Ronald van Loon

The Challenges to Tackle Before You Start With AI

Artificial Intelligence and the technology behind it are growing at a furious pace. Marketers have realized its vast potential and are striving to extract the technology’s opportunities in full. There are numerous advancements being made in this regard, and many organizations have taken center stage
Miha Kralj

Cloud Native – Design, Delivery and Management of Applications

Going cloud native, the right way Moving from a traditional IT organization to one that’s cloud native is an inevitability for all businesses. This is because all real software innovation is now cloud-first or cloud-only, so organizations that rely on innovation to succeed – and

What Cloud Consumers Need To Look Out

What Cloud Consumers Need

Many people think cloud computing contracts look out for service providers alone. There are different factors that fuel this attitude. Even then, many consumers still feel like they have no choice. Providers tell them what they can and cannot get. This development is negative for the industry. However, if you want to be a consumer for cloud products, the future is looking bright. With more providers on the market, competition will force some of these dominating companies to think twice. In the meantime, you need to look out for yourself when working on cloud computing contracts with amicable providers.

Ownership of data

Privacy is a critical topic in the cloud. You need to make sure that you still own all content and materials stored in the cloud. The contract needs to clearly assert you as owner for the data stored on another company’s servers. This includes all ownership rights—direct, indirect, and intellectual. This will not only protect you from all the dangers that cover infringements, but it will also serve as evidence in a court of law, were this be necessary. Negotiating a language that guarantees express ownership is the best approach to the contract.

Data disposition

It’s critical that your contract has a clear clause on what happens when you go separate ways. This means that your company avoids a lock-in when the contract ends. There are different approaches to make the provider agree to this. One is for you to get access to your information on an ongoing basis. This way you would have access to the data when the contract ends, but you can also make contingency plans for temporary, emergency, and critical access to data stored on their servers.

Data breaches

Hacking and other breaches are common in the cloud. They happen once in a while, depending on who your provider is. Sometimes, breaches can happen via your root. On many occasions, breaches happen through company’s internal systems. When breaches happen, who is responsible? Naturally, the contract should have a clear direction covering the service provider and consumer duties and responsibilities. It should also state clearly what are the consequences for breaching the terms of the contract.

Legal requests to access data

The cloud contract should also stipulate what happens in the event of a request for data stored from a court of law or government body. Because ownership is entirely in the consumer’s hands, one needs to ensure the right for full disclosure is provided, to stem arbitrary checks and privacy infringements.


Many people wrongly assume that the cloud has no relation whatsoever with physical data centers and infrastructure. Consumers need to know what level of security is awarded to their data, so make sure security measures are clear when you sign the contract.

By Gregory Musungu

Gregory Contributor
Gregory is a writer from Kenya whose education background is Biotechnology, New Media and Accounting. When his intense passion for the tech sphere is not sending him to experiment with new gadgets and technology, you can find him creatively engaged in Nairobi’s thriving underground art scene, copywriting and design.
Chris Gervais

Why Containers Can’t Solve All Your Problems In The Cloud

Containers and the cloud Docker and other container services are appealing for a good reason - they are lightweight and flexible. For many organizations, they ...
Vibhav Agarwal

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as an afterthought. These include a ...
Daren Glenister

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security and private industry to ensure ...
Oracle News

Oracle Recognizes Top Cloud Innovators at OpenWorld

Accenture, Ferrari, GAP, OUTFRONT Media, and SKY Brasil among those recognized as 2019 Oracle Excellence Award Winners This week, Oracle honored a diverse set of customers and partners for outstanding ...
Firefox is testing a VPN, and you can try it right now - It’s part of the revitalized Firefox Test Pilot program

Firefox is testing a VPN, and you can try it right now – It’s part of the revitalized Firefox Test Pilot program

Last week, Mozilla said its Firefox browser would block third-party trackers for everyone by default and yesterday, Mozilla announced a new product that could give Firefox users even more privacy ...
Nvidia News

Seasons of Learning: 700+ Interns Take NVIDIA by Storm

There are no coffee runs in sight for NVIDIA interns. Unless it involves building vehicles to make those runs autonomously. This year, more than 700 interns have joined NVIDIA across 30 ...