Security, Data Sovereignty… No Problem Rocky Heckman & Chris Zhong AZR222.

Slides:



Advertisements
Similar presentations
Criminal Accountability of UN Official and Experts on Missions (GA 6th) By: Leah Barnett &Hunter Champ.
Advertisements

The Gathering Cloud computing - Legal considerations David Goodbrand, Partner 28 February 2013 Aberdeen Edinburgh Glasgow.
Leniency related pitfalls and challenges in a criminal enforcement system Marcus Bezzi Executive General Manager, Enforcement and Compliance
Time until next coffee 55:00 30 minutes 15 minutes.
AN INTERNATIONAL SOLUTION TO A GLOBAL PROBLEM. A Global Problem What is cybercrime? How does it affect us ? The solution.
Code of Federal Regulations Title 42, Chapter 1, Subchapter A Part 2 – CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENTS BRYANT D. MILLER CAC II, MAC,
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
1 Windows Azure – Why not? Eric Nelson Application Architect | Microsoft UK |
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Reduce Your IT Costs. Microsoft’s Core Infrastructure Solutions NEXT GENERATION DESKTOP EMPOWERING SERVICES Desktop Datacenter CLOUD COMPUTING.
Integration choices 3 Integration Partners Windows Azure.
SOFTWARE AS A SERVICE PLATFORM AS A SERVICE INFRASTRUCTURE AS A SERVICE.
Data Protection Act. Lesson Objectives To understand the data protection act.
FSA Enforcement Ian Mason Head of Department, Wholesale Group Enforcement Division June 2005.
Road to the Cloud The Economics of Cloud Computing.
UNIT 5 AMERICAN GOVERNMENT. LESSON PAGES How do the 4 th and 5 th Amendments protect against unreasonable law enforcement procedures? Objective:
WINDOWS AZURE Scott Guthrie Corporate Vice President Windows Azure Application Platform.
Windows Azure Alex BOGDAN Academic Developer Evangelist.
Hilton Giesenow Principal Consultant, 3fifteen Microsoft MVP.
Introduction to Cloud Computing Course Module by David S Platt Harvard University Extension School Lectured by Nilanjan Banerjee.
Windows Azure with a dash of OSS Peter Laudati Technology Evangelist Microsoft Corporation
Using Windows Azure John Donnelly Technical Evangelist Microsoft Technology Centre Thames Valley Park
Windows Azure Overview
Introduction To Windows Azure Cloud
Windows Azure Joseph Landes General Manager, DPE Microsoft India
Class 11 Internet Privacy Law Government Surveillance.
Interoperabilidade com Windows Azure Computação em nuvem no Windows Azure com suporte a PHP, Java, Ruby e Python Rogerio Cordeiro Technical Evangelist.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
Websites mit Windows Azure Jürgen Mayrbäurl Principal Technical Evangelist Microsoft Österreich GmbH.
Confidentiality and Drug Courts Carson Fox Esq. Steve Hanson M.S. Ed.
Conducting Cross-Border International Internal Investigations Association of Corporate Counsel International Legal Affairs Committee Jeffrey D. Clark Willkie.
Microsoft’s Commitment to Privacy Principles and practices concerning government access to enterprise customer data April 2,
Identity & Access Control in the Cloud Name Title Organization.
Interoperability. Describe the technology Explain the commercial model Consider Workload Patterns and Application Types Discuss Future Direction Objectives.
Intro to cloud computing and Azure. And in a non-Cloud view, there are inefficiencies in addressing those issues TIME IT CAPACITY Actual Load Allocated.
Introducing Microsoft Azure Government Steve Read Barbara Brucker.
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
Windows Azure June 2012 Release for Developers & Architects
Public Communications Law Lecture 13 Slide 1 Controlling Pre-Trial Publicity A court is obligated to try to make sure the defendant gets a fair trial.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Authentication in the cloud: Step by Step Felix Jorkowski Senior Developer, Planet Software AZR317.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Chapter 10 The Criminal Process. A.k.a. Procedural criminal law Two most essential elements of Canadian Criminal Process are: - Truth - Justice.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
DELIVERING PLATFORM AS A SERVICE WITH THE PUBLIC CLOUD Clare Dillon Developer & Platform Group Lead
Virtual techdays INDIA │ august 2010 A lap around Windows Azure SDK for Java Developers Ramaprasanna Chellamuthu │ Developer Evangelist, Microsoft.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Windows Azure Overview for IT Pros Anton Boyko. Intro to Cloud Computing Intro to Windows Azure Cloud Services Web Sites Virtual Machines Workload Options.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Human Subjects Update E. Wethington, Chair, UCHS.
Going Hybrid – part 1 Moving to Hybrid Cloud with Windows Azure Virtual Machines & System Center 2012 R2.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Windows Azure Boot CampWindowsAzureBootCamp.com. Windows Azure Boot CampWindowsAzureBootCamp.com.
Criminal Justice Process: The Investigation The criminal justice process includes everything that happens to a person from the moment of arrest, through.
Chapter 26 International Law and Global Commerce Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the.
Hacking Exposé Using SSL to Protect SQL Connections.
Develop for the Cloud - Windows Azure Microsoft gi Pranav Rastogi.
Juvenile Legislative Update 2013 Confidential Records and Protected Disclosures.
Health Insurance Portability and Accountability Act of 1996
Microsoft 365 Security and Compliance: Training and Resources
Surveillance around the world
Cloud computing Anton Boyko .NET Developer.
Privacy This Blackboard Collaborate Session is being recorded because a member of our group is unable to participate and watching the recording will mean.
Why? (or … am I really in the right track?)
What is the Data Protection Act (DPA)? 1998
NSX Data Center for Security
Developing Advanced Applications with Windows Azure
International Law.
4/12/ :51 AM How Microsoft does IT: Drive resource and cost efficiencies with Microsoft Azure optimization Seth Malcolm IT Showcase © Microsoft.
Government Notes The Judicial Branch.
Presentation transcript:

Security, Data Sovereignty… No Problem Rocky Heckman & Chris Zhong AZR222

Compute Inactivity Period Compute On and Off On & off workloads (e.g. batch job) Over provisioned capacity is wasted Time to market can be cumbersome Unpredictable Bursting Unexpected/unplanned peak in demand Sudden spike impacts performance Can’t over provision for extreme cases Growing Fast Successful services needs to grow/scale Keeping up w/ growth is big IT challenge Cannot provision hardware fast enough Predictable Bursting Services with micro seasonality trends Peaks due to periodic increased demand IT complexity and wasted capacity

ANSWERS Solutions for the Big Issues

SWT Windows Azure Access Control Service Host an STS in cloud for you Handles relationships with business and social Ips WS-Federation, WS- Trust, Open ID, OAuth

Relayed One-Way Unicast and Multicast Relayed WCF NET.TCP with Direct Connect Option Relayed WCF HTTP with support for REST and SOAP 1.1/1.2 Endpoint protection with Access Control TCP/SSL HTTP(S)

Hybrid App Demo

– Answers…

AZRnnn All of the Azure Sessions Hands-on Labs Any of the Azure and Private Cloud HOLs Demos at the Azure Stand in the Expo Hall Find Me Later At the Speaker Area / Azure Stand

Start here Sign Up Now

* “Review by a judge” encompasses either an initial review when issuing the court order, warrant, etc. or subsequent review when the court order, warrant, etc. is challenged by the service provider or customer. ** Under a recently revised criminal procedure law, Japanese law enforcement officials may obtain copies of data located on a remote server if a computer in Japan is able to create, change, or delete data on the server, even if the server is located outside of Japan. Although computers of Cloud providers may be able to change or delete customer data, the Japanese Ministry of Justice currently takes the position that computers of Cloud providers are not subject to the law. It is not certain, however, whether Japanese courts would read this same limitation into the law. A Hogan Lovells White Paper A Global Reality: Governmental Access to Data in the Cloud A comparative analysis of ten international jurisdictions Governmental access to data stored in the Cloud – including cross-border access – exists in every jurisdiction by Winston Maxwell, Paris, France Christopher Wolf, Washington, DC  23 May 2012 Updated 18 July 2012 Some erroneously believe the best way to limit governmental access to data is to use Cloud service providers present only in “safe” jurisdictions – places where data are thought to be free from troublesome governmental access. The existence of Mutual Legal Assistance Treaties greatly diminishes any argument that data stored in one jurisdiction is immune from access by governmental authorities in another jurisdiction. Australia A Cloud service provider can voluntarily disclose personal information to the Australian government if it reasonably believes that the use or disclosure is reasonably necessary to, among other similar reasons, prevent, detect, investigate, prosecute, or punish violations of law or serious breaches of standards of conduct, including corruption, abuse of power, dereliction of duty, or “any other seriously reprehensible behaviour.”