Issues:Â Privacy
Access to customer information from Internet infrastructure providers should follow due process of law.
In some instances, law enforcement agencies have a legitimate need to access personal online data—but government access to data must be preceded by due process procedures set out in the 4th Amendment in regards to search and seizure.
United States law is clear on the privacy of phone calls and other non-digital communications: government officials and agencies need a search warrant based on probable cause to gain access. However, such protections don’t extend to email.
A warrant is needed for messages located on the computer of a sender or receiver, but messages older than 180 days can be obtained from the servers of Internet infrastructure providers and other third parties with only a subpoena or court order. A court order can be based on a standard lower than probable cause, and many agencies can issue themselves a subpoena without an outside judge.
Recent Updates On Privacy
PLEASE LOGIN.
Watch: Weathering The Transatlantic Tug-of-War On on Global Digital Privacy
PLEASE LOGIN.
Watch: Abuse Reporting Workshop Featuring i2Coalition Member Experts
One of the most crucial factors to curbing online abuse is the quality of abuse reports that get submitted to Internet infrastructure help desks. All too often, abuse reports are often either directed to the wrong provider or contain insufficient information to take action. i2Coalition members have been proactive in educating stakeholders on both where […]
Members-Only Workshop on Abuse Reporting — A Discussion with Member Experts: Nov 1
The i2Coalition’s Insights and Innovation Committee’s is hosting a “Members-Only Workshop on Abuse Reporting — A Discussion with Member Experts” on November 1st at 14:00 UTC/10:00 AM Eastern Time. This session will feature frank and open discussion from within our membership on what work is being done and how our industry can engage with that […]
The i2Coalition Issues Open Letter to United States Policymakers on VPN Security Technologies
Christian Dawson, the Executive Director of The Internet Infrastructure Coalition (“i2Coalition”) wrote the following letter to policymakers on the subject of Virtual Private Network (VPN) security technologies. Click here for the PDF version. An Open Letter to United States Policymakers Re: i2Coalition Expands VPN Trust Initiative – Announces Principles to Evaluate VPN Security Technologies On […]
i2Coaltion Signs Letter Opposing H.R. 8454, Urging the Bill not be Given Further Consideration
The Internet Infrastructure Coalition (“i2Coaltion”) is among several leading technology industry organizations asking both House E&C Committee and House Judiciary Committee leadership to oppose H.R. 8454, a new bill would have unintended consequences that run contrary to its stated intension of preventing online child sexual exploitation. The i2Coalition is the voice for businesses that build the […]
WHOIS Privacy: How we got to this point, and how not to move backwards
In an era where online privacy is a key concern, a lot of people may wonder how WHOIS – the directory that holds the name, address, and other information for domain registrants – came to be in the first place, and where it’s going. This blog post outlines how WHOIS began in the very early […]