Cloud Security , Next-Generation Technologies & Secure Development

Protect Data in the Cloud: What You Don't Know About the Patriot Act

Protect Data in the Cloud: What You Don't Know About the Patriot Act
As banking institutions seek tremendous cost savings from cloud infrastructure and services, two key factors must be considered: The Patriot Act, which has strict stipulations regarding access to data and where it is stored, and the protection of data -- even from third party service providers.

This webinar explores what these security topics mean to financial institutions:

  • The impact from the newly-extended Patriot Act re: sensitive data in the cloud;
  • Risks to consumer information stored in the cloud from 3rd parties;
  • How to address data sovereignty issues with cloud computing infrastructure.


The virtual nature of cloud computing opens up cost savings that are difficult to ignore, yet two orthogonal but perhaps complimentary issues make having a cohesive data security strategy dramatically more complex.

The first is the recently extended U.S. Patriot Act which provides for sweeping abilities for law enforcement to access data stored in U.S. Data Centers - regardless of geography. Often in conflict with local, e.g. European Union Data Protection legislation, there are complex issues ahead concerning the protection of data as it crosses international boundaries.

The second issue is that of protecting the data stored in cloud infrastructure - with its virtual nature - it's not possible to know necessarily where a piece of data is being stored in the cloud - nor is it always clear who exactly at the 3rd party service provider has access to that data.

The question becomes, is it possible to have a strategy where data from international jurisdictions can be stored in the cloud while retaining clear lines of separation? Similarly is it possible for enterprises to control their data stored in a 3rd party cloud without knowing exactly where it is?

It turns out that some new advances in key management could help resolve both these scenarios. By using some common examples, e.g. "How to protect sensitive emails in Microsoft BPOS/Office 365 Environments" and "How to enforce sovereignty of data stored in a cloud based infrastructure", we'll help uncover:

  • The specific threats to data in the cloud;
  • How to segregate data using encryption keys;
  • How to protect and control data stored in the cloud.

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.