Article

Data Hosting and Data Breaches

December 2014
Social Media
Download
Download
Read Mode
Subscribe
Summarize
There are many reasons why cloud computing gets used, but a main reason is often due to the cost savings of the utility model for service delivery. In an age of increasing data breaches, users should confirm that they comply with their data protection obligations and have a plan in place to mitigate the harm that can be done in the event of a data breach. Published in Cloud Computing, a supplement of the Toronto Star.
Social Media
Download
Download
Subscribe
Republishing Requests

For permission to republish this or any other publication, contact Peter Zvanitajs at ZvanitajsP@bennettjones.com.

For informational purposes only

This publication provides an overview of legal trends and updates for informational purposes only. For personalized legal advice, please contact the authors.

Latest Insights

See All Insights
Understanding IP Infringement Risk in Typeface Use in AI Generated Content
Blog

Understanding IP Infringement Risk in Typeface Use in AI-Generated Content

November 5, 2025
Benjamin K. ReingoldMakda YohannesStephen D. Burns
Benjamin K. Reingold, Makda Yohannes & Stephen D. Burns