Legal Resource Center

What is the Electronic Communications Privacy Act?

 

This was an act enacted by the United States Congress to extend government restrictions on wiretaps from telephone calls to include transmissions of electronic data by computer. The Electronic Communications Privacy Act (ECPA) was an amendment to Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (the Wiretap Statute), which was primarily designed to prevent unauthorized government access to private electronic communications.

The ECPA also added new provisions prohibiting access to stored electronic communications, including the Stored Communications Act. The ECPA also included provisions that permit the tracing of telephone communications. The ECPA has been amended by the Communications Assistance to Law Enforcement Act (CALEA) (1994), the USA Patriot Act (2001), the USA Patriot reauthorization acts (2006), and the FISA Amendments Act (2008). The law entitles federal agencies to subpoena 180-day-old emails.

 

An Overview of the ActWhat is the Electronic Communications Privacy Act?

The electronic communication means any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photo electronic or photo optical system that affects interstate or foreign commerce. This does not include:

• A wire or oral communication.
• A communication made through a tone-only paging device.
• A communication from a tracking device (as defined in section 3117 of the Act).
• An electronic funds transfer information stored by a financial institution in a communications system used for the electronic storage and transfer of funds.

Title I of the ECPA protects wire, oral, and electronic communications while in transit. Title II of the ECPA, the Stored Communications Act (SCA), protects communications held in electronic storage, most notably messages stored on computers. Its protections are weaker than those of Title I, however, and do not impose heightened standards for warrants. Title III prohibits the use of trace devices to record dialing, routing, addressing, and signaling information used in the process of transmitting wire or electronic communications without a court order.

 

Major Court Decisions Interpreting the Act

In Katz v. United States, the Supreme Court held that telephone conversations are protected by the Fourth Amendment and establishing the principle of a reasonable expectation of privacy.

In Smith v. Maryland (1979), the Supreme Court held that the use of trace devices does not constitute a search requiring a warrant.

In United States v. Warshak (2010), the 6th Circuit court held that law enforcement must have a warrant to obtain emails stored by email providers.

Lastly, in Application of the US (2010), the 3rd Circuit held that judges might require the government to obtain a warrant to access stored location information.

 

What are Damages and Civil and Criminal Claims Available under the Act?

There are both civil and criminal penalties for a violation of the ECPA. A court can award damages to the victim of eavesdropping. The damages are calculated in a way that each day of continuation of the violation gives rise to a higher amount of damages. A court may also impose additional, punitive damages if the violation is especially malicious. Finally, a court may impose a term of imprisonment not to exceed five years for a violation of the ECPA.

 

Elements of a Civil or Criminal Action in violation of the ECPA

Under the Act, it is illegal to:

• Intentionally or purposefully,
• Intercept, disclose, or use the contents of
• Any wire, oral, or electronic communication
• With a “device.”

 

What are Defenses to a violation of the ECPA?

Two main exceptions allow communications to be intercepted without violating the Act are:

• The “provider” exception allows telephone service providers to listen to or monitor your telephone calls when they are directed to by law enforcement officers with a valid court order or when it’s necessary to provide you with service, to inspect the equipment, or to protect the provider’s property or rights, such as when its network is being used without being paid for, and
• Law enforcement officials can intercept communications when one party consents to it, so, if you’re suspected in illegal activities and a government informant consents, agents can listen to and record your conversations with the informant

The law of the right of privacy and wiretapping is complex. If you believe you are a victim of a violation of the ECPA then contact the experienced attorneys at Meyers Roman Friedberg & Lewis, LPA to evaluate your case. The laws regarding the ECPA vary depending on the state. Call today to find out more information at (216) 831-0042.

Revenge Porn: How to Fight Back [50 State Interactive Map]

Of all the posts I’ve written in my years of running this blog, few have gotten more traffic and response than an article I wrote three years ago on revenge porn. It focused on the malicious revenge porn site, MyEx.com, which posts intimate, personal and sometimes...
Read More

Defamation of Character – What is Online Defamation?

You sleep in one morning and wake up to find 30 messages on your phone. Rubbing the sleep from your eyes, you grope for an explanation. It is not your birthday, and there are no reports of terror attacks on your newsfeed. When you open the first message, though, you...
Read More

How to Remove Fake Google Reviews

Most business owners are aware of the importance online reviews play in expanding or maintaining one’s clients and business relationships. While positive reviews can spur potential clients to call, e-mail, or come to your place of business, a negative review can have...
Read More

‘Sugar Babies’ Not All So Sweet

Kent State University recently cracked the top 10 in national rankings. Kent didn’t win recognition for its prowess in basketball or academics. Rather, Kent has become nationally prominent for producing sugar babies. Sugar babies are women, usually college students or...
Read More

How to Report Slander on Twitter

Twitter is a popular social networking site that allows people to send, receive and read short 140-character messages that are commonly known as tweets.  Not only can users post tweets they can also share,  commonly known as retweet, other people’s posts. Twitter has...
Read More