Codify — Article

S.3850: Protecting Attorney‑Client Electronic Communications in BOP Facilities

Requires the Attorney General to create a system that excludes privileged digital communications between incarcerated people and counsel from routine monitoring, while preserving limited law‑enforcement access under warrant.

The Brief

S.3850 directs the Attorney General to design and implement, within two years, a program or modified system that lets incarcerated people send and receive electronic communications that exclude the contents of privileged attorney‑client communications from monitoring. The text defines privileged electronic communications, requires that attorney‑client privilege rules apply to communications transmitted through the system, and preserves the Bureau of Prisons’ ability to retain communications until a person’s release.

The bill matters because it sets a federal baseline for how digital attorney‑client communications are handled in federal custody: it constrains routine monitoring, creates a warrant-driven access path for investigators, imposes review and participation barriers for prosecutors who see privileged content, and provides a suppression remedy for violations. Compliance, technical design, costs, and interactions with security needs are practical issues federal and private actors will need to address if the statute becomes law.

At a Glance

What It Does

The Attorney General must issue a report, establish guidelines, and create or modify a program that prevents monitoring of privileged electronic communications between incarcerated persons and their attorneys or agents, with a two‑year implementation target. The statute lets the Bureau of Prisons retain stored communications but restricts who may access privileged content and under what legal process.

Who It Affects

The Bureau of Prisons, the Department of Justice (including U.S. Attorneys), the U.S. Marshals Service, incarcerated people charged or convicted of federal crimes, defense attorneys and their staff, and vendors or platforms that supply inmate email or computer systems.

Why It Matters

This bill replaces a gapy, ad hoc landscape for digital attorney‑client exchanges in federal custody with statutory rules protecting privilege while creating a constrained law‑enforcement pathway (warrant + prosecutorial oversight). That combination will drive procurement, IT architecture, and operational procedures in federal detention settings and may influence state and local practices.

More articles like this one.

A weekly email with all the latest developments on this topic.

Unsubscribe anytime.

What This Bill Actually Does

The bill starts by defining the key terms: who counts as an incarcerated person, what constitutes an electronic communication (explicitly including the Trust Fund Limited Inmate Computer System), who qualifies as an agent of counsel, and what the bill means by monitoring and by privileged electronic communication.

The core command is procedural: within two years the Attorney General must produce a report, publish guidelines, and put in place—or modify—an existing program or system that lets incarcerated people exchange electronic communications that exclude the contents of privileged attorney‑client messages from monitoring. The statute makes clear that attorney‑client privilege applies to messages transmitted through that system and that common privilege limits and exceptions (for example, the crime‑fraud exception) still operate.The bill permits the Bureau of Prisons to retain electronic communications—including privileged items—until the person is released, but it tightly limits who can access that retained privileged content.

The Attorney General (or a designee) may only access retained privileged communications for the narrow administrative purpose of creating or maintaining the system, and may not read their contents. Law‑enforcement investigators can access and review privileged retained content only under a court warrant obtained under the Federal Rules of Criminal Procedure; such warrant applications require express approval by a U.S. Attorney, an Assistant Attorney General, or a designee.

The incarcerated person can waive the warrant requirement.To avoid prosecution conflicts, the bill requires that privileged communications subject to review be screened first by a U.S. Attorney, Assistant Attorney General, or designee to determine whether any privilege limitation applies; anyone who conducts that screening is barred from later participating in prosecutions of the affected defendant or sharing the privileged material with prosecutors who will handle the case. A court may suppress evidence obtained in violation of the bill’s access limits.

Until a compliant system is operational, the Attorney General must provide written notice to each incarcerated person that their privileged electronic communications remain subject to monitoring. Finally, the bill clarifies that it does not constrain monitoring of non‑privileged communications and allows the BOP to verify attorney identity and status before authorizing privileged electronic exchanges.

The Five Things You Need to Know

1

The Attorney General has a two‑year deadline from enactment to report, issue guidelines, and stand up or modify a program that excludes privileged attorney‑client electronic content from monitoring.

2

The statute explicitly includes the Trust Fund Limited Inmate Computer System in its definition of electronic communications, bringing inmate email platforms within the rule.

3

Privileged retained communications may be accessed by investigators only with a warrant under the Federal Rules of Criminal Procedure, and any warrant application must carry express approval from a U.S. Attorney, an Assistant Attorney General, or a designee.

4

A U.S. Attorney, Assistant Attorney General, or designee must screen privileged material for privilege exceptions (such as crime‑fraud) before investigators may review it, and anyone who performs that screening is barred from later participating in the prosecution or sharing the material with prosecutors on the case.

5

The Bureau of Prisons may retain privileged communications until the incarcerated person’s release, and courts may suppress evidence obtained in violation of the statute’s access limitations.

Section-by-Section Breakdown

Every bill we cover gets an analysis of its key sections. Expand all ↓

Section 2(a)

Definitions and scope

This subsection sets the operational vocabulary the rest of the bill uses: who counts as an incarcerated person, what electronic communications include (calling out the Trust Fund system), what monitoring means, and who counts as an agent of counsel. Those definitions are consequential because they determine which messages are eligible for ‘privileged’ treatment and which platforms must adapt—any system used by the BOP that falls under the statutory definition will need to implement the exclusion mechanism.

Section 2(b)

AG duty to create or modify a system; reporting and guidelines

The Attorney General must, within two years, prepare a report, promulgate guidelines, and create or adapt a program or system that blocks monitoring of privileged electronic communications. The provision is implementation‑forward: it does not prescribe a single technical solution but compels DOJ to produce an operational mechanism and governance documentation—an outcome that will drive procurement and compliance requirements for BOP and its contractors.

Section 2(c)

Retention and application of privilege

This part allows the BOP to retain stored communications (including privileged ones) until release while affirming that attorney‑client privilege and its limits apply to messages sent through the protected system. The retention permission creates a separation between storage and access: the government can keep privileged material but cannot freely inspect it, which has implications for secure storage, chain of custody, and records management in detention settings.

2 more sections
Section 2(d)

Who may access privileged communications and under what process

Access to retained privileged communications is tightly circumscribed. The Attorney General (or designee) may only access messages to build or maintain the system and may not read contents. Investigators can only access and review privileged messages pursuant to a court warrant under the Federal Rules of Criminal Procedure; U.S. Attorney or Assistant Attorney General approval is required before a warrant application may be made. The bill also builds in a screening step—review by a designated prosecutor to determine privilege exceptions—and bars that reviewer from future participation in the defendant’s prosecution or from sharing the material with trial counsel. The incarcerated person may waive the warrant requirement, and courts can suppress evidence if the statute’s access rules are violated.

Section 2(e)–(f)

Interim notice, verification, and construction rules

The Attorney General must notify incarcerated individuals, in writing, during the gap between enactment and the system becoming operational that privileged communications remain subject to monitoring. The bill also expressly leaves non‑privileged monitoring untouched and preserves BOP authority to require identity or licensure verification from attorneys and their agents before granting them electronic access—an administrative control that BOP can use to limit misuse of privileged channels.

At scale

This bill is one of many.

Codify tracks hundreds of bills on Justice across all five countries.

Explore Justice in Codify Search →

Who Benefits and Who Bears the Cost

Every bill creates winners and losers. Here's who stands to gain and who bears the cost.

Who Benefits

  • Incarcerated people facing federal charges or serving federal sentences — gain a statutory baseline protecting the confidentiality of digital communications with counsel, which strengthens the practical assurance of privileged legal advice.
  • Defense attorneys and their agents (law clerks, investigators, paralegals) — receive clearer protection for electronic exchanges originating from federal detention facilities and a formal process to claim privilege for digital communications.
  • Federal courts and defense counsel — benefit from a suppression remedy and screening procedures that seek to prevent tainted prosecutions and preserve fair‑trial rights when privileged material is at issue.
  • Providers of secure legal‑communications technology — stand to win procurement opportunities to build compliant channels or to adapt existing inmate‑communication systems to meet DOJ guidelines.

Who Bears the Cost

  • Bureau of Prisons and detention administrators — will need to design, procure, deploy, and operate technical systems and verification processes, and to manage secure long‑term retention of communications, all of which carry implementation costs.
  • Department of Justice prosecutors and investigative units — face new procedural overhead: required pre‑warrant approvals, screening steps that create recusals, and limits on direct access to potentially relevant material.
  • Private vendors of inmate communications platforms — must modify products to implement exclusion mechanisms, integrate verification and segregation features, and accept additional compliance and auditing obligations.
  • Investigative timelines and law‑enforcement flexibility — may suffer operational cost in the form of delays or extra approval layers when privileged communications are suspected of containing non‑privileged evidence.

Key Issues

The Core Tension

The bill pits two legitimate objectives against one another: preserving confidential, constitutionally grounded attorney‑client communications in a high‑risk environment versus maintaining the government’s ability to detect and investigate criminal planning that may use those same channels; the statute protects privilege but necessarily restricts investigative access, producing trade‑offs between privacy, public safety, and prosecutorial efficiency that have no frictionless solution.

The bill draws a sharp line between storage and access that raises operational complexities. Allowing retention of privileged communications while forbidding review requires robust technical segregation, access logging, and strict role‑based controls; poorly designed systems risk accidental disclosure or covert access.

The statute leaves the technical approach unspecified—filtering, separate channels, encryption, or metadata gating could all satisfy the requirement—but that ambiguity puts the onus on DOJ and BOP to pick architectures that withstand privacy, security, and evidentiary scrutiny.

Procedural safeguards create bottlenecks and conflict‑management questions. Mandatory prosecutorial screening to identify privilege exceptions and the bar on later participation are intended to prevent taint, but they could produce staffing strain for U.S. Attorney offices and create delays in urgent investigations.

The waiver option—allowing an incarcerated person to forgo the warrant requirement—protects autonomy but also risks coercive waiver dynamics in custody. Finally, the interplay between the bill’s federal baseline and state/local detention systems is unresolved: the law applies to federal custody and Marshals Service detainees, but many defendants serve time in state facilities where technology and monitoring practices differ, raising cross‑jurisdictional operational and evidentiary questions.

Try it yourself.

Ask a question in plain English, or pick a topic below. Results in seconds.