Вы находитесь на странице: 1из 3

THE BE

ING

NC
SER

8H
AND

88
BA 1
R SINCE
Web address: http://www.nylj.com

VOLUME 236—NO. 89 TUESDAY, NOVEMBER 7, 2006

WHITE-COLLAR CRIME
BY ELKAN ABRAMOWITZ AND BARRY A. BOHRER

The Fourth Amendment in the Age of the Computers

A
fter two centuries of Fourth the government in its investigation, two
Amendment jurisprudence, the Frontline IT employees entered Mr. Ziegler’s
rules applicable to government private office one evening and made two
searches of offices, homes, copies of his computer’s hard drive, which
and motor vehicles are by now reasonably were turned over to the government.4
clear. Much less certain, however, are the Mr. Ziegler was indicted with receipt and
standards that govern searches and seizures possession of child pornography and receipt of
of computers. obscene material. He filed a pretrial motion
Computer searches are occurring with Elkan Abramowitz Barry A. Bohrer seeking suppression of evidence obtained
greater frequency in a wide range of cases. from his computer’s hard drive. The district
As stated by Justice John Paul Stevens, storage media. The first case addresses this court denied his motion, and Mr. Ziegler
“[i]t would be foolish to contend that the in the context of an employment situation, entered into a conditional plea agreement
degree of privacy secured to citizens by defining the nature of an employee’s privacy allowing him to appeal the district court’s
the Fourth Amendment has been entirely interest in his office computer and raising decision. On appeal, Mr. Ziegler contended
unaffected by the advance of technology.”1 a question as to whether there remains a that the search of his workplace computer
Although much has been written regarding distinction between private and public violated the Fourth Amendment.
these questions and how traditional rules of employees. The second case concerns the In opposition, the government argued
criminal procedure should be applied,2 the government’s ability to seize and search— that Mr. Ziegler did not have a reasonable
Supreme Court has offered no guidance on as opposed to search, and then seize— expectation of privacy in his computer. To
the subject. computerized information. succeed on his Fourth Amendment claim,
Two recent opinions from the U.S. Court These cases provide examples the court noted that Mr. Ziegler had to
of Appeals for the Ninth Circuit demonstrate demonstrating that careful analysis of establish both that he had a subjective
the uncertain and developing nature of this current Fourth Amendment law is required expectation of privacy and that he had
area of law. Both cases address an individual’s in technology cases to ensure its appropriate an objectively reasonable expectation of
privacy right with respect to information application and to avoid erosion of the privacy. Because Mr. Ziegler used a private
maintained on computers and related protections against unreasonable search password on his computer and a lock on his
and seizure. office door, there was no contention that
he did not have subjective expectation
Elkan Abramowitz is a member of ‘United States v. Ziegler’ of privacy. Rather, the court focused on
Morvillo, Abramowitz, Grand, Iason, whether his expectation of privacy also was
Anello & Bohrer. He is a former chief In United States v. Ziegler, the court objectively reasonable.
of the criminal division in the U.S. examined the nature of an employee’s In answering this question, the court relied
Attorney’s Office for the Southern District Fourth Amendment rights to materials on a U.S. Court of Appeals for the Fourth
of New York. Barry A. Bohrer also saved on the computer in his private office.3 Circuit decision, United States v. Simons.
is a member of Morvillo Abramowitz and Mr. Ziegler was an employee of Frontline The Simons court held that “an employer’s
was formerly chief appellate attorney and Processing (Frontline), a company that Internet-usage policy—which required that
chief of the major crimes unit in the U.S. processed on-line electronic payments for employees use the Internet only for official
Attorney’s Office for the Southern District Internet merchants. After discovering that business and informed employees that the
of New York. Gretchan R. Ohlig, Mr. Ziegler had accessed child pornography employer would ‘conduct electronic audits
an attorney, assisted in the preparation of Web sites from his work computer, his to ensure compliance,’ including the use
this article. employer contacted the FBI. Assisting of a firewall—defeated any expectation
NEW YORK LAW JOURNAL TUESDAY, NOVEMBER 7, 2006

of privacy in ‘the record or fruits of [one’s] In its initial decision, the Ninth Circuit Perhaps the government has failed to
Internet use.’”5 The government argued that panel specifically relied on Simons and recognize that the Supreme Court has
the Ziegler situation was factually similar another Supreme Court case, O’Connor issued different localized rules for Fourth
to that of Simons because Frontline had: v. Ortega, both of which involved searches Amendment rights in the public versus
(i) complete administrative access to its of the workspace of government employees. private employment context, however.13
employees’ computers; (ii) installed a firewall In Ortega, the Supreme Court found that a Resolution of the issue within the context
to regularly monitor Internet traffic; and (iii) public employee’s expectation of privacy in of the Ziegler case depends on whether the
informed its employees through training and his workspace could be reduced “by virtue Ninth Circuit agrees to reconsider the
employment manuals that the computers of actual office practices and procedures, or case. It is almost certain, though, that the
were not to be used for personal activities. by legitimate regulation…,” such as those issue will arise again. Fourth Amendment
Mr. Ziegler did not contradict any of workplace monitoring policies in effect in scholars have sided with Mr. Ziegler in this
these assertions. both the Simons and Ziegler cases.9 This dispute, arguing that the correct way to
position differed from that articulated by analyze the case is to determine that Mr.
Routine Monitoring the Supreme Court in Mancusi, which held Ziegler had a reasonable expectation of
that a private employee had a reasonable privacy in the contents of his private-sector
Setting forth a number of cases in which expectation of privacy in his office space and office and turn to the issue of whether the
courts have examined the issue of searches of the contents therein, despite the fact that search violated the Fourth Amendment.
workplace computers, the Ninth Circuit stated he shared the office with other employees.10 The “unfortunate result” of the decision
that case law consistently established that Indeed, Justice Antonin Scalia’s concurring as it currently stands is the “incorrect
“an employer’s policy of routine monitoring conclusion that private-sector employees
is among the factors that may preclude an xxxxxxxxxxxxxx do not have a reasonable expectation of
objectively reasonable expectation of privacy.” The government disputes privacy in the workplace computers in their
Further finding that society had effectively the notion that there office when the employer has access rights
diminished an employee’s reasonable is a public/private to the machine.”14
expectation of privacy with regard to the distinction, stating that
employee’s use of his employer’s computers, “[t]he key factors—the
the court held that Mr. Ziegler had no policies and practices of ‘United States v. Hill’
objectively reasonable expectation of privacy the employer, and the
in his workplace computer. Since he had no In United States v. Hill, the court examined
reasonable expectation of privacy, the Fourth
reasonable expectations the question of the extent to which the
Amendment was not implicated; accordingly, of the employees—are the government is permitted to seize and search
the district court’s decision was affirmed.6 same for both private and personal computers and computer storage
Last month, Mr. Ziegler petitioned the government employees.” media. The court determined that where the
xxxxxxxxxxxxxx
Ninth Circuit for an en banc rehearing on government needs to remove the equipment
the matter, arguing that the circuit court’s offsite to complete the search, the affidavit
earlier decision conflicted with the Supreme opinion in Ortega specifically notes the supporting the warrant for such equipment
Court’s decision in Mancusi v. DeForte.7 private/public distinction by recognizing must detail the reasons for such removal.15
Specifically, the defendant contends that the that a private sector employee’s workspace In Hill , the defendant was indicted
court failed to recognize a well-established is “constitutionally protected” despite his for possession of child pornography
distinction between the types of Fourth employer’s internal regulations.11 after a computer technician repairing
Amendment protection accorded public In its response to Mr. Ziegler’s petition the defendant’s computer discovered
employees versus those who work in the for rehearing, the government disputes pornographic photographs on his hard
private sector, as he did. the notion that there is a public/private drive and reported him to the police. There
The distinction can be articulated as distinction, stating that “[t]he key factors— were two warrants involved in the seizure
follows: private employees have Fourth the policies and practices of the employer, of Mr. Hill’s computer data. First, the
Amendment protection in the contents and the reasonable expectations of the local police obtained a warrant to search
of their offices, regardless of their employees—are the same for both private the computer repair store and seize the
employer’s office procedures, whereas and government employees.” Further, defendant’s computer and all storage media
public employees’ protections hinge on the the government contends that the panel belonging to him. However, when the
degree to which the employee’s workspace correctly applied the “reasonable expectation police arrived to execute the warrant, Mr.
is publicly available. One commentator of privacy” test in determining whether Hill had already picked up his computer.
notes that this distinction suggests that the the Fourth Amendment was implicated Accordingly, they obtained a second
government cannot enter an employee’s by Frontline’s copying of Mr. Ziegler’s warrant to search the defendant’s home,
workspace in a private office without the hard drive. Arguing that no legitimate authorizing seizure of the same items.
employer’s consent, while the same rules expectation existed, the government In executing the second warrant, the police
do not apply in the public sector because asserts that no “search” occurred under the were unable to find Mr. Hill’s computer, but
the government is the employer.8 Fourth Amendment.12 seized floppy disks, CD-ROMS and zip disks
NEW YORK LAW JOURNAL TUESDAY, NOVEMBER 7, 2006

from his home. The pornographic pictures [I]f agents expect that they may need
Conclusion
in issue were obtained from the zip disks to seize a personal computer and
when they were reviewed by the police in search it off-site to recover the relevant These cases demonstrate that the
their laboratory. The defendant sought to evidence, the affidavit [accompanying application of traditional Fourth Amendment
suppress this evidence in the district court the warrant application] should rules to the seizure and use of digitized
arguing, among other things, that the warrant explain this expectation and its basis evidence can potentially result in less than
was overbroad in allowing seizure of all to the magistrate judge. The affidavit satisfactory conclusions of law. Practitioners
discovered computer storage media with no should inform the court of the practical should be aware of the nuances of what was
regard to whether such media contained child limitations of conducting an on-site previously viewed as hornbook law and press
pornography and in placing no limitation on search, and should articulate the plan for legal considerations that recognize the
the police officers’ search of the seized media. to remove the entire computer from the unique circumstances created by new and
The district court denied the suppression site if it becomes necessary.17 evolving technologies.
motion, and Mr. Hill entered a conditional Effectively transforming these ••••••••••••• ••••••••••••••••
guilty plea, reserving the right to appeal the recommendations into a constitutional 1. Kyllo v. United States, 533 US 27, 33-34 (2001) (Stevens,
evidentiary ruling. requirement, the court found that the J., dissenting).
Considering Mr. Hill’s appeal, the Ninth warrant executed in the defendant’s 2. See, e.g., Orin S. Kerr, “Searches and Seizures in a Digital
World,” Harvard Law Review, Vol. 119 (2005) at fn. 1 (listing
Circuit found that there was sufficient probable home lacked the requisite explanation various law review articles); Orin S. Kerr, “Digital Evidence
cause to support the search warrant and turned and therefore was overbroad. and the New Criminal Procedure,” Columbia Law Review,
to the question of whether the warrant was Despite finding that the warrant was Vol. 105 (January 2005).
3. 456 F3d 1138 (9th Cir. 2006).
overbroad. Mr. Hill asserted that the warrant overbroad, the court did not believe that
4. There is some factual dispute as to whether Frontline
was overbroad because it authorized the officers suppression was the appropriate remedy in took these actions at the FBI agent’s request or on their own
to seize and remove equipment without first this case. Rather, because the zip disks had accord. The resolution of this issue had no bearing on the 9th
Circuit’s holding. Id. at 1140-41.
determining whether they actually contained been “seized and retained lawfully because
5. Id. at 1143-44 (citing Simons, 206 F3d 392, 395, 398
child pornography. The court noted that the described in and therefore taken pursuant (4th Cir. 2000)).
defendant had raised an important question to a valid search warrant” and because 6. Id. at 1145.
regarding the execution of warrants seeking the officers were properly motivated “by 7. Defendant-Appellant’s Petition for Rehearing
and Suggestion for Rehearing En Banc, No. 05-30177
computerized evidence—one that typically considerations of practicality rather than (Sept. 1, 2006).
does not arise with respect to other personal by a desire to engage in indiscriminate 8. Orin Kerr, “Ninth Circuit Mostly Eliminates Private-
effects that constitute contraband or evidence ‘fishing,’” the court determined that Sector Workplace Privacy Rights in Computers,” The Volokh
Conspiracy Blog (Aug. 9, 2006) (available at http://volokh.
of criminal activity. suppression of the fruits of the overbroad com/posts/chain_1157474085.shtml).
Although the court concurred with the search was not necessary.18 9. 480 US 709 (1987).
district court’s reasoning that the warrant In deciding not to suppress evidence found 10. 392 US 364 (1968).
11. Id. at 730 (Scalia, concurring).
was not fatally defective in failing to on the zip disks, it appears that the court 12. Appellee’s Response to Petition for Rehearing and
require an onsite search and isolation of was applying a “flagrant disregard standard,” Rehearing En Banc, No. 05-30177 (Oct. 5, 2006).
child pornography before removing the under which “the court will only suppress 13. Orin Kerr, “Government Responds in ‘United States v.
Ziegler,’” The Volokh Conspiracy Blog (Oct. 9, 2006).
equipment, it stated that the government evidence within the scope of a facially 14. Orin Kerr, “Ninth Circuit Mostly Eliminates Private-
should not be given an “automatic blank proper warrant if the warrant was executed Sector Workplace Privacy Rights in Computers,” The Volokh
check when seeking or executing warrants in flagrant disregard of its terms.”19 But the Conspiracy Blog (Aug. 9, 2006) (available at http://volokh.
com/posts/chain_1157474085.shtml).
in computer-related searches.” Rather, the application of this standard may create a
15. 459 F3d 966 (9th Cir. 2006).
government is required to demonstrate to “right without a remedy.” As stated, the 16. Id. at 975.
the magistrate factually why such a search is rule is that warrants seeking to seize, remove 17. United States Department of Justice, Searching and
Seizing Computers and Obtaining Electronic Evidence in
necessary— “there must be some threshold and then search computers and computer
Criminal Investigations 43, 69 (July 2002) (available at http://
showing before the government may ‘seize storage devices must be accompanied by an www.cybercrime.gov/s&smanual2002.htm).
the haystack to look for the needle.’”16 explanation. However, the typical Fourth 18. 459 F3d at 977 (citing United States v. Tamura, 694 F.2d
Accordingly, warrants authorizing blanket Amendment remedy of suppression will 591 (9th Cir. 1982)).
19. Orin Kerr, “‘United States v. Hill,’” OrinKerr.Com
removal of computer equipment for later not be available where a warrant lacks Blog (Aug. 11, 2006) (available at http://www.orinkerr.
examination must be supported by an the required explanation unless there has com/2006/08/11/united-states-v-hill/).
affidavit from the government giving been a flagrant disregard for the terms of 20. Id.

a reasonable explanation as to why a the warrant.20 Given that it is difficult to


wholesale seizure is necessary. prove such a level of disregard, it is unlikely This article is reprinted with permission from the
In setting forth its rationale, the court that insufficient affidavits will result in the November 7, 2006 edition of the NEW YORK LAW
cited a Department of Justice manual suppression of evidence. Such an outcome JOURNAL. © 2006 ALM Properties, Inc. All rights
reserved. Further duplication without permission is
on “Searching and Seizing Computers will do little in providing an incentive to
prohibited. For information, contact ALM Reprint
and Obtaining Electronic Evidence in searching agents in complying with the Department at 800-888-8300 x6111 or visit
Criminal Investigations”: government’s own standards. almreprints.com. #070-11-06-0007

Вам также может понравиться