MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How the CLOUD Act Will Affect Your Security

How the CLOUD Act Will Affect Your Security

On March 23rd, 2018, the United States Congress passed another spending bill that could potentially limit individual privacy protection all over the world. This bill included a provision called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, which makes changes to the Stored Communications Act of 1986 and provides unelected American officials a considerable amount of power over digital privacy rights.

The basic gist of this law is that U.S. officials and others involved with them could potentially obtain digital information that isn’t hosted on their home turf. This law garnered overwhelming support from both the U.S. Department of Justice and major technology companies, prompting Congress to push it through.

What Does This Mean?
At a glance, this law represents a significant loss for the individual. It’s now easier than ever before to conduct criminal and civil investigations. Part of this law also allows for access to personal information and communication as well. Prior to the passing of this law, foreign governments would have to go through the proper channels in order to access information from U.S.-based technology companies.

Naturally, these companies wouldn’t necessarily consent so easily. Due to the multitude of nations that the United States deals with on a regular basis, before submitting to a request for information from a foreign entity, there would be much thought put into factors such as records of human rights abuses and other pressures placed on the company to make the decision. As a member of the Mutual Legal Assistance Treaty, or MLAT, the United States is hesitant to provide any information that could place human lives at risk, but the CLOUD Act can potentially shake these responsibilities up.

In the wake of this new law, the executive branch of the United States government will be able to control who this information is shared with, as well as who it’s not shared with. At the helm of such decisions are U.S. President Donald Trump and Attorney General Jeff Sessions. Data can now effectively be used as bargaining chips by the executive branch. Consequently, there has been a lot of power placed in the hands of appointees that haven’t necessarily been directly elected to positions of authority.

The United States and other law enforcement agencies around the globe will have powerful new ways to seize data for any express purpose. Therefore, the average user’s private messages via email or social media can now be confiscated and looked upon without a search warrant. This puts the personal information of so many users right in the crosshairs of people who now have a legal right to view it.

Below is a short explanation for what changes the CLOUD Act will bring about:

  • Enable foreign police to collect and wiretap people’s interpersonal communications without obtaining a warrant to do so.
  • Allows foreign nations to demand records saved and stored by American companies.
  • Allows the U.S. President to enter “executive agreements” designed to help foreign police agencies obtain data regardless of that regime’s human rights record.
  • Allows foreign police to obtain and collect data without notifying the party.
  • Gives U.S. police the right to grab data anyplace, no matter where it is stored.

The Electronic Frontier Foundation has been a particular opponent of this new law. They issued a public statement that decreed it a “dangerous expansion of police snooping” and that it would “erode privacy protections around the globe.” They go on to state:

“Legislation to protect the privacy of technology users from government snooping has long been overdue in the United States, but the CLOUD Act does the opposite, and privileges law enforcement at the expense of the people’s privacy. EFF strongly opposes the bill.”

Clearly any act that limits the privacy of any technology is going to be to be controversial. Where does your business stand? Let us know in the comments below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Business Management Backup google Managed IT Services Computer Outsourced IT Microsoft Mobile Devices Disaster Recovery Business Continuity Business communications VoIP Windows 10 IT Support Hardware Cybersecurity Innovation Email User Tips Data Backup IT Services Cybercrime Efficiency Data Recovery Saving Money Mobile Device Management Windows Managed IT Mobility Small Business Apps Server Ransomware Tech Term Law Enforcement Internet of Things Operating System browser Data Productivity Smartphone Save Money Telephone Systems Android Virtualization Office 365 BDR Cloud Computing Smartphones Hosted Solution Phishing Passwords Quick Tips Data Security Money Information Technology Communication VPN Recovery Microsoft Office Password Holiday BYOD Automation Managed Service Provider Chrome Collaboration App IT Support Best Practice Social Media Risk Management Unsupported Software Budget Facebook Data Management Government Vulnerability Network Work/Life Balance Cost Management Update Wi-Fi Gadgets Application Data Breach Google Drive Hacking Avoiding Downtime Alert Health Miscellaneous Computers Social upgrade Two-factor Authentication Wireless search Cleaning USB Save Time Proactive IT The Internet of Things Identity Theft User Error Employer-Employee Relationship Artificial Intelligence Flexibility Spam Shortcut Gmail Tech Support Managed IT Services Firewall Wireless Technology Workplace Tips Antivirus Current Events Audit Telephony Compliance Personal Information Social Engineering Streaming Media Politics Office tips Applications Private Cloud History Remote Computing Data Protection Going Green Bandwidth Office Phone System Redundancy Computer Care eWaste Commerce Project Management Legal Users Humor Encryption Disaster Cortana Patch Management Windows 10 Big Data Sports Wireless Charging Excel Education Router Data Storage Vendor Management Hacker Management Solid State Drive Blockchain Internet Exlporer SaaS IT solutions OneNote Samsung Content Filtering DDoS Mobile Security Battery Devices HaaS iPhone Data Loss Television Mobile Computing Transportation Marketing Google Assistant Google Docs Apple Automobile Robot Fraud Value WiFi Saving Time End of Support Laptop Virus Uninterrupted Power Supply Professional Services File Sharing Chromebook remote Wireless Internet Ciminal Video Games IT Management Windows 10s Nanotechnology Yahoo Touchpad Proactive Virtual Reality Travel Storage Scam Reputation Smart Tech Server 2008 Gamification Music Credit Cards WIndows Server 2008 Running Cable Hard Disk Drive Advertising Root Cause Analysis Ali Rowghani Websites Tablets Trending Employer Employee Relationship Connectivity Memory Analytics Data storage MSP FAQ Augmented Reality Keyboard Data Theft Instant Messaging NFL Lifestyle Business Intelligence Computer Accessories Touchscreen Administration Content Filter Worker Commute Chromecast server installation dvd "cannot install required files" Students intranet Charger Outlook Mobile Device stock Computing Managing Stress Word Legislation Managed IT Service Colocation Monitoring Hard Drives Unified Communications Books IT budget Scalability iOS tweet Hiring/Firing Analysis Files Windows Ink Administrator Maintenance Comparison Lithium-ion battery calculator Financial How To Evernote Regulation Computer Fan Google Maps Twitter Benefits App store Access Device Security Specifications Screen Mirroring Relocation control Financial Technology Unified Threat Management Dark Web Identities Networking Sync Software as a Service Meetings WSJ Entertainment Sales Cast Training Emails Exchange Printing Upgrades PDF altivista Electronic Medical Records IoT Workers Adobe Distributed Denial of Service Settings Identity Point of Sale HIPAA Spyware Retail Company Culture SBS Consultant WannaCry Text Messaging compaq Safety Language Black Market Updates Licensing Smart Technology Data Privacy Computer Forensics Avoid Downtime Conferencing HBO Wearable Technology Webinar hp Shadow IT Microsoft Word Mobile Microsoft Excel Remote Monitoring Hard Drive Document Management domain PowerPoint Experience Edge Gifts IT solutions Worker Thank You CrashOverride Congratulations Cache Monitors Emergency

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...