094 90 48200     Get SUPPORT

Aniar IT Services Blog

United States Citizens Demand Data Privacy… How Will It Impact Your Business?

United States Citizens Demand Data Privacy… How Will It Impact Your Business?

With over 90 percent of people in the United States feeling as though their data is out of their hands, it should come as little surprise that many are looking towards the European Union’s General Data Protection Regulation as inspiration. However, how close is the United States to passing this kind of legislation… and how will smaller businesses fare if (or when) some is passed?

The GDPR (In a Nutshell)

Under the GDPR - which came into effect on May 25, 2018 - any companies that have collected data on a resident of the European Union are then responsible for protecting that data. Furthermore, the GDPR grants these residents a far higher level of access and control over the data that organizations possess.

How United States Citizens Have Reacted

According to a poll, data privacy has become a bigger priority for 73 percent of respondents, 64 percent stating that they felt the security of their data was worse than it has been in the past. 80 percent want the ability to learn who has purchased their data, while 83 percent want the ability to veto an organization’s ability to sell their data in the first place. 64 percent also stated that they want the ability to have this data deleted.

How the Government Has Reacted

Governing bodies at different levels have had different reactions to these demands. For instance, the state of California has already passed the Consumer Privacy Act (CCPA) - a piece of legislation that the House of Representatives' Consumer Protection and Commerce Subcommittee isn’t too fond of, as its position is that there needs to be a singular piece of legislation at the federal level to protect data. As of right now, data privacy is addressed in a combination of state laws and some proposed federal laws.

One of these proposed laws, the Data Care Act, spells out that (in addition to promptly alerting end users to security breaches) a service provider cannot legally share a user’s data without the receiving party also being beholden to the same confidentiality standards. Others include the Information Transparency and Personal Data Control Act, which requires transparency and personal control over data, the Consumer Data Protection Act, which could throw executives in prison for abusing data, and the American Data Dissemination Act, which sets a deadline for the government to enact privacy requirements upon businesses.

However, when the Consumer Protection and Commerce subcommittee met to discuss the prospect of a federal privacy law (which it was agreed was necessary), there weren’t any representatives for the average consumer - the ones whose data is really at stake. This reflects the hearings held last year by the Senate, also without consumer representation. Instead, technology companies were invited to participate during both sessions.

Small Business Concerns

That being said, there is very little support among the committee for any regulations that are at all similar to the GDPR. One reason for this: the fear that small businesses will not find themselves able to afford the added cost of compliance.

For instance, there are a variety of potential burdens that such a measure could potentially impose upon small and medium-sized businesses. These burdens include:

  • All-encompassing overhauls that would result in lost business
  • Business failure due to inadequate budgets to make the demanded changes
  • Impeded growth after regulations are put in place
  • Prerequisites becoming too great to start a business in the first place
  • Costs passed down to SMBs from larger companies for technology services

It is worth noting that if your organization does business with people from the EU, you are responsible to adopt the privacy rules of the GDPR.

What do you think? Are laws like these necessary, especially given the cost they could put on small businesses? Have you had any data privacy concerns in the past? Share your thoughts in the comments.

How to Use YouTube’s Full Capabilities for Your Bu...
ISPs Have Finally Started Rolling Out 5G


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, July 16 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy User Tips Productivity Email Google Cloud Workplace Tips Hackers Tech Term Internet Microsoft Hosted Solutions Data Innovation Network Security Data Backup Hardware Communication Cloud Computing Data Recovery Business Mobile Devices Efficiency IT Support Android Windows 10 Smartphones Malware VoIP Smartphone Communications Small Business Gadgets IT Services Managed IT Services Mobile Device Network Software Business Management Browser Users Backup Internet of Things Artificial Intelligence Collaboration Information Router Spam Chrome How To Cybersecurity Server Windows Office 365 Word Phishing Cybercrime Miscellaneous Saving Money Computers Applications BDR Outsourced IT Computer Business Continuity Operating System Data Protection BYOD Holiday Facebook Ransomware Upgrade Remote Monitoring Connectivity Social Media Settings Managed Service Data Security Paperless Office Money Mobile Device Management Encryption Two-factor Authentication Passwords Staff Windows 7 Vulnerability Redundancy Voice over Internet Protocol Automation Software as a Service IT Management Training App Telephone Systems Microsoft Office Social Engineering Meetings Avoiding Downtime Google Drive Identity Theft Website Comparison Virtual Assistant Private Cloud IT Plan OneNote Google Docs Access Control Law Enforcement Sports Virtualization Save Money Telephony CES Unsupported Software Education Managed IT Fraud Data Storage Scam Infrastructure Business Intelligence Human Resources Telephone System Update Wi-Fi Content Management Keyboard Augmented Reality Botnet VPN Spam Blocking Password Machine Learning Disaster Recovery Bring Your Own Device Managed IT services Blockchain Cryptocurrency Display Government Apps The Internet of Things Biometric Security Legal Travel Remote Work Hacker Amazon Web Services Accountants Cryptomining Password Manager Nanotechnology YouTube Mouse Tools Work/Life Balance Windows Server 2008 R2 Google Search Patch Management Solid State Drive Smart Office Quick Tips Start Menu IT Infrastructure HIPAA USB Safe Mode Security Cameras Frequently Asked Questions Recovery Wireless Charging Inventory Sync Multi-Factor Security Big Data Manufacturing Criminal Downtime Networking Shortcuts Windows 10s Remote Worker Database Business Mangement Smart Tech Microchip Millennials Digital Signature Screen Mirroring Save Time WiFi Audit Physical Security Document Management Camera Investment Electronic Medical Records Wire Employer-Employee Relationship Smartwatch Excel Google Apps Business Technology Virtual Reality Addiction Root Cause Analysis Enterprise Content Management Mobility Online Shopping Wiring Gmail Search Engine Value Workforce Credit Cards PDF Cast Proactive IT Flash Specifications ROI Data Management Health Tip of the week Wireless Workers Firewall Trending Cabling Password Management Social Evernote Cleaning Public Cloud Recycling Devices Servers Bing MSP Net Neutrality HaaS Authentication Computer Fan Entertainment Warranty GDPR Data loss Employee Windows Server 2008 Unified Threat Management Cables Cache NIST Vendor HBO Practices Software Tips OLED eWaste Thought Leadership HVAC Help Desk Telecommuting Amazon File Sharing ISP Bandwidth FENG Printer Remote Computing Cortana Alert Digital Signage Computer Care 5G Mobile Computing Skype Default App Wireless Internet Outlook Charger Hosted Computing Productivity Managed Service Provider Marketing Budget Regulation Customer Relationship Management Hiring/Firing Competition Twitter IP Address Fun Company Culture Processor Customer Service Mobile Office Domains Managing Stress Printers Windows 10 Hard Drives Public Speaking Search Presentation Lithium-ion battery CrashOverride Emergency Tech Support Compliance Wireless Technology IBM Safety