SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Is Privacy A Cloud
Illusion?
Five Hidden Facts You Need to Know
© 2014 StoAmigo. The information contained within these marketing materials is strictly for illustrative purposes, and the
figures herein are not guaranteed for accuracy. The information used in preparing these materials are from sources we believe
to be accurate, or reasonably estimated, however StoAmigo has not made any investigation into the accuracy of these sources.
StoAmigo does not intend for these marketing materials to be a substitute for appropriate due diligence investigations.
StoAmigo, or its agents, and/or affiliates make(s) no further warranties, express or implied, for any reason or purpose to any
party in possession of these marketing materials.
What is the Cloud?
With all the recent headlines and revelations about privacy and security of the cloud, users are
becoming more and more concerned about what’s happening to their files and who really has access to
them. We wanted to share some important facts about the cloud that you may not be aware of.
But first, let’s define “The Cloud”. In the simplest terms, cloud computing means storing and accessing
data and programs over the Internet instead of your computer’s hard drive. This would obviously
include cloud storage providers, but what some people don’t realize is that the Cloud also includes email
service providers, photo and video sharing sites, and social media sites.
With that in mind, here are five things you need to know about the Cloud:
1. Multiple copies are created in the Cloud
Have you ever thought about the number of copies created for everything you put
in the Cloud? Let’s start with something as simple as sending an email attachment.
Most people tend to think they attach a file to an email, send it to someone and
that person opens it. However, there’s much more to it. First, that file is in a folder
on your computer. When you attach it to an email, a copy is made in your email
program. Another copy is stored online by your email service. They also make a
backup copy. Then it goes to the inbox of the recipient and one or two copies are
stored online before it is opened in the recipient’s email program, which makes
another copy. If the recipient decides to keep it, he will save it somewhere on his
computer. That’s seven or eight copies right there. If he sends it to other people,
the whole process gets repeated. The bottom line is there’s no way for you to
control the number of copies created, or how and where they are circulated.
2. Storing files on the Cloud may not be as private as you think
Every email
attachment
you send
creates 7 or
more copies
of your file…
“With the Cloud, you don’t own
anything. You already signed it
away through the legalistic
terms of service with a cloud
provider that computer users
must agree to.”
Steve Wozniak, Co-founder,
Apple
Another often overlooked fact about the Cloud lies in the privacy
policies of the cloud providers. Some services are more liberal than
others about using and sharing your information. The privacy policies
were not created to protect the users; these policies were created to
protect the cloud providers.
Many of the policies and terms-of-use conditions grant the cloud
providers a broad license as to their usage and control over your
media. Some even state that you are giving them exclusive rights to
your files when you put your files on their systems.
Here is a quote from the Terms of Service of a popular social media
site:
You hereby grant us and our contractors the right to use, modify, adapt,
reproduce, distribute, display and disclose content posted on this service solely
to the extent necessary to provide the service or as otherwise permitted by these
terms.
If you haven’t read the privacy policies and Terms of Service of your cloud storage provider or favorite
social media sites, you may be giving away copies of your files without knowing it.
3. Files don’t always get deleted
The next point we’d like to share involves file deletion. Computer networking relies heavily on
redundancy and backup capabilities to ensure the networks remain trouble free and provide quick
access and navigation to files and stored media. Consequently it should come as no surprise that when
we try to delete a file that’s hosted on a web server, other copies almost certainly exist and will continue
to do so.
Your original file (center) may be deleted,
but copies still remain on backup servers.
Many providers even state in their terms and conditions that copies of your media will remain on their
servers and in their backup facilities after you’ve deleted your originals. Here are excerpts from the
published terms of some providers:
It typically takes about one month to delete an account, but some information
may remain in backup copies and logs.
Please note that there might be a latency in deleting information from our
servers, and backed-up versions might exist after deletion.
So remember, just because you don’t see it anymore doesn’t mean it’s gone.
4. Where in the world are your files?
The fourth thing you should know concerns the physical location of the files stored in the Cloud. All we
know is that our media is on a provider’s server, but we don’t know where the servers are. The fact of
the matter is that most services have multiple networks interconnected in various states and countries.
It’s literally impossible to tell exactly where your files are stored.
Realizing that your media could potentially be stored anywhere, the next logical conclusion is that it will
be subjected to and governed by differing rules and regulations, depending on the geographic location
of the server hosting it. Rarely do consumers know where their files are stored, when they are moved to
a different location, or how that may affect the security of their files.
Did you know that most cloud storage providers don’t actually have their own servers? You may agree
to the privacy policy of your provider, but do you know what policies are in place for the company that
owns the servers where your data is actually stored? It might be unclear if their policy is the same as
your storage provider’s, who can see your files and what your rights are in the end.
The World Privacy Forum sums it up like this:
Indeed, it may be impossible for a casual user to know in advance or with
certainty which jurisdiction’s law actually applies to information entrusted to a
cloud provider. These uncertainties complicate the ability of a user to determine
the protections that apply to data entrusted to a cloud provider.1
5. Who has access to your files might surprise you
Finally, one of the largest concerns is, “Who has access to the files we
store online?” Not knowing where your media is – coupled with the
varying laws, rules and regulations governing it – creates a number of very
serious questions.
Given some of the policy statements and terms of use we’ve discussed,
how can you be certain that your files are secure and not being accessed
by someone you don’t know and have not given permission to get into
them?
Privacy advocates have long been speaking out in regards to our rights to
privacy for media and files we store on the internet. The general
consensus among legal officials is that our rights to privacy don’t typically
apply to media stored outside of our home.
“The Fourth Amendment does
not protect communications
held in electronic storage such
as email messages stored on a
server, because internet users
do not have a reasonable
expectation of privacy in such
communications.”
World Privacy Forum
1
World Privacy Forum, Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, 2009
the rights to their own content.
The message is clear: the safest place to store your media is in the privacy of your own home. Putting
your files on an unknown server in an unknown location is basically handing over control and ownership
of your files.
What’s the alternative?
As technology continues to evolve rapidly, policies and laws may lag behind. In the resulting state of
uncertainty about our rights to privacy in the Cloud, keeping our files in our own possession is the safest
course of action. Fortunately there are alternatives available that meet our need for privacy and our
desire to have the convenience of cloud computing – such as the CloudLocker.
The CloudLocker is a personal cloud device that sits in your home or office and allows you to access and
manage your files from anywhere. Simply connect it to your network and you’re ready to go.
CloudLocker is easily managed from any computer or through your portable smart devices with our
mobile app. The CloudLocker is a private and secure alternative to public cloud storage, replacing the
network and cloud servers by hosting your media and keeping it in your possession.
There is no longer a need for email attachments. Users can send a customized email message that
includes a link to the file stored in their CloudLocker. Each share
includes unique permission settings that let the user control
who can simply view the file, who can share the file with others
and who can download it. If you change your mind, you can
modify or retract the share at any time.
CloudLocker came about from the growth of mobile computing
and social media, and here is where its breakthrough
technology really shines.
When you use CloudLocker to post pictures, videos or any type
of file to social media sites, you don’t post the file itself. You
merely post a link to the file which is stored on your
CloudLocker. If you later decide to break the link, the file will
not be accessible from the social media site anymore. This is a
great safety net for all types of social media and allows users to retain
CloudLocker offers a host of fun and convenient features that
represent the best of cloud technology, while protecting your right
to privacy in a way that a public cloud cannot.
Find out more:
For more information on CloudLocker, please visit www.stoamigo.com
© 2014 StoAmigo. All rights reserved.
CloudLocker connects easily to your home
network and provides access to your files
at home or away.

Más contenido relacionado

Destacado

Optimizing content for the "mobile web"
Optimizing content for the "mobile web"Optimizing content for the "mobile web"
Optimizing content for the "mobile web"Chris Mills
 
Barter for Hotels and Resorts
Barter for Hotels and ResortsBarter for Hotels and Resorts
Barter for Hotels and ResortsSelina Markham
 
Communication Centre Manager
Communication Centre ManagerCommunication Centre Manager
Communication Centre ManagerRobert Stewart
 
Cuadro de la temporalidad de un lustro
Cuadro de la temporalidad de un lustroCuadro de la temporalidad de un lustro
Cuadro de la temporalidad de un lustroMaria Moguel Herrera
 
Francesca Sanzo @GGD8 Bologna camp
Francesca Sanzo @GGD8 Bologna campFrancesca Sanzo @GGD8 Bologna camp
Francesca Sanzo @GGD8 Bologna campGGDBologna
 
Viajarporelmundo
ViajarporelmundoViajarporelmundo
Viajarporelmundobillbabeaux
 
Collect Bad Debt Using Barter: Chinese
Collect Bad Debt Using Barter: ChineseCollect Bad Debt Using Barter: Chinese
Collect Bad Debt Using Barter: ChineseDaniel Evans
 
Dr Martin Poulter, Wikipedia and higher education
Dr Martin Poulter, Wikipedia and higher educationDr Martin Poulter, Wikipedia and higher education
Dr Martin Poulter, Wikipedia and higher educationmediazoo
 
Network motifs in integrated cellular networks of transcription–regulation an...
Network motifs in integrated cellular networks of transcription–regulation an...Network motifs in integrated cellular networks of transcription–regulation an...
Network motifs in integrated cellular networks of transcription–regulation an...Samuel Sattath
 
Libras Annual Meeting 2010 New Web Site
Libras Annual Meeting 2010 New Web SiteLibras Annual Meeting 2010 New Web Site
Libras Annual Meeting 2010 New Web SiteWade Stewart
 

Destacado (15)

Optimizing content for the "mobile web"
Optimizing content for the "mobile web"Optimizing content for the "mobile web"
Optimizing content for the "mobile web"
 
Barter for Hotels and Resorts
Barter for Hotels and ResortsBarter for Hotels and Resorts
Barter for Hotels and Resorts
 
Intro to cardiology
Intro to cardiologyIntro to cardiology
Intro to cardiology
 
Estrategias de búsqueda
Estrategias de búsqueda Estrategias de búsqueda
Estrategias de búsqueda
 
Communication Centre Manager
Communication Centre ManagerCommunication Centre Manager
Communication Centre Manager
 
4
44
4
 
French project
French projectFrench project
French project
 
Estomas
EstomasEstomas
Estomas
 
Cuadro de la temporalidad de un lustro
Cuadro de la temporalidad de un lustroCuadro de la temporalidad de un lustro
Cuadro de la temporalidad de un lustro
 
Francesca Sanzo @GGD8 Bologna camp
Francesca Sanzo @GGD8 Bologna campFrancesca Sanzo @GGD8 Bologna camp
Francesca Sanzo @GGD8 Bologna camp
 
Viajarporelmundo
ViajarporelmundoViajarporelmundo
Viajarporelmundo
 
Collect Bad Debt Using Barter: Chinese
Collect Bad Debt Using Barter: ChineseCollect Bad Debt Using Barter: Chinese
Collect Bad Debt Using Barter: Chinese
 
Dr Martin Poulter, Wikipedia and higher education
Dr Martin Poulter, Wikipedia and higher educationDr Martin Poulter, Wikipedia and higher education
Dr Martin Poulter, Wikipedia and higher education
 
Network motifs in integrated cellular networks of transcription–regulation an...
Network motifs in integrated cellular networks of transcription–regulation an...Network motifs in integrated cellular networks of transcription–regulation an...
Network motifs in integrated cellular networks of transcription–regulation an...
 
Libras Annual Meeting 2010 New Web Site
Libras Annual Meeting 2010 New Web SiteLibras Annual Meeting 2010 New Web Site
Libras Annual Meeting 2010 New Web Site
 

Más de AXEL

Data breach infographic
Data breach infographicData breach infographic
Data breach infographicAXEL
 
Avoid the Black Friday Blues!
Avoid the Black Friday Blues!Avoid the Black Friday Blues!
Avoid the Black Friday Blues!AXEL
 
November is Adopt a Senior Pet Month!
November is Adopt a Senior Pet Month!November is Adopt a Senior Pet Month!
November is Adopt a Senior Pet Month!AXEL
 
Happy Halloween, StoAmigo Style!
Happy Halloween, StoAmigo Style!Happy Halloween, StoAmigo Style!
Happy Halloween, StoAmigo Style!AXEL
 
Cloud Technology Skyrockets [Infographic]
Cloud Technology Skyrockets [Infographic]Cloud Technology Skyrockets [Infographic]
Cloud Technology Skyrockets [Infographic]AXEL
 
Media.Mobile.Social. Staying Ahead of Technology Trends
Media.Mobile.Social. Staying Ahead of Technology TrendsMedia.Mobile.Social. Staying Ahead of Technology Trends
Media.Mobile.Social. Staying Ahead of Technology TrendsAXEL
 

Más de AXEL (6)

Data breach infographic
Data breach infographicData breach infographic
Data breach infographic
 
Avoid the Black Friday Blues!
Avoid the Black Friday Blues!Avoid the Black Friday Blues!
Avoid the Black Friday Blues!
 
November is Adopt a Senior Pet Month!
November is Adopt a Senior Pet Month!November is Adopt a Senior Pet Month!
November is Adopt a Senior Pet Month!
 
Happy Halloween, StoAmigo Style!
Happy Halloween, StoAmigo Style!Happy Halloween, StoAmigo Style!
Happy Halloween, StoAmigo Style!
 
Cloud Technology Skyrockets [Infographic]
Cloud Technology Skyrockets [Infographic]Cloud Technology Skyrockets [Infographic]
Cloud Technology Skyrockets [Infographic]
 
Media.Mobile.Social. Staying Ahead of Technology Trends
Media.Mobile.Social. Staying Ahead of Technology TrendsMedia.Mobile.Social. Staying Ahead of Technology Trends
Media.Mobile.Social. Staying Ahead of Technology Trends
 

Último

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Último (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Is Privacy a Cloud Illusion?

  • 1. Is Privacy A Cloud Illusion? Five Hidden Facts You Need to Know © 2014 StoAmigo. The information contained within these marketing materials is strictly for illustrative purposes, and the figures herein are not guaranteed for accuracy. The information used in preparing these materials are from sources we believe to be accurate, or reasonably estimated, however StoAmigo has not made any investigation into the accuracy of these sources. StoAmigo does not intend for these marketing materials to be a substitute for appropriate due diligence investigations. StoAmigo, or its agents, and/or affiliates make(s) no further warranties, express or implied, for any reason or purpose to any party in possession of these marketing materials.
  • 2. What is the Cloud? With all the recent headlines and revelations about privacy and security of the cloud, users are becoming more and more concerned about what’s happening to their files and who really has access to them. We wanted to share some important facts about the cloud that you may not be aware of. But first, let’s define “The Cloud”. In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive. This would obviously include cloud storage providers, but what some people don’t realize is that the Cloud also includes email service providers, photo and video sharing sites, and social media sites. With that in mind, here are five things you need to know about the Cloud: 1. Multiple copies are created in the Cloud Have you ever thought about the number of copies created for everything you put in the Cloud? Let’s start with something as simple as sending an email attachment. Most people tend to think they attach a file to an email, send it to someone and that person opens it. However, there’s much more to it. First, that file is in a folder on your computer. When you attach it to an email, a copy is made in your email program. Another copy is stored online by your email service. They also make a backup copy. Then it goes to the inbox of the recipient and one or two copies are stored online before it is opened in the recipient’s email program, which makes another copy. If the recipient decides to keep it, he will save it somewhere on his computer. That’s seven or eight copies right there. If he sends it to other people, the whole process gets repeated. The bottom line is there’s no way for you to control the number of copies created, or how and where they are circulated. 2. Storing files on the Cloud may not be as private as you think Every email attachment you send creates 7 or more copies of your file… “With the Cloud, you don’t own anything. You already signed it away through the legalistic terms of service with a cloud provider that computer users must agree to.” Steve Wozniak, Co-founder, Apple Another often overlooked fact about the Cloud lies in the privacy policies of the cloud providers. Some services are more liberal than others about using and sharing your information. The privacy policies were not created to protect the users; these policies were created to protect the cloud providers. Many of the policies and terms-of-use conditions grant the cloud providers a broad license as to their usage and control over your media. Some even state that you are giving them exclusive rights to your files when you put your files on their systems. Here is a quote from the Terms of Service of a popular social media site:
  • 3. You hereby grant us and our contractors the right to use, modify, adapt, reproduce, distribute, display and disclose content posted on this service solely to the extent necessary to provide the service or as otherwise permitted by these terms. If you haven’t read the privacy policies and Terms of Service of your cloud storage provider or favorite social media sites, you may be giving away copies of your files without knowing it. 3. Files don’t always get deleted The next point we’d like to share involves file deletion. Computer networking relies heavily on redundancy and backup capabilities to ensure the networks remain trouble free and provide quick access and navigation to files and stored media. Consequently it should come as no surprise that when we try to delete a file that’s hosted on a web server, other copies almost certainly exist and will continue to do so. Your original file (center) may be deleted, but copies still remain on backup servers. Many providers even state in their terms and conditions that copies of your media will remain on their servers and in their backup facilities after you’ve deleted your originals. Here are excerpts from the published terms of some providers: It typically takes about one month to delete an account, but some information may remain in backup copies and logs. Please note that there might be a latency in deleting information from our servers, and backed-up versions might exist after deletion. So remember, just because you don’t see it anymore doesn’t mean it’s gone.
  • 4. 4. Where in the world are your files? The fourth thing you should know concerns the physical location of the files stored in the Cloud. All we know is that our media is on a provider’s server, but we don’t know where the servers are. The fact of the matter is that most services have multiple networks interconnected in various states and countries. It’s literally impossible to tell exactly where your files are stored. Realizing that your media could potentially be stored anywhere, the next logical conclusion is that it will be subjected to and governed by differing rules and regulations, depending on the geographic location of the server hosting it. Rarely do consumers know where their files are stored, when they are moved to a different location, or how that may affect the security of their files. Did you know that most cloud storage providers don’t actually have their own servers? You may agree to the privacy policy of your provider, but do you know what policies are in place for the company that owns the servers where your data is actually stored? It might be unclear if their policy is the same as your storage provider’s, who can see your files and what your rights are in the end. The World Privacy Forum sums it up like this: Indeed, it may be impossible for a casual user to know in advance or with certainty which jurisdiction’s law actually applies to information entrusted to a cloud provider. These uncertainties complicate the ability of a user to determine the protections that apply to data entrusted to a cloud provider.1 5. Who has access to your files might surprise you Finally, one of the largest concerns is, “Who has access to the files we store online?” Not knowing where your media is – coupled with the varying laws, rules and regulations governing it – creates a number of very serious questions. Given some of the policy statements and terms of use we’ve discussed, how can you be certain that your files are secure and not being accessed by someone you don’t know and have not given permission to get into them? Privacy advocates have long been speaking out in regards to our rights to privacy for media and files we store on the internet. The general consensus among legal officials is that our rights to privacy don’t typically apply to media stored outside of our home. “The Fourth Amendment does not protect communications held in electronic storage such as email messages stored on a server, because internet users do not have a reasonable expectation of privacy in such communications.” World Privacy Forum 1 World Privacy Forum, Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing, 2009
  • 5. the rights to their own content. The message is clear: the safest place to store your media is in the privacy of your own home. Putting your files on an unknown server in an unknown location is basically handing over control and ownership of your files. What’s the alternative? As technology continues to evolve rapidly, policies and laws may lag behind. In the resulting state of uncertainty about our rights to privacy in the Cloud, keeping our files in our own possession is the safest course of action. Fortunately there are alternatives available that meet our need for privacy and our desire to have the convenience of cloud computing – such as the CloudLocker. The CloudLocker is a personal cloud device that sits in your home or office and allows you to access and manage your files from anywhere. Simply connect it to your network and you’re ready to go. CloudLocker is easily managed from any computer or through your portable smart devices with our mobile app. The CloudLocker is a private and secure alternative to public cloud storage, replacing the network and cloud servers by hosting your media and keeping it in your possession. There is no longer a need for email attachments. Users can send a customized email message that includes a link to the file stored in their CloudLocker. Each share includes unique permission settings that let the user control who can simply view the file, who can share the file with others and who can download it. If you change your mind, you can modify or retract the share at any time. CloudLocker came about from the growth of mobile computing and social media, and here is where its breakthrough technology really shines. When you use CloudLocker to post pictures, videos or any type of file to social media sites, you don’t post the file itself. You merely post a link to the file which is stored on your CloudLocker. If you later decide to break the link, the file will not be accessible from the social media site anymore. This is a great safety net for all types of social media and allows users to retain CloudLocker offers a host of fun and convenient features that represent the best of cloud technology, while protecting your right to privacy in a way that a public cloud cannot. Find out more: For more information on CloudLocker, please visit www.stoamigo.com © 2014 StoAmigo. All rights reserved. CloudLocker connects easily to your home network and provides access to your files at home or away.