<html xmlns:v="urn:schemas-microsoft-com:vml" xmlns:o="urn:schemas-microsoft-com:office:office" xmlns:w="urn:schemas-microsoft-com:office:word" xmlns:m="http://schemas.microsoft.com/office/2004/12/omml" xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
<meta name="Generator" content="Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
        {font-family:Helvetica;
        panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
        {font-family:Helvetica;
        panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Georgia;
        panose-1:2 4 5 2 5 4 5 2 3 3;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0cm;
        margin-bottom:.0001pt;
        font-size:11.0pt;
        font-family:"Calibri","sans-serif";
        mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
span.EmailStyle17
        {mso-style-type:personal-compose;
        font-family:"Calibri","sans-serif";
        color:windowtext;}
span.source3
        {mso-style-name:source3;
        color:#888888;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-family:"Calibri","sans-serif";
        mso-fareast-language:EN-US;}
@page WordSection1
        {size:612.0pt 792.0pt;
        margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
        {page:WordSection1;}
/* List Definitions */
@list l0
        {mso-list-id:1472207285;
        mso-list-template-ids:-907611834;}
@list l0:level1
        {mso-level-number-format:bullet;
        mso-level-text:\F0B7;
        mso-level-tab-stop:36.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;
        mso-ansi-font-size:10.0pt;
        font-family:Symbol;}
@list l0:level2
        {mso-level-tab-stop:72.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level3
        {mso-level-tab-stop:108.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level4
        {mso-level-tab-stop:144.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level5
        {mso-level-tab-stop:180.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level6
        {mso-level-tab-stop:216.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level7
        {mso-level-tab-stop:252.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level8
        {mso-level-tab-stop:288.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
@list l0:level9
        {mso-level-tab-stop:324.0pt;
        mso-level-number-position:left;
        text-indent:-18.0pt;}
ol
        {margin-bottom:0cm;}
ul
        {margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang="EN-AU" link="blue" vlink="purple">
<div class="WordSection1">
<p class="MsoNormal">Dear colleagues<o:p></o:p></p>
<p class="MsoNormal"><o:p>&nbsp;</o:p></p>
<p class="MsoNormal">This came across my desk today &#8211; interesting.<o:p></o:p></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;margin-bottom:5.25pt;line-height:22.5pt;background:white">
<span style="font-size:19.5pt;font-family:&quot;Georgia&quot;,&quot;serif&quot;;color:#333333">In the cloud, your data can get caught up in legal actions
<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;margin-bottom:7.5pt;line-height:15.0pt;background:white">
<span style="font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#666666">Legitimate users of Megaupload's service have learned this lesson the hard way</span><span style="font-size:12.0pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#666666"><o:p></o:p></span></p>
<p class="MsoNormal" style="line-height:14.25pt;background:white"><b><span style="font-size:8.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333">By Thomas J. Trappler<o:p></o:p></span></b></p>
<p class="MsoNormal" style="line-height:12.0pt;background:white"><span style="font-size:7.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333">March 20, 2012 10:58 AM ET<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:15.0pt;margin-left:22.5pt;line-height:15.0pt;background:white">
<span class="source3"><span style="font-size:11.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;">Computerworld -</span></span><span style="font-size:11.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333"> We all know that the data we rely on to run our businesses
 can be subject to subpoena and other government actions. Such actions create additional risks when that data is in the
<a href="http://www.computerworld.com/s/topic/158/Cloud&#43;Computing" title="Computerworld coverage of cloud computing">
<span style="color:#1752A3">cloud</span></a>.<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:15.0pt;margin-left:22.5pt;line-height:15.0pt;background:white">
<span style="font-size:11.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333">With cloud computing, data from multiple customers is typically commingled on the same servers. That means that legal action taken against another customer that is completely
 unrelated to your business could have a ripple effect. Your data could become unavailable to you just because it was being stored on the same server as data belonging to someone else that was subject to some legal action. For example, a search warrant issued
 for the data of another customer could result in your data being seized as well.
<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:15.0pt;margin-left:22.5pt;line-height:15.0pt;background:white">
<span style="font-size:11.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333"><a href="http://www.computerworld.com/s/article/9223557/Feds_charge_7_in_massive_case_against_Megaupload_online_piracy_ring"><span style="color:#1752A3">The news earlier this
 year about Megaupload</span></a>, a cloud file storage and viewing service, provides a real, if extreme, example of how a customer could lose access to its data in the cloud.
<a href="http://www.justice.gov/opa/pr/2012/January/12-crm-074.html" target="new">
<span style="color:#1752A3">The federal indictments against the individuals behind Megaupload</span></a> on multiple charges, including racketeering and criminal copyright infringement, resulted in law enforcement agencies seizing more than $50 million of Megaupload's
 assets. These actions were intended to stop any nefarious activities and collect evidence to be used in the case against Megaupload.
<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:15.0pt;margin-left:22.5pt;line-height:15.0pt;background:white">
<span style="font-size:11.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333">The catch is that a lot of
<a href="https://www.eff.org/cases/megaupload-data-seizure"><span style="color:#1752A3">people were using Megaupload for legitimate purposes</span></a>. When the government took action against the alleged bad guys, those legitimate users also lost access to
 their data. It's a textbook example of how technology continues to outpace the law's ability to address the new questions that arise with cloud computing. For example, who is responsible for returning data to legitimate users?<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:15.0pt;margin-left:22.5pt;line-height:15.0pt;background:white">
<span style="font-size:11.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333">With Megaupload essentially shut down,
<a href="http://www.computerworld.com/s/article/9223856/Megaupload_user_content_safe_for_two_more_weeks">
<span style="color:#1752A3">legitimate users couldn't retrieve their data directly</span></a> as in the past. The government wouldn't release any data while it temporarily had custody of it to gather evidence, and when it was finished with that, it didn't want
 responsibility for sorting and returning data. Instead, it directed legitimate users to the two infrastructure-as-a-service providers used by Megaupload. The IaaS providers claimed that they had provided only raw infrastructure and never had access to customer
 data, and so they pointed customers full circle back to Megaupload. The <a href="https://www.eff.org/">
<span style="color:#1752A3">Electronic Frontier Foundation</span></a> has now stepped in to help
<a href="https://www.eff.org/cases/megaupload-data-seizure"><span style="color:#1752A3">sort out this mess</span></a>.<o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:15.0pt;margin-left:22.5pt;line-height:15.0pt;background:white">
<span style="font-size:11.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333">How could a legitimate Megaupload customer have avoided getting caught up in this? Thoroughly vetting a cloud provider's background and business practices before using its service
 would be a good first step in most cases. Additionally, you could ensure that your contract obligates the cloud provider to effectively partition customer data. That way, there's at least a chance that law enforcement could seize a bad guy's data without touching
 yours. <o:p></o:p></span></p>
<p class="MsoNormal" style="mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;line-height:18.0pt;background:white">
<b><span style="font-size:9.0pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333">Other columns by Thomas Trappler<o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;text-indent:-18.0pt;line-height:11.25pt;mso-list:l0 level1 lfo1;background:white">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol;color:#333333"><span style="mso-list:Ignore">&middot;<span style="font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><b><span style="font-size:8.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333"><a href="/s/article/9225340/In_the_cloud_your_data_can_get_caught_up_in_legal_actions_?source=toc"><span style="color:#1752A3">In the cloud, your
 data can get caught up in legal actions </span></a><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;text-indent:-18.0pt;line-height:11.25pt;mso-list:l0 level1 lfo1;background:white">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol;color:#333333"><span style="mso-list:Ignore">&middot;<span style="font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><b><span style="font-size:8.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333"><a href="/s/article/9224317/In_the_cloud_a_data_breach_is_only_as_bad_as_your_contract?source=toc"><span style="color:#1752A3">In the cloud, a
 data breach is only as bad as your contract</span></a><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;text-indent:-18.0pt;line-height:11.25pt;mso-list:l0 level1 lfo1;background:white">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol;color:#333333"><span style="mso-list:Ignore">&middot;<span style="font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><b><span style="font-size:8.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333"><a href="/s/article/9223479/When_your_data_s_in_the_cloud_is_it_still_your_data_?source=toc"><span style="color:#1752A3">When your data's in the
 cloud, is it still your data?</span></a><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;text-indent:-18.0pt;line-height:11.25pt;mso-list:l0 level1 lfo1;background:white">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol;color:#333333"><span style="mso-list:Ignore">&middot;<span style="font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><b><span style="font-size:8.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333"><a href="/s/article/9222627/Cloud_adviser_Where_s_your_data_?source=toc"><span style="color:#1752A3">Cloud adviser: Where's your data?</span></a><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;text-indent:-18.0pt;line-height:11.25pt;mso-list:l0 level1 lfo1;background:white">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol;color:#333333"><span style="mso-list:Ignore">&middot;<span style="font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><b><span style="font-size:8.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333"><a href="/s/article/9222057/Making_sure_your_cloud_provider_can_protect_your_data_as_promised?source=toc"><span style="color:#1752A3">Making sure
 your cloud provider can protect your data as promised</span></a><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;text-indent:-18.0pt;line-height:11.25pt;mso-list:l0 level1 lfo1;background:white">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol;color:#333333"><span style="mso-list:Ignore">&middot;<span style="font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><b><span style="font-size:8.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333"><a href="/s/article/9221326/Where_there_are_clouds_there_s_lightning_and_other_cloud_disaster_tips_?source=toc"><span style="color:#1752A3">Where
 there are clouds, there's lightning (and other cloud disaster tips)</span></a><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;text-indent:-18.0pt;line-height:11.25pt;mso-list:l0 level1 lfo1;background:white">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol;color:#333333"><span style="mso-list:Ignore">&middot;<span style="font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><b><span style="font-size:8.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333"><a href="/s/article/358043/Why_physical_security_matters_even_in_the_cloud?source=toc"><span style="color:#1752A3">Why physical security matters,
 even in the cloud</span></a><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;text-indent:-18.0pt;line-height:11.25pt;mso-list:l0 level1 lfo1;background:white">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol;color:#333333"><span style="mso-list:Ignore">&middot;<span style="font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><b><span style="font-size:8.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333"><a href="/s/article/9217604/The_Cloud_Contract_Adviser_Making_sure_your_information_is_secure?source=toc"><span style="color:#1752A3">The Cloud
 Contract Adviser: Making sure your information is secure</span></a><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;text-indent:-18.0pt;line-height:11.25pt;mso-list:l0 level1 lfo1;background:white">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol;color:#333333"><span style="mso-list:Ignore">&middot;<span style="font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><b><span style="font-size:8.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333"><a href="/s/article/9216786/The_Cloud_Contract_Adviser_Know_your_provider_s_infrastructure?source=toc"><span style="color:#1752A3">The Cloud Contract
 Adviser: Know your provider's infrastructure</span></a><o:p></o:p></span></b></p>
<p class="MsoNormal" style="mso-margin-top-alt:0cm;margin-right:0cm;margin-bottom:15.0pt;margin-left:0cm;text-indent:-18.0pt;line-height:11.25pt;mso-list:l0 level1 lfo1;background:white">
<![if !supportLists]><span style="font-size:10.0pt;font-family:Symbol;color:#333333"><span style="mso-list:Ignore">&middot;<span style="font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><b><span style="font-size:8.5pt;font-family:&quot;Helvetica&quot;,&quot;sans-serif&quot;;color:#333333"><a href="/s/article/9216037/The_Cloud_Contract_Adviser_Service_level_agreements?source=toc"><span style="color:#1752A3">The Cloud Contract Adviser:
 Service-level agreements</span></a><o:p></o:p></span></b></p>
<p class="MsoNormal"><o:p>&nbsp;</o:p></p>
<p class="MsoNormal"><span style="font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;mso-fareast-language:EN-AU">Paula Christophersen<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;mso-fareast-language:EN-AU">ICT Curriculum Manager<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;mso-fareast-language:EN-AU">Victorian Curriculum and Assessment<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;mso-fareast-language:EN-AU">Authority<o:p></o:p></span></p>
<p class="MsoNormal"><span style="font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;mso-fareast-language:EN-AU">(03) 9651 4378<o:p></o:p></span></p>
<p class="MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<p></p><p><b>Important - </b>This email and any attachments may be confidential. If received in error, please contact us and delete all copies. Before opening or using attachments check them for viruses and defects. Regardless of any loss, damage or consequence, whether caused by the negligence of the sender or not, resulting directly or indirectly from the use of any attached files our liability is limited to resupplying any affected attachments. Any representations or opinions expressed are those of the individual sender, and not necessarily those of the Department of Education and Early Childhood Development.</p>
</body>
</html>