Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Law From 1986 Shouldn’t Govern Email Privacy in 2016

b2ap3_thumbnail_congress_to_hear_arguments_for_ecpa_reform_400.jpgAre you familiar with the protections in place that ensure that your digital communications remain private? What’s keeping an entity like the government from going through your emails? In the United States, the government uses a loophole in an outdated law to access the digital information they want from its citizens. If you’re concerned about privacy, you need to be informed about such laws and loopholes.

For the US government, this loophole is found in the Electronic Communications Privacy Act (ECPA). Key to this discussion is the fact that the law was originally passed in 1986. We don’t have to tell you how different the technological landscape was in 1986, much less digital communications like email. The loophole to ECPA is that it considers any stored electronic communications over 180 days old to be “abandoned,” and thus, law enforcement agencies can access it after the 180-day mark without a warrant. Obviously, the original version of ECPA was passed without having any idea how dependent the world would become on sharing and storing digital communications 30 years into the future.

Recently, legislative action has taken place to try and close this loophole. CompTIA reports:

On April 13th, the House Judiciary Committee unanimously passed an amended version of the Email Privacy Act (H.R. 699)... The Email Privacy Act would put an end to this outdated 180 day rule and require a warrant for law enforcement to access the content of all stored communications. While the current iteration of the bill is not perfect, we were happy to see that it does not contain a carve out to the warrant requirement for civil agencies, nor does it alter ECPA’s emergency exception procedures.

The idea here is to protect users of email and cloud services, along with the service providers themselves. As society continues to become more dependent upon digital communications, having discussions like this and knowing who has access to your data is increasingly important.

Were you aware of this loophole before reading this article? Do you feel this is cause for concern, or do you not care if the government reads your emails? Share your opinion with us in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Managed IT Services Phishing Upgrade Windows Ransomware Data Backup Outsourced IT Windows 10 Save Money Data Recovery Office Cloud Computing Server Windows 10 Passwords Chrome Gadgets Virtualization Social Media Saving Money Holiday Tech Term Microsoft Office Managed IT Services Automation Managed Service Operating System Computers Facebook Artificial Intelligence Cybercrime Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Health Networking IT Support Managed Service Provider Spam Office 365 Remote Telephone Systems Alert Information Technology Covid-19 Information Router Social Engineering Mobility BDR Recovery Employer-Employee Relationship Bandwidth Big Data Remote Monitoring Law Enforcement Data Breach App History Mobile Computing Password Money Application Human Resources Encryption Applications Mobile Office Government Private Cloud Office Tips Training Managed IT Blockchain Paperless Office VPN Apps How To Remote Computing Data Storage Patch Management HaaS Vulnerability Windows 7 Word Avoiding Downtime Servers Flexibility Marketing Wireless WiFi IT solutions Data Security Bring Your Own Device Entertainment Data Management Gmail Work/Life Balance Website Budget Settings Two-factor Authentication Infrastructure Voice over Internet Protocol Google Drive Mouse Keyboard Scam User Error Meetings Data Protection Vendor Management Risk Management Hacker Save Time The Internet of Things Lithium-ion battery Vendor Cleaning Managed Services Telephone System Staff Software as a Service Display USB Machine Learning Firewall Connectivity Remote Work End of Support Employee/Employer Relationship Education Physical Security RMM Virtual Reality Safety Apple Sports HIPAA Social Conferencing Redundancy Fraud Proactive IT Business Intelligence Remote Worker Digital Signage Best Practice Audit Worker YouTube IT Management Cryptocurrency Black Market Wearable Technology Retail Botnet Hard Drives IT Plan Virus Procurement Instant Messaging Robot Workplace Strategy Excel Comparison Net Neutrality Document Management Unified Threat Management Biometrics Unsupported Software Solid State Drive Computer Accessories CES Wireless Technology Help Desk Virtual Desktop How to Printing Downtime Charger Business Technology Content Management DDoS Access Control Data storage Compliance Computer Care Managed Services Provider Automobile OneNote Virtual Assistant Printer Current Events SharePoint Bluetooth Telephony Authentication Database Computing Infrastructure Samsung Remote Workers Going Green Customer Service Value Processor Environment Update IT Consultant Fax Server Battery Spam Blocking Electronic Medical Records Hard Drive Shadow IT Legal Google Docs SaaS Humor Hiring/Firing Identity Theft Internet Exlporer Computing PDF Network Congestion Augmented Reality eWaste Tools Search Engine Tablets Twitter Messaging Relocation Cabling Television Business Mangement Hypervisor Best Available Entrepreneur NIST Policy WIndows 7 Dark mode Video Games Smart Tech Trend Micro Trending Shortcut Worker Commute Addiction SMS Amazon Default App Public Computer Recycling Saving Time Experience Cost Management Procedure Social Networking Regulations Wiring dark theme Scalability Practices Shopping Transportation Google Search Business Owner Computer Fan Cache AI Rootkit Amazon Web Services IT Infrastructure Safe Mode FinTech Criminal NarrowBand Bing Running Cable User GDPR Search PowerPoint Workers Hosted Computing Social Network Windows Media Player Benefits Online Shopping Investment Memory FENG Wireless Internet iPhone File Sharing Employees IBM Employee/Employer Relationships Managing Stress Flash Camera Windows 365 Inventory Smart Technology Specifications ISP Evernote ROI Wire Video Conferencing Files Software Tips Sales Cameras Supercomputer Bitcoin Chromecast Travel Shortcuts Sync Printers Point of Sale Science Emails Personal Millennials Cryptomining Wireless Charging Uninterrupted Power Supply Smart Office Supply Chain Management Colocation Monitoring Batteries Distributed Denial of Service Customer Relationship Management Virtual Private Network Windows 8.1 Netflix Digitize Monitor Two Factor Authentication Workforce Cables Windows Server 2008 R2 Analyitcs Root Cause Analysis Programming HBO Customer relationships Printer Server Knowledge Music Streaming Media Skype Project Management Email Best Practices Nanotechnology IT Assessment Reputation Telecommuting Manufacturing Cortana Tech Support Content Data loss Outlook Computer Tips Techology Leadership Digital Signature Managed IT Service Laptop Troubleshooting Security Cameras Antivirus Start Menu Warranty Virtual CIO Windows 8 OneDrive Customers Biometric Security Loyalty Google Apps IT service Audiobook Screen Mirroring HVAC Peripheral Frequently Asked Questions Digital Security Cameras Analysis Using Data Touchpad Books Mobile Administrator Tablet Windows 10s Devices Copiers 5G Advertising Domains Politics Cast Enterprise Content Management Quick Tip Tip of the week MSP Ergonomics webinar Accountants Emergency Smartwatch Notifications IaaS Maintenance Professional Services Microchip Public Cloud Thought Leadership Development Employer Employee Relationship Credit Cards OLED Assessment Password Manager Virtual Machine Consultant Bloatware Password Management PCI DSS Windows Server 2008 2FA Analytics Fiber Optics Multi-Factor Security Employee

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code