Article

Data Hosting and Data Breaches

December 2014
Social Media
Download
Download
Read Mode
Subscribe
Summarize
There are many reasons why cloud computing gets used, but a main reason is often due to the cost savings of the utility model for service delivery. In an age of increasing data breaches, users should confirm that they comply with their data protection obligations and have a plan in place to mitigate the harm that can be done in the event of a data breach. Published in Cloud Computing, a supplement of the Toronto Star.
Social Media
Download
Download
Subscribe
Republishing Requests

For permission to republish this or any other publication, contact Peter Zvanitajs at ZvanitajsP@bennettjones.com.

For informational purposes only

This publication provides an overview of legal trends and updates for informational purposes only. For personalized legal advice, please contact the authors.

Latest Insights

See All Insights
Expanded Federal Lobbyist Registration Requirements
Blog

Expanded Federal Lobbyist Registration Requirements

February 6, 2026
William S. Osler KCDrew C. BroughtonAudrix Arce
William S. Osler KC, Drew C. Broughton & Audrix Arce
Protecting Your Proprietary Information Lessons from SHAC Solutions Inc v Guenther
Blog

Protecting Your Proprietary Information: Lessons from SHAC Solutions Inc v Guenther

February 5, 2026
Edward (Ted) YooAhmed ElmallahJoshua Kim
Edward (Ted) Yoo, Ahmed Elmallah & Joshua Kim