Aussie, Eurozone Cloud Computing Industries Grow Gloomy On The US Patriot Act

Aussie, Eurozone Cloud Computing Industries Grow Gloomy On The US Patriot Act

The European Union has resuscitated the more than a decade-old contention about data independence after giving an exposé of the US Patriot Act of 2001, which bequeaths the Federal administration, on the other side of the Atlantic, the power to seize data in any continent for surveillance reasons.

The same rigmarole surrounding a legislation that is now a dozen years old has also visited upon the Australian scene, where CIOs are circumspect on whether to go ahead and store data offshore, where the United States’ forensic agencies have a right to penetrate the firewalls as long as they are under US companies, despite being in overseas’ jurisdictions.

This has forced tech giants like Google and Rackspace to come out strongly, vowing that they would resist the prerogative of the government to use a warrant, or even, in some cases, as the Patriot Act stipulates, seize information devoid of a warranty, as this would lead to the gagging of the Infrastructure as a Service (IaaS) dispensation.

One of the key elements of the legislation is the Foreign Intelligence Surveillance, an Act that received revision by Congress (2008), whose mandate the current US administration extended for the ensuing period of half-a-decade, starting 2012. It is this clause that the Eurozone has much bone to chew on for it provides for searches without warrant on cloud data as well as in other communication conduits, not just the Internet.

The European IT community feels that this provision is more like a weapon of mass destruction spot on the EU laws, which have much of a right to claim as being some of the freest legislations on the globe, factoring in user privacy. Indeed, the whole point of concern is the Foreign Intelligence clause’s ability to just monitor the offshore data by US firms or even data under storage in the United States by a non-citizen, for “purely political” reasons. The current legislation is a limb of several others that came up intermittently two to three decades ago but consummated into a single powerful automation of a law or what is now the Patriot Act, subsequent to the terrorist attacks in 2001.

On the Other side of the Smoke

Despite this much concern about the cloud laws, analysts are saying that the Patriot Act may eventually prove to be too much ado about nothing in cloud computing terms, because of two points:

First, the laws have always been there and have required, time and again, a federal judge to provide a subpoena for the investigation of another entity’s sovereign data, with the exception of cases where the issue is too sensitive for the government to necessarily seek a legal permit. Furthermore, there have to be precedents in certain cases before anyone can arbitrarily rummage through someone else’s data, albeit this is rather vague for the government can use the same advantage of a precedent to analyze an offshore account without going through a judge.

Secondly, the Patriot Act is not the only legislation around. In Australia, United Kingdom, Germany, Denmark and other nations that protest the move, there are provisions for the respective regimes to perpetuate this ‘reign of terror’ on cloud accounts abroad that are of national concern.

In the Land Down Under for instance, the government can search a national’s documents abroad but under a shady alias so that this won’t become public. The fact of the matter still remains that there always have to be a permit to conduct any surveillance on outsource and cloud data in Australia.

The implications of this compendium of laws which are all obscure but for the Patriot Act, one would say, has led many IT firms to decide to just go on with their business of life while EU, Google and co., check their pawns for their next moves on the chess table.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Comic
SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things

Monetizing Internet Of Things There are many interesting ways in which companies are looking to connect devices to the cloud. From the vehicles to kitchen appliances the internet of things is already a $1.9 trillion dollar market based on research estimates from IDC. Included is a fascinating infographic provided by AriaSystems which shows us some of the exciting…

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services Cloud Banking Insights Series focuses on big data in the financial services industry and whether it is a security threat or actually a massive opportunity. How does big data fit into an overall cloud strategy? Most FI’s have a positive mind-set towards cloud IT consumption as it not only enables…

Low Cost Cloud Computing Gives Rise To Startups

Low Cost Cloud Computing Gives Rise To Startups

Balancing The Playing Field For Startups According to a Goldman Sachs report, cloud infrastructure and platform spending could reach $43 billion by 2018, which is up $16 billion from last year, representing a growth of around 30% from 2013 said the analyst. This phenomenal growth is laying the foundation for a new breed of startup…

Cloud Infographic – The Data Scientist

Cloud Infographic – The Data Scientist

Data Scientist Report The amount of data in our world has been exploding in recent years. Managing big data has become an integral part of many businesses, generating billions of dollars of competitive innovations, productivity and job growth. Forecasting where the big data industry is going has become vital to corporate strategy. Enter the Data…

Cloud Infographic – What Is The Internet of Things?

Cloud Infographic – What Is The Internet of Things?

What Is The Internet of Things? “We’re still in the first minutes of the first day of the Internet revolution.”  – Scott Cook The Internet of Things (IOT) and Smart Systems are based on the notions of Sensors, Connectivity, People and Processes. We are creating a new world to view and measure anything around us through…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…