{"id":16600,"date":"2015-04-29T10:57:09","date_gmt":"2015-04-29T10:57:09","guid":{"rendered":"https:\/\/www.legalgeek.co\/?p=16600"},"modified":"2015-04-29T10:57:09","modified_gmt":"2015-04-29T10:57:09","slug":"cloud-computing-and-privacy-issues","status":"publish","type":"post","link":"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/","title":{"rendered":"Cloud Computing and Privacy Issues &#8211; Salar Atrizadeh discusses"},"content":{"rendered":"<p>In general, online privacy concerns fall under two categories: First, corporate privacy. Second, personal privacy. \u00a0\u00a0Corporate privacy is concerned with the protection of corporate data from retrieval or interception by unauthorized parties. \u00a0So, security is important for protection of trade secrets, proprietary information, and privileged communications. \u00a0The failure to maintain confidentiality can result in a loss of \u201ctrade secret\u201d status pursuant to California Civil Code \u00a7\u00a7 3426 et seq.<\/p>\n<p>Furthermore, the recent trends in outsourcing have increased the risks associated with \u201ceconomic espionage.\u201d \u00a0In fact, businesses should be cautious when transferring proprietary technology to overseas partners because foreign governments sponsor theft. \u00a0The applicable statute for theft of trade secrets and economic espionage is 18 U.S.C. \u00a7\u00a7 1831 et seq.<\/p>\n<p>In order to protect corporate privacy it\u2019s best to follow these steps: (1) Identify and label confidential information; (2) Restrict access to confidential information; (3) Use encryption; (4) Use firewall and secure username\/password; (5) Use software that detects trade secret theft; (6) Include warnings in privileged correspondence; (7) Provide computers without hard drives; (8) Prohibit use of removable storage (e.g., flash drives); (9) Audit employee computers; (10) Prohibit and monitor external web-based email services; (11) Execute Confidentiality and Non-disclosure Agreements; and (12) Execute Computer-Use Policies.<\/p>\n<p>In today\u2019s world, cloud computing is risky because you can\u2019t secure its perimeter. \u00a0For example, state or federal agencies must comply with regulatory statutes (e.g., HIPAA, Sarbanes\u2013Oxley Act). The National Institute of Standards and Technology has compared the adoption of cloud computing to wireless technology. \u00a0In recent years, organizations have learned how to protect wireless data, so they\u2019ll probably do the same with cloud computing. \u00a0\u00a0You should bear in mind that privacy rights can be waived by contract and privacy expectations may be negated by express policies. \u00a0So, a company&#8217;s policies (whether formal or implied) may create a reasonable expectation of privacy in electronic communications. \u00a0In general, users have reasonable expectations of privacy in personal email contents and text messages.<\/p>\n<h2>What is Cloud Computing?<\/h2>\n<p>Cloud computing is a global technological infrastructure, where user of a computer accesses and uses software and data located outside of a digital device. \u00a0The typical scenario is that a user connects to external devices thru an Internet connection, but has no knowledge of the nature or location of the server on which the data and software are located. \u00a0In essence, this anonymous, external, and often unidentifiable interaction is known as \u201ccloud computing\u201d or simply \u201cthe Cloud.\u201d \u00a0\u00a0There are three basic types of cloud services. \u00a0First, it\u2019s Infrastructure as a Service (IaaS). \u00a0Second, it\u2019s Platform as a Service (PaaS). \u00a0Third, it\u2019s Software as a Service (SaaS). \u00a0IaaS seeks to obviate the need for customers to have their own data centers. \u00a0The provider sells access to web storage space, servers, and internet connections. The provider owns and maintains the hardware and customers rent space according to their needs. The customer maintains control of software environment, but not over equipment.<\/p>\n<p>PaaS provides a place for developers to create and publish new web applications stored on provider\u2019s servers. \u00a0The customers use the Internet to access the platform and create applications using the provider&#8217;s API, web portal, or gateway software. \u00a0\u00a0In fact, SaaS is the most common service. \u00a0SaaS applications provide the function of software that would normally have been installed and run on the user&#8217;s desktop. \u00a0The application is stored on the service provider&#8217;s servers and runs through the user&#8217;s web browser over the Internet. \u00a0Examples include Gmail, Facebook, and YouTube.<\/p>\n<p>At our law firm, we assist clients in legal issues related to internet, technology, and digital currencies. You may contact us in order to setup an initial consultation.<\/p>\n<h4><b>My Biography<\/b>:<\/h4>\n<h5><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium wp-image-16603\" src=\"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2015\/04\/Salar-Atrizadeh-3-210x300.jpg\" alt=\"Salar Atrizadeh (3)\" width=\"210\" height=\"300\" \/><\/h5>\n<div>\n<p>Salar Atrizadeh, Esq. is the principal and founder of the Law Offices of Salar Atrizadeh. He is licensed to practice law in the State of California, District of Columbia, and the United States District and Bankruptcy Courts. \u00a0He has an extensive background in technology and holds a bachelor&#8217;s of science degree in Computer Information Systems with a minor in Database Management Systems.<\/p>\n<div>Mr. Atrizadeh has conducted seminars regarding online privacy, cloud computing, cybersecurity, crowdfunding, digital currencies (e.g., Bitcoin, Litecoin, Worldcoin), cyber piracy, internet sales tax laws, search engine privacy, electronic discovery, and online banking fraud before legal and non-legal organizations, including, but not limited to, the State Bar of California, State Bar of New Mexico, University of Tulsa-Oklahoma, NextSpace, Rotary International, Institute of Internal Auditors, IEEE, and various chambers of commerce. In addition, he has conducted presentations before educational institutions on the topics of cyberharassment, cyberstalking and cyberbullying.<\/div>\n<div><\/div>\n<div>For more info:\u00a0<a href=\"http:\/\/www.atrizadeh.com\/\" target=\"_blank\" rel=\"noopener\">www.atrizadeh.com<\/a>\u00a0or\u00a0please contact Salar Atrizadeh;\u00a0info@atrizadeh.com<\/div>\n<div><\/div>\n<div>\n<p style=\"text-align: center;\"><em>From time-to-time we have experts, such as\u00a0Salar Atrizadeh, contribute\u00a0on LegalGeek.co.\u00a0<\/em><em>The views, opinions and positions expressed within these posts are those of the author alone and do not represent those of LegalGeek.co. The accuracy, completeness and validity of any statements made within this article are not guaranteed. We accept no liability for any errors, omissions or representations. The copyright of this content belongs to the author and any liability with regards to infringement of intellectual property rights remains with them.<\/em><\/p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In general, online privacy concerns fall under two categories: First, corporate privacy. Second, personal privacy. \u00a0\u00a0Corporate privacy is concerned with the protection of corporate data from retrieval or interception by unauthorized parties. \u00a0So, security is important for protection of trade secrets, proprietary information, and privileged communications. \u00a0The failure to maintain confidentiality can result in a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[20,21],"tags":[],"class_list":["post-16600","post","type-post","status-publish","format-standard","hentry","category-news","category-read"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cloud Computing and Privacy Issues<\/title>\n<meta name=\"description\" content=\"In general, online privacy concerns fall under two categories: First, corporate privacy. Second, personal privacy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cloud Computing and Privacy Issues\" \/>\n<meta property=\"og:description\" content=\"In general, online privacy concerns fall under two categories: First, corporate privacy. Second, personal privacy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/\" \/>\n<meta property=\"og:site_name\" content=\"Legal Geek\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/legalgeekco\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-29T10:57:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2015\/04\/Salar-Atrizadeh-3-210x300.jpg\" \/>\n<meta name=\"author\" content=\"Legal Geek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wearelegalgeek\" \/>\n<meta name=\"twitter:site\" content=\"@wearelegalgeek\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Legal Geek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/\"},\"author\":{\"name\":\"Legal Geek\",\"@id\":\"https:\/\/www.legalgeek.co\/#\/schema\/person\/2998cc5f819a0ded226c067a6d98e53b\"},\"headline\":\"Cloud Computing and Privacy Issues &#8211; Salar Atrizadeh discusses\",\"datePublished\":\"2015-04-29T10:57:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/\"},\"wordCount\":867,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.legalgeek.co\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2015\/04\/Salar-Atrizadeh-3-210x300.jpg\",\"articleSection\":[\"News\",\"Read\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/\",\"url\":\"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/\",\"name\":\"Cloud Computing and Privacy Issues\",\"isPartOf\":{\"@id\":\"https:\/\/www.legalgeek.co\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2015\/04\/Salar-Atrizadeh-3-210x300.jpg\",\"datePublished\":\"2015-04-29T10:57:09+00:00\",\"description\":\"In general, online privacy concerns fall under two categories: First, corporate privacy. Second, personal privacy.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/#primaryimage\",\"url\":\"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2015\/04\/Salar-Atrizadeh-3-210x300.jpg\",\"contentUrl\":\"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2015\/04\/Salar-Atrizadeh-3-210x300.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.legalgeek.co\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Computing and Privacy Issues &#8211; Salar Atrizadeh discusses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.legalgeek.co\/#website\",\"url\":\"https:\/\/www.legalgeek.co\/\",\"name\":\"Legal Geek\",\"description\":\"Legal Geek organises legal technology conferences around the world.\",\"publisher\":{\"@id\":\"https:\/\/www.legalgeek.co\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.legalgeek.co\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.legalgeek.co\/#organization\",\"name\":\"Legal Geek\",\"url\":\"https:\/\/www.legalgeek.co\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.legalgeek.co\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2023\/02\/Legal-Geek-Hi-Res-Black-on-Transparent-1.png\",\"contentUrl\":\"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2023\/02\/Legal-Geek-Hi-Res-Black-on-Transparent-1.png\",\"width\":2550,\"height\":1967,\"caption\":\"Legal Geek\"},\"image\":{\"@id\":\"https:\/\/www.legalgeek.co\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/legalgeekco\/\",\"https:\/\/x.com\/wearelegalgeek\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.legalgeek.co\/#\/schema\/person\/2998cc5f819a0ded226c067a6d98e53b\",\"name\":\"Legal Geek\",\"sameAs\":[\"https:\/\/legalgeek.co\"],\"url\":\"https:\/\/www.legalgeek.co\/author\/lovelegalinfo52\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloud Computing and Privacy Issues","description":"In general, online privacy concerns fall under two categories: First, corporate privacy. Second, personal privacy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/","og_locale":"en_US","og_type":"article","og_title":"Cloud Computing and Privacy Issues","og_description":"In general, online privacy concerns fall under two categories: First, corporate privacy. Second, personal privacy.","og_url":"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/","og_site_name":"Legal Geek","article_publisher":"https:\/\/www.facebook.com\/legalgeekco\/","article_published_time":"2015-04-29T10:57:09+00:00","og_image":[{"url":"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2015\/04\/Salar-Atrizadeh-3-210x300.jpg","type":"","width":"","height":""}],"author":"Legal Geek","twitter_card":"summary_large_image","twitter_creator":"@wearelegalgeek","twitter_site":"@wearelegalgeek","twitter_misc":{"Written by":"Legal Geek","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/#article","isPartOf":{"@id":"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/"},"author":{"name":"Legal Geek","@id":"https:\/\/www.legalgeek.co\/#\/schema\/person\/2998cc5f819a0ded226c067a6d98e53b"},"headline":"Cloud Computing and Privacy Issues &#8211; Salar Atrizadeh discusses","datePublished":"2015-04-29T10:57:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/"},"wordCount":867,"commentCount":0,"publisher":{"@id":"https:\/\/www.legalgeek.co\/#organization"},"image":{"@id":"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/#primaryimage"},"thumbnailUrl":"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2015\/04\/Salar-Atrizadeh-3-210x300.jpg","articleSection":["News","Read"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/","url":"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/","name":"Cloud Computing and Privacy Issues","isPartOf":{"@id":"https:\/\/www.legalgeek.co\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/#primaryimage"},"image":{"@id":"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/#primaryimage"},"thumbnailUrl":"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2015\/04\/Salar-Atrizadeh-3-210x300.jpg","datePublished":"2015-04-29T10:57:09+00:00","description":"In general, online privacy concerns fall under two categories: First, corporate privacy. Second, personal privacy.","breadcrumb":{"@id":"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/#primaryimage","url":"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2015\/04\/Salar-Atrizadeh-3-210x300.jpg","contentUrl":"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2015\/04\/Salar-Atrizadeh-3-210x300.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.legalgeek.co\/cloud-computing-and-privacy-issues\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.legalgeek.co\/"},{"@type":"ListItem","position":2,"name":"Cloud Computing and Privacy Issues &#8211; Salar Atrizadeh discusses"}]},{"@type":"WebSite","@id":"https:\/\/www.legalgeek.co\/#website","url":"https:\/\/www.legalgeek.co\/","name":"Legal Geek","description":"Legal Geek organises legal technology conferences around the world.","publisher":{"@id":"https:\/\/www.legalgeek.co\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.legalgeek.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.legalgeek.co\/#organization","name":"Legal Geek","url":"https:\/\/www.legalgeek.co\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.legalgeek.co\/#\/schema\/logo\/image\/","url":"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2023\/02\/Legal-Geek-Hi-Res-Black-on-Transparent-1.png","contentUrl":"https:\/\/www.legalgeek.co\/wp-content\/uploads\/2023\/02\/Legal-Geek-Hi-Res-Black-on-Transparent-1.png","width":2550,"height":1967,"caption":"Legal Geek"},"image":{"@id":"https:\/\/www.legalgeek.co\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/legalgeekco\/","https:\/\/x.com\/wearelegalgeek"]},{"@type":"Person","@id":"https:\/\/www.legalgeek.co\/#\/schema\/person\/2998cc5f819a0ded226c067a6d98e53b","name":"Legal Geek","sameAs":["https:\/\/legalgeek.co"],"url":"https:\/\/www.legalgeek.co\/author\/lovelegalinfo52\/"}]}},"_links":{"self":[{"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/posts\/16600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/comments?post=16600"}],"version-history":[{"count":0,"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/posts\/16600\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/media?parent=16600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/categories?post=16600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.legalgeek.co\/wp-json\/wp\/v2\/tags?post=16600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}