HOME

TheInfoList



OR:

The Electronic Communications Privacy Act of 1986 (ECPA) was enacted by the
United States Congress The United States Congress is the legislature, legislative branch of the federal government of the United States. It is a Bicameralism, bicameral legislature, including a Lower house, lower body, the United States House of Representatives, ...
to extend restrictions on government wire taps of telephone calls to include transmissions of electronic data by computer ( ''et seq.''), added new provisions prohibiting access to stored electronic communications, i.e., the Stored Communications Act (SCA, ''et seq.''), and added so-called
pen trap A pen register, or dialed number recorder (DNR), is a device that records all Telephone number, numbers called from a particular telephone line. The term has come to include any device or program that performs similar functions to an original pen ...
provisions that permit the tracing of telephone communications ( ''et seq.''). ECPA was an amendment to Title III of the
Omnibus Crime Control and Safe Streets Act of 1968 The Omnibus Crime Control and Safe Streets Act of 1968 (, codified at ''et seq.'') was legislation passed by the Congress of the United States and signed into law by President Lyndon B. Johnson that established the Law Enforcement Assistance A ...
(the Wiretap Statute), which was primarily designed to prevent unauthorized government access to private electronic communications. The ECPA has been amended by the Communications Assistance for Law Enforcement Act (CALEA) of 1994, the USA PATRIOT Act (2001), the USA PATRIOT reauthorization acts (2006), and the
FISA Amendments Act The FISA Amendments Act of 2008, also called the FAA and Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, is an Act of Congress that Rescind or amend something previously adopted, amended the Foreign Intelligence Surveilla ...
(2008).


Overview

"Electronic communications" means any transfer of signs, signals, writing, images, sounds,
data Data ( , ) are a collection of discrete or continuous values that convey information, describing the quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpreted for ...
, or intelligence of any nature transmitted in whole or in part by a wire,
radio Radio is the technology of communicating using radio waves. Radio waves are electromagnetic waves of frequency between 3  hertz (Hz) and 300  gigahertz (GHz). They are generated by an electronic device called a transmitter connec ...
,
electromagnetic In physics, electromagnetism is an interaction that occurs between particles with electric charge via electromagnetic fields. The electromagnetic force is one of the four fundamental forces of nature. It is the dominant force in the interacti ...
, photoelectronic or photooptic system that affects interstate or foreign commerce, but excludes the following: * Wire or
oral communication Conversation is interactive communication between two or more people. The development of conversational skills and etiquette is an important part of socialization. The development of conversational skills in a new language is a frequent focus ...
* Communication made through a tone-only
paging In computer operating systems, memory paging is a memory management scheme that allows the physical Computer memory, memory used by a program to be non-contiguous. This also helps avoid the problem of memory fragmentation and requiring compact ...
device * Communication from a tracking device (as defined in section 3117) *
Electronic funds transfer Electronic funds transfer (EFT) is the transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, via computer-based systems. The funds transfer process generally consists ...
information stored by a financial institution in a communications system used for the
electronic storage Data storage is the recording (storing) of information (data) in a storage medium. Handwriting, Phonograph record, phonographic recording, magnetic tape, and optical discs are all examples of storage media. Biological molecules such as RNA ...
and transfer of funds Title I of the ECPA protects wire, oral, and electronic communications while in transit. It sets down requirements for search warrants that are more stringent than in other settings. Title II of the ECPA, the Stored Communications Act (SCA), protects communications held in electronic storage, most notably messages stored on computers. Its protections are weaker than those of Title I, however, and do not impose heightened standards for warrants. Title III prohibits the use of
pen register A pen register, or dialed number recorder (DNR), is a device that records all numbers called from a particular telephone line. The term has come to include any device or program that performs similar functions to an original pen register, includin ...
and/or trap and trace devices to record dialing, routing, addressing, and signaling information used in the process of transmitting wire or electronic communications without a court order.


History

The law was first brought to attention after the Captain Midnight broadcast signal intrusion, where electrical engineer John R. MacDougall hacked into the
HBO Home Box Office (HBO) is an American pay television service, which is the flagship property of namesake parent-subsidiary Home Box Office, Inc., itself a unit owned by Warner Bros. Discovery. The overall Home Box Office business unit is based a ...
signal on April 27, 1986. As a consequence, this act was passed. This act also made satellite hijacking a felony.


Provisions

The ECPA extended government restrictions on wire taps from telephone calls to include transmissions of electronic data by computer ( ''et seq.''), added new provisions prohibiting access to stored electronic communications, i.e., the Stored Communications Act ( ''et seq.''), and added so-called pen/trap provisions that permit the tracing of telephone communications ( ''et seq.''). provides for gag orders which direct the recipient of a
pen register A pen register, or dialed number recorder (DNR), is a device that records all numbers called from a particular telephone line. The term has come to include any device or program that performs similar functions to an original pen register, includin ...
or
trap and trace device A trap and trace device captures incoming phone calls to a particular number, similar to a how a pen register captures outgoing phone calls. Description Title 18 of the United States Code defines a trap and trace device as follows: : The term ...
order not to disclose the existence of the pen/trap or the investigation.


Employee privacy

The ECPA extended privacy protections provided by the
Omnibus Crime Control and Safe Streets Act of 1968 The Omnibus Crime Control and Safe Streets Act of 1968 (, codified at ''et seq.'') was legislation passed by the Congress of the United States and signed into law by President Lyndon B. Johnson that established the Law Enforcement Assistance A ...
(of employers monitoring of employees phone calls) to include also electronic and cell phone communications.Slide 22 o
Chapter 24 Powerpoint
for text:
''See also
Employee monitoring Employee monitoring is the (often automated) surveillance of workers' activity. Organizations engage in employee monitoring for different reasons, such as to track performance, avoid legal liability, protect trade secrets, or address other securi ...
and Workplace privacy''.


Case law

Several court cases have raised the question of whether
e-mail Electronic mail (usually shortened to email; alternatively hyphenated e-mail) is a method of transmitting and receiving Digital media, digital messages using electronics, electronic devices over a computer network. It was conceived in the ...
messages are protected under the stricter provisions of Title I while they were in transient storage en route to their final destination. In '' United States v. Councilman'', a U.S. district court and a three-judge appeals panel ruled they were not, but in 2005, the full
United States Court of Appeals for the First Circuit The United States Court of Appeals for the First Circuit (in case citations, 1st Cir.) is a federal court with appellate jurisdiction over the district courts in the following districts: * District of Maine * District of Massachusetts ...
reversed this opinion.
Privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
advocates were relieved; they had argued in
amicus curiae An amicus curiae (; ) is an individual or organization that is not a Party (law), party to a legal case, but that is permitted to assist a court by offering information, expertise, or insight that has a bearing on the issues in the case. Wheth ...
briefs that if the ECPA did not protect e-mail in temporary storage, its added protections were meaningless as virtually all electronic mail is stored temporarily in transit at least once and that Congress would have known this in 1986 when the law was passed. (see, e.g., RFC 822). The case was eventually dismissed on grounds unrelated to ECPA issues. The seizure of a computer, used to operate an electronic
bulletin board system A bulletin board system (BBS), also called a computer bulletin board service (CBBS), is a computer server running list of BBS software, software that allows users to connect to the system using a terminal program. Once logged in, the user perfor ...
, and containing private electronic mail which had been sent to (stored on) the bulletin board, but not read (retrieved) by the intended recipients, does not constitute an unlawful intercept under the Federal Wiretap Act, 18 U.S.C. s 2510, et seq., as amended by Title I of ECPA. Governments can actually track cell phones in real time without a search warrant under ECPA by analyzing information as to antennae being contacted by cell phones, as long as the cell phone is used in public where visual surveillance is available. In '' Robbins v. Lower Merion School District'' (2010), also known as "WebcamGate", the plaintiffs charged that two suburban
Philadelphia Philadelphia ( ), colloquially referred to as Philly, is the List of municipalities in Pennsylvania, most populous city in the U.S. state of Pennsylvania and the List of United States cities by population, sixth-most populous city in the Unit ...
high schools violated ECPA by remotely activating the webcams embedded in school-issued laptops and monitoring the students at home. The schools admitted to secretly snapping over 66,000 webshots and
screenshot A screenshot (also known as screen capture or screen grab) is an analog or digital image that shows the contents of a computer display. A screenshot is created by a (film) camera shooting the screen or the operating system An operating sys ...
s, including webcam shots of students in their bedrooms.


Criticism

ECPA has been criticized for failing to protect all communications and consumer records, mainly because the law is so outdated and out of touch with how people currently share, store, and use information. Under ECPA, it is relatively easy for a government agency to demand service providers hand over personal consumer data stored on the service provider's servers. Email that is stored on a third party's server for more than 180 days is considered by the law to be abandoned. All that is required to obtain the content of the emails by a law enforcement agency is a written statement certifying that the information is relevant to an investigation, without
judicial review Judicial review is a process under which a government's executive, legislative, or administrative actions are subject to review by the judiciary. In a judicial review, a court may invalidate laws, acts, or governmental actions that are in ...
. When the law was initially passed, emails were stored on a third party's server for only a short period of time, just long enough to facilitate transfer of email to the consumer's email client, which was generally located on their personal or work computer. Now, with online email services prevalent such as
Gmail Gmail is the email service provided by Google. it had 1.5 billion active user (computing), users worldwide, making it the largest email service in the world. It also provides a webmail interface, accessible through a web browser, and is also ...
and
Hotmail Outlook.com, formerly Hotmail, is a free personal email service offered by Microsoft. It also provides a webmail interface accessible via web browser or mobile apps featuring mail, Calendaring software, calendaring, Address book, contacts, and ...
, users are more likely to store emails online indefinitely, rather than to only keep them for less than 180 days. If the same emails were stored on the user's personal computer, it would require the police to obtain a warrant first for seizure of their contents, regardless of their age. When they are stored on an internet server however, no warrant is needed, starting 180 days after receipt of the message, under the law. In 2013, members of the U.S. Congress proposed to reform this procedure. ECPA also increased the list of crimes that can justify the use of surveillance, as well as the number of judicial members who can authorize such surveillance. Data can be obtained on traffic and calling patterns of an individual or a group without a warrant, allowing an agency to gain valuable intelligence and possibly invade privacy without any scrutiny, because the actual content of the communication is left untouched. While workplace communications are, in theory, protected, all that is needed to gain access to communiqué is for an employer to simply give notice or a supervisor to report that the employee's actions are not in the company's interest. This means that, with minimal assumptions, an employer can monitor communications within the company. The ongoing debate is, where to limit the government's power to see into civilian lives, while balancing the need to curb national threats. In 2011, ''
The New York Times ''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'' published "1986 Privacy Law Is Outrun by the Web", highlighting that:Helft, Miguel and Claire Cain Miller
“News Analysis: 1986 Privacy Law Is Outrun by the Web”
''
The New York Times ''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'', January 9, 2011. Retrieved 2011-01-10.
...the Justice Department argued in court that cellphone users had given up the
expectation of privacy In United States constitutional law, reasonable expectation of privacy is a legal test which is crucial in defining the scope of the applicability of the privacy protections of the Fourth Amendment to the U.S. Constitution. It is related to, ...
about their location by voluntarily giving that information to carriers. In April, it argued in a federal court in
Colorado Colorado is a U.S. state, state in the Western United States. It is one of the Mountain states, sharing the Four Corners region with Arizona, New Mexico, and Utah. It is also bordered by Wyoming to the north, Nebraska to the northeast, Kansas ...
that it ought to have access to some e-mails without a search warrant. And federal law enforcement officials, citing technology advances, plan to ask for new regulations that would smooth their ability to perform legal wiretaps of various Internet communications.
The analysis went on to discuss how
Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
,
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
,
Verizon Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
,
Twitter Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
and other companies are in the middle between users and governments.


See also

* Customer proprietary network information (CPNI) * ''
Katz v. United States ''Katz v. United States'', 389 U.S. 347 (1967), was a landmark decision of the U.S. Supreme Court in which the Court redefined what constitutes a "search" or "seizure" with regard to the Fourth Amendment to the U.S. Constitution. The ruling ex ...
'' (1967) * '' In re DoubleClick'' (2001) * '' Lane v. Facebook, Inc.'' (2010) * '' United States v. Graham'' (2012)


References

{{Authority control United States federal computing legislation United States federal defense and national security legislation 1986 in American law Privacy of telecommunications Privacy law in the United States United States federal privacy legislation Labor rights