13.07.2015 Views

Vol 7 No 1 - Roger Williams University School of Law

Vol 7 No 1 - Roger Williams University School of Law

Vol 7 No 1 - Roger Williams University School of Law

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

determinative factors has been further verified.68 Where there islittle, if any established parameters, such as the FourthAmendment’s application regarding the Internet, the analysis hastended toward a narrow application <strong>of</strong> the Katz reasoning.69 Infact, the few judicial decisions expressly addressing Internettransmissions have applied the Katz reasoning very narrowly.70For instance, in United States v. Charbonneau,71 the court heldthat an individual’s expectation <strong>of</strong> privacy in electronic mail wassignificantly less than that held in posted mail.72 Also, in UnitedStates v. Kennedy,73 the court established that society would notrecognize an expectation <strong>of</strong> privacy in information a user passesonline to an ISP when contracting for Internet service.74Thus, the judicial decisions addressing personal privacy onthe Internet strongly suggest that a narrow interpretation <strong>of</strong> theKatz analysis will be applied to determine if society will recognizean expectation <strong>of</strong> privacy in URL and IP information. The firstinquiry would undoubtedly address whether Carnivore enablesaccess to the content <strong>of</strong> the electronic communications <strong>of</strong> personsnot named in a court order. It is very improbable that, under anarrow Katz application, a court would determine URL and IPinformation to be “content” because each serves a function similarto that <strong>of</strong> a telephone number. Also, if the judiciary is not willingto recognize an equal expectation <strong>of</strong> privacy in electronic mail tothat <strong>of</strong> posted mail, the probability <strong>of</strong> successfully arguing that theprotection <strong>of</strong> information can be intercepted by law enforcementwithout intrusion into the body <strong>of</strong> the electronic communication itaccompanies is minimal.The second inquiry in the Katz analysis would certainly focuson whether the individual attempted to restrict third party accessto his URL or IP information. Again, the judiciary will likelyconclude that users <strong>of</strong> the Internet must realize that they “convey”their URL information since this information must travel throughthe ISP’s network to reach whatever destination is desired.75 The68. See Minnesota v. Carter, 525 U.S. 83 (1998); see also O’Connor v. Ortega, 480U.S. 709 (1987).69. See Knopf, supra note 65, at 83.70. See Skok, supra note 1, at 72.71. 979 F. Supp. 1177 (S.D. Ohio 1997).72. Id. at 1184.73. 81 F. Supp. 2d 1103 (D. Kan. 2000).74. Id. at 1110.75. See Smith, 442 U.S. at 742 (reasoning that an individual realizes that he must

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!