亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? computer email and privacy.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
                    COMPUTER ELECTRONIC MAIL AND PRIVACY                    ====================================                                     by                             Ruel T. Hernandez                             801 Cedarbend Way                       Chula Vista, California 92010                           (619) 421-6517 (voice)                          (CompuServe: 71450,3341)                         (GEnie Mail: R.HERNANDEZ)                              January 11, 1987               Copyright (c) 1986, 1987 by Ruel T. Hernandez     (This is an edited version of a law school seminar paper I wrote atCalifornia Western School of Law.  A another version of the paper, entitled"Electronic Mail - Your Right to Privacy," by Ruel T. Hernandez as told toDan Gookin, was published as the cover story in The Byte Buyer, San Diego'sMicrocomputer Magazine, volume 4, number 24, December 5, 1986.  That versionmay also be found on their BBS at 619/226-3304 or 619/573-0359.  Note,citations to the Electronic Communications Privacy Act of 1986 refer to thefinal version passed by the House of Representatives on October 2, 1986,which was passed by the Senate the day before, as listed in theCongressional Record.)                                INTRODUCTION     Two years ago, legislation was introduced into Congress that sought toprovide federal statutory guidelines for privacy protection of computercommunications, such as electronic mail found on commercial computer systemsand on remote computer systems, commonly known as bulletin board systems(BBS).  Old federal wiretap law only gave protection to normal audiotelephonic communications.  There was no contemplation of computers or theiroperators using telephone lines to communicate.  The old federal wiretap lawregulated police interceptions of communications while they are beingtransmitted on a telephone line.  Before the Electronic CommunicationsPrivacy Act of 1976, the law did not provide guidelines for protecting thetransmitted message once it was stored within a computer system.                                 QUESTIONS     (1) Whether electronic mail and other intended private material storedwithin an electronic computer communication system have Fourth Amendmentprivacy protection?     (2) Should private electronic mail and other such material be accordedthe protection guidelines as with telephone communication and the U.S. Mail?                                  PROBLEM     Law enforcement seeks criminal evidence stored as E-Mail on either alocal, user-supported BBS, or on a commercial computer service, such asCompuServe, GEnie or The Source.  (Note, this situation is equallyapplicable to personal, private data stored on a remote system for laterretrieval, as with CompuServe's online disk storage capabilities.)     For instance, a computer user calls up a computer communication system.Using the electronic mail function, he leaves a private message that canonly be read by an intended recipient.  The message is to inform therecipient of a conspiracy plan to violate a federal or state criminalstatute.  Law enforcement gets a tip about the criminal activity and learnthat incriminating evidence may be found on the computer system.     In 1982, such a situation occurred.  (Meeks, Brock, "Life at 300 Baud:Crime on the BBS Network," Profiles, August, 1986, 12-13.)  A Detroitfederal grand jury, investigating a million-dollar cocaine ring, issued asubpoena ordering a commercial service, The Source, to hand over privatesubscriber data files.  The files were routinely backed up to guard againstsystem crashes.  The grand jury was looking for evidence to show that thecocaine ring was using The Source as communication base to send messages tomembers of the ring.  With such evidence, the grand jury could implicate orindict those suspected to be a part of the cocaine ring.  The Source refusedto obey the subpoena.  The prosecution argued The Source could notvicariously assert a subscriber's privacy rights.  Constitutional rights arepersonal and could only be asserted by the person whose rights are invaded.Additionally, if the files containing messages were duplicated, anyreasonable expectation of privacy by users would be extinguished.  A courtbattle ensued.  However, before a ruling could be made, the kingpin of thecocaine ring entered a surprise guilty plea to federal drug traffickingcharges.  The case against the Source was discontinued.     Publicly posted messages and other public material may be easilyretrieved by law enforcement.  It is the private material, such as E-Mail,that poses the problem.     Law enforcement's task is then to gather enough evidence tosubstantiate a criminal case.  Specifically, they would want the E-Mail, orother private files, transmitted by suspected criminals.  A computercommunications service, as keeper and transmitter of private electronicmessages, would not want to turn over the private data.                           INADEQUACY OF OLD LAW     Brock Meeks of Profiles magazine noted that as of August, 1986, "no ...protection exist[ed] for electronic communications.  Any law enforcementagency can, for example, confiscate a local BBS and examine all the messagetraffic," including and private files and E-Mail.  (Ibid.)     In the next section, case law will be examined and statutory law priorto the Electronic Communications Privacy Act of 1986 (ECPA) will be noted.Seemingly applicable statutes, as they stood, provided no guidelines forprivacy protection of electronic computer communication systems, such asCompuServe, GEnie, and local, user-operated BBSs.CASE LAW     There is little case law available on computer communications andFourth Amendment constitutional problems.  (M.D. Scott, Computer Law, 9-9(1984 & Special Update, August 1, 1984).)  If not for the surprisepreemptive guilty plea, the above described Detroit case may have providedguidance on computer communications and privacy issues.     Of the available cases, Scott noted those that primarily dealt withfinancial information found in bank and consumer credit organizationcomputers.   In U.S. v. Davey, 426 F.2d 842, 845 (2 Cir. 1970), thegovernment had the right to require the production of relevant informationwherever it may be lodged and regardless of the form in which it is kept andthe manner in which it may be retrieved, so long as it pays the reasonablecosts of retrieval.  In a California case, Burrows v. Superior Court, 13Cal. 3d 238, 243, 118 Cal. Rptr. 166, 169 (1974), a depositor was found tohave a reasonable expectation that a bank would maintain the confidentialityof both those papers in check form originating from the depositor and thedepositor's bank statements and records of those same checks.  However, inU.S. v. Miller, 425 U.S. 435, 440 (1976), customer account records on abanks' computer were held to not be private papers of the bank customer,and, hence, there is no Fourth Amendment problem when they are subpoenaeddirectly from the bank.     The computer data and information in these cases have more of abusiness character in contrast to personal E-Mail found on remote computersystems such as CompuServe or a local BBS.  Under the old law, a prosecutor,as in the Detroit case, may try to analogize duplicated and backed up E-Mailto business situations where data on business computer databases are alsobacked up.  Both types of computer data are stored on a system and thenlater retrieved.  The provider of the remote computing service or the sysopwould counterargue that the nature of computers always require theduplication and backup of any computer data, whether the data files are E-Mail or centrally-based financial or credit data.  Duplication does notnecessarily make E-Mail the same as financial or credit data stored inbusiness computers.  Centrally-based business information is more concernedwith the data processing.  That information is generally stored andretrieved by the same operator.  E-Mail is more concerned with personalcommunications between individuals where the sender transmits a privatemessage to be retrieved only by an intended recipient.  The sender and therecipient have subjective expectations of privacy that when viewedobjectively is reasonable.  Therefore, there is a constitutionally protectedexpectation of privacy under Katz v. U.S., 389 U.S. 347, 19 L.Ed. 88 S.Ct.507 (1967).  However, the prosecution would note under California v.Ciraolo, -- U.S. --, 106 S.Ct. 1809 (1984), the users would have to protecttheir electronic mail from any privacy intrusion.  The provider or operatorof the remote system has ultimate control of his system.  He has completeaccess to all areas of the system.  He could easily examine the material.The prosecution would note the user could not reasonably protect his privatedata from provider or operator invasion.  This "knot-hole" would exclude anyidea of privacy.  If there is no privacy, there can be no search andtherefore no Fourth Amendment constitutional violation.  Law enforcement canretrieve the material.FEDERAL WIRETAP STATUTES     The federal wiretap statutes, before the Electronic CommunicationPrivacy Act of 1986, protected oral telephone communications from policeinterceptions.  This protection was made in 1968 in response to electroniceavesdropping by government.  (Cohodas, Nadine, "Congress Races to stayAhead of Technology," Congressional Quarterly Weekly Report, May 31, 1986,1235.)  Although E-Mail appears to come under the statute's definition of"wire communication," under the old law, it was limited to audiotransmissions by wire or cable and does not mention stored computer data.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91精品办公室少妇高潮对白| 蜜桃精品视频在线观看| 欧美三级电影在线观看| 精品中文av资源站在线观看| 亚洲一区二区三区三| 欧美激情综合在线| 国产欧美精品国产国产专区| 久久久久久97三级| 国产欧美1区2区3区| 国产精品欧美一级免费| 亚洲欧美一区二区三区国产精品 | 日本不卡视频在线观看| 图片区小说区区亚洲影院| 日韩高清中文字幕一区| 国产一区二区三区免费观看| 国产成人精品免费视频网站| 99视频国产精品| 欧美三电影在线| 日韩一区二区三区免费看| 久久综合狠狠综合| 欧美国产日韩精品免费观看| 亚洲激情网站免费观看| 日本vs亚洲vs韩国一区三区二区| 经典三级在线一区| 成人国产精品免费观看视频| 色婷婷精品久久二区二区蜜臀av | 成人精品电影在线观看| 欧美亚洲高清一区二区三区不卡| 欧美久久久影院| 国产欧美日韩视频在线观看| 亚洲美女精品一区| 美美哒免费高清在线观看视频一区二区 | 亚洲欧美二区三区| 美腿丝袜亚洲三区| www.视频一区| 欧美精品日日鲁夜夜添| 久久久精品欧美丰满| 一区二区激情小说| 国产一区二区日韩精品| 在线一区二区三区| 欧美国产精品中文字幕| 日本一区中文字幕| 99精品欧美一区二区三区小说 | 1024亚洲合集| 韩日精品视频一区| 欧美午夜一区二区三区免费大片| 亚洲区小说区图片区qvod| 五月婷婷激情综合| 91丨九色丨蝌蚪富婆spa| 欧美一级在线观看| 一区二区在线观看不卡| 高清shemale亚洲人妖| 欧美一区二区三区四区高清 | 亚洲第一激情av| 成人高清免费在线播放| 久久综合中文字幕| 美女视频网站久久| 91精品欧美一区二区三区综合在 | 色婷婷av一区二区三区大白胸| 精品美女在线观看| 天天综合色天天综合色h| 97精品久久久午夜一区二区三区 | 欧美亚洲高清一区二区三区不卡| 国产亚洲制服色| 久久99精品久久久久久国产越南 | 国产精品国产三级国产普通话蜜臀| 日韩在线a电影| 欧美视频中文一区二区三区在线观看| 欧美国产日韩a欧美在线观看| 国产一区二区三区电影在线观看| 日韩一区二区三区四区五区六区| 日日夜夜免费精品视频| 欧美日韩在线观看一区二区| 亚洲黄色片在线观看| 9色porny自拍视频一区二区| 久久精品人人爽人人爽| 国产精品1区2区3区| 26uuu精品一区二区三区四区在线 26uuu精品一区二区在线观看 | 午夜精品视频一区| 欧美日韩免费视频| 丝袜美腿成人在线| 欧美一区二区福利视频| 秋霞午夜av一区二区三区| 欧美日韩国产成人在线91 | 欧美成人乱码一区二区三区| 免费成人深夜小野草| 精品福利一区二区三区免费视频| 久久爱www久久做| 欧美激情一区在线| 在线亚洲一区二区| 天天色天天爱天天射综合| 欧美乱妇23p| 国产伦精品一区二区三区视频青涩| 久久久午夜精品| 91麻豆.com| 日韩精品一级中文字幕精品视频免费观看 | 欧美日本韩国一区二区三区视频 | 一区二区日韩电影| 欧美精品一二三| 国产在线一区二区| 亚洲免费观看高清完整| 91麻豆精品国产91久久久久| 国产专区欧美精品| ...xxx性欧美| 欧美一级片在线| 99热在这里有精品免费| 亚洲h在线观看| 欧美极品aⅴ影院| 欧美日韩不卡一区二区| 国产成人av影院| 午夜日韩在线电影| 日本一区二区三区dvd视频在线| 色综合久久88色综合天天免费| 天堂成人免费av电影一区| 欧美激情综合五月色丁香| 欧美日韩一区 二区 三区 久久精品| 蜜臀av一区二区在线观看| 国产精品久久久久久久久动漫| 在线看日韩精品电影| 国产精品66部| 日韩av一区二区三区| 亚洲三级在线播放| 亚洲精品一区二区精华| 在线观看国产精品网站| 国产精品中文有码| 亚洲aaa精品| 亚洲人123区| 国产日韩精品一区二区三区 | 亚洲最快最全在线视频| 国产欧美日本一区视频| 91精品国产色综合久久久蜜香臀| 91小宝寻花一区二区三区| 国产一区二区三区高清播放| 日韩国产欧美在线观看| 一区二区三区.www| 日韩一区在线播放| 国产欧美一区二区三区鸳鸯浴 | 亚洲男人电影天堂| 国产欧美日韩麻豆91| 久久青草欧美一区二区三区| 欧美一区二区精品在线| 911精品产国品一二三产区| 一本大道久久a久久精二百| 成人午夜激情片| 国产成人av一区二区| 国产在线一区观看| 国产一区高清在线| 久久爱另类一区二区小说| 秋霞电影网一区二区| 日韩高清在线观看| 免费精品视频在线| 日韩不卡一区二区三区| 日韩av高清在线观看| 日韩电影在线看| 蜜臀久久99精品久久久画质超高清| 午夜天堂影视香蕉久久| 日韩综合小视频| 日本成人在线网站| 美女视频免费一区| 国产酒店精品激情| 国产成人日日夜夜| www.色综合.com| 欧美性猛片aaaaaaa做受| 欧美在线影院一区二区| 欧美亚洲国产一卡| 日韩视频123| 国产亚洲一区二区三区在线观看| 国产欧美一区二区精品性色超碰| 欧美—级在线免费片| 国产精品不卡一区二区三区| 亚洲三级在线看| 爽好久久久欧美精品| 色悠悠亚洲一区二区| 67194成人在线观看| 久久亚洲一级片| 亚洲免费看黄网站| 日本视频一区二区三区| 国产一区在线不卡| 色就色 综合激情| 日韩欧美中文字幕公布| 日本一区二区成人| 午夜在线成人av| 国产精品一级在线| 欧洲精品一区二区三区在线观看| 日韩欧美专区在线| 综合久久久久久久| 久久精品国产亚洲5555| aa级大片欧美| 精品久久久久久久久久久久久久久久久 | 国产麻豆精品一区二区| 99久久精品国产一区二区三区| 欧美另类高清zo欧美| 欧美激情一区在线| 日本欧美在线观看| 99re成人精品视频| 欧美成va人片在线观看| 亚洲欧洲制服丝袜| 国产中文字幕一区| 欧美日韩国产高清一区二区三区 | 欧美一区二区免费视频|