{"id":251,"date":"2010-10-19T00:00:00","date_gmt":"2010-10-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/10\/19\/cloud-computing-how-to-navigate-the-legal-and-contractual-pitfalls\/"},"modified":"2021-12-30T11:36:50","modified_gmt":"2021-12-30T11:36:50","slug":"cloud-computing-how-to-navigate-the-legal-and-contractual-pitfalls","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/10\/19\/cloud-computing-how-to-navigate-the-legal-and-contractual-pitfalls\/","title":{"rendered":"Cloud computing: how to navigate the legal and contractual pitfalls"},"content":{"rendered":"<p>With all of the hype about cloud computing, you&#8217;d think it is a novel concept that will revolutionise the IT industry.  They were not initially called &#8216;cloud computing&#8217; &#8212; but ASP or Application Service Provider contracts, or hosted or managed service arrangements, to name a few aliases.  The reason cloud computing is making a lot of noise these days is because the benefits that it can now bring are more tangible than a decade ago, with improvements in internet speeds, IT infrastructure and the increase in the number of service providers in the industry.  The advantages of cloud include: scalability; cost control; opex versus capex advantages through reduced upfront payments; quicker IT deployment and better technology refresh; &#8216;greener&#8217; IT solutions by avoiding over-provisioning of IT kit and centralising IT infrastructures within the cloud.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is not to say the challenges outweigh the benefits, but that these must be thought through carefully, so that proper commercial decisions are made to deal with the risks.<\/p>\n<p>Data protection: data must be processed within the European Economic Area, unless there is adequacy of protection established outside the EEA, or consent requirements have been met in respect of data subjects;<br \/>\nRegulatory compliance: if an organisation is operating in a regulated industry, it must ensure that the associated compliance obligations can be maintained (audit rights and appropriate controls, for example);<br \/>\nSecurity and confidentiality obligations &#8212; although an obvious and important point, consideration needs to be given as to how to verify such measures; Service levels and compensation mechanisms &#8212; with the infrastructure in the cloud, this becomes more vital, together with considerations associated with measurement (delineating between the cloud provider&#8217;s infrastructure responsibilities, and those which lie within the domain of the customer);<br \/>\nEscrow considerations &#8211; worth thinking about, in case the service provider disappears, or the contract terminates early;<br \/>\nBusiness continuity and disaster recovery &#8212; cloud computing can give rise to robust business continuity and disaster recovery measures if properly implemented.<\/p>\n<p>http:\/\/itlaw.computing.co.uk\/2010\/10\/cloud-computing-blue-sky-thinking-or-head-in-the-clouds.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-251","post","type-post","status-publish","format-standard","hentry","category-cloud"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=251"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/251\/revisions"}],"predecessor-version":[{"id":2738,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/251\/revisions\/2738"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}