<Ul> <Li> Security of stored data and data in transit may be a concern when storing sensitive data at a cloud storage provider </Li> <Li> Users with specific records - keeping requirements, such as public agencies that must retain electronic records according to statute, may encounter complications with using cloud computing and storage . For instance, the U.S. Department of Defense designated the Defense Information Systems Agency (DISA) to maintain a list of records management products that meet all of the records retention, personally identifiable information (PII), and security (Information Assurance; IA) requirements </Li> <Li> Cloud storage is a rich resource for both hackers and national security agencies . Because the cloud holds data from many different users and organizations, hackers see it as a very valuable target . </Li> <Li> Piracy and copyright infringement may be enabled by sites that permit filesharing . For example, the CodexCloud ebook storage site has faced litigation from the owners of the intellectual property uploaded and shared there, as have the GrooveShark and YouTube sites it has been compared to . </Li> <Li> The legal aspect, from a regulatory compliance standpoint, is of concern when storing files domestically and especially internationally . </Li> </Ul> <Li> Security of stored data and data in transit may be a concern when storing sensitive data at a cloud storage provider </Li> <Li> Users with specific records - keeping requirements, such as public agencies that must retain electronic records according to statute, may encounter complications with using cloud computing and storage . For instance, the U.S. Department of Defense designated the Defense Information Systems Agency (DISA) to maintain a list of records management products that meet all of the records retention, personally identifiable information (PII), and security (Information Assurance; IA) requirements </Li> <Li> Cloud storage is a rich resource for both hackers and national security agencies . Because the cloud holds data from many different users and organizations, hackers see it as a very valuable target . </Li>

Cloud storage is a virtual service so the infrastructure