SOPA, PIPA, and the Cloud: We Have Mega Issues

SOPA, PIPA, and the Cloud

SOPA and PIPA, two of the most infamous and polemical pieces of governmental legislation aimed squarely at the Internet’s copyright violators in modern history, have produced ripples of interest that should not go unnoticed by the cloud computing community.

After days of heated protest both online and away from the Web, both the Stop Online Piracy Act and the Protect IP Act have been postponed by Congress. The former bill sought to enlarge the authority of American law enforcement to combat web-based trafficking of counterfeit products and intellectual property, while PIPA would have armed the government with additional power to restrict the activities of websites involved with such activity.

Although a maelstrom of dismay on Twitter and virtual discussion forums successfully curbed the power of SOPA/PIPA, some websites did not survive the crossfire. Before closing up shop, Congress nabbed and eliminated Megaupload, a well-known fire sharing site, brandying it as their scapegoat of copyright violation. The indictment against Megaupload noted how many users employed the site as their own personal cloud, storing video files, pictures, and work documents on the site. Many Megaupload fans mourned how conveniently it functioned as a backup service.

Internet users en masse have begun to question the cloud’s benefit as safe and secure storage of their information as a result of the SOPA/PIPA debacle. And rightfully so: this incident has ignited an open discussion for the relevance of the cloud in the current status of the Internet in society.

The whiffs of a cloud backlash in the wake of SOPA/PIPA are not unfounded. But cloud computing skeptics should thoroughly evaluate the entirety of the dilemma before completely writing off the cloud’s positive capacities.

To be sure, actual copyright violators and pirates of intellectual property did flourish on the liberal, expansive nature of Megaupload and its subsidiary sites (such as the extremely popular Megavideo). Yet virtual wrongdoers were not the site’s sole constituents. Many Megaupload users merely regarded the site as a useful repository for their online data. Others backed up their files there, employing Megaupload for its auxiliary function.

Understandably, many would-be cloud users might be warded off by fear of a federal shakedown. Businesses should also be concerned, since their employees might choose to store important information in cloud sites that might be dismantled and rid of their data.

The SOPA/PIPA affair has not concluded by any means. Both Craigslist and Wikipedia warn their users that the bills will continue to lurk in Congress’ shadows, perhaps to eventually resurface in a revamped and less easily overpowered form. But for the interim, the sum of these events should be considered as a cautionary tale.

Both professional companies and private users should thoroughly vet their providers of online data storage, backup, and information hosting well in advance of uploading critical information there. Only vigilance against sites with a history of hosting pirated information can preempt users from being pipped by SOPA/PIPA in the future.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Comic
When Sci-Fi Predictions Come To Fruition

When Sci-Fi Predictions Come To Fruition

Evolution of Technologies To paraphrase science fiction author Arthur C. Clark, those who make predictions about the future are either “considered conservative now and mocked later, or mocked now and proved right when they are no longer around to enjoy the acclaim.” The one thing we can be sure about, Clark ventured, is that “[the…

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Inc (FB.O) said on Thursday it had completed a successful test flight of a solar-powered drone that it hopes will help it extend internet connectivity to every corner of the planet. Aquila, Facebook’s lightweight, high-altitude aircraft, flew at a few thousand feet for 96 minutes in Yuma, Arizona, Chief Executive Mark Zuckerberg wrote in…

When Will Women In Tech Become The Norm?

When Will Women In Tech Become The Norm?

Tech Diversity It is well known that the technology industry has been dominated by men, but it is also clear that the industry is working to change that. Diversity in the tech industry, especially where it applies to women in tech, has been a topic of discussion for years. Recently the Washington Technology Industry Association…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Edtech and Virtual Reality – Exciting Learning Environment

Edtech and Virtual Reality – Exciting Learning Environment

Customizing Edutech Customized edtech learning solutions are becoming more commonplace as the education industry recognises their potential and begins transforming the traditional structures so as to incorporate innovative developments. From textbooks to tablets, chalkboards to virtual reality, edtech promises not only dynamic and exciting learning environments but better learning strategies and solutions. Virtual Reality and…

Get Ready For Virtual Reality and the Cloud

Get Ready For Virtual Reality and the Cloud

Virtual Reality Cloud We’re lucky to live in an era where virtual reality is no longer relegated to the confines of a sci-fi movie universe. Thanks to technology introduced by products like Oculus Rift, consumers now have access to virtual environments with fully immersive graphic capabilities. As a result, companies have only just begun to…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Cloud And The Military – In The US

Cloud And The Military – In The US

Cloud And The Military Scandalous cost overruns; the newest high tech doesn’t work any better than very old tech; sweetheart monopoly deals with favorite defense contractors; sole sourcing key components from our enemies – the litany just goes on and on. The military’s relationship with technology always seems to be like watching a slow motion…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

The Business of Security: Avoiding Risks

The Business of Security: Avoiding Risks

The Business of Security Security is one of those IT concerns that aren’t problematic until disaster strikes. It might be tomorrow, it could be next week or next year. The fact is that poor security leaves businesses wide open for data loss and theft. News outlets just skim the surface, but hackers cost business up…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…