Head Out of the Clouds: What the United States May Learn from the European Union's Treatment of Data in the Cloud

J. Gerber
{"title":"Head Out of the Clouds: What the United States May Learn from the European Union's Treatment of Data in the Cloud","authors":"J. Gerber","doi":"10.18060/17879","DOIUrl":null,"url":null,"abstract":"\"Every cloud has its silver lining but it is sometimes a little dfficult to get it to the mint. \" An attorney is awakened at 3:00 a.m. by a phone call from police. There has been a break-in at his firm, and a laptop filled with hundreds of client files containing sensitive data of payment records, client addresses and phone numbers, and trial strategies was stolen. Fortunately, the attorney has back-up files, knows what is missing, and who potentially has been affected. Later that morning, the hundreds of clients who have sought confidential advice from that attorney are alerted that their information has been stolen. It is a nightmare for many of the firm's attorneys, but the physical evidence immediately alerted the staff that there had been a security breach, and the office was able to respond to the situation quickly and effectively. The attorney decides that the solution to preventing the risk of having sensitive data stolen off the hardware from the office is to move all client data \"to the cloud.\" Only those with authority would be able to access the data on the remote server, so even if a laptop were to go missing, nothing would be compromised. The problem, though, is that there may not be the same physical evidence of a breach, and an attorney or client may never know of a security threat because the information is stored on a remote server. The paradox of moving to the cloud is that personal data is, in many ways, more secure and less secure than it has ever been. Cloud computing has been growing in size and momentum in informational technology's collective conscience ever since the phrase was first used in its current context in 1997.2 The concept itself, though, is not really new, dating back at least to the 1960s. The name derived from telecommunication companies who changed their services from point-topoint circuits to Virtual Private Networks in the 1990s, and subsequently","PeriodicalId":230320,"journal":{"name":"Indiana international and comparative law review","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Indiana international and comparative law review","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.18060/17879","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

"Every cloud has its silver lining but it is sometimes a little dfficult to get it to the mint. " An attorney is awakened at 3:00 a.m. by a phone call from police. There has been a break-in at his firm, and a laptop filled with hundreds of client files containing sensitive data of payment records, client addresses and phone numbers, and trial strategies was stolen. Fortunately, the attorney has back-up files, knows what is missing, and who potentially has been affected. Later that morning, the hundreds of clients who have sought confidential advice from that attorney are alerted that their information has been stolen. It is a nightmare for many of the firm's attorneys, but the physical evidence immediately alerted the staff that there had been a security breach, and the office was able to respond to the situation quickly and effectively. The attorney decides that the solution to preventing the risk of having sensitive data stolen off the hardware from the office is to move all client data "to the cloud." Only those with authority would be able to access the data on the remote server, so even if a laptop were to go missing, nothing would be compromised. The problem, though, is that there may not be the same physical evidence of a breach, and an attorney or client may never know of a security threat because the information is stored on a remote server. The paradox of moving to the cloud is that personal data is, in many ways, more secure and less secure than it has ever been. Cloud computing has been growing in size and momentum in informational technology's collective conscience ever since the phrase was first used in its current context in 1997.2 The concept itself, though, is not really new, dating back at least to the 1960s. The name derived from telecommunication companies who changed their services from point-topoint circuits to Virtual Private Networks in the 1990s, and subsequently
走出云端:美国可以从欧盟对云端数据的处理中学到什么
“黑暗中总有一线光明,但有时要把它变成现实有点困难。”一名律师在凌晨三点被警察的电话叫醒。他的公司遭到了闯入,一台笔记本电脑里装满了数百份客户文件,其中包括付款记录、客户地址和电话号码等敏感数据,以及试验策略。幸运的是,律师有备份文件,知道丢失了什么,以及谁可能受到影响。当天上午晚些时候,数百名向该律师寻求保密建议的客户被告知,他们的信息被盗了。对于许多律师来说,这是一场噩梦,但物证立即提醒了工作人员,有一个安全漏洞,办公室能够迅速有效地应对这种情况。律师决定,防止敏感数据从办公室的硬件上被窃取的解决方案是将所有客户数据“转移到云端”。只有那些有权限的人才能访问远程服务器上的数据,所以即使一台笔记本电脑丢失了,也不会受到任何损害。然而,问题是,可能没有同样的物理证据证明违规,律师或客户可能永远不会知道安全威胁,因为信息存储在远程服务器上。迁移到云的矛盾之处在于,在许多方面,个人数据比以往任何时候都更安全,也更不安全。自从1997年云计算这个词在当前语境中首次被使用以来,云计算在信息技术的集体意识中规模和势头一直在增长。然而,这个概念本身并不新鲜,至少可以追溯到20世纪60年代。这个名字来源于电信公司,他们在20世纪90年代将他们的服务从点对点电路改为虚拟专用网络,以及随后的服务
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信