Respondents nonetheless contend that, because Husband has not claimed that he saved the emails anywhere else, the storage of his emails could not have been for the purposes of backup protection. However, courts interpreting section 2701 have issued rulings that would seem to allow Husband's cause of action in this case. See Cardinal Health 414, Inc. v. Adams, 582 F. Supp. 2d 967, 976 (M.D. Tenn. 2008) ("[W]here the facts indisputably present a case of an individual logging onto another's e-mail account without permission and reviewing the material therein, a summary judgment finding of an SCA violation is appropriate."); Pure Power Boot Camp v. Warrior Fitness Boot Camp, 587 F. Supp. 2d 548, 555 (S.D.N.Y. 2008) ("The majority of courts which have addressed the issue have determined that e-mail stored on an electronic communication service provider's systems after it has been delivered, as opposed to e-mail stored on a personal computer, is a stored communication subject to the SCA."); Fischer, 207 F. Supp. 2d at 925-26 (rejecting argument that emails stored on Hotmail's system were not in "electronic storage").
Furthermore, we do not find Respondents' argument to be convincing. Under Respondents' construction of the SCA, the unauthorized access of a person's emails from an ECS would be unlawful if the person had previously saved his emails somewhere else, but would be perfectly lawful if the person had not done so. However, such an interpretation would lead to strange results. For instance, a person whose emails were stored solely with an ECS would generally suffer greater harm if someone "alter[ed]" or "prevent[ed] authorized access" to his ECS-stored emails than a person who had saved his emails in additional locations. Yet, under Respondents' construction of the SCA, only the person in the latter position would be protected. We do not believe that this was what Congress intended.
Indeed, the legislative history of the SCA supports the conclusion that Congress intended for the SCA to apply to the conduct Broome engaged in here. For instance, both the House and Senate Reports state that section 2701 "addresses the growing problem of unauthorized persons deliberately gaining access to, and sometimes tampering with, electronic or wire communications that are not intended to be available to the public." H.R. Rep. No. 99-647, at 62 (1986); S. Rep. No. 99-541, at 35 (1986). Additionally, the Senate Report provides the following illustration of what conduct would constitute a violation of section 2701:
For example, a computer mail facility authorizes a subscriber to access information in their portion of the facilities storage. Accessing the storage of other subscribers without specific authorization to do so would be a violation of [section 2701].
S. Rep. No. 99-541, at 36. Here, Broome has admitted that she accessed and read, without authorization, Husband's emails that were stored on Yahoo's system. The legislative history of the SCA indicates that Congress intended that such conduct would constitute a violation of section 2701.
Here is the text of the Federal law
Since the information was obtained illegally you can probably keep it from being introduced into evidence.
DISCLAIMER: Answers from Experts on JustAnswer are not substitutes for the advice of an attorney. JustAnswer is a public forum and questions and responses are not private or confidential or protected by the attorney-client privilege. The Expert above is not your attorney, and the response above is not legal advice. You should not read this response to propose specific action or address specific circumstances, but only to give you a sense of general principles of law that might affect the situation you describe. Application of these general principles to particular circumstances must be done by a lawyer who has spoken with you in confidence, learned all relevant information, and explored various options. Before acting on these general principles, you should hire a lawyer licensed to practice law in the jurisdiction to which your question pertains.
The responses above are from individual Experts, not JustAnswer. The site and services are provided “as is”. To view the verified credential of an Expert, click on the “Verified” symbol in the Expert’s profile. This site is not for emergency questions which should be directed immediately by telephone or in-person to qualified professionals. Please carefully read the Terms of Service (last updated February 8, 2012).