PogoWasRight.org

Menu
  • About
  • Privacy
Menu

Article: Can a Computer Intercept Your Email?

Posted on December 23, 2012July 1, 2025 by Dissent

Bruce E. Boyden has an article in Cardozo Law Review (Vol. 34, No. 2). Here’s the abstract:

In recent years, it has become feasible for computers to rapidly scan the contents of large amounts of communications traffic to identify certain characteristics of those messages: that they are spam, contain malware, discuss various products or services, are written in a particular dialect, contain copyright-infringing files, or discuss symptoms of particular diseases. There are a wide variety of potential uses for this technology, such as research, filtering, or advertising. But the legal status of automated processing, if it is done without advance consent, is unclear. Where it results in the disclosure of the contents of a message to others, that clearly violates the federal law governing communications privacy, the Electronic Communications Privacy Act (ECPA). But what if no record of the contents of the communication is ever made? Does it violate communications privacy simply to have a computer scan emails? 

I argue that automated processing that leaves no record of the contents of a communication does not violate the ECPA, because it does not “intercept” that communication within the meaning of the Act. The history, purpose, and judicial interpretation of the ECPA all support this reading: interception requires at least the potential for human awareness of the contents. Furthermore, this is not simply an accident of drafting or an omission due to the limited foresight of legislators. Under most theories of privacy, automated processing does not harm privacy. Automated processing may in some cases lead to harm, but those harms are not, in fact, privacy harms, and should be analyzed instead under other legal regimes better adapted to dealing with such issues.

Via Concurring Opinions

No related posts.

Category: SurveillanceU.S.

Post navigation

← Facedown over privacy
A Holiday Wish from PogoWasRight.org →

3 thoughts on “Article: Can a Computer Intercept Your Email?”

  1. Michael Cromer says:
    December 23, 2012 at 2:56 pm

    (Bruce E. Boyden must be a good friend of John Yoo.)

    The point of automatic processing is to flag certain emails, based on the words they contain, for further human processing.

    The harm it does is that it suppresses free speech. We can easily guess what words might flag our communications and therefore we will avoid using them. If that isn’t an impediment to free speech, I don’t know what is. Furthermore, the right to speak freely with close associates is fundamental to our privacy.

    If we can’t have a reasonable expectation of privacy in our emails, the great American Experiment is pretty much over.

    1. Dissent says:
      December 23, 2012 at 3:17 pm

      I tend to agree with you, but that wouldn’t take away from his point that automated processing might not violate ECPA. I’d prefer to assume he’s correct and try to get Congress to update ECPA in a way that would make it something that requires a court order.

  2. Anonymous says:
    December 23, 2012 at 4:50 pm

    But what if no record of the contents of the communication is ever made? Does it violate communications privacy simply to have a computer scan emails?

    I’d say No, Most of us prefer computers to scan our emails on a regular basis for the purpose of checking for SPAM for example, so long as no records are kept of the content of the email or even the headers preferably.

    Now if said computer system is actually deleting these emails because they contain copyrighted files or just anything the government doesn’t like and is mandatory to use, then that most certainly crosses a line and needs to be stopped.

Comments are closed.

Search

Contact Me

Email: info[at]pogowasright.org
Security Issue: security[at]pogowasright.org
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]pogowasright.org

Research Report of Note

A report by EPIC.org:

State Attorneys General & Privacy: Enforcement Trends, 2020-2024

Categories

Recent Posts

  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map
  • EPIC Publishes New Whitepaper Detailing Privacy Risks of Government Data Mining Programs
  • Modern cars are spying on you. Here’s what you can do about it.
  • Attorney General James and Multistate Coalition Secure $5.1 Million from Education Software Company for Failing to Protect Students’ Data       
  • EU Parliament committee votes to advance controversial Europol data sharing proposal

RSS Recent Posts at DataBreaches.net

  • Short-term renewal of cyber information sharing law appears in bill to end shutdown
  • Yanluowang ransomware IAB pleads guilty
  • Lawsuit Alleges Ex-Intel Employee Hid 18,000 Sensitive Documents Prior to Leaving the Company
  • HIPAA, but for non-Covered Entities?
  • Manassas City Public Schools close on Monday due to cyberattack
©2025 PogoWasRight.org. All rights reserved.