Data protection in cloud computing: The Swedish perspective

Research output: Contribution to journalArticleResearchpeer-review

6 Citations (Scopus)

Abstract

This article describes and analyses three recent decisions by the Swedish Data Inspection Board (Datainspektionen) directly focused on cloud computing. All three decisions were published on 28 September 2011 as part of a supervisory project seeking to clarify what demands the Data Protection Act places on organisations utilising cloud computing. As such, and due to the fact that similar concerns arise in the three matters, there is considerable overlap between the three decisions. Indeed, large parts of text are identical in the three decisions. To avoid repetition, I discuss the first decision in most detail, and limit the discussion of overlapping issues in the context of the other two decisions.

Original languageEnglish
Pages (from-to)476-480
Number of pages5
JournalComputer Law and Security Review
Volume28
Issue number4
DOIs
Publication statusPublished - Aug 2012

Fingerprint

data protection
Data privacy
Cloud computing
Inspection
Data protection
act

Cite this

@article{270ed2391ed54c5c807075eccdd28f33,
title = "Data protection in cloud computing: The Swedish perspective",
abstract = "This article describes and analyses three recent decisions by the Swedish Data Inspection Board (Datainspektionen) directly focused on cloud computing. All three decisions were published on 28 September 2011 as part of a supervisory project seeking to clarify what demands the Data Protection Act places on organisations utilising cloud computing. As such, and due to the fact that similar concerns arise in the three matters, there is considerable overlap between the three decisions. Indeed, large parts of text are identical in the three decisions. To avoid repetition, I discuss the first decision in most detail, and limit the discussion of overlapping issues in the context of the other two decisions.",
author = "Svantesson, {Dan Jerker B}",
year = "2012",
month = "8",
doi = "10.1016/j.clsr.2012.05.005",
language = "English",
volume = "28",
pages = "476--480",
journal = "Computer Law and Security Review",
issn = "0267-3649",
publisher = "Elsevier",
number = "4",

}

Data protection in cloud computing : The Swedish perspective. / Svantesson, Dan Jerker B.

In: Computer Law and Security Review, Vol. 28, No. 4, 08.2012, p. 476-480.

Research output: Contribution to journalArticleResearchpeer-review

TY - JOUR

T1 - Data protection in cloud computing

T2 - The Swedish perspective

AU - Svantesson, Dan Jerker B

PY - 2012/8

Y1 - 2012/8

N2 - This article describes and analyses three recent decisions by the Swedish Data Inspection Board (Datainspektionen) directly focused on cloud computing. All three decisions were published on 28 September 2011 as part of a supervisory project seeking to clarify what demands the Data Protection Act places on organisations utilising cloud computing. As such, and due to the fact that similar concerns arise in the three matters, there is considerable overlap between the three decisions. Indeed, large parts of text are identical in the three decisions. To avoid repetition, I discuss the first decision in most detail, and limit the discussion of overlapping issues in the context of the other two decisions.

AB - This article describes and analyses three recent decisions by the Swedish Data Inspection Board (Datainspektionen) directly focused on cloud computing. All three decisions were published on 28 September 2011 as part of a supervisory project seeking to clarify what demands the Data Protection Act places on organisations utilising cloud computing. As such, and due to the fact that similar concerns arise in the three matters, there is considerable overlap between the three decisions. Indeed, large parts of text are identical in the three decisions. To avoid repetition, I discuss the first decision in most detail, and limit the discussion of overlapping issues in the context of the other two decisions.

UR - http://www.scopus.com/inward/record.url?scp=84864627827&partnerID=8YFLogxK

U2 - 10.1016/j.clsr.2012.05.005

DO - 10.1016/j.clsr.2012.05.005

M3 - Article

VL - 28

SP - 476

EP - 480

JO - Computer Law and Security Review

JF - Computer Law and Security Review

SN - 0267-3649

IS - 4

ER -