SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Competition i th Cl d
                      C    titi in the Cloud


                                     Professor Ian Walden
                            Institute of Computer and Communications Law
                            I i        fC           dC      i i      L
                Centre for Commercial Law Studies, Queen Mary, University of London
                                     Of Counsel, Baker & McKenzie




                           Introductory remarks
          edu




                      “cloud computing can boost Europe's
                      competitiveness.....drastically reduce IT costs, help
                          p                         y                , p
  cl@ccls.e




                      governments supply services at a lower cost to citizens and
                      make computing much more energy efficient.”
                                                              Commission, 3 March 2011

                     Competition concerns
                      – End-user & supply chain
icc




                     Legal responses
                      – Within competition law
                      – Other legal regimes




                                                                                         1
edu
  cl@ccls.e                    Cloud Computing

                  Cloud
                  Cl d computing provides fl ibl l
                                ti       id flexible, location-independent access
                                                          ti i d      d t
                  to computing resources that are quickly and transparently
                  allocated or released in response to demand.

                  Services (especially infrastructure) are abstracted and typically
                  virtualised, generally being allocated from a pool shared as a
                  fungible resource with other customers.

                  Charging is commonly on an access basis, often in proportion to
                                                    basis
icc




                  the resources used.




                                 “X as a Service”
                Software as a Service
          edu




                Platform as a Service
  cl@ccls.e




                Infrastructure as a Service


                                  Communications as a Service
                                                 as a Service
                                       and so on...
                                       and so on...
                                       and so on...
icc




                                                                                      2
Service Cloud
          edu
  cl@ccls.e



                                                                          Network Cloud
icc




                                                                          Physical Cloud




                        Competition challenges
          edu




                   Anti-competitive agreements
  cl@ccls.e




                       e.g. Apple iPhone apps agreements (Sept. 2010)
                   Abuse of dominant position
                    – Market definition
                            From products to services
                    – Tying
icc




                            e.g. IBM i
                                      investigation re: software emulations & transition
                                            i i           f         l i            ii
                             from legacy systems
                    – Network effects & lock-in
                            e.g. Data portability & switching costs
                   Territoriality




                                                                                           3
Standardisation
          edu

                   Standards-making process
  cl@ccls.e

                        – F
                          From f
                               formal to i f
                                    l informal bodies
                                             l b di
                                e.g. Cloud Security Alliance, Trusted Cloud Initiative......
                        – EU approach
                                White Paper: Modernising ICT Standardisation in the EU (2009)
                                EC Guidelines on ‘horizontal agreements’ (2011)
                   Interoperability
                          p        y
icc




                        – IBM (1984), Microsoft (2007), Intel/McAfee....
                        – European Interoperability Strategy & Framework (2010)
                   Intellectual property rights
                        – On FRAND or royalty-free basis?




                                     Public procurement
          edu




                       Cloud services
                            Google Inc & Onix Networking v US and Softchoice
  cl@ccls.e




                             Corp. (2011)
                                    Re: Microsoft’s BPOS: “the DOI’s product selection of choice”
                       Regulated procurement
                         – UK Govt., Note 3/11 (31 January 2011)
                                    Open standards: i.e. “intellectual property made irrevocably
icc




                                     available on a royalty free basis”
                                    Italian Constitutional Court, Decision Nº 122, 22.3.2010
                                    But compliant with WTO public procurement rules?
                       State aid concerns
                         – TFEU, art. 107




                                                                                                     4
edu                     Data protection
                   Directive 95/46/EC
                    – Processing ‘personal data
                                  personal data’
  cl@ccls.e


                    – Review & reform
                           Commission Communication (Nov. 2010)
                   Data portability right
                    – Individual right to withdraw his/her own data
                           ‘as far as technically feasible’
                                                 y
icc




                    – Cloud terms & conditions
                           Post- termination: (a) opportunity to retrieve & (b)
                            assurance as to deletion
                    – Google’s ‘Data Liberation Front’!
          edu
  cl@ccls.e




                            Concluding remarks
icc




                             www.cloudlegal.ccls.qmul.ac.uk




                                                                                   5

Weitere ähnliche Inhalte

Was ist angesagt?

강의자료 Kkk 20130221(eng)
강의자료 Kkk 20130221(eng)강의자료 Kkk 20130221(eng)
강의자료 Kkk 20130221(eng)KK Ko
 
Draadloze campus van de toekomst
Draadloze campus van de toekomstDraadloze campus van de toekomst
Draadloze campus van de toekomstSURFnet
 
Ieee pimrc 2011 M2M challenges - WWRF - exalted
Ieee pimrc 2011   M2M challenges - WWRF - exaltedIeee pimrc 2011   M2M challenges - WWRF - exalted
Ieee pimrc 2011 M2M challenges - WWRF - exaltedThierry Lestable
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingTahmin Aysha Murshed
 
Distributed Reactive Programming Tools2010
Distributed Reactive Programming Tools2010Distributed Reactive Programming Tools2010
Distributed Reactive Programming Tools2010alombide
 
Broadband For Digitization
Broadband For DigitizationBroadband For Digitization
Broadband For DigitizationHadi Raad
 
Reframing Web 2.0 as a Public Service for the Right to Communicate
Reframing Web 2.0 as a Public Service for the Right to CommunicateReframing Web 2.0 as a Public Service for the Right to Communicate
Reframing Web 2.0 as a Public Service for the Right to CommunicateSebastian Deterding
 
I Minds2009 Future Networks Prof Piet Demeester (Ibbt Ibcn U Gent)
I Minds2009 Future Networks  Prof  Piet Demeester (Ibbt Ibcn U Gent)I Minds2009 Future Networks  Prof  Piet Demeester (Ibbt Ibcn U Gent)
I Minds2009 Future Networks Prof Piet Demeester (Ibbt Ibcn U Gent)imec.archive
 
EDF2012 Andrew Farrow - (Copy)right information in the digital age
EDF2012   Andrew Farrow - (Copy)right information in the digital ageEDF2012   Andrew Farrow - (Copy)right information in the digital age
EDF2012 Andrew Farrow - (Copy)right information in the digital ageEuropean Data Forum
 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
 
Cloud services via SURFconext
Cloud services via SURFconextCloud services via SURFconext
Cloud services via SURFconextSURFnet
 
Horizon 2020 & EC Innovation policy and Smart Cities EIP by Director Mario C...
Horizon 2020 & EC Innovation policy and Smart Cities EIP by Director  Mario C...Horizon 2020 & EC Innovation policy and Smart Cities EIP by Director  Mario C...
Horizon 2020 & EC Innovation policy and Smart Cities EIP by Director Mario C...European Network of Living Labs (ENoLL)
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsHarshitParkar6677
 
Opening mark thompson
Opening   mark thompsonOpening   mark thompson
Opening mark thompsonCFG
 
Intelligent Community Network Services May 2009
Intelligent Community Network Services   May 2009Intelligent Community Network Services   May 2009
Intelligent Community Network Services May 2009Mike Wons
 

Was ist angesagt? (19)

Smit Flyer
Smit FlyerSmit Flyer
Smit Flyer
 
Broadband Cooking Recipe
Broadband Cooking RecipeBroadband Cooking Recipe
Broadband Cooking Recipe
 
강의자료 Kkk 20130221(eng)
강의자료 Kkk 20130221(eng)강의자료 Kkk 20130221(eng)
강의자료 Kkk 20130221(eng)
 
Draadloze campus van de toekomst
Draadloze campus van de toekomstDraadloze campus van de toekomst
Draadloze campus van de toekomst
 
Ieee pimrc 2011 M2M challenges - WWRF - exalted
Ieee pimrc 2011   M2M challenges - WWRF - exaltedIeee pimrc 2011   M2M challenges - WWRF - exalted
Ieee pimrc 2011 M2M challenges - WWRF - exalted
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
 
Nancy Pascall digital_trends_11
Nancy Pascall digital_trends_11Nancy Pascall digital_trends_11
Nancy Pascall digital_trends_11
 
Distributed Reactive Programming Tools2010
Distributed Reactive Programming Tools2010Distributed Reactive Programming Tools2010
Distributed Reactive Programming Tools2010
 
Broadband For Digitization
Broadband For DigitizationBroadband For Digitization
Broadband For Digitization
 
Reframing Web 2.0 as a Public Service for the Right to Communicate
Reframing Web 2.0 as a Public Service for the Right to CommunicateReframing Web 2.0 as a Public Service for the Right to Communicate
Reframing Web 2.0 as a Public Service for the Right to Communicate
 
I Minds2009 Future Networks Prof Piet Demeester (Ibbt Ibcn U Gent)
I Minds2009 Future Networks  Prof  Piet Demeester (Ibbt Ibcn U Gent)I Minds2009 Future Networks  Prof  Piet Demeester (Ibbt Ibcn U Gent)
I Minds2009 Future Networks Prof Piet Demeester (Ibbt Ibcn U Gent)
 
EDF2012 Andrew Farrow - (Copy)right information in the digital age
EDF2012   Andrew Farrow - (Copy)right information in the digital ageEDF2012   Andrew Farrow - (Copy)right information in the digital age
EDF2012 Andrew Farrow - (Copy)right information in the digital age
 
Geo 24 28
Geo 24 28Geo 24 28
Geo 24 28
 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...
 
Cloud services via SURFconext
Cloud services via SURFconextCloud services via SURFconext
Cloud services via SURFconext
 
Horizon 2020 & EC Innovation policy and Smart Cities EIP by Director Mario C...
Horizon 2020 & EC Innovation policy and Smart Cities EIP by Director  Mario C...Horizon 2020 & EC Innovation policy and Smart Cities EIP by Director  Mario C...
Horizon 2020 & EC Innovation policy and Smart Cities EIP by Director Mario C...
 
Fog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of ThingsFog Computing and Its Role in the Internet of Things
Fog Computing and Its Role in the Internet of Things
 
Opening mark thompson
Opening   mark thompsonOpening   mark thompson
Opening mark thompson
 
Intelligent Community Network Services May 2009
Intelligent Community Network Services   May 2009Intelligent Community Network Services   May 2009
Intelligent Community Network Services May 2009
 

Andere mochten auch

Information ownership in the cloud
Information ownership in the cloudInformation ownership in the cloud
Information ownership in the cloudCloud Legal Project
 
Cloud computing: opportunities and risks
Cloud computing: opportunities and risksCloud computing: opportunities and risks
Cloud computing: opportunities and risksCloud Legal Project
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud Legal Project
 
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
Cloud Computing Contracts and Services:  What's Really Happening Out There? T...Cloud Computing Contracts and Services:  What's Really Happening Out There? T...
Cloud Computing Contracts and Services: What's Really Happening Out There? T...Cloud Legal Project
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingCloud Legal Project
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Cloud Legal Project
 

Andere mochten auch (6)

Information ownership in the cloud
Information ownership in the cloudInformation ownership in the cloud
Information ownership in the cloud
 
Cloud computing: opportunities and risks
Cloud computing: opportunities and risksCloud computing: opportunities and risks
Cloud computing: opportunities and risks
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risks
 
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
Cloud Computing Contracts and Services:  What's Really Happening Out There? T...Cloud Computing Contracts and Services:  What's Really Happening Out There? T...
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud Computing
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011
 

Ähnlich wie Cloud computing - competition law issues

Tutorial 4 peter kustor
Tutorial 4 peter kustorTutorial 4 peter kustor
Tutorial 4 peter kustoregovernment
 
Cloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigationsCloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigationspoojagupta010
 
Tutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moranTutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moranegovernment
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
 
A220113
A220113A220113
A220113irjes
 
CUTTING THROUGH THE FOG: UNDERSTANDING THE COMPETITIVE DYNAMICS IN CLOUD COMP...
CUTTING THROUGH THE FOG: UNDERSTANDING THE COMPETITIVE DYNAMICS IN CLOUD COMP...CUTTING THROUGH THE FOG: UNDERSTANDING THE COMPETITIVE DYNAMICS IN CLOUD COMP...
CUTTING THROUGH THE FOG: UNDERSTANDING THE COMPETITIVE DYNAMICS IN CLOUD COMP...HarshitParkar6677
 
Unleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranUnleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranE-Government Center Moldova
 
Cloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing CapabilitiesCloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing CapabilitiesSusanneT
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityTech and Law Center
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issuesRezgar Mohammad
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112Sharon Rozov
 
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing ResearchFuture Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing ResearchAntonio Marcos Alberti
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 

Ähnlich wie Cloud computing - competition law issues (20)

Tutorial 4 peter kustor
Tutorial 4 peter kustorTutorial 4 peter kustor
Tutorial 4 peter kustor
 
Cloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigationsCloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigations
 
Tutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moranTutorial 4 francisco garcia moran
Tutorial 4 francisco garcia moran
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
A220113
A220113A220113
A220113
 
CUTTING THROUGH THE FOG: UNDERSTANDING THE COMPETITIVE DYNAMICS IN CLOUD COMP...
CUTTING THROUGH THE FOG: UNDERSTANDING THE COMPETITIVE DYNAMICS IN CLOUD COMP...CUTTING THROUGH THE FOG: UNDERSTANDING THE COMPETITIVE DYNAMICS IN CLOUD COMP...
CUTTING THROUGH THE FOG: UNDERSTANDING THE COMPETITIVE DYNAMICS IN CLOUD COMP...
 
4 francisco garcia_moran_moldova_2013
4 francisco garcia_moran_moldova_20134 francisco garcia_moran_moldova_2013
4 francisco garcia_moran_moldova_2013
 
Unleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moranUnleashing the potential of cloud computing in europe francisco garcia moran
Unleashing the potential of cloud computing in europe francisco garcia moran
 
Tarot 2017
Tarot 2017Tarot 2017
Tarot 2017
 
Cloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing CapabilitiesCloud Governance Framework - Required Cloud Sourcing Capabilities
Cloud Governance Framework - Required Cloud Sourcing Capabilities
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity
 
G0314043
G0314043G0314043
G0314043
 
Cloud Computing_2015_03_05
Cloud Computing_2015_03_05Cloud Computing_2015_03_05
Cloud Computing_2015_03_05
 
A survey of fog computing concepts applications and issues
A survey of fog computing concepts  applications and issuesA survey of fog computing concepts  applications and issues
A survey of fog computing concepts applications and issues
 
Cloud computing ppts
Cloud computing pptsCloud computing ppts
Cloud computing ppts
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112
 
BEN Event - Guijarro
BEN Event - GuijarroBEN Event - Guijarro
BEN Event - Guijarro
 
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing ResearchFuture Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
Future Internet: Visions, Requirements, Key Ingredients, and Ongoing Research
 
B017660813
B017660813B017660813
B017660813
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 

Kürzlich hochgeladen

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Kürzlich hochgeladen (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Cloud computing - competition law issues

  • 1. Competition i th Cl d C titi in the Cloud Professor Ian Walden Institute of Computer and Communications Law I i fC dC i i L Centre for Commercial Law Studies, Queen Mary, University of London Of Counsel, Baker & McKenzie Introductory remarks edu “cloud computing can boost Europe's competitiveness.....drastically reduce IT costs, help p y , p cl@ccls.e governments supply services at a lower cost to citizens and make computing much more energy efficient.” Commission, 3 March 2011  Competition concerns – End-user & supply chain icc  Legal responses – Within competition law – Other legal regimes 1
  • 2. edu cl@ccls.e Cloud Computing Cloud Cl d computing provides fl ibl l ti id flexible, location-independent access ti i d d t to computing resources that are quickly and transparently allocated or released in response to demand. Services (especially infrastructure) are abstracted and typically virtualised, generally being allocated from a pool shared as a fungible resource with other customers. Charging is commonly on an access basis, often in proportion to basis icc the resources used. “X as a Service” Software as a Service edu Platform as a Service cl@ccls.e Infrastructure as a Service Communications as a Service as a Service and so on... and so on... and so on... icc 2
  • 3. Service Cloud edu cl@ccls.e Network Cloud icc Physical Cloud Competition challenges edu  Anti-competitive agreements cl@ccls.e  e.g. Apple iPhone apps agreements (Sept. 2010)  Abuse of dominant position – Market definition  From products to services – Tying icc  e.g. IBM i investigation re: software emulations & transition i i f l i ii from legacy systems – Network effects & lock-in  e.g. Data portability & switching costs  Territoriality 3
  • 4. Standardisation edu  Standards-making process cl@ccls.e – F From f formal to i f l informal bodies l b di  e.g. Cloud Security Alliance, Trusted Cloud Initiative...... – EU approach  White Paper: Modernising ICT Standardisation in the EU (2009)  EC Guidelines on ‘horizontal agreements’ (2011)  Interoperability p y icc – IBM (1984), Microsoft (2007), Intel/McAfee.... – European Interoperability Strategy & Framework (2010)  Intellectual property rights – On FRAND or royalty-free basis? Public procurement edu  Cloud services  Google Inc & Onix Networking v US and Softchoice cl@ccls.e Corp. (2011)  Re: Microsoft’s BPOS: “the DOI’s product selection of choice”  Regulated procurement – UK Govt., Note 3/11 (31 January 2011)  Open standards: i.e. “intellectual property made irrevocably icc available on a royalty free basis”  Italian Constitutional Court, Decision Nº 122, 22.3.2010  But compliant with WTO public procurement rules?  State aid concerns – TFEU, art. 107 4
  • 5. edu Data protection  Directive 95/46/EC – Processing ‘personal data personal data’ cl@ccls.e – Review & reform  Commission Communication (Nov. 2010)  Data portability right – Individual right to withdraw his/her own data  ‘as far as technically feasible’ y icc – Cloud terms & conditions  Post- termination: (a) opportunity to retrieve & (b) assurance as to deletion – Google’s ‘Data Liberation Front’! edu cl@ccls.e Concluding remarks icc www.cloudlegal.ccls.qmul.ac.uk 5