|
|
xv | |
|
|
xvii | |
|
I Cloud Computing Essentials |
|
|
|
|
1 | (2) |
|
1 Cloud Technologies and Services |
|
|
3 | (15) |
|
|
|
1 What Is Cloud Computing? |
|
|
3 | (3) |
|
2 Cloud Computing Resources and Technologies |
|
|
6 | (7) |
|
3 Cloud Supply Chain: Key Concepts |
|
|
13 | (4) |
|
|
17 | (1) |
|
2 Control, Security, and Risk in the Cloud |
|
|
18 | (19) |
|
|
|
|
18 | (1) |
|
|
19 | (6) |
|
|
25 | (1) |
|
|
25 | (2) |
|
5 Control and Flexibility in Practice |
|
|
27 | (5) |
|
6 Cloud Services and Commercial Arrangements, Contractual Structures, and the IT Channel |
|
|
32 | (2) |
|
7 Insurance as a Tool for Managing Cloud Risks |
|
|
34 | (1) |
|
|
35 | (2) |
|
II Cloud Computing Transactions |
|
|
|
|
37 | (2) |
|
3 Standard Contracts for Cloud Services |
|
|
39 | (34) |
|
|
|
|
|
39 | (1) |
|
2 Classifying Cloud Services and Cloud Provider ToS Documents |
|
|
40 | (4) |
|
3 Categorizing and Analysing Terms |
|
|
44 | (20) |
|
|
64 | (7) |
|
|
71 | (2) |
|
4 Negotiated Contracts for Cloud Services |
|
|
73 | (35) |
|
|
|
|
|
73 | (1) |
|
|
74 | (1) |
|
3 Cloud Providers' Perspectives |
|
|
75 | (1) |
|
4 Cloud Users' Perspectives |
|
|
75 | (5) |
|
5 Cloud Contract Terms: Detailed Analysis |
|
|
80 | (24) |
|
|
104 | (4) |
|
5 Public Sector Cloud Contracts |
|
|
108 | (34) |
|
|
|
|
|
108 | (2) |
|
|
110 | (2) |
|
3 Which Cloud Computing Services? |
|
|
112 | (1) |
|
|
113 | (5) |
|
|
118 | (4) |
|
|
122 | (1) |
|
7 Gi Contractual Documents |
|
|
123 | (9) |
|
|
132 | (8) |
|
9 Making Contracts Cloud-appropriate? |
|
|
140 | (2) |
|
6 Ownership of Information in Clouds |
|
|
142 | (23) |
|
|
|
|
142 | (1) |
|
2 User Content Stored and Processed in the Cloud |
|
|
142 | (8) |
|
3 Information Generated in the Cloud by the Provider |
|
|
150 | (3) |
|
4 Using the Cloud to Distribute Content |
|
|
153 | (4) |
|
|
157 | (1) |
|
6 Problems of Infringing Content |
|
|
158 | (1) |
|
7 Collaboration in the Cloud |
|
|
159 | (1) |
|
8 IP Rights of Cloud Providers |
|
|
160 | (3) |
|
|
163 | (2) |
|
III Protection Of Personal Data In Clouds |
|
|
|
|
165 | (2) |
|
7 What is Regulated as Personal Data in Clouds? |
|
|
167 | (26) |
|
|
|
|
|
167 | (1) |
|
|
167 | (2) |
|
3 Anonymization and Pseudonymization |
|
|
169 | (9) |
|
|
178 | (4) |
|
5 Provider's Ability to Access Data |
|
|
182 | (3) |
|
|
185 | (4) |
|
|
189 | (4) |
|
8 Who is Responsible for Personal Data in Clouds? |
|
|
193 | (27) |
|
|
|
|
|
193 | (1) |
|
2 Controllers and Processors-General Concepts |
|
|
193 | (2) |
|
|
195 | (11) |
|
|
206 | (9) |
|
5 Three Proposals for Reform |
|
|
215 | (5) |
|
9 Which Law(s) Apply to Personal Data in Clouds? |
|
|
220 | (29) |
|
|
|
|
|
220 | (1) |
|
2 Jurisdiction, Applicable Law, and Data Protection Law |
|
|
220 | (10) |
|
3 Cloud Computing and the Long-arm Reach of EU Data Protection Laws |
|
|
230 | (13) |
|
4 Cloud Service Provider as Processor-Local Obligations |
|
|
243 | (1) |
|
5 An Alternative Approach: Targeting/Directing |
|
|
244 | (3) |
|
6 Conclusion and Recommendations |
|
|
247 | (2) |
|
Appendix---Practical Application---Use of EEA Data Centres |
|
|
249 | (30) |
|
10 How Do Restrictions on International Data Transfers Work in Clouds? |
|
|
254 | (25) |
|
|
|
|
254 | (1) |
|
2 Data Export Restriction |
|
|
254 | (3) |
|
3 What Is a `Transfer'? Who Makes the Transfer? |
|
|
257 | (3) |
|
4 Data Export Exceptions/Derogations |
|
|
260 | (2) |
|
5 Ways to Meet the Adequacy Requirement |
|
|
262 | (8) |
|
6 Possible Solutions for Cloud Computing |
|
|
270 | (5) |
|
|
275 | (4) |
|
Appendix---Practical Application of the Data Transfer Rules to Common Cloud Scenarios |
|
|
279 | (112) |
|
A Private Cloud (Self-hosted) |
|
|
280 | (1) |
|
|
280 | (3) |
|
IV Cloud Regulaton And Governance Introduction |
|
|
283 | (2) |
|
11 Law Enforcement Access to Data in Clouds |
|
|
285 | (26) |
|
|
|
285 | (2) |
|
2 Forensic Challenges in the Cloud |
|
|
287 | (2) |
|
|
289 | (2) |
|
|
291 | (6) |
|
5 International Cooperation |
|
|
297 | (2) |
|
6 European Criminal Procedure |
|
|
299 | (2) |
|
7 LEA-Service Provider Relations |
|
|
301 | (4) |
|
8 Law Enforcement and Data Protection |
|
|
305 | (3) |
|
|
308 | (1) |
|
|
309 | (2) |
|
12 Facilitating Competition in the Clouds |
|
|
311 | (20) |
|
|
Laise Da Correggio Luciano |
|
|
|
311 | (1) |
|
2 Competition in the Cloud Computing Sector |
|
|
312 | (2) |
|
3 Mechanisms within Competition Law |
|
|
314 | (6) |
|
|
320 | (8) |
|
5 Contract and Consumer Protection Law |
|
|
328 | (1) |
|
|
329 | (2) |
|
13 Consumer Protection in Cloud Environments |
|
|
331 | (31) |
|
|
|
|
331 | (2) |
|
2 The Consumer and the Cloud |
|
|
333 | (3) |
|
3 Ex ante Consumer Protection Law |
|
|
336 | (10) |
|
4 Ex post Consumer Protection Law |
|
|
346 | (6) |
|
5 Standard Terms of Service: Issues for the Consumer |
|
|
352 | (8) |
|
|
360 | (2) |
|
14 Cloud Governance: The Way Forward |
|
|
362 | (29) |
|
|
|
362 | (1) |
|
2 Governance, Legitimacy, and Effectiveness |
|
|
363 | (13) |
|
3 The Route to Co-regulation |
|
|
376 | (2) |
|
|
378 | (11) |
|
|
389 | (2) |
Table of Cases |
|
391 | (3) |
Table of UK Statutes |
|
394 | (1) |
Table of UK Statutory Instruments |
|
395 | (1) |
Table of International and European Legislation |
|
396 | (5) |
Table of National Legislation |
|
401 | (2) |
Index |
|
403 | |