Comments
Data Protection Fears Vs. US Cloud Market
Newest First  |  Oldest First  |  Threaded View
Susan Fourtané
50%
50%
Susan Fourtané,
User Rank: Ninja
5/10/2014 | 6:21:52 AM
Re: security solution
Bob,

"One of the most common causes of data getting in the wrong hands is the loss of mobile devices that often contain a frightening amount of private information."

True. And thanks for sharing the link to the tracer tags site. It's very useful. It's great you got your lost laptop returned.

However, if the device is stolen instead of lost the thief is not going to contact you to return you the device. In that case, deleting your data remotedly is all that can help.  

-Susan
wkcantab
50%
50%
wkcantab,
User Rank: Apprentice
5/4/2014 | 11:03:32 PM
Raising Awareness of Data Privacy Rules for SMEs
Excellent article. Data privacy is such a key consideration when using cloud providers and your rightly point out the huge deficiency in business' understanding of the laws. This is particularly true for businesses which operate internationally and must comply with the laws where their customers reside. And "cloud" is a very broad term -- even a process such as email outsourcing can get a company caught up in needing to be aware of the relevant data privacy practices of their third-party provider.

Wendy Kennedy Esq, author, Data Privacy: A Practical Guide (April, 2014)

@wkcantab
BobH088
50%
50%
BobH088,
User Rank: Apprentice
5/4/2014 | 7:11:45 PM
security solution
One of the most common causes of data getting in the wrong hands is the loss of mobile devices that often contain a frightening amount of private information. I want to share a protection option that worked for me. Tracer tags (mystufflostandfound.com) let someone who finds your lost stuff contact you directly without exposing your private information.  I use them on almost everything I take when I travel like my phone, passport and luggage after one of the tags was responsible for getting my lost laptop returned to me in Rome one time.
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Author
5/2/2014 | 5:40:22 PM
Data ownership in the cloud
Is there a legal structure that could be used to grant cloud clients temporary ownership over the remote hardware they use or temporary ownership of the space their equipment occupies? This would deny the cloud provider the lawful authority to provide access to the hardware in the event of a subpoena.


IT's Reputation: What the Data Says
IT's Reputation: What the Data Says
InformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business really views IT's performance in delivering services - and, more important, powering innovation. Our results suggest IT leaders should worry less about whether they're getting enough resources and more about the relationships they have with business unit peers.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Must Reads Oct. 21, 2014
InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
A roundup of the top stories and community news at InformationWeek.com.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.