Ch 12 - Privacy Issues - Civil Litigation & Gov't Investigations Flashcards
What are 5 elements of a good Information Management Plan for responding to discovery requests?
An Information Management Plan should include:
- when or under what conditions private information can be disclosed;
- how private information can be disclosed;
- any required organizational authorizations required for releasing private information;
- audit trails; and
- IT systems implementation.
What amendment offers U.S. citizens protection over unreasonable searches and seizures?
The U.S. Constitution offers citizens protection against unreasonable searches and seizures in the 4th Amendment.
What is a 4th Amendment search warrant?
A search warrant for probable cause that a crime has been, or will be, committed.
What are the 4 required conditions for obtaining a valid 4th Amendment search warrant?
The warrant must:
(1) be filed in good faith by a law enforcement officer;
(2) be based on reliable information showing probable cause to search;
(3) be issued by a neutral and detached magistrate; and
(4) state specifically the place to be searched and the items to be seized.
Generally, under what conditions may a wiretap be obtained?
a. Fourth Amendment probable cause
b. All other alternatives for obtaining the information have been exhausted
c. Law enforcement wants to monitor a suspect’s conversations
d. a and b
d. a and b
Which of the following is a big challenge when responding to discovery requests?
a. Providing information based on a specific request
b. Finding all the data requested
c. Providing too much or too little information
d. None of the above
c. Providing too much or too little information.
What are some examples of reporting requirements by federal regulation or law?
Examples of reporting to government agencies:
- BSA reporting of suspicious financial activities related to terrorism or money laundering;
- FDA reporting by regulated industries (drug manufacturers, health professionals) for serious adverse events; product problems, medication errors;
- OSHA reporting by employers of workplace injuries/illnesses;
- State reporting regarding certain injuries/medical conditions;
- HIPAA reporting permitted to other agencies when required by law.
What is the purpose of the Right to Financial Privacy Act (RFPA)?
The Right to Financial Privacy Act regulates the disclosure of personal information by financial institutions to federal government agencies requesting the information.
What is the purpose of the Electronic Communications Privacy Act?
a. Changes the privacy requirements for electronic communications such as email
b. Extends prohibition of wiretaps on phone calls to include electronic communication such as email
c. Provides clarity that electronic communications have always been included in coverage
d. All of the above
b. Extends prohibition of wiretaps on phone calls to include electronic communication such as email
Which of the following types of surveillance on wire communications are included in the scope of the Title III of the Omnibus Crime Control and Safe Streets Act of 1968?
a. Aural communication made through a network, such as phone calls
b. Oral communications such as hidden bugs or microphones
c. Electronic communications, such as emails, that are not wire or oral communications
d. All of the above
d. All of the above
Title III generally applies to surveillance on wire communications, including:
- aural communication made through a network, such as phone calls;
- oral communications, such as hidden bugs or microphones,
- electronic communications, such as emails, that are not wire or oral communications.
When is a communication considered to be subject to a search warrant?
a. When the persons involved in the communication have no expectation of privacy
b. When the persons involved in the communication have a reasonable expectation of privacy
c. When the persons involved in the communication state something openly in public
d. None of the above
b. When the persons involved in the communication have a reasonable expectation of privacy
What is the “reasonable expectation of privacy” test?
The outcome of the 1967 Katz v. U.S. case in which there was a concurring opinion stated by Justice John Marshall Harlan:
- the person has exhibited an actual expectation of privacy, and
- the expectation is one that society is prepared to recognize as ‘reasonable.’
What are some exceptions to the 4th Amendment requirement to obtain a warrant where a reasonable expectation of privacy exists?
- “In public” rule: what a person knowingly exposes to the public;
- “Third-party” rule: information a person puts into the hands of someone else.
When is the “reasonable expectation of privacy” test used?
To determine whether information that was obtained without a warrant is admissible evidence.
Which of the following best describes what “discovery” means in litigation?
a. Exchange of legal information and known facts of a case disclosed in a lawsuit during the trial
b. Exchange of legal information and known facts of a case disclosed in the rules of civil and criminal procedure
c. Exchange of legal information and known facts of a case disclosed in a lawsuit before trial
d. None of the above
c. Exchange of legal information and known facts of a case disclosed in a lawsuit before trial
What is a subpoena?
A subpoena is a written instruction to produce a witness or records.
What are the 4 requirements of a subpoena under Federal Rule of Civil Procedure 45?
Federal Rule of Civil Procedure 45 requires that the subpoena:
- state which court issued it;
- state the title of action and action number;
- command each person to attend and testify, produce specific evidence, or permit inspection at a time and place; and
- include rules regarding the person’s right to challenge or modify the subpoena.
What does it mean to “serve” a subpoena?
To deliver the subpoena in a legal way, put a person on notice of obligation to respond and their right to seek to quash or modify the subpoena.
What are the consequences of a person failing to obey a subpoena?
Failure to obey a subpoena without an adequate excuse may result in being held in contempt of court, fines, and/or imprisonment.
What are the conditions for obtaining a pen register order?
A pen register order may be issued when the information is relevant to an ongoing investigation.
What is a pen register?
A pen register is a record of dialed numbers or outgoing calls. It may also include internet communications. It includes communications metadata, but does not include the content of the communications.
Which of the following is a source of of law used to obtain a search warrant?
a. 18 USC 2703(d) of the Stored Communications Act (SCA)
b. Fourth Amendment of the U.S. Constitution
c. Wire Tap Act
d. All of the above
18 USC 2703(d) of the Stored Communications Act (SCA)
Fourth Amendment of the U.S. Constitution
Wire Tap Act
Which of the following is a required basis for obtaining a search warrant under the Stored Content Act (SCA)?
a. Specific articulable facts
b. Reasonable grounds
c. Relevant to the investigation
d. All of the above
d. All of the above
A search warrant to obtain evidence from electronics communications service providers under the Stored Content Act must be based on:
- Specific articulable facts showing
- Reasonable grounds
- Relevant to the investigation.
What are the requirements for obtaining a search warrant under the Fourth Amendment?
There must be probable cause that a crime has been or will be committed.