Infracore LLC Blog

United States Citizens Demand Data Privacy… How Will It Impact Your Business?

United States Citizens Demand Data Privacy… How Will It Impact Your Business?

With over 90 percent of people in the United States feeling as though their data is out of their hands, it should come as little surprise that many are looking towards the European Union’s General Data Protection Regulation as inspiration. However, how close is the United States to passing this kind of legislation… and how will smaller businesses fare if (or when) some is passed?

The GDPR (In a Nutshell)

Under the GDPR - which came into effect on May 25, 2018 - any companies that have collected data on a resident of the European Union are then responsible for protecting that data. Furthermore, the GDPR grants these residents a far higher level of access and control over the data that organizations possess.

How United States Citizens Have Reacted

According to a poll, data privacy has become a bigger priority for 73 percent of respondents, 64 percent stating that they felt the security of their data was worse than it has been in the past. 80 percent want the ability to learn who has purchased their data, while 83 percent want the ability to veto an organization’s ability to sell their data in the first place. 64 percent also stated that they want the ability to have this data deleted.

How the Government Has Reacted

Governing bodies at different levels have had different reactions to these demands. For instance, the state of California has already passed the Consumer Privacy Act (CCPA) - a piece of legislation that the House of Representatives' Consumer Protection and Commerce Subcommittee isn’t too fond of, as its position is that there needs to be a singular piece of legislation at the federal level to protect data. As of right now, data privacy is addressed in a combination of state laws and some proposed federal laws.

One of these proposed laws, the Data Care Act, spells out that (in addition to promptly alerting end users to security breaches) a service provider cannot legally share a user’s data without the receiving party also being beholden to the same confidentiality standards. Others include the Information Transparency and Personal Data Control Act, which requires transparency and personal control over data, the Consumer Data Protection Act, which could throw executives in prison for abusing data, and the American Data Dissemination Act, which sets a deadline for the government to enact privacy requirements upon businesses.

However, when the Consumer Protection and Commerce subcommittee met to discuss the prospect of a federal privacy law (which it was agreed was necessary), there weren’t any representatives for the average consumer - the ones whose data is really at stake. This reflects the hearings held last year by the Senate, also without consumer representation. Instead, technology companies were invited to participate during both sessions.

Small Business Concerns

That being said, there is very little support among the committee for any regulations that are at all similar to the GDPR. One reason for this: the fear that small businesses will not find themselves able to afford the added cost of compliance.

For instance, there are a variety of potential burdens that such a measure could potentially impose upon small and medium-sized businesses. These burdens include:

  • All-encompassing overhauls that would result in lost business
  • Business failure due to inadequate budgets to make the demanded changes
  • Impeded growth after regulations are put in place
  • Prerequisites becoming too great to start a business in the first place
  • Costs passed down to SMBs from larger companies for technology services

It is worth noting that if your organization does business with people from the EU, you are responsible to adopt the privacy rules of the GDPR.

What do you think? Are laws like these necessary, especially given the cost they could put on small businesses? Have you had any data privacy concerns in the past? Share your thoughts in the comments.

How to Use YouTube’s Full Capabilities for Your Bu...
ISPs Have Finally Started Rolling Out 5G
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 26 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Network Security Productivity Hosted Solutions Microsoft Internet Malware Software User Tips Data Innovation Hackers Hardware Smartphones Business Email Tech Term Mobile Devices Backup Communications Efficiency Workplace Tips Business Continuity Browser Business Management Android IT Services Smartphone Windows 10 VoIP Data Backup Small Business Computer Cloud Computing Data Recovery Communication Outsourced IT Managed IT Services Alert Disaster Recovery Network Chrome Miscellaneous Artificial Intelligence Router Managed IT Services Office Ransomware Windows 10 Computers Mobile Device Collaboration Cybersecurity IT Support Internet of Things Social Media Cybercrime Gadgets Windows Law Enforcement Quick Tips Server Productivity Money Passwords Health Office 365 How To Password Applications Facebook Virtualization Telephone Systems Holiday Google Drive Phishing Work/Life Balance Automation Word Saving Money Upgrade App Spam Wi-Fi Private Cloud Information Social Engineering Managed Service Apps Keyboard Operating System Data Security HaaS Office Tips BDR Scam Data Breach IT Support Vulnerability Data Protection Microsoft Office Voice over Internet Protocol Settings Hacking Training Two-factor Authentication Mobility Mobile Device Management Bring Your Own Device Encryption Paperless Office Save Money Connectivity IT Plan VPN Machine Learning Save Time Employer-Employee Relationship Virtual Assistant Charger Marketing Human Resources Fraud Access Control Display Google Docs Patch Management Unsupported Software Battery End of Support Remote Monitoring Telephone System Cleaning History Comparison Staff Sports Managed IT Worker Website CES Remote Computing Big Data Education Telephony Software as a Service Computer Care Windows 7 Botnet Content Management Flexibility PDF BYOD Augmented Reality Data Storage Samsung Business Intelligence Electronic Medical Records Legal Meetings Cryptocurrency Wireless Blockchain Bandwidth Automobile Managed Service Provider Entertainment Servers Update Government Identity Theft OneNote Infrastructure IT Management USB Value Redundancy Avoiding Downtime Spam Blocking Firewall Networking Data Management Users Public Cloud Content Password Manager Troubleshooting Loyalty Cryptomining Humor Internet Exlporer Workforce Computer Fan Sync Bing Wireless Charging Data loss Devices Digital Signage Search Files Trending Tip of the week Wire Smart Technology Printer Current Events Downtime Enterprise Content Management Instant Messaging Data storage Unified Threat Management Virtual Reality Hybrid Cloud Video Games Audiobook webinar Business Mangement MSP SaaS Database The Internet of Things Accountants YouTube Help Desk Cortana Screen Mirroring Thought Leadership Experience Google Search How to Windows 10s Windows Server 2008 Two Factor Authentication Mouse Knowledge Amazon Root Cause Analysis Authentication Risk Management Password Management Security Cameras HBO Mobile Computing Worker Commute Apple Conferencing Gmail Software Tips File Sharing Business Technology Internet exploMicrosoft Telecommuting FENG Hiring/Firing Google Apps Cast Music Proactive IT Black Market Specifications Smart Office Administrator Network Congestion Amazon Web Services Nanotechnology Politics NIST Rootkit Hacker Outlook Transportation Camera Safety iPhone Employer Employee Relationship Shortcuts Scalability Recovery Emails Recycling Books Assessment Biometric Security Computing Infrastructure Advertising Remote Work Practices Skype Workers Addiction Wearable Technology Net Neutrality Relocation User Error Solid State Drive Digital Signature Flash Document Management Microchip IT Consultant Online Shopping Smart Tech Travel Smartwatch Frequently Asked Questions Benefits Hosted Computing Start Menu Computer Accessories Social Monitor eWaste Remote Worker Television 5G Cache ISP Millennials Audit Search Engine Leadership Best Practice Evernote Safe Mode Vendor Management Employee Multi-Factor Security HIPAA Excel Wireless Internet Warranty Credit Cards Inventory Tools HVAC Bluetooth Vendor Information Technology WiFi IT solutions Criminal Physical Security Emergency Wiring Public Computer OLED Techology Manufacturing Company Culture Thank You Twitter Compliance Managing Stress Congratulations Regulation Printers Webinar CrashOverride

Recent Comments

NoahAnton Cryptomining is Inspiring Cybercrime
25 April 2019
The growth stock is actually the Cryptomining which increases in capital value instead of yield in h...
Sara George Tip of the Week: Locating a Misplaced Smartphone
16 April 2019
If you’re smart phone will be missed then with the software of the tracking location has to find the...
Jenna Ray What Star Wars can Teach About Mentorship
15 April 2019
There are lots of things in this world from we can learn positivity and people of this era are to ad...
Henry Lasseter What Volkswagen is Doing to Prevent Hackers From Controlling Your Car
09 April 2019
Volkswagen was doing to prevent hackers for from controlling your car it was done by the hackers. I ...
Hunter Gill Essential Cybersecurity Tips From The FBI
09 April 2019
FBI is the federal agency of the investigation the firm which investigates the cases of severe term ...