Category Archives: Cloud Computing

VMworld 2017: Everything you need to know about VMware’s hybrid cloud strategy – ZDNet

Special Feature

The Art Of The Hybrid Cloud

Cloud computing is insatiably gobbling up more of the backend services that power businesses. But, some companies have apps with privacy, security, and regulatory demands that preclude the cloud. Here's how to find the right mix of public cloud and private cloud.

Read More

VMware increasingly sees itself as the glue in hybrid cloud deployments, as its partnership with AWS is now generally available and the company rolled out a series of advances the preserve and grow its position.

At VMworld 2017, VMware CEO Pat Gelsinger rolled out a series of announcements and highlighted its customer base and partner network.

In a nutshell, VMware sketched out the following:

Here's a look at what you need to know about VMworld 2017.

VMware's primary strategy is to be a bridge between private and public clouds, as well as adopt new technologies, such as containers and OpenStack, as they arise, and maintain its customer base -- all as it grows businesses, such as software-defined networking tools like NSX.

So far, so good for VMware. The company highlighted companies such as ADP, Cerner, Liberty Mutual, Medtronic, and Western Digital as customers. These customers are also increasing spending as VMware's quarterly results shine.

Gelsinger sees VMware as a company that can clean up a "messy" app and infrastructure footprint. At VMware's analyst meeting at VMworld, Gelsinger said referring to enterprise apps and delivering them:

And about the cloud Gelsinger said:

No matter what niche of the data center market VMware targets, the aim is the same: Abstract the complexity and put the moving technology parts together.

Stifel analyst Brad Reback noted:

The general availability of the VMware Cloud on AWS only covers AWS' West region (Oregon) for now, but the broader rollout is on deck for 2018.

Read also: AWS cements hybrid cloud position with VMware partnership: Here's what it means

What VMware is really hoping to do is be the enabler that breaks down cloud silos. This graphic tells the tale.

Read also: What is cloud computing? Everything you need to know from public and private cloud to software as a service

And if hybrid cloud deployments are indeed accelerating VMware is in front of integration curve. For now, VMware Cloud on AWS is priced as you go, but VMware will offer one and three-year subscriptions.

Add it up and VMware is clearly embracing hyperscale public clouds. VMware customers get an onramp to AWS and VMware keeps its installed base secure. The limited beta was oversubscribed, so its safe to assume there will be strong demand ahead.

Look for VMware to craft broader deals with Google Cloud and Microsoft Azure on some level in the future.

Read also: Hybrid cloud: The smart person's guide | Software defined data centers: The smart person's guide

Speaking of deal making, VMware's software is increasingly being delivered via integrated appliances.

Lenovo, Hewlett Packard Enterprise, and Dell EMC all announced systems to couple VMware and hardware into one package. These hardware partnerships align to give VMware more of a play into high-performance computing.

VMware also announced partnerships with DXC, the combination of CSC and HPE Enterprise Services, as well as Fujitsu.

The general idea behind these partnerships is to offer integrated systems that can use private and public clouds, Cloud Foundry, OpenStack, and naturally, VMware's own platform.

To VMware, the software defined data center is going to include a bunch of integrated systems.

Related stories:

When it comes to security, VMware remained on message. Gelsinger's take on security echoed the company's approach with other areas: Make it simple and integrate. VMware again sees itself as the security linchpin between the private and public clouds. Gelsinger said:

Fundamentally, we the tech industry have failed you, the customer. It is simply too hard, too complex and breaches are growing far too fast.

We need a new approach.

VMware's focus on cloud security was echoed by a bevy of other partners. Palo Alto Networks said its Next-Generation Security Platform is available to VMware Cloud on AWS customers. The VMware-AWS partnership has allowed a bevy of security software and service integrations.

Fortinet said its FortiGate virtualized security was available for VMware on AWS. In addition, HyTrust outlined a security policy to protect workloads and support VMware Cloud on AWS.

IBM launched storage software dubbed IBM Spectrum Protect Plus to protect data in cloud, virtualized, and data center environments. IBM timed it launch and demonstration for VMworld.

Trend Micro said its Deep Security lineup is available to VMware Cloud customers on AWS. Trend Micro said it is enabling multiple security techniques such as policy application and vulnerability scanning on VMware and AWS.

There were also a bevy of partners outlining wares connected to VMware.

Here's the quick view:

In addition, VMware's partnership with AWS cleared the decks for more vendors to participate with products. For instance, Faction is offering managed VMware Cloud services on AWS.

VMware's positioning for 2017 and 2018 looks as strong as it has ever been. In the end, the hybrid cloud has bounced its way and the company has done well navigating various technology trends as well as a change in ownership via the Dell acquisition of EMC.

Cloud vs. Data Center decisions

Managing vendors

Here is the original post:
VMworld 2017: Everything you need to know about VMware's hybrid cloud strategy - ZDNet

Cloud Computing | HHS.gov

Introduction

With the proliferation and widespread adoption of cloud computing solutions, HIPAA covered entities and business associates are questioning whether and how they can take advantage of cloud computing while complying with regulations protecting the privacy and security of electronic protected health information (ePHI). This guidance assists such entities, including cloud services providers (CSPs), in understanding their HIPAA obligations.

Cloud computing takes many forms. This guidance focuses on cloud resources offered by a CSP that is an entity legally separate from the covered entity or business associate considering the use of its services. CSPs generally offer online access to shared computing resources with varying levels of functionality depending on the users requirements, ranging from mere data storage to complete software solutions (e.g., an electronic medical record system), platforms to simplify the ability of application developers to create new products, and entire computing infrastructure for software programmers to deploy and test programs. Common cloud services are on-demand internet access to computing (e.g., networks, servers, storage, applications) services. We encourage covered entities and business associates seeking information about types of cloud computing services and technical arrangement options to consult a resource offered by the National Institute of Standards and Technology; SP 800-145, The NIST Definition of Cloud Computing.[1]

The HIPAA Privacy, Security, and Breach Notification Rules (the HIPAA Rules) establish important protections for individually identifiable health information (called protected health information or PHI when created, received, maintained, or transmitted by a HIPAA covered entity or business associate), including limitations on uses and disclosures of such information, safeguards against inappropriate uses and disclosures, and individuals rights with respect to their health information. Covered entities and business associates must comply with the applicable provisions of the HIPAA Rules. A covered entity is a health plan, a health care clearinghouse, or a health care provider who conducts certain billing and payment related transactions electronically. A business associate is an entity or person, other than a member of the workforce of a covered entity, that performs functions or activities on behalf of, or provides certain services to, a covered entity that involve creating, receiving, maintaining, or transmitting PHI. A business associate also is any subcontractor that creates, receives, maintains, or transmits PHI on behalf of another business associate.

When a covered entity engages the services of a CSP to create, receive, maintain, or transmit ePHI (such as to process and/or store ePHI), on its behalf, the CSP is a business associate under HIPAA. Further, when a business associate subcontracts with a CSP to create, receive, maintain, or transmit ePHI on its behalf, the CSP subcontractor itself is a business associate. This is true even if the CSP processes or stores only encrypted ePHI and lacks an encryption key for the data. Lacking an encryption key does not exempt a CSP from business associate status and obligations under the HIPAA Rules. As a result, the covered entity (or business associate) and the CSP must enter into a HIPAA-compliant business associate agreement (BAA), and the CSP is both contractually liable for meeting the terms of the BAA and directly liable for compliance with the applicable requirements of the HIPAA Rules.

This guidance presents key questions and answers to assist HIPAA regulated CSPs and their customers in understanding their responsibilities under the HIPAA Rules when they create, receive, maintain or transmit ePHI using cloud products and services.

Yes, provided the covered entity or business associate enters into a HIPAA-compliant business associate contract or agreement (BAA) with the CSP that will be creating, receiving, maintaining, or transmitting electronic protected health information (ePHI) on its behalf, and otherwise complies with the HIPAA Rules. Among other things, the BAA establishes the permitted and required uses and disclosures of ePHI by the business associate performing activities or services for the covered entity or business associate, based on the relationship between the parties and the activities or services being performed by the business associate. The BAA also contractually requires the business associate to appropriately safeguard the ePHI, including implementing the requirements of the Security Rule. OCR has created guidance on the elements of BAAs[2]

A covered entity (or business associate) that engages a CSP should understand the cloud computing environment or solution offered by a particular CSP so that the covered entity (or business associate) can appropriately conduct its own risk analysis and establish risk management policies, as well as enter into appropriate BAAs. See 45 CFR 164.308(a)(1)(ii)(A); 164.308(a)(1)(ii)(B); and 164.502. Both covered entities and business associates must conduct risk analyses to identify and assess potential threats and vulnerabilities to the confidentiality, integrity, and availability of all ePHI they create, receive, maintain, or transmit. For example, while a covered entity or business associate may use cloud-based services of any configuration (public, hybrid, private, etc.),[3] provided it enters into a BAA with the CSP, the type of cloud configuration to be used may affect the risk analysis and risk management plans of all parties and the resultant provisions of the BAA.

In addition, a Service Level Agreement (SLA)[4] is commonly used to address more specific business expectations between the CSP and its customer, which also may be relevant to HIPAA compliance. For example, SLAs can include provisions that address such HIPAA concerns as:

If a covered entity or business associate enters into a SLA with a CSP, it should ensure that the terms of the SLA are consistent with the BAA and the HIPAA Rules. For example, the covered entity or business associate should ensure that the terms of the SLA and BAA with the CSP do not prevent the entity from accessing its ePHI in violation of 45 CFR 164.308(b)(3), 164.502(e)(2), and 164.504(e)(1).[6]

In addition to its contractual obligations, the CSP, as a business associate, has regulatory obligations and is directly liable under the HIPAA Rules if it makes uses and disclosures of PHI that are not authorized by its contract, required by law, or permitted by the Privacy Rule. A CSP, as a business associate, also is directly liable if it fails to safeguard ePHI in accordance with the Security Rule, or fails to notify the covered entity or business associate of the discovery of a breach of unsecured PHI in compliance with the Breach Notification Rule.

For more information about the Security Rule, see OCR and ONC tools for small entities[7] and OCR guidance on SR compliance.[8]

Yes, because the CSP receives and maintains (e.g., to process and/or store) electronic protected health information (ePHI) for a covered entity or another business associate. Lacking an encryption key for the encrypted data it receives and maintains does not exempt a CSP from business associate status and associated obligations under the HIPAA Rules. An entity that maintains ePHI on behalf of a covered entity (or another business associate) is a business associate, even if the entity cannot actually view the ePHI.[9] Thus, a CSP that maintains encrypted ePHI on behalf a covered entity (or another business associate) is a business associate, even if it does not hold a decryption key [10] and therefore cannot view the information. For convenience purposes this guidance uses the term no-viewservices to describe the situation in which the CSP maintains encrypted ePHI on behalf of a covered entity (or another business associate) without having access to the decryption key.

While encryption protects ePHI by significantly reducing the risk of the information being viewed by unauthorized persons, such protections alone cannot adequately safeguard the confidentiality, integrity, and availability of ePHI as required by the Security Rule. Encryption does not maintain the integrity and availability of the ePHI, such as ensuring that the information is not corrupted by malware, or ensuring through contingency planning that the data remains available to authorized persons even during emergency or disaster situations. Further, encryption does not address other safeguards that are also important to maintaining confidentiality, such as administrative safeguards to analyze risks to the ePHI or physical safeguards for systems and servers that may house the ePHI.

As a business associate, a CSP providing no-view services is not exempt from any otherwise applicable requirements of the HIPAA Rules. However, the requirements of the Rules are flexible and scalable to take into account the no-view nature of the services provided by the CSP.

All CSPs that are business associates must comply with the applicable standards and implementation specifications of the Security Rule with respect to ePHI. However, in cases where a CSP is providing only no-view services to a covered entity (or business associate) customer, certain Security Rule requirements that apply to the ePHI maintained by the CSP may be satisfied for both parties through the actions of one of the parties. In particular, where only the customer controls who is able to view the ePHI maintained by the CSP, certain access controls, such as authentication or unique user identification, may be the responsibility of the customer, while others, such as encryption, may be the responsibility of the CSP business associate. Which access controls are to be implemented by the customer and which are to be implemented by the CSP may depend on the respective security risk management plans of the parties as well as the terms of the BAA. For example, if a customer implements its own reasonable and appropriate user authentication controls and agrees that the CSP providing no-view services need not implement additional procedures to authenticate (verify the identity of) a person or entity seeking access to ePHI, these Security Rule access control responsibilities would be met for both parties by the action of the customer.

However, as a business associate, the CSP is still responsible under the Security Rule for implementing other reasonable and appropriate controls to limit access to information systems that maintain customer ePHI. For example, even when the parties have agreed that the customer is responsible for authenticating access to ePHI, the CSP may still be required to implement appropriate internal controls to assure only authorized access to the administrative tools that manage the resources (e.g., storage, memory, network interfaces, CPUs) critical to the operation of its information systems. For example, a CSP that is a business associate needs to consider and address, as part of its risk analysis and risk management process, the risks of a malicious actor having unauthorized access to its systems administrative tools, which could impact system operations and impact the confidentiality, integrity and availability of the customers ePHI. CSPs should also consider the risks of using unpatched or obsolete administrative tools. The CSP and the customer should each confirm in writing, in either the BAA or other documents, how each party will address the Security Rule requirements.

Note that where the contractual agreements between a CSP and customer provide that the customer will control and implement certain security features of the cloud service consistent with the Security Rule, and the customer fails to do so, OCR will consider this factor as important and relevant during any investigation into compliance of either the customer or the CSP. A CSP is not responsible for the compliance failures that are attributable solely to the actions or inactions of the customer, as determined by the facts and circumstances of the particular case.

A business associate may only use and disclose PHI as permitted by its BAA and the Privacy Rule, or as otherwise required by law. While a CSP that provides only no-view services to a covered entity or business associate customer may not control who views the ePHI, the CSP still must ensure that it itself only uses and discloses the encrypted information as permitted by its BAA and the Privacy Rule, or as otherwise required by law. This includes, for example, ensuring the CSP does not impermissibly use the ePHI by blocking or terminating access by the customer to the ePHI.[11]

Further, a BAA must include provisions that require the business associate to, among other things, make available PHI as necessary for the covered entity to meet its obligations to provide individuals with their rights to access, amend, and receive an accounting of certain disclosures of PHI in compliance with 45 CFR 164.504(e)(2)(ii)(E)-(G). The BAA between a no-view CSP and a covered entity or business associate customer should describe in what manner the no-view CSP will meet these obligations for example, a CSP may agree in the BAA that it will make the ePHI available to the customer for the purpose of incorporating amendments to ePHI requested by the individual, but only the customer will make those amendments.

As a business associate, a CSP that offers only no-view services to a covered entity or business associate still must comply with the HIPAA breach notification requirements that apply to business associates. In particular, a business associate is responsible for notifying the covered entity (or the business associate with which it has contracted) of breaches of unsecured PHI. See 45 CFR 164.410. Unsecured PHI is PHI that has not been destroyed or is not encrypted at the levels specified in HHS Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals [12] If the ePHI that has been breached is encrypted consistent with the HIPAA standards set forth in 45 CFR 164.402(2) and HHS Guidance [13] the incident falls within the breach safe harbor and the CSP business associate is not required to report the incident to its customer. However, if the ePHI is encrypted, but not at a level that meets the HIPAA standards or the decryption key was also breached, then the incident must be reported to its customer as a breach, unless one of the exceptions to the definition of breach applies. See 45 CFR 164.402. See also 45 CFR 164.410 for more information about breach notification obligations for business associates.

Generally, no. CSPs that provide cloud services to a covered entity or business associate that involve creating, receiving, or maintaining (e.g., to process and/or store) electronic protected health information (ePHI) meet the definition of a business associate, even if the CSP cannot view the ePHI because it is encrypted and the CSP does not have the decryption key.

As explained in previous guidance,[14] the conduit exception is limited to transmission-only services for PHI (whether in electronic or paper form), including any temporary storage of PHI incident to such transmission. Any access to PHI by a conduit is only transient in nature. In contrast, a CSP that maintains ePHI for the purpose of storing it will qualify as a business associate, and not a conduit, even if the CSP does not actually view the information, because the entity has more persistent access to the ePHI.

Further, where a CSP provides transmission services for a covered entity or business associate customer, in addition to maintaining ePHI for purposes of processing and/or storing the information, the CSP is still a business associate with respect to such transmission of ePHI. The conduit exception applies where the only services provided to a covered entity or business associate customer are for transmission of ePHI that do not involve any storage of the information other than on a temporary basis incident to the transmission service.

OCR does not endorse, certify, or recommend specific technology or products.

If a covered entity (or business associate) uses a CSP to maintain (e.g., to process or store) electronic protected health information (ePHI) without entering into a BAA with the CSP, the covered entity (or business associate) is in violation of the HIPAA Rules. 45 C.F.R 164.308(b)(1) and 164.502(e). OCR has entered into a resolution agreement and corrective action plan with a covered entity that OCR determined stored ePHI of over 3,000 individuals on a cloud-based server without entering into a BAA with the CSP.[15]

Further, a CSP that meets the definition of a business associate that is a CSP that creates, receives, maintains, or transmits PHI on behalf of a covered entity or another business associate must comply with all applicable provisions of the HIPAA Rules, regardless of whether it has executed a BAA with the entity using its services. See 78 Fed. Reg. 5565, 5598 (January 25, 2013). OCR recognizes that there may, however, be circumstances where a CSP may not have actual or constructive knowledge that a covered entity or another business associate is using its services to create, receive, maintain, or transmit ePHI. The HIPAA Rules provide an affirmative defense in cases where a CSP takes action to correct any non-compliance within 30 days (or such additional period as OCR may determine appropriate based on the nature and extent of the non-compliance) of the time that it knew or should have known of the violation (e.g., at the point the CSP knows or should have known that a covered entity or business associate customer is maintaining ePHI in its cloud). 45 CFR 160.410. This affirmative defense does not, however, apply in cases where the CSP was not aware of the violation due to its own willful neglect.

If a CSP becomes aware that it is maintaining ePHI, it must come into compliance with the HIPAA Rules, or securely return the ePHI to the customer or, if agreed to by the customer, securely destroy the ePHI. Once the CSP securely returns or destroys the ePHI (subject to arrangement with the customer), it is no longer a business associate. We recommend CSPs document these actions.

While a CSP maintains ePHI, the HIPAA Rules prohibit the CSP from using or disclosing the data in a manner that is inconsistent with the Rules.

Yes. The Security Rule at 45 CFR 164.308(a)(6)(ii) requires business associates to identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents that are known to the business associate; and document security incidents and their outcomes. In addition, the Security Rule at 45 CFR 164.314(a)(2)(i)(C) provides that a business associate agreement must require the business associate to report, to the covered entity or business associate whose electronic protected health information (ePHI) it maintains, any security incidents of which it becomes aware. A security incident under 45 CFR 164.304 means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system. Thus, a business associate CSP must implement policies and procedures to address and document security incidents, and must report security incidents to its covered entity or business associate customer.

The Security Rule, however, is flexible and does not prescribe the level of detail, frequency, or format of reports of security incidents, which may be worked out between the parties to the business associate agreement (BAA). For example, the BAA may prescribe differing levels of detail, frequency, and formatting of reports based on the nature of the security incidents e.g., based on the level of threat or exploitation of vulnerabilities, and the risk to the ePHI they pose. The BAA could also specify appropriate responses to certain incidents and whether identifying patterns of attempted security incidents is reasonable and appropriate.

Note, though, that the Breach Notification Rule specifies the content, timing, and other requirements for a business associate to report incidents that rise to the level of a breach of unsecured PHI to the covered entity (or business associate) on whose behalf the business associate is maintaining the PHI. See 45 CFR 164.410. The BAA may specify more stringent (e.g., more timely) requirements for reporting than those required by the Breach Notification Rule (so long as they still also meet the Rules requirements) but may not otherwise override the Rules requirements for notification of breaches of unsecured PHI.

For more information on this topic, see the FAQ about reporting security incidents(although directed to plan sponsors and group health plans, the guidance is also relevant to business associates); [16] as well as OCR breach notification guidance [17]

Yes. Health care providers, other covered entities, and business associates may use mobile devices to access electronic protected health information (ePHI) in a cloud as long as appropriate physical, administrative, and technical safeguards are in place to protect the confidentiality, integrity, and availability of the ePHI on the mobile device and in the cloud, and appropriate BAAs are in place with any third party service providers for the device and/or the cloud that will have access to the e-PHI. The HIPAA Rules do not endorse or require specific types of technology, but rather establish the standards for how covered entities and business associates may use or disclose ePHI through certain technology while protecting the security of the ePHI by requiring analysis of the risks to the ePHI posed by such technology and implementation of reasonable and appropriate administrative, technical, and physical safeguards to address such risks. OCR and ONC have issued guidance on the use of mobile devices and tips for securing ePHI on mobile devices. [18]

No, the HIPAA Rules generally do not require a business associate to maintain electronic protected health information (ePHI) beyond the time it provides services to a covered entity or business associate. The Privacy Rule provides that a business associate agreement (BAA) must require a business associate to return or destroy all PHI at the termination of the BAA where feasible. 45 CFR 164.504(e)(2)(J).

If such return or destruction is not feasible, the BAA must extend the privacy and security protections of the BAA to the ePHI and limit further uses and disclosures to those purposes that make the return or destruction of the information infeasible. For example, return or destruction would be considered infeasible if other law requires the business associate CSP to retain ePHI for a period of time beyond the termination of the business associate contract.[19]

Yes, provided the covered entity (or business associate) enters into a business associate agreement (BAA) with the CSP and otherwise complies with the applicable requirements of the HIPAA Rules. However, while the HIPAA Rules do not include requirements specific to protection of electronic protected health information (ePHI) processed or stored by a CSP or any other business associate outside of the United States, OCR notes that the risks to such ePHI may vary greatly depending on its geographic location. In particular, outsourcing storage or other services for ePHI overseas may increase the risks and vulnerabilities to the information or present special considerations with respect to enforceability of privacy and security protections over the data. Covered entities (and business associates, including the CSP) should take these risks into account when conducting the risk analysis and risk management required by the Security Rule. See 45 CFR 164.308(a)(1)(ii)(A) and (a)(1)(ii)(B). For example, if ePHI is maintained in a country where there are documented increased attempts at hacking or other malware attacks, such risks should be considered, and entities must implement reasonable and appropriate technical safeguards to address such threats.

No. The HIPAA Rules require covered entity and business associate customers to obtain satisfactory assurances in the form of a business associate agreement (BAA) with the CSP that the CSP will, among other things, appropriately safeguard the protected health information (PHI) that it creates, receives, maintains or transmits for the covered entity or business associate in accordance with the HIPAA Rules. The CSP is also directly liable for failing to safeguard electronic PHI in accordance with the Security Rule [20] and for impermissible uses or disclosures of the PHI. [21]. The HIPAA Rules do not expressly require that a CSP provide documentation of its security practices to or otherwise allow a customer to audit its security practices. However, customers may require from a CSP (through the BAA, service level agreement, or other documentation) additional assurances of protections for the PHI, such as documentation of safeguards or audits, based on their own risk analysis and risk management or other compliance activities.

No. A CSP is not a business associate if it receives and maintains (e.g., to process and/or store) only information de-identified following the processes required by the Privacy Rule. The Privacy Rule does not restrict the use or disclosure of de-identified information, nor does the Security Rule require that safeguards be applied to de-identified information, as the information is not considered protected health information. See the OCR guidance on de-identificationfor more information.[22]

[1] See http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf

[3] As adapted from NIST Special Publication 800-144, vi:

A Public cloud is open for use by the general public and may be owned, managed, and operated by any organization. Examples are the message storage services offered by major email providers, photo-sharing sites, and certain EMR providers. Many large organizations use Private clouds that exclusively serve their business functions. A Community cloud serves exclusively a specific community of users from organizations that have shared concerns. A Hybrid cloud is a combination of any of the above, bound together by standardized or proprietary technology that enables data and application portability.

[9] 78 Fed. Reg. 5,566, 5,572 (January 25, 2013).

[10] A key used to encrypt and decrypt data, also called a cryptographic key, is [a] parameter used in conjunction with a cryptographic algorithm that determines its operation in such a way that an entity with knowledge of the key can reproduce or reverse the operation, while an entity without knowledge of the key cannot. See NIST SP 800-47 Part 1 Revision 4, Recommendation for Key Management Part 1: General (January 2016). Available at http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf

[19] 67 Fed. Reg. 53181, 53254 (August 14, 2002).

[20] See Section 13401 of the HITECH Act.

[21] See 45 CFR 164.502(a)(3).

More:
Cloud Computing | HHS.gov

Oppo, Vivo plan to move cloud storage to India – Economic Times

NEW DELHI: Chinese smartphone makers Oppo and Vivo plan to move their cloud service locations to India, while an up and coming brand from the Asian country has called off talks with developers of apps to be pre-loaded on its devices after the Indian government asked handset companies to share their customer data security protocols.

According to senior industry executives, some domestic device vendors are also seeking clarity from pre-loaded app developers about security features to protect user data after the IT ministry recently ordered almost 30 smartphone makers mostly Chinese to share their information security protocols by August 28.

Oppo and Vivo have their cloud outside India, which is usually outsourced to enterprise cloud service and data server providers like Amazon. They are now asking them to change the location of these clouds to Indian territory, said a senior executive, asking not to be identified.

Amazon Web Services and Microsoft Azure are the leading cloud and server providers and both have a presence in India. The companies did not respond to queries about whether Chinese, multinational or Indian handset makers had discussed shifting of their remote data-storage locations.

Vivo and Oppo, which are No. 3 and No. 4 in India by market share, declined to comment.

A relatively new Chinese entrant, which has soared up the handset market ranks, has halted talks with app developers after getting the government order. Its CEO said that while the companys servers and cloud storage were local, it wants to ensure compliance with any upcoming government rules before entering into agreements with app developers. Pre-loading apps on a device would give the handset maker additional revenue, he added.

A leading Indian handset brand with servers in the country has asked developers of apps that were being pre-bundled on some of its devices to share their user information protection protocols.

We have asked them internally, so we can tell the government, a senior executive of the company said, asking not to be identified.

Cyber security experts said that moving cloud services to India would only be the first step that companies would have to take considering that the governments long-term view is to keep data of mobile phone users within the country.

If companies are moving their cloud-based data to India, its fine as that is the first level where data is stored and it can be easily accomplished. But the more important aspect to address is whether data would leave India at any point for processing, analytics, etc., said Amit Jaju, partner, cyber forensics and data analytics, at EY. The regulations need to be clearer in defining this.

Moving cloud locations would take one to two weeks and the cost would not be very high.

However, if to move the cloud to India a brand has to change its service provider from one which doesnt have an India-ready model to one which has, that transition can become effort- and cost-oriented, said Atul Gupta, partner of IT advisory at KPMG India . EYs Jaju said large mobile companies, including Chinese handset makers, will increasingly have to keep their data storage locations within the countries where they operate as rules to protect user privacy globally, including India, become stronger.

In the European Union, fines of up to 20 million euros or 4% of revenue of a data controller can be levied for any violation, including security breaches. The proposed rules under which personal data of EU users needs to remain in the Union come into effect in May 2018.

India has directed 30 handset makers including Apple, Samsung, Micromax, Xiaomi and Lenovo to share the procedures and processes they use to ensure the security of mobile phones sold in the country by August 28.

We comply with all regulations of the Indian government, a Samsung spokesperson said. Indian companies including Micromax have made similar statements.

Read this article:
Oppo, Vivo plan to move cloud storage to India - Economic Times

Marketo decides to go all-in on cloud computing, and picks Google as its home – GeekWire

Diane Greene, senior vice president for Google Cloud, speaks at Google Cloud Next this morning. (Google Photo)

One of the bigger marketing software companies, Marketo, has decided its ready to ditch its servers and move into the cloud, and Google is getting the business.

The two companies announced a multiyear collaboration strategy Thursday that will see Marketo move its business onto Google Cloud Platform over the next couple of years, and Google will do some work to integrate Marketos products into G Suite. Forbes noted that Google provided migration incentives in order to sweeten the deal, which will further the notion that a lot of Googles major customer wins have come at the cost of steep discounts for its services.

Still, the multiyear agreement provides Google with another long-term customer that could help it woo others, especially other marketing companies. Marketo told Forbes that one of the main reasons it choose Google was because of its in-house marketing savvy as one of the biggest advertising brokers in the world, and that might be an interesting niche for Google to pursue as other software-as-a-service marketing companies plot out cloud strategies.

Marketos software is used by a lot of companies to manage their marketing operations, from lead generation to campaign measurement. It might have decided that it needed some IT assistance earlier this year when it somehow forgot to renew its domain name registration and went down for several hours until it could fix the problem.

Google has been making slow but steady process in its cloud efforts, as it tries to shed a reputation for lacking the enterprise sales touch that Amazon Web Services and Microsoft enjoy. It has stepped up its support of hybrid cloud strategies through deals with Nutanix and just this week lowered prices on networking costs for customers that dont require all the performance that Googles fiber network provides.

The rest is here:
Marketo decides to go all-in on cloud computing, and picks Google as its home - GeekWire

Biz Cloud Computing – Four States Homepage

More News

JOPLIN, Mo. - "It's just like I'm there at the office," says Wendy Brunner-Lewis.

She says it's hard to imagine not being able to tap into the Cloud. "How many times have you woken up and your kids are sick and you think, 'Oh gosh, all my stuff's at the office.' You know it's nice that you don't have to try to remember everything you need the night before and bring home," Brunner-Lewis says.

A study by IDG Enterprise says almost seven out of ten offices are doing at least part of their work remotely, or on the Cloud. And it predicts it will be 100% within three years.

John Motazedi with Joplin IT company SNCSquared says that's likely due to advantages like reduced maintenance. "Most of those things are already done by the vendor. So you don't spend time backing it up, you don't spend time patching it doing updates," he says.

He also points to the flexibility; you aren't limited by the size of your hardware on site, kind of like electricity. "Most people don't have a generator in their house. They use electricity whenever they need it, they have wires that come to their house," Motazedi says.

He adds security is a high priority, so new users should check out the Cloud service before signing up. "There is a difference in data centers and how secure access to those data centers are," Motazedi says.

SNC Squared is holding a seminar on Cloud computing next month.

See the article here:
Biz Cloud Computing - Four States Homepage

Top 2 aspects of cloud computing you need to consi – Accountingweb.com (blog)

If you are planning to invest in a cloud computing environment, you are not alone. In the present era, majority of business owners prefer to invest in cloud and data centre services in order to provide their customers with improved services. Although the large enterprises can plan to invest in personalized data centres, its hardly possible for SMEs. However, in order to cater to their target audience in a better way, they need to upgrade the quality of their services and products. This is where a cloud solution seems to be the most reliable option.

With the emergence of big data, each and every company needs a proper data storage facility in order to continue with their business initiatives properly. Cloud is a cost effective solution to store all the business critical data securely. But is it completely secure to store your mission critical data in cloud? Well, that is where you need to do a thorough research on your own business requirements and identify what kind of a cloud solution can meet your needs. At the same time, you should also be aware of the probable risk factors while investing in a cloud solution as this will help you deal with the situations tactfully in future. According to the industry experts, there are some aspects that you need to consider thoroughly and then determine whether or not you should opt for a cloud based solution. Here are two of the most relevant aspects of storing data in cloud that you should give a thought well in advance

If you are planning to invest in a cloud environment, make sure you have a clear understanding of all the core features of it. This will help you make a better utilization of the service you invest in.

See the original post here:
Top 2 aspects of cloud computing you need to consi - Accountingweb.com (blog)

Cloud Computing Confirmed for Travers | TDN | Thoroughbred Daily … – Thoroughbred Daily News

Cloud Computing at Saratoga | Sarah K. Andrew

After some deliberation by trainer Chad Brown, Klaravich Stables and William Lawrences GI Preakness S. winner Cloud Computing (Macleans Music) will compete in Saturdays GI Travers S. at Saratoga, the Eclipse Award-winning conditioner confirmed Monday morning. The latest addition to the expected full field augments an already competitive race that is expected to also draw GI Kentucky Derby winner Always Dreaming (Bodemeister) and GI Belmont S. hero Tapwrit (Tapit) from the Todd Pletcher barn.

Second in the Mar. 4 GIII Gotham S. and third in the Apr. 8 GII Wood Memorial S. prior to his win in the Preakness May 20, Cloud Computing returned from a two-month layoff with a disappointing last-of-five finish as the 6-5 second choice in the July 29 GII Jim Dandy S., the traditional prep for the Travers. He was asked to stay closer to a decidedly moderate pace that day and came up empty in the stretch, despite being beaten just 4 3/4 lengths by Good Samaritan (Harlans Holiday). The colt has worked twice since then, most recently posting a five-furlong move in 1:01.65 Saturday.

He couldnt have worked any better, said Brown. I was very happy with the work and Javier was pleased, and he came out of his work well.

Brown said recently inducted Hall of Fame jockey Javier Castellano will ride Cloud Computing in the Traversa race he has won a record five times.

Not a subscriber? Click here to sign up for the daily PDF or alerts.

Here is the original post:
Cloud Computing Confirmed for Travers | TDN | Thoroughbred Daily ... - Thoroughbred Daily News

Why 2017 Is The Year To Understand Cloud Computing – Nasdaq

The Cloud has become a major buzzword in business for very good reason. Small businesses and large enterprises alike cantake advantage of cloud computingto build and expand the computer based infrastructurebehind the scenes. Follow this guide to better understand what cloud computing is, how it works, and how you can take advantage.

In the old world of web servers and internet infrastructure, websites and other online assets were typically limited to one main server, or a few linked servers using tools called load balancers, to process and send data, whether it be acustomer facing websiteor internal facing application. The advent of content delivery networks (CDNs) powered up those servers to host and serve data from the edge of the network for faster serving and sometimes lower costs.

As computing demand exploded with the rise of the smartphone and high-speed internet, consumer and business needs downstream of those servers continues to creep upward. Cloud computing has emerged as the best option to handle an array of computing needs for startups and small businesses due to the ability to start at a low cost and scale, almost infinitely, as demand grows. Advances in cloud technology at Amazon, Google, Microsoft, IBM, Oracle, and other major cloud providers is making cloud computing more desirable for all businesses.

When cloud computing first emerged, large enterprises were the only businesses able to afford the cost of elastic, flexible computing power. Now, however, those costs are more likely a drop in the bucket for small businesses.

For example, I use the cloud to store and serve videos forDenver Flash Mob, a side hustle business I run with my wife. Our monthly bill is typically around a dollar or two, and heavy months lead to a bill around five bucks. No big deal! Mylending startup Money Molais also cloud based, with costs to run both a development server and public facing server running us around $30 per month.

The first time I logged into Amazon Web Services (AWS) it seemed like I needed a computer science degree to use it! I had a hard time doing even basic tasks outside of uploading and sharing videos. Thankfully Amazon has made using AWS much easier, though it is not without its challenges.

Im a pretty techy guy, so my skillset is a bit more advanced than the average computer user. I have setup AWS to send outgoing transactional emails,automatically backup websites, and more on my own. If you are willing and able to hire a cloud expert, the possibilities of the cloud are endless. Anything from web hosting to artificial intelligence and big data analysis can run in the cloud.

The most basic way to get started with cloud computing is website and computer backups. If you use WordPress for your website, setting up cloud backups is simple with one of a handful of plugins likeUpdraft Plus. If you can use the WordPress dashboard, you can setup cloud backups with Updraft plus. It is quick and easy and includes out of the box support. Easy from companies like AWS, Drobox, Google Drive, Rackspace Cloud, and other services. The paid plugin version adds access to Microsoft OneDrive and Azure, Google Cloud Storage, and other options.

I runseveral backups of both my laptop and my web based assets. If my home were to be burglarized or burned down, the cloud has me covered. If my laptop is stolen, I have a backup at home and in the cloud. Redundant backups are not optional, they are a must in 2017.

In addition to safe, secure backups, the cloud can reach far corners of the planet. Utilizingcloud based CDNs, you know your customers will get every video and web page they want with near instant speeds.

Lets say your business has a popular video you want to share around the world. With acloud CDN, you upload your video once to the web. Then the CDN takes over and creates copies of that video file in data centers around the world. Whenever a customer clicks to view that video, they are served a copy from the closest data center to their location.

Thanks to the power of a CDN, you dont have to send viewers in Australia, London, Bangkok, and Buenos Aires a video from your web server in Texas. Each one gets a local copy so they get their video even faster, offering a better customer experience. App based businesses can even run multiple versions of their app in data centers around the world. This will nsure every user has the same great experience.

It doesnt matter what your business does, there is some way the cloud can help you achieve better results. The cloud is only going to grow and become more prominent in business. Older computer methods will go the way of the fax machine. If you want serious computing success with scalability and flexibility, the cloud is your best option.

This article was originally published on Due.com.

The views and opinions expressed herein are the views and opinions of the author and do not necessarily reflect those of Nasdaq, Inc.

Read the original post:
Why 2017 Is The Year To Understand Cloud Computing - Nasdaq

VMware shares to surge more than 20% because the Amazon cloud threat is overblown: Analyst – CNBC

Wall Street rarely talks about its mistakes, but Deutsche Bank admitted it overestimated the Amazon Web Services threat to VMware's business.

The firm raised its rating for VMware shares on Monday to buy from hold, saying the company's server virtualization software can continue to thrive in a cloud-computing world.

"We've spent much of the last two years worried about VMware's on-premise core server business given its maturity and the threat from AWS/Cloud adoption [Amazon Web Services]," analyst Karl Keirstead wrote in a note to clients entitled "Overcoming our AWS fears."

"This upgrade should be seen in the context of growing evidence that large enterprises are embracing a hybrid model, materially lowering the out-year risk profile of VMware shares."

The hybrid model is defined by companies using both local servers on-site and cloud-computing servers off-site. Keirstead said he realized the staying power of VMWare's on-site server market was more "durable" than he originally forecast.

"We believe that large enterprises are migrating IT workloads to the public cloud model at a slower-than-expected pace and are electing to ramp spending to modernize their on-premise IT infrastructures," he wrote. "Our recent checks agree that VMware technology is proving to be more durable than they would have thought 12-18 months ago."

As a result, Keirstead increased his VMware price target to $120, which is 24 percent higher than Monday's close. His previous price target was $110.

VMware shares are outperforming the market this year. Shares have risen 23.2 percent year to date through Monday compared with the S&P 500's 8.5 percent gain.

The analyst said he is also cautiously optimistic about the VMware and Amazon AWS strategic partnership announced in October, which enables access to AWS computing power for the company's customers.

"We are positive on the deal for both parties. It is hard to imagine how this could end up being a net negative for either party," he wrote. "We conclude that the stock can still work even if the initial lift from VMware Cloud on AWS is modest."

VMware will report second-quarter earnings on Thursday after the market close. Its stock traded up 1.8 percent short after Tuesday's market open.

CNBC's Michael Bloom contributed to this story.

Read this article:
VMware shares to surge more than 20% because the Amazon cloud threat is overblown: Analyst - CNBC

Microsoft acquires cloud computing firm Cycle Computing to boost … – The News Minute


The News Minute
Microsoft acquires cloud computing firm Cycle Computing to boost ...
The News Minute
To accelerate big computing in the Cloud, Microsoft has acquired Cycle Computing, a leader in cloud computing orchestration, for an undisclosed sum. With this ...
Cycle Computing will make Microsoft Azure more appealing to more enterprisesTechRepublic
Microsoft acquires cycle computing for users to accelerate to cloudETCIO.com
Microsoft acquires Cloud firm Cycle ComputingBusiness Standard
DeathRattleSports.com
all 19 news articles »

Here is the original post:
Microsoft acquires cloud computing firm Cycle Computing to boost ... - The News Minute