System Operator Privileges
Provider may monitor private real-time communications to protect its rights or property [§ 2511(2)(a)(i)]
- e.g., logging every keystroke typed by a suspected intruder
- phone companies more restricted than ISPs
Under same subsection, a provider may also intercept communications if inherently necessary to providing the service