
The Children’s Online Privacy Protection Act was amended in 2012, with changes officially implemented in 2013. Children’s Online Privacy Protection Act (COPPA) It will very likely continue to be a point of debate in Congress for some time. The act has received substantial opposition, with opponents such as the Electronic Frontier Foundation concerned about “inadequate privacy protections” considering broad cyberthreat definitions. The act is an amendment to the National Security Act of 1947, which does not cover cyber crime.Ī basic definition of this act is that it concerns how to share information on potential cyber threats with the federal government. It passed in the House of Representatives but not the Senate in 2013, and was reintroduced in 2015. Legislation regarding this act was originally introduced in 2011. Reformers say the act is far too restrictive.Ĭyber Intelligence Sharing And Protection Act (CISPA)

The act was passed in the late 1980s and revised about a decade later. The Computer Fraud And Abuse Act makes it a crime to access and subsequently share protected information. The ECPA also dictates when the government is allowed access to GPS tracking via cellphones. Companies supply the government with information for example in the latter half of 2012, Google reported that the government made 18,000 requests for information.

No warrant is required if the items in question are 180 days old or older. government to access digital communications such as email, social media messages, information on public cloud databases, and more with a subpoena.

The Electronic Communications Privacy Act was passed in 1986, and while technology has changed significantly since then, the act has remained the same. Let’s review some of the laws currently in place to provide a more solid idea of your rights as a consumer or businessperson: Electronic Communications Privacy Act (ECPA) The invention of the Internet changed the definition of privacy, and made it necessary to enact new laws concerning electronic communications and security.
