Right to Sue: Under the law, Vermont residents can directly sue companies that collect or share their sensitive data without their consent. This provision is a departure from the usual regulatory approach, which relies on government agencies to enforce privacy rules.
Sensitive Data Definition: The law defines sensitive data broadly, encompassing not only personally identifiable information (PII) but also health-related data, biometric information, and geolocation data.
Transparency Requirements: Companies must be transparent about their data practices. They are required to disclose what data they collect, how it is used, and whether it is shared with third parties.
Opt-In Consent: Companies must obtain explicit consent from users before collecting or sharing their sensitive data. This opt-in approach puts control back in the hands of consumers.
The Vermont scenario is a rare but dramatic exception to a growing national trend: with little action from Congress, the responsibility of regulating technology has shifted to the states. This sets state lawmakers, who frequently have limited staff and part-time occupations, against big national lobbies with corporate and political influence.
It's unclear whether Vermont's new strategy will work: Republican Gov. Phil Scott has yet to sign the bill, and lawmakers and industry are still arguing about it.
However, national consumer advocacy groups are already turning to Vermont as a possible model for lawmakers hoping to impose severe state tech restrictions throughout the country – a struggle that states have mostly lost up to this point.
Vermont’s data privacy law has galvanized state lawmakers across the country. Here’s why:
Grassroots Playbook: Lawmakers collaborated with counterparts from other states to create a “grassroots playbook.” This playbook outlines strategies for passing similar legislation elsewhere. By sharing insights and tactics, they hope to create a united front against tech industry lobbying.
Pushback Against Industry Pressure: Tech lobbyists have historically opposed stringent privacy regulations. Vermont’s law represents a bold move, and lawmakers anticipate pushback from industry giants. However, the alliance aims to stand firm and protect consumers’ rights.
Potential Model for Other States: If Vermont successfully implements its data privacy law, other states may follow suit. The alliance hopes to create a domino effect, encouraging more states to prioritize consumer privacy.
The fight for privacy legislation has been fought in states since 2018 when California became the first to implement a comprehensive data privacy law.
In March 2024, Vermont's House of Representatives began debating a state privacy law that would allow residents the right to sue firms for privacy infractions and limit the amount of data that businesses may collect on their customers. Local businesses and national groups warned that the plan would destroy the industry, but the House passed it overwhelmingly.
The bill was then sent to the state Senate, where it was met with further support from local businesses.
The CFO of Vermont outdoor outfitter Orvis wrote to state legislators saying limiting data collecting would "put Vermont businesses at a significant if not crippling disadvantage."
A spokesman for Orvis stated that the corporation did not collaborate with tech sector groups opposing Vermont's privacy measure.
On April 12, the Vermont Chamber of Commerce informed its members that it had met with state senators and that they had "improved the bill to ensure strong consumer protections that do not put an undue burden on Vermont businesses."
Priestley expressed concern about the pressure in an interview. It reminded her of L.L. Bean's significant resistance to Maine's privacy legislation. She discovered similar industry attacks against state privacy rules in Maryland, Montana, Oklahoma, and Kentucky. She invited politicians from all five states to discuss their experiences to demonstrate this trend to her colleagues.
Predictably, tech companies and industry associations have expressed concerns. They argue that a patchwork of state laws could hinder innovation and create compliance challenges. Some argue for a federal approach to data privacy, emphasizing consistency across all states.
Without proper protection, our personal and sensitive information can be easily accessed by hackers. To ensure your Wi-Fi security, here are some tips to follow.
The default login credentials of your Wi-Fi router are often easy to guess and readily available online. Therefore, it is essential to change them to something unique and complex. Using a strong and complex password that includes a mix of uppercase and lowercase letters, numbers, and symbols can make it difficult for hackers to crack. Make sure to avoid using personal information such as your name, birth date, or address in your password.
Encryption is a way of encoding information to prevent unauthorized access. Wi-Fi routers come with several encryption options such as WPA, WPA2, and WEP. WPA2 is the most secure encryption option available, and you should make sure to enable it. WEP encryption is outdated and can be easily hacked, so it's best to avoid it.
Router firmware updates are essential for fixing any security vulnerabilities and bugs that may be present in the current version. To ensure your Wi-Fi security, it's important to regularly check for firmware updates and install them as soon as they are available. Most routers have a built-in option to check for updates, and you can also visit the manufacturer's website to download the latest firmware.
Remote management allows you to access your router's settings from outside your home network. However, this feature can also be exploited by hackers to gain access to your network. Therefore, it's recommended to disable remote management unless you need it. If you do need to use remote management, make sure to enable it only when necessary and use a strong password.
Every device that connects to your Wi-Fi network has a unique MAC address. You can use MAC address filtering to allow or block devices from connecting to your network. Enabling MAC address filtering can help prevent unauthorized devices from accessing your network. However, it's important to note that MAC addresses can be spoofed, so this method should not be relied upon solely for security.
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Most routers come with a built-in firewall that you can enable to add an extra layer of protection to your network. Make sure to configure the firewall settings to suit your security needs.
SSID is the name of your Wi-Fi network. By default, your router broadcasts the SSID, making it visible to anyone within range. Disabling SSID broadcasts can make your network invisible to others, which can help prevent unauthorized access. However, it's important to note that this method is not foolproof as hackers can still discover your network through other means.
In conclusion, Wi-Fi security is essential to protect your personal and sensitive information from cyber threats. By following these tips, you can ensure that your Wi-Fi network is secure and protect yourself from potential cyber-attacks. Remember to keep your router firmware up to date, use strong login credentials, and enable encryption, firewall, and other security features.
It is becoming more and more difficult to find out whether you are being followed through a webcam. According to Arseny Shcheltsin, General Director of Digital Platforms, earlier it was used by a special indicator, which showed whether the camera is recording, but now it’s easy to bypass this device.
"The most characteristic signs of tracking are the “freezing” of the computer or phone only when there is an Internet connection, or immediately after switching on,” explained the specialist.
As Shcheltsin noted, the appearance of unknown programs on the device that significantly "slow down" its work should also be alerted. One of the most obvious confirmations that a person is being spied on through a webcam is its spontaneous activation, but today, as the expert clarified, the burning icon near the device's camera may not light up, while it will record what is happening around.
The expert noted that it is worth paying attention to where the potential use of the camera can harm its owner. For example, it is better not to use the phone where the person is not fully dressed — in the locker room, bathroom, etc.
It is also important to keep your computer's antivirus software up-to-date. They should be updated as a new version is released.
Previously, Mr. Shcheltsin reported that intelligence services of various countries are using backdoors to spy on people around the world through Smart TVs.All users from Israel are now connected to WhatsApp through the Facebook servers. 🇮🇱— WABetaInfo (@WABetaInfo) April 2, 2018
The fact that WhatsApp is starting to use the Facebook servers must NOT worry you.— WABetaInfo (@WABetaInfo) April 2, 2018
This just ensures a better quality of the connection.
All chats and calls are end-to-end encrypted, so WhatsApp/Facebook/anyone cannot read/listen them.
Everything is encrypted, also Stickers.
And it means that #facebook gets the metadata of the chats/calls in realtime.— Karine Nahon (@karineb) April 3, 2018
Encryption is not a problem. Its just that metadata like last seen, online time, etc. which are dynamic and are not needed after a particular time, must be wiped from servers.— ã…¤ (@pcx33) April 2, 2018
Like, 'to whom I sent a message' like data can be cleared after a week. But no such policy. Sad!