Verified Document

What Did The ECPA Do To Limit Law Enforcement  Essay

¶ … Electronic Privacy Control Act of 1986 address? The ECPA addressed a variety of issues regarding the collection of information by government agencies using electronic devices. For instance, it placed more restrictions on wire tapping, such as the transmission of data via computer. It also addressed issues regarding the retrieval of data stored on a drive and the use of pen traps for tracing phone calls.

In actuality, however, the Act addressed the needs of government agencies to have permission to tap into communications and stored data files of networks and providers. The Act allowed such agencies to request warrants to obtain such information by broadening the list of crimes for which said collection methods could be lawfully used. So while technically the Act was said to place new limits on law enforcement "snooping," it actually expanded those limits in terms of the justification that could be used to request a warrant.

How many titles are there in the Act?

There were 3 titles in ECPA: Title I, or the Wiretap Act; Title II, or the Stored Communications Act; and Title III, or the Pen Register Act, which addressed the lawful usage of pen registers, traps, and tracing devices.

3. Explain what each of the titles covers.

Title I, or the Wiretap Act, covered the prohibition of any "procurement" of any kind (intentional, attempted, actual), or of any attempt to intercept "any wire, oral, or electronic communication" (ECPA, 1986). Also prohibited is the use as evidence of any such illegally procured communication.

Title II, or the Stored Communications Act, covers the protection of service providers' stored files...

These devices do not record actual communications, only the origin/destination of the second party. Nonetheless, a court order must be obtained by the agency wishing to employ such technology in the gathering of information pertaining to a subject under surveillance. The agency must certify that the data to be collected is important to the investigation of the said subject.
4. List any exceptions and amendments to the original Act of 1986.

Exceptions to Title I consist of the following: Operators and providers who are required to collect information as part of the normal procedure of business are exempted. Also, operators authorized to intercept by the Foreign Intelligence Surveillance Act (FISA) are exempted. Also, officers of Federal, State and other levels are supplied a procedure for obtaining the authority to intercept by a judge who can provide a warrant good for 30 days, provided the officer shows that there exists a probable cause that the tap will turn up crucial evidence of a "particular offense" as stated in Section 2516 (ECPA, 1986).

The ECPA was amended in 1994 by the Communications Assistance to Law Enforcement Act (CALEA) and again in 2001 by the U.S.A. Patriot Act, and again in 2006 by the U.S.A. Patriot Reauthorization Acts as well as by, in 2008,…

Sources used in this document:
References

ECPA. (1986). Cornell University Law School. Retrieved from https://www.law.cornell.edu/uscode/text/18/part-I/chapter-119

Helft, M., Miller, C. (2011). 1986 Privacy Law is Outrun by the Web. New York Times.

Retrieved from http://www.nytimes.com/2011/01/10/technology/10privacy.html?hp&_r=0

Introduction to ECPA. (2015). Electronic Privacy Information Center. Retrieved from https://epic.org/privacy/ecpa/
Retrieved from https://it.ojp.gov/PrivacyLiberty/authorities/statutes/1285
Cite this Document:
Copy Bibliography Citation

Related Documents

Telecommunications Law the USA Patriot
Words: 7930 Length: 25 Document Type: Thesis

The law's intended purpose of preventing and detecting future attacks was the dominant concern of lawmakers. Yet, the hasty manner in which the law passed through Congressional lawmaking processes causes opponents to argue that lawmakers gave disproportionate consideration to the law enforcement and intelligence community's viewpoint in drafting the provisions. It is thought that in the future the law will face many challenges in the court system. Even though

Contact Me Before Assigning to Another Writer.
Words: 1118 Length: 3 Document Type: Essay

CONTACT ME BEFORE ASSIGNING TO ANOTHER WRITER. The Role Federal Agencies Fighting Digital Crime in United States, a number law enforcement agencies, including Secret Service, FBI, Department Homeland Security,, roles fight computer crimes terrorism. Law enforcement can be understood as a thorough process in which the police act step-by-step and enforce the law in order to ensure justice and the decrease of crime. Precise and adequate investigation is what marks

Information Technology - Legal Issues
Words: 1129 Length: 3 Document Type: Term Paper

77). Electronic privacy law applies to employment and business records and information management in the workplace, with different rights and regulations depending on the specific communications medium involved. Generally, employee privacy rights to e-mail systems and telephone message recording and retrieval systems are determined by the employment contract or by the employment policies of the employer and are not subject to legal disputes initiated by employees ((Halbert & Ingulli p.78-80). The

Designing a New Regulatory Framework
Words: 11210 Length: 37 Document Type: Multiple Chapters

E., the company) that has technical control over telecommunications networks and thus technical ability to access communications, versus a party that is duly authorized to actually access those communications via a warrant (Mares, 2002). Although, as is consistent with the British model of legal evolution that relies heavily on interpretation of judicial action and precedent rather than overt legislative action, there have been no new statues issued in the intervening

How the Patriot Act Stepped on the Fourth Amendment
Words: 613 Length: 2 Document Type: Research Paper

Fourth Amendment Related to Computer Searches The Fourth Amendment is supposed to protect individuals from undue searches and seizures. Yet how this Amendment affects the searching of electronic storage (computers, drives, etc.) is unclear, as it was composed long before the Digital Age came into being. Thus, there have been various Acts and amendments geared towards explaining how the Fourth Amendment should be applied in the case of digital property. The

British Judge Lord Bringham Warned States Powers
Words: 2535 Length: 8 Document Type: Essay

British Judge Lord Bringham warned states powers intrude liberty privacy individuals justification fight a "war terror." Using specific cases examples countries studying (United States, Canada Great Britain) discuss extent intrusion rights privacy freedom occurred justified a democracy? This essay 2000 words (7-9 pages) Also sources needed paper. The issue of national security has been a subject that has kept the headlines of the newspapers especially since the 9/11 terrorist attacks.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now