Ethics On The Cloud

Ethics On The Cloud

Ethics and morality have always been dictated by culture and the times. It takes on different forms and their forms from different places and time periods often contradict each other, and what is considered ethical or moral in one era may not be in another. The World Wide Web, and now more recently the move to Cloud Computing and the social revolution is changing the norms of our world’s cultures and ethics and morality along with it.

Just a decade ago it was very unethical to read someone else’s letter, it still is, but the medium of transportation and consumption has changed so much that it has become a little hard to define. Before, it was only between you and the mailman, and he was bound by law to never touch the contents of what he delivers. But in today’s Cloud environments there are no such laws and standards so companies are free to make their own. And as it stands what they write in the agreement which the user consequently agrees to because they can’t avail of the service otherwise, becomes bounded by law. This has a very big potential to become fraud which in this case is actually legal because of the agreement and in my opinion is very unethical. This doesn’t actually mean that it happens, that service providers actually do that, it’s just that it is entirely possible for them to do so and there is not a lot anybody could do when that happens. There is also the problem of accountability and ownership. When something bad happens to the data being stored in the cloud, who can be held responsible, is it the provider for being lenient or the user who was too lenient? And who actually owns the data now that it’s on the Cloud, is it the original owner or the owner of the infrastructure on which it is stored in? This actually raises so many questions with very few answers as of this moment. But this should not dissuade us from making use of Cloud Computing as the benefits most definitely outweigh the negative issues I have discussed.

There is, however, a one-shot-kill-all solution for this and that is to have a unified governing body create and impose a unified standard that would answer all of these concerns once and for all. How to go about doing that is an entirely different story which is still a long way from being finished. There are some studies and papers written on this subject matter.

By Abdul Salam

Sorry, comments are closed for this post.

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…