• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Privacy in Cloud Computing : Applicability of Data Protection Law

By Abhishek Ghosh December 12, 2013 4:26 am Updated on December 12, 2013

Privacy in Cloud Computing : Applicability of Data Protection Law

Advertisement

Privacy in Cloud Computing includes the applicable laws for personal data. The data protection law is only applicable to personal data. The applicable laws for maintain the Privacy in Cloud Computing only comes into play precisely when such data is to be stored or processed within the cloud. The applicable data protection law is bound locally. Therefore, in normal as in the case of Privacy Policy, are examined in which spatial data may be sent and which not. In the previous article, named Privacy in Cloud Computing, we gave an elementary introduction for the more complex topics evolving the newest concern Privacy in Cloud Computing.

Table of Contents

  • 1 Introduction
  • 2 Regional Laws
  • 3 Contracts
  • 3 Further Reading

 

Privacy in Cloud Computing : Regional Laws

 

Within the EU:

Advertisement

---

EU Member States form a single market and a common legal space. This means that jointly the EU decisions are immediately transferred to local law of the Member States. In short, what is decided at the EU level, can also be found in the relevant law of a Member State. This ensures that one can speak of an uniform data protection law. Therefore, it is not surprising that in the EU data protection directives, it will be decided that the cross-border traffic within the EU must not present any obstacle.
Appropriate regulations can also be found in the Federal Data Protection Act. The community law, therefore prevents breech of Privacy in Cloud Computing to some extent. However, this is not applicable to the foreign companies that rise through a branch within the EU member states, since they are not bound by the Federal Privacy Act and thus the protection of sensitive data is not guaranteed.

Outside the EU:

Here, there is no difference to the normal case of data protection. It must therefore be ensured that the EU’s data protection guidelines are followed by additional agreements.

Requirements for a company:

Since the data protection legislation must therefore be applied in any case, companies have to bend to this and also should provide enough cloud computing privacy to ensure that these provisions are enforceable. In this case, that means concrete terms that must be dealt with access control, access and authorization controls.

 

Privacy in Cloud Computing : Contracts

 

Cloud providers provide the customers a variety of IT systems and / or IT infrastructure. Depending on the service rendered (providing web or file space, databases, applications, hosting services, etc.) These can be represented legally based on a business, rental or service agreement. The contract is not unique due to the fact that the legal contract terms of cloud contracts is not yet clearly established, till date.
From a technical point of view, it is basically commissioned data processing. The obligation to ensure the confidentiality and integrity of the data is still the principal. The cloud provider and its only auxiliary and support functions according to the specifications of the client is able to fulfill the obligations. Ideally, the service providers should not notice the actual, substantive data processing – that is what is an ideal privacy in cloud computing.
Comprehensive full transparency regarding the conditions of the executed services (processes of the cloud provider, security concept of the cloud provider, etc.) is thus the decisive argument for the client in the selection of a suitable partner in order to be able to fulfill the legal obligations.

Privacy in Cloud Computing

When choosing a cloud provider, the client needs to consider, with whom and how many providers they want to enter into a direct contractual relationship. It is important to differentiate normally between the following situations:

 

Respect of desired services from a provider:

Between supplier and customer, a conventional bilateral contractual relationship is based on a service contract to the form using agreed SLAs (Service Level Agreement) is entered.

Respect of desired services from multiple providers through the use of a general contractor model:

The customer enters into a service contract with a contractor (general contractor), which in turn makes use of subcontractors to provide the agreed services. For the customer, this model provides the most convenient but also most expensive way to take IT services from different providers. There is a direct contact person, a so-called SPOC (Single Point of Contact), who mitigates the administrative burden.
In order to continue to fulfill the legal obligations (e.g. ensuring the confidentiality and integrity of data), the customer must be able to grant the appropriate rights to intervene in the subcontractors.

Respect of desired services from multiple providers through the use of a multi-vendor strategy:

A cheaper alternative is the multi-vendor strategy from different cloud providers services. Since no SPOC is available to coordinate all other participating provider, this Administrative expenses must be met by the customer himself/herself. A guarantee for the compatibility of the individual services is large.

Generally, however, the content of the contractual service should be taken to the follow the following points :

  1. Detailed description of the service provided and the associated quality requirements
  2. Clarification of the rights of use of licenses with SaaS.
  3. SLA:
  4. accurate service description (what performance is to be rendered as)
    Response times
    Recovery time
    Quality of Service
    Sanctions in the form of penalties (so-called penalties)
    Availability
  5. Assurance of service provision to safeguard by regulations :
    Confidentiality
    Integrity
    Authenticity
    Availability
    Liability of data and other information

In the event of termination of the contractual relationship between client and provider contractual agreements regarding back-sorcing strategies as well as how to deal with the data sets should also be taken in to consideration.

 

Privacy in Cloud Computing : Further Reading

 

Readers can perform a search on this website for any matter related to Cloud Computing. However, here are some recommended articles related to Privacy in Cloud Computing.

 

This article on Privacy in Cloud Computing will be continued.

Readers are suggested to read the following few articles:

What Cloud Users Need to Know : Cloud computing demands input not only from the IT professionals and users, but also from the lawyers on the planning aspect “ is not surprising. But, it is interesting that the legal arguments not primarily serve as limitations of the new business model, but are sometimes even used to support sales to bring solutions with high availability and reliability to the market.

Cloud Computing Contracts and SLAs : Cloud Computing Contracts and SLAs are to get protection against data loss or abuse “ provider is not liable, but the client, so clients must be aware. So to elaborate the fact again; if in the cloud computing platform, in case of any data loss or abuse, the provider is not liable, but the client is.

Tagged With cloud computing data privacy

This Article Has Been Shared 473 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Privacy in Cloud Computing : Applicability of Data Protection Law

  • Google F1 : Distributed RDBMS replacement for MySQL

    Google F1, The Fault-Tolerant Distributed RDBMS is targated to be replacement for MySQL. This claimed to be perform better like serving Ads from crap servers.

  • Cloud Computing Benefits for Small Business

    Cloud Computing Benefits for Small Business are not that focused than the providers do to show advantages for the Enterprises. Strategy can make ROI more.

  • GoDaddy Buys Media Temple : Thoughts and Ideas

    GoDaddy Buys Media Temple – four days has been passed since we all know about the acquisition. Thoughts and Helps for the old Clients and technical notes.

  • Technical Aspects of Data Security in the Cloud

    Technical aspects of data security in the cloud is one of the main reason why the companies or the end users thinks to be in the cloud. Here is a discussion.

  • Browser Based Chat, Screen Sharing System With HTML5 WebRTC

    Browser based chat including video chat, Screen Sharing are possible with HTML5 WebRTC. Here are some resources which you can run on Cloud as App.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Zebronics Pixaplay 16 : Entry Level Movie Projector Review February 2, 2023
  • What is Voice User Interface (VUI) January 31, 2023
  • Proxy Server: Design Pattern in Programming January 30, 2023
  • Cyberpunk Aesthetics: What’s in it Special January 27, 2023
  • How to Do Electrical Layout Plan for Adding Smart Switches January 26, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Privacy in Cloud Computing : Applicability of Data Protection Law," in The Customize Windows, December 12, 2013, February 3, 2023, https://thecustomizewindows.com/2013/12/privacy-in-cloud-computing-applicability-of-data-protection-law/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT