-
1
-
-
0003187764
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data [1995] OJ L 281/31.
-
(1995)
OJ
, vol.L281
, pp. 31
-
-
-
3
-
-
79953871258
-
-
European Network and Information Security Agency, ENISA, November
-
European Network and Information Security Agency, An SME perspective on Cloud Computing-Survey (ENISA, November 2009).
-
(2009)
An SME Perspective on Cloud Computing-Survey
-
-
-
4
-
-
84926349975
-
Information “ownership” in the cloud
-
CLP paper last accessed 26 August 2011
-
see Chris Reed's CLP paper, 'Information “Ownership” in the Cloud' (2010) Queen Mary School of Law Legal Studies Research Paper No. 45/2010,http://papers.ssrn.com/ sol3/papers.cfm?abstract_id=1562461. last accessed 26 August 2011.
-
(2010)
Queen Mary School of Law Legal Studies Research
-
-
Reed'S, C.1
-
6
-
-
79956108069
-
A comprehensive approach on personal data protection in the European Union' (Communication)
-
European Commission final November 2010
-
European Commission, 'A comprehensive approach on personal data protection in the European Union' (Communication) COM (2010) 609 final (November 2010);
-
(2010)
COM
, pp. 609
-
-
-
7
-
-
85071014515
-
-
Les Assises du Numérique conference, Université Paris-Dauphine, 25 November SPEECH/10/686
-
Neelie Kroes, 'Cloud computing and data protection' (Les Assises du Numérique conference, Université Paris-Dauphine, 25 November 2010) SPEECH/10/686.
-
(2010)
Cloud Computing and Data Protection
-
-
Kroes, N.1
-
8
-
-
84888875353
-
Contracts for clouds: Comparison and analysis of the terms and conditions of cloud computing services
-
CLP Contracts Paper, last accessed 26 August 2011
-
S Bradshaw, C Millard and I Walden, 'Contracts for Clouds: Comparison and Analysis of the Terms and Conditions of Cloud Computing Services' (2010) Queen Mary School of Law Legal Studies Research Paper No 63/ 2010 ('CLP Contracts Paper'),http://papers.ssrn.com/sol3/papers. cfm?abstract_id=1662374. last accessed 26 August 2011.
-
(2010)
Queen Mary School of Law Legal Studies Research
-
-
Bradshaw, S.1
Millard, C.2
Walden, I.3
-
10
-
-
85071004751
-
-
Heroku's acquisition by SaaS (and, increasingly, PaaS) provider Salesforce.com was completed in January 2011, last accessed 26 August 2011
-
Heroku's acquisition by SaaS (and, increasingly, PaaS) provider Salesforce.com was completed in January 2011. Salesforce.com, 'Salesforce.com Completes Acquisition of Heroku' (2011),http://www. salesforce.com/company/news-press/press-releases/2011/01/110104.jsp. last accessed 26 August 2011.
-
(2011)
Salesforce.Com Completes Acquisition of Heroku
-
-
-
11
-
-
85071006857
-
-
Eg, for Windows Azure users, Zuora's payments system Windows Azure Team Blog, 11 November last accessed 26 August 2011
-
Eg, for Windows Azure users, Zuora's payments system. 'Real World Windows Azure: Interview with Jeff Yoshimura, Head of Product Marketing, Zuora' (Windows Azure Team Blog, 11 November 2010),http://blogs.msdn.com/b/windowsazure/archive/2010/11/11/real-world-windows-azure-interview-with-jeff-yoshimura-head-of-product-marketing-zuora.aspx. last accessed 26 August 2011.
-
(2010)
Real World Windows Azure: Interview with Jeff Yoshimura, Head of Product Marketing, Zuora
-
-
-
12
-
-
80052587713
-
-
Google Apps, 10 March last accessed 26 August 2011
-
'Google Apps Marketplace now launched' (Google Apps, 10 March 2010) ,http://googleappsupdates.blogspot.com/2010/03/google-apps-marketplace-now-launched.html. last accessed 26 August 2011.
-
(2010)
Google Apps Marketplace Now Launched
-
-
-
13
-
-
24944574585
-
Traffic data' and 'location data' under Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector
-
Some other data types are also regulated more stringently, eg 31.07. ePrivacy Directive
-
Some other data types are also regulated more stringently, eg 'traffic data' and 'location data' under Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector OJ L 201/37, 31.07.2002 ('ePrivacy Directive').
-
(2002)
OJ
, vol.L201
, pp. 37
-
-
-
14
-
-
85071023738
-
WP136, 13, and the contextual nature of 'personal data' has been recognized eg in Common Services Agency v Scottish Information Commissioner (Scotland)
-
WP136, 13, and the contextual nature of 'personal data' has been recognized eg in Common Services Agency v Scottish Information Commissioner (Scotland) [2008] UKHL 47, (CSA), [27].
-
(2008)
UKHL
, vol.47
, pp. 27
-
-
-
16
-
-
71749114467
-
The fog over the Grimpen Mire: Cloud computing and the law
-
Such use may indeed be key to its business model. 144-5
-
Such use may indeed be key to its business model. Miranda Mowbray, 'The Fog over the Grimpen Mire: Cloud Computing and the Law' (2009) 6:1 SCRIPTed 129, 144-5.
-
(2009)
SCRIPTed
, vol.6
, Issue.1
, pp. 129
-
-
Mowbray, M.1
-
18
-
-
85071017625
-
-
last accessed 26 August 2011
-
HipSnip, HipSnip Legal Statement,http://hipsnip.com/hip/legal. last accessed 26 August 2011.
-
HipSnip Legal Statement
-
-
-
20
-
-
85070938454
-
All party parliamentary group on extraordinary rendition v the information commissioner & the Ministry of Defence
-
the UK, a tribunal has held that anonymization is 'processing'-
-
In the UK, a tribunal has held that anonymization is 'processing'-All Party Parliamentary Group on Extraordinary Rendition v The Information Commissioner & The Ministry of Defence, [2011] UKUT 153 (AAC) (APGER), [127].
-
(2011)
UKUT 153 (AAC) (APGER)
, pp. 127
-
-
-
21
-
-
67650655439
-
Differential privacy: A survey of results, theory and applications of models of computation
-
Manindra Agrawal, Dingzhu Du, Zhenhua Duan and Angsheng Li eds, Springerlink
-
C Dwork, 'Differential Privacy: A Survey of Results, Theory and Applications of Models of Computation', in Manindra Agrawal, Dingzhu Du, Zhenhua Duan and Angsheng Li (eds), Theory and Applications of Models of Computation (Springerlink 2008).
-
(2008)
Theory and Applications of Models of Computation
-
-
Dwork, C.1
-
22
-
-
70449632682
-
De-anonymizing Social Networks
-
IEEE Computer Society Washington, DC, USA, 17-20 May
-
Arvind Narayanan and Vitaly Shmatikov, 'De-anonymizing Social Networks' (Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, IEEE Computer Society Washington, DC, USA, 17-20 May 2009) 173.
-
(2009)
Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
, pp. 173
-
-
Narayanan, A.1
Shmatikov, V.2
-
23
-
-
85070955813
-
Joined Cases C 92/09 and C 93/09 Volker und Markus Schecke (Approximation of laws)
-
Eg 15.1
-
Eg Joined Cases C 92/09 and C 93/09 Volker und Markus Schecke (Approximation of laws) OJ C 13/6, 15.1.2011
-
(2011)
OJ
, vol.C13
, pp. 6
-
-
-
25
-
-
85070996065
-
-
Peter Fleischer: Privacy ?, 22 February last accessed 26 August 2011
-
Peter Fleischer, 'Austrian insights' (Peter Fleischer: Privacy . . . ?, 22 February 2010),http://peterfleischer.blogspot.com/ 2010/02/austrian-insights.html. last accessed 26 August 2011.
-
(2010)
Austrian Insights
-
-
Fleischer, P.1
-
26
-
-
85071028581
-
The Scottish court in Craigdale Housing Association & Ors v the Scottish Information Commissioner
-
2010 SLT 655 19
-
The Scottish court in Craigdale Housing Association & Ors v The Scottish Information Commissioner [2010] CSIH 43, [2010] SLT 655 [19]
-
(2010)
CSIH
, vol.43
-
-
-
27
-
-
85070952041
-
Department of Health v Information Commissioner
-
Admin
-
Department of Health v Information Commissioner, [2011] EWHC 1430 (Admin)
-
(2011)
EWHC
, pp. 1430
-
-
-
28
-
-
85070995915
-
The Safe Harbor is one method enabling export of personal data to the USA. Commission decision 2000/520/EC
-
The Safe Harbor is one method enabling export of personal data to the USA. Commission Decision 2000/520/EC [2000] OJ L 215/7.
-
(2000)
OJ
, vol.L215
, pp. 7
-
-
-
30
-
-
77957594024
-
Broken promises of privacy: Responding to the surprising failure of anonymization
-
the AOL search results release incident, summarized in
-
See the AOL search results release incident, summarized in Paul Ohm, 'Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization' (2010) 57 UCLA Law Review 1701.
-
(2010)
UCLA Law Review
, vol.57
, pp. 1701
-
-
Ohm, P.1
-
35
-
-
85070991650
-
CIA to examine impact of files recently released by WikiLeaks
-
22 December
-
Greg Miller, 'CIA to examine impact of files recently released by WikiLeaks', The Washington Post (22 December 2010).
-
(2010)
The Washington Post
-
-
Miller, G.1
-
36
-
-
85071039173
-
-
Eg messages encrypted using Data Encryption Standard (DES) were decrypted by the US Electronic Frontier Foundation-, last accessed 26 August 2011
-
Eg messages encrypted using Data Encryption Standard (DES) were decrypted by the US Electronic Frontier Foundation-see,http://w2. eff.org/Privacy/Crypto/Crypto_misc/DESCracker/. last accessed 26 August 2011.
-
-
-
-
37
-
-
84887975632
-
-
Schneier on Security, 18 February last accessed 26 August 2011
-
Bruce Schneier, 'Cryptanalysis of SHA-1' (Schneier on Security, 18 February 2005),http://www.schneier.com/blog/archives/2005/02/ cryptanalysis_o.html. last accessed 26 August 2011.
-
(2005)
Cryptanalysis of SHA-1
-
-
Schneier, B.1
-
38
-
-
78650851875
-
Now Firefox sync-Christopher Soghoian, 'Caught in the Cloud: Privacy, encryption, and government back doors in the web 2.0 era
-
Eg Mozilla Weave, now Firefox Sync-Christopher Soghoian, 'Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era' [2010] Journal on Telecommunications and High Technology Law 8(2) 359
-
(2010)
Journal on Telecommunications and High Technology Law
, vol.8
, Issue.2
, pp. 359
-
-
Weave, E.M.1
-
39
-
-
84872113187
-
-
Stacksmashing.net, 15 November last accessed 26 August 2011
-
Thomas Roth, 'Cracking Passwords in the Cloud: Amazon's New EC2 GPU Instances' (Stacksmashing.net, 15 November 2010),http://stacksmashing.net/2010/ 11/15/cracking-in-the-cloud-amazons-new-ec2-gpu-instances. last accessed 26 August 2011.
-
(2010)
Cracking Passwords in the Cloud: Amazon's New EC2 GPU Instances
-
-
Roth, T.1
-
40
-
-
85070982971
-
-
Electric Alchemy, 30 October last accessed 26 August 2011
-
Cracking Passwords in the Cloud: Breaking PGP on EC2 with EDPR' (Electric Alchemy, 30 October 2009),http://news.electricalchemy.net/2009/10/cracking-passwords-in-cloud.html. last accessed 26 August 2011.
-
(2009)
Cracking Passwords in the Cloud: Breaking PGP on EC2 with EDPR
-
-
-
41
-
-
85071030023
-
Dropbox lied to users about data security
-
Wired, 13 May last accessed 26 August 2011
-
Ryan Singel, 'Dropbox Lied to Users about Data Security, Complaint to FTC Alleges' (Wired, 13 May 2011),http:// www.wired.com/threatlevel/2011/05/dropbox-ftc/. last accessed 26 August 2011.
-
(2011)
Complaint to FTC Alleges
-
-
Singel, R.1
-
42
-
-
85070955136
-
Who is responsible for “personal data
-
last accessed 26 August 2011
-
W Kuan Hon, Millard and Walden, 'Who is Responsible for “Personal Data” in Cloud Computing? The Cloud of Unknowing, Part 2' (2011),http://papers.ssrn.com/sol3/ papers.cfm?abstract_id=1794130. last accessed 26 August 2011.
-
(2011)
Cloud Computing? The Cloud of Unknowing, Part 2
-
-
Kuan Hon, W.1
Millard2
Walden3
-
43
-
-
77956137294
-
Cryptographic cloud storage
-
Radu Sion and others eds, Springer-Verlag Berlin, Heidelberg
-
Seny Kamara and Kristin Lauter, 'Cryptographic Cloud Storage', in Radu Sion and others (eds), FC'10 Proceedings of the 14th International Conference on Financial Cryptography and Data Security (Springer-Verlag Berlin, Heidelberg 2010), 136.
-
(2010)
FC'10 Proceedings of the 14th International Conference on Financial Cryptography and Data Security
, pp. 136
-
-
Kamara, S.1
Lauter, K.2
-
45
-
-
79955532534
-
Fully homomorphic encryption with relatively small key and ciphertext sizes
-
Phong Q Nguyen and David Pointcheval eds, Springer, Berlin/Heidelberg
-
Eg N Smart and F Vercauteren, 'Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes' in Phong Q Nguyen and David Pointcheval (eds), Public Key Cryptography-PKC 2010, 420 (Springer, Berlin/Heidelberg 2010).
-
(2010)
Public Key Cryptography-PKC 2010
, vol.420
-
-
Smart, E.N.1
Vercauteren, F.2
-
46
-
-
79960477230
-
Controlling data in the cloud: Outsourcing computation without outsourcing control' in Radu Sion and Dawn Song (chairs)
-
ACM, Chicago, Illinois
-
R Chow and others, 'Controlling data in the cloud: outsourcing computation without outsourcing control' in Radu Sion and Dawn Song (chairs), Proceedings of the 2009 ACM workshop on Cloud computing security (ACM, Chicago, Illinois 2009).
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
-
-
Chow, R.1
-
47
-
-
84864578620
-
Enhancing privacy in cloud computing via policy-based obfuscation
-
Other approaches to secure cloud processing include data obfuscation- online 31 March
-
Other approaches to secure cloud processing include data obfuscation-Miranda Mowbray, Siani Pearson and Yun Shen, 'Enhancing privacy in cloud computing via policy-based obfuscation' (online 31 March 2010) The Journal of Supercomputing DOI: 10.1007/s11227-010-0425-z.
-
(2010)
The Journal of Supercomputing
-
-
Mowbray, M.1
Pearson, S.2
Shen, Y.3
-
51
-
-
84855350737
-
-
Eg Facebook uses relational database MySQL and NoSQL database Cassandra- 22 July last accessed 26 August 2011
-
Eg Facebook uses relational database MySQL and NoSQL database Cassandra-Sean Michael Kerner, 'Inside Facebook's Open Source Infrastructure' (Developer.com, 22 July 2010),http:// www.developer.com/features/article.php/3894566/Inside-Facebooks-Open-Source-Infrastructure.htm. last accessed 26 August 2011.
-
(2010)
Inside Facebook's Open Source Infrastructure
-
-
Kerner, S.M.1
-
52
-
-
84951311822
-
-
Google Apps- Official Google Enterprise Blog, 4 March last accessed 26 August 2011
-
Google Apps-Rajen Sheth, 'Disaster Recovery by Google' (Official Google Enterprise Blog, 4 March 2010),http://googleenterprise.blogspot. com/2010/03/disaster-recovery-by-google.html. last accessed 26 August 2011.
-
(2010)
Disaster Recovery by Google
-
-
Sheth, R.1
-
53
-
-
85070959655
-
-
Microsoft Windows Azure-Microsoft last accessed 26 August 2011
-
Microsoft Windows Azure-Microsoft, 'Introduction to the Windows Azure Platform' (MSDN Library),,http://msdn.microsoft.com/en-us/ library/ff803364.aspx. last accessed 26 August 2011.
-
Introduction to the Windows Azure Platform' (MSDN Library)
-
-
-
54
-
-
85071009595
-
The datacenter as a computer: An introduction to the design of warehouse-scale machines
-
Eg to equalize workload across different servers and/or data centres. Mark D Hill ed, Morgan & Claypool
-
Eg to equalize workload across different servers and/or data centres. LA Barroso and U Hölzle, The Datacenter as a Computer: An Introduction to the Design of Warehouse-Scale Machines in Mark D Hill (ed.), Synthesis Lectures on Computer Architecture (Morgan & Claypool 2010) 16.
-
(2010)
Synthesis Lectures on Computer Architecture
, pp. 16
-
-
Barroso, L.A.1
Hölzle, U.2
-
55
-
-
84855755528
-
-
Eg data stored using Amazon's Elastic Block Store (EBS), appearing to users as physical hard drives, are, before being stored as EBS snapshots on Amazon's S3 storage service, first broken into chunks whose size depends on Amazon's optimizations. Amazon, last accessed 26 August 2011
-
Eg data stored using Amazon's Elastic Block Store (EBS), appearing to users as physical hard drives, are, before being stored as EBS snapshots on Amazon's S3 storage service, first broken into chunks whose size depends on Amazon's optimizations. Amazon, Amazon Elastic Block Store (EBS) (2011),http://aws.amazon.com/ebs/. last accessed 26 August 2011.
-
(2011)
Amazon Elastic Block Store (EBS)
-
-
-
57
-
-
85070974379
-
-
last accessed 26 August 2011
-
(Symform, 'How Symform Processes and Stores Data' (Symform),http://symform.com/ faq-how-symform-processes-and-stores-data.aspx.) last accessed 26 August 2011.
-
How Symform Processes and Stores Data' (Symform)
-
-
-
58
-
-
85070981434
-
Law enforcement access in a cloud environment
-
On law enforcement issues in cloud computing another CLP paper: last accessed 26 August 2011
-
On law enforcement issues in cloud computing see another CLP paper: Ian Walden, 'Law Enforcement Access in a Cloud Environment' (2011) Queen Mary School of Law Legal Studies Research Paper No. 72/2011,http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1781067. last accessed 26 August 2011.
-
(2011)
Queen Mary School of Law Legal Studies Research
-
-
Walden, I.1
-
59
-
-
85070979108
-
-
The Sedona Conference 2011, 10-11, last accessed 26 August 2011
-
Thilo Weichert, 'Cloud Computing and Data Privacy' (The Sedona Conference 2011) ,https://www.datenschutzzentrum.de/cloud-computing/20100617-cloud-computing-and-data-privacy.pdf., 10-11, last accessed 26 August 2011.
-
Cloud Computing and Data Privacy
-
-
Weichert, T.1
-
61
-
-
85071033691
-
-
Google Public Policy Blog, 20 April last accessed 26 August 2011
-
David Drummond, 'Greater transparency around government requests' (Google Public Policy Blog, 20 April 2010),http://googlepublicpolicy.blogspot.com/2010/04/ greater-transparency-around-government.html. last accessed 26 August 2011.
-
(2010)
Greater Transparency around Government Requests
-
-
Drummond, D.1
-
62
-
-
84906175515
-
-
Concerns have recently been raised about US providers handing users' data to US authorities if compelled by US law, eg the US PATRIOT Act, including data located outside the USA. for example, NetworkWorld 5 July last accessed 26 August 2011
-
Concerns have recently been raised about US providers handing users' data to US authorities if compelled by US law, eg the US PATRIOT Act, including data located outside the USA. See, for example, Jennifer Baker, 'EU upset by Microsoft warning about US access to EU cloud' (NetworkWorld 5 July 2011),http://www.networkworld.com/ news/2011/070511-eu-upset-by-microsoft-warning.html. last accessed 26 August 2011.
-
(2011)
EU Upset by Microsoft Warning about US Access to EU Cloud
-
-
Baker, J.1
-
63
-
-
32644447679
-
-
OUP, a TV interview statement is public; what about a personal announcement to friends?
-
Peter Carey, Data Protection: a Practical Guide to UK and EU Law (OUP, 2009), 86: a TV interview statement is public; what about a personal announcement to friends?
-
(2009)
Data Protection: A Practical Guide to UK and EU Law
, pp. 86
-
-
Carey, P.1
-
64
-
-
85071018781
-
A29WP and Working Party on Police and Justice, the Future of Privacy-Joint contribution to the Consultation of the European Commission on the legal framework for the fundamental right to protection of personal data
-
Eg 71
-
Eg A29WP and Working Party on Police and Justice, The Future of Privacy-Joint contribution to the Consultation of the European Commission on the legal framework for the fundamental right to protection of personal data, WP 168 (2009) [48], [71];
-
(2009)
WP
, vol.168
, pp. 48
-
-
-
65
-
-
85070952995
-
A29WP, Opinion 5/2009 on online social networking
-
3.1.2 and 3.2
-
A29WP, Opinion 5/2009 on online social networking, WP 163 (2009), 3.1.2 and 3.2.
-
(2009)
WP
, pp. 163
-
-
-
69
-
-
84893155505
-
-
World Economic Forum Davos 27 January SPEECH/11/ 50. Encryption and security measures also need standardization, with a view to appropriate legal recognition of accepted standards
-
Neelie Kroes, 'Towards a European Cloud Computing Strategy' (World Economic Forum Davos 27 January 2011) SPEECH/11/ 50. Encryption and security measures also need standardization, with a view to appropriate legal recognition of accepted standards.
-
(2011)
Towards a European Cloud Computing Strategy
-
-
Kroes, N.1
-
70
-
-
85071040371
-
IBM's Idemix, Microsoft's technologies incorporating Credentica's U-Prove, the Information Card Foundation's Information Cards
-
Eg Identity Weblog, 3 July last accessed 26 August 2011
-
Eg IBM's Idemix, Microsoft's technologies incorporating Credentica's U-Prove, the Information Card Foundation's Information Cards. Touch2ID pilots smartcards proving UK holders are of drinking age without revealing other data-Kim Cameron, 'Doing it right: Touch2Id' (Identity Weblog, 3 July 2010),http://www.identityblog.com/?p=1142. last accessed 26 August 2011.
-
(2010)
Touch2ID Pilots Smartcards Proving UK Holders Are of Drinking Age without Revealing Other Data-Kim Cameron, 'Doing It Right: Touch2Id
-
-
-
71
-
-
85070960896
-
Case C-73/07 Tietosuojavaltuutettu v Satakunnan Markkinaporssi and Satamedia Oy (Approximation of laws)
-
21.2
-
Case C-73/07 Tietosuojavaltuutettu v Satakunnan Markkinaporssi and Satamedia Oy (Approximation of laws) OJ C 44/6, 21.2.2009;
-
(2009)
OJ C
, vol.44
, Issue.6
-
-
-
72
-
-
85070976659
-
-
[2008] ECR I-9831.
-
(2008)
ECR
, vol.1
, pp. 9831
-
-
|