Law Enforcement and Privacy Flashcards

1-3 questions

You may prefer our related Brainscape-certified flashcards:
1
Q

FRCP 45: subpoena

A

a subpoena must:
* state the court from which it is issued
* state the title of the action and its civil-action number
* command each person to whom it is directed to do the following at a specific time and place: attend and testify; produce designated documents, electronically stored information, or tangible things in that person’s possession, custody or control; or permit the inspection of premises
* set out text of the rules describing the person’s right to challenge or modify the subpoena

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define:

legal standards for seeking stored content of records, search warrant and telephone wiretap

A
  • **stored content of records **: “specific and articulable facts showing that there are reasonable grounds” to believe communications are relevant to a criminal investigation
  • traditional search warrant issued under 4A: showing that there is probable cause that a crime has been, or will be committed
  • telephone wiretap: probable cause warrant + other requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define:

“computer trespasser” exception

A

in general, a law enforcement officer needs to have a court order or some other lawful basis to intercept wire or electronic communications
* officer must be lawfully engaged in investigation and have reasonable grounds to believe contents of comm will be relevant investigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define:

4th Amendment

A
  • ban against “unreasonable searches and seizures” by the government
  • for search warrants, the government must show “probable cause” that a crime has been, is or is likely to be committed
  • must describe the place to be searched with particularity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define:

exclusionary rule

A

evidence gathered by the government in violation of 4A can be excluded from criminal trial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Katz v. United States (U.S. 1967)

A
  • overruled Olmstead vs. United States
  • warrant needed for police bug in a restaurant placed to hear calls behind closed doors of a phone booth
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

rule from Katz v. United States

A

reasonable expectation of privacy” test:
1. person exhibited actual (subjective) expectation of privacy
2. expectation be one that society is prepared to recognize as “reasonable”

what a person seeks to preserve as private, even in an areas accessible to the public, may be constitutionally protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

United States v. Jones (2012)

A

warrant needed when police placed GPS device on a car and tracked its location for over a month
* warrant needed when police placed GPS device on a car and tracked its location for over a month

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Riley v. California (U.S. 2014)

A

contents of a cellphone cannot be searched unless law enforcement officers first obtain a search warrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Carpenter v. United States (U.S. 2018)

A

reduced scope of third-party doctrine → must secure warrant to access at least certain records held by 3Ps, namely, cell site location information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define:

geofence

A

technology that allows companies to target digital advertising to people within a virtually fenced area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

HIPAA and the 4th Amendment

A
  • general rule in HIPAA is that PHI may be disclosed to third parties, including law enforcement, only with opt-in consent from the patient
  • Section 512(f) permits disclosure pursuant to court order or grand jury subpoena, or through administrative request, if three criteria met:
    1. info sought is relevant and material to a legitimate law enforcement inquiry
    2. request is specific and limited scope to the extent reasonably practicable in light of the purpose for which the info is sought
    deidentified information could not reasonably be used
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What types of claims can monitoring of communications give rise to?

A
  • federal law violations
  • state law violations
  • invasion of privacy if offensive to a reasonable person
  • stricter for real-time interception vs. retrieval of a stored record
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

federal law on interception of communications

A

interception is prohibited unless an exception applies

  • Wiretap Act: applies to wire communications, which includes a phone call or other aural communications made through a network and oral communications
  • Electronic Communications Privacy Act: applies to electronic communications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the exception to prohibition on interceptions under federal law?

A

interception is permitted if a person is the party to call or if one of the parties has given consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Rank the below in order from strictest to most permissive:

  1. telephone monitoring and other tracking of oral communications
  2. video surveillance
  3. privacy of electronic communications
A
  1. telephone monitoring and other tracking of oral communications
  2. privacy of electronic communications
  3. video surveillance
17
Q

Does federal law on monitoring communciations preempt state law?

A

no, state laws can be more restrictive

18
Q

Define:

Stored Communications Act

A
  • enacted as part of ECPA
  • creates a general prohibition against the unauthorized acquisition, alteration or blocking of electronic communications while in electronic storage in a facility through which an electronic communications service is provided
19
Q

Does the SCA preempt state law?

A

no

20
Q

What are the exceptios under the SCA?

A
  • exception for conduct authorized by the person or entity providing a wire or electronic communication service, which will often be the company
  • exception for conduct authorized by a user of that service with respect to a communication of or intended for that use
21
Q

Define:

pen register

A

records telephone numbers of outgoing calls

22
Q

Define:

trap-and-trace devices

A

record the telephone numbers that called in to a particular number

23
Q

What is the standard for pen register and trap-and-trace orders from a judge?

A

“relevant to an ongoing investigation”
* USA FREEDOM Act prohibits use of pen register and trap-and-trace orders for bulk collection and restricting their use to circumstances where there were specific selectors such as an email address or telephone number

24
Q

Define:

U.S. Communications Assistance to Law Enforcement Act of 1994 (CALEA)

A
  • duties of defined actors in telecomms industry to cooperate in the interception of communications for law enforcement and other needs related to security and safety of public
  • requires telecomms carriers to design their products and services to ensure they can carry out a lawful order to provide government access to communications
  • also covers providers of broadband internet access and voice-over-internet protocol (VoIP) services
25
Q

Who implements CALEA?

A

FCC

26
Q

Define:

Cybersecurity Information Sharing Act (CISA)

A

permits federal government to share unclassified technical data with companies about how networks have been attacked and how successful defenses against such attacks have been carried out

27
Q

What are specific provisions of CISA?

A
  • authorization for a company to share or receive “cyberthreat indicators” or “defensive measures”
  • req for company to remove personal information before sharing
  • sharing information with a federal government
    does not waive privileges
  • shared information exempt from federal and state FOIA laws
  • prohibition on government using shared information to regulate or take enforcement actions against lawful activities, but may be used to develop or implement new cybersecurity regulations
  • authorization for company’s monitoring and operating defensive measures protection from liability for monitoring activities (but not for defensive measures)
28
Q

What does the Right to Financial Privacy Act (RFPA) of 1978 cover?

A

covers disclosures of financial records of individuals and partnerships of fewer than five people, by a variety of financial institutions, including banks, credit card companies and consumer finance companies in response to requests from federal agencies

29
Q

What is the rule under the Right to Financial Privacy Act?

A

no governmental authority may have access to or obtain copies of, the information contained in the financial records of any customer from a financial institution unless the financial records are reasonably described and meet at least one of these conditions:
* customer authorizes access
* appropriate administrative subpoena or summons
* qualified search warrant
* appropriate judicial subpoena
* appropriate formal written request from an authorized government authority

30
Q

Define:

Privacy Protection Act of 1980

A

provides extra layer of protection for members of the media and media orgs from government searches or seizures in the course of a criminal investigation

31
Q

What is the rule under the Privacy Protection Act of 1980?

A

government officials engaging in criminal investigations are not permitted to search or seize media work products or documentary materials “reasonably believed to have a purpose to disseminate to the public a newspaper, book, broadcast or other similar form of public communication”

exception:
* if there is probable cause to believe that a reporter has committed or is in process of committing a crime
* prevent death and serious injury
* reason to believe docs would be destroyed or concealed if subpoena’d

32
Q

Define:

U.S. CLOUD Act (2018)

A
  • Part I addresses how DOJ can access content of comms held by companies located in the U.S.
  • Part 2 creates a new mechanism for other countries to access content of comms held by U.S. service providers
33
Q

Define:

Part I of U.S. CLOUD Act

A

compelled disclosure orders apply regardless of whether such communication, record or other information is located within or outside of the United States (pending SCOTUS case)

34
Q

Define:

Part II of U.S. CLOUD Act

A
  • under ECPA, service providers in U.S. prohibited from disclosing content of comms to law enforcement except through a warrant or an appropriate request through a mechanism such as a mutual legal assistance treaty (MLAT) and must show “probable cause” (takes 10 months)
  • if U.S. and foreign government sign agreement pursuant to Part II, foreign law enforcement can go directly to service providers for comms content and can target comms of non-U.S. citizens and residents
35
Q

Define:

Budapest Convention

A

first international treaty to focus explicitly on cybercrime and mandated participating countries to outlaw certain cybercrimes, enact evidence-gathering rules and cooperate with investigations across national borders

36
Q

Define:

Second Additional Protocol to the Budapest Convention

A
  • opened for signature in 2022
  • expedited production of subscriber info and traffic data
  • direct disclosure of subscriber information and domain name registration information by allowing law enforcements to make request directly to service provider in another country
  • additional protections for personal data