Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

ISP Access to e-Mail Content Is Not Invasion of Privacy

By Jonathan Bick
November 28, 2011

An Internet Service Provider (ISP) can legally search the e-mail that it processes. ISPs may lawfully search the content of users' e-mails for many purposes, including assisting law enforcement, ensuring compliance with the ISP's terms-of-use agreement and protecting the ISP from legal difficulties, to name a few. Such activities do not currently constitute an invasion of the e-mail user's privacy.

No Expectation of Privacy

An ISP may process ' and, hence, read ' e-mails containing medical, legal and other information that the sender may desire to keep confidential. The Internet's protocol of passing e-mails through many computers, each of which copies (but does not necessarily delete) those e-mails, may result in access to confidential information by third parties simply because the Internet, when used as a communication system, is not designed to protect content privacy.

The Fourth Circuit, in United States v. Richardson, 2010 U.S. App. LEXIS 11928 (4th Cir. June 11, 2010), found that the question of whether someone has a reasonable expectation of privacy in the content of his or her e-mail can be complex and difficult. However, this is not based on whether people actually expect their e-mail content to remain private, but on the fact that e-mail's role in society hasn't yet become clear.

Due to an increasing understanding of the Internet and terms-of-use agreements, which specifically state that ISPs are allowed to read the e-mail they process, Internet users have no reasonable expectation of privacy for their e-mail. Without an expectation of privacy, courts will not find such a right to such privacy.

e-Mail users who understand that Internet protocol allows access by unauthorized third parties abandon their expectation of e-mail privacy per se. These e-mail users know that Internet protocol requires use of the “store-and-forward” model. They understand that typically, e-mails are sent to several intermediaries, including two ISPs (one for the sender and one for the recipient). Thus, knowledgeable e-mail users have no expectation of e-mail privacy; hence, their privacy cannot be violated by ISP access in the due course of processing their e-mail.

The Fourth Amendment

Both court rulings and contract law are the legal bases for divesting all other Internet users of their expectation of e-mail privacy. Court decisions, such as United States v. Vaghari, 2009 U.S. Dist. LEXIS 64793, (E.D. Pa. 2009) and Quon v. Arch Wireless Operating Co. Inc., 529 F.3d 892 (9th Circ. 2008), have detailed Internet e-mail protocol and have uniformly held that the e-mail headers specifically, and e-mail generally, is not subject to Fourth Amendment protection when in the possession of a third party such as an ISP.

Additionally, in order to reduce an ISP's secondary liability, most ISP terms-of-use agreements explicitly require e-mail users to abandon their expectation of e-mail privacy. Such agreements directly state that the ISP may access a user's e-mail for a host of reasons.

It should be noted that not all e-mail may be accessed by an ISP. For example, normally, if an e-mail exists solely in the sender's or recipient's computer, an ISP cannot physically (or lawfully) access it, and governmental access is limited by the Fourth Amendment. However, if a copy of an e-mail is stored on an ISP's computer, then it is accessible both legally and physically by the ISP ' and possibly the government.

An e-mail sent using a Post Office Protocol (POP) program is generally saved on the sender's and recipient's computer. Once the POP program has been executed, it is unusual for an ISP to have access to the e-mail that it processed. However, e-mail systems such as Gmail use an Interactive Message Access Protocol (IMAP) program, which saves the e-mail on the ISP's computer. Such e-mail is accessible both legally and physically by the ISP, even after the completion of the IMAP process.

IMAP ISPs are currently free to access that e-mail on their own and turn it over to law enforcement. Privacy laws and the Fourth Amendment limitation are not applicable because the ISP is an authorized third party.

It is generally accepted that the extent to which law enforcement can obtain e-mail content is strictly circumscribed. Due to the ISP agreement and the lack of an expectation of privacy, ISP access and use of e-mail content is virtually unlimited. Additionally, ISPs can restrict speech via e-mail processing with near impunity.

ISP Responsibility

In addition to contract and expectation-related immunities, ISPs in the United States enjoy freedom from liability for the actions of third parties who use their networks, because they are treated as telecommunication providers by the Communications Decency Act of 1996 (CDA). Also, as found by the court in United States v. Forrester, 512 F.3d 500 (9th Cir. 2007), ISPs are private actors that are not subject to constitutional restrictions.

An ISP may even lawfully block an e-mail transmission based on reading its content. Just as other private Internet facilitators, including PayPal, Amazon, MasterCard and Visa, dropped their services to Wikileaks, an ISP may choose to whom it wishes to provide service. Computer programs, sometimes called “Net Nannies,” make it possible to search the content of each e-mail sent over a network and prevent its transmission without a noticeable change in service level.

It should be noted that ISPs need the ability to read the e-mail content they process in order to manage and secure their networks. In particular, ISPs need the ability to determine how much data there is to be transferred, where it's coming from, where it's going and whether any viruses, worms, bots or other malware are contained in the e-mail they process.

An ISP without the capability to search the content of the e-mail it processes could not inhibit spam or divert it to users' spam folders, nor could it detect and limit child pornography or comply with certain law enforcement requests. Without e-mail search capability, ISPs could not find and report potential national security threats or criminal conduct, such as “violent jihad” or “money laundering.”

Technology also provides an alternative to existing naked e-mails. While an ISP can efficiently read e-mails, the same is not true for reading attachments or encrypted e-mails. Searching e-mail attachments and encrypted e-mails is time-consuming and costly. Additionally, e-mail users can have a reasonable expectation that an attachment or encrypted e-mail will be private. Thus, privacy difficulties may be overcome via relatively simple, existing technological solutions.


Jonathan Bick is Of Counsel to Brach Eichler L.L.C. in Roseland, NJ. A member of this newsletter's Board of Editors, he is an adjunct professor of Internet law at Pace Law School and Rutgers Law School-Newark, and the author of 101 Things You Need to Know About Internet Law (Random House 2000). He can be reached at [email protected].

An Internet Service Provider (ISP) can legally search the e-mail that it processes. ISPs may lawfully search the content of users' e-mails for many purposes, including assisting law enforcement, ensuring compliance with the ISP's terms-of-use agreement and protecting the ISP from legal difficulties, to name a few. Such activities do not currently constitute an invasion of the e-mail user's privacy.

No Expectation of Privacy

An ISP may process ' and, hence, read ' e-mails containing medical, legal and other information that the sender may desire to keep confidential. The Internet's protocol of passing e-mails through many computers, each of which copies (but does not necessarily delete) those e-mails, may result in access to confidential information by third parties simply because the Internet, when used as a communication system, is not designed to protect content privacy.

The Fourth Circuit, in United States v. Richardson, 2010 U.S. App. LEXIS 11928 (4th Cir. June 11, 2010), found that the question of whether someone has a reasonable expectation of privacy in the content of his or her e-mail can be complex and difficult. However, this is not based on whether people actually expect their e-mail content to remain private, but on the fact that e-mail's role in society hasn't yet become clear.

Due to an increasing understanding of the Internet and terms-of-use agreements, which specifically state that ISPs are allowed to read the e-mail they process, Internet users have no reasonable expectation of privacy for their e-mail. Without an expectation of privacy, courts will not find such a right to such privacy.

e-Mail users who understand that Internet protocol allows access by unauthorized third parties abandon their expectation of e-mail privacy per se. These e-mail users know that Internet protocol requires use of the “store-and-forward” model. They understand that typically, e-mails are sent to several intermediaries, including two ISPs (one for the sender and one for the recipient). Thus, knowledgeable e-mail users have no expectation of e-mail privacy; hence, their privacy cannot be violated by ISP access in the due course of processing their e-mail.

The Fourth Amendment

Both court rulings and contract law are the legal bases for divesting all other Internet users of their expectation of e-mail privacy. Court decisions, such as United States v. Vaghari, 2009 U.S. Dist. LEXIS 64793, (E.D. Pa. 2009) and Quon v. Arch Wireless Operating Co. Inc. , 529 F.3d 892 (9th Circ. 2008), have detailed Internet e-mail protocol and have uniformly held that the e-mail headers specifically, and e-mail generally, is not subject to Fourth Amendment protection when in the possession of a third party such as an ISP.

Additionally, in order to reduce an ISP's secondary liability, most ISP terms-of-use agreements explicitly require e-mail users to abandon their expectation of e-mail privacy. Such agreements directly state that the ISP may access a user's e-mail for a host of reasons.

It should be noted that not all e-mail may be accessed by an ISP. For example, normally, if an e-mail exists solely in the sender's or recipient's computer, an ISP cannot physically (or lawfully) access it, and governmental access is limited by the Fourth Amendment. However, if a copy of an e-mail is stored on an ISP's computer, then it is accessible both legally and physically by the ISP ' and possibly the government.

An e-mail sent using a Post Office Protocol (POP) program is generally saved on the sender's and recipient's computer. Once the POP program has been executed, it is unusual for an ISP to have access to the e-mail that it processed. However, e-mail systems such as Gmail use an Interactive Message Access Protocol (IMAP) program, which saves the e-mail on the ISP's computer. Such e-mail is accessible both legally and physically by the ISP, even after the completion of the IMAP process.

IMAP ISPs are currently free to access that e-mail on their own and turn it over to law enforcement. Privacy laws and the Fourth Amendment limitation are not applicable because the ISP is an authorized third party.

It is generally accepted that the extent to which law enforcement can obtain e-mail content is strictly circumscribed. Due to the ISP agreement and the lack of an expectation of privacy, ISP access and use of e-mail content is virtually unlimited. Additionally, ISPs can restrict speech via e-mail processing with near impunity.

ISP Responsibility

In addition to contract and expectation-related immunities, ISPs in the United States enjoy freedom from liability for the actions of third parties who use their networks, because they are treated as telecommunication providers by the Communications Decency Act of 1996 (CDA). Also, as found by the court in United States v. Forrester , 512 F.3d 500 (9th Cir. 2007), ISPs are private actors that are not subject to constitutional restrictions.

An ISP may even lawfully block an e-mail transmission based on reading its content. Just as other private Internet facilitators, including PayPal, Amazon, MasterCard and Visa, dropped their services to Wikileaks, an ISP may choose to whom it wishes to provide service. Computer programs, sometimes called “Net Nannies,” make it possible to search the content of each e-mail sent over a network and prevent its transmission without a noticeable change in service level.

It should be noted that ISPs need the ability to read the e-mail content they process in order to manage and secure their networks. In particular, ISPs need the ability to determine how much data there is to be transferred, where it's coming from, where it's going and whether any viruses, worms, bots or other malware are contained in the e-mail they process.

An ISP without the capability to search the content of the e-mail it processes could not inhibit spam or divert it to users' spam folders, nor could it detect and limit child pornography or comply with certain law enforcement requests. Without e-mail search capability, ISPs could not find and report potential national security threats or criminal conduct, such as “violent jihad” or “money laundering.”

Technology also provides an alternative to existing naked e-mails. While an ISP can efficiently read e-mails, the same is not true for reading attachments or encrypted e-mails. Searching e-mail attachments and encrypted e-mails is time-consuming and costly. Additionally, e-mail users can have a reasonable expectation that an attachment or encrypted e-mail will be private. Thus, privacy difficulties may be overcome via relatively simple, existing technological solutions.


Jonathan Bick is Of Counsel to Brach Eichler L.L.C. in Roseland, NJ. A member of this newsletter's Board of Editors, he is an adjunct professor of Internet law at Pace Law School and Rutgers Law School-Newark, and the author of 101 Things You Need to Know About Internet Law (Random House 2000). He can be reached at [email protected].

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
COVID-19 and Lease Negotiations: Early Termination Provisions Image

During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.

How Secure Is the AI System Your Law Firm Is Using? Image

What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

Generative AI and the 2024 Elections: Risks, Realities, and Lessons for Businesses Image

GenAI's ability to produce highly sophisticated and convincing content at a fraction of the previous cost has raised fears that it could amplify misinformation. The dissemination of fake audio, images and text could reshape how voters perceive candidates and parties. Businesses, too, face challenges in managing their reputations and navigating this new terrain of manipulated content.

Authentic Communications Today Increase Success for Value-Driven Clients Image

As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support Image

The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.