SlideShare a Scribd company logo
1 of 16
Investigation and E-discovery in the Cloud Albert Barsocchini, Esq.barsocchini@gmail.comE-Discovery and International Data Privacy and Protection legal Series
Definitions of terms A customer or potential customer of a cloud computing service is a user. The user may be an individual, business, government agency, or any other entity. The organization that offers the cloud computing service is a cloud service provider, or cloud provider.  A cloud provider may be an individual, a corporation or other business, a non-profit organization, a government agency or any other entity. A cloud service provider is one type of third party that maintains information about, or on behalf of, another entity.
Cloud Types: Public Via web applications/web services, from an off-site third-party provider who uses a shared resources.  Not much new here this is traditional online email and other related service that are typically free Hotmail, Yahoo Mail, Gmail and many others. Paid for by marketing, advertising and/or your contact information.
Cloud Types: Private ,[object Object]
Amazon Elastic Compute Cloud (also known as "EC2") allows users to rent computers on which to run their own computer applications. EC2 allows scalable deployment of applications by providing a web service through which a user can boot an Amazon Machine Image to create a virtual machine instance containing any software desired.
The Rackspace Cloud is a web application hosting/cloud platform provider ("Cloud Sites") that bills on a utility computing basis[1]. It has since branched out into cloud storage ("Cloud Files") and cloud infrastructure ("Cloud Servers"). 
Paid for buy customer.,[object Object]
What are the major legal issues? Transborder Data Flow. Reasonable Security eDiscovery
Top Legal Considerations Cloud computing has significant implications for the privacy of personal information as well as for the confidentiality of business and governmental information. A user’s privacy and confidentiality risks vary significantly with the terms of service and privacy policy established by the cloud provider. For some types of information and some categories of cloud computing users privacy and confidentiality rights, obligations, and status may change when a user discloses information to a cloud provider. Disclosure and remote storage may have adverse consequences for the legal status of or protections for personal or business information. The location of information in the cloud may have significant effects on the privacy and confidentiality protections of information and on the privacy obligations of  those who process or store the information. Information in the cloud may have more than one legal location at the same time, with differing legal consequences. Laws could oblige a cloud provider to examine user records for evidence of criminal activity and other matters. Legal uncertainties make it difficult to assess the status of information in the cloud as well as the privacy and confidentiality protections available to users. Responses to the privacy and confidentiality risks of cloud computing include better policies and practices by cloud providers, changes to laws, and more vigilance by users.
eDiscovery Issues Litigation hold Data access Data format Due diligence Data Privacy Data Security Response capability Data access contracts
Subpoena Issues Privacy policies at some websites promise to provide notice of subpoenas to users when legally permissible to do so The more activity that a user conducts in the cloud, the greater the risk of third party disclosure. cloud providers will have obligations to monitor users in some cases. For example, some jurisdictions in the United States require computer technicians to report evidence of child pornography that they find when repairing or otherwise servicing computers to police or prosecutors.
Other Legal Issues Electronic Communications Privacy Act (ECPA) USA PATRIOT Act HIPAA and compelled disclosures Fair Credit Reporting Act Bankruptcy of a cloud provider Gramm-Leach-Bliley Act Trade secrets Tax Preparation Laws Legally Privileged Information Professional Secrecy Obligations
Policy Considerations Responses to the privacy and confidentiality risks of cloud computing should include better policies and practices by cloud providers. Cloud computing industry should establish standards that will help users to analyze the difference between cloud providers and to assess the risks that users face. Users should pay more attention to the consequences of using a cloud provider and, especially, to the provider’s terms of service. For those risks not addressable solely through policies and practices, changes in laws may be needed.
General Discussion Issues What kind of data will be in the cloud? Where do the data subjects reside? Where will the data be stored?  Where are the servers?  Will the data be transferred to other locations and, if so, when and where? Can certain types of data be restricted to particular geographic areas? What is the compliance plan for cross-border data transfers?
General Discussion Issues ,[object Object]
When information is transported across the Internet, it is done in the form of bits and bytes wrapped in data packets, which contain lots of information about the information that is being transmitted. Each data packet has a header and a "payload." While the header keeps overhead information about the packet, the service and other transmission-related things, the payload is the data itself.  Is this packet information discoverable in a way similar to how meta data is sometime discoverable for user created files?,[object Object]

More Related Content

What's hot

Understanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingUnderstanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingJanine Anthony Bowen, Esq.
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computingRitambhara Agrawal
 
Cloud Computing: legal issues
Cloud Computing: legal issuesCloud Computing: legal issues
Cloud Computing: legal issuesISPABelgium
 
Cloud computing: Legal and ethical issues in library and information services
Cloud computing: Legal and ethical issues in library and information servicesCloud computing: Legal and ethical issues in library and information services
Cloud computing: Legal and ethical issues in library and information servicese-Marefa
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contractsMeera Kaul
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computingmovinghats
 
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Tom Kulik
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0David Spinks
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110guestd7fc9c
 
Sookman law society_6_min_business_law
Sookman law society_6_min_business_lawSookman law society_6_min_business_law
Sookman law society_6_min_business_lawbsookman
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is CloudWilliam Lam
 
Misa cloud computing workshop lhm final
Misa cloud computing workshop   lhm finalMisa cloud computing workshop   lhm final
Misa cloud computing workshop lhm finalLou Milrad
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationNicole Black
 
Impact of GDPR on the pre dominant business model for digital economies
Impact of GDPR on the pre dominant business model for digital economiesImpact of GDPR on the pre dominant business model for digital economies
Impact of GDPR on the pre dominant business model for digital economiesEquiGov Institute
 
Trust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelTrust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelIJERA Editor
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersRobert Ambrogi
 

What's hot (20)

Understanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud ComputingUnderstanding Minimizing And Mitigating Risk In Cloud Computing
Understanding Minimizing And Mitigating Risk In Cloud Computing
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
 
Is There Sun Behind Those Clouds
Is There Sun Behind Those CloudsIs There Sun Behind Those Clouds
Is There Sun Behind Those Clouds
 
Cloud Computing: legal issues
Cloud Computing: legal issuesCloud Computing: legal issues
Cloud Computing: legal issues
 
Cloud computing: Legal and ethical issues in library and information services
Cloud computing: Legal and ethical issues in library and information servicesCloud computing: Legal and ethical issues in library and information services
Cloud computing: Legal and ethical issues in library and information services
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contracts
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
 
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
Partly Sunny With a Chance of Rain: Forecasting the Legal Issues in Cloud Com...
 
Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0Legal And Regulatory Issues Cloud Computing...V2.0
Legal And Regulatory Issues Cloud Computing...V2.0
 
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110C:\Fakepath\Cloud Computing   Mitigating Risk   Fmb   0110
C:\Fakepath\Cloud Computing Mitigating Risk Fmb 0110
 
Sookman law society_6_min_business_law
Sookman law society_6_min_business_lawSookman law society_6_min_business_law
Sookman law society_6_min_business_law
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
Misa cloud computing workshop lhm final
Misa cloud computing workshop   lhm finalMisa cloud computing workshop   lhm final
Misa cloud computing workshop lhm final
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association Presentation
 
Impact of GDPR on the pre dominant business model for digital economies
Impact of GDPR on the pre dominant business model for digital economiesImpact of GDPR on the pre dominant business model for digital economies
Impact of GDPR on the pre dominant business model for digital economies
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
 
Trust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelTrust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto Model
 
Cloud security - Publication
Cloud security - Publication Cloud security - Publication
Cloud security - Publication
 
GDPR - 5 Months On!
GDPR - 5 Months On!GDPR - 5 Months On!
GDPR - 5 Months On!
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 

Viewers also liked

Kakadu Software High Quality JPEG2000 Software Enhanced Server Platform
Kakadu Software High Quality JPEG2000 Software Enhanced Server PlatformKakadu Software High Quality JPEG2000 Software Enhanced Server Platform
Kakadu Software High Quality JPEG2000 Software Enhanced Server Platformxband
 
Protagonista da medicina do futuro 2012
Protagonista da medicina do futuro 2012Protagonista da medicina do futuro 2012
Protagonista da medicina do futuro 2012José Antonio Paniagua
 
I loader 2 โปรแกรมดีสำหรับผู้ใช้งาน facebook บน iphone
I loader 2 โปรแกรมดีสำหรับผู้ใช้งาน facebook บน iphoneI loader 2 โปรแกรมดีสำหรับผู้ใช้งาน facebook บน iphone
I loader 2 โปรแกรมดีสำหรับผู้ใช้งาน facebook บน iphonenuttakorn nakkerd
 
Festival tra lago e monti locandina 2010
Festival tra lago e monti locandina 2010Festival tra lago e monti locandina 2010
Festival tra lago e monti locandina 2010Danilo Mambretti
 
ธรรมะเดลิเวอร์รี่ 1
ธรรมะเดลิเวอร์รี่ 1ธรรมะเดลิเวอร์รี่ 1
ธรรมะเดลิเวอร์รี่ 1nuttakorn nakkerd
 
ธรรมะทูเดย์ 7
ธรรมะทูเดย์ 7ธรรมะทูเดย์ 7
ธรรมะทูเดย์ 7nuttakorn nakkerd
 
Recentes avanços moleculares e aspectos genético clínicos em síndrome de down
Recentes avanços moleculares e aspectos genético clínicos em síndrome de downRecentes avanços moleculares e aspectos genético clínicos em síndrome de down
Recentes avanços moleculares e aspectos genético clínicos em síndrome de downJosé Antonio Paniagua
 
Revisão para recuperação paralela em Ciências da Natureza - 8º anos 2014
Revisão para recuperação paralela em Ciências da Natureza - 8º anos 2014  Revisão para recuperação paralela em Ciências da Natureza - 8º anos 2014
Revisão para recuperação paralela em Ciências da Natureza - 8º anos 2014 José Antonio Paniagua
 
Revisão dos capítulos 3 e 4 do livro didático de ciências para recuperação pa...
Revisão dos capítulos 3 e 4 do livro didático de ciências para recuperação pa...Revisão dos capítulos 3 e 4 do livro didático de ciências para recuperação pa...
Revisão dos capítulos 3 e 4 do livro didático de ciências para recuperação pa...José Antonio Paniagua
 

Viewers also liked (10)

Kakadu Software High Quality JPEG2000 Software Enhanced Server Platform
Kakadu Software High Quality JPEG2000 Software Enhanced Server PlatformKakadu Software High Quality JPEG2000 Software Enhanced Server Platform
Kakadu Software High Quality JPEG2000 Software Enhanced Server Platform
 
Protagonista da medicina do futuro 2012
Protagonista da medicina do futuro 2012Protagonista da medicina do futuro 2012
Protagonista da medicina do futuro 2012
 
I loader 2 โปรแกรมดีสำหรับผู้ใช้งาน facebook บน iphone
I loader 2 โปรแกรมดีสำหรับผู้ใช้งาน facebook บน iphoneI loader 2 โปรแกรมดีสำหรับผู้ใช้งาน facebook บน iphone
I loader 2 โปรแกรมดีสำหรับผู้ใช้งาน facebook บน iphone
 
Festival tra lago e monti locandina 2010
Festival tra lago e monti locandina 2010Festival tra lago e monti locandina 2010
Festival tra lago e monti locandina 2010
 
ธรรมะเดลิเวอร์รี่ 1
ธรรมะเดลิเวอร์รี่ 1ธรรมะเดลิเวอร์รี่ 1
ธรรมะเดลิเวอร์รี่ 1
 
ธรรมะทูเดย์ 7
ธรรมะทูเดย์ 7ธรรมะทูเดย์ 7
ธรรมะทูเดย์ 7
 
Unit2
Unit2Unit2
Unit2
 
Recentes avanços moleculares e aspectos genético clínicos em síndrome de down
Recentes avanços moleculares e aspectos genético clínicos em síndrome de downRecentes avanços moleculares e aspectos genético clínicos em síndrome de down
Recentes avanços moleculares e aspectos genético clínicos em síndrome de down
 
Revisão para recuperação paralela em Ciências da Natureza - 8º anos 2014
Revisão para recuperação paralela em Ciências da Natureza - 8º anos 2014  Revisão para recuperação paralela em Ciências da Natureza - 8º anos 2014
Revisão para recuperação paralela em Ciências da Natureza - 8º anos 2014
 
Revisão dos capítulos 3 e 4 do livro didático de ciências para recuperação pa...
Revisão dos capítulos 3 e 4 do livro didático de ciências para recuperação pa...Revisão dos capítulos 3 e 4 do livro didático de ciências para recuperação pa...
Revisão dos capítulos 3 e 4 do livro didático de ciências para recuperação pa...
 

Similar to Cloud

Intro to cloud computing
Intro to cloud computingIntro to cloud computing
Intro to cloud computingKashif Bhatti
 
Cloud computing
Cloud computingCloud computing
Cloud computinghundejibat
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudIOSR Journals
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 EuroCloud
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsCloudMask inc.
 
Legal Challenges in Contracting for Cloud Services
Legal Challenges in Contracting for Cloud ServicesLegal Challenges in Contracting for Cloud Services
Legal Challenges in Contracting for Cloud ServicesLou Milrad
 
Cloud computing
Cloud computingCloud computing
Cloud computingHira Zahan
 
1 3Financial Service Security EngagementLearning Team .docx
1     3Financial Service Security EngagementLearning Team .docx1     3Financial Service Security EngagementLearning Team .docx
1 3Financial Service Security EngagementLearning Team .docxoswald1horne84988
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for GovernmentsCloudMask inc.
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensenjaredcarst
 
Cloud Computing presentation by Lisa Abe at the Canadian IT Lawyers Associat...
Cloud Computing  presentation by Lisa Abe at the Canadian IT Lawyers Associat...Cloud Computing  presentation by Lisa Abe at the Canadian IT Lawyers Associat...
Cloud Computing presentation by Lisa Abe at the Canadian IT Lawyers Associat...lisaabe
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?Mohammad Mydul Islam
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management Padma Jella
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud ComputingJoseph Williams
 
Ahearn Cloud Presentation
Ahearn Cloud PresentationAhearn Cloud Presentation
Ahearn Cloud Presentationjohnjamesahearn
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 
Cloud Services As An Enabler
Cloud Services As An EnablerCloud Services As An Enabler
Cloud Services As An EnablerSLA-Ready Network
 

Similar to Cloud (20)

Intro to cloud computing
Intro to cloud computingIntro to cloud computing
Intro to cloud computing
 
02 05 d_51_cc_efiles
02 05 d_51_cc_efiles02 05 d_51_cc_efiles
02 05 d_51_cc_efiles
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in Cloud
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
Legal Challenges in Contracting for Cloud Services
Legal Challenges in Contracting for Cloud ServicesLegal Challenges in Contracting for Cloud Services
Legal Challenges in Contracting for Cloud Services
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
1 3Financial Service Security EngagementLearning Team .docx
1     3Financial Service Security EngagementLearning Team .docx1     3Financial Service Security EngagementLearning Team .docx
1 3Financial Service Security EngagementLearning Team .docx
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
Cloud Computing presentation by Lisa Abe at the Canadian IT Lawyers Associat...
Cloud Computing  presentation by Lisa Abe at the Canadian IT Lawyers Associat...Cloud Computing  presentation by Lisa Abe at the Canadian IT Lawyers Associat...
Cloud Computing presentation by Lisa Abe at the Canadian IT Lawyers Associat...
 
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?How secure is the cloud? and Amazon vs Walmart which giant will dominant?
How secure is the cloud? and Amazon vs Walmart which giant will dominant?
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
IEEE PHM Cloud Computing
IEEE PHM Cloud ComputingIEEE PHM Cloud Computing
IEEE PHM Cloud Computing
 
Ahearn Cloud Presentation
Ahearn Cloud PresentationAhearn Cloud Presentation
Ahearn Cloud Presentation
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Cloud Services As An Enabler
Cloud Services As An EnablerCloud Services As An Enabler
Cloud Services As An Enabler
 

Cloud

  • 1. Investigation and E-discovery in the Cloud Albert Barsocchini, Esq.barsocchini@gmail.comE-Discovery and International Data Privacy and Protection legal Series
  • 2. Definitions of terms A customer or potential customer of a cloud computing service is a user. The user may be an individual, business, government agency, or any other entity. The organization that offers the cloud computing service is a cloud service provider, or cloud provider. A cloud provider may be an individual, a corporation or other business, a non-profit organization, a government agency or any other entity. A cloud service provider is one type of third party that maintains information about, or on behalf of, another entity.
  • 3. Cloud Types: Public Via web applications/web services, from an off-site third-party provider who uses a shared resources. Not much new here this is traditional online email and other related service that are typically free Hotmail, Yahoo Mail, Gmail and many others. Paid for by marketing, advertising and/or your contact information.
  • 4.
  • 5. Amazon Elastic Compute Cloud (also known as "EC2") allows users to rent computers on which to run their own computer applications. EC2 allows scalable deployment of applications by providing a web service through which a user can boot an Amazon Machine Image to create a virtual machine instance containing any software desired.
  • 6. The Rackspace Cloud is a web application hosting/cloud platform provider ("Cloud Sites") that bills on a utility computing basis[1]. It has since branched out into cloud storage ("Cloud Files") and cloud infrastructure ("Cloud Servers"). 
  • 7.
  • 8. What are the major legal issues? Transborder Data Flow. Reasonable Security eDiscovery
  • 9. Top Legal Considerations Cloud computing has significant implications for the privacy of personal information as well as for the confidentiality of business and governmental information. A user’s privacy and confidentiality risks vary significantly with the terms of service and privacy policy established by the cloud provider. For some types of information and some categories of cloud computing users privacy and confidentiality rights, obligations, and status may change when a user discloses information to a cloud provider. Disclosure and remote storage may have adverse consequences for the legal status of or protections for personal or business information. The location of information in the cloud may have significant effects on the privacy and confidentiality protections of information and on the privacy obligations of those who process or store the information. Information in the cloud may have more than one legal location at the same time, with differing legal consequences. Laws could oblige a cloud provider to examine user records for evidence of criminal activity and other matters. Legal uncertainties make it difficult to assess the status of information in the cloud as well as the privacy and confidentiality protections available to users. Responses to the privacy and confidentiality risks of cloud computing include better policies and practices by cloud providers, changes to laws, and more vigilance by users.
  • 10. eDiscovery Issues Litigation hold Data access Data format Due diligence Data Privacy Data Security Response capability Data access contracts
  • 11. Subpoena Issues Privacy policies at some websites promise to provide notice of subpoenas to users when legally permissible to do so The more activity that a user conducts in the cloud, the greater the risk of third party disclosure. cloud providers will have obligations to monitor users in some cases. For example, some jurisdictions in the United States require computer technicians to report evidence of child pornography that they find when repairing or otherwise servicing computers to police or prosecutors.
  • 12. Other Legal Issues Electronic Communications Privacy Act (ECPA) USA PATRIOT Act HIPAA and compelled disclosures Fair Credit Reporting Act Bankruptcy of a cloud provider Gramm-Leach-Bliley Act Trade secrets Tax Preparation Laws Legally Privileged Information Professional Secrecy Obligations
  • 13. Policy Considerations Responses to the privacy and confidentiality risks of cloud computing should include better policies and practices by cloud providers. Cloud computing industry should establish standards that will help users to analyze the difference between cloud providers and to assess the risks that users face. Users should pay more attention to the consequences of using a cloud provider and, especially, to the provider’s terms of service. For those risks not addressable solely through policies and practices, changes in laws may be needed.
  • 14. General Discussion Issues What kind of data will be in the cloud? Where do the data subjects reside? Where will the data be stored?  Where are the servers?  Will the data be transferred to other locations and, if so, when and where? Can certain types of data be restricted to particular geographic areas? What is the compliance plan for cross-border data transfers?
  • 15.
  • 16.
  • 17.
  • 18. Will the addition of cloud computing to my companies environment add to the complexity my computer forensics program?
  • 19. How does working in a cloud based virtualized environment change my investigation since we do not have physical access?
  • 20. How do you audit systems in a cloud computing environment?
  • 21. How does the use of a shared resource impact a forensic investigation?
  • 22. How do you collect data from a system in a cloud computing environment?
  • 23.