ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The CLOUD Act Explained

The CLOUD Act Explained

Another eleventh-hour spending bill passed through the U.S. Congress and was signed into law on March 23, 2018. This time, however, there was a certain earmark that may work to erode individual privacy protection around the globe. The new law, called the Clarifying Lawful Overseas Use of Data (or CLOUD) Act, amends the Stored Communications Act of 1986 and gives unelected American officials extensive powers over global digital privacy rights.

The law allows U.S. officials, and those nations that the U.S. deems worthy, to extend their reach when they are looking to obtain digital information that isn’t hosted in the United States. With overwhelming support of both the U.S. Department of Justice and major technology companies, Congress didn’t waiver and pushed it through with the spending omnibus only a day after it was given to legislators.

What Does This Mean?
For the individual, this law is seemingly a major loss. Now governments from all around the world have fewer impediments when conducting criminal and civil investigations. The new law allows them access to see an individual’s personal information or their interpersonal communications with others. Traditionally, when foreign governments requested content information from U.S.-based technology companies, it wasn’t always a formality that the American companies would comply. Since the U.S. deals with many nations, if information is requested by a foreign government, they would typically decide whether the nation that is requesting the data had a prior record of human rights abuses, and then decided whether they will put pressure on the company to comply with said government. In fact, the U.S. is a member of the Mutual Legal Assistance Treaty (MLAT), and largely dealt with them exclusively to avoid giving information that could put human lives at risk.

With the passage of the CLOUD Act, the executive branch of the U.S. Government, led by President Donald Trump and Attorney General Jeff Sessions, will be able to determine who to share this information with, and who to deny it to. In essence it undoes the protections that were in place to ensure that data wouldn’t be used as a bargaining chip by the executive branch. By removing the protection of legislative and judicial oversight, a lot of power has been placed in the hands of appointees in high-profile executive cabinet positions, even though none of these positions were directly elected.

Now, U.S. and foreign law enforcement will have powerful new mechanics at their disposal. They can seize data for any purpose. This puts everyone’s private messages, email, social media activity--some of the most personal moments of a person’s life--on the table, without the process of getting a warrant. Previously, warrants were required, but with the passage of this law, prosecutors are given all the teeth they need to subpoena the records they need.

Here is a short recap of the CLOUD Act. It will:

  • Enable foreign police to collect and wiretap people’s interpersonal communications without obtaining a warrant to do so.
  • Allows foreign nations to demand records saved and stored by American companies
  • Allows the U.S. President to enter “executive agreements” designed to help foreign police agencies obtain data regardless of that regime’s human rights record.
  • Allows foreign police to obtain and collect data without notifying the party.
  • Gives U.S. police the right to grab data anyplace, no matter where it is stored.

One organization that has criticized the new law is the Electronic Frontier Foundation. In a public statement, they called it a “dangerous expansion of police snooping” and that it would “erode privacy protections around the globe.” They go on to state:

“Legislation to protect the privacy of technology users from government snooping has long been overdue in the United States, but the CLOUD Act does the opposite, and privileges law enforcement at the expense of the people’s privacy. EFF strongly opposes the bill.”

At ClearView IT, we think data privacy is important. Unfortunately, a large number of the elected officials in the U.S. Congress apparently aren’t inclined to agree. To ensure that your data stays private, instituting data protections such as encryption is important. What are your thoughts on the CLOUD Act? Could it be beneficial to the United States? Should individuals’ privacy concerns be addressed? Leave your thoughts in the comments section below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup Smartphone communications Small Business Upgrade Smartphones Microsoft Office Network Mobile Devices Data Recovery Communication Managed IT Services Productivity Quick Tips Social Media VoIP Users Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Passwords Holiday Disaster Recovery Covid-19 Managed Service Windows 10 IT Support Browser Apps Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Remote Work Data Management Internet of Things Saving Money Operating System Government Networking Windows Artificial Intelligence Managed IT services Gadgets Workplace Strategy Encryption Mobile Device Management Business Technology App Virtualization WiFi Blockchain Spam Server Information Remote Bandwidth Budget Gmail Office Apple Two-factor Authentication Information Technology Office 365 Employee/Employer Relationship History Health BDR Analytics Big Data Conferencing Access Control Data Security Cybercrime Wi-Fi Compliance Remote Monitoring Voice over Internet Protocol Remote Computing Help Desk Hacking Cost Management IT Management Training Document Management Hacker Save Money Patch Management Employer-Employee Relationship Vendor Augmented Reality Retail Word Alert Project Management BYOD Vulnerabilities IBM Website Computing Hiring/Firing Outlook Vendor Management Mobile Office Hard Drive Password Managed Services Data loss Legal Data storage Money Search... Customer Service Unified Threat Management Firewall Best Practice Applications iPhone Cleaning Maintenance Education Cortana Windows 11 Robot Content Filtering Monitoring User Healthcare Websites Router Remote Workers Meetings Mobility Windows 7 The Internet of Things Free Resource YouTube Twitter Google Maps Chrome Scam Law Enforcement How To Laptop End of Support Printer VPN Mobile Computing Update Marketing Running Cable Social Sports Travel DDoS Virtual Reality Data Breach SaaS Social Engineering Cryptocurrency Paperless Office Storage Antivirus Black Market Video Conferencing Physical Security Politics Virtual Machines Settings Computer Repair Lithium-ion battery Machine Learning Multi-factor Authentication Professional Services HIPAA Start Menu Computer Care Solid State Drive Downloads Processors Vulnerability Saving Time Chromebook Software as a Service Drones Managed Services Provider Bitcoin Data Protection Computers Virtual Private Network Automobile Telephone Current Events How To Wireless Technology Microchip eWaste Excel Solutions PowerPoint Flexibility Administration Integration Presentation Downtime Tech Terms Images 101 Safety Identity Theft Display Specifications Hack Notifications Managed IT IT Consultant Unified Communications Virtual Assistant Digital Virtual Desktop Customer Relationship Management Experience Employees Google Docs Taxes Avoiding Downtime Co-Managed IT Bluetooth Entertainment Distributed Denial of Service Office Tips Holidays Private Cloud Processor Memory Disaster Cooperation Flash Cache Addiction email scam Teamwork Navigation 2FA Telephone Systems Unified Threat Management Data Storage Business Growth Workers Mobile Security Hypervisor News Medical IT Recovery User Tip Shopping Competition Legislation Network Management CCTV SQL Server Troubleshooting Printing Evernote Paperless LiFi Banking Touchscreen PCI DSS Entrepreneur Google Wallet Licensing Computer Malfunction Fake News Supply Chain Documents Messenger Emergency Proxy Server Gig Economy Application Deep Learning Emails Humor Vendor Mangement Service Level Agreement Internet Service Provider Business Intelligence Computing Infrastructure Azure Business Communications Business Metrics Management Regulations Compliance Hosted Solution Samsung Device security Managed IT Service Webcam Microsoft Excel Workplace Securty Books Uninterrupted Power Supply Wireless Headphones Memes Domains Language Business Mangement Going Green Net Neutrality Society Business Cards Business Owner Tech Human Resources Error Financial Data Tablets Visible Light Communication Scams Reading Bookmark Risk Management Monitors IT Download Windows 8 Supercomputer Piracy Google Calendar Term Google Apps Virus Telework HTML Advertising Motion Sickness Microsoft 365 Cables Relocation Browsers Smartwatch Public Speaking Displays Nanotechnology Communitications Work/Life Balance Google Drive Upload Procurement Tech Support Software License Inbound Marketing Streaming Media Comparison Google Play Social Network FinTech Keyboard Point of Sale Knowledge Data Analysis CES Hard Drives Corporate Profile Screen Reader IT Assessment Telephony Trends Supply Chain Management intranet Employer Employee Relationship Mobile Technology Value In Internet of Things Television Security Cameras Wireless Hacks Customer Resource management Organization Shortcut Network Congestion Cabling Devices Cyber security Electronic Payment Shortcuts Environment G Suite Tip of the week Reliable Computing Fileless Malware Heating/Cooling Writing Tablet Smart Devices VoIP Gamification Remote Working Social Networking Tracking Company Culture Windows XP Mouse Phone System Telephone System AI Regulations Trend Micro Be Proactive Web Server Transportation Scalability Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Text Messaging Content Proactive IT Digital Payment Desktop Wasting Time Administrator SharePoint Bring Your Own Device Electronic Medical Records Worker Accountants eCommerce Modem Workplace Strategies Videos Access Database Surveillance Time Management Music Public Cloud Managing Costs Computer Accessories Staffing Health IT Equifax SSID Hard Drive Disposal Employer/Employee Relationships Audit Media IP Address Spyware Tactics Development Botnet Username File Sharing Virtual Machine Rental Service Redundancy Reviews Micrsooft Startup Optimization Freedom of Information Smart Technology

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?