Entry
Reader's guide
Entries A-Z
Subject index
Electronic Communications Privacy Act
The U.S. Electronic Communications Privacy Act (ECPA) of 1986 was created in order to address privacy issues surrounding the pervasiveness of computers and databases in the government and the workplace. Its major provisions include extending privacy protection to email, voice mail, and remote computing services. It has been criticized for allowing law-enforcement agencies easier access to consumer records, and for allowing a certain amount of employer surveillance. Debates have more recently focused on whether its extension of law-enforcement monitoring of private communications could undermine the constitutional right to privacy.
Before the ECPA was enacted in 1986, electronic surveillance was covered by Title III of the Omnibus Crime Control and Safe Streets Act of 1968, also known as the Federal Wiretap Act. Because the wiretap law did not consider electronic technologies, both industry and civil-liberty groups urged Congress to update the law. It was believed that strengthening privacy through ECPA would create a principle that privacy is beneficial for both consumers and businesses. Signed into law by President Reagan on October 21, 1986, and effective January 20, 1987, the ECPA expanded privacy protection to radio pagers, electronic mail, cellular telephones, private-communication carriers, and computer transmissions.
Under the ECPA, privacy protection was extended to all carriers, private and branch telephone exchanges, and local area networks. Under the Stored Communications provisions of the ECPA, the contents of stored email, voicemail, and remote computing services are protected. These provisions protect email from unauthorized access, alteration, and disruption, as well as from unauthorized disclosure without the lawful consent of the originator of the communication. The ECPA also restricts government access to customer and subscriber records, and requires government entities to acquire a search warrant, court order, or subpoena to access any service-provider records without the prior notification of the customer or subscriber.
Criticism of the ECPA has focused on its potential threats to civil liberties. In particular, critics are worried that more and varied law-enforcement agencies have easier access to customer and subscriber information records, that the federal infringement of privacy under the guise of electronic surveillance has increased, and that there could be a possible increase in the surveillance of citizens who have been targeted as members of particular political groups.
Workplace privacy has also been a concern, as the ECPA, although not allowing employers to monitor employee email or telephone calls, does allow employers to eavesdrop on their employees if they are notified in advance, or if there is reason to suspect that the employers' interests are being jeopardized.
One of the first major decisions under the ECPA was the 1993 ruling in Steve Jackson Games Incorporated, et al., vs. United States Secret Service, United States of America, et al. In this case, the court ruled that the U.S. Secret Service had violated the ECPA when it seized computer equipment belonging to Steve Jackson, believing that he was involved in software theft from BellSouth. Of particular interest in this case is the judge's ruling that the ECPA was violated when agents seized a computer containing private, stored emails.
After the Oklahoma City bombing in 1995, proposals were made to reinforce the wiretap laws so that law enforcement would have easier access to electronic records. Two recent court cases demonstrate the increasing complexity of email privacy.
...
- Art, Music, and Performance
- Business and Commerce
- http://Amazon.com
- http://MP3.com
- Business-to-Business
- Cookies
- Customer Relationship Management
- Digital Cash
- Disintermediation
- E-Commerce
- Harold Innis
- Internet Service Providers
- Jakob Nielsen
- Jeff Bezos
- Knowledge Management
- Local Area Network
- Margaret Whitman
- Metrics
- Napster
- Narrowcasting
- Personalization
- Peter Drucker
- Security
- Stephen M. Case
- Steven P. Jobs
- Telecommuting
- Trademark
- Video Conferencing
- William H. Gates, III
- Cyberculture
- “A Manifesto for Cyborgs”
- Neuromancer
- The New Hacker's Dictionary
- The Soul of a New Machine
- Understanding Media: The Extensions of Man
- Allucquère Rosanne Stone
- Avatar
- Blog
- Bruce Sterling
- CommuniTree
- Convergence
- Cyberculture
- Cyberethics
- Cyberfeminism
- Cyberpunk
- Cyberspace
- Cyberwarfare
- Donna J. Haraway
- Electronic Civil Disobedience
- Electronic Democracy
- Electronic Frontier Foundation
- Emoticons
- Esther Dyson
- Gender and New Media
- Habitat
- Hacking, Cracking, and Phreaking
- Hacktivism
- Howard Rheingold
- Instant Messaging
- Interactvity
- John Perry Barlow
- Killer Application
- LambdaMOO
- Marshall McLuhan
- Meme
- Metrics
- Mitchell Kapor
- Nicholas Negroponte
- Online Journalism
- Peer-to-Peer
- Race and Ethnicity and New Media
- Sherry Turkle
- Virtual Community
- William Gibson
- Hacking
- 2600: The Hacker Quarterly
- The New Hacker's Dictionary
- CommuniTree
- Computer Emergency Response Team
- Copyleft
- Cyberculture
- Cyberethics
- Cyberwarfare
- DeCSS
- Electronic Civil Disobedience
- Electronic Frontier Foundation
- Encryption and Cryptography
- Eric Raymond
- Hacking, Cracking, and Phreaking
- Hacktivism
- John Perry Barlow
- Mitchell Kapor
- Richard Stallman
- Security
- Virus
- Legal Topics
- 2600: Hacker Quarterly
- Bernstein vs. the U.S. Department of State
- United States vs. Thomas
- Anonymity
- Carnivore
- Child Online Protection Act and Child Online Privacy Protection Act
- Communications Decency Act
- Copyleft
- Copyright
- DeCSS
- Digital Millennium Copyright Act
- Electronic Civil Disobedience
- Electronic Communications Privacy Act
- Electronic Frontier Foundation
- Hacking, Cracking, and Phreaking
- Linking
- Napster
- Obscenity
- Pamela Samuelson
- Privacy
- Security
- Networks and Networking
- ARPANET
- BITNET
- Broadband
- Browser
- Bulletin Board Systems
- Cellular Telephony
- CommuniTree
- Community Networking
- Distributed Computing
- Firewall
- Freenet (Community Network)
- Freenet (File-Sharing Network)
- Internet
- Internet Appliances
- Internet Corporation for Assigned Names and Numbers
- Internet Engineering Task Force
- Internet Relay Chat
- Internet Service Providers
- LISTSERV
- Local Area Network
- Marc Andreessen
- Markup Languages
- Minitel
- MUDs and MOOs
- Napster
- Newsgroups
- Peer-to-Peer
- PLATO
- Satellite Networks
- Short Messaging System
- Telephony
- Tim Berners-Lee
- Usability
- vBNS
- Videotex
- Whole Earth ‘Lectronic Link’
- Wireless Application Protocol
- Wireless Networks
- World Wide Web
- Open-Source Software
- Organizations and Labs
- Association for Computing Machinery
- Computer Emergency Response Team
- Electronic Frontier Foundation
- Institute of Electrical and Electronic Engineers
- Internet Corporation for Assigned Names and Numbers
- Internet Engineering Task Force
- Media Lab, Massachusetts Institute of Technology
- SIGGRAPH
- SRI International
- World Wide Web Consortium
- Xerox Palo Alto Research Center
- People
- Alan Kay
- Alan Turing
- Allucquère Rosanne Stone
- Anita Borg
- Bill Joy
- Brenda Laurel
- Brian Eno
- Bruce Sterling
- Claude Shannon
- Daniel Sandin
- Donna Hoffman
- Donna J. Haraway
- Douglas Englebart
- Edward Tufte
- Eric Raymond
- Esther Dyson
- George Lucas
- Hal Varian
- Hans Moravec
- Harold Innis
- Howard Rheingold
- Ivan Sutherland
- J. C. R. Licklider
- Jakob Nielsen
- Jaron Lanier
- Jeff Bezos
- John Carmack
- John Perry Barlow
- John von Neumann
- Kai Krause
- Laurie Anderson
- Lawrence Lessig
- Manuel Castells
- Marc Andreessen
- Margaret Whitman
- Marshall McLuhan
- Marvin Minsky
- Michael Joyce
- Mitchell Kapor
- Nam June Paik
- Nicholas Negroponte
- Pamela Samuelson
- Pattie Maes
- Peter Drucker
- Raymond Kurzweil
- Richard Stallman
- Robert Moog
- Rodney Brooks
- Seymour Papert
- Sherry Turkle
- Stephen M. Case
- Steven P. Jobs
- Stewart Brand
- Theodor Holm (Ted) Nelson
- Thomas DeFanti
- Tim Berners-Lee
- Vannevar Bush
- Vinton Cerf
- W. Daniel Hillis
- William Gibson
- William H. Gates, III
- Social Issues
- Access
- Anonymity
- Carnivore
- Cyberethics
- Cyberfeminism
- Cyberwarfare
- Digital Divide
- Disposal of Computers
- Education and Computers
- Electronic Civil Disobedience
- Electronic Democracy
- Encryption and Cryptography
- Gender and New Media
- Hacking, Cracking, and Phreaking
- Hacktivism
- Obscenity
- Patent
- Privacy
- Race and Ethnicity and New Media
- Security
- Spam
- Technological Determinism
- Universal Design
- Virtual Community
- Technology
- ARPANET
- Authoring Tools
- Bluetooth
- Broadband
- Browser
- Bulletin Board Systems
- Carnivore
- CAVE
- CD-R, CD-ROM, and DVD
- Cellular Telphony
- Chat
- Codec
- Compression
- Computer-Supported Collaborative Work
- Content Filtering
- Cookies
- DeCSS
- Desktop Video
- Digital Asset Management
- Digital Subscriber Line
- Digital Television
- Distributed Computing
- Emulation
- Encryption and Cryptography
- Expert Systems
- Firewall
- Flash
- Graphical User Interface
- Habitat
- Hypermedia
- Hypertext
- Instant Messaging
- Interactive Television
- Internet
- Internet Appliances
- Internet Relay Chart
- Java
- Linux
- Local Area Network
- Markup Languages
- MIDI
- Minitel
- MP3
- MPEG
- Object-Oriented Programming
- Optical Character Recognition
- Optical Computing and Networking
- Peer-to-Peer
- Personal Digital Assistants
- Photoshop
- Qube
- Robotics
- Satellite Networks
- Shockwave
- Short Messaging System
- Sketchpad
- Software Agents
- Streaming Media
- Telecommuting
- Telephony
- vBNS
- Videoconferencing
- Videotex
- Virus
- Wireless Application Protocol
- Wireless Networks
- World Wide Web
- Writing
- “A Manifesto for Cyborgs”
- “As We May Think”
- “Man-Computer Symbiosis”
- “The Cathedral and the Bazaar”
- 2600: The Hacker Quarterly
- Neuromancer
- The New Hacker's Dictionary
- The Soul of a New Machine
- Understanding Media: The Extensions of Man
- Bruce Sterling
- Cyberpunk
- Electronic Publishing
- Emoticons
- Hypertext
- Michael Joyce
- William Gibson
- Loading...
Get a 30 day FREE TRIAL
-
Watch videos from a variety of sources bringing classroom topics to life
-
Read modern, diverse business cases
-
Explore hundreds of books and reference titles
Sage Recommends
We found other relevant content for you on other Sage platforms.
Have you created a personal profile? Login or create a profile so that you can save clips, playlists and searches