Defendant was employed by NYU, and he obtained a computer under a grant and encrypted the hard drive with multiple layers of protection. He took that computer home every night. NYU became suspicious of his handling of the grant and demanded to look at the computer. He handed it over but refused to give the passwords. NYU turned it over to the FBI which succeeded in getting into it. The NYU employee handbook and computer policy told everybody that NYU retains control over all computers the university owned. Defendant still had a reasonable expectation of privacy in the computer, but NYU’s third party consent was effective. United States v. Yudong Zhu, 2014 U.S. Dist. LEXIS 77208 (S.D. N.Y. May 27, 2014):
In this case, NYU’s computer policy does not weigh strongly toward a finding that Zhu lacked a reasonable expectation of privacy regarding a law enforcement search. The NYU Staff Handbook contained strong language warning staff of their lack of an expectation of privacy in their NYU-owned computers. Based on the Staff Handbook, “staff should have no expectation of privacy” in NYU computers (Delts Decl., Ex. A, at 4), and NYU reserved the right to search such computers at any time, without notice, even including computers used at home (Id.; id., Ex. A., at 17). Importantly, though, the Staff Handbook did not apply to Zhu, who was a member of the faculty, not the staff. (See id., Ex. A, at 4 (“The information in this handbook applies to all Medical Center employees, other than members of the Faculty ….”).)
Thus, the only NYU computer policy that applied to Zhu concerns the form he signed acknowledging that NYU had the right to “inspect the computers it owns, as well as personal PCs used for work, to ensure that its data and software are used according to its policies and procedures.” (Id., Ex. C.) Zhu’s authorization granted NYU only the right to search his computer; it did not contain a disclaimer of any expectation of privacy such as appeared in the Staff Handbook, and it did not state that NYU could inspect Zhu’s computer at any time, without notice. This is not the type of pervasive policy that could vitiate Zhu’s expectation of privacy vis-a-vis law enforcement. Cf. Angevine, 281 F.3d at 1134 (professor lacked a reasonable expectation of privacy where University maintained right to search work computers at any time, and computer users were notified by a “splash screen” each time they opened the computer that they had no expectation of privacy in any emails); Levanthal, 266 F.3d at 74 (finding defendant had a reasonable expectation of privacy from public employer search of his computer where employer neither “had a general practice of routinely conducting searches of office computers [n]or had placed [defendant] on notice that he should have no expectation of privacy in the contents of his office computer”); Simons, 206 F.3d at 398 (deciding that CIA employee lacked a reasonable expectation of privacy where the policy stated that the employer would monitor the internet usage of all employees, “including all file transfers, all websites visited, and all email messages, as deemed appropriate”).
B. ACTUAL AUTHORITY
While Zhu had a reasonable expectation of privacy in relation to the FBI’s search of his laptop, the Court is persuaded that the search here was performed with NYU’s valid, third-party consent. To find NYU’s consent to be valid, the Government must show first that NYU “had access to the area searched, ” and next that NYU had either “(a) common authority over the area, (b) a substantial interest in the area, or (c) permission to gain access to the area.” Davis, 967 F.2d at 87.
NYU had “access” to Zhu’s computer as required under Davis, based on the authorization Zhu signed acknowledging that NYU could inspect its own computers to ensure that “its data and software are being used according to its policies and procedures.” (Delts Decl., Ex. C.) This authorization granted NYU legal access to Zhu’s laptop, which was purchased with NIH funds granted to NYU and therefore property of NYU. (Carna Decl, at 4.) As Zhu correctly notes, “[c]ommon authority is not to be implied from the mere property interest a third party has in the property.” Matlock, 415 U.S. at 171 n.7. But while NYU’s property interest in the laptop was not sufficient on its own to grant it access to Zhu’s laptop, Zhu’s signed authorization permitted NYU to access the laptop in order to ensure that Zhu had not violated NYU’s policies and procedures.
by John Wesley Hall
Criminal Defense Lawyer and
Search and seizure law consultant
Little Rock, Arkansas
Contact: forhall @ aol.com / The Book www.johnwesleyhall.com
"If it was easy, everybody would be doing it. It isn't, and they don't." —Me
"Life is not a matter of holding good cards, but of playing a poor hand well." –Josh Billings (pseudonym of Henry Wheeler Shaw), Josh Billings on Ice, and Other Things (1868) (erroneously attributed to Robert Louis Stevenson, among others)
“I am still learning.” —Domenico Giuntalodi (but misattributed to Michelangelo Buonarroti (common phrase throughout 1500's)).
"Love work; hate mastery over others; and avoid intimacy with the government."
—Shemaya, in the Thalmud
"It is a pleasant world we live in, sir, a very pleasant world. There are bad people in it, Mr. Richard, but if there were no bad people, there would be no good lawyers."
—Charles Dickens, “The Old Curiosity Shop ... With a Frontispiece. From a Painting by Geo. Cattermole, Etc.” 255 (1848)
"A system of law that not only makes certain conduct criminal, but also lays down rules for the conduct of the authorities, often becomes complex in its application to individual cases, and will from time to time produce imperfect results, especially if one's attention is confined to the particular case at bar. Some criminals do go free because of the necessity of keeping government and its servants in their place. That is one of the costs of having and enforcing a Bill of Rights. This country is built on the assumption that the cost is worth paying, and that in the long run we are all both freer and safer if the Constitution is strictly enforced."
—Williams
v. Nix, 700 F. 2d 1164, 1173 (8th Cir. 1983) (Richard Sheppard Arnold,
J.), rev'd Nix v. Williams, 467 US. 431 (1984).
"The criminal goes free, if he must, but it is the law that sets him free. Nothing can destroy a government more quickly than its failure to observe its own laws,
or worse, its disregard of the charter of its own existence." —Mapp
v. Ohio, 367 U.S. 643, 659 (1961).
"Any costs the exclusionary rule are costs imposed directly by the Fourth Amendment."
—Yale Kamisar, 86 Mich.L.Rev. 1, 36 n. 151 (1987).
"There have been powerful hydraulic pressures throughout our history that
bear heavily on the Court to water down constitutional guarantees and give the
police the upper hand. That hydraulic pressure has probably never been greater
than it is today."
— Terry
v. Ohio, 392 U.S. 1, 39 (1968) (Douglas, J., dissenting).
"The great end, for which men entered into society, was to secure their
property."
—Entick
v. Carrington, 19 How.St.Tr. 1029, 1066, 95 Eng. Rep. 807 (C.P. 1765)
"It is a fair summary of history to say that the safeguards of liberty have
frequently been forged in controversies involving not very nice people. And
so, while we are concerned here with a shabby defrauder, we must deal with his
case in the context of what are really the great themes expressed by the Fourth
Amendment."
—United
States v. Rabinowitz, 339 U.S. 56, 69 (1950) (Frankfurter, J., dissenting)
"The course of true law pertaining to searches and seizures, as enunciated
here, has not–to put it mildly–run smooth."
—Chapman
v. United States, 365 U.S. 610, 618 (1961) (Frankfurter, J., concurring).
"A search is a search, even if it happens to disclose nothing but the
bottom of a turntable."
—Arizona
v. Hicks, 480 U.S. 321, 325 (1987)
"For the Fourth Amendment protects people, not places. What a person knowingly
exposes to the public, even in his own home or office, is not a subject of Fourth
Amendment protection. ... But what he seeks to preserve as private, even in
an area accessible to the public, may be constitutionally protected."
—Katz
v. United States, 389 U.S. 347, 351 (1967)
“Experience should teach us to be most on guard to
protect liberty when the Government’s purposes are beneficent. Men born
to freedom are naturally alert to repel invasion of their liberty by evil-minded
rulers. The greatest dangers to liberty lurk in insidious encroachment by men
of zeal, well-meaning but without understanding.”
—United
States v. Olmstead, 277 U.S. 438, 479 (1925) (Brandeis, J., dissenting)
“Liberty—the freedom from unwarranted
intrusion by government—is as easily lost through insistent nibbles by
government officials who seek to do their jobs too well as by those whose purpose
it is to oppress; the piranha can be as deadly as the shark.”
—United
States v. $124,570, 873 F.2d 1240, 1246 (9th Cir. 1989)
"You can't always get what you want /
But if you try sometimes / You just might find / You get what you need."
—Mick Jagger & Keith Richards
"In Germany, they first came for the communists,
and I didn't speak up because I wasn't a communist. Then they came for the Jews,
and I didn't speak up because I wasn't a Jew. Then they came for the trade unionists,
and I didn't speak up because I wasn't a trade unionist. Then they came for
the Catholics and I didn't speak up because I wasn't a Catholic. Then they came
for me–and by that time there was nobody left to speak up."
—Martin Niemöller (1945) [he served seven years in a concentration
camp]
“You know, most men would get discouraged by
now. Fortunately for you, I am not most men!”
---Pepé Le Pew
"The point of the Fourth Amendment, which often is not grasped by zealous officers,
is not that it denies law enforcement the support of the usual inferences which
reasonable men draw from evidence. Its protection consists in requiring that
those inferences be drawn by a neutral and detached magistrate instead of being
judged by the officer engaged in the often competitive enterprise of ferreting
out crime."
—Johnson
v. United States, 333 U.S. 10, 13-14 (1948)