Data Privacy



Meetingthe Challenges of Privacy, Security, and Compliance in the Cloudis a four-part video series that features different presenters on theissues of privacy, security and compliance in data handling today(Lynchet al., 2016).In the first part, Brendon Lynch acknowledges that the increased useof cloud services has caused new challenges related to privacy andsecurity of data. He appreciates the commercial and tactical benefitsof cloud computing but cautions that entrusting them to third partiesrequires a careful assessment of vendor compliance with related rulesand regulations (Lynch,Miller, Brown &amp Holden, 2016).In the second part of the video, Doug Miller reviews the requirementsfor the establishment of trust between users and service providers.The third part features, Gregg Brown builds on the necessities oftrust between cloud service vendors and the users of these servicesand so does the fourth part by Jenner Holden.

Fromthe video, it is clear that cloud computing services haverevolutionized the business environment, which has induced hugebenefits. Cloud computing services facilitate handling of largeamounts of data, and they can help enterprises in numerous ways.Nevertheless, the issue of trust between the providers of thesesystems and the users is the greatest concern due to privacy issues.All the four speakers propose ways through which this trust can beestablished. They focus on government intervention to ensurecompliance with the industry standards to ensure that the vendors donot interfere with data privacy protocols and that the systems aresafe from third-party access through such ways as hacking (Lynchet al., 2016).

Cybercrimeis a real challenge in the modern computing era. There is so muchinformation across the internet and valuable details on individuals,organizations, and even governments. Careless handling of thisinformation can land it into the wrong hands, which may pose aserious security threat. As such, there have been alarms from a rangeof concerned bodies as to the security of data handled through theweb. Most arguments point towards stricter regulations by thegovernment to enhance compliance with the set standards and policies.

Sofar, the journey of data privacy is ongoing with over forty-sevenstates having passed various forms of laws concerning privacyprotection. The requirements and standards set by the states aredistinct from one state to another. On a similar point, the federalgovernment is also involved in the war against cybersecurity. Forinstance, the cybersecurity information bill was signed into law in2015. This Act permits information sharing between governmentagencies and the private sector and grants liability protection tocompanies that share their information with the government.

Thegovernment has a critical role to play in cybersecurity today. Thegovernment creates and enforces laws through its legislative andjudicial arms. Therefore, the government can enhance data privacy andsecurity by enacting laws that ensure compliance and facilitatesharing of information to enhance alertness in case of a cyberthreat. The government should do all that is necessary to ensure dataand information security for its citizens and the organizations thatoperate within its boundaries.

Theissue of data privacy is a major concern amidst the modernadvancements in technology. Technical progress in cloud computingcapabilities is beneficial to enterprises. The four-part videoclearly demonstrates this but argues for more involvement by thegovernment to enhance security in the cyberspace. The video centerson ways in which trust between the vendors and the users can be builtto reduce chances of information loss or leaks to the wrong hands.The government has a central role to play in the fight againstcybercrime, and more involvement could reinforce the advances made sofar in the data privacy journey.


Lynch,B., Miller, D., Brown, G., &amp Holden, J. (2016). Meeting theChallenges of Privacy, Security, and Compliance in the Cloud: Part 2.Retrieved November 09, 2016, from