Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How the CLOUD Act Will Affect Your Security

How the CLOUD Act Will Affect Your Security

On March 23rd, 2018, the United States Congress passed another spending bill that could potentially limit individual privacy protection all over the world. This bill included a provision called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, which makes changes to the Stored Communications Act of 1986 and provides unelected American officials a considerable amount of power over digital privacy rights.

The basic gist of this law is that U.S. officials and others involved with them could potentially obtain digital information that isn’t hosted on their home turf. This law garnered overwhelming support from both the U.S. Department of Justice and major technology companies, prompting Congress to push it through.

What Does This Mean?
At a glance, this law represents a significant loss for the individual. It’s now easier than ever before to conduct criminal and civil investigations. Part of this law also allows for access to personal information and communication as well. Prior to the passing of this law, foreign governments would have to go through the proper channels in order to access information from U.S.-based technology companies.

Naturally, these companies wouldn’t necessarily consent so easily. Due to the multitude of nations that the United States deals with on a regular basis, before submitting to a request for information from a foreign entity, there would be much thought put into factors such as records of human rights abuses and other pressures placed on the company to make the decision. As a member of the Mutual Legal Assistance Treaty, or MLAT, the United States is hesitant to provide any information that could place human lives at risk, but the CLOUD Act can potentially shake these responsibilities up.

In the wake of this new law, the executive branch of the United States government will be able to control who this information is shared with, as well as who it’s not shared with. At the helm of such decisions are U.S. President Donald Trump and Attorney General Jeff Sessions. Data can now effectively be used as bargaining chips by the executive branch. Consequently, there has been a lot of power placed in the hands of appointees that haven’t necessarily been directly elected to positions of authority.

The United States and other law enforcement agencies around the globe will have powerful new ways to seize data for any express purpose. Therefore, the average user’s private messages via email or social media can now be confiscated and looked upon without a search warrant. This puts the personal information of so many users right in the crosshairs of people who now have a legal right to view it.

Below is a short explanation for what changes the CLOUD Act will bring about:

  • Enable foreign police to collect and wiretap people’s interpersonal communications without obtaining a warrant to do so.
  • Allows foreign nations to demand records saved and stored by American companies.
  • Allows the U.S. President to enter “executive agreements” designed to help foreign police agencies obtain data regardless of that regime’s human rights record.
  • Allows foreign police to obtain and collect data without notifying the party.
  • Gives U.S. police the right to grab data anyplace, no matter where it is stored.

The Electronic Frontier Foundation has been a particular opponent of this new law. They issued a public statement that decreed it a “dangerous expansion of police snooping” and that it would “erode privacy protections around the globe.” They go on to state:

“Legislation to protect the privacy of technology users from government snooping has long been overdue in the United States, but the CLOUD Act does the opposite, and privileges law enforcement at the expense of the people’s privacy. EFF strongly opposes the bill.”

Clearly any act that limits the privacy of any technology is going to be to be controversial. Where does your business stand? Let us know in the comments below.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 26 September 2018
If you'd like to register, please fill in the username, password and name fields.

Contact Excedeo Today


Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Management Hackers Business Computing Efficiency Google Productivity Hosted Solutions Backup Managed Service Provider Innovation Business Malware User Tips windows Workplace Tips Mobile Devices Computer Hardware IT Support IT Services Network Security Saving Money Upgrade Miscellaneous Windows 10 Email Virtualization Communication Apps Data Gadgets Smartphones Business Continuity Mobile Device Management Server Disaster Recovery Network Microsoft Office Information Technology Smartphone Mobile Computing VoIP Tech Term Productivity Small Business Browser Quick Tips Health Social Media Passwords Going Green Android Operating System Mobile Office Cybersecurity Holiday Chrome Save Money Application Office App Alert Best Practice Collaboration Cybercrime Marketing Managed IT Services Ransomware spam Data Backup BYOD Law Enforcement communications Remote Computing Tablet Search Employer-Employee Relationship Wearable Technology The Internet of Things Office 365 Apple Vendor Management WiFi Data Security iPhone Internet of Things Risk Management Cost Management Money Maintenance Data Recovery Router Outsourced IT Wireless Technology BDR Facebook History Users User Error Remote Monitoring Hacking Antivirus Unified Threat Management Bring Your Own Device Avoiding Downtime Phishing Social Telephone Systems Hard Drives IT Solutions Tech Support Big Data Saving Time Government Office Tips Customer Relationship Management Password Bandwidth Mobility Data Management Computers Wireless VPN Humor Website Net Neutrality Unsupported Software IT Support Printer Cloud Computing Windows 10 Budget Wi-Fi Outlook Social Networking Phone System Vulnerability Gmail USB Encryption Automation PowerPoint Analytics Two-factor Authentication OneNote Google Drive Update Proactive IT Firewall Lithium-ion battery Shortcut Current Events Blockchain Identity Theft Networking Social Engineering Education Information IT COnsultant Television Work/Life Balance Retail Computer Repair Recovery Mobile Device Politics Virus administration Streaming Media Excel Trending Artificial Intelligence Disaster Audit Managed IT Intranet Laptop Augmented Reality Travel Content Filtering Printer Server Private Cloud Virtual Reality Managed IT Services Save Time HIPAA Programming Internet Exlporer Computer Care Twitter DDoS Data Protection Instant Messaging Emails Amazon Paperless Office Google Assistant Legal Sports Entertainment Benefits Transportation eWaste Commerce Fax Server Computer Accessories End of Support Flexibility Managed Service Devices Computing SaaS Value Patch Management HaaS Uninterrupted Power Supply Data Storage Sales Hard Drive Fraud Managing Stress Google Docs Storage WannaCry Wireless Charging Online Currency Mobile Security Hosted Solution Samsung Data Breach Business Intelligence Battery Applications Windows 8 Meetings Cortana Telephony Customer Service Personal Information Biometrics Automobile Point of Sale Cleaning Blogging Virtual Assistant Company Culture Tutorial Workers Near Field Communication Tablets Windows 10s Lifestyle Chromebook Comparison Reputation HBO Alexa for Business Updates Solid State Drive Identities IT consulting Worker Commute NFL Administrator Human Resources Settings Co-managed IT Printing Keyboard Specifications hacker Video Games Display Microsoft Word Hard Disk Drive Language Reliable Computing Word Access Distributed Denial of Service Hiring/Firing Conferencing Compliance IT Management OneDrive Software as a Service Bloatware Print Server Device Security Nokia Windows Ink Gift Giving Computer Forensics Smart Technology Gifts Inbound Marketing WIndows Server 2008 Files Ebay Youtube Branding Proactive Google Maps Robot Management Mouse Microblogging Credit Cards Advertising Scalability Chromecast Vendor Spyware iOS Websites WIndows 7 Experience Data Loss Data storage Wireless Internet Network Congestion Scam FAQ PDF Regulations How To Sync Employee-Employer Relationship Upgrades Bluetooth Computer Fan Data Theft Music 3D Printing Screen Mirroring Gamification Webinar Employer Employee Relationship Surge Protector Charger junk Images Text Messaging Edge Cameras Business Technology Consultant SharePoint App store User Books Microsoft Excel Touchpad Cast Memory filter Ciminal Presentation Black Market Adobe Testing Virtual Desktop Touchscreen Teamwork Monitors Best Available Electronic Medical Records File Sharing Financial Science Debate Help Desk Project Management Camera Webinar Nanotechnology Community Identity Safety Operating Sysytem ISP Hybrid Cloud Training Evernote IT budget Licensing Intrantet Projects Buisness IT solutions Running Cable Root Cause Analysis Data Privacy Legislation