We all know that the data we rely on to run our businesses can be subject to subpoena and other government actions. Such actions create additional risks when that data is in the cloud.
With cloud computing, data from multiple customers is typically commingled on the same servers. That means that legal action taken against another customer that is completely unrelated to your business could have a ripple effect. Your data could become unavailable to you just because it was being stored on the same server as data belonging to someone else that was subject to some legal action. For example, a search warrant issued for the data of another customer could result in your data being seized as well.
[ In the data center today, the action is in the private cloud. InfoWorld's experts take you through what you need to know to do it right in our "Private Cloud Deep Dive" PDF special report. | Also check out our "Cloud Security Deep Dive," our "Cloud Storage Deep Dive," and our "Cloud Services Deep Dive." ]
The news earlier this year about Megaupload, a cloud file storage and viewing service, provides a real, if extreme, example of how a customer could lose access to its data in the cloud. The federal indictments against the individuals behind Megaupload on multiple charges, including racketeering and criminal copyright infringement, resulted in law enforcement agencies seizing more than $50 million of Megaupload's assets. These actions were intended to stop any nefarious activities and collect evidence to be used in the case against Megaupload.
The catch is that a lot of people were using Megaupload for legitimate purposes. When the government took action against the alleged bad guys, those legitimate users also lost access to their data. It's a textbook example of how technology continues to outpace the law's ability to address the new questions that arise with cloud computing. For example, who is responsible for returning data to legitimate users?
With Megaupload essentially shut down, legitimate users couldn't retrieve their data directly as in the past. The government wouldn't release any data while it temporarily had custody of it to gather evidence, and when it was finished with that, it didn't want responsibility for sorting and returning data. Instead, it directed legitimate users to the two infrastructure-as-a-service providers used by Megaupload. The IaaS providers claimed that they had provided only raw infrastructure and never had access to customer data, and so they pointed customers full circle back to Megaupload. The Electronic Frontier Foundation has now stepped in to help sort out this mess.