Premium Content

Access "To avoid cloud computing legal issues, consider these three domains"

Stewart Room, Contributor Published: 13 Oct 2012

Enterprise cloud computing has been a hot topic for several years now. While it may seem like there’s been plenty of time of think through cloud computing legal issues and complications, a number of quandaries in this realm continue to hinder enterprise adoption and usage of cloud computing. To me, cloud computing legal issues split down into three key domains.  First, there is the contractual framework that is required to ensure good service levels.  Second, there is the regulatory environment that applies to the processing of data.  Third, there is the issue of applicable law, which is about the jurisdictional confusion that flows from the way that (a) cloud services are organised and (b) the legitimate aim of nation states to have access to intelligence for national security, law enforcement and other high-level public concerns. Ensuring good service levels Creating a suitable contractual framework for ensuring good service levels should never be a problem, because a contract outlining a cloud service agreement is like any other outsourcing contract, and ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • The next frontier for managed print services
    The-next-frontier-for-managed-print-services-(1361197877_756).jpg
    E-Handbook

    The managed print services (MPS) market has matured since many organisations inked their first deal. Organisations moving beyond first generation ...

  • World-Class EA: The Agile Enterprise
    World-Class-EA---The-Agile-Enterprise-(1360587978_371).jpg
    E-Handbook

    The concept of “agile” has recently come to the fore, typically in connection with technical activities, such as software development. Subsequently, ...

  • Security Visualisation
    Security-visualisation-(1358519141_684).jpg
    E-Handbook

    This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. ...