Cloud Computing for Innovation !

Cloud Computing for Innovation !

Cloud becomes an extension of all services and will be increasingly integrated into our daily lives by a groundswell of major providers of personal computing. You have a Smartphone? A reader of digital books? A player? Soon your TV! Take these examples, they are necessarily connected to the Cloud now. The Smartphone to your contacts, photos … book reader for infinite library of books enough to spend all your holiday to enjoy the latest fashionable novels. And the player? Music for the endless delight of music lovers. Do you have new services to offer? Would you win new customers? Would you still improve your products or services? The Cloud is part of our daily lives, it is present today and tomorrow it will be everywhere. Use it as a new link between your customers and your products and services. Is it a great opportunity to...
Cloud Computing and personal data ? French touch ?

Cloud Computing and personal data ? French touch ?

The main obstacle to cloud computing is security. One associated theme is the access to your data, especially sensitive data like personal data. The last week, the CNIL issued a series of specific recommandations. Recommendation 1: Clearly identify data and treatments that will pass in the Cloud Recommendation 2: Define your own requirements as to technical and legal Recommendation 3: Conduct a risk analysis to identify the essential security measures for the company, Recommendation 4: Identify the type of cloud relevant to the proposed treatment, Recommendation 5: Choose a provider with adequate safeguards, Recommendation 6: Review the internal security policy, Recommendation 7: Monitor changes over time. Find a legal eye on these recommendations by Laurent Caron. Finally, in the appendix of this document, examples of contract clauses allow everyone to be proactive with its Cloud supplier. However, what is the operational nature of this checklist? Actually quite low. Should be reviewed, with a new approach, the security policy of the Company with a particular point on the processing of security : data security and data processing. The Cloud is not only A and A! The “Cloud” approach as a single has its limits, we must separate the Public Cloud  and the Private Cloud but also the types of usages you imagine in the Cloud: email, business data, e-commerce sites are all different cases . The Public Cloud does not negotiate its contracts nor their security framework, it is often taken as is. In this case a risk-based approach allows us to know whether the company can assume the risk. The Private Cloud can meet a contractual framework more suitable and adjustable. It...