Court Effectively Says No 4th Amendment Protection To Copies Of Emails

from the that's-not-good dept

Earlier this year, we wrote about some Fourth Amendment questions when it came to information stored in the cloud — and a recent legal ruling provides some new troubling views on this matter. Slashdot points us to Orin Kerr’s excellent analysis of a recent 11th Circuit decision, that basically says once an email is delivered, there’s no Fourth Amendment protections of that email. But, as Kerr notes, the real problem here (as with so many issues in the digital world) is that the court seems to be confusing copies of digital content with the original:

For a real-world example, imagine you write a letter and photocopy it before you put it in the mail. You file the copy in your closet and send the original. During the course of delivery, the original is protected by the Fourth Amendment; when it arrives, you lose Fourth Amendment protection. But the fact that you lose Fourth Amendment protection in the original does not mean that the Government can break into your house and read the copy you made. Conversely, the fact that the recipient of the mail does not have Fourth Amendment rights in the copy does not mean that the government can break into the recipient?s house to read the original.

For these reasons, the court should have analyzed access to the e-mails stored with the ISP based on whether there was a reasonable expectation of privacy in that remotely stored copy accessed, independently of delivery of another copy….

We see this over and over again when it comes to the digital world. People try to automatically equate it to the physical world, not recognizing that they’re dealing with independent copies, not the original (hence the argument that “file sharing is the same as theft.”) Unfortunately, in this case the ruling could do some serious damage to how the government and law enforcement views your expectation of privacy with regards to your emails.

Filed Under: , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Court Effectively Says No 4th Amendment Protection To Copies Of Emails”

Subscribe: RSS Leave a comment
16 Comments
pixelpusher220 (profile) says:

Plausible real world scenario

I send a letter to a friend. The process for transferring the letter from mail carrier to post office involves making a copy of the letter. Likewise for each separate post office the letter passes through a copy is made and stored for some amount of time before being destroyed.

After the original is delivered to the final destination, the sender loses the 4th amendment protections present in transit and the recipient gains them for the possessed letter.

What about all those copies that exist along the way?

It seems to me this pretty well replicates the digital process of sending an email. Would those physical copies be protected?

Wiggins says:

Incorrect analogy

I believe the mail analogy is missing one crucial step. Sending an email isn’t like sealing it in an envelope and mailing it off you are actually doing something more along the lines of:

a. alice writes a letter
b. alice photocopies the letter and sends to charles, asking him to mail it to bob
c. charles photocopies the letter and sends it to bob.
d. bob receives the letter
e. police go to charles and ask to see his copy of the letter
f. charles agrees.

in this situation can alice reasonably expect to have 4th amendment protections over the copy in charles’ possession?

Anonymous Coward says:

Re: Incorrect analogy

I agree, a more correct analogy. Sending the letter to ABC corporation and asking them to forward the letter to Bob would be the same thing. ABC corporation has the right to “give it up” if they want. We need P-2-P email instead of Yahoo, Gmail, etc. for the letter analogy to be correct.

Rob (profile) says:

Infinite goods

Remember this is the Internet and we’re talking about infinite goods. I think the only original is the one stored on your computer. All the ones after that are copies, right? Isn’t that what you’ve been saying all along. Everything on the Internet is a copy, right?

As Anonymous Coward said,encryption solves this problem everywhere.

rockman says:

i like these articles where judges misinterprets or conflates the analog value of an original and then superimposes that value on a seemingly never ending perfectly reproducible digital copy. in aesthetics this destabilization becomes a critique on how meaning is created. picasso paints the picture and the value is in the individuality, warhol does a print of thirty and so where lies the essence or truth. judges are asking the wrong question or maybe basing an analysis on one system of thought- platonic idealism as an example and having an event meaningful only in a phenomenological context. number 6 ask where is the fourth amendment protection and i would say that the loss of the priority of the original renders it moot. you have no protection or guarantee in a digital age both because there is no original and because the methodology of the question destabilizes any effort to create a centered concept of originality. that is what i like about piracy and p2p, the real value is not in stealing content but in deconstructing how we create value and truth. although not everybody that downloads a mp3 from the bay is necessarily thinking of post structuralist critiques on meaning, arguing piercean semiotics to the judge probably wont get you far either.

:) says:

There is one thing missing from the email process right now.

The envelope, and that is encryption.

Emails today are like sending letters without a seal.

Even though encryption is only good for 10~20 years before it can be broken, if you encrypt you are showing clearly that the intention is not to be public but private. You could even use ROT13 and that should be enough to show an attempt at privacy.

If that is not the case, there is a lot of banking data just waiting to be mined.

UN-SS# 488-74-2586 (profile) says:

SLAVERY

A government that is incapable of defending the laws and amendments on which this country was founded is BLANTANLY OBVIOUS. Those in power are ENEMIES of “We The People” and have engaged in HIGH TREASON.
How much worse does it have to get before the people who are acting like docile domesticated SLAVES, stand up for their countryman’s most basic fundamental Unalienable rights as a human being the Almighty GOD “YHWH” Himself has given to each one of us.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...