{"id":30966,"date":"2017-12-27T00:09:59","date_gmt":"2017-12-27T05:09:59","guid":{"rendered":"http:\/\/fourthamendment.com\/?p=30966"},"modified":"2017-12-27T06:48:56","modified_gmt":"2017-12-27T11:48:56","slug":"d-haw-authorized-third-partys-access-of-defs-security-video-from-cloud-not-unreasonable-nor-was-a-sw-require","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=30966","title":{"rendered":"D.Haw.: Authorized third party&#8217;s access of def&#8217;s security video from cloud not unreasonable nor was a SW required"},"content":{"rendered":"<p>\u201cThe evolution of technology gives rise, in this particular case, to the question of whether a third-party&#8217;s access to a defendant&#8217;s personal home surveillance system stored in the cloud (that is, where managed remotely and made available to users over the internet) requires law enforcement first to obtain a search warrant before accessing, downloading and copying the digital video content. Under the facts of this case, an authorized user accessed the account containing the video content and showed it to the police. Therefore a warrant was not required.\u201d United States v. Patrakis, 2017 U.S. Dist. LEXIS 211299 (D. Haw. Dec. 21, 2017).<\/p>\n<p>A LPN check showed that the vehicle operator\u2019s license was suspended, and that justified blocking its path. Because that was a custodial arrest situation, a search incident was proper.<br \/>\nUnited States v. Fullwood, 2017 U.S. Dist. LEXIS 210211 (W.D. N.C. Nov. 17, 2017).*<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cThe evolution of technology gives rise, in this particular case, to the question of whether a third-party&#8217;s access to a defendant&#8217;s personal home surveillance system stored in the cloud (that is, where managed remotely and made available to users over &hellip; <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=30966\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[76,79],"tags":[],"class_list":["post-30966","post","type-post","status-publish","format-standard","hentry","category-surveillance-technology","category-third-party-doctrine"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/30966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=30966"}],"version-history":[{"count":2,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/30966\/revisions"}],"predecessor-version":[{"id":30977,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/30966\/revisions\/30977"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=30966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=30966"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=30966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}