Home Is Where Your Modem Is: An Appropriate Application of Search and Seizure Law to Electronic Mail

By Bertron, Megan Connor | American Criminal Law Review, Fall 1996 | Go to article overview

Home Is Where Your Modem Is: An Appropriate Application of Search and Seizure Law to Electronic Mail


Bertron, Megan Connor, American Criminal Law Review


I. Introduction

"For people who want privacy, there may be no place like home."(1)

A person's home not only provides a shield from nosy neighbors; the home also provides protection from an intrusive government. While Fourth Amendment protections have continued to erode in many areas, the home has maintained its highly protected status,(2) and police generally must have a warrant to enter a person's home without consent.(3) When a person leaves home, expectations of privacy diminish because her actions are exposed to the public eye and she can no longer expect the same seclusion that is afforded by the closed doors of her home. When a person remains inside her home, however, and writes a letter or places a telephone call, she expects heightened privacy protection despite using semi-public means of communication. This is because she is still within the confines of that ultimate place of privacy -- the home -- and she has made her desire for privacy clear.

Despite this healthy respect for the home in American privacy law, those Americans with homes in "cyberspace" do not necessarily have an equal amount of privacy protection from law enforcement. In particular, while first class mail is protected on an equal footing with a person's home, cyberspace mail is not equally protected but is instead provided even less protection than telephone communications.

In 1966, when telephone communications were experiencing increased threats to privacy from advanced surveillance technologies, Alan Westin observed that "[p]rospects for physical surveillance technology in the coming decade indicate that the problem of insulating private conduct will be further intensified."(5) The Supreme Court and Congress responded with legal doctrines to protect telephone conversations.(6) In the 1990s, prospects for electronic surveillance likewise threaten the privacy of millions of Americans who send electronic mail (e-mail) from their cyberspace homes over the Internet to friends, family, and other acquaintances. Despite the intervening decades, surveillance technologies continue to threaten the same "sense of privacy that is of concern most often in ordinary life" -- informational privacy.(7) At its most basic level, informational privacy refers to an individual's interest in controlling how, when, and where personal information is disseminated. Without the ability to control this dissemination, individuals lose their senses of autonomy(8) and personhood.(9)

Among the greatest legal protectors of informational privacy is the Fourth Amendment. The Amendment protects "persons, houses, papers, and effects" from unreasonable search and seizure by the government.(10) "The peculiar immunity that the law has thrown around the dwelling house of man"(11) reflects society's desire to have a place of retreat and ultimate privacy that is out of reach of all others.(12) Similarly, the law provides equal protection to first class mail because of its highly private nature -- as evidenced by the sender's use of an envelope to shield the contents before briefly releasing it into public hands for transmission.

Opposing these Fourth Amendment privacy interests are the law enforcement concerns of the government. As new technologies have developed that enable criminals to hide evidence of crime behind the shield of the Fourth Amendment, legislatures and the courts have developed a series of exceptions to the warrant requirement as well as special statutory rules for the most problematic tools used by criminals -- including telephone communications. The current dilemma faced by lawmaking bodies is how to maintain the privacy protections guaranteed by the Constitution in the face of technologies, such as electronic mail, that make the planning and commission of crime even more efficient.

This Note argues that first class mail receives greater privacy protection than telephone communications and that because e-mail is more comparable to first class mail, it deserves this greater privacy protection. …

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Default project is now your active project.
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

Home Is Where Your Modem Is: An Appropriate Application of Search and Seizure Law to Electronic Mail
Settings

Settings

Typeface
Text size Smaller Larger Reset View mode
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited passage

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.