Wednesday, April 10, 2013

Privacy and Compliance


The loss of control by cloud-service consumers represents a serious threat to data integrity, confidentiality and privacy principles.  A reference for defining principles for protection of privacy and personal data is the Madrid Resolution which was approved by data protection authorities from fifty countries.  “It states the urgent need to protect privacy in a world without borders and attain a joint proposal for the establishment of international standards on privacy and data protection. Its purpose is to define a set of principles and rights guaranteeing the effective and internationally uniform protection of privacy with regard to processing of personal data, and to facilitate the international flows of personal data inherent in a globalized world.” 

The expanding quantity of personal data will drive the demand for cloud services.  Some of the main privacy challenges for cloud computing are:
·    
  •  Complexity of risk assessment
    • With service providers promoting a simple way to flow personal data irrespective of national boundaries, a challenge arise in terms of checking the date processing life cycle and its compliance with legal frameworks.
  • Emergence of new business models and their implications for consumer privacy
    • The expand of technology, data demand, and collection means that new business models will be implemented to manage this data. “The fact that the applications may not all be operated by the same SaaS provider could result in differences in terms of reliability and security. Such models could become more widespread in the future, and their legal and security/privacy implications need to be clearly understood.”
  • Regulatory compliance


 Definitions:
Privacy- The state or condition of being free from being observed or disturbed by other people
Compliance- The action or fact of complying with a wish or command.

 Sources: 

1 comment:

  1. Privacy is always an issue in networks. in my point of view, cloud computing attract a lot of different hackers which indicate a very high security systems that will stop their attacks.

    how well are the security systems in cloud computing comparing to the hackers attacks ?

    Mustafa Alaswad

    ReplyDelete