StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Is current uk law relevant , when applied to cloud computin - Essay Example

Cite this document
Summary
The UK Data Protection Act of 1998 incorporates intensified commitments to ensure that information controllers are able to embrace specific stipulations in written agreements with data processors. The law necessitates that data controllers have to guarantee control of personal…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Is current uk law relevant , when applied to cloud computin
Read Text Preview

Extract of sample "Is current uk law relevant , when applied to cloud computin"

UK’s Law and Cloud Computing Department: The UK Data Protection Act of 1998 incorporates intensified commitments to ensurethat information controllers are able to embrace specific stipulations in written agreements with data processors. The law necessitates that data controllers have to guarantee control of personal data with the appropriate technical and organizational measures in place to prevent unauthorized or unlawful processing or accidental loss, and destruction of individuals’ images.

Even though the customary approach in a number of cloud providers’ conditions of operation is to avoid legal responsibility for security of information and endow their clients with full responsibility of retaining safety based on information they upload, the principals of the UK legislation are on the contrary to this.This Data Protection Act provides that anyone with the intention of or responsible for using data has to adhere to data protection principles recommending: fair and lawful use; use for limited, and specifically stated purposes; use in an adequate, relevant and not excessive way; accurate use; data not kept for longer than is absolutely necessary; handled in accordance to the people’s data protection rights; kept safe and secure; and, not transferred outside the UK without adequate protection.

In short therefore, this Act ensures that Data controllers are bound by the law to give rights to data subjects, i.e.: the right of access to their personal data; the right to stop information processing techniques that are likely to cause substantial distress or damage; the authority to obstruct auto generated decisions; and the right to object direct marketing by any institution thereof (Data Protection Act, 1998). From a wider perspective, the European Data Protection Law (which also concerned with electronic data), stipulates very stringent controls on the entire steps involved in processing of personal data/ information, and its transfer to anywhere outside European Economic Area.

Because of the uncertainties over how and where cloud vendor will probably store the uploaded data, there is a lot more potential that need to be put to ensure that customers are in breach of such laws. Therefore, a number of regulations influencing cloud computing are linked to data security. Whatever processes are involved in processing of data, and the consequent location where the data is processed is so critical. Hence, regarding data processing, the European law necessitates that appropriate techniques and organizational measures are actively taken to protect against unauthorized or unlawful processing of personal data such as any information that would relate to an identified or identifiable natural person, and against accidental loss destruction of, or damage to, such data/ information.

Data controllers (customers, in the case of cloud computing vendors) are supposed to be engaged in a formal agreement in place with the cloud merchant necessitating that vendor should solely process individualized information in accordance with the data controller’s instructions and to set up apt technical and organizational measures. Consequently, the standard approach of many cloud vendors is to take into account provisions specifications that exclude liability for security of any data. For data location, storage and retrieval, cloud computing provides data abstraction; a situation where data is held somewhere else, in a cheaper jurisdiction.

This means that this technology offers a platform for easy and quicker access to data without the user having any knowledge of the physical location. In conclusion, this Act provides that personal data can only be transmitted to another country for use in case that country is registered with the European Commission’s record of territories or if it makes available sufficient fortification for the personal information, of which US is one. Companies that have signed the Safe Harbor agreement providing regulations on how to handle such data, under the oversight of Federal Trade Commission, can also be allowed to access personal information.

In complying with this Data Protection Act of 1998, individuals and organizations ensure legal acquiescence to avoid fines, to make business management better, and to keep customer security. BibliographyThe Data Protection Act 1998, Part Two (Rights of data subjects), Section 11, Office of Public Sector Information, information accessed on 6th September, 2007

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Is current uk law relevant , when applied to cloud computin Essay”, n.d.)
Is current uk law relevant , when applied to cloud computin Essay. Retrieved from https://studentshare.org/information-technology/1623401-is-current-uk-law-relevant-when-applied-to-cloud-computin
(Is Current Uk Law Relevant , When Applied to Cloud Computin Essay)
Is Current Uk Law Relevant , When Applied to Cloud Computin Essay. https://studentshare.org/information-technology/1623401-is-current-uk-law-relevant-when-applied-to-cloud-computin.
“Is Current Uk Law Relevant , When Applied to Cloud Computin Essay”, n.d. https://studentshare.org/information-technology/1623401-is-current-uk-law-relevant-when-applied-to-cloud-computin.
  • Cited: 0 times

CHECK THESE SAMPLES OF Is current uk law relevant , when applied to cloud computin

Implementation of Digital Literacy in the Improved Website

Introduction This project was started following revelations that the current website of 1K bride was lacking some important features while some features were added unnecessarily.... Final Project Documentation For The improvement of the website of 1K Bride Dress Company Date: Developer: Table of Contents 1 Introduction…………………………………………………………………....
11 Pages (2750 words) Essay

Relevance of Current UK IT Law as Applied to Cloud Computing

RELEVANCE OF CURRENT UK IT LAW AS applied to cloud COMPUTING Name: Institution: Course: Tutor: Date: Literature review Information technology law in United Kingdom is divided into several topics, which affect different stakeholders in different ways.... cloud computing can be defined as the use of cloud technology to store and access data that is stored in a virtual space.... cloud computing can be divided into several forms that serve better to explain the whole idea; they include the following: 1....
3 Pages (750 words) Literature review

Relevance of Current UK IT Law to Cloud Computing

Title of Project: Is current UK IT law relevant when applied to cloud computing?... The Main Deliverable(s): A critique of current IT law when it applies to cloud computing.... Identification of aspect of cloud computing that do not comply with or avoid current uk IT law.... Overview of Project Content The aim of this study is to re-examine current IT law in context of the cloud, to highlight areas where the law appears to be inclined and to suggest ways in which the original protection of the law can be restored....
3 Pages (750 words) Dissertation

Criminal Justice and American Jutice ystem

hellip; It i important that the criminal jutice ytem include the word jutice, ince law applied to thoe accued of a crime hould be fair. Jutice alo refer not only to the fair trial accorded to the citizen of mot countrie, but alo to the jut retribution for victim of a crime, a for example, eeing an offender jailed.... Criminal jutice i the application or tudy of law regarding criminal behavior.... Other work to advocate for change in the current ytem of criminal jutice, uch a thoe who render deciion regarding current law, like member of upreme Court....
8 Pages (2000 words) Essay

Human Rights and Anti-Terrorism Legislation

The changes ushered into the British legal system ride on the crescent wave of voices and policies in the European community that seek to uphold the primacy of human rights and due process, particularly when made vulnerable by antiquated state structures and legal institutions.... Human rights advocates scored a victory when the Law Lords ruled that a provision in the Law allowing the indefinite detention of foreign terrorist suspects was contrary to human rights principles....
6 Pages (1500 words) Essay

Importance of Planning and Modelling for Successful E Business

n this regard, the specific need areas of the people involved in terms of end users is a difficult area to study in order to arrive at the relevant simulation models and approaches.... This can be seen in the PR based models of various universities in uk, US, Australia and other countries....
10 Pages (2500 words) Essay

Spelsbury Council and Human Rights

Thus, when a judicial review process is considered, the Spelsbury Council would clearly fall under the category of “state” and Tracy would be “person” whose rights have to be protected.... Under the law, the new tion that has taken over the function of the Spelsbury District Council has moved from the status of “state” to “person”, which are the only two groups in society that are assumed under the European Convention of Human Rights, which aims to protect the rights of “people” from the “state”....
11 Pages (2750 words) Essay

Management and Information Security - Project Management Body of Knowledge

The concepts are applied to projects, programs, and operations.... nbsp;The time management process is applied when one needs to record the time actually spent on the project and the time planned for the project.... Project time management records time spent by various people in the project as it enables managers to identify the projects that have been worked on, when it was done and how long it took to complete the project....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us