Sunday, December 29, 2019

Martin Thembisile (Chris) Hani, South African Activist

Chris Hani (born Martin Thembisile Hani; June 28, 1942–April 10, 1993) was a charismatic leader in the African National Congress (ANC) militant wing (uMkhonto we Sizwe or MK) and the secretary-general of the South African Communist Party. Considered a threat to both the extreme-right wing in South Africa and the new, moderate leadership of the African National Congress, his assassination had a significant impact on his countrys transition from apartheid. Fast Facts: Martin Thembisile (Chris) Hani Known For:  South African activist, chief of staff of uMkhonto we Sizwe, and secretary-general of the Communist Party whose assassination was pivotal in South Africas transition from apartheidAlso Known As:  Chris HaniBorn:  June 28, 1942 in Comfimvaba, Transkei, South AfricaParents: Gilbert  and Mary HaniDied:  April 10, 1993 in Dawn Park, Boksburg, South AfricaEducation: Matanzima Secondary School at Cala, Lovedale Institute, University of Fort Hare, Rhodes UniversityPublished Works:  My LifeSpouse: Limpho HaniChildren: Nomakhwezi, Neo, and LindiweNotable Quote: My studies of literature further strengthened my hatred of all forms of oppression, persecution and obscurantism. The action of tyrants as portrayed in various literary works also made me hate tyranny and institutionalised oppression. Early Life Martin Thembisile (Chris) Hani was born on June 28, 1942 in the small, rural town of Comfimvaba, Transkei. He was the fifth of six children. His father, a migrant worker in the Transvaal mines, sent what money he could back to the family in Transkei. His mother worked on a subsistence farm to supplement the family income. Hani and his siblings walked 25 kilometers to school each weekday and the same distance to church on Sundays. Hani was a devout Catholic and became an altar boy at the age of 8. He wanted to become a priest, but his father would not give him permission to enter the seminary. Education and Politicization When Hani was 11 years old, the South African government introduced the Black Education Act of 1953. The act formalized the segregation of black schooling and laid the foundation for Bantu Education and Hani, at a young age, became aware of the limitations that the apartheid system imposed on his future: [T]his angered and outraged us and paved the way for my involvement in the struggle. In 1956, at the start of the Treason Trial, he joined the African National Congress (ANC)—his father was already a member of the ANC. In 1957 he joined the ANC Youth League. One of his teachers at school, Simon Makana, may have influenced this decision. Hani matriculated from Lovedale High School in 1959 and went to university at Fort Hare to study modern and classical literature in English, Greek, and Latin. Hani is said to have identified with the plight of Roman commoners suffering under the control of its nobility. Fort Hare had a reputation as a liberal campus, and it was here that Hani was exposed to the Marxist philosophy that influenced his future career. The Extension of University Education Act (1959) put an end to black students attending white universities (mainly the Universities of Cape Town and Witwatersrand) and created separate tertiary institutions for Whites, Coloured, Blacks, and Indians. Hani was active in campus protests over the takeover of Fort Hare by the Department of Bantu Education. He graduated in 1962 from Rhodes University in Grahamstown with a Bachelors degree in classics and English, just ahead of being expelled for political activism. Exploring Communism Hanis uncle had been active in the Communist Party of South Africa (CPSA). The organization was founded in 1921 but had dissolved itself in response to the Suppression of Communism Act of 1950. Ex-Communist Party members had continued to operate in secret and then formed the underground South African Communist Party (SACP) in 1953. In 1961, after a move to Cape Town, Hani joined the SACP. The following year he joined uMkhonto we Sizwe (MK), the militant wing of the ANC. With his high level of education, he quickly rose through the ranks; within months he was a member of the leadership cadre, the Committee of Seven. Arrest and Exile In 1962, Hani was arrested for the first of several times under the Suppression of Communism Act. In 1963, having tried and exhausted all the possible legal appeals against conviction, he followed his father into exile in Lesotho, a small country landlocked within South Africa. Hani was sent to the Soviet Union for military training and returned to Africa in 1967 to take an active role in the Rhodesian bush war, acting as a political commissar in the Zimbabwe Peoples Revolutionary Army (ZIPRA). Work With Zipra ZIPRA, under the command of Joshua Nkomo, operated out of Zambia. Hani was present for three battles during the Wankie Campaign (fought in the Wankie Game Reserve against Rhodesian forces) as part of the Luthuli Detachment of combined ANC and Zimbabwe African Peoples Union (ZAPU) forces. Although the campaign provided much-needed propaganda for the struggle in Rhodesia and South Africa, in military terms it was a failure. The local population frequently informed on guerrilla groups to the police. In early 1967, Hani made a narrow escape into Botswana, only to be arrested and detained in prison for two years for weapons possession. Hani returned to Zambia at the end of 1968 to continue his work with ZIPRA. Rising in the ANC, MK, and the SACP In 1973 Hani transferred to Lesotho. There, he  organized  units of the MK for guerrilla operations in South Africa. By 1982, Hani had become prominent enough in the ANC to be the focus of several assassination attempts, including at least one car bomb. He was transferred from the Lesotho capital of Maseru to the  center  of the ANC political leadership in Lusaka, Zambia. That year he was elected to the membership of the ANC National Executive Committee, and by 1983 he had been promoted to political commissar of the MK, working with student recruits who joined the ANC in exile after the  1976 student uprising. When dissident ANC members, who were being held in detention camps in Angola, mutinied against their harsh treatment in 1983–1984, Hani had a part in the uprisings suppression. Hani continued to rise through the ANC ranks and in 1987 he became the chief of staff of the MK. During the same  period,  he rose to senior  membership  of the SACP. Return to South Africa After the unbanning of ANC and SACP on February 2, 1990, Hani returned to South Africa and became a charismatic and popular speaker in townships. By 1990 he was known to be a close associate of Joe Slovo, the secretary-general of the SACP. Both Slovo and Hani were considered dangerous figures in the eyes of South Africas extreme right: the Afrikaner Weerstandsbewging (AWB, Afrikaner Resistance Movement) and the Conservative Party (CP). When Slovo announced that he had cancer in 1991, Hani took over as secretary-general. In 1992, Hani stepped down as chief of staff of uMkhonto we Sizwe to devote more time to the  organization  of the SACP. Communists were prominent in the ANC and the Council of South African Trade Unions, but were under threat—the collapse of the Soviet Union in Europe had discredited the movement  worldwide. Helping the SACP Rise Hani campaigned for the SACP in townships around South Africa, seeking to redefine its place as a national political party. It was soon doing well—better than the ANC in fact—especially amongst the young. The youth had no real experiences of the pre-apartheid era and no commitment to the democratic ideals of the more moderate Mandela and his cohort. Hani is known to have been charming, passionate, and charismatic and he soon attracted a cult-like following. He was the only political leader who seemed to have influence over the radical township  self-defense  groups that had parted from the authority of the ANC. Hanis SACP would have proved a serious match for the ANC in the 1994 elections. Assassination On April 10, 1993, as he returned home to the racially mixed suburb of Dawn Park,  Boksburg  near Johannesburg, Hani was assassinated by  Janusz  Walus, an anti-Communist Polish refugee who had close links to the white nationalist AWB. Also implicated in the assassination was Conservative Party member of parliament Clive Derby-Lewis. Legacy Hanis death came at a critical time for South Africa. The SACP had been on the brink of attaining significant status as an independent political party, but it now found itself bereft of funds (due to the Soviet collapse in Europe) and without a strong leader—and the democratic process was faltering. The assassination helped persuade the bickering negotiators of the Multi-Party Negotiating Forum to finally set a date for South Africas first democratic election. Walus and Derby-Lewis were captured, sentenced, and jailed shortly after the assassination—within six months. Both were sentenced to death. In a peculiar twist, the new government (and constitution) that they had actively fought against, caused their sentences to be commuted to life imprisonment because the death penalty had been ruled unconstitutional. In 1997 Walus and Derby-Lewis applied for amnesty through the Truth and Reconciliation Commission (TRC) hearings. Despite their claims that they were working for the Conservative Party, and therefore the assassination had been a political act, the TRC effectively ruled that Hani had been assassinated by right-wing extremists who were apparently acting independently. Walus and Derby-Lewis are currently serving their sentence in a maximum-security prison near Pretoria. Sources Hani, Chris. My Life. South Africa Communist Party, 1991.The OMalley Archives.  The Death of Chris Hani:  An African Misadventure.

Saturday, December 21, 2019

Summary of Prevail and Transcend Scenario in Radical...

Summary of Prevail and Transcend Scenario In chapter six of Radical Evolution, author Joel Garreau shows through various interviews and examples that even though technology may be rising on an exponentially increasing Curve, humans may still be able to change the effects of technological advance in unpredictable ways. Deemed the Prevail scenario, it is also characterized by humans slowing down once-viewed inevitable change viewed as negative and speeding up positive change. Another great theme of the Prevail Scenario is its idea that technological advance will enable humans to acquire a better understanding of their society and nature. In addition to discussing the Prevail scenario, Garreau also discusses the possible change humans†¦show more content†¦Garreau emphasizes this scenario by quoting Faulkner’s famous saying that â€Å"man will prevail ‘because he has a soul, a spirit capable of passion and sacrifice and endurance’† (qtd. in 209). Garea u expands on the concept of the development of human nature in the chapter seven. Through a series of interviews and examples, Garreau attempts to explain and clarify what it means for humans to transcend and how technological advance will have an impact on that transcendence. Garreau starts out the chapter with an explanation that throughout human history, humans have been changing and evolving, with examples such as fire and writing. Then, Garreau describes the way human nature is being changed: â€Å"Even the least educated among us is not raised by wolves, feral and wild. He grows up shaped by contemporary humans who own television, who have been shaped by modern society† (237). This quote further suggests that human nature may be impacted the advancing GRIN technologies. To examine this possibility, Garreau interviewed Nick Bostrom, co-founder of the World Transhumanist Association. Bostrom shows his agreement with human transcendence by asserting that â€Å"Technologic al progress makes it harder for people to ignore the fact that we might actually change the human nature† (qtd. in Garreau, 242). Garreau also brings up the topic of civil disruption from such enhancement. As discussed in theShow MoreRelatedOrganisational Theory230255 Words   |  922 PagesManagement Studies, Keele University, UK An unusually rich and deep philosophical book on organization theory with several new thinkers and ideas. Pedagogically a well-structured book with many clear learning objectives, cases, examples and good summaries for every chapter. Professor Martin Lindell, Hanken Business School, Swedish School of Economics and Business Administration, Finland This book makes it easier to understand the current stand of organization theory. I strongly recommend it to anyoneRead MoreContemporary Issues in Management Accounting211377 Words   |  846 Pagesaccounting practice, thereby informing our understanding of the Weld. He wrote The Economics of Capital Budg eting (Penguin, 1976), one of the earliest theoretically rigorous textbooks in Wnancial management. His co-authored books, Management Accounting: Evolution not Revolution (CIMA, 1989) and Management Accounting: Pathways to Progress (CIMA, 1994), were published during a time of dramatic change in UK management accounting practice. These textbooks contributed to the UK management accounting transformationRead MoreProject Mgmt296381 Words   |  1186 PagesCulture 79 Summary 16 What Is Organizational Culture? 79 Identifying Cultural Characteristics 82 Chapter 2 Organization Strategy and Project Selection 22 The Strategic Management Process: An Overview 24 Four Activities of the Strategic Management Process 26 Implications of Organizational Culture for Organizing Projects 84 Summary 87 Chapter 4 Defining the Project 100 102 Step 1: Defining the Project Scope 102 Employing a Project Scope Checklist Scenario Planning: A SupplementRead MoreLibrary Management204752 Words   |  820 PagesConclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4 . .6 . .6 . .8 . .8 . 10 . 12 . 13 . . . . . . . 16 . . . . . . . 17 2—The Evolution of Management Thought . . . . . . . . . . . 19 Management in Ancient History . . . . . . . . . . . . . . . . . . . 20 The Effects of the Industrial Age on Management . . . . . 22 Classical Perspectives . . . . . . . . . . . . . . . . . . . . . .Read MoreStrategic Marketing Management337596 Words   |  1351 Pagesstrategy The marketing/strategy interface Summary xi xiii 1 3 3 7 11 19 37 41 43 45 45 50 53 70 71 75 77 79 79 80 81 86 88 89 101 102 104 107 109 Stage One: Where are we now? Strategic and marketing analysis 2 Marketing auditing and the analysis of capability 2.1 2.2 2.3 2.4 2.5 2.6 2.7 Learning objectives Introduction Reviewing marketing effectiveness The role of SWOT analysis Competitive advantage and the value chain Conducting effective audits Summary 3 Segmental, productivity and ratioRead MoreManagement Course: Mba−10 General Management215330 Words   |  862 Pages Management Contents Feigenbaum−Feigenbaum †¢ The Power of Management Capital 1. New Management for Business Growth in a Demanding Economy 1 1 Text Jones−George †¢ Contemporary Management, Fourth Edition I. Management 17 17 2. The Evolution of Management Thought Hughes−Ginnett−Curphy †¢ Leadership, Fifth Edition I. Leadership is a Process, Not a Position 51 51 70 1. Leadership is Everyone’s Business 2. Interaction between the Leader, the Followers the Situation Cohen †¢ EffectiveRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 PagesNetworked Organizations 20 †¢ Helping Employees Balance Work–Life Conflicts 21 †¢ Creating a Positive Work Environment 22 †¢ Improving Ethical Behavior 22 Coming Attractions: Developing an OB Model 23 An Overview 23 †¢ Inputs 24 †¢ Processes 25 †¢ Outcomes 25 Summary and Implications for Managers 30 S A L Self-Assessment Library How Much Do I Know About Organizational Behavior? 4 Myth or Science? â€Å"Most Acts of Workplace Bullying Are Men Attacking Women† 12 An Ethical Choice Can You Learn from FailureRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 PagesLandscape Gerda Lerner, Fireweed: A Political Autobiography Allida M. Black, ed., Modern American Queer History Eric Sandweiss, St. Louis: The Evolution of an American Urban Landscape Sam Wineburg, Historical Thinking and Other Unnatural Acts: Charting the Future of Teaching the Past Sharon Hartman Strom, Political Woman: Florence Luscomb and the Legacy of Radical Reform Michael Adas, ed., Agricultural and Pastoral Societies in Ancient and Classical History Jack Metzgar, Striking Steel: SolidarityRead MoreExploring Corporate Strategy - Case164366 Words   |  658 Pagesand tutors to take every possible opportunity to explore the live strategic issues of organisations – both their own and others. The following brief points of guidance should prove useful in selecting and using the case studies provided: ââ€"  The summary table that follows indicates the main focus of each of the chosen case studies – together with important subsidiary foci (where appropriate). In general, the sequence of cases is intended to mirror the chapter sequence. However, this should not beRead MoreDeveloping Management Skills404131 Words   |  1617 PagesWhat Are Management Skills? 9 Improving Management Skills 12 An Approach to Skill Development 13 Leadership and Management 16 Contents of the Book 18 Organization of the Book 19 Practice and Application 21 Diversity and Individual Differences 21 Summary 23 SUPPLEMENTARY MATERIAL 24 Diagnostic Survey and Exercises 24 Personal Assessment of Management Skills (PAMS) 24 What Does It Take to Be an Effective Manager? 28 SSS Software In-Basket Exercise 30 SCORING KEY AND COMPARISON DATA 42 Personal Assessment

Friday, December 13, 2019

A Rose for Emily Critical Essay Free Essays

Critical essay â€Å"A Rose for Emily† was the first short story that William Faulkner published in a major magazine. It was published on April 30, 1930 in an issue of Forum magazine. Faulkner was still struggling to make a name for himself before he published this story. We will write a custom essay sample on A Rose for Emily Critical Essay or any similar topic only for you Order Now â€Å"A Rose for Emily† features many characters that make it an interesting story. Three of the ones that most appeal to the reader are Emily Grierson, Homer Barron, and Toby the servant. Emily is the main character in this story; she used to be a vibrant, outgoing young girl who loved socializing with people and spending time with her family. After her father’s death she transformed into an introverted old woman who spent the rest of her life hiding away in her house, and alienating herself from human contact. Emily’s life was being told through a series of flashbacks. She seems to be living in a world where time ceases to exist. She threatens to have metallic numbers affixed to the side of her house when the town receives modern mail service, she is isolated from reality which constantly threatens to break through her little world. Emily can be portrayed as some sort of object in this novel because she is always being watched. The townspeople always watch Emily as if she were some sort of object that they knew nothing about. People always wondered what she was doing. They would often see her through her window on some rare occasions, this was considered to be a rare sight since she never left her house. Homer Barron is a foreman from the north. Faulkner describes him as a large man with a dark complexion, a booming voice, and light-coloured hair. Homer takes interest in Emily and starts taking her out for Sunday drives in his buggy. As the years pass Homers interest in marrying Emily is dramatically decreasing. He disappeared in Emily`s house one day, his corpse was later discovered in one of the rooms in her house. Homer was poisoned by Emily so that he could spend eternity with her; â€Å"Then we noticed that in the second pillow was the indentation of a head. One of us lifted something from it, and leaning forward, that faint and invisible dust dry and acrid in the nostrils, we saw a long strand of iron-gray hair. p. 130 The Broadview Anthology of Short Fiction. This quote was taken from the end of the story. Emily’s secret was finally out, all of town now knew what Emily was up to all these years. She was unsecure because she was never able to give up the men who shaped her life. Her father’s corpse for example was released after a fight with the townspeople, Emily had a tough time losing the significant ma le figures in her life, even though she poisoned one of them. A long strand of steel gray hair was discovered on the pillow next to Homer`s corpse. This meant that Emily was sleeping next to his corpse ever since she poisoned him. This also shows loneliness in Emily`s character since her father died. She was desperately looking for a way to bring back the memories of when her father was still alive. Toby was Emily`s servant. He was not mentioned a lot in this story, but he was an important figure in Emily`s life. He provided for her whenever she was in need, his communication skills however were gone. Some say that his voice would be rusty since he never used it. Toby was like Emily`s link to society. He was the only person leaving her house and coming back. The townspeople were always asking Toby questions about Emily or anything that goes on in her house, the townspeople however stopped asking him for information about Emily after a while. After Emily`s death, Toby walks out the back door and is never heard from again. In conclusion, â€Å"A Rose for Emily† is a great story with many literary elements that possess a significant meaning in its context. Emily Grierson, Homer Barron, and Toby the servant are only a few characters presented in this short story by William Faulkner. How to cite A Rose for Emily Critical Essay, Essay examples

Thursday, December 5, 2019

Cloud Computing Technical Management and Service Level

Question: Describe about the Cloud Computing for Technical Management and Service Level. Answer: Introduction Child protection board has considered to assess the technical management and Service Level Agreements (SLA) in cloud computing. For this purpose the estimation of management requirements of different vendors of cloud is necessary. In the following report, discussion about remote administration, SLA management and resource management is done including the payroll services and data file exchange. Since the report discusses about the cloud services of various vendors certain features are to be highlighted which are application resilience, disaster recovery and backup and finally the SLA service are illustrated. Child Protection Board has levied this responsibility as the cloud architecture is the most important feature in deciding the security and risk management of the vendor. Comparison is made between different vendors cloud architecture to select the most suitable cloud service for the Child Protection Board. Architecture refers as many components and sub-components of cloud service s that are classified into Front-end and Back-end. Further discussion is done in the following report. Cloud Computing Architecture Architecture of cloud computing can be divided into two sections which are front-end and back-end architectures. Both ends are connected to each other by a network connection which is internet in most of the cases. Front end of the architecture is of the client or the user. It includes the software or the interface part or the application module of the cloud (Kim Solomon, 2013). Since interface of each cloud service is not the same it is the dynamic part of architecture. Back end is cloud part of the architecture. This contains several vital systems such as servers, data storage and computers. Both ends of the cloud architecture are present in any cloud system which may host a data processing system or a video game (Cao et al., 2014). Various cloud vendors give emphasis to different cloud architectures. But in Child Protection Board both of the front end and back end architectures are deployed to get proper synchronization in providing the data processing and payroll management syst ems (Lloyd, 2014). Cloud Computing Delivery Models Some cloud computing delivery working models are Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS). These platforms differ in the type of applications which they support which is required by the user. SaaS applications are available from numerous client devices such as a web browser. But the cloud users do not control the infrastructure such as operating systems, individual applications, network or even system storage (Limoncelli, Chalup Hogan, 2014). Moreover, IaaS gives the access to users for processing of consumers, networks, fundamental resources and networking depending on the type of application use. PaaS deploys software and platform of users. The applications are accessible from anywhere. They have the rights to control the platform. Users get the conformation about the tools which are supported on the platform. IBM and Oracle is the two largest cloud service providers in the world. Another working model ids are Communication as service (CaaS), Database as service (DaaS) and Business Process as service (BPaaS) (Mutkoski, 2013). Risk management of Outsourced ICT systems including Cloud Risk management of cloud systems which comes under the ambit of ICT systems is done by the government of the country. This follows the structured approach for defining risk assessment. This helps the decision makers to calculate the benefits of executing cloud computing services according to the business requirements (Reed Bennett, 2012). There are certain guidelines on which the risk management is done which are: Application of risk management principles of International Standard ISO 31000. Strategic and organizational context. Risk identification. Assessment of tolerance of risk. Questions related to the timing of risk management deployed in the cloud. Threats involved during information outsourcing Assessment and mapping of risks with other factors. Defining likelihood and potential of risks. Evaluation and rating of risks. Options of risk treatment even when the services are outsourced. Review of services and consultation form experts. Governance and security in cloud computing services There are certain features which are considered in governing and security of cloud services which are discussed below: Data Protection: The questions relating to the positioning and storage of data and its location, data is stationery or in motion and assurance of availability of data (Wang et al., 2014). Security control: It is concerned with controls of security provided by the cloud to its end user and assurance of effective and efficient management of controls in cloud services. Compliance: Synchronization with the given guidelines and confidence of cloud provider in the effective use and support of cloud services (Moerel, 2014). Multi-tenancy: Vulnerability of the assets if another client is under attack and separation of data of multiple customers on the cloud. Security governance: Ownership, access and rights of the data and measurement of performance. Erls SLA agreement The service level agreement is basically considered as contractual agreement between consumer of the supplied products and specialized services provider. As per the Erls SLA, it is mainly consisting ethical scenario, human rights goal and objectives of the organization (Gu Guirguis, 2014). Service level agreement mainly supports organizational authorities to understand the different deliverables representing in it. The organizational service level agreement is following in nature: Service Level Agreement Overview The service level agreement is mainly initiated by child protection board for their cloud service provider (Kim Solomon, 2013). This service agreement are created to manage their employees payroll of the organization over cloud networking. Scope of the services There are basically some part of the services are covered in the basis of For easier accessibility and better managerial services Cloud based payroll services are selected by board (Limoncelli Hogan, 2014). Availability for the better provisional support services. Confidentiality To maintain the confidentiality of the provided database, maintenance of data usage secured and under security section. Price The allocated prices required to be according to competitiveness of the market, which should not be more than stipulated level also need to be properly documented. Migration to Cloud model Migrating the entire application on cloud is a tough ask for Child Protection Board as it has to completely shift their existing work model to an unknown domain. Migration should not be done in haste or a flip of the switch. Child Processing Board must choose the right migration strategy and tool (Kshetri, 2016). Since Child Protection Board is a public enterprise it should take care of the following factors before migrating to cloud: Virtualized Infrastructure: If the existing infrastructure is based on virtualization then it is viable to migrate from virtual-to-virtual framework. Therefore, physical migration is not considered a better option. Redundancy: If the availability requirement of an application is not close to 100 percent then it is considered unwise to migrate that service to cloud as it creates redundancy issues (Amos, 2014). Licensing: Cloud infrastructures require licensing of the services which are used in it such as operating systems and software which may become a problem at the time of migration. So this factor needs to be ensured (Busquets lvarez, 2015). Support: Software vendor needs to give support to the applications which will run of the cloud without which it is difficult to maintain a real time application. Since cloud supports round the clock service of its applications, support is a must thing for its execution and even for migration (Gu Guirguis, 2014). Data Locality: Location of details considered to be the most important factor in migration to cloud as some agencies require the data to be confined within borders. For this purpose regulatory authorities need to be considered. Remote administration This system provides tools and interfaces for external cloud administrators to administer and configure IT resources based on cloud. It is the most basic and fascinating service of cloud users that provides the leverage to its users for accessing, controlling and monitoring its services irrespective of the location. It is termed as the access and security management as per the checklist of Morad and Dalbhanjan (Houze, 2014). Cloud Service Level Agreements Before deploying the cloud services by Child Protection Board, they need to comply with some prerequisites of Service Level Agreements which are stated below: Understanding of responsibilities and roles. Evaluation of policies and business levels. Understand differences between service and deployment models. Identification of objective which are critical. Evaluation of privacy and security requirements. Preparation of management strategies during service failure. Understanding of plan for disaster recovery. Development of governance process to work efficiently. Understanding the process to exit. Cloud based disaster recovery Recovery of data and preventing disaster is not easy in cloud services. For cloud storage most of the users apply a hybrid approach for data backup and disaster recovery. This is done by choosing the data to be stored in the cloud. Not every data is kept on the cloud and some of it is stored on premise in different data storage systems. Recent data-backup techniques are used to minimize the risk of data loss (Reed Bennett, 2012). Introduction of new technologies such as variable length reduplication and reduction of storage bandwidth is done to protect data from risks of disaster. Replication of data to off-site cloud storage is another way of data recovery. Identification of critical data and applications that are running on cloud is also a successful method to ensure data protection which can be stored in another way or a storage device (Kshetri, 2016). There is no concrete way of avoiding risk associated with data loss on cloud but these protective measures minimize the chances o f data loss. Reference Amos, S. (2014). Data Security: Foundation for Smart City Development. Busquets, J., lvarez, C. (2015). Banco Sabadell acquires Banco CAM: leveraging a cloud computing strategy.Journal of Information Technology Teaching Cases,5(1), 8-19. Cao, N., Wang, C., Li, M., Ren, K., Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data.IEEE Transactions on parallel and distributed systems,25(1), 222-233. Gu, Q., Guirguis, M. (2014). Secure Mobile Cloud Computing and Security Issues. InHigh Performance Cloud Auditing and Applications(pp. 65-90). Springer New York. Houze Jr, R. A. (2014).Cloud dynamics(Vol. 104). Academic press. Kim, D., Solomon, M. G. (2013).Fundamentals of information systems security. Jones Bartlett Publishers. Kshetri, N. (2016). The Evolution of Rules and Institutions in Cybersecurity: Cloud Computing and Big Data. InThe Quest to Cyber Superiority(pp. 25-52). Springer International Publishing. Limoncelli, T. A., Chalup, S. R., Hogan, C. J. (2014).The Practice of Cloud System Administration: Designing and Operating Large Distributed Systems(Vol. 2). Pearson Education. Lloyd, I. (2014).Information technology law. Oxford University Press, USA. Moerel, L. (2014). Big Data Protection.How to Make the Draft EU Regulation on Data Protection Future Proof. Mutkoski, S. (2013). Cloud computing, regulatory compliance, and student privacy: A guide for school administrators and legal counsel.J. Marshall J. Info. Tech. Privacy L.,30, 511. Reed, A., Bennett, S. G. (2012).Silver clouds, dark linings: A concise guide to cloud computing. Pearson Education. Wang, H., Wu, S., Chen, M., Wang, W. (2014). Security protection between users and the mobile media cloud.IEEE Communications Magazine,52(3), 73-79.