Consent: The Fourth Amendment

Improved Essays
The Fourth Amendment grants property rights to citizens against unreasonable searches and seizures. Consent is one of the most frequently used exceptions to the Fourth Amendment. Determining if a person has the authority to grant consent is an issue unique to computers. Today, technology enables multiple users to log on to a computer using multiple passwords and profiles and create multiple accounts and screen names. A password is analogous to a key that can be used to open a locked container. Therefore, an individual cannot grant consent to search a computer without specifying the password.
Tasks:
• Explain when consent to search and seizure should be granted in a household in which two persons share a computer but use different login names
…show more content…
The methods or ways which law enforcement can determine whether or not person (s) who granted consent to search someone else’s computer are found in the federal case of “U.S. v. Smith,” which involves a “third-party” consent to search a computer that is “normally” used by the third-party and others. In Smith, police were contacted by Smith’s live-in girlfriend to report that she had found child pornography on Smith’s computer which they “shared.” At the appeal trial, Smith’s attorney argued that Smith’s girlfriend; while she lived with him, did not have the legal authority as stated by the Supreme Court’s (the Court) ruling on exceptions to the Fourth Amendment, to grant consent to the search of his computer. (Knetzger, Michael and Muraski, Jeremy, 2008) (p. 245) The Court, in their ruling, gave the following factors for their ruling that Smith’s girlfriend “did” have the legal authority to grant consent of the search of Smith’s computer:
1. Smith’s girlfriend lived with him at the time of the search and seizure of Smith’s computer, on which child pornography was
…show more content…
Both owners “must” give their consent to officers when officers ask for the consent to search their computer. When “one” owner “objects” to the consent, then the search is “illegal” and the search cannot be done. However, when obtaining consent for permission to search computer data which users have different passwords in order to access their own data; law enforcement must obtain the consent from the user which has their own passwords, and are limited to searching the computer files which are covered by the user which have given consent to search this particular user’s computer files, which they have access to, using their user password to gain access into the shared computer. (Knetzger, Michael and Muraski, Jeremy, 2008) (p. 246) Both the husband and wife may have separate usernames and passwords for the same computer, and the husband refuses to grant consent, but the wife, however, is willing to give consent to search her part of their “shared”

Related Documents

  • Improved Essays

    Dmak Dbq Analysis

    • 580 Words
    • 3 Pages

    United States, the use of a thermal imager without a warrant was a violation of DLK’s fourth amendment right. Though the government never physically intruded upon private property, they used technology to conduct an intrusive search which revealed private, guarded information about the house in question. Therefore, the scan was a search and should require a warrant. The question of whether a thermal scan constituted a search was of key importance because with the advancement of technology, it will become easier to gather information without a physical intrusion. The DLK case drew a line which the government had crossed by declaring a scan that revealed information about the inside of a house, without actually showing the inside, required a…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Facts: The Defendant’s van was searched by Canadian border officials during a routine search and found a videotape that focused on a young ball-boy playing tennis. A more through search led the officials to discover marijuana paraphernalia, a photo album loaded with child pornography, a computer, and several hard drives. Customs officials examined the contents of the hard-drives and the defendant’s computer, all of which contained other files of child pornography. The defendant would later file a motion, seeking to suppress the contents of both the hard drives and the computer on both First and Fourth Amendment form.…

    • 325 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    In the case of the employee Jeffrey Brian Ziegler the question remains to whether he should have had a reasonable expectation of privacy in the contents of his work computer? I think that as this case presents information which stated, “when the employee were hired, they were told that their computer use was subject to monitoring and that computers should not be used for personal business” this information should have been sufficient enough for Mr. Ziegler to only use his work computer for intended work purposes (Walsh, 2013, p. 619). He should have gained a great understanding for his workplace policy, while using the company’s computer to look up child pornography. The fact that he held a private office still did not make it acceptable for visiting websites that contain pornography. So Ziegler filed a motion to suppress evidence due to how the employer proceeded in gaining the information from his office.…

    • 716 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    Fourth Amendment in Relation to Computer and Electronic Evidence The Fourth Amendment was drafted to regulate searches of homes and physical property, and has developed clear rules to regulate entering and retrieving mechanism of traditional physical searches. Computer searches involves lots of magnetized spots on metal disks, transforming those spots into data that is processed and directed to users through monitors. On the other hand, if the police have a warrant, the warrant allows them to take away any evidence named in the warrant. Once they take away the physical property that is considered seizure which is reasonable if the property is named in the warrant.…

    • 350 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Plain Search Case Study

    • 835 Words
    • 4 Pages

    4) Search in Plain View Search in plain view is when a police officer finds some unexpected suspicious items, he has the right to seize them without a search warrant. In digital evidence, police officers are usually not the people who found suspicious files, this is more likely to be a server admin in organization or technician who repair digital devices for his clients. In the past few years, there are many cases that illegal data are found in computers or other digital devices accidentally, such as Corey Beantee Melton’s case, reported by Hill,k from Forbes. He left his laptop to Bestbuy’s geek squad to repair, then some files with suspicious names are found, so they contacted with local police office, since this is under plain view, police officer seized the laptop and later applied for search warrant, at the end, Melton is found guilty.…

    • 835 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    4th Amendment Case Study

    • 833 Words
    • 4 Pages

    The 4th amendment protects US citizens from the government and other citizens from invading people’s privacy. Robert Westbrook gave his computer to Gateway Computer services for servicing. While the computer was being serviced one of the technicians found child pornography on Westbrook’s computer. The technician reported the images to the police who came and inspected the files. Once the officers saw the pictures they obtained a warrant to search the entire computer.…

    • 833 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Moot Court Case

    • 1647 Words
    • 7 Pages

    DAVID FALLSBAUER’S RIGHTS UNDER THE FOURTH AMENDMENT WERE VIOLATED BY THE POLICE OFFICERS, BECAUSE WHEN FACED WITH AMBIGUITY REGARDING THE A THIRD PARTY’S CONSENT TO SEARCH THEY FAILED TO MAKE A FURTHER INQUIRY. BY DOING SO, THE OFFICERS VIOLATED DAVID’S RIGHT TO PRIVACY. The primary question before this Court is whether police officers must make a further inquiry when faced with an ambiguity regarding a third party’s consent to search. The Federal Circuit Courts of Appeals have taken different views when deciding the actions a police officer must take when faced with an ambiguity pertaining to third party consent. It is crucial to our society that a person’s right to privacy is protected and able to be exercised.…

    • 1647 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    R V N. A Case Analysis

    • 921 Words
    • 4 Pages

    Carmody then discusses the common law public policy discretion; quoting Halliday v Nevill ‘The warrant process acts as a safeguard in the “contest” between public authority and the security of private dwellings and property’. Moreover, comparing Australian authority that ‘police lawfully on premises cannot search them … before arrest merely on the basis of reasonable suspicion’ and Lord Denning’s obiter in Ghani v Jones that allows for ‘a public interest-based judicial discretion’ to receive evidence outside of the legal scope of search and seizure. In considering the impact on presenting evidence to juries, Carmody CJ concludes that usually it would be wrong to reject the evidence contained in the iPhone because it was found before a warrant had been obtained. However, it is then whether the ‘carefully drawn bounds’ of the search power can be circumvented in the pursuing a public standard regarding the illicit drug trade. 2 Reasonable Suspicion Briefly Carmody CJ considered the policy concerns that surround the requirement of reasonable suspicion.…

    • 921 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Consent to search and seizure should be granted in a household in which two persons share a computer but use different login names and passwords when both parties are present and both most give consent otherwise officers can only search the consenting persons portion of the computer. If the one person is present and the other person isn’t the only way the person who is home has authority to consent to a search of the whole computer is by providing passwords for both users. It is recommended that you get consent in writing and make sure the individual understands the scope of consent as a layman would. Also, be very specific and detailed in the request for consent (Knetzger, 2008). Defendants may claim that the person who granted consent to search and seizure did not have the authority to do so.…

    • 451 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Computer Search Warrants

    • 295 Words
    • 2 Pages

    In cyber crime for police to enter and search a computer they may issue a search warrant or media object if the object of search is located in a specific place. However, there must be probable cause that the computer contains evidence of a crime (Roberson 2015). Even though a search warrant can be of great benefit, there are times in which computer search warrants can be a little tricky than a physical warrant. In regards to the Fourth Amendment there are sensitive issues that involves an individuals protection that must be adhered to.…

    • 295 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Child Pornography Case Study

    • 2479 Words
    • 10 Pages

    A Case of Child Pornography and the Social Context R. v. Barabash, 2015 SCC 29, [2015] 2 S.C.R. 52 was a court case derived from the Alberta Court of Queen’s Bench that was appealed to the last court, the Supreme Court of Canada. Donald Barabash, 60 years old at the time, was charged with making child pornography and possession of child pornography while, Shane Rollison, 41 years old at the time, was only charged with the making child pornography (cite). Barabash and Rollison were tried together on the child pornography charges after two teenage girls, aged 14, had been filmed engaging in a variety of sexual activities with Rollison, Barabash and with each other. The social justice issues of poverty and drug abuse paired with unstable bringing…

    • 2479 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    "The internet has been a vast, resourceful network of information and entertainment since the late 20th Century. Along with its vast resources, the internet has also provided opportunities f However, the internet has also been a source of controversy over past few decades. One of the leading subjects of said controversy is privacy. Privacy on the internet is heavily debated because of what said privacy could be hiding or what actions it enables.…

    • 561 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Privacy And Security

    • 1243 Words
    • 5 Pages

    Privacy is a right guaranteed to Americans under the Fourth Amendment of the United States Constitution. While items in the physical realm have be easily understood as being protected by this amendment, it is not exactly the case with digital items such as data and information files. As a result, technology companies such as Apple introduced encryption security measures to protect their information from being accessed. However, this has resulted in conflict over how to access data relating to crimes and similar heinous acts. An example of this is the conflict between Apple and the Federal Bureau of Investigation.…

    • 1243 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Solving Ethical Issues

    • 1095 Words
    • 4 Pages

    This paper will summarize a current event related to an ethical issue, and the ethical issue will be clearly identified. Then, ethical theory will be applied to show how to resolve the ethical issue. The descriptive, prescriptive, and applied aspects will also be identified in relation to the given ethical issue. The majority perspective and the consequences will be discussed in detail. Finally, the paper will discuss if the majority perspective would change in a different culture and, if so, why it would change.…

    • 1095 Words
    • 4 Pages
    Improved Essays