VIEW by Michael Riddle Copyright Mi

Found at: 0x1bi.net:70/textfiles/file?law/ecpalay.law


                              A LAYMAN'S VIEW

                             Michael H. Riddle

(Copyright 1988, Michael H. Riddle.  This article may be further reproduced
and disseminated provided that no fees are charged beyond normal

DISCLAIMER: The author is not an lawyer.  This article represents one
layman's views of the background and contents of PL 99-508, the Electronic
Communications Privacy Act of 1986.  Anyone needing legal advice should
consult with the attorney of their choice.

Those of us who remember life before the Pepsi Generation can attest to the
change brought into our lives by advances in electronic technology.
Starting with the widespread use of the transistor, and continuing into the
ntegrated circuit, the large scale integrated circuit, the very large
commonplace and cheap.  Perhaps the single best illustration of that change
s in the field of "information technology."  The advent of the personal
computer, the blurring of the lines between telecommunications and
computing, the breakup of the Bell system, and the growing technological
awareness of the general population have caused what can only be called a
ago, we learned of world events from newspapers--today from television and
ncreasingly, businesses and individuals use computer communications instead
of or in addition to these other means of passing information around our

Anytime someone passes what they hope to be a private communication to
another, they expect that their fellow citizens will respect its privacy.
Not only do the customs of society enforce this expectation, statute laws
to tamper with the mail.  Everyone knows, or should know, not to
electronically eavesdrop ("bug") someone else's telephone calls.  And
everyone knows, or should know, not to do likewise with computer

Alas, not everyone knows that.  If everyone did, we wouldn't need laws to
long ago, the Congress of the United States passed PL 99-508, the Electronic
Communications Privacy Act of 1986.  In doing so, Congress was recognizing
the way technology has changed society and trying to react to that change.

The Act contains two main parts, or Titles.  Title I--Interception of
Communications and Related Matters, merely updates existing laws to reflect
telephone communications, it now says you can't bug private computer
communications.  Where it preserved your right to listen in to public radio
transmissions, it preserves your right to "listen in" to public computerized
transmissions (here the Congress particularly was thinking of unencrypted
electronic bulletin board users) to keep records of who called and when, to

Title II--Stored Wire and Electronic Communications and Transactional
Records Access, is the section that has caused the biggest concern among
bulletin board system operators and users.  Unfortunately, while a lot of
of reaction and overreaction that was unnecessary.

The first thing we need to realize is that Title II adds a new chapter to
Title 18 of the United States Code (USC).  The USC fills most of two shelves
n the Omaha library.  It covers in general detail virtually everything the
federal government does.  In many places it gives departments and agencies
to pass rules and regulations that have the force of law.  If it didn't,
nstead of filling two shelves it would probably fill two floors, and
Congress would be so bogged down in detail work it would get even less done
that it does now.  Of all the USC, Title 18 deals with Crimes and Criminal
certain common-sense rights of sysops.

Under the Act, it is now a federal offense to access a system without
authorization.  That's right.  Using your "war-games dialer," you find a
modem tone on a number you didn't know about before and try to log on.  From
the way I read the law, you can try to log on without penalty.  After all,
you might not have used a war-games dialer.  You might just have got a wrong
number.  (Don't laugh, it's happened to me right here in Omaha!)  At the
up, because at the point where you gain access to that neat, new, unknown

A lot of us are users of systems with "levels" of access.  In the BBS world,
levels may distinguish between old and new users, between club members and
non-members, or sysops from users.  In the corporate and government world,
levels may protect different types of proprietary information or trade
authorized access on a system.

What about electronic mail, or "e-mail?"  E-Mail has been the single biggest
area of misinformation about the new law.  First, section 2701 does make it
a federal offense to read someone else's electronic mail.  That would be
exceeding your authorization, since "private" e-mail systems do not intend
for anyone other than the sender or receiver to see that mail.  But, and a
big but, sysops are excluded.  Whoever staffed the bill for Congress
but there are also practical legal reasons.  While the Act does not directly
address the liability of sysops for the use of their systems in illegal
acts, it recognizes they might have some liability, and so allows them to
carrier can't give your mail to someone else, just like a telegraph operator
can't pass your telegram to someone else, just like a telephone operator
overhearing your call can't tell someone else what it was about, so sysops
are prohibited from disclosing your e-mail traffic to anyone, unless you (or
the other party to the traffic) give them permission.

Common sense, right.  So far all I think we've seen is that the law has
changed to recognize changes in technology.  But then, what about the
legally subpoena telephone records, what can they do with bulletin boards?
a sysop or user ever needed to know this information, that would be a case
backup copy of whatever information is on their system (limited, of course,
to that listed in the warrant or subpoena).  They must do this without
telling the persons under investigation.  They do not at this point,
been done.  Then, the courts notify the user that this information has been
all gets sorted out, the information goes to the police or is destroyed,

establish?  Again, generally, there are two cases.  The first is the one
most BBS operators and users will be concerned with.  "A fine of not more
than $5,000 or imprisonment for not more than six months, or both."
Actually, in the law, that's the second case.  The first is where businesses
malicious destruction or damage, or private commercial gain."  In this case,
"a fine of not more that $250,000 or imprisonment for not more than one year,
or both, in the case of a first offense," and "a fine or imprisonment for not
more that two years, or both, for a subsequent offense."

What all this has said is that the federal criminal code now protects
electronic communications the way it previously protected written ones.  It
understands that mailmen, physical or electronic, have access to the mail
they carry, so it tells them not to tell.  It sets up some hefty penalties
for those who don't take privacy seriously enough.   And finally, it sets up
to be sought for official investigation.  This is, of course, one layman's
opinion.  As long as the reader doesn't have criminal intent or hasn't been
advice: see a lawyer, and soon!

Downloaded From P-80 International Information Systems 304-744-2253