Consent: The Fourth Amendment

Improved Essays
The Fourth Amendment grants property rights to citizens against unreasonable searches and seizures. Consent is one of the most frequently used exceptions to the Fourth Amendment. Determining if a person has the authority to grant consent is an issue unique to computers. Today, technology enables multiple users to log on to a computer using multiple passwords and profiles and create multiple accounts and screen names. A password is analogous to a key that can be used to open a locked container. Therefore, an individual cannot grant consent to search a computer without specifying the password.
Tasks:
• Explain when consent to search and seizure should be granted in a household in which two persons share a computer but use different login names
…show more content…
The methods or ways which law enforcement can determine whether or not person (s) who granted consent to search someone else’s computer are found in the federal case of “U.S. v. Smith,” which involves a “third-party” consent to search a computer that is “normally” used by the third-party and others. In Smith, police were contacted by Smith’s live-in girlfriend to report that she had found child pornography on Smith’s computer which they “shared.” At the appeal trial, Smith’s attorney argued that Smith’s girlfriend; while she lived with him, did not have the legal authority as stated by the Supreme Court’s (the Court) ruling on exceptions to the Fourth Amendment, to grant consent to the search of his computer. (Knetzger, Michael and Muraski, Jeremy, 2008) (p. 245) The Court, in their ruling, gave the following factors for their ruling that Smith’s girlfriend “did” have the legal authority to grant consent of the search of Smith’s computer:
1. Smith’s girlfriend lived with him at the time of the search and seizure of Smith’s computer, on which child pornography was
…show more content…
Both owners “must” give their consent to officers when officers ask for the consent to search their computer. When “one” owner “objects” to the consent, then the search is “illegal” and the search cannot be done. However, when obtaining consent for permission to search computer data which users have different passwords in order to access their own data; law enforcement must obtain the consent from the user which has their own passwords, and are limited to searching the computer files which are covered by the user which have given consent to search this particular user’s computer files, which they have access to, using their user password to gain access into the shared computer. (Knetzger, Michael and Muraski, Jeremy, 2008) (p. 246) Both the husband and wife may have separate usernames and passwords for the same computer, and the husband refuses to grant consent, but the wife, however, is willing to give consent to search her part of their “shared”

Related Documents

  • Superior Essays

    In the case of the employee Jeffrey Brian Ziegler the question remains to whether he should have had a reasonable expectation of privacy in the contents of his work computer? I think that as this case presents information which stated, “when the employee were hired, they were told that their computer use was subject to monitoring and that computers should not be used for personal business” this information should have been sufficient enough for Mr. Ziegler to only use his work computer for intended work purposes (Walsh, 2013, p. 619). He should have gained a great understanding for his workplace policy, while using the company’s computer to look up child pornography. The fact that he held a private office still did not make it acceptable for visiting websites that contain pornography. So Ziegler filed a motion to suppress evidence due to how the employer proceeded in gaining the information from his office.…

    • 716 Words
    • 3 Pages
    Superior Essays
  • Improved Essays

    Fourth Amendment in Relation to Computer and Electronic Evidence The Fourth Amendment was drafted to regulate searches of homes and physical property, and has developed clear rules to regulate entering and retrieving mechanism of traditional physical searches. Computer searches involves lots of magnetized spots on metal disks, transforming those spots into data that is processed and directed to users through monitors. On the other hand, if the police have a warrant, the warrant allows them to take away any evidence named in the warrant. Once they take away the physical property that is considered seizure which is reasonable if the property is named in the warrant.…

    • 350 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    4th Amendment Case Study

    • 833 Words
    • 4 Pages

    The 4th amendment protects US citizens from the government and other citizens from invading people’s privacy. Robert Westbrook gave his computer to Gateway Computer services for servicing. While the computer was being serviced one of the technicians found child pornography on Westbrook’s computer. The technician reported the images to the police who came and inspected the files. Once the officers saw the pictures they obtained a warrant to search the entire computer.…

    • 833 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    Plain Search Case Study

    • 835 Words
    • 4 Pages

    4) Search in Plain View Search in plain view is when a police officer finds some unexpected suspicious items, he has the right to seize them without a search warrant. In digital evidence, police officers are usually not the people who found suspicious files, this is more likely to be a server admin in organization or technician who repair digital devices for his clients. In the past few years, there are many cases that illegal data are found in computers or other digital devices accidentally, such as Corey Beantee Melton’s case, reported by Hill,k from Forbes. He left his laptop to Bestbuy’s geek squad to repair, then some files with suspicious names are found, so they contacted with local police office, since this is under plain view, police officer seized the laptop and later applied for search warrant, at the end, Melton is found guilty.…

    • 835 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Moot Court Case

    • 1647 Words
    • 7 Pages

    Id. at 681. Once the officers reached the spare bedroom’s closet they found more men’s clothing on top of a shoebox. Id. at 682. The court concluded that a reasonable person would have substantial doubts about whether the box was subject to mutual use. Id.…

    • 1647 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The 4th amendment, which is contained in the Bill of Rights, is a crucial part of the United States Constitution. This single sentence offers great protection to everyone, against government and its power. Although it was not always this way, this portion of the law that govern our great nation was inserted shortly after the establishment of The United States Constitution. Throughout history, there have been many cases where this single guideline has protected an individual, and through their case it has changed the way people’s privacy is respected, to include encounters with law enforcement. Although protection is of primary importance, there are also legal ways that law enforcement and government can circumvent this great protection.…

    • 935 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Fourth Amendment Essay

    • 1229 Words
    • 5 Pages

    The Fourth Amendment: Our Right to Privacy Criminal Procedure CRJ350 Dr. Patricia Drown Regent University Eboni Alston The Fourth Amendment is part of the first ten amendments in the Bill of Rights added to the US Constitution, ratified in 1791 and guaranteeing such rights as the freedoms of speech, assembly, and worship. This amendment provides "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. " The ultimate goal of this amendment is to protect…

    • 1229 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    The Fourth Amendment

    • 752 Words
    • 4 Pages

    Amendment IV The fourth amendment is one of the primitive and mainly significant entitlements bestowed to the citizens of The United State of America; the law, distinctively states, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” What Does the Fourth Amendment Mean? The Fourth Amendment of the U.S. Constitution stipulates, the entitlement of individuals to be secure in their individualities, dwellings, documents, and possessions, against irrational searches…

    • 752 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Child Pornography Case Study

    • 2479 Words
    • 10 Pages

    A Case of Child Pornography and the Social Context R. v. Barabash, 2015 SCC 29, [2015] 2 S.C.R. 52 was a court case derived from the Alberta Court of Queen’s Bench that was appealed to the last court, the Supreme Court of Canada. Donald Barabash, 60 years old at the time, was charged with making child pornography and possession of child pornography while, Shane Rollison, 41 years old at the time, was only charged with the making child pornography (cite). Barabash and Rollison were tried together on the child pornography charges after two teenage girls, aged 14, had been filmed engaging in a variety of sexual activities with Rollison, Barabash and with each other. The social justice issues of poverty and drug abuse paired with unstable bringing…

    • 2479 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    Consent to search and seizure should be granted in a household in which two persons share a computer but use different login names and passwords when both parties are present and both most give consent otherwise officers can only search the consenting persons portion of the computer. If the one person is present and the other person isn’t the only way the person who is home has authority to consent to a search of the whole computer is by providing passwords for both users. It is recommended that you get consent in writing and make sure the individual understands the scope of consent as a layman would. Also, be very specific and detailed in the request for consent (Knetzger, 2008). Defendants may claim that the person who granted consent to search and seizure did not have the authority to do so.…

    • 451 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    R V N. A Case Analysis

    • 921 Words
    • 4 Pages

    In the Supreme Court, a pre-trial application under s 590AA was sought to exclude evidence obtained based on public policy. The grounds for this application were the result of an improper search conducted without the required reasonable suspicion on the part of K (the searching officer). Mr Callaghan, council for N, argued the forensic…

    • 921 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Computer Search Warrants

    • 295 Words
    • 2 Pages

    In cyber crime for police to enter and search a computer they may issue a search warrant or media object if the object of search is located in a specific place. However, there must be probable cause that the computer contains evidence of a crime (Roberson 2015). Even though a search warrant can be of great benefit, there are times in which computer search warrants can be a little tricky than a physical warrant. In regards to the Fourth Amendment there are sensitive issues that involves an individuals protection that must be adhered to.…

    • 295 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    "The internet has been a vast, resourceful network of information and entertainment since the late 20th Century. Along with its vast resources, the internet has also provided opportunities f However, the internet has also been a source of controversy over past few decades. One of the leading subjects of said controversy is privacy. Privacy on the internet is heavily debated because of what said privacy could be hiding or what actions it enables.…

    • 561 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Privacy And Security

    • 1243 Words
    • 5 Pages

    Privacy is a right guaranteed to Americans under the Fourth Amendment of the United States Constitution. While items in the physical realm have be easily understood as being protected by this amendment, it is not exactly the case with digital items such as data and information files. As a result, technology companies such as Apple introduced encryption security measures to protect their information from being accessed. However, this has resulted in conflict over how to access data relating to crimes and similar heinous acts. An example of this is the conflict between Apple and the Federal Bureau of Investigation.…

    • 1243 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Solving Ethical Issues

    • 1095 Words
    • 4 Pages

    This paper will summarize a current event related to an ethical issue, and the ethical issue will be clearly identified. Then, ethical theory will be applied to show how to resolve the ethical issue. The descriptive, prescriptive, and applied aspects will also be identified in relation to the given ethical issue. The majority perspective and the consequences will be discussed in detail. Finally, the paper will discuss if the majority perspective would change in a different culture and, if so, why it would change.…

    • 1095 Words
    • 4 Pages
    Improved Essays