SlideShare a Scribd company logo
“Looking at Clouds from both Sides” –
Risks and Benefits of Cloud Computing

      Employment and Labour Law Conference
                               May 24, 2012

                              Tamara Hunter
What is Cloud Computing?
What is cloud computing?
•   technologies that provide computation, software,
    data access and storage services that do not require
    end-user knowledge of the physical location and
    configuration of the system that delivers the services
    (Wikipedia)


•   delivered over a network (typically, the Internet)
Categories
•   Infrastructure as a Service (“IaaS”) and Storage
    • Delivers computer infrastructure, along with storage and
        networking

•   Software as a Service (“Saas”)
    • Delivers software without the need to install and run
       applications

•   Platform as a Service (“PaaS”)
    • Allows the development and deployment of applications
       without the need to purchase specific hardware or software
Benefits
•   Cost
•   Scalability
•   User mobility
•   Customizability
•   Reliability?
•   Performance?
•   Security?
Cloud Computing:
General Issues and Risks
General Issues and Risks
•   Location and jurisdiction

•   Data ownership

•   Business interruption (service provider)

•   Loss of access (customer)
General Issues and Risks
•   Source code and escrow

•   Migration

•   Who can access?

•   Backup and archiving
General Issues and Risks
•   Security

•   Destruction of data

•   IP infringement
Cloud Computing:
Litigation (E-Discovery)
Key Obligations
•   Disclosure
    •   must disclose every relevant document in possession,
        control or power
    •   “document” is broadly defined

•   Preservation
    •   must preserve all relevant documents

•   Serious consequences for breach
E-Discovery
•   Electronic documents increase scope, complexity and
    cost of discovery process

•   Courts aware of importance of electronic documents
Cloud Computing and Discovery
•   Disclosure and preservation obligations still apply

•   Court does not care if you store data in your building or
    in the cloud – only cares whether you have possession
    or control
Cloud Computing and Discovery
•   Consider risks:

    •   lost data
    •   non-compliant data preservation practices
    •   platform not easily searched
    •   sub-outsourcing
Cloud Computing and Discovery

•   Cloud computing contract is key
•   Maintain legal control over data
•   Due diligence on cloud provider
•   Ability to retrieve data in any circumstance
Cloud Computing:
Privacy Law Compliance
•   When you think about Cloud Computing, consider it
    as “mega-outsourcing”
•   Regular outsourcing is when you store your data on
    your own servers, but you send certain data to an
    outside service provider or a service, so they can
    perform a function with the data and provide a product
    (e.g. send personalized cheques to your customers or
    process your payroll and arrange for direct deposits for
    your employees).
•   Cloud computing means you don’t have your own
    servers anymore – you’ve “out-sourced” that whole
    infrastructure
•   The key privacy law compliance issue is security of
    personal information
•   Geographic location of personal information is a
    significant privacy law issue, especially for public
    bodies in British Columbia (and service providers to
    public bodies) but the concern with geographical
    location of data really boils down to a security issue
Public Bodies in B.C.: Section 30.1 of FOIPPA

•   A public body must ensure that personal information in
    its custody or under its control is stored only in Canada
    and accessed only in Canada, [unless a specific
    exception applies]
•   Breach of s. 30.1 of FOIPPA is an offence
•   Some cloud service providers are aware of this
    requirement and offer cloud services that meet this
    requirement
Québec – Private Sector Privacy Legislation
•   If using service provider outside Québec to store or
    process personal information, must take all reasonable
    steps to ensure that the personal information will not be
    used for purposes not relevant to the object of the file or
    communicated to third persons without consent
•   If cannot be satisfied that the personal information will
    be properly protected, must not communicate the
    information outside Québec (s. 17)
•   What about professionals (e.g., doctors, lawyers,
    accountants, etc.) and businesses handling highly
    sensitive personal information (e.g. banks, credit unions,
    insurance companies)?

•   Ethical and contractual obligations around confidentiality
    may also require specialized cloud computing solutions

•   Community Cloud or Private Cloud may work (e.g. Law
    Society Cloud for lawyers is being considered)
•   Private Sector - still have obligation under PIPEDA,
    PIPA, the Québec Private Sector Privacy Legislation
    (and, possibly, contractual obligations) to make
    reasonable security arrangements to protect personal
    information from risks such as unauthorized access,
    disclosure, destruction, etc.

•   Standard Cloud Computing contracts may not sufficiently
    protect customer/employee personal information

•   Requirement for transparency/notification
    (customers/employees have a right to know)
Security issues:

•   What geographic locations could be involved? Rule
    some out or stipulate acceptable jurisdictions
•   Reputation/history of cloud provider
•   What other data will be mingled with your organization's
    data? Concern re: concentration of high-risk data
•   Will your organization be able to access audit logs?
•   How quickly could you be required to produce a copy of
    your organization’s records? will your organization be
    able to meet that timeframe?

•   What obligations does the cloud provider have in the
    event of an information security breach?
    • Immediate notification to your organization?
    • Indemnity for any damages and professional fees?
•   What happens if the cloud provider goes bankrupt?
    backup/escrow might not be sufficient without access to
    the application software necessary to decode the stored
    data

•   Does the contract provide for a method for your
    organization to audit the cloud provider’s compliance
    with its contractual security obligations?
•   Insurance – does your organization’s insurance
    coverage for information security breaches or data loss
    apply if your data is “in the clouds”?
Thank You


                         Tamara Hunter
                     Associate Counsel,
  Head of Privacy Law Group, Vancouver
                tamara_hunter@davis.ca
                          604.643.2952

More Related Content

What's hot

IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
Donald E. Hester
 
Securing Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeSecuring Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & Netskope
Ahmad Abdalla
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Brian Miller, Solicitor
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3
Anne Starr
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
movinghats
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Venkateswar Reddy Melachervu
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
IBM Security
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
gangal
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
Jyotika Pandey
 
Cloud Computing: legal issues
Cloud Computing: legal issuesCloud Computing: legal issues
Cloud Computing: legal issuesISPABelgium
 
Security issue in Cloud computing
Security issue in Cloud computingSecurity issue in Cloud computing
Security issue in Cloud computing
Seema Kumari
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
maheralgamdi
 
4.5.cloud security
4.5.cloud security4.5.cloud security
4.5.cloud security
DrRajapraveenkN
 
Know Your Attacker - Core Security
Know Your Attacker - Core SecurityKnow Your Attacker - Core Security
Know Your Attacker - Core Security
Core Security
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
Livingstone Advisory
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
Nicolas Morales
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
Md. Hasibur Rashid
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
Rahul Gurnani
 

What's hot (20)

IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011IT Series: Cloud Computing Done Right CISOA 2011
IT Series: Cloud Computing Done Right CISOA 2011
 
Securing Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & NetskopeSecuring Apps & Data in the Cloud by Spyders & Netskope
Securing Apps & Data in the Cloud by Spyders & Netskope
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
 
gkknwqeq3232,sqSecurity essentials domain 3
gkknwqeq3232,sqSecurity essentials   domain 3gkknwqeq3232,sqSecurity essentials   domain 3
gkknwqeq3232,sqSecurity essentials domain 3
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014
 
Cloud Computing: legal issues
Cloud Computing: legal issuesCloud Computing: legal issues
Cloud Computing: legal issues
 
Security issue in Cloud computing
Security issue in Cloud computingSecurity issue in Cloud computing
Security issue in Cloud computing
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
4.5.cloud security
4.5.cloud security4.5.cloud security
4.5.cloud security
 
Know Your Attacker - Core Security
Know Your Attacker - Core SecurityKnow Your Attacker - Core Security
Know Your Attacker - Core Security
 
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...UTSpeaks Public Lecture:  Clearing up the Cloud  -19th July 2011 - Rob Living...
UTSpeaks Public Lecture: Clearing up the Cloud -19th July 2011 - Rob Living...
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 

Similar to Risks and Benefits of Cloud Computing

The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
This account is closed
 
Bird&Bird
Bird&BirdBird&Bird
Bird&Bird
Frits Bussemaker
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and factsArun Ganesh
 
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of TradeSecuring Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of TradeLisa Abe-Oldenburg, B.Comm., JD.
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
Mark Williams
 
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Danny Miller
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
The Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThe Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud Services
This account is closed
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
Gokul Alex
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
Tejaswi Agarwal
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
Bianca Mueller, LL.M.
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
Rohit Buddabathina
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
Abbie Hosta
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
AchSulav
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
AchSulav
 
Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2
Ankit Gupta
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
centralohioissa
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
Uni Systems S.M.S.A.
 

Similar to Risks and Benefits of Cloud Computing (20)

The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
 
Legal issues in the cloud renzo marchini & gene landy
Legal issues in the cloud   renzo marchini & gene landyLegal issues in the cloud   renzo marchini & gene landy
Legal issues in the cloud renzo marchini & gene landy
 
Bird&Bird
Bird&BirdBird&Bird
Bird&Bird
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
 
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of TradeSecuring Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
The Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThe Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud Services
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
 
Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2
 
Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!Bil Harmer - Myths of Cloud Security Debunked!
Bil Harmer - Myths of Cloud Security Debunked!
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
 

More from DLA Piper (Canada) LLP

Consumer Protection: Recent Developments and Trends
Consumer Protection: Recent Developments and TrendsConsumer Protection: Recent Developments and Trends
Consumer Protection: Recent Developments and Trends
DLA Piper (Canada) LLP
 
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...Latest Developments in Advertising and Marketing Law and Their Impact on Cana...
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...
DLA Piper (Canada) LLP
 
The Need to Know Legalities of Marketing Sponsorships
The Need to Know Legalities of Marketing SponsorshipsThe Need to Know Legalities of Marketing Sponsorships
The Need to Know Legalities of Marketing SponsorshipsDLA Piper (Canada) LLP
 
The Importance of Documentation in an Employment Relationship
The Importance of Documentation in an Employment RelationshipThe Importance of Documentation in an Employment Relationship
The Importance of Documentation in an Employment RelationshipDLA Piper (Canada) LLP
 
Operational Information as "Personal Information"
Operational Information as "Personal Information"Operational Information as "Personal Information"
Operational Information as "Personal Information"DLA Piper (Canada) LLP
 
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...DLA Piper (Canada) LLP
 
Anatomy of a Failed Termination Process
Anatomy of a Failed Termination ProcessAnatomy of a Failed Termination Process
Anatomy of a Failed Termination ProcessDLA Piper (Canada) LLP
 
Maternity and Parental Leave: Current Issues
Maternity and Parental Leave: Current IssuesMaternity and Parental Leave: Current Issues
Maternity and Parental Leave: Current IssuesDLA Piper (Canada) LLP
 
Mental Health as a Safety Issue in the Workplace
Mental Health as a Safety Issue in the WorkplaceMental Health as a Safety Issue in the Workplace
Mental Health as a Safety Issue in the WorkplaceDLA Piper (Canada) LLP
 
Disclaimer in Ads - Resting Not Dead?
Disclaimer in Ads - Resting Not Dead?Disclaimer in Ads - Resting Not Dead?
Disclaimer in Ads - Resting Not Dead?
DLA Piper (Canada) LLP
 
Employing Contractors and Contracting Employees
Employing Contractors and Contracting EmployeesEmploying Contractors and Contracting Employees
Employing Contractors and Contracting EmployeesDLA Piper (Canada) LLP
 
Breaking Up Is Hard to Do!
Breaking Up Is Hard to Do!Breaking Up Is Hard to Do!
Breaking Up Is Hard to Do!
DLA Piper (Canada) LLP
 
What to Do When Regulators Come A-knocking
What to Do When Regulators Come A-knockingWhat to Do When Regulators Come A-knocking
What to Do When Regulators Come A-knockingDLA Piper (Canada) LLP
 
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...
DLA Piper (Canada) LLP
 
To Disclaim or Not and How? Very Big Questions. A Primer for Marketers
To Disclaim or Not and How? Very Big Questions. A Primer for MarketersTo Disclaim or Not and How? Very Big Questions. A Primer for Marketers
To Disclaim or Not and How? Very Big Questions. A Primer for Marketers
DLA Piper (Canada) LLP
 
How to Make Litigation Pay
How to Make Litigation PayHow to Make Litigation Pay
How to Make Litigation Pay
DLA Piper (Canada) LLP
 
Notre ami, Anton Piller (l’ordonnance d’injonction)
Notre ami, Anton Piller (l’ordonnance d’injonction)Notre ami, Anton Piller (l’ordonnance d’injonction)
Notre ami, Anton Piller (l’ordonnance d’injonction)DLA Piper (Canada) LLP
 
Our Friend, Anton Piller (The Injunction)
Our Friend, Anton Piller (The Injunction)Our Friend, Anton Piller (The Injunction)
Our Friend, Anton Piller (The Injunction)DLA Piper (Canada) LLP
 
Surveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsSurveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsDLA Piper (Canada) LLP
 

More from DLA Piper (Canada) LLP (20)

Current Issues in Employment Law
Current Issues in Employment LawCurrent Issues in Employment Law
Current Issues in Employment Law
 
Consumer Protection: Recent Developments and Trends
Consumer Protection: Recent Developments and TrendsConsumer Protection: Recent Developments and Trends
Consumer Protection: Recent Developments and Trends
 
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...Latest Developments in Advertising and Marketing Law and Their Impact on Cana...
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...
 
The Need to Know Legalities of Marketing Sponsorships
The Need to Know Legalities of Marketing SponsorshipsThe Need to Know Legalities of Marketing Sponsorships
The Need to Know Legalities of Marketing Sponsorships
 
The Importance of Documentation in an Employment Relationship
The Importance of Documentation in an Employment RelationshipThe Importance of Documentation in an Employment Relationship
The Importance of Documentation in an Employment Relationship
 
Operational Information as "Personal Information"
Operational Information as "Personal Information"Operational Information as "Personal Information"
Operational Information as "Personal Information"
 
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...
 
Anatomy of a Failed Termination Process
Anatomy of a Failed Termination ProcessAnatomy of a Failed Termination Process
Anatomy of a Failed Termination Process
 
Maternity and Parental Leave: Current Issues
Maternity and Parental Leave: Current IssuesMaternity and Parental Leave: Current Issues
Maternity and Parental Leave: Current Issues
 
Mental Health as a Safety Issue in the Workplace
Mental Health as a Safety Issue in the WorkplaceMental Health as a Safety Issue in the Workplace
Mental Health as a Safety Issue in the Workplace
 
Disclaimer in Ads - Resting Not Dead?
Disclaimer in Ads - Resting Not Dead?Disclaimer in Ads - Resting Not Dead?
Disclaimer in Ads - Resting Not Dead?
 
Employing Contractors and Contracting Employees
Employing Contractors and Contracting EmployeesEmploying Contractors and Contracting Employees
Employing Contractors and Contracting Employees
 
Breaking Up Is Hard to Do!
Breaking Up Is Hard to Do!Breaking Up Is Hard to Do!
Breaking Up Is Hard to Do!
 
What to Do When Regulators Come A-knocking
What to Do When Regulators Come A-knockingWhat to Do When Regulators Come A-knocking
What to Do When Regulators Come A-knocking
 
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...
 
To Disclaim or Not and How? Very Big Questions. A Primer for Marketers
To Disclaim or Not and How? Very Big Questions. A Primer for MarketersTo Disclaim or Not and How? Very Big Questions. A Primer for Marketers
To Disclaim or Not and How? Very Big Questions. A Primer for Marketers
 
How to Make Litigation Pay
How to Make Litigation PayHow to Make Litigation Pay
How to Make Litigation Pay
 
Notre ami, Anton Piller (l’ordonnance d’injonction)
Notre ami, Anton Piller (l’ordonnance d’injonction)Notre ami, Anton Piller (l’ordonnance d’injonction)
Notre ami, Anton Piller (l’ordonnance d’injonction)
 
Our Friend, Anton Piller (The Injunction)
Our Friend, Anton Piller (The Injunction)Our Friend, Anton Piller (The Injunction)
Our Friend, Anton Piller (The Injunction)
 
Surveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsSurveillance of Your Electronic Systems
Surveillance of Your Electronic Systems
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 

Risks and Benefits of Cloud Computing

  • 1. “Looking at Clouds from both Sides” – Risks and Benefits of Cloud Computing Employment and Labour Law Conference May 24, 2012 Tamara Hunter
  • 2. What is Cloud Computing?
  • 3. What is cloud computing? • technologies that provide computation, software, data access and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services (Wikipedia) • delivered over a network (typically, the Internet)
  • 4. Categories • Infrastructure as a Service (“IaaS”) and Storage • Delivers computer infrastructure, along with storage and networking • Software as a Service (“Saas”) • Delivers software without the need to install and run applications • Platform as a Service (“PaaS”) • Allows the development and deployment of applications without the need to purchase specific hardware or software
  • 5. Benefits • Cost • Scalability • User mobility • Customizability • Reliability? • Performance? • Security?
  • 7. General Issues and Risks • Location and jurisdiction • Data ownership • Business interruption (service provider) • Loss of access (customer)
  • 8. General Issues and Risks • Source code and escrow • Migration • Who can access? • Backup and archiving
  • 9. General Issues and Risks • Security • Destruction of data • IP infringement
  • 11. Key Obligations • Disclosure • must disclose every relevant document in possession, control or power • “document” is broadly defined • Preservation • must preserve all relevant documents • Serious consequences for breach
  • 12. E-Discovery • Electronic documents increase scope, complexity and cost of discovery process • Courts aware of importance of electronic documents
  • 13. Cloud Computing and Discovery • Disclosure and preservation obligations still apply • Court does not care if you store data in your building or in the cloud – only cares whether you have possession or control
  • 14. Cloud Computing and Discovery • Consider risks: • lost data • non-compliant data preservation practices • platform not easily searched • sub-outsourcing
  • 15. Cloud Computing and Discovery • Cloud computing contract is key • Maintain legal control over data • Due diligence on cloud provider • Ability to retrieve data in any circumstance
  • 17. When you think about Cloud Computing, consider it as “mega-outsourcing”
  • 18. Regular outsourcing is when you store your data on your own servers, but you send certain data to an outside service provider or a service, so they can perform a function with the data and provide a product (e.g. send personalized cheques to your customers or process your payroll and arrange for direct deposits for your employees).
  • 19. Cloud computing means you don’t have your own servers anymore – you’ve “out-sourced” that whole infrastructure
  • 20. The key privacy law compliance issue is security of personal information
  • 21. Geographic location of personal information is a significant privacy law issue, especially for public bodies in British Columbia (and service providers to public bodies) but the concern with geographical location of data really boils down to a security issue
  • 22. Public Bodies in B.C.: Section 30.1 of FOIPPA • A public body must ensure that personal information in its custody or under its control is stored only in Canada and accessed only in Canada, [unless a specific exception applies] • Breach of s. 30.1 of FOIPPA is an offence • Some cloud service providers are aware of this requirement and offer cloud services that meet this requirement
  • 23. Québec – Private Sector Privacy Legislation • If using service provider outside Québec to store or process personal information, must take all reasonable steps to ensure that the personal information will not be used for purposes not relevant to the object of the file or communicated to third persons without consent • If cannot be satisfied that the personal information will be properly protected, must not communicate the information outside Québec (s. 17)
  • 24. What about professionals (e.g., doctors, lawyers, accountants, etc.) and businesses handling highly sensitive personal information (e.g. banks, credit unions, insurance companies)? • Ethical and contractual obligations around confidentiality may also require specialized cloud computing solutions • Community Cloud or Private Cloud may work (e.g. Law Society Cloud for lawyers is being considered)
  • 25. Private Sector - still have obligation under PIPEDA, PIPA, the Québec Private Sector Privacy Legislation (and, possibly, contractual obligations) to make reasonable security arrangements to protect personal information from risks such as unauthorized access, disclosure, destruction, etc. • Standard Cloud Computing contracts may not sufficiently protect customer/employee personal information • Requirement for transparency/notification (customers/employees have a right to know)
  • 26. Security issues: • What geographic locations could be involved? Rule some out or stipulate acceptable jurisdictions • Reputation/history of cloud provider • What other data will be mingled with your organization's data? Concern re: concentration of high-risk data • Will your organization be able to access audit logs?
  • 27. How quickly could you be required to produce a copy of your organization’s records? will your organization be able to meet that timeframe? • What obligations does the cloud provider have in the event of an information security breach? • Immediate notification to your organization? • Indemnity for any damages and professional fees?
  • 28. What happens if the cloud provider goes bankrupt? backup/escrow might not be sufficient without access to the application software necessary to decode the stored data • Does the contract provide for a method for your organization to audit the cloud provider’s compliance with its contractual security obligations?
  • 29. Insurance – does your organization’s insurance coverage for information security breaches or data loss apply if your data is “in the clouds”?
  • 30. Thank You Tamara Hunter Associate Counsel, Head of Privacy Law Group, Vancouver tamara_hunter@davis.ca 604.643.2952