We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure [email protected]
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Social media platforms hold vast amounts of data about our lives. Content from the past is increasingly being presented in the form of 'memories'. Critically exploring this new form of memory making, this unique book asks how social media are beginning to change the way we remember.
In recent decades, companies around the world have deployed an arsenal of tools - including IP law, hardware design, software restrictions, pricing strategies, and marketing messages - to prevent consumers from fixing the things they own. While this strategy has enriched companies almost beyond measure, it has taken billions of dollars out of the pockets of consumers and imposed massive environmental costs on the planet. In The Right to Repair, Aaron Perzanowski analyzes the history of repair to show how we've arrived at this moment, when a battle over repair is being waged - largely unnoticed - in courtrooms, legislatures, and administrative agencies. With deft, lucid prose, Perzanowski explains the opaque and complex legal landscape that surrounds the right to repair and shows readers how to fight back.
This chapter introduces the subject matter of the book, provides the core problem statement and defines the central terms used in the book. The introduction also explains the focus on governmental adoption of cloud computing services, legal sources, and the research approach.
The introduction explains how cloud computing has made it possible and desirable for users, such as businesses and governments, to migrate their data to be hosted on infrastructure managed by third parties. The chapter further outlines why aspects of migration to cloud services pose specific legal, contractual, and technical challenges for governments.
The chapter further outlines the challenge of addressing contracting and procurement requirements, data privacy and jurisdictional obligations when using an opaque, global, multi-tenant technology such as cloud computing.
This chapter contains the second part of book’s study on cloud computing contracts.
The chapter examines how general contract law, as defined in the chapter, will likely apply to the use of cloud computing services. This chapter focuses on terms that are often considered standard in cloud agreements. The analysis includes terms aimed at keeping information confidential, non-disclosure agreements, terms regarding liability, warranties, and other terms and conditions aimed at regulating or limiting responsibility. Additionally, the chapter considers terms aimed at termination of services, portability and other provisions necessary for exiting services.
In addition to offering an evaluation of specific contract terms, the chapter also evaluates how governments might create better cloud computing contracts to generate more consistent and compliant results.
This chapter evaluates the key data protection requirements and compliance obligations that governments must account for when entering into contracts with cloud service providers. The chapter concentrates on data protection issues that pose particular barriers for governments attempting to adopt cloud-computing services.
The chapter focuses primarily on understanding how the General Data Protection Regulation (GDPR) impacts the use of cloud computing. This requires an analysis of applicability and jurisdiction, applications of principles, understanding roles and responsibilities under the law, contractual obligations on sub-processors, liability for compliance, and limits on data transfers among others. The chapter also provides an overview of US data privacy law.
The chapter further evaluates recent case law and guidance from the European Data Protection Board (EDPB) and national data protection authorities to draw conclusions regarding GDPR cloud compliance obligations. Specifically, the chapter focuses on challenges and limits to cross-border transfers of data following the CJEU decision in the “Schrems II” case.
This chapter provides an overview of cloud computing technology. The explanation includes an overview of the differences between traditional outsourcing and cloud computing and how server virtualization makes cloud computing possible. The chapter also identifies the major players in the provision of cloud computing services and the primary cloud computing service and deployment models. The chapter evaluates central security concerns and risks including loss of availability and risks to data portability.
This chapter evaluates the unique obligations governments have when they commit citizen data to cloud service providers. In particular, the chapter focuses on how the responsibilities of governments are different than other types of cloud computing users focusing on specific procurement obligations, and other legal requirements.
The chapter also evaluates issues related to “data sovereignty”, outsourcing of government functions, and the potential risk to citizens from outsourcing critical infrastructure. Further, barriers that governments face when procuring cloud computing services including data localization restrictions, difficulties in comparing costs to traditional IT services, and ill-suited contract templates designed for traditional IT-outsourcing being applied to cloud computing services.
The chapter also explains that since operations or services are outsourced to cloud, governments must have the means to monitor them in order to retain a certain level of control over the operations they are outsourcing. The chapter examines government procurement programs in the United States, United Kingdom, and European initiatives to adopt cloud computing at the government level.
This chapter evaluates the application of jurisdictional principles to cloud computing services and the core challenges for governments and others. The chapter considers the interplay of jurisdiction—the ability of a court to hear a dispute—in the context of physical location, intelligible access to data, and the physical location of servers.
In particular, the chapter focuses on areas of uncertainty, such as the categorization of services and the location of data and limits to current approaches. The chapter argues that the traditional territorial approach to jurisdiction is a poor fit to account for the properties of cloud computing services and data more generally arguing that data poses unique legal challenges to applying traditional jurisdiction principles.
The chapter provides an analysis of access to cloud computing services for law enforcement and intelligence purposes by the US government. This includes an analysis of the “Microsoft Warrant” case, the US CLOUD Act and its possible conflicts with the General Data Protection Regulation (GDPR), and access by US intelligence agencies under FISA Section 702 and Executive Order 12333.