CloudCode: A Code of Conduct For Cloud Computing Providers In New Zealand

CloudCode: A Code of Conduct For Cloud Computing Providers In New Zealand

Because cloud computing is a relatively new industry, it is but expected that it is unregulated. With the influx of cloud services providers and organizations which earn a lot from this industry, there is a thus a need to offer security measures. Thus in New Zealand, these cloud computing groups got together and tried to create guidelines for those entities offering cloud computing in the country.

A fundamental code of conduct for cloud computing providers was put together by the New Zealand Computer Society and named it CloudCode. The code of conduct, however, is voluntary but it’s a start to screen out those providers offering bad services. A CloudCode facilitator, Joy Cottle, said that the code of conduct is not prescriptive but proactive. It aims to be the answer to vendors and consumers needs. It can also be adopted easily by the suppliers and understood easily by the customers.

In coming with CloudCode, the proponents hopes to empower the professional cloud computing providers to demonstrate and benchmark their ethics, processes, and practices through a reputable 3rd party in order to build a trusting relationship with potential customers. This purpose is achieved by adherence to CloudCode. The code of conduct also helps consumers by letting them create informed decisions through the disclosure of practices of such cloud computing service provider thereby empowering them to gain confidence on the providers’ ability to meet their requirements.

CloudCode also demonstrates trust in the Cloud Computing Service Industry by offering a format which can be depended on by both customers and suppliers. Also, the providers of cloud service has the option to increase their compliance level by undertaking extra compliance modules which can offer a higher compliance level in areas of Jurisdictions, Data Formats, HR Procedures, Business Continuity, Service dependencies, Data Transportability, and Security. The drafting of New Zealand’s CloudCode was created by more than 150 IT individuals from all over New Zealand and other countries.

The code of conduct is based on core principles which can be applied to succeeding cloud code practices:

  • CloudCode is banking on existing work on Computing Code of Practice not only in New Zealand but in other countries as well. As much as possible, it prefers any established work rather than create a new one. It is not bent on reinventing the wheel.
  • CloudCode aims to be consistent with Global Structure and Practice so much so that it has taken steps to research any established approaches to resolve core issues in other countries so that the results are consistent with other countries’ practices.
  • CloudCode was developed based on arbitrary approach in order to establish demonstrable good decisions and practice.
  • The project teams and the New Zealand Computer Society only acted as facilitators in the development of the code of conduct in consultation with a wide range of stakeholders.
  • The resultant CloudCode is a product of consensus with the intention to obtain a broad support from a wide range of stakeholders
  • The steering committee ensured the process and principles all adhere to evidence. It didn’t, however, take any part in CloudCode’s development.
  • CloudCode doesn’t require any unnecessary compliance process or cost on those providers which desires to adhere to CloudCode. Only necessary costs and processes are required in order to maintain the integrity of the code of conduct.

The objectives of CloudCode include:

  • Improvement of cloud computing services standards.
  • Set a disclosure standard with the Cloud Computing Industry.
  • Create impartiality between customers and suppliers with regards to privacy, sovereignty, and data protection.
  • Strengthen cloud computing’s integrity in New Zealand.

CloudCode was created for cloud computing service providers which provide IT services which are remotely hosted, whether within New Zealand or from New Zealand, which meet the Cloud Computing’s definition. It doesn’t, however, provide legal obligations for any party adhering to the code of conduct. However, if a provider is found to be falsifying information then they will have to be punished under New Zealand law.

By Florence de Borja

Sorry, comments are closed for this post.

Comic
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Significant Emerging Technologies To Lookout For In 2017

Significant Emerging Technologies To Lookout For In 2017

Emerging Technologies The entire world is being transformed right before our eyes. Emerging technologies are developing at break-neck speeds, and the global community needs to be prepared for what lies in the horizon. As with anything new or evolving there is benefit versus risk to consider. Most of the up-and-coming technologies that will soon affect…

In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where they need some work. With big data analytics, every move you make for your company can be backed by data and analytics. While every business venture involves some level of risk, with big data, that risk…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Get Ready For Virtual Reality and the Cloud

Get Ready For Virtual Reality and the Cloud

Virtual Reality Cloud We’re lucky to live in an era where virtual reality is no longer relegated to the confines of a sci-fi movie universe. Thanks to technology introduced by products like Oculus Rift, consumers now have access to virtual environments with fully immersive graphic capabilities. As a result, companies have only just begun to…

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business owners and entrepreneurs. So many choices, in fact, that many companies aren’t sure which business intelligence company to use. To help offer you a solution, we’ve compiled a list of 12 Business Intelligence companies…

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing Innovation Sao Paulo, Brazil has had trouble with both energy and water supplies as of late. Despite it is the rainy period. Unfortunately Sao Paulo is very dependent on its rain as a majority of its power is generated from large dams. No water, no energy. Difficult situation for a city of some…

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data Future Today’s organizations should become more collaborative, virtual, adaptive, and agile in order to be successful in complex business world. They should be able to respond to changes and market needs. Many organizations found that the valuable data they possess and how they use it can make them different than others. In fact,…

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do I am not going to mention names in this article, but if you want to be the best, you must look at what the best do – and do it better. The importance of investing in SaaS onboarding can be easily overlooked in favor of designing efficient and powerful software…

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think Last week we touched upon how a project in Finland had blended two of the world’s most important industries, cloud computing and green technology, to produce a data centre that used nearby sea water to both cool their servers and heat local homes.  Despite such positive environmental projects, there…

Cloud Computing Then & Now

Cloud Computing Then & Now

The Evolving Cloud  From as early as the onset of modern computing, the possibility of resource distribution has been explored. Today’s cloud computing environment goes well beyond what most could even have imagined at the birth of modern computing and innovation in the field isn’t slowing. A Brief History Matillion’s interactive timeline of cloud begins…