Sunday, January 4, 2015

Third party doctrine and the expectation of privacy.



Third party doctrine and the expectation of privacy.

Information has always been of value. For instance in Classical times Caesar's public letters were distributed to the public to glorify his campaigns while his private correspondences of military plans were encrypted with the cipher that bears his name. What both have in common is they need to be handed over to another person for distribution, a third party.



When sending an electronic communication the final act of the writer is to press the send button. Normally this message will appear almost instantly at the recipient's destination. Simple. Simple that is to the user, but the framework on how this occurs is complex. The message must be dissembled under known protocols, shunted between numerous servers and then re-assembled. This process involves various different stakeholders who control the servers and email infrastructure; third-parties into whose hand the message is entrusted. From a legal perspective, what are the levels of privacy involved?

In a letter, there is both the core message and address. While the former has levels of legal protection it is the address, which can be described as metadata, which has been held to be view able by the state,
Two legal cases provide the groundwork for this in the US. In United States v. Miller (1976) during an accident response, untaxed excise material was discovered which lead to an unwarranted search on the defendant's bank records. On appeal it was held there was no "expectation of privacy" due to the commercial nature of these bank records having been created from a voluntarily interaction in the normal course of business. This was affirmed later in the context of e-communications in Smith v. Maryland (1979).This revolved around crank phone calls and the police acting to record the Defendant's dialed numbers. Again it was held that as telephone communications being part of normal business practices then these were not private. Hence it appears that any such metadata information being handed over so as to transmit to another is covered by this.

Whether this ruling will remain in place, specially in light of the recent years Snowden revelations, will be in focus in a number of cases. For instance in the US the Klayman v Obama seeks to distinguish between Maryland and that of the surveillance program by the key differentials of the technologies used and the bulk nature of the collection which are now subject to various data mining techniques and processing power that was not available during the initial rulings in the 1970s. Thus the upcoming judgment on this and other related cases will provide an interesting start to 2015.


See also:
Cellular Convergence and the Death of Privacy by Stephen B. Wicker
If the Supreme Court tackles the NSA in 2015, it’ll be one of these five cases - Ars Technica




No comments:

Post a Comment