Microsoft v. United States (2016) Court Filing, retrieved on July 14, 2016, is part of HackerNoonâs Legal PDF Series. You can jump to any part in this filing here. This part is 16 of 22.
2. Other Aspects of the Statute
In addition to the textâs plain meaning, other aspects of the statute confirm its focus on privacy.
As we have noted, the first three sections of the SCA contain its major substantive provisions. These sections recognize that users of electronic communications and remote computing services hold a privacy interest in their stored electronic communications. In particular, § 2701(a) makes it unlawful to âintentionally access[] without authorization,â or âintentionally exceed[] an authorization to access,â a âfacility through which an electronic communication service is providedâ and âthereby obtain[], alter[], or prevent[] authorized access to a wire or electronic communication while it is in electronic storage.â Contrary to the governmentâs contention, this section does more than merely protect against the disclosure of information by third parties. By prohibiting the alteration or blocking of access to stored communications, this section also shelters the communicationsâ integrity. Section 2701 thus protects the privacy interests of users in many aspects of their stored communications from intrusion by unauthorized third parties.
Section 2702 generally prohibits providers from âknowingly divulg[ing]â the âcontentsâ of a communication that is in electronic storage subject to certain enumerated exceptions. 18 U.S.C. § 2702(a). Sections 2701 and 2702 are linked by their parallel protections for communications that are in electronic storage. Section 2703 governs the circumstances in which information associated with stored communications may be disclosed to the government, creating the elaborate hierarchy of privacy protections that we have described.
From this statutory framework we find further reason to conclude that the SCAâs focus lies primarily on the need to protect usersâ privacy interests. The primary obligations created by the SCA protect the electronic communications. Disclosure is permitted only as an exception to those primary obligations and is subject to conditions imposed in § 2703. Had the Act instead created, for example, a rebuttable presumption of law enforcement access to content premised on a minimal showing of legitimate interest, the governmentâs argument that the Actâs focus is on aiding law enforcement and disclosure would be stronger. Cf. Morrison, 561 U.S. at 267. But this is not what the Act does.
The SCAâs procedural provisions further support our conclusion that the Act focuses on user privacy. As noted above, the SCA expressly adopts the procedures set forth in the Federal Rules of Criminal Procedure. 18 U.S.C. § 2703(a), (b)(1)(A). Rule 41, which governs the issuance of warrants, reflects the historical understanding of a warrant as an instrument protective of the citizenryâs privacy. See Fed. R. Crim. P. 41. Further, the Act provides criminal penalties for breaches of those privacy interests and creates civil remedies for individuals aggrieved by a breach of their privacy that violates the Act. See 18 U.S.C. §§ 2701, 2707. These all buttress our sense of the Actâs focus.
We find unpersuasive the governmentâs argument, alluded to above, that the SCAâs warrant provisions must be read to focus on âdisclosureâ rather than privacy because the SCA permits the government to obtain by mere subpoena the content of eâmails that have been held in ECS storage for more than 180 days. Govât Br. at 28â29; see 18 U.S.C. § 2703(a). In this vein, the government submits that reading the SCAâs warrant provisions to focus on the privacy of stored communications instead of disclosure would anomalously place newer eâmail content stored on foreign servers âbeyond the reach of the statute entirely,â while older eâmail content stored on foreign servers could be obtained simply by subpoena, if notice is given to the user. Govât Br. at 29. This argument assumes, however, that a subpoena issued to Microsoft under the SCAâs subpoena provisions would reach a userâs eâmail content stored on foreign servers. Although our Courtâs precedent regarding the foreign reach of subpoenas (and Marc Rich in particular) might suggest this result, the protections rightly accorded user content in the face of an SCA subpoena have yet to be delineated. Today, we need not determine the reach of the SCAâs subpoena provisions, because we are faced here only with the lawful reach of an SCA warrant. Certainly, the service providerâs role in relation to a customerâs content supports the idea that persuasive distinctions might be drawn between it and other categories of subpoena recipients. See supra note 23.
In light of the plain meaning of the statutory language and the characteristics of other aspects of the statute, we conclude that its privacy focus is unmistakable.
Continue Reading Here.
About HackerNoon Legal PDF Series: We bring you the most important technical and insightful public domain court case filings.
This court case No. 15â777 retrieved on September 27, 2023, from cases.justia.com is part of the public domain. The court-created documents are works of the federal government, and under copyright law, are automatically placed in the public domain and may be shared without legal restriction.