You are on page 1of 2

Information is a source of power and, increasingly, the key to prosperity among those with

access to it.

Countering questions of rights to access are questions of privacy. The amount and kinds of
personal information available as a result of both technologies is startling: financial, medical,
educational and employment histories; driving records, insurance records, buying habits, hobbies,
pets, family and associates, travels, phone usage--where and when, income, marital status,
criminal records, address changes, and so on, can all be accessed through electronic networks.

Privacy is the claim of individuals to be left alone, free from surveillance or interference from
other individuals or organizations, including the state. Information technology and systems threaten
individual claims to privacy by making the invasion of privacy cheap, profitable, and effective. The
claim to privacy is protected in the U.S., Canadian, and German constitutions in a variety of
different ways and in other countries through various statutes. In the United States, the claim to
privacy is protected primarily by the First Amendment guarantees of freedom of speech and
association, the Fourth Amendment protections against unreasonable search and seizure of ones
personal documents or home, and the guarantee of due process

Ruling in favor of Cyberexpanse would be disastrous because it would open the way for any
country with jurisdiction over any provider to reach into any other country and demand data. One
immediate impact would be that Cyberexpanse could begin to require access to data on
Globalreach citizens. It would, threaten the sovereignty of the countries. The secondary effect
would be that companies, and users, globally would actively avoid these businesses because their
data isn't safe from government spying.

Jurisdiction over cloud storage is a double edged sword. If one country seeks jurisdiction
over online content, it would create an avenue for the international community to require such
demand to be reciprocated. Once caught in this cycle, the flow of information would break the
barriers of privacy among nations and can be an avenue to infringe not only on the privacy of
individuals, but also on nations. Such act could be exploited and used to disrupt national security.

If the government will be able to seize the data, these leaks will caused significant and
irreversible damage to the nation's security and will have a long-term detrimental impact on the
intelligence community's ability to detect future attacks.

Cloud system information hosting services are not the most secure ones. As all information
is available via internet if taken to the cloud like in this case, there may be concerns with breach of
confidential information and there is a tendency for some firms to lose their control over the piled
up information in the cloud.

If it falls in the wrong hands, security chiefs should be alarmed, knowing that terrorists or
public enemies can change their modus operandi in response to new information on their
capabilities and there will be no firm evidence that the intelligence agencies are using these new
collection capabilities for malign ends.