 {"id":3190,"date":"2022-02-08T00:20:48","date_gmt":"2022-02-08T00:20:48","guid":{"rendered":"https:\/\/live-cornell-law-review.pantheonsite.io\/?p=3190"},"modified":"2022-02-08T00:20:48","modified_gmt":"2022-02-08T00:20:48","slug":"cookies-and-wires-can-facebook-lure-users-into-divulging-information-under-the-wiretap-acts-party-exception","status":"publish","type":"post","link":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/2022\/02\/08\/cookies-and-wires-can-facebook-lure-users-into-divulging-information-under-the-wiretap-acts-party-exception\/","title":{"rendered":"Cookies and Wires: Can Facebook Lure Users Into Divulging Information Under the Wiretap Act&#8217;s Party Exception?"},"content":{"rendered":"\n<p>The advent of the Internet brought immeasurable benefits<sup class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_1');\" onkeypress=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_1');\" ><sup id=\"footnote_plugin_tooltip_3190_1_1\" class=\"footnote_plugin_tooltip_text\">1<\/sup><\/a><cite class=\"footnote_tooltip\"><span class=\"footnote-inner\">1. See Lisa Eadicicco, Obama Wants to Reclassify the Internet by Turning It Into a Utility, BUSINESS INSIDER (Nov. 10, 2014, 9:36 AM), https:\/\/&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\"  onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_1');\">Continue reading<\/span><\/span><\/cite><\/sup><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_3190_1_1').tooltip({ tip: '#footnote_plugin_tooltip_text_3190_1_1', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top center', relative: true, offset: [-7, 0], });<\/script> to society in various ways\u2014providing convenient access to information,<sup class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_2');\" onkeypress=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_2');\" ><sup id=\"footnote_plugin_tooltip_3190_1_2\" class=\"footnote_plugin_tooltip_text\">2<\/sup><\/a><cite class=\"footnote_tooltip\"><span class=\"footnote-inner\">2. Kotagiri Ramamohanarao, Kapil Kumar Gupta, Tao Peng &amp; Christopher Leckie, The Curse of Ease of Access to the Internet, in Information Systems Security 234 (Patrick Drew McDaniel &amp; Shyam K.&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\"  onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_2');\">Continue reading<\/span><\/span><\/cite><\/sup><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_3190_1_2').tooltip({ tip: '#footnote_plugin_tooltip_text_3190_1_2', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top center', relative: true, offset: [-7, 0], });<\/script> facilitating the purchase and sale of goods (from Amazon<sup class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_3');\" onkeypress=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_3');\" ><sup id=\"footnote_plugin_tooltip_3190_1_3\" class=\"footnote_plugin_tooltip_text\">3<\/sup><\/a><cite class=\"footnote_tooltip\"><span class=\"footnote-inner\">3. Clare Duffy, How Jeff Bezos Changed the World, CNN, https:\/\/ www.cnn.com\/2019\/08\/16\/tech\/jeff-bezos-amazon\/index.html [https:\/\/ perma.cc\/LMB5-XVWF] (last updated Aug. 16, 2019) (noting that Amazon&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\"  onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_3');\">Continue reading<\/span><\/span><\/cite><\/sup><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_3190_1_3').tooltip({ tip: '#footnote_plugin_tooltip_text_3190_1_3', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top center', relative: true, offset: [-7, 0], });<\/script> to Fintech<sup class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_4');\" onkeypress=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_4');\" ><sup id=\"footnote_plugin_tooltip_3190_1_4\" class=\"footnote_plugin_tooltip_text\">4<\/sup><\/a><cite class=\"footnote_tooltip\"><span class=\"footnote-inner\">4. See Lenny Sanicola, What is FinTech?, HUFFPOST (Feb. 13, 2017, 2:50 PM), https:\/\/www.huffpost.com\/entry\/what-isfintech_b_58a20d80e4b0cd37efcfebaa [https:\/\/perma.cc\/KD4A-8WVA] (noting how FinTech&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\"  onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_4');\">Continue reading<\/span><\/span><\/cite><\/sup><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_3190_1_4').tooltip({ tip: '#footnote_plugin_tooltip_text_3190_1_4', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top center', relative: true, offset: [-7, 0], });<\/script>), and offering an invaluable method of social and political communication.<sup class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_5');\" onkeypress=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_5');\" ><sup id=\"footnote_plugin_tooltip_3190_1_5\" class=\"footnote_plugin_tooltip_text\">5<\/sup><\/a><cite class=\"footnote_tooltip\"><span class=\"footnote-inner\">5. See Matt Richtel, E-Mail Gets an Instant Makeover, N.Y. TIMES (Dec. 20, 2010), https:\/\/www.nytimes.com\/2010\/12\/21\/technology\/21email.html [https:\/\/perma.cc\/V7J4-ZN67] (noting the rise in preference&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\"  onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_5');\">Continue reading<\/span><\/span><\/cite><\/sup><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_3190_1_5').tooltip({ tip: '#footnote_plugin_tooltip_text_3190_1_5', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top center', relative: true, offset: [-7, 0], });<\/script> <\/p>\n\n\n\n<p>The United States has largely left the ways in which companies collect and utilize user data unregulated.<sup class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_6');\" onkeypress=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_6');\" ><sup id=\"footnote_plugin_tooltip_3190_1_6\" class=\"footnote_plugin_tooltip_text\">6<\/sup><\/a><cite class=\"footnote_tooltip\"><span class=\"footnote-inner\">6. See Dobkin, supra note 10, at 8 (\u201c[T]here is no sweeping standard for howprivate firms treat data . . . .\u201d); Yonatan Lupu, The Wiretap Act and Web Monitoring: A Breakthrough for Privacy Rights?,&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\"  onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_6');\">Continue reading<\/span><\/span><\/cite><\/sup><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_3190_1_6').tooltip({ tip: '#footnote_plugin_tooltip_text_3190_1_6', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top center', relative: true, offset: [-7, 0], });<\/script> Because Congress has failed to establish a general data privacy regime, Internet users frequently turn to the Wiretap Act to seek redress in cases involving user data and privacy. However, the Wiretap Act\u2019s statutory language has largely failed to keep up with the development of Internet communications<sup class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_7');\" onkeypress=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_7');\" ><sup id=\"footnote_plugin_tooltip_3190_1_7\" class=\"footnote_plugin_tooltip_text\">7<\/sup><\/a><cite class=\"footnote_tooltip\"><span class=\"footnote-inner\">7. See Deirdre K. Mulligan, Reasonable Expectations in Electronic Communications: A Critical Perspective on the Electronic Communications Privacy Act, 72 GEO. WASH. L. REV. 1557, 1557, 1559 (2004)&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\"  onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_7');\">Continue reading<\/span><\/span><\/cite><\/sup><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_3190_1_7').tooltip({ tip: '#footnote_plugin_tooltip_text_3190_1_7', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top center', relative: true, offset: [-7, 0], });<\/script> and courts have struggled to apply the Act in such contexts.<sup class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_8');\" onkeypress=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_8');\" ><sup id=\"footnote_plugin_tooltip_3190_1_8\" class=\"footnote_plugin_tooltip_text\">8<\/sup><\/a><cite class=\"footnote_tooltip\"><span class=\"footnote-inner\">8. infamous) for its lack of clarity.\u201d Steve Jackson Games, Inc. v. U.S. Secret Serv., 36 F.3d 457, 462 (5th Cir. 1994); see also In re Pharmatrak, Inc., 329 F.3d 9, 21 (1st Cir. 2003) (\u201cWe share&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\"  onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_8');\">Continue reading<\/span><\/span><\/cite><\/sup><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_3190_1_8').tooltip({ tip: '#footnote_plugin_tooltip_text_3190_1_8', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top center', relative: true, offset: [-7, 0], });<\/script> As part of the courts\u2019 struggle to interpret and apply the Wiretap Act to Internet communications, the Ninth Circuit recently issued a holding in In re Facebook, Inc. Internet Tracking Litigation<sup class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_9');\" onkeypress=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_9');\" ><sup id=\"footnote_plugin_tooltip_3190_1_9\" class=\"footnote_plugin_tooltip_text\">9<\/sup><\/a><cite class=\"footnote_tooltip\"><span class=\"footnote-inner\">9. 956 F.3d 589 (9th Cir. 2020).<\/span><\/cite><\/sup><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_3190_1_9').tooltip({ tip: '#footnote_plugin_tooltip_text_3190_1_9', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top center', relative: true, offset: [-7, 0], });<\/script> (hereby referred to as \u201cIn re Facebook\u201d) deviating from the Third Circuit\u2019s holding in In re Google Inc. Cookie Placement Consumer Privacy Litigation<sup class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_10');\" onkeypress=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_10');\" ><sup id=\"footnote_plugin_tooltip_3190_1_10\" class=\"footnote_plugin_tooltip_text\">10<\/sup><\/a><cite class=\"footnote_tooltip\"><span class=\"footnote-inner\">10. 806 F.3d 125 (3d Cir. 2015).<\/span><\/cite><\/sup><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_3190_1_10').tooltip({ tip: '#footnote_plugin_tooltip_text_3190_1_10', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top center', relative: true, offset: [-7, 0], });<\/script> (hereby referred to as \u201cIn re Google\u201d) regarding the applicability of the Wiretap Act\u2019s party exception to third-party websites\u2019 cookies practices.<sup class=\"footnote_referrer\"><a role=\"button\" tabindex=\"0\" onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_11');\" onkeypress=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_11');\" ><sup id=\"footnote_plugin_tooltip_3190_1_11\" class=\"footnote_plugin_tooltip_text\">11<\/sup><\/a><cite class=\"footnote_tooltip\"><span class=\"footnote-inner\">11. The U.S. Supreme Court has denied certiorari to hear Facebook\u2019s appeal of the decision in In re Facebook, leaving the disagreement in interpretation between the Ninth and Third Circuits unresolved.&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\"  onclick=\"footnote_moveToReference_3190_1('footnote_plugin_reference_3190_1_11');\">Continue reading<\/span><\/span><\/cite><\/sup><script type=\"text\/javascript\"> jQuery('#footnote_plugin_tooltip_3190_1_11').tooltip({ tip: '#footnote_plugin_tooltip_text_3190_1_11', tipClass: 'footnote_tooltip', effect: 'fade', predelay: 0, fadeInSpeed: 200, delay: 400, fadeOutSpeed: 200, position: 'top center', relative: true, offset: [-7, 0], });<\/script><\/p>\n\n\n\n<p>This Note analyzes the circuit split regarding the Wiretap Act\u2019s party exception and cookies, and recommends a framework to aid in the application of the Wiretap Act to Internet communications. Part I of this Note provides background information on how cookies operate, the history of the Wiretap Act, and previous litigation concerning the meaning of \u201cintercept\u201d under the Wiretap Act. Part II discusses several important cases involving the Wiretap Act and cookies. Part III describes the split between the Third and Ninth Circuits\u2019 interpretations of the Wiretap Act\u2019s party exception in In re Google and In re Facebook, respectively. Part IV argues that courts should establish an additional \u201csurreptitious tampering\u201d framework to provide guidance on the meaning of \u201cintercept\u201d under the Wiretap Act and that it is ultimately unclear as to whether third-party websites can use cookies to perform an interception. Part IV continues to argue that Google and Facebook should not qualify for the Wiretap Act\u2019s party exception (assuming they are able to intercept, and have intercepted, users\u2019 communications through the use of cookies). Part V discusses the limitations of the \u201csurreptitious tampering\u201d framework and the need for congressional legislation.<\/p>\n\n\n\n<p>To read this Note, please click here: <a href=\"https:\/\/live-cornell-law-review.pantheonsite.io\/wp-content\/uploads\/2022\/02\/Wang-note-final-1-31-2219333.pdf\">Cookies and Wires: Can Facebook Lure Users Into Divulging Information Under the Wiretap Act&#8217;s Party Exception?<\/a><\/p>\n<div class=\"speaker-mute footnotes_reference_container\"> <div class=\"footnote_container_prepare\"><p><span role=\"button\" tabindex=\"0\" class=\"footnote_reference_container_label pointer\" onclick=\"footnote_expand_collapse_reference_container_3190_1();\">References<\/span><span role=\"button\" tabindex=\"0\" class=\"footnote_reference_container_collapse_button\" style=\"display: none;\" onclick=\"footnote_expand_collapse_reference_container_3190_1();\">[<a id=\"footnote_reference_container_collapse_button_3190_1\">+<\/a>]<\/span><\/p><\/div> <div id=\"footnote_references_container_3190_1\" style=\"\"><table class=\"footnotes_table footnote-reference-container\"><caption class=\"accessibility\">References<\/caption> <tbody> \r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_3190_1('footnote_plugin_tooltip_3190_1_1');\"><a id=\"footnote_plugin_reference_3190_1_1\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>1<\/a><\/th> <td class=\"footnote_plugin_text\">See Lisa Eadicicco, Obama Wants to Reclassify the Internet by Turning It Into a Utility, BUSINESS INSIDER (Nov. 10, 2014, 9:36 AM), https:\/\/ www.businessinsider.com\/president-obama-thinks-the-internet-should-be-autility-2014-11 [<span class=\"footnote_url_wrap\">https:\/\/perma.cc\/FZD2-C9TS]<\/span> (noting that former-President Barack Obama argued that the FCC should recognize the Internet as a vital service); Internet Access Is \u2018a Fundamental Right\u2019, BBC NEWS, <span class=\"footnote_url_wrap\">http:\/\/news.bbc.co.uk\/2\/<\/span> hi\/8548190.stm [<span class=\"footnote_url_wrap\">https:\/\/perma.cc\/YR82-K5QS]<\/span> (last updated Mar. 8, 2010) (\u201cAlmost four in five people around the world believe that access to the Internet is a fundamental right . . . .\u201d).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_3190_1('footnote_plugin_tooltip_3190_1_2');\"><a id=\"footnote_plugin_reference_3190_1_2\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>2<\/a><\/th> <td class=\"footnote_plugin_text\">Kotagiri Ramamohanarao, Kapil Kumar Gupta, Tao Peng &amp; Christopher Leckie, The Curse of Ease of Access to the Internet, in Information Systems Security 234 (Patrick Drew McDaniel &amp; Shyam K. Gupta, eds., Lecture Notes in Computer Science Series No. 4812, 2007) (\u201cThe Internet has emerged as one of the most convenient and widely used media for exchanging information. The amount of information that it contains is unprecedented . . . [and] the main factor that led to its success is the ease with which anyone can access this information.\u201d).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_3190_1('footnote_plugin_tooltip_3190_1_3');\"><a id=\"footnote_plugin_reference_3190_1_3\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>3<\/a><\/th> <td class=\"footnote_plugin_text\">Clare Duffy, How Jeff Bezos Changed the World, CNN, https:\/\/ www.cnn.com\/2019\/08\/16\/tech\/jeff-bezos-amazon\/index.html [https:\/\/ perma.cc\/LMB5-XVWF] (last updated Aug. 16, 2019) (noting that Amazon \u201cdisrupted the retail industry\u201d with its implementation of online shopping).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_3190_1('footnote_plugin_tooltip_3190_1_4');\"><a id=\"footnote_plugin_reference_3190_1_4\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>4<\/a><\/th> <td class=\"footnote_plugin_text\">See Lenny Sanicola, What is FinTech?, HUFFPOST (Feb. 13, 2017, 2:50 PM), <span class=\"footnote_url_wrap\">https:\/\/www.huffpost.com\/entry\/what-isfintech_b_58a20d80e4b0cd37efcfebaa<\/span> [<span class=\"footnote_url_wrap\">https:\/\/perma.cc\/KD4A-8WVA]<\/span> (noting how FinTech companies have used Internet-based applications to provide financial services to consumers).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_3190_1('footnote_plugin_tooltip_3190_1_5');\"><a id=\"footnote_plugin_reference_3190_1_5\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>5<\/a><\/th> <td class=\"footnote_plugin_text\">See Matt Richtel, E-Mail Gets an Instant Makeover, N.Y. TIMES (Dec. 20, 2010), <span class=\"footnote_url_wrap\">https:\/\/www.nytimes.com\/2010\/12\/21\/technology\/21email.html<\/span> [<span class=\"footnote_url_wrap\">https:\/\/perma.cc\/V7J4-ZN67]<\/span> (noting the rise in preference among young people for online chats and text messages due to their ability to facilitate real time communication); Richard T. Wang &amp; Patrick D. Tucker, How Partisanship Influences What Congress Says Online and How They Say It, 49 AM. POL. RES. 76, 76 (2021) (citing GARY LEE MALECHA &amp; DANIEL J. REAGAN, THE PUBLIC CONGRESS: CONGRESSIONAL DELIBERATION IN A NEW MEDIA AGE 18 (2012); Scott E. Adler, Chariti E. Gent &amp; Cary B. Overmeyer, The Home Style Homepage: Legislator Use of the World Wide Web for Constituency Contact, 23 LEGIS. STUD. Q. 585, 585) (noting that members of Congress believe the Internet provides an important and low-cost means of communicating with their constituents).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_3190_1('footnote_plugin_tooltip_3190_1_6');\"><a id=\"footnote_plugin_reference_3190_1_6\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>6<\/a><\/th> <td class=\"footnote_plugin_text\">See Dobkin, supra note 10, at 8 (\u201c[T]here is no sweeping standard for how<br \/>private firms treat data . . . .\u201d); Yonatan Lupu, The Wiretap Act and Web Monitoring: A Breakthrough for Privacy Rights?, 9 VA. J.L. &amp; TECH. 1, 5 (2004) (\u201cDespite continuous calls for a definitive legislative stance on the protection of online privacy rights, Congress has not enacted a comprehensive statute.\u201d).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_3190_1('footnote_plugin_tooltip_3190_1_7');\"><a id=\"footnote_plugin_reference_3190_1_7\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>7<\/a><\/th> <td class=\"footnote_plugin_text\">See Deirdre K. Mulligan, Reasonable Expectations in Electronic Communications: A Critical Perspective on the Electronic Communications Privacy Act, 72 GEO. WASH. L. REV. 1557, 1557, 1559 (2004) (noting that Congress last amended the Wiretap Act in 1986, before the creation of the World Wide Web, and that the Wiretap Act has \u201cfailed to keep pace with changes in and on the Internet\u201d).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_3190_1('footnote_plugin_tooltip_3190_1_8');\"><a id=\"footnote_plugin_reference_3190_1_8\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>8<\/a><\/th> <td class=\"footnote_plugin_text\">infamous) for its lack of clarity.\u201d Steve Jackson Games, Inc. v. U.S. Secret Serv., 36 F.3d 457, 462 (5th Cir. 1994); see also In re Pharmatrak, Inc., 329 F.3d 9, 21 (1st Cir. 2003) (\u201cWe share the concern . . . about the judicial interpretation of a statute written prior to the widespread usage of the internet and the World Wide Web in a case involving purported interceptions of online communications.\u201d); United States v. Smith, 155 F.3d 1051, 1055 (9th Cir. 1998) (\u201cWhen the Fifth Circuit observed that the Wiretap Act \u2018is famous (if not infamous) for its lack of clarity\u2019, it might have put the matter too mildly.\u201d).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_3190_1('footnote_plugin_tooltip_3190_1_9');\"><a id=\"footnote_plugin_reference_3190_1_9\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>9<\/a><\/th> <td class=\"footnote_plugin_text\">956 F.3d 589 (9th Cir. 2020).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_3190_1('footnote_plugin_tooltip_3190_1_10');\"><a id=\"footnote_plugin_reference_3190_1_10\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>10<\/a><\/th> <td class=\"footnote_plugin_text\">806 F.3d 125 (3d Cir. 2015).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"  onclick=\"footnote_moveToAnchor_3190_1('footnote_plugin_tooltip_3190_1_11');\"><a id=\"footnote_plugin_reference_3190_1_11\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>11<\/a><\/th> <td class=\"footnote_plugin_text\">The U.S. Supreme Court has denied certiorari to hear Facebook\u2019s appeal of the decision in In re Facebook, leaving the disagreement in interpretation between the Ninth and Third Circuits unresolved. Facebook, Inc. v. Davis, 141 S. Ct. 1684 (2021).<\/td><\/tr>\r\n\r\n <\/tbody> <\/table> <\/div><\/div><script type=\"text\/javascript\"> function footnote_expand_reference_container_3190_1() { jQuery('#footnote_references_container_3190_1').show(); jQuery('#footnote_reference_container_collapse_button_3190_1').text('\u2212'); } function footnote_collapse_reference_container_3190_1() { jQuery('#footnote_references_container_3190_1').hide(); jQuery('#footnote_reference_container_collapse_button_3190_1').text('+'); } function footnote_expand_collapse_reference_container_3190_1() { if (jQuery('#footnote_references_container_3190_1').is(':hidden')) { footnote_expand_reference_container_3190_1(); } else { footnote_collapse_reference_container_3190_1(); } } function footnote_moveToReference_3190_1(p_str_TargetID) { footnote_expand_reference_container_3190_1(); var l_obj_Target = jQuery('#' + p_str_TargetID); if (l_obj_Target.length) { jQuery( 'html, body' ).delay( 0 ); jQuery('html, body').animate({ scrollTop: l_obj_Target.offset().top - window.innerHeight * 0.2 }, 380); } } function footnote_moveToAnchor_3190_1(p_str_TargetID) { footnote_expand_reference_container_3190_1(); var l_obj_Target = jQuery('#' + p_str_TargetID); if (l_obj_Target.length) { jQuery( 'html, body' ).delay( 0 ); jQuery('html, body').animate({ scrollTop: l_obj_Target.offset().top - window.innerHeight * 0.2 }, 380); } }<\/script>","protected":false},"excerpt":{"rendered":"<p>The advent of the Internet brought immeasurable benefits11. See Lisa Eadicicco, Obama Wants to Reclassify the Internet by Turning It Into a Utility, BUSINESS INSIDER (Nov. 10, 2014, 9:36 AM), https:\/\/&nbsp;&#x2026; Continue reading to society in various ways\u2014providing convenient access to information,22. Kotagiri Ramamohanarao, Kapil Kumar Gupta, Tao Peng &amp; Christopher Leckie, The Curse of&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[101,46,48,52],"tags":[212,399,678],"class_list":["post-3190","post","type-post","status-publish","format-standard","hentry","category-issue-7-print-volume-106","category-notes","category-print","category-print-volume-106","tag-cookies","tag-internet","tag-wiretap"],"acf":[],"_links":{"self":[{"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/posts\/3190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/comments?post=3190"}],"version-history":[{"count":0,"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/posts\/3190\/revisions"}],"wp:attachment":[{"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/media?parent=3190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/categories?post=3190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/tags?post=3190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}