It is not yet available today, mr. Chairman, we do have industry and government involvement on developing those standards. Because we have to develop a standard in order to implement that technology into the network. Well, if you could have heard all of the hearings that we have had, and just to complicate matters, a lot of them dont originate in this country. They are from a foreign country, and that means youve got to work with another government in order to get them to cooperate to go after the guys. So that makes it doubly difficult and longer and longer and, therefore, the development of technology that will help someone identify a number of them who gets spoofed, that would be extremely helpful in the protection of senior citizens, indeed, protection of customers. Because of the vote that is now occurring, i want to say that i want to bring to the table retailers who offer the services to send money, such as western union, moneygram, and the various cards. Were going to have a fu
General counsels office, they arent going to notify the target. Theyre found by the same disclosure and i think the law should account for that. You know, one of the things that was interesting, i was recently reading the legislative history of ecpa, one of the things that congress stressed, even though it got a fair amount wrong when it drew the 180day line, one of the things they were trying to do, and they made this very clear, is sort of promote the adoption of new technologies like this. So i think without clarifying this, and you know, without clarifying the law in some of these other respects, you risk undermining the adoption of these new technologies which provide a number of benefits as greg was alluding to. Weve talked a fair amount of content, weve been using it as emails for content generally, obviously, both microsoft and google and many other companies store an enormous amount of content, other than emails, you know, including the backed up concepts of phones. But there
Law really hasnt kept pace with technology and the way people are using it. If youre a large Multinational Corporation today, and youre providing your own email service. And you have an onpremise email or Cloud Storage service, the government goes to you to get the information. And they serve an order, a subpoena or sometime, a search warrant, on the company itself. It goes to their general counsels office, and they figure out how to respond to it. And theres certain information that they possess that is afforded protections under the law. There is a great fear out there, not just about government obtaining their information, but doing it without their knowledge. And i think, you know, when youre talking about a company considering moving to the cloud, there are a lot of them that are concerned that theyre going to serve Legal Process on microsoft or google or somebody else and get that information without them knowing because of a nondisclosure order. Our position is basically, you we
Email issue with epka. I think for passage we ought to deal specifically with emails so we can get something and amend it as we progress through technology, keeping its mind, the spirit of the Fourth Amendment as well. Thank you very much for your attention. I appreciate it. Thank you. Ill invite our Panel Members to join me here on stage, as formidable panel as one could ask for an event like this. Joining me, we have if youre here, greg new james from i know quite well. A Senior Council of the senate for democracy and technology and the hed of the project on freedom, security and technology and cochair of the american Bar Committee on American Civil Liberties. And an attorney in private practice and director of Legal Services for the American Discrimination Committee as well as Legislative Council at the American Civil Liberties union. A veteran of the fight for judicial privacy and is also a driving force behind the digital due process coalition. We have several members represented
Warrant for content in all cases, it tends to be things that you have to be able to get a search warrant to investigate. So that sort of drives a lot of it. But, you know, the data types and the data fields that are provided are sort of incumbent on what data there is in existence and how long its stored and what specifically they ask for. You know, we typically require them to be very specific in saying what types of data theyre seeking under a request. They cant just issue a search warrant and say give us soandsos data. They have to specify what fields and things they want. Both of you or both Companies Get quite a lot of requests for information for transactional data or activity logs or other kinds of subscriber information, so that takes up the bulk of the requests. Im wondering what those tend to look like and whether thats something that usually is fairly focused, or whether the number of accounts, obviously, are going to be larger than the number of requests to both companies,