Add a new comment

no-images

Wim Schollaert on 19 April 2013

Where People in the business right now are focusing on the teritoriality of the stored data. It is clear that we speak about Data flow... as data is moved between locations trough who knows what location, it quickly transits trough switching and routing located in a different country, so does that imply that the contry where the data flows trough has access rights ? port duplication / sniffing ....) Data privacy has not yet seen the end of the tunnel

no-images

C.C. Warren on 19 April 2013

I don't particularly mind, as I (and other should do so as well) encrypt any vital information to the nth degree. And moreover, I only use the "cloud" for nonvital things (Amazon MP3 purchases, for example, or school assignments) prefering to instead carry my data on my person, just as portable and reliable as the cloud , on a flash disk. I'd suggest everyone do so as well. (When feasible.) What I *do* fear is the snooping of governments on internet transmissions (emails, im's, etc. ) and I'm already beginning to enact countermeasures to this... but if I told them here, that'd kind of defeat the purpose of having secrets. I'd encourage you all to be very cautious and be creative in your data storage and transmission. I wish you all the best in everything and hope that nothing disaterous befalls you, even if you are prepared.

no-images

B Cairn on 20 April 2013

The criterion is 'the jurisdiction in which the data is located'. Not the 'jurisdiction of the data owner' or the 'jurisdiction in which a company is incorporated'. Consider a Bank holding company registered in Delaware, owns a subsidiary in London (UK). The subsidiary stores its customer account data on a cloud server located in Luxemburg. 1. Does the US/Delaware have jurisdiction over London? 2. Does the US/Delaware have jurisdiction over Luxemburg? 3. Does London have jurisdiction over Luxemburg? 4. Does London have jurisdiction over US/Delaware? Generally, to answer to 1 thru 4 in no. The question to be asked is "What bi-lateral terrorist and money-laundering arrangements are there between the various countries?"

no-images

Don O'Neill on 21 April 2013

Every organization has information it cannot afford to lose. The remedy for the loss of proprietary information and data lies not in better Cyber Security hygiene, perimeter defense, or defense in depth measures. Instead the remedy can be found in a far more muscular and critical inquiry by consumers themselves into the actual risk of loss of proprietary information and data they cannot afford to lose and cannot protect. That inherent risk is heightened in the joint use of cloud computing with the Internet and a supply chain of third party participants and outsource vendors. In the Internet as public commons, there is no overarching responsibility for making the Internet safe; instead safety depends on cooperation and responsible choices by the commoners who use it. Considering the widespread Cyber Security risk associated with Internet use, why is the default option with respect to Internet use one of use not nonuse? Indiscriminately applied, the presumed use option only serves to enable Cyber crime whose bad actors threaten competitiveness and national security. Instead the default option on Internet use should be nonuse.

no-images

slayerwulfe on 21 April 2013

i have no concerns about gov't i'm a very little person. my gov't doesn't (as strange and unrealistic, they do want me to be successful)to use me. i'm more concerned about those claiming to be business that are not. we have to accept the pains of getting older (that means the future)50 yrs this will not be an issue we'll either get older or we'll all be gone. hedge my bet, Hello, Goodbye. i feel so much better. very well written article

no-images

Hawk 79 on 23 April 2013

Instead of asking little people, how do you feel about having created another "wonder",ripe for abuse by wronged politicians? Maybe like Albert felt after Atom Bombs dropped on civilians??

Dan Swinhoe (Global) - Data, Cloud, Government: The Dangers Of Data Sovereignty

All fields are mandatory so please complete them prior to submitting your comment.

     

Recommended for You

phil-muncaster

How a Washington crackdown on Huawei could backfire for everyone

Phil Muncaster reports on China and beyond

dan2

5G is over-hyped and expectations need reining in

Dan Swinhoe casts a critical eye on the future

keri-allan

What can we learn from tech initiatives in the Middle East?

Keri Allan looks at the latest trends and technologies

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should the government regulate Artificial Intelligence?