SlideShare a Scribd company logo
1 of 28
Cloud Computing
in Australia:
Separating Hype
from Reality
Craig Subocz
BE (Hons), LLB, LLM, Grad.
Cert. in Entrepreneurship &
Innovation
Senior Associate
7 May 2014
The information contained in this
presentation is intended as general
commentary and should not be
regarded as legal advice. Should you
require specific advice on the topics or
areas discussed please contact the
presenter directly.
Disclaimer
Agenda
The use of
cloud computing
in Australia
The risks of
cloud computing
Risk
minimisation
strategy
Cloud Computing in Australia
Source: 2012 CCH Technology Survey (US)
Cloud Computing in Australia
Risks
Security
Confidentiality
and privacy
Intellectual
property
Service
availability and
service levels
Disaster recovery
and business
continuity
Termination,
insolvency and
transition-out
Risks - Security
• Secure access to data
• Customer access
• Provider access
• Secure data transfer
• Identity management
• Architecture security
Risks - Confidentiality
• A key risk magnified if your provider has
access to your data
• Essential to manage the risk of inadvertent
disclosure of your confidential information
• Contractual provisions protecting confidentiality
of your information assist
• Issue of proof may be difficult
Risks - Privacy
• New privacy laws from 12 March 2014
• Private entities with annual turnover exceeding
$3 million bound by the Privacy Act and the
Australian Privacy Principles
• APP 8 deals with cross-border disclosure of
personal information (NB: not use of personal
information offshore)
Risks - Privacy
• APP 8 – two choices
• APP 8.1: Before disclosure, reasonable steps
to ensure recipient does not breach APPs
• Due diligence on provider pre-contract
• Contract provisions
• APP 8.2: Several options
• Reasonable belief about o/s laws
• Individuals consent to disclosure
• Disclosure authorised or required by law
Risks - Privacy
• Victorian government agencies still bound by
Information Privacy Act 2000 (Vic) and IPP 9.
• Can only transfer information about an individual to
someone outside Victoria only if:
• Reasonable belief about the law binding the
recipient
• The individual consents
• Transfer is necessary for the performance of a
contract between you and the individual
• Transfer is necessary for the performance of a
contract between you and a 3rd party for the benefit
of the individual
Risks - Privacy
How can an entity
use a cloud
provider based
outside Australia?
Informed consent
of individuals
how practical?
Reasonable belief
about the laws
binding the
provider
what happens if
location(s) of
provider’s data
centre(s) change?
Capacity to
contract with
provider
how strong is your
bargaining
position?
Risks - Privacy
• Other APPs (IPPs) are also relevant.
• APP 10 – quality of personal information
• APP 11 – security of personal information
• APP 12 – access to personal information
• APP 13 – correction of personal information
• But consider all the Privacy Principles
Risks – Intellectual Property
• Service, not software, provided
• Sufficient IP rights needed
• Different considerations apply depending on
context
• Public cloud versus private cloud
Risks – Service Levels
• What service levels are appropriate?
• What is the risk to your business if the cloud
service fails to meet the service levels?
• Reputational risk
• Legal risk (including contract breach)
• What rights and remedies do you have if
provider fails a service level?
Risks – Disaster Recovery
• You trust your provider to keep your data safe
• This trust is earned through assessing how a
provider will react to a disaster event
• Assess whether trusting your critical systems to
cloud is worth the risk
• What contingencies do you have to mitigate
against a disaster event affecting your
business?
• Weigh this against the benefits of moving to
cloud
Risks – Termination & Transition-Out
• Nothing lasts forever
• What procedures are in place to transition out
from your engagement?
• What assistance will the provider give?
• At what cost?
• Who pays?
• Effect of provider’s insolvency
• What happens to your data at the end of the
engagement?
Risk Mitigation Strategies
Minimising
legal risks
Pre-contract
During contract
Post-contract
Minimising
practical risks
Risk
management
plan
Be cognisant of
what you have
agreed with
your provider
Risk Mitigation Strategies
• Why cloud?
• Due diligence
(including evaluation)
• Vendor selection
Pre-
engagement
• Regular reports
• Regular project
meetings (if possible)
• Audit rights
During
engagement • Clear, unambiguous
transition arrangements
and knowledge transfer
• Safeguarding privacy
and confidentiality
Post
engagement
Pre-Engagement
Why move to the
cloud?
Identify a clear
business need
Why is this
model the
preferred
delivery model?
Who can robustly
deliver your
requirements?
Cloud
computing
growing but still
relatively new
Who has a
track record for
delivery?
Identity your
minimum
requirements
Minimum
service levels
Compliance
with your
statutory
obligations
Located in
Australia?
Evaluate potential
suppliers
Tender process
Proof of
concept
How will they
handle a
transition-out?
Risk Mitigation Strategies – Pre-
Engagement
Plan for the following risks:
• Security breaches
• Misuse/unauthorised disclosure of confidential
information or personal information
• Adequate IP rights secured
• Clear service levels and remedies for service
level non-compliance
• Clear means for a “graceful exit”
During Engagement
• Non-compliance with privacy laws (APP 1)
• Physical locations of data centres – which laws apply?
• Is the provider bound to hand over personal information
to foreign governments?
• Transfers between data centres (APP 8/IPP 9)
• Right to be notified if provider seeks to transfer your
data to a new centre
• Notification of breaches (APP 11/IPP 4)
• Responsibility for conduct investigations into
breaches
During Engagement
During Engagement
• Seek information on service level compliance
• Regular written reports
• Dashboard software
• Independent audits keep provider honest
• Customer remedies for non-compliance with
service levels
• Are service rebates your only remedy?
• Need flexibility regarding serious or repeated
breaches
During Engagement
• What happens if a disaster event occurs and the
data needs to be restored?
• Ensuring clear lines of responsibility and
communication
• Disaster recovery and business continuity plan to
be provided before contract starts
• Plan to be updated, maintained and tested during
contract term.
• Verification that the plan is functional essential
to maintaining your trust in the provider
Post-Engagement
• Data transfer post expiry or termination
• Immediate transfer as a provision in the contract
• Transfer to the customer directly or to new provider
• When the cloud provider becomes insolvent
• Customer may deal with a liquidator
• different priorities to the cloud provider
• Understand rights of controller under Corporations Act to
dispose of assets
Post-Engagement
• Survival of key obligations
• Privacy
• Confidentiality
• Customer should ensure that provider no
longer holds customer’s data following the
contract
• Possible conflict with data protection laws
in data centre locations
Please Contact
Craig Subocz
Senior Associate
(03) 9609 1646
csubocz@rk.com.au
rk.com.au
Questions

More Related Content

What's hot

It resource us signal cloud presentation itr - final
It resource   us signal cloud presentation itr - finalIt resource   us signal cloud presentation itr - final
It resource us signal cloud presentation itr - finalsvanelderen
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing itnewsafrica
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580Joanna Hendricks
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...Altoros
 
Trends in Government ICT - Chasing Data, Information, and Decision Support
Trends in Government ICT - Chasing Data, Information, and Decision SupportTrends in Government ICT - Chasing Data, Information, and Decision Support
Trends in Government ICT - Chasing Data, Information, and Decision SupportCorporacion Colombia Digital
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing RisksMarc Vael
 
UK Access Management Federation update
UK Access Management Federation updateUK Access Management Federation update
UK Access Management Federation updateJisc
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernanceCloudera, Inc.
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
NetReveal OnDemand Fact Sheet APAC
NetReveal OnDemand Fact Sheet APACNetReveal OnDemand Fact Sheet APAC
NetReveal OnDemand Fact Sheet APACRigby Lumanglas
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Designbradley_g
 
The Rise of Hybrid IT
The Rise of Hybrid ITThe Rise of Hybrid IT
The Rise of Hybrid ITInterxion
 
Oper8 document management solution v2.0
Oper8 document management solution v2.0Oper8 document management solution v2.0
Oper8 document management solution v2.0Tony Riley
 
HealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTHealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTKimberly Simon MBA
 
Privacy Advisory Service
Privacy Advisory ServicePrivacy Advisory Service
Privacy Advisory ServiceIron Mountain
 

What's hot (20)

It resource us signal cloud presentation itr - final
It resource   us signal cloud presentation itr - finalIt resource   us signal cloud presentation itr - final
It resource us signal cloud presentation itr - final
 
Effective data protection for businesses with multiple locations
Effective data protection for businesses with multiple locationsEffective data protection for businesses with multiple locations
Effective data protection for businesses with multiple locations
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing
 
Cloud computing web 2.0 By Joanna Hendricks BMT 580
Cloud computing web 2.0  By Joanna Hendricks BMT 580Cloud computing web 2.0  By Joanna Hendricks BMT 580
Cloud computing web 2.0 By Joanna Hendricks BMT 580
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
Security of IoT Data: Implementing Data-Centric Security and User Access Stra...
 
Trends in Government ICT - Chasing Data, Information, and Decision Support
Trends in Government ICT - Chasing Data, Information, and Decision SupportTrends in Government ICT - Chasing Data, Information, and Decision Support
Trends in Government ICT - Chasing Data, Information, and Decision Support
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
UK Access Management Federation update
UK Access Management Federation updateUK Access Management Federation update
UK Access Management Federation update
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
 
GDPR: 3 Months On | Guest Speaker: Data Protection Commissioners
GDPR: 3 Months On | Guest Speaker: Data Protection CommissionersGDPR: 3 Months On | Guest Speaker: Data Protection Commissioners
GDPR: 3 Months On | Guest Speaker: Data Protection Commissioners
 
The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
NetReveal OnDemand Fact Sheet APAC
NetReveal OnDemand Fact Sheet APACNetReveal OnDemand Fact Sheet APAC
NetReveal OnDemand Fact Sheet APAC
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Design
 
The Rise of Hybrid IT
The Rise of Hybrid ITThe Rise of Hybrid IT
The Rise of Hybrid IT
 
Oper8 document management solution v2.0
Oper8 document management solution v2.0Oper8 document management solution v2.0
Oper8 document management solution v2.0
 
HealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUSTHealthCare Compliance - HIPAA and HITRUST
HealthCare Compliance - HIPAA and HITRUST
 
Meaningful Use Forecast: Cloud Computing and Disaster Preparedness
Meaningful Use Forecast: Cloud Computing and Disaster PreparednessMeaningful Use Forecast: Cloud Computing and Disaster Preparedness
Meaningful Use Forecast: Cloud Computing and Disaster Preparedness
 
Privacy Advisory Service
Privacy Advisory ServicePrivacy Advisory Service
Privacy Advisory Service
 

Viewers also liked

음성 인식
음성 인식음성 인식
음성 인식geumwon
 
HP Cloud Business - Australia & New Zealand
HP Cloud Business - Australia & New ZealandHP Cloud Business - Australia & New Zealand
HP Cloud Business - Australia & New ZealandDamian Hamilton
 
AWS Canberra WWPS Summit 2013 - Disaster Recovery with the AWS Cloud
AWS Canberra WWPS Summit 2013 - Disaster Recovery with the AWS CloudAWS Canberra WWPS Summit 2013 - Disaster Recovery with the AWS Cloud
AWS Canberra WWPS Summit 2013 - Disaster Recovery with the AWS CloudAmazon Web Services
 
EMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcEMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcDamian Hamilton
 
How big is the cloud in Australia?
How big is the cloud in Australia?How big is the cloud in Australia?
How big is the cloud in Australia?Oscar Trimboli
 
Cloud computing for business
Cloud computing for businessCloud computing for business
Cloud computing for businessAzure Group
 
Keto cloud® part 6.1 keto-cloud economics (australia)
Keto cloud® part 6.1 keto-cloud economics (australia)Keto cloud® part 6.1 keto-cloud economics (australia)
Keto cloud® part 6.1 keto-cloud economics (australia)Johannes van der wiel
 
Transforming Education in the Cloud
Transforming Education in the CloudTransforming Education in the Cloud
Transforming Education in the CloudAmazon Web Services
 
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 AustraliaYour Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 AustraliaAmazon Web Services
 
What is everything you know about change was wrong?
What is everything you know about change was wrong?What is everything you know about change was wrong?
What is everything you know about change was wrong?Oscar Trimboli
 
Ansible @ Red Hat | December 2015 Ansible Meetup in Melbourne
Ansible @ Red Hat | December 2015 Ansible Meetup in MelbourneAnsible @ Red Hat | December 2015 Ansible Meetup in Melbourne
Ansible @ Red Hat | December 2015 Ansible Meetup in MelbourneKen Thompson
 
2011 AWS Tour Australia, Closing Keynote: How Amazon.com migrated to AWS, by ...
2011 AWS Tour Australia, Closing Keynote: How Amazon.com migrated to AWS, by ...2011 AWS Tour Australia, Closing Keynote: How Amazon.com migrated to AWS, by ...
2011 AWS Tour Australia, Closing Keynote: How Amazon.com migrated to AWS, by ...Amazon Web Services
 
AWS Public Sector Symposium 2014 Canberra | Big Data in the Cloud: Accelerati...
AWS Public Sector Symposium 2014 Canberra | Big Data in the Cloud: Accelerati...AWS Public Sector Symposium 2014 Canberra | Big Data in the Cloud: Accelerati...
AWS Public Sector Symposium 2014 Canberra | Big Data in the Cloud: Accelerati...Amazon Web Services
 
ePortfolio Australia 2010
ePortfolio Australia 2010ePortfolio Australia 2010
ePortfolio Australia 2010Sarah Stewart
 
Azure Large Scale Deployments - Tales from the Trenches
Azure Large Scale Deployments - Tales from the TrenchesAzure Large Scale Deployments - Tales from the Trenches
Azure Large Scale Deployments - Tales from the TrenchesAaron Saikovski
 
Designing custom REST and SOAP interfaces on Force.com
Designing custom REST and SOAP interfaces on Force.comDesigning custom REST and SOAP interfaces on Force.com
Designing custom REST and SOAP interfaces on Force.comSteven Herod
 
Performance Testing in the Cloud
Performance Testing in the CloudPerformance Testing in the Cloud
Performance Testing in the Cloudstuartmoncrieff
 
Journey to the Cloud with Red Hat
Journey to the Cloud with Red HatJourney to the Cloud with Red Hat
Journey to the Cloud with Red HatKen Thompson
 
AWS Partner Summit Sydney Keynote
AWS Partner Summit Sydney KeynoteAWS Partner Summit Sydney Keynote
AWS Partner Summit Sydney KeynoteAmazon Web Services
 

Viewers also liked (20)

음성 인식
음성 인식음성 인식
음성 인식
 
HP Cloud Business - Australia & New Zealand
HP Cloud Business - Australia & New ZealandHP Cloud Business - Australia & New Zealand
HP Cloud Business - Australia & New Zealand
 
AWS Canberra WWPS Summit 2013 - Disaster Recovery with the AWS Cloud
AWS Canberra WWPS Summit 2013 - Disaster Recovery with the AWS CloudAWS Canberra WWPS Summit 2013 - Disaster Recovery with the AWS Cloud
AWS Canberra WWPS Summit 2013 - Disaster Recovery with the AWS Cloud
 
EMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcEMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdc
 
How big is the cloud in Australia?
How big is the cloud in Australia?How big is the cloud in Australia?
How big is the cloud in Australia?
 
Cloud computing for business
Cloud computing for businessCloud computing for business
Cloud computing for business
 
Keto cloud® part 6.1 keto-cloud economics (australia)
Keto cloud® part 6.1 keto-cloud economics (australia)Keto cloud® part 6.1 keto-cloud economics (australia)
Keto cloud® part 6.1 keto-cloud economics (australia)
 
Transforming Education in the Cloud
Transforming Education in the CloudTransforming Education in the Cloud
Transforming Education in the Cloud
 
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 AustraliaYour Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia
Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia
 
What is everything you know about change was wrong?
What is everything you know about change was wrong?What is everything you know about change was wrong?
What is everything you know about change was wrong?
 
Ansible @ Red Hat | December 2015 Ansible Meetup in Melbourne
Ansible @ Red Hat | December 2015 Ansible Meetup in MelbourneAnsible @ Red Hat | December 2015 Ansible Meetup in Melbourne
Ansible @ Red Hat | December 2015 Ansible Meetup in Melbourne
 
2011 AWS Tour Australia, Closing Keynote: How Amazon.com migrated to AWS, by ...
2011 AWS Tour Australia, Closing Keynote: How Amazon.com migrated to AWS, by ...2011 AWS Tour Australia, Closing Keynote: How Amazon.com migrated to AWS, by ...
2011 AWS Tour Australia, Closing Keynote: How Amazon.com migrated to AWS, by ...
 
AWS Public Sector Symposium 2014 Canberra | Big Data in the Cloud: Accelerati...
AWS Public Sector Symposium 2014 Canberra | Big Data in the Cloud: Accelerati...AWS Public Sector Symposium 2014 Canberra | Big Data in the Cloud: Accelerati...
AWS Public Sector Symposium 2014 Canberra | Big Data in the Cloud: Accelerati...
 
ePortfolio Australia 2010
ePortfolio Australia 2010ePortfolio Australia 2010
ePortfolio Australia 2010
 
Azure Large Scale Deployments - Tales from the Trenches
Azure Large Scale Deployments - Tales from the TrenchesAzure Large Scale Deployments - Tales from the Trenches
Azure Large Scale Deployments - Tales from the Trenches
 
Azure ARM Templates 101
Azure ARM Templates 101Azure ARM Templates 101
Azure ARM Templates 101
 
Designing custom REST and SOAP interfaces on Force.com
Designing custom REST and SOAP interfaces on Force.comDesigning custom REST and SOAP interfaces on Force.com
Designing custom REST and SOAP interfaces on Force.com
 
Performance Testing in the Cloud
Performance Testing in the CloudPerformance Testing in the Cloud
Performance Testing in the Cloud
 
Journey to the Cloud with Red Hat
Journey to the Cloud with Red HatJourney to the Cloud with Red Hat
Journey to the Cloud with Red Hat
 
AWS Partner Summit Sydney Keynote
AWS Partner Summit Sydney KeynoteAWS Partner Summit Sydney Keynote
AWS Partner Summit Sydney Keynote
 

Similar to Cloud computing in Australia - Separating hype from reality

12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotatedwdsnead
 
10 things to consider when choosing a hosted desktop provider
10 things to consider when choosing a hosted desktop provider10 things to consider when choosing a hosted desktop provider
10 things to consider when choosing a hosted desktop providerLouisaHDUK
 
The Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThe Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThis account is closed
 
Cloud Computing & IT in the Boardroom
Cloud Computing & IT in the BoardroomCloud Computing & IT in the Boardroom
Cloud Computing & IT in the BoardroomBrendon Noney
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Data protection within development
Data protection within developmentData protection within development
Data protection within developmentowaspsuffolk
 
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30This account is closed
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveJanine Anthony Bowen, Esq.
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Bianca Mueller, LL.M.
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNithin Raj
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David RossGraeme Wood
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesPeister
 
Managed Service Provider Contracts
Managed Service Provider ContractsManaged Service Provider Contracts
Managed Service Provider ContractsWhitmeyerTuffin
 
Company concern risk migration
Company concern risk migrationCompany concern risk migration
Company concern risk migrationRaj Raj
 
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...Alan Yau Ti Dun
 

Similar to Cloud computing in Australia - Separating hype from reality (20)

Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 
10 things to consider when choosing a hosted desktop provider
10 things to consider when choosing a hosted desktop provider10 things to consider when choosing a hosted desktop provider
10 things to consider when choosing a hosted desktop provider
 
The Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThe Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud Services
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
Cloud Computing & IT in the Boardroom
Cloud Computing & IT in the BoardroomCloud Computing & IT in the Boardroom
Cloud Computing & IT in the Boardroom
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Data protection within development
Data protection within developmentData protection within development
Data protection within development
 
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
 
Cutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers PerspectiveCutting To The Chase: Cloud From A Customers Perspective
Cutting To The Chase: Cloud From A Customers Perspective
 
Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
CSA Introduction 2013 David Ross
CSA Introduction 2013 David RossCSA Introduction 2013 David Ross
CSA Introduction 2013 David Ross
 
Introduction to CSA Australia 2013 by David Ross
Introduction to CSA Australia 2013 by David RossIntroduction to CSA Australia 2013 by David Ross
Introduction to CSA Australia 2013 by David Ross
 
Compliance in Public Cloud & CSA Framework
Compliance in Public Cloud & CSA FrameworkCompliance in Public Cloud & CSA Framework
Compliance in Public Cloud & CSA Framework
 
Procurement Of Software And Information Technology Services
Procurement Of Software And Information Technology ServicesProcurement Of Software And Information Technology Services
Procurement Of Software And Information Technology Services
 
Managed Service Provider Contracts
Managed Service Provider ContractsManaged Service Provider Contracts
Managed Service Provider Contracts
 
Company concern risk migration
Company concern risk migrationCompany concern risk migration
Company concern risk migration
 
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
 

More from Russell_Kennedy

Seminar: Social media in the workplace - 30 November 2016
Seminar: Social media in the workplace - 30 November 2016Seminar: Social media in the workplace - 30 November 2016
Seminar: Social media in the workplace - 30 November 2016Russell_Kennedy
 
Illicit Tobacco Investigations and Prosecutions Presentation
Illicit Tobacco Investigations and Prosecutions PresentationIllicit Tobacco Investigations and Prosecutions Presentation
Illicit Tobacco Investigations and Prosecutions PresentationRussell_Kennedy
 
Russell Kennedy Health Seminar by Matthew Carroll - 6 September 2016
Russell Kennedy Health Seminar by Matthew Carroll - 6 September 2016Russell Kennedy Health Seminar by Matthew Carroll - 6 September 2016
Russell Kennedy Health Seminar by Matthew Carroll - 6 September 2016Russell_Kennedy
 
Russell Kennedy Not-for-profit Seminar: Strategic challenges facing primary ...
Russell Kennedy Not-for-profit Seminar: Strategic challenges facing primary ...Russell Kennedy Not-for-profit Seminar: Strategic challenges facing primary ...
Russell Kennedy Not-for-profit Seminar: Strategic challenges facing primary ...Russell_Kennedy
 
RKWN event: Women and the Power of Negotiation by Nicole Davidson, CMA Learni...
RKWN event: Women and the Power of Negotiation by Nicole Davidson, CMA Learni...RKWN event: Women and the Power of Negotiation by Nicole Davidson, CMA Learni...
RKWN event: Women and the Power of Negotiation by Nicole Davidson, CMA Learni...Russell_Kennedy
 
I'm Never Going to Die and My Partner's Never Going to Leave Me - RKWN event ...
I'm Never Going to Die and My Partner's Never Going to Leave Me - RKWN event ...I'm Never Going to Die and My Partner's Never Going to Leave Me - RKWN event ...
I'm Never Going to Die and My Partner's Never Going to Leave Me - RKWN event ...Russell_Kennedy
 
"He's never going to leave me..." and other myths - RKWN event - Wednesday 3 ...
"He's never going to leave me..." and other myths - RKWN event - Wednesday 3 ..."He's never going to leave me..." and other myths - RKWN event - Wednesday 3 ...
"He's never going to leave me..." and other myths - RKWN event - Wednesday 3 ...Russell_Kennedy
 
Clinical Governance Presentation by Michael Gorton AM - 21 July 2016
Clinical Governance Presentation by Michael Gorton AM - 21 July 2016Clinical Governance Presentation by Michael Gorton AM - 21 July 2016
Clinical Governance Presentation by Michael Gorton AM - 21 July 2016Russell_Kennedy
 
Workplace Relations Seminar - Wednesday 20 July 2016
Workplace Relations Seminar - Wednesday 20 July 2016Workplace Relations Seminar - Wednesday 20 July 2016
Workplace Relations Seminar - Wednesday 20 July 2016Russell_Kennedy
 
Russell Kennedy and Pitcher Partners NFP Seminar - 12 July 2016
Russell Kennedy and Pitcher Partners NFP Seminar - 12 July 2016Russell Kennedy and Pitcher Partners NFP Seminar - 12 July 2016
Russell Kennedy and Pitcher Partners NFP Seminar - 12 July 2016Russell_Kennedy
 
Barrington Centre - Psychological Risks and Human Management in a Crisis - 24...
Barrington Centre - Psychological Risks and Human Management in a Crisis - 24...Barrington Centre - Psychological Risks and Human Management in a Crisis - 24...
Barrington Centre - Psychological Risks and Human Management in a Crisis - 24...Russell_Kennedy
 
Grounded Communications - Communicating in a Crisis - 24 May 2016
Grounded Communications - Communicating in a Crisis - 24 May 2016Grounded Communications - Communicating in a Crisis - 24 May 2016
Grounded Communications - Communicating in a Crisis - 24 May 2016Russell_Kennedy
 
Russell Kennedy - Legal Issues in Crisis Management - 24 May 2016
Russell Kennedy - Legal Issues in Crisis Management - 24 May 2016Russell Kennedy - Legal Issues in Crisis Management - 24 May 2016
Russell Kennedy - Legal Issues in Crisis Management - 24 May 2016Russell_Kennedy
 
Restructures, redundancies and transfer of business: Getting it Right
Restructures, redundancies and transfer of business: Getting it RightRestructures, redundancies and transfer of business: Getting it Right
Restructures, redundancies and transfer of business: Getting it RightRussell_Kennedy
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected WorldRussell_Kennedy
 
Russell Kennedy - Abuse issues in the Not For Profit sector: Handling and Pr...
Russell Kennedy - Abuse issues in the Not For Profit sector: Handling and Pr...Russell Kennedy - Abuse issues in the Not For Profit sector: Handling and Pr...
Russell Kennedy - Abuse issues in the Not For Profit sector: Handling and Pr...Russell_Kennedy
 
Russell Kennedy Women's Network: Develop seminar - Wills & Estates Planning f...
Russell Kennedy Women's Network: Develop seminar - Wills & Estates Planning f...Russell Kennedy Women's Network: Develop seminar - Wills & Estates Planning f...
Russell Kennedy Women's Network: Develop seminar - Wills & Estates Planning f...Russell_Kennedy
 
Changes to the ACT Coroner Act
Changes to the ACT Coroner ActChanges to the ACT Coroner Act
Changes to the ACT Coroner ActRussell_Kennedy
 
Workplace Relations Seminar
Workplace Relations Seminar Workplace Relations Seminar
Workplace Relations Seminar Russell_Kennedy
 

More from Russell_Kennedy (20)

Seminar: Social media in the workplace - 30 November 2016
Seminar: Social media in the workplace - 30 November 2016Seminar: Social media in the workplace - 30 November 2016
Seminar: Social media in the workplace - 30 November 2016
 
Illicit Tobacco Investigations and Prosecutions Presentation
Illicit Tobacco Investigations and Prosecutions PresentationIllicit Tobacco Investigations and Prosecutions Presentation
Illicit Tobacco Investigations and Prosecutions Presentation
 
Russell Kennedy Health Seminar by Matthew Carroll - 6 September 2016
Russell Kennedy Health Seminar by Matthew Carroll - 6 September 2016Russell Kennedy Health Seminar by Matthew Carroll - 6 September 2016
Russell Kennedy Health Seminar by Matthew Carroll - 6 September 2016
 
Russell Kennedy Not-for-profit Seminar: Strategic challenges facing primary ...
Russell Kennedy Not-for-profit Seminar: Strategic challenges facing primary ...Russell Kennedy Not-for-profit Seminar: Strategic challenges facing primary ...
Russell Kennedy Not-for-profit Seminar: Strategic challenges facing primary ...
 
RKWN event: Women and the Power of Negotiation by Nicole Davidson, CMA Learni...
RKWN event: Women and the Power of Negotiation by Nicole Davidson, CMA Learni...RKWN event: Women and the Power of Negotiation by Nicole Davidson, CMA Learni...
RKWN event: Women and the Power of Negotiation by Nicole Davidson, CMA Learni...
 
I'm Never Going to Die and My Partner's Never Going to Leave Me - RKWN event ...
I'm Never Going to Die and My Partner's Never Going to Leave Me - RKWN event ...I'm Never Going to Die and My Partner's Never Going to Leave Me - RKWN event ...
I'm Never Going to Die and My Partner's Never Going to Leave Me - RKWN event ...
 
"He's never going to leave me..." and other myths - RKWN event - Wednesday 3 ...
"He's never going to leave me..." and other myths - RKWN event - Wednesday 3 ..."He's never going to leave me..." and other myths - RKWN event - Wednesday 3 ...
"He's never going to leave me..." and other myths - RKWN event - Wednesday 3 ...
 
Clinical Governance Presentation by Michael Gorton AM - 21 July 2016
Clinical Governance Presentation by Michael Gorton AM - 21 July 2016Clinical Governance Presentation by Michael Gorton AM - 21 July 2016
Clinical Governance Presentation by Michael Gorton AM - 21 July 2016
 
Workplace Relations Seminar - Wednesday 20 July 2016
Workplace Relations Seminar - Wednesday 20 July 2016Workplace Relations Seminar - Wednesday 20 July 2016
Workplace Relations Seminar - Wednesday 20 July 2016
 
Russell Kennedy and Pitcher Partners NFP Seminar - 12 July 2016
Russell Kennedy and Pitcher Partners NFP Seminar - 12 July 2016Russell Kennedy and Pitcher Partners NFP Seminar - 12 July 2016
Russell Kennedy and Pitcher Partners NFP Seminar - 12 July 2016
 
Barrington Centre - Psychological Risks and Human Management in a Crisis - 24...
Barrington Centre - Psychological Risks and Human Management in a Crisis - 24...Barrington Centre - Psychological Risks and Human Management in a Crisis - 24...
Barrington Centre - Psychological Risks and Human Management in a Crisis - 24...
 
Grounded Communications - Communicating in a Crisis - 24 May 2016
Grounded Communications - Communicating in a Crisis - 24 May 2016Grounded Communications - Communicating in a Crisis - 24 May 2016
Grounded Communications - Communicating in a Crisis - 24 May 2016
 
Russell Kennedy - Legal Issues in Crisis Management - 24 May 2016
Russell Kennedy - Legal Issues in Crisis Management - 24 May 2016Russell Kennedy - Legal Issues in Crisis Management - 24 May 2016
Russell Kennedy - Legal Issues in Crisis Management - 24 May 2016
 
Restructures, redundancies and transfer of business: Getting it Right
Restructures, redundancies and transfer of business: Getting it RightRestructures, redundancies and transfer of business: Getting it Right
Restructures, redundancies and transfer of business: Getting it Right
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected World
 
Russell Kennedy - Abuse issues in the Not For Profit sector: Handling and Pr...
Russell Kennedy - Abuse issues in the Not For Profit sector: Handling and Pr...Russell Kennedy - Abuse issues in the Not For Profit sector: Handling and Pr...
Russell Kennedy - Abuse issues in the Not For Profit sector: Handling and Pr...
 
Russell Kennedy Women's Network: Develop seminar - Wills & Estates Planning f...
Russell Kennedy Women's Network: Develop seminar - Wills & Estates Planning f...Russell Kennedy Women's Network: Develop seminar - Wills & Estates Planning f...
Russell Kennedy Women's Network: Develop seminar - Wills & Estates Planning f...
 
Changes to the ACT Coroner Act
Changes to the ACT Coroner ActChanges to the ACT Coroner Act
Changes to the ACT Coroner Act
 
Workplace Relations Seminar
Workplace Relations Seminar Workplace Relations Seminar
Workplace Relations Seminar
 
Aged Care Seminar
Aged Care SeminarAged Care Seminar
Aged Care Seminar
 

Recently uploaded

一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书SS A
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueSkyLaw Professional Corporation
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdfSUSHMITAPOTHAL
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxRRR Chambers
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书Fir L
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书Fir L
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhaiShashankKumar441258
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French
 

Recently uploaded (20)

一比一原版西澳大学毕业证学位证书
 一比一原版西澳大学毕业证学位证书 一比一原版西澳大学毕业证学位证书
一比一原版西澳大学毕业证学位证书
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
如何办理普利茅斯大学毕业证(本硕)Plymouth学位证书
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in Midlothian
 

Cloud computing in Australia - Separating hype from reality

  • 1. Cloud Computing in Australia: Separating Hype from Reality Craig Subocz BE (Hons), LLB, LLM, Grad. Cert. in Entrepreneurship & Innovation Senior Associate 7 May 2014
  • 2. The information contained in this presentation is intended as general commentary and should not be regarded as legal advice. Should you require specific advice on the topics or areas discussed please contact the presenter directly. Disclaimer
  • 3. Agenda The use of cloud computing in Australia The risks of cloud computing Risk minimisation strategy
  • 4. Cloud Computing in Australia Source: 2012 CCH Technology Survey (US)
  • 5. Cloud Computing in Australia
  • 6. Risks Security Confidentiality and privacy Intellectual property Service availability and service levels Disaster recovery and business continuity Termination, insolvency and transition-out
  • 7. Risks - Security • Secure access to data • Customer access • Provider access • Secure data transfer • Identity management • Architecture security
  • 8. Risks - Confidentiality • A key risk magnified if your provider has access to your data • Essential to manage the risk of inadvertent disclosure of your confidential information • Contractual provisions protecting confidentiality of your information assist • Issue of proof may be difficult
  • 9. Risks - Privacy • New privacy laws from 12 March 2014 • Private entities with annual turnover exceeding $3 million bound by the Privacy Act and the Australian Privacy Principles • APP 8 deals with cross-border disclosure of personal information (NB: not use of personal information offshore)
  • 10. Risks - Privacy • APP 8 – two choices • APP 8.1: Before disclosure, reasonable steps to ensure recipient does not breach APPs • Due diligence on provider pre-contract • Contract provisions • APP 8.2: Several options • Reasonable belief about o/s laws • Individuals consent to disclosure • Disclosure authorised or required by law
  • 11. Risks - Privacy • Victorian government agencies still bound by Information Privacy Act 2000 (Vic) and IPP 9. • Can only transfer information about an individual to someone outside Victoria only if: • Reasonable belief about the law binding the recipient • The individual consents • Transfer is necessary for the performance of a contract between you and the individual • Transfer is necessary for the performance of a contract between you and a 3rd party for the benefit of the individual
  • 12. Risks - Privacy How can an entity use a cloud provider based outside Australia? Informed consent of individuals how practical? Reasonable belief about the laws binding the provider what happens if location(s) of provider’s data centre(s) change? Capacity to contract with provider how strong is your bargaining position?
  • 13. Risks - Privacy • Other APPs (IPPs) are also relevant. • APP 10 – quality of personal information • APP 11 – security of personal information • APP 12 – access to personal information • APP 13 – correction of personal information • But consider all the Privacy Principles
  • 14. Risks – Intellectual Property • Service, not software, provided • Sufficient IP rights needed • Different considerations apply depending on context • Public cloud versus private cloud
  • 15. Risks – Service Levels • What service levels are appropriate? • What is the risk to your business if the cloud service fails to meet the service levels? • Reputational risk • Legal risk (including contract breach) • What rights and remedies do you have if provider fails a service level?
  • 16. Risks – Disaster Recovery • You trust your provider to keep your data safe • This trust is earned through assessing how a provider will react to a disaster event • Assess whether trusting your critical systems to cloud is worth the risk • What contingencies do you have to mitigate against a disaster event affecting your business? • Weigh this against the benefits of moving to cloud
  • 17. Risks – Termination & Transition-Out • Nothing lasts forever • What procedures are in place to transition out from your engagement? • What assistance will the provider give? • At what cost? • Who pays? • Effect of provider’s insolvency • What happens to your data at the end of the engagement?
  • 18. Risk Mitigation Strategies Minimising legal risks Pre-contract During contract Post-contract Minimising practical risks Risk management plan Be cognisant of what you have agreed with your provider
  • 19. Risk Mitigation Strategies • Why cloud? • Due diligence (including evaluation) • Vendor selection Pre- engagement • Regular reports • Regular project meetings (if possible) • Audit rights During engagement • Clear, unambiguous transition arrangements and knowledge transfer • Safeguarding privacy and confidentiality Post engagement
  • 20. Pre-Engagement Why move to the cloud? Identify a clear business need Why is this model the preferred delivery model? Who can robustly deliver your requirements? Cloud computing growing but still relatively new Who has a track record for delivery? Identity your minimum requirements Minimum service levels Compliance with your statutory obligations Located in Australia? Evaluate potential suppliers Tender process Proof of concept How will they handle a transition-out?
  • 21. Risk Mitigation Strategies – Pre- Engagement Plan for the following risks: • Security breaches • Misuse/unauthorised disclosure of confidential information or personal information • Adequate IP rights secured • Clear service levels and remedies for service level non-compliance • Clear means for a “graceful exit”
  • 22. During Engagement • Non-compliance with privacy laws (APP 1) • Physical locations of data centres – which laws apply? • Is the provider bound to hand over personal information to foreign governments? • Transfers between data centres (APP 8/IPP 9) • Right to be notified if provider seeks to transfer your data to a new centre • Notification of breaches (APP 11/IPP 4) • Responsibility for conduct investigations into breaches
  • 24. During Engagement • Seek information on service level compliance • Regular written reports • Dashboard software • Independent audits keep provider honest • Customer remedies for non-compliance with service levels • Are service rebates your only remedy? • Need flexibility regarding serious or repeated breaches
  • 25. During Engagement • What happens if a disaster event occurs and the data needs to be restored? • Ensuring clear lines of responsibility and communication • Disaster recovery and business continuity plan to be provided before contract starts • Plan to be updated, maintained and tested during contract term. • Verification that the plan is functional essential to maintaining your trust in the provider
  • 26. Post-Engagement • Data transfer post expiry or termination • Immediate transfer as a provision in the contract • Transfer to the customer directly or to new provider • When the cloud provider becomes insolvent • Customer may deal with a liquidator • different priorities to the cloud provider • Understand rights of controller under Corporations Act to dispose of assets
  • 27. Post-Engagement • Survival of key obligations • Privacy • Confidentiality • Customer should ensure that provider no longer holds customer’s data following the contract • Possible conflict with data protection laws in data centre locations
  • 28. Please Contact Craig Subocz Senior Associate (03) 9609 1646 csubocz@rk.com.au rk.com.au Questions