Home > JITPL > Vol. 27 > Iss. 4 (2010)
UIC John Marshall Journal of Information Technology & Privacy Law
Citations to This Work
- Jay P. Kesan, Carol M. Hayes & Masoodan. Bashir, A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, 91 Ind. L.J. 267 (2016)
Abstract
This paper examines the evolution of a number of cloud computing services’ terms of use with the aim to discern whether they offer less or more (or equal) privacy safeguards. To better highlight the changes cloud computing has brought about, I focus on those privacy terms that relate to the special modus operandi of cloud services. This paper proceeds in three parts. Part I identifies the special ways by which cloud computing challenges privacy. Part II discusses a series of privacy terms commonly found in the sampled cloud computing services and follows their evolution by comparing previous versions where available. Part III then goes on to analyze what the changes mean and whether they give reasons to believe that cloud computing will more deeply compromise privacy. The overall conclusion is that cloud computing does result in the collection of more private information, but this mostly happens voluntarily. Thus, this paper concludes, cloud computing poses a greater threat insofar as more information is being collected and shared, but from a technological perspective cloud companies do not appear to indulge in greater privacy compromises than necessary to deliver their services.
Recommended Citation
Konstantinos K. Stylianou, An Evolutionary Study of Cloud Computing Services Privacy Terms, 27 J. Marshall J. Computer & Info. L. 593 (2010)
Included in
Computer Law Commons, Internet Law Commons, Privacy Law Commons, Science and Technology Law Commons