Advertisement

New Template for SLAs

  • Marcelo Corrales CompagnucciEmail author
Chapter
Part of the Perspectives in Law, Business and Innovation book series (PLBI)

Abstract

The notion that theory and practice are somewhat disconnected is often criticized. Most theories and models fail to address the links that put together theory and research into effective practice. To fill this gap, this chapter attempts to demonstrate how Plan-like Architectures can be particularly applied as a methodological took in the real world of cloud computing and Big Data.

References

  1. Agarwal B, Tayal S, Gupta M (2010) Software engineering & testing: an introduction. Computer Science Series. Jones and Bartlett Publishers, Sudbury, p 130Google Scholar
  2. Albrecht U, Von Jan U (2016) mHealth Apps and Their Risks—Taking Stock. In: Mantas J et al (eds) Unifying the applications and foundations of biomedical and health informatics. IOS Press, Amsterdam, p. 227Google Scholar
  3. Andersen B (2006) If “Intellectual Property Right” is the Answer, What is the Question? Revisiting the patent controversy. In: Andersen B (ed) Intellectual property rights: innovation. Governance and the Institutional Environment. Edward Elgar Publishing, Cheltenham, pp 112–113CrossRefGoogle Scholar
  4. Anderson D (2015) A question of trust. Williams Lea Group, London, p. 159Google Scholar
  5. Bakey P (2014) Big data means big benefits for retailers and consumers http://www.digitalistmag.com/industries/retail/2014/12/31/big-data-big-benefits-for-retailers-and-consumers-01972311. Accessed May 10 2019
  6. Balboni P (2011) Data protection and data security issues related to cloud computing in the EU, p. 165. In: Pohlmann N, Reimer H, Schneider W (eds) ISSE 2010 securing electronic business processes: highlights of the information security solutions, Europe 2010 Conference. Springer, WiesbadenCrossRefGoogle Scholar
  7. Barnitzke et al (2011) Legal restraints and security requirements on personal data and their technical implementation in clouds. Workshop for E-contracting for Clouds, eChallenges, pp 51–55 http://www.optimis-project.eu/sites/default/files/content-files/document/echallenges2011-legal-restraints-security.pdf. Accessed May 10 2019
  8. Bayles M (2014) Exercise testing. In: Swain D (ed) ACSM’s Resource manual for guidelines for exercise testing and prescription, 7th edn. Wolters Kluwer (Lippincott Williams & Wilki), Philadelphia, p 331Google Scholar
  9. Behrooz S, Marsh S (2016) A Trust-based framework for information sharing between mobile health care applications. In: Habib S et al (eds) Trust management X, 10th IFIP WG 11.11 international conference, IFIPTM 2016, Darmstadt, Germany, July 18–22, 2016, Proceedings. Springer, Cham, p 80CrossRefGoogle Scholar
  10. Berman (2013) Principles of big data: preparing, sharing, and analyzing complex information. Morgan Kaufmann (Elsevier), Waltham, pp 201–211CrossRefGoogle Scholar
  11. Birney E, Clamp M, Durbin R (2004) GeneWise and Genomewise. Genome Res 14(5):988–995CrossRefGoogle Scholar
  12. Blanc I, Vento C (2007) Performing with Microsoft Office 2007: Introductory. The Performing Series. Cengage Learning, Boston, p 192Google Scholar
  13. Boniface G, Seymour A (2012) (eds) Using occupational therapy theory in practice. Wiley-Blackwell, ChichesterGoogle Scholar
  14. Booch G, Rumbaugh J, Jacobson I (2005) The unified modeling language user guide, Object Technology Series. Addison Wesley Longman, ReadingGoogle Scholar
  15. Borda G (1974) Manual de Contratos, 7th edn. Editorial Perrot, Buenos Aires, p 14Google Scholar
  16. Borgman C (2015) Big data, little data, no data: scholarship in the networked world, p 73. The MIT Press, CambridgeCrossRefGoogle Scholar
  17. Bovemberg J (2006) Property rights in blood, genes and data: naturally yours? p 26. Martinus Nijhoff Publishers, LeidenGoogle Scholar
  18. Bradshaw S, Millard C, Waelden I (2010) Contracts for clouds: comparison and analysis of the terms and conditions of cloud computing services, Queen Mary School of Law Legal Studies Research Paper No. 63/2010, pp 31–32 http://ssrn.com/abstract01662374. Accessed May 10 2019
  19. Bragg S (2006) Outsourcing: a guide to selecting the correct business unit, negotiating the contract, maintaining control of the process, 2nd edn. Wiley, Hoboken, p 49Google Scholar
  20. Brauer R (2016) Safety and health for engineers, 3rd edn. Wiley, Hoboken, p 172Google Scholar
  21. Caelli V, Longley D, Shain M (1989) Information security for managers. Stockton Press, New YorkCrossRefGoogle Scholar
  22. Carpenter R (2010) Walking from cloud to cloud: the portability issue in cloud computing. Washington J Law Technol Arts 6(1):1–14Google Scholar
  23. Carstensen J, Morgenthal J, Golden B (2012) Cloud computing: assessing the risks. IT Governance Publishing, Cambridgeshire, p. 244Google Scholar
  24. Cessna E, Balachandran D (2016) Getting started with ResearchKit. Packt Publishing, Birmingham, p. 84Google Scholar
  25. Chander A (2013) The electronic silk road: how the web binds the world together in commerce. Yale University Press, New Haven, pp 11, 16, 137, 143, 144, 145 and 169Google Scholar
  26. Chen T, Lin C (2015) Study on partnering critical factors for construction industry in Taiwan. In: Sung W, Kao J (eds) Environment, energy and applied technology, Proceedings of the 2014 international conference of frontier of energy and environment engineering (ICFEEE 2014), Taiwan, December 6–7 2014. CRC Press, Boca Ratón, p 881Google Scholar
  27. Chulani I et al (2012) Technical implementation of legal requirements, exploitation of the toolkit in use cases and component licenses, p 23, Cloud Legal Guidelines, OPTIMIS Deliverable 7.2.1.3 http://www.optimis-project.eu/sites/default/files/content-files/document/d7213-cloud-legal-guidelines.pdf. Accessed May 10 2019
  28. Colditz G (2015) (ed) The SAGE Encyclopedia of cancer and society, 2nd edn. SAGE Publications, Los Angeles, p 395Google Scholar
  29. Corrales Compagnucci M et al (2009) Analysis of the most important intellectual property issues resulting from the chosen ACGT architecture, p 8. ACGT Project, Deliverable 10.7Google Scholar
  30. Corrales Compagnucci M (2010) Protecting patients’ rights in clinical trial scenarios: the “bee metaphor” and the symbiotic relationship. In: Bottis M (ed) An information law for the 21st century, third international seminar on information law 2010. Nomiki Bibliothiki Group, Athens, pp 5–13Google Scholar
  31. Corrales Compagnucci M, Jurčys P (2016) A new legal landscape for big data in Japan, Beck-Online, ZD-Aktuell 2016, No. 15, 05247 https://beckonline.beck.de/?vpath=bibdata%2Fzeits%2FZDAKTUELL%2F2016%2Fcont%2FZDAKTUELL.2016.05247.htm. Accessed May 10 2019
  32. Crawford L (2015) JAPAN: New Amendments to Japanese Privacy Law http://blogs.dlapiper.com/privacymatters/new-amendments-to-japanese-privacy-law/. Accessed May 10 2019
  33. Davenport T (2014) Big data at work: dispelling the myths, uncovering the opportunities. Harvard Business Review Press, Boston, p 167Google Scholar
  34. Davies M, Naffine N (2001) Are persons property? Legal debates about property and personality, 165. Ashgate Publishing, Aldershot, pp 158–159Google Scholar
  35. Davison M (2003) The legal protection of databases. Cambridge University Press, CambridgeGoogle Scholar
  36. Derclaye E (2008) The legal protection of databases: a comparative analysis. Edgar Elgar Publishing, CheltenhamGoogle Scholar
  37. Dickenson D, Huxtable R, Parker M (2010) The cambridge medical ethics workbook, 2nd edn. Cambridge University Press, Cambridge, p 67Google Scholar
  38. Donaldson S, Siegel S (2001) Successful software development, 2nd edn. Prentice Hall, Upper Saddle River, p 144Google Scholar
  39. Durham M (2016) Japan Updates Privacy Law http://www.winston.com/en/privacy-law-corner/japan-updates-privacy-law.html. Accessed May 10 2019
  40. Edwards A, Elwyn G (2009) Shared decision-making in health care: achieving evidence-based patient choice, 2nd edn. Oxford University Press, Oxford, p 89Google Scholar
  41. El-Zein S (2008) The regulation of human genetics by international soft law and international trade. In: Wüger D, Cottier T (eds) Genetic engineering and the world trade system: world trade forum. Cambridge University Press, Cambridge, p 326Google Scholar
  42. Ezor J (1999) Clicking through: a survival guide for bringing your company online, 1st edn. Bloomberg Press, PrincetonGoogle Scholar
  43. Fisher T (2009) The data asset: how smart companies govern their data for business success. Wiley, HobokenGoogle Scholar
  44. Forgó N, Nwankwo S, Pfeiffenbring J (2013) Cloud Legal Guidelines Final Report, Deliverable 7.2.1.4, p. 20 http://www.optimis-project.eu/sites/default/files/content-files/document/optimis-public-deliverable-d7214-cloud-legal-guidelines-final-report.pdf. Accessed May 10 2019
  45. Garcia Wiley C, Coulton P (2009) Persuasive mobile health applications. In: Weerasinghe D (ed) Electronic healthcare, first international conference, eHealth 2008, London UK, September 2008, Revised Selected Papers. Springer, Berlin, p 91Google Scholar
  46. Gartner R (2016) Metadata: shaping knowledge from antiquity to the semantic Web. Springer, Cham, p 7Google Scholar
  47. Gochfeld M, Burger J, Goldstein B (2001) Medical Care as a Common, Chapter 12 with further references. In: Burger J et al (eds) Protecting the commons: a framework for resource management in the Americas. Island Press, Washington D.CGoogle Scholar
  48. Goodman M (2015) Future crimes: inside the digital underground and the battle for our connected world. Transworld Publishers (Bantam Press), London, p 90Google Scholar
  49. Greif K, Merz J (2007) Current controversies in the biological sciences: case studies of policy challenges from new technologies. The MIT Press, Cambridge, p 69Google Scholar
  50. Guastello S (2014) Human factors engineering and ergonomics: a systems approach, 2nd edn. CRC Press, Boca Ratón, p 253CrossRefGoogle Scholar
  51. Harney M (2002) Application service providers (ASPs): a manager’s guide, 1st edn. Pearson Education, Upper Saddle River, p 126Google Scholar
  52. Healey B, Marchese M (2012) Foundations of health care management: principles and methods. Jossey Bass (Wiley), San FranciscoGoogle Scholar
  53. Hennicker R, Koch N (2001) Modeling the user interface of web applications with UML. In: Evans A et al (eds) Practical UML-based rigorous development methods—countering or integrating the eXtremists, workshop of the pUML-Group at the UML 01, Toronto, Canada. Gesselschaft für Informatik. Köllen Druck-Verlag, Köllen, pp 158–172Google Scholar
  54. Herder M, Fernandez C (2014) Cancer Genomics and Biobanking: Exploring Key Ethical and Legal Issues. In: Dellaire G, Berman J, Arceci R (eds) Cancer genomics: from bench to personalized medicine. Elsevier, Amsterdam, p. 425CrossRefGoogle Scholar
  55. Hoppe N (2016) Bioequity—Property and the Human Body. Routledge, LondonCrossRefGoogle Scholar
  56. House of Commons, Great Britain Parliament (2014) Responsible Use of Data. House of Commons, Science and Technology Committee, Fourth Report of Session 2014–15, p 2Google Scholar
  57. Hustinx P (2010) Privacy by design: delivering the promises. Identity in the Information Society 3(2):253–255CrossRefGoogle Scholar
  58. Jin L, Machi-Raju V (2002) Analysis on service level agreement of web services, Technical Report HPL-2002–180, Software Technology Laboratories. HP Laboratories, Palo Alto http://www.hpl.hp.com/techreports/2002/HPL-2002-180.pdf. Accessed May 10 2019
  59. Kavaler F, Spiegel A (2003) Risk management in health care institutions: a strategic approach, 2nd edn. Jones and Bartlett Publishers, Sudbury, p 98Google Scholar
  60. Keller P, Maracke C (2007) Creative Commons, On the Treatment of the Sui Generis Rights in Version 3.0 of the Creative Commons Licenses http://wiki.creativecommons.org/images/f/f6/V3_Database_Rights.pdf. Accessed May 10 2019
  61. King A, Squillante M (2005) Service level agreements for web hosting systems. In: Labbi A (ed) Handbook of integrated risk management for E-Business: measuring, modeling, and managing risk. J. Ross Publishing, Boca Ratón, pp 195 et seqGoogle Scholar
  62. Kirkham T et al (2012) Risk-based SLA management in clouds: a legal perspective. In: IEEE internet technology and secured transactions, 2012 international conference for internet technology and secured transactions (ICITST-2012). Infonomics Society, s.l, pp 156–160Google Scholar
  63. Knoppers B (2001) The human genome: individual property or common heritage? In Mattei J (ed) Ethical Eye: The Human Genome. Council of Europe Publishing, Strasbourg, p 114Google Scholar
  64. Kousiouris G, Vafiadis G, Corrales Compagnucci M (2013) A cloud provider description schema for meeting legal requirements in cloud federation scenarios. In: Douligeris et al (eds) Collaborative, Trusted and Privacy-Aware e/m-Services, 12th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2013, Athens, Greece, April 25-26, 2013. Springer, Heidelberg, pp 61–72Google Scholar
  65. Kunz C et al (2001) Click-through agreements: strategies for avoiding disputes on validity of assent 57(1) https://www.ssrn.com/abstract=1640196. Accessed May 10 2019
  66. Latimer P, Maum P (2015) Promoting information in the marketplace for financial services: financial market regulation and international standards. Springer, Cham, p 232 et seqGoogle Scholar
  67. Laurie G (2003) Privacy and property? Multi-level strategies for protecting personal interests in genetic material. In: Knoppers B, Scriver C (eds) Genomics, health and society: emerging issues for public policy. Policy Research Initiative, OttawaGoogle Scholar
  68. Laurie G (2004) Genetic privacy: a challenge to medico-legal norms. Cambridge University Press, Cambridge, p 326Google Scholar
  69. Lenk C (2012) donors and users of human tissue for research purposes: conflict of interests and balancing of interests. In: Dabrock P, Taupitz J, Ried J (eds) Trust in Biobanking: dealing with ethical, legal and social issues in an emerging field of biotechnology. Springer, Berlin, p 86CrossRefGoogle Scholar
  70. Lindstrom M (2011) Brandwashed: tricks companies use to manipulate our minds and persuade us to buy, 1st edn. Crown Business, New York, p 225Google Scholar
  71. Lipsey R, Chrystal A (2011) Economics, 12th Edition. Oxford University Press, Oxford, p 7Google Scholar
  72. Lori A (2012) I know who you are and i saw what you did: social networks and the death of privacy. Free Press, New York, p 175Google Scholar
  73. Luzak J (2010) One Click Could Save Your Soul, Recent Developments in European Consumer Law http://recent-ecl.blogspot.jp/2010/05/one-click-could-save-your-soul.html. Accessed May 10 2019
  74. Maclean A (2009) Autonomy, informed consent and medical law: a relational challenge. Cambridge University Press, Cambridge, p 42Google Scholar
  75. Mayer-Schoenberger V, Cukier K (2013) Big data: revolution that will transform how we live, work and think. John Murray (Publishers), LondonGoogle Scholar
  76. McCabe L, McCabe E (2008) DNA: promise and Peril. University of California Press, Berkeley, p 154Google Scholar
  77. McHugh S, Bannerman D (2010) Cognition: learning and memory: spatial. In: Koob G, Le Moal M, Thompson R (eds) Encyclopedia of behavioral neuroscience. Academic Press (Elsevier), London, p. 280CrossRefGoogle Scholar
  78. Matthews J, Gillespie M (2002) Service providers: ASPs, ISPs, MSPs, and WSPs: A Wiley Tech Brief. Wiley, New York, pp 143 et seqGoogle Scholar
  79. Metcalfe J (2013) Japan railway company apologizes for selling IC card data. Wall Street J http://blogs.wsj.com/japanrealtime/2013/07/29/japan-railway-company-apologizes-for-selling-ic-card-data/. Accessed May 10 2019
  80. Minor J (2015) Informed consent in predictive genetic testing: a revised model. Springer, Cham, p 75CrossRefGoogle Scholar
  81. Mitchell H (2005) The intellectual commons: toward an ecology of intellectual property. Lexington Books, Lanham, p 10Google Scholar
  82. Molinaro V (2016) The leadership contract: the fine print to becoming an accountable leader. Wiley, Hoboken, p 35Google Scholar
  83. Morabito V (2015) Big data and analytics: strategic and organizational impacts. Springer, Cham, p 75CrossRefGoogle Scholar
  84. Morris C (1992) The academic press dictionary of science and technology. Academic Press (Harcourt Brace Jovanovich Publishers), San Diego, p 591Google Scholar
  85. Muresan G (2009) An integrated approach to interaction design and log analysis. In: Jansen B, Spink A, Taksa I (eds) Handbook of research on web log analysis. Information Science Reference (IGI Global), Hershey, p 233Google Scholar
  86. Myler H (1998) Fundamentals of engineering programming with C and fortran. Cambridge University Press, Cambridge, p 37Google Scholar
  87. Nair S et al (2011) Requirements and architecture of a cloud broker, OPTIMIS Work Package 6, Deliverable 6.4.1 http://www.optimis-project.eu/sites/default/files/content-files/document/requirements-and-architecture-cloud-broker.pdf. Accessed May 10 2019
  88. Nesbitt L (2004) Clinical research: what it is and how it works. Jones and Bartlett Publishers, Sudbury, p 256Google Scholar
  89. Newman A (2010) Not the First Time the “Dead-Man” Switch Did Its Job http://cityroom.blogs.nytimes.com/2010/05/07/not-the-first-time-the-dead-man-switch-did-its-job/?_r=0. Accessed May 10 2019
  90. Nix D (2011) Why You Should Stop Using the Term “Deadman” http://machinerysafety101.com/2011/03/28/why-you-should-stop-using-the-term-deadman/. Accessed May 10 2019
  91. Nwabueze R (2016) Biotechnology and the Challenge of Property: Property Rights in Dead Bodies, Body Parts, and Genetic Information. Routledge, London, p. 187CrossRefGoogle Scholar
  92. Ostroff E (2011) Universal design: an evolving paradigm. In: Preiser W (ed) Universal design handbook: building accessible and inclusive environments, 2nd edn. Advisory Committee on Accessibility (ACA) Access Design Subcommittee, Calgary, pp 10–12Google Scholar
  93. Overgaard G (1999) A formal approach to collaborations in the unified modeling language. In: France R, Rumpe B (eds) UML’99—The unified Modeling language: beyond the standard, second international conference for collins, CO, USA, October 28–30, Proceedings. Springer, Berlin, p 99Google Scholar
  94. Papaioannou T (2016) The limits to governance: the challenge of policy-making for the new life sciences, p 199. Routledge, LondonGoogle Scholar
  95. Pearson G (2008) Financial services law and compliance in Australia. Cambridge University Press, Cambridge, p 156Google Scholar
  96. Pearson S, Charlesworth A (2009) Accountability as a way forward for privacy protection in the cloud. In: Jaatun M, Zhao G, Rong C (eds) Cloud computing, 1st. international conference, CloudCom 2009, Beijing, China, December 2009, Proceedings. Springer, Berlin, p 137Google Scholar
  97. Power M, Desouza K, Bonifazi C (2006) The outsourcing handbook: how to implement a successful outsourcing process. Kogan Page, London, p 84Google Scholar
  98. Ravichandran D (2006) Introduction to computers and communication. Tata McGraw-Hill Publishing, New Delhi, p 177Google Scholar
  99. Reed C (2010) Information “Ownership” in the Cloud, Legal Studies Research Paper No. 45/2010, pp 1–22 https://papers.ssrn.com/sol3/Data_Integrity_Notice.cfm?abid=1562461. Accessed May 10 2019
  100. Reichman J, Uhlir P, Dedeurwaerdere T (2016) Governing digitally integrated genetic resources, data, and literature: global intellectual property strategies for a redesigned microbial research commons. Cambridge University Press, Cambridge, p 3Google Scholar
  101. Resnik D (2004) Owning the genome: a moral analysis of DNA patenting. State University of New York Press, Albaby, p 158Google Scholar
  102. Ron S, Aliko P (2001) Service level agreements. Internet NG. Internet NG project http://ing.ctit.utwente.nl/WU2/. Accessed May 10 2019
  103. Rosenthal E (2012) I Disclose…Nothing, The New York Times http://www.nytimes.com/2012/01/22/sunday-review/hard-truths-about-disclosure.html?_r=0. Accessed May 10 2019
  104. Shesshasaayee A, Swetha T (2016) SLA based utility analysis for improving QoS in cloud computing. In: Chandra C et al (eds) Information systems design and intelligent applications, Proceedings of the 3rd. International Conference, India 2016, Vol 3. Springer, New Delhi, p 574Google Scholar
  105. Schroeder D (2009) Justice and benefit sharing. In: Wynberg R, Schroeder D, Chennells R (eds) Indigenous peoples, consent and benefit sharing: lessons from the San-Hoodia case. Springer, Dordrecht, p 40Google Scholar
  106. Schulte in den Baeumen T (2016) International protection of human genetic data—The UNESCO declaration of human genetic data and the possible impact on genetic governance models. In: Lenk C, Hoppe N, Andorno R (eds) Ethics and law of intellectual property: current problems in politics, science and technology. Routledge, New York, p 77Google Scholar
  107. Singh K (2015) Biotechnology and intellectual property rights: legal and social implications. Springer, New Delhi, p 206Google Scholar
  108. Solis G, Gasteazoro R (1992) West’s Spanish-English/English-Spanish Law Dictionary. West Group, Saint Paul, p 79Google Scholar
  109. Spindler G, Schmechel P (2016) Personal data and encryption in the European general data protection regulation. JIPITEC 7:163–177Google Scholar
  110. Stimmel C (2015) Big data analytics strategies for the smart grid. CRC Press, Boca Ratón, p 209Google Scholar
  111. Sunstein (2015) Choose not to choose: understanding the value of choice. Oxford University Press, Oxford, pp 206 and 218Google Scholar
  112. Svirskas B (2004) Dynamic management of business service quality in collaborative commerce systems. In: Mendes M, Suomi R, Passos C (eds) Digital communities in a networked society: e-Commerce, e-Business and e-Government. Kluwer Academic Publishers, New York, pp 96 et seqGoogle Scholar
  113. Tompkins J (2004) Partnerships and the supply Chain. In: Tompkins J, Harmelink D (eds) The supply chain handbook. Tompkins Press, s. l, p 24Google Scholar
  114. Tutton R (2004) Person, property and gift: exploring languages of tissue donation to biomedical research. In: Tutton R, Corrigan O (eds) Genetic databases: socio-ethical issues in the collection and Use of DNA. Routledge, Abingdon, p 30Google Scholar
  115. Vafiadis G, Kousiouris G, Nair S (2012) Data manager (DM) User Guide, pp 27–31, OPTIMIS project, http://optimis-project.eu/sites/default/files/content-files/page/datamanageruserguide.pdf. Accessed May 10 2019
  116. Van Alsenoy B et al (2015) From Social Media Service to Advertising Network: A Critical Analysis of Facebook’s Revised Policies and Terms, Report, Draft Version 1.2., s.lGoogle Scholar
  117. Veatch R (1997) Medical ethics, 2nd edn. Jones and Bartlett Publishers, Boston, pp 195 et seqGoogle Scholar
  118. Verite L, Helberger N (2013) EU cloud computing expert group: discussion paper pre-contractual information requirements and cloud services [online]. Available at: https://dare.uva.nl/search?identifier=43f9e5e9-ab4a-43e6-8bcd-a40c7c2d58c6. Accessed May 10 2019
  119. Von Jan U, Albrecht U (2016) Apps for research and research with apps—taking inventory. In: Mantas J et al (eds) unifying the applications and foundations of biomedical and health informatics. IOS Press, Amsterdam, p 245Google Scholar
  120. Wall D (2014) The Sustainable Economics of Elinor Ostrom: Commons, Contestation and Craft. Routledge, London, p 80Google Scholar
  121. Waschke M (2015) How clouds Hold IT together: integrating architecture with cloud deployment. CA Technologies APress, New York, p 122CrossRefGoogle Scholar
  122. Weale D (2001) The smart guide to excel 2000 further skills: a progressive course for more experienced users. Continuum, London, p 6Google Scholar
  123. Weir R, Alick R (2004) The stored tissue issue: biomedical research, ethics, and law in the era of genomic medicine. Oxford University Press, Oxford, p 191Google Scholar
  124. Williams G (2007) Online business security systems. Springer, New York, p 12CrossRefGoogle Scholar
  125. Winston & Strown LLP (2015) Japan Updates Privacy Law http://www.winston.com/en/privacy-law-corner/japan-updates-privacy-law.html. Accessed May 10 2019
  126. Wrinkler V (2011) Cloud Computing: Negotiating Cloud Contracts, TechNet Magazine http://www.technet.microsoft.com/en-us/magazine/jj149022.aspx. Accessed May 10 2019
  127. Wu L (2014) SLA-based Resource Provisioning for Management of Cloud-based Software-as-a-Service Applications, p. 20, Doctoral Thesis https://pdfs.semanticscholar.org/e2fd/7963dc422f6d8ae7de7a9246d85a0e30e427.pdf. Accessed May 10 2019
  128. Zanfir G (2012) The Right to data portability in the context of the eu data protection reform. Int Data Privacy Law 2(3):149–162CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Centre for Advanced Studies in Biomedical Innovation Law (CeBIL)University of CopenhagenCopenhagenDenmark

Personalised recommendations