{"id":526382,"date":"2010-04-13T06:00:00","date_gmt":"2010-04-13T10:00:00","guid":{"rendered":"tag:redtape.msnbc.com:\/\/dfd2f90cf5afcc6baa4af63a2ef4d968"},"modified":"2010-04-13T06:00:00","modified_gmt":"2010-04-13T10:00:00","slug":"the-constitutional-issues-of-cloud-computing","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/526382","title":{"rendered":"The Constitutional issues of cloud computing"},"content":{"rendered":"<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">What would the Founding Fathers think about Internet-based \u201ccloud\u201d computing?<span style=\"mso-spacerun: yes\">&#0160; <\/span><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Would James Madison, for example, agree with some current interpretations of the Fourth Amendment, which hold that old-fashioned letters stored in a dresser drawer enjoy stronger legal protection against search and seizure than an e-mail stored on the Web or a private post left for a friend on Facebook?<span style=\"mso-spacerun: yes\">&#0160; <\/span><o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">In a world where every computer is connected, where it doesn&#39;t matter whether your e-mail is on the hard drive in your bedroom or a server half a world away, where your critical company documents can be viewed from anywhere, where would the Founding Fathers draw the line for law enforcement? The &quot;cloud,&quot; already well formed with Hotmail and Google docs, is a potential treasure trove for police investigators.<span style=\"mso-spacerun: yes\">&#0160; <\/span>But how can we make sure the cloud doesn&#39;t rain all over Americans&#39; Fourth Amendment rights to avoid unfair searches?<\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><o:p><\/o:p><\/span><\/font><\/span><font face=\"Verdana\"><\/font><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">That&#39;s the goal of a new coalition behind the Web site <a href=\"http:\/\/digitaldueprocess.org\/\">DigitalDueProcess.org.<\/a> The group includes strange bedfellows, ranging from the right-leaning Americans for Tax Reform and the Competitive Enterprise Institute to the liberal American Civil Liberties Union. Google, Microsoft, Intel and a host of other technology companies are also involved. Their main goal is a rewrite of the outdated Electronic Privacy Communications Act of 1986 for the 21st Century.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">\u201cTechnology has changed dramatically in the last 20 years, but the law has not,\u201d said Jim Dempsey, vice president for public policy at the Center for Democracy and Technology, another member of the coalition. \u201cThe traditional standard for the government to search your home or office and read your mail or seize your personal papers is a judicial warrant. The law needs to be clear that the same standard applies to email and documents stored with a service provider while at the same time be flexible enough to meet law enforcement needs.\u201d <o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><img decoding=\"async\" alt=\"Small msnbc\" border=\"0\" class=\"asset asset-image at-xid-6a00d83451b0aa69e20133ec8d7ade970b \" src=\"http:\/\/onthescene.msnbc.com\/.a\/6a00d83451b0aa69e20133ec8d7ade970b-800wi\" style=\"MARGIN: 7px; FLOAT: left\" title=\"Small msnbc\" \/>Descriptions vary, but cloud computing generally refers to storing information or software on computer servers that can be accessed from multiple locations around the world \u2013 Gmail is a good example &#8212; as opposed to data that must be accessed by someone who has physical access to a local computer or hard drive. <span style=\"mso-spacerun: yes\">&#0160;<\/span>Today, the rules of evidence gathering apply differently to data in the cloud.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Ryan Radia, a spokesman for the libertarian think tank the Competitive Enterprise Institute, said that there is plenty of judicial confusion about application of search and seizure laws to electronic communication &#8212; in fact, federal courts have issued contradictory rulings.<span style=\"mso-spacerun: yes\">&#0160; <\/span>But in general, many Internet service providers turn over electronic records to investigators in response to a simple subpoena, while old-fashioned paper records require the higher standard of a judge-issued warrant. Just because information travels over a wire and sits on a server doesn&#39;t mean it should be less protected by the Constitution, Radia argued.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;If you get a letter from a friend of relative in the mail and leave it in the file cabinet in the basement, if law enforcement wants to read it they have to get a search warrant,&quot; he said.<span style=\"mso-spacerun: yes\">&#0160; <\/span>&quot;But with cloud computing \u2026 judges have interpreted that the information has been handed over to third parties and is no longer considered to be private. Federal law ought to protect that information in the modern age.&quot;<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">More than theoretical constitutional issues are at stake. There&#39;s also real money.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Tech companies like Microsoft and Intel are worried that concerns about privacy could stunt the growth of cloud computing, and recent research by the Pew Internet and American Life Project seems to validate this concern.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><a href=\"http:\/\/www.pewinternet.org\/Reports\/2008\/Use-of-Cloud-Computing-Applications-and-Services.aspx\">The report found that 69 percent<\/a> of online Americans use at least one cloud service, such as Web-based e-mail, and 64 percent of them said they were concerned that law enforcement agencies could access their files. Only 22 percent said they weren&#39;t concerned.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><img decoding=\"async\" alt=\"Herbbox\" border=\"0\" class=\"asset asset-image at-xid-6a00d83451b0aa69e20120a6792d57970c \" src=\"http:\/\/onthescene.msnbc.com\/.a\/6a00d83451b0aa69e20120a6792d57970c-800wi\" style=\"MARGIN: 6px; FLOAT: left\" title=\"Herbbox\" \/>&quot;We run the risk of users lacking trust in cloud computing and in many information services if a user cannot be confident their information will remain secure,&quot; Radia said. &quot;If cloud computing is going to realize its full potential, if the industry is going to succeed, we need to be sure there is privacy protection. We can&#39;t expect the technology to work around the limitations of federal law.&quot;<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Among the groups&#39; top goals: members want federal law to be &quot;technologically neutral,&quot; meaning that search and seizure requirement would apply uniformly, regardless of the technology involved. That would mean a private communication &#8212; be it handwritten or electronic &#8212; would be governed by the same rules of evidence gathering.<span style=\"mso-spacerun: yes\">&#0160; <\/span>They also want to clear up inconsistencies in the application of federal law. Currently, in some cases, there&#39;s a lower legal standard for law enforcement to intercept an e-mail in transit than for that same agencies to read an e-mail stored on a recipient&#39;s computer.<span style=\"mso-spacerun: yes\">&#0160; <\/span>In other words, a single e-mail can be governed by various different legal standards during its life-cycle.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;A particular category of information should be afforded the same level of protection whether it is in transit or in storage,&quot; the group says in its &quot;guiding principles.&quot;<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">While the group has gone to some pains to avoid sounding as if they are attacking law enforcement agencies, don\u2019t expect them to hop on board the effort.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Updates to the Electronics Communications Privacy Act would almost certainly curtail use of some evidence-gathering tools, such as the FBI\u2019s much-maligned Carnivore software, which was designed to capture e-mail and Web transmissions going into and out of Internet Service Provider servers.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><br \/><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">The group has already received a relatively warm welcome on Capitol Hill. House Judiciary Committee Chairman John Conyers, D-Michigan, has said he would hold hearings this spring on potential updates to the Electronic Communications Privacy Act.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">\u201cMany Americans take for granted the protections of the Bill of Rights that prevent the government from coming into people\u2019s homes without a valid search warrant.<span style=\"mso-spacerun: yes\">&#0160; <\/span>The rise of cloud computing should not diminish these privacy safeguards,\u201d said Mike Hintze, Microsoft\u2019s associate general counsel<a href=\"http:\/\/microsoftontheissues.com\/cs\/blogs\/mscorp\/archive\/2010\/03\/30\/restoring-balance-to-american-surveillance-laws.aspx\">, in a blog post<\/a>.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Change will not be easy, however, and isn&#39;t expected this year.<span style=\"mso-spacerun: yes\">&#0160; <\/span>Americans have a rather tortured relationship with privacy. They often say one thing (&quot;Privacy is important to me&quot;) but do another (&quot;Sure, thanks for the coupon, here&#39;s my Social Security Number&quot;) noted Lee Rainie, head of the Pew Internet and American Life Project.<span style=\"mso-spacerun: yes\">&#0160; <\/span>And when it comes to law enforcement issues, their opinions are even more contradictory, particularly since Sept. 11, 2001.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&quot;Americans are concerned with bad actors doing bad things, and if you ask them if they are comfortable with law enforcement checking (online data) related to people who, for example, are going to hurt children, by and large they are,&quot; he said.<span style=\"mso-spacerun: yes\">&#0160; <\/span>On the other hand, they really value privacy, and are not comfortable with government agents having broad access to their data, he said. &quot;The way people think about privacy is very context sensitive,&quot; he added.<o:p><\/o:p><\/span><\/font><\/span><\/p>\n<p><span style=\"COLOR: black; mso-themecolor: text1\"><o:p><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><\/p>\n<p class=\"MsoNormal\" style=\"MARGIN: 0in 0in 10pt\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><span style=\"mso-spacerun: yes\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&#0160;<span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><span style=\"MARGIN: 0in 0in 10pt; FONT-FAMILY: Verdana; FONT-SIZE: 14px\"><span style=\"LINE-HEIGHT: 115%; FONT-SIZE: 12pt\"><span style=\"COLOR: black; mso-themecolor: text1\"><font size=\"3\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 12px\"><span style=\"FONT-FAMILY: Verdana; COLOR: black; FONT-SIZE: 12px\"><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\"><span style=\"COLOR: black; mso-themecolor: text1\"><span style=\"FONT-FAMILY: Verdana\"><span style=\"FONT-FAMILY: Verdana\"><span style=\"FONT-FAMILY: arial, helvetica, clean, sans-serif\"><strong><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Become a&#0160;<\/span><\/strong><a href=\"http:\/\/www.facebook.com\/pages\/Bob-Sullivan\/78714223105?_fb_noscript=1\" style=\"COLOR: blue; CURSOR: pointer; TEXT-DECORATION: underline\" ><strong><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">Red Tape Chronicles Facebook fan<\/span><\/strong><\/a><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 13px\">&#0160;<span style=\"FONT-FAMILY: Arial; FONT-SIZE: 14px\"><strong>or follow me at <\/strong><a href=\"http:\/\/twitter.com\/RedTapeChron\"><strong>http:\/\/twitter.com\/RedTapeChron<\/strong><\/a><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/font><\/span><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 9px\"><\/span><\/span><\/span><\/span><\/font><\/span><\/span><\/font><\/span><\/span><\/span><\/span><\/font><\/p>\n<p><\/span><\/o:p><\/span><\/p>\n<p><span style=\"FONT-FAMILY: Verdana; FONT-SIZE: 9px\"><\/span>&#0160;<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What would the Founding Fathers think about Internet-based \u201ccloud\u201d computing?&#0160; Would James Madison, for example, agree with some current interpretations of the Fourth Amendment, which hold that old-fashioned letters stored in a dresser drawer enjoy stronger legal protection against search and seizure than an e-mail stored on the Web or a private post left for [&hellip;]<\/p>\n","protected":false},"author":5524,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-526382","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/526382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/5524"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=526382"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/526382\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=526382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=526382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=526382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}