亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? computer email and privacy.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
                    COMPUTER ELECTRONIC MAIL AND PRIVACY                    ====================================                                     by                             Ruel T. Hernandez                             801 Cedarbend Way                       Chula Vista, California 92010                           (619) 421-6517 (voice)                          (CompuServe: 71450,3341)                         (GEnie Mail: R.HERNANDEZ)                              January 11, 1987               Copyright (c) 1986, 1987 by Ruel T. Hernandez     (This is an edited version of a law school seminar paper I wrote atCalifornia Western School of Law.  A another version of the paper, entitled"Electronic Mail - Your Right to Privacy," by Ruel T. Hernandez as told toDan Gookin, was published as the cover story in The Byte Buyer, San Diego'sMicrocomputer Magazine, volume 4, number 24, December 5, 1986.  That versionmay also be found on their BBS at 619/226-3304 or 619/573-0359.  Note,citations to the Electronic Communications Privacy Act of 1986 refer to thefinal version passed by the House of Representatives on October 2, 1986,which was passed by the Senate the day before, as listed in theCongressional Record.)                                INTRODUCTION     Two years ago, legislation was introduced into Congress that sought toprovide federal statutory guidelines for privacy protection of computercommunications, such as electronic mail found on commercial computer systemsand on remote computer systems, commonly known as bulletin board systems(BBS).  Old federal wiretap law only gave protection to normal audiotelephonic communications.  There was no contemplation of computers or theiroperators using telephone lines to communicate.  The old federal wiretap lawregulated police interceptions of communications while they are beingtransmitted on a telephone line.  Before the Electronic CommunicationsPrivacy Act of 1976, the law did not provide guidelines for protecting thetransmitted message once it was stored within a computer system.                                 QUESTIONS     (1) Whether electronic mail and other intended private material storedwithin an electronic computer communication system have Fourth Amendmentprivacy protection?     (2) Should private electronic mail and other such material be accordedthe protection guidelines as with telephone communication and the U.S. Mail?                                  PROBLEM     Law enforcement seeks criminal evidence stored as E-Mail on either alocal, user-supported BBS, or on a commercial computer service, such asCompuServe, GEnie or The Source.  (Note, this situation is equallyapplicable to personal, private data stored on a remote system for laterretrieval, as with CompuServe's online disk storage capabilities.)     For instance, a computer user calls up a computer communication system.Using the electronic mail function, he leaves a private message that canonly be read by an intended recipient.  The message is to inform therecipient of a conspiracy plan to violate a federal or state criminalstatute.  Law enforcement gets a tip about the criminal activity and learnthat incriminating evidence may be found on the computer system.     In 1982, such a situation occurred.  (Meeks, Brock, "Life at 300 Baud:Crime on the BBS Network," Profiles, August, 1986, 12-13.)  A Detroitfederal grand jury, investigating a million-dollar cocaine ring, issued asubpoena ordering a commercial service, The Source, to hand over privatesubscriber data files.  The files were routinely backed up to guard againstsystem crashes.  The grand jury was looking for evidence to show that thecocaine ring was using The Source as communication base to send messages tomembers of the ring.  With such evidence, the grand jury could implicate orindict those suspected to be a part of the cocaine ring.  The Source refusedto obey the subpoena.  The prosecution argued The Source could notvicariously assert a subscriber's privacy rights.  Constitutional rights arepersonal and could only be asserted by the person whose rights are invaded.Additionally, if the files containing messages were duplicated, anyreasonable expectation of privacy by users would be extinguished.  A courtbattle ensued.  However, before a ruling could be made, the kingpin of thecocaine ring entered a surprise guilty plea to federal drug traffickingcharges.  The case against the Source was discontinued.     Publicly posted messages and other public material may be easilyretrieved by law enforcement.  It is the private material, such as E-Mail,that poses the problem.     Law enforcement's task is then to gather enough evidence tosubstantiate a criminal case.  Specifically, they would want the E-Mail, orother private files, transmitted by suspected criminals.  A computercommunications service, as keeper and transmitter of private electronicmessages, would not want to turn over the private data.                           INADEQUACY OF OLD LAW     Brock Meeks of Profiles magazine noted that as of August, 1986, "no ...protection exist[ed] for electronic communications.  Any law enforcementagency can, for example, confiscate a local BBS and examine all the messagetraffic," including and private files and E-Mail.  (Ibid.)     In the next section, case law will be examined and statutory law priorto the Electronic Communications Privacy Act of 1986 (ECPA) will be noted.Seemingly applicable statutes, as they stood, provided no guidelines forprivacy protection of electronic computer communication systems, such asCompuServe, GEnie, and local, user-operated BBSs.CASE LAW     There is little case law available on computer communications andFourth Amendment constitutional problems.  (M.D. Scott, Computer Law, 9-9(1984 & Special Update, August 1, 1984).)  If not for the surprisepreemptive guilty plea, the above described Detroit case may have providedguidance on computer communications and privacy issues.     Of the available cases, Scott noted those that primarily dealt withfinancial information found in bank and consumer credit organizationcomputers.   In U.S. v. Davey, 426 F.2d 842, 845 (2 Cir. 1970), thegovernment had the right to require the production of relevant informationwherever it may be lodged and regardless of the form in which it is kept andthe manner in which it may be retrieved, so long as it pays the reasonablecosts of retrieval.  In a California case, Burrows v. Superior Court, 13Cal. 3d 238, 243, 118 Cal. Rptr. 166, 169 (1974), a depositor was found tohave a reasonable expectation that a bank would maintain the confidentialityof both those papers in check form originating from the depositor and thedepositor's bank statements and records of those same checks.  However, inU.S. v. Miller, 425 U.S. 435, 440 (1976), customer account records on abanks' computer were held to not be private papers of the bank customer,and, hence, there is no Fourth Amendment problem when they are subpoenaeddirectly from the bank.     The computer data and information in these cases have more of abusiness character in contrast to personal E-Mail found on remote computersystems such as CompuServe or a local BBS.  Under the old law, a prosecutor,as in the Detroit case, may try to analogize duplicated and backed up E-Mailto business situations where data on business computer databases are alsobacked up.  Both types of computer data are stored on a system and thenlater retrieved.  The provider of the remote computing service or the sysopwould counterargue that the nature of computers always require theduplication and backup of any computer data, whether the data files are E-Mail or centrally-based financial or credit data.  Duplication does notnecessarily make E-Mail the same as financial or credit data stored inbusiness computers.  Centrally-based business information is more concernedwith the data processing.  That information is generally stored andretrieved by the same operator.  E-Mail is more concerned with personalcommunications between individuals where the sender transmits a privatemessage to be retrieved only by an intended recipient.  The sender and therecipient have subjective expectations of privacy that when viewedobjectively is reasonable.  Therefore, there is a constitutionally protectedexpectation of privacy under Katz v. U.S., 389 U.S. 347, 19 L.Ed. 88 S.Ct.507 (1967).  However, the prosecution would note under California v.Ciraolo, -- U.S. --, 106 S.Ct. 1809 (1984), the users would have to protecttheir electronic mail from any privacy intrusion.  The provider or operatorof the remote system has ultimate control of his system.  He has completeaccess to all areas of the system.  He could easily examine the material.The prosecution would note the user could not reasonably protect his privatedata from provider or operator invasion.  This "knot-hole" would exclude anyidea of privacy.  If there is no privacy, there can be no search andtherefore no Fourth Amendment constitutional violation.  Law enforcement canretrieve the material.FEDERAL WIRETAP STATUTES     The federal wiretap statutes, before the Electronic CommunicationPrivacy Act of 1986, protected oral telephone communications from policeinterceptions.  This protection was made in 1968 in response to electroniceavesdropping by government.  (Cohodas, Nadine, "Congress Races to stayAhead of Technology," Congressional Quarterly Weekly Report, May 31, 1986,1235.)  Although E-Mail appears to come under the statute's definition of"wire communication," under the old law, it was limited to audiotransmissions by wire or cable and does not mention stored computer data.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91精品在线麻豆| 一区二区三区中文字幕在线观看| 视频一区二区中文字幕| 国产精品第一页第二页第三页| 日韩影院免费视频| 精品久久久三级丝袜| 欧美日韩美女一区二区| 色综合久久久久综合体桃花网| 国产一区高清在线| 色偷偷久久人人79超碰人人澡| 在线成人午夜影院| 欧美极品另类videosde| 亚洲精品一线二线三线| 精品一区二区三区免费| 成人白浆超碰人人人人| 欧美在线不卡视频| 欧美激情一区在线| 国产一区二区三区免费看| 日韩小视频在线观看专区| 久久精品国产免费| 欧美三级韩国三级日本三斤| 亚洲美女视频一区| 在线看国产一区二区| 爽好多水快深点欧美视频| 99久久精品国产一区二区三区 | 亚洲一区二区三区不卡国产欧美| 欧美中文字幕一区二区三区亚洲| 亚洲成人自拍网| 国产激情一区二区三区桃花岛亚洲| 欧美美女黄视频| 亚洲人吸女人奶水| 91麻豆福利精品推荐| 国产精品天干天干在线综合| 九九热在线视频观看这里只有精品| 欧美专区亚洲专区| 亚洲精品视频在线观看网站| eeuss鲁一区二区三区| 中文一区一区三区高中清不卡| 国产·精品毛片| 国产精品福利一区| 欧美精品色一区二区三区| 精品影院一区二区久久久| 91偷拍与自偷拍精品| 欧美韩国一区二区| 日本伊人色综合网| 欧美综合一区二区三区| 国产欧美一区二区精品性色超碰| 国产一区二区三区免费观看| 在线电影院国产精品| 日韩高清一区二区| 精品国精品自拍自在线| 国产精品69毛片高清亚洲| 国产日产欧美一区二区视频| www.综合网.com| 一区二区在线观看免费| 在线成人av网站| 国产风韵犹存在线视精品| 国产精品美女久久福利网站| 欧美在线免费播放| 精品一区二区三区蜜桃| 国产精品午夜电影| 精品视频一区三区九区| 国产在线播放一区二区三区| 国产精品久久久久aaaa樱花| 欧美精品欧美精品系列| 国产成人自拍网| 亚洲亚洲人成综合网络| 久久久久久久网| 欧美日韩国产综合久久| 国产成人自拍在线| 日本一道高清亚洲日美韩| 国产欧美精品一区| 制服视频三区第一页精品| 国产激情一区二区三区四区| 天天色天天操综合| 欧美激情自拍偷拍| 欧美一区二区三区精品| 成人性视频网站| 毛片av一区二区三区| 17c精品麻豆一区二区免费| 在线播放中文字幕一区| 91色综合久久久久婷婷| 国产一区二区在线电影| 日韩不卡一区二区三区| 亚洲午夜激情网页| 亚洲最快最全在线视频| 国产精品免费视频观看| 国产丝袜在线精品| 国产亚洲精品中文字幕| 91精品国产综合久久福利| 欧美亚洲国产bt| 欧美视频日韩视频| 欧洲av在线精品| 色综合天天狠狠| 色先锋资源久久综合| 99国产精品久久久| 一本色道久久综合狠狠躁的推荐| 国产91丝袜在线播放| 成人黄页毛片网站| 99国产精品久久久久久久久久久| av在线播放一区二区三区| av电影在线观看一区| 色哟哟在线观看一区二区三区| 91在线观看一区二区| 91高清在线观看| 欧美年轻男男videosbes| 日韩欧美中文字幕公布| 国产亚洲综合性久久久影院| 亚洲国产精华液网站w| 亚洲欧美激情视频在线观看一区二区三区| 精品免费视频.| 中文字幕亚洲欧美在线不卡| 日韩电影在线观看网站| 污片在线观看一区二区| 99精品国产视频| 亚洲国产精品ⅴa在线观看| 久久99最新地址| 欧美日韩免费一区二区三区视频| 国产精品久久午夜| 国产精品1区2区| 26uuu色噜噜精品一区二区| 天天色天天操综合| 欧美日韩高清一区二区不卡| 亚洲另类在线一区| 99久久久精品| 亚洲裸体在线观看| 91视频你懂的| 亚洲黄色片在线观看| 一本在线高清不卡dvd| 亚洲手机成人高清视频| 91捆绑美女网站| 樱桃视频在线观看一区| 欧美日韩亚洲综合一区二区三区| 亚洲精选视频免费看| 欧美影院一区二区三区| 亚洲第一激情av| 欧美一级一级性生活免费录像| 日韩国产欧美在线播放| 欧美一级欧美三级| 精品写真视频在线观看| 中文字幕的久久| 色综合天天做天天爱| 亚洲成人一区在线| 欧美精品一区二区三区蜜桃 | 亚洲国产视频直播| 91在线观看高清| 亚洲精品成人天堂一二三| 91免费小视频| 亚洲国产中文字幕| 在线观看日韩av先锋影音电影院| 国产精品久久毛片| 在线观看国产精品网站| 亚洲精品免费在线观看| 成人免费高清在线| 亚洲最快最全在线视频| 在线电影一区二区三区| 欧美伦理视频网站| 亚洲bt欧美bt精品777| 日韩精品在线一区二区| 成人免费av在线| 日韩精品午夜视频| 日韩欧美国产综合在线一区二区三区| 国内不卡的二区三区中文字幕| 国产精品福利一区二区| 欧美日韩免费一区二区三区| 九九热在线视频观看这里只有精品| 日本一区二区综合亚洲| 欧美三级中文字幕| 国产馆精品极品| 美女任你摸久久| 亚洲视频一二三区| 欧美大片国产精品| 99国产精品99久久久久久| 男女视频一区二区| 亚洲人成人一区二区在线观看| 欧美一区二区三区四区久久| 91在线国产观看| 国产高清亚洲一区| 精品一区二区免费在线观看| 天天综合日日夜夜精品| 亚洲一区视频在线观看视频| 欧美国产视频在线| 中文字幕一区二区三区在线观看| 国产精品沙发午睡系列990531| 国产精品麻豆久久久| 久久久精品综合| 精品国产免费一区二区三区香蕉| 欧美色倩网站大全免费| 91久久香蕉国产日韩欧美9色| yourporn久久国产精品| 成人黄色在线视频| 国产福利视频一区二区三区| 99久久综合国产精品| 成人视屏免费看| 91美女在线观看| 欧美自拍偷拍一区| 欧美日韩一级二级| 欧美哺乳videos| 国产欧美视频一区二区| 久久久久久久久99精品|