Protecting Digital Identity in the Cloud

Protecting Digital Identity in the Cloud
Author :
Publisher :
Total Pages : 17
Release :
ISBN-10 : OCLC:1308870743
ISBN-13 :
Rating : 4/5 ( Downloads)

Book Synopsis Protecting Digital Identity in the Cloud by : Clare Linda Sullivan

Download or read book Protecting Digital Identity in the Cloud written by Clare Linda Sullivan and published by . This book was released on 2014 with total page 17 pages. Available in PDF, EPUB and Kindle. Book excerpt: Widespread use of cloud computing and other off-shore hosting and processing arrangements make regulation of cross border data one of the most significant issues for regulators around the world. Cloud computing has made data storage and access cost effective but it has changed the nature of cross border data. Now data does not have to be stored or processed in another country or transferred across a national border in the traditional sense, to be what we consider to be cross border data. Nevertheless, the notion of physical borders and transfers still pervades thinking on this subject. The European Commission (“EC”) is proposing a new global standard for data transfer to ensure a level of protection for data transferred out of the EU similar to that within the EU. This paper examines the two major international schemes regulating cross-border data, the EU approach and the US approach, and the new EC and US proposals for a global standard. These approaches which are all based on data transfer are contrasted with the new Australian approach which regulates disclosure. The relative merits of the EU, US and Australian approaches are examined in the context of digital identity, rather than just data privacy which is the usual focus, because of the growing significance of digital identity, especially to an individual's ability to be recognized and to transact. The set of information required for transactions which invariably consists of full name, date of birth, gender and a piece of what is referred to as identifying information, has specific functions which transform it from mere information. As is explained in this article, as a set, it literally enables the system to transact. For this reason, it is the most important, and most vulnerable, part of digital identity. Yet while it is deserving of most protection, its significance has been largely underappreciated. This article considers the issues posed by cross border data regulation in the context of cloud computing, with a focus on transaction identity and the other personal information which make up an individual's digital identity. The author argues that the growing commercial and legal importance of digital identity and its inherent vulnerabilities mandate the need for its more effective protection which is provided by regulation of disclosure, not just transfer.


Protecting Digital Identity in the Cloud Related Books

Protecting Digital Identity in the Cloud
Language: en
Pages: 17
Authors: Clare Linda Sullivan
Categories:
Type: BOOK - Published: 2014 - Publisher:

DOWNLOAD EBOOK

Widespread use of cloud computing and other off-shore hosting and processing arrangements make regulation of cross border data one of the most significant issue
Digital Identity Management
Language: en
Pages: 272
Authors: Maryline Laurent
Categories: Computers
Type: BOOK - Published: 2015-04-02 - Publisher: Elsevier

DOWNLOAD EBOOK

In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate. These chang
Protecting Your Internet Identity
Language: en
Pages: 289
Authors: Ted Claypoole
Categories: Computers
Type: BOOK - Published: 2016-11-16 - Publisher: Rowman & Littlefield

DOWNLOAD EBOOK

People research everything online – shopping, school, jobs, travel – and other people. Your online persona is your new front door. It is likely the first th
Zero Trust Networks
Language: en
Pages: 240
Authors: Evan Gilman
Categories: Computers
Type: BOOK - Published: 2017-06-19 - Publisher: "O'Reilly Media, Inc."

DOWNLOAD EBOOK

The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in
The Cloud Security Ecosystem
Language: en
Pages: 571
Authors: Raymond Choo
Categories: Computers
Type: BOOK - Published: 2015-06-01 - Publisher: Syngress

DOWNLOAD EBOOK

Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics fr