Electronic Communications Privacy Act Distinction between wire and electronic communication Title III defines “electronic communication” –Any transfer.

Slides:



Advertisements
Similar presentations
Key New Surveillance Provisions Professor Peter P. Swire Ohio State University Privacy 2001 Conference October 4, 2001.
Advertisements

Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Online Cell Phones Laptops Gaming Devices. INSTAGRAM INSTAGRAM.
Presented by Jennifer Coughlin Eugene, Oregon April 10, 2013.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Your Rights Under the Internet Law By: Sannita S. Lam.
Ethical Behavior 7-12 Conforming to moral standards or conforming to standards of conduct of profession or group Conforming to moral standards or conforming.
Stewardship and Custodianship of Electronic Mail Office of Information Technologies University Computer Policy and Law Program Office of Information Technologies.
INTERNET and CODE OF CONDUCT
Chapter 26 Communication Systems. Objectives After reading the chapter and reviewing the materials presented the students will be able to: Identify common.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Class 7 Internet Privacy Law Your Digital Afterlife.
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
The Privacy Symposium Privacy in Transition August 20, 2008 Turning the Tables: How Preference Marketing by Broadband ISPs Will Disrupt the Google Advertising.
1. 2 WHY WE STUDY CRIMINAL LAW IN BUSINESS COURSES: Wrongful behavior in the business world can lead to criminal prosecution against both the individual.
DEFENDING CLAIMS UNDER CIVIL CODE § (f)(1) © 2010 Karen A. Henry, Esq.
Teaching and Learning with Technology  Allyn and Bacon 2002 Networks and the Internet Chapter 7 Technology in Teaching and Learning.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
Business Law for the Entrepreneur and Manager
7. Legal. Topics Fourth Amendment E-Discovery Duty to Preserve Private Searches ECPA Searching With & Without a Warrant.
Introduction to Data communication
An Act Relative to Bullying in Schools MGL c 71, Section 370
Electronic Use Policies.   Social Media  Internet.
Introduction of Communication Protection and Interception Act in Taiwan, R.O.C. Jackie Chien Cybercrime Unit of MJIB Korea KCC, ETRI, KTOA.
Computer Legislation The need for computer laws Go to Contents.
Copyright / Legal liability Paul Van den Bulck Brussels 6 th of february 2004 Law of : New Technologies Intellectual.
Chapter 17 E-Commerce and Digital Law
Intellectual Property Rights and Internet Law, Social Media, and Privacy Chapter 8 & 9.
Prepared by Douglas Peterson, University of Alberta 15-1 Part 3 – The Law of Contract Chapter 15 Electronic Business Law and Data Protection.
PMS Software Ltd Electronic Communications A Guide.
ELECTRONIC COMMUNICATIONS Standard Grade Computing ELECTRONIC COMMUNICATIONS CHAPTER 10.
MIRMA SPRING TRAINING 2014 PRESENTED BY JANE DRUMMOND WHISTLEBLOWER PROTECTIONS EMPLOYMENT PRACTICS UPDATE.
Practicing the Art of Leadership: A Problem Based Approach to Implementing the ISLLC Standards, 4e © 2013, 2009, 2005, 2001 Pearson Education, Inc. All.
Medical Manager Unit 9 ICBS 170. Medical Manager Electronic Data Interchange (EDI)  Ability to request, receive, transfer and integrate information electronically.
Chapter 18 - The Fourth Amendment and National Security.
What is Data Communication? Data communication is the process of collecting and distributing data(text, voice, graphics, video, etc) electrically from.
Anti-Bullying Law Mansfield Public Schools Staff Training Please read and review Contact an administrator if you have questions or need further.
By: D’Kihya Cooper.  The first messages are sent.
Chapter 14 USA Patriot Act, Foreign Intelligence and Other Types of Electronic Surveillance Covered by Federal Law "Big Brother in the form of an increasingly.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Privacy Policy Issues & Pages Amy Reese INF385E Information Architecture and Design 1 UT iSchool 21 September 2004.
Storage, Communication & Disposal of data & information Threats to data & Information Deliberate, accidental & technical failure.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
Mass Media Law 18 th Edition Don Pember Clay Calvert Chapter 7 Invasion of Privacy: Appropriation and Intrusion McGraw-Hill/Irwin © 2013 McGraw-Hill Companies.
Communications Technology 2104 Brandon Farewell & Liam Stamp.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
PRIVACY IN THE ELECTRONIC COMMUNICATIONS SECTOR IN BULGARIA.
Telecommunications, telematics, telepresence as terms and discussion prompts Created by Brett Oppegaard for Washington State University's DTC 375 class,
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Test Title Test Content.
M.G.L. chapter, 71 section 370 Bullying is extended to Staff
1895 WHS.
1895 WHS.
Courts System Search Warrants.
1895 WHS.
by John Bagby and F. William McCarty
Student Discipline, Bullying & Cyber-Bullying
1895 WHS.
PTO – Principal’s Coffee
Confidentiality October 14, 2005.
Knowingly access without authorization
Laws Governing Police Surveillance
The E-Commerce Act and the Right to Privacy
Presentation transcript:

Electronic Communications Privacy Act Distinction between wire and electronic communication Title III defines “electronic communication” –Any transfer of signs, signals, writing, images, sounds, data or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photo- electric, or photo-optical system that affects interstate... Commerce, but does not include... any wire... communication...

Illegal for any “person” to “intentionally intercept” the “content” of any “wire... or electronic communication” and to disclose or use any illegally intercepted communication Violation of Title III is a felony—punishable by 5 years in prison Private right of action also possible—damages, punitive damages, attorney fees No exclusionary rule for illegally intercepted electronic communication

Electronic communication includes and internet use Electronic communication does not include communication in electronic storage –Eliminates usefulness of Title III for — unlike voice mail

Workplace exceptions Consent –A party to the communication may give prior consent, even if the other party is unaware Ordinary course of business