Can The Gov’t Avoid Gaffes In The Cloud?

Can the Gov’t Avoid Gaffes in the Cloud?

It’s no surprise that programs that shape our government on all levels of jurisdiction are rapidly and eagerly enlisting into the cloud computing fray. Finally, several of cloud’s noteworthy assets — scalable and streamlined storage and infrastructure, and services purchasable a la carte, for example — have started to beguile departments and bureaucracies frazzled by tightening budgets and increased demand for high-quality service to constituents. But governmental involvement frequently means thwarting several of risks in cloud that could hamper the experience. How can government companies enter cloud without fear of making major errors there?

Cloud computing’s usefulness for the layman user typically comes in the forms of e-mail and basic data storage. Yet exchanging messages about your cat’s vaccination records and storing pics of that Wimbledon tennis party you attended are important but relatively inane documents to protect, especially when compared to the ultra-sensitive data that fuels and nurtures serious governmental operations. Our nation’s economy and border-to-border safety in part hinge upon the material of such documents, and thus protecting them perfectly is paramount. Any gaffe-averse government program looking to enter cloud is therefore highly advised to consider a customized private cloud, where the cloud itself could manage issues like e-mail yet allow for more info-sensitive material to be handled strictly in house.

One of the fundamental and reliable tenets of cloud computing as a tool of progressive technology is that every document handled in the cloud must maintain its original quality and condition, no matter how many times that document may enter and exit the cloud itself. This principle of quality integrity holds doubly true for governmental organizations, for whom even the smallest error in a document could spur damaging repercussions. Government organizations MUST ensure that their cloud provider upholds data integrity at the outset. And any type of cloud (public, private, or a mélange of the two) must also reverence important integrity and quality-retention guidelines, especially those stipulated by the Government Records Act.

Essentially, government clients interested in cloud must exercise more vigilance than private parties. Cloud gaffes are best avoided with this additional meticulousness shown from the get-go. Not every cloud provider will demonstrate the scope of resources and support required of an sensitive-data organization. Focusing on a serious determination of just how sensitive the data involved is from the beginning can shape a cloud computing experience that’s more fruitful and protected.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Securing A Mid-Sized Enterprise: When A Little Assistance Goes A Long Way

Securing A Mid-Sized Enterprise: When A Little Assistance Goes A Long Way

Securing A Mid-Sized Enterprise There is no longer any subjectivity in this statement: security is at the top of list for all CIOs. Every meeting I’ve attended over the last three months has been dominated by the topic of security and when it’s injected into the conversation, it’s not necessarily by my team, but the…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

Bimodal IT Is Not The Death of Traditional IT

Bimodal IT Is Not The Death of Traditional IT

Not The Death of Traditional IT If you are a CIO, no doubt you are getting pressure from your line of business managers to provide a more agile IT environment so they can take advantage of faster, easier to use cloud applications. If you’re not providing those services, they are probably using them anyway and…

Cloud Computing vs. “Cord” Computing

Cloud Computing vs. “Cord” Computing

Easily Managing Access And Authentication To Both Though end users might not notice a difference between systems and applications hosted on-site or in the cloud at their organization, administrators who manage them often have to do so quite differently. Each solution has different requirements pertaining to security, and access and authentication management. System admins want…

All Enterprises Should Model Themselves After Today’s Startups

All Enterprises Should Model Themselves After Today’s Startups

Startups Leveraging Cloud Services Never in history has it been easier to start a business and fast track growth to dominate a market. Conversely, it has never been possible to transform from market leader to market memory faster than now. New startups are disrupting the market, fast tracking growth and sucker punching the market leaders.…

Digital Transformation: Miracle and Wonder

Digital Transformation: Miracle and Wonder

Digital Transformation These are the days of miracle and wonder. I’ve been leading a small, global research team at the Tau Institute for the past few years to examine the dynamics of IT adoption in more than 100 countries throughout the world. We’ve developed several indices that show how well these nations are doing on a relative basis. We ranked the nations…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor