Cloud (service): Difference between revisions
legal, loss control |
→Examples: misc other examples, with some links |
||
Line 36: | Line 36: | ||
Providers may offer some access controls for the data they possess and process, but most of the time they are also the ones enforcing them, which renders them ineffective for restricting providers' access due to a conflict of interest. There may be legally binding promises of effectiveness of these controls in the [[End-user license agreement|EULA]],{{Citation needed|reason=I would have thought ToS would be more typical for cloud services, rather than EULA (more usual for an item than a service)? [Don't really need a citation, if EULA is what they usually use]}} but violations of policies established through these controls are difficult to detect and legal enforcement is generally difficult. | Providers may offer some access controls for the data they possess and process, but most of the time they are also the ones enforcing them, which renders them ineffective for restricting providers' access due to a conflict of interest. There may be legally binding promises of effectiveness of these controls in the [[End-user license agreement|EULA]],{{Citation needed|reason=I would have thought ToS would be more typical for cloud services, rather than EULA (more usual for an item than a service)? [Don't really need a citation, if EULA is what they usually use]}} but violations of policies established through these controls are difficult to detect and legal enforcement is generally difficult. | ||
=== Less legal protection === | ===Less legal protection=== | ||
In the United States, federal limits on gathering evidence mean you are not usually required to supply a password to unlock a device that you have, however others may be compelled to release your data. | In the United States, federal limits on gathering evidence mean you are not usually required to supply a password to unlock a device that you have, however others may be compelled to release your data. | ||
=== Loss of control === | ===Loss of control=== | ||
Service company can deprive you of your data/services. | Service company can deprive you of your data/services. | ||
Line 45: | Line 45: | ||
{{Incomplete section}} | {{Incomplete section}} | ||
*Data storage and synchronization, where changes to data are propagated to all devices with access to it. | *Data storage and synchronization, where changes to data are propagated to all devices with access to it. Examples include file synchronization services like [[wikipedia:Dropbox|Dropbox]] and [[wikipedia:Google_drive|Google Drive]]. [[OneDrive]] [[ICloud]] [[Mega.io cloud storage service]] | ||
*Device access, where functions from an internet-connected device can be accessed from another device with an internet connection, possibly very far. This is especially common when a product requires a companion mobile app. | *Device access, where functions from an internet-connected device can be accessed from another device with an internet connection, possibly very far. This is especially common when a product requires a companion mobile app. | ||
*[[Software as a service]] online applications, like Google Workspace, [[Microsoft Office 365]], conferencing, e-mail, [[Adobe creative cloud]] | |||
*AI compute (inference) servers which power AI chatbots and agents. | |||
==Further reading== | ==Further reading== | ||
*[[Self-hosting]] | *[[Self-hosting]] | ||
*[[ | *[[Internet of things]] | ||
==References== | ==References== | ||
<references /> | <references /> | ||
[[Category:Common terms]] | [[Category:Common terms]] |