The End of Miller's Time: How Sensitivity Can Categorize Third-Party Data After Carpenter

54 Pages Posted: 23 Apr 2018 Last revised: 24 Mar 2020

See all articles by Michael Gentithes

Michael Gentithes

University of Akron School of Law; Chicago-Kent College of Law - Illinois Institute of Technology; New York University School of Law; Loyola University Chicago School of Law

Date Written: April 3, 2018

Abstract

For over 40 years, the Supreme Court has permitted government investigators to warrantlessly collect information citizens disclose to third-party service providers. That third-party doctrine is under significant strain in the modern, networked world. Yet scholarly responses typically fall into unhelpfully extreme camps, either championing an absolute version of the doctrine or calling for its abolition. In Carpenter v. United States, the Court suggested a middle road, holding that some categories of data—such as digital location information collected from cell phones—do not neatly fall into the third-party doctrine’s dichotomy between unprotected, disclosed information and protected, undisclosed information. But the majority elucidated little rationale upon which to draw such nuanced distinctions.

This Article provides the missing rationale for such categorization: informational sensitivity. Disclosure to a third party matters, but is not a trump card. Sensitivity matters too. I thus propose a two-step test to determine if the government must obtain a warrant before collecting information from a third party. First, the Court should analyze the information’s sensitivity, placing it on a sensitivity continuum rather than a disclosure dichotomy. The Court can look to related jurisprudence, and the inherent meaning such information conveys, to determine placement on that continuum. Second, if the information is sensitive, the Court should decide whether the government has collected enough of it to create an informational mosaic of the citizen. If so, that collection is a search.

The Court has long held that some data, like medical records or phone conversations, are too sensitive to be warrantlessly collected from third parties. Intermediately sensitive data, like the financial information in United States v. Miller and the cell site location information in Carpenter, might be warrantlessly collected in small amounts, but is too sensitive for warrantless collection in bulk. The Court should adjust the third-party doctrine to account for such sensitive information and craft provisional rules to protect it. Doing so will enhance both the public’s security and its regard for the Court.

Keywords: Criminal Procedure, Fourth Amendment, Constitutional Law, Carpenter, Miller, Evidence, Jurisprudence, Supreme Court

Suggested Citation

Gentithes, Michael, The End of Miller's Time: How Sensitivity Can Categorize Third-Party Data After Carpenter (April 3, 2018). 53 Georgia L. Rev. 1039 (2019), Available at SSRN: https://ssrn.com/abstract=3155644

Michael Gentithes (Contact Author)

University of Akron School of Law ( email )

150 University Ave.
Akron, OH 44325-2901
United States

Chicago-Kent College of Law - Illinois Institute of Technology ( email )

565 W. Adams St.
Chicago, IL 60661-3691
United States

New York University School of Law ( email )

40 Washington Square South
New York, NY 10012-1099
United States

Loyola University Chicago School of Law ( email )

25 E Pearson St.
Room 1041
Chicago, IL 60611
United States

Here is the Coronavirus
related research on SSRN

Paper statistics

Downloads
104
Abstract Views
507
rank
295,137
PlumX Metrics