Contact us today!

FRS Pros Blog

How the CLOUD Act Will Affect Your Security

How the CLOUD Act Will Affect Your Security

On March 23rd, 2018, the United States Congress passed another spending bill that could potentially limit individual privacy protection all over the world. This bill included a provision called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, which makes changes to the Stored Communications Act of 1986 and provides unelected American officials a considerable amount of power over digital privacy rights.

The basic gist of this law is that U.S. officials and others involved with them could potentially obtain digital information that isn’t hosted on their home turf. This law garnered overwhelming support from both the U.S. Department of Justice and major technology companies, prompting Congress to push it through.

What Does This Mean?
At a glance, this law represents a significant loss for the individual. It’s now easier than ever before to conduct criminal and civil investigations. Part of this law also allows for access to personal information and communication as well. Prior to the passing of this law, foreign governments would have to go through the proper channels in order to access information from U.S.-based technology companies.

Naturally, these companies wouldn’t necessarily consent so easily. Due to the multitude of nations that the United States deals with on a regular basis, before submitting to a request for information from a foreign entity, there would be much thought put into factors such as records of human rights abuses and other pressures placed on the company to make the decision. As a member of the Mutual Legal Assistance Treaty, or MLAT, the United States is hesitant to provide any information that could place human lives at risk, but the CLOUD Act can potentially shake these responsibilities up.

In the wake of this new law, the executive branch of the United States government will be able to control who this information is shared with, as well as who it’s not shared with. At the helm of such decisions are U.S. President Donald Trump and Attorney General Jeff Sessions. Data can now effectively be used as bargaining chips by the executive branch. Consequently, there has been a lot of power placed in the hands of appointees that haven’t necessarily been directly elected to positions of authority.

The United States and other law enforcement agencies around the globe will have powerful new ways to seize data for any express purpose. Therefore, the average user’s private messages via email or social media can now be confiscated and looked upon without a search warrant. This puts the personal information of so many users right in the crosshairs of people who now have a legal right to view it.

Below is a short explanation for what changes the CLOUD Act will bring about:

  • Enable foreign police to collect and wiretap people’s interpersonal communications without obtaining a warrant to do so.
  • Allows foreign nations to demand records saved and stored by American companies.
  • Allows the U.S. President to enter “executive agreements” designed to help foreign police agencies obtain data regardless of that regime’s human rights record.
  • Allows foreign police to obtain and collect data without notifying the party.
  • Gives U.S. police the right to grab data anyplace, no matter where it is stored.

The Electronic Frontier Foundation has been a particular opponent of this new law. They issued a public statement that decreed it a “dangerous expansion of police snooping” and that it would “erode privacy protections around the globe.” They go on to state:

“Legislation to protect the privacy of technology users from government snooping has long been overdue in the United States, but the CLOUD Act does the opposite, and privileges law enforcement at the expense of the people’s privacy. EFF strongly opposes the bill.”

Clearly any act that limits the privacy of any technology is going to be to be controversial. Where does your business stand? Let us know in the comments below.

Tech Term: Router
What’s the Best Form of Authentication on Your Mob...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, January 20 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Computing Business Management Google User Tips Cloud Tech Term Hackers Hardware Software Data Backup Mobile Devices Microsoft Malware Computer Hosted Solutions Productivity Efficiency Browser Smartphone Cybersecurity Windows Data Security Android IT Services Windows 10 Data Recovery Office 365 Email Innovation Cybercrime Outsourced IT Data Smartphones Apps Internet of Things Backup IT Support Business Continuity Upgrade Operating System VoIP Phishing Business Money Saving Money Alert Communications Law Enforcement Disaster Recovery Mobile Device Management Ransomware Vulnerability Microsoft Office Employer-Employee Relationship Collaboration Best Practice Network Applications Chrome Small Business IT Support Workplace Tips Managed IT Services Passwords Server Spam Gadgets Tech Support Router Holiday Networking OneNote Google Drive Managed Service Provider Windows 10 Managed IT Artificial Intelligence Computers Managed IT Services Virtualization Unsupported Software Information Technology App Miscellaneous Users Blockchain Two-factor Authentication Cloud Computing Information Telephone Systems Sports Safety User Error Facebook Touchscreen Data Storage Google Assistant Quick Tips WiFi Cortana Risk Management Hosted Solution Password Mobile Device Automation Avoiding Downtime Mobility Word Audit Data Protection Wi-Fi Patch Management Wireless Charging Google Docs Project Management Hacking Business Technology Communication Gmail Update Devices Politics Save Money Shortcut Government Data Breach Cost Management BDR Augmented Reality WannaCry Robot Travel Budget Commerce Excel Wireless Technology Data Management Access Control The Internet of Things Social Media Fraud Managed Service Application VPN iPhone Proactive IT Evernote Productivity Bring Your Own Device SaaS Encryption Mobile Security IT solutions History FAQ PowerPoint Admin Data storage Edge Access Vendor Retail Websites Hyperlink Remote Computing NFL Health eWaste Chromecast Identity iOS WIndows Server 2008 Hybrid Cloud Machine Learning Hacker Identities Telephony Windows 10s HBO Charger Wireless Wireless Internet Saving Time Emergency Data Loss Settings Ciminal Internet Exlporer Employee-Employer Relationship Screen Mirroring Point of Sale Conferencing Data Theft Value Wasting Time Computer Care Nanotechnology Search Device Security Data Privacy Windows 7 Transportation Adobe Workers Amazon Unified Threat Management Laptop Legislation Language Uninterrupted Power Supply Solid State Drive Private Cloud Identity Theft Gamification Keyboard Shortcuts Meetings Emails Cast Gifts Computing Accessory Root Cause Analysis Windows Ink Software as a Service Hard Drive Display Computer Fan Going Green Licensing Social Updates Virtual Assistant Upgrades Touchpad Comparison Hard Disk Drive IT Management Outlook Vendor Management Files Memory Human Resources Microsoft Excel IT budget DDoS Testing Marketing BYOD Scam Credit Cards App store Disaster Computer Forensics Peripheral Google Maps Spyware Recovery Bandwidth Specifications Virus Chromebook Co-Managed Services Microsoft Word Alexa for Business Humor IT Solutions Samsung Financial Payroll File Sharing Camera Webinar Personal Information Management Apple Administrator Sales Proactive Lithium-ion battery Printing Telephone Legal Tablets Maintenance Streaming Media Consultant Projects Antivirus Sync Reputation Security Cameras Remote Monitoring Storage Social Engineering Computer Accessories Mobile Computing Television CrashOverride Battery Smart Technology Company Culture Flexibility Music Compliance Printers Instant Messaging Text Messaging Congratulations Scalability Analytics Regulation Entertainment Downtime Keyboard Office tips Black Market Cleaning Advertising Automobile Office Twitter Big Data Managing Stress USB Worker HaaS How To Books End of Support Hiring/Firing Video Games Experience Relocation Education Work/Life Balance es Cache Virtual Reality Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Benefits Training Monitors Phone System Save Time PDF Thank You