Verified Document

Cloud Computing Laws Explained Essay

Cloud Security and Privacy Cloud computing's exponential growth is fueling a corresponding need for greater compliance, governance and regulations to ensure data and knowledge are secured and accessed for intended use. A regulation by definition is a rule or law, and has inherent within its definition support for compliance and enforcement (Halpert, 2011). Regulations differ from legal frameworks or standards in that the former is broadly protective and more focused on protecting shareholder value, ensuring corporate responsibility and also defining disincentives for recklessness or wrongdoing (Halpert, 2011). The purpose of this analysis is to analyze the top five security regulations for business and government.

Analysis of the Top Five Security Regulations for Businesses and Government

The top five security regulations provide laws governing the use of digital assets including cloud computing platforms and applications, with the specific purpose of ensuring personal and corporate data, information and knowledge are protected.

The first of the five regulations is the Federal Information Security Management Act. This Act was passed in 2002 and includes specific laws governing the access and use of U.S. government data at federal agencies (Halpert, 2011). The Act concentrates on how to define, implement and optimize every aspect of system...

federal agencies. What is unique about this Act is that it has a clause that provides for greater funding if the overall readiness of IT systems falls below a specific threshold level. This act predates cloud computing's adoption, however it includes 17 specific families of controls that encompass Access Control to Disaster Recovery, which while they are not directly applicable to cloud computing, they address infrastructure clouds rely in on integrated platforms.
The second most significant security regulation is the Sarbanes-Oxley Act of 2002, often called SOX. This set of regulations define in detail how all American publically-traded companies report their financial results, define their ownership and stakeholders, and report exceptional events that could have a material effect on their financial performance. Companies who are in compliance with these are also by definition of this regulation also in compliance with COSO and COBIT (Halpert, 2011). Cloud-based platforms being used in financial services by firms that are publically traded on American stock exchanges must abide by these laws or face heavy fines from the U.S. Securities Exchange Commission. This is so foundational to building cloud platforms that is an essential element of any design of applications or systems in publically-traded American companies today.

The…

Sources used in this document:
Reference:

Halpert, B. (2011). Auditing cloud computing a security and privacy guide. Hoboken, N.J.: John Wiley & Sons.
Cite this Document:
Copy Bibliography Citation

Related Documents

Cloud Computing Digital Forensics the
Words: 1273 Length: 4 Document Type: Research Paper

This means that no deeper view into the system and its underlying infrastructure is provided to the customer." The constant flow of information makes compiling a forensics report on any given item very difficult. Legal issues may also hamper digital forensics in dealing with cloud issues. Cloud computing raises some unique law enforcement concerns regarding the location of potential digital evidence and its subsequent forensic analysis. When a savvy and

Information Systems and Its Effects on Business
Words: 2058 Length: 6 Document Type: Essay

information systems and its effects on business processes. Moreover, I have explained the several business components and their effectiveness as information systems. In addition, I have provided information regarding the effects of information systems on various business careers. Information systems have brought revolutions and innovations in today's business' setups and also have developed a close relationship with globalization. The responsibility of these information systems in an organization is not to

Patriot Act This Study Seeks
Words: 4721 Length: 15 Document Type: Term Paper

" Prohibiting "a bill of attainder" means that the U.S. Congress cannot pass a law that considers individual or aggregation blameworthy and later discipline them. Disallowing an ex post facto law implies that the U.S. Congress cannot make any given act a crime after the time the act had been committed. It is doubtful that this applies to a few sections of the Patriot Act. Individuals who monitor the Supreme

Hewlett Packard and Its Vision
Words: 5264 Length: 20 Document Type: Research Paper

Problem Statement #2 The Problem The problem with Hewlett-Packard’s (HP) vision of how to run a successful organization shifted dramatically in the 2000s, beginning with its plan in 2002 to outsource “PC manufacturing facilities worldwide, in keeping with its longstanding strategy to decrease operations costs and improve profitability” (Mourdoukoutas, 2014). By outsourcing its manufacturing, HP entered into a phase of self-destruction, inviting the collapse of its own supply chain through fragmentation inevitably

Telehealth and Solving the Problem of Nursing Turnover
Words: 12696 Length: 45 Document Type: Capstone Project

Reducing Nursing Turnover by Implementing Innovative E-Health: A New Strategy for Incentivizing Nurses and Improving Organizational Culture Problem Identification: Nursing turnover rates are a serious issue for hospitals: they are costly and result in lost time and energy in continuously training new staff (Twibell, 2012). Identifying the main reasons for nursing turnover and addressing them can lead to better nurse retention (Trivellas, Gerogiannis, Svarna, 2013). The problem of nurse retention has been identified

Google Technologies
Words: 2066 Length: 8 Document Type: Essay

Google Technologies Google Blimp Google has a vast array of different types of technologies under development. One of the more interesting projects is Google Blimp. In rural communities, such as in the ones in many parts of Africa, there is often a lack of physical communication infrastructure. Because of this lack of infrastructure, it makes creative solutions of delivering internet to millions of people possible. Google is intending to build huge wireless

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now