How to Protect Your Intellectual Property in the Cloud by Stephanie Overby
The main focus of this article is how to protect user intellectual property online. Cloud users and businesses do not always recognize how much their intellectual property is at risk on the cloud. For businesses, this sometimes requires, at a great expense, moving formulas and files back to in-house data storage. Being online, there is always a risk when intellectual property and sensitive data is released in the cloud, and that risk increases when a third party is involved or when internet based services are brought into the equation. Threats from these two problems make it more difficult to know and follow where data is and who is accessing it. Data on the cloud can bounce from country to country where intellectual property laws are not necessarily consistent. The article then outlines nine steps to follow to protect user intellectual property. The nine steps are as follows:
1) Pick the right internet provider.
2) Select the right service.
3) Read the fine print. Add some fine print of your own.
4) Expect to pay more.
5) Consider IP creation.
6) Secure it yourself.
7) Prevent a lockout.
8) Revisit controls on a regular basis.
9) Be prepared to walk.
The ninth step infers the option that cloud based services may not be appropriate for every user or every business.
I chose this article because it gave possible threats and steps to protecting intellectual identity on the cloud. Though Stephanie Overby is a writer, she covers topics in IT Outsourcing for CIO, a technology professional journal.
Cloud Security: Will Your Business Data Be Safe In the Cloud? By Todd Weiss
This article’s main focus is to reveal how businesses can protect their intellectual property in the cloud. In today’s world, it is almost impossible not to have information online, but businesses such as medical centers, insurance agencies, and financial companies struggle to keep sensitive data private. These poses a large problem for data security, as hackers can gain access to personal information, then turn around and ‘sell’ that information. The article suggests that setting clear policies on access to both user and location is quite possibly the best move that a company can take to protect their information as well as their clients’ information. Although the author and a tech consultant of an IT consultancy, Ara Trembly says, “that inherit risk is not something I advise clients to take if they are in a business that is data dependent.” The article lists a few questions for a company to consider before establishing user access and placing data online.
I chose this article because it gave a perspective of how intellectual property through businesses can be a greater risk without users necessarily knowing. Though Todd Weiss is a writer, he covers topics such as Cloud computing, CRM, and Enterprise applications for CIO, a technology professional journal.
Tech Industry Leaders Appeal for Laxer Intellectual Property Laws by Kenneth Corbin
An appeal to the House of Representatives lawmakers from tech industry executives to relax intellectual property laws for the benefit of companies is the main focus of this article. The main problem proposed by these executives is patent rules and restrictions on the innovation of technology. These executives requested to rewrite Intellectual Property laws, such that the rate of innovation can be increased while also taking into account antipiracy struggles. Companies hacking competitors can find files and blue prints and other forms of intellectual property, while patents are becoming a thing of the past. According to Nathan Seidle, CEO of SparkFun Electronics, comments “Innovation moves faster than the shield of intellectual property…time is better spent innovating.”
I chose this article because it gave a different perspective to intellectual property as being technology innovations and corporations. Though Kenneth Corbin is a journalist, he often reports on government and regulatory issues for CIO, a technology professional journal.