
As of Saturday April 18, all Twitter users outside of the US are now protected under the EU Data Protection Regulation or Directive. This is an important move by Twitter and helps to provide some level of protection for non-US citizens. This directive includes the “right to be forgotten” clause so that users can request the removal of damaging information.
US Citizens will not fall under this ruling however, and will be governed according to US law and be handled out of Twitter’s San Francisco headquarters.
The EU has some of the best privacy laws in the world protecting individuals rights as to what information can be collected and stored. This latest move by Twitter provides a glimmer of hope that US tech companies are starting to value individuals privacy. The EU is also looking at bolstering its privacy protection through a new Data Protection Regulation which allows individual countries to deal with cross-border privacy issues which has proven to be very difficult in the past.
Share This Story, Choose Your Platform!
Related Posts
Oracle Breach: What Happened and Why It Matters
The 2025 Oracle breach exposed millions of records across three separate incidents. Learn how attackers got in, which industries were hit, and how to protect your organization.
What Is An Integrity Data Breach?
Find out what an integrity data breach involves, how it differs from data loss and why it's vital for businesses to be aware of the potential risks.
How Quickly Should A Suspected Data Breach Be Reported?
Data breach reporting deadlines can be tight. Learn when firms must report a suspected data breach, who must be informed and the risks of delay.
What Are The 5 Most Common Sources Of Data Leaks On The Internet?
Understanding how these five common sources of data leaks occur and how they can be prevented is an essential part of a data security strategy.
What Are The Latest Major Data Breaches And What Was Leaked?
These ten major data breaches from 2025 highlight the worldwide scale of cybersecurity incidents in the past year.
How Can A Company Develop An Effective Data Breach Response Plan?
Learn how to build an effective data breach response plan with clear roles, rapid detection, containment procedures and tested communication protocols.






