Friday, 15 July 2011

Computer email and privacy

 

COMPUTER ELECTRONIC MAIL AND PRIVACY

====================================

by

Ruel T. Hernandez

801 Cedarbend Way

Chula Vista, California 92010

(619) 421-6517 (voice)

(CompuServe: 71450,3341)

(GEnie Mail: R.HERNANDEZ)

January 11, 1987

Copyright (c) 1986, 1987 by Ruel T. Hernandez

 

(This is an edited version of a law school seminar paper I wrote at

California Western School of Law. A another version of the paper, entitled



"Electronic Mail - Your Right to Privacy," by Ruel T. Hernandez as told to

Dan Gookin, was published as the cover story in The Byte Buyer, San Diego's

Microcomputer Magazine, volume 4, number 24, December 5, 1986. That version

may also be found on their BBS at 619/226-3304 or 619/573-0359. Note,

citations to the Electronic Communications Privacy Act of 1986 refer to the

final version passed by the House of Representatives on October 2, 1986,

which was passed by the Senate the day before, as listed in the

Congressional Record.)

 

INTRODUCTION

Two years ago, legislation was introduced into Congress that sought to

provide federal statutory guidelines for privacy protection of computer

communications, such as electronic mail found on commercial computer systems

and on remote computer systems, commonly known as bulletin board systems

(BBS). Old federal wiretap law only gave protection to normal audio

telephonic communications. There was no contemplation of computers or their

operators using telephone lines to communicate. The old federal wiretap law

regulated police interceptions of communications while they are being

transmitted on a telephone line. Before the Electronic Communications

Privacy Act of 1976, the law did not provide guidelines for protecting the

transmitted message once it was stored within a computer system.

 

QUESTIONS

(1) Whether electronic mail and other intended private material stored

within an electronic computer communication system have Fourth Amendment

privacy protection?

(2) Should private electronic mail and other such material be accorded

the protection guidelines as with telephone communication and the U.S. Mail?

 

PROBLEM

Law enforcement seeks criminal evidence stored as E-Mail on either a

local, user-supported BBS, or on a commercial computer service, such as

CompuServe, GEnie or The Source. (Note, this situation is equally

applicable to personal, private data stored on a remote system for later

retrieval, as with CompuServe's online disk storage capabilities.)

For instance, a computer user calls up a computer communication system.

Using the electronic mail function, he leaves a private message that can

only be read by an intended recipient. The message is to inform the

recipient of a conspiracy plan to violate a federal or state criminal

statute. Law enforcement gets a tip about the criminal activity and learn

that incriminating evidence may be found on the computer system.

In 1982, such a situation occurred. (Meeks, Brock, "Life at 300 Baud:

Crime on the BBS Network," Profiles, August, 1986, 12-13.) A Detroit

federal grand jury, investigating a million-dollar cocaine ring, issued a

subpoena ordering a commercial service, The Source, to hand over private

subscriber data files. The files were routinely backed up to guard against

system crashes. The grand jury was looking for evidence to show that the

cocaine ring was using The Source as communication base to send messages to

members of the ring. With such evidence, the grand jury could implicate or

indict those suspected to be a part of the cocaine ring. The Source refused

to obey the subpoena. The prosecution argued The Source could not

vicariously assert a subscriber's privacy rights. Constitutional rights are

personal and could only be asserted by the person whose rights are invaded.

Additionally, if the files containing messages were duplicated, any

reasonable expectation of privacy by users would be extinguished. A court

battle ensued. However, before a ruling could be made, the kingpin of the

cocaine ring entered a surprise guilty plea to federal drug trafficking

charges. The case against the Source was discontinued.

Publicly posted messages and other public material may be easily

retrieved by law enforcement. It is the private material, such as E-Mail,

that poses the problem.

Law enforcement's task is then to gather enough evidence to

substantiate a criminal case. Specifically, they would want the E-Mail, or

other private files, transmitted by suspected criminals. A computer

communications service, as keeper and transmitter of private electronic

messages, would not want to turn over the private data.

 

INADEQUACY OF OLD LAW

Brock Meeks of Profiles magazine noted that as of August, 1986, "no ...

protection exist[ed] for electronic communications. Any law enforcement

agency can, for example, confiscate a local BBS and examine all the message

traffic," including and private files and E-Mail. (Ibid.)

In the next section, case law will be examined and statutory law prior

to the Electronic Communications Privacy Act of 1986 (ECPA) will be noted.

Seemingly applicable statutes, as they stood, provided no guidelines for

privacy protection of electronic computer communication systems, such as

CompuServe, GEnie, and local, user-operated BBSs.

CASE LAW

There is little case law available on computer communications and

Fourth Amendment constitutional problems. (M.D. Scott, Computer Law, 9-9

(1984 & Special Update, August 1, 1984).) If not for the surprise

preemptive guilty plea, the above described Detroit case may have provided

guidance on computer communications and privacy issues.

Of the available cases, Scott noted those that primarily dealt with

financial information found in bank and consumer credit organization

computers. In U.S. v. Davey, 426 F.2d 842, 845 (2 Cir. 1970), the

government had the right to require the production of relevant information

wherever it may be lodged and regardless of the form in which it is kept and

the manner in which it may be retrieved, so long as it pays the reasonable

costs of retrieval. In a California case, Burrows v. Superior Court, 13

Cal. 3d 238, 243, 118 Cal. Rptr. 166, 169 (1974), a depositor was found to

have a reasonable expectation that a bank would maintain the confidentiality

of both those papers in check form originating from the depositor and the

depositor's bank statements and records of those same checks. However, in

U.S. v. Miller, 425 U.S. 435, 440 (1976), customer account records on a

banks' computer were held to not be private papers of the bank customer,

and, hence, there is no Fourth Amendment problem when they are subpoenaed

directly from the bank.

The computer data and information in these cases have more of a

business character in contrast to personal E-Mail found on remote computer

systems such as CompuServe or a local BBS. Under the old law, a prosecutor,

as in the Detroit case, may try to analogize duplicated and backed up E-Mail

to business situations where data on business computer databases are also

backed up. Both types of computer data are stored on a system and then

later retrieved. The provider of the remote computing service or the sysop

would counterargue that the nature of computers always require the

duplication and backup of any computer data, whether the data files are E-

Mail or centrally-based financial or credit data. Duplication does not

necessarily make E-Mail the same as financial or credit data stored in

business computers. Centrally-based business information is more concerned

with the data processing. That information is generally stored and

retrieved by the same operator. E-Mail is more concerned with personal

communications between individuals where the sender transmits a private

message to be retrieved only by an intended recipient. The sender and the

recipient have subjective expectations of privacy that when viewed

objectively is reasonable. Therefore, there is a constitutionally protected

expectation of privacy under Katz v. U.S., 389 U.S. 347, 19 L.Ed. 88 S.Ct.

507 (1967). However, the prosecution would note under California v.

Ciraolo, -- U.S. --, 106 S.Ct. 1809 (1984), the users would have to protect

their electronic mail from any privacy intrusion. The provider or operator

of the remote system has ultimate control of his system. He has complete

access to all areas of the system. He could easily examine the material.

The prosecution would note the user could not reasonably protect his private

data from provider or operator invasion. This "knot-hole" would exclude any

idea of privacy. If there is no privacy, there can be no search and

therefore no Fourth Amendment constitutional violation. Law enforcement can

retrieve the material.

FEDERAL WIRETAP STATUTES

The federal wiretap statutes, before the Electronic Communication

Privacy Act of 1986, protected oral telephone communications from police

interceptions. This protection was made in 1968 in response to electronic

eavesdropping by government. (Cohodas, Nadine, "Congress Races to stay

Ahead of Technology," Congressional Quarterly Weekly Report, May 31, 1986,

1235.) Although E-Mail appears to come under the statute's definition of

"wire communication," under the old law, it was limited to audio

transmissions by wire or cable and does not mention stored computer data.

(18 U.S.C. sec. 2510(1).) The old law required that an interception of a

wire communication be an aural acquisition of the communication. (18 U.S.C.

sec. 2510(4).) Being "aural," the communication must be "heard."

Therefore, a computer communication may come under the old law while being

transmitted. After a caller's message is "sent" on a remote computer

system, the message is then stored within the computer's system. The

communication's conversion into computer stored data, thus no longer in

transmission until retrieved, takes the communication out of the old

statutory protection.

"Eighteen years ago ... Congress could not appreciate - or in some

cases even contemplate - [today's] telecommunications and computer

technology...." (132 Cong. Rec. S7992 (daily ed. June 19, 1986) (statement

of Sen. Leahy).)

CALIFORNIA'S INVASION OF PRIVACY AND WIRETAP STATUTE

California's "invasion of privacy" and wiretap statutes (Cal. Penal

Code sec. 630 et seq.), appears to provide state protection for BBSs.

California Penal Code sec. 637 reads as:

Every person not a party to a telegraphic or telephonic

communication who willfully discloses the contents of a

telegraphic or telephonic message, or any part thereof, addressed

to another person, without the permission of such person, unless

directed so to do by the lawful order of a court, is punishable

by imprisonment in the state prison, or in the count jail not

exceeding one year, or by fine not exceeding five thousand

dollars ($5000), or by both fine and imprisonment.

Again, the question here would be whether "telegraphic or telephonic

messages" include computer communications via modem where a transmitted

message is subsequently stored within a computer awaiting retrieval by its

intended recipient. Again, the storage of the data takes the computer

communications out of the statute. When the statute was passed, the

California legislature, much like the Congress, could not foresee the

technological advances in computer communications.

It should be noted that Assemblywoman Moore introduced legislation in

1985 that would amend have the California state constitution to explicitly

provide state constitutional privacy protection for remote computing

services and their stored information. However, nothing has come out of

this. Aside from political reasons for the lack of further action is one

possible legal consequential argument against the amendment may be if

computer privacy protection is specified in the state constitution, more

litigation may result to tie up the courts in cases deciding whether or not

there is privacy protection for other unspecified matters. Although,

overall, the California state constitution is much more specific than the

United States Constitution, it may be best to not be any more specific with

regard to privacy.

PROTECTION FOR U.S. MAIL

Statutory U.S. Mail protection provides a suggestion for statutory

provisions of privacy protection for E-Mail deposited in electronic

communication systems. The unauthorized taking out of and examining of the

contents of mail held in a "depository for mail matter" before it is

delivered to the mail's intended recipient is punishable by fine,

imprisonment, or both. (18 U.S.C. sec. 1702.)

 

SOLUTION - THE NEW LAW

There are two methods towards a solution: (1) court decisions; and (2)

new legislated privacy protection.

COURT DECISIONS

Courts may have chosen to read computer communications protection into

the old federal wiretap statute or into existing state law. However, they

were reluctant to do so. Courts "are in no hurry to [revise or make new law

in this area] and some judges are openly asking Congress for help....

[F]ederal Appeals Court Judge Richard Posner in Chicago said Congress needed

to revise current law, adding that 'judges are not authorized to amend

statutes even to bring them up-to-date.'" (Cohodas, Nadine, "Congress Races

to Stay Ahead of Technology," Congressional Quarterly Weekly Report, May 31,

1986, p. 1233.)

NEW STATUTE

Last October 21, 1986, President Reagan signed the Electronic

Communications Privacy Act of 1986 amending the federal wiretap law. The

new Act (P.L. 99-508) would not take immediate effect until three months

after the signing - presumably January 21, 1986. (18 U.S.C. secs. 111 and

202.)

When the new law does take effect, it would first provide privacy

protection for any

'electronic communication' ... [by] any transfer of signs,

signals, writing, images, sounds, data or intelligence of any

nature transmitted in whole or in part by a wire, radio,

electromagnetic, photoelectronic or photooptical system that

affects interstate or foreign commerce...."

(18 U.S.C. sec. 2510(10).)

Second, and more importantly for this discussion, ECPA would protect

"stored wire and electronic communications," i.e. E-Mail stored and backed

up on disk or tape on an electronic computer communication system. (18

U.S.C. sec. 2701(a)(1) and (2).) The legislation makes it a federal

criminal offense to break into any electronic system holding copies of

messages or to exceed authorized access to alter or obtain the stored

messages. (Ibid.)

The legislation would protect electronic computer communication systems

from law enforcement invasion of user E-Mail without a court order. (18

U.S.C. sec. 2703.) Although the burden of preventing invasion of the E-Mail

is placed on the subscriber or user of the system, the government must give

him notice allowing him fourteen days to file a motion to quash a subpoena

or to vacate a court order seeking disclosure of his computer data. (18

U.S.C. sec. 2704(b).) However, the government may give delayed notice when

there are exigent circumstances as listed by the Act (18 U.S.C. sec. 2705.)

The legislation gives a civil cause of action to the provider or

operator, subscriber, customer or user of the system aggrieved by an

invasion of private material stored in the system in violation of ECPA. (18

U.S.C. sec. 2702; see also 18 U.S.C. sec. 2520.) If the provider or

operator has to disclose information stored on his system due to a court

order, warrant, subpoena, or certification under ECPA, there can be no cause

of action against him by any person aggrieved by such disclosure. (18

U.S.C. sec. 2703(e); see also sec. 2702(b).)

The electronic communications, under this new Act, must be sent by a

system that "affects interstate or foreign commerce." (18 U.S.C. sec.

2510(12).) The "electronic communications" may practically be limited to

electronic communications sent by common carrier telephone lines.

There may be some question as to whether or not ECPA is confined to

commercial systems and does not cover user-operated bulletin board systems.

That would be similar to arguing the old federal wiretap law was confined to

long distance communications and not to local telephone calls. The House

report (H.R. No. 647, 99th Cong. (1986)), indicates user-operated BBSs are

intended to be covered by the Act. The House noted a difference between

commercial subscription systems and user-operated BBSs readily accessible by

the public. However, it also noted the different levels of security found

on user-operated BBSs, i.e. the difference between system areas containing

private electronic mail and other areas containing public information.

Electronic communications that the operator attempts to keep confidential

would be protected by ECPA, while there would be no liability for access to

features configured to be readily accessible by the general public.

Language in the Act also refers to "the person or entity providing the wire

or electronic communication service." Such language may be seen to indicate

the inclusion of individuals who operate a BBS. (18 U.S. secs. 2701(c)(1)

and 2702(a)(1) and (b).) Additionally, a remote computing service was

defined in the Act as an electronic communications system that provides

computer storage or processing services to the public. (18 U.S.C. sec.

2710(2).) This would certainly be applicable to a user-operated BBS that

is easily accessible to public with the simple dialing of a telephone number

by a modem-equipped computer. On the political side, Senator Leahy, a

principal sponsor of the Act was reported to have been "soliciting [users

and operators' of BBSs] comments and encourage sensitivity to the needs of

BBS's in the legislation.... They are ... willing to listen to our side of

things." (BBSLAW02.MSG, dated 07/24/85, information from Chip Berlet,

Secretary, National Lawyers Guild Civil Liberties Committee, transmitted by

Paul Bernstein, SYSOP, LAW MUG, Chicago, Illinois 312/280-8180, regarding

Federal Legislation Affecting Computer Bulletin Boards, deposited on The

Legacy Network 213/553-1473.)

 

CONCLUSION

Electronic mail stored on computer communication systems have Fourth

Amendment constitutional privacy protection. Unfortunately, before the

Electronic Communications Privacy Act of 1986, such protection was not

articulated by federal or state statutory guidelines. Case law also did

not provide any helpful guidance. The peculiarities of computers and

computer storage posed problems which were not addressed by the old wiretap

laws. They were also problems overwhelmed by constitutional privacy law as

defined by the United States Supreme Court. A legislative solution was

required and was provided for by ECPA.

[For more information on ECPA, see 132 Cong. Rec. H8977 (daily ed.

October 2, 1986) or "Major Provisions of 1986 Electronic Privacy Act,"

Congressional Quarterly Weekly Report, October 11, 1986, 2558.]

No comments:

Post a Comment