Contact us today!
217-428-6449

Network Solutions Unlimited Blog

How the CLOUD Act Will Affect Your Security

How the CLOUD Act Will Affect Your Security

On March 23rd, 2018, the United States Congress passed another spending bill that could potentially limit individual privacy protection all over the world. This bill included a provision called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, which makes changes to the Stored Communications Act of 1986 and provides unelected American officials a considerable amount of power over digital privacy rights.

The basic gist of this law is that U.S. officials and others involved with them could potentially obtain digital information that isn’t hosted on their home turf. This law garnered overwhelming support from both the U.S. Department of Justice and major technology companies, prompting Congress to push it through.

What Does This Mean?
At a glance, this law represents a significant loss for the individual. It’s now easier than ever before to conduct criminal and civil investigations. Part of this law also allows for access to personal information and communication as well. Prior to the passing of this law, foreign governments would have to go through the proper channels in order to access information from U.S.-based technology companies.

Naturally, these companies wouldn’t necessarily consent so easily. Due to the multitude of nations that the United States deals with on a regular basis, before submitting to a request for information from a foreign entity, there would be much thought put into factors such as records of human rights abuses and other pressures placed on the company to make the decision. As a member of the Mutual Legal Assistance Treaty, or MLAT, the United States is hesitant to provide any information that could place human lives at risk, but the CLOUD Act can potentially shake these responsibilities up.

In the wake of this new law, the executive branch of the United States government will be able to control who this information is shared with, as well as who it’s not shared with. At the helm of such decisions are U.S. President Donald Trump and Attorney General Jeff Sessions. Data can now effectively be used as bargaining chips by the executive branch. Consequently, there has been a lot of power placed in the hands of appointees that haven’t necessarily been directly elected to positions of authority.

The United States and other law enforcement agencies around the globe will have powerful new ways to seize data for any express purpose. Therefore, the average user’s private messages via email or social media can now be confiscated and looked upon without a search warrant. This puts the personal information of so many users right in the crosshairs of people who now have a legal right to view it.

Below is a short explanation for what changes the CLOUD Act will bring about:

  • Enable foreign police to collect and wiretap people’s interpersonal communications without obtaining a warrant to do so.
  • Allows foreign nations to demand records saved and stored by American companies.
  • Allows the U.S. President to enter “executive agreements” designed to help foreign police agencies obtain data regardless of that regime’s human rights record.
  • Allows foreign police to obtain and collect data without notifying the party.
  • Gives U.S. police the right to grab data anyplace, no matter where it is stored.

The Electronic Frontier Foundation has been a particular opponent of this new law. They issued a public statement that decreed it a “dangerous expansion of police snooping” and that it would “erode privacy protections around the globe.” They go on to state:

“Legislation to protect the privacy of technology users from government snooping has long been overdue in the United States, but the CLOUD Act does the opposite, and privileges law enforcement at the expense of the people’s privacy. EFF strongly opposes the bill.”

Clearly any act that limits the privacy of any technology is going to be to be controversial. Where does your business stand? Let us know in the comments below.

Tech Term: Router
What’s the Best Form of Authentication on Your Mob...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 20 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Conferencing WPA3 Disaster Recovery CrashOverride Memory Identity Theft Tech Support Virtualization Managed IT Services Network Security Hybrid Cloud Data Protection Smartphones Data Data Security Scalability BDR File Storage Loyalty Computing Settings Data Privacy Smart Tech Content Filtering Office Tips eWaste Cloud Vendor Management Applications Passwords Redundancy Instant Messaging Data Theft Hackers Touchscreen Cleaning Vulnerability Identity Windows 10 Avoiding Downtime Projects Managed Service Provider Physical Security IT Support Nanotechnology Social Media Microsoft Word Meetings Gmail Cloud Computing Big Data Training intranet Computer Fan Business Computing Software as a Service Personal Information Two-factor Authentication Connectivity Firewall Webinar Hosted Solution Management Battery Smartphone Commerce Computing Infrastructure Legal Hosted Solutions Sales Computer Accessories Virtual Assistant Tech Term Wireless Bluetooth Administration The Internet of Things Customer User Error Wasting Time Hard Drives Internet Exlporer Employee-Employer Relationship Mobile BYOD Monitoring Patch Management Co-Managed Services Screen Mirroring Password Computer Forensics Consultant Save Money Cache Cybersecurity Testing Vendor PowerPoint Ciminal Experience IT solutions Bring Your Own Device Data Storage IT Support Unified Communications Internet exploMicrosoft Comparison Worker Cortana Hard Disk Drive Alexa for Business Chrome File Sharing Legislation Content Filter Cast Efficiency USB Managing Stress HaaS Chromebook Communications Facebook Hiring/Firing Augmented Reality Display Colocation Black Market Telephone Systems Antivirus Computer Care Business Intelligence Twitter Employer-Employee Relationship Humor Government Content Unified Threat Management Microsoft Credit Cards Virtual Reality Reputation Financial Networking History Streaming Media Devices SaaS Private Cloud Law Enforcement Emergency Blockchain Proactive VoIP Telephone Sync Virus Operating System Sports Hard Drive Scam iPhone End of Support Troubleshooting Public Computer Money Wasting Money Benefits MSP Work/Life Balance Browser Word Google Assistant Alert Lifestyle Social Engineering Data Breach Windows 10 Data Backup Managed Service Remote Monitoring Business Technology Root Cause Analysis Email Company Culture Analysis App hacker Microsoft Office Professional Services Retail Windows IT Services Encryption Miscellaneous Data storage FAQ Google Data Loss Privacy Risk Management Remote Computing Worker Commute Quick Tips Malware Websites Managed IT Services Relocation Mobile Device Specifications Automation WIndows Server 2008 Router Emails Entertainment Automobile Cost Management Windows 10s Document Management Accessory Software Proactive IT Regulation Books Collaboration Smart Technology Files Wireless Charging Samsung Windows 7 Best Practices Managed IT Computers Congratulations Rootkit Financial Technology Excel Solid State Drive Maintenance Outsourced IT Saving Money Backup Amazon Windows Ink Laptop How To Office 365 Storage Techology IoT Gifts Update Save Time Mobile Devices Printing Evernote User Tips Application Fraud Printers Monitor Wireless Technology Adobe Small Business Cybercrime Camera Identities Bandwidth Audiobook Two Factor Authentication Audit Wi-Fi Android Shadow IT IT Management Budget Mobility Internet Upgrades Politics Technology Transportation Spam Blocking Electronic Medical Records App store Network Business Continuity Health Public Cloud Unsupported Software Chromecast Mobile Security Safety Edge HIPAA WiFi Search Artificial Intelligence Computer Peripheral Flexibility Hacking Information Technology PDF Phishing Device Security Gadgets Holiday Tip of the Week Recovery Touchpad Business Owner Downtime WannaCry Travel Server Best Practice Going Green Video Games Office Business Management Dark Web HBO Gamification Apps Data Recovery Workplace Tips Assessment Google Drive Google Maps Mobile Device Management Users Information Innovation Project Management NFL Hyperlink Business IT Solutions IT budget Marketing Upgrade Productivity Television Apple Updates Hardware Advertising Tablets Robot Charger Shortcut Students Outlook Spam Microsoft Excel Monitors Data Management iOS Thank You Value Security Keyboard OneNote Compliance Managed IT Service Google Docs Internet of Things Ransomware Licensing VPN Education Employer Employee Relationship Workers Communication Spyware Phone System Language How to Productivity Wireless Internet