6.6: Closer Examination of the Third-Party Doctrine
- Page ID
- 35661
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)
( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\id}{\mathrm{id}}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\kernel}{\mathrm{null}\,}\)
\( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\)
\( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\)
\( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)
\( \newcommand{\vectorA}[1]{\vec{#1}} % arrow\)
\( \newcommand{\vectorAt}[1]{\vec{\text{#1}}} % arrow\)
\( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vectorC}[1]{\textbf{#1}} \)
\( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)
\( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)
\( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)One might be surprised to learn how much authority the “reasonable man” wields in the judiciary. The Supreme Court defers to the judgment of this reasonable man when it distinguishes between police brutality and justified conduct and when it determines negligence in tort law. In 2018, the U.S. Court of Appeals for the Second Circuit even used the “reasonable man” test to decide whether “Whole Grain” Cheez-Its were labeled deceptively. (They were.)
While those domains are certainly important, perhaps the reasonable man’s greatest responsibility is differentiating between information that is entitled to privacy and information that is not. Specifically, the reasonable man is charged with determining whether a citizen’s personal digital records (such as bank records, phone records, and smart device data) can be accessed by the authorities without a warrant.
Learn more about reasonable expectation of privacy in this video: reasonable expectation of privacy.
*If you are accessing a print version of this book, type the following short url into your browser to visit this source: bit.ly/3mI60Oz
The Supreme Court applies a reasonable expectation of privacy test to determine when police need a warrant to collect someone’s personal records. If it is “reasonable” to expect that the information in question will remain private, then the police need a warrant to access it. But expecting information that is shared with third parties to remain private has consistently been considered unreasonable by the Court. Because a “reasonable expectation of privacy” doesn’t attach to records stored by third parties, the police do not need a warrant to collect that information. Common examples of these third parties include phone service providers, financial institutions, and parent companies of smart technologies that store data, such as Amazon, Nest, and Google. The Court’s rationale is that information relinquished to a third party cannot reasonably be expected to remain private and thus is not protected by the Fourth Amendment. A famous application of this logic was the Supreme Court’s ruling that the Fourth Amendment allows for the warrantless collection of garbage from outside of a suspect’s home. So, in terms of Fourth Amendment protection, is the trash at the end of your driveway equivalent to your banking records? In the eyes of the Supreme Court, the answer is yes.
This standard has come to be known as the Third Party Doctrine, and it has already been used to allow the warrantless collection of email records, banking records, and internet browsing data. Consideration of this issue is important because as we continue to integrate advanced technologies into our daily lives, the Third Party Doctrine has the potential to erode our Fourth Amendment protection from searches and seizures conducted without a warrant.
Learn more about third-party doctrine in this video: third-party doctrine.
*If you are accessing a print version of this book, type the following short url into your browser to visit this source: bit.ly/3xtpJXk
The Third-Party Doctrine spawned from Justice Harlan’s “Reasonable Expectation of Privacy Test,” first promulgated in Katz v. United States (1967). However, there is a critical distinction between the Third Party Doctrine and the Reasonable Expectation of Privacy Test. The Test established that citizens are entitled to Fourth Amendment protections only if the government violates that citizen’s “reasonable expectation of privacy.” By contrast, the Third Party Doctrine argues that any information shared with a third party is automatically ineligible for Fourth Amendment protection because it lacks any reasonable expectation of privacy by virtue of its relinquishment.
The Third-Party Doctrine and Reasonable Expectation of Privacy Test are fully compatible in some—perhaps even most—situations. Suppose, for instance, that during a celebratory dinner, you discuss your latest bank heist with your accomplice. If the conversation is loud enough that patrons sitting in the next booth overhear your conversation and report you to the police, you cannot claim that your Fourth Amendment right was violated. There is no reasonable expectation of privacy when openly discussing your crimes in public. The tension between the Doctrine and the Test only emerges when the third-party information in question can reasonably be expected to remain private.
Today, third parties have access to more data than ever before. Americans unwittingly share heaps of data with third parties daily: Every phone call, email, text, ATM withdrawal, and debit card purchase that you make is shared with a third party. If you have a smartphone, your location is automatically shared with a third party. Any conversation that you have with an Amazon Alexa is stored in the cloud (a third party). If you happen to install a Nest Learning Thermostat in your home, it “can use sensors and your phone’s location to check if you’ve left, then set itself to an Eco Temperature to save energy.”9 If we view this energy-saving technique through the lens of the Third Party Doctrine, we quickly see that law enforcement agents can legally check whether someone was home at a particular time by subpoenaing Nest and then examining that specific person’s Nest records.