{"id":725,"date":"2007-07-18T13:54:21","date_gmt":"2007-01-20T07:05:06","guid":{"rendered":""},"modified":"-0001-11-30T00:00:00","modified_gmt":"2007-01-20T07:05:06","slug":"en-US","status":"publish","type":"post","link":"https:\/\/fourthamendment.com\/?p=725","title":{"rendered":"Company computer and e-mail policy eliminated any expectation of privacy in the system or defendant&#8217;s work station"},"content":{"rendered":"<p>The defendant&#8217;s employer had a computer use and e-mail policy that effectively eliminated all reasonable expectation of privacy in the system or defendant&#8217;s own work station.  United States v. Hassoun, 2007 U.S. Dist. LEXIS 3404 (S.D. Fla. January 17, 2007):<\/p>\n<blockquote><p>However, the Defendant argues in his objections that the employer&#8217;s ownership of the seized computer and components and the existence of the above-quoted policy, which does not forbid all personal use of computers and allows for employee monitoring of an employee&#8217;s work computer, is not dispositive of the employee&#8217;s expectation of privacy.<\/p>\n<p>In his R &amp; R, the Magistrate Judge relied on cases that did not forbid all personal uses of the employer&#8217;s computer and\/or computer network systems. <em>United States v. Angevine,<\/em> 281 F. 3d. 1130 (10th Cir. 2002) and <em>United States v. Scrushy,<\/em> No. CR-03-BE-0530-S, 2005 WL 4149004 (N.D. Ala. 2005). Moreover, MarCom&#8217;s policy did not limit in any way its right to monitor an employee&#8217;s computer. Although the MarCom policy did not forbid employees&#8217; personal use of their assigned computers, the policy makes clear that all uses &#8211;work or personal, would be subject to the company&#8217;s monitoring. &#8220;Employer monitoring is largely an assumed practice, and thus&#8230;a disseminated computer-use policy is entirely sufficient to defeat any expectation that an employee might nonetheless harbor.&#8221; <em>United States v. Ziegler<\/em>, 456 F.3d 1138, 1146 (9th Cir. 2006).<\/p><\/blockquote>\n<p>In a forfeiture case, the record supports the finding that the claimant consented to a search of the vehicle that produced the cash.  Jury verdict of relation to drugs was supported by the evidence. United States v. Three Hundred Sixty-Nine Thousand Nine Hundred Eighty Dollars in United States Currency, 214 Fed. Appx. 432 (5th Cir. 2007)* (unpublished).<\/p>\n<p>A suspicionless search of a known parolee, under the authority of Cal. Penal Code \u00a7 3067(a), did not violate the Fourth Amendment. That section applied to defendant&#8217;s parole via \u00a7 3067(c) because the underlying offense for his parole was committed on March 7, 2001. Because even a suspicionless search of a person known by police to be a California parolee subject to \u00a7 3067(a) was not unconstitutional, defendant&#8217;s challenge to the search based on lack of reasonable suspicion failed. The court noted that defendant did not challenge the search as arbitrary, capricious, or harassing. United States v. Dixon, 217 Fed. Appx. 712 (9th Cir. 2007)* (unpublished) (virtually quoting from the Lexis Overview).<\/p>\n<p>Police responded to a 911 call that someone in the area of defendant&#8217;s house was firing a shotgun at their house. Police arrived and found shotgun shells on the ground, and defendant was associated with the premises.  He was removed from the area. Officers then talked with his girlfriend, and they learned that she had moved into the house months earlier. She also paid the telephone bill. She had apparent authority to consent, and <em>Randolph<\/em> did not apply.  United States v. Groves, 2007 U.S. Dist. LEXIS 3518 (N.D. Ind. January 17, 2007)* (on remand from the Seventh Circuit in light of <em>Randolph<\/em> which was decided after briefing).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>b2evALnk.b2WPAutP <a class=\"more-link\" href=\"https:\/\/fourthamendment.com\/?p=725\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"","ping_status":"pingsdone","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-725","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/725","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=725"}],"version-history":[{"count":0,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=\/wp\/v2\/posts\/725\/revisions"}],"wp:attachment":[{"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=725"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=725"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fourthamendment.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}