1 CLASS 7 Privacy and Law Enforcement pt. 2; Education Privacy Privacy and Information Security Law Randy Canis.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Protect Our Students Protect Ourselves
Information for Students MGH Institute of Health Professions Use your down arrow or click your mouse to advance through the presentation.
Confidentiality Tutorial Family Education Rights and Privacy Act (FERPA)
SEARCH AND SEIZURE A REASONABLE TEST Created by the Ohio State Bar Foundation.
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Chapter 8 Part II. 2 New York v. Burger, 482 U.S. 691 (1987) Search of junk yard for stolen goods Lower court excluded the evidence in the criminal trial:
Lecturer: Miljen Matijašević Session 8, 7 May 2014.
Fourth Amendment: Searches at School Note: Some photos and text in the PowerPoint are adapted from a lesson plan developed by Lindsey Kakert. The lesson.
Right to Privacy: The Unwritten Right
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
Criminal Justice Process: the investigation – Chp 12 Arrest – Suspect taken into custody 4 th Amendment: The right of the people to be secure in their.
2/16/2010 The Family Educational Records and Privacy Act.
1 Chapter 15 Search Warrants. 2 Search warrants fall under the 4 th Amendment Search warrants fall under the 4 th Amendment The police must have “probable.
INTERNET and CODE OF CONDUCT
Brandon Day EDAD 689 November 3, Overview When analyzing search/seizure methods in public schools, one must be mindful of federal legislation which.
Office of General Counsel Princeton University FERPA Issues for Princeton Administrators
+ Protecting Individual Liberties Section 1 Chapter 14.
Unit Five Lesson 31 How do the Fourth and Fifth Amendments Protect Against Unreasonable Law Enforcement Procedures.
Fourth Amendment What are your rights in school?.
(Edited) WORKPLACE PRIVACY.
Featured Programs Awards Publications Products Catalog LRE Network Contact Print This | Page Feedback | ShareThisPage Feedback Criminal Law Rules on Search.
Privacy, Confidentiality and Duty to Warn in School Guidance Services March 2006 Disclaimer - While the information in these slides are designed to reflect.
Case Study Presentation
Analyzing a Court Decision An overview of Student Searches presented by Bart Fennemore.
1 Copyright © 2013 M. E. Kabay, D. J. Blythe, J. Tower-Pierce & P. R. Stephenson. All rights reserved. Legal Issues in Cybercrime Cases: Search & Seizure.
Introduction to Constitutional Law Unit 4. CJ140-02A – Introduction to Constitutional Law Unit 4: The Fourth Amendment CJ140-02A– Class 4 Part 1.
Chapter Seven – Searches and Seizures and the Right to Privacy Rolando V. del Carmen.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Chapter 2 Legal Aspects of Investigation © 2009 McGraw-Hill Higher Education. All rights reserved. LEARNING OBJECTIVES Explain the historical evolution.
Policing Legal Aspects Go to this Site. Due Process Most Due Process requirements are in either: –evidence and investigation –arrest –interrogation All.
Grady L. Hunt Locklear, Jacobs, Hunt & Brooks (910) The information contained in this presentation is intended for general.
Search Incident to Arrest MNPD Training Academy Recruit Session 42 David Veile.
Session Title: FERPA: What You Need To Know Presented By: Jeffery Loggins Institution: Mississippi Valley State University September 15, 2015.
Pre-Trial Procedures Search and Seizure.  The law seeks to balance individual’s right to privacy and need for police to conduct a thorough investigation.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
The Bill of Rights The First Fundamental Changes of the Constitution.
Criminal Justice-- Investigations Chapter 12—Due Process Rights of Suspects under 4 th & 5 th Amendments.
Some test cases. The student body of Crestwood high school, a took a vote. By a vast majority they voted to conduct a student-led prayer over the public.
“ Copyright © Allyn & Bacon 2008 Criminal Evidence Chapter Six: Warrantless Arrests and Searches This multimedia product and its contents are protected.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Where the Exclusionary Rule Does Not Apply
The Investigation.  Right to remain silent  Right to an attorney  No interrogation should take place before they read  Are a result of the US Supreme.
Strip search th Amendment “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
FERPA for the Financial Aid Office NCASFAA Fall Conference November 2012.
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Chapter 12: Criminal Justice Process ~ The Investigation Objective: Student should be able to correlate how the constitution relates to an investigation.
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 7 Search Incident to a Lawful Arrest, Hot Pursuit Criminal Justice Procedure.
Criminal Investigation: Laws of Arrest, Search and Seizure Chapter 12 Law and Government.
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 6 Exceptions to the Warrant Requirement: Plain View, Open Fields, Abandoned.
Unit 3 The Fourth Amendment. The Fourth Amendment To The United States Constitution The right of the people to be secure in their persons, houses, papers,
1 Book Cover Here Copyright © 2013, Elsevier Inc. All Rights Reserved Chapter 5 Automobile Searches: exceptions to the warrant requirement Criminal Justice.
Nassau Association of School Technologists
Surveillance around the world
Courts System Search Warrants.
Evidence Collection at the Crime Scene and Constitutional Law
What Do You Think? The principal is walking down the hall at the end of lunch, hurrying students to class. As he passes the bathroom, he smells marijuana.
Obligations of Educational Agencies: Parents’ Bill of Rights
Chapter 8 Police and Constitutional Law
Name that tune! Raise your hand if you know how to answer BOTH of the questions below. Artist? How does this song relate to what we’re learning today?
Welcome to the FERPA training for Faculty and Staff.
Search and Seizure Concepts
October 16, 2018 Modern Issues in the U.S. Agenda:
Criminal Procedure: Theory and Practice, 2d.
Bell Work (Think of your response and be prepared to share)
Pre-Trial Procedures Search and Seizure.
Chapter 20: Civil Liberties: Protecting Individual Rights Section 2
Search laws CLU3ME: Unit #3 - Day Five.
Search & Seizure The act of taking possession of this property.
Presentation transcript:

1 CLASS 7 Privacy and Law Enforcement pt. 2; Education Privacy Privacy and Information Security Law Randy Canis

Privacy and Law Enforcement pt. 2 2

D. DIGITAL SERARCHES AND SEIZURES 3

Computer Searches Generic warrants may be upheld when a “more precise description is not possible” However, a search for drug files expanded to a search for pornographic files required a second warrant 4

Copying of Computer Files 4 th Amendment violation for copying of a computer file? –“The agents’ act of copying the data on the Russian computers was not a seizure under the Fourth Amendment because it did not interfere with Defendant’s or anyone else’s possessory interest in the data.” 5

3 rd Party Search Permission? Consent to a police search is an exception to the warrant requirement “A third party has actual authority to consent to a search ‘if that third party has either (1) mutual use of the property by virtue of joint access, or (2) control for most purposes.’ Even where actual authority is lacking, however, a third party has apparent authority to consent to a search when an officer reasonably, even if erroneously, believes the third party possesses authority to consent.” 6

Computer Searches at the Border Government does not need a warrant or even reasonable suspicion to justify searches of a person or property at an international border 7

Riley v. California Issue –Can police search a cell phone seized from an arrested individual without a warrant? 8

Riley v. California “Where a search is undertaken by law enforcement officials to discover evidence of criminal wrongdoing,... reasonableness generally requires the obtaining of a judicial warrant.” … In the absence of a warrant, a search is reasonable only if it falls within a specific exception to the warrant requirement. …” 9

Riley v. California Reasonableness of a warrantless search incident to an arrest –“When an arrest is made, it is reasonable for the arresting officer to search the person arrested in order to remove any weapons that the latter might seek to use in order to resist arrest or effect his escape.... In addition, it is entirely reasonable for the arresting officer to search for and seize any evidence on the arrestee’s person in order to prevent its concealment or destruction. …” 10

Riley v. California Search incident to arrest limited to personal property immediately associated with the arrested person Issue of prevention of destruction of evidence v. remote wiping and encryption 11

Riley v. California “Our holding, of course, is not that the information on a cell phone is immune from search; it is instead that a warrant is generally required before such a search, even when a cell phone is seized incident to arrest.” Other case specific exceptions may apply 12

Clipper Chip Encryption where the US government has a key Standard not widely used… 13

Encryption as Protected Speech “[E]ncryption software, in its source code form and as employed by those in the field of cryptography, must be viewed as expressive for First Amendment purposes. …” “[T]he Court holds that the regulation of the plaintiff’s diskette is narrowly tailored to the goal of limiting the proliferation of cryptographic products and that the regulation is justified. …” 14

Video Surveillance “[I]f the government intercepts a communication consisting of video images (such as a transmission of a webcam image or an containing a video clip), then the Wiretap Act applies. If the government accesses an individual’s stored video clip, then the SCA applies. However, being watched by video surveillance (such as a surveillance camera) does not involve an interception or an accessing of stored images. The video surveillance must be silent video surveillance, or else it could be an “oral” communication subject to the Wiretap Act. In sum, silent video surveillance is not covered under federal electronic surveillance law.” 15

Criminal Enforcement and “In the criminal law context, the Stored Communications Act requires a warrant to obtain s stored at the ISP for 180 days or less. If the e- mails have been stored over 180 days, then the government can obtain them with a mere subpoena.” 16

United States v. Warshak Issue –Suspect ran a business the sold herbal supplement and filed false applications to banks –Suspect tried to exclude 27K private s from his commercial ISP 17

United States v. Warshak Gov’t obtaining content of s –180 days or less – only with a warrant –More than 180 days – warrant, subpoena, or under a court order 18

United States v. Warshak “[W]e hold that a subscriber enjoys a reasonable expectation of privacy in the contents of s “that are stored with, or sent or received through, a commercial ISP.” The government may not compel a commercial ISP to turn over the contents of a subscriber’s s without first obtaining a warrant based on probable cause. Therefore, because they did not obtain a warrant, the government agents violated the Fourth Amendment when they obtained the contents of Warshak’s s. Moreover, to the extent that the SCA purports to permit the government to obtain such s warrantlessly, the SCA is unconstitutional. …” 19

United States v. Warshak Are the s excluded? “Even though the government’s search of Warshak’s s violated the Fourth Amendment, the s are not subject to the exclusionary remedy if the officers relied in good faith on the SCA to obtain them.” 20

Keystroke Logging System Keystroke logging does not violate the Wiretap Act because only logged when not connected to the network 21

United States v. Hambrick Issue –Defendant seeks to suppress evidence obtained from ISP and from defendant’s home pursuant to a warrant –Warrant was invalid; should information that flowed from it be excluded? 22

United States v. Hambrick “The government may require that an ISP provide stored communications and transactional records only if (1) it obtains a warrant issued under the Federal Rules of Criminal Procedure or state equivalent, or (2) it gives prior notice to the online subscriber and then issues a subpoena or receives a court order authorizing disclosure of the information in question. … When an ISP discloses stored communications or transactional records to a government entity without the requisite authority, the aggrieved customer’s sole remedy is damages.” 23

United States v. Hambrick “To have any interest in privacy, there must be some exclusion of others. To have a reasonable expectation of privacy under the Supreme Court’s risk-analysis approach to the Fourth Amendment, two conditions must be met: (1) the data must not be knowingly exposed to others, and (2) the Internet service provider’s ability to access the data must not constitute a disclosure.” 24

United States v. Hambrick “[T]here is nothing in the record to suggest that there was a restrictive agreement between the defendant and MindSpring that would limit the right of MindSpring to reveal the defendant’s personal information to nongovernmental entities. Where such dissemination of information to nongovernment entities is not prohibited, there can be no reasonable expectation of privacy in that information.” 25

United States v. Hambrick “Under the ECPA, Internet Service Providers are civilly liable when they reveal subscriber information or the contents of stored communications to the government without first requiring a warrant, court order, or subpoena.” 26

Privacy in ISP Records “[A] person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” … When defendant entered into an agreement with [his ISP], he knowingly revealed all information connected to [his IP address]. He cannot now claim to have a Fourth Amendment privacy interest in his subscriber information.” 27

United States v. Forrester Issue –Court permission to install a pen register against a defendant for surveillance of and Internet activity –Warrant to use imaging and keystroke monitoring –Was surveillance a violation of the 4 th Amendment? 28

United States v. Forrester “We hold that the surveillance did not constitute a Fourth Amendment search and thus was not unconstitutional. We also hold that whether or not the computer surveillance was covered by the.. pen register statute … Alba is not entitled to the suppression of any evidence (let alone the reversal of his convictions) as a consequence.” 29

United States v. Forrester “[E]-mail and Internet users have no expectation of privacy in the to/from addresses of their messages or the IP addresses of the websites they visit because they should know that this information is provided to and used by Internet service providers for the specific purpose of directing the routing of information. … [E]-mail to/from addresses and IP addresses are not merely passively conveyed through third party equipment, but rather are voluntarily turned over in order to direct the third party’s servers.” 30

Education Privacy 31

A. SCHOOL SEARCHES AND SURVEILLANCE 32

New Jersey v. T.L.O. Issue –School caught student smoking in the bathroom –School searched the student’s purse and found marijuana and evidence of drug dealing –School turns over evidence to police –Student confesses –Delinquency charges filed against student’s mother 33

New Jersey v. T.L.O. Mother argues search violates 4 th amendment and wants all evidence suppressed Preliminary issue – Does the 4 th Amendment apply to searches conducted by school officials? –Answer - Yes 34

New Jersey v. T.L.O. 4 th Amendment governs activities of sovereign authorities –“We have held the Fourth Amendment applicable to the activities of civil as well as criminal authorities: building inspectors, Occupational Safety and Health Act inspectors, and even firemen entering privately owned premises to battle a fire, are all subject to the restraints imposed by the Fourth Amendment.” 35

New Jersey v. T.L.O. “Although the underlying command of the Fourth Amendment is always that searches and seizures be reasonable, what is reasonable depends on the context within which a search takes place. The determination of the standard of reasonableness governing any specific class of searches requires ‘balancing the need to search against the invasion which the search entails.’ On one side of the balance are arrayed the individual’s legitimate expectations of privacy and personal security; on the other, the government’s need for effective methods to deal with breaches of public order.” 36

New Jersey v. T.L.O. “We have also recognized that searches of closed items of personal luggage are intrusions on protected privacy interests, for ‘the Fourth Amendment provides protection to the owner of every container that conceals its contents from plain view.’ A search of a child’s person or of a closed purse or other bag carried on her person, no less than a similar search carried out on an adult, is undoubtedly a severe violation of subjective expectations of privacy.” 37

New Jersey v. T.L.O. “[S]choolchildren may find it necessary to carry with them a variety of legitimate, noncontraband items, and there is no reason to conclude that they have necessarily waived all rights to privacy in such items merely by bringing them onto school grounds.” 38

New Jersey v. T.L.O. “[S]chool officials need not obtain a warrant before searching a student who is under their authority. …. [T]he legality of a search of a student should depend simply on the reasonableness, under all the circumstances, of the search. Determining the reasonableness of any search involves a twofold inquiry: first, one must consider ‘whether the... action was justified at its inception’; second, one must determine whether the search as actually conducted ‘was reasonably related in scope to the circumstances which justified the interference in the first place.’” 39

Strip Searching Student suspected of having contraband was made to pull out bra and underwear Search violated 4 th amendment “[B]arring clear and direct evidence that a student is hiding contraband in her undergarments or barring any need to search to promote immediate safety, a strip search is improper.” 40

B. DRUG TESTING 41

Student Athletes “Somewhat like adults who choose to participate in a “closely regulated industry,” students who voluntarily participate in school athletics have reason to expect intrusions upon normal rights and privileges, including privacy. …” Vernonia School District v. Acton, 515 U.S. 646 (1995) 42

Board of Education v. Earls Issue –All middle and high school students consent to drug testing to participate in any extracurricular activity –Before, random, and upon suspicion –“The urinalysis tests are designed to detect only the use of illegal drugs, including amphetamines, marijuana, cocaine, opiates, and barbiturates, not medical conditions or the presence of authorized prescription medications…” –(J. 1003) –J., Solove, D., Scwartz, Paul. Information Privacy Law, 5th Edition. Aspen Publishers, 11/2014. VitalBook file. –The citation provided is a guideline. Please check each citation for accuracy before use. 43

Board of Education v. Earls “In Vernonia, this Court held that the suspicionless drug testing of athletes was constitutional. The Court, however, did not simply authorize all school drug testing, but rather conducted a fact-specific balancing of the intrusion on the children’s Fourth Amendment rights against the promotion of legitimate governmental interests. Applying the principles of Vernonia to the somewhat different facts of this case, we conclude that Tecumseh’s Policy is also constitutional…” 44

Board of Education v. Earls How are the test results used? “Given the minimally intrusive nature of the sample collection and the limited uses to which the test results are put, we conclude that the invasion of students’ privacy is not significant.” 45

C. SCHOOL RECORDS 46

The Family Education Rights and Privacy Act “The Family Educational Rights and Privacy Act … generally prohibits schools from releasing student ‘education records’ without the authorization of the student and/or parent. Schools may release such ‘directory’ information as names, addresses, dates of attendance, degrees earned, and activities unless the student and/or parent expressly indicates in writing that he or she wants it to remain confidential.” 47

What are Education Records? Directly related to a student and maintained by an education agency/institution Does not cover information per se 48

Whose Right? Right belongs to parent until the student is 18 and then the right belongs to the student In college, the right always belongs to the student 49

What Rights? 1)to review the student’s education records; 2)to correct any inaccuracies or misleading information in those records; 3)to control certain disclosures of the information in those records; 4)to file a complaint with the U.S. Department of Education in the event of a violation of the above rights 50

51 Program Completed All course materials - Copyright 2015 Randy L. Canis, Esq.