Cloud Computing and National Security
Hameed Jawahar
Seasoned Director & Innovative Leader: Enterprise & Solutions Architect, AI & ML Architect, Private & Public Cloud Architect, Information Systems Security.
Today I Came across very interesting article Cloud Computing and National Security, this topic took me to another search where i came across "CLOUD Act" I recommend cloud adopters to follow the links below
https://en.wikipedia.org/wiki/CLOUD_Act
https://www.justice.gov/opa/press-release/file/1153446/download
https://epic.org/privacy/cloud-act/
https://www.financierworldwide.com/the-cloud-act-law-enforcer-or-global-privacy-threat#.YD5JDCQza70
Until now, if foreign law enforcement officials wanted access to data held by any U.S service providers with in US or any cross border region, they had to go through Mutual Legal Assistance Treaties or “letters rogatory,” which give U.S. providers the ability to challenge production orders in U.S. courts. But the U.S.-U.K. “Bilateral Data Access Agreement,” which is the first such agreement under the CLOUD Act, cuts U.S. courts out of the process and allows U.K. law enforcement to serve production orders directly on U.S. providers.
Finally the conclusion is
Cloud computing is a very hot topic on both national and international agendas. Governments are very much keen on incorporating this new technology in their e-government programs to benefit from the advantages that the technology provides. However, it is of no doubt that there are some security concerns attributed to the technology that could have considerable effects on data security. International organizations are currently working on studying national and international regulations related to cloud computing and data security in order to provide international legal frameworks for cloud computing. Each country planning to migrate to cloud computing should study first what are all the possible implications of governments adopting cloud on all levels. Governments should particularly study their national laws and regulations related to cloud computing as well as other countries' rules and regulations because cloud computing creates a very complicated interconnected environment. Countries implement different strategies to ensure the highest possible security level, however, each strategy has its own pros and cons. Each country should also assess what serves its goals and fits with its own regulatory, social, political and economic particularities. Most importantly, cloud computing security strategies' success should be assessed regularly and accordingly updated and modified.
Director, Economic Affairs and International Indicators Department, MCIT
2 年Thank you so much for your review..For the full paper, kindly check the following link: https://www.emerald.com/insight/content/doi/10.1108/REPS-09-2019-0125/full/html