"First you need to parse obtaining phrases from clauses"
Before that you need to intercept private/confidential communications without consent from either party.
That's where the privacy intrusion starts.
The rest of your cunning theory is irrelevant thereafter.