Cloud Computing and National Security

Cloud Computing and National Security

Today I Came across very interesting article Cloud Computing and National Security, this topic took me to another search where i came across "CLOUD Act" I recommend cloud adopters to follow the links below

https://en.wikipedia.org/wiki/CLOUD_Act

https://www.justice.gov/opa/press-release/file/1153446/download

https://epic.org/privacy/cloud-act/

https://www.financierworldwide.com/the-cloud-act-law-enforcer-or-global-privacy-threat#.YD5JDCQza70

No alt text provided for this image

Until now, if foreign law enforcement officials wanted access to data held by any U.S service providers with in US or any cross border region, they had to go through Mutual Legal Assistance Treaties or “letters rogatory,” which give U.S. providers the ability to challenge production orders in U.S. courts. But the U.S.-U.K. “Bilateral Data Access Agreement,” which is the first such agreement under the CLOUD Act, cuts U.S. courts out of the process and allows U.K. law enforcement to serve production orders directly on U.S. providers. 

Finally the conclusion is

Cloud computing is a very hot topic on both national and international agendas. Governments are very much keen on incorporating this new technology in their e-government programs to benefit from the advantages that the technology provides. However, it is of no doubt that there are some security concerns attributed to the technology that could have considerable effects on data security. International organizations are currently working on studying national and international regulations related to cloud computing and data security in order to provide international legal frameworks for cloud computing. Each country planning to migrate to cloud computing should study first what are all the possible implications of governments adopting cloud on all levels. Governments should particularly study their national laws and regulations related to cloud computing as well as other countries' rules and regulations because cloud computing creates a very complicated interconnected environment. Countries implement different strategies to ensure the highest possible security level, however, each strategy has its own pros and cons. Each country should also assess what serves its goals and fits with its own regulatory, social, political and economic particularities. Most importantly, cloud computing security strategies' success should be assessed regularly and accordingly updated and modified.

Hedaia-t-Allah Nabil, PhD

Director, Economic Affairs and International Indicators Department, MCIT

2 年

Thank you so much for your review..For the full paper, kindly check the following link: https://www.emerald.com/insight/content/doi/10.1108/REPS-09-2019-0125/full/html

回复

要查看或添加评论,请登录

Hameed Jawahar的更多文章

社区洞察

其他会员也浏览了