Castelfranco Charter: Cloud Computing For Public Health

Castelfranco Charter: Cloud Computing For Public Health

A new revolution is occurring in communication and information technology, and that is cloud computing. People are becoming familiar with social networks and emails which are some of the services being offered by cloud computing. The main thrust of this revolution is to use the same concept being used in email and social networking to business so that applications and data can be shifted to the clouds. Great savings as well as better efficiency in both public and private sectors are expected to be generated if business entities shift to the clouds.

Asolo Ulss, a local public entity in Venice, Italy came up with a charter called Castelfranco Charter for public health. The charter offers suggestions for public entities when they shift to cloud computing. The recommendations were presented in an international conference tour.

The Castelfranco Charter recommends:

  • Use of a redundant broadband network to connect the company, the cloud service providers, and the clients.
  • Make sure the cloud service provider can offer use of a private cloud as an initial step before switching to a public cloud.
  • A roadmap must be presented when moving applications and data to the clouds under sustainable security, management, and economic conditions.
  • Ensure that the datacenters where the entity’s data will be stores are located in a country which guarantees regulations and laws are complied with.
  • Data portability and interoperability must be guaranteed by the cloud service providers if the entity wishes to take advantage of the offers of another service provider.
  • The cloud service provider must be able to ensure continuous operations while in the clouds.
  • Backup/data storage activities must be included in the cloud provider’s management policy.
  • The cloud service provider must put in writing its liability for interoperability failures, downtime, outages, theft and/or loss, and data misplacement.
  • The information and communication technology infrastructure must be modified for service management skills.
  • The entity must appoint a risk and privacy manager who will supervise security, protection, and data management.

Small and medium-scale companies as well as local public entities can also take advantage of the recommendations in order to move their applications and data safely to the clods. The benefits of cloud computing is highly depended on how fast business and public entities can adopt cloud computing therefore policymakers must be able to promote rapid adoption. These entities may have difficulties in overcoming data privacy, data portability, and reorganizations but these can be resolved by coming up with strategies before moving the systems to the clouds.

Cloud computing is continuously evolving and currently focused in providing software as a service, platform as a service, and infrastructure as a service. Because of this movement, software and hardware companies are creating a lot of services and data centers.

Compared to traditional platforms, cloud platforms can support various users through the internet and therefore becoming cost-efficient. Traditional platforms, on the other hand, are still founded on the use of the operating system on various infrastructure services as well as on custom and packaged applications.

Business organizations and public authorities can have great financial benefits when they take advantage of cloud computing because on a general scale, fixed costs are reduced because the entities do not need to spend heavily on fixed capital IT expenditures. SMEs can greatly benefit on cloud computing because money which is saved from capital expenditures can now be used on other more important projects.

By Florence de Borja

Sorry, comments are closed for this post.

Comic
The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Higher Education Institutions Increasing Cloud Use In Next 5 Years

Higher Education Institutions Increasing Cloud Use In Next 5 Years

Cloud Computing Advancing Edtech In a new research study by ResearchMoz it’s predicted that the global cloud computing market in higher education will grow steadily at a CAGR of 24.57% over the period 2016 to 2020. Making use of computing resources connected by either public or private networks provides the benefits of scalable infrastructure, greater…

Big Data and AI Hold Greatest Promise For Healthcare Technologies

Big Data and AI Hold Greatest Promise For Healthcare Technologies

Digital Healthcare Executives and Investors Addressed Opportunities and Challenges Facing the Industry New York City – September 21, 2016 – According to a survey of 122 founders, executives and investors in health-tech companies released today by Silicon Valley Bank, big data and artificial intelligence will have the greatest impact on the industry in the year ahead. Healthcare…

What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The cloud is capable of delivering many benefits, enabling greater collaboration, business agility, and speed to market. Cloud adoption in the enterprise has been growing fast. Worldwide spending on public cloud services will grow at a…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…