In the cloud, your data can get caught up in legal actions
Legitimate users of Megaupload's service have learned this lesson the hard way
Computerworld - We all know that the data we rely on to run our businesses can be subject to subpoena and other government actions. Such actions create additional risks when that data is in the cloud.
With cloud computing, data from multiple customers is typically commingled on the same servers. That means that legal action taken against another customer that is completely unrelated to your business could have a ripple effect. Your data could become unavailable to you just because it was being stored on the same server as data belonging to someone else that was subject to some legal action. For example, a search warrant issued for the data of another customer could result in your data being seized as well.
The news earlier this year about Megaupload, a cloud file storage and viewing service, provides a real, if extreme, example of how a customer could lose access to its data in the cloud. The federal indictments against the individuals behind Megaupload on multiple charges, including racketeering and criminal copyright infringement, resulted in law enforcement agencies seizing more than $50 million of Megaupload's assets. These actions were intended to stop any nefarious activities and collect evidence to be used in the case against Megaupload.
The catch is that a lot of people were using Megaupload for legitimate purposes. When the government took action against the alleged bad guys, those legitimate users also lost access to their data. It's a textbook example of how technology continues to outpace the law's ability to address the new questions that arise with cloud computing. For example, who is responsible for returning data to legitimate users?
With Megaupload essentially shut down, legitimate users couldn't retrieve their data directly as in the past. The government wouldn't release any data while it temporarily had custody of it to gather evidence, and when it was finished with that, it didn't want responsibility for sorting and returning data. Instead, it directed legitimate users to the two infrastructure-as-a-service providers used by Megaupload. The IaaS providers claimed that they had provided only raw infrastructure and never had access to customer data, and so they pointed customers full circle back to Megaupload. The Electronic Frontier Foundation has now stepped in to help sort out this mess.
How could a legitimate Megaupload customer have avoided getting caught up in this? Thoroughly vetting a cloud provider's background and business practices before using its service would be a good first step in most cases. Additionally, you could ensure that your contract obligates the cloud provider to effectively partition customer data. That way, there's at least a chance that law enforcement could seize a bad guy's data without touching yours.
Other columns by Thomas Trappler
- NASA's cloud audit holds value for all
- Who can pry into your cloud-based data?
- Does your cloud vendor protect your rights?
- Software licensing in the cloud
- For credit card handlers, cloud computing guidelines just got clearer
- Regulations and the cloud: HIPAA modification provides clarity
- Certification programs are making it easier to know all about a cloud vendor
- The do's and don'ts of safeguarding cloud-based data with encryption
- For a good cloud contract, start with an RFP
- It takes a team to create a good cloud contract
- Cloud Computing eGuide In this eGuide, CIO, Computerworld, and InfoWorld offer advice, tips, news, and predictions regarding cloud implementations in the coming year and beyond. Read...
- Increase IT Performance from the Enterprise to the Cloud with WAN Optimization Massive consolidation and data mobility, enabled by virtualization, have radically altered how we build servers, design applications, and deploy storage for the emerging...
- IDC: Eliminate Shortcomings in Your Cloud Architecture with Smarter Storage This white paper demonstrates how IBM Smarter Storage provides customers with an ideal, proven platform for cloud computing. IBM has a differentiated storage...
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- Video surveillance for IT: maximum image quality, minimum bandwidth Join us on Thursday, May 8th at 1 p.m. EST when Willem Ryan, Senior Product Marketing Manager at Avigilon, will discuss how IT... All Cloud Computing White Papers | Webcasts