Electronic Frontier Foundation+Image
Publishes law enforcement guidelines
Does the company publish law enforcement guidelines?
1369810
Researched

About the data

Electronic Frontier Foundation also evaluates whether companies publish their guidelines for law enforcement requests for user data. Law enforcement guides might provide insight into issues such as:

  • Whether a company requires a warrant for content;
  • What types of data a company retains, and what kind of legal process the company requires for law enforcement to obtain various kinds of information;
  • How long data is generally held by the company, and how long will it be held in response to a retention request;
  • Whether the company has an exception for specific emergency or other kinds of disclosures; and
  • Whether the company asks for reimbursement for the costs incurred in complying with a request for data.

These published guidelines help us better understand what standards and rules law enforcement must follow when they seek access to sensitive user data on a variety of different platforms. They also help companies avoid receiving improper requests in the first place, by educating law enforcement about what they can and cannot obtain, and the standards that must be met.

EFF entrust its most sensitive, private, and important information to technology companies like Google, Facebook, and Verizon. Collectively, these companies are privy to the conversations, photos, social connections, and location data of almost everyone online. The choices these companies make affect the privacy of every one of their users. So which companies stand with their users, embracing transparency around government data requests? Which companies have resisted improper government demands by fighting for user privacy in the courts and on Capitol Hill? In short, which companies have your back?

These questions are even more important in the wake of the past year’s revelations about mass surveillance, which showcase how the United States government has been taking advantage of the rich trove of data EFF entrust to technology companies to engage in surveillance of millions of innocent people in the US and around the world. Internal NSA documents and public statements by government officials confirm that major telecommunications companies are an integral part of these programs. EFF is also faced with unanswered questions, conflicting statements, and troubling leaked documents which raise real questions about the government’s ability to access to the information they entrust to social networking sites and webmail providers.

The legal landscape is unsettled. The Electronic Frontier Foundation and other organizations have filed constitutional challenges to mass surveillance programs. Both Congress and President Obama are negotiating legislative reform that could curtail or even end bulk surveillance programs, while other Congressional proposals would instead enshrine them into law. In multiple recent public opinion polls, the American people attest that they believe government surveillance has gone too far.

In the face of unbounded surveillance, users of technology need to know which companies are willing to take a stand for the privacy of their users.

In this fourth-annual report, EFF examines the publicly-available policies of major Internet companies—including Internet service providers, email providers, mobile communications tools, telecommunications companies, cloud storage providers, location-based services, blogging platforms, and social networking sites—to assess whether they publicly commit to standing with users when the government seeks access to user data. The purpose of this report is to allow users to make informed decisions about the companies with whom they do business. It is also designed to incentivize companies to adopt best practices, be transparent about how data flows to the government, and to take a stand for their users’ privacy in Congress and in the courts whenever it is possible to do so.

The categories EFF evaluates in this report represent objectively verifiable, public criteria and so cannot and do not evaluate secret surveillance. They compiled the information in this report by examining each company’s published terms of service, privacy policy, transparency report, and guidelines for law enforcement requests, if any. As part of their evaluation, they contacted each company to explain treir findings and to give them an opportunity to provide evidence of improving policies and practices.

Download the complete Who Has Your Back? 2014: Protecting Your Data From Government Requests report as a PDF.

Value Type
Options
Yes
No
steps in the right direction
Research Policy
Community Assessed