
As of Saturday April 18, all Twitter users outside of the US are now protected under the EU Data Protection Regulation or Directive. This is an important move by Twitter and helps to provide some level of protection for non-US citizens. This directive includes the “right to be forgotten” clause so that users can request the removal of damaging information.
US Citizens will not fall under this ruling however, and will be governed according to US law and be handled out of Twitter’s San Francisco headquarters.
The EU has some of the best privacy laws in the world protecting individuals rights as to what information can be collected and stored. This latest move by Twitter provides a glimmer of hope that US tech companies are starting to value individuals privacy. The EU is also looking at bolstering its privacy protection through a new Data Protection Regulation which allows individual countries to deal with cross-border privacy issues which has proven to be very difficult in the past.
Related Posts
Understanding Attack Surfaces in Cybersecurity
What do you need to know in order to minimise the risks of your network's attack surface?
Successful Cyberattack Vectors: Common Threats and How to Stop Them
Make sure you understand the threats your firm faces by learning about the most successful cyberattack vectors used by hackers.
Brute Force Attacks in 2025: How They Work, What’s Changed and How to Stop Them
How have brute force attacks evolved in 2025 and what can firms do to prevent these threats?
Types of Cybercrime: Understanding Today’s Threat Landscape
Recognizing the key types of cybercrime and knowing how they work is an essential starting point when developing a cybersecurity defense strategy.
Cybersecurity Incident Response: How to Prepare for and Manage Modern Threats
Following these seven data loss prevention best practices can help any firm reduce the risk of falling victim to threats like ransomware.
Understanding Threat Actors: Who’s Behind Cyberattacks and How to Stay Protected
Discover the different types of threat actors in cybersecurity, how they operate and what your business can do to stay protected from evolving threats.