Governments
Click below to see particular measures legislators and regulators can take to make progress on individual cloud governance issues.
Click below to see particular measures legislators and regulators can take to make progress on individual cloud governance issues.
Cloud Certification and Auditing
Localization and Routing Requirements
Security and Privacy in Lawful Government Access
Data Retrievability and Back-up Arrangements
Government Intervention in Extremis
Insurance for Cloud Services
Portability and Interoperability
Commercialization of Customer Data
Effects of Cloud Market Concentration
Environmental, Community, and Energy Market Impact
Cloud Access Restrictions and Content Moderation
Ensuring a Beneficial and Safe Digital Environment for Groups with Special Requirements
1 Requirements on disclosure timelines to government agencies vary both within and among nations, with some governments calling for 72-hour timelines and others for as low as 12-hours. These requirements may also vary depending on the function and sectors (such as, critical infrastructure and government services) being served. See: Michael Kans, “Congress Debates Cyber Incident Reporting Deadlines in the NDAA,” Just Security, 26 October 2021, https://www.justsecurity.org/78745/congress-debates-cyber-incident-reporting-deadlines-in-the-ndaa/.
2 While this occurs in the U.S. under the auspices of the Cybersecurity and Infrastructure Security Agency (CISA) and in other individual countries, not all governments maintain a centralized cybersecurity agency to perform this function. See: CISA, “Cybersecurity and Infrastructure Security Agency.” Cybersecurity and Infrastructure Security Agency, n.d., https://www.cisa.gov/.
3 See: Jay Greene Jay and Drew Harwell, “When the FBI seizes your messages from Big Tech, you may not know it for years,” The Washington Post, 25 September 2021, https://www.washingtonpost.com/technology/2021/09/25/tech-subpoena-secrecy-fight/.
4 See: U.S. Department of Justice, “Promoting Public Safety, Privacy, and the Rule of Law Around the World: The Purpose and Impact of the CLOUD Act,” U.S. Department of Justice, April 2019, https://www.justice.gov/opa/press-release/file/1153446/download.
5 Telecoms World, “Diverse Routing,” Telecoms World, n.d., https://www.telecomsworld.com/diverse-routing.
6 For example, in the case of the U.S., Congress enacted into law the Terrorism Risk Insurance Act, which created a backstop for insurance providers against large-scale, catastrophic losses arising from terrorism-related attacks, outside of the scope of war. Prior to this, insurance companies often used the “war exclusion” in their policies to avoid covering the claims that may arise from terrorist-related acts. See: Jon Bateman, War, Terrorism, and Catastrophe in Cyber Insurance: Understanding and Reforming Exclusions (Washington, DC: Carnegie Endowment for International Peace, October 2020), https://carnegieendowment.org/2020/10/05/war-terrorism-and-catastrophe-in-cyber-insurance-understanding-and-reforming-exclusions-pub-82819 and Aaron Klein and Scott R. Anderson, “A federal backstop for insuring against cyberattacks?” The Brookings Institution, September 27, 2019, https://www.brookings.edu/blog/techtank/2019/09/27/a-federal-backstop-for-insuring-against-cyberattacks/.
7 These strategies can include arrangements for failover across regions, load balancers, application gateways, and more, and should as well include a complementary data backup strategy (for example, how frequent should the backup process be, how extensive, should they be simultaneous across all applications, and so on) and a strategy on how to address lost data. A disaster recovery plan should also account for the people, processes, and applications needed to restore functionality, and should be fully and regularly tested through disaster simulations.
8 “SWIPO (Switching Cloud Providers and Porting Data), is a multi-stakeholder group facilitated by the European Commission, in order to develop voluntary Codes of Conduct for the proper application of the EU Free Flow of Non-Personal Data Regulation / Article 6 ‘Porting of Data.’” See: SWIPO, “Switching & Porting,” SWIPO, n.d., https://swipo.eu/.
9 Beyond Standards, “IEEE Addresses Standards for the Cloud,” Beyond Standards (blog), IEEE Standards Association, April 18, 2011, https://beyondstandards.ieee.org/ieee-addresses-standards-for-the-cloud/.
10 “ISO/IEC 19941:2017 specifies cloud computing interoperability and portability types, the relationship and interactions between these two cross-cutting aspects of cloud computing and common terminology and concepts used to discuss interoperability and portability, particularly relating to cloud services. See: ISO, “ISO/IEC 19941:2017: Information technology – cloud computing – interoperability and portability,” ISO, December 2017, https://www.iso.org/standard/66639.html.
11 This may include incidental uses of data and other reasonable uses, for example, such as those stipulated under “legitimate interests” in the General Data Protection Regulation (GDPR), “GDPR Legitimate Interests,” GDPR, n.d., https://www.gdpreu.org/the-regulation/key-concepts/legitimate-interest/.
12 “Brownfield” refers to sites that are often difficult to use for other purposes due to contamination, the presence of hazardous substances (for example, former gas stations and landfills). Development of these sites often requires significant investments in pre-development cleanup, revitalization, and monitoring to remain in compliance with local laws. Cloud providers are well-positioned, due to their size and affluence, to overcome these hurdles, reducing the development pressure on “greenfield” sites, undeveloped land that may be used for agricultural purposes. For additional information, please refer to: United States Environmental Protection Agency, “Overview of EPA’s Brownfields Program,” United States Environmental Protection Agency, n.d., https://www.epa.gov/brownfields/overview-epas-brownfields-program.
13 For additional information, please refer to: Paul Gillin, “Data Center Operators Look to Cooling Strategies for Greater Efficiency,” Data Center Frontier, January 15, 2021, https://datacenterfrontier.com/data-center-cooling-efficiency/; Matteo Mezzanotte, “Datacenter Cooling Methods: The Importance of Choosing the Right Cooling Method,” Submer, October 13, 2015, https://submer.com/blog/datacenter-cooling-methods/ ; and Clarke Energy “Data Centre CHP/Cogneration,” Clarke Energy, n.d., https://www.clarke-energy.com/applications/data-centre-chp-trigeneration/.
14 For additional information, please refer to: David Mytton, “Data centre water consumption,” npj Clean Water 4, no. 11 (2021), https://doi.org/10.1038/s41545-021-00101-w.
15 For additional information, please refer to: American Coalition of Competitive Energy Suppliers, “What is Energy Choice?” American Coalition of Competitive Energy Suppliers, n.d., https://competitiveenergy.org/what-is-choice/.
16 Catherine Howell and Darrell M. West, “The internet as a human right,” The Brookings Institution, November 7, 2016, https://www.brookings.edu/blog/techtank/2016/11/07/the-internet-as-a-human-right/.
17 Web Accessibility Initiative, “Web Content Accessibility Guidelines (WCAG) Overview,” Web Accessibility Initiative, (July 2005) April 29, 2021, https://www.w3.org/WAI/standards-guidelines/wcag/.