IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Management of Privacy and Security in Cloud Computing: Contractual Controls in Service Agreements

Management of Privacy and Security in Cloud Computing: Contractual Controls in Service Agreements
View Sample PDF
Author(s): Deniz Tuncalp (Istanbul Technical University, Turkey)
Copyright: 2015
Pages: 26
Source title: Delivery and Adoption of Cloud Computing Services in Contemporary Organizations
Source Author(s)/Editor(s): Victor Chang (Computing, Creative Technologies and Engineering, Leeds Beckett University, UK), Robert John Walters (Electronics and Computer Science, University of Southampton, UK)and Gary Wills (Electronics and Computer Science, University of Southampton, UK)
DOI: 10.4018/978-1-4666-8210-8.ch017

Purchase

View Management of Privacy and Security in Cloud Computing: Contractual Controls in Service Agreements on the publisher's website for pricing and purchasing information.

Abstract

There are a number of risk domains that are relevant for information privacy and security in cloud-based scenarios and alternative deployment models, which require implementation of a number of controls. However, cloud service providers often take a one-size-fits-all approach and want all their customers to accept the same standardized contract, regardless of their particular information security and legal compliance needs. Taking ISO 27001 Information Security Management standard as a guide, we have employed the Delphi method with a group of cloud computing experts from around the world who are subscribed to the “Cloud Computing” group on LinkedIN to identify the most applicable controls in a generic cloud service provider – customer context. Based on these results, we use a sample of cloud computing customer service agreement as a case study to further discuss related contingencies. As a result, this chapter argues that a more balanced approach is needed in service contracts to ensure the maintenance of necessary service levels and the protection of cloud users.

Related Content

Dina Darwish. © 2024. 43 pages.
Kassim Kalinaki, Musau Abdullatif, Sempala Abdul-Karim Nasser, Ronald Nsubuga, Julius Kugonza. © 2024. 23 pages.
Yogita Yashveer Raghav, Ramesh Kait. © 2024. 17 pages.
Renuka Devi Saravanan, Shyamala Loganathan, Saraswathi Shunmuganathan. © 2024. 21 pages.
Veera Talukdar, Ardhariksa Zukhruf Kurniullah, Palak Keshwani, Huma Khan, Sabyasachi Pramanik, Ankur Gupta, Digvijay Pandey. © 2024. 30 pages.
Dharmesh Dhabliya, Sukhvinder Singh Dari, Nitin N. Sakhare, Anish Kumar Dhablia, Digvijay Pandey, Balakumar Muniandi, A. Shaji George, A. Shahul Hameed, Pankaj Dadheech. © 2024. 9 pages.
Avtar Singh, Shobhana Kashyap. © 2024. 11 pages.
Body Bottom