453 lines
26 KiB
Plaintext
453 lines
26 KiB
Plaintext
This article, "Computer Electronic Mail and Privacy," appeared in THE
|
||
COMPUTER LAW AND SECURITY REPORT (4 Comp. L.Sec. Rpt. 4-8, Nov/Dec
|
||
1987). It appeared as part of a special "Information Law" section of
|
||
the British print publication. The article is about the American
|
||
federal statute known as the Electronic Communications Privacy Act of
|
||
1986. This article is:
|
||
|
||
Copyright 1986, 1987 Ruel T. Hernandez
|
||
Copies of this copyrighted article may only be used for PERSONAL USE.
|
||
This file replaces and supersedes documents found in PRIVACY.LBR and
|
||
PRIVACY2.LBR.
|
||
(PRIVACY.TXT - this has WordStar dot commands and Ctrl-P print codes)
|
||
|
||
|
||
COMPUTER_ELECTRONIC_MAIL_AND_PRIVACY
|
||
|
||
by
|
||
Ruel T. Hernandez
|
||
|
||
July 27, 1987
|
||
|
||
Copyright 1986, 1987 by Ruel T. Hernandez
|
||
|
||
|
||
INTRODUCTION
|
||
|
||
Three years ago, Congress introduced legislation which sought to
|
||
provide federal statutory guidelines for the privacy protection of
|
||
electronic communications, including electronic mail (e-mail) found on
|
||
commercial computer-based services and on other remote computer systems such
|
||
as electronic bulletin board systems (BBS). The old federal wiretap law
|
||
only gave protection to normal audio telephone communications. Before the
|
||
legislation culminated into the Electronic Communications Privacy Act of
|
||
1986 (ECPA), which went into effect on January 20, 1987, there was no
|
||
contemplation of computer-based electronic communications being transmitted
|
||
across telephone lines and then being stored on disk for later retrieval by
|
||
or forwarding to its intended recipient. Federal law did not provide
|
||
guidelines for protecting the transmitted electronic messages once they were
|
||
stored on these computer-based communications services and systems.
|
||
|
||
QUESTIONS
|
||
|
||
(1) Whether electronic mail and other intended private material stored
|
||
on an electronic computer communications service or system have Fourth
|
||
Amendment privacy protection?
|
||
|
||
(2) Should private electronic mail and other such material be accorded
|
||
federal statutory protection guidelines such as those enjoyed by the U.S.
|
||
Mail?
|
||
|
||
PROBLEM
|
||
|
||
Law enforcement seeks criminal evidence stored as e-mail either on a
|
||
commercial computer service, such as CompuServe, GEnie or The Source, or on
|
||
a hobbyist-supported BBS. (Note, this situation is equally applicable to
|
||
personal, private data stored on a remote system for later retrieval, such
|
||
as with CompuServe's "personal file" online storage capabilities.)
|
||
|
||
For example, a computer user calls up a computer communication system.
|
||
Using the electronic mail function, he leaves a private message that can
|
||
only be read by an intended recipient. The message is to inform the
|
||
recipient of a conspiracy plan to violate a federal or state criminal
|
||
statute. Law enforcement gets a tip about the criminal activity and learn
|
||
that incriminating evidence may be found on the computer system.
|
||
|
||
In 1982, such a situation occurred. (Meeks, Life_at_300_Baud:_Crime_on
|
||
the_BBS_Network, Profiles, Aug. 1986, 12-13.) A Detroit federal grand jury,
|
||
investigating a million-dollar cocaine ring, issued a subpoena ordering a
|
||
commercial service, The Source, to hand over private subscriber data files.
|
||
The files were routinely backed up to guard against system crashes. The
|
||
grand jury was looking for evidence to show that the cocaine ring was using
|
||
The Source as a communications base to send messages to members of the ring.
|
||
With such evidence, the grand jury could implicate and indict those
|
||
suspected of being part of the cocaine ring. The Source refused to obey the
|
||
subpoena on the basis of privacy. The prosecution argued The Source could
|
||
not vicariously assert a subscriber's privacy rights. Constitutional rights
|
||
are personal and could only be asserted by the person whose rights are
|
||
invaded. Additionally, since the files containing messages were duplicated
|
||
by the service, any user expectation of privacy would be extinguished. A
|
||
court battle ensued. However, before a ruling could be made, the kingpin of
|
||
the cocaine ring entered a surprise preemptime guilty plea to federal drug
|
||
trafficking charges. The case against The Source was discontinued.
|
||
|
||
Publicly posted messages and other public material may be easily
|
||
retrieved by law enforcement. It is the private material, such as e-mail,
|
||
which posed the problem.
|
||
|
||
Law enforcement's task was then to gather enough evidence to
|
||
substantiate a criminal case. Specifically, they would want the e-mail, or
|
||
other private files, transmitted by suspected criminals. In oppostion, the
|
||
provider or systems operator of a computer communications service or system,
|
||
in his assumed role as keeper of transmitted private electronic messages,
|
||
would not want to turn over the private data.
|
||
|
||
INADEQUACY OF OLD LAW
|
||
|
||
Meeks noted that as of August, 1986, "no ... protection exist[ed] for
|
||
electronic communications. Any law enforcement agency can, for example,
|
||
confiscate a local BBS and examine all the message traffic," including and
|
||
private files and e-mail. (Id.)
|
||
|
||
CASE LAW
|
||
|
||
There is little case law available on computer communications and
|
||
Fourth Amendment constitutional problems. (See_generally M.D. Scott,
|
||
Computer Law, 9-9 (1984 & Special Update, Aug. 1, 1984).) If not for the
|
||
preemptive guilty plea, the above described Detroit case may have provided
|
||
some guidance on computer-based communications and privacy issues.
|
||
|
||
Of the available cases, there are those which primarily dealt with
|
||
financial information found in bank and consumer credit organization
|
||
computers. In U.S._v._Davey, 426 F.2d 842, 845 (2 Cir. 1970), the
|
||
government had the right to require the production of relevant information
|
||
wherever it may be lodged and regardless of the form in which it is kept and
|
||
the manner in which it may be retrieved, so long as it pays the reasonable
|
||
costs of retrieval. In a California case, Burrows_v._Superior_Court, 13
|
||
Cal. 3d 238, 243, 118 Cal. Rptr. 166, 169 (1974), a depositor was found to
|
||
have a reasonable expectation that a bank would maintain the confidentiality
|
||
of both his papers in check form originating from the depositor and the
|
||
depositor's bank statements and records of those checks. However, in
|
||
U.S._v. Miller, 425 U.S. 435, 96 S.Ct. 1619 (1976), customer account
|
||
records on a bank's computer were held to not be private papers of the bank
|
||
customer, and, hence, there was no Fourth Amendment problem when they are
|
||
subpoenaed directly from the bank.
|
||
|
||
Although these cases have more of a business character in contrast to
|
||
personal e-mail found on computer systems such as CompuServe or a hobbyist-
|
||
supported BBS, they would hold that there would be very little to legally
|
||
stop unauthorized access to computer data and information.
|
||
|
||
Under the old law, a prosecutor, as in the Detroit case, may try to
|
||
analogize duplicated and backed up e-mail to business situations where data
|
||
on business computer databases are also backed up. Both types of computer
|
||
data are stored on a system and then later retrieved. The provider or
|
||
systems operator of a computer electronic communications system would
|
||
counterargue that the nature of computers always require the duplication and
|
||
backup of any computer data, whether the data files be e-mail or centrally-
|
||
based financial or credit data. Data stored on magnetic media are prone to
|
||
possible destruction. Duplication does not necessarily make e-mail the same
|
||
as financial or credit data stored in business computers. Centrally-based
|
||
business information is more concerned with the data processing. That
|
||
information is generally stored and retrieved by the same operator. E-mail
|
||
is more concerned with personal communications between individuals where the
|
||
sender transmits a private message to be retrieved only by an intended
|
||
recipient. The sender and the recipient have subjective expectations of
|
||
privacy that when viewed objectively are reasonable. Therefore, there would
|
||
be a constitutionally protected expectation of privacy under Katz_v._U.S.,
|
||
389 U.S. 347, 88 S.Ct. 507 (1967).
|
||
|
||
However, the prosecution would note under California_v._Ciraolo, --
|
||
U.S. --, 106 S.Ct. 1809 (1984), users would have to protect their electronic
|
||
mail from any privacy intrusion. The provider or operator of the service or
|
||
system has ultimate control over it. He has complete access to all areas of
|
||
the system. He could easily examine the material. The prosecution would
|
||
note the user could not reasonably protect his private data from provider or
|
||
operator invasion. This "knot-hole," where an observer can make an
|
||
observation from a lawful position, would exclude any reasonable expectation
|
||
of privacy. If there is no privacy, there can be no search and therefore no
|
||
Fourth Amendment constitutional violation. Law enforcement can retrieve the
|
||
material.
|
||
|
||
The Justice Department noted the ambiguity of the knothole in a
|
||
response to Senator Leahy's question whether the then existing wiretap law
|
||
was adequate to cover computer communications. (S. Rep. No. 541, 99th
|
||
Cong., 2d Sess. 4 reprinted_in 1986 U.S. Code Cong. & Ad. News 3558.) It
|
||
was "not always clear or obvious" whether a reasonable expectation of
|
||
privacy existed. (Id.)
|
||
|
||
FEDERAL WIRETAP STATUTES
|
||
|
||
The old federal wiretap statutes protected oral telephone
|
||
communications from police interceptions. This protection was made during
|
||
1968 in response to electronic eavesdropping conducted by government.
|
||
(Cohodas, Congress_Races_to_stay_Ahead_of_Technology, Congressional
|
||
Quarterly Weekly Report, May 31, 1986, 1235.) Although e-mail appears to
|
||
come under the old 18 U.S.C. sec. 2510(1) definition of "wire
|
||
communication," it was limited to audio transmissions by wire or cable. The
|
||
old 18 U.S.C. sec. 2510(4) required that an interception of a wire
|
||
communication be an aural acquisition of the communication. By being
|
||
"aural," the communication must be "heard." There would be a problem as to
|
||
whether an electronic communication could be "heard." Data transmissions
|
||
over telephone lines generally sound like unintelligible noisy static or
|
||
high pitched tones. There would certainly be no protection after a
|
||
communication has completed its transmission and been stored on a computer.
|
||
The communication's conversion into computer stored data, thus no longer in
|
||
transmission until later retrieved or forwarded as transmission to another
|
||
computer system, would clearly take the communication out of the old
|
||
statutory protected coverage.
|
||
|
||
"Eighteen years ago ... Congress could not appreciate - or in some
|
||
cases even contemplate - [today's] telecommunications and computer
|
||
technology...." (132 Cong. Rec. S7992 (daily ed. June 19, 1986) (statement
|
||
of Sen. Leahy).)
|
||
|
||
COMPARISON WITH U.S. MAIL PROTECTION
|
||
|
||
A letter sent by first class mail is given a high level of protection
|
||
against unauthorized intrusion by a combination of federal and U.S. Postal
|
||
Service statutes and regulations. For instance, the unauthorized taking out
|
||
of and examining of the contents of mail held in a "depository for mail
|
||
matter" before it is delivered to the mail's intended recipient is
|
||
punishable by fine, imprisonment, or both. (18 U.S.C. sec. 1702.) In
|
||
comparison, under the old law, electronic communications had no protection.
|
||
Federal protection for U.S. Mail provided a suggested direction as to how
|
||
electronic communications should be protected when it was no longer in
|
||
transmission.
|
||
|
||
SOLUTION - THE NEW LAW
|
||
|
||
There are two methods towards a solution: (1) court decisions; or (2)
|
||
new legislated privacy protection.
|
||
|
||
COURT DECISIONS
|
||
|
||
Courts may have chosen to read computer communications protection into
|
||
the old federal wiretap statute or into existing state law. However, they
|
||
were reluctant to do so. Courts "are in no hurry to [revise or make new law
|
||
in this area] and some judges are openly asking Congress for help....
|
||
[F]ederal Appeals Court Judge Richard Posner in Chicago said Congress needed
|
||
to revise current law, adding that 'judges are not authorized to amend
|
||
statutes even to bring them up-to-date.'" (Cohodas, 1233.)
|
||
|
||
NEW STATUTE
|
||
|
||
Last October 21, 1986, President Reagan signed the new Electronic
|
||
Communications Privacy Act of 1986 amending the federal wiretap law. ECPA
|
||
has since went into effect during the beginning of 1987. (P.L. 99-508,
|
||
Title I, sec. 111, 100 Stat. 1859; P.L. 99-508, Title II, sec. 202, 100
|
||
Stat. 1868.) ECPA created parallel privacy protection against both
|
||
interception of electronic communications while in transmission and
|
||
unauthorized access to electronic communications stored on a system.
|
||
|
||
The new ECPA first provides privacy protection for any
|
||
|
||
'electronic communication' ... [by] any transfer of signs,
|
||
signals, writing, images, sounds, data or intelligence of any
|
||
nature transmitted in whole or in part by a wire, radio,
|
||
electromagnetic, photoelectronic or photooptical system that
|
||
affects interstate or foreign commerce...."
|
||
|
||
(18 U.S.C. secs. 2510(12), 2511.) The Senate Report noted examples of
|
||
electronic communications to include non-voice communications such as
|
||
"electronic mail, digitized transmissions, and video teleconferences." (S.
|
||
Rep. No. 541, 99th Cong., 2d Sess. 14 reprinted_in 1986 U.S. Code Cong. &
|
||
Ad. News 3568.) Electronic communication is defined in terms of how it is
|
||
transmitted. So long as the means by which a communication is transmitted
|
||
affects interstate or foreign commerce, the communication is covered ECPA.
|
||
(18 U.S.C. sec. 2510(12).) Generally, that would include all telephonic
|
||
means including private networks and intra-company communications. (S.
|
||
Rep. No. 541, 99th Cong., 2d Sess. 12 reprinted_in 1986 U.S. Code Cong. &
|
||
Ad. News 3566.)
|
||
|
||
Second, ECPA protects the electronic communication when it has been
|
||
stored after transmission, such as e-mail left on an electronic computer
|
||
communication system for later pickup by its intended recipient. (18 U.S.C.
|
||
sec. 2510(17).) The legislation makes it a federal criminal offense to
|
||
break into any electronic system holding private communications or to exceed
|
||
authorized access to alter or obtain the stored communications. (18 U.S.C.
|
||
sec. 2701(a).)
|
||
|
||
The legislation would protect electronic computer communication systems
|
||
from law enforcement invasion of user e-mail without a court order. (18
|
||
U.S.C. secs. 2517, 2518, 2703.) Although the burden of preventing
|
||
disclosure of the e-mail is placed on the subscriber or user of the system,
|
||
the government must give him fourteen days notice to allow him to file a
|
||
motion to quash a subpoena or to vacate a court order seeking disclosure of
|
||
his computer material. (18 U.S.C. sec. 2704(b).) However, the government
|
||
may give delayed notice where there are exigent circumstances as listed by
|
||
the Act (18 U.S.C. sec. 2705.) Recognizing the easy user destruction of
|
||
computer data, ECPA allows the government to include in its subpoena or
|
||
court order the requirement that the provider or operator retain a backup
|
||
copy of electronic communications when there is risk of user destruction.
|
||
(18 U.S.C. sec. 2704(a).)
|
||
|
||
The legislation gives a civil cause of action to the provider or
|
||
operator, subscriber, customer or user of the system aggrieved by an
|
||
invasion of an electronic communication in the system in violation of the
|
||
ECPA. (18 U.S.C. secs. 2520, 2707.) If the provider or operator has to
|
||
disclose information stored on his system due to a court order, warrant,
|
||
subpoena, or certification under ECPA, no cause of action can be brought
|
||
against him by the person aggrieved by such disclosure. (18 U.S.C. sec.
|
||
2703(e); see_also 18 U.S.C. secs. 2701(c), 2702(b), 2511(2)(a)(i),
|
||
2511(3)(b)(iii) where the systems operator or provider is not held
|
||
criminally liable, may observe a private communication while performing
|
||
employment duties or according to authorization, etc., may intercept private
|
||
communication while making quality control checks or during the course of
|
||
forwarding communications to another system.)
|
||
|
||
SYSTEMS COVERED
|
||
|
||
Clearly, the national commercial services in the United States,
|
||
including CompuServe, MCI Mail or a company using a contracted e-mail
|
||
service, such as GE QUIK-COM (See S. Rep. No. 99-541, 99th Cong., 2d Sess.
|
||
8 reprinted_in 1986 U.S. Code Cong. & Ad. News 3562) are covered by ECPA.
|
||
|
||
However, there may be some confusion as to whether ECPA would protect
|
||
electronic communications found on a mere hobbyist-supported BBS. For
|
||
instance, language in ECPA does not expressly state the term "bulletin
|
||
board." Nonetheless, ECPA would indeed cover electronic bulletin boards.
|
||
|
||
What are electronic bulletin boards? Generally, they are personal
|
||
computers provided for and maintained by computer hobbyists out of their own
|
||
personal resources. These systems traditionally allow free access to
|
||
computer/modem-equipped members of local communities and provide for both
|
||
public and private electronic mail exchange. Some sophisticated systems,
|
||
such as the ProLine system written for Apple II computers, provide callers
|
||
with personal user areas where they may keep private files much like the
|
||
CompuServe personal file areas.
|
||
|
||
Augmenting the single stand-alone BBS, there are networks of bulletin
|
||
boards linked together, often with the assistance of university mainframes,
|
||
with other bulletin boards or mainframe computers by sophisticated "mail
|
||
routing" systems (such as ARPAnet and FIDOnet). These networks use
|
||
sophisticated message addressing instructions and computer automation where
|
||
networked computers make calls to other networked computers to exchange
|
||
"net-news" or private mail between users of the different bulletin boards.
|
||
Given the proper address routing instructions, a user may communicate with
|
||
another user on a cross-town BBS or on a BBS in another part of the country.
|
||
Although there is some delay with messages being routed through a network,
|
||
these networks help to reduce or eliminate the computer hobbyist's need to
|
||
make direct toll or long distance calls to faraway systems or having to pay
|
||
subscription fees to use a commercial electronic mail service. (Note, there
|
||
are also network exchange systems and "gateways" between commercial
|
||
services.)
|
||
|
||
As an alternative to commercial service subscriptions, businesses have
|
||
been turning to the use of BBS's and BBS mailing networks for increased
|
||
productivity, paperwork reduction, improved client contact and the
|
||
elimination of "telephone tag." (See Keaveney, Custom-Built_Bulletin_Boards,
|
||
Personal Computing, Aug. 1987, 91.) A number of these corporate BBS's are
|
||
open to the public with restricted access to business and client system
|
||
areas. Examples of such systems include two Washington D.C. area boards
|
||
run by Gannet Company Inc. ("[f]or all Gannet/USA Today employees and other
|
||
computer users") and Issue Dynamics Inc. (catering to the consulting
|
||
company's clients).
|
||
|
||
ECPA language would show protection for bulletin boards. 18 U.S.C.
|
||
sec. 2510(15) provides that "'electronic communication service' means any
|
||
service which provides to users thereof the ability to send or receive wire
|
||
or electronic communications" (emphasis added). A "remote computing
|
||
service" was defined in the Act as an electronic communications system that
|
||
provides computer storage or processing services to the public. (18 U.S.C.
|
||
sec. 2710(2).) An intra-company communications system, the corporate BBS,
|
||
would also be protected. (S. Rep. No. 541, 99th Cong., 2d Sess. 12
|
||
reprinted_in 1986 U.S. Code Cong. & Ad. News 3566.) Language in ECPA
|
||
refers to "the person or entity providing the wire or electronic
|
||
communication service," such as in 18 U.S. secs. 2701(c)(1) and 2702(a)(1).
|
||
Such language would indicate the inclusion of individuals and businesses who
|
||
operate bulletin board systems.
|
||
|
||
The Senate report, in addition to defining "electronic mail," gave a
|
||
separate definition of "electronic bulletin boards":
|
||
|
||
Electronic "bulletin boards" are communications networks created
|
||
by computer users for the transfer of information among computers.
|
||
These may take the form of proprietary systems or they may be
|
||
noncommercial systems operating among computer users who share special
|
||
interests. These noncommercial systems may [or may not] involve fees
|
||
covering operating costs and may require special "passwords" which
|
||
restrict entry to the system. These bulletin boards may be public or
|
||
semi-public in nature, depending on the degree of privacy sought by
|
||
users, operators or organizers of such systems.
|
||
|
||
(S. Rep. No. 541, 99th Cong., 2d Sess. 8-9 reprinted_in 1986 U.S. Code
|
||
Cong. & Ad. News 3562-3563.)
|
||
|
||
ECPA, as enacted, takes note of the different levels of security found
|
||
on hobbyist-supported BBS's, i.e. the difference between configured system
|
||
areas containing private electronic mail and other areas configured to
|
||
contain public material. (18 U.S.C. sec. 2511(2)(g)(i).) The electronic
|
||
communications which a user seeks to keep private, through methods provided
|
||
by the system, would be protected by ECPA. In contrast, there would be no
|
||
liability for access to features configured by the system to be readily
|
||
accessible by the general public. An indicia of privacy on the system, with
|
||
no notice to show otherwise, would trigger ECPA coverage. An indicia of
|
||
privacy may include passwords and prompts asking if a message is to be kept
|
||
private.
|
||
|
||
House Representative Kastenmeier noted that there was an unusual
|
||
coalition of groups, businesses and organizations interested in ECPA.
|
||
(Kastenmeier, Communications_Privacy, Communications Lawyer, Winter 1987,
|
||
1, 24.) Among those interested included the BBS community. Reporters in
|
||
the BBS community noted how Senator Leahy and others were receptive to their
|
||
concerns. They report Leahy to have been "soliciting [users and BBS
|
||
operators'] comments and encourag[ing] sensitivity to the needs of BBS's in
|
||
the legislation.... [Senators and congressional members] are ... willing to
|
||
listen to our side of things." (BBSLAW02.MSG, dated 07/24/85, information
|
||
from Chip Berlet, Secretary, National Lawyers Guild Civil Liberties
|
||
Committee, transmitted by Paul Bernstein, SYSOP, LAW MUG, Chicago, Illinois
|
||
(312)280-8180, regarding Federal Legislation Affecting Computer Bulletin
|
||
Boards, deposited on The Legacy Network (213)553-1473 in Los Angeles,
|
||
California.)
|
||
|
||
ESCAPING COVERAGE
|
||
|
||
There are at least two possible ways to escape ECPA coverage. The
|
||
first is to provide adequate notice that all material on a service or system
|
||
may be publicly accessible even though methods of providing privacy remain.
|
||
The bulletin board system maintained by DePaul University College of Law
|
||
(312)341-6217, Chicago, Illinois, provides an example of an electronic
|
||
notice (displayed upon user access):
|
||
|
||
PURSUANT TO THE ELECTRONIC AND COMMUNICATIONS PRIVACY ACT OF 1986, 18
|
||
USC 2510 et. seq., NOTICE IS HEREBY GIVEN THAT THERE ARE NO FACILITIES
|
||
PROVIDED BY THIS SYSTEM FOR SENDING OR RECEIVING PRIVATE OR
|
||
CONFIDENTIAL ELECTRONIC COMMUNICATIONS. ALL MESSAGES SHALL BE DEEMED
|
||
TO BE READILY ACCESSIBLE TO THE GENERAL PUBLIC.
|
||
|
||
Do NOT use this system for any communication for which the sender
|
||
intends only the sender and the intended recipient or recipients to
|
||
read.
|
||
|
||
Note, although the DePaul notice states otherwise, user-operated message
|
||
privacy toggles remain on the board. The second possible method to escape
|
||
ECPA coverage would be to merely not provide any means of privacy.
|
||
|
||
One way of foiling the intent of a government subpoena or court order
|
||
requirement to keep duplicate copies of private electronic communications
|
||
would be the use of passworded private e-mail. For instance, the private
|
||
e-mail capabilities of GEnie Mail and GE QUIK-COM include user-toggled
|
||
passwording which utilizes an encryption technique that no one, not even the
|
||
provider, knows how to decipher. Bill Louden, General Manager of GEnie
|
||
(General Electric Network for Information Exchange), noted how GEnie Mail
|
||
and GE QUIK-COM passworded e-mail cannot be read by anyone who did not know
|
||
the password. "[N]ot even our 'god' number could ever read the [passworded]
|
||
mail." (Message from Bill Louden, GEnie, Legacy RoundTable (LAW), category
|
||
1, topic 7, message 6 (May 15, 1987).) The writer of the encryption
|
||
software has since left General Electric and no one has had success in
|
||
breaking the code. (Message from Bill Louden, GEnie, Legacy RoundTable
|
||
(LAW), category 1, topic 7, message 10 (May 17, 1987).)
|
||
|
||
CONCLUSION
|
||
|
||
With ECPA, e-mail and other private electronic communications stored on
|
||
computer communication systems have privacy protection. Unfortunately,
|
||
before ECPA, federal statutory guidelines for such protection were not
|
||
articulated. Case law also did not provide any helpful guidance. The
|
||
peculiarities of computers and computer storage were not addressed by the
|
||
old wiretap laws. Electronic communications privacy could not stand up
|
||
against constitutional privacy law as defined by the United States Supreme
|
||
Court. The then existing law was "hopelessly out of date." (S. Rep. No.
|
||
541, 99th Cong., 2d Sess. 2 reprinted_in 1986 U.S. Code Cong. & Ad. News
|
||
3556 (statement of Sen. Leahy).) Fortunately, a legislative solution to
|
||
bring privacy law up to date with the advancing computer communication and
|
||
information technology was provided for in ECPA.
|
||
|
||
|
||
-------------------------
|
||
Copyright 1986, 1987 Ruel T. Hernandez. This paper was originally written
|
||
for a Law and Technology seminar course at California Western School of Law.
|
||
The author may be contacted via CompuServe (71450,3341) or GEnie
|
||
(R.HERNANDEZ) or Intermail/UUCP (ruel@cup.portal.com).
|