Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Security News -- Cloud Computing

New European Guidelines to Address Cloud Computing

July 2, 2012

The European Commission’s panel on privacy is expected to endorse the concept of cloud computing as legal under the continent’s privacy law today, and is likely to recommend that large companies and organizations police themselves to assure users that personal information kept in remote locations is protected, according to an article from The New York Times.

The panel, known as the Article 29 Working Party, would present the recommendation as part of its long-awaited guidelines on cloud computing, an industry that has sparked much interest in European nations, despite a variety of concerns from the different countries.

The report will highlight the advantages of using cloud computing to encourage innovation and economic efficiency, said an anonymous source with knowledge of the recommendations, the Times reports. This would reflect a more practical approach from European officials to remote computing’s growing role in the broader economy.

According to the article, “The recommendations are expected to guide decisions on cloud computing by regulators in the 27 E.U. countries. The sellers of cloud services are hoping the new guidelines will improve their image in Europe, where concerns about privacy and fears that business secrets could be stolen in U.S.-based cloud centers have discouraged sales.”

And while cloud computing sales in Europe are trailing those in the U.S. by at least two years (according to research firm Gartner), the sales of cloud services are rising at about 24 percent each year – or about four times as fast as the rate of technology spending overall, according to International Data Corp.

According to the article, companies using cloud computing can save money because they do not have to buy or house servers to deliver services or store data.

Some governments in Europe are also beginning to use cloud services to cut costs, the Times reports. In Belgium, the national government is creating its own cloud to consolidate government services.

But while the guidelines are unlikely to harmonize the patchwork of national privacy laws that control cloud computing in Europe, E.U. nations are required to give them “utmost consideration” in drafting national policies.

But the nations all have very different approaches to cybersecurity and therefore cloud security. According to the Times article, “Britain and Scandinavian countries tend to be more permissive than other European nations about the ways personal data can be processed in clouds, whereas Spain and France impose tough requirements, like requiring cloud service sellers to know at all times where information is being kept, said Jörg-Alexander Paul, a privacy lawyer at the firm Bird & Bird in Frankfurt. Germany has strict laws on handling cloud data, Mr. Paul said, but its enforcement is relatively lax.”

There are expected to be three major recommendations:

  • Cloud services sellers must be able to inform clients exactly where their data is being physically stored at any time of day.
  • Sellers must delete all personal data in cloud computing centers when retaining it is no longer necessary.
  • Cloud service companies must disclose to clients the subcontractors they plan to use to process data.

While the first two might add complexity and cost to managing data, the third recommendation could undermine large sellers of cloud services by forcing them to disclose their contractor lists to potential lower-cost rivals, the article says. 

KEYWORDS: cloud computing cloud security cyber defense cyber security European Union

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0219-data-Feat-slide1_900px

    European Commission and EDPB provide update on efforts to address cross-border transfers after Schrems II

    See More
  • IBM Study Says Cloud Computing to Rewrite Corporate Business Models

    See More
  • Massachusetts Looks to Tax Cloud Computing

    See More

Related Products

See More Products
  • into to sec.jpg

    Introduction to Security, 10th Edition

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products

Events

View AllSubmit An Event
  • July 13, 2011

    NYC Infragard monthly security summit focused on cloud computing and email archiving.

View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing