{"id":1589,"date":"2012-10-22T20:10:15","date_gmt":"2012-10-23T00:10:15","guid":{"rendered":"http:\/\/journals.law.harvard.edu\/hlpr\/?p=1589"},"modified":"2015-10-02T15:22:31","modified_gmt":"2015-10-02T15:22:31","slug":"our-quaint-electronic-privacy-protections","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/lpr\/2012\/10\/22\/our-quaint-electronic-privacy-protections\/","title":{"rendered":"Our Quaint Electronic Privacy Protections"},"content":{"rendered":"<p><em>By\u00a0Mark Wilson<\/em><\/p>\n<p><em>The email! It burns!<\/em><\/p>\n<p>The Electronic Communications Privacy Act of 1986 (ECPA) is only one year older than my little sister. But at least she knows what email is. The ECPA still does not. In fact,\u00a0the 1980s Honeywell advertisement at left (\u201c<a href=\"https:\/\/web.archive.org\/web\/20121022134700\/http:\/\/hlpronline.com\/wp-content\/uploads\/sites\/89\/2012\/10\/honeywell_email_ad_1977.jpg\">What the heck is Electronic Mail?<\/a>\u201c) pretty much sums up the\u00a0<em>current<\/em>\u00a0state of constitutional protection for stored electronic communications.<br \/>\n<!--more--><br \/>\nThe Stored Communications Act (SCA), a subsection of the ECPA, grants full Fourth Amendment protection to data that has been in electronic storage for\u00a0<em>less than<\/em>180 days. More than 180 days? You can get that with an administrative subpoena. The thinking back in 1986 was that most electronic storage providers routinely erased customer information after six months because data retention was so expensive. Therefore, said Congress, it must be that someone who has something in electronic storage that long must not care about it. Those data are going to be erased, anyway, so why grant constitutional protection to them?<\/p>\n<p>Fast forward to a future where even the \u201cfast forward\u201d metaphor is antiquated, and data retention is exactly the opposite. Hard disks are cheap,\u00a0<em>cheap<\/em>,\u00a0<em>cheap!<\/em>\u00a0Online services like Mobi want you to pay them to back up\u00a0<em>your entire computer<\/em>. Google hands out multiple gigabytes of online storage like they\u2019re\u00a0perfume samples.\u00a0We\u2019ve come a long way, baby.<\/p>\n<p>The SCA, however, has not. In a Kafkaesque twist of fate, the emails that we would most like to keep private \u2014 the ones we keep forever \u2014\u00a0<a href=\"https:\/\/web.archive.org\/web\/20121022134700\/http:\/\/thehill.com\/opinion\/op-ed\/189737-get-a-warrant-congress-must-act-to-protect-privacy-in-digital-age-\">are the ones with the fewest privacy protections<\/a>. But take heart! There\u2019s one group of people that is not complaining: federal prosecutors. When it comes to seizing data, the administrative subpoena standard of \u201crelated to an ongoing investigation\u201d lets the Feds comb through as much email as they want with a\u00a0<em>de minimis<\/em>\u00a0showing of necessity. The Justice Department\u2019s\u00a0<a href=\"https:\/\/web.archive.org\/web\/20121022134700\/http:\/\/www.judiciary.senate.gov\/pdf\/11-4-6%20Baker%20Testimony.pdf\">official position<\/a>\u00a0is that strengthening constitutional protections will have dire consequences.<\/p>\n<p>But at least one federal court decided that something was wrong, here. In 2010, the Sixth Circuit, in a fascinating case of \u201cmale enhancement pill\u201d mail and wire fraud called\u00a0<a href=\"https:\/\/web.archive.org\/web\/20121022134700\/http:\/\/www.ca6.uscourts.gov\/opinions.pdf\/10a0377p-06.pdf\"><em>U.S. v. Warshak<\/em><\/a>, took a searching look at the SCA, which allowed the government access to the email Warshak stored in his Hotmail account. Applying the test from\u00a0<em>Katz v. U.S.<\/em>, the Court concluded that we do have a subjective expectation of privacy in our remotely-stored email, and yes, that\u2019s an expectation society was willing to recognize. Unfortunately, this is the law only in the Sixth Circuit.<\/p>\n<p>Last month, however, Rep. Zoe Lofgren introduced\u00a0<a href=\"https:\/\/web.archive.org\/web\/20121022134700\/http:\/\/thomas.loc.gov\/home\/gpoxmlc112\/h6259_ih.xml\">H.R. 6259<\/a>, which aims to provide email with full Fourth Amendment protections by striking that 180-day distinction.. That means no more administrative\u00a0subpoena; if the governments wants to see your email, it needs to get a warrant. The Justice Department, which argues that they need\u00a0the\u00a0unconstitutional\u00a0provisions of the SCA in order to do their jobs,\u00a0certainly is not wrong. Law enforcement would be much easier if police could barge into our homes and search whatever they wanted. But that\u2019s not really what the Constitution permits.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By\u00a0Mark Wilson The email! It burns! The Electronic Communications Privacy Act of 1986 (ECPA) is only one year older than [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2],"tags":[],"class_list":["post-1589","post","type-post","status-publish","format-standard","hentry","category-blog"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/peZQka-pD","_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/lpr\/wp-json\/wp\/v2\/posts\/1589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/lpr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/lpr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/lpr\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/lpr\/wp-json\/wp\/v2\/comments?post=1589"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/lpr\/wp-json\/wp\/v2\/posts\/1589\/revisions"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/lpr\/wp-json\/wp\/v2\/media?parent=1589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/lpr\/wp-json\/wp\/v2\/categories?post=1589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/lpr\/wp-json\/wp\/v2\/tags?post=1589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}