Email Privacy Tops Tech Agenda at Judiciary Committee
- 16 January, 2013 21:10
When the Senate convenes next week for the first session of the 113th session Congress, the head of the Judiciary Committee plans to renew the push to strengthen email privacy protections.
In an address at the Georgetown University Law Center, committee chairman Patrick Leahy (D-Vt.) announced that a reform of the 1986 Electronic Communications Privacy Act (ECPA) will be his top technology priority for the panel in the coming year.
"I'll keep pushing to update our privacy laws to address emerging technology and the Internet," Leahy said.
You Got a Warrant?
Advocates of reforming ECPA-- and there are many in the technology sector--argue that the law does not provide adequate protections for Internet users in the 21st century, and that interpretations of the statute have led to nonsensical distinctions between communications transmitted and stored in the cloud and those housed locally on a computer, among other concerns.
For instance, under ECPA, law-enforcement officials have been able to access emails stored remotely with a cloud-service provider that are more than six months old on the authority of a subpoena, rather than a warrant issued by a judge.
In November 2012, the Judiciary Committee passed legislation that Leahy authored updating ECPA to require a warrant based on probable cause to access communications from Webmail providers and ending the 180-day distinction for government access to email and other digital files stored in the cloud.
Leahy said that at that late date in the session, with holidays and the debate over the fiscal cliff looming, he did not expect the ECPA reform legislation to move further, but instead that he wanted to signal that email privacy remains one of his chief legislative priorities.
"We knew it would not go on the floor but I did want to lay down the marker as a way of telling everybody it's coming back up again," he said.
"Nobody questions the fact that if a police agency wants to go into your home, open your files, papers and read through them, they're going to have to have a search warrant. I question the willingness to have a different view when they can do it from a hundred miles away with a keystroke," he added.
ECPA reform proposals have come under fire from critics who warn against provisions they say would hinder the ability of law enforcement authorities to conduct effective investigations.
Leahy has acknowledged some of those concerns in his legislation, allowing that government authorities should be able to seek permission from a court to delay notifying a suspect about a warrant in a sensitive investigation for up to six months. But the bedrock principal of the reform effort--that access to electronic communications must be obtained through a warrant issued by a judge--remains controversial.
"It is going to be a fight, but I think people are realizing they don't have to give up their ability to use the Internet and everything else while at the same time guarding their freedom," Leahy said. "Those are broad-brush answers, I realize, but we are going to bring it back this year and it's also one of the things that helped my decision to stay as chair of the Judiciary Committee."
Leahy did not indicate when he plans to bring ECPA reform back to the committee's agenda, though he said that comprehensive immigration reform will be among the first issues the panel considers, with hearings planned for next month.
The Obama administration has also signaled that it plans to push for immigration reform in the president's second term, and any overhaul would likely include efforts to expand access to high-skilled, foreign-born workers, a long-standing priority of the technology industry writ large.
Judiciary Committee's Crowded Agenda
Leahy identified a number of other issues on his crowded policy agenda for the Judiciary Committee, beginning with a hearing this month on gun violence, as well as benefits for first responders, oversight of the administration's counter-terrorism programs and the reauthorization of the Violence Against Women Act.
Notably absent from the technology agenda that Leahy described was any mention of legislation to strengthen protection of copyrights and other intellectual property. In the last Congress, Leahy had backed the Protect IP Act (PIPA), a bill aimed at curbing online copyright infringement.
That measure, along with a slightly different House bill, the Stop Online Piracy Act (SOPA), became a lightning rod for controversy, with digital-rights advocates and prominent websites like Wikipedia and Reddit warning that the bills would lead to the restriction of lawful online content and eventually participating in a day of protest when they and scores of other sites went dark.
That groundswell of opposition effectively killed the bills, which were strongly backed by anti-piracy groups representing the movie and music industries, among others. Many lawmakers who had supported PIPA and SOPA have since backed away from the issue, and Leahy gave no indication that he intends to renew the fight for tougher online copyright laws in the coming session.
Read more about government in CIO's Government Drilldown.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Governance For All - Empowering IT and Business Content Owners
Governance for all is more than an IT initiative or a goal written in a plan document; it’s a strategy that unites IT and business content owners to achieve their SharePoint goals. At its best, governance means empowering self-governance, with tools like delegated access, effective reporting, and automated policy enforcement. This white paper explains how to create a “governance for all” strategy that will enhance SharePoint adoption and its benefits to the organization. Read now.
Batten Down the Hatches! A Guide to Protecting Data in Motion
The risks facing high-speed data networks and unencrypted data while in motion are very real and on the rise. As information becomes one of the most valuable ‘off balance sheet’ assets, protection of that information and the investment in it is a paramount obligation of office-holders and management. Read now for a better understanding of the risks to data in motion.
Russian Underground 101
This research paper intends to provide a brief summary of the cybercriminal underground and shed light on the basic types of hacker activity in Russia. It discusses fundamental concepts that Russian hackers follow and the information they share with their peers. It also examines prices charged for various types of services, along with how prevalent the given services are in advertisements. The primary features of each type of activity and examples of associated service offerings are discussed as well. Read this paper.