Legal issues in cloud computing Teemu Mäntylä 11.11.2009.

Slides:



Advertisements
Similar presentations
European Cloud Computing Conference Panel 1: What should be the legal framework to help create a market for Cloud services? Dalibor Baskovc Member Executive.
Advertisements

The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
In Harmony, In the Cloud: Harmonizing Data Protection Rules In a Cross-Border World Steve Mutkoski Worldwide Director Policy Microsoft Corporation.
The Gathering Cloud computing - Legal considerations David Goodbrand, Partner 28 February 2013 Aberdeen Edinburgh Glasgow.
IS BIG DATA GIVING YOU A BIG HEADACHE? Risk Reduction - Transactional, International and Liability Issues Oregon State Bar Corporate Counsel Section Fall.
SA Constitution Sec 14 – Privacy – RICA – POPI Sec 32 – Access to Information – PAIA – POPI.
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Framework for Global Electronic Commerce Communications 411 Relevant Site:
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
BACKGROUND  Hawkes Bay Holdings/Aquila Underwriting LLP  Established 2009 utilising Lloyd’s capacity: Canopius % Hiscox 33 50% to May 2010, replaced.
Cloud Computing Lecture #6 Information Policy Jimmy Lin The iSchool University of Maryland Wednesday, October 7, 2008 This work is licensed under a Creative.
Cloud Computing and Information Policy: Computing in a Policy Cloud? Jimmy Lin The iSchool University of Maryland Thursday, April 2, 2009 This work is.
“Why do business in Panama?” A Survey of Certain Legal Aspects David M. Mizrachi This document is not meant to be relied upon in place of seeking independent.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Issues Raised by ICT.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
11 – E-Commerce 1. What is Electronic Commerce? 2. What is a contract? 3. Elements of an enforceable contract 4. Standard terms of a contract 5. Form and.
INTERNATIONAL INSURANCE MEDIATION CONFERENCE Istanbul, March 2011 INTERNATIONAL INSURANCE MEDIATION CONFERENCE Istanbul, March 2011 George.
18 th Annual Canadian IT Law Association Conference Insider View from the EU Expert Group on Cloud Computing Dr Sam De Silva Partner, Head of IT & Outsourcing.
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Compliance and Corporate Social Responsibility 6th CIS LOCAL COUNSEL FORUM Mr. Alexander Bolkvadze, Partner, BLC Law Office - Tbilisi.
Computer Legislation The need for computer laws Go to Contents.
The Data Protection Act 1998 The Eight Principles.
E-COMMERCE AND PRIVACY LAWS IN THE UAE Rindala Beydoun Senior Legal Counsel Al Tamimi & Company.
TG7 – Business models and SLAs BEinGRID - Legal Issues ICRI – K.U. Leuven Davide M. Parrilli
Chapter 5 Legal Environment.
INTELLIGENCE SERVICES. The Stratfor Advantage As the world’s leading private intelligence company, Stratfor is able to analyze and deliver timely, accurate.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Jeremy Kackley, James Jacobs, Paulus Wahjudi and Jean Gourd.
13.6 Legal Aspects Corporate IT Security Policy. Objectives Understand the need for a corporate information technology security policy and its role within.
IT Professionalism Ethics Modified by Andrew Poon.
Privacy, Personal Data and the Cloud Billy Hawkes Data Protection Commissioner Public Affairs Ireland Conference Dublin, 30 June 2011.
Legal Status of Cloud Provider Kozhevnikova Yuliana Unesco Chair on copyright Institute of Legal Regulation Higher School of Economics, Moscow,
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
Recent Privacy Developments ISACA January 12, 2012 Keith A. Cheresko and Robert L. Rothman Principals, Privacy Associates International LLC.
CHAPTER 17 INTERNATIONAL MARKETING IN E-COMMERCE.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Legal Implications You need to know about the following:
Protecting Yourself from Fraud including Identity Theft Personal Finance.
LEGAL AND MORAL ISSUES – CODE OF CONDUCT Year 13.
System Monitoring of Federal Agents Stephen Cevallos.
Dino Tsibouris (614) Cloudy with a Chance of Lawyers: Legal issues in Cloud Computing Contracts.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
NCBFAA Annual Conference 2015 Orlando Converging Logistics: Realities vs. Possibilities Cyber Insurance Bernie Cissek, Chairman.
1 TAIEX JHA Workshop on data protection and cloud computing Data transfers to third countries and standard contractual clauses Skopje, 29 May 2014.
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
KUMC EXPORT CONTROLS The Challenge: Balancing National Security and Openness in Research, Education and Public Service.
Privacy and ‘Big Data’: the European perspective Human Subjects’ Protections in the Digital Age: IRB, Privacy and Big Data Peter Elias, University of Warwick.
European Mobility & Endpoint Security User Group.
Smart Law in Digital India - Legal, Regulatory & Governance Challenges July 24, 2016 Sajai Singh Partner J. Sagar Associates advocates & solicitors Ahmedabad.
Client-Side Malware Protection for your site
Surveillance around the world
Add video notes to lecture
LEGAL ASPECTS OF FINANCE Lecture 4
AIBT Nassau Conference Bootcamp Family Offices
Steps to Troubleshoot Norton 360 Error Norton 360 security software is all in one solution that combined online protection and performance tuning.
How to Get Rid of Online Threats Impacting your Computer Device?
Information Security based on International Standard ISO 27001
Cyber Issues Facing Medical Practice Managers
International business ethics
The First amendment and unprotected speech.
Consumer Protection Online
Other Sources of Information
Protecting Yourself from Fraud including Identity Theft
Database Security &Threats
Regulating supply chains
Presentation privacy law
GDPR PERSONDATAFORORDNINGEN I PRAKSIS
Presentation transcript:

Legal issues in cloud computing Teemu Mäntylä

Reliability & liability Users expect clouds to be reliable What guarantees are there? Who is responsible for damages? How do you prove the cloud provider is at fault?

Reliability & liability (2) Damages may come from multiple causes: –Service outage –Data/code/result corruption –Data/code/result compromisation Telecommunications law relies on market to drop bad operators, doing the same with clouds is too risky

Security & privacy Data, code and results must all be protected Cloud provider needs to monitor Threats range from pushy advertisers to corporate spies Difference between simple monitoring and malicious data mining can be a fine line

Security & privacy (2) By European laws, personal data may not normally be sent outside the EU, but a cloud provider might subcontract another cloud Foreign government agencies might gain access, even without needing to show cause Care must be taken not to break data protection laws or user contracts

Access & usage Can a licensed program be used in a cloud? License terms vary between countries, with no regard to clouds Who is responsible for illegal activity within the cloud? Expecting cloud providers to monitor for illegal activity big technical problem

Current situation National laws, international clouds Legislation lags behind technology Current laws and cloud providers place all responsibility on the client Clients need to be alert and insist on terms that protect their interests Better clouds might surface if left to market

Example cases Legal issues very much alike between outsourcing services and cloud computing Death by Delete Monopolizing service provider

?