croom new

How the CLOUD Act Will Affect Your Security

How the CLOUD Act Will Affect Your Security

On March 23rd, 2018, the United States Congress passed another spending bill that could potentially limit individual privacy protection all over the world. This bill included a provision called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, which makes changes to the Stored Communications Act of 1986 and provides unelected American officials a considerable amount of power over digital privacy rights.

The basic gist of this law is that U.S. officials and others involved with them could potentially obtain digital information that isn’t hosted on their home turf. This law garnered overwhelming support from both the U.S. Department of Justice and major technology companies, prompting Congress to push it through.

What Does This Mean?
At a glance, this law represents a significant loss for the individual. It’s now easier than ever before to conduct criminal and civil investigations. Part of this law also allows for access to personal information and communication as well. Prior to the passing of this law, foreign governments would have to go through the proper channels in order to access information from U.S.-based technology companies.

Naturally, these companies wouldn’t necessarily consent so easily. Due to the multitude of nations that the United States deals with on a regular basis, before submitting to a request for information from a foreign entity, there would be much thought put into factors such as records of human rights abuses and other pressures placed on the company to make the decision. As a member of the Mutual Legal Assistance Treaty, or MLAT, the United States is hesitant to provide any information that could place human lives at risk, but the CLOUD Act can potentially shake these responsibilities up.

In the wake of this new law, the executive branch of the United States government will be able to control who this information is shared with, as well as who it’s not shared with. At the helm of such decisions are U.S. President Donald Trump and Attorney General Jeff Sessions. Data can now effectively be used as bargaining chips by the executive branch. Consequently, there has been a lot of power placed in the hands of appointees that haven’t necessarily been directly elected to positions of authority.

The United States and other law enforcement agencies around the globe will have powerful new ways to seize data for any express purpose. Therefore, the average user’s private messages via email or social media can now be confiscated and looked upon without a search warrant. This puts the personal information of so many users right in the crosshairs of people who now have a legal right to view it.

Below is a short explanation for what changes the CLOUD Act will bring about:

  • Enable foreign police to collect and wiretap people’s interpersonal communications without obtaining a warrant to do so.
  • Allows foreign nations to demand records saved and stored by American companies.
  • Allows the U.S. President to enter “executive agreements” designed to help foreign police agencies obtain data regardless of that regime’s human rights record.
  • Allows foreign police to obtain and collect data without notifying the party.
  • Gives U.S. police the right to grab data anyplace, no matter where it is stored.

The Electronic Frontier Foundation has been a particular opponent of this new law. They issued a public statement that decreed it a “dangerous expansion of police snooping” and that it would “erode privacy protections around the globe.” They go on to state:

“Legislation to protect the privacy of technology users from government snooping has long been overdue in the United States, but the CLOUD Act does the opposite, and privileges law enforcement at the expense of the people’s privacy. EFF strongly opposes the bill.”

Clearly any act that limits the privacy of any technology is going to be to be controversial. Where does your business stand? Let us know in the comments below.

Tech Term: Router
What’s the Best Form of Authentication on Your Mob...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, August 20 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Business Computing Google Hackers Network Security Malware Internet Business Management Software Microsoft Tech Term Hosted Solutions Computer User Tips Backup Innovation Windows 10 Productivity Business Apps Cybersecurity Productivity Efficiency Windows Email Mobile Devices Managed IT Services Cybercrime Virtualization Browser Smartphone Saving Money Smartphones Hardware communications Operating System Internet of Things Law Enforcement VoIP Data Recovery Data Backup Communication Disaster Recovery Small Business IT Support Microsoft Office Data Security Collaboration Ransomware Passwords Business Continuity Android Phishing Chrome Social Media Server Office 365 Mobile Device Management Telephone Systems BDR Wireless Quick Tips Miscellaneous Network Money Holiday IT Support Workplace Tips Mobility Outsourced IT Social Data Cost Management Wi-Fi Employer-Employee Relationship Application App Health Government Information Technology Update Cloud Computing Vulnerability Password Unsupported Software IT Services Best Practice Risk Management Google Drive Gadgets Managed IT Work/Life Balance Facebook Users Current Events Automation Office tips Proactive IT USB Spam Alert Artificial Intelligence Antivirus Windows 10 Managed Service Provider Computers Blockchain Hacking Shortcut Upgrade Identity Theft Streaming Media Patch Management Data Management Politics User Error Save Money Sports Two-factor Authentication Private Cloud Audit Save Time Excel Networking Company Culture Recovery iPhone Managing Stress HaaS SaaS Commerce Devices Cortana Meetings Gmail Automobile Computer Care Tech Support Personal Information Going Green Apple Transportation Legal Mobile Security Internet Exlporer Analytics eWaste Information Wireless Technology Wireless Charging Search The Internet of Things Google Docs WiFi Office Hosted Solution Fraud Mobile Computing DDoS Data Storage Flexibility Business Intelligence Cleaning Samsung OneNote Data Protection Encryption Bandwidth VPN Router Telephony Humor History Compliance Social Engineering Maintenance Television End of Support Battery Managed IT Services Remote Computing Uninterrupted Power Supply Operating Sysytem Cast Sales How To Hard Drive Benefits Access Licensing Device Security Text Messaging RAM Storage Teamwork Computing Plug-In Solid State Drive Budget Point of Sale Trends Settings Cables Electronic Medical Records IT Solutions FAQ Internet Explorer Computer Accessories Augmented Reality Google Maps Project Management Phone System Avoiding Downtime BYOD Retail Chromebook Reporting Smart Technology Computer Fan Travel Microsoft Teams Video Games App store Remote Monitoring and Management Hacker Hard Disk Drive Chromecast Sync Workers Advertising Wearable Technology A.I. Music Virus Voice over Internet Protocol Safety Emails Files Charger Threat Data Loss IT budget Unified Threat Management Conferencing Reputation Printing Medical IT WannaCry Tablets Spyware G Suite Laptop Legislation Analysis Keyboard Updates Movies Proactive Webinar WIndows Server 2008 Virtual Reality PowerPoint Vendor Management Bring Your Own Device Upgrades HBO Gifts Black Market Google Assistant GDPR Robot NFL Entertainment Touchpad Comparison Identity Managed Service Adobe Microsoft Word Running Cable Identities Big Data SharePoint Websites Amazon IT solutions Trending Data Breach Education Connectivity Data storage Microsoft Excel Distributed Denial of Service Hybrid Cloud Consultant Credit Cards Value Scam Nanotechnology Lithium-ion battery Word Edge Bluetooth Screen Mirroring Specifications Scalability Data Privacy Hiring/Firing iOS Administrator Applications PDF Worker Commute Unified Communications Mobile Device File Sharing Language Books Data Theft Virtual Assistant Windows 10s Outlook Evernote Marketing Downloads Training Fax Server Managed IT Service Touchscreen IT Management Instant Messaging Employer Employee Relationship Root Cause Analysis Windows Ink Ciminal Experience Regulation Cache Remote Monitoring Emergency CrashOverride Disaster Monitors Dark Web Worker Relocation Twitter Error

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login