StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Electronic Communications Privacy Act - Essay Example

Cite this document
Summary
The paper "Electronic Communications Privacy Act" describes that the act should increase the threshold of evidence required in a judicial review of a statement or warrant seeking access to data. The act also lacks another aspect which makes it outdated…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.1% of users find it useful
Electronic Communications Privacy Act
Read Text Preview

Extract of sample "Electronic Communications Privacy Act"

Electronic Communications Privacy Act Electronic Communications Privacy Act Introduction The cyber space is growing dynamically andat a rapid pace, which has resulted in more features, channels of communication and means of sharing resources within the cyberspace. Nonetheless, the Electronic Communications Privacy Act (ECPA) has been slow in capturing the dynamic changes that are occurring (Electronic Privacy Information Center, 2012). Accordingly, there is no legal framework to guide the use of features such as cloud computing and various forms of virtual computing. The above recent developments have altered the cyber space in various ways, which require a legal framework to manage the workings of the new features created by the development in computer and internet sector (Matsuura, 2003). Ideally, the act seeks to ensure sanity and protection of privacy, but the rapid changes in the communication sector especially in the internet-based sector has rendered the act virtually ineffective while other laws such as the patriotic act have made it impossible to enhance privacy. Background In its present form, the ECPA has countless flaws owing to the dynamism of communication. The inadequacies of the act can be linked to its enactment. The ECPA was enacted in 1986 when the communication sector was not expansive or as specialized and innovative as it is today. As such, most of the concerns were addressed generally. Today privacy has become a major concern but back then, it was not a key concern. Fundamentally, the act seeks to enhance privacy but in light of other laws such as the patriotic act, it is ineffective (Electronic Privacy Information Center, 2012). The patriotic act granted the government huge leeway in compromising or breaching privacy in all the forms of electronic communications. The government can compromise the privacy of communications in the form of images, signs, writings and even oral communication due to the flaws of the law as revealed by United States v. Councilman. In the above suit, the defendant sought to block the government from accessing email in temporary storage prior to the recipient reading them. Nevertheless, on appeal, a full court of appeal revealed that e-mails on transit are not protected from surveillance (Packard, 2012). From the above, it is evident that despite having strict clauses on privacy ECPA is inherently inadequate. Inadequacies and Relevant Changes Surveillance is one of the most controversial issues in America owing to its extensive nature. The surveillance involves electronic data, which is protected by this act. Nonetheless, the government has seemingly unlimited access to electronic data. One of the key reforms required to ensure that the revelation of a user’s personal information is barred expressly (Packard, 2012). Currently, the congress is in the course of reviewing the act to ensure it is effective in safeguarding privacy. The act has to failed in one of its core objectives which is to safeguard privacy of all forms of data or communications. As such, there was need to review to ensure that it can address the challenges of modern-day data privacy. For instance, this law regards an email that has been in a server for more than six months or a hundred and eighty day as abandoned (Electronic Privacy Information Center, 2012). Subsequently, law enforcements agencies only require a statement elaborating its relevance to an investigation to access it. This statement is however subject to judicial review. Once the judicial approval is granted the law enforcement agencies will have unlimited access to emails. This act has opened up a leeway for people and agencies to breach privacy especially with regard to information stored in servers, which has enabled the government authorities to triangulate calls undeterred on real time basis. The ECPA has many loopholes with regard to enforcing privacy over any form of data therefore requiring am in-depth review to enhance its compliance. One of the recent developments in the computer and communication sector is the emergence of cloud computing. This new development aims at harnessing aspects of computers that can be rendered as services with the key aim being cost reduction in organizations (Matsuura, 2003). Cloud computing ensures the sharing of computer resources such as software, computer systems, information and servers. This ensures the utilization of idle capacities by firms that require the underutilized computer facilities or infrastructure. The ECPA does not capture such aspects of the communication sector, which are developing rapidly (Packard, 2012). Most organizations are making use of clouding computing services to reduce cost, as they do not have to procure certain IT infrastructure since they can make use of the shared facilities offered through cloud computing services. The lack of a legal framework that will guide the use of clouding computing services makes the industry vulnerable to unscrupulous entities. The legal framework should provide a platform for the exploitation of cloud computing which will relieve companies the burden of procuring certain infrastructure (Electronic Privacy Information Center, 2012). A legal framework would support the rapid development of the sector to ensure that more companies adopt the services. With respect to cloud computing, the act lacks clauses which would provide a legal framework for cloud computing. Changes to the act to enhance cloud-computing services should address various aspects such as agreements between companies to provide relevant services, privacy of customer information, security of the systems and the services that cloud-computing entities can offer. The legal framework would also promote specialization of entities and differentiation in the corporate sector. Cloud computing proponents have postulated that organization would procure computing services and ‘pay on a go model’ while focusing on their core objectives. Organizations would not require IT departments, which reduce specialization in entities while eating into entities’ profits. As such, having a proper legal framework would enhance cloud-computing service massively (Electronic Privacy Information Center, 2012). Moreover, it would also provide a legal framework, which the legal system may use to resolve disputes in the sector. Currently, the ECPA is inherently inadequate which limits its ability to help in settling disputes in the communication sector. The advantages of having the ECPA crafted again to capture the recent developments in cloud computing reveal how inadequate the current act is amidst an innovative and an ever-expanding communication and internet sector. Adequacies Despite its massive inadequacies, there are certain positives from the act. Firstly, for an act grafted close to three decade ago, it encouraging make out that it sought to secure privacy across all forms of communication when many people never felt the need to have secure communication line. By then, there was minimal public awareness on liberties in the communication sector (Matsuura, 2003). However, this has changed massively over the last two and half decades. Despite its initial aim of protecting the privacy of communication subsequent legislation such as the patriot act have eroded the gains that would have been realized if the act were strengthened as opposed to weakening by act that paved the way for wiretaps and other surveillance activity on the premise of national security (Electronic Privacy Information Center, 2012). The congress has also been slow to consolidate the developments that are occurring daily in the communication sector. Conclusion Based on the analysis, the ECPA is inherently lacking in its capacity to address the challenges of a modern-day internet based communication sector. The act has weak clauses on privacy, which were diluted by subsequent legislation. The act therefore has many inadequacies, which would require review and relevant amendments. The changes must enhance privacy by increasing the role of judiciary in overseeing statements or warrants to access data. The act should also increase the threshold of evidence required in a judicial review of a statement or warrant seeking access to data. The act also lack in another aspects which makes it outdated. Having been drafted in the mid1980s, it does not capture aspects such as clouding computer, which emerged later largely due to lack of timely amendments. As such, the ECPA is outdated with regard to the developments, which are occurring in the internet based communication sector. Based on the two major frailties the act has become innately ineffective for the modern day communication sector. References Electronic Privacy Information Center. (2012). Electronic Communications Privacy Act (ECPA). Retrieved on August 15, 2014 from http://epic.org/privacy/ecpa/ Matsuura, H. (2003). Managing Intellectual Assets in the Digital Age. Norwood, MA: Artech House Publishing. Packard, A. (2012). Digital Media Law. New York, NY: John Wiley and Son. . Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Electronic Communications Privacy Act Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Electronic Communications Privacy Act Essay Example | Topics and Well Written Essays - 1250 words. Retrieved from https://studentshare.org/information-technology/1654973-electronic-communications-privacy-act
(Electronic Communications Privacy Act Essay Example | Topics and Well Written Essays - 1250 Words)
Electronic Communications Privacy Act Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1654973-electronic-communications-privacy-act.
“Electronic Communications Privacy Act Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/information-technology/1654973-electronic-communications-privacy-act.
  • Cited: 0 times

CHECK THESE SAMPLES OF Electronic Communications Privacy Act

Explanatory synthesis(read the prompt)

Though the Electronic Communications Privacy Act was brought into force to safeguard the citizens from such interceptions, the ACT did have loopholes.... The recently proposed or established acts like the Homeland Security act, the USA Patriot act, and the Foreign Intelligence Surveillance act etc have initiated hot debate.... The USA patriot act brought in the use of wiretap warrants that allowed the USA police to engage in wiretap surveillance against anyone who was under suspicion....
3 Pages (750 words) Essay

Computer laws in US. Computer Fraud and Abuse Act

CFAA was modified for the second time in 1994 so as to deal with the act of malicious code such as viruses, worms and other programs designed with an aim of changing or damaging data on the computer (Title 18 U.... The National Information act (NIIA) was enacted in 1996 to protect computer systems against those who access them using other people's authorization....
5 Pages (1250 words) Research Paper

Privacy and Digital Investigations

Aftab (2006) notes that the Electronic Communications Privacy Act of 1986 explicitly prohibits employer monitoring of employee private electronic communications, even if the medium of communication was owned by the employer, occurred in the workplace and on the employer's own time.... Therefore, to overcome the strictures placed on employers by the Electronic Communications Privacy Act, organizations typically have employees sign an organization-specific Electronic and Communication Equipment policy....
5 Pages (1250 words) Essay

Privacy Issues in the Workplace- Technology and Social Media

Indeed, the Electronic Communications Privacy Act, stipulates that an employer has can monitor electronic communications, e-mail and Internet surfing, and instant messaging of an employee where employee is using the employer-provided computer system (US Department of Justice Web).... However, the provisions of the Electronic Communications Privacy Act (ECPA) set out the procedures governing the monitoring and retrieval of employee's electronic communication (US Department of Justice Web)....
2 Pages (500 words) Essay

Criminal laws related to the Internet

Congress and the courts are actively considering the design and implementation of such laws as Computer Fraud and Abuse Act (1984), Electronic Communications Privacy Act, and Children's Online Privacy Protection Act (1988).... There should also be international mediators (countries) that act to resolve international disputes....
1 Pages (250 words) Essay

Is Employer Monitoring of Employee Social Media Justified

Thus, it was emphasized that “The Electronic Communications Privacy Act (ECPA) of 1986 prohibits the intentional interception of “any wire, oral or electronic communication,” but it does include a business use exemption that permits email and phone call monitoring” (Beesely, 2012, par.... Electronic Communications Privacy Act.... National Labor Relations act does address employee rights in regard to the use of social media and acceptable social media policy” (par....
1 Pages (250 words) Essay

Data as an Asset

For instance, the Electronic Communications Privacy Act fails to show the change in technology that occurred since its enactment in 1986.... For instance, the Electronic Communications Privacy Act fails to show the change in technology that occurred since its enactment in 1986.... hellip; Senators also proposed the amendment of the Family Educational Rights and privacy act (1974) that will forbid the use of identifiable student information for marketing....
1 Pages (250 words) Assignment

No Safe Harbour for Personal Data

Personal privacy is important and should be protected.... … IntroductionTechnology continues to influence the human and business requirements.... Voluminous amounts of personal data are collected, stored, accessed and used by different entities.... The information can be shared with the third party or transferred IntroductionTechnology continues to influence the human and business requirements....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us