Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How the CLOUD Act Will Affect Your Security

How the CLOUD Act Will Affect Your Security

On March 23rd, 2018, the United States Congress passed another spending bill that could potentially limit individual privacy protection all over the world. This bill included a provision called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, which makes changes to the Stored Communications Act of 1986 and provides unelected American officials a considerable amount of power over digital privacy rights.

The basic gist of this law is that U.S. officials and others involved with them could potentially obtain digital information that isn’t hosted on their home turf. This law garnered overwhelming support from both the U.S. Department of Justice and major technology companies, prompting Congress to push it through.

What Does This Mean?
At a glance, this law represents a significant loss for the individual. It’s now easier than ever before to conduct criminal and civil investigations. Part of this law also allows for access to personal information and communication as well. Prior to the passing of this law, foreign governments would have to go through the proper channels in order to access information from U.S.-based technology companies.

Naturally, these companies wouldn’t necessarily consent so easily. Due to the multitude of nations that the United States deals with on a regular basis, before submitting to a request for information from a foreign entity, there would be much thought put into factors such as records of human rights abuses and other pressures placed on the company to make the decision. As a member of the Mutual Legal Assistance Treaty, or MLAT, the United States is hesitant to provide any information that could place human lives at risk, but the CLOUD Act can potentially shake these responsibilities up.

In the wake of this new law, the executive branch of the United States government will be able to control who this information is shared with, as well as who it’s not shared with. At the helm of such decisions are U.S. President Donald Trump and Attorney General Jeff Sessions. Data can now effectively be used as bargaining chips by the executive branch. Consequently, there has been a lot of power placed in the hands of appointees that haven’t necessarily been directly elected to positions of authority.

The United States and other law enforcement agencies around the globe will have powerful new ways to seize data for any express purpose. Therefore, the average user’s private messages via email or social media can now be confiscated and looked upon without a search warrant. This puts the personal information of so many users right in the crosshairs of people who now have a legal right to view it.

Below is a short explanation for what changes the CLOUD Act will bring about:

  • Enable foreign police to collect and wiretap people’s interpersonal communications without obtaining a warrant to do so.
  • Allows foreign nations to demand records saved and stored by American companies.
  • Allows the U.S. President to enter “executive agreements” designed to help foreign police agencies obtain data regardless of that regime’s human rights record.
  • Allows foreign police to obtain and collect data without notifying the party.
  • Gives U.S. police the right to grab data anyplace, no matter where it is stored.

The Electronic Frontier Foundation has been a particular opponent of this new law. They issued a public statement that decreed it a “dangerous expansion of police snooping” and that it would “erode privacy protections around the globe.” They go on to state:

“Legislation to protect the privacy of technology users from government snooping has long been overdue in the United States, but the CLOUD Act does the opposite, and privileges law enforcement at the expense of the people’s privacy. EFF strongly opposes the bill.”

Clearly any act that limits the privacy of any technology is going to be to be controversial. Where does your business stand? Let us know in the comments below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 19 July 2018
If you'd like to register, please fill in the username, password and name fields.

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Management Business Computing Hackers Google Productivity Efficiency Hosted Solutions Managed Service Provider Backup Business Innovation Malware windows Workplace Tips User Tips Hardware Mobile Devices Computer IT Support IT Services Saving Money Miscellaneous Upgrade Email Virtualization Windows 10 Gadgets Network Security Apps Business Continuity Communication Server Disaster Recovery Data Network Smartphones Mobile Computing Microsoft Office Information Technology Mobile Device Management Quick Tips VoIP Small Business Smartphone Health Productivity Social Media Going Green Cybersecurity Android Operating System Browser Mobile Office Passwords Holiday Tech Term Chrome Best Practice Cybercrime Save Money Office Application App Alert BYOD Marketing Collaboration Law Enforcement Ransomware Managed IT Services spam Office 365 communications Tablet Search Remote Computing Employer-Employee Relationship Wearable Technology Apple The Internet of Things Vendor Management WiFi Data Backup Remote Monitoring Hacking Unified Threat Management Antivirus iPhone Avoiding Downtime Phishing Data Security Risk Management Cost Management Maintenance Router Money Wireless Technology BDR History Data Recovery Facebook Outsourced IT User Error Bring Your Own Device Computers Data Management Social Mobility Hard Drives Telephone Systems Internet of Things IT Solutions Saving Time Tech Support Big Data Customer Relationship Management Government Office Tips Password Google Drive Bandwidth Lithium-ion battery Shortcut Current Events VPN Humor Website Net Neutrality Wireless Social Networking Printer Outlook Phone System Unsupported Software IT Support Gmail Automation USB Cloud Computing Encryption Wi-Fi PowerPoint Two-factor Authentication Users Analytics OneNote Vulnerability Update Proactive IT Firewall Audit Intranet Travel Laptop Artificial Intelligence Content Filtering Managed IT Networking IT COnsultant Social Engineering Blockchain Computer Repair Education Television Identity Theft Retail Budget Virus Recovery Work/Life Balance administration Windows 10 Politics Disaster Streaming Media Excel Trending Online Currency Wireless Charging Hosted Solution Business Intelligence Mobile Security Data Breach Meetings WannaCry Customer Service Telephony Augmented Reality Biometrics Cortana Point of Sale Virtual Reality Printer Server Samsung Private Cloud Battery HIPAA Programming Personal Information Internet Exlporer Twitter Automobile Cleaning DDoS Instant Messaging Emails Amazon Managed IT Services Save Time Paperless Office Data Protection Entertainment Computer Care Sports Benefits Google Assistant Fax Server eWaste Computer Accessories Uninterrupted Power Supply Sales Hard Drive Computing Value Devices Legal Transportation Commerce Patch Management End of Support HaaS Flexibility Managing Stress Fraud Storage Google Docs Data Storage Windows 8 Virtual Desktop Presentation App store Upgrades Microsoft Excel How To Music Teamwork Best Available Memory Computer Fan Science Screen Mirroring Ciminal Employer Employee Relationship Adobe Text Messaging Consultant File Sharing Books Community Touchpad Financial Cast ISP Project Management Applications Lifestyle Buisness Intrantet Identity Touchscreen Black Market Monitors Evernote Electronic Medical Records Running Cable Hybrid Cloud IT budget Blogging Licensing Tutorial Near Field Communication Data Privacy Webinar Legislation Nanotechnology Workers Safety Operating Sysytem Virtual Assistant Training Tablets Human Resources IT consulting Chromebook IT solutions Comparison Root Cause Analysis Updates Co-managed IT HBO Alexa for Business Identities Company Culture Display NFL Nokia Gift Giving Reliable Computing Printing Windows 10s Specifications Compliance Microsoft Word Reputation Youtube Distributed Denial of Service Bloatware OneDrive Language Word Print Server Worker Commute Administrator Microblogging Solid State Drive Conferencing Settings Inbound Marketing Device Security Keyboard IT Management hacker Ebay Windows Ink Video Games Files Gifts Access Branding Computer Forensics Hard Disk Drive Hiring/Firing WIndows Server 2008 SaaS Mouse Proactive Google Maps Chromecast Credit Cards Webinar Images WIndows 7 Management Spyware Smart Technology Network Congestion Regulations Websites Mobile Device Data Loss 3D Printing FAQ Robot Bluetooth Wireless Internet junk Sync Advertising Surge Protector Cameras Data Theft Scalability Charger Experience Data storage Debate SharePoint Help Desk User Gamification iOS filter Edge Scam PDF