亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? computer email and privacy.txt

?? 1000 HOWTOs for various needs [WINDOWS]
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
                    COMPUTER ELECTRONIC MAIL AND PRIVACY                    ====================================                                     by                             Ruel T. Hernandez                             801 Cedarbend Way                       Chula Vista, California 92010                           (619) 421-6517 (voice)                          (CompuServe: 71450,3341)                         (GEnie Mail: R.HERNANDEZ)                              January 11, 1987               Copyright (c) 1986, 1987 by Ruel T. Hernandez     (This is an edited version of a law school seminar paper I wrote atCalifornia Western School of Law.  A another version of the paper, entitled"Electronic Mail - Your Right to Privacy," by Ruel T. Hernandez as told toDan Gookin, was published as the cover story in The Byte Buyer, San Diego'sMicrocomputer Magazine, volume 4, number 24, December 5, 1986.  That versionmay also be found on their BBS at 619/226-3304 or 619/573-0359.  Note,citations to the Electronic Communications Privacy Act of 1986 refer to thefinal version passed by the House of Representatives on October 2, 1986,which was passed by the Senate the day before, as listed in theCongressional Record.)                                INTRODUCTION     Two years ago, legislation was introduced into Congress that sought toprovide federal statutory guidelines for privacy protection of computercommunications, such as electronic mail found on commercial computer systemsand on remote computer systems, commonly known as bulletin board systems(BBS).  Old federal wiretap law only gave protection to normal audiotelephonic communications.  There was no contemplation of computers or theiroperators using telephone lines to communicate.  The old federal wiretap lawregulated police interceptions of communications while they are beingtransmitted on a telephone line.  Before the Electronic CommunicationsPrivacy Act of 1976, the law did not provide guidelines for protecting thetransmitted message once it was stored within a computer system.                                 QUESTIONS     (1) Whether electronic mail and other intended private material storedwithin an electronic computer communication system have Fourth Amendmentprivacy protection?     (2) Should private electronic mail and other such material be accordedthe protection guidelines as with telephone communication and the U.S. Mail?                                  PROBLEM     Law enforcement seeks criminal evidence stored as E-Mail on either alocal, user-supported BBS, or on a commercial computer service, such asCompuServe, GEnie or The Source.  (Note, this situation is equallyapplicable to personal, private data stored on a remote system for laterretrieval, as with CompuServe's online disk storage capabilities.)     For instance, a computer user calls up a computer communication system.Using the electronic mail function, he leaves a private message that canonly be read by an intended recipient.  The message is to inform therecipient of a conspiracy plan to violate a federal or state criminalstatute.  Law enforcement gets a tip about the criminal activity and learnthat incriminating evidence may be found on the computer system.     In 1982, such a situation occurred.  (Meeks, Brock, "Life at 300 Baud:Crime on the BBS Network," Profiles, August, 1986, 12-13.)  A Detroitfederal grand jury, investigating a million-dollar cocaine ring, issued asubpoena ordering a commercial service, The Source, to hand over privatesubscriber data files.  The files were routinely backed up to guard againstsystem crashes.  The grand jury was looking for evidence to show that thecocaine ring was using The Source as communication base to send messages tomembers of the ring.  With such evidence, the grand jury could implicate orindict those suspected to be a part of the cocaine ring.  The Source refusedto obey the subpoena.  The prosecution argued The Source could notvicariously assert a subscriber's privacy rights.  Constitutional rights arepersonal and could only be asserted by the person whose rights are invaded.Additionally, if the files containing messages were duplicated, anyreasonable expectation of privacy by users would be extinguished.  A courtbattle ensued.  However, before a ruling could be made, the kingpin of thecocaine ring entered a surprise guilty plea to federal drug traffickingcharges.  The case against the Source was discontinued.     Publicly posted messages and other public material may be easilyretrieved by law enforcement.  It is the private material, such as E-Mail,that poses the problem.     Law enforcement's task is then to gather enough evidence tosubstantiate a criminal case.  Specifically, they would want the E-Mail, orother private files, transmitted by suspected criminals.  A computercommunications service, as keeper and transmitter of private electronicmessages, would not want to turn over the private data.                           INADEQUACY OF OLD LAW     Brock Meeks of Profiles magazine noted that as of August, 1986, "no ...protection exist[ed] for electronic communications.  Any law enforcementagency can, for example, confiscate a local BBS and examine all the messagetraffic," including and private files and E-Mail.  (Ibid.)     In the next section, case law will be examined and statutory law priorto the Electronic Communications Privacy Act of 1986 (ECPA) will be noted.Seemingly applicable statutes, as they stood, provided no guidelines forprivacy protection of electronic computer communication systems, such asCompuServe, GEnie, and local, user-operated BBSs.CASE LAW     There is little case law available on computer communications andFourth Amendment constitutional problems.  (M.D. Scott, Computer Law, 9-9(1984 & Special Update, August 1, 1984).)  If not for the surprisepreemptive guilty plea, the above described Detroit case may have providedguidance on computer communications and privacy issues.     Of the available cases, Scott noted those that primarily dealt withfinancial information found in bank and consumer credit organizationcomputers.   In U.S. v. Davey, 426 F.2d 842, 845 (2 Cir. 1970), thegovernment had the right to require the production of relevant informationwherever it may be lodged and regardless of the form in which it is kept andthe manner in which it may be retrieved, so long as it pays the reasonablecosts of retrieval.  In a California case, Burrows v. Superior Court, 13Cal. 3d 238, 243, 118 Cal. Rptr. 166, 169 (1974), a depositor was found tohave a reasonable expectation that a bank would maintain the confidentialityof both those papers in check form originating from the depositor and thedepositor's bank statements and records of those same checks.  However, inU.S. v. Miller, 425 U.S. 435, 440 (1976), customer account records on abanks' computer were held to not be private papers of the bank customer,and, hence, there is no Fourth Amendment problem when they are subpoenaeddirectly from the bank.     The computer data and information in these cases have more of abusiness character in contrast to personal E-Mail found on remote computersystems such as CompuServe or a local BBS.  Under the old law, a prosecutor,as in the Detroit case, may try to analogize duplicated and backed up E-Mailto business situations where data on business computer databases are alsobacked up.  Both types of computer data are stored on a system and thenlater retrieved.  The provider of the remote computing service or the sysopwould counterargue that the nature of computers always require theduplication and backup of any computer data, whether the data files are E-Mail or centrally-based financial or credit data.  Duplication does notnecessarily make E-Mail the same as financial or credit data stored inbusiness computers.  Centrally-based business information is more concernedwith the data processing.  That information is generally stored andretrieved by the same operator.  E-Mail is more concerned with personalcommunications between individuals where the sender transmits a privatemessage to be retrieved only by an intended recipient.  The sender and therecipient have subjective expectations of privacy that when viewedobjectively is reasonable.  Therefore, there is a constitutionally protectedexpectation of privacy under Katz v. U.S., 389 U.S. 347, 19 L.Ed. 88 S.Ct.507 (1967).  However, the prosecution would note under California v.Ciraolo, -- U.S. --, 106 S.Ct. 1809 (1984), the users would have to protecttheir electronic mail from any privacy intrusion.  The provider or operatorof the remote system has ultimate control of his system.  He has completeaccess to all areas of the system.  He could easily examine the material.The prosecution would note the user could not reasonably protect his privatedata from provider or operator invasion.  This "knot-hole" would exclude anyidea of privacy.  If there is no privacy, there can be no search andtherefore no Fourth Amendment constitutional violation.  Law enforcement canretrieve the material.FEDERAL WIRETAP STATUTES     The federal wiretap statutes, before the Electronic CommunicationPrivacy Act of 1986, protected oral telephone communications from policeinterceptions.  This protection was made in 1968 in response to electroniceavesdropping by government.  (Cohodas, Nadine, "Congress Races to stayAhead of Technology," Congressional Quarterly Weekly Report, May 31, 1986,1235.)  Although E-Mail appears to come under the statute's definition of"wire communication," under the old law, it was limited to audiotransmissions by wire or cable and does not mention stored computer data.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
开心九九激情九九欧美日韩精美视频电影 | 欧美日韩成人一区二区| 欧美肥胖老妇做爰| 国产精品久久久久aaaa樱花 | 国精产品一区一区三区mba视频 | 国产成人无遮挡在线视频| 91黄色激情网站| 国产视频视频一区| 中文字幕在线一区| 26uuu精品一区二区三区四区在线| 91久久精品一区二区二区| 精品久久人人做人人爰| 亚洲成人免费av| 97精品视频在线观看自产线路二| 精品欧美一区二区在线观看| 亚洲福利一区二区三区| 色呦呦国产精品| 最新日韩av在线| www.综合网.com| 久久久久国产精品人| 精品一区二区久久| 日韩一区二区三区在线视频| 亚洲亚洲人成综合网络| 91蜜桃婷婷狠狠久久综合9色| 亚洲国产精品国自产拍av| 久久99国产精品麻豆| 欧美一区三区四区| 日日噜噜夜夜狠狠视频欧美人| 欧美视频在线一区二区三区| 7777女厕盗摄久久久| 麻豆国产精品777777在线| 91丨九色丨蝌蚪丨老版| 欧美第一区第二区| 日韩精品欧美成人高清一区二区| 在线亚洲一区二区| 中文字幕国产精品一区二区| 国产不卡视频在线观看| 国产精品污www在线观看| 国产激情91久久精品导航 | 亚洲色图自拍偷拍美腿丝袜制服诱惑麻豆| 久久无码av三级| 国产一区免费电影| 日本一区二区成人| 99久久99久久免费精品蜜臀| 亚洲特黄一级片| 色素色在线综合| 亚洲精品ww久久久久久p站| 日韩精品资源二区在线| 国产曰批免费观看久久久| 三级欧美在线一区| 欧美一区二区三区系列电影| 久久综合狠狠综合| 国产精品视频一二| 久久麻豆一区二区| 国产三级久久久| 全国精品久久少妇| 欧美精品一区二区三区四区| 久久国产成人午夜av影院| 久久久久99精品国产片| 国产福利一区在线| 亚洲精品久久7777| 欧美大片在线观看| 一本色道亚洲精品aⅴ| 日韩精品一级中文字幕精品视频免费观看| 综合在线观看色| 免费视频一区二区| 精品在线观看视频| 五月婷婷久久丁香| 国产一区二区不卡在线 | av电影一区二区| 欧美曰成人黄网| 日韩欧美卡一卡二| 亚洲午夜免费电影| 国产性做久久久久久| 亚洲成人av电影在线| 欧美一级视频精品观看| 韩国精品免费视频| 一区二区三区在线免费观看| 日韩一区二区精品葵司在线| 粉嫩av一区二区三区| 亚洲一二三四区| 成人免费一区二区三区在线观看| 性欧美大战久久久久久久久| 亚洲视频资源在线| 日韩精品中午字幕| 91丨九色丨蝌蚪富婆spa| 奇米影视在线99精品| 中文字幕亚洲一区二区va在线| 91精品婷婷国产综合久久竹菊| www.欧美色图| 狠狠色丁香久久婷婷综合_中| 亚洲精品成人悠悠色影视| ww亚洲ww在线观看国产| 欧美高清视频不卡网| 91色综合久久久久婷婷| 国产91在线观看丝袜| 看电视剧不卡顿的网站| 亚洲午夜久久久久久久久电影院| 国产精品女人毛片| 日韩欧美成人一区二区| 欧美日韩一区二区在线观看视频| 99久久伊人网影院| 国产成人av影院| 国产在线精品不卡| 日韩欧美国产三级电影视频| 99精品黄色片免费大全| 亚洲免费观看高清完整版在线观看| 日韩视频一区二区| 欧美日韩一区二区在线观看视频| 91视频在线看| 成人免费高清在线| 国产福利一区二区三区| 国产成人在线视频网站| 国产一区二区美女诱惑| 国内外成人在线视频| 韩国av一区二区| 国产精品一区免费在线观看| 国产在线乱码一区二区三区| 久久99精品国产91久久来源| 久久精品免费看| 国内成人免费视频| 大美女一区二区三区| 风间由美中文字幕在线看视频国产欧美 | 福利91精品一区二区三区| 国产一区二区视频在线播放| 国产一区欧美一区| 成人高清av在线| 国产精品欧美一区喷水| 91精品综合久久久久久| 日韩欧美成人一区二区| 丰满亚洲少妇av| 国产激情一区二区三区四区 | 欧美性xxxxx极品少妇| 欧洲激情一区二区| 91精品国产一区二区| 亚洲精品在线观看网站| 欧美激情资源网| 一区二区三区.www| 日韩在线观看一区二区| 国产一区视频在线看| 成人av资源站| 欧洲精品在线观看| 日韩三级视频中文字幕| 久久影音资源网| 国产精品久久久久影视| 亚洲午夜久久久久久久久电影网| 青青草国产精品亚洲专区无| 国产乱色国产精品免费视频| jiyouzz国产精品久久| 国产一区二区三区在线观看精品 | 久久久久久久免费视频了| 国产丝袜在线精品| 亚洲午夜一二三区视频| 久久国产生活片100| 不卡电影一区二区三区| 91.麻豆视频| 日韩一区在线播放| 日韩成人一级片| 本田岬高潮一区二区三区| 欧美色国产精品| 中文字幕免费一区| 日韩一区精品视频| 波多野结衣精品在线| 欧美老肥妇做.爰bbww视频| 国产女人18水真多18精品一级做| 亚洲自拍偷拍av| 国产精品亚洲视频| 91麻豆精品91久久久久久清纯| 国产视频亚洲色图| 麻豆国产精品777777在线| 色婷婷av一区| 国产精品激情偷乱一区二区∴| 麻豆91在线看| 欧美视频中文字幕| 日韩理论在线观看| 高清视频一区二区| 精品国产伦一区二区三区免费| 一区二区久久久| www.欧美亚洲| 91污片在线观看| 亚洲综合在线视频| 欧美一区二区三区小说| 91精品国模一区二区三区| 国产精品嫩草影院com| 国产一区二区不卡| 日韩一区二区三区视频| 亚洲高清三级视频| 91福利视频网站| 亚洲丝袜美腿综合| 99视频一区二区| 国产精品久久影院| 本田岬高潮一区二区三区| 国产日韩三级在线| 国产精品一区久久久久| 日韩三级精品电影久久久| 天天操天天色综合| 制服丝袜在线91| 日本系列欧美系列| 欧美一卡在线观看| 蜜桃一区二区三区四区|