W Kuan Hon and Christopher Millard
- Published in print:
- 2013
- Published Online:
- January 2014
- ISBN:
- 9780199671670
- eISBN:
- 9780191767463
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199671670.003.0002
- Subject:
- Law, Intellectual Property, IT, and Media Law
The focus of this chapter is on control, security and risk in the cloud, including a description of how the so-called ‘CIA Triad’ (Confidentiality, Integrity and Availability) works in cloud ...
More
The focus of this chapter is on control, security and risk in the cloud, including a description of how the so-called ‘CIA Triad’ (Confidentiality, Integrity and Availability) works in cloud computing environments. The chapter also explains how cloud computing differs from traditional outsourcing arrangements and provides an overview of typical contractual structures for cloud services. Users do not necessarily lose control in cloud, and may be able to exercise self-help, for example by encrypting data.Less
The focus of this chapter is on control, security and risk in the cloud, including a description of how the so-called ‘CIA Triad’ (Confidentiality, Integrity and Availability) works in cloud computing environments. The chapter also explains how cloud computing differs from traditional outsourcing arrangements and provides an overview of typical contractual structures for cloud services. Users do not necessarily lose control in cloud, and may be able to exercise self-help, for example by encrypting data.
W Kuan Hon, Christopher Millard, and Ian Walden
- Published in print:
- 2013
- Published Online:
- January 2014
- ISBN:
- 9780199671670
- eISBN:
- 9780191767463
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199671670.003.0007
- Subject:
- Law, Intellectual Property, IT, and Media Law
This chapter considers what information in clouds is, and what should be, classified as personal data under European Union data protection laws. It is crucial to tackle this question first as the ...
More
This chapter considers what information in clouds is, and what should be, classified as personal data under European Union data protection laws. It is crucial to tackle this question first as the rights and obligations arising under EU national data protection laws apply only to personal data and tend to do so on an ‘all or nothing’ basis depending on whether a particular individual is identified or identifiable. The use in cloud computing of encryption, anonymisation, data fragmentation and other techniques has an impact on this threshold issue.Less
This chapter considers what information in clouds is, and what should be, classified as personal data under European Union data protection laws. It is crucial to tackle this question first as the rights and obligations arising under EU national data protection laws apply only to personal data and tend to do so on an ‘all or nothing’ basis depending on whether a particular individual is identified or identifiable. The use in cloud computing of encryption, anonymisation, data fragmentation and other techniques has an impact on this threshold issue.
Björn Lundgren
- Published in print:
- 2020
- Published Online:
- September 2021
- ISBN:
- 9781474463522
- eISBN:
- 9781474485012
- Item type:
- chapter
- Publisher:
- Edinburgh University Press
- DOI:
- 10.3366/edinburgh/9781474463522.003.0014
- Subject:
- Political Science, Political Theory
Lundgren looks at the meaning and role of anonymity, which is often threatened when data sets are agglomerated in big data practices, leading to de-anonymisation. He argues that there are a number of ...
More
Lundgren looks at the meaning and role of anonymity, which is often threatened when data sets are agglomerated in big data practices, leading to de-anonymisation. He argues that there are a number of key values threatened by the de-anonymisation, but that the concept of anonymity is not sufficient given what is really at stake. Instead he holds that what is really under threat is our ability to be anonymous, which he characterises as a reasonable control over what we communicate.Less
Lundgren looks at the meaning and role of anonymity, which is often threatened when data sets are agglomerated in big data practices, leading to de-anonymisation. He argues that there are a number of key values threatened by the de-anonymisation, but that the concept of anonymity is not sufficient given what is really at stake. Instead he holds that what is really under threat is our ability to be anonymous, which he characterises as a reasonable control over what we communicate.
Christian Wiese Svanberg
- Published in print:
- 2020
- Published Online:
- March 2021
- ISBN:
- 9780198826491
- eISBN:
- 9780191932267
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198826491.003.0136
- Subject:
- Law, EU Law
Article 4 (Definitions) (see too recital 26); Article 5 (Principles relating to processing of personal data); Article 6 (Lawfulness of processing) (see too recital 50); Article 9 (Processing of ...
More
Article 4 (Definitions) (see too recital 26); Article 5 (Principles relating to processing of personal data); Article 6 (Lawfulness of processing) (see too recital 50); Article 9 (Processing of special categories of personal data) (see too recitals 52–53).
Less
Article 4 (Definitions) (see too recital 26); Article 5 (Principles relating to processing of personal data); Article 6 (Lawfulness of processing) (see too recital 50); Article 9 (Processing of special categories of personal data) (see too recitals 52–53).