<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>edisclosure myth or reality? &#187; cloud computing</title>
	<atom:link href="https://jollyvip.com/edisclosure/tag/cloud-computing/feed/" rel="self" type="application/rss+xml" />
	<link>https://jollyvip.com/edisclosure</link>
	<description>From litigation to the arbitration regime</description>
	<lastBuildDate>Tue, 01 Jul 2025 10:14:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.1</generator>
		<item>
		<title>cloud computing</title>
		<link>https://jollyvip.com/edisclosure/2012/02/22/cloud-computing/</link>
		<comments>https://jollyvip.com/edisclosure/2012/02/22/cloud-computing/#comments</comments>
		<pubDate>Wed, 22 Feb 2012 23:28:07 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2012]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[right to be forgotten]]></category>

		<guid isPermaLink="false">http://iedisc.com/?p=290</guid>
		<description><![CDATA[Cloud is here to stay (until another storm clears the current cloud), so might as well ride with the current cloud. Like picking up any new technology or looking to make sense of the new technology, I start with looking at the new technology with references to established methodologies, approaches or techniques or simply methods. [...]]]></description>
			<content:encoded><![CDATA[<p>Cloud is here to stay (until another storm clears the current cloud), so might as well ride with the current cloud.</p>
<p>Like picking up any new technology or looking to make sense of the new technology, I start with looking at the new technology with references to established methodologies, approaches or techniques or simply methods. These established methods are still around, come cloud or no cloud. </p>
<p>I have heard references of cloud computing in terms of outsourcing or another way of addressing or outsourcing your computing costs. So folks also talk about cloud computing in terms of opex and/or capex. Is cloud computing new technology or another way to talk about outsourcing your computing costs?</p>
<p>After reading this excellent write up on <a href="http://www.katescomment.com/what-is-cloud-computing/">Cloud Computing</a>,  my initial skepticism on cloud computing turns into childish delight! Ah! It makes sense to have the 4 letters i.e. SaaS, PaaS, IaaS to describe cloud computing in terms of services. It seems that cloud computing does resemble outsourcing except that with outsourcing one is led to address business function/activities instead of computing services. My next question -what services are offered by cloud computing that will radically change the way I work or use technology? An ediscovery question in cloud computing &#8211; will (or is) cloud computing radically change (changing) the ediscovery scene?</p>
<p>Right now I can&#8217;t think of any (cloud) services except that I will have to figure out what data do I consider cloud worthy. This sounds familiar in outsourcing too. The same question as what is core to my business, I keep in control and not outsource also applies to cloud computing. At the lowest level, is data core to my business? A tough question or a non question! There will be established or seasoned/reasoned questions which are irrelevant in cloud computing.</p>
<p>Businesses outsource their core function as &#8216;core&#8217; is not an accounting concept or an IT concept. We don&#8217;t talk about core accounting costs or core computing/technological data or services. Do we?</p>
<p>It seems the focus is no longer on &#8216;core business&#8217; or even services. Cloud computing is driving the way we handle or our ability to handle data &#8211; period. The signs are around us e.g.  &#8216;Big Data&#8217; and &#8216;BYOD&#8217;.</p>
<p>I am not interested in what cloud computing delivers, it is what data to &#8216;outsource&#8217;/give up to cloud service providers.  There is data protection act (soon a law in itself) and privacy related concerns. It will be interesting to see whether the changes to the data regime will define further questions or will the changes redefine the way cloud computing is currently defined. I have not come across a piece of legislation that changes the way technology is defined (&amp; hence it&#8217;s course of design, development and deployment). It is a known fact that law plays catch up in terms of technology. The <a href="http://www.stanfordlawreview.org/online/privacy-paradox/right-to-be-forgotten">&#8216;right to be forgotten</a>&#8216; is probably the policy/rule makers&#8217; way of acknowledging that computing is beyond &#8216;legal codifying&#8217;. Perhaps the policy makers in mixing data protection with privacy wanted to recapture the concept of privacy as defined by Judge Thomas Cooley in 1888 &#8211; The Law of Torts 29 (2d ed. 1888) &#8211; &#8216;the right to be left alone&#8217;.</p>
<p>So where does this lead to in terms of ediscovery, which is also here to stay whether cloud or no cloud.</p>
<p>One term that comes to mind is disruption as in disruptive technology with the intended consequences and (perceived) benefits.</p>
<p>Cloud computing is disruptive technology/computing for ediscovery at many levels as it touches on several areas where ediscovery is weak (in terms of uncertainty or complexity in data access and processing). Similar to the concept of &#8216;core&#8217;, &#8216;control&#8217; and  &#8216;trust&#8217; are meaningless in disruptive technology. Meaningless in the sense that one invariably (even with contractual agreements in place) loses control of data (in the cloud). The issue with trust is &#8211; how can we trust cloud providers if we loses control of data?  Control of data and issues of trust are interlock or meshed up as seen in the measures to deal with data protection and privacy rights. The emphasis on &#8216;protect&#8217; data (as in data protection rather than &#8216;control&#8217; ) seems to have lost its lustre in the attempt to address privacy of individual in the non physical data world. </p>
<p>So it is back to &#8216;handling of data&#8217; which is essentially what we do when we do ediscovery. We &#8216;handle&#8217; &#8211; as this cover all aspects of accessing or processing &#8211; as it is human that handle the data not computer.If this is not the case, why do we have ediscovery rules (CPR) that has description of &#8216;how to do&#8230;&#8217; .  Like all changes in rules/law, there will be disruption initially. So it is safe to say, changes in the data regime will disrupt the ediscovery rules or more accurately further disrupt the handling of data.</p>
<p>Can we define data in terms of services? It&#8217;s like defining personal and sensitive data (or secret data/info) as services for cloud computing. Maybe we are getting there in terms of 4 letters, as data is 4 letters too.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2012/02/22/cloud-computing/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A reckoning with reality</title>
		<link>https://jollyvip.com/edisclosure/2010/04/26/a-reckoning-with-reality/</link>
		<comments>https://jollyvip.com/edisclosure/2010/04/26/a-reckoning-with-reality/#comments</comments>
		<pubDate>Mon, 26 Apr 2010 19:03:44 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[data categories]]></category>
		<category><![CDATA[seal]]></category>
		<category><![CDATA[stamp]]></category>

		<guid isPermaLink="false">http://iedisc.com/2010/04/26/a-reckoning-with-reality/</guid>
		<description><![CDATA[Is there such a thing as ‘reality’? I guess the answer depends on where one draws a line or whether a line can indeed be distinguished and/or drawn. Can we really distinguish and be able to categorise data into neat buckets (or cells, columns, rows, stacks etc.)? Answer depends on who is distinguishing the data [...]]]></description>
			<content:encoded><![CDATA[<p>Is there such a thing as ‘reality’? I guess the answer depends on where one draws a line or whether a line can indeed be distinguished and/or drawn.</p>
<p>Can we really distinguish and be able to categorise data into neat buckets (or cells, columns, rows, stacks etc.)?  Answer depends on who is distinguishing the data and what the data represent for who. Lots of ‘who’ when it comes to dealing with the reality of data…</p>
<p>This blog was triggered after reading the article, <a href="http://iedisc.com/2010/04/26/a-reckoning-with-reality/the-fog-over-the-grimpen-mire-cloud-computing-and-the-law/" rel="attachment wp-att-204" title="The Fog over the Grimpen Mire: Cloud Computing and the Law">The Fog over the Grimpen Mire: Cloud Computing and the Law</a>, and the recent volcanic ashes quadmire affecting not only the travel industry but also announcement from the <a href="http://iccwbo.org/policy/banking/index.html?id=36095">ICC</a> on the non- force majeure of the rules of UCP 600 (article 36), URDG 458 (article 13) and URC 522 (article 15), I can’t help but wonder why documents are still needed.  No wonder my online banking is never really ‘instant’ when it comes to international payment/transaction – electrons travel but not the paper/document ‘money’. Is ‘money’ real or an illusion? The ‘bucks’ have to stop somewhere and it seems paper is still king in the digital age.</p>
<p>Recently, I was fortunate to have the chance to spend a brief period in the <a href="http://www.cietac.org/">CIETAC</a> office in Beijing and have my first taste of Chinese arbitration-mediation hearing and the administrative work done by the excellent staff in the CIETAC, Beijing.  Paper documentation dominants the way the Chinese conduct businesses and invariably paper document finds their way into the dispute resolution mechanism. I am told that the important stuff with document is the red stamp or the seal that shows or authenticate or prove that a piece of document is ‘real’. The seal representing a symbolic proof that the business or transaction is genuine and/or the document has been approved by some high authority or power. In essence the seal is a physical mark – like a signature and yet not quite like a signature more like a symbol recognisable by those who know where the line crosses i.e. the power to draw the line.</p>
<p>Perhaps the Service Level Agreements or the detailed contractual clauses serve as a reminder that the ‘bucks’ have to stop somewhere. The &#8216;somewhere&#8217; is non categorisable as the ‘act of god’ means different things to different people.  Is that why no one really read into the fine print (except those that wrote them?) until the ‘act of god’ becomes a reality to be reckoned with – like in the volcanic ash events?</p>
<p>In my previous work as analyst (system and business) whereby I have to categorise data or model data to fit into a particular business domain or process, I wish I have the luxury to be able to formulate the neat category as described in the article, The Fog over the Grimpen Mire: Cloud Computing and the Law. The author described an approach to the Easter egg business as:<br />
“<em>A cloud computing service that processes data for a small business will have access to four different types of data. First, there is data about the small business’ own customers. For example, the data for an Easter egg business might include a list of past Easter egg purchasers, and information about their purchases. Second there is account data about the small business itself, including its contact and payment details.<br />
Third is data generated by the operation of the services (some of which, for example the internal state of applications, may not be accessible to the small business). Last there is activity data, which tracks when and for which applications the business’ account with the service provider is used.</em>”</p>
<p>What I find interesting is whether such approach to data categorisation can be extended to any business, not only small business. In the context of cloud computing, the law is applicable not only to small business.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2010/04/26/a-reckoning-with-reality/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Two different approaches to privacy</title>
		<link>https://jollyvip.com/edisclosure/2009/10/14/two-different-approaches-to-privacy/</link>
		<comments>https://jollyvip.com/edisclosure/2009/10/14/two-different-approaches-to-privacy/#comments</comments>
		<pubDate>Wed, 14 Oct 2009 14:18:05 +0000</pubDate>
		<dc:creator></dc:creator>
				<category><![CDATA[2009]]></category>
		<category><![CDATA[Asia Pacific]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[US]]></category>
		<category><![CDATA[china]]></category>
		<category><![CDATA[cloud computing]]></category>
		<category><![CDATA[my research]]></category>
		<category><![CDATA[privacy]]></category>

		<guid isPermaLink="false">http://iedisc.com/2009/10/14/two-different-approaches-to-privacy/</guid>
		<description><![CDATA[Since I can&#8217;t tweet I will use my blog to post. Research into trust model(s) in the cloud and a new credit privacy rule (still in draft according to the report) in China.]]></description>
			<content:encoded><![CDATA[<p>Since I can&#8217;t tweet I will use my blog to post.</p>
<p><a href="http://www.sciencedaily.com/releases/2009/10/091013162746.htm">Research i</a>nto trust model(s) in the cloud and a new <a href="http://www.chinadaily.com.cn/china/2009-10/14/content_8790079.htm">credit privacy rule</a> (still in draft according to the report) in China.</p>
]]></content:encoded>
			<wfw:commentRss>https://jollyvip.com/edisclosure/2009/10/14/two-different-approaches-to-privacy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
