Tuesday, June 18, 2019
Email and Privacy and how Cyber Law Protects User Rights Research Paper
Email and Privacy and how Cyber Law Protects User Rights - Research Paper ExampleAfter the discovery of the internet, electronic conversation has rapidly evolved and hence the internet has grown to a complete unregulated and an unplanned phenomenon. The inventors of the internet and the World Wide Web never anticipated that it could authorise to extreme undesirable consequences (Bazelon, 2001). The growth rate of the internet has been expanding at an alarming rate where recent studies indicate that the population of internet users is doubling after each three months due to the emergence of social sites as well as development of e-commerce. Many people are turning to electronic means of communication being offered by the internet, especially e-mails which can pass, store, and retrieve instruction from a database provide by an Internet Service Provider (ISP). However, as the internet becomes much useful day after day, it has been blamed on various sandals of m matchlessy launderi ng, moral decay, as well as several legal issues related to seclusion and hence the emergence of cyber laws which contain all the regulatory and legal aspects of the world wide web and the internet(Bazelon, 2001).The Fourth Amendment of the United States Constitution deals with the issues concerning searches and seizures which may in one way or the other compromise an individuals privacy and one case that involved such a violation was United States v. Warshak (Trout, 2010). Warshak was enjoying the intelligent chance of privacy of his e-mails from his Internet Service Provider, Nu Vox until government agents compromised his rights by ordering the ISP to preserve and issue his emails without first obtaining a warrant which was to be base on probable cause, thus in accordance to the Fourth Amendment, the government agents had violated the privacy rights of Warshak. However, the agents depended on good faith with reference to the Stored Communications perform even though this excl usionary rule was not applicable in such a case (Trout, 2010). In another case involving United States v. Bynum, Mr. Bynum gave his information with the expectation that ISP would protect the privacy of his internet and phone subscriber information. However the internet service provider violated the Fourth Amendments by releasing personal information of Mr. Bynum to the FBI without them first obtaining subpoenas (Schwartz, 2009). Another similar case involved the U.S v. Councilman, in this particular scenario Councilman retained his clients personal information especially his competitors through spigot in violation of the Wiretap Act. The interception and seizure without consent of his customers was contravention of the Fourth Amendment. Thus there was an urgent need to amend the Wiretap Act to give a broad definition of the word intercept to include electronic communication temporary in transit because the previous definition only encompassed the e-mails on electronic storage in computers. Congress amended the definition on 22nd July 2004 (Bazelon, 2001). Discussion During the case of United States v. Bynum, 08-4207, the court failed to accept the argument from the suspect that the use of subpoenas by the government in an effort to get subscribers information from his ISP was a violation of the Fourth Amendment rights of privacy (Trout, 2010). The court ruled that there was neediness of evidence that the defendant had a subjective expectation of privacy in his internet and phone subscriber information Later he voluntarily recognized that he had freely given his personal data to his ISP and phone company and as a consequence, he had assumed the risk that theses companies could reveal his information to the government activity without his jurisdiction (Trout, 2010). Additionally, the court noted that Bynum was capable of demonstrating a subjective expectation of privacy with regard to this information, and then the information was subject to reasonableness test.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.