Expectation of privacy

Expectation of privacy is a legal test which is crucial in defining the scope of the applicability of the privacy protections of the Fourth Amendment to the United States Constitution. It is related to, but is not the same as, a right to privacy, a much broader concept which is found in many legal systems (see privacy law).

Overview

There are two types of expectations of privacy:

Examples of places where a person has a reasonable expectation of privacy are a person's residence or hotel room[1] and public places which have been specifically provided by businesses or the public sector in order to ensure privacy, such as public restrooms, private portions of jailhouses,[2] or a phone booth.[3]

In general, one cannot have a reasonable expectation of privacy in things held out to the public. A well-known example is that there are no privacy rights in garbage left for collection in a public place.[2] Other examples include: pen registers that record the numbers dialed from particular telephones;[4] conversations with others, though there could be a Sixth Amendment violation if the police send an individual to question a defendant who has already been formally charged;[5] a person's physical characteristics, such as voice and handwriting;[6] what is observed pursuant to aerial surveillance that is conducted in public navigable airspace not using equipment that unreasonably enhances the surveying government official's vision;[7][8] anything in open fields (e.g., a barn);[9] smells that can be detected by the use of a drug-sniffing dog during a routine traffic stop, even if the government official did not have probable cause or reasonable suspicion to suspect that drugs were present in the defendant's vehicle;[10] and paint scrapings on the outside of a vehicle.[11]

While a person may have a subjective expectation of privacy in his/her car, it is not always an objective one, unlike a person's home.[12]

This article discusses expectation of privacy in cyberspace and some of the implications with the Fourth Amendment of the US Constitution. It also takes a look at the Canadian Supreme Court and its stance on reasonable expectations of privacy. There are also some concerns as to online bullying and sex solicitation from online entities that can create difficulties in conversing about expectation of privacy in the cyberspace. This article covers legal cases such as Florida v. Jardines, Missouri v. McNeely, and R. v. Tesslign that have pushed the understanding of expectation of privacy within the court of law.

The expectation of privacy is crucial to distinguishing a legitimate, reasonable police search and seizure from an unreasonable one.

A "search" occurs for purposes of the Fourth Amendment when the Government violates a person's "reasonable expectation of privacy."[13] In Katz v. United States, 389 U.S. 347 (1967) Justice Harlan issued a concurring opinion articulating the two-prong test later adopted by the U.S. Supreme Court as the test for determining whether a police or government search is subject to the limitations of the Fourth Amendment:

To meet the first part of the test, the person from whom the information was obtained must demonstrate that they, in fact, had an actual, subjective expectation that the evidence obtained would not be available to the public. In other words, the person asserting that a search was conducted must show that they kept the evidence in a manner designed to ensure its privacy.

The first part of the test is related to the notion "in plain view". If a person did not undertake reasonable efforts to conceal something from a casual observer (as opposed to a snoop), then no subjective expectation of privacy is assumed.[14]

The second part of the test is analyzed objectively: would society at large deem a person's expectation of privacy to be reasonable? If it is plain that a person did not keep the evidence at issue in a private place, then no search is required to uncover the evidence. For example, there is generally no search when police officers look through garbage because a reasonable person would not expect that items placed in the garbage would necessarily remain private.[15] An individual has no legitimate expectation of privacy in information provided to third parties. In Smith v. Maryland, 442 U.S. 735 (1979), the Supreme Court held individuals have no "legitimate expectation of privacy" regarding the telephone numbers they dial because they knowingly give that information to telephone companies when they dial a number.[16] Therefore, there is no search where officers monitor what phone numbers an individual dials,[17] although the Congress has enacted laws that restrict such monitoring. The Supreme Court has also ruled that there is no objectively reasonable expectation of privacy (and thus no search) when officers hovering in a helicopter 400 feet above a suspect's house conduct surveillance.[18] The U.S. Court of Appeals for the Sixth Circuit held in 2010 that users did have a reasonable expectation of privacy in the contents of their e-mail in United States v. Warshak, although no other court of appeals has followed suit.[19]

In cyberspace

An article by İlker and ÖKTEM (2012) entitled "Expectation of Privacy in Cyberspace: The Fourth Amendment of the US Constitution and an Evaluation of the Turkish Case" starts by giving us operational definitions of concepts of privacy, expectation of privacy, and cyberspace. In providing these definitions, the authors were able to then present what kind of cyberspace they will be addressing and subsequently what time of legality they will talk about to address in an online setting. These definitions served to have a better understating of how they all work together. The authors identify that there needs to be policy to address privacy in the cyberspace. The article evaluates the extent of the law and how it can protect people's expectations of privacy within the cyber environment. The article talks about privacy expectations in cyberspace while discussing the Fourth Amendment of the United States constitution. The Fourth Amendment provides citizens of the United States with security of themselves, their house, and from unreasonable searches and seizures. If these are violated, there are reasonable sanctions for the violating party.[20]

However, the article points out that the Fourth Amendment does not protect individuals from informational privacy. It has been established that since the government can seize any item they would then be able to have access to information if it is needed. The article focuses and tells us that the Fourth Amendment and how it applies to decrypting an internet communication and how it cannot trespass the reasonable expectation of privacy. In other words, this type of communication cannot violate the Fourth Amendment rights. Finally, the article presents the state of privacy during the time it was written and compares to the privacy in the Turkish judicial systems. The authors take particular notice to how there needs to be a strong political desire to secure privacy issues in society specifically in cyberspace.[20]

The Canadian Supreme Court has a stance on reasonable expectations of privacy. Steeves (2008) introduce the idea that we need pay attention to privacy expectation can be a protecting factor for personal information by itself.[21] Steeves (2008) indicates that young individual in particular have adapted the internet into their social life. Having this online communication, individual feel and recognize a freedom socially and physically.[21] Furthermore, Steeves (2008) argues that some practices by the court are not efficient in implementing with certain population and it will not address individual experiences. These practices could potentially hinder the court's ability to secure individuals from surveillance technology.

This technology could at times have affected individual's:

This is especially important if we pay attention to how our lives have transitioned into a more virtual space. It is important for the court systems to give attention to the understanding of social science and their research on privacy. This new understanding can provide with more competent in addressing privacy as an important social value.[21]

Considering new technology

An article by Nair (2006) presents concerns with online bullying and sex solicitation from online entities. Nair (2006) argues that these new additions of cyberspace might create layers of difficulties and could change the expectations of freedom and privacy in helping kids stay safe from dangerous content. While there are many benefits of having access to the internet, Nair (2006) presents the argument that there needs to be measures to help prevent abuse and promote a safer environment for kids.[22]

Court cases

In Florida v. Jardines the U.S. Supreme Court ruled on March 26, 2013, that police violated the Fourth Amendment rights of a homeowner when they led a drug-sniffing dog to the front door of a house suspected of being used to grow marijuana.

In a 5-to-4 decision, the court said that police conducted a "search" when they entered the property and took the dog to the house's front porch. Since the officers had not first obtained a warrant beforehand, their search was unconstitutional, the court said. The court said the police officers violated a basic rule of the Fourth Amendment by physically intruding into the area surrounding a private home for investigative purposes without securing a warrant.

"When it comes to the Fourth Amendment, the home is first among equals," Justice Scalia wrote. "At the amendment's very core stands the right of a man to retreat into his own home and there be free from unreasonable government intrusion." Scalia added: "This right would be of little practical value if the state's agents could stand in a home's porch or side garden and trawl for evidence with impunity."

This case may provide some argument or protection in the area of reasonable expectation of privacy in one's home and curtilage given the rapid advancement of drone technology, particularly given law enforcements' stated intent to deploy these technologies. This question may well turn on the court's interpretation of the "naked eye" test (described in the earlier Ciraolo case) in relation to the "enhanced view" test. It would seem enhanced view(s) are achievable through the use of drone technology. See also: Kyllo v. United States, 533 U.S. 27 (2001) (precludes enhanced views from outside a home without a warrant, using thermal imaging).

In Missouri v. McNeely on April 17, 2013, The U.S. Supreme Court ruled that police must generally obtain a warrant before subjecting a drunken-driving suspect to a blood test. The vote was 8-to-1, with Justice Clarence Thomas the lone dissenter.

The legal case of R. v. Tesslign the Supreme Court of Canada identified that the defendant did not have a reasonable expectation of privacy with regards to the information policemen acquired from him. These officers got this information by using warrantless infrared imaging to monitor the respondent's home. The court tried to answer the questions of what can be expected to be covered by reasonable expectation of privacy. They specify that information that is covered under reasonable expectation of privacy is called "deeply personal information." Matheson (2008) offers the view that deeply personal information can be related to sensitivity.[23] One common functional use to describe privacy and personal information is a matter of control. This type of information is to be treated within the choice of the individual that holds the information. However, the difference between deeply personal information and other information is that this particular type of information tends to be related to how vulnerable and sensitive an individual is to the exposure of said information. Matheson (2008) tells us that it is particularly deemed deeply personal information if the personal information would weaken the individual's account or personal story about himself or others if shared. Matheson (2008) states that while questionable the Canadian Court's decision was partly right because the defendant did not have a reasonable expectation of privacy when it came to the warrantless infrared search.[23]

In marketing

Privacy has also been talked about in the context of business actions, consumer reaction, and regulatory efforts both consumers and marketers' interaction. Milne and Shalini (2010) presented the question of how both of these groups start and upkeep privacy boundaries. Information about the relationship between consumers and marketers has been defined by this fine line of what is the privacy a customer is willing to provide to the marketer.[24] Milne and Shalini (2010) used information gathered in a national online survey to compare three different groups of customers.[24] They asked these groups questions around the limits of using information technology such as the use of cookies, biometrics, loyalty cards, radio frequency identification, text messaging, pop-up advertisements, telemarketing, and last but not least spam. The authors use these same surveys with groups of marketing managers and database vendors. This survey study presented results that provided discussion as there was a discrepancy in the answers from the customers and the marketers/venders. The customers' expectations around privacy were different from those of a marketer/vender. The difference in their answers prompted the Milne and Shalini (2010) to advise for attention to this issue and asked for public policy to take notice of these findings.[24]

See also

References

  1. Do Not Disturb: Fourth Amendment Expectations of Privacy in Hotel Rooms, Medical examination rooms, Social Science Research Network (2010)
  2. 1 2 "The Criminal Law Handbook: Know Your Rights, Survive the System" (2007), ISBN 1-4133-0704-3, pp. 38, 62
  3. Katz v. U.S., 389 U.S. 347, 361 (1967).
  4. Smith v. Maryland, 442 U.S. 735 (1979).
  5. Massiah v. United States, 377 U.S. 201 (1964).
  6. U.S. v. Dionisio, 410 U.S. 1 (1973).
  7. California v. Ciraolo, 476 U.S. 207 (1986).
  8. Dow Chemical v. United States, 476 U.S. 227 (1986).
  9. Oliver v. United States 466 U.S. 170 (1984)
  10. Illinois v. Caballes, 543 U.S. 405 (2005).
  11. Cardwell v. Lewis, 417 U.S. 583 (1974).
  12. The Criminal Law Handbook, p. 62
  13. Katz v. United States, 389 U.S. 347, 351 (1967); at. 360-61 (Harlan, J., concurring)
  14. Mark Tunick (1998) "Practices and Principles: Approaches to Ethical and Legal Judgment", ISBN 0-691-07079-2 pp.163-166
  15. California v. Greenwood, 486 U.S. 35 (1988).
  16. Smith v. Maryland, 442 U.S. 735 (1979), at 742.
  17. Smith v. Maryland, 442 U.S. 735 (1979)
  18. Florida v. Riley, 488 U.S. 445 (1989).
  19. United States v. Warshak, 631 F.3d 266 (6th Cir. 2010).
  20. 1 2 "Expectation of Privacy in Cyberspace: The Fourth Amendment of the US Constitution and an Evaluation of the Turkish Case". Sosyoekonomi. 18.
  21. 1 2 3 "If the Supreme Court Were on Facebook: Evaluating the Reasonable Expectation of Privacy Test from a Social Perspective". Canadian Journal Of Criminology & Criminal Justice. 50. doi:10.3138/cjccj.50.3.331.
  22. Nair, Abhilash (2006-03-01). "Mobile phones and the internet: Legal issues in the protection of children". International Review of Law, Computers & Technology. 20 (1-2): 177–185. ISSN 1360-0869. doi:10.1080/13600860600579779.
  23. 1 2 "Deeply Personal Information and the Reasonable Expectation of Privacy in Tessling.". Canadian Journal of Criminology & Criminal Justice. 50. doi:10.3138/cjccj.50.3.349.
  24. 1 2 3 Milne,, George R.; Bahl, Shalini (2013-05-29). "Are There Differences Between Consumers' and Marketers' Privacy Expectations? A Segment- and Technology-Level Analysis". AMA Journals. doi:10.1509/jppm.29.1.138.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.