RANSOMWARE TRACKING MAPS

Recent problems experienced with Ransomware are evident from infections, which have occurred in 99 countries including China and Russia. The organization that was worst hit by the attack was the National Health Service in England. It was reported that there was a WannaCry programme that demanded...

What Cloud Consumers Need To Look Out For In Cloud Contracts

What Cloud Consumers Need To Look Out For In Cloud Contracts

Many people think cloud computing contracts look out for service providers alone. There are different factors that fuel this attitude. Even then, many consumers still feel like they have no choice. Providers tell them what they can and cannot get. This development is negative for the industry. However, if you want to be a consumer for cloud products, the future is looking bright. With more providers on the market, competition will force some of these dominating companies to think twice. In the meantime, you need to look out for yourself when working on cloud computing contracts with amicable providers.

Ownership of data

Privacy is a critical topic in the cloud. You need to make sure that you still own all content and materials stored in the cloud. The contract needs to clearly assert you as owner for the data stored on another company’s servers. This includes all ownership rights—direct, indirect, and intellectual. This will not only protect you from all the dangers that cover infringements, but it will also serve as evidence in a court of law, were this be necessary. Negotiating a language that guarantees express ownership is the best approach to the contract.

Data disposition

It’s critical that your contract has a clear clause on what happens when you go separate ways. This means that your company avoids a lock-in when the contract ends. There are different approaches to make the provider agree to this. One is for you to get access to your information on an ongoing basis. This way you would have access to the data when the contract ends, but you can also make contingency plans for temporary, emergency, and critical access to data stored on their servers.

Data breaches

Hacking and other breaches are common in the cloud. They happen once in a while, depending on who your provider is. Sometimes, breaches can happen via your root. On many occasions, breaches happen through company’s internal systems. When breaches happen, who is responsible? Naturally, the contract should have a clear direction covering the service provider and consumer duties and responsibilities. It should also state clearly what are the consequences for breaching the terms of the contract.

Legal requests to access data

The cloud contract should also stipulate what happens in the event of a request for data stored from a court of law or government body. Because ownership is entirely in the consumer’s hands, one needs to ensure the right for full disclosure is provided, to stem arbitrary checks and privacy infringements.

Security

Many people wrongly assume that the cloud has no relation whatsoever with physical data centers and infrastructure. Consumers need to know what level of security is awarded to their data, so make sure security measures are clear when you sign the contract.

By Gregory Musungu

About Gregory

Gregory is a writer from Kenya whose education background is Biotechnology, New Media and Accounting. When his intense passion for the tech sphere is not sending him to experiment with new gadgets and technology, you can find him creatively engaged in Nairobi’s thriving underground art scene, copywriting and design.

SYNDICATED NEWS SOURCES

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit to Help Cybersecurity Pros Securely Harness Cloud Technologies

By CloudBuzz | September 22, 2017

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit Research cites strengthening of cloud security skills top priority over next three years CLEARWATER, Fla. ,Sept. 22, 2017 /PRNewswire-USNewswire/ — (ISC)² today announced it’s partnering with the Cloud Security Alliance (CSA) for the CSA…

Exclusive: T-Mobile, Sprint close to agreeing deal terms – Sources

By CloudBuzz | September 22, 2017

(Reuters) – T-Mobile US Inc (TMUS.O) is close to agreeing tentative terms on a deal to merge with peer Sprint Corp (S.N), people familiar with the matter said, a major breakthrough in efforts to merge the third and fourth largest…

Hack of U.S. securities regulator rattles investors, stirs doubts

By CloudBuzz | September 21, 2017

WASHINGTON/NEW YORK (Reuters) – Wall Street’s top regulator faced questions on Thursday about its defenses against cyber criminals after admitting hackers breached its electronic database of corporate announcements and may have used it for insider trading. The incursion at the…

Leaking Cloud Databases and Servers Expose Over 1 Billion Records

By CloudBuzz | September 21, 2017

Servers Expose Over 1 Billion Records As The Wall Street Journal recently pointed out, some clients of cloud service providers such as Amazon and Microsoft are accidentally leaving their cloud databases exposed due to misconfigurations of their services. Coupled with recent headline-making…

Thales Joins the Microsoft Enterprise Cloud Alliance

By CloudBuzz | September 21, 2017

SAN JOSE, Calif., Sept. 21, 2017 /PRNewswire/ — Thales, a leader in critical information systems, cybersecurity and data security, is now a member of the Microsoft Enterprise Cloud Alliance (ECA). Designed to foster innovation and promote awareness of partner solutions, the ECA membership…

Addressing the UK NCSC’s Cloud Security Principles

By CloudBuzz | September 20, 2017

As your organization adopts more cloud services, it’s essential to get a clear picture of how sensitive data will be protected. Many authorities, from government regulators, to industry standards bodies and consortia, have provided guidance on how to evaluate cloud…