Sen. Leahy has not caved on e-privacy, aide says
Leahy remains focused on requiring law enforcement agencies to get court-ordered warrants before agencies access email, an aide says
IDG News Service - The chairman of the U.S. Senate Judiciary Committee has not reversed course on email privacy and has not proposed to give U.S. agencies access to email and other electronic communications without search warrants, despite a news report to the contrary, an aide to Sen. Patrick Leahy said Tuesday.
The Judiciary Committee is scheduled to vote on House Resolution 2471, a bill related to consumer consent to video service providers, on Nov. 29, and Leahy, the committee's chairman, has proposed amendments to the bill to address electronic communications privacy, according to information from the committee.
But Leahy, a Vermont Democrat who has pushed for electronic communications to be protected by court-ordered warrants, has not reversed course to propose that more than 20 U.S. agencies have access to email and other electronic communications through simple subpoenas, a Judiciary Committee aide said. CNET on Tuesday reported that Leahy, after law enforcement objections to his earlier position, has proposed amendments that would allow the U.S. Department of Justice, the Department of Homeland Security and other agencies access to electronic communications without court oversight.
Suggestions that Leahy has changed his mind are "off base," said the Judiciary Committee aide. "Senator Leahy does not support warrantless searches of email content," the aide added. "He looks forward to updating the nearly 30-year-old Electronic Communications Privacy Act, and has been working with a myriad of stakeholders to ensure any updates strike the right balance while also protecting the privacy rights of citizens."
Leahy, in May 2011, introduced the Electronic Communications Privacy Act Amendments Acts, which would require that U.S. law enforcement agencies get court-ordered search warrants before accessing electronic data stored with third-party vendors, such as cloud providers.
ECPA, passed by Congress in 1986, allows law enforcement agencies to gain access to unopened emails and files stored in the cloud for longer than 180 days through a subpoena, typically issued by a prosecutor, not a judge. Leahy has called the 180-day rule "outdated."
Several civil liberties groups and tech vendors have pushed for changes to ECPA, saying the rules allowing warrantless searches of emails and other electronic documents for longer than 180 days inhibits adoption of cloud services. Those groups have praised Leahy's bill, which has not moved forward in the Senate.
The DOJ has questioned whether Congress should make it more difficult for law enforcement agencies to gain access to electronic communications. ECPA helps law enforcement agents track terrorists, computer hackers, drug traffickers and other criminals, James Baker, associate deputy attorney general at the DOJ, said during a hearing in September 2010.
Leahy's proposed amendments to H.R. 2471 would implement the ECPA reform he's advocated in the past, according to information from the Judiciary Committee. Leahy's amendment would prohibit an ISP from "voluntarily disclosing the contents of its customer's email or other electronic communications to the government," according to a summary provided by the committee.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts