{"id":4991,"date":"2011-03-08T22:09:21","date_gmt":"2010-12-15T00:02:33","guid":{"rendered":""},"modified":"-0001-11-30T00:00:00","modified_gmt":"2010-12-14T21:43:59","slug":"en-US","status":"publish","type":"post","link":"http:\/\/fourthamendment.com\/?p=4991","title":{"rendered":"CA6: E-mail has Fourth Amendment protection"},"content":{"rendered":"<p>In the Smilin&#8217; Bob Enzyte case from the Sixth Circuit, <a href=\"https:\/\/www.eff.org\/files\/warshak_opinion_121410.pdf\">United States v. Washak<\/a>, 631 F.3d 266 (6th Cir. 2010), the Court held that emails have Fourth Amendment protection. First, a summary of the holding: <\/p>\n<blockquote><p>(1) Warshak enjoyed a reasonable expectation of privacy in his emails vis-a-vis NuVox, his Internet Service Provider. See <a href=\"http:\/\/scholar.google.com\/scholar_case?case=9210492700696416594&amp;q=place&amp;hl=en&amp;as_sdt=1002\">Katz v. United States<\/a>, 389 U.S. 347 (1967). Thus, government agents violated his Fourth Amendment rights by compelling NuVox to turn over the emails without first obtaining a warrant based on probable cause. However, because the agents relied in good faith on provisions of the Stored Communications Act, the exclusionary rule does not apply in this instance. See <a href=\"http:\/\/scholar.google.com\/scholar_case?case=7047825201890663839&amp;q=illinois%2Bv.%2Bkrull&amp;hl=en&amp;as_sdt=1002\">Illinois v. Krull<\/a>, 480 U.S. 340 (1987).<\/p><\/blockquote>\n<p>From the opinion:<\/p>\n<blockquote><p>Turning first to the subjective component of the test, we find that Warshak plainly manifested an expectation that his emails would be shielded from outside scrutiny. As he notes in his brief, his \u201centire business and personal life was contained within the &#8230; emails seized.\u201d Appellant\u2019s Br. at 39-40. Given the often sensitive and sometimes damning substance of his emails,15 we think it highly unlikely that Warshak expected them to be made public, for people seldom unfurl their dirty laundry in plain view. See, e.g., United States v. Maxwell, 45 M.J. 406, 417 (C.A.A.F. 1996) (\u201c[T]he tenor and content of e-mail conversations between appellant and his correspondent, \u2018Launchboy,\u2019 reveal a[n] &#8230; expectation that the conversations were private.\u201d). Therefore, we conclude that Warshak had a subjective expectation of privacy in the contents of his emails.<\/p>\n<p>The next question is whether society is prepared to recognize that expectation as reasonable. See <a href=\"http:\/\/scholar.google.com\/scholar_case?case=3033726127475530815&amp;q=smith+v.+maryland&amp;hl=en&amp;as_sdt=1002\">Smith<\/a>, 442 U.S. at 740. This question is one of grave import and enduring consequence, given the prominent role that email has assumed in modern communication. Cf. Katz, 389 U.S. at 352 (suggesting that the Constitution must be read to account for \u201cthe vital role that the public telephone has come to play in private communication\u201d). Since the advent of email, the telephone call and the letter have waned in importance, and an explosion of Internet-based communication has taken place. People are now able to send sensitive and intimate information, instantaneously, to friends, family, and colleagues half a world away. Lovers exchange sweet nothings, and businessmen swap ambitious plans, all with the click of a mouse button. Commerce has also taken hold in email. Online purchases are often documented in email accounts, and email is frequently used to remind patients and clients of imminent appointments. In short, \u201caccount\u201d is an apt word for the conglomeration of stored messages that comprises an email account, as it provides an account of its owner\u2019s life. By obtaining access to someone\u2019s email, government agents gain the ability to peer deeply into his activities. Much hinges, therefore, on whether the government is permitted to request that a commercial ISP turn over the contents of a subscriber\u2019s emails without triggering the machinery of the Fourth Amendment.<\/p>\n<p>In confronting this question, we take note of two bedrock principles. First, the very fact that information is being passed through a communications network is a paramount Fourth Amendment consideration. See ibid.; <a href=\"http:\/\/scholar.google.com\/scholar_case?case=3656507059175116190&amp;q=407+us+297&amp;hl=en&amp;as_sdt=1002\">United States v. U. S. Dist. Court<\/a>, 407 U.S. 297, 313 (1972) (\u201c[T]he broad and unsuspected governmental incursions into conversational privacy which electronic surveillance entails necessitate the application of Fourth Amendment safeguards.\u201d). Second, the Fourth Amendment must keep pace with the inexorable march of technological progress, or its guarantees will wither and perish. See <a href=\"http:\/\/scholar.google.com\/scholar_case?case=15840045591115721227&amp;q=kyllo&amp;hl=en&amp;as_sdt=4002\">Kyllo v. United States<\/a>, 533 U.S. 27, 34 (2001) (noting that evolving technology must not be permitted to \u201cerode the privacy guaranteed by the Fourth Amendment\u201d); see also <a href=\"http:\/\/www.stanfordlawreview.org\/system\/files\/articles\/Kerr_0.pdf\">Orin S. Kerr, Applying the Fourth Amendment to the Internet: A General Approach<\/a>, 62 Stan. L. Rev. 1005, 1007 (2010) (arguing that \u201cthe differences between the facts of physical space and the facts of the Internet require courts to identify new Fourth Amendment distinctions to maintain the function of Fourth Amendment rules in an online environment\u201d).<\/p><\/blockquote>\n<p>See <a href=\"http:\/\/www.eff.org\/deeplinks\/2010\/12\/breaking-news-eff-victory-appeals-court-holds\">Electronic Frontier Foundation<\/a>, <a href=\"http:\/\/www.zdnet.com\/blog\/btl\/appeals-court-email-communication-is-protected-under-the-fourth-amendment\/42723\">ZDNet<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>b2evALnk.b2WPAutP <a class=\"more-link\" href=\"http:\/\/fourthamendment.com\/?p=4991\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"","ping_status":"pingsdone","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-4991","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/4991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4991"}],"version-history":[{"count":0,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/4991\/revisions"}],"wp:attachment":[{"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4991"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}