Applying the Data Protection Act to the Cloud The UK's Data Protection Act 1998 (DPA) applies to the whole lifecycle of information, from its original collection to its final destruction. Failure to comply with the DPA's eight principles could lead to claims for compensation from affected individuals and financial penalties of up to 500,000 from the Information Commissioner's Office, not to mention negative publicity and reputational damage. An expert introduction More than 85% of businesses now take advantage of Cloud computing, but Cloud computing does not sit easily with the DPA. Data Protection and the Cloud addresses that issue, providing an expert introduction to the legal and practical data protection risks involved in using Cloud services. Data Protection and the Cloud highlights the risks an organisation's use of the Cloud might generate, and offers the kind of remedial measures that might be taken to mitigate those risks. Topics covered include: * Protecting the confidentiality, integrity and accessibility of personal data * Data protection responsibilities * The data controller/data processor relationship * How to choose Cloud providers * Cloud security - including two-factor authentication, data classification and segmentation * The increased vulnerability of data in transit * The problem of BYOD (bring your own device) * Data transfer abroad, US Safe Harbor and EU legislation * Relevant legislation, frameworks and guidance, including: o the EU General Data Protection Regulation o Cloud computing standards o the international information security standard, ISO 27001 o the UK Government's Cyber Essentials scheme and security framework o CESG's Cloud security management principles o guidance from the Information Commissioner's Office and the Open Web Application Security Project (OWASP) Mitigate the security risks Mitigating security risks requires a range of combined measures to be used to provide end-to-end security. Moving to the Cloud does not solve security problems, it just adds another element that must be addressed. Data Protection and the Cloud provides information on how to do so while meeting the DPA's eight principles.
Subscribe to:
Post Comments (Atom)
The Colt 1911 Pistol (Osprey Weapon 9)
Download The Colt 1911 Pistol (Osprey Weapon 9) First used in combat during the Punitive Expedition into Me...
-
Download Drawdown: The Most Comprehensive Plan Ever Proposed To Reverse Global Warming The 100 most substan...
-
Download Invision Power Board 2: A User Guide. This book is your guide to configuring, managing and maintai...
-
Download Connection Games: Variations On A Theme A comprehensive study of the connection game genre, Connec...
No comments:
Post a Comment