This chapter examines privacy issues that arise when a company is responding to civil litigation and government investigations.
Before trial, a company may receive civil “discovery” requests (requests for information by each party in a lawsuit)
Disclosures in investigations and litigation are more likely to be made through cooperative efforts of lawyers with a company’s privacy and information technology professionals.
Covers how disclosures may be required, permitted or forbidden by law.
Organizations sometimes are required by law either to disclose or not to disclose personal information.
For investigations and litigation
The law can be complex about when information must be disclosed
When the organization has a choice about whether to disclose
When the organization is prohibited from disclosing.
Disclosures Required by Law
Certain U.S. laws require disclosure of personal information held by an organization.
As discussed by the Bank Secrecy Act and related reporting requirements designed to reduce money laundering.
Other disclosures:
U.S. Food and Drug Administration (FDA) requires health professionals and drug manufacturers to report serious adverse events, product problems or medication errors.
U.S. Department of Labor’s Occupational Health and Safety Administration (OSHA) requires compilation and reporting of information about certain workplace injuries and illnesses.
Health Insurance Portability and Accountability Act (HIPAA) permits disclosure of protected health information where disclosure is required by law.
Companies with information relevant to a government investigation or in civil litigation may receive a subpoena, which is an instruction to produce a witness or records.
Disclosures Permitted by Law
For some categories of information, an organization is permitted, but not required, to disclose personal information.
HIPAA requires very few disclosures.
Privacy Rule requires covered entities to disclose protected health information (PHI) only to
the individual to whom it pertains
the U.S. Department of Health and Human Services (HHS) in the course of an enforcement action
Computer trespasser” exception (sometimes called the “hacker trespasser” exception)
USA PATRIOT Act
Law enforcement officer needs to have a court order or some other lawful basis to intercept wire or electronic communications
Disclosures Forbidden by Law
Many of the privacy laws discussed in this book forbid disclosures
These laws often use either an opt- in or an opt-out requirement to help accomplish their restrictions.
Gramm-Leach-Bliley Act (GLBA) forbids disclosures to third parties if the individual has opted out.
HIPAA and the Children’s Online Privacy Protection Rule (COPPA) forbid disclosures of covered information to third parties, unless there is opt-in consent
A large amount of personal information may be disclosed to parties in the course of civil litigation.
Although the United States has a strong tradition of public access to court records, privacy concerns are also recognized.
Courts can issue protective orders to prohibit disclosure of personal information revealed in litigation
Attorneys increasingly are required to redact Social Security numbers and other sensitive information (FPI, ESI) when filing documents with the courts (P 308)
Trademark, Trade Secrets, other sensitive information can b reddacted
Public Access to Court Records, Protective Orders and Required Redaction
The U.S. has a strong tradition of public access to government records, including under the federal Freedom of Information Act (FOIA) and state open records laws.
Placing court records on the Internet, however, also raised privacy issues
One response to public access to court records has been
Litigants to seek protective orders for personal information.
With a protective order, a judge determines what information should not be made public and what conditions apply to those who may access the protected information.
Electronic Discovery
Prior to trial, the parties usually engage in discovery.
In discovery, the information typically is exchanged with the other party or parties and their attorneys.
Managing e-discovery and privacy begins with a well-managed data retention program.
Designing a retention policy, it should be remembered that ESI takes not only obvious forms such as email or word processing documents, but can also manifest itself as databases, web pages, server logs, and others.
Federal Rules of Civil Procedure
Discusses electronically stored information (ESI)
Discovery of ESI, generally known as e-discovery
When a court finds conflict between a corporate retention policy and a discovery request, the court will likely apply a three-factor test:
The retention policy should be reasonable considering the facts of the situation
Courts may consider similar complaints against the organization
Courts may evaluate whether the organization instituted the policy in bad faith.
Issue of transborder data flows creates a more complicated situation.
When engaged in pretrial discovery in U.S. courts, parties can be caught between conflicting demands.
On the one hand, they must comply with U.S. discovery rules that expressly recognize the importance of broad preservation, collection and production.
Aerospaciale v. S.D. of Iowa outlines the factors that an American court may use to reconcile the conflict.
These factors include:
The importance of the documents or data to the litigation at hand
The specificity of the request
Whether the information originated in the United States
The availability of alternative means of securing the information
The extent to which the important interests of the U.S. and the foreign state would be undermined by an adverse ruling
With civil litigation, a company can face requests to provide personal information in connection with criminal investigations and litigation.
Fourth Amendment Limits on Law Enforcement Searches
The Fourth Amendment to the Constitution provides:
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched.
Limits on government power stem in part from objections to “general warrants” used by the British king’s customs inspectors before the American Revolution.
Evidence gathered by the government in violation of the Fourth Amendment is generally subject to what is called the “exclusionary rule,” meaning that the evidence can be excluded from the criminal trial.
Telephone wiretap law
has been important to the last century of Fourth Amendment jurisprudence.
1928 case of Olmstead v. United States, a majority of the Supreme Court held that no warrant was required for wiretaps conducted on telephone company wires outside of the suspect’s building
Supreme Court overruled Olmstead in the 1967 case of Katz v. United States. (warrantless wiretapping is not okay, Olmstead was on a telephone wire, not protected by 4th amendment) not allowed right now except for exception - Unless suspected of terrorism hard to get info
The majority stated: “What a person knowingly exposes to the public, even in his own home or office, is not a subject of Fourth Amendment protection.
What he seeks to preserve as private, even in an area accessible to the public, may be constitutionally protected
Statutes That Go Beyond Fourth Amendment Protections
A number of federal statutes affect law enforcement access to personal information.
Some of the statutes placed additional requirements on law enforcement after the Supreme Court held that the Constitution did not require search warrants in the relevant circumstances.
The Wiretap Act, Electronic Communications Privacy Act, and Stored Communications Act
From strictest to most permissive, federal law has different rules for
Telephone monitoring and other tracking of oral communications
Privacy of electronic communications
Video surveillance, for which there is little applicable law.
Intercepting Communications
Federal law is generally strict in prohibiting wiretaps of telephone calls.
applies to “wire communications,” which includes a phone call or other aural communication made through a network.
The Electronic Communications Privacy Act ("ECPA") was passed in 1986 to expand and revise federal wiretapping and electronic eavesdropping provisions.
It was enacted to create and promote " the privacy expectations of citizens and the legitimate needs of law enforcement.
Stored Communications
The SCA was enacted as part of ECPA in 1986.
Creates a general prohibition against the unauthorized acquisition, alteration or blocking of electronic communications while in electronic storage in a facility through which an electronic communications service is provided.
ECPA included amendments to the Wiretap Act, created the Stored Communications Act, and created the Pen Register Act.
As for interceptions, violations can lead to criminal penalties or a civil lawsuit.
United States itself cannot be sued under ECPA, but evidence that is gathered illegally cannot be introduced in court.
Under § 2703, an administrative subpoena, a National Security Letter ("NSL"), can be served on a company to compel it to disclose basic subscriber information
The Communications Assistance to Law Enforcement Act
The U.S. Communications Assistance to Law Enforcement Act of 1994 (CALEA) (sometimes referred to as the Digital Telephony Bill) lays out the duties of defined actors in the telecommunications industry to cooperate in the interception of communications for law enforcement and other needs relating to the security and safety of the public
Cybersecurity Information Sharing Act
The Cybersecurity Information Sharing Act (CISA) became law in 2015.
The statute permits the federal government to share unclassified technical data with companies about how networks have been attacked and how successful defenses against such attacks have been carried out.
Specific provisions of CISA include:
Authorization for a company to share or receive “cyber threat indicators” or “defensive measures.”
Requirement for company to remove personal information before sharing.
Sharing information with federal government does not waive privileges.
Shared information exempt from federal and state FOIA laws.
Prohibition on government using shared information to regulate or take enforcement actions against lawful activities
Authorization for company’s monitoring and operating defensive measures.
Protection from liability for monitoring activities.
Right to Financial Privacy Act
The special requirements of the Right to Financial Privacy Act (RFPA) of 1978 apply to disclosures by a variety of financial institutions, including banks, credit card companies and consumer finance companies.
RFPA states that “no Government authority may have access to or obtain copies of, or the information contained in the financial records of any customer from a financial institution unless the financial records are reasonably described” and meet at least one of these conditions:
The customer authorizes access
There is an appropriate administrative subpoena or summons
There is a qualified search warrant
There is an appropriate judicial subpoena
There is an appropriate formal written request from an authorized government authority
Media Records and the Privacy Protection Act
The Privacy Protection Act (PPA) of 1980 provides an extra layer of protection for members of the media and media organizations from government searches or seizures in the course of a criminal investigation.
Newspapers/Journalists - benefit of this act and protection unreasonable turnover.
Evidence Stored in a Different Country
With the growth of cloud storage of records, including by web email and social network providers, evidence for a criminal case is more frequently held in a different country, a phenomenon that has been called “the globalization of criminal evidence.”
other governments have had to meet the requirements of U.S. law, such as ECPA, to gain access to email, social network, or other electronic evidence held by these companies.
Compared with the law enforcement issues discussed in the previous section, somewhat different rules and issues arise when the government seeks personal information for national security purposes.
Introduction to Debates About National Security Surveillance
National security wiretaps and other national security searches create a fundamental constitutional question
USA PATRIOT Act
Supporters of broader surveillance argued that foreign intelligence wiretaps should be used more often and with more flexible legal limits.
FISA
Congress accessed FISA once again, notably in the FISA Amendment Act of 2008.
This statute gave legal authorization to some of the new surveillance practices, especially where one party to the communication is reasonably believed to be outside of the United States.
Overview of The Foreign Intelligence Surveillance Act
FISA establishes standards and procedures for electronic surveillance that collects “foreign intelligence” within the United States
FISA orders can issue when foreign intelligence gathering is “a significant purpose” of the investigation.
Section 702 applies to collection of electronic communications that take place within the United States and only authorizes access to the communications of targeted individuals for listed foreign intelligence purposes.
Section 702
Section 702 refers to a provision in the Foreign Intelligence Surveillance Act Amendments Act of 2008, which revised FISA
Section 702 can provide access to the full contents of communications, and not just metadata such as to/from information.
Section 215 Orders
Section 215 of the USA PATRIOT Act stated that the National Security Agency (NSA) had created a database containing a substantial fraction of call detail information for domestic U.S. telephone calls.
National Security Letters
An NSL is a category of subpoena that, prior to the PATRIOT Act in 2001, was used narrowly, only for certain financial and communication records of an agent of a foreign power, and only with approval of FBI headquarters.
Separate and sometimes differing statutory provisions now govern access, without a court order, to communication providers, financial institutions, consumer credit agencies and travel agencies
NSLs can be issued by authorized officials, often the special agent in charge of an FBI field office.
The precise language in the statutes varies, but NSLs generally can seek records relevant to protect against international terrorism or clandestine intelligence activities.
NSLs can be issued without any judicial involvement.
Many privacy issues can arise in the course of investigations and litigation.
Companies can face complex legal rules about when they are required to or forbidden from disclosing personal information, and when they have a choice about whether to do so.