101
In addition, an area often forgotten in the application of security to a data resource is the protection of that resource during its use—that is, during a collaboration step as part of a document workflow process.
Other issues that complicate the area of hosted data include ensuring that the various data security acts and rules are adhered to this becomes particularly complicated when you consider the cross border implications of cloud computing and the hosting of data in a country other than that originating the data.
Share with your friends: