While it is now illegal to intentionally intercept cordless telephone conversations, cordless telephone users have not always been protected. Prior to October 1994 the Federal Wiretap Act did not protect cordless telephone users from private persons or law enforcement agencies who intentionally intercepted their conversations. In fact, the Electronic Communications Privacy Act of 1986 (ECPA) amended Title III of the of the Omnibus Crime Control and Safe Streets Act of 1968 to expressly exclude cordless telephone transmissions from the definition of wire and electronic communications. With the advent of new cordless technology and the ubiquitousness of the cordless telephone, Congress amended the ECPA, by removing the cordless telephone...
This Note examines what began as a very common-sense idea: law enforcement\u27s surveillance capabil...
This article focuses on the policy and legal issues that are before state and federal agencies regar...
This note will explain how the different surveillance methods work: wire taps, pen register and trap...
This Note concerns the problem of privacy in wireless communications. Since wireless communications ...
I argue that a person\u27s privacy interest in his email is the same as his privacy interest in a te...
This article considers the viability of the Telephone Consumer Protection Act (TCPA) in light of rec...
This article considers the viability of the Telephone Consumer Protection Act (TCPA) in light of rec...
With the expanded use of wiretaps, courts will be faced in the coming years with questions concernin...
The use of telecommunications monitoring and recording devices in the workplace has generated consid...
This article argues that the coming tide of electronic Federal law protects the privacy of transmitt...
The Fourth Amendment, which affords individuals protection from unreasonable searches and seizures, ...
Wireless communications devices such as cell phones and personal digital assistants (PDAs) are ubiqu...
A response to Professor Orin Kerr\u27s The Next Generation Communications Privacy Act, which makes a...
This article analyzes the extent that digital privacy acts are adequately protected by existing law....
In the article I examine the legality of the not uncommon practice of surreptitiously recording tele...
This Note examines what began as a very common-sense idea: law enforcement\u27s surveillance capabil...
This article focuses on the policy and legal issues that are before state and federal agencies regar...
This note will explain how the different surveillance methods work: wire taps, pen register and trap...
This Note concerns the problem of privacy in wireless communications. Since wireless communications ...
I argue that a person\u27s privacy interest in his email is the same as his privacy interest in a te...
This article considers the viability of the Telephone Consumer Protection Act (TCPA) in light of rec...
This article considers the viability of the Telephone Consumer Protection Act (TCPA) in light of rec...
With the expanded use of wiretaps, courts will be faced in the coming years with questions concernin...
The use of telecommunications monitoring and recording devices in the workplace has generated consid...
This article argues that the coming tide of electronic Federal law protects the privacy of transmitt...
The Fourth Amendment, which affords individuals protection from unreasonable searches and seizures, ...
Wireless communications devices such as cell phones and personal digital assistants (PDAs) are ubiqu...
A response to Professor Orin Kerr\u27s The Next Generation Communications Privacy Act, which makes a...
This article analyzes the extent that digital privacy acts are adequately protected by existing law....
In the article I examine the legality of the not uncommon practice of surreptitiously recording tele...
This Note examines what began as a very common-sense idea: law enforcement\u27s surveillance capabil...
This article focuses on the policy and legal issues that are before state and federal agencies regar...
This note will explain how the different surveillance methods work: wire taps, pen register and trap...