1 ISPs and Federal Privacy Law: Everything You Need to Know About the Electronic Communications Privacy Act (ECPA) Mark Eckenwiler Computer Crime and Intellectual.

Slides:



Advertisements
Similar presentations
1 Online Criminal Investigations: The USA Patriot Act, ECPA, and Beyond Mark Eckenwiler Computer Crime and Intellectual Property Section U.S. Department.
Advertisements

Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Northside I.S.D. Acceptable Use Policy
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
HIPAA Privacy Rule Training
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
Through 2008 Season Barry Bonds 762 Home Runs Roger Clemens 354 Wins Alex Rodriguez 553 Home Runs.
Electronic Communications Privacy Act (ECPA)
Cyber Security - the Laws that Govern Incident Response Joel Michael Schwarz Department of Justice Computer Crime and Intellectual Property Section Criminal.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
©The USA PATRIOT Act and You: A Legal Update Jennifer Stisa Granick, Esq. Stanford Law School Center for Internet & Society 559 Nathan Abbott Way Stanford,
Health Insurance Portability & Accountability Act (HIPAA)
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
Legal Considerations in Obtaining Electronic Evidence in Online Investigations CSC 486/586 1.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Cyber Security - the laws that protect your systems and govern incident response Joel Michael Schwarz Department of Justice Computer Crime and Intellectual.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Chapter 15 Counter-terrorism. Introduction  United and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
GOVERNMENT ACCESS TO ELECTRONIC COMMUNICATIONS – UPDATING THE RULES EDUCAUSE Live! June 9, 2010 James X. Dempsey Center for Democracy & Technology 1.
1 CONFIDENTIAL RECORDS EVIDENCE MANAGEMENT Beverly T. Beal North Carolina Conference of Superior Court Judges June, 2006.
INTERNET and CODE OF CONDUCT
Class 7 Internet Privacy Law Your Digital Afterlife.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
Whose Computer Is It, Anyway? Steven J. McDonald General Counsel Rhode Island School of Design Computer Policy and Law 2006.
1 Marc J. Zwillinger Elizabeth Banker Zwillinger Genetski LLP April 7, 2011.
Business Law for the Entrepreneur and Manager
1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Search Warrants & Seizure of Electronic Evidence.
Federal Bureau of Investigation
Chapter 18 - The Fourth Amendment and National Security.
Class 11 Internet Privacy Law Government Surveillance.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
Use Policies Deputy Attorney General Robert Morgester
Electronic Use Policies.   Social Media  Internet.
The Patriot Act Protecting the US or Violating People’s Freedoms.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Legal Issues in Cybercrime Cases: Search & Seizure.
Health Insurance Portability and Accountability Act (HIPAA)
Toward a Culture of Cybersecurity Research Aaron Burstein TRUST & ACCURATE Research Fellow Samuelson Clinic & BCLT, Boalt Hall UC Berkeley.
Lesson 5-Legal Issues in Information Security. Overview U.S. criminal law. State laws. Laws of other countries. Issues with prosecution. Civil issues.
Financial Exploitation Legal. § 108A ‑ 102. Duty to report; content of report; immunity. Legal Section (a) Any person having reasonable cause to believe.
Chapter 18 - The Fourth Amendment and National Security.
October 10, 2007 Fenwick & West Conference Center EFF 2007 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior.
& SELECTED TOPICS: DIGITAL FORENSICS Xinwen Fu, UMass Lowell, USA Center for Cyber Forensics, UMass Lowell.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
May 11, 2009 Golden Gate University EFF 2009 Bootcamp 2.0 Best Practices for OSPs: Law Enforcement Information Requests Kurt Opsahl, Senior Staff Attorney.
Activities affecting informational privacy Collection Processing dissemination Monitoring ContractNo-contract questioning AggregationSecondary useExclusion.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION PRESENTED BY: JUDGE MARK A. SPEISER.
Surveillance around the world
VI. CRIMINAL PROCESS FROM ARREST TO CONCLUSION
Tomball Independent School District Annual Confidentiality Training
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
What is HIPAA? HIPAA stands for “Health Insurance Portability & Accountability Act” It was an Act of Congress passed into law in HEALTH INSURANCE.
Confidentiality October 14, 2005.
DEVELOPING A LEGAL FRAMEWORK TO COMBAT CYBERCRIME
Government Data Practices & Open Meeting Law Overview
Texas Search and Seizure
Government Data Practices & Open Meeting Law Overview
Presentation transcript:

1 ISPs and Federal Privacy Law: Everything You Need to Know About the Electronic Communications Privacy Act (ECPA) Mark Eckenwiler Computer Crime and Intellectual Property Section U.S. Department of Justice

2 The Computer Crime and Intellectual Property Section n Founded in 1991 as Computer Crime Unit n Current staff of 22 attorneys n Mission of CCIPS –Combat computer crime and IP crimes –Develop enforcement policy –Train agents and prosecutors –Contribute to public awareness of the issues –Promote international cooperation –Propose and comment on federal legislation

3 Why You Might Care About ECPA n Comprehensive privacy framework for communications providers n Regulates conduct between –different users –provider and customer –government and provider n Civil and criminal penalties for violations n Note: state laws may impose additional restrictions/obligations

4 Why ECPA Matters to Law Enforcement n As people take their lives online, crime follows; no different from the real world n Online records are often the key to investigating and prosecuting criminal activity –“cyber” crimes (network intrusions) –traditional crimes (threats, fraud, etc.) n ECPA says how and when government can (and cannot) obtain those records

5 Substantive Provisions of ECPA Or, Everything you know is wrong

6 ECPA & The Courts: A Love Affair n “famous (if not infamous) for its lack of clarity” –Steve Jackson Games v. United States Secret Service, 36 F.3d 457, 462 (5th Cir. 1994) n “fraught with trip wires” –Forsyth v. Barr, 19 F.3d 1527, 1543 (5th Cir. 1994) n “a fog of inclusions and exclusions” –Briggs v. American Air Filter, 630 F.2d 414, 415 (5th Cir. 1980)

7 The Matrix

8 Real-Time Acquisition of Communications (Interception) n The default rule under § 2511(1): do not –eavesdrop on others’ communications –use or disclose illegally intercepted contents n Applies to oral/wire/electronic comms. n Violations may lead to –criminal penalties (5-year felony) [§ 2511(4)] »exception for first offense, wireless comms. –civil damages of $10,000 per violation –suppression

9 Relevance to Computer Networks n Makes it illegal to install an unauthorized packet sniffer n In several recent federal prosecutions, defendants have pled guilty to interception violations –e.g., Cloverdale minors

10 Exceptions to the General Prohibition n Publicly accessible system [§ 2511(2)(g)(i)] –open chat room/IRC channel n Consent of a party n System provider privileges n Court-authorized intercepts

11 Consent of a Party n May be implied through –login banner –terms of service n Implied consent may give an ISP authority to pass information to law enforcement and other officials

12 System Operator Privileges n Provider may monitor private real-time communications to protect its rights or property [§ 2511(2)(a)(i)] –e.g., logging every keystroke typed by a suspected intruder –phone companies more restricted than ISPs n Under same subsection, a provider may also intercept communications if inherently necessary to providing the service

13 Court-Authorized Monitoring n Requires a kind of “super-warrant” –a/k/a “Title III order” (or T-3) –§ 2518 n Good for 30 days maximum n Necessity, minimization requirements n Ten-day reporting n Sealing

14 Types of Wiretap Orders You May Encounter n Keystroking –common in network intrusion cases n Cloning an account

15 The Matrix

16 Real-Time Transactional Records n The pen register/trap and trace statute (same as for telephones) applies n Law enforcement may obtain a court order to gather prospective non-content information about a user, such as –addresses on in/outbound –inbound FTP connections –where remote user is logging in from (dialup? remote IP address?)

17 The Matrix

18 Stored Communications and Historical Records

19 Dichotomies ‘R’ Us n Permissive disclosure vs. mandatory –“may” vs. “must” n Content of communications vs. non-content –content »unopened vs. opened –non-content »transactional records vs. subscriber information n Basic rule: content receives more protection

20 Penalties for Stored Records & Communications Violations n Civil remedies [18 U.S.C. § 2707] –$1,000 minimum per violation –attorneys’ fees n Criminal remedies [§ 2701] –only for accessing stored communications without authorization (e.g., one user snooping in another’s inbox) –inapplicable to the provider [§ 2701(c)(3)]

21 Subscriber Content and the System Provider n Any provider may freely read stored or files of its customers –Bohach v. City of Reno, 932 F. Supp (D. Nev. 1996) (pager messages) n While ECPA imposes no prohibition, contractual agreement with customer may limit right of access

22 Public Providers and Permissive Disclosure n General rule: a public provider (e.g., an ISP) may not freely disclose customer content to others [18 U.S.C. § 2702] n Exceptions include –subscriber consent –necessary to protect rights or property of service provider –to law enforcement if contents inadvertently obtained, pertains to the commission of a crime

23 Government Access to Stored Communications Content n For unretrieved < 181 days old stored on a provider’s system, government must obtain a search warrant [18 U.S.C. § 2703(a)] –Warrant operates like a subpoena

24 Government Access to Stored Communications Content n For opened (or other stored files), government may send provider a subpoena and notify subscriber in advance [18 U.S.C. § 2703(b)] –government may delay notice 90 days in certain cases (§ 2705(a)) –no notice to subscriber required if not a provider “to the public”

25 The Matrix

26 Permissive Disclosure and Non- Content Subscriber Information n Rule is short and sweet n Provider may disclose non-content records to anyone except a governmental entity n Government needs –appropriate legal process –or consent of subscriber

27 The Two Categories of Non-Content Information n Basic subscriber information –§2703(c)(1)(C) n Transactional records –§ 2703(c)(1)(B)

28 Basic Subscriber Information n Can be obtained through subpoena n Provider must give government –name of subscriber –address –local and LD telephone toll billing records –telephone number or other account identifier –type of service provided –length of service rendered

29 Transactional Records n Not content, not basic subscriber info n Everything in between –past audit trails/logs –addresses of past correspondents n Government may compel via a “section 2703(d) court order”

30 Section 2703(d) Court Orders n a/k/a “articulable facts” order –“specific and articulable facts showing that there are reasonable grounds to believe that [the specified records] are relevant and material to an ongoing criminal investigation” n A lower standard than probable cause n Like warrant (& unlike subpoena), requires judicial oversight & factfinding

31 The Matrix

32 Summary: Legal Process & ECPA n Warrant –unopened n Court order under § 2703(d) –transactional records n Subpoena –opened , unopened >180 days old, or stored files –basic subscriber info n Higher-order process always valid –e.g., warrant can compel transactional logs

33 ECPA In Practice: A Scenario n A victim reports a threat of physical injury via from n To determine StalkNU’s identity, gov’t would serve a on isp.com n For the target’s login records, gov’t serves a _______ on isp.com n To obtain all the (opened and unopened) in target’s account, gov’t serves a ________

34 Preclusion of Notice n In criminal investigations, general policy is to avoid tipping off target n Under ECPA, government may ask a court to prohibit ISP from notifying subscriber that records have been requested from ISP [§ 2705(b)]

35 § 2703(f) Requests to Preserve n Government can ask for any existing records (content or non-content) to be preserved –no court order required –does not apply prospectively n Government must still satisfy the usual standards if it wants to receive the preserved data

36 Summary n For better or worse, ECPA shapes your destiny n Benefits of understanding (and complying with) the statute include –avoiding civil & criminal liability –smoother relations with law enforcement

37 Where To Get More Information n Computer Crime Section’s phone number: n Computer Crime Section’s home page: