Cloud Computing: The Legal Dilemmas

The Legal Dilemmas

Cloud computing has fronted the expansion of the personal computer. Microsoft’s Bill Gates envisioned the personalization of the computer over 20 years ago, and these dreams have been surpassed. The desire to expand the utility of personal computing has brought to light the need for control of data sharing. Outsourcing of hardware resources is a fairly new area in computing. Normally termed as cloud computing, data sharing has fronted a novel catalogue of legal implications, with most jurisdictions seeking to control the power wielded by providers of such services.

These jurisdictions are actually justified in their cause, owing to the growing tendency for cloud computing to replace onsite data storage. What will become of individuals who are not able to handle the required expertise in managing the data stored in the cloud? Is there any conflict of interest when it comes to cloud computing? Do onshore and offshore data centers offers analogous services?

Randal Jackson has raised this concern, with relation to the appointment of Revera by Microsoft as a provider of cloud computing services. Conflict of interest arises from the fact that Revera has private datacenters offering the same services he is to oversee at Microsoft, albeit on a private offering. Since Microsoft does the same on public clouds, the concern are aligned with whether Revera will be able to assure the sovereignty of the two roles.

Similar concerns have originated with regard to the manner in which data sharing and handling is to be overseen. Currently, specific laws are vague and this has come in the way of expansion of cloud computing with some entities facing legal stand-offs. In addition to the loss of business, these legal impasses have contributed to the inability of tech startups to focus on expanding their services towards cloud computing for commercial purposes. Private cloud computing companies have also sought to limit their services within jurisdictions where legal implications are limited to nil. On the same note, by limiting their clientele to certain companies, liabilities are mitigated, making it easy to operate.

The future looks bright though, considering that legislation regarding administration of clouds have sprung up in numerous locations. Hopes are now turned to the consolidation of views and formation of a globally-acceptable and focused piece of legislation which will allow cloud computing to expand across the nations. Unlike other technology-based inventions such as the internet, cloud computing presents a novel set of challenges. Considering the sensitive nature of the information being placed in the cloud, the rush to quick-fix solutions could be a component of doom.

There is never a rush when it comes to the search for lasting solutions. Unlike in the past, the fact that the global village is highly developed, dissemination of solutions will be an immediate step in the development of a solution. Meanwhile, corporations and individuals will just have to make-do with the existing facilities of data handling and data transfer, hoping that a decision will be reached soon.

By Rick Watson

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…