency Computing - Starting Points for Privacy and Transparency Ina Schiering Ostfalia University of Applied Science Wolfenbüttel, Germany IFIP Summerschool: Privacy and Identity Management for Life, Helsingborg,

More information

(a) the kind of data and the harm that could result if any of those things should occur;

(a) the kind of data and the harm that could result if any of those things should occur; Cloud Computing This information leaflet aims to advise organisations on the factors they should take into account in considering engaging cloud computing. It explains the relevance of the Personal Data

More information

Disclosure Requirements of CloudCode Software

Disclosure Requirements of CloudCode Software DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

XIT CLOUD SOLUTIONS LIMITED

XIT CLOUD SOLUTIONS LIMITED DISCLOSURE STATEMENT PREPARED BY - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Pharma CloudAdoption. and Qualification Trends

Pharma CloudAdoption. and Qualification Trends Pharma CloudAdoption and Qualification Trends OurCloudExperience Numerous implementations of EDMS systems with external hosting for smaller life science clients Development of qualification strategy for

More information

Cloud Computing in Higher Education: A Guide to Evaluation and Adoption

Cloud Computing in Higher Education: A Guide to Evaluation and Adoption Cloud Computing in Higher Education: A Guide to Evaluation and Adoption Executive Summary Public cloud computing delivering infrastructure, services, and software on demand through the network offers attractive

More information

Cloud Computing. Technologies and Types

Cloud Computing. Technologies and Types Cloud Computing Cloud Computing Technologies and Types Dell Zhang Birkbeck, University of London 2015/16 The Technological Underpinnings of Cloud Computing Data centres Virtualisation RESTful APIs Cloud

More information

Cloud Computing. Key Considerations for Adoption. Abstract. Ramkumar Dargha

Cloud Computing. Key Considerations for Adoption. Abstract. Ramkumar Dargha Cloud Computing Key Considerations for Adoption Ramkumar Dargha Abstract Cloud Computing technology and services have been witnessing quite a lot of attention for the past couple of years now. We believe

More information

Architectural Implications of Cloud Computing

Architectural Implications of Cloud Computing Architectural Implications of Cloud Computing Grace Lewis Research, Technology and Systems Solutions (RTSS) Program Lewis is a senior member of the technical staff at the SEI in the Research, Technology,

More information

Cloud computing an insight

Cloud computing an insight Cloud computing an insight Overview IT infrastructure is changing according the fast-paced world s needs. People in the world want to stay connected with Work / Family-Friends. The data needs to be available

More information

15 April 2014. Mr Ian Taylor Chair Tax Practitioners Board PO Box 126 Hurstville BC NSW 1481. Email: tpbsubmissions@tpb.gov.au.

15 April 2014. Mr Ian Taylor Chair Tax Practitioners Board PO Box 126 Hurstville BC NSW 1481. Email: tpbsubmissions@tpb.gov.au. 15 April 2014 Mr Ian Taylor Chair Tax Practitioners Board PO Box 126 Hurstville BC NSW 1481 Email: tpbsubmissions@tpb.gov.au Dear Mr Taylor Re. Exposure Draft tax (financial) adviser policy documents The

More information

The NREN s core activities are in providing network and associated services to its user community that usually comprises:

The NREN s core activities are in providing network and associated services to its user community that usually comprises: 3 NREN and its Users The NREN s core activities are in providing network and associated services to its user community that usually comprises: Higher education institutions and possibly other levels of

More information

Submissions should be evidence based, provide examples where possible, and address the consultation questions.

Submissions should be evidence based, provide examples where possible, and address the consultation questions. REVIEW OF AUSTRALIA S RESEARCH TRAINING SYSTEM CONSULTATION RESPONSE FORM Please read the submission guidelines before completing and submitting this form. This form should be submitted through the consultation

More information

CSUSB Cloud Computing Standard CSUSB, Information Security Office

CSUSB Cloud Computing Standard CSUSB, Information Security Office CSUSB, Information Security Office Last Revised: 01/30/2013 Final REVISION CONTROL Document Title: Author: File Reference: CSUSB Cloud Computing Standard James Macdonell Date By Action Pages 05/04/12 J

More information

Certified Cloud Computing Professional VS-1067

Certified Cloud Computing Professional VS-1067 Certified Cloud Computing Professional VS-1067 Certified Cloud Computing Professional Certification Code VS-1067 Vskills Cloud Computing Professional assesses the candidate for a company s cloud computing

More information

Cloud Computing in the Enterprise: A Question of Control.. And who has it. INF5210 Ben Eaton 12/11/2013

Cloud Computing in the Enterprise: A Question of Control.. And who has it. INF5210 Ben Eaton 12/11/2013 Cloud Computing in the Enterprise: A Question of Control.. And who has it. INF5210 Ben Eaton 12/11/2013 1 The Cloud We all use it as consumers But I m going to talk about cloud computing in an enterprise

More information

Security in the Cloud

Security in the Cloud Security in the Cloud Visibility & Control of your Cloud Service Provider Murray Goldschmidt, Pierre Tagle, Ph.D. April 2012 Compliance, Protection & Business Confidence Sense of Security Pty Ltd Sydney

More information

Digital Forensics. Lab 10: Cloud Computing & the Future of Digital Forensics

Digital Forensics. Lab 10: Cloud Computing & the Future of Digital Forensics Digital Forensics Lab 10: Cloud Computing & the Future of Digital Forensics Today's Topics Cloud Computing Overview Applications of Cloud Computing Impact of CC to Digital Forensics Future of Digital Forensics

More information

Submission in response to the Life Insurance and Advice Working Group Interim Report on Retail Life Insurance

Submission in response to the Life Insurance and Advice Working Group Interim Report on Retail Life Insurance 30 January 2015 Mr John Trowbridge Chairman Life Insurance and Advice Working Group Email: submissions@trowbridge.com.au Dear Mr Trowbridge, Submission in response to the Life Insurance and Advice Working

More information

Carrier Cloud Services 2014-2019

Carrier Cloud Services 2014-2019 Brochure More information from http://www.researchandmarkets.com/reports/2905638/ Carrier Cloud Services 2014-2019 Description: The Cloud has moved beyond simply computing to encompass communications,

More information

Charities Bill 2013 and the Charities (Consequential Amendments and Transitional Provisions) Bill 2013

Charities Bill 2013 and the Charities (Consequential Amendments and Transitional Provisions) Bill 2013 3 May 2013 Manager Philanthropy and Exemptions Unit Indirect, Philanthropy and Resource Tax Division The Treasury Langton Crescent PARKES ACT 2600 By email: charities@treasury.gov.au Dear Treasury Charities

More information

Clearing the Legal fog:

Clearing the Legal fog: Clearing the Legal fog: cloud computing explained MARCH 2010 This issues summary highlights some of the main legal issues that are claimed to negatively affect users of cloud computing and provides practical

More information

MISCELLANEOUS CONSULTANTS PROFESSIONAL INDEMNITY PROPOSAL FORM

MISCELLANEOUS CONSULTANTS PROFESSIONAL INDEMNITY PROPOSAL FORM MISCELLANEOUS CONSULTANTS PROFESSIONAL INDEMNITY PROPOSAL FORM IMPORTANT INFORMATION: PLEASE READ THE FOLLOWING INFORMATION BEFORE COMPLETING THIS PROPOSAL A. Your Duty of Disclosure Before you enter into

More information

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University

Cloud computing: the state of the art and challenges. Jānis Kampars Riga Technical University Cloud computing: the state of the art and challenges Jānis Kampars Riga Technical University Presentation structure Enabling technologies Cloud computing defined Dealing with load in cloud computing Service

More information

Tales of Empirically Understanding and Providing Process Support for Migrating to Clouds

Tales of Empirically Understanding and Providing Process Support for Migrating to Clouds Tales of Empirically Understanding and Providing Process Support for Migrating to Clouds M. Ali Babar Lancaster University, UK & IT University of Copenhagen Talk @ MESOCA, Eindhoven, the Netherlands September,

More information

Our Commitment to Information Security

Our Commitment to Information Security Our Commitment to Information Security What is HIPPA? Health Insurance Portability and Accountability Act 1996 The HIPAA Privacy regulations require health care providers and organizations, as well as

More information

CPA Australia Professional Indemnity Policy For members providing pro-bono or voluntary accounting services in the community

CPA Australia Professional Indemnity Policy For members providing pro-bono or voluntary accounting services in the community CPA Australia Professional Indemnity Policy For members providing pro-bono or voluntary accounting services in the community Frequently Asked Questions These frequently asked questions support the global

More information

The cloud - ULTIMATE GAME CHANGER ===========================================

The cloud - ULTIMATE GAME CHANGER =========================================== The cloud - ULTIMATE GAME CHANGER =========================================== When it comes to emerging technologies, there is one word that has drawn more controversy than others: The Cloud. With cloud

More information

Cloud Computing: Making the right choices

Cloud Computing: Making the right choices Cloud Computing: Making the right choices Kalpak Shah Clogeny Technologies Pvt Ltd 1 About Me Kalpak Shah Founder & CEO, Clogeny Technologies Passionate about economics and technology evolving through

More information

National Cloud Computing Strategy

National Cloud Computing Strategy National Cloud Computing Strategy DBCDE DRAFT DISCUSSION PAPER AIIA Response 21 DECEMBER 2012 INTRODUCTION The Australian Information Industry Association (AIIA) welcomes the opportunity to provide comment

More information

Cloud Computing in the Victorian Public Sector

Cloud Computing in the Victorian Public Sector Cloud Computing in the Victorian Public Sector AIIA response July 2015 39 Torrens St Braddon ACT 2612 Australia T 61 2 6281 9400 E info@aiia.com.au W www.aiia.comau Page 1 of 9 17 July 2015 Contents 1.

More information

NSW Government. Cloud Services Policy and Guidelines

NSW Government. Cloud Services Policy and Guidelines NSW Government Cloud Services Policy and Guidelines August 2013 1 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4

More information

How To Understand Cloud Computing

How To Understand Cloud Computing CLOUD COMPUTING Jillian Raw Partner, Kennedys http://www.kennedys-law.com/jraw/ Cloud Computing- what they say about it the cloud will transform the information technology industry profoundly change the

More information

So#ware to Data model

So#ware to Data model So#ware to model Lenos Vacanas, Stelios So/riadis, Euripides Petrakis Technical University of Crete (TUC), Greece www.intelligence.tuc.gr Workshop on Adap-ve Resource Management and Scheduling for Cloud

More information

Security Awareness and Training

Security Awareness and Training T h e A u d i t o r - G e n e r a l Audit Report No.25 2009 10 Performance Audit A u s t r a l i a n N a t i o n a l A u d i t O f f i c e Commonwealth of Australia 2010 ISSN 1036 7632 ISBN 0 642 81115

More information

Cloud Workload Migration

Cloud Workload Migration Cover Sheet Cloud Workload Migration Where the Cloud-Based Service Delivery Model Makes Sense Sungard(print)New branding.indd 1 28/03/2014 16:09 Summary of Research A significant majority of applications

More information

UniversalSoft Limited

UniversalSoft Limited Working in Partnership for Success Dr Aziz Shaikh Email: aziz@universalsoft.co.uk Tel: +44 (0) 20 8395 3609 Mob: +44 (0) 7710 295 287 www.universalsoft.co.uk Who We Are? UniversalSoft Ltd UniversalSoft

More information

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD

Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Daren Kinser Auditor, UCSD Jennifer McDonald Auditor, UCSD Agenda Cloud Computing Technical Overview Cloud Related Applications Identified Risks Assessment Criteria Cloud Computing What Is It? National

More information

Optimizing Service Levels in Public Cloud Deployments

Optimizing Service Levels in Public Cloud Deployments WHITE PAPER OCTOBER 2014 Optimizing Service Levels in Public Cloud Deployments Keys to Effective Service Management 2 WHITE PAPER: OPTIMIZING SERVICE LEVELS IN PUBLIC CLOUD DEPLOYMENTS ca.com Table of

More information

IJRSET 2015 SPL Volume 2, Issue 11 Pages: 29-33

IJRSET 2015 SPL Volume 2, Issue 11 Pages: 29-33 CLOUD COMPUTING NEW TECHNOLOGIES 1 Gokul krishnan. 2 M, Pravin raj.k, 3 Ms. K.M. Poornima 1, 2 III MSC (software system), 3 Assistant professor M.C.A.,M.Phil. 1, 2, 3 Department of BCA&SS, 1, 2, 3 Sri

More information

Cloud Computing INTRODUCTION

Cloud Computing INTRODUCTION Cloud Computing INTRODUCTION Cloud computing is where software applications, processing power, data and potentially even artificial intelligence are accessed over the internet. or in simple words any situation

More information

Cloud Workload Migration

Cloud Workload Migration Cover Sheet Infographic Summary Introduction Migration Potential Cloud Applications Security: Myth vs. Reality Data Retrieval Cloud Workload Migration Cloud Control Single vs. Multiple Providers Regulation

More information

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute

More information

Storm Clouds Ahead? A risk analysis of Cloud Computing

Storm Clouds Ahead? A risk analysis of Cloud Computing Storm Clouds Ahead? A risk analysis of Cloud Computing Andy Bolton Chief Executive Officer, Capacitas Abstract Many organisations are now considering using 'Cloud Computing' offerings to meet their scalability

More information

Cloud Courses Description

Cloud Courses Description Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment

More information

Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL

Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL 1. Definition of Cloud Computing In the public consultation, CNIL defined

More information

Cloud Computing in Higher Education: Impact and Challenges

Cloud Computing in Higher Education: Impact and Challenges Cloud Computing in Higher Education: Impact and Challenges Anju Gautam Research Scholar, Jagannath University, Jaipur Abstract: Cloud computing is a slogan at present days. It has altered the entire state

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Analogous

More information

Re: Guidelines for Hosting State Government Data Outside NSW Borders

Re: Guidelines for Hosting State Government Data Outside NSW Borders http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 16 March 2014 Dr E. Coombs NSW Privacy Commissioner Dear Elizabeth Re: Guidelines for Hosting State Government

More information

Recommendations for companies planning to use Cloud computing services

Recommendations for companies planning to use Cloud computing services Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation

More information

Legal Issues Associated with Cloud Computing. Laurin H. Mills May 13, 2009

Legal Issues Associated with Cloud Computing. Laurin H. Mills May 13, 2009 Legal Issues Associated with Cloud Computing Laurin H. Mills May 13, 2009 What Is Cloud Computing? The cloud is a metaphor for the Internet Leverages the connectivity of the Internet to optimize the utility

More information

Cloud Computing - Overview of Information Assurance Concerns and Opportunities

Cloud Computing - Overview of Information Assurance Concerns and Opportunities Cloud Computing - Overview of Information Assurance Concerns and Opportunities NSA's Systems and Network Analysis Center, Version 1.02 18 December 2009 Cloud Technology Introduction Cloud computing is

More information

Abstract 1. INTRODUCTION

Abstract 1. INTRODUCTION Abstract CLOUD COMPUTING GauravBawa & Sheena Girdhar DAV Institute of Engineering and Technology, Jalandhar Email: gaurav.daviet@yahoo.com, sheenagirdhar@gmail.com Contact Numbers: 09417614654,09914658188

More information

Securing Your Data In The Cloud: an insiders perspective

Securing Your Data In The Cloud: an insiders perspective Securing Your Data In The Cloud: an insiders perspective INTRODUCTION As the increasing use of cloud computing and other technologies is changing the world of data management, keeping your data private

More information

Teaching cloud computing: a software engineering perspective

Teaching cloud computing: a software engineering perspective Teaching cloud computing: a software engineering perspective Ian Sommerville, School of Computer Science, St Andrews University, Scotland. When a new area of a discipline emerges, university teachers are

More information