SlideShare a Scribd company logo
Protecting Official Records as
Evidence in the Cloud Environment
Anne Thurston
Introduction
In a cloud computing environment, government
records are held in virtual storage. A service
provider looks after much of the maintenance, but
the government still owns the records, and
government agencies still must comply with legal
requirements. The records still are essential for
protecting citizens’ rights and entitlements,
demonstrating accountability, and providing the
basis for data credibility.
Record Keeping Requirements
Cloud computing has obvious benefits and less
obvious risks. The risks are mainly in relation to
how records and data, particularly in terms of
their security and integrity, are managed in the
cloud. Records management requirements for
official records must be defined in relation to
legal requirements, for instance for personal and
financial information, access to information,
privacy, data protection, and disaster recovery.
Requirements
Metadata (data describing the context, content
and structure of records) is essential to
demonstrate that the records are authentic and
to make it possible to access and interpret them
over time. Metadata must be captured when the
records are created and then, through system
logs and audit trails, to document how the
records are used and any changes to their
structure.
Risks
1 Records and data can be lost or corrupted
unintentionally or as the result of unauthorised
action by a malicious insider, a hacker or a
shared server user.
2 The service provider may not be able to
preserve records with very long retention
periods, such as property or pension records.
3 The records may not be returned at the end of
contract or they may be returned in a format
that the agency finds difficult to access or use.
Risks
4 A lack of standardised interfaces can make
it difficult or expensive to transfer services
or information from one cloud provider to
another.
5 Service providers may not share audit logs
documenting access to applications and
services and how they are used. In this
case, it is not possible to demonstrate
authenticity, integrity and legal compliance.
Risk Assessment
Some records management applications can be
integrated with cloud computing services, but
many cloud computing services lack records
functionality, and cloud architectures often lack
technical standards for records storage and use.
A risk assessment should be carried out when a
contract is negotiated to insure that information
integrity and security can be protected.
Questions for a Risk Assessment
1 Does the service provider have experience of
implementing records management solutions in
the cloud? Have the records requirements been
defined; can the service provider demonstrate
the ability to meet the requirements?
2 What are the provisions for preventing hackers
and security threats? Is there information, for
instance personnel records, that is too sensitive
or important to be held in the cloud computing
environment?
Risk Assessment
3 What back-up arrangements are in place to
ensure that records and the associated structure
and metadata can be restored if anything
happens to them?
4 Will the records will be available when 24/7
access is required?
5 Can the service provider demonstrate that the
information will be stored in acceptable
jurisdictions?
Risk Assessment
6 When the contract ends, will all records be
returned to the agency within an agreed
timeframe and in an acceptable format?
7 What are the provisions for external risk
auditing, certification and monitoring, and how
are they enforced? How often is the provider
audited by external bodies, and when did the
last audit take place? How are incidents
reported and addressed?
8 Who will have access to the records and what
controls will govern third party access?
Risk Assessment
9 Is the provider’s system functionality capable of
accommodating the required metadata fields?
Can additional metadata fields be added as
needed?
10 Does the vendor provide certificates of
destruction?
9 Are there provisions for transferring records
with permanent value to secure long-term
storage (Trusted Digital Repositories)?
Risk Assessment
If you are planning for cloud computing in your
country, it is important to assess the risks for
official records.

More Related Content

PDF
Data Security
DOCX
Data Security
PPT
Hipaa auditing in cloud computing enviroment
PPTX
what is data security full ppt
PPTX
In data security
PDF
Data Security
PDF
Web Werks Data Center Achieves HIPAA Compliance Certification
PPTX
Data Security Explained
Data Security
Data Security
Hipaa auditing in cloud computing enviroment
what is data security full ppt
In data security
Data Security
Web Werks Data Center Achieves HIPAA Compliance Certification
Data Security Explained

What's hot (10)

PDF
Protect customer's personal information eng 191018
PPT
Hipaa Compliance With IT
PDF
Dotnet scalable and secure sharing of personal health records in cloud compu...
PDF
LogRhythm E Phi Use Case
PPTX
Secure Cloud Reference Architecture
PPT
The Top 6 Data Challenges of Cloud Computing
PDF
Brochure Imperva Securesphere Vormetric Encryption
PPTX
Cloud computing 10 cloud security advantages and challenges
PPTX
Healthcare data breach
Protect customer's personal information eng 191018
Hipaa Compliance With IT
Dotnet scalable and secure sharing of personal health records in cloud compu...
LogRhythm E Phi Use Case
Secure Cloud Reference Architecture
The Top 6 Data Challenges of Cloud Computing
Brochure Imperva Securesphere Vormetric Encryption
Cloud computing 10 cloud security advantages and challenges
Healthcare data breach
Ad

Similar to Uganda Cloud Computing Panel (20)

PPTX
NARA's FAQ and Bulletin on Cloud Computing
ODP
Securing The Cloud
PPTX
Cloud
PPTX
Capitalizing on the Cloud
DOCX
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
PDF
Strategies for assessing cloud security
PDF
Strategies for assessing cloud security
PDF
Ast 0064255 strategies-for_assessing_cloud_security
DOCX
Issue identification cloud computing
PDF
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
DOCX
Cloud computing risk assesment report
PDF
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...
PDF
Cloud computing security issues and challenges
PPT
Cloud Computing and the Public Sector
PPTX
Evolution security controls towards Cloud Services
PDF
Cloud Security
PPT
Legal And Regulatory Issues Cloud Computing...V2.0
PPT
Cloud Computing Legal Risks And Best Practices
PPTX
Cloud computing Risk management
PDF
Cloud: Should I Stay or Should I Go?
NARA's FAQ and Bulletin on Cloud Computing
Securing The Cloud
Cloud
Capitalizing on the Cloud
CLOUD COMPUTING -Risks, Countermeasures, Costs and Benefits-
Strategies for assessing cloud security
Strategies for assessing cloud security
Ast 0064255 strategies-for_assessing_cloud_security
Issue identification cloud computing
д-р Лючиана Дюранти – Расширенная версия презентации на английском языке к се...
Cloud computing risk assesment report
д-р Лючиана Дюранти - Презентация на английском языке к семинару в Москве 23 ...
Cloud computing security issues and challenges
Cloud Computing and the Public Sector
Evolution security controls towards Cloud Services
Cloud Security
Legal And Regulatory Issues Cloud Computing...V2.0
Cloud Computing Legal Risks And Best Practices
Cloud computing Risk management
Cloud: Should I Stay or Should I Go?
Ad

More from Commonwealth Telecommunications Organisation (20)

PDF
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
PDF
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
PDF
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
PDF
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
PDF
PDF
Reflections on scale up and transferability
PDF
Planning your learning expedition final
PDF
Session 6.2 Cécile Barayre El Shami
PDF
PDF
Commonwealth Digital Broadcasting Siwtchover FOrum 2015 Regis Le Roux
Commonwealth Digital Broadcasting Switchover Forum 2015 Michael Ojo
Commonwealth Digital Broadcasting Switchover Forum 2015 Loren Braithwaite Kab...
Commonwealth Digital Broadcasting Switchover Forum 2015 Régis Saint Girons
Commonwealth Digital Broadcasting Switchover Forum 2015 Francois Hernandez
Commonwealth digital broadcasting switchover forum 2015 dr mothobi mutloatse
Commonwealth digital broadcasting switchover forum 2015 annemarie meijer
Commonwealth Digital Broadcasting Switchover Forum 2015 Mortimer Hope
Commonwealth Digital Broadcasting Switchover Forum 2015 Michele Coat Degert
Reflections on scale up and transferability
Planning your learning expedition final
Session 6.2 Cécile Barayre El Shami

Recently uploaded (20)

PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPT
Teaching material agriculture food technology
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Empathic Computing: Creating Shared Understanding
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Mushroom cultivation and it's methods.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Teaching material agriculture food technology
OMC Textile Division Presentation 2021.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Empathic Computing: Creating Shared Understanding
A comparative study of natural language inference in Swahili using monolingua...
Unlocking AI with Model Context Protocol (MCP)
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Network Security Unit 5.pdf for BCA BBA.
A comparative analysis of optical character recognition models for extracting...
Mushroom cultivation and it's methods.pdf
MIND Revenue Release Quarter 2 2025 Press Release
TLE Review Electricity (Electricity).pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Machine learning based COVID-19 study performance prediction
Digital-Transformation-Roadmap-for-Companies.pptx

Uganda Cloud Computing Panel

  • 1. Protecting Official Records as Evidence in the Cloud Environment Anne Thurston
  • 2. Introduction In a cloud computing environment, government records are held in virtual storage. A service provider looks after much of the maintenance, but the government still owns the records, and government agencies still must comply with legal requirements. The records still are essential for protecting citizens’ rights and entitlements, demonstrating accountability, and providing the basis for data credibility.
  • 3. Record Keeping Requirements Cloud computing has obvious benefits and less obvious risks. The risks are mainly in relation to how records and data, particularly in terms of their security and integrity, are managed in the cloud. Records management requirements for official records must be defined in relation to legal requirements, for instance for personal and financial information, access to information, privacy, data protection, and disaster recovery.
  • 4. Requirements Metadata (data describing the context, content and structure of records) is essential to demonstrate that the records are authentic and to make it possible to access and interpret them over time. Metadata must be captured when the records are created and then, through system logs and audit trails, to document how the records are used and any changes to their structure.
  • 5. Risks 1 Records and data can be lost or corrupted unintentionally or as the result of unauthorised action by a malicious insider, a hacker or a shared server user. 2 The service provider may not be able to preserve records with very long retention periods, such as property or pension records. 3 The records may not be returned at the end of contract or they may be returned in a format that the agency finds difficult to access or use.
  • 6. Risks 4 A lack of standardised interfaces can make it difficult or expensive to transfer services or information from one cloud provider to another. 5 Service providers may not share audit logs documenting access to applications and services and how they are used. In this case, it is not possible to demonstrate authenticity, integrity and legal compliance.
  • 7. Risk Assessment Some records management applications can be integrated with cloud computing services, but many cloud computing services lack records functionality, and cloud architectures often lack technical standards for records storage and use. A risk assessment should be carried out when a contract is negotiated to insure that information integrity and security can be protected.
  • 8. Questions for a Risk Assessment 1 Does the service provider have experience of implementing records management solutions in the cloud? Have the records requirements been defined; can the service provider demonstrate the ability to meet the requirements? 2 What are the provisions for preventing hackers and security threats? Is there information, for instance personnel records, that is too sensitive or important to be held in the cloud computing environment?
  • 9. Risk Assessment 3 What back-up arrangements are in place to ensure that records and the associated structure and metadata can be restored if anything happens to them? 4 Will the records will be available when 24/7 access is required? 5 Can the service provider demonstrate that the information will be stored in acceptable jurisdictions?
  • 10. Risk Assessment 6 When the contract ends, will all records be returned to the agency within an agreed timeframe and in an acceptable format? 7 What are the provisions for external risk auditing, certification and monitoring, and how are they enforced? How often is the provider audited by external bodies, and when did the last audit take place? How are incidents reported and addressed? 8 Who will have access to the records and what controls will govern third party access?
  • 11. Risk Assessment 9 Is the provider’s system functionality capable of accommodating the required metadata fields? Can additional metadata fields be added as needed? 10 Does the vendor provide certificates of destruction? 9 Are there provisions for transferring records with permanent value to secure long-term storage (Trusted Digital Repositories)?
  • 12. Risk Assessment If you are planning for cloud computing in your country, it is important to assess the risks for official records.