There are many reasons why cloud computing gets used, but a main reason is often
due to the cost savings of the utility model for service delivery. In an
age of increasing data breaches, users should confirm that they comply
with their data protection obligations and have a plan in place to
mitigate the harm that can be done in the event of a data breach.
Published in Cloud Computing, a supplement of the Toronto Star.
Article
Data Hosting and Data Breaches
December 3, 2014
Republishing Requests
For permission to republish this or any other publication, contact Amrita Kochhar at kochhara@bennettjones.com.
For informational purposes only
This publication provides an overview of legal trends and updates for informational purposes only. For personalized legal advice, please contact the authors.