• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » Privacy in Cloud Computing : Applicability of Data Protection Law

By Abhishek Ghosh December 12, 2013 4:26 am Updated on December 12, 2013

Privacy in Cloud Computing : Applicability of Data Protection Law

Advertisement

Privacy in Cloud Computing includes the applicable laws for personal data. The data protection law is only applicable to personal data. The applicable laws for maintain the Privacy in Cloud Computing only comes into play precisely when such data is to be stored or processed within the cloud. The applicable data protection law is bound locally. Therefore, in normal as in the case of Privacy Policy, are examined in which spatial data may be sent and which not. In the previous article, named Privacy in Cloud Computing, we gave an elementary introduction for the more complex topics evolving the newest concern Privacy in Cloud Computing.

Table of Contents

  • 1 Introduction
  • 2 Regional Laws
  • 3 Contracts
  • 3 Further Reading

 

Privacy in Cloud Computing : Regional Laws

 

Within the EU:

Advertisement

---

EU Member States form a single market and a common legal space. This means that jointly the EU decisions are immediately transferred to local law of the Member States. In short, what is decided at the EU level, can also be found in the relevant law of a Member State. This ensures that one can speak of an uniform data protection law. Therefore, it is not surprising that in the EU data protection directives, it will be decided that the cross-border traffic within the EU must not present any obstacle.
Appropriate regulations can also be found in the Federal Data Protection Act. The community law, therefore prevents breech of Privacy in Cloud Computing to some extent. However, this is not applicable to the foreign companies that rise through a branch within the EU member states, since they are not bound by the Federal Privacy Act and thus the protection of sensitive data is not guaranteed.

Outside the EU:

Here, there is no difference to the normal case of data protection. It must therefore be ensured that the EU’s data protection guidelines are followed by additional agreements.

Requirements for a company:

Since the data protection legislation must therefore be applied in any case, companies have to bend to this and also should provide enough cloud computing privacy to ensure that these provisions are enforceable. In this case, that means concrete terms that must be dealt with access control, access and authorization controls.

 

Privacy in Cloud Computing : Contracts

 

Cloud providers provide the customers a variety of IT systems and / or IT infrastructure. Depending on the service rendered (providing web or file space, databases, applications, hosting services, etc.) These can be represented legally based on a business, rental or service agreement. The contract is not unique due to the fact that the legal contract terms of cloud contracts is not yet clearly established, till date.
From a technical point of view, it is basically commissioned data processing. The obligation to ensure the confidentiality and integrity of the data is still the principal. The cloud provider and its only auxiliary and support functions according to the specifications of the client is able to fulfill the obligations. Ideally, the service providers should not notice the actual, substantive data processing – that is what is an ideal privacy in cloud computing.
Comprehensive full transparency regarding the conditions of the executed services (processes of the cloud provider, security concept of the cloud provider, etc.) is thus the decisive argument for the client in the selection of a suitable partner in order to be able to fulfill the legal obligations.

Privacy in Cloud Computing

When choosing a cloud provider, the client needs to consider, with whom and how many providers they want to enter into a direct contractual relationship. It is important to differentiate normally between the following situations:

 

Respect of desired services from a provider:

Between supplier and customer, a conventional bilateral contractual relationship is based on a service contract to the form using agreed SLAs (Service Level Agreement) is entered.

Respect of desired services from multiple providers through the use of a general contractor model:

The customer enters into a service contract with a contractor (general contractor), which in turn makes use of subcontractors to provide the agreed services. For the customer, this model provides the most convenient but also most expensive way to take IT services from different providers. There is a direct contact person, a so-called SPOC (Single Point of Contact), who mitigates the administrative burden.
In order to continue to fulfill the legal obligations (e.g. ensuring the confidentiality and integrity of data), the customer must be able to grant the appropriate rights to intervene in the subcontractors.

Respect of desired services from multiple providers through the use of a multi-vendor strategy:

A cheaper alternative is the multi-vendor strategy from different cloud providers services. Since no SPOC is available to coordinate all other participating provider, this Administrative expenses must be met by the customer himself/herself. A guarantee for the compatibility of the individual services is large.

Generally, however, the content of the contractual service should be taken to the follow the following points :

  1. Detailed description of the service provided and the associated quality requirements
  2. Clarification of the rights of use of licenses with SaaS.
  3. SLA:
  4. accurate service description (what performance is to be rendered as)
    Response times
    Recovery time
    Quality of Service
    Sanctions in the form of penalties (so-called penalties)
    Availability
  5. Assurance of service provision to safeguard by regulations :
    Confidentiality
    Integrity
    Authenticity
    Availability
    Liability of data and other information

In the event of termination of the contractual relationship between client and provider contractual agreements regarding back-sorcing strategies as well as how to deal with the data sets should also be taken in to consideration.

 

Privacy in Cloud Computing : Further Reading

 

Readers can perform a search on this website for any matter related to Cloud Computing. However, here are some recommended articles related to Privacy in Cloud Computing.

 

This article on Privacy in Cloud Computing will be continued.

Readers are suggested to read the following few articles:

What Cloud Users Need to Know : Cloud computing demands input not only from the IT professionals and users, but also from the lawyers on the planning aspect “ is not surprising. But, it is interesting that the legal arguments not primarily serve as limitations of the new business model, but are sometimes even used to support sales to bring solutions with high availability and reliability to the market.

Cloud Computing Contracts and SLAs : Cloud Computing Contracts and SLAs are to get protection against data loss or abuse “ provider is not liable, but the client, so clients must be aware. So to elaborate the fact again; if in the cloud computing platform, in case of any data loss or abuse, the provider is not liable, but the client is.

Tagged With cloud computing data privacy
Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Privacy in Cloud Computing : Applicability of Data Protection Law

  • Cloud Computing Articles – List With Description of all we have Published

    Cloud Computing Solution penetrating as business solution and in day to day usage. Here is list of all articles on Cloud computing we have published so far.

  • Developing Privacy Compliant Big Data Apps on IBM Cloud

    A key theme of this work is to answer the key question “Can we use IBM’s solutions to develop various privacy law complainant applications?”.

  • Impact of the Patriot Act for Public Cloud on Privacy Policy

    When using cloud services, privacy is a key issue. The applicable data protection laws / policies in Germany, Europe and USA differs. For a better understanding first few terms must be defined.

  • Nginx WordPress Installation Guide (All Steps)

    This is a Full Nginx WordPress Installation Guide With All the Steps, Including Some Optimization and Setup Which is Compatible With WordPress DOT ORG Example Settings For Nginx.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Hybrid Multi-Cloud Environments Are Becoming UbiquitousJuly 12, 2023
  • Data Protection on the InternetJuly 12, 2023
  • Basics of BJT TransistorJuly 11, 2023
  • What is Confidential Computing?July 11, 2023
  • How a MOSFET WorksJuly 10, 2023
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy