Computers, Privacy & the Constitution

View   r2  >  r1  ...
MayaWakamatsuFirstPaper 2 - 10 Apr 2022 - Main.EbenMoglen
Line: 1 to 1
 
META TOPICPARENT name="FirstPaper"
Deleted:
<
<
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
 

Issues on the Electronic Communications Privacy Act and Possible Solutions

Line: 38 to 37
 In conclusion, I believe that we can protect our privacy by amending ECPA and introducing personal servers at home.
Added:
>
>
The explanation of the difficulties with mail left on IMAP servers is confusing, not to mention your discussion of metadata. In writing about a statute it's always a good idea to start from the text of the statute itself. You can then state concisely what's amiss and sh9w how the California Act models what might be done federally. (You don't explain why if it is both necessary and easy, it doesn't happen.)

You discuss the benefits of setting up a personal mail server, but you don't offer the reader show much as a reference about how to do it. Why don't you take the opportunity while you are here to learn how yourself, so that you can teach other people? If it's a good thing to do, why not do it?

 
You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

MayaWakamatsuFirstPaper 1 - 12 Mar 2022 - Main.MayaWakamatsu
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="FirstPaper"
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Issues on the Electronic Communications Privacy Act and Possible Solutions

-- By MayaWakamatsu - 12 Mar 2022

1. Introduction

It is said that the Electronic Communications Privacy Act (ECPA) has some issues because of the gap between the current circumstances of information technology and the provisions of ECPA (Orin S. Kerr, The Next Generation Communications Privacy Act, 162 U. PA. L. REV. 373, 384 (2014) https://scholarship.law.upenn.edu/cgi/viewcontent.cgi?article=1546&context=penn_law_review). The dichotomy adopted by ECPA since its enactment in 1986 may not be appropriate for the current situation.

2. Issues on ECPA

Under ECPA, content information and non-content information are separated and regulated separately. Non-content information is subject to lesser restrictions than actual content (https://epic.org/ecpa/). Under ECPA, non-content information -subscriber records or transactional details about communications- can generally be obtained without a warrant, pursuant to an administrative subpoena, whereas ECPA requires government agencies to obtain a warrant when they access to content information. Another dichotomy is the distinction between the acquisition of real-time communications and the acquisition of stored communications. Under the Stored Communications Act, the government is able to access to many kinds of stored communications without a warrant, whereas ECPA requires government agencies to obtain a warrant when they obtain real-time information. This was a meaningful distinction at the time of the enactment of the law, when there was little information stored, but today, with the spread of the Internet and low-cost or free storage services, a lot of data is stored on the provider's servers, and it is difficult to distinguish between them.

3. Possible Solutions

3.1. California Electronic Communications Privacy Act

In contrast to ECPA, California Electronic Communications Privacy Act (CalECPA? ) provides stricter procedures. Except in emergencies when there is a threat to life or health, CalECPA? prohibits a government entity from compelling the production of, or access to, electronic communication information or electronic device information without a warrant. In addition, notice must be served upon or delivered to the identified targets of the warrant or emergency request (https://www.lawfareblog.com/so-whats-california-electronic-communications-privacy-act). For example, under CalECPA? , location-based information stored by cell phone companies is treated uniformly as a type of electronic facility information, regardless of whether it is stored in a third party's electronic facility or their personal electronic facility. State government departments must always request disclosure of location-based information stored by cellular phone companies with a warrant. In addition, the scope of the information sought and the nature of the research activities in which this information will be used must also be communicated to the identified targets of the warrant. CalECPA? applies only to California law enforcement officers, and it is clear that CalECPA? 's regulations are stricter than ECPA’s regulations concerning search on information. I believe that ECPA can fill the gap between the current circumstances of information technology and the provisions of the law by amending provisions to require government agencies to obtain a warrant when they access to non-content information or stored information.

3.2. Introducing Personal Servers at Home

I believe that ECPA should be amended as above mentioned, but I would like to think about another way to protect our privacy. Nowadays, many people use services like email, calendar, and SNS which are provided for free by firms like Google, Apple, or Facebook. Their data is collected, stored, and surveilled by the firms. If the government searches on information stored in the firms without a search warrant, our privacy will be threatened. As above mentioned, with the spread of the Internet and low-cost or free storage services, a lot of data is stored on servers, it is difficult to distinguish between content information and non-content information, or between real-time communication and stored communication. If we introduce personal servers at home rather than giving our information to the firms, government agencies need a search warrant to access to our data on personal servers at home under the Fourth Amendment. In this way, we can protect our privacy from government agencies and private firms.

4. Conclusion

In conclusion, I believe that we can protect our privacy by amending ECPA and introducing personal servers at home.


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.


Revision 2r2 - 10 Apr 2022 - 17:38:33 - EbenMoglen
Revision 1r1 - 12 Mar 2022 - 07:00:09 - MayaWakamatsu
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM