ROI Integrated Office Technologies Blog

United States Citizens Demand Data Privacy… How Will It Impact Your Business?

United States Citizens Demand Data Privacy… How Will It Impact Your Business?

With over 90 percent of people in the United States feeling as though their data is out of their hands, it should come as little surprise that many are looking towards the European Union’s General Data Protection Regulation as inspiration. However, how close is the United States to passing this kind of legislation… and how will smaller businesses fare if (or when) some is passed?

The GDPR (In a Nutshell)

Under the GDPR - which came into effect on May 25, 2018 - any companies that have collected data on a resident of the European Union are then responsible for protecting that data. Furthermore, the GDPR grants these residents a far higher level of access and control over the data that organizations possess.

How United States Citizens Have Reacted

According to a poll, data privacy has become a bigger priority for 73 percent of respondents, 64 percent stating that they felt the security of their data was worse than it has been in the past. 80 percent want the ability to learn who has purchased their data, while 83 percent want the ability to veto an organization’s ability to sell their data in the first place. 64 percent also stated that they want the ability to have this data deleted.

How the Government Has Reacted

Governing bodies at different levels have had different reactions to these demands. For instance, the state of California has already passed the Consumer Privacy Act (CCPA) - a piece of legislation that the House of Representatives' Consumer Protection and Commerce Subcommittee isn’t too fond of, as its position is that there needs to be a singular piece of legislation at the federal level to protect data. As of right now, data privacy is addressed in a combination of state laws and some proposed federal laws.

One of these proposed laws, the Data Care Act, spells out that (in addition to promptly alerting end users to security breaches) a service provider cannot legally share a user’s data without the receiving party also being beholden to the same confidentiality standards. Others include the Information Transparency and Personal Data Control Act, which requires transparency and personal control over data, the Consumer Data Protection Act, which could throw executives in prison for abusing data, and the American Data Dissemination Act, which sets a deadline for the government to enact privacy requirements upon businesses.

However, when the Consumer Protection and Commerce subcommittee met to discuss the prospect of a federal privacy law (which it was agreed was necessary), there weren’t any representatives for the average consumer - the ones whose data is really at stake. This reflects the hearings held last year by the Senate, also without consumer representation. Instead, technology companies were invited to participate during both sessions.

Small Business Concerns

That being said, there is very little support among the committee for any regulations that are at all similar to the GDPR. One reason for this: the fear that small businesses will not find themselves able to afford the added cost of compliance.

For instance, there are a variety of potential burdens that such a measure could potentially impose upon small and medium-sized businesses. These burdens include:

  • All-encompassing overhauls that would result in lost business
  • Business failure due to inadequate budgets to make the demanded changes
  • Impeded growth after regulations are put in place
  • Prerequisites becoming too great to start a business in the first place
  • Costs passed down to SMBs from larger companies for technology services

It is worth noting that if your organization does business with people from the EU, you are responsible to adopt the privacy rules of the GDPR.

What do you think? Are laws like these necessary, especially given the cost they could put on small businesses? Have you had any data privacy concerns in the past? Share your thoughts in the comments.

How to Use YouTube’s Full Capabilities for Your Bu...
ISPs Have Finally Started Rolling Out 5G


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, April 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Hosted Solutions Google Productivity Network Security User Tips Microsoft Data Software Hackers Innovation Internet Malware Backup Hardware Tech Term Smartphones Mobile Devices Email Communications Business IT Services Workplace Tips Browser Business Management Android Smartphone Data Backup Business Continuity Cloud Computing Efficiency Windows 10 VoIP Computer Computers Disaster Recovery Alert Outsourced IT Data Recovery Communication Network Chrome Router Managed IT Services Artificial Intelligence Ransomware Managed IT Services Windows 10 Cybercrime Windows Miscellaneous Law Enforcement Office Social Media IT Support Small Business Internet of Things Collaboration Cybersecurity How To Facebook Gadgets Mobile Device Office 365 Health Virtualization Server Quick Tips Wi-Fi Holiday Passwords Applications Money Password BDR Automation Phishing Saving Money Upgrade Spam Mobile Device Management Word Google Drive App Information Social Engineering Save Money BYOD Private Cloud Telephone Systems Productivity Microsoft Office Data Protection Mobility Data Breach Scam HaaS Bring Your Own Device Operating System Hacking Voice over Internet Protocol Office Tips Training Encryption Two-factor Authentication Connectivity Vulnerability Paperless Office Settings Data Security Flexibility SMB's Apps Work/Life Balance Managed Service Marketing Charger Botnet Save Time Virtual Assistant Comparison Employer-Employee Relationship Public Cloud Windows 7 Patch Management Government Content Management Unsupported Software Cleaning Spam Blocking Sports Big Data Telephone System Remote Monitoring Users Worker Mobile Computing Battery Website Google Docs Blockchain Identity Theft Computer Care Avoiding Downtime End of Support Infrastructure Education Bandwidth Business Intelligence Redundancy Wireless Entertainment Remote Computing Samsung Automobile Data Storage Electronic Medical Records Networking Meetings Cryptocurrency History PDF Keyboard Servers Display Human Resources IT Support Fraud Value Data Management IT Management Legal USB Managed IT Augmented Reality VPN Managed Service Provider Telephony Firewall OneNote Staff Hiring/Firing Machine Learning Software as a Service Update CES IT Plan Access Control Best Practice Troubleshooting Hacker Wire Administrator Monitor Gmail Virtual Reality Google Search The Internet of Things Data loss Accountants User Error HBO Telecommuting Budget Thought Leadership Camera Skype Google Apps Black Market Smart Technology Enterprise Content Management Risk Management Amazon Web Services SaaS Audit YouTube Shortcuts Techology WiFi Content Biometric Security Authentication MSP Remote Work Books Microchip Travel Recycling Worker Commute Net Neutrality Current Events Screen Mirroring Internet Exlporer Outlook Netflix Start Menu Workers Two Factor Authentication Security Cameras Downtime Password Management Specifications Politics Hybrid Cloud Flash Online Shopping Instant Messaging Computer Fan Social Audiobook OLED webinar Software Tips Nanotechnology File Sharing Frequently Asked Questions Video Games Smart Office Search Engine Data storage eWaste Employer Employee Relationship ISP Knowledge Cast Practices Rootkit Addiction Warranty Proactive IT Tools Smartwatch Root Cause Analysis Digital Signature NIST Files Music Evernote Transportation Assessment FENG Vendor HIPAA Conferencing Physical Security Smart Tech Remote Worker Internet exploMicrosoft Excel Credit Cards Windows 10s Document Management Bing Criminal Computer Accessories Cryptomining Network Congestion Hosted Computing Cache Printer Password Manager Computing Infrastructure Employee Millennials Wearable Technology Wiring Cortana Sync Benefits Television Apple Multi-Factor Security Emails Advertising Tip of the week Scalability Emergency Help Desk Recovery Bluetooth Database IT Consultant Inventory Vendor Management Wireless Internet Mouse Business Mangement Digital Signage Supercomputer Safe Mode Workforce Devices Unified Threat Management Information Technology Wireless Charging 5G Public Computer HVAC iPhone Trending Windows Server 2008 Amazon Safety Loyalty Solid State Drive Business Technology IBM Leadership IT solutions CrashOverride Fun Competition Customer Relationship Management IP Address Twitter Printers Company Culture Customer Service Mobile Office Compliance Hard Drives Domains Search Managing Stress Manufacturing Regulation Public Speaking Presentation Lithium-ion battery How to Wireless Technology Tech Support Webinar