Author archive

Some key risks arise from cloud computing. Principally, they revolve around the management, confidentiality and security of data. The storage of vast amounts of outsourced data in server farms across the world presents the potential for data leakage, contamination and interference.

A wide range of legal compliance and other issues surround Web 2.0 services, for which a failure of observance might lead to serious consequences. Legal vulnerability potentially arises through deliberate or accidental abuse of information that is posted or mutually exchanged. This article covers the legal, security and operational issues that might arise.