Вы находитесь на странице: 1из 156

cloud computing law

vincent gautrais
professeur agrg /associate professor
facult de droit / faculty of law
universit de Montral /university of montreal

January 23/24th, 2011

chaire en droit de la scurit et des affaires lectroniques /
udm chair in e-Security and e-Business law
www.gautrais.com






thanks to CUSO






but maybe not a so nice gift
4 points in my intro

definition
wikileaks
law + i.t.
legal
tools
0.1 - definition


is it really so
new ?
buzz ASP
outsourcing
good or not ?

an emerging architecture by which data and
applications reside in cyber space, allowing
users to access them through any web
connected device.

(John B. Horrigan) (2008)

Cloud computing refers to a variety of
technologies that transfer the responsibility for a
computing activity (such as storage or processing)
from a local computer to a network of remote
computers over the Internet. The remote
computers are generally operated by a third-
party cloud service provider.

James Kosa (2010)

3 models




Saas
Paas
Iaas
infrastructure
platform
software
0.2 wikileaks
political perspective

constitutional perspective

knowledge management perspective

legal perspective

0.2.1 political perspective

0.2.1 political perspective


strange interpol efficiency

for a rape by surprise infringement
0.2.1 political perspective

Yep. For years people have extolled cloud
computing as the way of the future. The
lesson of the last week is simple: be careful
what you wish for.

John Naughton (2010)

0.2.2 constitutional perspective

balance between
national
security
free
information
0.2.3 knowledge management
perspective



if you want to kill your dog
you accuse him of having the plague
2008 Chatsworth train collision
Stefana Broadbent
0.2.3 knowledge management
perspective



why 1 to 3 billions of people had an access to
sensitive information ????
0.2.3 knowledge management
perspective



efficiency /
access
security
0.2.4 legal perspective
0.2.4 legal perspective

contract ? liability ?
contract
ovh
liability
0.3 i.t. + law
inherent opposition between both concepts
law is stable
techno change quickly
law had no choice to be late (Cicero)
techno is already tomorrow
law is old
techno is new (revolution ???)
26




techno law
27

Michel Serres
les nouvelles technologies :
rvolution culturelle et cognitive
(new technologies: cultural and
knowledge revolution)
28


Michel Serres

when the support / information conbinaison is
changing, everything is changing !

29
-

5
0
0
0

-

4
0
0
0

-

3
0
0
0

-

2
0
0
0

0

-

1
0
0
0

2
0
0
0

1
0
0
0

w
r
i
t
i
n
g

p
r
i
n
t
i
n
g

i
n
t
e
r
n
e
t

30


Michel Serres

today a pure science professor teaches 60 to 70%
of content that he or she doesnt learn him(her)self
in the university.

0.4 legal tools
constitution
international convention
laws
jurisprudence
contract
trade usages
internal documentation
0.4.1 constitution
ex: the Canadian Charter of Rights and Freedoms
(1982)
Life, liberty and security of person art. 7
Freedom of expression art. 2 b)
Freedom of association art. 2d)
Freedom of Conscience and Religion art. 2 a)
Equality before and under law and equal protection and benefit
of law art. 15
EX:
Yahoo! Case in France and United States
wikileaks
ex: Quebec Charter of human rights and freedoms,
R.S.Q. c. C-12 (1975)

0.4.2 international convention
of course nothing on cloud computing
copyright
- WIPO Copyright Treaty (1996)
- WIPO Performances and Phonograms Treaty (WPPT) (1996)
contract
- United Nations Convention on the Use of Electronic Communications
in International Contracts (2005)
privacy (no real international convention)
- Council of Europe and Privacy Protection (1980)
- United Nations Guidelines concerning Computerized Personal Data
Files (1990)
cybercrime
- Convention on Cybercrime (2001) (Council of Europe)


0.4.3 laws

main instrument (+ regulations)

ex: e-contract
ex: privacy
ex: copyright
0.4.4 jurisprudence



very few
0.4.5 contract



part 2
37
0.4.6 trade usages
usages and customs
usages rebirth because others norms are unsufficient
laws (EX: Utah)
regulations
treaties
Jurisprudence
intrinsic reasons of its rebirth
formal reasons
flexibility
vague
subtantial reasons
technical (EX: T.J. Hooper) (1932)
commercial (lex mercatoria)
international (EX: consumer protection)
new and variable
38
0.4.6 trade usages
usages and customs
CCQ. recognition
1434 CCQ. : A contract validly formed binds the parties
who have entered into it not only as to what they have
expressed in it but also as to what is incident to it
according to its nature and in conformity with usage,
equity or law.
but limited recognition
Rare jurisprudence
too vague to be honest
outside the law?
0.4.7 internal documentation

maybe the most important legal solution



that may be used for almost every problems
6 main problems
document
manage-
ment
contract
liability privacy
internati
-onal law
property
1. document management
document
managem
ent
contract
liability privacy
internati-
onal law
property



quite silence of law
ex.1
An Act to establish a legal framework for information
technology (Quebec) (2001)

34. Where the information contained in a document is
declared by law to be confidential, confidentiality must
be protected by means appropriate to the mode of
transmission, including on a communication network.

Documentation explaining the agreed mode of
transmission, including the means used to protect the
confidentiality of the transmitted document, must be
available for production as evidence.



ex.2
Personal Information Protection and Electronic
Documents Act, S.C. 2000, c. 5

4.7 Principle 7 Safeguards
Personal information shall be protected by security safeguards appropriate
to the sensitivity of the information.
4.7.3
The methods of protection should include
(a) physical measures, for example, locked filing cabinets and restricted
access to offices;
(b) organizational measures, for example, security clearances and limiting
access on a need-to-know basis; and
(c) technological measures, for example, the use of passwords and
encryption.
4.7.4
Organizations shall make their employees aware of the importance of
maintaining the confidentiality of personal information.

electronic document management
is different from paper
document
operations
document
functions


paper document security = safe locker
physical
solutions


electronic document security = documentation
administrative
solutions


ex: document evidence
1 document
itself
2
documentation
1.1 document functions
Confidentiality

Authentification

Non-repudiation

Disponibility

Integrity
examples of solutions
technical solution are available (as
encryption) (not the most important aspect)
always a balance between comfort versus security
always a balance between cost versus security
documentation is often required
norms may by used (as ISO)
human resources education
etc.




1.2 document operations
retention
destruction
transmission
transfer
custody
simple storage (ISP)
22. A service provider, acting as an intermediary, that
provides document storage services on a communication
network is not responsible for the activities engaged in
by a service user with the use of documents stored by
the service user or at the service user's request.

However, the service provider may incur responsibility,
particularly if, upon becoming aware that the documents
are being used for an illicit activity, or of circumstances
that make such a use apparent, the service provider does
not act promptly to block access to the documents or
otherwise prevent the pursuit of the activity.

custody
26. Anyone who places a technology-based document in the custody
of a service provider is required to inform the service provider
beforehand as to the privacy protection required by the document
according to the confidentiality of the information it contains, and as
to the persons who are authorized to access the document.

During the period the document is in the custody of the service
provider, the service provider is required to see to it that the agreed
technological means are in place to ensure its security and maintain
its integrity and, if applicable, protect its confidentiality and prevent
accessing by unauthorized persons. Similarly, the service provider
must ensure compliance with any other obligation provided for by law
as regards the retention of the document.

process of security
process of security

categorization of information WHAT
pluri-disciplinary approach HOW
identification of a person in charge
of the process WHO
place of servors WHERE
work in progress process
process of security


too much norms




as the car business in 1920
2. contract
document
manage-
ment
contract
liability privacy
internati
-onal law
property



Whats a contract?

A B


1386 CCQ. The exchange of consents is
accomplished by the express or tacit
manifestation of the will of a person to accept
an offer to contract made to him by another
person.

2 questions to deal with


1. content of the contract (obligations of
provider)

1. form of the contract (eContract)
2.1 very simple



just need 2 wills
1 content
that said
1. possible to negociate
2. possible to use correction of law (contract of
adhesion)
as abusive clause protection
contract is interpreted in favour of the person who
contracted the obligation (against the person who
stipulated it)
illegible or incomprehensible clause protection

main differences


free providers (impossible to negociate)


$$$ providers (sometimes, it may be possible)
main contractual questions
who is responsible?
which law is applicable?
what is the level of security?
who is the owner of data / software?
how customer use cloud services?
where are data?
how did we terminate the contract?
etc.

general
free
7 pages
Several documents by
reference (as privacy
policy, copyright,
complaint, etc.)
contract may be
changed by Amazon
with no specific notice

$$$$ / free
23 pages
several documents by
reference (as privacy
policy)
contract may be
changed by Amazon
with no specific notice
liability
law

state of California (art.
19)

state of Washington
(art. 14)
security







no mention
You agree that Google has
no responsibility or liability
for the deletion or failure to
store any Content and other
communications maintained
or transmitted by Google
services.
7.2. Security. We strive to
keep Your Content secure, but
cannot guarantee that we will
be successful at doing so,
given the nature of the
Internet. Accordingly, without
limitation to Section 4.3 above
and Section 11.5 below, you
acknowledge that you bear
sole responsibility for
adequate security, protection
and backup of Your Content
and Applications. We strongly
encourage you ...
ownership
Googles rights
Software
Marks
Advertisement
information
Your rights
Non-exclusive right and
license to use the object
code of its sofware
Data
Amazon properties:
Software
Marks
Platform
feedback
customer properties
License
Data
Some applications
permission








4.1 Permitted uses
generally

4.2 Restricted uses
generally
2 APPROPRIATE CONDUCT
You understand that all information, data,
text, software, music, sound, photographs,
graphics, video, messages or other
materials ("Content") are the sole
responsibility of the person from which
such Content originated. Google reserves
the right, but shall have no obligation, to
pre-screen, flag, filter, refuse, modify or
move any Content available via Google
services. You understand that by using
Google services you may be exposed to
Content that is offensive, indecent or
objectionable, and that you use Google
services at your own risk. For some
services, Google provides tools to filter out
adult sexual content, including our
SafeSearch preference settings
data location

no information in
contract but

for sure there are
some server farms in US

no information in
contract but

for sure there are
some server farms in US

PATRIOT Act
Providing Appropriate Tools Required to
Intercept and Obstruct Terrorism (2001)

enhance American authorities control ability
lack of transparency about the law application



some providers offer insurance that data are
not store outside a specific place

ex.: lawyer obligation (as British Columbia in
Canada) See http://www.lawsociety.bc.ca/publications_forms/rules/rules_part03.html#3-68
and more widely

25(1). The Member States shall provide that the
transfer to a third country of personal data which are
undergoing processing or are intended for processing
after transfer may take place only if, without prejudice
to compliance with the national provisions adopted
pursuant to the other provisions of this Directive, the
third country in question ensures an adequate level of
protection.

European directive (1995)
termination
Immediatly (for
Amazon) in some cases
(hacking, inappropriate
content, etc.)
5 or 15 days (after a
notice) (for Amazon) in
other cases (as payment
problem)
ou may discontinue your use
of Google services at any time.
You agree that Google may at
any time and for any reason,
including a period of account
inactivity, terminate your
access to Google services,
terminate the Terms, or
suspend or terminate your
account. In the event of
termination, your account will
be disabled and you may not
be granted access to Google
services
2.2 very simple too



just need 2 consents

So may be done via internet
2 form
consent is


1) communication


2) acceptance

1
2
2.1.1 communication

1399 CCQ

Consent may be given only in a free and
enlightened manner.

legibility



Contract = Information
but ...



At least 10 pathological
contractual practices
1 - readability







2 - dynamic
7. Privacy; Monitoring the Services
We are under no obligation to monitor the
services, but we may do so from time to time
and we may disclose information regarding
Users use of the Services for any reason and
at our sole discretion in order to satisfy
applicable laws, regulations, governmental
requests, or in order to operate and deliver
the Services in an effective manner, or to
otherwise protect us and our Users. We agree
to comply with the terms of our Privacy Policy
as set forth on our FAQ website, as it may be
amended from time to time.
3 - lenght



information = oxygen
Feldman v. Google (April 2007)
AdWords Agreement gave reasonable notice of its terms. In order to activate
an AdWords account, the user had to visit a webpage which displayed the
Agreement in a scrollable text box. () the text of the AdWords Agreement was
immediately visible to the user, as was a prominent admonition in boldface to
read the terms and conditions carefully, and with instruction to indicate assent if
the user agreed to the terms. That the user would have to scroll through the text
box of the Agreement to read it in its 14 entirety does not defeat notice because
there was sufficient notice of the Agreement itself and clicking Yes constituted
assent to all of the terms. The preamble, which was immediately visible, also
made clear that assent to the terms was binding. The Agreement was presented
in readable 12-point font. It was only seven paragraphs long not so long so as
to render scrolling down to view all of the terms inconvenient or impossible. A
printer-friendly, full-screen version was made readily available. The user had
ample time to review the document.
4 - hyperlinks

Linearity versus hyopertextuality
5 - wheres the e-contract ?
6 multiple Legal Documents
Copyright
Privacy
Cookies
Terms and Conditions of Sale
Terms of Use
Limited Warranty
Service Contracts
Hardware Technical Support Policy
Etc.
7 legal terminologies
THE SERVICES PROVIDED BY US ARE PROVIDED "AS IS." WE MAKE NO WARRANTY OF ANY KIND, EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO ANY
WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, OR ANY WARRANTY REGARDING THE RELIABILITY OR
SUITABILITY FOR A PARTICULAR PURPOSE OF ITS SERVICES. USER UNDERSTANDS AND ACKNOWLEDGES THAT WE EXERCISE NO CONTROL OVER THE NATURE,
CONTENT OR RELIABILITY OF THE INFORMATION AND/OR DATA PASSING THROUGH OUR NETWORK. NO ORAL OR WRITTEN INFORMATION OR ADVICE GIVEN BY US,
ITS DEALERS, AGENTS OR EMPLOYEES SHALL CREATE A WARRANTY AND USER MAY NOT RELY ON ANY SUCH INFORMATION OR ADVICE. WE MAKES NO WARRANTY
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, REGARDING THE QUALITY, ACCURACY OR VALIDITY OF THE INFORMATION AND/OR DATA RESIDING ON OR PASSING
THROUGH ANY NETWORK. USE OF ANY INFORMATION AND/OR DATA OBTAINED FROM OR THROUGH SERVICES PROVIDED BY US WILL BE AT USERS OWN RISK.
USER ACKNOWLEDGES THAT WE ARE NOT LIABLE FOR ANY ERRORS OR INTERRUPTION IN THE INSTALLATION PROCESS OR IN PROVIDING THE SERVICES, WHETHER
WITHIN OR OUTSIDE THE CONTROL OF US. UNDER NO CIRCUMSTANCES SHALL THE USER HOLD US OR ANY OF OUR AGENTS, CONTRACTORS OR REPRESENTATIVES
RESPONSIBLE FOR ANY FORM OF DAMAGES OR LOSSES (INCLUDING WITHOUT LIMITATION ANY DIRECT, INDIRECT, CONSEQUENTIAL OR INCIDENTAL DAMAGES OR
LOSSES) SUFFERED FROM, BUT NOT LIMITED TO ERRORS, DELAYS, LOSS OF INFORMATION, DELAYS IN THE INSTALLATION OR PROVISIONING PROCESS, OR
INTERRUPTIONS IN THE SERVICES CAUSED BY THE USER, US OR A THIRD PARTYS NEGLIGENCE, FAULT, MISCONDUCT OR FAILURE TO PERFORM. USER
UNDERSTANDS THAT TELECOMMUNICATION AND/OR NETWORK ACCESS SERVICES MAY BE TEMPORARILY UNAVAILABLE FOR SCHEDULED OR UNSCHEDULED
MAINTENANCE AND FOR OTHER REASONS WITHIN AND OUTSIDE OF THE DIRECT CONTROL OF US. UNDER NO CIRCUMSTANCES DO ANY SUCH ERRORS, DELAYS,
INTERRUPTIONS IN SERVICES OR LOSS OF INFORMATION NULLIFY OR MODIFY THESE TERMS AND CONDITIONS. WE RESERVE THE RIGHT TO REFUSE OR TERMINATE
SERVICES TO A USER AT ANY TIME WITHOUT CAUSE. THE INTERNET CONTAINS UNEDITED MATERIALS, WHICH MAY BE SEXUALLY EXPLICIT, OR MAY BE OFFENSIVE
TO YOU OR OTHERS ACCESSING THE SERVICES. WE HAVE NO CONTROL OVER SUCH MATERIALS AND ACCEPT NO RESPONSIBILITY FOR SUCH MATERIALS.
7 legal terminologies
8 non-legal titles
consumer contract
terms of Services
conditions of Use
conditions of Sale
notice
legal
waiver
licence
etc.
Privacy contract
privacy
confidentiality
FAQ
security
legal
waiver
licence
notice
etc.
9 abusives clauses
10 stupid clauses

DELL (INCLUDING DELLS PARENTS, AFFILIATES, OFFICERS,
DIRECTORS, EMPLOYEES OR AGENTS) DOES NOT ACCEPT
LIABILITY BEYOND THE REMEDIES SET FORTH HEREIN,
INCLUDING ANY LIABILITY FOR PRODUCTS NOT BEING
AVAILABLE FOR USE, LOST OR CORRUPTED DATA OR
SOFTWARE, PRODUCTS SOLD THROUGH DELLS SOFTWARE
AND PERIPHERALS DIVISION, OR THE PROVISION OF
SERVICES OR SUPPORT. DELL WILL NOT HAVE ANY LIABILITY
FOR ANY DAMAGES ARISING FROM THE USE OF THE
PRODUCTS IN ANY HIGH RISK ACTIVITY, INCLUDING, BUT NOT
LIMITED TO, THE OPERATION OF NUCLEAR FACILITIES,
AIRCRAFT NAVIGATION OR COMMUNICATION SYSTEMS, AIR
TRAFFIC CONTROL, MEDICAL SYSTEMS, LIFE SUPPORT OR
WEAPONS SYSTEMS. DELL WILL NOT BE LIABLE FOR LOST
PROFITS, LOSS OF BUSINESS, OR OTHER INCIDENTAL,
INDIRECT, CONSEQUENTIAL, SPECIAL OR PUNITIVE DAMAGES,
EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES,
OR FOR ANY CLAIM BY ANY THIRD PARTY EXCEPT AS
EXPRESSLY PROVIDED HEREIN.
10 stupid clauses



Do not use the ING DIRECT Web Site to communicate
to others, to post on the ING DIRECT Web Site, or
otherwise transmit to the ING DIRECT Web Site, any
materials, information, or communication that either
causes any harm to any person or that is illegal or
otherwise unlawful, including without limitation any
hateful, harassing, pornographic, obscene, profane,
defamatory, libellous, threatening materials which
constitutes or may encourage conduct that would be
considered, a criminal offence, give rise to civil liability,
promote the excessive, irresponsible or underage
consumption of alcohol, or otherwise violate any law or
regulation.

10 stupid clauses



The limited warranty set forth below is given by Canon
U.S.A., Inc. (Canon U.S.A.) in the United States or Canon
Canada Inc., (Canon Canada) in Canada with respect to the
Canon-brand PowerShot Digital Camera purchased with this
limited warranty, when purchased and used in the United
States or Canada.
10 stupid clauses


11. Governing Law

This Agreement is governed by the law of Sharps
Audio Visual.

some simple solutions

short
plain english
humanity
slow
visual
2.2.2 acceptance

1399 CCQ

Consent may be given only in a free
and enlightened manner.


A. shrink wrap consent

B. click wrap consent

C. browse wrap consent
1 - shrink wrap





ProCD (US - 1996)
King (Canada - 1989)
2 - click wrap dell case


dell computer c. union des consommateurs -
supreme court decision (July 2007)

contract is valid





Click 1
Click 2
Click 3
Click 4
3 - browse wrap

by using or signing up to use Netscape.com,
you signify that you agree to these terms. You
consent to the AOL Network Privacy Policy and
you agree to receive notices and terms from
us electronically. If you do not agree, do not
use Netscape.com.
3. liability
document
manage-
ment
contract
liability
privacy
internati
-onal law
property
bruce schneier



no liability = no security
civil law


liability =

damage + fault + link between both of them




but not too much liability too
2 sorts of providers

1 simple
storage
2
custody
116
liability
ISP (Internet Services Provider) (Hosting services)
Definition.
General exemption Regime

117
eBay Cases
April 2008 in France = Hermes v. eBay (see Manara
Comment french)
Not an editor
Not a ISP
In the middle = reinforced ISP liability
2000 in USA = Hendrickson c. eBay
VERO (Verified Rights Owner) application
No liability for ISP (under exception)

118
Tyffany c. eBay, (2008) (US)
119
liability
custody services

in which category are cloud computing
providers?
difficult to say

need to read the contract
$$$ or free may be a criteria
in both cases, need to identify the provider
diligence
4. privacy
document
manage-
ment
contract
liability
privacy
internati
-onal law
property
personal information definition

2(a) 'personal data' shall mean any information
relating to an identified or identifiable natural
person ('data subject'); an identifiable person is
one who can be identified, directly or indirectly,
in particular by reference to an identification
number or to one or more factors specific to his
physical, physiological, mental, economic,
cultural or social identity


European directive (1995)

Same in Switzerland

all information relating to an identified or
identifiable person.



Democracy means that if the doorbell rings in
the early hours, it is likely to be the milkman.








Winston Churchill
privacy =
expectations


difficult to really know


between phantasm and real fear

privacy may be seen as a question of control
provider
itself
public
institutions





R. v Patrick, [2009] 1 S.C.R. 579
129


[62] Nevertheless, until the garbage is placed at or within reach
of the lot line, the householder retains an element of control
over its disposition and cannot be said to have unequivocally
abandoned it, particularly if it is placed on a porch or in a garage
or within the immediate vicinity of the dwelling where the
principles set out in the perimeter cases such as Kokesch, Grant
and Wiley apply.

[63] () However, when the garbage is placed at the lot line for
collection, I believe the householder has sufficiently abandoned
his interest and control to eliminate any objectively reasonable
privacy interest.


R. v. Patrick, 2009 SCC 17



cloud computing is from web 2.0
high
expectations
low
expectations
british-columbia


She said she could no longer kayak, hike or
bicycle, but the defendant produced some of the
plaintiffs own photographs posted on her
Facebook page that showed her doing these
activities. (Bagasbas v. Atwal, 2009 BCSC 512)

Brisindi et STM (Rseau des autobus),
2010 QCCLP 4158





no one alleging his own turpitude is to be heard


satisfied
control may be by consent
limited
on 1 side



consent = best way to offer
information to individual
on the other side




consent = is the best way for using personal
information of individual
ex: facebook
137
ex: facebook
138




what are customers privacy expectations?
privacy


to be honest


i dont know!


to be honest


i dont know!




controlling personal information
is quite an illusion
information obligation
26. Anyone who places a technology-based document in the custody
of a service provider is required to inform the service provider
beforehand as to the privacy protection required by the document
according to the confidentiality of the information it contains, and as
to the persons who are authorized to access the document.

During the period the document is in the custody of the service
provider, the service provider is required to see to it that the agreed
technological means are in place to ensure its security and maintain
its integrity and, if applicable, protect its confidentiality and prevent
accessing by unauthorized persons. Similarly, the service provider
must ensure compliance with any other obligation provided for by law
as regards the retention of the document.

(custody in Qc)

information categorization




a question of risk management






but no accountability obligation yet
5. international law
document
manage-
ment
contract
liability privacy
internati
-onal law
property
first step
see applicable law clause in the contract

In most cloud computing contract

always the law of the provider (cheaper)

always the court of the provider (cheaper)

arbitration may be a good solution
second step
if no clause
see law applicable in your own country
in Switzerland law
Le contrat est rgi par le droit choisi par les
parties. (an act is governed by the law designated
in the act ) (art. 116)
A dfaut dlection de droit, le contrat est rgi par
le droit de lEtat avec lequel il prsente les liens
les plus troits. (country with which the act is
most closely connected) (art. 117)
third step



are you sure you want to go in court ?
6. property
document
manage-
ment
contract
liability privacy
internati
-onal law
property
quite simple for almost all situations

customer = owner of data
customer = user of software (license)
provider = owner of software
provider = custodian of data


but





data ownership may be compromise
bankruptcy of provider
data compatibility (difficult to migrate)
ex: facebook
non-exclusive license of the data owner with
provider
ex: facebook
ex: google



11.1 You retain copyright and any other rights you already
hold in Content which you submit, post or display on or through,
the Services. By submitting, posting or displaying the content
you give Google a perpetual, irrevocable, worldwide, royalty-
free, and non-exclusive license to reproduce, adapt, modify,
translate, publish, publicly perform, publicly display and
distribute any Content which you submit, post or display on or
through, the Services. This license is for the sole purpose of
enabling Google to display, distribute and promote the Services
and may be revoked for certain Services as defined in the
Additional Terms of those Services.
some data may be create by the provider
metadata or data mining produced by
provider on customers activities
may be confidential (if PI - privacy)
May be aggregated

conclusion
not so new
read your contract (even if they are quite long
and maybe boring)
write some internal audit to show your diligence
identify a person in charge of cloud computing
management
understand cloud computing is a work-in-
progress process
etc.
cloud computing law
vincent gautrais
professeur agrg /associate professor
facult de droit / faculty of law
universit de Montral /university of montreal

January 23/24th, 2011

chaire en droit de la scurit et des affaires lectroniques /
udm chair in e-Security and e-Business law
www.gautrais.com

Вам также может понравиться