(redirected from Read receipt)
Also found in: Dictionary, Thesaurus, Medical, Encyclopedia, Wikipedia.


Electronic mail, or e-mail, developed as part of the revolution in high-tech communications during the mid 1980s. Although statistics about the number of e-mail users is often difficult to compute, the total number of person-to-person e-mails delivered each day has been estimated at more than ten billion in North America and 16 billion worldwide. Faster and cheaper than traditional mail, this correspondence is commonly sent over office networks, through many national services, and across the Internet.

E-mail is less secure than traditional mail, even though federal law protects e-mail from unauthorized tampering and interception. Under the Electronic Communications Privacy Act of 1986 (ECPA), Pub. L. No. 99-508, 100 Stat. 1848, third parties are forbidden to read private e-mail. However, a loophole in the ECPA that allows employers to read their workers' e-mail has proven especially controversial. It has provoked several lawsuits and has produced legislative and extralegal proposals to increase e-mail privacy.

Congress intended to increase privacy by passing the ECPA. Lawmakers took note of increasingly popular communications devices that were readily susceptible to eavesdropping—cellular telephones, pagers, satellite dishes, and e-mail. The law updated existing federal criminal codes in order to qualify these emerging technologies for constitutional protection under the Fourth Amendment. In the case of e-mail, Congress gave it most of the protection already accorded by law to traditional mail. Just as postal employees may not divulge information about private mail to third parties, neither may e-mail services. The law provides criminal and civil penalties for violators: In cases of third-party interception, it establishes fines of up to $5,000 and prison sentences of up to six months. In cases of industrial espionage—where privacy is invaded for purposes of commercial advantage, malicious destruction, or private commercial gain—it establishes fines of up to $250,000 and prison sentences of up to one year.

Commentators have noted that cases involving employers reading their employees' e-mails tend to favor the employers, especially where the employer owns the equipment that stores the e-mail. Many companies also provide written policies regarding the ownership of stored e-mail messages, indicating whether the employer considers stored e-mail to be the property of the employer.

E-mail raises additional issues of privacy in the context of communications between an attorney and client. Because communications between attorney and client must remain confidential, questions have arisen about whether sending unencrypted e-mail messages by attorneys to clients could pose ethical problems. In 1999, the American Bar Association issued its opinion that the mere use of unencrypted messages does not pose ethical problems.

E-mail raises some evidentiary problems as well. Commentators have noted that the origin of some e-mail messages might be difficult to authenticate, while messages might constitute Hearsay. Nevertheless, many courts have admitted e-mail messages into evidence. To protect against disclosure of private or sensitive information, some attorneys advise employers and employees to exercise caution with e-mail, as it can be subpoenaed. Some experts have advised users to delete their e-mail regularly, and even to avoid saving it in the first place. Still others advocate the use of encryption software, which scrambles messages and makes them unreadable without a digital password.

Further readings

"Harris, Micalyn S. 2002. "Is Email Privacy an Oxymoron? Meeting the Challenge of Formulating a Company Email Policy." Saint John's Journal of Legal Commentary 553.

"Joseph, Gregory P. 2003. "Internet and Email Evidence." ALI-ABA Course of Study.

Pearlstein, Mark W. and Jonathan D. Twombly. 2002. "Cell Phones, Email, and Confidential Communications: Protecting Your Client's Confidences." Boston Bar Journal 20.

References in periodicals archive ?
The secure text product leverages powerful geolocation features for mobile purchases, and provides two-way, end-to-end encrypted messaging (up to 2048 bits), with proof of delivery and read receipts.
Create and consume messages with text, links, audio, video, images, attachments, read receipts, and knowledge checks
The new product features two-way, end-to-end encrypted messaging, sophisticated message controls, and proof of delivery and read receipts, plus an SMS push wake-up feature that delivers a message even if a device application is offline.
It also logs read receipts and is capable of both simple yes/no and free-form text responses for a complete picture of all communications.
RMail Mobile also includes legal electronic signatures to lock in agreements on attached documents or messages typed in email body text, enhanced deliverability with read receipts, and proof records specially routed or stored for easy reference after the fact.
All messages, responses, and read receipts are logged in a full audit trail that simplifies reporting.
Increased productivity - Three pane e-mail view and the ability to compose e-mail in separate tabs; enhanced calendar functionality and improved visual view of appointments, including a "fish-eye" zoom-in feature within calendar; read receipts assuring that e-mail has been read; improved file and sharing management; customized rules and filters on current e-mails and ability to sort e-mail message by size; conveniently attach any file from Zimbra Briefcase to e-mail and manage shared documents or folders.
With a distributed workforce and broad mission -- ranging from natural resource conservation and improving rural prosperity to homeland security and food safety -- USDA agencies of all sizes will leverage enterprise collaborative capabilities such as global address lists, full calendar synchronization, integrated voice mail and e-mail, delegated administration, read receipts, distribution lists, and offline capabilities.
QuantaMail includes more complex features at no extra charge such as encryption, password protection, data compression, certified read receipts and more.