Calendar No. 66
113th Congress Report
SENATE
1st Session 113-34
======================================================================
ELECTRONIC COMMUNICATIONS PRIVACY ACT AMENDMENTS ACT OF 2013
_______
May 16, 2013.--Ordered to be printed
_______
Mr. Leahy, from the Committee on the Judiciary,
submitted the following
R E P O R T
together with
ADDITIONAL VIEWS
[To accompany S. 607]
[Including cost estimate of the Congressional Budget Office]
The Committee on the Judiciary, to which was referred the
bill (S. 607), a bill to improve the provisions relating to the
privacy of electronic communications, having considered the
same, reports favorably thereon, with an amendment, and
recommends that the bill, as amended, do pass.
CONTENTS
Page
I. Background and Purpose of the Electronic Communications Privacy
Act Amendments Act of 2013.......................................2
II. History of the Bill and Committee Consideration..................7
III. Section-by-Section Summary of the Bill...........................8
IV. Congressional Budget Office Cost Estimate.......................10
V. Regulatory Impact Evaluation....................................11
VI. Conclusion......................................................11
VII. Additional Views of Senators Grassley and Sessions..............12
VIII.Changes to Existing Law Made by the Bill, as Reported...........20
I. Background and Purpose of the Electronic Communications Privacy Act
Amendments Act of 2013
A. THE ELECTRONIC COMMUNICATIONS PRIVACY ACT AMENDMENTS
The Electronic Communications Privacy Act (``ECPA'')
amended the Omnibus Crime Control and Safe Streets Act to
protect against the unauthorized interception of electronic
communications. When Senator Leahy introduced ECPA with Senator
Mathias on June 19, 1986, he said: ``The Electronic
Communications Privacy Act provides standards by which law
enforcement agencies may obtain access to both electronic
communications and the records of an electronic communications
system. These provisions are designed to protect legitimate law
enforcement needs while minimizing intrusions on the privacy of
system users as well as the business needs of electronic
communications system providers.''\1\ For almost three decades,
ECPA has been the premier privacy law protecting Americans from
unauthorized Government intrusions into their private
electronic communications.
---------------------------------------------------------------------------
\1\See Cong. Rec., June 19, 1986 at page S7993.
---------------------------------------------------------------------------
The Electronic Communications Privacy Act requires that the
Government obtain a court order, based upon probable cause, in
order to intercept wireless and data communications. The law
also requires that the Government obtain a search warrant in
order to compel a third-party service provider to disclose the
content of email, or other electronic communications, that the
provider maintains in electronic storage. However, this search
warrant requirement for email applies only if the email is 180
days old or less. Under ECPA, an email is presumed to be
abandoned after 180 days and the law allows the Government to
compel the disclosure of older email with either a subpoena or
a court order that is issued upon a finding that there are
specific and articulable facts demonstrating that the
information sought is relevant to a criminal investigation. The
ECPA also allows the Government to use a subpoena or court
order to compel disclosure of documents--regardless of their
age--that a user stores in the Internet ``cloud.''\2\
---------------------------------------------------------------------------
\2\See 18 U.S.C. Sec. 2703(d).
---------------------------------------------------------------------------
At the time that Congress enacted ECPA more than 25 years
ago, Congress assumed that most Americans would periodically
access their email accounts and download any emails that they
wished to read, and that third-party service providers would
subsequently delete any email stored on their servers. In fact,
Congress believed that the most extended period of time that a
service provider might store an email would be for six months.
After almost three decades, new technologies--such as the
Internet, social networking sites and cloud computing--have
changed how Americans use and store email today. Storing
documents and other information electronically has become much
less expensive and mobile technologies permit users to access
stored documents wherever the user chooses to access the
Internet. The digital privacy protections that the Congress put
in place by enacting ECPA have not kept pace with these
changes.
In March 2010, a diverse coalition of privacy and civil
liberties advocates, major technology companies, think tanks,
and academics wrote to Chairman Leahy to urge the Committee to
begin work on reforming the Electronic Communications Privacy
Act to reflect the realities of the digital age. The aptly
named ``Digital Due Process'' coalition argued that ECPA has
been out-paced by changes in technology and the growth of email
as a primary means of communicating. The Committee held the
first of several hearings and briefings on ECPA reform in
September 2010.
On January 11, 2011, Chairman Leahy announced that his
legislative agenda for the 112th Congress would include
legislation to update the Electronic Communications Privacy Act
to better protect Americans' digital privacy. In April 2011,
the Committee held a second hearing on ECPA reform effort that
focused specifically on the perspectives of the Departments of
Justice and Commerce on proposed updates to the law.\3\ On May
11, 2011, Chairman Leahy introduced the Electronic
Communications Privacy Act Amendments Act of 2011, S.1011,
legislation that would, among other things, update ECPA to
require a search warrant for the Government to access the
contents of any email obtained from a third-party service
provider. On September 20, 2012, Chairman Leahy offered this
portion of his ECPA reform bill as an amendment in the nature
of a substitute to H.R. 2471. The Committee favorably reported
this legislation on November 29, 2012.
---------------------------------------------------------------------------
\3\Although the Obama administration did not take an official
position on the legislative proposals to update ECPA, the Committee
received technical comments and feedback on these proposals from the
Departments of Justice and Commerce and other affected Federal
agencies.
---------------------------------------------------------------------------
Reform of the Electronic Communications Privacy Act
remained a top legislative priority for the Committee during
the 113th Congress. On March 18, 2013, Chairman Leahy and
Senator Mike Lee introduced the Electronic Communications
Privacy Act Amendments Act of 2013, S. 607. The legislation
establishes a uniform search warrant requirement for the
Government to compel the disclosure of all email content when
email is stored with a third-party service provider. This
bipartisan privacy legislation seeks to carefully balance the
privacy expectations of American citizens, the legitimate needs
of law enforcement agencies and the interests of the American
technology sector. The legislation is substantially identical
to ECPA reform proposal the Senate Judiciary Committee
favorably reported in November 2012.
The Committee recognizes that most Americans regularly use
email in their professional and personal lives for confidential
communications of a business or personal nature. The Committee
also recognizes that there is growing uncertainty about the
constitutionality of the provisions in ECPA that allow the
Government to obtain certain email content without a search
warrant.\4\ The absence of a clear legal standard for access to
electronic communications content not only endangers privacy
rights, but also endangers the admissibility of evidence in
criminal and other legal proceedings. Accordingly, the
Committee has determined that the law must be updated to keep
pace with the advances in technology in order to ensure the
continued vitality of the Fourth Amendment protections for
email and other electronic communications content.
---------------------------------------------------------------------------
\4\In 2010, the United States Court of Appeals for the Sixth
Circuit held that use of a subpoena or court order under section 2703
of ECPA to obtain the contents of emails violated the Fourth
Amendment's prohibition against warrantless searches. See United States
v. Warshak, 631 F.3d 266, 288 (6th Cir. 2010).
---------------------------------------------------------------------------
The reforms in the bill will better safeguard the privacy
of email and other electronic communications while allowing law
enforcement to carry out its important mission. The bill
contains several important provisions to ensure that the
reforms to ECPA do not hinder law enforcement. First, the bill
preserves the exceptions to the warrant requirement under
existing law. For example under current law, the Government
does not need a warrant in an emergency situation involving
danger of death or serious physical injury, or when a crime is
being committed.\5\ Second, to protect the integrity of ongoing
investigations, the bill adds a new notice requirement to the
law that requires service providers to notify the Government of
their intent to inform a customer about a disclosure of
electronic communications information at least three business
days before giving such notice.
---------------------------------------------------------------------------
\5\See 18 U.S.C. 2702(b).
---------------------------------------------------------------------------
In addition, the bill does not alter the legal authorities
that the Government currently uses to obtain electronic
communications content in national security matters.
Specifically, the bill provides that the search warrant
requirement does not apply to other Federal criminal or
national security laws, including Title III of the Omnibus
Crime Control and Safe Streets Act of 1986 (commonly known as
the ``Wiretap Act'') and the Foreign Intelligence Surveillance
Act of 1978 (commonly known as ``FISA'')). The Committee does
not intend for the bill to alter other existing statutory
authorities pursuant to which the Federal Government collects
electronic communications and related information, including
surveillance and other intelligence authorities. Accordingly,
the bill does not preclude any other legal authorities that
permit the acquisition by the United States Government of the
contents of wire or electronic communications, or other records
or information of a subscriber or customer of any electronic
communications service or remote computing service, pursuant to
other lawful authorities, including in Title 18 (e.g., chapters
119, 121 or 206), Title 50 (e.g., the Foreign Intelligence
Surveillance Act of 1978, as amended), or any other provision
of Federal law.
The bill also includes several provisions to help civil
enforcement agencies, such as the Federal Trade Commission and
the Securities and Exchange Commission, investigate corporate
wrongdoing and protect consumers. Section 3 of the bill adds
civil discovery subpoenas to the existing tools that the
Government may use to obtain non-content information under
ECPA. Section 3 of the bill also makes clear that the
Government may employ administrative, civil discovery and grand
jury subpoena to obtain corporate email and other electronic
communications directly from a corporate entity, when such
communications are contained on an internal email system.
In addition, the bill preserves the legal tools in existing
law for civil enforcement agencies to obtain electronic
communications information. For example, the bill preserves the
ability for civil enforcement agencies to issue subpoenas to a
service provider to compel the disclosure of email account
information (i.e. non-content information). The bill also
preserves the ability of such agencies to compel the target of
a civil enforcement investigation to produce electronic
communications content information to the Government, including
electronic communications content information that is stored
with a third party service provider. Lastly, to address
concerns about the potential destruction of evidence, the bill
preserves the tools in current law that allow the Government,
including civil enforcement agencies, to require a service
provider to preserve any evidence in its possession to included
stored email content.\6\
---------------------------------------------------------------------------
\6\See 18 U.S.C. 2703(f).
---------------------------------------------------------------------------
The objections to the bill raised in the additional view
are misguided and belied by a plain reading of the bill and
current law. First, the additional views incorrectly suggest
that the bill may adversely impact criminal investigations. As
discussed above, current law provides numerous exceptions to
the warrant requirement in ECPA to accommodate emergencies,
child exploitation matters and other criminal activity.\7\ The
bill preserves all of these exceptions. The additional views
also acknowledge that the well-established exigent
circumstances exception to the warrant requirement provides a
separate legal ground for the Government to obtain electronic
communications information without a warrant in time sensitive
situations.\8\ The authors provide no support to substantiate
their claim that these longstanding authorities are inadequate.
---------------------------------------------------------------------------
\7\See 18 U.S.C. 2702(b)(6), (7) and (8).
\8\See, e.g., Kentucky v. King, 563 U.S.___ (2011) (exception to
warrant requirement applies when the exigencies of the situation make
the needs of law enforcement so compelling that a warrantless search is
objectively reasonable under the Fourth Amendment.)
---------------------------------------------------------------------------
The additional views also incorrectly suggest that the bill
would adversely impact the important work of the Securities
Exchange Commission and other civil enforcement agencies. As
discussed above, under current law, civil enforcement agencies
can use subpoenas to among other things--(1) compel the
disclosure of stored communications from the targets of their
investigations, (2) obtain crucial customer records from
service providers and (3) require third-party service providers
to preserve any electronic communications information sought by
the Government. Contrary to the assertion in the additional
views, the bill does not eliminate administrative subpoenas. In
fact, the bill augments the subpoena authority of civil
agencies by permitting these agencies, for the first time, to
use civil discovery subpoenas to obtain records under ECPA.
Moreover, creating a broad statutory exception to the warrant
requirement for civil enforcement matters would eviscerate the
important privacy protections in the bill and in current law.
Such an exception would apply to all kinds of civil agencies at
the Federal, State and local level, including the Internal
Revenues Service. Such an exception could also circumvent the
warrant requirement in the bill, by permitting the Government
to use information obtained under the civil exception in a
related criminal matter. The Securities and Exchange Commission
and numerous other civil enforcement agencies have successfully
performed their duties by relying upon the civil tools already
in the law to acquire stored email content for decades, while
complying with the existing warrant requirement in the law for
emails that are less than 180 days old. There is no reason to
believe that this would not continue to be the case with a
uniform warrant requirement for all electronic communications
content.\9\
---------------------------------------------------------------------------
\9\To the extent that the Securities and Exchange Commission
requires additional legal authorities to compel the disclosure of
information, such authorities should be considered when Congress
reviews the laws enacted to govern how that agency investigates and
enforces civil regulatory matters. See, e.g., Section 19(c) of the
Securities Act of 1934 (15 U.S.C. 77(a), et seq.); Section 21(b) of the
Securities and Exchange Act (15 U.S.C. 78a, et seq.); Section 209(b) of
the Investment Advisers Act (15 U.S.C. 80b-1, et seq.); and Section
42(b) of the Investment Company Act (15 U.S.C 80a-1, et seq.).
---------------------------------------------------------------------------
Lastly, the additional reviews raise the prospect of adding
a statutory time limit to the bill. There is universal
agreement on the Committee that service providers should
provide timely responses to requests from law enforcement when
proper legal process has been obtained. The Committee believes
that the courts, which have familiarity with the specific facts
and circumstances of particular investigation, are in the best
position to address such timeliness issues.\10\ Therefore, the
bill appropriately recognizes the long-standing practice of
leaving such case-by-case decisions to the courts.\11\
---------------------------------------------------------------------------
\10\A statutory time limit imposed by Congress could be very
harmful to law enforcement, because such a requirement could cause
communications service providers make disclosures to the Government
based upon a ``first come, first served'' basis, without regards to the
specific facts and needs of law enforcement in particular case.
\11\The additional views also propose that the Committee examine
other reforms to ECPA, including clarifying the legal standard for law
enforcement to access geolocation information. In May 2011, Chairman
Leahy introduced legislation to update ECPA to address geolocation
information and other electronic privacy issues. The Committee held two
hearings on these forms and the Committee will continue to work on
these issues.
---------------------------------------------------------------------------
The carefully balanced ECPA reforms in the bill have
bipartisan support on the Committee, as well as the support of
a broad coalition of more than 100 privacy, civil liberties,
civil rights and technology organizations from across the
political spectrum. The organizations and individuals below
support the principles embodied in the legislation:
Technology Industry and Trade Associations: Adobe, AOL, the
Chamber of Commerce, eBay, Facebook, IBM, LinkedIn, Microsoft,
Symantec, Verizon, Business Software Alliance, Computer and
Communications Industry Association, Newspaper Association of
America, Software & Information Industry Alliance, and
TechAmerica.
Privacy, civil liberties and civil rights communities:
American Civil Liberties Union, Americans for Tax Reform,
American Library Association, Center for Constitutional Rights,
Center for Democracy & Technology, Competitive Enterprise
Institute, The Constitution Project, Electronic Frontier
Foundation, the Heritage Foundation, The Leadership Conference
on Civil and Human Rights, Liberty Coalition, Mexican American
Legal Defense and Educational Fund, Muslim Legal Fund of
America, NAACP, National Association of Criminal Defense
Lawyers, National Hispanic Media Coalition, National Urban
League, and TechFreedom.
Law Enforcement Community: William K. Sessions, Former
Director of the Federal Bureau of Investigation (1987-1993);
Zachary W. Carter, U.S. Attorney, Eastern District of New York
(1993-1999); W. Thomas Dillard, Assistant U.S. Attorney,
Eastern District of Tennessee (1967-1976, 1978-1983), U.S.
Attorney, Northern District of Florida (1983-1986); Saul A.
Green, U.S. Attorney, Eastern District of Michigan (1994-2001);
Rodger A. Heaton, U.S. Attorney, Central District of Illinois
(2005-2009); A. Melvin McDonald, U.S. Attorney, District of
Arizona (1981-1985); Jerome F. O'Neill, U.S. Attorney, District
of Vermont (1981), First Assistant U.S. Attorney, District of
Vermont (1975-1981); Stephen M. Orlofsky, U.S. District Judge,
District of New Jersey (1996-2003); U.S. Magistrate Judge,
District of New Jersey (1976-1980); and Ron Woods, U.S.
Attorney, Southern District of Texas (1990-1993).
II. History of the Bill and Committee Consideration
A. INTRODUCTION OF THE BILL
On March 18, 2013, Senators Leahy and Lee introduced S.
607--the Electronic Communications Privacy Act Amendments Act
of 2013.
B. COMMITTEE CONSIDERATION
Chairman Leahy placed S. 607 on the Committee's executive
business agenda on April 18, 2013. The Committee considered and
favorably reported this legislation on April 25, 2013.
The Committee has held two hearings related to S. 607. On
September 22, 2010, the Judiciary Committee held a hearing
entitled, ``The Electronic Communications Privacy Act:
Promoting Security and Protecting Privacy in the Digital Age.''
The hearing examined several gaps in this digital privacy law
that have resulted from changes in technology. The witnesses
for this hearing were: Cameron F. Kerry, General Counsel,
United States Department of Commerce; James A. Baker, Associate
Deputy Attorney General, United States Department of Justice;
James X. Dempsey, Vice President for Public Policy, Center for
Democracy and Technology; Brad Smith, General Counsel and
Senior Vice President, Legal and Corporate Affairs, Microsoft
Corporation; and Jamil N. Jaffer, Attorney, Washington, D.C.
During this hearing, Senator Leahy called for Congress to work
on bipartisan legislation to update ECPA to meet the privacy
demands of the digital age.
On April 6, 2011, the Judiciary Committee held a hearing
entitled, ``The Electronic Communications Privacy Act:
Government Perspectives on Privacy in the Digital Age.'' This
hearing examined potential updates to the Electronic
Communications Privacy Act to address inconsistencies in that
law, changes in technology, and new threats to privacy and
cybersecurity. The witnesses for this hearing were: Cameron
Kerry, General Counsel, United States Department of Commerce,
and James Baker, Associate Deputy Attorney General, United
States Department of Justice.
In addition, on November 29, 2012, the Committee considered
and favorably reported legislation substantially similar to S.
607 as part of H.R. 2471, the Video Privacy Protection Act
Amendments Act of 2012.
On April 25, 2013, the Senate Judiciary Committee favorably
reported S. 607 with the following two amendments:
First, Chairman Leahy offered a technical amendment to the
bill to make technical corrections to the rule of construction
language in the bill at the request of the Department of
Justice. The changes further clarify that the bill does not
apply to, or alter, any other Federal criminal or national
security laws that authorize the United States Government to
collect, or acquire, wire or electronic communications--or
related records--including the surveillance and other
intelligence authorities contained in the Wiretap Act (Chapter
119 of Title 18) and the Foreign Intelligence Surveillance Act
of 1978 (50 U.S.C. 1801, et seq.). The Committee unanimously
adopted the amendment by voice vote.
Second, Senator Grassley offered an amendment to require
that the Comptroller General of the United States conduct a
study and report to Congress by September 30, 2015 on how ECPA
is currently being applied, including the extent to which law
enforcement is relying upon section 2703 of ECPA to obtain
information in criminal matters, and how the law will be
affected by the new warrant requirement in the bill. The
Committee unanimously adopted the amendment by voice vote.
The Committee then voted to report the Electronic
Communications Privacy Act Amendments Act of 2013, as amended,
favorably to the Senate by voice vote.
III. Section-by-Section Summary of the Bill
The Leahy-Lee Electronic Communications Privacy Act
Amendments Act would update the privacy protections for
Americans' email and other electronic communications for the
digital age. The Electronic Communications Privacy Act (ECPA)
is one of the nation's premier digital privacy laws. After
three decades, ECPA has become outdated by vast technological
advances and changing law enforcement missions since the law's
initial enactment. The bill would update this law to improve
the privacy protections for electronic communications
information that is stored or maintained by third-party service
providers. The bill maintains the careful balance that Congress
struck when it first enacted the law--to continue to protect
and promote consumer privacy interests, law enforcement needs,
and American innovation in the digital age.
Section 1. Short title
This section designates the Act as the Electronic
Communications Privacy Act Amendments Act of 2013.
Section 2. Confidentiality of electronic communications
Section 2 amends Title 18, United States Code, Section 2702
(the Electronic Communications Privacy Act or ``ECPA'') to
prohibit an electronic communications or remote computing
service provider from voluntarily disclosing the contents of
its customers' email or other electronic communications to the
Government. There are limited exceptions to this prohibition
under current law, including customer consent and disclosure to
law enforcement to address criminal activity.
Section 3. Elimination of 180-day rule; Search warrant requirement for
content; Required disclosure of customer records
Section 3 amends ECPA so that the disclosure of the content
of email and other electronic communications by an electronic
communications or remote computing service provider to the
Government is subject to one clear legal standard--a search
warrant issued based on a showing of probable cause. The
provision eliminates the confusing and outdated ``180-day''
rule that calls for different legal standards for the
Government to obtain email content, depending upon the email's
age and whether the email has been opened. The provision also
requires that the Government notify the individual whose
account was disclosed, and provide that individual with a copy
of the search warrant and other details about the information
obtained. Such notice must be provided within ten business days
for a law enforcement agency, and three business days for other
agencies, of a Government entity's receipt of the
communications unless the notice is delayed pursuant to Section
4 of the bill.
Section 3 also reaffirms current law to clarify that the
Government may use an administrative or grand jury subpoena in
order to obtain certain kinds of electronic communication
records from a service provider, including customer name,
address, session time records, length of service information,
subscriber number and temporarily assigned network address, and
means and source of payment information. At the request of the
Department of Justice and the Federal Trade Commission, Section
3 also contains a provision that adds civil discovery subpoenas
to the types of subpoenas that may be used under existing law
(administrative subpoena authorized by Federal or State law,
Federal or State grand jury subpoena and trial subpoena) to
obtain routing and other non-content information from a third-
party provider.
Lastly, the section contains a rule of construction
regarding Government access to internal corporate email that
makes clear that nothing in the bill precludes the Government
from using a subpoena to obtain email and other electronic
communications content obtained from an intended recipient or
original sender, or to obtain such communications directly from
a company when the communications are to or from an officer,
agent or employee of a company and the company is acting as an
electronic communications service provider for its own internal
email system.
Section 4. Delayed notice
Section 4 amends section 2705 of ECPA to provide that the
Government may seek a court order to delay notifying an
individual of the fact that the Government has accessed the
contents of the individual's electronic communications for up
to 180 days if the requesting Government entity is a law
enforcement agency, and for up to 90 days if the requesting
Government entity is a civil or administrative enforcement
agency. A court may extend the delay periods for a period of up
to an additional 180 or 90 days at a time, respectively.
Section 4 also establishes a time limit on the period that
the Government could preclude a service provider from informing
its customer about the disclosure of electronic communications
information to the Government. If the Government entity is a
civil or administrative enforcement agency, the applicable time
period for preclusion of notice is 90 days. The time period for
preclusion may extend up to 180 days if the requesting
Government entity is a law enforcement agency. These time
periods may also be extended by a court for up to an additional
90 or 180 days at a time, respectively.
Lastly, Section 4 requires that service providers notify
the Government of their intent to inform a customer or
subscriber of the fact that the provider has disclosed the
individual's electronic communications information to the
Government at least three business days before the provider
gives such notice to the customer or subscriber. The purpose of
this provision is to ensure that the Government has an
opportunity to protect the integrity of its investigation and,
if warranted, to ask a court to delay the notification, before
such notice is given.
Section 5. Evaluation by the Government Accountability Office
Section 5 requires that the Comptroller General of the
United States submit a report to Congress by September 30,
2015, that evaluates, among other things, during the five years
prior to the effective date of the amendments in the bill--(1)
how often law enforcement relied upon section 2703 of ECPA to
requests electronic communications content information; (2) the
average length of time needed for service providers to comply
with such requests; (3) the number of times a warrant was used
for such requests; and (4) the number of times law enforcement
requested delayed notification pursuant to section 2705 of
ECPA. Section 5 also requires that the Comptroller General--(1)
the effects of the new warrant requirement contained in the
bill on the courts; (2) conduct a survey to determine the
average length of time required to respond to requests for
information; and (3) determine whether the new warrant
requirement in the bill resulted in an increase in the use of
the emergency exception to the warrant requirement in section
2702(b)(8) of ECPA.
Section 6. Rule of construction
Section 6 provides that the search warrant requirement for
electronic communications content contained in Section 3 of the
bill does not apply to any other Federal criminal or national
security laws, including Title III of the Omnibus Crime Control
and Safe Streets Act of 1986 (commonly known as the ``Wiretap
Act'') and the Foreign Intelligence Surveillance Act of 1978
(50 U.S.C. 1801, et seq. (commonly known as ``FISA'')).
IV. Congressional Budget Office Cost Estimate
The Committee sets forth, with respect to the bill, S. 607,
the following estimate and comparison prepared by the Director
of the Congressional Budget Office under section 402 of the
Congressional Budget Act of 1974:
May 16, 2013.
Hon. Patrick J. Leahy,
Chairman, Committee on the Judiciary,
U.S. Senate, Washington, DC.
Dear Mr. Chairman: The Congressional Budget Office has
prepared the enclosed cost estimate for S. 607, the Electronic
Communications Privacy Act Amendments Act of 2013.
If you wish further details on this estimate, we will be
pleased to provide them. The CBO staff contact is Mark
Grabowicz.
Sincerely,
Douglas W. Elmendorf.
Enclosure.
S. 607--Electronic Communications Privacy Act Amendments of 2013
S. 607 would amend the Electronic Communications Privacy
Act of 1986 (Public Law 99-508) to make several changes to the
current laws relating to the privacy of personal electronic
communications. The bill also would require the Government
Accountability Office (GAO) to prepare a report, by the end of
fiscal year 2015, on service providers' disclosure of customer
communications to law enforcement agencies.
Based on the cost of similar activities, CBO estimates that
it would cost $1 million to $2 million from appropriated funds
over the 2014-2015 period for GAO to prepare the report
required by the bill. CBO estimates that other provisions of
the bill would have no significant cost to the federal
government. Enacting the legislation would not affect direct
spending or revenues; therefore, pay-as-you-go procedures do
not apply.
S. 607 would impose intergovernmental mandates, as defined
in the Unfunded Mandates Reform Act (UMRA), by changing the
procedures that governmental agencies must follow when they
obtain electronic communications. Because the changes would
result in minimal additional spending, CBO estimates that the
costs of the intergovernmental mandates would be small and
would not exceed the threshold established in UMRA ($75 million
in 2013, adjusted annually for inflation).
S. 607 also would impose a private-sector mandate by
requiring providers of electronic communications and remote
computing services to inform the government before they notify
a customer or subscriber that they have disclosed information
to the government. Based on information from industry sources,
CBO estimates that the cost of the mandate would fall well
below the annual threshold established in UMRA for private-
sector mandates ($150 million in 2013, adjusted annually for
inflation).
The CBO staff contacts for this estimate are Mark Grabowicz
and Matthew Pickford (for federal costs), Elizabeth Cove
Delisle (for the impact on state, local, and tribal
governments), and Marin Burnett (for the impact on the private
sector). The estimate was approved by Theresa Gullo, Deputy
Assistant Director for Budget Analysis.
V. Regulatory Impact Evaluation
In compliance with rule XXVI of the Standing Rules of the
Senate, the Committee finds that no significant regulatory
impact will result from the enactment of S. 607.
VI. Conclusion
The bill, as amended, S. 607, provides greatly needed
updates to our Federal digital privacy laws. The bill carefully
balances the need to protect Americans' privacy rights in
cyberspace, with the legitimate needs of law enforcement and
the interests of the American technology sector. Given the many
advances in technology and new threats to privacy, the passage
and enactment of these important privacy updates is long
overdue.
VII. Additional Views
----------
ADDITIONAL VIEWS FROM SENATORS GRASSLEY AND SESSIONS
Amendments to the Electronic Communications Privacy Act Are Necessary
but Should Also Address the Impact on Law Enforcement, the Courts, and
Civil Regulatory Agencies
In the 112th Congress, we voted to report virtually the
same version of this bill because we believe that the
Electronic Communications Privacy Act of 1986 (``ECPA'') needs
to be updated to match advances in technology. However, we also
stated that the bill needed work to better protect email
privacy without hampering law enforcement agencies' ability to
obtain information in order to investigate serious crimes, as
well as civil regulatory agencies' ability to investigate
wrongdoing. We expressed concern that the bill did not strike
the proper balance, but it was the start of an important
discussion. We believe that these changes are important to
continue the carefully crafted balance between protecting
privacy and providing needed tools to law enforcement.
We find ourselves in the same position in this Congress. We
reiterate that the Committee should work to ensure that this
balance is continued as we update ECPA for decades to come.
First, the Committee should consider whether a more
comprehensive approach to updating the laws involving
electronic communications and data is warranted. This would
include looking to advances in technology for location
information in addition to the content of communications. It
would also assist in addressing the concerns that have been
raised by the law enforcement, technology, and privacy
communities. Second, the bill should address the ability of law
enforcement to obtain access to critical evidence, especially
in time-sensitive emergency cases. Third, and finally, more
consideration is needed with regard to the bill's removal of a
valuable tool from civil regulatory agencies, which rely on
administrative subpoenas to obtain email communications when
investigating insider trading, accounting fraud, and false or
misleading statements made by companies about their financial
situations.
We appreciate that members on the Committee share these
concerns and spoke up at the Committee mark-up to highlight the
need for modifications to the current bill. Additionally, we
welcome the views of the well-respected Chairwoman of the
Securities and Exchange Commission, Mary Jo White. While we
support the goal of harmonizing and updating ECPA, failure to
address these important issues and strike the proper balance
will be detrimental to not just the law enforcement and civil
regulatory agencies seeking to obtain necessary information,
but to the American people, businesses, and the court system
and may require future action from Congress to update other
parts of ECPA.
Current law
ECPA was enacted in 1986 as a result of advancements in
wireless communication technology and was designed to provide
modern rules for government access to electronic communications
and related data. It was designed to balance the public's
privacy interests with law enforcement's need to access
electronic communication information for investigative
purposes.\1\
---------------------------------------------------------------------------
\1\S. Rep. No. 99-541, pt. 3, at 5 (1986) (noting that, when ECPA
was first adopted, the Senate Judiciary Committee believed that it
``represent[ed] a fair balance between the privacy expectations of
American citizens and the legitimate needs of law enforcement
agencies'').
---------------------------------------------------------------------------
ECPA created a spectrum of legal standards depending on the
level of privacy interest in the information sought by the
government. For example, under current law, a government entity
may require a provider of electronic communication services to
disclose the contents of a wire or electronic communication
that is in electronic storage for 180 days or less pursuant to
a criminal search warrant.\2\ For communications stored with a
third party for more than 180 days, however, the statute
authorizes a lower legal burden.\3\ A government entity can
require a provider of electronic communication services to
disclose the contents of the communications either by search
warrant (without notice to the subscriber or customer), or by
administrative, grand jury, or trial subpoena, or a Section
2703(d) court order if notice is first provided to the
subscriber or customer.\4\ The basis for the ``180 day rule''
has been that if the emails are stored by a third party service
provider for more than six months, one's expectation of privacy
in the content of these communications diminishes, and these
records are therefore treated more akin to third party business
records than real-time communications. As a result, law
enforcement investigators have been able to use quicker and
more efficient methods of legal process (i.e., subpoena or
2703(d) order) to obtain the content contained in these older
emails and related records.\5\
---------------------------------------------------------------------------
\2\18 U.S.C. Sec. 2703(a) (2006).
\3\18 U.S.C. Sec. 2703(a) (2006).
\4\18 U.S.C. Sec. 2703(b) (2006).
\5\On March 19, 2013, while testifying before the House Judiciary
Subcommittee on Crime, Terrorism, Homeland Security, and
Investigations, Acting Assistant Attorney General Elana Tyrangiel
testified that the Department of Justice no longer supports
differentiating between emails kept in storage for less than 180 days
and emails stored for over 180 days. She did not indicate, however,
whether the Department had solicited input from the thousands of state
and local law enforcement professionals on the front lines prior to
offering a view that could adversely impact the course of their
investigations.
---------------------------------------------------------------------------
The ability to use a subpoena or a court order has allowed
law enforcement officials to gather older email content
information quickly in cases where time is of the essence and
probable cause may not yet have been developed. However, under
the bill criminal investigators would not be able to obtain
email information in criminal investigations until they have
developed probable cause and could obtain a search warrant.
Additionally, these same tools have permitted federal
regulatory agencies like the Securities and Exchange
Commission, the Food and Drug Administration, the Consumer
Product Safety Commission, and the Federal Trade Commission,
etc., to gather important information by administrative
subpoenas and carry out their enforcement responsibilities over
important industries. But this bill eliminates these
administrative subpoenas. Therefore, since civil investigators
have no criminal search warrant authority, they would no longer
be able to obtain the contents of emails unless a target of an
investigation or a charged defendant graciously provides the
incriminating email containing the ``smoking gun.'' Civil
regulators would then have no ability to compel the disclosure
of email content from third party Internet service providers.
As a result, the bill raises concerns over civil regulatory
agencies' ability to even undertake the types of investigations
Congress has authorized and empowered them to undertake.
ECPA reform requires a more comprehensive review
As an initial matter, in conducting a review of the laws
relating to electronic communications and related documents, we
agree that work needs to be done to ensure that our laws are up
to date and do not negatively impact business innovation and
development. We also need to address legitimate privacy
concerns. It is equally important, however, to hear from the
law enforcement community to ensure we do not limit their
ability to obtain information necessary to catch criminals and
terrorists who use electronic communications to further their
crimes. ECPA has specific definitions and has come to be
interpreted by courts in particular ways; therefore, any
amendment requires careful consideration to ensure we do not
create loopholes that make it harder for law enforcement to do
their jobs and allow criminals and terrorists to operate with
impunity.
Demonstrating the need for a comprehensive review, the bill
is silent regarding the use of ECPA to obtain data regarding
location information data. Increasingly, judges across the
country are examining whether ECPA allows law enforcement to
obtain location information data obtained from a handheld
device or from cellular site towers. The Committee on the
Judiciary in the House of Representatives recently held a
hearing to address this exact question.\6\ This hearing
examined the different legal tools law enforcement utilizes to
obtain stored, prospective, or real-time geolocation
information. Specifically, the hearing focused on the different
statutes employed to obtain this information, including the use
of ECPA, 2703(d) orders, pen registers, and combinations of
these various authorities.\7\ The testimony at the hearing
discussed the need for Congress to bring clarity to ECPA and
companion statutes to address the splits among the various
federal courts as part of any ECPA reform effort. This bill
does not include such endeavors and as a result, does not
examine ECPA in a comprehensive manner. The Committee should
follow the lead of the House Judiciary Committee and examine
these important issues to ensure that the proper balance is
struck with regard to all aspects of ECPA, including
geolocation.
---------------------------------------------------------------------------
\6\See The Electronic Communications Privacy Act (ECPA), Part 2:
Geolocation Privacy and Surveillance Before the H. Comm. on the
Judiciary, 113th Cong. (April 25, 2013).
\7\Id. (Statement of Mark Eckenwiler, Senior Counsel, Perkins Coie
LLP).
---------------------------------------------------------------------------
The amendment may adversely affect criminal investigations
Law enforcement representatives have raised concerns that
increasing the legal standard to require a criminal search
warrant for the content of all email communications regardless
of the length of time they have been in electronic storage will
hinder and delay criminal investigations.\8\ Criminal search
warrants require a showing of probable cause to believe that a
crime has been committed and that evidence of that crime will
be located in the place to be searched. This can be a
challenging standard, especially in cases where time is of the
essence.
---------------------------------------------------------------------------
\8\Id. at 2; Letter from the MCCPA, et al., to Chairman Leahy &
Ranking Member Grassley, supra note 7, at 2-3.
---------------------------------------------------------------------------
For example, in the early stages of a child abduction case
where time is of the essence, the facts are usually not fully
known. Investigators often cannot establish probable cause to
search a missing child's email account--or a similar account
such as Facebook or Twitter--because it is not clear that a
kidnapping has occurred or that evidence of that crime will be
found in the child's email account. However, under current law,
investigators have been able to access the contents of a
child's email account by using grand jury subpoenas or court
orders, thereby identifying valuable investigative leads and
even perpetrators who may have been communicating with the
child.
Under the bill, however, investigators have no way to
compel the disclosure of this vital information and are left at
the mercy of parental consent or voluntary disclosure by
service providers. While neither of these scenarios requires a
warrant, they are both highly problematic for other reasons.
Investigators would encounter issues with parental consent when
a child's parents are unavailable because they are dead or
missing, or unwilling to consent when they are targets of the
investigation.
Voluntary disclosure by service providers is likewise
unreliable, because the bill does not address the current
standard in Section 2702(b) of Title 18, United States Code on
emergency disclosures. This section merely requires service
providers to voluntarily disclose email content information to
law enforcement officials if the provider, in good faith,
believes that an emergency involving danger of death or serious
physical injury to any person requires the disclosure without
delay of the communication. But, even if an emergency arises
and time is of the essence, the bill does not require a service
provider to disclose important information to law enforcement
investigators. Early in an investigation, when any information
as to the location of the child and identity of the kidnappers
is absolutely critical, a provider may be reluctant to
voluntarily disclose information without a warrant for a number
of reasons. These might include a fear of litigation for
disclosing a customer's information without a warrant,
declining to accept law enforcement's assertion that there are
enough facts to justify an emergency, implementing a policy of
always requiring a search warrant, and many other possible
impediments to the rapid recovery of the child.
Some members of the Committee have stated that the
traditional ``exigent circumstances'' to the Fourth Amendment
would be sufficient to permit investigators to seize the
electronic communication information without a warrant. Despite
assurances from supporters of the bill that the traditional
exigent circumstances exception would apply in the event this
bill becomes law, this is not a settled issue by any means.
As a threshold matter, courts across the country disagree
as to whether the contents of email stored in the hands of a
third party service provider trigger privacy protection under
the Fourth Amendment. Some courts have held that emails are
analogous to a mailed letter, and that an individual's
reasonable expectation of privacy ends upon delivery of the
letter or the transmission of the email to the recipient.\9\
Other courts have reached a different conclusion, holding that
a subscriber enjoys a reasonable expectation of privacy in the
content of emails that are stored or sent and received through
a third-party internet service provider.\10\ Unfortunately, the
Committee never held a hearing, heard witnesses or reviewed
evidence, or even had the opportunity to debate this important
question.
---------------------------------------------------------------------------
\9\See, e.g., United States v. Lifshitz, 369 F.3d 173, 190 (2d Cir.
2004) (holding that, like letter-writers whose expectation of privacy
ends upon delivery of the letter, individuals may not possess a
legitimate expectation of privacy ``in transmissions over the Internet
or e-mail that have already arrived at the recipient''); United States
v. Dupree, 781 F.Supp.2d 115, 159 (E.D.N.Y.2011) (finding that
defendants could ``not claim a legitimate expectation of privacy in
emails that they gave [an employee] permission to access and view'');
State v. Hinton, 280 P.3d 476, 482 (Wash. App. 2012) (ruling that the
defendant's expectation of privacy in a text message terminated upon
the message's delivery to the recipient). Furthermore, the Supreme
Court has held that the Fourth Amendment did not prevent the government
from reviewing electronic pager messages of its employees. City of
Ontario v. Quon, 130 S.Ct. 2619 (2010).
\10\See, e.g., United States v. Warshak, 631 F.3d 266, 288 (6th
Cir. 2010) (holding that ``a subscriber enjoys a reasonable expectation
of privacy in the contents of emails `that are stored with, or sent or
received through, a commercial [internet service provider]'''); United
States v. Forrester, 512 F.3d 500, 509-11 (9th Cir. 2008) (finding that
a customer does not have a legitimate expectation of privacy in the
email addresses attached to transmitted messages or the internet
protocol addresses visited on a home computer because that information
is voluntarily conveyed to the service provider, but distinguishing
between addresses and the content of messages, noting that ``the
contents may deserve Fourth Amendment protection, but the address and
size of the package do not'').
---------------------------------------------------------------------------
But even assuming arguendo that traditional Fourth
Amendment exceptions apply, the exigent circumstances exception
to the warrant requirement would not be helpful in obtaining
email content because the bill leaves law enforcement officials
at the mercy of the service providers, even in an emergency.
Law enforcement investigators, who have the training and
experience in such matters, should be making the determination
as to what constitutes an emergency situation--not an untrained
employee of a service provider. An emergency exception that
allows law enforcement professionals to determine the existence
of an emergency and requires service providers to disclose the
requested information is a potential fix that might help
address some law enforcement concerns and might help
recalibrate ECPA so that there is better balance between
privacy and public safety.
Finally, we have a related concern as to whether Congress
should be looking at setting time limits to ensure timely
compliance with the search warrants. By raising all content
requests to a search warrant standard, the bill would delegate
authority to every state, local, and federal judge to manage
requests for email content. This is important because,
traditionally, search warrants do not operate like subpoenas,
where recipients are typically given up to 14 days to respond.
Instead, search warrants usually require immediate processing
and prompt reporting back to the judge. However, law
enforcement officials have advised us that third-party service
providers do not always provide prompt compliance.
Additionally, because the statute is silent on this matter,
courts often create their own time limits. We should consider
whether uniform time limits for compliance with the search
warrant are appropriate and seek to avoid the confusion
inherent with third-party compliance wrought by the variable
time limits set by the different federal and state courts
issuing these warrants.
Civil investigations could be adversely affected
As noted above, under the bill, agencies with civil
regulatory authority will no longer be able to compel access to
older email content because the amendment removes the
administrative subpoena as a tool to obtain email
communications. The bill permits criminal search warrants as
the sole legal vehicle to compel disclosure of email content.
Without criminal search warrant authority, these civil federal
agencies reported to us that the amendment will negatively
impact their investigations.
For example, Securities and Exchange Commission Chairwoman
Mary Jo White recently sent a letter to the Committee outlining
her concerns that the SEC will be unable to obtain critical
emails necessary to investigate civil securities fraud
statutes. Specifically, she wrote that the legislation, in its
current form, could have an impact on the Commission's
``ability to protect investors and to assist victims of
securities fraud.''\11\
---------------------------------------------------------------------------
\11\Letter from SEC to U.S. Senate Judiciary Committee Chairman
Leahy (April 24, 2013) (attached in appendix).
---------------------------------------------------------------------------
Chairman White's letter also argues that the proposed
``work-arounds'' that have been suggested would be inadequate.
For example, some argue that the solution is to simply obtain
emails from the targets of the investigation.\12\ Chairman
White argues that often time these individuals delete relevant
emails or otherwise fail to provide them despite obtaining a
subpoena.\13\ As a result, the Chairman White fears that this
could embolden non-compliance with subpoenas by targets of
investigations.\14\
---------------------------------------------------------------------------
\12\Id. at 2-3.
\13\Id.
\14\Id.
---------------------------------------------------------------------------
Additionally, Chairman White argues against those who say
the SEC could simply work with the Justice Department to obtain
a warrant.\15\ She notes that, ``the Commission cannot request
that the DOJ apply for a search warrant on the SEC's behalf.''
Further, she adds that the vast majority of cases investigated
by the SEC are not criminal and therefore would be outside the
scope of ability to obtain a warrant--effectively limiting
enforcement.\16\
---------------------------------------------------------------------------
\15\Id. at 2.
\16\Id.
---------------------------------------------------------------------------
To remedy this, Chairman White advocates for an amendment
to allow a judicial standard for civil matters akin to a
criminal search warrant.\17\ This is an idea worth considering
as we move forward. It would still require a ruling from a
judge of a competent jurisdiction, similar to what we will
allow for criminal cases under this bill, while retaining the
protections provided in this bill.
---------------------------------------------------------------------------
\17\Id. at 3.
---------------------------------------------------------------------------
The SEC relies on email communications to help determine a
person's intent, agreements and conspiracies to defraud, and
patterns of illegal conduct when investigating allegations of
insider trading, accounting fraud, and providing false or
misleading information about securities and the companies that
issue them. In providing technical assistance to the Ranking
Member in evaluating the bill, the SEC advised that this
legislation would significantly impact the SEC's enforcement of
the securities laws--including insider trading.
The SEC recently filed a civil case against two individuals
alleging that over a period of years they engaged in a scheme
to artificially inflate the financial results of a publicly
owned retailer by engaging in a series of fraudulent financial
transactions. During the investigation, the SEC obtained an
email using an ECPA-authorized subpoena showing that one of the
defendants sent an email describing the publicly owned
company's commitment to buy certain products and services at
inflated prices. The email stated ``the fake credits that were
negotiated with'' the company were being used ``to hit certain
quarterly numbers.'' This evidence was particularly important
because the defendants were sophisticated and had cleverly and
carefully concealed their scheme. The SEC subpoenaed the
Internet Service Provider (ISP) because an individual in the
case had failed to produce an email from one of his personal
email account in response to a subpoena issued to him almost a
year earlier. SEC investigators confronted the defendant with
the email obtained from the ISP. The defendant then produced
his personal email, including this inculpatory one. This
example demonstrates how important the administrative subpoena
is in the civil regulatory context; indeed, it can be the
difference between enforcing the laws and watching helplessly
as crafty fraudsters escape liability and accountability for
their crimes.
The SEC has also advised us that investigative
administrative subpoenas for email from ISPs are highly
valuable in other situations, such as: (1) when investigators
are attempting to locate stolen assets of victimized investors,
(2) where the target of an investigation lives outside the
United States, and (3) where the target of an investigation
claims to have deleted all of their emails, has a damaged hard
drive, or simply withholds the evidence.
The administrative subpoena is a vital tool for other
federal civil enforcement agencies as well. The Food and Drug
Administration also uses administrative subpoenas to review
email communications to investigate allegations regarding
violations of food and drug safety laws. The Consumer Product
Safety Commission and the Federal Trade Commission use email
communications to investigate allegations of fraud, deception,
and unfair business practices in the marketplace. The
Commodities and Futures Trading Commission (CFTC) relies on
email communications to investigate fraud, manipulation, and
abusive trading practices in the marketplace. Through effective
oversight, the CFTC enables the futures markets to serve the
important function of providing a means for price discovery and
offsetting price risk.
Conclusion
We agree that ECPA reform is needed to address the dramatic
advances to technology over the last three decades. We have
concerns, however, with the version reported by the Committee.
There are very valid concerns raised by the law enforcement
community and civil regulatory agencies and those concerns
should be addressed. ECPA is an important privacy law and
advances in technology warrant an update. However, in addition
to the changes made for content in this bill, ECPA reform
should address some of these other concerns raised to ensure we
have a comprehensive approach that strikes the proper balance
between privacy and public safety. Going forward, we trust that
the Committee will address the concerns described above so that
ECPA reform can be achieved.
Charles E. Grassley.
Jeff Sessions.
VIII. Changes to Existing Law Made by the Bill, as Reported
In compliance with paragraph 12 of rule XXVI of the
Standing Rules of the Senate, changes in existing law made by
S. 607, as reported, are shown as follows (existing law
proposed to be omitted is enclosed in black brackets, new
matter is printed in italic, and existing law in which no
change is proposed is shown in roman):
18 USC Sec. 2702--VOLUNTARY DISCLOSURE OF CUSTOMER COMMUNICATIONS OR
RECORDS
(a) Prohibitions.--Except as provided in subsection (b) or
(c)--
(1) a person or entity providing an electronic
communication service to the public shall not knowingly
divulge to any person or entity the contents of a
communication while in electronic storage by that
service; and
(2) a person or entity providing remote computing
service to the public shall not knowingly divulge to
any person or entity the contents of any communication
which is carried or maintained on that service--
(A) on behalf of, and received by means of
electronic transmission from (or created by
means of computer processing of communications
received by means of electronic transmission
from), a subscriber or customer of such
service;
(B) solely for the purpose of providing
storage or computer processing services to such
subscriber or customer, if the provider is not
authorized to access the contents of any such
communications for purposes of providing any
services other than storage or computer
processing; and
(3) [a provider of remote computing service or
electronic communication service to the public shall
not knowingly divulge a record or other information
pertaining to a subscriber to or customer of such
service (not including the contents of communications
covered by paragraph (1) or (2)) to any Governmental
entity.] a provider of remote computing service or
electronic communication service to the public shall
not knowingly divulge to any Governmental entity the
contents of any communication described in section
2703(a), or any record or other information pertaining
to a subscriber or customer of such service.
(b) Exceptions for Disclosure of Communications.--A
provider described in subsection (a) may divulge the contents
of a communication--
(1) to an addressee or intended recipient of such
communication or an agent of such addressee or intended
recipient;
(2) as otherwise authorized in section 2517,
2511(2)(a), or 2703 of this title;
(3) with the lawful consent of the originator or an
addressee or intended recipient of such communication,
or the subscriber in the case of remote computing
service;
(4) to a person employed or authorized or whose
facilities are used to forward such communication to
its destination;
(5) as may be necessarily incident to the rendition
of the service or to the protection of the rights or
property of the provider of that service;
(6) to the National Center for Missing and Exploited
Children, in connection with a report submitted thereto
under section 2258A;
(7) to a law enforcement agency--
(A) if the contents--
(i) were inadvertently obtained by
the service provider; and
(ii) appear to pertain to the
commission of a crime; or
(8) to a Governmental entity, if the provider, in
good faith, believes that an emergency involving danger
of death or serious physical injury to any person
requires disclosure without delay of communications
relating to the emergency.
(c) Exceptions for Disclosure of Customer Records.--A
provider described in subsection (a) may divulge a record or
other information pertaining to a subscriber to or customer of
such service (not including the contents of communications
covered by subsection (a)(1) or (a)(2))--
(1) as otherwise authorized in section 2703;
(2) with the lawful consent of the customer or
subscriber;
(3) as may be necessarily incident to the rendition
of the service or to the protection of the rights or
property of the provider of that service;
(4) to a Governmental entity, if the provider, in
good faith, believes that an emergency involving danger
of death or serious physical injury to any person
requires disclosure without delay of information
relating to the emergency;
(5) to the National Center for Missing and Exploited
Children, in connection with a report submitted thereto
under section 2258A; or
(6) to any person other than a Governmental entity.
(d) Reporting of Emergency Disclosures.--On an annual
basis, the Attorney General shall submit to the Committee on
the Judiciary of the House of Representatives and the Committee
on the Judiciary of the Senate a report containing--
(1) the number of accounts from which the Department
of Justice has received voluntary disclosures under
subsection (b)(8); and
(2) a summary of the basis for disclosure in those
instances where--
(A) voluntary disclosures under subsection
(b)(8) were made to the Department of Justice;
and
(B) the investigation pertaining to those
disclosures was closed without the filing of
criminal charges.
18 USC Sec. 2703--REQUIRED DISCLOSURE OF CUSTOMER COMMUNICATIONS OR
RECORDS
[(a) Contents of Wire or Electronic Communications in
Electronic Storage.--A Governmental entity may require the
disclosure by a provider of electronic communication service of
the contents of a wire or electronic communication, that is in
electronic storage in an electronic communications system for
one hundred and eighty days or less, only pursuant to a warrant
issued using the procedures described in the Federal Rules of
Criminal Procedure (or, in the case of a State court, issued
using State warrant procedures) by a court of competent
jurisdiction. A Governmental entity may require the disclosure
by a provider of electronic communications services of the
contents of a wire or electronic communication that has been in
electronic storage in an electronic communications system for
more than one hundred and eighty days by the means available
under subsection (b) of this section.
[(b) Contents of Wire or Electronic Communications in a
Remote Computing Service.--
[(1) A Governmental entity may require a provider of
remote computing service to disclose the contents of
any wire or electronic communication to which this
paragraph is made applicable by paragraph (2) of this
subsection--
[(A) without required notice to the
subscriber or customer, if the Governmental
entity obtains a warrant issued using the
procedures described in the Federal Rules of
Criminal Procedure (or, in the case of a State
court, issued using State warrant procedures)
by a court of competent jurisdiction; or
[(B) with prior notice from the Governmental
entity to the subscriber or customer if the
Governmental entity--
[(i) uses an administrative subpoena
authorized by a Federal or State
statute or a Federal or State grand
jury or trial subpoena; or
[(ii) obtains a court order for such
disclosure under subsection (d) of this
section; except that delayed notice may
be given pursuant to section 2705 of
this title.
[(2) Paragraph (1) is applicable with respect to any
wire or electronic communication that is held or
maintained on that service--
[(A) on behalf of, and received by means of
electronic transmission from (or created by
means of computer processing of communications
received by means of electronic transmission
from), a subscriber or customer of such remote
computing service; and
[(B) solely for the purpose of providing
storage or computer processing services to such
subscriber or customer, if the provider is not
authorized to access the contents of any such
communications for purposes of providing any
services other than storage or computer
processing.
[(c) Records Concerning Electronic Communication Service or
Remote Computing Service.--
[(1) A Governmental entity may require a provider of
electronic communication service or remote computing
service to disclose a record or other information
pertaining to a subscriber to or customer of such
service (not including the contents of communications)
only when the Governmental entity--
[(A) obtains a warrant issued using the
procedures described in the Federal Rules of
Criminal Procedure (or, in the case of a State
court, issued using State warrant procedures)
by a court of competent jurisdiction;
[(B) obtains a court order for such
disclosure under subsection (d) of this
section;
[(C) has the consent of the subscriber or
customer to such disclosure;
[(D) submits a formal written request
relevant to a law enforcement investigation
concerning telemarketing fraud for the name,
address, and place of business of a subscriber
or customer of such provider, which subscriber
or customer is engaged in telemarketing (as
such term is defined in section 2325 of this
title); or
[(E) seeks information under paragraph (2).
[(2) A provider of electronic communication service
or remote computing service shall disclose to a
Governmental entity the--
[(A) name;
[(B) address;
[(C) local and long distance telephone
connection records, or records of session times
and durations;
[(D) length of service (including start date)
and types of service utilized;
[(E)telephone or instrument number or other
subscriber number or identity, including any
temporarily assigned network address; and
[(F) means and source of payment for such
service (including any credit card or bank
account number), of a subscriber to or customer
of such service when the Governmental entity
uses an administrative subpoena authorized by a
Federal or State statute or a Federal or State
grand jury or trial subpoena or any means
available under paragraph (1).
[(3) A Governmental entity receiving records or
information under this subsection is not required to
provide notice to a subscriber or customer.]
(a) Contents of Wire or Electronic Communications.--A
Governmental entity may require the disclosure by a provider of
electronic communication service or remote computing service of
the contents of a wire or electronic communication that is in
electronic storage with or otherwise stored, held, or
maintained by the provider only if the Governmental entity
obtains a warrant issued using the procedures described in the
Federal Rules of Criminal Procedure (or, in the case of a State
court, issued using State warrant procedures) that is issued by
a court of competent jurisdiction directing the disclosure.
(b) Notice.--Except as provided in section 2705, not later
than 10 business days, in the case of a law enforcement agency,
or not later than 3 days, in the case of any other Governmental
entity, after a Governmental entity receives the contents of a
wire or electronic communication of a subscriber or customer
from a provider of electronic communication service or remote
computing service under subsection (a), the Governmental entity
shall serve upon, or deliver to by registered or first-class
mail, electronic mail, or other means reasonably calculated to
be effective, as specified by the court issuing the warrant,
the subscriber or customer--
(1) a copy of the warrant; and
(2) a notice that includes the information referred
to in clause (i) and (ii) of section 2705(a)(4)(B).
(c) Records Concerning Electronic Communication Service or
Remote Computing Service.--
(1) In general.--Subject to paragraph (2), a
Governmental entity may require a provider of
electronic communication service or remote computing
service to disclose a record or other information
pertaining to a subscriber or customer of the provider
or service (not including the contents of
communications), only if the Governmental entity--
(A) obtains a warrant issued using the
procedures described in the Federal Rules of
Criminal Procedure (or, in the case of a State
court, issued using State warrant procedures)
that is issued by a court of competent
jurisdiction directing the disclosure;
(B) obtains a court order directing the
disclosure under subsection (d);
(C) has the consent of the subscriber or
customer to the disclosure; or
(D) submits a formal written request relevant
to a law enforcement investigation concerning
telemarketing fraud for the name, address, and
place of business of a subscriber or customer
of the provider or service that is engaged in
telemarketing (as defined in section 2325).
(2) Information to be disclosed.--A provider of
electronic communication service or remote computing
service shall, in response to an administrative
subpoena authorized by Federal or State statute, a
grand jury, trial, or civil discovery subpoena, or any
means authorized under paragraph (1), disclose to a
Governmental entity the--
(A) name;
(B) address;
(C) local and long distance telephone
connection records, or records of session times
and durations;
(D) length of service (including start date)
and types of service used;
(E) telephone or instrument number or other
subscriber number or identity, including any
temporarily assigned network address; and
(F) means and source of payment for such
service (including any credit card or bank
account number), of a subscriber or customer of
such service.
(3) Notice not required.--A Governmental entity that
receives records or information under this subsection
is not required to provide notice to a subscriber or
customer.
(d) Requirements for Court Order.--[A court order for
disclosure under subsection (b) or (c)] A court order for
disclosure under subsection (c) may be issued by any court that
is a court of competent jurisdiction and shall issue only if
the Governmental entity offers specific and articulable facts
showing that there are reasonable grounds to believe that [the
contents of a wire or electronic communication, or] the records
or other information sought, are relevant and material to an
ongoing criminal investigation. In the case of a State
Governmental authority, such a court order shall not issue if
prohibited by the law of such State. A court issuing an order
pursuant to this section, on a motion made promptly by the
service provider, may quash or modify such order, if the
information or records requested are unusually voluminous in
nature or compliance with such order otherwise would cause an
undue burden on such provider.
(e) No Cause of Action Against a Provider Disclosing
Information Under This Chapter.--No cause of action shall lie
in any court against any provider of wire or electronic
communication service, its officers, employees, agents, or
other specified persons for providing information, facilities,
or assistance in accordance with the terms of a court order,
warrant, subpoena, statutory authorization, or certification
under this chapter.
(f) Requirement To Preserve Evidence.--
(1) In general.--A provider of wire or electronic
communication services or a remote computing service,
upon the request of a Governmental entity, shall take
all necessary steps to preserve records and other
evidence in its possession pending the issuance of a
court order or other process.
(2) Period of retention.--Records referred to in
paragraph (1) shall be retained for a period of 90
days, which shall be extended for an additional 90-day
period upon a renewed request by the Governmental
entity.
(g) Presence of Officer Not Required.--Notwithstanding
section 3105 of this title, the presence of an officer shall
not be required for service or execution of a search warrant
issued in accordance with this chapter requiring disclosure by
a provider of electronic communications service or remote
computing service of the contents of communications or records
or other information pertaining to a subscriber to or customer
of such service.
(h) Rule of Construction.--Nothing in this section or in
section 2702 shall be construed to limit the authority of a
Governmental entity to use an administrative subpoena
authorized under a Federal or State statute or to use a Federal
or State grand jury, trial, or civil discovery subpoena to--
(1) require an originator, addressee, or intended
recipient of an electronic communication to disclose
the contents of the electronic communication to the
Governmental entity; or
(2) require an entity that provides electronic
communication services to the officers, directors,
employees, or agents of the entity (for the purpose of
carrying out their duties) to disclose the contents of
an electronic communication to or from an officer,
director, employee, or agent of the entity to a
Governmental entity, if the electronic communication is
held, stored, or maintained on an electronic
communications system owned or operated by the entity.
18 USC Sec. 2705--DELAYED NOTICE
[(a) Delay of Notification.--
[(1) A Governmental entity acting under section
2703(b) of this title may--
[(A) where a court order is sought, include
in the application a request, which the court
shall grant, for an order delaying the
notification required under section 2703(b) of
this title for a period not to exceed ninety
days, if the court determines that there is
reason to believe that notification of the
existence of the court order may have an
adverse result described in paragraph (2) of
this subsection; or
[(B) where an administrative subpoena
authorized by a Federal or State statute or a
Federal or State grand jury subpoena is
obtained, delay the notification required under
section 2703(b) of this title for a period not
to exceed ninety days upon the execution of a
written certification of a supervisory official
that there is reason to believe that
notification of the existence of the subpoena
may have an adverse result described in
paragraph (2) of this subsection.
[(2) An adverse result for the purposes of paragraph
(1) of this subsection is--
[(A) endangering the life or physical safety
of an individual;
[(B) flight from prosecution;
[(C) destruction of or tampering with
evidence;
[(D) intimidation of potential witnesses; or
[(E) otherwise seriously jeopardizing an
investigation or unduly delaying a trial.
[(3) The Governmental entity shall maintain a true
copy of certification under paragraph (1)(B).
[(4) Extensions of the delay of notification provided
in section 2703 of up to ninety days each may be
granted by the court upon application, or by
certification by a Governmental entity, but only in
accordance with subsection (b) of this section.
[(5) Upon expiration of the period of delay of
notification under paragraph (1) or (4) of this
subsection, the Governmental entity shall serve upon,
or deliver by registered or first-class mail to, the
customer or subscriber a copy of the process or request
together with notice that--
[(A) states with reasonable specificity the
nature of the law enforcement inquiry; and
[(B) informs such customer or subscriber--
[(i) that information maintained for
such customer or subscriber by the
service provider named in such process
or request was supplied to or requested
by that Governmental authority and the
date on which the supplying or request
took place;
[(ii) that notification of such
customer or subscriber was delayed;
[(iii) what Governmental entity or
court made the certification or
determination pursuant to which that
delay was made; and
[(iv) which provision of this chapter
allowed such delay.
[(6) As used in this subsection, the term
``supervisory official'' means the investigative agent
in charge or assistant investigative agent in charge or
an equivalent of an investigating agency's headquarters
or regional office, or the chief prosecuting attorney
or the first assistant prosecuting attorney or an
equivalent of a prosecuting attorney's headquarters or
regional office.
[(b) Preclusion of Notice to Subject of Governmental
Access.--A Governmental entity acting under section 2703, when
it is not required to notify the subscriber or customer under
section 2703(b)(1), or to the extent that it may delay such
notice pursuant to subsection (a) of this section, may apply to
a court for an order commanding a provider of electronic
communications service or remote computing service to whom a
warrant, subpoena, or court order is directed, for such period
as the court deems appropriate, not to notify any other person
of the existence of the warrant, subpoena, or court order. The
court shall enter such an order if it determines that there is
reason to believe that notification of the existence of the
warrant, subpoena, or court order will result in--
[(1) endangering the life or physical safety of an
individual;
[(2) flight from prosecution;
[(3) destruction of or tampering with evidence;
[(4) intimidation of potential witnesses; or
[(5) otherwise seriously jeopardizing an
investigation or unduly delaying a trial.]
(a) Delay of Notification.--
(1) In general. A Governmental entity that is seeking
a warrant under section 2703(a) may include in the
application for the warrant a request for an order
delaying the notification required under section
2703(a) for a period of not more than 180 days, in the
case of a law enforcement agency, or not more than 90
days, in the case of any other Governmental entity.
(2) Determination.--A court shall grant a request for
delayed notification made under paragraph (1) if the
court determines that there is reason to believe that
notification of the existence of the warrant may result
in
(A) endangering the life or physical safety
of an individual;
(B) flight from prosecution;
(C) destruction of or tampering with
evidence;
(D) intimidation of potential witnesses; or
(E) otherwise seriously jeopardizing an
investigation or unduly delaying a trial.
(3) Extension.--Upon request by a Governmental
entity, a court may grant 1 or more extensions of the
delay of notification granted under paragraph (2) of
not more than 180 days, in the case of a law
enforcement agency, or not more than 90 days, in the
case of any other Governmental entity.
(4) Expiration of the delay of notification.--Upon
expiration of the period of delay of notification under
paragraph (2) or (3), the Governmental entity shall
serve upon, or deliver to by registered or first-class
mail, electronic mail or other means reasonably
calculated to be effective as specified by the court
approving the search warrant, the customer or
subscriber--
(A) a copy of the warrant; and
(B) notice that informs the customer or
subscriber--
(i) of the nature of the law
enforcement inquiry with reasonable
specificity;
(ii) that information maintained for
the customer or subscriber by the
provider of electronic communication
service or remote computing service
named in the process or request was
supplied to, or requested by, the
Governmental entity;
(iii) of the date on which the
warrant was served on the provider and
the date on which the information was
provided by the provider to the
Governmental entity;
(iv) that notification of the
customer or subscriber was delayed;
(v) the identity of the court
authorizing the delay; and
(vi) of the provision of this chapter
under which the delay was authorized.
(b) Preclusion of Notice to Subject of Governmental
Access.--
(1) In general.--A Governmental entity that is
obtaining the contents of a communication or
information or records under section 2703 may apply to
a court for an order directing a provider of electronic
communication service or remote computing service to
which a warrant, order, subpoena, or other directive
under section 2703 is directed not to notify any other
person of the existence of the warrant, order,
subpoena, or other directive for a period of not more
than 180 days, in the case of a law enforcement agency,
or not more than 90 days, in the case of any other
Governmental entity.
(2) Determination.--A court shall grant a request for
an order made under paragraph (1) if the court
determines that there is reason to believe that
notification of the existence of the warrant, order,
subpoena, or other directive may result in--
(A) endangering the life or physical safety
of an individual;
(B) flight from prosecution;
(C) destruction of or tampering with
evidence;
(D) intimidation of potential witnesses; or
(E) otherwise seriously jeopardizing an
investigation or unduly delaying a trial.
(3) Extension.--Upon request by a Governmental
entity, a court may grant 1 or more extensions of an
order granted under paragraph (2) of not more than 180
days, in the case of a law enforcement agency, or not
more than 90 days, in the case of any other
Governmental entity.
(4) Prior notice to law enforcement.--Upon expiration
of the period of delay of notice under this section,
and not later than 3 business days before providing
notice to a customer or subscriber, a provider of
electronic communications service or remote computing
service shall notify the Governmental entity that
obtained the contents of a communication or information
or records under section 2703 of the intent of the
provider of electronic communications service or remote
computing service to notify the customer or subscriber
of the existence of the warrant, order, or subpoena
seeking that information.
(c) Definition.--In this section and section 2703, the term
``law enforcement agency'' means an agency of the United
States, a State, or a political subdivision of a State,
authorized by law or by a Government agency to engage in or
supervise the prevention, detection, investigation, or
prosecution of any violation of criminal law, or any other
Federal or State agency conducting a criminal investigation.