Privacy Regulations for Cloud Computing
homepage.tudelft.nl
Abstract
AI
AI
Privacy is a fundamental human right that has prompted extensive legislation globally, particularly in the European Union and the United States. This paper delves into the implications of privacy regulations on Cloud Computing, highlighting the uncertainties organizations face in ensuring compliance while utilizing Cloud Services. The study reveals that many Cloud Service Providers (CSPs) lack clarity regarding their compliance with privacy laws, resulting in potential risks related to data handling, security measures, and the protection of personal information.
References (39)
- Annecharico, D. (2002). Notes & Comments: V. Privacy after GLBA: Online Transactions: Squaring the Gramm-Leach-Bliley Act Privacy Provisions With the FTC Fair Information Practice Principles. NC Banking Inst. 6, 637-695.
- Armbrust, M., A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, et al. (2009). Above the clouds: A berkeley view of cloud computing. EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009- 28.
- Baase, S. (2007). A gift of fire: Social, legal, and ethical issues for computing and the Internet. Prentice Hall.
- Baumer, D., J. Earp, and J. Poindexter (2004). Internet privacy law: A comparison between the United States and the European Union. Computers & Security 23(5), 400-412.
- Bender, D. and Ponemon, L (2006). Binding Corporate Rules for Cross-Border Data Transfer. Rutgers Journal of Law & Public Policy
- Birnhack, M. (2008). The EU Data Protection Directive: An engine of a global regime. Computer Law & Security Report 24(6), 508- 520.
- Bull, G. (2001). Data Protection -Safe Harbor, Transferring Personal Data To The USA. Computer Law & Security Report 17(4), 239- 243.
- Eisenhauer, M. (2005). Privacy and Security Law Issues in Off-shore Outsourcing Transactions. Hunton & Williams, Atlanta Georgia 15.
- EU Directive (1995). Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.
- Fromholz, J. (2000). European Union Data Privacy Directive, The. Berk. Tech. LJ 15, 461.
- FTC (2009). Federal Trade Commission, Fair Credit Reporting Act.
- Gellman, R. (2009). WPF REPORT: Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing. Released February 23.
- Gentry, C. (2009). A fully homomorphic encryption scheme, Phd Thesis, Standford University.
- Grossman, R. (2009). The Case for Cloud Computing. IT Professional 11(2), 23-27.
- Grossman, R. and Y. Gu (2009). On the Varieties of Clouds for Data Intensive Computing. Data Engineering, 44.
- HIPAA (1996). Health Insurance Portability and Accountability Act of 1996.
- Jaeger, P., J. Lin, and J. Grimes (2008). Cloud computing and information policy: Computing in a policy cloud? Journal of Information Technology & Politics 5(3), 269-283.
- Jaeger, P., J. Lin, J. Grimes, and S. Simmons (2009). Where is the cloud? Geography, economics, environment, and jurisdiction in cloud computing. First Monday 14(5-4).
- Jentzsch, N. (2003). The regulation of financial privacy: the United States Vs Europe. ECRI Research Report 5.
- Leavitt, N. (2009). Is Cloud Computing Really Ready for Prime Time? Computer 42(1), 15-20.
- Lederman, L., B. Suri, J. Houston, and S. Itchhaporia (2008). The Next Stage of Computing. William Blair & Company.
- Lewis, S. (2009). Cloud Computing Brings New Legal Challenges. New York Law Journal.
- Lin, G., D. Fu, J. Zhu, and G. Dasmalchi (2009). Cloud Computing: IT as a Service. IT Professional 11(2), 10-13.
- Movius, L. and N. Krup (2009). U.S. and EU Privacy Policy: Comparison of Regulatory Approaches. International Journal of Communication, 169-187.
- Mowbray, M. (2009). The Fog over the Grimpen Mire: Cloud Computing and the Law. Script-ed Journal of Law, Technology and Society 6(1).
- PCI (2009). PCI Security Standards Council, Payment Card Industry (PCI) Data Security Standard -Requirements and Security Assessment Procedures version 1.2.
- Regan, P. (2004). Old issues, new context: Privacy, information collection, and homeland security. Government Information Quarterly 21(4), 481-497.
- RIPA (2000). United kingdom. regulation of investigatory powers act.
- Ruiter, J. (2009). The Relationship between Privacy and Information Security in Cloud Computing Technologies. Master's thesis, Vrije Universiteit Amsterdam.
- Sarathy, R. and C. Robertson. (2003). Strategic and ethical considerations in managing digital privacy. Journal of Business ethics 46(2), 111-126.
- SAS70. American Institute of Certified Public Accountants, Statement on Auditing Standard 70.
- Soghoian, C. (2009). Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era.
- Steinke, G. (2002). Data privacy approaches from US and EU perspectives. Telematics and Informatics 19(2), 193-200.
- Strauss, J. and K. Rogerson (2002). Policies for online privacy in the United States and the European Union. Telematics and Informatics 19(2), 173-192.
- Vaquero, L., J. Caceres, M. Lindner, and Rodero-Merino (2009). A Break in the Clouds: Towards a Cloud Definition. ACM SIGCOMM Computer Communication Review, 50-55.
- VISA (2009). VISA Inc, Global List of PCI DSS Validated Service Providers.
- Wang, L., G. von Laszewski, M. Kunze, and J. Tao (2008). Cloud Computing: a Perspective Study. Service Oriented
- Weinhardt, C., A. Anandasivam, B. Blau, and J. Stosser (2009). Business Models in the Service World. IT Professional 11(2), 28- 33.
- Wright, S. (2008). PCI DSS: A Practical Guide to Implementation. IT Governance Ltd.