The Proceedings of the International Conference on Cloud Security and Management - ICCSM 2013

Page 64

Virginia Greiman and Barry Unger

13. Conclusion The time for a global legal framework for cloud computing has definitely arrived. The present legal and regulatory landscape around cloud computing is in a flux. There are new laws being proposed that could change the responsibilities of both cloud computing users and providers. Innovation is not only required in the cloud, but in the laws that will protect cloud providers and users from unwanted storms and unwelcome intruders. This paper explored and delineated where frameworks are needed and the emerging legal issues. The next step is to develop an international framework based on minimally acceptable standards, and where feasible enshrine these in international treaties, and only from there move to defining what must still be negotiated on an individual country basis or through contractual arrangements. Cloud computing that employs a hybrid, community or public cloud model is today rapidly creating the possibility for amazing innovations and better services to consumers and customers, but also creates new dynamics in the relationship between an organization and its information, thus requiring a well-planned comprehensive framework that will remove uncertainty and foster the advancement of an innovative and prosperous partnership in the cloud.

References Bederman, D.J. (2010) International Law Frameworks, 3rd ed., Foundation Press, New York.

Brenner, S.W. (2005) “Distributed Security: Moving Away from Reactive Law Enforcement”, 9 Int’l J. Comm. L & Pol’y 11.

Brenner, S.W. and Koops, B. (2004) “Approaches to Cybercrime Jurisdiction”, Journal of High Technology Law, 4 J. High Tech. L. 1, 2-4. Cade, N.W. (2012) “Note: An Adaptive Approach for an Evolving Crime: The Case for an International Cyber Court and Penal Code”, 37 Brooklyn J. Int’l L. 1139, pp. 1166-1168. Crook, J.R. (2008) “Contemporary Practice of the United States Relating to International Law: U.S. Views on Norms and Structures for Internet Governance”, The American Society of International Law, American Journal of International Law, 102 A.J.I.L. 648, 650. de Hert, P. & Kopcheva, M. (2011) “International Mutual Legal Assistance in Criminal Law Made Redundant: A Comment on the Belgian Yahoo! Case”, Computer Law and Security Review, Volume 27, Issue 3, June, pp. 291-297. Downing, R. W. (2005) “Shoring up the Weakest Link: What Lawmakers around the World Need to Consider in Developing Comprehensive Laws to Combat Cybercrime”, 43 Colum. J. Transnat’l L. 705, 716-19. Gable, K. A. (2010) “Cyber-Apocalypse Now: Securing The Internet Against Cyberterrorism and Using Universal Jurisdiction as a Deterrent”, 43 Vand. J. Transnat’l L. 57, 60-66. Geelan, J. (2009) Twenty-one experts define cloud computing, January 24, Cloud-Expo, SYS-CON Media, Inc. Goldsmith, J. L. (1998) Against Cyberanarchy, 65 U. Chi. L. Rev. 1199. Goldsmith, J.L. and Posner, E.A. (2005) The Limits of International Law, Oxford University Press, New York. Kleindienst, K., Coughlin, T. M., and Paswuarella, J.K. (2009) “Computer Crimes”, American Criminal Law Review, 46 Am. Crim. L. Rev. 315, 350. Lessig, Lawrence (1995) The Path of Cyberlaw, 104 Yale L.J. 1743, 1743-45. Moses, L.B. (2007) “Recurring Dilemmas: The Law’s Race to Keep up with Technological Change”, 7 U. Ill. J.L. Tech. & Policy 239, 241-243. Narayanan, V. (2012) “Harnessing the Cloud: International Law Implications of Cloud-Computing”, 12 Chi. J. Int’l L. 783, Winter, Chicago Journal of International Law, The University of Chicago, pp. 806-809. (NCSL) National Conference of State Legislators (2012) State Security Breach Notification Laws, August 20, Denver, CO. Perry, S.W., (2006) Bureau of Justice Statistics, DOJ, National Survey of Prosecutors. Rustad, M. (2009) Internet Law in a Nutshell, Thomson Reuters, St. Paul, MN. Schjølberg, S. and Hubbard, A.M. (2005) Harmonizing National Legal Approaches on Cybercrime, International Telecommunications Union, Geneva. Shackelford, S. (2009) “From Nuclear War to Net War: Analogizing Cyber Attacks in International Law”, 27 Berkeley J. Int’l L. 192, 251. U.S. v. Gorshkov, 2001 WL 1024026 at 1 (W.D. WA May 23, 2001). Zagaris, B. (2009) “European Council Develops Cyber Patrols, Internet Investigation Teams and Other Initiatives Against Cyber Crime”, International Enforcement Law Reporter, Cybercrime; Vol. 25, No. 3.

51


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.