Cloud Computing and Information Policy: Computing in a Policy Cloud? Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009 This work is.

Slides:



Advertisements
Similar presentations
Privacy and the Internet Professor Peter P. Swire Ohio State University National Press Foundation February 14, 2001.
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Mobile Payments and the FTC Manas Mohapatra Director of Mobile Policy Mobile Technology Unit Federal Trade Commission The views expressed are not necessarily.
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
The Gathering Cloud computing - Legal considerations David Goodbrand, Partner 28 February 2013 Aberdeen Edinburgh Glasgow.
CHAPTER 4 E-ENVIRONMENT
Overcoming Objections Answers to Common Objectives for Cloud BDR Services March 2014.
What Are Your Products Doing Online? Presented by Anthony V. Lupo Sarah E. Bruno Arent Fox LLP Washington, DC | New York, NY | Los Angeles, CA August 20,
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Washington State Archives Presented by: Leslie Koziara Electronic Records Management Consultant Lions and Tigers and Twitter.
1 3M Privacy Filters Justification Toolkit: How to Use The following presentation is meant to provide you with the most impactful data points to help you.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Hong Kong Privacy Code on Human Resource Management
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking Funded by a grant from Take Charge America, Inc.
Cloud Computing Lecture #6 Information Policy Jimmy Lin The iSchool University of Maryland Wednesday, October 7, 2008 This work is licensed under a Creative.
SOX & ISO Protect your data and be ready to be audited!!!
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Computer Security: Principles and Practice
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
FDA Recalls Risk Communication Advisory Committee David K. Elder Director, Office of Enforcement.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
1Copyright Jordan Lawrence. All rights reserved. Annual In-House Symposium Practical Steps to Minimize Privacy Risks: Understanding The Intersection.
LegalTech Asia DATA PRIVACY LAWS UPDATE Edward Chatterton 4 March 2013.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Outsourcing Louis P. Piergeti VP, IIROC March 29, 2011.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
1 Solving the records management problem A cloud-computing approach to archiving Amanda Kleha Product Marketing, Google May 20, 2008.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
Wireless Password:  “The cloud” is real  Electronic data growth is rapid and pervasive  Employees use the cloud to conduct government work.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 14 – Human Factors.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Computers and Society Lecture 1: administrative details and an introduction to the class Professor: Evan Korth New York University.
Author: Victor Rosenberg, 2010 License: Unless otherwise noted, this material is made available under the terms of the Creative Commons Attribution 3.0.
Skills: none Concepts: Third party login, motivation for third party login, filter bubble This work is licensed under a Creative Commons Attribution-Noncommercial-Share.
Regulation of Personal Information Sally Brierley & Emma Harvey.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
VS.  The Internet was created in the 1970’s by the Pentagon.  It was designed to be used as an alternate means of communication during wartime.  The.
FIRMA April 2010 DATA BREACHES & PRIVACY Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Overcoming Objections Answers to Common Objectives for Cloud BDR Services.
Managing the Information Copyright © Texas Education Agency, All rights reserved.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Watech.wa.gov Records Management In a nutshell. watech.wa.gov What’s a record? A record is anything you create in the course of doing your work – Everything.
Privacy & Confidentiality in Internet Research Jeffrey M. Cohen, Ph.D. Associate Dean, Responsible Conduct of Research Weill Medical College of Cornell.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Dino Tsibouris (614) Updates on Cloud, Contracting, Privacy, Security, and International Privacy Issues Mehmet Munur (614)
Legal issues in cloud computing Teemu Mäntylä
14 May 2014 Information Security, Information Governance and the Law – Confidence in Compliance © Contact Leonardo for reuse
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Welcome Esuring Your File Sharing Solution is Secure and Compliant Hosts: Josh Bopp Rebekah Stevens Paisley Coxsey President Account Manager Relationship.
The Functions of Operating Systems Network Operating Systems (NOS)
April 19, IT Outsourcing overview and training cases.
Complaint Handling Medical Device Reporting May 19, 2016 Rita Harden, Director Customer Relations & Regulatory Reporting.
Legal Aspects in IT Security Is Your Organisation Up-to-Date?? (Ref : IT Act, 2008 & IT Rules 2011) Adv Prashant Mali [BSc(Phy),MSc(Comp. Sci.),CNA,
Florida Information Protection Act of 2014 (FIPA)
Florida Information Protection Act of 2014 (FIPA)
Forensics Week 11.
E-Commerce: Regulatory, Ethical, and Social Environments
Ad Hoc Phase Structured Phase Enterprise Phase
SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
CONVERCENT INCIDENT REPORTING Employee Training
Presentation transcript:

Cloud Computing and Information Policy: Computing in a Policy Cloud? Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009 This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States See for details Some material in these slides taken from: Jaeger, Lin, and Grimes. Cloud Computing and Information Policy: Computing in a Policy Cloud? Journal of Information Technology & Politics, 5(3): , 2008.

Tech Firms Seek to Get Agencies on Board With Cloud Computing By Kim Hart Washington Post Staff Writer Tuesday, March 31, 2009; A13 … “The government may be outsourcing functions to contractors now, but this takes it to a whole new level,” said Jimmy Lin, assistant professor of information studies at the University of Maryland, which has received funding from Google and IBM to research cloud computing. “And what happens if Google gets hacked by a third party?” he said. “The answer is, nobody knows.” …

What is policy? Why is policy important?

What is information policy? Why is information policy important?

Perception vs. Reality

Cloud Computing: Public Perception “Use of Cloud Computing Applications and Services” Study conducted by the Pew Research Center April-May, 2008: sample of 1,553 Internet Users Users may not know the term, but it’s already here…

All18-29 User webmail services56%77% Store personal photos online34%50% Use online applications29%39% Store personal videos online7%14% Pay to store computer files online5%9% Back up hard drive to an online site5%7% Cloud computing activities Percent of Internet users who do the following…

MajorMinorNot Easy and convenient51%23% Ubiquitous access41%25%32% Easily shared39%28%29% Won’t lose information34%23% Reasons people use cloud applications

Sold your files to others90%5%2%3% Used your information in marketing campaigns80%10%3%6% Analyzed your information to display custom ads68%19%6%7% Kept a copy of your deleted files63%20%8% Gave law enforcement files when asked49%15%11%22% Attitudes about policy of services How concerned would you be if a company… Very Somewhat Not too Not at all

Pew Study: Key Issues Identified Trust Control Reliability Security

Cloud Computing Issues Reliability Security, Privacy, and Anonymity Access and Usage Control and Monopolization

Reliability Accuracy of results? Consequences of failure? Who bears the risks? Liability for losses? Corruption of data?

And you thought it was safe?

EPIC filed a complaint with the FTC seeking an investigation of Google Docs, in light of the company's data breach reported on March 7, 2009… The Google Docs Data Breach reported earlier this month highlights the hazards of cloud computing conjoined with inadequate security practices. The compliant seeks that the FTC's provide a remedies for consumers that includes greater transparency, security, and privacy rights for Google Cloud Computing users. Press Release EPIC (Electronic Privacy Information Center) March 17, 2009

Security, Privacy, Anonymity Need for protection, particularly sensitive information Personal (SSNs, photos, etc.) Corporate (client accounts, internal memos, etc.) Scientific (experimental data, results, etc.) Technology isn’t enough!

Security, Privacy, Anonymity Spying by other users of the cloud service Monitoring by the cloud provider Quality control Data mining Government surveillance Cross-national issues

Existing Regulations HIPPA for medical records Sarbanes-Oxley for corporations …

Access and Usage Intellectual Property Licenses Export and data sharing prohibitions

Source:

Source: Harper’s (Feb, 2008)

“I think there is a world market for maybe five computers” Quote often (mistakenly) attributed to Thomas J. Waston, former president of IBM

Standards?

Location, Location, Location

Who’s driving policy today? Telecommunications policy and law What is a cloud provider (legally speaking)? … closest to a teleco Contractual law Often unilaterally dictated by the cloud provider

“you acknowledge that you bear sole responsibility for adequate security, protection and backup of Your Content.”

Possible Futures Governmental regulations? Laws do not keep pace with technology Let the market handle it? Service differentiation Danger of monopolies Combination of the two?