亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? computer email and privacy.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
                    COMPUTER ELECTRONIC MAIL AND PRIVACY                    ====================================                                     by                             Ruel T. Hernandez                             801 Cedarbend Way                       Chula Vista, California 92010                           (619) 421-6517 (voice)                          (CompuServe: 71450,3341)                         (GEnie Mail: R.HERNANDEZ)                              January 11, 1987               Copyright (c) 1986, 1987 by Ruel T. Hernandez     (This is an edited version of a law school seminar paper I wrote atCalifornia Western School of Law.  A another version of the paper, entitled"Electronic Mail - Your Right to Privacy," by Ruel T. Hernandez as told toDan Gookin, was published as the cover story in The Byte Buyer, San Diego'sMicrocomputer Magazine, volume 4, number 24, December 5, 1986.  That versionmay also be found on their BBS at 619/226-3304 or 619/573-0359.  Note,citations to the Electronic Communications Privacy Act of 1986 refer to thefinal version passed by the House of Representatives on October 2, 1986,which was passed by the Senate the day before, as listed in theCongressional Record.)                                INTRODUCTION     Two years ago, legislation was introduced into Congress that sought toprovide federal statutory guidelines for privacy protection of computercommunications, such as electronic mail found on commercial computer systemsand on remote computer systems, commonly known as bulletin board systems(BBS).  Old federal wiretap law only gave protection to normal audiotelephonic communications.  There was no contemplation of computers or theiroperators using telephone lines to communicate.  The old federal wiretap lawregulated police interceptions of communications while they are beingtransmitted on a telephone line.  Before the Electronic CommunicationsPrivacy Act of 1976, the law did not provide guidelines for protecting thetransmitted message once it was stored within a computer system.                                 QUESTIONS     (1) Whether electronic mail and other intended private material storedwithin an electronic computer communication system have Fourth Amendmentprivacy protection?     (2) Should private electronic mail and other such material be accordedthe protection guidelines as with telephone communication and the U.S. Mail?                                  PROBLEM     Law enforcement seeks criminal evidence stored as E-Mail on either alocal, user-supported BBS, or on a commercial computer service, such asCompuServe, GEnie or The Source.  (Note, this situation is equallyapplicable to personal, private data stored on a remote system for laterretrieval, as with CompuServe's online disk storage capabilities.)     For instance, a computer user calls up a computer communication system.Using the electronic mail function, he leaves a private message that canonly be read by an intended recipient.  The message is to inform therecipient of a conspiracy plan to violate a federal or state criminalstatute.  Law enforcement gets a tip about the criminal activity and learnthat incriminating evidence may be found on the computer system.     In 1982, such a situation occurred.  (Meeks, Brock, "Life at 300 Baud:Crime on the BBS Network," Profiles, August, 1986, 12-13.)  A Detroitfederal grand jury, investigating a million-dollar cocaine ring, issued asubpoena ordering a commercial service, The Source, to hand over privatesubscriber data files.  The files were routinely backed up to guard againstsystem crashes.  The grand jury was looking for evidence to show that thecocaine ring was using The Source as communication base to send messages tomembers of the ring.  With such evidence, the grand jury could implicate orindict those suspected to be a part of the cocaine ring.  The Source refusedto obey the subpoena.  The prosecution argued The Source could notvicariously assert a subscriber's privacy rights.  Constitutional rights arepersonal and could only be asserted by the person whose rights are invaded.Additionally, if the files containing messages were duplicated, anyreasonable expectation of privacy by users would be extinguished.  A courtbattle ensued.  However, before a ruling could be made, the kingpin of thecocaine ring entered a surprise guilty plea to federal drug traffickingcharges.  The case against the Source was discontinued.     Publicly posted messages and other public material may be easilyretrieved by law enforcement.  It is the private material, such as E-Mail,that poses the problem.     Law enforcement's task is then to gather enough evidence tosubstantiate a criminal case.  Specifically, they would want the E-Mail, orother private files, transmitted by suspected criminals.  A computercommunications service, as keeper and transmitter of private electronicmessages, would not want to turn over the private data.                           INADEQUACY OF OLD LAW     Brock Meeks of Profiles magazine noted that as of August, 1986, "no ...protection exist[ed] for electronic communications.  Any law enforcementagency can, for example, confiscate a local BBS and examine all the messagetraffic," including and private files and E-Mail.  (Ibid.)     In the next section, case law will be examined and statutory law priorto the Electronic Communications Privacy Act of 1986 (ECPA) will be noted.Seemingly applicable statutes, as they stood, provided no guidelines forprivacy protection of electronic computer communication systems, such asCompuServe, GEnie, and local, user-operated BBSs.CASE LAW     There is little case law available on computer communications andFourth Amendment constitutional problems.  (M.D. Scott, Computer Law, 9-9(1984 & Special Update, August 1, 1984).)  If not for the surprisepreemptive guilty plea, the above described Detroit case may have providedguidance on computer communications and privacy issues.     Of the available cases, Scott noted those that primarily dealt withfinancial information found in bank and consumer credit organizationcomputers.   In U.S. v. Davey, 426 F.2d 842, 845 (2 Cir. 1970), thegovernment had the right to require the production of relevant informationwherever it may be lodged and regardless of the form in which it is kept andthe manner in which it may be retrieved, so long as it pays the reasonablecosts of retrieval.  In a California case, Burrows v. Superior Court, 13Cal. 3d 238, 243, 118 Cal. Rptr. 166, 169 (1974), a depositor was found tohave a reasonable expectation that a bank would maintain the confidentialityof both those papers in check form originating from the depositor and thedepositor's bank statements and records of those same checks.  However, inU.S. v. Miller, 425 U.S. 435, 440 (1976), customer account records on abanks' computer were held to not be private papers of the bank customer,and, hence, there is no Fourth Amendment problem when they are subpoenaeddirectly from the bank.     The computer data and information in these cases have more of abusiness character in contrast to personal E-Mail found on remote computersystems such as CompuServe or a local BBS.  Under the old law, a prosecutor,as in the Detroit case, may try to analogize duplicated and backed up E-Mailto business situations where data on business computer databases are alsobacked up.  Both types of computer data are stored on a system and thenlater retrieved.  The provider of the remote computing service or the sysopwould counterargue that the nature of computers always require theduplication and backup of any computer data, whether the data files are E-Mail or centrally-based financial or credit data.  Duplication does notnecessarily make E-Mail the same as financial or credit data stored inbusiness computers.  Centrally-based business information is more concernedwith the data processing.  That information is generally stored andretrieved by the same operator.  E-Mail is more concerned with personalcommunications between individuals where the sender transmits a privatemessage to be retrieved only by an intended recipient.  The sender and therecipient have subjective expectations of privacy that when viewedobjectively is reasonable.  Therefore, there is a constitutionally protectedexpectation of privacy under Katz v. U.S., 389 U.S. 347, 19 L.Ed. 88 S.Ct.507 (1967).  However, the prosecution would note under California v.Ciraolo, -- U.S. --, 106 S.Ct. 1809 (1984), the users would have to protecttheir electronic mail from any privacy intrusion.  The provider or operatorof the remote system has ultimate control of his system.  He has completeaccess to all areas of the system.  He could easily examine the material.The prosecution would note the user could not reasonably protect his privatedata from provider or operator invasion.  This "knot-hole" would exclude anyidea of privacy.  If there is no privacy, there can be no search andtherefore no Fourth Amendment constitutional violation.  Law enforcement canretrieve the material.FEDERAL WIRETAP STATUTES     The federal wiretap statutes, before the Electronic CommunicationPrivacy Act of 1986, protected oral telephone communications from policeinterceptions.  This protection was made in 1968 in response to electroniceavesdropping by government.  (Cohodas, Nadine, "Congress Races to stayAhead of Technology," Congressional Quarterly Weekly Report, May 31, 1986,1235.)  Although E-Mail appears to come under the statute's definition of"wire communication," under the old law, it was limited to audiotransmissions by wire or cable and does not mention stored computer data.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美精品乱码久久久久久| 91精品国产美女浴室洗澡无遮挡| 夜夜揉揉日日人人青青一国产精品| 欧美一区二区三区在线观看视频| 国产成都精品91一区二区三| 亚洲精品乱码久久久久久日本蜜臀| 日韩片之四级片| 91久久精品午夜一区二区| 国产一区三区三区| 婷婷开心激情综合| 成人欧美一区二区三区| 久久综合色综合88| 欧美乱熟臀69xxxxxx| 欧美日韩亚洲综合一区二区三区| 国产成人小视频| 久久99精品久久久久婷婷| 亚洲第一成年网| 亚洲免费在线视频| 国产欧美日韩亚州综合| 日韩丝袜情趣美女图片| 欧美久久久久免费| 欧美性猛交xxxxxx富婆| av在线不卡电影| 成人久久视频在线观看| 国产在线观看一区二区| 精品一区二区三区在线观看| 日韩不卡一区二区| 亚洲福利一区二区| 亚洲综合一区二区三区| 1024成人网| 中文字幕日韩精品一区| 国产拍揄自揄精品视频麻豆| 久久久亚洲精品石原莉奈| 欧美成人一级视频| 日韩欧美亚洲另类制服综合在线| 91超碰这里只有精品国产| 欧美私人免费视频| 欧美色爱综合网| 欧洲一区二区三区在线| 欧美视频日韩视频| 欧美日韩mp4| 欧美福利视频导航| 制服丝袜亚洲网站| 91精品国产91久久久久久最新毛片| 欧美日韩一级大片网址| 欧美日韩精品一区二区三区| 欧美少妇性性性| 欧美一级日韩一级| 日韩精品在线一区| 久久久99精品免费观看| 国产午夜精品在线观看| 国产精品美女久久久久av爽李琼| 日韩美女精品在线| 伊人一区二区三区| 亚洲va韩国va欧美va| 日韩在线观看一区二区| 成人免费毛片片v| 国产成人亚洲综合a∨猫咪| 成人短视频下载| 色偷偷成人一区二区三区91 | 综合婷婷亚洲小说| 亚洲免费在线视频一区 二区| 亚洲综合在线第一页| 视频一区二区中文字幕| 国产最新精品免费| 成人av网站免费| 欧美吻胸吃奶大尺度电影| 4438x亚洲最大成人网| 国产午夜三级一区二区三| 中文字幕亚洲欧美在线不卡| 亚洲午夜羞羞片| 国模套图日韩精品一区二区| 99久久免费精品高清特色大片| 欧美日韩一区高清| 欧美精品一区二区三| 综合欧美亚洲日本| 天天影视色香欲综合网老头| 国产一区二区成人久久免费影院| 成人av在线观| 欧美日韩精品专区| 国产视频一区在线播放| 亚洲精品videosex极品| 久久精品99国产国产精| 99久久精品一区二区| 制服丝袜国产精品| 国产精品久久午夜| 午夜不卡在线视频| 大美女一区二区三区| 欧美日韩国产不卡| 中文字幕精品三区| 日韩激情一区二区| 成人av网站免费| 日韩精品一区二区三区在线| 中文字幕在线播放不卡一区| 日av在线不卡| 成人动漫精品一区二区| 在线不卡免费av| 国产精品天干天干在观线| 青草国产精品久久久久久| 99re这里只有精品视频首页| 日韩欧美三级在线| 亚洲国产cao| 福利电影一区二区| 日韩午夜精品视频| 一区二区三区在线视频观看| 国产成人精品三级麻豆| 欧美日韩mp4| 一区二区三区在线视频观看58| 久久成人免费电影| 欧美日韩高清在线播放| 亚洲欧美日韩久久精品| 国产伦精品一区二区三区在线观看| 欧美日韩亚洲丝袜制服| 亚洲欧美视频在线观看| 国产露脸91国语对白| 欧美一区二区久久| 亚洲一区二区美女| 99久久精品99国产精品| 国产蜜臀av在线一区二区三区| 九九国产精品视频| 欧美精品乱人伦久久久久久| 夜夜精品浪潮av一区二区三区| www.欧美.com| 国产精品网站一区| 国产一区二区伦理| 久久这里只有精品6| 麻豆精品一区二区| 欧美精品久久天天躁| 天天操天天色综合| 欧美精品一区二区三区视频| 免费成人av在线播放| 337p亚洲精品色噜噜噜| 亚洲成a人v欧美综合天堂 | 91啪九色porn原创视频在线观看| 国产欧美日本一区视频| 国产精品99久| 久久夜色精品国产欧美乱极品| 久久电影网站中文字幕| 日韩视频免费观看高清完整版在线观看| 日本va欧美va欧美va精品| 欧美一区二区黄色| 精品一区二区在线视频| 精品日韩一区二区三区免费视频| 蜜臀av一区二区在线观看| 日韩精品在线一区| 国产在线不卡一卡二卡三卡四卡| 久久蜜桃av一区二区天堂| 国产成人在线看| 国产精品久久久久桃色tv| 97久久人人超碰| 樱桃国产成人精品视频| 欧美日产国产精品| 老司机精品视频在线| 久久美女艺术照精彩视频福利播放 | 欧美午夜精品久久久久久孕妇| 一区二区三区在线免费| 欧美疯狂性受xxxxx喷水图片| 日本欧美在线看| 26uuu精品一区二区| 粉嫩绯色av一区二区在线观看| 国产精品二三区| 欧美视频精品在线| 九九精品一区二区| 中文字幕亚洲不卡| 欧美美女激情18p| 精品一区二区三区免费播放| 欧美激情在线一区二区三区| 色播五月激情综合网| 日韩精品国产精品| 日本一区二区成人在线| 色菇凉天天综合网| 免费精品视频在线| 高清久久久久久| 激情综合色综合久久综合| 91在线观看一区二区| 国产欧美一二三区| 色婷婷综合激情| 一区二区三区四区在线免费观看| 国产精品欧美久久久久无广告| 亚洲福中文字幕伊人影院| 不卡的av电影在线观看| 五月婷婷激情综合网| 亚洲三级在线看| 久久久久国色av免费看影院| 91精品免费观看| 日本乱码高清不卡字幕| 国产成人亚洲综合色影视 | 国产凹凸在线观看一区二区| 亚洲bt欧美bt精品| 国产亚洲欧美色| 色激情天天射综合网| 国产成人鲁色资源国产91色综| 青青草成人在线观看| 日本美女一区二区三区| 亚洲欧美精品午睡沙发| 中文字幕+乱码+中文字幕一区| 精品国产欧美一区二区| 欧美一区二区黄色| 欧美夫妻性生活| 7777精品伊人久久久大香线蕉最新版|