What is the Electronic Communications Privacy Act?
This page has been peer-reviewed, fact-checked, and edited by multiple qualified attorneys and legal professionals to ensure substantive accuracy and coverage. Our publication process is robust, following a 16-step content creation and review process.
This was an act enacted by the United States Congress to extend government restrictions on wiretaps from telephone calls to include transmissions of electronic data by computer. The Electronic Communications Privacy Act (ECPA) was an amendment to Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (the Wiretap Statute), which was primarily designed to prevent unauthorized government access to private electronic communications.
The ECPA also added new provisions prohibiting access to stored electronic communications, including the Stored Communications Act. The ECPA also included provisions that permit the tracing of telephone communications. The ECPA has been amended by the Communications Assistance to Law Enforcement Act (CALEA) (1994), the USA Patriot Act (2001), the USA Patriot reauthorization acts (2006), and the FISA Amendments Act (2008). The law entitles federal agencies to subpoena 180-day-old emails.
An Overview of the Act
The electronic communication means any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photo electronic or photo optical system that affects interstate or foreign commerce. This does not include:
- A wire or oral communication.
- A communication made through a tone-only paging device.
- A communication from a tracking device (as defined in section 3117 of the Act).
- An electronic funds transfer information stored by a financial institution in a communications system used for the electronic storage and transfer of funds.
Title I of the ECPA protects wire, oral, and electronic communications while in transit. Title II of the ECPA, the Stored Communications Act (SCA), protects communications held in electronic storage, most notably messages stored on computers. Its protections are weaker than those of Title I, however, and do not impose heightened standards for warrants. Title III prohibits the use of trace devices to record dialing, routing, addressing, and signaling information used in the process of transmitting wire or electronic communications without a court order.
Major Court Decisions Interpreting the Act
In Katz v. United States, the Supreme Court held that telephone conversations are protected by the Fourth Amendment and establishing the principle of a reasonable expectation of privacy.
In Smith v. Maryland (1979), the Supreme Court held that the use of trace devices does not constitute a search requiring a warrant.
In United States v. Warshak (2010), the 6th Circuit court held that law enforcement must have a warrant to obtain emails stored by email providers.
Lastly, in Application of the US (2010), the 3rd Circuit held that judges might require the government to obtain a warrant to access stored location information.
What are Damages and Civil and Criminal Claims Available under the Act?
There are both civil and criminal penalties for a violation of the ECPA. A court can award damages to the victim of eavesdropping. The damages are calculated in a way that each day of continuation of the violation gives rise to a higher amount of damages. A court may also impose additional, punitive damages if the violation is especially malicious. Finally, a court may impose a term of imprisonment not to exceed five years for a violation of the ECPA.
Elements of a Civil or Criminal Action in Violation of the ECPA
Under the Act, it is illegal to:
- Intentionally or purposefully,
- Intercept, disclose, or use the contents of
- Any wire, oral, or electronic communication
- With a “device.”
What are Defenses to a Violation of the ECPA?
Two main exceptions allow communications to be intercepted without violating the Act are:
- The “provider” exception allows telephone service providers to listen to or monitor your telephone calls when they are directed to by law enforcement officers with a valid court order or when it’s necessary to provide you with service, to inspect the equipment, or to protect the provider’s property or rights, such as when its network is being used without being paid for, and
- Law enforcement officials can intercept communications when one party consents to it, so, if you’re suspected in illegal activities and a government informant consents, agents can listen to and record your conversations with the informant
Minc Law does not typically litigate ECPA claims. However, understanding the ECPA is critical for defamation cases in terms of the scope of discovery that can be obtained from third party service providers. This is especially the case in John Doe lawsuits, where obtaining as much information from email accounts and online service providers is critical to identify online defamers. The law of the right of privacy and wiretapping is complex. If you believe you are a victim of a violation of the ECPA then contact the experienced extortion lawyers at Minc Law to evaluate your case. The laws regarding the ECPA vary depending on the state. Call today to find out more information at (216) 373-7706.
“They were very understanding. They did not judge me and they were very helpful. It gave me peace of mind to have someone who I could turn too in a stressful situation.”
Jordan Fong, January 7, 2022