Editorials       Cover Story   Letters
 Subscribe Now  Contact Us
Book Reviews
Case Study
Constitution of India
Cover Story
Crime File
Cyber Space
Good Living
Harvard Law School
Health & Fitness
Permanent Imprint Leading
Know Your Judge
The Law and The Celebrity
Legal Articles
Legal Events
Law for Other Species
Law School Confidential
Legal Scanner
Legal Trotternama
Media Scan
Reasoning The Reasons
Street Lawyer
Study Abroad
Supreme Court Cases
Thinkers & Theory
Top Law Schools
Universal Law of Success
--------------- Print Magazine --------------
  May 2016
  April 2016

Cloud Computing ‘A Security Worry’

A rise in the popularity of "cloud computing" systems could pose new security threats and a legal minefield for law enforcement agencies, a technology expert has warned.

Cloud computing allows users to outsource their computer software and storage requirements over networks to IT specialists, reducing costs and simplifying the use of the system. But such systems have been identified as a potential problem for law enforcement, with questions raised over issues of jurisdiction, privacy and security.

Edith Cowan University security and network technology senior lecturer Andrew Woodward said police might have trouble locating and accessing cloud computer servers, securing co-operation from other jurisdictions and recovering data if a cloud system failed. There were also potential privacy concerns and he believed it would pose problems in the future because the popularity of cloud systems was on the rise.

"The Computer Crime Act in WA is quite comprehensive but that only applies to WA, it's not going to allow you to step on to foreign soil," Dr. Woodward said.

WA Police specialist crime portfolio commander Paul Zanetti said offsite storage in other jurisdictions raised questions including about the integrity of the data and privacy and meant investigators needed to deal with other jurisdictions and different laws when locating evidence.

"Our computer crime squad regularly partners with industry groups, universities and law enforcement agencies nationally and internationally to develop strategies to deal with issues such as this, and in reality, whenever technology creates challenges for law enforcement, it also tends to give investigators new tools and methods to investigate and prosecute criminal activity."

An Australian Institute of Criminology report, released in October 2010, highlighted concerns over virtual eavesdropping, data theft, Trojan-style attacks whereby keystrokes were recorded, attacks on websites designed to cripple legitimate websites and systems, espionage and potential threats to national security.

Report author Kim-Kwang Raymond Choo said cyber criminals might also establish "rogue clouds" that could be used to store and distribute criminal data, for example, child pornography.

Sanjay Gade

(Print Version)
Rs. 600/- per year
(Registered Post & Courier)

New Releases by UNIVERSAL's

     To avail discounts and for more details write to us at marketing.in@lexisnexis.com

Home     :      About Us     :      Subscribe     :      Advertise With Us    :       Privacy     :      Copyright     :      Feedback     :      Contact Us

Copyright © Universal Book Traders. All material on this site is subject to copyright. All rights reserved.
No part of this material may be reproduced, transmitted, framed or stored in a retrieval system for public or private
use without the written permission of the publisher. This site is developed and maintained by Universal Legal Infosolutions.
Powered by: Universal Book Traders