Data Protection and the Cloud: Are the risks too great?
By Paul Ticher
4/5
()
About this ebook
An expert introduction
More than 85% of businesses now take advantage of Cloud computing, but Cloud computing does not sit easily with the DPA. Data Protection and the Cloud addresses that issue, providing an expert introduction to the legal and practical data protection risks involved in using Cloud services. Data Protection and the Cloud highlights the risks an organisation’s use of the Cloud might generate, and offers the kind of remedial measures that might be taken to mitigate those risks.
Topics covered include:
- Protecting the confidentiality, integrity and accessibility of personal data
- Data protection responsibilities
- The data controller/data processor relationship
- How to choose Cloud providers
- Cloud security – including two-factor authentication, data classification and segmentation
- The increased vulnerability of data in transit
- The problem of BYOD (bring your own device)
- Data transfer abroad, US Safe Harbor and EU legislation
- Relevant legislation, frameworks and guidance, including:
- the EU General Data Protection Regulation
- Cloud computing standards
- the international information security standard, ISO 27001
- the UK Government’s Cyber Essentials scheme and security framework
- CESG’s Cloud security management principles
- guidance from the Information Commissioner’s Office and the Open Web Application Security Project (OWASP)
Mitigate the security risks
Mitigating security risks requires a range of combined measures to be used to provide end-to-end security. Moving to the Cloud does not solve security problems, it just adds another element that must be addressed. Data Protection and the Cloud provides information on how to do so while meeting the DPA’s eight principles.
Paul Ticher
Paul Ticher has over 25 years’ experience in the voluntary and public sectors as an information worker and manager, and has served as board member, trustee or governor of various local and national bodies. His data protection experience goes back as far as the Data Protection Act of 1984.
Related to Data Protection and the Cloud
Related ebooks
Securing Cloud Services - A pragmatic guide: Second edition Rating: 0 out of 5 stars0 ratingsData Privacy Fintech A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsData Retention Policies A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsGDPR A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsGDPR Compliance A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsPrivacy Program A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCIPT A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsPrivacy Requirements A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsSoftware And SaaS Negotiations A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsData Privacy Laws A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsPrivacy Impact A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsEU General Data Protection Regulation Standard Requirements Rating: 0 out of 5 stars0 ratingsData Protection Standard Requirements Rating: 0 out of 5 stars0 ratingsBig Data Privacy Second Edition Rating: 0 out of 5 stars0 ratingsData Privacy Regulations A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsPrivacy Impact Assessment A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsInformation Privacy A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsNon Disclosure Agreement A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsData Privacy Complete Self-Assessment Guide Rating: 5 out of 5 stars5/5Certified Information Privacy Manager A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsSECURITY AND PRIVACY IN AN IT WORLD: Managing and Meeting Online Regulatory Compliance in the 21st Century Rating: 5 out of 5 stars5/5Cloud computing security Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsData Privacy: A runbook for engineers Rating: 0 out of 5 stars0 ratingsLegal Tech and Digital Transformation: Competitive Positioning and Business Models of Law Firms Rating: 0 out of 5 stars0 ratingsNetwork and Information Systems (NIS) Regulations - A pocket guide for digital service providers Rating: 0 out of 5 stars0 ratingsData Protection vs. Freedom of Information: Access and Personal Data Rating: 4 out of 5 stars4/5Certified Information Privacy Manager A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsSaaS Contracts A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsGDPR A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsCIPM Complete Self-Assessment Guide Rating: 1 out of 5 stars1/5
Computers For You
Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsArtificial Intelligence: The Complete Beginner’s Guide to the Future of A.I. Rating: 4 out of 5 stars4/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratings101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5Storytelling with Data: Let's Practice! Rating: 4 out of 5 stars4/5Pro Tools All-in-One For Dummies Rating: 5 out of 5 stars5/5Master Builder Roblox: The Essential Guide Rating: 4 out of 5 stars4/5SQL Guide for Microsoft Access: SQL Basics, Fundamental & Queries Exercise Rating: 5 out of 5 stars5/5People Skills for Analytical Thinkers Rating: 5 out of 5 stars5/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5AWS Certified Cloud Practitioner All-in-One Exam Guide (Exam CLF-C01) Rating: 5 out of 5 stars5/5The Insider's Guide to Technical Writing Rating: 0 out of 5 stars0 ratingsTor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5ChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsEverybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5I Forced a Bot to Write This Book: A.I. Meets B.S. Rating: 4 out of 5 stars4/5Elon Musk Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsThe Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5
Reviews for Data Protection and the Cloud
1 rating0 reviews
Book preview
Data Protection and the Cloud - Paul Ticher
Resources
INTRODUCTION
This book is intended to be an introduction to the risks involved in cloud sourcing, and to enable managers to ask the right questions. Suggestions are offered for the kind of risks an organisation’s use of the cloud might generate, and the kind of remedial measures that might be taken. These are given as examples only and are not intended to be a substitute for qualified legal or technical advice. Other publications from ITGP, listed at the end of this book, address security in more detail.
Cloud security has to be a joint effort between the provider and the customer. The customer must select a provider with adequate security and other provisions; many of the topics discussed here will therefore be of equal interest to cloud providers. However, the customer’s responsibilities go further. Without a well-functioning information security process in place, selection of a secure cloud provider is only a half-measure.
In order to emphasise where the responsibility for data protection compliance normally lies, the customer for cloud services is more-or-less interchangeably referred to in this publication as the Data Controller.
The Data Protection Act 1998 is generally referred to as ‘the Act’ in this