Saturday, June 8, 2019
Is current UK IT law relevant when applied to the cloud computing Dissertation
Is current UK IT law relevant when applied to the denigrate computing - Dissertation standardMake recommendations as to how users of the cloud should approach the problem and recommendations for future change to the legislation. 4. The Main Deliverable(s) A critique of current IT law when it applies to cloud computing. A fall everyplace of how cloud computing or will change the legal context for IT operations management. A set of recommendation for cloud computing users and suggested updates to UK IT law to agglomerate with the problems that come from cloud computing. 5. The Target Audience for the Deliverable(s) Potential users of cloud computing IT legislators 6. The Work to be undertaken In this research essay, I would concentrate on the following(a) How to use the run of CSPs without infringing the UKs laws like Data Protection Act, etc. What are all the safeguards and protection mechanism to be undertaken while using CSP services? Recommendations to initiate adequate meas ures to safekeeping the data while they are stored with CSPs who are located outside UK jurisdiction. 7. Additional Information / Knowledge Required The researcher should film additional knowledge on USA Patriot Act if UK companies want to use cloud services offered by US based companies like Microsoft, virago and Google Inc. Besides UK laws, the researcher should have extensive knowledge on European Data Protection Directive, intellectual property laws, contracts act, Criminal Procedure and Investigation Act, 1996 (CPIA, 1996) and so on. 8. Information Sources that Provide a Context for the Project The information and data have been sourced for this project from previous empirical studies, peer viewed journals, books written on the field on the subject by eminent authors, from online sources, and from sources available from the online libraries. 9. The Importance of the Project Availing the services of a cloud service contractor and having lost the control over the data processi ng is an issue relating with security. The problems that emanate from the encroachment of the data demonstrate the confronts that the cloud customers witness when things go haphazard in the cloud atmosphere. Making an in-depth digest of the risks associated is vital before venturing into the use of the service of a CSP and if the risks are controllable, managing them through incorporating appropriate clauses in the contract. Businesses should exercise more vigil and should not opt for cloud computing purely on the cost basis by ceding poignant control over their data, which may land them later for data infringement offences later. Further, by encrypting the data, business can adhere with residency and jurisdictional needs by maintaining the encryption keys within its jurisdiction in spite of the actual visible placement of the data. 10. The Key Challenge(s) to be overcome The boiler plate CSP contract should be replaced by an authorised contract for CSP contracts which should hav e the following clauses the security of the data of the business to be guaranteed by the cloud computing service provider the cloud service provider (CSP) should use data only for the purpose mentioned in the contract, and he should be held accountable if the data is either misused or for non-business purposes the data handler to inform to the data owner immediately if there is both breach of data or security so as to take immediate precautionary steps by the service
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.