The bill strengthens protections and creates procedures for confidential electronic attorney‑client communications in prisons, but it still allows warrant‑based access and creates operational and interim risks (data retention, verification barriers, and chilling effects) that could erode those protections in practice.
Incarcerated people and their attorneys retain confidential electronic attorney‑client communications that are protected from routine monitoring and may be shielded from use as evidence if accessed improperly.
The bill limits government review of privileged electronic messages by requiring higher authorization (a warrant plus senior DOJ approval) and restricting the Attorney General from routine reading of contents, reducing the risk of improper evidence collection.
Provides clear definitions and a two‑year implementation timeline for the Department of Justice and Bureau of Prisons to set up protected electronic attorney‑client communications, giving agencies guidance to operationalize the protections.
BOP may retain the contents of privileged messages until an individual's release, creating a sustained risk that sensitive communications could be exposed through data breaches or unauthorized access.
Law enforcement can obtain privileged electronic communications with a warrant, which may permit intrusive access into confidential attorney‑client exchanges during investigations.
Requiring identity and licensure verification for attorneys to use the system may delay or impede timely legal communications, disproportionately affecting indigent clients, pro bono counsel, and others with limited resources.
Based on analysis of 2 sections of legislative text.
Introduced February 11, 2026 by Ronald Lee Wyden · Last progress February 11, 2026
Requires the Attorney General to develop or update, within two years, a system allowing incarcerated people to send and receive electronic communications while protecting the confidentiality of attorney-client privileged electronic messages. The system must exclude routine monitoring of privileged communications, limit access to privileged content to law enforcement only with a court-issued warrant and high-level departmental approval, require privilege-review procedures, and permit suppression of evidence obtained in violation of these rules.