Forgot your password?
typodupeerror
Privacy Communications Facebook Government Social Networks The Courts Your Rights Online

The Intimate Social Graph 21

Posted by Soulskill
from the anything-you-tweet-may-be-used-against-you-in-a-court-of-law dept.
jamie tips an article by Slashdot vet Keith Dawson about the uncertain state of privacy protection for one-to-one online communications through social sites and services. Quoting: "The privacy of these communications is protected mainly under a law — ECPA, the Electronic Communications Privacy Act — dating from 1986 and crafted for then-existing email (think Compuserve and Prodigy) and emerging cellular networks. This law is an increasingly poor fit for modern and emerging communication modalities. Email stored on servers is treated differently depending on whether or not the user has read a particular message; and messages older than 6 months in storage enjoy different protection than newer messages. In attempting to apply the ECPA to social networking media, courts have interpreted users' privacy rights in a variety of ways. ... One shortcoming of the ECPA is that it does not require email, search engine, cloud computing or social networking sites to report how many requests for private data they get from authorities. Whatever the number, it almost certainly dwarfs the number of real-time online intercepts (wiretap, pen register, and trap and trace orders), for which statistics must be kept."
This discussion has been archived. No new comments can be posted.

The Intimate Social Graph

Comments Filter:
  • GPG FTW (Score:2, Informative)

    by Anonymous Coward on Friday October 15, 2010 @06:59PM (#33913940)

    GPG is ported to about everything in creation. If you care about email privacy, use it. It makes whatever the law says some company must do irrelevant, and guards against "accidental" leaks by those companies.

    Nearly every ISP provides you with POP or other mail. Run your own mail client: most have built in support for GPG so it's transparent to you once you have made your keys.

    Depending on some "benevolent entity" to protect you is unwise.

The IQ of the group is the lowest IQ of a member of the group divided by the number of people in the group.

Working...