iTnews

Google to fight US government access to users' email

By Staff Writers on Jan 29, 2013 12:20PM
Google to fight US government access to users' email

Seeks law revision.

Google will lobby Washington in 2013 to make it harder for US law enforcement authorities to gain access to emails and other digital messages.

In a blog post on Monday, linked to Data Privacy Day, Google's chief legal officer, David Drummond, said the tech giant, in coalition with many other powerful tech companies, will try to convince US Congress to update a 1986 privacy protection law.

He cited data showing that government requests for Google's user data increased more than 70 percent since 2009.

In 2012, Google said, it received 16,407 requests for user data affecting 31,072 users or accounts, more than half of them accompanied by a subpoena.

"We're a law-abiding company, and we don't want our services to be used in harmful ways. But it's just as important that laws protect you against overly broad requests for your personal information," Drummond said in the post.

The US Electronic Communications Privacy Act, passed in the early days of the Internet, does not require government investigators to have a search warrant when requesting access to old emails and messages that are stored online, providing less protection for them than, say, letters stored in a desk drawer or even messages saved on a computer's hard drive.

The current system also makes complex distinctions, many disputed in courts, between emails saved as drafts online, in transit, unopened or opened.

Some of them are to be released with subpoenas, which have a lower threshold than search warrants as they often do not involve a judge.

A warrant is generally approved by a judge if investigators have "probable cause" to believe that their search is likely to turn up information related to a crime.

Google, Microsoft, Yahoo and popular social media site Twitter — among others — have resisted turning over customer data.

They have put in place policies, based on the constitutional protection from unreasonable searches, that require search warrants for access to content of private communications.

Privacy activists say the outdated law should be reformed to extend the constitutional right to privacy online, but legislation limiting government requests will not face an easy road.

Last year, US Democratic Senator Patrick Leahy, who chairs the US Senate Judiciary Committee, introduced a bill that would have updated the current law.

It triggered a wave of concerns from the police and FBI that new restrictions would impede crime investigations and possibly endanger victims.

"After three decades, it is essential that Congress update ECPA to ensure that this critical law keeps pace with new technologies and the way Americans use and store email today," Leahy said in a statement on Monday.

His privacy legislation died in Congress last year after his counterpart in the House of Representatives, House Judiciary Committee Chairman Bob Goodlatte, a Republican, drafted another version of that bill, which also tackled other issues but stripped out privacy reform language.

Last year, Goodlatte said he was willing to consider the privacy law reform, but that the timeline then was too short for a "thorough examination."

Leahy has now included the change of privacy laws as one of his top priorities this year. \

(Reporting by Alina Selyukh in Washington and Alexei Oreskovic in San Francisco; Editing by Steve Orlofky)

Got a news tip for our journalists? Share it with us anonymously here.
Copyright Reuters
© 2019 Thomson Reuters. Click for Restrictions.
Tags:
accessfightgmailgooglegovernmentsecuritysubpoenaus

Partner Content

Tick off the ransomware bandits
Promoted Content Tick off the ransomware bandits
Top 5 Benefits of Managed IT Services
Promoted Content Top 5 Benefits of Managed IT Services
The case for postponing mainframe migration has eroded
Partner Content The case for postponing mainframe migration has eroded
Security through visibility: supporting Essential Eight cyber mitigation strategies
Promoted Content Security through visibility: supporting Essential Eight cyber mitigation strategies

Sponsored Whitepapers

Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership
Don’t pay the ransom: A three-step guide to ransomware protection
Don’t pay the ransom: A three-step guide to ransomware protection

Events

  • iTnews Benchmark Awards 2022 - Finalist Showcase
  • 11th Annual Fraud Prevention Summit 2022
  • IoT Impact Conference
  • Cyber Security for Government Summit
By Staff Writers
Jan 29 2013
12:20PM
0 Comments

Related Articles

  • AWS, Telstra, L'Oreal Australia line up against cyber security director liability plan
  • Google locks Afghan government accounts
  • US senators urge barring Huawei, ZTE from US$1.9 trillion govt funding measure
  • Google adds phishing protection to Workspace apps
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Kmart Australia stands up consent-as-a-service platform

Kmart Australia stands up consent-as-a-service platform

Telstra to open its 5G network to wholesale customers

Telstra to open its 5G network to wholesale customers

Macquarie Bank creates a broker portal on Salesforce

Macquarie Bank creates a broker portal on Salesforce

Active Directory defaults lead to no-fix PrivEsc vulnerability

Active Directory defaults lead to no-fix PrivEsc vulnerability

Digital Nation

Case Study: PlayHQ leverages graph technologies for sports administration
Case Study: PlayHQ leverages graph technologies for sports administration
The other ‘CTO’: The emerging role of the chief transformation officer
The other ‘CTO’: The emerging role of the chief transformation officer
As NFTs gain traction, businesses start taking early bets
As NFTs gain traction, businesses start taking early bets
Metaverse hype will transition into new business models by mid decade: Gartner
Metaverse hype will transition into new business models by mid decade: Gartner
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
COVER STORY: From cost control to customer fanatics, AI is transforming the contact centre
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.