Aussie, Eurozone Cloud Computing Industries Grow Gloomy On The US Patriot Act

Aussie, Eurozone Cloud Computing Industries Grow Gloomy On The US Patriot Act

The European Union has resuscitated the more than a decade-old contention about data independence after giving an exposé of the US Patriot Act of 2001, which bequeaths the Federal administration, on the other side of the Atlantic, the power to seize data in any continent for surveillance reasons.

The same rigmarole surrounding a legislation that is now a dozen years old has also visited upon the Australian scene, where CIOs are circumspect on whether to go ahead and store data offshore, where the United States’ forensic agencies have a right to penetrate the firewalls as long as they are under US companies, despite being in overseas’ jurisdictions.

This has forced tech giants like Google and Rackspace to come out strongly, vowing that they would resist the prerogative of the government to use a warrant, or even, in some cases, as the Patriot Act stipulates, seize information devoid of a warranty, as this would lead to the gagging of the Infrastructure as a Service (IaaS) dispensation.

One of the key elements of the legislation is the Foreign Intelligence Surveillance, an Act that received revision by Congress (2008), whose mandate the current US administration extended for the ensuing period of half-a-decade, starting 2012. It is this clause that the Eurozone has much bone to chew on for it provides for searches without warrant on cloud data as well as in other communication conduits, not just the Internet.

The European IT community feels that this provision is more like a weapon of mass destruction spot on the EU laws, which have much of a right to claim as being some of the freest legislations on the globe, factoring in user privacy. Indeed, the whole point of concern is the Foreign Intelligence clause’s ability to just monitor the offshore data by US firms or even data under storage in the United States by a non-citizen, for “purely political” reasons. The current legislation is a limb of several others that came up intermittently two to three decades ago but consummated into a single powerful automation of a law or what is now the Patriot Act, subsequent to the terrorist attacks in 2001.

On the Other side of the Smoke

Despite this much concern about the cloud laws, analysts are saying that the Patriot Act may eventually prove to be too much ado about nothing in cloud computing terms, because of two points:

First, the laws have always been there and have required, time and again, a federal judge to provide a subpoena for the investigation of another entity’s sovereign data, with the exception of cases where the issue is too sensitive for the government to necessarily seek a legal permit. Furthermore, there have to be precedents in certain cases before anyone can arbitrarily rummage through someone else’s data, albeit this is rather vague for the government can use the same advantage of a precedent to analyze an offshore account without going through a judge.

Secondly, the Patriot Act is not the only legislation around. In Australia, United Kingdom, Germany, Denmark and other nations that protest the move, there are provisions for the respective regimes to perpetuate this ‘reign of terror’ on cloud accounts abroad that are of national concern.

In the Land Down Under for instance, the government can search a national’s documents abroad but under a shady alias so that this won’t become public. The fact of the matter still remains that there always have to be a permit to conduct any surveillance on outsource and cloud data in Australia.

The implications of this compendium of laws which are all obscure but for the Patriot Act, one would say, has led many IT firms to decide to just go on with their business of life while EU, Google and co., check their pawns for their next moves on the chess table.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…