The IT Law Wiki
Explore
Main Page
All Pages
Community
Interactive Maps
Random page
TopContent
Most Visited Pages
Cell phone
Radio frequency spectrum
RFID tag
Cloud consumer
Internet
Newly Changed Pages
Computer terminal
Persuasive evidence
Website operator
Bfdi
Email bombing
Pornography
Message modification
Most Popular Pages
community
Community portal
forum
FANDOM
Fan Central
BETA
Games
Anime
Movies
TV
Video
Wikis
Explore Wikis
Community Central
Start a Wiki
Don't have an account?
Register
Sign In
Sign In
Register
The IT Law Wiki
34,539
pages
Explore
Main Page
All Pages
Community
Interactive Maps
Random page
TopContent
Most Visited Pages
Cell phone
Radio frequency spectrum
RFID tag
Cloud consumer
Internet
Newly Changed Pages
Computer terminal
Persuasive evidence
Website operator
Bfdi
Email bombing
Pornography
Message modification
Most Popular Pages
community
Community portal
forum
Editing
Cloud Computing: Benefits, Risks, and Recommendations for Information Security
Back to page
Edit
Edit source
View history
Talk (0)
Edit Page
Cloud Computing: Benefits, Risks, and Recommendations for Information Security
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
The edit appears to have already been undone.
Anti-spam check. Do
not
fill this in!
== Citation == [[European Network and Information Security Agency]], '''Cloud Computing: Benefits, Risks and Recommendations for Information Security''' (Nov. 2009) ([http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment/at_download/fullReport full-text]). == Overview == The key conclusion of this paper is that the [[cloud]]'s [[economies of scale]] and [[flexibility]] are both a friend and a foe from a [[security]] point of view. The massive concentrations of resources and [[data]] present a more attractive target to [[attacker]]s, but [[cloud]]-based defenses can be more [[robust]], [[scalable]] and cost-effective. This paper allows an informed assessment of the [[security risk]]s and benefits of using [[cloud computing]] — providing [[security]] guidance for potential and existing [[user]]s of [[cloud computing]]. == Legal concerns == Most legal issues involved in [[cloud computing]] will currently be resolved during [[contract]] evaluation (i.e., when making comparisons between different [[cloud service provider|provider]]s) or [[negotiation]]s. The more common case in [[cloud computing]] will be selecting between different [[contract]]s on offer in the market (contract evaluation) as opposed to [[contract negotiation]]s. However, opportunities may exist for prospective customers of [[cloud services]] to choose [[cloud service provider|provider]]s whose contracts are negotiable. Unlike traditional [[Internet service]]s, [[standard contract clause]]s may deserve additional review because of the nature of [[cloud computing]]. The parties to a [[contract]] should pay particular attention to their rights and obligations related to notifications of [[security breach|breaches in security]], [[data transfer]]s, creation of [[derivative work]]s, change of control, and [[access]] to [[data]] by law enforcement entities. Because the [[cloud]] can be used to [[outsource]] [[critical internal infrastructure]], and the [[interruption]] of that [[infrastructure]] may have wide-ranging effects, the parties should carefully consider whether standard [[limitations on liability]] adequately represent [[allocation of risk|allocations of liability]], given the parties' use of the [[cloud]], or responsibilities for [[infrastructure]]. Until legal precedent and regulations address [[security]] concerns specific to [[cloud computing]], customers and [[cloud service provider]]s alike should look to the terms of their [[contract]] to effectively address [[security risk]]s. [[Category:EU]] [[Category:Publication]] [[Category:Security]] [[Category:Cloud computing]] [[Category:2009]]
Summary:
Please note that all contributions to the The IT Law Wiki are considered to be released under the CC-BY-SA
Cancel
Editing help
(opens in new window)
Follow on IG
TikTok
Join Fan Lab