Whose Computer Is It, Anyway? Steven J. McDonald General Counsel Rhode Island School of Design Computer Policy and Law 2005.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
Paul Ohm Associate Professor, CU Law Initiative Director, Silicon Flatirons December 4, 2009.
A Brief History of Information Privacy IC211. Colonial America Eavesdropping “listen[ing] under walls or windows, or the eaves of a house, to hearken.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Privacy of Communications: Snail Mail to Telephones.
News Gathering & the Law The Role of the First Amendment The text of the First Amendment, by its terms, says nothing about a right to gather news or a.
Criminal Procedure for the Criminal Justice Professional 11 th Edition John N. Ferdico Henry F. Fradella Christopher Totten Prepared by Tony Wolusky Searches.
The Bill of Rights Amendment I
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Right to Privacy: The Unwritten Right
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
Does Your Campus Need a Chief Privacy Officer? Dennis Devlin, Chief Information Security Officer, Brandeis University Steven J. McDonald, General Counsel,
2/16/2010 The Family Educational Records and Privacy Act.
INTERNET and CODE OF CONDUCT
The Bill of Rights.
EMPLOYER/EMPLOYEE PRIVACY RIGHTS
Security Services Constitutional Issues in Private Security.
+ Protecting Individual Liberties Section 1 Chapter 14.
Whose Computer Is It, Anyway? Steven J. McDonald General Counsel Rhode Island School of Design Computer Policy and Law 2006.
Unit Five Lesson 31 How do the Fourth and Fifth Amendments Protect Against Unreasonable Law Enforcement Procedures.
131 Privacy 2. DOJ Position “Visit DOJ's new website launched to educate Americans about how we are preserving.
The Exclusionary Rule The Fourth Amendment History of the Exclusionary Rule Deontological Defenses of the Rule Consequentialist Defenses Objections Alternatives.
(Edited) WORKPLACE PRIVACY.
SPC Duckwiler, e:\adlaw\cp2.ppt OFFICE OF THE STAFF JUDGE ADVOCATE OVERVIEW Constitutional Basis Statutory Framework Regulations.
Chapter 18 - The Fourth Amendment and National Security.
Class 11 Internet Privacy Law Government Surveillance.
Privacy, Confidentiality and Duty to Warn in School Guidance Services March 2006 Disclaimer - While the information in these slides are designed to reflect.
The Basics AMERICAN GOVERNMENT. The Bill of Rights  What is the Bill of Rights?  The Bill of Rights are the first ten amendments.  Why was the Bill.
Legal Case Studies November 8,  1 st Amendment to US Constitution  4 th Amendment to US Constitution  Tinker vs. Des Moines.
INSPECTIONS AND SEARCHES PREPARATION AND RESPONSE Richard E. Glaze, Jr. Balch & Bingham LLP Atlanta, GA AWMA August 3, 2011.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Chapter 1 What is Law?. Laws and Values Our current legal system is based on values that our government and society believe are most important to keep.
PROCEDURES IN THE JUSTICE SYSTEM, 8 th ed. Roberson, Wallace, and Stuckey PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ
Amendments to the U.S Constitution that have particular implications in science, medicine, and the delivery of health care >>>>>>
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
The USA PATRIOT Act An Overstatement of ALA Concerns?
The Bill of Rights The First Fundamental Changes of the Constitution.
Amendments in Action Search and Seizure. The 4 th Amendment “The right of the people to be secure in their persons, houses, papers, and effects, against.
 What is the exclusionary rule  Explain stop and frisk  What is the plain view doctrine  What did Miranda v Arizona require police to do  What happens.
The Fourth Amendment and the Home By Laura Zajac.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
4 th Amendment: Search and Seizure. The Fourth Amendment to the U.S. Constitution protects personal privacy, and every citizen's right to be free from.
You remember the 4th Amendment, don’t you?  “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
First 10 Amendments to the United States Constitution.
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
Criminal Justice Process: The Investigation The criminal justice process includes everything that happens to a person from the moment of arrest, through.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
LAW RIGHT TO PRIVACY NOTES 1. Def: Right protecting citizens from unreasonable interference by government 2. No right to privacy in the Constitution.
1 st Amendment: Freedom of Expression “Congress shall make no law.
Unit 4 Seminar. Tell me what the Miranda warning is and what it means to you.
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 6 Exceptions to the Warrant Requirement: Plain View, Open Fields, Abandoned.
Nassau Association of School Technologists
Privacy and the Law.
Surveillance around the world
Networking 2002 USA-Patriot Act Tracy Mitrano Cornell University
Protection of News Sources
The Fourth Amendment and the Home
Fourth Amendment And Probable Cause.
2.2 Civil Liberties 4th 5th, 6th, and 8th Amendments.
CHAPTER 1 1/15/2019 BHS Law Related Education Program Criminal Justice
Criminal Procedure: Theory and Practice, 2d.
Bell Work (Think of your response and be prepared to share)
Authority to Detain and Arrest; Use of Force
Search & Seizure The act of taking possession of this property.
Presentation transcript:

Whose Computer Is It, Anyway? Steven J. McDonald General Counsel Rhode Island School of Design Computer Policy and Law 2005

The Key to Handling Computer Privacy Issues Successfully Ignore the law

But First, Let's Invade a Little pages/reverse-address

Never Metadata I Didn't Like ( hives/individual/2005_05/ php)

The Spy Who Loves You?

What is Privacy? "[T]he right to be let alone – the most comprehensive of rights, and the right most valued by civilized men." Justice Louis Brandeis Olmstead v. U.S.

The Legal Basis for Privacy: A Patchwork Quilt U.S. and state constitutions –But no explicit reference in U.S. constitution –Fourth amendment (and state versions) Statutory privacy –Electronic Communications Privacy Act (and state versions) –FERPA and other general privacy statutes –But also federal and state FOIA laws The common law of privacy

The Fourth Amendment "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."

The Fourth Amendment in Cyberspace "We are satisfied that the Constitution requires that the FBI and other police agencies establish probable cause to enter into a personal and private computer." U.S. v. Maxwell

Publics are Private, Privates are Not "Although individuals have a right under the Fourth Amendment of the United States Constitution to be free from unreasonable searches and seizures by the Government, private searches are not subject to constitutional restrictions." U.S. v. Hall

O'Connor v. Ortega "Fourth Amendment rights are implicated [whenever] the conduct of the [government] officials at issue... infringe[s] 'an expectation of privacy that society is prepared to consider reasonable.'"

O'Connor v. Ortega (continued) "[W]e reject the contention... that public employees can never have a reasonable expectation of privacy in their place of work. Individuals do not lose their Fourth Amendment rights merely because they work for the government instead of a private employer. The operational realities of the workplace, however, may make some employees' expectations of privacy unreasonable when an intrusion is by a supervisor rather than a law enforcement official. Public employees' expectations of privacy in their offices, desks, and file cabinets, like similar expectations of employees in the private sector, may be reduced by virtue of actual office practices and procedures, or by legitimate regulation."

O'Connor v. Ortega (continued) "Given the great variety of work environments in the public sector, the question whether an employee has a reasonable expectation of privacy must be addressed on a case-by-case basis."

Reasonable Expectations in Cyberspace Who owns the system? Who has access to the system? How does the system work? How is the system used? Is the system password-protected? What policies apply to the system? What is the ordinary practice?

The Electronic Communications Privacy Act (ECPA) "[A] fog of inclusions and exclusions" – Briggs v. American Air Filter Co. (5th Cir. 1980) "[A] statute... which is famous (if not infamous) for its lack of clarity" – Steve Jackson Games, Inc. v. United States Secret Service (5th Cir. 1994) "[T]he Fifth Circuit... might have put the matter too mildly." – U.S. v. Smith (9th Cir. 1998)

ECPA Prohibitions Generally illegal to: –Intercept an electronic communication while it is in transmission (§2511(1)(a)) –Disclose the contents of an electronic communication that has been illegally intercepted (§2511(1)(c)) –Use the contents of an electronic communication that has been illegally intercepted (§2511(1)(d))

"In Transmission" "[T]he seizure of a computer on which is stored private e- mail that has been sent to an electronic bulletin board, but not yet read (retrieved) by the recipients" did not violate §2511(1)(a) "because [the] acquisition of the contents of the electronic communications was not contemporaneous with the transmission of those communications". – Steve Jackson Games, Inc. v. United States Secret Service ECPA "protects electronic communications from interception when stored to the same extent as when in transit." – Konop v. Hawaiian Airlines, Inc. I "We therefore hold that for a website such as Konop's to be 'intercepted' in violation of the Wiretap Act, it must be acquired during transmission, not while it is in electronic storage." – Konop v. Hawaiian Airlines, Inc. II

"In Transmission" "We believe that the language of the statute makes clear that Congress meant to give lesser protection to electronic communications than wire and oral communications. Moreover, at this juncture, much of the protection may have been eviscerated by the realities of modern technology. We observe, as most courts have, that the language may be out of step with the technological realities of computer crimes. However, it is not the province of this court to graft meaning onto the statute where Congress has spoken plainly." – United States v. Councilman

ECPA Exceptions A provider of electronic communication service may intercept an electronic communication, or disclose or use an intercepted communication, "while engaged in any activity which is a necessary incident to the rendition of [its] service or to the protection of [its] rights or property". (§2511(2)(a)(i))

More ECPA Exceptions A party to an electronic communication, or a person to whom a party to an electronic communication has given consent, may intercept the communication "unless such communication is intercepted for the purpose of committing any criminal or tortious act". (§2511(2)(d)) –An exception to the exception: Some states require that all parties consent.

Still More ECPA Prohibitions and Exceptions It generally is illegal to access an electronic communication while it is in electronic storage. (§2701(a)) –But a provider of electronic communication service has apparently unlimited authority to access stored communications on its system. (§2701(c)(1)) But a provider of electronic communication service to the public generally may not divulge the contents of a stored communication. (§2702(a)(1)) –But any provider may divulge the contents of a stored communication with consent or as a necessary incident to the rendition of service or to protects its rights or property. (§2702(b))

"To the Public" "The statute does not define 'public'. The word 'public', however, is unambiguous. Public means the 'aggregate of the citizens' or 'everybody' or 'the public at large' or 'the community at large'. Black's Law Dictionary 1227 (6th ed. 1990). Thus, the statute covers any entity that provides electronic communication service (e.g., ) to the community at large." Andersen Consulting LLP v. UOP

Law Enforcement Access Voluntary or at government request? Obtained inadvertently or intentionally? In transmission or in storage? –In storage more than 180 days? Contents or log files? With consent of user or without? With notice to user or without?

Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations

USA PATRIOT Act A provider of electronic communication service may disclose subscriber information concerning, and the contents of, a stored communication to a law enforcement agency if the provider reasonably believes that an emergency involving immediate danger of death or serious physical injury to any person requires disclosure of the information without delay (§2702(b)(6)(C) and (c)(4)) The owner of a computer system may, under certain circumstances, authorize law enforcement to intercept communications of a computer trespasser (§2511(2)(i))

USA PATRIOT Act Governmental entities may subpoena a provider of electronic communication service for a subscriber's: –Name –Address –Records of session times and durations –Length and types of service –Subscriber number or identity, including any temporarily assigned network address –Means and source of payment, including credit card or bank numbers (§2703(c)(2))

Common Law Invasion of Privacy Four theories: –Intrusion –Public Disclosure of Private Facts –Misappropriation of Name or Likeness –False Light Few cases Room for growth?

In summary... "In Hell, there will be nothing but law, and due process will be meticulously observed." Grant Gilmore

Untangling the Privacy Mess Ignore the law Establish – and follow – a policy –What expectations are reasonable? –Consent Options: –No privacy –Total privacy –Somewhere in between

The Importance of Being Earnest (About Privacy Policies) I "Leventhal had a reasonable expectation of privacy in the contents of his office computer.... Leventhal occupied a private office with a door. He had exclusive use of the desk, filing cabinet, and computer in his office. Leventhal did not share use of his computer with other employees... nor was there evidence that visitors of the public had access to his computer.... [W]e do not find that the DOT either had a general practice of routinely conducting searches of office computers or had placed Leventhal on notice that he should have no expectation of privacy in the contents of his office computer." Leventhal v. Knapek

The Importance of Being Earnest (About Privacy Policies) II "The general policy of the department that department- issued equipment... was not to be 'converted to personal use' cannot provide the necessary notice to officers to find consent to surreptitious interception of their messages.... The so-called policy prohibiting personal use cannot form an after-the-fact justification for intercepting plaintiff's pager where the policy had not been enforced and the department conceded it was aware that pagers were used by many members of the force for personal use." Adams v. City of Battle Creek

The Importance of Being Earnest (About Privacy Policies) III "Oklahoma State University policies and procedures prevent its employees from reasonably expecting privacy in data downloaded from the Internet onto University computers. The University computer- use policy reserved the right to randomly audit Internet use and to monitor specific individuals suspected of misusing University computers. The policy explicitly cautions computer users that information flowing through the University network is not confidential either in transit or in storage on a University computer. Under this policy, reasonable Oklahoma State University computer users should have been aware network administrators and others were free to view data downloaded from the Internet." U.S. v. Angevine

The Importance of Being Earnest (About Privacy Policies) IV "The only evidence relied upon by the defendants to suggest that plaintiff's expectation of privacy was not objectively reasonable is the policy that was displayed each day on the employee's computers in the AG's office.... This particular statement obviously has considerable significance here. The court, however, must consider this fact in conjunction with... the oral representations made by AG employees to the plaintiff [to the effect that he could maintain a 'private file' to which no one would have access]. These other facts suggest that plaintiff's expectation of privacy was objectively reasonable." Haynes v. Kline