Thursday, December 22, 2011

Facebook Forced to Change Privacy Policy

security lockI know I complain about Facebook and its privacy policy all the time.  So much so, that my kids have told me to quit using it.  Well, they have done it for me and I have moved on to Google + where I have an easier way of controlling my info.

Even though I live a pretty public life, I do enjoy controlling what info I do share.  I love how privacy is one of the most important parts of European life.  You might be wondering how I would know about that.  The basis for this statement - I grew up in the US, I lived in Europe for 22 years and am now back in the US - missing my privacy.

The changes being forced on Facebook will have almost no impact on non-EU users. There would be no FB if it had started in the EU due to the fact that privacy is important there and very well protected by law. Unlike here in the US where privacy is ignored.

In 2012, Facebook will be making 45 privacy-related changes to comply with the recommendations of an audit by Ireland’s Office of the Data Protection Commissioner (DPC) released today.

45 Privacy Changes Facebook Will Make To Comply With Data Protection Law

Wednesday, October 5, 2011

Cookie Monster on Facebook Cookie diet

security lockThe only person I know of that really likes cookies is Cookie Monster.  He will take any cookie and enjoys all of them.  He likes chocolate chip, peanut butter and sugar cookies but I am not so sure he would like the cookies that Facebook is serving.

Josh Constine of Inside Facebook writes, “Facebook’s business is built on trust, but that trust has been shaken over the past few weeks by criticism and speculation regarding how it uses browser cookies to get data about users.”

He further writes, “A lack of thorough documentation explaining what each of its cookies does has led some observers to assume that the company is tracking offsite browsing behavior in order to target ads.”

If Facebook is not using this information to track its users why did it file for a patent that contains the line “A method is described for tracking information about the activities of users of a social networking system while on another domain”?

If they are not tracking you now, I’m sure they will be in the future.

Read more here.

With that info,

Safer Surfing!

Tuesday, October 4, 2011

What? Me Worry?

mrrockfordMaybe we all should.

PC World reports that hackers have cracked Internet encryption, TLS 1.0, “used by most major browsers and websites”.

 

“Data encryption is the cornerstone of Internet security. Every time you log into your email account or sign into an online retailer like Amazon, chances are that your browser is establishing a secure connection to the server using an encryption technology called TLS (Transport Layer Security).”

“First developed in 1999 as an improvement over SSL (Secure Socket Layer) 3.0 encryption, TLS 1.0 is used as part of HTTPS encryption and is now the Web standard for data encryption. Almost all websites and browsers use TLS to secure information being transferred between you and the site,”

Read more here.

With that Info,

Safe Surfing!

Wednesday, September 28, 2011

Barnes & Noble Acquires Database

Barnes & Noble Acquires Borders Customer Database - if you were a Borders customer you have 15 days to opt out of letting B&N use that info

According to PC World, “Barnes & Noble is purchasing bankrupt Borders' database, which contains information regarding 48 million customers. Customers will have 15 days to opt out of the system.”

After arguing in court over privacy concerns from the sale of bankrupt Borders' customer loyalty database to Barnes & Noble, the lawyers in the case agreed to email customers and give them 15 days to opt out of the system.

According to a Reuters report, the parties also plan to "split the cost of an advertisement in USA Today giving customers information on how to opt out." Barnes & Noble's own privacy policy will govern the information once it is transferred, has agreed to purge any information it deems unnecessary

 

Read more here.

Sunday, September 25, 2011

Facebook Is So 2010!

mrrockfordFacebook is so 2010!  Why do I say that?  It’s simple.  Facebook has an amazing amount of users,  I have seen numbers between 500 million (daily users) and over 750 million (user base).  They are adding newer and bigger features to the site.  They are announcing new and possibly ground changing deals with several large players in the Internet world. 

This is where Facebook becomes so 2010.  They have a huge number of users that can topple the Facebook environment when the users feel they have been run over.  Facebook has made its users unhappy in the past but there was really nowhere for these unhappy users to go.

Now there is.  Entering from the colorful corner is the heavyweight champion of search – Google! 

As of Wednesday  28 September, 2011, Google has opened its Social Media platform Google+ to the general public.  All you need to join is a Google account.  Don’t have one?  Get it here google-plus-32.

Google + is not just a Social Media platform, it is turning into a great business tool also.  With the changes just recently made to G+’s video chat app, Hangout, businesses will be able to be more productive. 

3 of those extras are:

  • Screensharing: for when you want to show whatever is on your screen
  • Sketchpad: for when you want to draw, doodle, or just scribble together
  • Google Docs: for when you want to write, plan or present something with others

Now business users and be productive and social at the same time.

For more info, read here.

Thursday, September 22, 2011

“Day of Vengence”?

mrrockfordThis might get interesting. Sept 24th, a Saturday, chosen as "Day of Vengence" by Anonymous. Will they get arrested for wearing their masks?

Anonymous, or someone pretending to be Anonymous, has declared Saturday, 24 September, as the “Day of Vengence” in retaliation of the arrest of several peaceful protesters wearing masks during the central protest in the NY financial district.

This Anonymous states,

This year, we heard President Barack Obama and Secretary Hillary Clinton say over and over in country after country from the Balkans through the mid-east to Africa that the right to peacefully protest and occupy public space is a right that MUST be respected in every instance.

He goes on in his “rant”,

Anonymous & the other cyber liberation groups around the world together with all the freedom loving people in the USA will NOT stand for this. We will peacefully yet forcefully resist the abuses of the NYC Police Department.

So everyone should check to make sure you have no business with the NYC Police Department on Saturday as you might not be able to connect to the website!  Like I said, this might get interesting.

With that info,

Safer Surfing!

Wednesday, September 21, 2011

Next Gen Hackers – Just Copycats?

mrrockford

Are they really doing something new? I’ve been around computers and networks since the days before the www., back in the day when you were happy that your 800 bauds were flying.  So when I read something about malicious hacking being “more sophisticated than ever before”, I tend to take it with a grain of salt.

This article on Hackers Smarts seems to be just such a thing.

Why Hackers Don't Need to be Smart

Cyber criminals have used the same technologies and tactics for years, but companies keep failing to defend against them

Online, in print, on TV, and on the radio, report after report claims that malicious hacking is "more sophisticated than ever before." The media seemingly wants the world to believe it's besought by impossible-to-stop uberhackers with supersophisticated tools and skills.

read the entire article here.

With that info,

Safer Surfing!

Sunday, August 7, 2011

Do I smell money?

mrrockford

AOL, Spotify, GigaOm, Etsy, KISSmetrics sued over undeletable tracking cookies

 

Over the last few days a story has been developing about an undeletable tracking cookie used by KISSmetrics, a website analytics company. This company and more than 20 of its clients have now had a class action lawsuit filed against them. The plaintiffs claim that the Privacy Act and Electronics Communications Privacy Act have been broken, that their personal property (chattel) has been trespassed on, and that the defendants have violated unfair competition law. Anyone who has visited one of the defendants’ sites is able to join the class action, and actual damages of up to $10,000 per member of the class are sought. If punitive damages are also awarded this lawsuit could be worth hundreds of millions of dollars.

Read more here.

Wednesday, July 20, 2011

Email at Work: Can Your Boss Spy on You?

mrrockford

by Michael Sall aka mrrockford

Abstract

Email at Work: Can Your Boss Spy on You? covers one of the most important legal aspects of today’s advanced technological world, the expectation of privacy in the work place. It discusses the questions of increased usage of surveillance and monitoring in the workplace and calls for a better understanding of privacy at work. What kind of privacy may employees expect? And perhaps more importantly, to what extent should they expect privacy?

The general and legal definition of subjects that are important to this idea; The First and Fourth Amendments to the Constitution, Company Privacy Policies, “Third Party Doctrine”, National Security Letters and the “Postal Letter Doctrine” are covered and explained in some detail.

The Eleventh Federal Circuit Courts case Rehberg v. Paulk and the Ninth Federal Circuit Courts Quon v. Arch Wireless case are compared and contrasted along with underlying information and concepts, to show how employees should have an expectation of privacy in their emails at work and that the Federal government must enact an “employee workplace privacy rights law” that has the same or similar protections as those afforded citizens in private life.

Introduction

In today’s modern workplace it is impossible to avoid use of any electronic devices. Technology has created a faster and more efficient workplace environment. In order for businesses to increase bottom line profits they have had to make major investments in technology that allow them to better serve their customers. In protecting that investment there has been also a large investment of employee monitoring. Within the realm of work, surveillance can be carried out with a scrutiny and continuity that is most often not possible in public places and it can provide the observer with detailed person-specific data. In addition to traditional camera monitoring, location based device can display employees’ movements past and present. Radio Frequency IDs enable employers to trace and track an employee’s movements in the fixed workplace and GPS-equipped company cars and cell-phones provide control of the mobile workforce. Computerized work equipment enables assessment of an employee’s output by means of key-stroke loggers. An employee’s interaction with clients, customers and colleagues can be video recorded and intercepted. Additionally, workers may be asked to state information about their health status or to undergo certain capacity tests. Inherent in these practices is the capacity of creating more or less permanent records. When combined, surveillance generated information and employment record data can provide exclusive information about individual employees.

The technology that has had the largest impact on the increase of bottom line profits has been the Internet and its resulting services such as email. Email is defined as “a means or system for transmitting messages electronically (as between computers on a network)” or the “messages sent and received electronically through an e-mail system” (Berghel, 1997). The use of email in the business sector has led to increased efficiency within companies and with their customers and partners by being an almost instant form of direct communication. Business email is used by employees on a daily basis because the costs involved are almost zero. This daily use in the business world, at the workplace, by employees is expected for business purposes. These emails often times contain business secrets that need to be protected, which is important. Use of this email system by employees for private, non-business related communication is frowned on and often considered grounds for termination. The contents of these emails have been made available to employers through commercial spying software and are often of a very private nature. Employers spy on their employees in those ways and others, but, employers can get away with unreasonable employee electronic surveillance too, because there is no Federal law that universally prohibits it across all states. Therefore the Federal government must enact an “employee workplace privacy rights law” that has the same or similar protections as those afforded citizens in private life.

Argument against the Right to Privacy

Many Employers will argue that because they have the right to protect their buildings, office equipment and other assets, allowing employees to be spied on is necessary. Subsequently, security legally trumps employee privacy rights in the workplace (Everett, Wong, Paynter, 2005). Employers also have the right to thwart potentially-damaging employee behavior, such as sexual harassment in order to protect the company from legal recourse, and ensure employee productivity by monitoring all incoming and outgoing email (E-Monitoring in the Workplace, 2006). Most Employers equate the importance of security of their company to that that the United States uses in protecting itself. Employers tend to use the idea of a “National Security Letter” when spying on employees. A National Security Letter (NSL) is a form of administrative subpoena used by the United States Federal Bureau of Investigation and reportedly by other U.S. Government Agencies including the Central Intelligence Agency and the Department of Defense (Garlinger, 2009). It is a demand letter issued to a particular entity or organization to turn over various records and data pertaining to individuals. NSL's can only request non-content information, such as transactional records, phone numbers dialed or email addresses mailed to and from. They require no probable cause or judicial oversight (Yeh, Doyle, 2006). Although an NSL does not allow “non-content” information, this is ignored by Employers as they expect to protect their business. An Employer uses the NSL ideal as not requiring the employees to be informed of any monitoring or recovery of email information.

In addition to the above most employers have their employees sign a computer and network usage policy, which typically will set forth that your email is to be used only for business purposes and grants the employer the right to monitor email and computer usage.  This agreement normally deprives an employee of any reasonable expectation of privacy, and means that your emails are fair game for an employer to search through.  Employers, unlike law enforcement, do not have very many obstacles preventing them from searching your emails.  You are sending communications from their equipment that could affect their business, which usually provides them with the justification to search through your emails.

Many legal experts hired by businesses state that the “Third Party Doctrine” applies to email and therefore employees have no right to privacy in their emails. The “Third Party Doctrine” is the Fourth Amendment rule that governs collection of evidence from third parties in criminal investigations. The rule is simple: By disclosing to a third party, the subject gives up all of his Fourth Amendment rights in the information revealed. According to the Supreme Court,

“[T]he Fourth Amendment does not prohibit the obtaining of information revealed to a third party and conveyed by him to Government authorities, even if the information is revealed on the assumption that it will be used only for a limited purpose and the confidence placed in the third party will not be betrayed” (United States v. Miller, 1976).

In other words, a person cannot have a reasonable expectation of privacy in information disclosed to a third party. The Fourth Amendment simply does not apply.

The Eleventh Federal Circuit Courts case Rehberg v. Paulk is used when the right to email privacy is concerned. In this case, Rehberg’s voluntary delivery of emails to third parties constituted a voluntary relinquishment of the right to privacy in that information. Rehberg does not allege that the defendants, Hodges and Paulk, illegally searched his home computer for emails, but alleges Hodges and Paulk subpoenaed the emails directly from the third-party Internet service provider to which Rehberg transmitted the messages. Lacking a valid expectation of privacy in that email information, Rehberg fails to state a Fourth Amendment violation for the subpoenas for his Internet records (Rehberg v. Paulk, 2010).

A person also loses a reasonable expectation of privacy in emails, at least

after the email is sent to and received by a third party (“Every federal court to address this issue has held that subscriber information provided to an internet provider is not protected by the Fourth Amendment’s privacy expectation”)” (Rehberg v. Paulk, 2010).

In this case the court decided that the “Third Party Doctrine” was involved in that each mail server located along the path used by the sent emails is considered a “third party” and therefore the sender loses his Fourth Amendment protections.

Businesses also like to use First Amendment protection when supporting their spying activities on employees. The First Amendment to the U.S. Constitution reads, “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances”.

In the area of free speech, does the right to speak your mind include the right to use offensive language that could start a fight or incite a riot? Is Freedom of Speech synonymous with freedom of expression, such that the right to condemn the U.S. government extends to offensive symbolic actions involving no written or spoken words, like burning the U.S. flag?

The U.S. Supreme Court has confronted most of these questions. Its answers have not always produced unanimous, or even widespread, agreement around the United States. But the Court's decisions have provided a prism through which U.S. citizens have examined the appropriate limitations society may place on the freedoms protected by the First Amendment, and have sparked colorful and spirited discussions among friends and family members, as well as politicians and their constituents. However, all speech is not equal under the First Amendment. The high court has identified five areas of expression that the government may legitimately restrict under certain circumstances. These areas are speech that incites illegal activity and subversive speech, fighting words, Obscenity and Pornography, commercial speech, and symbolic expression.

Businesses tend to use the area of the “commercial speech” part of the First Amendment when limiting employee’s rights. They see limiting use of personal email rights at the workplace as protecting against leaks of proprietary information and therefore stopping any kind of “commercial speech” leaving the company email system.

A businesses expectation of security allows for the argument that because they have the right to protect their buildings, office equipment, other assets, and also have the right to thwart potentially-damaging employee behavior, such as sexual harassment in order to protect the company from legal recourse, and to ensure employee productivity by monitoring all incoming and outgoing email, spying on employees is necessary and legal. Subsequently, security, most employers feel, legally trumps employee privacy rights in the workplace.

Argument for the Right to Privacy

Most employees will argue that they have a right to expectation of privacy in the work place. A privacy policy being a legal document that discloses some or all of the ways a party gathers, uses, discloses and manages a customer's data. The exact contents of a privacy policy will depend upon the applicable law. Employees argue that they should have the same rights afforded a business’s customers under generally accepted company privacy policies (Palm, 2009). Although there are no current federal laws concerning workplace privacy, several guidelines have been established.

Company privacy policies that protect Employee workplace privacy rights are virtually nonexistent in private-sector employment. That is because most private-sector employers conduct some type of electronic surveillance on their employees. Most may do so even without the consent or knowledge of their employees. Using sophisticated software, hidden cameras, phone-tapping devices, “smart card” security badges and global-positioning technology, employers may electronically snoop on employee computer keystrokes and files; Internet, Web and email usage; locations, movements and activities and phone conversations and numbers dialed (Riedy, Wen, 2010). Most states don't have so-called employee workplace privacy rights laws. Even in the few that do, the laws have no “teeth”. In a nutshell, they require only that employers give employees prior notice of electronic surveillance and/or avoid watching employees while they're changing clothes. In fact, the state laws essentially legalize electronic surveillance, because they don't universally prohibit it.

Employees’ needs for protection of communication and correspondence are articulated in debates on employers’ usage of email interception and listening-in devices in call-centers. However, discretion regarding interpersonal communication and various types of correspondence are not claims exclusively addressed to employers. Due to the long-term and often close interaction with colleagues, employees are likely to expect co-workers to withdraw their attention as far as possible rather than to overhear phone conversations or go through documents left in the fax or printer. Although it may, for reasons of limited space, be difficult for colleagues to avoid hearing a conversation altogether, there is a significant difference between withdrawing one’s attention as far as possible and actively listening in. Even in the case of work-related material that co-workers are entitled to access, they would be expected to make a request first. Many legal experts believe that a company privacy policy may deny them some but not all workplace privacy rights.

The Fourth Amendment to the U.S. Constitution reads, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized” .

The Fourth Amendment was intended to create a constitutional buffer between U.S. citizens and the intimidating power of law enforcement. It has three components. First, it establishes a privacy interest by recognizing the right of U.S. citizens to be “secure in their persons, houses, papers, and effects.” Second, it protects this privacy interest by prohibiting searches and seizures that are “unreasonable” or are not authorized by a warrant based upon probable cause. Third, it states that no warrant may be issued to a law enforcement officer unless that warrant describes with particularity “the place to be searched, and the persons or things to be seized”.

Two requirements must be met before a particular search or seizure will give rise to Fourth Amendment protection. First, the search or seizure must have been conducted by a government agent or pursuant to government direction. Thus, the actions of state and federal law enforcement officers or private persons working with law enforcement officers will be subject to the strictures of the Fourth Amendment. Bugging, wire tapping, and other related eavesdropping activities performed by purely private citizens, such as private investigators, will not receive Fourth Amendment protection.

Second, a defendant must be able to demonstrate that he or she had a "reasonable expectation of privacy" in the place that was searched or the thing that was seized (Katz v. United States, 1967). In Katz, the U.S. Supreme Court explained that "[w]hat a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection… . But what he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected."

Although the Eleventh Circuit Court has set a precedent that a businesses employees enjoy no reasonable expectation of privacy in light of such company policies, the Ninth Federal Circuit Courts case Quon v. Arch Wireless is used to assert an employee’s right to privacy in their emails.

The “Postal Letter Doctrine” is the rule that the Fourth Amendment ordinarily protects postal mail and packages during delivery.  The same rule applies to both government postal mail and private delivery companies like UPS.  As soon as the sender drops off the mail in the mailbox, both the sender and recipient enjoy Fourth Amendment protection in the contents of the mail during delivery.  When the mail is delivered to the recipient, the sender loses his Fourth Amendment protection. The Fourth Amendment rights are transferred solely to the recipient.  In practice, this works pretty simply, each party has Fourth Amendment protection in the mail when they’re in possession of it, and both the sender and receiver have Fourth Amendment rights in the contents of the mail when the postal service or private mail carrier is holding the mail on their mutual behalf.

It should be clear that there are exceptions to these rules.  For example, if a person sends a letter in what the Postal Service used to call “Fourth Class” mail, that is, mail that the Postal Service reserves the right to open, then it is not protected by the Fourth Amendment.  The information on a postcard is also not protected by the Fourth Amendment as it is open to the public (Tokson, 2009). The Fourth Amendment protection only applies to the contents of the communication, not the outside, therefore the sender and recipient addresses do not require a warrant to be collected. This basic approach has governed postal mail privacy for a long time.

"Letters and other sealed packages are in the general class of effects in which the public at large has a legitimate expectation of privacy. However, as with the phone numbers they dial, individuals do not enjoy a reasonable expectation of privacy in what they write on the outside of an envelope” (United States v. Hernandez, 2002).

A person has a legitimate interest and trusts that a mailed package will not be opened and searched en route. There can be no reasonable expectation that postal service employees will not handle the package or that they will not view its exterior.

“Like the Supreme Court in Smith, in Forrester we explicitly noted that "e-mail to/from addresses ... constitute addressing information and do not necessarily reveal any more about the underlying contents of communication than do phone numbers." Id. Thus, we concluded that "[t]he privacy interests in these two forms of communication [letters and e-mails] are identical," and that, while "[t]he contents may deserve Fourth Amendment protection... the address and size of the package do not." (Quon v. Arch Wireless, 2008).

In some ways, this trust is increasingly irrelevant, because, if we are to be members of the internet enabled society, we have no other option but to rely on the powerful tools we have at our disposal (such as those provided by employers). Like rats forced to endure electric shocks to acquire food, we must use these tools to acquire information and communicate. The implications of data disclosure and retention are profound, including corporate and law enforcement abuses and identity theft, as well as second- and third-order effects impossible to predict. Those of us who are aware of the risks already self-censor our activities, even as we continue to indulge them.

An Employees argument that they should have the same rights afforded a business’s customers under generally accepted company privacy policies and law, including the right of privacy in their emails should be the accepted norm. Also, that these emails be afforded the same protection under the Fourth Amendment as is a company’s business postal mail and the employee’s private postal mail. The Ninth Federal Circuit Courts case Quon v. Arch Wireless is the basis needed to implement state if not federal employee workplace privacy rights laws that do have “teeth”.

Conclusion

With the importance of daily use of email in the workplace, whether for business or private use, I believe that the Federal government must enact an “employee workplace privacy rights law” that has the same or similar protections as those afforded citizens in private life.

The Eleventh Federal Circuit Courts decision in Rehberg v. Paulk to define an intermediate server as a third party is flawed and thus negates the entire decision. When an email is sent, it travels through many “hands”, these “hands” are the email servers that the email passes through to reach the final destination, the recipient. At each point of this chain the email remains unopened and therefore content of the email has not been delivered which makes the contents private as far as Fourth Amendment protections are concerned. The Eleventh Federal Circuit Court defines each individual email server as a recipient and therefore decides that the email has been delivered and the email loses it Fourth Amendment protection. If the Courts decision is to be taken as valid then a sealed postal letter also loses its Fourth Amendment protection as soon as it is placed into a mail drop or mailman’s hands. The Eleventh Federal Circuit Courts decision in Rehberg v. Paulk does not see that the intermediate email servers are the same as the mail drop (Zwillinger, & Genetski, 2007) or mailman’s hands. If this were the case then at any point after having placed your sealed “snail mail” letter into the postal system it could be opened by the government and its contents read and used as they wished.

In the Ninth Federal Circuit Courts decision of the case Quon v. Arch Wireless, the judges agreed in case law and precedence that should be used when deciding the right to privacy.

“It is well-settled that, "since 1878, ... the Fourth Amendment's protection against `unreasonable searches and seizures' protects a citizen against the warrantless opening of sealed letters and packages addressed to him in order to examine the contents” (United States v. Choate, 1978).

My reasons that the Quon v. Arch Wireless case be used are based on an assumption of “technology neutrality” within the court system. This assumption is that the degree of privacy that the Fourth Amendment offers in the Internet setting should match the degree of privacy protection that the Fourth Amendment provides in the physical world. This assumption follows from the general consensus among judges and scholars that the Fourth Amendment attempts to balance privacy and security interests in a way that both protects privacy and yet also gives the police the power needed to solve crimes or a business owner the right to protect business security.

This also assumes that the courts will extend that same goal to the cyber world. In other words, they should apply the Fourth Amendment protections in the new cyber setting in ways that roughly replicates the role of the Fourth Amendment in the traditional physical setting. As a result, the goal is to apply the protections of the Fourth Amendment from physical space to cyberspace, translating the concepts of the Fourth Amendment from the physical environment to the network environment.

Lawyers across the land are now recognizing that a gold mine of incriminating evidence can be found in corporate emails. I remember watching Microsoft's Bill Gates stumble through answers to questions about his own personal email, tossed at him by government lawyers in the courtroom. This has caused a high-level scramble among corporate bosses to review their own internal email policies.

Most people would now say that if something's really that important, there's always the encryption route. Encryption is a nice concept but hard in execution. The cold, hard reality of encryption is that only an insignificant fraction of email is ever encrypted. In more than 15 years of sending email, I have never sent an encrypted message, nor received one. I can't imagine that I'm alone.

Arguably, increased usage of surveillance and monitoring in the workplace calls for a better understanding of privacy at work. What kind of privacy may employees expect? And perhaps more importantly, to what extent should they expect privacy? The predominating view has been that privacy is a reasonable claim exclusively or at least primarily in obviously private domains such as an individual’s home. Outside this indisputably private domain, privacy expectations must be held reasonable in certain relations either of an intimate or institutionalized kind. The U.S. Congress has seen and anticipated a potential gap in constitutional privacy protections for remotely-stored electronic communications such as email, and set out to bridge that gap. In doing so, it carefully delineated the categories of information afforded protection and assigned corresponding limitations on the rights of the government. Despite some bumps along the way in applying those rules to unforeseen new technologies, a clear regime has been established that dictates when privacy rights must yield to the needs of law enforcement but does not cover an employee’s right of privacy. The Federal government has a set of rules that are enforced for the government but not for employees of a business and this is why the government must enact an “employee workplace privacy rights law” that has the same or similar protections as those afforded citizens in private life.