Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How the CLOUD Act Will Affect Your Security

How the CLOUD Act Will Affect Your Security

On March 23rd, 2018, the United States Congress passed another spending bill that could potentially limit individual privacy protection all over the world. This bill included a provision called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, which makes changes to the Stored Communications Act of 1986 and provides unelected American officials a considerable amount of power over digital privacy rights.

The basic gist of this law is that U.S. officials and others involved with them could potentially obtain digital information that isn’t hosted on their home turf. This law garnered overwhelming support from both the U.S. Department of Justice and major technology companies, prompting Congress to push it through.

What Does This Mean?
At a glance, this law represents a significant loss for the individual. It’s now easier than ever before to conduct criminal and civil investigations. Part of this law also allows for access to personal information and communication as well. Prior to the passing of this law, foreign governments would have to go through the proper channels in order to access information from U.S.-based technology companies.

Naturally, these companies wouldn’t necessarily consent so easily. Due to the multitude of nations that the United States deals with on a regular basis, before submitting to a request for information from a foreign entity, there would be much thought put into factors such as records of human rights abuses and other pressures placed on the company to make the decision. As a member of the Mutual Legal Assistance Treaty, or MLAT, the United States is hesitant to provide any information that could place human lives at risk, but the CLOUD Act can potentially shake these responsibilities up.

In the wake of this new law, the executive branch of the United States government will be able to control who this information is shared with, as well as who it’s not shared with. At the helm of such decisions are U.S. President Donald Trump and Attorney General Jeff Sessions. Data can now effectively be used as bargaining chips by the executive branch. Consequently, there has been a lot of power placed in the hands of appointees that haven’t necessarily been directly elected to positions of authority.

The United States and other law enforcement agencies around the globe will have powerful new ways to seize data for any express purpose. Therefore, the average user’s private messages via email or social media can now be confiscated and looked upon without a search warrant. This puts the personal information of so many users right in the crosshairs of people who now have a legal right to view it.

Below is a short explanation for what changes the CLOUD Act will bring about:

  • Enable foreign police to collect and wiretap people’s interpersonal communications without obtaining a warrant to do so.
  • Allows foreign nations to demand records saved and stored by American companies.
  • Allows the U.S. President to enter “executive agreements” designed to help foreign police agencies obtain data regardless of that regime’s human rights record.
  • Allows foreign police to obtain and collect data without notifying the party.
  • Gives U.S. police the right to grab data anyplace, no matter where it is stored.

The Electronic Frontier Foundation has been a particular opponent of this new law. They issued a public statement that decreed it a “dangerous expansion of police snooping” and that it would “erode privacy protections around the globe.” They go on to state:

“Legislation to protect the privacy of technology users from government snooping has long been overdue in the United States, but the CLOUD Act does the opposite, and privileges law enforcement at the expense of the people’s privacy. EFF strongly opposes the bill.”

Clearly any act that limits the privacy of any technology is going to be to be controversial. Where does your business stand? Let us know in the comments below.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 24 April 2018
If you'd like to register, please fill in the username, password and name fields.

Contact Excedeo Today


Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Cloud Internet Microsoft Software Business Computing Business Management Hackers Productivity Google Efficiency Backup Hosted Solutions Managed Service Provider Innovation Business Malware windows Workplace Tips User Tips IT Support Mobile Devices Hardware IT Services Computer Upgrade Miscellaneous Saving Money Email Virtualization Windows 10 Gadgets Apps Network Security Disaster Recovery Business Continuity Communication Server Data Smartphones Microsoft Office Information Technology Mobile Computing Mobile Device Management Quick Tips VoIP Small Business Network Smartphone Social Media Health Productivity Operating System Browser Going Green Android Mobile Office Chrome Passwords Holiday App Alert Best Practice Cybercrime Office Save Money spam BYOD Marketing Cybersecurity Collaboration Application Ransomware Apple WiFi The Internet of Things Tablet Search Wearable Technology Law Enforcement Employer-Employee Relationship Remote Computing History Vendor Management Wireless Technology Hacking Facebook iPhone User Error Data Security Phishing Risk Management Antivirus Unified Threat Management communications Avoiding Downtime Maintenance Managed IT Services Money Big Data Data Backup Office Tips BDR Password Government Data Management Computers Office 365 Remote Monitoring Hard Drives Social Mobility Telephone Systems Internet of Things Saving Time IT Solutions Customer Relationship Management Users Tech Support Outlook Wi-Fi Two-factor Authentication Update Router Vulnerability USB Encryption Data Recovery Bring Your Own Device Outsourced IT Analytics OneNote Proactive IT Google Drive Shortcut Firewall Bandwidth Lithium-ion battery Cost Management Current Events Social Networking VPN Tech Term Wireless Humor Website Net Neutrality Phone System Unsupported Software Printer Automation IT Support Cloud Computing Windows 10 Disaster Gmail Politics PowerPoint Excel Streaming Media Trending Audit IT COnsultant Intranet Managed IT Social Engineering Laptop Computer Repair Content Filtering Identity Theft Budget Virus Education Recovery Television administration Retail Work/Life Balance Fraud Legal HaaS Fax Server Google Docs Transportation Managing Stress Commerce Computing End of Support Flexibility Storage Windows 8 Mobile Security Data Storage Hosted Solution Cortana Business Intelligence Meetings Telephony Customer Service Travel Biometrics WannaCry Online Currency Blockchain Artificial Intelligence Private Cloud Virtual Reality Networking HIPAA Samsung Battery Internet Exlporer Augmented Reality Data Protection Personal Information DDoS Point of Sale Printer Server Automobile Instant Messaging Emails Cleaning Programming Sports Twitter Entertainment Managed IT Services Save Time Benefits eWaste Uninterrupted Power Supply Computer Accessories Sales Computer Care Patch Management Paperless Office Sync WIndows 7 Hiring/Firing Data Theft Network Congestion Regulations Ebay Charger Bluetooth Smart Technology Edge App store Microsoft Excel Debate junk Mobile Device Help Desk Cameras Wireless Charging Robot SharePoint Adobe User Ciminal Advertising Scalability File Sharing filter Presentation iOS Experience Data Breach Data storage Virtual Desktop Teamwork Applications Best Available Scam 3D Printing Project Management PDF Identity How To Science Surge Protector Upgrades Computer Fan Music Evernote Licensing Lifestyle Screen Mirroring Employer Employee Relationship IT budget Text Messaging Consultant Data Privacy Legislation Books Workers Touchpad Buisness Running Cable Tablets Cast Touchscreen Black Market Comparison HBO Near Field Communication Monitors Electronic Medical Records Updates Identities Community NFL Webinar ISP Specifications Nokia IT consulting Nanotechnology Intrantet Safety Microsoft Word Operating Sysytem Human Resources Language Word Gift Giving Training IT solutions Blogging Conferencing Tutorial Youtube IT Management Reliable Computing Root Cause Analysis Device Security Distributed Denial of Service Windows Ink Microblogging Compliance Company Culture Windows 10s Gifts Bloatware WIndows Server 2008 Devices Reputation Proactive Co-managed IT Google Maps Inbound Marketing Hard Drive Solid State Drive Worker Commute Files Display Credit Cards Administrator Settings Keyboard Amazon Spyware hacker Branding Websites Video Games SaaS Data Loss Mouse Webinar Value Images Hard Disk Drive OneDrive Chromecast FAQ Access Print Server