Aussie, Eurozone Cloud Computing Industries Grow Gloomy On The US Patriot Act

Aussie, Eurozone Cloud Computing Industries Grow Gloomy On The US Patriot Act

The European Union has resuscitated the more than a decade-old contention about data independence after giving an exposé of the US Patriot Act of 2001, which bequeaths the Federal administration, on the other side of the Atlantic, the power to seize data in any continent for surveillance reasons.

The same rigmarole surrounding a legislation that is now a dozen years old has also visited upon the Australian scene, where CIOs are circumspect on whether to go ahead and store data offshore, where the United States’ forensic agencies have a right to penetrate the firewalls as long as they are under US companies, despite being in overseas’ jurisdictions.

This has forced tech giants like Google and Rackspace to come out strongly, vowing that they would resist the prerogative of the government to use a warrant, or even, in some cases, as the Patriot Act stipulates, seize information devoid of a warranty, as this would lead to the gagging of the Infrastructure as a Service (IaaS) dispensation.

One of the key elements of the legislation is the Foreign Intelligence Surveillance, an Act that received revision by Congress (2008), whose mandate the current US administration extended for the ensuing period of half-a-decade, starting 2012. It is this clause that the Eurozone has much bone to chew on for it provides for searches without warrant on cloud data as well as in other communication conduits, not just the Internet.

The European IT community feels that this provision is more like a weapon of mass destruction spot on the EU laws, which have much of a right to claim as being some of the freest legislations on the globe, factoring in user privacy. Indeed, the whole point of concern is the Foreign Intelligence clause’s ability to just monitor the offshore data by US firms or even data under storage in the United States by a non-citizen, for “purely political” reasons. The current legislation is a limb of several others that came up intermittently two to three decades ago but consummated into a single powerful automation of a law or what is now the Patriot Act, subsequent to the terrorist attacks in 2001.

On the Other side of the Smoke

Despite this much concern about the cloud laws, analysts are saying that the Patriot Act may eventually prove to be too much ado about nothing in cloud computing terms, because of two points:

First, the laws have always been there and have required, time and again, a federal judge to provide a subpoena for the investigation of another entity’s sovereign data, with the exception of cases where the issue is too sensitive for the government to necessarily seek a legal permit. Furthermore, there have to be precedents in certain cases before anyone can arbitrarily rummage through someone else’s data, albeit this is rather vague for the government can use the same advantage of a precedent to analyze an offshore account without going through a judge.

Secondly, the Patriot Act is not the only legislation around. In Australia, United Kingdom, Germany, Denmark and other nations that protest the move, there are provisions for the respective regimes to perpetuate this ‘reign of terror’ on cloud accounts abroad that are of national concern.

In the Land Down Under for instance, the government can search a national’s documents abroad but under a shady alias so that this won’t become public. The fact of the matter still remains that there always have to be a permit to conduct any surveillance on outsource and cloud data in Australia.

The implications of this compendium of laws which are all obscure but for the Patriot Act, one would say, has led many IT firms to decide to just go on with their business of life while EU, Google and co., check their pawns for their next moves on the chess table.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

One Response to Aussie, Eurozone Cloud Computing Industries Grow Gloomy On The US Patriot Act

  1. Look, it is what it is. I know most large corporations are complying and trying to do what they need to do so they don’t face any hefty fines.

Comic
Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

5 Things To Consider About Your Next Enterprise File Sharing Solution

5 Things To Consider About Your Next Enterprise File Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

5 Reasons Why Your Startup Will Grow Faster In The Cloud

5 Reasons Why Your Startup Will Grow Faster In The Cloud

Cloud Startup Fast-tracking Start-ups face many challenges, the biggest of which is usually managing growth. A start-up that does not grow is at constant risk of failure, whereas a new business that grows faster than expected may be hindered by operational constraints, such as a lack of staff, workspace and networks. It is an unfortunate…

Cloud Computing – The Game Changer

Cloud Computing – The Game Changer

Global Cloud Index In October, Cisco released its Global Cloud Index (GCI) report for 2014-2019, projecting a near 3-fold growth of global data center traffic, with predictions that this traffic will reach 8.6 zettabytes (cloud data center traffic) and 10.4 zettabytes (total data center traffic) per year in 2019 and 80% of it will come…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

4 Industries Being Transformed By The Internet of Things

4 Industries Being Transformed By The Internet of Things

Compelling IoT Industries Every year, more and more media organizations race to predict the trends that will come to shape the online landscape over the next twelve months. Many of these are wild and outlandish and should be consumed with a pinch of salt, yet others stand out for their sober and well-researched judgements. Online…

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud Learn how to get to grips with cloud computing in business  Struggling to get your head around the Cloud? Here are five easy ways you can improve your cloud knowledge and perhaps even introduce cloud systems into your business.  Any new technology can appear daunting, and cloud computing is no exception.…

5 Surprising Ways Cloud Computing Is Changing Education

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost 90 percent of organizations currently using some kind of cloud-based application. The immediate benefits of cloud computing are obvious: cloud-based applications reduce infrastructure and IT costs, increase accessibility, enable collaboration, and allow organizations more flexibility…