– Electronic Communications Privacy Act Essay, Research Paper
Overview
The Electronic Communications Privacy
Act (ECPA) of 1986 was adopted to address the legal privacy issues that
were evolving with the growing use of computers and other new innovations
in electronic communications. The ECPA updated legislation passed in 1968
that had been designed to clarify what constitutes invasion of privacy when
electronic surveillance is involved. The ECPA extended privacy protection
outlined in the earlier legislation to apply to radio paging devices, electronic
mail, cellular telephones, private communication carriers, and computer
transmissions.
Background
Major Provisions
Electronic Mail
All Communication Carriers
Cellular Telephones
Radio Paging
Customer Records
Satellite Transmissions
Evolving ECPA Issues
Criticism of ECPA
Workplace Privacy
Constitutional Rights vs. Curbing Terrorism
Background
Prior to the enactment of the Electronic Communications Privacy Act (ECPA)
of 1986, Title III of the Omnibus Crime Control and Safe Streets Act of
1968 had established the procedures which governed electronic surveillance.
In a 1967 case, Katz vs. the U.S., the Supreme Court determined that the
use by FBI agents of electronic devices
to listen to and record telephone conversations without a warrant constituted
a violation of unreasonable search and seizure provisions established
by the Fourth Amendment. This case provided the Court with an opportunity
to more thoroughly articulate general criteria for allowable government
surveillance. Government agencies were required to demonstrate probable
cause, identify the specific suspect, crime, telephone to be used, and
time of conversation, and secure a warrant before they could legally execute
a wiretap.
By 1986 there had been very few significant abuses of earlier privacy
legislation, but legislators felt pressure from industry and civil liberties
groups to take notice of and address the dramatic expansion in the use
of new technologies like electronic mail. In October 1985, the congressional
Office of Technology Assessment
reported that "many innovations in electronic surveillance technology"
employed by law enforcement agencies "have outstripped constitutional
and statutory protections, leaving areas in which there is currently no
legal protection against . . . new surveillance devices." The ECPA
was developed in anticipation of new privacy issues, relating to both
government surveillance and "recreational eavesdropping" by
private parties, that were likely to emerge along with the widespread
use of new communication technologies.
Major Provisions
President Reagan signed the Electronics Communication Privacy Act into
law on October 21, 1986. The ECPA was designed to expand Title III privacy
protection to apply to radio paging devices, electronic mail, cellular
telephones, private communication carriers, and computer transmissions.
The Act also identified specific situations and types of transmissions
that would not be protected, most notably an employer’s monitoring of
employee electronic mail on the employer’s system.
Electronic Mail
The ECPA extended Title III privacy protection to both the transmission
and storage of digitized textual information exemplified by electronic
mail. The Act amended the definition of the term "intercept… to
make it clear that it is illegal to intercept the non-voice portion of
a wire communication such as the data or digitized portion of a voice
communication." The "non-voice portion" includes "electronic
communication," which is defined as "any transfer of signs,
signals, writing, images, sound, data, or intelligence of any nature transmitted
in whole or in part by a wire, radio, electromagnetic, photoelectric or
photo-optical system."
The Act was designed to protect the contents of stored electronic mail,
voice mail and remote computing services. It was also intended to prohibit
providers of the electronic communication services from disclosing the
contents of communication that has been stored electronically without
the lawful consent of the person who originated the communication.
All Communication
Carriers
Under Title III, privacy protection had been limited to surveillance
of the "common carrier" facilities available to the general
public. The ECPA of 1986 extends protection to the use of all carriers,
including private telephone systems and branch exchanges,
and local area networks. The House
Judiciary Committee explained that it "chose to extend federal
jurisdiction to the maximum permissible constitutional limits by providing
coverage of a person who provides or operates (any) facilities for communications
that affect interstate or foreign commerce."
Cellular Telephones
In Hall vs. U.S., a 1973 U.S.
Circuit Court of Appeals decision held that mobile telephone conversations
are protected under Title III when part of a communication is carried
to or from a ‘landline’ telephone." This decision failed to clarify
whether protection applies to all cellular and cordless telephone conversations,
however. The ECPA of 1986 amended the definition of protected "wire
communication" to "include communications utilizing wires, cables,
or other line connections within a switching office . . . regardless of
whether the communications are between two cellular
telephones or between a cellular telephone and a ‘landline’ telephone."
However, in order to encourage the use of technological means of protection
like scrambling and encryption,
the Act reduced the criminal penalty for the interception of unencrypted,
unscrambled cellular phone calls from a felony that could carry up to
five years of imprisonment to a $500 fine. The Act provides protection
for the wire portion of cordless phone conversations, but specifically
notes that "wire communication" protected under Title III "does
not include the radio portion of a telephone that is transmitted between
the cordless telephone handset and the base unit."
Radio Paging
The ECPA clarified privacy protection related to the use of radio paging
devices. The Department of Justice
defined voice and digital display pagers as "a continuation of an
original wire communication" that should therefore be subject to
Title III protection. The legislation also specifically identified the
"tone-only" pager as a device whose use is not protected under
Title III.
Customer Records
The ECPA of 1986 restricted government access to subscriber and customer
records belonging to electronic service providers. Government agencies
must first secure a search warrant, court order, or an authorized administrative
or grand jury subpoena to access service provider records without first
notifying a subscriber or customer.
Satellite
Transmissions
The ECPA of 1986 identified the Cable Communications Policy Act of 1984
as the exclusive source of protection policy governing home reception
of unencrypted cable satellite programming. The 1984 Act established a
separate set of specialized policies to address cable satellite reception
issues that related more to the conduct of commercial enterprise than
to privacy issues. The ECPA also increased criminal penalties for malicious
or intentional interference that impedes the delivery of satellite transmissions.
Evolving ECPA
Issues
Criticism
of ECPA
The ECPA was originally endorsed by the ACLU
and promoted to protect civil liberties. Since it was signed into law,
however, it has come under fire for its failure to protect certain electronic
communication procedures. Shortly after the Act was passed, critics pointed
to some key discrepancies between the original version of the Act promoted
by civil libertarians and the final version that became law. A critic
from The Nation called the final version "a wish list for
the law-enforcement community."
Critics maintain that ECPA provisions for access to subscriber information
make it easier for the FBI and other
agencies to demand that service providers hand over customer records.
The demand must be accompanied by a statement certifying that the information
sought pertains to an investigation of a foreign counterintelligence operation,
but no judicial review is required, so questionable certifying procedures
can be easily rationalized.
The ECPA substantially increased the list of Federal crimes for which
electronic surveillance could be authorized. It also expanded the range
and number of Justice Department officials who can authorize applications
for court approval.
While the ECPA was designed to protect the content of electronic communications,
it revised the definition of content to specifically exclude the existence
of the communication itself, as well as the identity of the parties involved.
This meant that close scrutiny of calling patterns had become allowable.
One critic argued that
The changes in the law’s definition could lead to specialized surveillance
of the networking patterns of citizens. Computer programs that analyze
telephone traffic information can be applied to the communications of
a political group, a student community or a ghetto to illuminate invisible
social networks and identify key members. Although the government must
apply for a wiretap order to have access to the substance of a telephone
conversation, it can amass a great deal of information without actually
hearing the conversation.
Workplace Privacy
Under the ECPA an employer cannot monitor employee telephone calls or
electronic mail when employees have a reasonable expectation of privacy.
However, the Act does allow employer eavesdropping if employees are notified
in advance or if the employer has reason to believe the company’s interests
are in jeopardy.
A number of cases in the early 1990s involving employee complaints that
their privacy was being violated sparked heated debate over the limits
of corporate surveillance. In 1992 legislators pointed to specific issues
that were inadequately addressed by the ECPA. Suggested supplements to
the ECPA include (1) requiring employers to disclose information about
their monitoring systems to employees and to provide a "beep"
tone whenever communication was being monitored, (2) requiring "all
monitoring to be relevant to work performance," (3) providing "employees
with access to information about their work gained through monitoring,"
and (4) restricting "disclosure and use of resulting data."
Constitutional
Rights vs. Curbing Terrorism
In 1995 the bombing of the Alfred
P. Murrah Federal Building in Oklahoma City prompted further reexamination
of ECPA provisions. President
Clinton proposed that the ECPA be amended to make it easier for law
enforcement officials to conduct roving wiretaps. The bombing also sparked
debate over whether the government should exercise greater control over
information transmitted on the Internet.
Marc Rotenberg, director of the Electronic
Privacy Information Center, criticized emerging proposals like Clinton’s
for seeking "the Holy Grail of absolute surveillance, an aim the
U.S. government has never previously pursued."
Strong anti-terrorist sentiment strengthens the conviction that every
effort should be made to curb the ability of terrorists and other criminals
to avail themselves of the enormous powers of information exchange that
new electronic communication technologies make possible. On the other
hand, privacy and civil liberty advocates
warn that terrorist incidents become convenient excuses to champion policy
that would undermine fundamental Constitutional rights to privacy. The
Electronic Communications Privacy Act of 1986 remains at the center of
ongoing debates about Constitutional privacy issues that are sparked by
rapid innovations in electronic communications technology.
35d
! |
Как писать рефераты Практические рекомендации по написанию студенческих рефератов. |
! | План реферата Краткий список разделов, отражающий структура и порядок работы над будующим рефератом. |
! | Введение реферата Вводная часть работы, в которой отражается цель и обозначается список задач. |
! | Заключение реферата В заключении подводятся итоги, описывается была ли достигнута поставленная цель, каковы результаты. |
! | Оформление рефератов Методические рекомендации по грамотному оформлению работы по ГОСТ. |
→ | Виды рефератов Какими бывают рефераты по своему назначению и структуре. |