croom new

Eclipse Integrated Systems Blog

How the CLOUD Act Will Affect Your Security

How the CLOUD Act Will Affect Your Security

On March 23rd, 2018, the United States Congress passed another spending bill that could potentially limit individual privacy protection all over the world. This bill included a provision called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, which makes changes to the Stored Communications Act of 1986 and provides unelected American officials a considerable amount of power over digital privacy rights.

The basic gist of this law is that U.S. officials and others involved with them could potentially obtain digital information that isn’t hosted on their home turf. This law garnered overwhelming support from both the U.S. Department of Justice and major technology companies, prompting Congress to push it through.

What Does This Mean?
At a glance, this law represents a significant loss for the individual. It’s now easier than ever before to conduct criminal and civil investigations. Part of this law also allows for access to personal information and communication as well. Prior to the passing of this law, foreign governments would have to go through the proper channels in order to access information from U.S.-based technology companies.

Naturally, these companies wouldn’t necessarily consent so easily. Due to the multitude of nations that the United States deals with on a regular basis, before submitting to a request for information from a foreign entity, there would be much thought put into factors such as records of human rights abuses and other pressures placed on the company to make the decision. As a member of the Mutual Legal Assistance Treaty, or MLAT, the United States is hesitant to provide any information that could place human lives at risk, but the CLOUD Act can potentially shake these responsibilities up.

In the wake of this new law, the executive branch of the United States government will be able to control who this information is shared with, as well as who it’s not shared with. At the helm of such decisions are U.S. President Donald Trump and Attorney General Jeff Sessions. Data can now effectively be used as bargaining chips by the executive branch. Consequently, there has been a lot of power placed in the hands of appointees that haven’t necessarily been directly elected to positions of authority.

The United States and other law enforcement agencies around the globe will have powerful new ways to seize data for any express purpose. Therefore, the average user’s private messages via email or social media can now be confiscated and looked upon without a search warrant. This puts the personal information of so many users right in the crosshairs of people who now have a legal right to view it.

Below is a short explanation for what changes the CLOUD Act will bring about:

  • Enable foreign police to collect and wiretap people’s interpersonal communications without obtaining a warrant to do so.
  • Allows foreign nations to demand records saved and stored by American companies.
  • Allows the U.S. President to enter “executive agreements” designed to help foreign police agencies obtain data regardless of that regime’s human rights record.
  • Allows foreign police to obtain and collect data without notifying the party.
  • Gives U.S. police the right to grab data anyplace, no matter where it is stored.

The Electronic Frontier Foundation has been a particular opponent of this new law. They issued a public statement that decreed it a “dangerous expansion of police snooping” and that it would “erode privacy protections around the globe.” They go on to state:

“Legislation to protect the privacy of technology users from government snooping has long been overdue in the United States, but the CLOUD Act does the opposite, and privileges law enforcement at the expense of the people’s privacy. EFF strongly opposes the bill.”

Clearly any act that limits the privacy of any technology is going to be to be controversial. Where does your business stand? Let us know in the comments below.

Tech Term: Router
What’s the Best Form of Authentication on Your Mob...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Network Security Internet Google User Tips Hackers Malware Software Business Management Productivity Microsoft Tech Term Hosted Solutions Innovation Efficiency Computer Backup Windows 10 Browser Email Business Cybersecurity Apps Smartphones Productivity Mobile Devices Managed IT Services Windows Small Business Data Recovery Saving Money Data Backup Hardware Communication Internet of Things Smartphone Collaboration Holiday VoIP Android Cybercrime Virtualization Mobile Device IT Support Wireless Passwords Ransomware Disaster Recovery Workplace Tips communications Mobility Business Continuity Data Security Microsoft Office Operating System Network Law Enforcement Miscellaneous Cloud Computing IT Services Users IT Support Data Office 365 Server BDR Update Outsourced IT Quick Tips Password Phishing Money Gadgets Windows 10 Social Media Mobile Device Management Telephone Systems Chrome Wi-Fi Health Application App Information Technology Risk Management Upgrade Best Practice Cost Management Google Drive Employer-Employee Relationship Social Facebook Government Unsupported Software Vulnerability USB Antivirus Artificial Intelligence Alert Managed IT Services Patch Management Streaming Media Managed IT Bandwidth Computers User Error Identity Theft Hacking Two-factor Authentication Marketing Politics Data Management Networking Spam Save Money Sports Managed Service Provider Work/Life Balance Proactive IT Information Current Events Shortcut Office tips Automation Blockchain Personal Information eWaste Gmail Fraud Tech Support Data Storage Mobile Computing DDoS WiFi Compliance Training Legal Transportation Analytics Data Protection Touchscreen Search Word Internet Exlporer Wireless Technology Applications Maintenance The Internet of Things Audit Company Culture Flexibility Outlook Hosted Solution Save Time Television Router SaaS Commerce Encryption Computer Care History Excel Remote Monitoring and Management VPN Storage Access Control Telephony Humor Social Engineering End of Support Battery BYOD Devices Medical IT Cortana Private Cloud Mobile Security Remote Computing Meetings Office HaaS Going Green iPhone Managing Stress Recovery Business Intelligence Apple Managed Service Connectivity Samsung OneNote Wireless Charging Cleaning Automobile Google Docs Scam Nanotechnology Music HBO Gifts Hybrid Cloud Chromecast Consultant NFL Value Dark Web Comparison Unified Communications Help Desk Files Healthcare Reputation Adobe Microsoft Word Data Privacy Hiring/Firing iOS Running Cable Downloads Data Breach Data Theft Virtual Assistant Windows 10s Microsoft Excel Identities Laptop Employer Employee Relationship Root Cause Analysis Credit Cards SharePoint Managed IT Service Virtual Reality Edge Error Entertainment Screen Mirroring Specifications Bluetooth Distributed Denial of Service RAM Certification Black Market Hard Drive Benefits Trends Troubleshooting Settings Evernote Computing Plug-In Robot Solid State Drive File Sharing Language Touchpad Computer Accessories Augmented Reality Big Data IT Management Cables Electronic Medical Records Education Windows Ink Ciminal Internet Explorer Microsoft Office 365 Cast Sales Fax Server Microsoft Teams Security Cameras Trending Licensing Device Security Chromebook Reporting Data storage Smart Technology Computer Fan A.I. Profitability Scalability App store Lithium-ion battery Hacker Hard Disk Drive PDF Worker Commute Books IT Solutions FAQ Teamwork Virus Voice over Internet Protocol Administrator Safety Emails Google Maps Project Management Threat WannaCry Experience Retail G Suite Wearables Unified Threat Management Instant Messaging Travel Printing Movies Eliminating Downtime How To Sync Workers Analysis Keyboard Text Messaging Wearable Technology PowerPoint Authentication Uninterrupted Power Supply Operating Sysytem Vendor Management Charger Proactive Access Webinar Point of Sale Data Loss IT budget Phone System Conferencing Bring Your Own Device Budget Upgrades Tablets Spyware Google Assistant GDPR Legislation Wireless Internet Updates Identity Authorization Avoiding Downtime Video Games WIndows Server 2008 Websites Amazon IT solutions Advertising Printers Worker Twitter Regulation Disaster Cache Relocation Remote Monitoring CrashOverride Emergency Monitors

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login