Mobile App Security

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 29 November 2012

Washington Post Editorial: Keepin E-mail Private

Posted on 15:56 by Unknown

By Editorial Board,

Nov 29, 2012 12:40 AM EST
The Washington Post Published: November 28


IF YOU LEFT a letter on your desk for 180 days, you wouldn’t imagine that the police could then swoop in and read it without your permission, or a judge’s. But that’s just what law enforcement officers can do with your e-mail. Using only a subpoena, government agents can demand that service providers turn over electronic communications they have stored, as long as those communications are more than six months old. Protections are even weaker for opened e-mail or documents stored in the “cloud.” The advertisements that the Postal Service piles into your mailbox every day are legally sacrosanct; the medical notifications your health-insurance company sends to your Gmail account are not.

This bizarre reality is thanks to the 1986 Electronic Privacy Communications Act, a law written before anyone dreamed that Americans would send, receive and store so much private information over third-party services such as Gmail or would draft documents using cloud computing that they intend to keep confidential. Now Sen. Patrick J. Leahy (D-Vt.), chairman of the Judiciary Committee and the 1986 law’s original author, wants to amend it into the 21st century.
 
Mr. Leahy is set to press his committee Thursday to adopt a series of changes that would establish the confidentiality of e-mail and other electronic communications. Service providers would be prohibited from handing over e-mail, and Mr. Leahy would get rid of the strange 180-day rule that the government can now use to compel disclosure. To access any e-mail content, law enforcement officers would be required to obtain a search warrant from a judge after demonstrating probable cause. The amendments would also oblige officials to give those whose e-mail they are reading a copy of the search warrant. This would bring the law in line with the reality that Americans are using electronic communications services to exchange and store all sorts of sensitive data. Many journalists rely on the cloud to transmit and store their work; the Newspaper Association of America, to which The Post belongs, is part of the Digital Due Process Coalition, which is lobbying for Mr. Leahy’s amendments.

There is always a trade-off between protecting Americans’ privacy and empowering law-enforcement officers to fight crime. But the choice is not difficult in this case. A letter to the Judiciary Committee from former federal, state and local prosecutors notes that the amendments would clarify the rules under which law-enforcement officials operate while maintaining essential exceptions — for example, in emergency situations such as kidnappings. In fact, the amendments would arguably not go far enough since they would still allow police to monitor some information, though not the content of digital documents, without a warrant — records regarding the time spent using electronic services, certain payment records and other information that service providers collect.

Still, Mr. Leahy’s amendments are worthy of enthusiastic support from his colleagues. They are already too long in coming.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in ICT Regulation, James Jones, Security, Security; Identity Management | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • LearningWorks: THE MISSING PIECE: Quantifying Non-Completion Pathways to Success
    ” . . . in the California Community College system . . . nearly one-third of students took an average of just two courses over about two yea...
  • Cisco Career Certifications Awarded American National Standards Institute Accreditation
    Achievement Demonstrates Compliance With Rigorous, Internationally Recognized Standards SAN JOSE, CA--(Marketwire - Jan 16, 2013) - Unders...
  • CyberWatch West Free Student 2 Student Webinar October 30th
    Online Workshop Oct 30 at 10:30 am PDT Man-in-the-Middle Attacks Using Mobile Devices Register @ cyberwatchwest.webex.com Student 2 Student ...
  • Spring 2013 NEW CCCApply Webinar Series
      Monday, 28 January 2013, TechEDge Written by Tim Calhoon Saturday, 26 January 2013 The New CCCApply online admissions application...
  • Community college grads out-earn bachelor's degree holders
    By Jon Marcus at The Hechinger Institute @CNNMoney February 26, 2013: 6:23 AM ET Nearly 30% of Americans with associate's degrees now ...
  • ACM CCECC Alice Summer Workshops Registration now open
    Registration has opened for the Alice Summer Workshops! A week has been set aside for a Community College focused workshop at Walt Disn...
  • CA Career Cafe: CALJOBS Job Search Service Now Available
    “ Somewhere someone is looking for exactly what you have to offer. ”                                                                    - ...
  • Code.org Launches To Help Make Computer Programming Accessible To Everyone
    Drew Olanoff ,  TechCrunch       Drew Olanoff has over 10 years of marketing, PR, customer service and support, relationship buildin...
  • EDGE goals addressed in 2013-14 California State Budget
    California's 2013-14 State Budget and an accompanying trailer bill, AB 86, address key EDGE goals of 1) beginning to restore dedicated f...
  • NCRIC Cyber Internship Program
    Northern California Regional Intelligence Center Cyber Internship Program Northern California Regional Intelligence Center (“NCRIC”) Mission...

Categories

  • Big Data
  • CATV
  • CENIC
  • Certifications
  • Cloud
  • Computational Thinking
  • Computer Engineering
  • Computer Science
  • CTE
  • Database
  • Digital Divide
  • Digital Literacy
  • Digital Media
  • Diversity
  • Educational Technology
  • elearning
  • Electronics
  • Entrepreneur
  • ethics
  • funding opportunity
  • Gaming
  • GIS
  • Grants
  • Hacking
  • Healthcare IT
  • ICT Applications
  • ICT Core Competencies
  • ICT Education
  • ICT Infrastructure
  • ICT Jobs
  • ICT pathways
  • ICT Regulation
  • ICT Research
  • Industry News
  • Innovation
  • Internships
  • James Jones
  • K-12
  • law
  • Linux
  • Mobility
  • MOOC
  • MPICT Announcements
  • Multimedia
  • Networking
  • networking security
  • Olivia Herriford
  • Open Source
  • Operating Systems
  • Pierre Thiry
  • Piracy
  • Public Policy
  • Security
  • Security; Identity Management
  • Smart Grid
  • Social Media
  • Soft Skills
  • Software Assurance
  • Software Engineering
  • Spanish
  • STEM Education
  • Storage
  • Teaching and Learning
  • Telecom
  • Tools
  • virtualization
  • Web
  • WIB
  • Wireless
  • women
  • Women in ICT
  • Workforce Development

Blog Archive

  • ►  2013 (418)
    • ►  November (41)
    • ►  October (53)
    • ►  September (44)
    • ►  August (21)
    • ►  July (30)
    • ►  June (28)
    • ►  May (43)
    • ►  April (43)
    • ►  March (35)
    • ►  February (43)
    • ►  January (37)
  • ▼  2012 (82)
    • ►  December (25)
    • ▼  November (40)
      • U.N. summit could lead to Internet regulations
      • CompTIA IT for Sales
      • App Academy - Interesting Education Model
      • Washington Post Editorial: Keepin E-mail Private
      • Southern California TechVoice Chapter 2012 Post-El...
      • If you want to solve the IT skills gap, fix the ge...
      • Smart Grid Industry Sector Profile Now Available
      • A jobs market bright spot? ‘App economy’ sizzles
      • CA Career Briefs: Grow a Network to Find Work
      • Career Pathways Illustrated Video
      • CCC "Maintaining a Quality Distance Education Prog...
      • AACC Workforce Development Institute - San Diego 1...
      • Career Ladders Project ICT Study Invitation
      • GovTech: California Prepares to Launch Geoportal
      • CCC Board of Governors Supports Jobs & Economy Thr...
      • California Emerging Technology Fund: Broadband Aw...
      • How do you know if your broadband meter is accurate?
      • CCC Brainstorm Info
      • For Credit College Statistics MOOC Unveiled Packag...
      • Gates Foundation: Massive Open Online Courses (MO...
      • American Council on Education May Recommend Some C...
      • IT professionals too trusting of Generation Y
      • 60 Minutes Report on National Skills Gap
      • CA Career Briefs: Corporate Culture
      • Study: Receiving a Compliment has Same Positive Ef...
      • What Does 2,000-Times-Faster Broadband Look Like?
      • Literacy 2.0: California Schools Get Digital Liter...
      • Free Symposium 12-6 in Sacramento: Partnering wit...
      • 2012 Nonprofit Software Development Summit in Oakl...
      • 2013 IT salaries: 15 titles getting the biggest pa...
      • Obama Wins The Election! Here’s His Technology Agenda
      • Internet Usage Shoots Up 122% Over Past Year: Study
      • A High Tech Solution to Low Tech Cities in Crises
      • Talking Tech: How to Improve Your Communication Sk...
      • Gartner upbeat on big data jobs
      • The Future of Learning, Networked Society - Ericsson
      • Australia ICT Industry Scan and Training Package
      • Literacy 2:0: Small Biz Seeks Cybersecurity Savvy
      • CMD-IT Announces Diversity as an Innovation Resour...
      • The Research and Planning Group announces the Lead...
    • ►  October (17)
Powered by Blogger.

About Me

Unknown
View my complete profile