Data Protection Fears Vs. US Cloud Market - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Government // Cloud computing
09:30 AM
Ben Young
Ben Young
Connect Directly

Data Protection Fears Vs. US Cloud Market

Data sovereignty is so important to businesses that 70% would trade cloud performance for more data control, research says. Where does that leave the post-Snowden US cloud market?

decision makers will have fewer cloud vendors to choose from -- and potentially face higher prices.

Still, it's difficult to gauge how long the threat to the cloud hosting market may last. For example, 51% of respondents in our survey are still hosting data in the US, making the US the most popular host country outside their own countries. Part of the reason for this may be that people simply don't have other options. If they have a large customer base in the US, there's probably not a reasonable substitute for a US-based datacenter or hosting provider. But this may change as infrastructure in Canada, Mexico, and Brazil becomes more robust, generating cloud alternatives in the Americas that could threaten the US's position as the de facto choice for hosting.

Additionally, the US government is taking steps to scale back its surveillance activity, which could alleviate the fears of non-US cloud buyers who are still on the fence. But while President Obama has announced new restrictions on the NSA's phone-data collecting programs, it's unclear if this means change on a grander scale is coming, or if it's just a short-term fire drill to help bide time.

Has trust in the cloud (or in the Internet, for that matter) been permanently damaged? Likely not. Companies aren't abandoning the Internet or completely upending their business models, but there will be some fundamental changes in how they go about conducting certain business operations online -- for example, with choosing where and how to host their sensitive data in the cloud.

There is definitely hope for the US cloud industry if both government agencies and service providers strive to be more open, honest, and fair about where company data is located and how it's being used. Plus, privacy laws are still a mystery to many: 60% of UK and Canadian businesses agree they don't know as much as they should about data laws, and 44% feel that privacy and security laws still confuse them. This knowledge gap gives service providers an opportunity, not only to lead the discussion around data privacy, but also to educate their customers on what it means for their businesses.

Only time will tell if history remembers Snowden as a hero or a villain, and it will likely be a mix of both. Regardless, the NSA revelations have provoked a discussion around data privacy that will ultimately help improve the hosting and cloud industries on a global scale. The new tensions that have sprung up around privacy and security, even among ordinary citizens, are sending a strong message to businesses on how they should think about their and their customers' data.

Businesses should realize how accountable they are in giving customers ownership and control of their data whenever possible, and they should acknowledge their responsibility to be transparent when data is potentially exposed to third parties. Meanwhile, IT decision makers at federal agencies can follow suit and place pressure on policy makers to scale back programs that are ultimately detrimental to the efficiency and cost-effectiveness of the government itself.

The NIST cyber-security framework gives critical-infrastructure operators a new tool to assess readiness. But will operators put this voluntary framework to work? Read the Protecting Critical Infrastructure issue of InformationWeek Government today.

Ben Young is General Legal Counsel at Peer 1 Hosting, where he defends, protects, and enforces Peer 1's legal and business interests, identifies risks, and finds the right solutions to mitigate them. View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
2 of 2
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Susan Fourtané
Susan Fourtané,
User Rank: Author
5/10/2014 | 6:21:52 AM
Re: security solution

"One of the most common causes of data getting in the wrong hands is the loss of mobile devices that often contain a frightening amount of private information."

True. And thanks for sharing the link to the tracer tags site. It's very useful. It's great you got your lost laptop returned.

However, if the device is stolen instead of lost the thief is not going to contact you to return you the device. In that case, deleting your data remotedly is all that can help.  

Thomas Claburn
Thomas Claburn,
User Rank: Author
5/2/2014 | 5:40:22 PM
Data ownership in the cloud
Is there a legal structure that could be used to grant cloud clients temporary ownership over the remote hardware they use or temporary ownership of the space their equipment occupies? This would deny the cloud provider the lawful authority to provide access to the hardware in the event of a subpoena.
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

10 Things Your Artificial Intelligence Initiative Needs to Succeed
Lisa Morgan, Freelance Writer,  4/20/2021
Tech Spending Climbs as Digital Business Initiatives Grow
Jessica Davis, Senior Editor, Enterprise Apps,  4/22/2021
Optimizing the CIO and CFO Relationship
Mary E. Shacklett, Technology commentator and President of Transworld Data,  4/13/2021
White Papers
Register for InformationWeek Newsletters
Current Issue
Planning Your Digital Transformation Roadmap
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Flash Poll