SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
Information Ownership
iccl @ CCLS



                   in the Cloud
                                 Chris Reed
                 Professor of Electronic Commerce Law


                            1


                          What is “Ownership”
              • No physical property rights in information
                   But customers may expect similar rights
              • Three legal sources of ownership
                   IP rights
                   Confidentiality
                   Contract
              • Customer/provider relationship
                   Confidentiality and contract are primary sources
                   IP rights relevant to claims against third parties
                     • But need to be allocated in the customer/provider relationship
              • All these are well-understood in normal computing
                usage
What is different about cloud
                         computing?
        • Provider makes processing technology and other
              information available to customer
                 Thus further information rights come into play
                  • Provider
                  • Third parties
        • Copyright fragments ownership and creates
              uncertainty
                 Who owns information generated in the cloud?
                 Particular problem of generation across jurisdictions
        • Provider has ability to undertake data mining and
              produce metadata
                 Does customer have any rights to control exploitation?




        Licensed
        technology
                                                            Metadata
Licensed
                                          Provider
information

                    Know how/                               Billing data
                    Trade secret
                                                                           Data mining


                  Know how/
                                                           Processing
                  Trade secret
                                                           outputs
                                      Customer
  Customer own                                                     Licensed
  information                                                      technology
                            Employee &
                            Client                   Licensed
                            information              information
Licensed
         technology


 Licensed
                                      Provider
 information


Information
   inputs



                                   Customer
   Customer own                                                Licensed
   information                                                 technology
                        Employee &
                        Client                   Licensed
                        information              information




          Ownership of information inputs

         • Ownership unchanged by placing in the cloud
               IP rights (mainly copyright/database) continue to
               subsist in software and data
               Third party information and software
                • Owned by providers
                • Use may be controlled by licence terms
         • Service terms may modify this
               Provider will require licence from customer to use
               information inputs
               Providers rarely ask for ownership rights in inputs
Metadata
                                       Provider

Outputs and    Know how/                               Billing data

  derived      Trade secret
                                                                      Data mining
information
              Know how/
              Trade secret                            Processing
                                                      outputs
                                     Customer




                    Information outputs
      • IP rights uncertainties
           Authorship
              • Who? (customer/provider?)
              • Where?
                     Problem for database right
      • Jurisdictional uncertainties
           Is the output created on the server?
              • Differing national law approaches to IPRs
                     Functional/factual works
                     Computer-generated works
           And which server was actually used?
           When is this a problem?
              • Claims against third parties
              • Use by provider
Metadata – the great unknown
• Metadata is information about the customer’s
  use of the service
      • Addition, deletion and generation of information
      • Use of software applications and databases
     Generated by provider, thus IPRs owned by provider
     But when relating to customer, metadata will be confidential
• Data mining
     Provider has ability to search customers’ information and
     extract further information from it
      • Unless constrained by service terms
     Generated by, and thus IPRs owned by, provider
     Potentially very valuable to third parties




       Will metadata generation infringe
              customer’s rights?

• IP rights
     Location of copying/extraction determines
     applicable rights
     Terms of provider’s licence to use customer
     information
• Confidential information
     Primary duty is to preserve confidentiality
      • Aggregation and anonymisation can reduce this risk
      • But note development of reidentification technology
     Secondary duty not to take unfair advantage of the
     information?
Customer concerns

• Secret use of “my” information
• Risk of confidentiality breach
    Carelessly including identifying information
    Customer identity can be deduced from metadata
    or mined data
• Revenue sharing
    Provider uses customer’s assets to make profits
    for itself
     • Customer will want to share
     • But revenue from this may be implicitly included in cost
       of service




        Resolving the ownership
              conundrum
• All these issues can be addressed by
  appropriate service terms
    But do current service terms even recognise the
    issues exist?
    If so, are they dealt with appropriately?
    Do customers have other expectations which need
    to be catered for?
    Effects of consumer protection law on service
    terms?
The limitations of service terms

• Little scope for individual negotiation
     Provider needs all users to be on same deal as to
     information ownership
• Hidden parties
     Outsourcing and reselling of cloud capacity
• Differing national law effects
     But clouds transcend geography




            A governance model

• Window of opportunity for cloud providers to
  establish a governance forum
     Identify best practices for issues such as
     information ownership
     Leading to coherent and consistent service terms
     across multiple cloud services
• Might be sufficient to forestall hasty national
  legislation
     History tells us that first generation regulation of
     cyberspace is usually a failure!

Contenu connexe

Tendances

OSS Presentation Keynote by Per Sedihn
OSS Presentation Keynote by Per SedihnOSS Presentation Keynote by Per Sedihn
OSS Presentation Keynote by Per SedihnOpenStorageSummit
 
Cloud computing and libraries sndt
Cloud computing and libraries sndtCloud computing and libraries sndt
Cloud computing and libraries sndtVishwas Taralekar
 
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and RisksLions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and RisksSAP Ariba
 
IBM ADEPT
IBM ADEPTIBM ADEPT
IBM ADEPT_hd
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computingAliAbdelwahab6
 
B fujitsu uk-and_ireland_cs.en-us
B fujitsu uk-and_ireland_cs.en-usB fujitsu uk-and_ireland_cs.en-us
B fujitsu uk-and_ireland_cs.en-ustewodros13
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterpriseGabriella Davis
 
Taking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing ServicesTaking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing Serviceswhite paper
 
Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorialsUdara Sandaruwan
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud EcosystemLumosNetworks
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud EcosystemLumos Networks
 
Cloud computing
Cloud computingCloud computing
Cloud computingBrizGo
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?doan_slideshares
 
Executive Briefing: Strategic Issues Surrounding Cloud Services
Executive Briefing:  Strategic Issues Surrounding Cloud ServicesExecutive Briefing:  Strategic Issues Surrounding Cloud Services
Executive Briefing: Strategic Issues Surrounding Cloud ServicesWhitmeyerTuffin
 
Ventana Research Presents: Best Practices with Hadoop - Real World Data
Ventana Research Presents:  Best Practices with Hadoop - Real World DataVentana Research Presents:  Best Practices with Hadoop - Real World Data
Ventana Research Presents: Best Practices with Hadoop - Real World DataCloudera, Inc.
 

Tendances (20)

OSS Presentation Keynote by Per Sedihn
OSS Presentation Keynote by Per SedihnOSS Presentation Keynote by Per Sedihn
OSS Presentation Keynote by Per Sedihn
 
Cloud computing and libraries sndt
Cloud computing and libraries sndtCloud computing and libraries sndt
Cloud computing and libraries sndt
 
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and RisksLions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
Lions and Tigers and Cloud, Oh My! The Truth Behind Cloud Security and Risks
 
Blockchain ibc eng
Blockchain ibc engBlockchain ibc eng
Blockchain ibc eng
 
IBM ADEPT
IBM ADEPTIBM ADEPT
IBM ADEPT
 
Cloud computing vs edge computing
Cloud computing vs edge computingCloud computing vs edge computing
Cloud computing vs edge computing
 
B fujitsu uk-and_ireland_cs.en-us
B fujitsu uk-and_ireland_cs.en-usB fujitsu uk-and_ireland_cs.en-us
B fujitsu uk-and_ireland_cs.en-us
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterprise
 
Taking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing ServicesTaking Account of Privacy When Designing Cloud Computing Services
Taking Account of Privacy When Designing Cloud Computing Services
 
Emc keynote 0945 1030
Emc keynote 0945 1030Emc keynote 0945 1030
Emc keynote 0945 1030
 
Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorials
 
Bird&Bird
Bird&BirdBird&Bird
Bird&Bird
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud Ecosystem
 
Cracking the Cloud Ecosystem
Cracking the Cloud EcosystemCracking the Cloud Ecosystem
Cracking the Cloud Ecosystem
 
Business in the cloud
Business in the cloudBusiness in the cloud
Business in the cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?Cloud Is Built, Now Who's Managing It?
Cloud Is Built, Now Who's Managing It?
 
Forrester
ForresterForrester
Forrester
 
Executive Briefing: Strategic Issues Surrounding Cloud Services
Executive Briefing:  Strategic Issues Surrounding Cloud ServicesExecutive Briefing:  Strategic Issues Surrounding Cloud Services
Executive Briefing: Strategic Issues Surrounding Cloud Services
 
Ventana Research Presents: Best Practices with Hadoop - Real World Data
Ventana Research Presents:  Best Practices with Hadoop - Real World DataVentana Research Presents:  Best Practices with Hadoop - Real World Data
Ventana Research Presents: Best Practices with Hadoop - Real World Data
 

En vedette

Cloud computing - competition law issues
Cloud computing  - competition law issuesCloud computing  - competition law issues
Cloud computing - competition law issuesCloud Legal Project
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud Legal Project
 
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
Cloud Computing Contracts and Services:  What's Really Happening Out There? T...Cloud Computing Contracts and Services:  What's Really Happening Out There? T...
Cloud Computing Contracts and Services: What's Really Happening Out There? T...Cloud Legal Project
 
Cloud computing - cooperating with law enforcement
Cloud computing - cooperating with law enforcementCloud computing - cooperating with law enforcement
Cloud computing - cooperating with law enforcementCloud Legal Project
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingCloud Legal Project
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Cloud Legal Project
 

En vedette (6)

Cloud computing - competition law issues
Cloud computing  - competition law issuesCloud computing  - competition law issues
Cloud computing - competition law issues
 
Cloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risksCloud computing: identifying and managing legal risks
Cloud computing: identifying and managing legal risks
 
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
Cloud Computing Contracts and Services:  What's Really Happening Out There? T...Cloud Computing Contracts and Services:  What's Really Happening Out There? T...
Cloud Computing Contracts and Services: What's Really Happening Out There? T...
 
Cloud computing - cooperating with law enforcement
Cloud computing - cooperating with law enforcementCloud computing - cooperating with law enforcement
Cloud computing - cooperating with law enforcement
 
Data Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud ComputingData Protection Jurisdiction and International Transfers in Cloud Computing
Data Protection Jurisdiction and International Transfers in Cloud Computing
 
Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011Data protection in cloud computing - Data Protection Conference 2011
Data protection in cloud computing - Data Protection Conference 2011
 

Similaire à Ownership Rights in the Cloud

NCHICA - Contracts with Healthcare Cloud Computing Vendors
NCHICA - Contracts with Healthcare Cloud Computing VendorsNCHICA - Contracts with Healthcare Cloud Computing Vendors
NCHICA - Contracts with Healthcare Cloud Computing VendorsWhitmeyerTuffin
 
How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementWilliam Tanenbaum
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionFlexera
 
IT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - LondonIT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - LondonEversheds Sutherland
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
IT:AM Semina Series - Managing your secrets, protecting your assets - NottinghamIT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
IT:AM Semina Series - Managing your secrets, protecting your assets - NottinghamEversheds Sutherland
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Leeds
IT:AM Semina Series - Managing your secrets, protecting your assets - LeedsIT:AM Semina Series - Managing your secrets, protecting your assets - Leeds
IT:AM Semina Series - Managing your secrets, protecting your assets - LeedsEversheds Sutherland
 
Intellectual Property 101 for Entrepreneurs
Intellectual Property 101 for EntrepreneursIntellectual Property 101 for Entrepreneurs
Intellectual Property 101 for EntrepreneursWhitmeyerTuffin
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - BirminghamIT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - BirminghamEversheds Sutherland
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Cambridge
IT:AM Semina Series - Managing your secrets, protecting your assets - CambridgeIT:AM Semina Series - Managing your secrets, protecting your assets - Cambridge
IT:AM Semina Series - Managing your secrets, protecting your assets - CambridgeEversheds Sutherland
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - CardiffIT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - CardiffEversheds Sutherland
 
Source code escrow and continuity in the cloud
Source code escrow and continuity in the cloudSource code escrow and continuity in the cloud
Source code escrow and continuity in the cloudErnst-Jan Louwers
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2Ankit Gupta
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020Ulf Mattsson
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
IT:AM Semina Series - Managing your secrets, protecting your assets - ManchesterIT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
IT:AM Semina Series - Managing your secrets, protecting your assets - ManchesterEversheds Sutherland
 
Chainyard BITA TYS presentation v0.1.11042019
Chainyard BITA TYS  presentation v0.1.11042019Chainyard BITA TYS  presentation v0.1.11042019
Chainyard BITA TYS presentation v0.1.11042019Mohan Venkataraman
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraORACLE USER GROUP ESTONIA
 

Similaire à Ownership Rights in the Cloud (20)

NCHICA - Contracts with Healthcare Cloud Computing Vendors
NCHICA - Contracts with Healthcare Cloud Computing VendorsNCHICA - Contracts with Healthcare Cloud Computing Vendors
NCHICA - Contracts with Healthcare Cloud Computing Vendors
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
How To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing ProcurementHow To Avoid Procuring Ip When Doing Procurement
How To Avoid Procuring Ip When Doing Procurement
 
Legal issues in the cloud renzo marchini & gene landy
Legal issues in the cloud   renzo marchini & gene landyLegal issues in the cloud   renzo marchini & gene landy
Legal issues in the cloud renzo marchini & gene landy
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
 
IT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - LondonIT:AM Semina Series - Managing your secrets, protecting your assets - London
IT:AM Semina Series - Managing your secrets, protecting your assets - London
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
IT:AM Semina Series - Managing your secrets, protecting your assets - NottinghamIT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
IT:AM Semina Series - Managing your secrets, protecting your assets - Nottingham
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Leeds
IT:AM Semina Series - Managing your secrets, protecting your assets - LeedsIT:AM Semina Series - Managing your secrets, protecting your assets - Leeds
IT:AM Semina Series - Managing your secrets, protecting your assets - Leeds
 
Intellectual Property 101 for Entrepreneurs
Intellectual Property 101 for EntrepreneursIntellectual Property 101 for Entrepreneurs
Intellectual Property 101 for Entrepreneurs
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - BirminghamIT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
IT:AM Semina Series - Managing your secrets, protecting your assets - Birmingham
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Cambridge
IT:AM Semina Series - Managing your secrets, protecting your assets - CambridgeIT:AM Semina Series - Managing your secrets, protecting your assets - Cambridge
IT:AM Semina Series - Managing your secrets, protecting your assets - Cambridge
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - CardiffIT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
IT:AM Semina Series - Managing your secrets, protecting your assets - Cardiff
 
Source code escrow and continuity in the cloud
Source code escrow and continuity in the cloudSource code escrow and continuity in the cloud
Source code escrow and continuity in the cloud
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
IT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
IT:AM Semina Series - Managing your secrets, protecting your assets - ManchesterIT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
IT:AM Semina Series - Managing your secrets, protecting your assets - Manchester
 
Chainyard BITA TYS presentation v0.1.11042019
Chainyard BITA TYS  presentation v0.1.11042019Chainyard BITA TYS  presentation v0.1.11042019
Chainyard BITA TYS presentation v0.1.11042019
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
Oow con7393
Oow con7393Oow con7393
Oow con7393
 

Dernier

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Dernier (20)

What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Ownership Rights in the Cloud

  • 1. Information Ownership iccl @ CCLS in the Cloud Chris Reed Professor of Electronic Commerce Law 1 What is “Ownership” • No physical property rights in information But customers may expect similar rights • Three legal sources of ownership IP rights Confidentiality Contract • Customer/provider relationship Confidentiality and contract are primary sources IP rights relevant to claims against third parties • But need to be allocated in the customer/provider relationship • All these are well-understood in normal computing usage
  • 2. What is different about cloud computing? • Provider makes processing technology and other information available to customer Thus further information rights come into play • Provider • Third parties • Copyright fragments ownership and creates uncertainty Who owns information generated in the cloud? Particular problem of generation across jurisdictions • Provider has ability to undertake data mining and produce metadata Does customer have any rights to control exploitation? Licensed technology Metadata Licensed Provider information Know how/ Billing data Trade secret Data mining Know how/ Processing Trade secret outputs Customer Customer own Licensed information technology Employee & Client Licensed information information
  • 3. Licensed technology Licensed Provider information Information inputs Customer Customer own Licensed information technology Employee & Client Licensed information information Ownership of information inputs • Ownership unchanged by placing in the cloud IP rights (mainly copyright/database) continue to subsist in software and data Third party information and software • Owned by providers • Use may be controlled by licence terms • Service terms may modify this Provider will require licence from customer to use information inputs Providers rarely ask for ownership rights in inputs
  • 4. Metadata Provider Outputs and Know how/ Billing data derived Trade secret Data mining information Know how/ Trade secret Processing outputs Customer Information outputs • IP rights uncertainties Authorship • Who? (customer/provider?) • Where? Problem for database right • Jurisdictional uncertainties Is the output created on the server? • Differing national law approaches to IPRs Functional/factual works Computer-generated works And which server was actually used? When is this a problem? • Claims against third parties • Use by provider
  • 5. Metadata – the great unknown • Metadata is information about the customer’s use of the service • Addition, deletion and generation of information • Use of software applications and databases Generated by provider, thus IPRs owned by provider But when relating to customer, metadata will be confidential • Data mining Provider has ability to search customers’ information and extract further information from it • Unless constrained by service terms Generated by, and thus IPRs owned by, provider Potentially very valuable to third parties Will metadata generation infringe customer’s rights? • IP rights Location of copying/extraction determines applicable rights Terms of provider’s licence to use customer information • Confidential information Primary duty is to preserve confidentiality • Aggregation and anonymisation can reduce this risk • But note development of reidentification technology Secondary duty not to take unfair advantage of the information?
  • 6. Customer concerns • Secret use of “my” information • Risk of confidentiality breach Carelessly including identifying information Customer identity can be deduced from metadata or mined data • Revenue sharing Provider uses customer’s assets to make profits for itself • Customer will want to share • But revenue from this may be implicitly included in cost of service Resolving the ownership conundrum • All these issues can be addressed by appropriate service terms But do current service terms even recognise the issues exist? If so, are they dealt with appropriately? Do customers have other expectations which need to be catered for? Effects of consumer protection law on service terms?
  • 7. The limitations of service terms • Little scope for individual negotiation Provider needs all users to be on same deal as to information ownership • Hidden parties Outsourcing and reselling of cloud capacity • Differing national law effects But clouds transcend geography A governance model • Window of opportunity for cloud providers to establish a governance forum Identify best practices for issues such as information ownership Leading to coherent and consistent service terms across multiple cloud services • Might be sufficient to forestall hasty national legislation History tells us that first generation regulation of cyberspace is usually a failure!