In some instances, law enforcement agencies have a legitimate need to access personal online data—but government access to data must be preceded by due process procedures set out in the 4th Amendment in regards to search and seizure.
United States law is clear on the privacy of phone calls and other non-digital communications: government officials and agencies need a search warrant based on probable cause to gain access. However, such protections don’t extend to email.
A warrant is needed for messages located on the computer of a sender or receiver, but messages older than 180 days can be obtained from the servers of Internet infrastructure providers and other third parties with only a subpoena or court order. A court order can be based on a standard lower than probable cause, and many agencies can issue themselves a subpoena without an outside judge.
One of the most crucial factors to curbing online abuse is the quality of abuse reports that get submitted to Internet infrastructure help desks. All too often, abuse reports are often either directed to the wrong provider or contain insufficient information to take action. i2Coalition members have been proactive in educating stakeholders on both where […]
The i2Coalition’s Insights and Innovation Committee’s is hosting a “Members-Only Workshop on Abuse Reporting — A Discussion with Member Experts” on November 1st at 14:00 UTC/10:00 AM Eastern Time. This session will feature frank and open discussion from within our membership on what work is being done and how our industry can engage with that […]
Christian Dawson, the Executive Director of The Internet Infrastructure Coalition (“i2Coalition”) wrote the following letter to policymakers on the subject of Virtual Private Network (VPN) security technologies. Click here for the PDF version. An Open Letter to United States Policymakers Re: i2Coalition Expands VPN Trust Initiative – Announces Principles to Evaluate VPN Security Technologies On […]
The Internet Infrastructure Coalition (“i2Coaltion”) is among several leading technology industry organizations asking both House E&C Committee and House Judiciary Committee leadership to oppose H.R. 8454, a new bill would have unintended consequences that run contrary to its stated intension of preventing online child sexual exploitation. The i2Coalition is the voice for businesses that build the […]
In an era where online privacy is a key concern, a lot of people may wonder how WHOIS – the directory that holds the name, address, and other information for domain registrants – came to be in the first place, and where it’s going. This blog post outlines how WHOIS began in the very early […]