Searches and Seizures in a Digital World
55 Pages Posted: 4 Apr 2005 Last revised: 17 Mar 2018
Date Written: 2005
Abstract
The new frontier of the Fourth Amendment is the search and seizure of computer data. Created to regulate entering homes and seizing physical evidence, the Fourth Amendment's prohibition on unreasonable searches and seizures is now called on to regulate a very different process: retrieval of digital evidence from electronic storage devices. While obvious analogies exist between searching computers and searching physical spaces, important differences between them will force courts to rethink the basic meaning of the Fourth Amendment's key concepts. What does it mean to search computer data? When is computer data seized? When is a computer search or seizure reasonable?
This article offers a normative framework for applying the Fourth Amendment to searches of computer data. It begins by exploring the basic differences between physical searches of physical property and electronic searches of digital evidence. It then proposes an exposure theory of Fourth Amendment searches: any exposure of data to an output device such as a monitor should be a search of that data, and only that data. The exposure approach is then matched with a rule for computer seizures: while copying data should not be deemed a seizure of that data, searches of copies should be treated the same as searches of the original. In the final section, the article proposes a rethinking of the plain view exception in computer searches to reflect the new dynamic of digital evidence investigations. The plain view exception should be narrowed or even eliminated in digital evidence cases to ensure that digital warrants that are narrow in theory do not devolve into general warrants in practice. Tailoring the doctrine in light of the new realities of computer investigations will protect the function of existing Fourth Amendment rules in the new world of digital evidence.
Keywords: Fourth Amendment, computers, digital evidence, cybercrime
JEL Classification: K14, K42
Suggested Citation: Suggested Citation
Do you have a job opening that you would like to promote on SSRN?
Recommended Papers
-
A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending it
By Orin S. Kerr
-
The Case for the Third-Party Doctrine
By Orin S. Kerr
-
Brandeis & Warren's 'The Right to Privacy and the Birth of the Right to Privacy'
By Ben Bratman
-
Applying the Fourth Amendment to the Internet: A General Approach
By Orin S. Kerr
-
Buying You: The Government's Use of Fourth-Parties to Launder Data about 'The People'
-
Back to Katz: Reasonable Expectation of Privacy in the Facebook Age