Contact us today!
217-428-6449

Network Solutions Unlimited Blog

How the CLOUD Act Will Affect Your Security

How the CLOUD Act Will Affect Your Security

On March 23rd, 2018, the United States Congress passed another spending bill that could potentially limit individual privacy protection all over the world. This bill included a provision called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, which makes changes to the Stored Communications Act of 1986 and provides unelected American officials a considerable amount of power over digital privacy rights.

The basic gist of this law is that U.S. officials and others involved with them could potentially obtain digital information that isn’t hosted on their home turf. This law garnered overwhelming support from both the U.S. Department of Justice and major technology companies, prompting Congress to push it through.

What Does This Mean?
At a glance, this law represents a significant loss for the individual. It’s now easier than ever before to conduct criminal and civil investigations. Part of this law also allows for access to personal information and communication as well. Prior to the passing of this law, foreign governments would have to go through the proper channels in order to access information from U.S.-based technology companies.

Naturally, these companies wouldn’t necessarily consent so easily. Due to the multitude of nations that the United States deals with on a regular basis, before submitting to a request for information from a foreign entity, there would be much thought put into factors such as records of human rights abuses and other pressures placed on the company to make the decision. As a member of the Mutual Legal Assistance Treaty, or MLAT, the United States is hesitant to provide any information that could place human lives at risk, but the CLOUD Act can potentially shake these responsibilities up.

In the wake of this new law, the executive branch of the United States government will be able to control who this information is shared with, as well as who it’s not shared with. At the helm of such decisions are U.S. President Donald Trump and Attorney General Jeff Sessions. Data can now effectively be used as bargaining chips by the executive branch. Consequently, there has been a lot of power placed in the hands of appointees that haven’t necessarily been directly elected to positions of authority.

The United States and other law enforcement agencies around the globe will have powerful new ways to seize data for any express purpose. Therefore, the average user’s private messages via email or social media can now be confiscated and looked upon without a search warrant. This puts the personal information of so many users right in the crosshairs of people who now have a legal right to view it.

Below is a short explanation for what changes the CLOUD Act will bring about:

  • Enable foreign police to collect and wiretap people’s interpersonal communications without obtaining a warrant to do so.
  • Allows foreign nations to demand records saved and stored by American companies.
  • Allows the U.S. President to enter “executive agreements” designed to help foreign police agencies obtain data regardless of that regime’s human rights record.
  • Allows foreign police to obtain and collect data without notifying the party.
  • Gives U.S. police the right to grab data anyplace, no matter where it is stored.

The Electronic Frontier Foundation has been a particular opponent of this new law. They issued a public statement that decreed it a “dangerous expansion of police snooping” and that it would “erode privacy protections around the globe.” They go on to state:

“Legislation to protect the privacy of technology users from government snooping has long been overdue in the United States, but the CLOUD Act does the opposite, and privileges law enforcement at the expense of the people’s privacy. EFF strongly opposes the bill.”

Clearly any act that limits the privacy of any technology is going to be to be controversial. Where does your business stand? Let us know in the comments below.

Tech Term: Router
What’s the Best Form of Authentication on Your Mob...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Payroll Data Breach Microsoft Excel Colocation Law Enforcement Wireless Technology Assessment Wireless Internet How To Lifestyle Camera Business Continuity Public Cloud Cost Management Meetings Data Management Loyalty Admin Touchpad Business Computing Hard Drives Humor Administration WannaCry Hardware Security Solid State Drive Word Transportation Smart Technology Managed IT The Internet of Things IT Solutions Telephone Collaboration Public Computer IT budget Flexibility Avoiding Downtime Benefits OneNote Printing Chromecast Money Smart Tech Productivity Samsung Artificial Intelligence Accessory Video Games Antivirus Virtualization Small Business Value BYOD iOS iPhone Troubleshooting Data Storage Data Security Fraud Browser Mobile Cybercrime Disaster Recovery Device Security Wasting Time Upgrades Google Training Specifications Identities Company Culture Unified Threat Management FAQ Root Cause Analysis Machine Learning Augmented Reality Big Data Mobile Security Adobe Windows 10 SMB Data Protection SaaS Retail Tip of the Week Information Scalability Email Amazon Techology Robot Computer Virtual Assistant Mobile Devices Identity Theft Saving Time Data Privacy Reputation Credit Cards Bluetooth Risk Management Privacy Malware Business Intelligence Financial Passwords Data Recovery Entertainment Relocation Keyboard Shortcuts Cast Congratulations Employer-Employee Relationship Best Practice Apple Recovery Gmail IoT Files Communications IT solutions Laptop Testing Cortana Managing Stress Computer Forensics Budget Internet of Things Downtime Blockchain Hyperlink Document Management File Sharing Unsupported Software Wireless Virtual Reality Tablets Tech Term Virtual Private Network Chromebook Experience Monitoring Hiring/Firing Rootkit Hacking Phone System Remote Computing Save Time Hosted Solution Vendor Audiobook Microsoft Word Cache Phishing Hard Disk Drive Advertising Google Docs IT Service App store Evernote Websites Peripheral Computer Accessories Paperless Office CrashOverride Marketing Government Private Cloud Two Factor Authentication IT Services Language WPA3 End of Support Network Security Automation Software Maintenance Charger Proactive IT Saving Money Updates Battery IT Support Security Cameras Managed IT Service Display Hackers Excel Password Worker Audit Internet WIndows Server 2008 Managed Service Employee-Employer Relationship NFL Monitors Gifts hacker Computing USB Social Media Business Outlook WiFi Communication Sports Internet exploMicrosoft Legal Human Resources Consultant IT Support Hosted Solutions Business Technology Computer Care Hard Drive Social Engineering Office 365 Android Computer Fan HBO Spam Blocking Backup Google Assistant Two-factor Authentication Sync Management Connectivity Politics Smartphone Office Utility Computing Cloud Computing Computers Books Work/Life Balance Vulnerability Instant Messaging Server Co-Managed Services PowerPoint Data Vendor Management Office Tips Monitor Spyware Education Microsoft Proactive Safety Workplace Tips Applications Encryption Black Market Health Apps Screen Mirroring Gamification Hybrid Cloud Settings Worker Commute intranet Google Maps eWaste Ransomware VPN Workers Microsoft Office Windows 10 Cloud Students Commerce Save Money Upgrade Wasting Money Cybersecurity Application Financial Technology Emails VoIP Windows Ink Tech Support Compliance Regulation Smartphones Business Owner Personal Information Managed IT Services Operating System Windows Remote Monitoring Conferencing Computing Infrastructure Data storage User Tips Data Backup Emergency Identity Unified Communications Scam Mobile Device Management Search Television Windows 10s Ciminal Holiday Miscellaneous Webinar Redundancy Access Control Employer Employee Relationship Touchscreen Facebook Automobile HaaS Memory IT Management History Shadow IT Devices Quick Tips Managed IT Services Legislation Comparison Licensing Update Software as a Service Information Technology Data Loss Twitter Printers Bandwidth Network Projects Shortcut Keyboard Firewall PDF Internet Exlporer Bring Your Own Device File Storage Content Filtering Content Nanotechnology Patch Management HIPAA Streaming Media Innovation Analysis Alexa for Business Virus Wi-Fi Chrome Travel Business Management MSP How to Mobility Storage Productivity Dark Web Thank You Best Practices Professional Services Content Filter Customer Wireless Charging Electronic Medical Records Outsourced IT Google Drive Gadgets User Error Telephone Systems Technology Physical Security Managed Service Provider Mobile Device BDR Going Green Spam Alert Users Networking Remote Workers Data Theft Windows 7 Sales Cleaning App Router Efficiency Project Management Edge