Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 20 - Third-Party Records and Data Mining

Similar presentations


Presentation on theme: "Chapter 20 - Third-Party Records and Data Mining"— Presentation transcript:

1 Chapter 20 - Third-Party Records and Data Mining
Part I

2 Smith v. Maryland Looking back at this case, what is the court really saying about a reasonable expectation of privacy? What does the court see within the ambit of a reasonable expectation of privacy? Is it really an original intent approach, i.e., is the court looking to what the founders through of as personally private? Has the Court always recognized a right of privacy beyond 4th amendment searches?

3 What would Jefferson have seen within the scope of privacy?
Letters? His personal dwelling? His dealings with his bank?

4 Does the Public's Expectation of Privacy Match the Court's?
If your employer can read it, can the government? Banking records? Transactions in general? Do you think the general public thinks their banking records are private? Their ? Their tweets? Why are transactions so valuable for intelligence? Should the use of encryption be seen as probable cause for the government to go after the contents of the communication?

5 Warshak v. U.S., 490 F.3d 455 (6th Cir.(Ohio) Jun 18, 2007)
Plaintiff seeks a declaratory judgment (facial challenge) that the provisions of the Stored Communications Act (SCA) allowing administrative subpoenas to his ISP for his s is unconstitutional. Plaintiff learned that s had been released to the government and sought declaratory judgment and an injunction on behalf of himself and all other users.

6 The Expectation of Privacy in Email
Why are analogies between ISPs and the post office misguided? Why is there no expectation of privacy in bank records? How does this court see as different from bank records? What about in the hands of a recipient?

7 The Nature of the Expectation
How much of this expectation of privacy is due to statutes? What if those changed? What if the court said they did not apply for national security investigations? Do you have an expectation of privacy if there are any exceptions?

8 The Contract with the ISP
Why does the contract with the ISP matter? What about on the employer's computer? What about on the University system? Does it matter whether the ISP really looks at the , or only has the right to? What about gmail - how is Google like the NSA when it comes to ?

9 Warshak v. U.S., 532 F.3d 521 (6th Cir.(Ohio) Jul 11, 2008)
The appeals court vacated the previous opinion It applied an Abbott Labs analysis and rejected the facial challenge to the SCA It found that the plaintiff had not made a proper showing under Abbott of imminent harm It found that he had two ways of attacking the subpoenas Motion to exclude evidence Bivens action Are these satisfactory?


Download ppt "Chapter 20 - Third-Party Records and Data Mining"

Similar presentations


Ads by Google