---------------------------------------------------------------------------------------------------------
"The right of the people to be secure in their persons, houses, papers and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."
Email privacy
As long as there is email, there will be questions concerning its privacy. The origins of the Fourth Amendment date back to c. 1754 when British tax collectors were given the powers to search homes and private records of colonists. It is this amendment which guarantees privacy. There are a number of laws which have been enacted specifically to provide clarity and protection given by this original law. To discuss them in detail is not in the scope of this book, but some summarizations will be stated below.
The Electronic Communications Privacy Act ("ECPA") was enacted in 1986 to define federal electronic eavesdropping provisions. It was intended to create "a fair balance between the privacy expectations of citizens and the legitimate needs of law enforcement." Congress also sought to address new technologies by assuring that personal information would remain safe.
Type of Communication | Required for Law Enforcement Access | Statute |
Email in transit | Warrant | 18 U.S.C.§ 2516 |
Email in storage on home computer | Warrant | 4th Amendment, US Constitution |
Email in remote storage, opened | Subpoena | 18 U.S.C.§ 2703 |
Email in remote storage, unopened, stored for 180 days or less | Warrant | 18 U.S.C.§ 2703 |
Email in remote storage, unopened, stored for more than 180 days | Subpoena | 18 U.S.C.§ 2703 |
In addition to the specific government exceptions outline above, there is other information that the government is empowered to collect from communications providers in the form of customer records. Under § 2703, an administrative subpoena, a National Security Letter ("NSL"), can be served on a company to compel it to disclose basic subscriber information. Section 2703 also allows a court to issue an order for records; whether an NSL or court order is warranted depends upon the information that is sought.
Pen registers/trap and trace
Pen registers and trap and trace devices only provide the origin and destination of email and other communications. The Supreme Court has held that there is no reasonable expectation of privacy of this information because the service provider has access to it. The company must utilize this information to ensure the communications are properly delivered. The Pen-Register Act covers pen registers/trap and trace. Because email subject lines contain content, their use on emails, per revision in the USA Patriot Act, must include the sender and addressee, but not necessarily the subject. IP addresses and port numbers associated with the communication are not exempted by the Act. The Pen-Register Act specifically applies to hardware that captures content. ECPA generally prohibits the installation or use of any device that serves as a pen register or trap or trace. Amendments in the USA Patriot Act encompass software as well.
Here are to answer's to the last blog's quiz:
Which country has the highest percentage of spam email servers?
1.) China
2.) Taiwan
3.) United States
4.) Israel
5.) India
What percentage of total units is this?
1.) 25%
2.) 33%3.) 51%
4.) 68%
5.) 85%
The answers are Taiwan which has 68% of the world's spam servers.
__________________________________________________________________________
Today's question/fact is:
According to about.com, what is the average size of an email?
1.) 25k
2.) 50k
3.) 75k
4.) 250k
5.) 500+k
Answers will appear in the next blog.
No comments:
Post a Comment