PDF Version


                                                        Calendar No. 66
113th Congress                                                   Report
                                 SENATE
 1st Session                                                     113-34

======================================================================




      ELECTRONIC COMMUNICATIONS PRIVACY ACT AMENDMENTS ACT OF 2013

                                _______


                  May 16, 2013.--Ordered to be printed

                                _______


            Mr. Leahy, from the Committee on the Judiciary,
                        submitted the following

                              R E P O R T

                             together with

                            ADDITIONAL VIEWS

                         [To accompany S. 607]

      [Including cost estimate of the Congressional Budget Office]

    The Committee on the Judiciary, to which was referred the
bill (S. 607), a bill to improve the provisions relating to the
privacy of electronic communications, having considered the
same, reports favorably thereon, with an amendment, and
recommends that the bill, as amended, do pass.

                                CONTENTS

                                                                   Page
  I. Background and Purpose of the Electronic Communications Privacy
     Act Amendments Act of 2013.......................................2
 II. History of the Bill and Committee Consideration..................7
III. Section-by-Section Summary of the Bill...........................8
 IV. Congressional Budget Office Cost Estimate.......................10
  V. Regulatory Impact Evaluation....................................11
 VI. Conclusion......................................................11
VII. Additional Views of Senators Grassley and Sessions..............12
VIII.Changes to Existing Law Made by the Bill, as Reported...........20


I. Background and Purpose of the Electronic Communications Privacy Act
                         Amendments Act of 2013


        A. THE ELECTRONIC COMMUNICATIONS PRIVACY ACT AMENDMENTS

    The Electronic Communications Privacy Act (``ECPA'')
amended the Omnibus Crime Control and Safe Streets Act to
protect against the unauthorized interception of electronic
communications. When Senator Leahy introduced ECPA with Senator
Mathias on June 19, 1986, he said: ``The Electronic
Communications Privacy Act provides standards by which law
enforcement agencies may obtain access to both electronic
communications and the records of an electronic communications
system. These provisions are designed to protect legitimate law
enforcement needs while minimizing intrusions on the privacy of
system users as well as the business needs of electronic
communications system providers.''\1\ For almost three decades,
ECPA has been the premier privacy law protecting Americans from
unauthorized Government intrusions into their private
electronic communications.
---------------------------------------------------------------------------
    \1\See Cong. Rec., June 19, 1986 at page S7993.
---------------------------------------------------------------------------
    The Electronic Communications Privacy Act requires that the
Government obtain a court order, based upon probable cause, in
order to intercept wireless and data communications. The law
also requires that the Government obtain a search warrant in
order to compel a third-party service provider to disclose the
content of email, or other electronic communications, that the
provider maintains in electronic storage. However, this search
warrant requirement for email applies only if the email is 180
days old or less. Under ECPA, an email is presumed to be
abandoned after 180 days and the law allows the Government to
compel the disclosure of older email with either a subpoena or
a court order that is issued upon a finding that there are
specific and articulable facts demonstrating that the
information sought is relevant to a criminal investigation. The
ECPA also allows the Government to use a subpoena or court
order to compel disclosure of documents--regardless of their
age--that a user stores in the Internet ``cloud.''\2\
---------------------------------------------------------------------------
    \2\See 18 U.S.C. Sec. 2703(d).
---------------------------------------------------------------------------
    At the time that Congress enacted ECPA more than 25 years
ago, Congress assumed that most Americans would periodically
access their email accounts and download any emails that they
wished to read, and that third-party service providers would
subsequently delete any email stored on their servers. In fact,
Congress believed that the most extended period of time that a
service provider might store an email would be for six months.
After almost three decades, new technologies--such as the
Internet, social networking sites and cloud computing--have
changed how Americans use and store email today. Storing
documents and other information electronically has become much
less expensive and mobile technologies permit users to access
stored documents wherever the user chooses to access the
Internet. The digital privacy protections that the Congress put
in place by enacting ECPA have not kept pace with these
changes.
    In March 2010, a diverse coalition of privacy and civil
liberties advocates, major technology companies, think tanks,
and academics wrote to Chairman Leahy to urge the Committee to
begin work on reforming the Electronic Communications Privacy
Act to reflect the realities of the digital age. The aptly
named ``Digital Due Process'' coalition argued that ECPA has
been out-paced by changes in technology and the growth of email
as a primary means of communicating. The Committee held the
first of several hearings and briefings on ECPA reform in
September 2010.
    On January 11, 2011, Chairman Leahy announced that his
legislative agenda for the 112th Congress would include
legislation to update the Electronic Communications Privacy Act
to better protect Americans' digital privacy. In April 2011,
the Committee held a second hearing on ECPA reform effort that
focused specifically on the perspectives of the Departments of
Justice and Commerce on proposed updates to the law.\3\ On May
11, 2011, Chairman Leahy introduced the Electronic
Communications Privacy Act Amendments Act of 2011, S.1011,
legislation that would, among other things, update ECPA to
require a search warrant for the Government to access the
contents of any email obtained from a third-party service
provider. On September 20, 2012, Chairman Leahy offered this
portion of his ECPA reform bill as an amendment in the nature
of a substitute to H.R. 2471. The Committee favorably reported
this legislation on November 29, 2012.
---------------------------------------------------------------------------
    \3\Although the Obama administration did not take an official
position on the legislative proposals to update ECPA, the Committee
received technical comments and feedback on these proposals from the
Departments of Justice and Commerce and other affected Federal
agencies.
---------------------------------------------------------------------------
    Reform of the Electronic Communications Privacy Act
remained a top legislative priority for the Committee during
the 113th Congress. On March 18, 2013, Chairman Leahy and
Senator Mike Lee introduced the Electronic Communications
Privacy Act Amendments Act of 2013, S. 607. The legislation
establishes a uniform search warrant requirement for the
Government to compel the disclosure of all email content when
email is stored with a third-party service provider. This
bipartisan privacy legislation seeks to carefully balance the
privacy expectations of American citizens, the legitimate needs
of law enforcement agencies and the interests of the American
technology sector. The legislation is substantially identical
to ECPA reform proposal the Senate Judiciary Committee
favorably reported in November 2012.
    The Committee recognizes that most Americans regularly use
email in their professional and personal lives for confidential
communications of a business or personal nature. The Committee
also recognizes that there is growing uncertainty about the
constitutionality of the provisions in ECPA that allow the
Government to obtain certain email content without a search
warrant.\4\ The absence of a clear legal standard for access to
electronic communications content not only endangers privacy
rights, but also endangers the admissibility of evidence in
criminal and other legal proceedings. Accordingly, the
Committee has determined that the law must be updated to keep
pace with the advances in technology in order to ensure the
continued vitality of the Fourth Amendment protections for
email and other electronic communications content.
---------------------------------------------------------------------------
    \4\In 2010, the United States Court of Appeals for the Sixth
Circuit held that use of a subpoena or court order under section 2703
of ECPA to obtain the contents of emails violated the Fourth
Amendment's prohibition against warrantless searches. See United States
v. Warshak, 631 F.3d 266, 288 (6th Cir. 2010).
---------------------------------------------------------------------------
    The reforms in the bill will better safeguard the privacy
of email and other electronic communications while allowing law
enforcement to carry out its important mission. The bill
contains several important provisions to ensure that the
reforms to ECPA do not hinder law enforcement. First, the bill
preserves the exceptions to the warrant requirement under
existing law. For example under current law, the Government
does not need a warrant in an emergency situation involving
danger of death or serious physical injury, or when a crime is
being committed.\5\ Second, to protect the integrity of ongoing
investigations, the bill adds a new notice requirement to the
law that requires service providers to notify the Government of
their intent to inform a customer about a disclosure of
electronic communications information at least three business
days before giving such notice.
---------------------------------------------------------------------------
    \5\See 18 U.S.C. 2702(b).
---------------------------------------------------------------------------
    In addition, the bill does not alter the legal authorities
that the Government currently uses to obtain electronic
communications content in national security matters.
Specifically, the bill provides that the search warrant
requirement does not apply to other Federal criminal or
national security laws, including Title III of the Omnibus
Crime Control and Safe Streets Act of 1986 (commonly known as
the ``Wiretap Act'') and the Foreign Intelligence Surveillance
Act of 1978 (commonly known as ``FISA'')). The Committee does
not intend for the bill to alter other existing statutory
authorities pursuant to which the Federal Government collects
electronic communications and related information, including
surveillance and other intelligence authorities. Accordingly,
the bill does not preclude any other legal authorities that
permit the acquisition by the United States Government of the
contents of wire or electronic communications, or other records
or information of a subscriber or customer of any electronic
communications service or remote computing service, pursuant to
other lawful authorities, including in Title 18 (e.g., chapters
119, 121 or 206), Title 50 (e.g., the Foreign Intelligence
Surveillance Act of 1978, as amended), or any other provision
of Federal law.
    The bill also includes several provisions to help civil
enforcement agencies, such as the Federal Trade Commission and
the Securities and Exchange Commission, investigate corporate
wrongdoing and protect consumers. Section 3 of the bill adds
civil discovery subpoenas to the existing tools that the
Government may use to obtain non-content information under
ECPA. Section 3 of the bill also makes clear that the
Government may employ administrative, civil discovery and grand
jury subpoena to obtain corporate email and other electronic
communications directly from a corporate entity, when such
communications are contained on an internal email system.
    In addition, the bill preserves the legal tools in existing
law for civil enforcement agencies to obtain electronic
communications information. For example, the bill preserves the
ability for civil enforcement agencies to issue subpoenas to a
service provider to compel the disclosure of email account
information (i.e. non-content information). The bill also
preserves the ability of such agencies to compel the target of
a civil enforcement investigation to produce electronic
communications content information to the Government, including
electronic communications content information that is stored
with a third party service provider. Lastly, to address
concerns about the potential destruction of evidence, the bill
preserves the tools in current law that allow the Government,
including civil enforcement agencies, to require a service
provider to preserve any evidence in its possession to included
stored email content.\6\
---------------------------------------------------------------------------
    \6\See 18 U.S.C. 2703(f).
---------------------------------------------------------------------------
    The objections to the bill raised in the additional view
are misguided and belied by a plain reading of the bill and
current law. First, the additional views incorrectly suggest
that the bill may adversely impact criminal investigations. As
discussed above, current law provides numerous exceptions to
the warrant requirement in ECPA to accommodate emergencies,
child exploitation matters and other criminal activity.\7\ The
bill preserves all of these exceptions. The additional views
also acknowledge that the well-established exigent
circumstances exception to the warrant requirement provides a
separate legal ground for the Government to obtain electronic
communications information without a warrant in time sensitive
situations.\8\ The authors provide no support to substantiate
their claim that these longstanding authorities are inadequate.
---------------------------------------------------------------------------
    \7\See 18 U.S.C. 2702(b)(6), (7) and (8).
    \8\See, e.g., Kentucky v. King, 563 U.S.___ (2011) (exception to
warrant requirement applies when the exigencies of the situation make
the needs of law enforcement so compelling that a warrantless search is
objectively reasonable under the Fourth Amendment.)
---------------------------------------------------------------------------
    The additional views also incorrectly suggest that the bill
would adversely impact the important work of the Securities
Exchange Commission and other civil enforcement agencies. As
discussed above, under current law, civil enforcement agencies
can use subpoenas to among other things--(1) compel the
disclosure of stored communications from the targets of their
investigations, (2) obtain crucial customer records from
service providers and (3) require third-party service providers
to preserve any electronic communications information sought by
the Government. Contrary to the assertion in the additional
views, the bill does not eliminate administrative subpoenas. In
fact, the bill augments the subpoena authority of civil
agencies by permitting these agencies, for the first time, to
use civil discovery subpoenas to obtain records under ECPA.
Moreover, creating a broad statutory exception to the warrant
requirement for civil enforcement matters would eviscerate the
important privacy protections in the bill and in current law.
Such an exception would apply to all kinds of civil agencies at
the Federal, State and local level, including the Internal
Revenues Service. Such an exception could also circumvent the
warrant requirement in the bill, by permitting the Government
to use information obtained under the civil exception in a
related criminal matter. The Securities and Exchange Commission
and numerous other civil enforcement agencies have successfully
performed their duties by relying upon the civil tools already
in the law to acquire stored email content for decades, while
complying with the existing warrant requirement in the law for
emails that are less than 180 days old. There is no reason to
believe that this would not continue to be the case with a
uniform warrant requirement for all electronic communications
content.\9\
---------------------------------------------------------------------------
    \9\To the extent that the Securities and Exchange Commission
requires additional legal authorities to compel the disclosure of
information, such authorities should be considered when Congress
reviews the laws enacted to govern how that agency investigates and
enforces civil regulatory matters. See, e.g., Section 19(c) of the
Securities Act of 1934 (15 U.S.C. 77(a), et seq.); Section 21(b) of the
Securities and Exchange Act (15 U.S.C. 78a, et seq.); Section 209(b) of
the Investment Advisers Act (15 U.S.C. 80b-1, et seq.); and Section
42(b) of the Investment Company Act (15 U.S.C 80a-1, et seq.).
---------------------------------------------------------------------------
    Lastly, the additional reviews raise the prospect of adding
a statutory time limit to the bill. There is universal
agreement on the Committee that service providers should
provide timely responses to requests from law enforcement when
proper legal process has been obtained. The Committee believes
that the courts, which have familiarity with the specific facts
and circumstances of particular investigation, are in the best
position to address such timeliness issues.\10\ Therefore, the
bill appropriately recognizes the long-standing practice of
leaving such case-by-case decisions to the courts.\11\
---------------------------------------------------------------------------
    \10\A statutory time limit imposed by Congress could be very
harmful to law enforcement, because such a requirement could cause
communications service providers make disclosures to the Government
based upon a ``first come, first served'' basis, without regards to the
specific facts and needs of law enforcement in particular case.
    \11\The additional views also propose that the Committee examine
other reforms to ECPA, including clarifying the legal standard for law
enforcement to access geolocation information. In May 2011, Chairman
Leahy introduced legislation to update ECPA to address geolocation
information and other electronic privacy issues. The Committee held two
hearings on these forms and the Committee will continue to work on
these issues.
---------------------------------------------------------------------------
    The carefully balanced ECPA reforms in the bill have
bipartisan support on the Committee, as well as the support of
a broad coalition of more than 100 privacy, civil liberties,
civil rights and technology organizations from across the
political spectrum. The organizations and individuals below
support the principles embodied in the legislation:
    Technology Industry and Trade Associations: Adobe, AOL, the
Chamber of Commerce, eBay, Facebook, IBM, LinkedIn, Microsoft,
Symantec, Verizon, Business Software Alliance, Computer and
Communications Industry Association, Newspaper Association of
America, Software & Information Industry Alliance, and
TechAmerica.
    Privacy, civil liberties and civil rights communities:
American Civil Liberties Union, Americans for Tax Reform,
American Library Association, Center for Constitutional Rights,
Center for Democracy & Technology, Competitive Enterprise
Institute, The Constitution Project, Electronic Frontier
Foundation, the Heritage Foundation, The Leadership Conference
on Civil and Human Rights, Liberty Coalition, Mexican American
Legal Defense and Educational Fund, Muslim Legal Fund of
America, NAACP, National Association of Criminal Defense
Lawyers, National Hispanic Media Coalition, National Urban
League, and TechFreedom.
    Law Enforcement Community: William K. Sessions, Former
Director of the Federal Bureau of Investigation (1987-1993);
Zachary W. Carter, U.S. Attorney, Eastern District of New York
(1993-1999); W. Thomas Dillard, Assistant U.S. Attorney,
Eastern District of Tennessee (1967-1976, 1978-1983), U.S.
Attorney, Northern District of Florida (1983-1986); Saul A.
Green, U.S. Attorney, Eastern District of Michigan (1994-2001);
Rodger A. Heaton, U.S. Attorney, Central District of Illinois
(2005-2009); A. Melvin McDonald, U.S. Attorney, District of
Arizona (1981-1985); Jerome F. O'Neill, U.S. Attorney, District
of Vermont (1981), First Assistant U.S. Attorney, District of
Vermont (1975-1981); Stephen M. Orlofsky, U.S. District Judge,
District of New Jersey (1996-2003); U.S. Magistrate Judge,
District of New Jersey (1976-1980); and Ron Woods, U.S.
Attorney, Southern District of Texas (1990-1993).

          II. History of the Bill and Committee Consideration


                      A. INTRODUCTION OF THE BILL

    On March 18, 2013, Senators Leahy and Lee introduced S.
607--the Electronic Communications Privacy Act Amendments Act
of 2013.

                       B. COMMITTEE CONSIDERATION

    Chairman Leahy placed S. 607 on the Committee's executive
business agenda on April 18, 2013. The Committee considered and
favorably reported this legislation on April 25, 2013.
    The Committee has held two hearings related to S. 607. On
September 22, 2010, the Judiciary Committee held a hearing
entitled, ``The Electronic Communications Privacy Act:
Promoting Security and Protecting Privacy in the Digital Age.''
The hearing examined several gaps in this digital privacy law
that have resulted from changes in technology. The witnesses
for this hearing were: Cameron F. Kerry, General Counsel,
United States Department of Commerce; James A. Baker, Associate
Deputy Attorney General, United States Department of Justice;
James X. Dempsey, Vice President for Public Policy, Center for
Democracy and Technology; Brad Smith, General Counsel and
Senior Vice President, Legal and Corporate Affairs, Microsoft
Corporation; and Jamil N. Jaffer, Attorney, Washington, D.C.
During this hearing, Senator Leahy called for Congress to work
on bipartisan legislation to update ECPA to meet the privacy
demands of the digital age.
    On April 6, 2011, the Judiciary Committee held a hearing
entitled, ``The Electronic Communications Privacy Act:
Government Perspectives on Privacy in the Digital Age.'' This
hearing examined potential updates to the Electronic
Communications Privacy Act to address inconsistencies in that
law, changes in technology, and new threats to privacy and
cybersecurity. The witnesses for this hearing were: Cameron
Kerry, General Counsel, United States Department of Commerce,
and James Baker, Associate Deputy Attorney General, United
States Department of Justice.
    In addition, on November 29, 2012, the Committee considered
and favorably reported legislation substantially similar to S.
607 as part of H.R. 2471, the Video Privacy Protection Act
Amendments Act of 2012.
    On April 25, 2013, the Senate Judiciary Committee favorably
reported S. 607 with the following two amendments:
    First, Chairman Leahy offered a technical amendment to the
bill to make technical corrections to the rule of construction
language in the bill at the request of the Department of
Justice. The changes further clarify that the bill does not
apply to, or alter, any other Federal criminal or national
security laws that authorize the United States Government to
collect, or acquire, wire or electronic communications--or
related records--including the surveillance and other
intelligence authorities contained in the Wiretap Act (Chapter
119 of Title 18) and the Foreign Intelligence Surveillance Act
of 1978 (50 U.S.C. 1801, et seq.). The Committee unanimously
adopted the amendment by voice vote.
    Second, Senator Grassley offered an amendment to require
that the Comptroller General of the United States conduct a
study and report to Congress by September 30, 2015 on how ECPA
is currently being applied, including the extent to which law
enforcement is relying upon section 2703 of ECPA to obtain
information in criminal matters, and how the law will be
affected by the new warrant requirement in the bill. The
Committee unanimously adopted the amendment by voice vote.
    The Committee then voted to report the Electronic
Communications Privacy Act Amendments Act of 2013, as amended,
favorably to the Senate by voice vote.

              III. Section-by-Section Summary of the Bill

    The Leahy-Lee Electronic Communications Privacy Act
Amendments Act would update the privacy protections for
Americans' email and other electronic communications for the
digital age. The Electronic Communications Privacy Act (ECPA)
is one of the nation's premier digital privacy laws. After
three decades, ECPA has become outdated by vast technological
advances and changing law enforcement missions since the law's
initial enactment. The bill would update this law to improve
the privacy protections for electronic communications
information that is stored or maintained by third-party service
providers. The bill maintains the careful balance that Congress
struck when it first enacted the law--to continue to protect
and promote consumer privacy interests, law enforcement needs,
and American innovation in the digital age.

Section 1. Short title

    This section designates the Act as the Electronic
Communications Privacy Act Amendments Act of 2013.

Section 2. Confidentiality of electronic communications

    Section 2 amends Title 18, United States Code, Section 2702
(the Electronic Communications Privacy Act or ``ECPA'') to
prohibit an electronic communications or remote computing
service provider from voluntarily disclosing the contents of
its customers' email or other electronic communications to the
Government. There are limited exceptions to this prohibition
under current law, including customer consent and disclosure to
law enforcement to address criminal activity.

Section 3. Elimination of 180-day rule; Search warrant requirement for
        content; Required disclosure of customer records

    Section 3 amends ECPA so that the disclosure of the content
of email and other electronic communications by an electronic
communications or remote computing service provider to the
Government is subject to one clear legal standard--a search
warrant issued based on a showing of probable cause. The
provision eliminates the confusing and outdated ``180-day''
rule that calls for different legal standards for the
Government to obtain email content, depending upon the email's
age and whether the email has been opened. The provision also
requires that the Government notify the individual whose
account was disclosed, and provide that individual with a copy
of the search warrant and other details about the information
obtained. Such notice must be provided within ten business days
for a law enforcement agency, and three business days for other
agencies, of a Government entity's receipt of the
communications unless the notice is delayed pursuant to Section
4 of the bill.
    Section 3 also reaffirms current law to clarify that the
Government may use an administrative or grand jury subpoena in
order to obtain certain kinds of electronic communication
records from a service provider, including customer name,
address, session time records, length of service information,
subscriber number and temporarily assigned network address, and
means and source of payment information. At the request of the
Department of Justice and the Federal Trade Commission, Section
3 also contains a provision that adds civil discovery subpoenas
to the types of subpoenas that may be used under existing law
(administrative subpoena authorized by Federal or State law,
Federal or State grand jury subpoena and trial subpoena) to
obtain routing and other non-content information from a third-
party provider.
    Lastly, the section contains a rule of construction
regarding Government access to internal corporate email that
makes clear that nothing in the bill precludes the Government
from using a subpoena to obtain email and other electronic
communications content obtained from an intended recipient or
original sender, or to obtain such communications directly from
a company when the communications are to or from an officer,
agent or employee of a company and the company is acting as an
electronic communications service provider for its own internal
email system.

Section 4. Delayed notice

    Section 4 amends section 2705 of ECPA to provide that the
Government may seek a court order to delay notifying an
individual of the fact that the Government has accessed the
contents of the individual's electronic communications for up
to 180 days if the requesting Government entity is a law
enforcement agency, and for up to 90 days if the requesting
Government entity is a civil or administrative enforcement
agency. A court may extend the delay periods for a period of up
to an additional 180 or 90 days at a time, respectively.
    Section 4 also establishes a time limit on the period that
the Government could preclude a service provider from informing
its customer about the disclosure of electronic communications
information to the Government. If the Government entity is a
civil or administrative enforcement agency, the applicable time
period for preclusion of notice is 90 days. The time period for
preclusion may extend up to 180 days if the requesting
Government entity is a law enforcement agency. These time
periods may also be extended by a court for up to an additional
90 or 180 days at a time, respectively.
    Lastly, Section 4 requires that service providers notify
the Government of their intent to inform a customer or
subscriber of the fact that the provider has disclosed the
individual's electronic communications information to the
Government at least three business days before the provider
gives such notice to the customer or subscriber. The purpose of
this provision is to ensure that the Government has an
opportunity to protect the integrity of its investigation and,
if warranted, to ask a court to delay the notification, before
such notice is given.

Section 5. Evaluation by the Government Accountability Office

    Section 5 requires that the Comptroller General of the
United States submit a report to Congress by September 30,
2015, that evaluates, among other things, during the five years
prior to the effective date of the amendments in the bill--(1)
how often law enforcement relied upon section 2703 of ECPA to
requests electronic communications content information; (2) the
average length of time needed for service providers to comply
with such requests; (3) the number of times a warrant was used
for such requests; and (4) the number of times law enforcement
requested delayed notification pursuant to section 2705 of
ECPA. Section 5 also requires that the Comptroller General--(1)
the effects of the new warrant requirement contained in the
bill on the courts; (2) conduct a survey to determine the
average length of time required to respond to requests for
information; and (3) determine whether the new warrant
requirement in the bill resulted in an increase in the use of
the emergency exception to the warrant requirement in section
2702(b)(8) of ECPA.

Section 6. Rule of construction

    Section 6 provides that the search warrant requirement for
electronic communications content contained in Section 3 of the
bill does not apply to any other Federal criminal or national
security laws, including Title III of the Omnibus Crime Control
and Safe Streets Act of 1986 (commonly known as the ``Wiretap
Act'') and the Foreign Intelligence Surveillance Act of 1978
(50 U.S.C. 1801, et seq. (commonly known as ``FISA'')).

             IV. Congressional Budget Office Cost Estimate

    The Committee sets forth, with respect to the bill, S. 607,
the following estimate and comparison prepared by the Director
of the Congressional Budget Office under section 402 of the
Congressional Budget Act of 1974:

                                                      May 16, 2013.
Hon. Patrick J. Leahy,
Chairman, Committee on the Judiciary,
U.S. Senate, Washington, DC.
    Dear Mr. Chairman: The Congressional Budget Office has
prepared the enclosed cost estimate for S. 607, the Electronic
Communications Privacy Act Amendments Act of 2013.
    If you wish further details on this estimate, we will be
pleased to provide them. The CBO staff contact is Mark
Grabowicz.
            Sincerely,
                                              Douglas W. Elmendorf.
    Enclosure.

S. 607--Electronic Communications Privacy Act Amendments of 2013

    S. 607 would amend the Electronic Communications Privacy
Act of 1986 (Public Law 99-508) to make several changes to the
current laws relating to the privacy of personal electronic
communications. The bill also would require the Government
Accountability Office (GAO) to prepare a report, by the end of
fiscal year 2015, on service providers' disclosure of customer
communications to law enforcement agencies.
    Based on the cost of similar activities, CBO estimates that
it would cost $1 million to $2 million from appropriated funds
over the 2014-2015 period for GAO to prepare the report
required by the bill. CBO estimates that other provisions of
the bill would have no significant cost to the federal
government. Enacting the legislation would not affect direct
spending or revenues; therefore, pay-as-you-go procedures do
not apply.
    S. 607 would impose intergovernmental mandates, as defined
in the Unfunded Mandates Reform Act (UMRA), by changing the
procedures that governmental agencies must follow when they
obtain electronic communications. Because the changes would
result in minimal additional spending, CBO estimates that the
costs of the intergovernmental mandates would be small and
would not exceed the threshold established in UMRA ($75 million
in 2013, adjusted annually for inflation).
    S. 607 also would impose a private-sector mandate by
requiring providers of electronic communications and remote
computing services to inform the government before they notify
a customer or subscriber that they have disclosed information
to the government. Based on information from industry sources,
CBO estimates that the cost of the mandate would fall well
below the annual threshold established in UMRA for private-
sector mandates ($150 million in 2013, adjusted annually for
inflation).
    The CBO staff contacts for this estimate are Mark Grabowicz
and Matthew Pickford (for federal costs), Elizabeth Cove
Delisle (for the impact on state, local, and tribal
governments), and Marin Burnett (for the impact on the private
sector). The estimate was approved by Theresa Gullo, Deputy
Assistant Director for Budget Analysis.

                    V. Regulatory Impact Evaluation

    In compliance with rule XXVI of the Standing Rules of the
Senate, the Committee finds that no significant regulatory
impact will result from the enactment of S. 607.

                             VI. Conclusion

    The bill, as amended, S. 607, provides greatly needed
updates to our Federal digital privacy laws. The bill carefully
balances the need to protect Americans' privacy rights in
cyberspace, with the legitimate needs of law enforcement and
the interests of the American technology sector. Given the many
advances in technology and new threats to privacy, the passage
and enactment of these important privacy updates is long
overdue.

                         VII. Additional Views

                              ----------


          ADDITIONAL VIEWS FROM SENATORS GRASSLEY AND SESSIONS

 Amendments to the Electronic Communications Privacy Act Are Necessary
but Should Also Address the Impact on Law Enforcement, the Courts, and
                       Civil Regulatory Agencies

    In the 112th Congress, we voted to report virtually the
same version of this bill because we believe that the
Electronic Communications Privacy Act of 1986 (``ECPA'') needs
to be updated to match advances in technology. However, we also
stated that the bill needed work to better protect email
privacy without hampering law enforcement agencies' ability to
obtain information in order to investigate serious crimes, as
well as civil regulatory agencies' ability to investigate
wrongdoing. We expressed concern that the bill did not strike
the proper balance, but it was the start of an important
discussion. We believe that these changes are important to
continue the carefully crafted balance between protecting
privacy and providing needed tools to law enforcement.
    We find ourselves in the same position in this Congress. We
reiterate that the Committee should work to ensure that this
balance is continued as we update ECPA for decades to come.
First, the Committee should consider whether a more
comprehensive approach to updating the laws involving
electronic communications and data is warranted. This would
include looking to advances in technology for location
information in addition to the content of communications. It
would also assist in addressing the concerns that have been
raised by the law enforcement, technology, and privacy
communities. Second, the bill should address the ability of law
enforcement to obtain access to critical evidence, especially
in time-sensitive emergency cases. Third, and finally, more
consideration is needed with regard to the bill's removal of a
valuable tool from civil regulatory agencies, which rely on
administrative subpoenas to obtain email communications when
investigating insider trading, accounting fraud, and false or
misleading statements made by companies about their financial
situations.
    We appreciate that members on the Committee share these
concerns and spoke up at the Committee mark-up to highlight the
need for modifications to the current bill. Additionally, we
welcome the views of the well-respected Chairwoman of the
Securities and Exchange Commission, Mary Jo White. While we
support the goal of harmonizing and updating ECPA, failure to
address these important issues and strike the proper balance
will be detrimental to not just the law enforcement and civil
regulatory agencies seeking to obtain necessary information,
but to the American people, businesses, and the court system
and may require future action from Congress to update other
parts of ECPA.
Current law
    ECPA was enacted in 1986 as a result of advancements in
wireless communication technology and was designed to provide
modern rules for government access to electronic communications
and related data. It was designed to balance the public's
privacy interests with law enforcement's need to access
electronic communication information for investigative
purposes.\1\
---------------------------------------------------------------------------
    \1\S. Rep. No. 99-541, pt. 3, at 5 (1986) (noting that, when ECPA
was first adopted, the Senate Judiciary Committee believed that it
``represent[ed] a fair balance between the privacy expectations of
American citizens and the legitimate needs of law enforcement
agencies'').
---------------------------------------------------------------------------
    ECPA created a spectrum of legal standards depending on the
level of privacy interest in the information sought by the
government. For example, under current law, a government entity
may require a provider of electronic communication services to
disclose the contents of a wire or electronic communication
that is in electronic storage for 180 days or less pursuant to
a criminal search warrant.\2\ For communications stored with a
third party for more than 180 days, however, the statute
authorizes a lower legal burden.\3\ A government entity can
require a provider of electronic communication services to
disclose the contents of the communications either by search
warrant (without notice to the subscriber or customer), or by
administrative, grand jury, or trial subpoena, or a Section
2703(d) court order if notice is first provided to the
subscriber or customer.\4\ The basis for the ``180 day rule''
has been that if the emails are stored by a third party service
provider for more than six months, one's expectation of privacy
in the content of these communications diminishes, and these
records are therefore treated more akin to third party business
records than real-time communications. As a result, law
enforcement investigators have been able to use quicker and
more efficient methods of legal process (i.e., subpoena or
2703(d) order) to obtain the content contained in these older
emails and related records.\5\
---------------------------------------------------------------------------
    \2\18 U.S.C. Sec. 2703(a) (2006).
    \3\18 U.S.C. Sec. 2703(a) (2006).
    \4\18 U.S.C. Sec. 2703(b) (2006).
    \5\On March 19, 2013, while testifying before the House Judiciary
Subcommittee on Crime, Terrorism, Homeland Security, and
Investigations, Acting Assistant Attorney General Elana Tyrangiel
testified that the Department of Justice no longer supports
differentiating between emails kept in storage for less than 180 days
and emails stored for over 180 days. She did not indicate, however,
whether the Department had solicited input from the thousands of state
and local law enforcement professionals on the front lines prior to
offering a view that could adversely impact the course of their
investigations.
---------------------------------------------------------------------------
    The ability to use a subpoena or a court order has allowed
law enforcement officials to gather older email content
information quickly in cases where time is of the essence and
probable cause may not yet have been developed. However, under
the bill criminal investigators would not be able to obtain
email information in criminal investigations until they have
developed probable cause and could obtain a search warrant.
    Additionally, these same tools have permitted federal
regulatory agencies like the Securities and Exchange
Commission, the Food and Drug Administration, the Consumer
Product Safety Commission, and the Federal Trade Commission,
etc., to gather important information by administrative
subpoenas and carry out their enforcement responsibilities over
important industries. But this bill eliminates these
administrative subpoenas. Therefore, since civil investigators
have no criminal search warrant authority, they would no longer
be able to obtain the contents of emails unless a target of an
investigation or a charged defendant graciously provides the
incriminating email containing the ``smoking gun.'' Civil
regulators would then have no ability to compel the disclosure
of email content from third party Internet service providers.
As a result, the bill raises concerns over civil regulatory
agencies' ability to even undertake the types of investigations
Congress has authorized and empowered them to undertake.
ECPA reform requires a more comprehensive review
    As an initial matter, in conducting a review of the laws
relating to electronic communications and related documents, we
agree that work needs to be done to ensure that our laws are up
to date and do not negatively impact business innovation and
development. We also need to address legitimate privacy
concerns. It is equally important, however, to hear from the
law enforcement community to ensure we do not limit their
ability to obtain information necessary to catch criminals and
terrorists who use electronic communications to further their
crimes. ECPA has specific definitions and has come to be
interpreted by courts in particular ways; therefore, any
amendment requires careful consideration to ensure we do not
create loopholes that make it harder for law enforcement to do
their jobs and allow criminals and terrorists to operate with
impunity.
    Demonstrating the need for a comprehensive review, the bill
is silent regarding the use of ECPA to obtain data regarding
location information data. Increasingly, judges across the
country are examining whether ECPA allows law enforcement to
obtain location information data obtained from a handheld
device or from cellular site towers. The Committee on the
Judiciary in the House of Representatives recently held a
hearing to address this exact question.\6\ This hearing
examined the different legal tools law enforcement utilizes to
obtain stored, prospective, or real-time geolocation
information. Specifically, the hearing focused on the different
statutes employed to obtain this information, including the use
of ECPA, 2703(d) orders, pen registers, and combinations of
these various authorities.\7\ The testimony at the hearing
discussed the need for Congress to bring clarity to ECPA and
companion statutes to address the splits among the various
federal courts as part of any ECPA reform effort. This bill
does not include such endeavors and as a result, does not
examine ECPA in a comprehensive manner. The Committee should
follow the lead of the House Judiciary Committee and examine
these important issues to ensure that the proper balance is
struck with regard to all aspects of ECPA, including
geolocation.
---------------------------------------------------------------------------
    \6\See The Electronic Communications Privacy Act (ECPA), Part 2:
Geolocation Privacy and Surveillance Before the H. Comm. on the
Judiciary, 113th Cong. (April 25, 2013).
    \7\Id. (Statement of Mark Eckenwiler, Senior Counsel, Perkins Coie
LLP).
---------------------------------------------------------------------------
The amendment may adversely affect criminal investigations
    Law enforcement representatives have raised concerns that
increasing the legal standard to require a criminal search
warrant for the content of all email communications regardless
of the length of time they have been in electronic storage will
hinder and delay criminal investigations.\8\ Criminal search
warrants require a showing of probable cause to believe that a
crime has been committed and that evidence of that crime will
be located in the place to be searched. This can be a
challenging standard, especially in cases where time is of the
essence.
---------------------------------------------------------------------------
    \8\Id. at 2; Letter from the MCCPA, et al., to Chairman Leahy &
Ranking Member Grassley, supra note 7, at 2-3.
---------------------------------------------------------------------------
    For example, in the early stages of a child abduction case
where time is of the essence, the facts are usually not fully
known. Investigators often cannot establish probable cause to
search a missing child's email account--or a similar account
such as Facebook or Twitter--because it is not clear that a
kidnapping has occurred or that evidence of that crime will be
found in the child's email account. However, under current law,
investigators have been able to access the contents of a
child's email account by using grand jury subpoenas or court
orders, thereby identifying valuable investigative leads and
even perpetrators who may have been communicating with the
child.
    Under the bill, however, investigators have no way to
compel the disclosure of this vital information and are left at
the mercy of parental consent or voluntary disclosure by
service providers. While neither of these scenarios requires a
warrant, they are both highly problematic for other reasons.
Investigators would encounter issues with parental consent when
a child's parents are unavailable because they are dead or
missing, or unwilling to consent when they are targets of the
investigation.
    Voluntary disclosure by service providers is likewise
unreliable, because the bill does not address the current
standard in Section 2702(b) of Title 18, United States Code on
emergency disclosures. This section merely requires service
providers to voluntarily disclose email content information to
law enforcement officials if the provider, in good faith,
believes that an emergency involving danger of death or serious
physical injury to any person requires the disclosure without
delay of the communication. But, even if an emergency arises
and time is of the essence, the bill does not require a service
provider to disclose important information to law enforcement
investigators. Early in an investigation, when any information
as to the location of the child and identity of the kidnappers
is absolutely critical, a provider may be reluctant to
voluntarily disclose information without a warrant for a number
of reasons. These might include a fear of litigation for
disclosing a customer's information without a warrant,
declining to accept law enforcement's assertion that there are
enough facts to justify an emergency, implementing a policy of
always requiring a search warrant, and many other possible
impediments to the rapid recovery of the child.
    Some members of the Committee have stated that the
traditional ``exigent circumstances'' to the Fourth Amendment
would be sufficient to permit investigators to seize the
electronic communication information without a warrant. Despite
assurances from supporters of the bill that the traditional
exigent circumstances exception would apply in the event this
bill becomes law, this is not a settled issue by any means.
    As a threshold matter, courts across the country disagree
as to whether the contents of email stored in the hands of a
third party service provider trigger privacy protection under
the Fourth Amendment. Some courts have held that emails are
analogous to a mailed letter, and that an individual's
reasonable expectation of privacy ends upon delivery of the
letter or the transmission of the email to the recipient.\9\
Other courts have reached a different conclusion, holding that
a subscriber enjoys a reasonable expectation of privacy in the
content of emails that are stored or sent and received through
a third-party internet service provider.\10\ Unfortunately, the
Committee never held a hearing, heard witnesses or reviewed
evidence, or even had the opportunity to debate this important
question.
---------------------------------------------------------------------------
    \9\See, e.g., United States v. Lifshitz, 369 F.3d 173, 190 (2d Cir.
2004) (holding that, like letter-writers whose expectation of privacy
ends upon delivery of the letter, individuals may not possess a
legitimate expectation of privacy ``in transmissions over the Internet
or e-mail that have already arrived at the recipient''); United States
v. Dupree, 781 F.Supp.2d 115, 159 (E.D.N.Y.2011) (finding that
defendants could ``not claim a legitimate expectation of privacy in
emails that they gave [an employee] permission to access and view'');
State v. Hinton, 280 P.3d 476, 482 (Wash. App. 2012) (ruling that the
defendant's expectation of privacy in a text message terminated upon
the message's delivery to the recipient). Furthermore, the Supreme
Court has held that the Fourth Amendment did not prevent the government
from reviewing electronic pager messages of its employees. City of
Ontario v. Quon, 130 S.Ct. 2619 (2010).
    \10\See, e.g., United States v. Warshak, 631 F.3d 266, 288 (6th
Cir. 2010) (holding that ``a subscriber enjoys a reasonable expectation
of privacy in the contents of emails `that are stored with, or sent or
received through, a commercial [internet service provider]'''); United
States v. Forrester, 512 F.3d 500, 509-11 (9th Cir. 2008) (finding that
a customer does not have a legitimate expectation of privacy in the
email addresses attached to transmitted messages or the internet
protocol addresses visited on a home computer because that information
is voluntarily conveyed to the service provider, but distinguishing
between addresses and the content of messages, noting that ``the
contents may deserve Fourth Amendment protection, but the address and
size of the package do not'').
---------------------------------------------------------------------------
    But even assuming arguendo that traditional Fourth
Amendment exceptions apply, the exigent circumstances exception
to the warrant requirement would not be helpful in obtaining
email content because the bill leaves law enforcement officials
at the mercy of the service providers, even in an emergency.
Law enforcement investigators, who have the training and
experience in such matters, should be making the determination
as to what constitutes an emergency situation--not an untrained
employee of a service provider. An emergency exception that
allows law enforcement professionals to determine the existence
of an emergency and requires service providers to disclose the
requested information is a potential fix that might help
address some law enforcement concerns and might help
recalibrate ECPA so that there is better balance between
privacy and public safety.
    Finally, we have a related concern as to whether Congress
should be looking at setting time limits to ensure timely
compliance with the search warrants. By raising all content
requests to a search warrant standard, the bill would delegate
authority to every state, local, and federal judge to manage
requests for email content. This is important because,
traditionally, search warrants do not operate like subpoenas,
where recipients are typically given up to 14 days to respond.
Instead, search warrants usually require immediate processing
and prompt reporting back to the judge. However, law
enforcement officials have advised us that third-party service
providers do not always provide prompt compliance.
Additionally, because the statute is silent on this matter,
courts often create their own time limits. We should consider
whether uniform time limits for compliance with the search
warrant are appropriate and seek to avoid the confusion
inherent with third-party compliance wrought by the variable
time limits set by the different federal and state courts
issuing these warrants.
Civil investigations could be adversely affected
    As noted above, under the bill, agencies with civil
regulatory authority will no longer be able to compel access to
older email content because the amendment removes the
administrative subpoena as a tool to obtain email
communications. The bill permits criminal search warrants as
the sole legal vehicle to compel disclosure of email content.
Without criminal search warrant authority, these civil federal
agencies reported to us that the amendment will negatively
impact their investigations.
    For example, Securities and Exchange Commission Chairwoman
Mary Jo White recently sent a letter to the Committee outlining
her concerns that the SEC will be unable to obtain critical
emails necessary to investigate civil securities fraud
statutes. Specifically, she wrote that the legislation, in its
current form, could have an impact on the Commission's
``ability to protect investors and to assist victims of
securities fraud.''\11\
---------------------------------------------------------------------------
    \11\Letter from SEC to U.S. Senate Judiciary Committee Chairman
Leahy (April 24, 2013) (attached in appendix).
---------------------------------------------------------------------------
    Chairman White's letter also argues that the proposed
``work-arounds'' that have been suggested would be inadequate.
For example, some argue that the solution is to simply obtain
emails from the targets of the investigation.\12\ Chairman
White argues that often time these individuals delete relevant
emails or otherwise fail to provide them despite obtaining a
subpoena.\13\ As a result, the Chairman White fears that this
could embolden non-compliance with subpoenas by targets of
investigations.\14\
---------------------------------------------------------------------------
    \12\Id. at 2-3.
    \13\Id.
    \14\Id.
---------------------------------------------------------------------------
    Additionally, Chairman White argues against those who say
the SEC could simply work with the Justice Department to obtain
a warrant.\15\ She notes that, ``the Commission cannot request
that the DOJ apply for a search warrant on the SEC's behalf.''
Further, she adds that the vast majority of cases investigated
by the SEC are not criminal and therefore would be outside the
scope of ability to obtain a warrant--effectively limiting
enforcement.\16\
---------------------------------------------------------------------------
    \15\Id. at 2.
    \16\Id.
---------------------------------------------------------------------------
    To remedy this, Chairman White advocates for an amendment
to allow a judicial standard for civil matters akin to a
criminal search warrant.\17\ This is an idea worth considering
as we move forward. It would still require a ruling from a
judge of a competent jurisdiction, similar to what we will
allow for criminal cases under this bill, while retaining the
protections provided in this bill.
---------------------------------------------------------------------------
    \17\Id. at 3.
---------------------------------------------------------------------------
    The SEC relies on email communications to help determine a
person's intent, agreements and conspiracies to defraud, and
patterns of illegal conduct when investigating allegations of
insider trading, accounting fraud, and providing false or
misleading information about securities and the companies that
issue them. In providing technical assistance to the Ranking
Member in evaluating the bill, the SEC advised that this
legislation would significantly impact the SEC's enforcement of
the securities laws--including insider trading.
    The SEC recently filed a civil case against two individuals
alleging that over a period of years they engaged in a scheme
to artificially inflate the financial results of a publicly
owned retailer by engaging in a series of fraudulent financial
transactions. During the investigation, the SEC obtained an
email using an ECPA-authorized subpoena showing that one of the
defendants sent an email describing the publicly owned
company's commitment to buy certain products and services at
inflated prices. The email stated ``the fake credits that were
negotiated with'' the company were being used ``to hit certain
quarterly numbers.'' This evidence was particularly important
because the defendants were sophisticated and had cleverly and
carefully concealed their scheme. The SEC subpoenaed the
Internet Service Provider (ISP) because an individual in the
case had failed to produce an email from one of his personal
email account in response to a subpoena issued to him almost a
year earlier. SEC investigators confronted the defendant with
the email obtained from the ISP. The defendant then produced
his personal email, including this inculpatory one. This
example demonstrates how important the administrative subpoena
is in the civil regulatory context; indeed, it can be the
difference between enforcing the laws and watching helplessly
as crafty fraudsters escape liability and accountability for
their crimes.
    The SEC has also advised us that investigative
administrative subpoenas for email from ISPs are highly
valuable in other situations, such as: (1) when investigators
are attempting to locate stolen assets of victimized investors,
(2) where the target of an investigation lives outside the
United States, and (3) where the target of an investigation
claims to have deleted all of their emails, has a damaged hard
drive, or simply withholds the evidence.
    The administrative subpoena is a vital tool for other
federal civil enforcement agencies as well. The Food and Drug
Administration also uses administrative subpoenas to review
email communications to investigate allegations regarding
violations of food and drug safety laws. The Consumer Product
Safety Commission and the Federal Trade Commission use email
communications to investigate allegations of fraud, deception,
and unfair business practices in the marketplace. The
Commodities and Futures Trading Commission (CFTC) relies on
email communications to investigate fraud, manipulation, and
abusive trading practices in the marketplace. Through effective
oversight, the CFTC enables the futures markets to serve the
important function of providing a means for price discovery and
offsetting price risk.
Conclusion
    We agree that ECPA reform is needed to address the dramatic
advances to technology over the last three decades. We have
concerns, however, with the version reported by the Committee.
There are very valid concerns raised by the law enforcement
community and civil regulatory agencies and those concerns
should be addressed. ECPA is an important privacy law and
advances in technology warrant an update. However, in addition
to the changes made for content in this bill, ECPA reform
should address some of these other concerns raised to ensure we
have a comprehensive approach that strikes the proper balance
between privacy and public safety. Going forward, we trust that
the Committee will address the concerns described above so that
ECPA reform can be achieved.

                                   Charles E. Grassley.
                                   Jeff Sessions.

      VIII. Changes to Existing Law Made by the Bill, as Reported

    In compliance with paragraph 12 of rule XXVI of the
Standing Rules of the Senate, changes in existing law made by
S. 607, as reported, are shown as follows (existing law
proposed to be omitted is enclosed in black brackets, new
matter is printed in italic, and existing law in which no
change is proposed is shown in roman):

 18 USC Sec. 2702--VOLUNTARY DISCLOSURE OF CUSTOMER COMMUNICATIONS OR
                                RECORDS

    (a) Prohibitions.--Except as provided in subsection (b) or
(c)--
          (1) a person or entity providing an electronic
        communication service to the public shall not knowingly
        divulge to any person or entity the contents of a
        communication while in electronic storage by that
        service; and
          (2) a person or entity providing remote computing
        service to the public shall not knowingly divulge to
        any person or entity the contents of any communication
        which is carried or maintained on that service--
                  (A) on behalf of, and received by means of
                electronic transmission from (or created by
                means of computer processing of communications
                received by means of electronic transmission
                from), a subscriber or customer of such
                service;
                  (B) solely for the purpose of providing
                storage or computer processing services to such
                subscriber or customer, if the provider is not
                authorized to access the contents of any such
                communications for purposes of providing any
                services other than storage or computer
                processing; and
          (3) [a provider of remote computing service or
        electronic communication service to the public shall
        not knowingly divulge a record or other information
        pertaining to a subscriber to or customer of such
        service (not including the contents of communications
        covered by paragraph (1) or (2)) to any Governmental
        entity.] a provider of remote computing service or
        electronic communication service to the public shall
        not knowingly divulge to any Governmental entity the
        contents of any communication described in section
        2703(a), or any record or other information pertaining
        to a subscriber or customer of such service.
    (b) Exceptions for Disclosure of Communications.--A
provider described in subsection (a) may divulge the contents
of a communication--
          (1) to an addressee or intended recipient of such
        communication or an agent of such addressee or intended
        recipient;
          (2) as otherwise authorized in section 2517,
        2511(2)(a), or 2703 of this title;
          (3) with the lawful consent of the originator or an
        addressee or intended recipient of such communication,
        or the subscriber in the case of remote computing
        service;
          (4) to a person employed or authorized or whose
        facilities are used to forward such communication to
        its destination;
          (5) as may be necessarily incident to the rendition
        of the service or to the protection of the rights or
        property of the provider of that service;
          (6) to the National Center for Missing and Exploited
        Children, in connection with a report submitted thereto
        under section 2258A;
          (7) to a law enforcement agency--
                  (A) if the contents--
                          (i) were inadvertently obtained by
                        the service provider; and
                          (ii) appear to pertain to the
                        commission of a crime; or
          (8) to a Governmental entity, if the provider, in
        good faith, believes that an emergency involving danger
        of death or serious physical injury to any person
        requires disclosure without delay of communications
        relating to the emergency.
    (c) Exceptions for Disclosure of Customer Records.--A
provider described in subsection (a) may divulge a record or
other information pertaining to a subscriber to or customer of
such service (not including the contents of communications
covered by subsection (a)(1) or (a)(2))--
          (1) as otherwise authorized in section 2703;
          (2) with the lawful consent of the customer or
        subscriber;
          (3) as may be necessarily incident to the rendition
        of the service or to the protection of the rights or
        property of the provider of that service;
          (4) to a Governmental entity, if the provider, in
        good faith, believes that an emergency involving danger
        of death or serious physical injury to any person
        requires disclosure without delay of information
        relating to the emergency;
          (5) to the National Center for Missing and Exploited
        Children, in connection with a report submitted thereto
        under section 2258A; or
          (6) to any person other than a Governmental entity.
    (d) Reporting of Emergency Disclosures.--On an annual
basis, the Attorney General shall submit to the Committee on
the Judiciary of the House of Representatives and the Committee
on the Judiciary of the Senate a report containing--
          (1) the number of accounts from which the Department
        of Justice has received voluntary disclosures under
        subsection (b)(8); and
          (2) a summary of the basis for disclosure in those
        instances where--
                  (A) voluntary disclosures under subsection
                (b)(8) were made to the Department of Justice;
                and
                  (B) the investigation pertaining to those
                disclosures was closed without the filing of
                criminal charges.

  18 USC Sec. 2703--REQUIRED DISCLOSURE OF CUSTOMER COMMUNICATIONS OR
                                RECORDS

    [(a) Contents of Wire or Electronic Communications in
Electronic Storage.--A Governmental entity may require the
disclosure by a provider of electronic communication service of
the contents of a wire or electronic communication, that is in
electronic storage in an electronic communications system for
one hundred and eighty days or less, only pursuant to a warrant
issued using the procedures described in the Federal Rules of
Criminal Procedure (or, in the case of a State court, issued
using State warrant procedures) by a court of competent
jurisdiction. A Governmental entity may require the disclosure
by a provider of electronic communications services of the
contents of a wire or electronic communication that has been in
electronic storage in an electronic communications system for
more than one hundred and eighty days by the means available
under subsection (b) of this section.
    [(b) Contents of Wire or Electronic Communications in a
Remote Computing Service.--
          [(1) A Governmental entity may require a provider of
        remote computing service to disclose the contents of
        any wire or electronic communication to which this
        paragraph is made applicable by paragraph (2) of this
        subsection--
                  [(A) without required notice to the
                subscriber or customer, if the Governmental
                entity obtains a warrant issued using the
                procedures described in the Federal Rules of
                Criminal Procedure (or, in the case of a State
                court, issued using State warrant procedures)
                by a court of competent jurisdiction; or
                  [(B) with prior notice from the Governmental
                entity to the subscriber or customer if the
                Governmental entity--
                          [(i) uses an administrative subpoena
                        authorized by a Federal or State
                        statute or a Federal or State grand
                        jury or trial subpoena; or
                          [(ii) obtains a court order for such
                        disclosure under subsection (d) of this
                        section; except that delayed notice may
                        be given pursuant to section 2705 of
                        this title.
          [(2) Paragraph (1) is applicable with respect to any
        wire or electronic communication that is held or
        maintained on that service--
                  [(A) on behalf of, and received by means of
                electronic transmission from (or created by
                means of computer processing of communications
                received by means of electronic transmission
                from), a subscriber or customer of such remote
                computing service; and
                  [(B) solely for the purpose of providing
                storage or computer processing services to such
                subscriber or customer, if the provider is not
                authorized to access the contents of any such
                communications for purposes of providing any
                services other than storage or computer
                processing.
    [(c) Records Concerning Electronic Communication Service or
Remote Computing Service.--
          [(1) A Governmental entity may require a provider of
        electronic communication service or remote computing
        service to disclose a record or other information
        pertaining to a subscriber to or customer of such
        service (not including the contents of communications)
        only when the Governmental entity--
                  [(A) obtains a warrant issued using the
                procedures described in the Federal Rules of
                Criminal Procedure (or, in the case of a State
                court, issued using State warrant procedures)
                by a court of competent jurisdiction;
                  [(B) obtains a court order for such
                disclosure under subsection (d) of this
                section;
                  [(C) has the consent of the subscriber or
                customer to such disclosure;
                  [(D) submits a formal written request
                relevant to a law enforcement investigation
                concerning telemarketing fraud for the name,
                address, and place of business of a subscriber
                or customer of such provider, which subscriber
                or customer is engaged in telemarketing (as
                such term is defined in section 2325 of this
                title); or
                  [(E) seeks information under paragraph (2).
          [(2) A provider of electronic communication service
        or remote computing service shall disclose to a
        Governmental entity the--
                  [(A) name;
                  [(B) address;
                  [(C) local and long distance telephone
                connection records, or records of session times
                and durations;
                  [(D) length of service (including start date)
                and types of service utilized;
                  [(E)telephone or instrument number or other
                subscriber number or identity, including any
                temporarily assigned network address; and
                  [(F) means and source of payment for such
                service (including any credit card or bank
                account number), of a subscriber to or customer
                of such service when the Governmental entity
                uses an administrative subpoena authorized by a
                Federal or State statute or a Federal or State
                grand jury or trial subpoena or any means
                available under paragraph (1).
          [(3) A Governmental entity receiving records or
        information under this subsection is not required to
        provide notice to a subscriber or customer.]
    (a) Contents of Wire or Electronic Communications.--A
Governmental entity may require the disclosure by a provider of
electronic communication service or remote computing service of
the contents of a wire or electronic communication that is in
electronic storage with or otherwise stored, held, or
maintained by the provider only if the Governmental entity
obtains a warrant issued using the procedures described in the
Federal Rules of Criminal Procedure (or, in the case of a State
court, issued using State warrant procedures) that is issued by
a court of competent jurisdiction directing the disclosure.
    (b) Notice.--Except as provided in section 2705, not later
than 10 business days, in the case of a law enforcement agency,
or not later than 3 days, in the case of any other Governmental
entity, after a Governmental entity receives the contents of a
wire or electronic communication of a subscriber or customer
from a provider of electronic communication service or remote
computing service under subsection (a), the Governmental entity
shall serve upon, or deliver to by registered or first-class
mail, electronic mail, or other means reasonably calculated to
be effective, as specified by the court issuing the warrant,
the subscriber or customer--
          (1) a copy of the warrant; and
          (2) a notice that includes the information referred
        to in clause (i) and (ii) of section 2705(a)(4)(B).
    (c) Records Concerning Electronic Communication Service or
Remote Computing Service.--
          (1) In general.--Subject to paragraph (2), a
        Governmental entity may require a provider of
        electronic communication service or remote computing
        service to disclose a record or other information
        pertaining to a subscriber or customer of the provider
        or service (not including the contents of
        communications), only if the Governmental entity--
                  (A) obtains a warrant issued using the
                procedures described in the Federal Rules of
                Criminal Procedure (or, in the case of a State
                court, issued using State warrant procedures)
                that is issued by a court of competent
                jurisdiction directing the disclosure;
                  (B) obtains a court order directing the
                disclosure under subsection (d);
                  (C) has the consent of the subscriber or
                customer to the disclosure; or
                  (D) submits a formal written request relevant
                to a law enforcement investigation concerning
                telemarketing fraud for the name, address, and
                place of business of a subscriber or customer
                of the provider or service that is engaged in
                telemarketing (as defined in section 2325).
          (2) Information to be disclosed.--A provider of
        electronic communication service or remote computing
        service shall, in response to an administrative
        subpoena authorized by Federal or State statute, a
        grand jury, trial, or civil discovery subpoena, or any
        means authorized under paragraph (1), disclose to a
        Governmental entity the--
                  (A) name;
                  (B) address;
                  (C) local and long distance telephone
                connection records, or records of session times
                and durations;
                  (D) length of service (including start date)
                and types of service used;
                  (E) telephone or instrument number or other
                subscriber number or identity, including any
                temporarily assigned network address; and
                  (F) means and source of payment for such
                service (including any credit card or bank
                account number), of a subscriber or customer of
                such service.
          (3) Notice not required.--A Governmental entity that
        receives records or information under this subsection
        is not required to provide notice to a subscriber or
        customer.
    (d) Requirements for Court Order.--[A court order for
disclosure under subsection (b) or (c)] A court order for
disclosure under subsection (c) may be issued by any court that
is a court of competent jurisdiction and shall issue only if
the Governmental entity offers specific and articulable facts
showing that there are reasonable grounds to believe that [the
contents of a wire or electronic communication, or] the records
or other information sought, are relevant and material to an
ongoing criminal investigation. In the case of a State
Governmental authority, such a court order shall not issue if
prohibited by the law of such State. A court issuing an order
pursuant to this section, on a motion made promptly by the
service provider, may quash or modify such order, if the
information or records requested are unusually voluminous in
nature or compliance with such order otherwise would cause an
undue burden on such provider.
    (e) No Cause of Action Against a Provider Disclosing
Information Under This Chapter.--No cause of action shall lie
in any court against any provider of wire or electronic
communication service, its officers, employees, agents, or
other specified persons for providing information, facilities,
or assistance in accordance with the terms of a court order,
warrant, subpoena, statutory authorization, or certification
under this chapter.
    (f) Requirement To Preserve Evidence.--
          (1) In general.--A provider of wire or electronic
        communication services or a remote computing service,
        upon the request of a Governmental entity, shall take
        all necessary steps to preserve records and other
        evidence in its possession pending the issuance of a
        court order or other process.
          (2) Period of retention.--Records referred to in
        paragraph (1) shall be retained for a period of 90
        days, which shall be extended for an additional 90-day
        period upon a renewed request by the Governmental
        entity.
    (g) Presence of Officer Not Required.--Notwithstanding
section 3105 of this title, the presence of an officer shall
not be required for service or execution of a search warrant
issued in accordance with this chapter requiring disclosure by
a provider of electronic communications service or remote
computing service of the contents of communications or records
or other information pertaining to a subscriber to or customer
of such service.
    (h) Rule of Construction.--Nothing in this section or in
section 2702 shall be construed to limit the authority of a
Governmental entity to use an administrative subpoena
authorized under a Federal or State statute or to use a Federal
or State grand jury, trial, or civil discovery subpoena to--
          (1) require an originator, addressee, or intended
        recipient of an electronic communication to disclose
        the contents of the electronic communication to the
        Governmental entity; or
          (2) require an entity that provides electronic
        communication services to the officers, directors,
        employees, or agents of the entity (for the purpose of
        carrying out their duties) to disclose the contents of
        an electronic communication to or from an officer,
        director, employee, or agent of the entity to a
        Governmental entity, if the electronic communication is
        held, stored, or maintained on an electronic
        communications system owned or operated by the entity.

                    18 USC Sec. 2705--DELAYED NOTICE

    [(a) Delay of Notification.--
          [(1) A Governmental entity acting under section
        2703(b) of this title may--
                  [(A) where a court order is sought, include
                in the application a request, which the court
                shall grant, for an order delaying the
                notification required under section 2703(b) of
                this title for a period not to exceed ninety
                days, if the court determines that there is
                reason to believe that notification of the
                existence of the court order may have an
                adverse result described in paragraph (2) of
                this subsection; or
                  [(B) where an administrative subpoena
                authorized by a Federal or State statute or a
                Federal or State grand jury subpoena is
                obtained, delay the notification required under
                section 2703(b) of this title for a period not
                to exceed ninety days upon the execution of a
                written certification of a supervisory official
                that there is reason to believe that
                notification of the existence of the subpoena
                may have an adverse result described in
                paragraph (2) of this subsection.
          [(2) An adverse result for the purposes of paragraph
        (1) of this subsection is--
                  [(A) endangering the life or physical safety
                of an individual;
                  [(B) flight from prosecution;
                  [(C) destruction of or tampering with
                evidence;
                  [(D) intimidation of potential witnesses; or
                  [(E) otherwise seriously jeopardizing an
                investigation or unduly delaying a trial.
          [(3) The Governmental entity shall maintain a true
        copy of certification under paragraph (1)(B).
          [(4) Extensions of the delay of notification provided
        in section 2703 of up to ninety days each may be
        granted by the court upon application, or by
        certification by a Governmental entity, but only in
        accordance with subsection (b) of this section.
          [(5) Upon expiration of the period of delay of
        notification under paragraph (1) or (4) of this
        subsection, the Governmental entity shall serve upon,
        or deliver by registered or first-class mail to, the
        customer or subscriber a copy of the process or request
        together with notice that--
                  [(A) states with reasonable specificity the
                nature of the law enforcement inquiry; and
                  [(B) informs such customer or subscriber--
                          [(i) that information maintained for
                        such customer or subscriber by the
                        service provider named in such process
                        or request was supplied to or requested
                        by that Governmental authority and the
                        date on which the supplying or request
                        took place;
                          [(ii) that notification of such
                        customer or subscriber was delayed;
                          [(iii) what Governmental entity or
                        court made the certification or
                        determination pursuant to which that
                        delay was made; and
                          [(iv) which provision of this chapter
                        allowed such delay.
          [(6) As used in this subsection, the term
        ``supervisory official'' means the investigative agent
        in charge or assistant investigative agent in charge or
        an equivalent of an investigating agency's headquarters
        or regional office, or the chief prosecuting attorney
        or the first assistant prosecuting attorney or an
        equivalent of a prosecuting attorney's headquarters or
        regional office.
    [(b) Preclusion of Notice to Subject of Governmental
Access.--A Governmental entity acting under section 2703, when
it is not required to notify the subscriber or customer under
section 2703(b)(1), or to the extent that it may delay such
notice pursuant to subsection (a) of this section, may apply to
a court for an order commanding a provider of electronic
communications service or remote computing service to whom a
warrant, subpoena, or court order is directed, for such period
as the court deems appropriate, not to notify any other person
of the existence of the warrant, subpoena, or court order. The
court shall enter such an order if it determines that there is
reason to believe that notification of the existence of the
warrant, subpoena, or court order will result in--
          [(1) endangering the life or physical safety of an
        individual;
          [(2) flight from prosecution;
          [(3) destruction of or tampering with evidence;
          [(4) intimidation of potential witnesses; or
          [(5) otherwise seriously jeopardizing an
        investigation or unduly delaying a trial.]
    (a) Delay of Notification.--
          (1) In general. A Governmental entity that is seeking
        a warrant under section 2703(a) may include in the
        application for the warrant a request for an order
        delaying the notification required under section
        2703(a) for a period of not more than 180 days, in the
        case of a law enforcement agency, or not more than 90
        days, in the case of any other Governmental entity.
          (2) Determination.--A court shall grant a request for
        delayed notification made under paragraph (1) if the
        court determines that there is reason to believe that
        notification of the existence of the warrant may result
        in
                  (A) endangering the life or physical safety
                of an individual;
                  (B) flight from prosecution;
                  (C) destruction of or tampering with
                evidence;
                  (D) intimidation of potential witnesses; or
                  (E) otherwise seriously jeopardizing an
                investigation or unduly delaying a trial.
          (3) Extension.--Upon request by a Governmental
        entity, a court may grant 1 or more extensions of the
        delay of notification granted under paragraph (2) of
        not more than 180 days, in the case of a law
        enforcement agency, or not more than 90 days, in the
        case of any other Governmental entity.
          (4) Expiration of the delay of notification.--Upon
        expiration of the period of delay of notification under
        paragraph (2) or (3), the Governmental entity shall
        serve upon, or deliver to by registered or first-class
        mail, electronic mail or other means reasonably
        calculated to be effective as specified by the court
        approving the search warrant, the customer or
        subscriber--
                  (A) a copy of the warrant; and
                  (B) notice that informs the customer or
                subscriber--
                          (i) of the nature of the law
                        enforcement inquiry with reasonable
                        specificity;
                          (ii) that information maintained for
                        the customer or subscriber by the
                        provider of electronic communication
                        service or remote computing service
                        named in the process or request was
                        supplied to, or requested by, the
                        Governmental entity;
                          (iii) of the date on which the
                        warrant was served on the provider and
                        the date on which the information was
                        provided by the provider to the
                        Governmental entity;
                          (iv) that notification of the
                        customer or subscriber was delayed;
                          (v) the identity of the court
                        authorizing the delay; and
                          (vi) of the provision of this chapter
                        under which the delay was authorized.
    (b) Preclusion of Notice to Subject of Governmental
Access.--
          (1) In general.--A Governmental entity that is
        obtaining the contents of a communication or
        information or records under section 2703 may apply to
        a court for an order directing a provider of electronic
        communication service or remote computing service to
        which a warrant, order, subpoena, or other directive
        under section 2703 is directed not to notify any other
        person of the existence of the warrant, order,
        subpoena, or other directive for a period of not more
        than 180 days, in the case of a law enforcement agency,
        or not more than 90 days, in the case of any other
        Governmental entity.
          (2) Determination.--A court shall grant a request for
        an order made under paragraph (1) if the court
        determines that there is reason to believe that
        notification of the existence of the warrant, order,
        subpoena, or other directive may result in--
                  (A) endangering the life or physical safety
                of an individual;
                  (B) flight from prosecution;
                  (C) destruction of or tampering with
                evidence;
                  (D) intimidation of potential witnesses; or
                  (E) otherwise seriously jeopardizing an
                investigation or unduly delaying a trial.
          (3) Extension.--Upon request by a Governmental
        entity, a court may grant 1 or more extensions of an
        order granted under paragraph (2) of not more than 180
        days, in the case of a law enforcement agency, or not
        more than 90 days, in the case of any other
        Governmental entity.
          (4) Prior notice to law enforcement.--Upon expiration
        of the period of delay of notice under this section,
        and not later than 3 business days before providing
        notice to a customer or subscriber, a provider of
        electronic communications service or remote computing
        service shall notify the Governmental entity that
        obtained the contents of a communication or information
        or records under section 2703 of the intent of the
        provider of electronic communications service or remote
        computing service to notify the customer or subscriber
        of the existence of the warrant, order, or subpoena
        seeking that information.
    (c) Definition.--In this section and section 2703, the term
``law enforcement agency'' means an agency of the United
States, a State, or a political subdivision of a State,
authorized by law or by a Government agency to engage in or
supervise the prevention, detection, investigation, or
prosecution of any violation of criminal law, or any other
Federal or State agency conducting a criminal investigation.