SlideShare a Scribd company logo
3461-2205-2097v1
567 Collins Street, Melbourne VIC 3000, Australia
GPO Box 9925, Melbourne VIC 3001, Australia
Tel +61 3 9672 3000
Fax +61 3 9672 3010
www.corrs.com.au
Sydney
Melbourne
Brisbane
Perth
Request for use of public cloud storage services to
transmit information to Corrs.
You have requested that Corrs Chambers Westgarth (Corrs) use public cloud storage services to
receive your data/information. Before organising the use of public cloud storage services, we would
like to draw your attention to some of the risks inherent in this technology, and suggest a secure
alternative method for receiving your data.
Risks of public cloud storage services
Public cloud storage allows for documents to be stored and hosted in the cloud ie on infrastructure
owned, managed and maintained by a third party. Third party cloud services such as Dropbox,
GoogleDrive, SkyDrive and Apple’s iCloud are becoming increasingly popular as they allow users to
store and access large quantities of information from any device, anywhere and at anytime.
There are, however, a number of risks associated with use of public cloud services including:
1 Data leakage and malicious interception
A user might send documents from their work computer to Dropbox, which they may access
from any number of locations or devices (such as their home computer or smart phone). As the
level of security applied to these devices is unknown, the potential exists for a copy of any
document accessed to be left on the device and available to subsequent users of the device
including those with malicious intent.
2 Service compromise
Third party cloud storage providers are not without their own issues. Last year Dropbox was
subject to a significant security breach (due to a programming error) where anyone could log
into another users’ account without entering a password. Generally these service providers
make their services available ‘as is’ and seek to disclaim any liability for loss arising from their
use including corruption of data, hacking or other security intrusions.
3 US Patriot Act
Many public cloud services are provided by US based companies such as Microsoft who are
subject to the US Patriot Act. The Patriot Act grants US authorities broad powers to access
and carry out surveillance of data stored within or outside US territory, by US companies and
their non-US based affiliates if suspected of terrorism. This means that if information is stored
in a US based or owned cloud, it may be accessed by the US government without notice.
Use of public cloud storage services
Due to the risks associated with these services Corrs does not recommend the use of public cloud
storage services. We do however recognise that some clients still require the use of public cloud
storage services to transfer/receive their data. Accordingly, Corrs will only adopt this technology for
use in transmitting data where it is specifically requested by a client. In doing so you, the client,
acknowledge and accept full responsibility for any loss or damage flowing from the use of public cloud
storage services and the risks identified above.
Corrs, and Corrs Support Services Pty Ltd as trustee for the Corrs Support Services Trust (CSS),
collectively, the Corrs Group, our employees, partners, officers, consultants and agents exclude all
liability whatsoever in connection with the use public cloud storage services, including without
limitation, any liability in tort (including negligence). The Corrs Group, our employees, partners,
officers, consultants and agents further exclude any liability for indirect, consequential or special
damages (including loss of revenue or profit, savings, goodwill, reputation or data) whether or not
such loss was foreseeable.
3461-2205-2097v1 page 2
Alternative file transfer
To assist clients in transferring large files, we have implemented secure file transfer solution and it is
our strong preference that this technology be used. We would be happy to work with you to provide
this service.
Acknowledgment
I, [ ] on behalf of [ ], confirm that I have read and understood the
above information, including the risks associated with public cloud storage services, and request that
Corrs receive our information via public cloud storage services.
……………………………………………. …………………………………….
Signature Date

More Related Content

Similar to Request to use public cloud

Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
H017155360
H017155360H017155360
H017155360
IOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
IOSR Journals
 
Factors to keep in mind when you’re considering cloud storage services.
Factors to keep in mind when you’re considering cloud storage services.Factors to keep in mind when you’re considering cloud storage services.
Factors to keep in mind when you’re considering cloud storage services.
Rita Barry
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Cloud computing
Cloud computingCloud computing
Cloud computingHira Zahan
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
Hossam Zein
 
F017414853
F017414853F017414853
F017414853
IOSR Journals
 
Science international journal
Science international journalScience international journal
Science international journal
Sarita30844
 
journal paper
journal paperjournal paper
journal paper
rikaseorika
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
Jyoti Srivastava
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106IJRAT
 
B018211016
B018211016B018211016
B018211016
IOSR Journals
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
Kresimir Popovic
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's GuideReece Gaumont
 
Cloud computing
Cloud computingCloud computing
Cloud computing
hundejibat
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
ijsrd.com
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410IJRAT
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
ijitcs
 

Similar to Request to use public cloud (20)

Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Factors to keep in mind when you’re considering cloud storage services.
Factors to keep in mind when you’re considering cloud storage services.Factors to keep in mind when you’re considering cloud storage services.
Factors to keep in mind when you’re considering cloud storage services.
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
F017414853
F017414853F017414853
F017414853
 
Science international journal
Science international journalScience international journal
Science international journal
 
journal paper
journal paperjournal paper
journal paper
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Paper id 212014106
Paper id 212014106Paper id 212014106
Paper id 212014106
 
B018211016
B018211016B018211016
B018211016
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
 
Paper id 21201410
Paper id 21201410Paper id 21201410
Paper id 21201410
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 

Recently uploaded

Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 

Recently uploaded (20)

Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 

Request to use public cloud

  • 1. 3461-2205-2097v1 567 Collins Street, Melbourne VIC 3000, Australia GPO Box 9925, Melbourne VIC 3001, Australia Tel +61 3 9672 3000 Fax +61 3 9672 3010 www.corrs.com.au Sydney Melbourne Brisbane Perth Request for use of public cloud storage services to transmit information to Corrs. You have requested that Corrs Chambers Westgarth (Corrs) use public cloud storage services to receive your data/information. Before organising the use of public cloud storage services, we would like to draw your attention to some of the risks inherent in this technology, and suggest a secure alternative method for receiving your data. Risks of public cloud storage services Public cloud storage allows for documents to be stored and hosted in the cloud ie on infrastructure owned, managed and maintained by a third party. Third party cloud services such as Dropbox, GoogleDrive, SkyDrive and Apple’s iCloud are becoming increasingly popular as they allow users to store and access large quantities of information from any device, anywhere and at anytime. There are, however, a number of risks associated with use of public cloud services including: 1 Data leakage and malicious interception A user might send documents from their work computer to Dropbox, which they may access from any number of locations or devices (such as their home computer or smart phone). As the level of security applied to these devices is unknown, the potential exists for a copy of any document accessed to be left on the device and available to subsequent users of the device including those with malicious intent. 2 Service compromise Third party cloud storage providers are not without their own issues. Last year Dropbox was subject to a significant security breach (due to a programming error) where anyone could log into another users’ account without entering a password. Generally these service providers make their services available ‘as is’ and seek to disclaim any liability for loss arising from their use including corruption of data, hacking or other security intrusions. 3 US Patriot Act Many public cloud services are provided by US based companies such as Microsoft who are subject to the US Patriot Act. The Patriot Act grants US authorities broad powers to access and carry out surveillance of data stored within or outside US territory, by US companies and their non-US based affiliates if suspected of terrorism. This means that if information is stored in a US based or owned cloud, it may be accessed by the US government without notice. Use of public cloud storage services Due to the risks associated with these services Corrs does not recommend the use of public cloud storage services. We do however recognise that some clients still require the use of public cloud storage services to transfer/receive their data. Accordingly, Corrs will only adopt this technology for use in transmitting data where it is specifically requested by a client. In doing so you, the client, acknowledge and accept full responsibility for any loss or damage flowing from the use of public cloud storage services and the risks identified above. Corrs, and Corrs Support Services Pty Ltd as trustee for the Corrs Support Services Trust (CSS), collectively, the Corrs Group, our employees, partners, officers, consultants and agents exclude all liability whatsoever in connection with the use public cloud storage services, including without limitation, any liability in tort (including negligence). The Corrs Group, our employees, partners, officers, consultants and agents further exclude any liability for indirect, consequential or special damages (including loss of revenue or profit, savings, goodwill, reputation or data) whether or not such loss was foreseeable.
  • 2. 3461-2205-2097v1 page 2 Alternative file transfer To assist clients in transferring large files, we have implemented secure file transfer solution and it is our strong preference that this technology be used. We would be happy to work with you to provide this service. Acknowledgment I, [ ] on behalf of [ ], confirm that I have read and understood the above information, including the risks associated with public cloud storage services, and request that Corrs receive our information via public cloud storage services. ……………………………………………. ……………………………………. Signature Date