Access "Cloud computing legal issues"
This article is part of the April 2010 issue of Combatting the new security threats of today's mobile devices
Lawyers are abuzz over cloud computing. Though offsite data storage and services are hardly new concepts (think Skype or Yahoo! Mail), the eyes of the law, which traditionally trail well beyond technology, are nervously fixating on "cloud computing," or generically speaking, distributed online services such as SaaS (Software as a Service), IaaS (Infrastructure as a Service) and PaaS (Platform as a Service). As companies look to cut costs and gain flexible, convenient access to services and massive storage/data back-up options, burgeoning interest in cloud computing solutions is understandable. But "computing in the cloud" is rifled with legal mystery --ahem, fear of unknown and uncertain legal risk. Understanding the mechanics and practicalities of how cloud computing works and how moving to the cloud legally impacts clients and corporations are just the tip of legal concerns over cloud computing --after all, what you don't know might kill you or at the very least, pose serious corporate risks. This lack of technical understanding, combined with a hotbed of ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
ISP shutdown slows Zeus botnet
Security experts say the Zeus botnet was slowed with the shutdown of Troyak, an ISP serving a large chunk of the Zeus botnet
-
Removable storage device endpoint security and control
by Lisa Phifer, Contributor
Endpoint security and control for devices like thumb drives, SIM cards and mobile devices can no longer be ignored.
-
ISP shutdown slows Zeus botnet
-
-
Economic recovery strategies for information security professionals
Security teams will continue to focus on efficiency and alignment with business as the economy recovers
-
Technologies to thwart online banking fraud
by Jerry Silva
Today's anti-fraud technologies create gated communities for online banking.
-
Economic recovery strategies for information security professionals
-
Columns
-
Information Security Profession Takes Two Steps Backward
The information security profession took two steps backwards with the firing of Pennsylvannia's CISO because of his comments on a conference panel, which illustrates the continuing disconnect between management and information security.
-
Schneier-Ranum Face-Off: Should the Government Stop Outsourcing Code Development?
Is outsourcing code development a threat to national security? Marcus Ranum and Bruce Schneier go head-to-head on this topic.
-
Cloud computing legal issues
Lawyers have a lot of concerns about cloud computing services. Learn about cloud computing legal issues
-
Information Security Profession Takes Two Steps Backward
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO