IDG News Service - A coalition of tech vendors and privacy groups is calling on Congress to update a 24-year-old law to better protect users of e-mail, cloud computing services and mobile phones from government surveillance.
The newly formed Digital Due Process Coalition wants Congress to revamp the 1986 Electronic Communications Privacy Act (ECPA) to ensure that e-mail messages, documents stored on cloud computing services and location-based mobile-phone information enjoy the same privacy protections as information stored in a file cabinet or on a PC hard drive.
ECPA needs to be updated because, in some cases, digital information stored in the cloud doesn't enjoy the same legal protections as other data, said Jim Dempsey, vice president for public policy at the Center for Democracy and Technology, a privacy and digital rights group that has spearheaded the coalition. In other cases, the privacy protections for digital data are unclear, he said during a press conference Tuesday.
ECPA doesn't work for many of the ways people use digital information today, said Michael Hintze, associate general counsel at Microsoft, a member of the coalition. "A lot of the distinctions in the statute are illogical or unclear or inconsistent, which creates challenges in terms of compliance," he said. "As more and more people embrace the benefits of cloud computing ... we just don't believe that the balance between privacy and law enforcement should be fundamentally turned on its head."
Typically, law enforcement officials would have to get a court-ordered warrant to search a suspect's PC or file cabinets, but law enforcement agencies can get access to some e-mail information, instant messages and other information stored in the cloud, as well as mobile-phone tracking information, through simple subpoenas, members of the coalition said.
The coalition's suggested changes to ECPA "would make it clear that all of that data, as it moves from the desktop to the cloud and back again, to the handheld device, without regard to platform, private content should be protected," Dempsey said.
The group wants ECPA changed so that law enforcement officials have to get warrants before demanding Internet service providers and cloud computing providers turn over private documents stored online and before mobile carriers turn over tracking information about customers. The coalition also wants court review that any real-time surveillance of communications such as text messages and instant messages is relevant to a criminal investigation, and it wants courts to review law enforcement requests for transactional data of multiple unidentified users.
Some of the changes the coalition wants were introduced in Senate legislation as far back as 1998. The coalition has briefed lawmakers and the U.S. Department of Justice and the FBI about its proposals, Dempsey said.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Firewall Buyers Guide Operate as the core of your network security infrastructure
- Getting Started With a Zero Trust Approach to Network Security The Traditional Approach to Network Security is Failing. View Now>>
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts