Press Releases

ITIF Calls for Updates to Privacy Laws

The Information Technology and Innovation Foundation today called for updates to federal laws regarding the privacy of electronic data and communications to bring our communications laws into the 21st century to reflect changes in technology over the last decade.

ITIF is part of a coalition of advocacy groups, legal experts, and major technology companies called Digital Due Process which is urging revision to the Electronic Communications Privacy Act (ECPA). The 1986 law establishes standards for government access to email and other electronic communications in criminal investigations.

“There is no way a law enacted at the dawn of the digital age can guide law enforcement officials and protect privacy rights in an age of cloud computing and the wireless Internet, and as billions of electronic exchanges occur every hour,” said ITIF President Robert D. Atkinson. “It is long past time to update the law to make sure it treats data stored on a person’s own computer on their desk at home the same way it treats their own data stored in the ‘cloud.’”

The group is calling for four specific steps:

  • The government must obtain a search warrant based on probable cause before acquiring any communications content stored by online service providers and telecommunications services, such as private e-mails, instant messages, text messages, word processing documents and spreadsheets, photos, Internet search queries and posts made over social networks, consistent with recent court rulings.
  • The government must obtain a search warrant based on probable cause before it can track the location of your cell phone or any other mobile communications device, and before obtaining records of your past locations from cell phone providers or other service providers with access to location data.
  • Before monitoring when and with whom you communicate using email, instant messaging, text messaging, the telephone or any other communications technology, the government must demonstrate to a court that such communications data is actually relevant to an authorized criminal investigation.
  • If the government wants to obtain the transactional data of multiple unidentified telephone or Internet users when trying to track down a suspect, it first needs to go to court and demonstrate that it needs the data for its criminal investigation.

"These steps are not about weakening the ability of law enforcement to take the steps they need to be able to take to protect Americans and fight crime and