The Electronic Communications Privacy Act of 1986 (ECPA) was enacted by the
United States Congress
The United States Congress is the legislature, legislative branch of the federal government of the United States. It is a Bicameralism, bicameral legislature, including a Lower house, lower body, the United States House of Representatives, ...
to extend restrictions on government
wire taps of telephone calls to include transmissions of electronic data by computer ( ''et seq.''), added new provisions prohibiting access to stored electronic communications, i.e., the
Stored Communications Act (SCA, ''et seq.''), and added so-called
pen trap provisions that permit the tracing of telephone communications ( ''et seq.'').
ECPA was an amendment to Title III of the
Omnibus Crime Control and Safe Streets Act of 1968 (the
Wiretap Statute), which was primarily designed to prevent unauthorized government access to private electronic communications. The ECPA has been amended by the
Communications Assistance for Law Enforcement Act (CALEA) of 1994, the
USA PATRIOT Act (2001), the USA PATRIOT reauthorization acts (2006), and the
FISA Amendments Act
The FISA Amendments Act of 2008, also called the FAA and Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, is an Act of Congress that Rescind or amend something previously adopted, amended the Foreign Intelligence Surveilla ...
(2008).
Overview
"Electronic communications" means any transfer of signs, signals, writing, images, sounds,
data
Data ( , ) are a collection of discrete or continuous values that convey information, describing the quantity, quality, fact, statistics, other basic units of meaning, or simply sequences of symbols that may be further interpreted for ...
, or intelligence of any nature transmitted in whole or in part by a wire,
radio
Radio is the technology of communicating using radio waves. Radio waves are electromagnetic waves of frequency between 3 hertz (Hz) and 300 gigahertz (GHz). They are generated by an electronic device called a transmitter connec ...
,
electromagnetic
In physics, electromagnetism is an interaction that occurs between particles with electric charge via electromagnetic fields. The electromagnetic force is one of the four fundamental forces of nature. It is the dominant force in the interacti ...
, photoelectronic or photooptic system that affects interstate or
foreign commerce, but excludes the following:
* Wire or
oral communication
* Communication made through a tone-only
paging device
* Communication from a
tracking device (as defined in section 3117)
*
Electronic funds transfer
Electronic funds transfer (EFT) is the transfer of money from one bank account to another, either within a single financial institution or across multiple institutions, via computer-based systems.
The funds transfer process generally consists ...
information stored by a financial institution in a communications system used for the
electronic storage
Data storage is the recording (storing) of information (data) in a storage medium. Handwriting, Phonograph record, phonographic recording, magnetic tape, and optical discs are all examples of storage media. Biological molecules such as RNA ...
and transfer of funds
Title I of the ECPA
protects wire, oral, and electronic communications while in transit. It sets down requirements for search warrants that are more stringent than in other settings. Title II of the ECPA, the
Stored Communications Act (SCA), protects communications held in electronic storage, most notably messages stored on computers. Its protections are weaker than those of Title I, however, and do not impose heightened standards for warrants. Title III prohibits the use of
pen register and/or trap and trace devices to record dialing, routing, addressing, and signaling information used in the process of transmitting wire or electronic communications without a court order.
History
The law was first brought to attention after the
Captain Midnight broadcast signal intrusion, where electrical engineer John R. MacDougall hacked into the
HBO
Home Box Office (HBO) is an American pay television service, which is the flagship property of namesake parent-subsidiary Home Box Office, Inc., itself a unit owned by Warner Bros. Discovery. The overall Home Box Office business unit is based a ...
signal on April 27, 1986.
As a consequence, this act was passed. This act also made satellite hijacking a felony.
Provisions
The ECPA extended government restrictions on
wire taps from telephone calls to include transmissions of electronic data by computer ( ''et seq.''), added new provisions prohibiting access to stored electronic communications, i.e., the
Stored Communications Act ( ''et seq.''), and added so-called pen/trap provisions that permit the tracing of telephone communications ( ''et seq.'').
provides for gag orders which direct the recipient of a
pen register or
trap and trace device order not to disclose the existence of the pen/trap or the investigation.
Employee privacy
The ECPA extended
privacy protections provided by the
Omnibus Crime Control and Safe Streets Act of 1968 (of employers monitoring of employees phone calls) to include also electronic and cell phone communications.
[Slide 22 o]
Chapter 24 Powerpoint
for text: ''See also
Employee monitoring and
Workplace privacy''.
Case law
Several court cases have raised the question of whether
e-mail messages are protected under the stricter provisions of Title I while they were in transient storage en route to their final destination. In ''
United States v. Councilman'', a
U.S. district court and a three-judge appeals panel ruled they were not, but in 2005, the full
United States Court of Appeals for the First Circuit reversed this opinion.
Privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
advocates were relieved; they had argued in
amicus curiae briefs that if the ECPA did not protect e-mail in temporary storage, its added protections were meaningless as virtually all electronic mail is stored temporarily in transit at least once and that Congress would have known this in 1986 when the law was passed. (see, e.g., RFC 822). The case was eventually dismissed on grounds unrelated to ECPA issues.
The seizure of a computer, used to operate an electronic
bulletin board system, and containing private electronic mail which had been sent to (stored on) the bulletin board, but not read (retrieved) by the intended recipients, does not constitute an unlawful intercept under the Federal Wiretap Act, 18 U.S.C. s 2510, et seq., as amended by Title I of ECPA.
Governments can actually track cell phones in real time without a search warrant under ECPA by analyzing information as to antennae being contacted by cell phones, as long as the cell phone is used in public where visual surveillance is available.
In ''
Robbins v. Lower Merion School District'' (2010), also known as "WebcamGate", the plaintiffs charged that two suburban
Philadelphia
Philadelphia ( ), colloquially referred to as Philly, is the List of municipalities in Pennsylvania, most populous city in the U.S. state of Pennsylvania and the List of United States cities by population, sixth-most populous city in the Unit ...
high schools violated ECPA by remotely activating the webcams embedded in school-issued laptops and monitoring the students at home. The schools admitted to secretly snapping over 66,000 webshots and
screenshots, including webcam shots of students in their bedrooms.
Criticism
ECPA has been criticized for failing to protect all communications and consumer records, mainly because the law is so outdated and out of touch with how people currently share, store, and use information.
Under ECPA, it is relatively easy for a government agency to demand service providers hand over personal consumer data stored on the service provider's servers. Email that is stored on a third party's server for more than 180 days is considered by the law to be abandoned. All that is required to obtain the content of the emails by a law enforcement agency is a written statement certifying that the information is relevant to an investigation, without
judicial review. When the law was initially passed, emails were stored on a third party's server for only a short period of time, just long enough to facilitate transfer of email to the consumer's email client, which was generally located on their personal or work computer. Now, with online email services prevalent such as
Gmail
Gmail is the email service provided by Google. it had 1.5 billion active user (computing), users worldwide, making it the largest email service in the world. It also provides a webmail interface, accessible through a web browser, and is also ...
and
Hotmail, users are more likely to store emails online indefinitely, rather than to only keep them for less than 180 days. If the same emails were stored on the user's personal computer, it would require the police to obtain a warrant first for seizure of their contents, regardless of their age. When they are stored on an internet server however, no warrant is needed, starting 180 days after receipt of the message, under the law. In 2013, members of the U.S. Congress proposed to reform this procedure.
ECPA also increased the list of crimes that can justify the use of surveillance, as well as the number of judicial members who can authorize such surveillance. Data can be obtained on traffic and calling patterns of an individual or a group without a warrant, allowing an agency to gain valuable intelligence and possibly invade privacy without any scrutiny, because the actual content of the communication is left untouched. While workplace communications are, in theory, protected, all that is needed to gain access to communiqué is for an employer to simply give notice or a supervisor to report that the employee's actions are not in the company's interest. This means that, with minimal assumptions, an employer can monitor communications within the company. The ongoing debate is, where to limit the government's power to see into civilian lives, while balancing the need to curb national threats.
In 2011, ''
The New York Times
''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'' published "1986 Privacy Law Is Outrun by the Web", highlighting that:
[Helft, Miguel and Claire Cain Miller]
“News Analysis: 1986 Privacy Law Is Outrun by the Web”
''The New York Times
''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'', January 9, 2011. Retrieved 2011-01-10.
...the Justice Department argued in court that cellphone users had given up the expectation of privacy about their location by voluntarily giving that information to carriers. In April, it argued in a federal court in Colorado
Colorado is a U.S. state, state in the Western United States. It is one of the Mountain states, sharing the Four Corners region with Arizona, New Mexico, and Utah. It is also bordered by Wyoming to the north, Nebraska to the northeast, Kansas ...
that it ought to have access to some e-mails without a search warrant. And federal law enforcement officials, citing technology advances, plan to ask for new regulations that would smooth their ability to perform legal wiretaps of various Internet communications.
The analysis went on to discuss how
Google
Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
,
Facebook
Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
,
Verizon,
Twitter
Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
and other companies are in the middle between users and governments.
See also
*
Customer proprietary network information (CPNI)
* ''
Katz v. United States'' (1967)
* ''
In re DoubleClick'' (2001)
* ''
Lane v. Facebook, Inc.'' (2010)
* ''
United States v. Graham'' (2012)
References
{{Authority control
United States federal computing legislation
United States federal defense and national security legislation
1986 in American law
Privacy of telecommunications
Privacy law in the United States
United States federal privacy legislation
Labor rights