Law Enforcement and Privacy Flashcards

1-3 questions

You may prefer our related Brainscape-certified flashcards:
1
Q

FRCP 45: subpoena

A

a subpoena must:

  • state the court from which it is issued
  • state the title of the action and its civil-action number
  • command each person to whom it is directed to do the following at a specific time and place: attend and testify; produce designated documents, electronically stored information, or tangible things in that person’s possession, custody or control; or permit the inspection of premises
  • set out text of the rules describing the person’s right to challenge or modify the subpoena
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define:

legal standards for seeking stored content of records, search warrant and telephone wiretap

A
  • stored content of records: “specific and articulable facts showing that there are reasonable grounds” to believe communications are relevant to a criminal investigation
  • traditional search warrant issued under 4A: showing that there is probable cause that a crime has been, or will be committed
  • telephone wiretap: probable cause warrant + other requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the requirements under the 4th Amendment?

A
  • ban against “unreasonable searches and seizures” by the government
  • for search warrants, the government must show “probable cause” that a crime has been, is or is likely to be committed
  • must describe the place to be searched with particularity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define:

exclusionary rule

A

evidence gathered by the government in violation of 4A can be excluded from criminal trial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Katz v. United States (U.S. 1967)

A
  • overruled Olmstead vs. United States
  • warrant needed for police bug in a restaurant placed to hear calls behind closed doors of a phone booth
  • what a person seeks to preserve as private, even in an areas accessible to the public, may be constitutionally protected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

rule from Katz v. United States

A

reasonable expectation of privacy” test:
1. person exhibited actual (subjective) expectation of privacy
2. expectation be one that society is prepared to recognize as “reasonable”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

United States v. Jones (2012)

A

warrant needed when police placed GPS device on a car and tracked its location for over a month

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Riley v. California (U.S. 2014)

A

contents of a cellphone cannot be searched unless law enforcement officers first obtain a search warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Carpenter v. United States (U.S. 2018)

A

reduced scope of third-party doctrine → must secure warrant to access at least certain records held by 3Ps, namely, cell site location information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HIPAA and the 4th Amendment

A

disclosure is permitted pursuant to court order or grand jury subpoena, or through administrative request, if three criteria met:
1. info sought is relevant and material to a legitimate law enforcement inquiry
2. request is specific and limited in scope to the extent reasonably practicable in light of the purpose for which the info is sought
3. deidentified information could not reasonably be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

federal law on interception of communications

A

interception is prohibited unless an exception applies

  • Wiretap Act: applies to wire communications, which includes a phone call or other aural communications made through a network and oral communications
  • Electronic Communications Privacy Act: applies to electronic communications
  • Stored Communications Act: applies to stored commnucations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the exception to prohibition on interceptions under federal law?

A

the interception is permitted if:

  • a person is the party to the call
  • if one of the parties has given consent
  • if done in ordinary course of business
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Does federal law on monitoring communications preempt state law?

A

no, state laws can be more restrictive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define:

Stored Communications Act

A
  • enacted as part of ECPA
  • creates a general prohibition against the unauthorized acquisition, alteration or blocking of electronic communications while in electronic storage in a facility through which an electronic communications service is provided
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the exceptions under the SCA?

A
  • exception for conduct authorized by the person or entity providing a wire or electronic communication service, which will often be the company
  • exception for conduct authorized by a user of that service with respect to a communication of or intended for that use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define:

pen register

A

records telephone numbers of outgoing calls

17
Q

Define:

trap-and-trace devices

A

record the telephone numbers that called in to a particular number

18
Q

What is the standard for pen register and trap-and-trace orders from a judge?

A

“relevant to an ongoing investigation”

  • USA FREEDOM Act prohibits use of pen register and trap-and-trace orders for bulk collection and restricting their use to circumstances where there were specific selectors such as an email address or telephone number
19
Q

Define:

U.S. Communications Assistance to Law Enforcement Act of 1994 (CALEA)

A
  • requires telecomms carriers to design their products and services to ensure they can carry out a lawful order to provide government access to communications
  • also covers providers of broadband internet access and voice-over-internet protocol (VoIP) services
20
Q

Who implements CALEA?

A

FCC

21
Q

Define:

Cybersecurity Information Sharing Act (CISA)

A

permits federal government to share unclassified technical data with companies about how networks have been attacked and how successful defenses against such attacks have been carried out

22
Q

What are specific provisions of CISA?

A
  • authorization for a company to share or receive “cyberthreat indicators” or “defensive measures”
  • req for company to remove personal information before sharing
  • sharing information with a federal government
    does not waive privileges
  • shared information exempt from federal and state FOIA laws
  • prohibition on government using shared information to regulate or take enforcement actions against lawful activities, but may be used to develop or implement new cybersecurity regulations
  • authorization for company’s monitoring and operating defensive measures protection from liability for monitoring activities (but not for defensive measures)
23
Q

What does the Right to Financial Privacy Act (RFPA) of 1978 cover?

A

covers disclosures of financial records of individuals and partnerships of fewer than five people, by a variety of financial institutions, including banks, credit card companies and consumer finance companies in response to requests from federal agencies

24
Q

What is the rule under the Right to Financial Privacy Act?

A

no governmental authority may have access to or obtain copies of, the information contained in the financial records of any customer from a financial institution unless the financial records are reasonably described and meet at least one of these conditions:

  • customer authorizes access
  • appropriate administrative subpoena or summons
  • qualified search warrant
  • appropriate judicial subpoena
  • appropriate formal written request from an authorized government authority
25
Q

What is the rule (and exceptions) under the Privacy Protection Act of 1980?

A

government officials engaging in criminal investigations are not permitted to search or seize media work products or documentary materials “reasonably believed to have a purpose to disseminate to the public a newspaper, book, broadcast or other similar form of public communication”

exception:

  • if there is probable cause to believe that a reporter has committed or is in process of committing a crime
  • prevent death and serious injury
  • reason to believe docs would be destroyed or concealed if subpoena’d
26
Q

Define:

U.S. CLOUD Act (2018)

A
  • Part I addresses how DOJ can access content of comms held by companies located in the U.S.
  • Part 2 creates a new mechanism for other countries to access content of comms held by U.S. service providers
27
Q

Define:

Part I of U.S. CLOUD Act

A

compelled disclosure orders apply regardless of whether such communication, record or other information is located within or outside of the United States (pending SCOTUS case)

28
Q

Define:

Part II of U.S. CLOUD Act

A
  • under ECPA, service providers in U.S. prohibited from disclosing content of comms to law enforcement except through a warrant or an appropriate request through a mechanism such as a mutual legal assistance treaty (MLAT) and must show “probable cause” (takes 10 months)
  • if U.S. and foreign government sign agreement pursuant to Part II, foreign law enforcement can go directly to service providers for comms content and can target comms of non-U.S. citizens and residents
29
Q

Define:

Budapest Convention

A

first international treaty to focus explicitly on cybercrime and mandated participating countries to outlaw certain cybercrimes, enact evidence-gathering rules and cooperate with investigations across national borders

30
Q

Define:

Second Additional Protocol to the Budapest Convention

A
  • opened for signature in 2022
  • expedited production of subscriber info and traffic data
  • direct disclosure of subscriber information and domain name registration information by allowing law enforcements to make request directly to service provider in another country
  • additional protections for personal data