亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? computer email and privacy.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
                    COMPUTER ELECTRONIC MAIL AND PRIVACY                    ====================================                                     by                             Ruel T. Hernandez                             801 Cedarbend Way                       Chula Vista, California 92010                           (619) 421-6517 (voice)                          (CompuServe: 71450,3341)                         (GEnie Mail: R.HERNANDEZ)                              January 11, 1987               Copyright (c) 1986, 1987 by Ruel T. Hernandez     (This is an edited version of a law school seminar paper I wrote atCalifornia Western School of Law.  A another version of the paper, entitled"Electronic Mail - Your Right to Privacy," by Ruel T. Hernandez as told toDan Gookin, was published as the cover story in The Byte Buyer, San Diego'sMicrocomputer Magazine, volume 4, number 24, December 5, 1986.  That versionmay also be found on their BBS at 619/226-3304 or 619/573-0359.  Note,citations to the Electronic Communications Privacy Act of 1986 refer to thefinal version passed by the House of Representatives on October 2, 1986,which was passed by the Senate the day before, as listed in theCongressional Record.)                                INTRODUCTION     Two years ago, legislation was introduced into Congress that sought toprovide federal statutory guidelines for privacy protection of computercommunications, such as electronic mail found on commercial computer systemsand on remote computer systems, commonly known as bulletin board systems(BBS).  Old federal wiretap law only gave protection to normal audiotelephonic communications.  There was no contemplation of computers or theiroperators using telephone lines to communicate.  The old federal wiretap lawregulated police interceptions of communications while they are beingtransmitted on a telephone line.  Before the Electronic CommunicationsPrivacy Act of 1976, the law did not provide guidelines for protecting thetransmitted message once it was stored within a computer system.                                 QUESTIONS     (1) Whether electronic mail and other intended private material storedwithin an electronic computer communication system have Fourth Amendmentprivacy protection?     (2) Should private electronic mail and other such material be accordedthe protection guidelines as with telephone communication and the U.S. Mail?                                  PROBLEM     Law enforcement seeks criminal evidence stored as E-Mail on either alocal, user-supported BBS, or on a commercial computer service, such asCompuServe, GEnie or The Source.  (Note, this situation is equallyapplicable to personal, private data stored on a remote system for laterretrieval, as with CompuServe's online disk storage capabilities.)     For instance, a computer user calls up a computer communication system.Using the electronic mail function, he leaves a private message that canonly be read by an intended recipient.  The message is to inform therecipient of a conspiracy plan to violate a federal or state criminalstatute.  Law enforcement gets a tip about the criminal activity and learnthat incriminating evidence may be found on the computer system.     In 1982, such a situation occurred.  (Meeks, Brock, "Life at 300 Baud:Crime on the BBS Network," Profiles, August, 1986, 12-13.)  A Detroitfederal grand jury, investigating a million-dollar cocaine ring, issued asubpoena ordering a commercial service, The Source, to hand over privatesubscriber data files.  The files were routinely backed up to guard againstsystem crashes.  The grand jury was looking for evidence to show that thecocaine ring was using The Source as communication base to send messages tomembers of the ring.  With such evidence, the grand jury could implicate orindict those suspected to be a part of the cocaine ring.  The Source refusedto obey the subpoena.  The prosecution argued The Source could notvicariously assert a subscriber's privacy rights.  Constitutional rights arepersonal and could only be asserted by the person whose rights are invaded.Additionally, if the files containing messages were duplicated, anyreasonable expectation of privacy by users would be extinguished.  A courtbattle ensued.  However, before a ruling could be made, the kingpin of thecocaine ring entered a surprise guilty plea to federal drug traffickingcharges.  The case against the Source was discontinued.     Publicly posted messages and other public material may be easilyretrieved by law enforcement.  It is the private material, such as E-Mail,that poses the problem.     Law enforcement's task is then to gather enough evidence tosubstantiate a criminal case.  Specifically, they would want the E-Mail, orother private files, transmitted by suspected criminals.  A computercommunications service, as keeper and transmitter of private electronicmessages, would not want to turn over the private data.                           INADEQUACY OF OLD LAW     Brock Meeks of Profiles magazine noted that as of August, 1986, "no ...protection exist[ed] for electronic communications.  Any law enforcementagency can, for example, confiscate a local BBS and examine all the messagetraffic," including and private files and E-Mail.  (Ibid.)     In the next section, case law will be examined and statutory law priorto the Electronic Communications Privacy Act of 1986 (ECPA) will be noted.Seemingly applicable statutes, as they stood, provided no guidelines forprivacy protection of electronic computer communication systems, such asCompuServe, GEnie, and local, user-operated BBSs.CASE LAW     There is little case law available on computer communications andFourth Amendment constitutional problems.  (M.D. Scott, Computer Law, 9-9(1984 & Special Update, August 1, 1984).)  If not for the surprisepreemptive guilty plea, the above described Detroit case may have providedguidance on computer communications and privacy issues.     Of the available cases, Scott noted those that primarily dealt withfinancial information found in bank and consumer credit organizationcomputers.   In U.S. v. Davey, 426 F.2d 842, 845 (2 Cir. 1970), thegovernment had the right to require the production of relevant informationwherever it may be lodged and regardless of the form in which it is kept andthe manner in which it may be retrieved, so long as it pays the reasonablecosts of retrieval.  In a California case, Burrows v. Superior Court, 13Cal. 3d 238, 243, 118 Cal. Rptr. 166, 169 (1974), a depositor was found tohave a reasonable expectation that a bank would maintain the confidentialityof both those papers in check form originating from the depositor and thedepositor's bank statements and records of those same checks.  However, inU.S. v. Miller, 425 U.S. 435, 440 (1976), customer account records on abanks' computer were held to not be private papers of the bank customer,and, hence, there is no Fourth Amendment problem when they are subpoenaeddirectly from the bank.     The computer data and information in these cases have more of abusiness character in contrast to personal E-Mail found on remote computersystems such as CompuServe or a local BBS.  Under the old law, a prosecutor,as in the Detroit case, may try to analogize duplicated and backed up E-Mailto business situations where data on business computer databases are alsobacked up.  Both types of computer data are stored on a system and thenlater retrieved.  The provider of the remote computing service or the sysopwould counterargue that the nature of computers always require theduplication and backup of any computer data, whether the data files are E-Mail or centrally-based financial or credit data.  Duplication does notnecessarily make E-Mail the same as financial or credit data stored inbusiness computers.  Centrally-based business information is more concernedwith the data processing.  That information is generally stored andretrieved by the same operator.  E-Mail is more concerned with personalcommunications between individuals where the sender transmits a privatemessage to be retrieved only by an intended recipient.  The sender and therecipient have subjective expectations of privacy that when viewedobjectively is reasonable.  Therefore, there is a constitutionally protectedexpectation of privacy under Katz v. U.S., 389 U.S. 347, 19 L.Ed. 88 S.Ct.507 (1967).  However, the prosecution would note under California v.Ciraolo, -- U.S. --, 106 S.Ct. 1809 (1984), the users would have to protecttheir electronic mail from any privacy intrusion.  The provider or operatorof the remote system has ultimate control of his system.  He has completeaccess to all areas of the system.  He could easily examine the material.The prosecution would note the user could not reasonably protect his privatedata from provider or operator invasion.  This "knot-hole" would exclude anyidea of privacy.  If there is no privacy, there can be no search andtherefore no Fourth Amendment constitutional violation.  Law enforcement canretrieve the material.FEDERAL WIRETAP STATUTES     The federal wiretap statutes, before the Electronic CommunicationPrivacy Act of 1986, protected oral telephone communications from policeinterceptions.  This protection was made in 1968 in response to electroniceavesdropping by government.  (Cohodas, Nadine, "Congress Races to stayAhead of Technology," Congressional Quarterly Weekly Report, May 31, 1986,1235.)  Although E-Mail appears to come under the statute's definition of"wire communication," under the old law, it was limited to audiotransmissions by wire or cable and does not mention stored computer data.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产99久久久久| 日本网站在线观看一区二区三区 | 99久久精品免费看国产| 国产精品拍天天在线| 成人av影视在线观看| 亚洲人精品一区| 欧美性猛片aaaaaaa做受| 石原莉奈在线亚洲三区| 精品久久久久99| 成人美女在线观看| 伊人一区二区三区| 欧美一区二区三区免费观看视频| 精品一区二区三区香蕉蜜桃| 中文字幕成人网| 欧美在线一区二区三区| 日本va欧美va精品| 日本一区二区免费在线观看视频| 99久久精品国产一区| 午夜激情综合网| 26uuu欧美| 色婷婷香蕉在线一区二区| 青青草原综合久久大伊人精品优势| 精品福利一二区| 99国产精品久| 免费成人结看片| 日本一区二区免费在线| 欧美日韩免费一区二区三区| 精品一区二区三区久久| 亚洲视频你懂的| 日韩精品一区二区三区中文精品 | 99国产精品久久久久| 日日夜夜一区二区| 欧美激情自拍偷拍| 337p亚洲精品色噜噜狠狠| 国产盗摄视频一区二区三区| 亚洲成av人影院| 国产精品欧美经典| 日韩精品一区二区三区三区免费| 91色|porny| 国产在线国偷精品免费看| 亚洲国产一区二区三区青草影视| 国产精品免费视频一区| 欧美一区二区三区不卡| 日本道色综合久久| 国产精品一二一区| 蜜桃久久精品一区二区| 亚洲制服丝袜av| 中文字幕在线不卡一区二区三区 | 国产一二精品视频| 日韩在线一区二区| 亚洲免费观看高清完整版在线| 久久人人爽人人爽| 日韩欧美一卡二卡| 欧美性受xxxx黑人xyx| jlzzjlzz欧美大全| 国产精品一区二区视频| 蜜臀a∨国产成人精品| 亚洲影视资源网| 亚洲精品国久久99热| 国产精品少妇自拍| 国产视频911| 欧美大片拔萝卜| 日韩视频在线永久播放| 欧美精品日日鲁夜夜添| 欧美综合亚洲图片综合区| aaa欧美色吧激情视频| 国产成都精品91一区二区三| 国模冰冰炮一区二区| 美女视频黄 久久| 日韩精品一二三四| 免费在线观看一区| 午夜精彩视频在线观看不卡| 亚洲小说春色综合另类电影| 亚洲视频网在线直播| 亚洲女人的天堂| 亚洲视频中文字幕| 亚洲欧美一区二区不卡| 亚洲免费观看高清在线观看| 亚洲男人电影天堂| 国产精品国产三级国产aⅴ中文| 国产精品免费视频一区| 最近中文字幕一区二区三区| 亚洲免费观看视频| 亚洲成人动漫av| 日韩精品福利网| 久久电影网站中文字幕| 久久aⅴ国产欧美74aaa| 久久黄色级2电影| 国内欧美视频一区二区| 国产成人免费视频| 成人美女在线视频| 色噜噜久久综合| 91精品国产综合久久久久久| 日韩一级大片在线观看| 久久亚洲春色中文字幕久久久| 国产日韩精品一区二区三区| 亚洲欧美一区二区三区久本道91| 亚洲一区二区综合| 蜜桃视频在线观看一区| 日本韩国一区二区| 日韩视频免费观看高清在线视频| 精品不卡在线视频| 国产精品久久久久国产精品日日| 亚洲人成伊人成综合网小说| 亚洲不卡在线观看| 精品一区二区影视| 91在线视频播放地址| 欧美日韩成人在线| 国产偷国产偷精品高清尤物| 亚洲视频一区在线| 毛片av中文字幕一区二区| 成人美女视频在线观看18| 在线观看亚洲a| 精品国产欧美一区二区| 成人免费一区二区三区视频 | 亚洲国产三级在线| 国产一区二区三区四区五区美女 | 岛国精品一区二区| 欧美亚洲丝袜传媒另类| 久久网站热最新地址| 夜夜嗨av一区二区三区中文字幕| 日本午夜精品一区二区三区电影 | 欧美性受xxxx黑人xyx| 久久精品在线观看| 午夜电影一区二区三区| 成人av电影在线网| 欧美一级夜夜爽| 成人欧美一区二区三区黑人麻豆| 免费人成黄页网站在线一区二区| 91香蕉视频mp4| 精品国产一区久久| 亚洲影院免费观看| a级高清视频欧美日韩| 日韩丝袜情趣美女图片| 一区二区三区中文字幕| 国产成人精品三级麻豆| 欧美一区二区三区四区久久| 亚洲精品精品亚洲| 成人av在线资源网站| 精品欧美一区二区久久| 亚洲国产美女搞黄色| av色综合久久天堂av综合| 精品播放一区二区| 成人免费毛片app| 91精品婷婷国产综合久久性色| 亚洲美女屁股眼交| 99热在这里有精品免费| 国产欧美中文在线| 国产精品久久久久久久久久免费看 | 不卡的av在线| 2021国产精品久久精品| 日av在线不卡| 91精品国产高清一区二区三区蜜臀| 亚洲最新视频在线观看| av激情综合网| 中文字幕二三区不卡| 国产精品综合av一区二区国产馆| 日韩欧美黄色影院| 日韩高清一区二区| 欧美男生操女生| 亚洲成人高清在线| 欧美精品久久一区二区三区| 亚洲高清视频中文字幕| 欧美亚洲一区三区| 亚洲成国产人片在线观看| 欧美性猛交xxxx乱大交退制版 | 亚洲国产va精品久久久不卡综合| 色香蕉成人二区免费| 亚洲精品一二三| 色综合激情五月| 亚洲摸摸操操av| 欧美亚洲国产一区在线观看网站| 亚洲国产另类av| 欧美高清视频www夜色资源网| 午夜视频一区二区三区| 欧美日韩国产影片| 日本女优在线视频一区二区| 日韩一区和二区| 国内精品国产三级国产a久久 | 欧美韩国日本不卡| 99国产精品久久久久久久久久| 亚洲男人的天堂av| 欧美日韩国产一区二区三区地区| 肉色丝袜一区二区| 精品国产凹凸成av人网站| 国产一区二区电影| 中文字幕一区二区三区乱码在线 | 在线观看日韩国产| 国产一区不卡精品| 综合电影一区二区三区| 欧美性大战久久久久久久| 男女激情视频一区| 国产欧美日韩在线观看| 色呦呦国产精品| 日日摸夜夜添夜夜添亚洲女人| 欧美成人video| 99精品视频在线观看| 视频一区二区不卡| 国产欧美一区二区三区网站| 在线免费观看一区|