Click here to close now.




















Welcome!

@CloudExpo Authors: Peter Silva, Esmeralda Swartz, Elizabeth White, Liz McMillan, Pete Waterhouse

Related Topics: @CloudExpo

@CloudExpo: Blog Feed Post

Cloud Privacy By Design and E-Discovery as a Service

Digital-Economy.ca - Canada isn’t really any further behind the rest of the world

As the Government’s own Digital Advantage paper recommends, the key to addressing Canada’s innovation gap is for CIO’s to adopt more new technologies like Cloud Computing, and the public sector can ignite this trend by leading the way with their own adoption.

Don Drummond makes a similar recommendation in his report. Recommendation 16-10 says: The government should shift its service delivery of information and information technology (I&IT) from in-house to external sources, where feasible.

However as this Telus press release and study reports, the reality is that in Canada is still in the early stages of there being very little external Cloud adoption, principly due to data security concerns.

Cloud Privacy Innovations

The critical point to note is that Canada isn’t really any further behind the rest of the world. Although there is significant press about the USA and UK in particular, and yes they are at least two years further down the track, this is a looong track and it’s only just started. Cloud is so massive, and so long term, opportunities still abound.

Indeed the central theme of this article is that Canada is equipped with some uniquely exciting capabilities that could make our vision of the country becoming a world leader in this field a reality, most notably the concept of ‘Cloud Privacy By Design’.

As shown here this is one of the foundations of Cloud Best Practices we recommend for security and privacy protections, and the critical point with innovation programs in mind is that this is an entirely embryonic green field of opportunity, a wealth of new technologies can and will be released to implement these practices.

This is powerfully described by the authors via this piece Privacy, Trust and Innovation. This describes how these practices can underpin Digital Economy innovations, and what role they might play in Cloud Computing, as well as general Internet and IT scenarios such as social networks, mapping technologies, Location Based Services, e-Health and the Internet of Things.

The article makes a number of recommendations for Canada to pioneer Digital Economy innovations:

  • Taking a holistic view and building privacy in from the start
  • Funding research to support digital literacy programs
  • Funding privacy positive research and development
  • Targeting SMEs that are technology innovators
  • Providing tools to help SMEs better understand privacy
  • Making privacy literacy an integral component of digital citizenship

One example of innovations in this field includes the industry organization Kantara.

As this Privacy presentation explains, Kantara provides all the required mechanisms to implement these best practices across Cloud providers, meeting all the privacy and technical requirements needed to ensure it is suitable for e-Government scenarios.

EDaaS : E-Discovery as a Service

These innovations could then enable a portfolio of new Cloud services ideal for government.

As the Telus press release describes, the key fact is really this one:

87 per cent of Canadian business and IT leaders have significant concerns about public cloud’s ability to handle data in compliance with regulations and legislation.

The step that will unleash the dam of Cloud adoption will be the ability to rate and certify Cloud providers in line with these best practices, in short to be able to prove this compliance.

In their Reach for the Cloud analysis, the Privacy Commissioner of Canada says that:

“it is also possible that the Government of Canada might create a “private cloud” infrastructure internally to facilitate information sharing, or even that some or all government institutions might make use of a cloud infrastructure for data processing or storage.”

Not only do Cloud providers need to be able to implement secure Cloud environments, they’ll need to be able to prove how secure they are, in line with a set of industry guidelines.

Being able to do so will provide a foundation not only for the legal compliance of the environment, but for new services that can make use of this capability, most notably ‘EDaaS’ : E-Discovery as a Service. This refers to “Records Management in the Cloud”, where record keeping requirements and best practices can be applied across Cloud environments.

Fundamentally this is about audit and compliance, and is a massive global opportunity. President Obama recently declared the ‘Managing Government Records‘ initiative , to better use Cloud technologies to perform Information Management and achieve Open Government. Canada also recently announced a similar initiative, to build a ‘GC Docs’ portal that publishes all of their records.

Conclusion

In this blog the Privacy team again repeats the point about Government leading the way in exploiting this opportunity as a means of Canada pioneering Digital Economy leadership:

We’ve written previously about the need to reform the Privacy Act, but we think the federal government can go even further in being a model user of technology

They refer to how the USA Government is moving ahead with building the required Identity authentication foundations into their e-Government strategies, adopting the NSTIC program.

NIST, the US Government organization who is leading this also spearheads the definition of Cloud computing overall, and also defined the requirements for these managed services for E-DaaS, described in this FAA E-Discovery Business Use Case (11-page PDF).

This provides the specifications for how Cloud providers can implement E-DaaS, so in combination with the Kantara methods, NSTIC procedures and so forth, there is a uniquely opportunity to be first to market with what will be the floodgate-opening managed services.

Canada’s unique opportunity is to provide the intellectual property that acts as the key to open this lock…

More Stories By Cloud Best Practices Network

The Cloud Best Practices Network is an expert community of leading Cloud pioneers. Follow our best practice blogs at http://CloudBestPractices.net

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@CloudExpo Stories
Any Ops team trying to support a company in today’s cloud-connected world knows that a new way of thinking is required – one just as dramatic than the shift from Ops to DevOps. The diversity of modern operations requires teams to focus their impact on breadth vs. depth. In his session at DevOps Summit, Adam Serediuk, Director of Operations at xMatters, Inc., will discuss the strategic requirements of evolving from Ops to DevOps, and why modern Operations has begun leveraging the “NoOps” approa...
In today's digital world, change is the one constant. Disruptive innovations like cloud, mobility, social media, and the Internet of Things have reshaped the market and set new standards in customer expectations. To remain competitive, businesses must tap the potential of emerging technologies and markets through the rapid release of new products and services. However, the rigid and siloed structures of traditional IT platforms and processes are slowing them down – resulting in lengthy delivery ...
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, will provide the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” uses open source attack tools that are free and available for download by anybody. Attendees will learn where to find and how to operate these tools for the purpose of testing their own IT infrastructu...
SYS-CON Events announced today that IceWarp will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IceWarp, the leader of cloud and on-premise messaging, delivers secured email, chat, documents, conferencing and collaboration to today's mobile workforce, all in one unified interface
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
SYS-CON Events announced today that G2G3 will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based on a collective appreciation for user experience, design, and technology, G2G3 is uniquely qualified and motivated to redefine how organizations and people engage in an increasingly digital world.
The Internet of Things (IoT) is about the digitization of physical assets including sensors, devices, machines, gateways, and the network. It creates possibilities for significant value creation and new revenue generating business models via data democratization and ubiquitous analytics across IoT networks. The explosion of data in all forms in IoT requires a more robust and broader lens in order to enable smarter timely actions and better outcomes. Business operations become the key driver of I...
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
SYS-CON Events announced today that Micron Technology, Inc., a global leader in advanced semiconductor systems, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Micron’s broad portfolio of high-performance memory technologies – including DRAM, NAND and NOR Flash – is the basis for solid state drives, modules, multichip packages and other system solutions. Backed by more than 35 years of tech...
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
IBM’s Blue Box Cloud, powered by OpenStack, is now available in any of IBM’s globally integrated cloud data centers running SoftLayer infrastructure. Less than 90 days after its acquisition of Blue Box, IBM has integrated its Blue Box Cloud Dedicated private-cloud-as-a-service into its broader portfolio of OpenStack® based solutions. The announcement, made today at the OpenStack Silicon Valley event, further highlights IBM’s continued support to deliver OpenStack solutions across all cloud depl...
Red Hat is investing in Tesora, the number one contributor to OpenStack Trove Database as a Service (DBaaS) also ranked among the top 20 companies contributing to OpenStack overall. Tesora, the company bringing OpenStack Trove Database as a Service (DBaaS) to the enterprise, has announced that Red Hat and others have invested in the company as a part of Tesora's latest funding round. The funding agreement expands on the ongoing collaboration between Tesora and Red Hat, which dates back to Febr...
Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is designed for their business. In 2015, organizations such as United Airlines, Sony...
U.S. companies are desperately trying to recruit and hire skilled software engineers and developers, but there is simply not enough quality talent to go around. Tiempo Development is a nearshore software development company. Our headquarters are in AZ, but we are a pioneer and leader in outsourcing to Mexico, based on our three software development centers there. We have a proven process and we are experts at providing our customers with powerful solutions. We transform ideas into reality.
With the proliferation of connected devices underpinning new Internet of Things systems, Brandon Schulz, Director of Luxoft IoT – Retail, will be looking at the transformation of the retail customer experience in brick and mortar stores in his session at @ThingsExpo. Questions he will address include: Will beacons drop to the wayside like QR codes, or be a proximity-based profit driver? How will the customer experience change in stores of all types when everything can be instrumented and a...
SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies leverage disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advance...
Akana has announced the availability of the new Akana Healthcare Solution. The API-driven solution helps healthcare organizations accelerate their transition to being secure, digitally interoperable businesses. It leverages the Health Level Seven International Fast Healthcare Interoperability Resources (HL7 FHIR) standard to enable broader business use of medical data. Akana developed the Healthcare Solution in response to healthcare businesses that want to increase electronic, multi-device acce...
SmartBear Software has updated its API tools, ServiceV for API service virtualization and LoadUI NG for API load testing, to accelerate development and testing processes in Agile teams. Updates to ServiceV enable software teams to rapidly build advanced mocks from real-time API traffic and quickly switch between virtualized “mock” services and actual APIs during diagnostic, load or integration testing in the continuous delivery lifecycle.
“Threats are always evolving and the days of ‘set it and forget it’ malware and virus scanners are over if you want to keep your business information secure,” explained Abel Sussman, Director of Federal Services at Coalfire, in this exclusive Q&A with Cloud Expo Conference Chair Roger Strukhoff. Cloud Computing Journal: Security threats seem so widespread and diverse that it seems companies need a framework before they tackle individual issues. To what degree do you take this point of view?...