{"id":4089,"date":"2016-05-02T13:18:24","date_gmt":"2016-05-02T17:18:24","guid":{"rendered":"http:\/\/ncjolt.org\/?p=4089"},"modified":"2020-06-04T20:53:01","modified_gmt":"2020-06-04T20:53:01","slug":"the-electronic-communications-privacy-act-does-the-act-let-the-government-snoop-through-your-emails-and-will-it-continue","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/articles\/the-electronic-communications-privacy-act-does-the-act-let-the-government-snoop-through-your-emails-and-will-it-continue\/","title":{"rendered":"The Electronic Communications Privacy Act: Does the Act Let the Government Snoop Through Your Emails and Will It Continue?"},"content":{"rendered":"<p>The Securities and Exchange Commission (\u201cSEC\u201d) is an\u00a0enforcement powerhouse that has historically relied on the 1986\u00a0Electronic Communications Privacy Act (\u201cECPA\u201d) to collect\u00a0electronic communications directly from Internet Service\u00a0Providers (\u201cISPs\u201d) with a subpoena. The ECPA shields recent or\u00a0unopened electronic communications from government eyes, but\u00a0treats all others as abandoned and thus subject to warrantless\u00a0government search and seizure. In 2015, Congress introduced the\u00a0Email Privacy Act to align the ECPA with current technologies\u00a0and their pervasive role in society by requiring a warrant before\u00a0the government may access any emails from ISPs. The SEC seeks a\u00a0civil agency exemption. This Recent Development argues that the\u00a0SEC\u2019s proposed exemption must fail because the bill\u2019s warrant\u00a0requirement will respect the Fourth Amendment\u2019s preference for\u00a0bright-line rules without inhibiting investigations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Securities and Exchange Commission (\u201cSEC\u201d) is an\u00a0enforcement powerhouse that has historically relied on the 1986\u00a0Electronic Communications Privacy Act (\u201cECPA\u201d) to collect\u00a0electronic communications directly from Internet Service\u00a0Providers (\u201cISPs\u201d) with a subpoena. The ECPA shields recent or\u00a0unopened electronic communications from government eyes, but\u00a0treats all others as abandoned and thus subject to warrantless\u00a0government search and seizure. In <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/articles\/the-electronic-communications-privacy-act-does-the-act-let-the-government-snoop-through-your-emails-and-will-it-continue\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[5,68,71],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4089"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=4089"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4089\/revisions"}],"predecessor-version":[{"id":7199,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4089\/revisions\/7199"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=4089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=4089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=4089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}