Can The Gov’t Avoid Gaffes In The Cloud?

Can the Gov’t Avoid Gaffes in the Cloud?

It’s no surprise that programs that shape our government on all levels of jurisdiction are rapidly and eagerly enlisting into the cloud computing fray. Finally, several of cloud’s noteworthy assets — scalable and streamlined storage and infrastructure, and services purchasable a la carte, for example — have started to beguile departments and bureaucracies frazzled by tightening budgets and increased demand for high-quality service to constituents. But governmental involvement frequently means thwarting several of risks in cloud that could hamper the experience. How can government companies enter cloud without fear of making major errors there?

Cloud computing’s usefulness for the layman user typically comes in the forms of e-mail and basic data storage. Yet exchanging messages about your cat’s vaccination records and storing pics of that Wimbledon tennis party you attended are important but relatively inane documents to protect, especially when compared to the ultra-sensitive data that fuels and nurtures serious governmental operations. Our nation’s economy and border-to-border safety in part hinge upon the material of such documents, and thus protecting them perfectly is paramount. Any gaffe-averse government program looking to enter cloud is therefore highly advised to consider a customized private cloud, where the cloud itself could manage issues like e-mail yet allow for more info-sensitive material to be handled strictly in house.

One of the fundamental and reliable tenets of cloud computing as a tool of progressive technology is that every document handled in the cloud must maintain its original quality and condition, no matter how many times that document may enter and exit the cloud itself. This principle of quality integrity holds doubly true for governmental organizations, for whom even the smallest error in a document could spur damaging repercussions. Government organizations MUST ensure that their cloud provider upholds data integrity at the outset. And any type of cloud (public, private, or a mélange of the two) must also reverence important integrity and quality-retention guidelines, especially those stipulated by the Government Records Act.

Essentially, government clients interested in cloud must exercise more vigilance than private parties. Cloud gaffes are best avoided with this additional meticulousness shown from the get-go. Not every cloud provider will demonstrate the scope of resources and support required of an sensitive-data organization. Focusing on a serious determination of just how sensitive the data involved is from the beginning can shape a cloud computing experience that’s more fruitful and protected.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…