• Home
  • Archive
  • Tools
  • Contact Us
  • Forum

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
Home » Computer and Internet » Cloud Computing » Cloud Computing and Handling of Confidentiality of Personal Data

By Abhishek Ghosh July 21, 2013 6:07 am Updated on July 21, 2013

Cloud Computing and Handling of Confidentiality of Personal Data

Advertisement

Cloud Computing and Handling of Confidentiality of Personal Data is much important aspect as data must be protected to be accessed by unauthorized persons. There is an order, in which the provider processes and stores the user’s data with legal risk and responsibility. According to the usual Data Protection Acts in most of the countries, which tells that both the parties must sign the agreement about the processing of data in written form. There are regulations concerning the rectification, erasure and blocking of data as well as acts and rules for storage of control rights in favor of the clients.

 

Cloud Computing and Handling of Confidentiality

 

In addition, it must be clarified whether the provider may engage third parties to perform their contractual obligations. Since, the customer is also responsible in this relationship, sub-delegation should be contractually excluded or be a subject to the approval. Furthermore, the customer must give instructions to the seller. Key issues for the order processing are :

  1. Whether the parties have a written contract for commissioned data processing
  2. The admissibility of sub-commissions controlled by the provider
  3. Whether the customer has the right to give instructions to the seller
  4. Whether the client can verify the compliance with data protection requirements at the provider or subcontractor in an appropriate manner

 

Cloud Computing and Agreements on confidentiality

 

Cloud Computing and Handling of Confidentiality of Personal Data

Again, sensitive data is processed and stored in the cloud computing environment must be protected from access by unauthorized persons. Confidentiality of agreements are therefore useful. In advance, at the project planning, data can get to unauthorized persons. This legal protection is often inadequate. Therefore, the parties already in this phase goes thhrough a confidentiality agreement (Non-Disclosure Agreement). If the contract for cloud computing services are closed, the agreements are to customized and extended. Anyone who refers to the earlier agreements from the project planning phase, must be careful whether they often affect only the initiation phase and not the runtime. In addition, in the contract it must be specified that the agreements on termination of the contract also applies. Also it is useful to have additionally secure agreements with penalties. Because in the case of disclosure of information can cause gentle to major damage on the victim. The provider of third parties needs to fulfill their obligations, they should be obliged to due notice for the confidentiality as obligations.

Advertisement

---

 

The main issues of confidentiality are :

 

  1. Are there are confidentiality agreements at all
  2. Are the agreements are to be renewed and extended in the contract
  3. Are the agreements on the contract goes beyond the end of relationship
  4. Are the agreements are secured with penalties
  5. Is the secrecy obligation of subcontractors is ensured

 

The importance of the exit management

 

Exit Management must be defined in the contract. If the data is returned or even destroyed must need to be ensured. There is also the need to regulate the mode of transmission and the file formats. In the event that the company does not collect their data, should the seller is entitled the right to delete them ? Is well advised to go for contract cancellation proceedings with a qualified technical description of the procedure. Thus, the provider is obliged to remove the data permanently from their system.

Abhishek-Ghosh
Facebook Twitter Google+ Pinterest

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Orthopaedic Surgeon, Author and Blogger. You can keep touch with him on Google Plus - Abhishek Ghosh1 and on Twitter - @AbhishekCTRL.

Follow the Author of this article :

13.7K+ Followers 18.7K+ Followers 2.5K+ Followers 1.5K Followers

Here’s what we’ve got for you which might like :

Articles Related to Cloud Computing and Handling of Confidentiality of Personal Data

  • Private Cloud Computing – Guiding Steps To Start

    Private Cloud Computing becoming an indispensable Component of any sized Enterprise. Cloud Computing Expert has written a handy guide where and how to implement Private Cloud in your business.

  • Father of Cloud Computing John McCarthy – Down the memory lane

    Father of Cloud Computing John McCarthy has left this World on 23rd October, 2011. Let us think for a moment for him who conceptualized Cloud Computing in 1961.

  • Grid Computing – What it is, How it Works

    Grid computing is a form of distributed computing, in which a virtual supercomputer works in coordinated way. There is difference between Grid and Cloud Computing.

  • Apple Inc. and Cloud Computing

    Apple Inc. and Cloud Computing means growing and always planning to upgrade a separate from the others service, both in execution as well as by technology.

  • Cloud Computing and Management of Browser Audio Elements

    Cloud Computing has made the Management of Browser Audio Elements easier with the advent of Edge Computing and Content Distribution Network.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Google+ or Twitter to join the conversation right now!

If you want to Advertise on our Article or want Business Partnership, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

You can subscribe to our Free Once a Day, Regular Newsletter by clicking the subscribe button below.

Click To Subscribe Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website...

 

 

Popular Articles

All articles of this Website are fully Free to read. Here are some, which possibly you'll like to read! Do not hesitate to contact us for any concern.

Contact Us

Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Recent Posts

  • Let’s Encrypt Effect : Huge Slash of Price of SSL/TLS DV and EV Certificates April 25, 2018
  • Arduino : IR Obstacle Detection Sensor For Dimming LED (Stop Event Facing Obstacle) April 24, 2018
  • Approaches of Deep Learning : Part 3 April 24, 2018
  • Regular IR Distance Sensor Vs Sharp IR Distance Sensor (Arduino, Pi) April 24, 2018
  • Fight Increasing Hacking Attempts on Cloud Telephony & VoIP April 23, 2018

About This Article

Title: Cloud Computing and Handling of Confidentiality of Personal Data
July 21, 2013
Author: Abhishek Ghosh
Subjects: Cloud Computing, Computer and Internet
Is Part Of:

TheCustomizeWindows, July 21, 2013, Vol.1(01),
p.1–39075 [IoT Ready Journal]

Source:The Customize Windows
ISSN: 0019-5847 ;
E-ISSN: 0019-5847 ;
Publisher: jima.in

Cite this article as: Abhishek Ghosh, "Cloud Computing and Handling of Confidentiality of Personal Data," in The Customize Windows, July 21, 2013, April 25, 2018, https://thecustomizewindows.com/2013/07/cloud-computing-and-handling-of-confidentiality-of-personal-data/.
This website uses cookies.

Read Cookie Policy

Contents are copyright protected and reproduction demands our permission.


PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

web analysis

Copyright © 2018 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy