Feeds

Brussels talks clouds and privacy

Steely Neelie warns on security

HP ProLiant Gen8: Integrated lifecycle automation

Neelie Kroes, European Commissioner for the Digital Agenda, warned yesterday that moves to cloud computing must not endanger citizens' rights to privacy and proper data protection.

neelie kroes

Neelie Kroes: Cloud companies need EC's "help"

to "know exactly what is allowed and what is not".

Kroes told the Université Paris-Dauphine that putting personal data on remote servers risked losing control of that data. She said the Commission was funding research to strengthen data protection but it was important that such security was put first when designing such systems.

She said legal systems also needed to adjusted as data increasingly flows out of the European Union to the rest of the world.

She said laws within the community needed to allow the free movement of data, as part of the Digital Single Market. But being "cloud-friendly" did not mean Europe should ignore security considerations.

She added that many cloud companies are small and medium businesses that needed help "to know exactly what is allowed and what is not".

Kroes said that some international companies assert that European privacy laws are merely a protectionist stance to favour local providers and to hold back the development of cloud computing.

She said this was untrue and used the car industry as a metaphor. She said that people mainly build cars to provide mobility, but that doesn't mean we should ignore safety features such as brakes and seatbelts.

Security and data protection were similarly "must-have" features of any cloud, she said.

She said European citizens and businesses should know two things about their cloud supplier - that they follow European data protection standards in a transparent way and secondly that places "where the cloud touches the earth" - the countries where the company's servers are located - have proper legal frameworks in place to enforce such standards.

The European Commission is collecting feedback on proposed improvements to European data protection.

Kroes said: "In conclusion, I wish to say to you that cloud computing may indeed become one of the backbones of our digital future. Securing workable data protection will help us to give shape to that digital future. Let us keep up the conversation about these and other digital issues. If we do that, we will deliver the better economy and better living that digital technologies make possible."

Kroes' full speech on cloud security is here. ®

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.