Lawful Access Issues and Challenges for

advertisement
Marc J. Zwillinger
Elizabeth Banker
Zwillinger Genetski LLP
April 7, 2011
1




Understanding Universities obligations
related to Law Enforcement and Civil
Demands
Developments in privacy related litigation
Lawful Access issues on the horizon for
Universities
Other issues for Universities related to
security and privacy
2





Federal, state and local law enforcement
issued subpoenas, court orders and warrants
National Security Requests issued under
National Security Letter authority, FISA or the
FAA
Civil subpoenas issued under DMCA
subpoena provision
Civil subpoenas issued in private litigation
Requests without legal process:
◦ Deceased students
◦ Complaints
3




Family Educational Rights and Privacy Act of
1974, 20 U.S.C. § 1232g; 34 CFR Part 99.
Prohibits disclosure of certain student records
without student or parental consent.
Universities may disclose educational records in
response to a subpoena or court order with prior
notice to the student or parents.
No notice is necessary if:
 Grand jury subpoena with court order to not provide notice
 Court order and told not to provide notice
 AG terrorism court order (ex parte)

Emergencies
4

ECPA has two primary parts:
◦ The Wiretap Act (also know as Title III) governs realtime access to the contents of electronic
communications
 Codified at 18 U.S.C. § 2510 et seq.
◦ The Stored Communications Act (“SCA”) is the
portion of ECPA that specifically governs stored
records and communications
 Codified at 18 U.S.C. § 2701et seq.
◦ Other parts of ECPA:
 Pen Register Trap and Trace Statute, 18 U.S.C. § 3121
5


Governs real-time intercept of electronic and
wire communications
Federal law prohibits intercept of
communications unless an exception applies:
◦ Consent (one party)
◦ Title III Wiretap Order issued by law enforcement
◦ Protection of Rights and Property of Providers

State wiretaps laws are similar, except:
◦ Twelve states require two-party/all-party consent
for a valid exception to the prohibition on intercept
6

Special Issues for Universities
◦ Students or School officials recording classes
◦ Email scanning for prohibited content/conduct
◦ Archiving chat, IM, or other conversations
conducted through interactive webpages

How to deal with two-party/all-party consent
requirements?
◦ Implied consent
◦ Affirmative consent
7

Covered entities defined in SCA are “Electronic
Communications Services” (ECS) and “Remote Computing
Services” (RCS)
◦ ECS defined as “any service which provides to users thereof the
ability to send or receive wire or electronic communications”
◦ RCS defined as “the provision to the public of computer
storage or processing services by means of an electronic
communications system”
 What does “to the public” mean?
 What public services do you offer – just broadband access, or more?


Restrictions on voluntary disclosure of information (for
ECS and RCS) turn on whether University offers services
“to the public”
Restrictions on compelled disclosures do not.
8
Statutory Definition
Plain Language
1) “contents of a communication while in
electronic storage”
1) contents of
messages or emails
2) “contents of a communication which is
carried or maintained on that service on
behalf of, and received by means of
electronic transmission from a subscriber
or customer of the service”
2) contents in stored
files
3) “a record or other information pertaining
to a subscriber to or customer of such
service not including contents under A or
B”
3) any non-identity,
non-content record
kept about a
subscriber
4) “name, address, telephone records,
session times and duration, length of
service, start date, types of service
utilized, telephone number or other
subscriber # or identity, network address,
means and source of payment”
4) basic identity
information about
the subscriber
9

Can be obtained through trial, grand jury or
administrative subpoena under § 2703(c)(2)
 name & address
 local and long distance billing records
 telephone number or other account identifier (such
as username or “screen name”)
 length & type of service provided
 Session times and duration
 Temporarily assigned network address (IP Address)
 Means and source of payment (cc# or bank acct)

Limited to specifically listed records
10

Scope:
◦ Not content, not basic subscriber
 § 2703(c)(1)(B)
◦ Everything in between
 identities of connections or email correspondence
 Subscriber info not specified in 2703 (c)(1)(c) (e.g., DOB,
gender, DL #, etc)
 Connection information

Obtainable with § 2703(d) court order
◦ Issued based on showing of “specific and articulable facts”
of relevance to “criminal investigation”
◦ Intermediate standard between subpoena (relevance) and
search warrant (probable cause)

Delayed Notice available under § 2705
11



“Electronic storage” defined as
1) temporary, intermediate storage incidental to
transmission (§2510(17)(A)); and
2) storage of such communication by an electronic
communication service for purposes of backup
protection of such communication
Beginning: DOJ view that a warrant was only required for
unopened, received email in user’s inbox for 180 days or
less. A court order or subpoena used for sent, read, or
emails over 180 days old
After Theofel v. Farey-Jones (9th Cir.): Read and saved
email was considered a “back up” and required a search
warrant if 180 days or less old
12


Sixth Circuit Court of Appeals held in U.S. v.
Warshak that the Fourth Amendment protects
email content from disclosure to law enforcement
absent a search warrant
Court found that individuals have a “reasonable
expectation of privacy” in their email content
◦ Court left open possibility that provider or employer
terms could eliminate the R.E.P.

Decisions about how to implement
◦ Restrict to district
◦ Implement nationwide
13


Public provider prohibited from voluntarily
disclosing any subscriber records (§ 2702)
Exceptions
◦ Consent of originator or addressee/intended recipient
◦ To an addressee or intended recipient
◦ to law enforcement if contents inadvertently obtained &
pertain to commission of a crime
◦ to person employed or authorized or whose facilities are
used to forward such communication
◦ As necessary to protect provider rights and property
◦ To NCMEC in child pornography report
◦ To government if provider in good faith believes an
emergency exists threatening death or serious physical
injury
14


Public provider prohibited from voluntarily
disclosing any contents of communications (§
2702)
Exceptions
◦ Consent of originator or addressee/intended recipient
◦ To an addressee or intended recipient
◦ To person employed or authorized or whose facilities are
used to forward such communication
◦ As necessary to protect rights and property

No prohibition on disclosing records to civil litigant
(§ 2702 (c)(6))
◦ Subpoena is generally sufficient
15



FERPA allows disclosure of educational records when legal process is issued.
◦ If not prohibited by law, notice must be given to the student or parents
◦ When is notice forbidden? A court order prohibits notice (e.g., an order
for delayed notice under Section 2705) or statute under which the legal
process was issued prohibits notice (e.g. NSLs).
◦ When in doubt? Advise law enforcement of plan to provide notice
FERPA allows disclosure of information in response to a civil subpoena with
notice, but ECPA prohibits disclosure of email content to private litigants
◦ Disclosure could be allowed if account holder consents
FERPA & ECPA both allow disclosure of records and email content when there
is an emergency that puts the physical safety of a person at risk
◦ ECPA only allows emergency disclosures to law enforcement.
◦ Be sure to document the nature of the emergency, how the requested
information will help LE and the requesting individual and agency.
◦ Also helpful: Emergency disclosure form, Emergency disclosure policy
16






Deceased Users and stored content
Freedom of Information Act requests
Complaints and requests to identify users
without legal process
Internal, on-campus investigations
State schools and status as a “governmental
entity”
National security process and non-disclosure
requirements
17
 ECPA
Litigation
 ECPA Reform
 CALEA Updates
 Data Retention Mandates
18




Plaintiffs lawyers are now suing for improper
disclosure of records based on claims that
the legal process used was illegitmate
Entities sued: Yahoo!, Myspace, Windstream,
Comcast
Theory – recipient must insist on proper
service of process to make legal process valid
– i.e, no out-of-state faxes.
Prediction – not going to be successful, but
may not be worth the risk
19


Initially proposed by the Digital Due Process
Coalition (DDP), which includes: CDT, Amazon,
Google, Facebook, AOL, Microsoft, AT&T
SalesForce, Loopt, and others
Need for ECPA reform:
◦ Definitions are archaic and hard to apply to Web 2.0
◦ Different law enforcement agencies use it and have
different interpretations
◦ Different jurisdictions have different interpretations
◦ Volume makes it impossible to operate with anything
less than bright lines rules
◦ Litigation develops over areas of friction
◦ Many, many issues do not seem to be answered by
ECPA
20
1. Technology and platform neutrality
2. All content should be protected under the 4th
Amendment standard – regardless of how old it
is or whether it has been “opened” or not
3. Data should receive same protection whether
it is in transit or in storage
4. Recognize sensitivity of data that deserves 4th
Amendment protection
21
1.
All content should be protected under the 4th
Amendment standard and probable cause should
be required – regardless of how old it is or
whether it has been “opened” or not
2.
Location data, whether historical or prospective
should be produced only pursuant to a Warrant
3.
The standard for pen registers/trap and trace
devices should be heightened
4.
Information requests made pursuant to a
subpoena should be particularized to an individual
or group of individuals, otherwise a 2703(d) Order
or greater should be required
22



At least 4 hearings held in 2010 before
House Judiciary Committee and at least
one in the Senate.
Hill meetings and DOJ meetings have been
occurring with increased frequency
DOJ has proposal for reform of NSL
provisions (18 USC 2709) which may get
linked to these efforts
◦ Proposal would clear up uncertainty regarding
ability of FBI to get access to electronic
communication transactional records
23


Communications Assistance to Law
Enforcement Act (“CALEA”) originally passed
in 1994
Mandates that covered providers build
capability to intercept communications if
presented with a wiretap order
◦ Currently covers telecommunications and
broadband


FBI “Going Dark” Initiative seeks to expand
coverage
Potential Model- Section 12 of UK’s RIPA
24



Lamar Smith (R), House Judiciary Chairman,
has had several bills in past and currently
working on a new bill
Hearing held in January 2011
Potential scope of data retention obligation:
◦ 6 months to 2 years of retention
◦ IP address assignment logs, IP log-in records,
communications transactional records, upload IP
information

EU Data Retention Directive implementation
◦ Problematic and still controversial in EU, but
provides potential model
25




Child pornography reporting requirements
applicable to ECS and RCS under 18 U.S.C.
§2258A.
Content complaints and Section 230
Security Breach notice requirements
Required security to protect sensitive
personal information
◦ E.g. Social Security Numbers
26
??
??
??
??
??
??
??
??
??
??
27
marc@zwillgen.com
elizabeth@zwillgen.com
Download