{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T20:45:25Z","timestamp":1766868325259,"version":"build-2065373602"},"reference-count":34,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2017,4,27]],"date-time":"2017-04-27T00:00:00Z","timestamp":1493251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>A popular bumper sticker states: \u201cThere is no cloud. It\u2019s just someone else\u2019s computer.\u201d Despite the loss of control that comes with its use, critical records are increasingly being entrusted to the cloud, generating ever-growing concern about the privacy and security of those records. Ultimately, privacy and security constitute an attempt to balance competing needs: privacy balances the need to use information against the need to protect personal data, while security balances the need to provide access to records against the need to stop unauthorized access. The importance of these issues has led to a multitude of legal and regulatory efforts to find a balance and, ultimately, to ensure trust in both digital records and their storage in the cloud. Adding a particular challenge is the fact that distinct jurisdictions approach privacy differently and an in-depth understanding of what a jurisdiction\u2019s laws may be, or even under what jurisdiction particular data might be, requires a Herculean effort. And yet, in order to protect privacy and enhance security, this effort is required. This article examines two legal tools for ensuring the privacy and security of records in the cloud, data protection laws, and data localization laws, through the framework of \u201ctrust\u201d as understood in archival science. This framework of trust provides new directions for algorithmic research, identifying those areas of digital record creation and preservation most in need of novel solutions.<\/jats:p>","DOI":"10.3390\/a10020047","type":"journal-article","created":{"date-parts":[[2017,4,27]],"date-time":"2017-04-27T13:01:15Z","timestamp":1493298075000},"page":"47","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Trust in the Balance: Data Protection Laws as Tools for Privacy and Security in the Cloud"],"prefix":"10.3390","volume":"10","author":[{"given":"Darra","family":"Hofman","sequence":"first","affiliation":[{"name":"School of Library, Archival and Information Studies, University of British Columbia, Vancouver, BC V6T 1Z1, Canada"}]},{"given":"Luciana","family":"Duranti","sequence":"additional","affiliation":[{"name":"School of Library, Archival and Information Studies, University of British Columbia, Vancouver, BC V6T 1Z1, Canada"}]},{"given":"Elissa","family":"How","sequence":"additional","affiliation":[{"name":"School of Library, Archival and Information Studies, University of British Columbia, Vancouver, BC V6T 1Z1, Canada"}]}],"member":"1968","published-online":{"date-parts":[[2017,4,27]]},"reference":[{"key":"ref_1","unstructured":"McKendrick, J. (2016). Public Cloud Computing Growing Almost 50 Percent Annually, Cisco Says, Forbes."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Vacca, J.R. (2016). Preservation as a Service for Trust (PaaST). Security in the Private Cloud, CRC Press.","DOI":"10.1201\/9781315372211"},{"key":"ref_3","unstructured":"Quadir, S. (2016). Bangladesh Bank Exposed to Hackers by Cheap Switches, No Firewall: Police, Reuters."},{"key":"ref_4","unstructured":"Fox-Brewster, T. (2016). Shadow Brokers Give NSA Halloween Surprise with Leak of Hacked Servers, Forbes."},{"key":"ref_5","unstructured":"Director of National Intelligence (2016). Joint Statement from the Department of Homeland Security and Office of the Director of National Intelligence on Election Security."},{"key":"ref_6","unstructured":"Lowry, J., and Wamukoya, J. (2014). Trust in Online Records and Data. Integrity in Government through Records Management: Essays in Honour of Anne Thurston, Ashgate."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1016\/j.clsr.2012.07.009","article-title":"Trust in Digital Records: An Increasingly Cloudy Legal Area","volume":"28","author":"Duranti","year":"2012","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_8","first-page":"1458","article-title":"Law and Trust","volume":"93","author":"Cross","year":"2004","journal-title":"Georget. Law"},{"key":"ref_9","first-page":"122","article-title":"What is Archival Theory and Why is it Important?","volume":"37","author":"Eastwood","year":"1994","journal-title":"Archivaria"},{"key":"ref_10","first-page":"5","article-title":"Reliability and Authenticity: The Concepts and Their Implications","volume":"39","author":"Duranti","year":"1995","journal-title":"Archivaria"},{"key":"ref_11","unstructured":"(2017, January 13). InterPARES Trust. Available online: https:\/\/interparestrust.org\/."},{"key":"ref_12","unstructured":"Pearce-Moses, R., Duranti, L., Michetti, G., Andaur, S.B.H., Banard, A., Barlaoura, G., Chabin, M.-A., Driskill, M., Owen, K., and Pan, W. (1970, January 01). InterPARES Trust Terminology Database. Available online: http:\/\/arstweb.clayton.edu\/interlex\/term.php?term=trust."},{"key":"ref_13","unstructured":"Bantin, P.C. (2016). What Will Trustworhty Systems Look Like In The Future?. Building Trustworhty Digital Repositories: Tehory and Implementation, Rowman & Littlefield."},{"key":"ref_14","first-page":"483","article-title":"A Typology of Privacy","volume":"38","author":"Koops","year":"2017","journal-title":"Univ. Pa. J. Int. Law"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"477","DOI":"10.2307\/40041279","article-title":"A Taxonomy Of Privacy","volume":"154","author":"Solove","year":"2006","journal-title":"Univ. Pa. Law Rev."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1151","DOI":"10.2307\/4135723","article-title":"The Two Western Cultures of Privacy: Dignity versus Liberty","volume":"113","author":"Whitman","year":"2004","journal-title":"Yale Law Soc."},{"key":"ref_17","unstructured":"Garner, B.A., and Black, H.C. (2009). Black\u2019s Law Dictionary, Wet."},{"key":"ref_18","unstructured":"Gilbert, F., and Privacy, V. (2017, January 13). Data Protection. What is the Difference? Francoise Gilbert On Privacy, Security, and Cloud Computing, 1 October 2014. Available online: http:\/\/www.francoisegilbert.com\/2014\/10\/privacy-v-data-protection-what-is-the-difference\/."},{"key":"ref_19","unstructured":"Government of Canada (2017, April 27). Privacy Act, RSC 1985, c P-21, Available online: http:\/\/laws-lois.justice.gc.ca\/PDF\/P-21.pdf."},{"key":"ref_20","unstructured":"(2017, April 27). 45 CFR Part 160.102\u2014General Administrative Requirements. Available online: https:\/\/www.law.cornell.edu\/cfr\/text\/45\/160.102."},{"key":"ref_21","unstructured":"Government of Canada (2017, April 27). Personal Information Protect Act, SA 2003, c P-6.5., Available online: https:\/\/www.canlii.org\/en\/ab\/laws\/stat\/sa-2003-c-p-6.5\/latest\/sa-2003-c-p-6.5.html."},{"key":"ref_22","first-page":"1541","article-title":"A Method for Preventing Discrimination in Data Mining","volume":"3","author":"Yuvasri","year":"2014","journal-title":"Int. J. Adv. Res. Comput. Eng. Technol."},{"key":"ref_23","first-page":"671","article-title":"Big Data\u2019s Disparate Impact","volume":"104","author":"Barocas","year":"2016","journal-title":"Calif. Law Rev."},{"key":"ref_24","first-page":"1413","article-title":"Promoting innovation while prevenitng discrimination: Policy goals for the scored society","volume":"89","author":"Pasquale","year":"2014","journal-title":"Wash. Law Rev."},{"key":"ref_25","first-page":"61","article-title":"Cyber civil rights","volume":"89","author":"Citron","year":"2009","journal-title":"Boston Univ. Law Rev."},{"key":"ref_26","first-page":"159","article-title":"How does Target know so much about its customers? Utilizing customer analytics to make marketing decisions","volume":"24","author":"Corrigan","year":"2014","journal-title":"Mark. Educ. Rev."},{"key":"ref_27","first-page":"351","article-title":"Judged by the Tin Man: Individual Rights in the Age of Big Data","volume":"11","author":"Tene","year":"2013","journal-title":"J. Telecommun. High Technol. Law"},{"key":"ref_28","unstructured":"(2017, April 27). Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/EC (General Date Protection Regulation). Available online: http:\/\/ec.europa.eu\/justice\/data-protection\/reform\/files\/regulation_oj_en.pdf."},{"key":"ref_29","unstructured":"Stewart, J.M., Chapple, M., and Gibson, D. (2012). CISSP: Certified Information Systems Security Professional Study Guide, John Wiley & Sons."},{"key":"ref_30","unstructured":"Rustici, C. (2016). GDPR: The Functional Specifications of EU-Grade Privacy, O\u2019Reilly Media."},{"key":"ref_31","first-page":"135","article-title":"Data Localization Laws in a Digital World: Data Protection or Data Protectionism?","volume":"2016","author":"Mishra","year":"2016","journal-title":"Public Sphere: J. Public Policy"},{"key":"ref_32","unstructured":"Bohaker, H., Austin, L., Clement, A., and Perrin, S. (2015). Seeing through the Cloud: National Jurisdiction and Location of Data, Serves, and Networks Still Matter in a Digitally Interconnected World, University of Toronto."},{"key":"ref_33","unstructured":"Dingman, S. (2016). Microsoft Opens Cloud Services to Select Canadian Clients with New Data Centres, The Globe and Mail."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s10502-011-9152-3","article-title":"Educating for trust","volume":"11","author":"Duranti","year":"2011","journal-title":"Arch. Sci."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/10\/2\/47\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:34:01Z","timestamp":1760207641000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/10\/2\/47"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,27]]},"references-count":34,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,6]]}},"alternative-id":["a10020047"],"URL":"https:\/\/doi.org\/10.3390\/a10020047","relation":{},"ISSN":["1999-4893"],"issn-type":[{"type":"electronic","value":"1999-4893"}],"subject":[],"published":{"date-parts":[[2017,4,27]]}}}