SlideShare une entreprise Scribd logo
1  sur  17
ISACA 2012




www.cyberlawconsulting.com
www.cyberlawconsulting.com
Legal Issues in Cloud Computing
                    Liability


                                          Law

Compliance




       Copyright                   Data Portability

             www.cyberlawconsulting.com
Why Cloud Computing
• Cloud Computing services offer low
barrier to entry and easy scaling
possibilities.

• Easy “click-wrap agreements”


• Agility/   Flexibility of Technology

• Always ON – ubiquitous

• Real Time Information and Immediate
feedback




       www.cyberlawconsulting.com
Compliance of Cloud Computing
• Auditing requirements
 Many contracts impose auditing possibilities that
 include physical inspection how can these auditing
  requirements be complied with when geographically
  decentralized cloud services are used?
• Applicable Law & Competent court
  If outside own country, any litigation can become
  prohibitively expensive . .
• What happens in case of bankruptcy of the
  cloud computing service provider?


                www.cyberlawconsulting.com
Compliance as per The IT Rules, 2011
• The intermediary shall observe following due diligence while
  discharging his duties, namely : ―
• (1) The intermediary shall publish the rules and regulations,
  privacy policy and user agreement for access or usage of the
  intermediary’s computer resource by any person.
• (2) Such rules and regulations, terms and conditions or user
  agreement shall inform the users of computer resource not to
  host, display, upload, modify, publish, transmit, update or
    share any information that       ….
•   If such hosting reported action to be taken in 36 hours
• FACTS : Drop Box , Rapid Share, Gmail Storage contains
  infinite pornography, pirated s/w , songs etc
                       www.cyberlawconsulting.com
Law for Cloud Computing Service
• Cloud computing service providers are intermediary
  as per The IT Act, 2000
• S2(1)(w) "Intermediary" with respect to any
  particular electronic records, means any person who
  on behalf of another person receives, stores or
  transmits that record or provides any service with
  respect to that record and includes telecom service
  providers, network service providers, internet service
  providers, web hosting service providers, search
  engines, online payment sites, online-auction sites,
  online market places and cyber cafes;

                www.cyberlawconsulting.com
Indemnity Issues in Cloud Computing
   We and our licensors shall not be responsible for
     any service interruptions, including, without
  limitation, power outages, system failures or other
 interruptions, including those that affect the receipt,
 processing, acceptance, completion or settlement of
               any payment services. (...)

Neither we nor any of our licensors shall be liable to
  you for any direct, indirect, incidental, special,
 consequential or exemplary damages, including,
   but not limited to, damages for loss of profits,
       goodwill, use, data or other losses (...)
Who will indemnify the Customer or the user ?
Agreement Clauses in Cloud Service

• ”You are utilizing a shared disk model
  and we cannot RISK the chance your
  third party may interfere with other
  clients using the same platform”.
• What happens
  to risk mitigation ?


            www.cyberlawconsulting.com
Legal Liability of Cloud Providers
• Including India many jurisdictions, cloud providers can
  be held liable for the illegal data they may be hosting

Escape Routes
• no liability for services that “consist of” the storage of electronic
   information under the condition that the provider has No
   knowledge or awareness of illegal nature.
• ..and removes or blocks illegal data when it does
  gain knowledge or become aware of illegal nature
• Liability protection does not prevent so-called
  injunctions, which can be as costly and timeconsuming


                    www.cyberlawconsulting.com
Loss Of Location in Cloud Computing
• With Indian Investigation agencies, Loss of location is
  likely to cripple cybercrime investigations at a very early
  stage.
• The Budapest Convention on Cybercrime already
  features a legal principle which overrules location as a
  legal connecting factor: Consent. Article 32 of the
  Budapest Convention states:
• Article 32 – Trans-border access to stored computer
  data with consent or where publicly available
• India not a Signatory to Convention on Cybercrime



                 www.cyberlawconsulting.com
Letter rogatory an option
• The Interpol can take necessary follow up
  steps for this the local police issues letters
  rogatory under the provisions of Section 166 A
  Cr PC.




              www.cyberlawconsulting.com
Data Portability on Cloud
• Who is really managing my company’s sensitive
  information?
• What are their internal security practices? How
  well do they handle incident response?
• How reliable is the infrastructure that provides
  the service?
• Are they prone to service outages?
• How can my service provider recover my cloud
  stuff?
• What is H/W & S/W Portability of my DATA ?
              www.cyberlawconsulting.com
Copyright Issues for Data on Cloud
• Cloud storage as offered by Box.net and other
  providers like Dropbox do offer some of the
  features of file sharing that a recent court ruling
  found illegal.
• RIAA v/s LimeWire.
(Recording Industry Association of America)
• RIAA?? which took NAPSTER DOWN)


                 www.cyberlawconsulting.com
www.cyberlawconsulting.com
www.cyberlawconsulting.com
Thank You



prashant.mali@cyberlawconsulting.com
Mobile : 09821763157
  www.facebook.com/cyberlawconsultant




           www.cyberlawconsulting.com

Contenu connexe

Tendances

Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
Upender Upr
 

Tendances (20)

Data Security
Data SecurityData Security
Data Security
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud computing and data security
Cloud computing and data securityCloud computing and data security
Cloud computing and data security
 
4. system models
4. system models4. system models
4. system models
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computing
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Cloud Security And Privacy
Cloud Security And PrivacyCloud Security And Privacy
Cloud Security And Privacy
 
Unit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computingUnit 3 -Data storage and cloud computing
Unit 3 -Data storage and cloud computing
 
Platform as a Service (PaaS)
Platform as a Service (PaaS)Platform as a Service (PaaS)
Platform as a Service (PaaS)
 
Cloud security
Cloud securityCloud security
Cloud security
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 

En vedette

Cloud Computing - a legal view from Bird & Bird
Cloud Computing - a legal view from Bird & BirdCloud Computing - a legal view from Bird & Bird
Cloud Computing - a legal view from Bird & Bird
Eduserv
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
Vivek Maurya
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study
North Bridge
 

En vedette (12)

Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
Social Media and Your Staff by Brian Miller and Jean Boyle, solicitors at Sto...
 
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing:  Legal Issues and Safety Risks by Brian Miller SolicitorCloud Computing:  Legal Issues and Safety Risks by Brian Miller Solicitor
Cloud Computing: Legal Issues and Safety Risks by Brian Miller Solicitor
 
Cloud computing: Legal and ethical issues in library and information services
Cloud computing: Legal and ethical issues in library and information servicesCloud computing: Legal and ethical issues in library and information services
Cloud computing: Legal and ethical issues in library and information services
 
Cloud Computing - a legal view from Bird & Bird
Cloud Computing - a legal view from Bird & BirdCloud Computing - a legal view from Bird & Bird
Cloud Computing - a legal view from Bird & Bird
 
Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”Cloud Computing Security Issues in Infrastructure as a Service”
Cloud Computing Security Issues in Infrastructure as a Service”
 
basics of cloud computing
basics of cloud computingbasics of cloud computing
basics of cloud computing
 
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
Presentation on cloud computing security issues using HADOOP and HDFS ARCHITE...
 
AWS re:Invent 2016: High Performance Computing on AWS (CMP207)
AWS re:Invent 2016: High Performance Computing on AWS (CMP207)AWS re:Invent 2016: High Performance Computing on AWS (CMP207)
AWS re:Invent 2016: High Performance Computing on AWS (CMP207)
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
Introduction to AWS Cloud Computing
Introduction to AWS Cloud ComputingIntroduction to AWS Cloud Computing
Introduction to AWS Cloud Computing
 
Bessemer's 10 Laws of Cloud Computing
Bessemer's 10 Laws of Cloud ComputingBessemer's 10 Laws of Cloud Computing
Bessemer's 10 Laws of Cloud Computing
 
2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study2016 Future of Cloud Computing Study
2016 Future of Cloud Computing Study
 

Similaire à Cloud computing legal issues

Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
Arun Ganesh
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
EuroCloud
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortz
itnewsafrica
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
wdsnead
 

Similaire à Cloud computing legal issues (20)

Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summit
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
 
Risks and Benefits of Cloud Computing
Risks and Benefits of Cloud ComputingRisks and Benefits of Cloud Computing
Risks and Benefits of Cloud Computing
 
The Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud ServicesThe Cloud Computing Contract Playbook: Contracting for Cloud Services
The Cloud Computing Contract Playbook: Contracting for Cloud Services
 
Legal issues in cloud computing
Legal issues in cloud computingLegal issues in cloud computing
Legal issues in cloud computing
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
 
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
The Cloud Computing Contract Playbook - Contracting for Cloud Services, Sept. 30
 
Cloud Technology & Law Firms
Cloud Technology & Law FirmsCloud Technology & Law Firms
Cloud Technology & Law Firms
 
Cloud
CloudCloud
Cloud
 
Cloud computing contracts
Cloud computing contractsCloud computing contracts
Cloud computing contracts
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
Is There Sun Behind Those Clouds
Is There Sun Behind Those CloudsIs There Sun Behind Those Clouds
Is There Sun Behind Those Clouds
 
Machine learning presentation in using pyhton
Machine learning presentation in using pyhtonMachine learning presentation in using pyhton
Machine learning presentation in using pyhton
 
Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014Mining IT Summit Nov 6 2014
Mining IT Summit Nov 6 2014
 
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009 Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
Carla Pinheiro Presentation / CloudViews.Org - Cloud Computing Conference 2009
 
Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?Does cloud technology belong at your law firm?
Does cloud technology belong at your law firm?
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortz
 
02 05 d_51_cc_efiles
02 05 d_51_cc_efiles02 05 d_51_cc_efiles
02 05 d_51_cc_efiles
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 

Plus de Adv Prashant Mali

Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
Adv Prashant Mali
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
Adv Prashant Mali
 

Plus de Adv Prashant Mali (13)

Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant mali
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant Mali
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Cloud computing legal issues

  • 3. Legal Issues in Cloud Computing Liability Law Compliance Copyright Data Portability www.cyberlawconsulting.com
  • 4. Why Cloud Computing • Cloud Computing services offer low barrier to entry and easy scaling possibilities. • Easy “click-wrap agreements” • Agility/ Flexibility of Technology • Always ON – ubiquitous • Real Time Information and Immediate feedback www.cyberlawconsulting.com
  • 5. Compliance of Cloud Computing • Auditing requirements Many contracts impose auditing possibilities that include physical inspection how can these auditing requirements be complied with when geographically decentralized cloud services are used? • Applicable Law & Competent court If outside own country, any litigation can become prohibitively expensive . . • What happens in case of bankruptcy of the cloud computing service provider? www.cyberlawconsulting.com
  • 6. Compliance as per The IT Rules, 2011 • The intermediary shall observe following due diligence while discharging his duties, namely : ― • (1) The intermediary shall publish the rules and regulations, privacy policy and user agreement for access or usage of the intermediary’s computer resource by any person. • (2) Such rules and regulations, terms and conditions or user agreement shall inform the users of computer resource not to host, display, upload, modify, publish, transmit, update or share any information that …. • If such hosting reported action to be taken in 36 hours • FACTS : Drop Box , Rapid Share, Gmail Storage contains infinite pornography, pirated s/w , songs etc www.cyberlawconsulting.com
  • 7. Law for Cloud Computing Service • Cloud computing service providers are intermediary as per The IT Act, 2000 • S2(1)(w) "Intermediary" with respect to any particular electronic records, means any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web hosting service providers, search engines, online payment sites, online-auction sites, online market places and cyber cafes; www.cyberlawconsulting.com
  • 8. Indemnity Issues in Cloud Computing We and our licensors shall not be responsible for any service interruptions, including, without limitation, power outages, system failures or other interruptions, including those that affect the receipt, processing, acceptance, completion or settlement of any payment services. (...) Neither we nor any of our licensors shall be liable to you for any direct, indirect, incidental, special, consequential or exemplary damages, including, but not limited to, damages for loss of profits, goodwill, use, data or other losses (...) Who will indemnify the Customer or the user ?
  • 9. Agreement Clauses in Cloud Service • ”You are utilizing a shared disk model and we cannot RISK the chance your third party may interfere with other clients using the same platform”. • What happens to risk mitigation ? www.cyberlawconsulting.com
  • 10. Legal Liability of Cloud Providers • Including India many jurisdictions, cloud providers can be held liable for the illegal data they may be hosting Escape Routes • no liability for services that “consist of” the storage of electronic information under the condition that the provider has No knowledge or awareness of illegal nature. • ..and removes or blocks illegal data when it does gain knowledge or become aware of illegal nature • Liability protection does not prevent so-called injunctions, which can be as costly and timeconsuming www.cyberlawconsulting.com
  • 11. Loss Of Location in Cloud Computing • With Indian Investigation agencies, Loss of location is likely to cripple cybercrime investigations at a very early stage. • The Budapest Convention on Cybercrime already features a legal principle which overrules location as a legal connecting factor: Consent. Article 32 of the Budapest Convention states: • Article 32 – Trans-border access to stored computer data with consent or where publicly available • India not a Signatory to Convention on Cybercrime www.cyberlawconsulting.com
  • 12. Letter rogatory an option • The Interpol can take necessary follow up steps for this the local police issues letters rogatory under the provisions of Section 166 A Cr PC. www.cyberlawconsulting.com
  • 13. Data Portability on Cloud • Who is really managing my company’s sensitive information? • What are their internal security practices? How well do they handle incident response? • How reliable is the infrastructure that provides the service? • Are they prone to service outages? • How can my service provider recover my cloud stuff? • What is H/W & S/W Portability of my DATA ? www.cyberlawconsulting.com
  • 14. Copyright Issues for Data on Cloud • Cloud storage as offered by Box.net and other providers like Dropbox do offer some of the features of file sharing that a recent court ruling found illegal. • RIAA v/s LimeWire. (Recording Industry Association of America) • RIAA?? which took NAPSTER DOWN) www.cyberlawconsulting.com
  • 17. Thank You prashant.mali@cyberlawconsulting.com Mobile : 09821763157 www.facebook.com/cyberlawconsultant www.cyberlawconsulting.com