Supreme Court Decision

Personal Rights and the Expectation of Privacy in the Digital Age


Warning: file_get_contents(https://efzcsfrbk8x.exactdn.com/wp-content/uploads/2017/12/CB-Seal-White-250.png): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /home/chesle6/public_html/wp-includes/class-wp-image-editor-imagick.php on line 156

From Chesley Brown International

Risk Management

[dpArticleShare]

In Major Privacy Case, Court Rules Law Enforcement Must Obtain Warrant To Track Cellphone Data.

 

In a recent ruling by the Supreme Court in the case of Carpenter v. United States, the court held in a 5-4 decision authored by Chief Justice Roberts, that the government violates the Fourth Amendment of the Constitution by accessing historical records containing physical locations of cellphones without a search warrant. Emergencies, such as child abductions and bomb threats, are excluded from the ruling, where the “need to protect threatened individuals, pursue suspects or prevent destruction of evidence” exists. Prior to this case, government entities could obtain cellphone location records by claiming the information was required as part of an investigation.

Chief Justice John G. Robert Jr. wrote “We decline to grant the state unrestricted access to a wireless carrier’s database of physical location information.

In this case, authorities gathered real-time location data over a span of 127 days. The data collected showed Tim Carpenter near each robbery as it occurred. With this data they were able to connect him to a string of robberies of Radio Shack and T-Mobile stores, for which he was convicted and sentenced to 116 years in prison.

Almost everyone has a cell phone as a necessary extension of themselves, and phones go everywhere we do. Cell phone data tracks a person’s every move including where they slept, where they go, and which church, if any, they attend.

If unrestricted access were allowed, with the increasing number of cell phone towers and developing cell phone technology, the user’s every action and location could be easily determined within 50 feet - a virtually time-stamped documentation of their every move.

Cell phone data could assist law enforcement in the pursuit, capture and prosecution of terrorists, serial killers, rapists, and other threatening menaces to society. The challenge has been to uphold the Fourth Amendment while also adapting to the technology of the digital age.

Generally, a warrant must now be obtained by authorities for this information.

According to Chief Justice Roberts, the data in one’s cell phone compares to the wearing of an ankle monitor, providing “near perfect surveillance”.

In his opinion, the Constitution must adapt to the evolution of the “vast technological changes”.

You may also feel free to contact us; we are more than happy to assist you in reviewing your company's data security and storage practices. 

Always be prepared. Sign up for our Mailing List

Get expert insight and analysis delivered directly to your inbox.

  • This field is for validation purposes and should be left unchanged.

How Can We Help?

Contact us today to discuss how Chesley Brown can help navigate your organization navigate around ever-evolving threats, and mitigate your risk.

Meet our Experts

Kim Meador

Executive VP & COO
(888) 711-7644 | Email

Josh Noland

VP of Operations
(888) 711-7644 | Email

Max Briggs

VP of Operations
(888) 711-7644 | Email

Mature manager meeting with warehouse worker to discuss supply chain security procedures

Supply Chain Security: Protecting Logistics Operations

By: James Hart Recent years have provided almost constant reminders about the importance of supply chains — and just how fragile they can be. Pandemics, shutdowns and natural disasters have all interrupted the orderly flow of goods to the marketplace.  Some of the biggest and most expensive disruptions have been caused by thieves, hackers, rivals…
Read More
Political unrest prevention, Community safety during elections

Last-Minute Security Tips for Election Season

Ensuring Safety and Reducing Disruptions With Election Day only a week away, businesses and community leaders are in the final sprint to prepare for any potential disruptions. While there may not be time for long-term strategies, impactful, practical steps can still help keep teams and property safe. And remember, political unrest can extend beyond Election…
Read More
Preventing mail room theft: tips for securing business mail and protecting sensitive information

Mail Room Theft and Fraud: Securing Your Business’s Mail Handling Processes

Your office building’s mail room could be an unexpectedly easy target for thieves looking to steal everything from banking information to brand-new electronics worth thousands of dollars. “In many properties, the mail room is usually out of the way and unsecured, making it incredibly easy for a criminal to steal something valuable,” said Max Briggs,…
Read More

SIGN UP FOR EXCLUSIVE INSIGHTS

Get the latest Chesley Brown insights and strategies directly in your inbox.

Sign Up Form Inline

  • This field is for validation purposes and should be left unchanged.