In the Cloud, Your Data Can Get Caught Up in Legal Actions

We all know that the data we rely on to run our businesses can be subject to subpoena and other government actions. Such actions create additional risks when that data is in the cloud.

By Thomas J. Trappler
Tue, March 20, 2012

Computerworld — We all know that the data we rely on to run our businesses can be subject to subpoena and other government actions. Such actions create additional risks when that data is in the cloud .

With cloud computing, data from multiple customers is typically commingled on the same servers. That means that legal action taken against another customer that is completely unrelated to your business could have a ripple effect. Your data could become unavailable to you just because it was being stored on the same server as data belonging to someone else that was subject to some legal action. For example, a search warrant issued for the data of another customer could result in your data being seized as well.

The news earlier this year about Megaupload , a cloud file storage and viewing service, provides a real, if extreme, example of how a customer could lose access to its data in the cloud. The federal indictments against the individuals behind Megaupload on multiple charges, including racketeering and criminal copyright infringement, resulted in law enforcement agencies seizing more than $50 million of Megaupload's assets. These actions were intended to stop any nefarious activities and collect evidence to be used in the case against Megaupload.

The catch is that a lot of people were using Megaupload for legitimate purposes . When the government took action against the alleged bad guys, those legitimate users also lost access to their data. It's a textbook example of how technology continues to outpace the law's ability to address the new questions that arise with cloud computing. For example, who is responsible for returning data to legitimate users?

With Megaupload essentially shut down, legitimate users couldn't retrieve their data directly as in the past. The government wouldn't release any data while it temporarily had custody of it to gather evidence, and when it was finished with that, it didn't want responsibility for sorting and returning data. Instead, it directed legitimate users to the two infrastructure-as-a-service providers used by Megaupload. The IaaS providers claimed that they had provided only raw infrastructure and never had access to customer data, and so they pointed customers full circle back to Megaupload. The Electronic Frontier Foundation has now stepped in to help sort out this mess .

How could a legitimate Megaupload customer have avoided getting caught up in this? Thoroughly vetting a cloud provider's background and business practices before using its service would be a good first step in most cases. Additionally, you could ensure that your contract obligates the cloud provider to effectively partition customer data. That way, there's at least a chance that law enforcement could seize a bad guy's data without touching yours.

Continue Reading

Originally published on www.computerworld.com. Click here to read the original story.
Our Commenting Policies