THE FOLLOWING DOCUMENTS ARE PROVIDED FOR

advertisement
THE FOLLOWING DOCUMENTS ARE PROVIDED FOR
INFORMATIONAL PURPOSES ONLY AND SHOULD NEITHER BE
CONSTRUED AS LEGAL ADVICE NOR RELIED UPON IN LIEU
OF CONSULTATION WITH LEGAL COUNSEL.
Responding to Law Enforcement
Quiz
1.
At 10:00 p.m. a man appears at the circulation desk, states that he is a
government agent with a warrant and demands that you “move out of the
way” from the circulation terminal without touching it. You should
a.
b.
c.
d.
e.
f.
g.
2.
inform the agent that he will need to present ID and that you will have
a copy of the warrant sent to the University Legal Counsel’s office
(who will respond to his request).
ask the agent to wait until morning so that staff can contact University
Counsel’s Office and Bob Burger.
ask the agent to wait until you have contacted central circulation.
demand ID and to see the warrant, then indicate to the agent that he
has permission to search and leave the area.
demand ID and to see the warrant, then indicate to the agent that he
has permission to search and step away and contact central circulation.
leave and contact central circulation.
step away and contact central circulation.
At 10:00 p.m. a woman appears at the circulation desk, states that she is a
police officer with a subpoena and demands that you immediately turn over all
circulation records pertaining to Paul Healey. You should
a.
b.
c.
d.
e.
f.
g.
inform the officer that she will need to see the University Librarian in
the morning.
ask the officer to wait until morning so that staff can contact
University Counsel’s Office.
ask the officer to provide ID and to wait until you have contacted
central circulation.
indicate to the officer that she has permission to search and leave the
area.
indicate to the officer that she has permission to search and step away
and contact central circulation.
leave and contact central circulation.
step away and contact central circulation.
January 18, 2001
THE SEARCH & SEIZURE OF ELECTRONIC INFORMATION: THE LAW BEFORE AND AFTER THE USA PATRIOT ACT1
*Changes made by the USA PATRIOT Act appear in bold.
TYPE OF
INFORMATION
SOUGHT
Basic subscriber
information
(e.g. name, address,
billing records,
telephone number,
length of service,
type of service,
payment
information,
session times and
duration, network
addresses)
How Can Government Authorities Compel Disclosure?
Type Of Legal
Process2
Subpoena
[18 USC
§ 2703(c)]
Standard To Be
Met Before
Issuance
Relevant to
investigation
How Issued
Signed by prosecutor (if
grand jury) or by agent (if
administrative)
Court order
[18 USC
§ 2703(d)]
Specific and
articulable facts
Court issues order upon
government showing that
meets standard
Search warrant
[18 USC
§ 2703(c)(1)(C)]
Probable Cause
FISA order
(subpoena)
[50 USC § 1862]
Business records
related to
terrorism or
clandestine
intelligence
activities6
Court issues warrant upon
application supported by
affidavit (nationwide
execution)
By secret FISA court upon
application by FBI
Wiley Rein & Fielding LLP
How Is Information
Used
Criminal and
administrative
investigations; to any
other Federal official if
consistent with “foreign
intelligence exception”4
Criminal investigations;
foreign intelligence
exception
Criminal investigations;
foreign intelligence
exception
Can An Organization Make A Voluntary
Disclosure To Government Authorities?
Public Provider3
Non-Public Provider
No
No
[18 USC § 2702]
[18 USC § 2702]
(but other exceptions
apply, including
emergency where
provider reasonably
believes there is
immediate danger of
death or serious
physical injury
(“emergency
exception”)5
(but other exceptions
apply, including
emergency exception)
Intelligence investigations
http://www.ala.org/washoff/matrix.pdf
TYPE OF
INFORMATION
SOUGHT
Transaction and
account records
How Can Government Authorities Compel Disclosure?
Type Of Legal
Process2
Standard To Be
Met Before
Issuance
No
[18 USC § 2702]
[18 USC § 2702]
Probable Cause
Court issues warrant upon
application supported by
affidavit (nationwide
execution)
Criminal investigations;
foreign intelligence
exception
(but exceptions apply,
including consent and
emergency
exception)
(but exceptions apply,
including consent and
emergency exception)
Business records
related to
terrorism or
clandestine
intelligence
activities
Probable Cause
By secret FISA court upon
application by FBI
Intelligence investigations
Court issues warrant upon
application supported by
affidavit (nationwide
execution)
Criminal investigations;
foreign intelligence
exception
No
Yes
[18 USC § 2702(a)(1)]
[18 USC § 2702(a)(1)]
(but exceptions apply
including emergency
exception)
No
Yes
[18 USC § 2702(a)(1)]
[18 USC § 2702(a)(1)]
FISA order
(subpoena)
[50 USC § 1862]
Subpoena with
notice to target
[18 USC
§ 2703(a)]
Relevant to
investigation
Signed by prosecutor (if
grand jury) or by agent (if
administrative)
Criminal and admin.
investigations; foreign
intelligence exception
Court order with
notice to target
[18 USC
§ 2703(d)]
Specific and
articulable facts
Court issues order upon
government showing that
meets standard
Criminal investigations;
foreign intelligence
exception
Search warrant
[18 USC
§ 2703(a) & (b)]
Probable Cause
Court issues warrant upon
application supported by
affidavit (nationwide
execution)
Criminal investigations;
foreign intelligence
exception
Wiley Rein & Fielding LLP
Non-Public Provider
No
Search warrant
[18 USC
§ 2703(c)(1)(B)]
E-mail not opened
by user that has
been in electronic
storage more than
180 days
Public Provider3
Criminal investigations;
foreign intelligence
exception
Specific and
articulable facts
Search warrant
How Is Information
Used
Court issues order upon
government showing that
meets standard
Court order
[18 USC
§ 2703(d)]
E-mail not opened
by user that has
been in electronic
storage less than
180 days
How Issued
Can An Organization Make A Voluntary
Disclosure To Government Authorities?
(but exceptions apply
including emergency
exception)
http://www.ala.org/washoff/matrix.pdf
TYPE OF
INFORMATION
SOUGHT
E-mail that has been
opened by the user
How Can Government Authorities Compel Disclosure?
Type Of Legal
Process2
Subpoena with
notice to target
Standard To Be
Met Before
Issuance
Relevant to
investigation
How Is Information
Used
Non-Public Provider
Criminal and admin.
investigations; foreign
intelligence exception
No
Yes
[18 USC § 2702(a)(2)]
[18 USC § 2702(a)(2)
and § 2711(2)]
(but exceptions apply
including emergency
exception)
Specific and
articulable facts
Court issues order upon
government showing that
meets standard
Criminal investigations;
foreign intelligence
exception
Search warrant
Probable Cause
Court issues warrant upon
application supported by
affidavit (nationwide
execution)
Criminal investigations;
foreign intelligence
exception
Search warrant
[18 USC
§ 703(b)]
Probable Cause
Court issues warrant upon
application supported by
affidavit (nationwide
execution)
Criminal investigations;
foreign intelligence
exception
Wiretap order
[18 USC
§ 2516(1)]
Probable cause that
target committed
one of list of serious
crimes (including
terrorism and
computer crimes)
Court issues warrant upon
application supported by
affidavit
Criminal investigations;
foreign intelligence
exception
Wiley Rein & Fielding LLP
Public Provider3
Signed by prosecutor (if
grand jury) or by agent (if
administrative)
Court order with
notice to target
[18 USC
§ 2703(b) &
18 USC § 2705]
Stored voice-mails
that were
transmitted via
computer
How Issued
Can An Organization Make A Voluntary
Disclosure To Government Authorities?
No
Yes
[18 USC § 2702(a)(1)]
[18 USC § 2702(a)(1)]
(but exceptions apply
including emergency
exception)
http://www.ala.org/washoff/matrix.pdf
TYPE OF
INFORMATION
SOUGHT
Real-time
interception of noncontent information
(including dialing,
routing,
addressing,
signaling
information, IP
addresses and port
numbers, “to” and
“from”
information in email header)
Real-time
interception of
electronic
communications
(content)
How Can Government Authorities Compel Disclosure?
Type Of Legal
Process2
Pen/Trap Order
[18 USC § 3122]
FISA order
(pen/trap)
[50 USC
§ 1842(c)]
Wiretap order
[18 USC
§ 2516(1)]
FISA order
(wiretap)
[50 USC § 1805]
Wiley Rein & Fielding LLP
Standard To Be
Met Before
Issuance
Relevant to a
criminal
investigation
Concern foreign
intelligence, do not
concern a U.S.
citizen, or do
concern U.S.
citizen and protect
against terrorism
or intelligence
activities
Probable cause that
target committed
one of list of serious
crimes (including
terrorism and
computer crimes)
Target is foreign
agent and a
significant purpose
is to gather foreign
intelligence
How Issued
How Is Information
Used
Court issues order upon
government showing that
meets standard
(nationwide execution)
(device can now be placed
on computer)
By secret FISA court upon
application by Attorney
General
Criminal investigations;
foreign intelligence
exception
Court issues warrant upon
application supported by
affidavit
Criminal investigations;
foreign intelligence
exception
By secret FISA court upon
application by Attorney
General (can be executed
on any phone or
computer used by target)
Can An Organization Make A Voluntary
Disclosure To Government Authorities?
Public Provider3
Non-Public Provider
No
No
[18 USC § 3121]
[18 USC § 3121]
(but exceptions apply)
(but exceptions apply)
No
No
[18 USC § 2511(2)(i)]
[18 USC § 2511(2)(i)]
(but exceptions apply,
including where
provider has
reasonable grounds
to believe that target
is computer
trespasser)
(but exceptions apply,
including where
provider has
reasonable grounds to
believe that target is
computer trespasser)
Foreign intelligence
investigations
Foreign intelligence
investigations
http://www.ala.org/washoff/matrix.pdf
The information provided in this chart is not intended to provide legal guidance on the application of the statutes cited to any specific factual
situation. Please consult with counsel in order to ensure compliance with applicable law, policies and procedures.
1
The USA Patriot Act, Pub. L. No. 107-56 (2001), makes changes to over fifteen (15) different statutes. Among those statutes changed or modified are the
Electronic Communications Private Act of 1986 (ECPA), 18 U.S.C. § 2801 et. seq., the Computer Fraud and Abuse Act (CFFA), 18 U.S.C. § 1030, the Foreign
Intelligence Surveillance Act of 1978 (FISA), 50 U.S.C. § 1801 et. seq., the Family Education Rights and Private Act (FERPA), 20 U.S.C. 1232(g), the Cable
Act, 47 U.S.C. § 551, the Federal Wiretap Statute, 18 U.S.C. § 2510 et. seq., and the Federal Rules of Criminal Procedure.
2
United States law sets forth the type of legal process required before a government authority may compel the production of information from a private
individual or organization, as well as the standard that the government must meet before obtaining such process. As a general matter, the more “private” the type
of information, the higher the standard the government must meet in order to compel production. The types of legal process discussed here are as follows: (1) a
subpoena is a document that compels the production of tangible things. It can be issued by an official in connection with a grand jury investigation. In addition,
certain federal agencies have the authority to issue administrative subpoenas in connection with investigations under their authority; (2) a search warrant, which
authorizes the search of physical premises and seizure of tangible items, is issued by a court upon a showing of probable cause; (3) pen register and trap-andtrace device court orders authorize the collection of telephone and computer identifying information dialed to and from a particular communications device; (4) a
wiretap order, also issued by a court, authorizes the real-time interception of communications. Such orders require an affidavit setting forth detailed information
and establishing probable cause that the target committed one of a list of specified serious crimes; and (5) FISA orders are issued by a secret FISA court, and
allow the compulsion of information, under very strict procedures, in search of information that relates to foreign intelligence and counter-intelligence.
3
If a provider does not provide services “to the public,” then the ECPA does not place any restrictions on the disclosure of the contents. See 18 U.S.C. §
2702(a). Whether a university or library is a public or private provider will involve a fact-specific determination.
4
The USA Patriot Act added broad new information sharing authority that pertains to previously confidential information including grand jury information and
intercepted communications. Section 203(b) permits sharing of any information lawfully obtained by a law enforcement official. The officer may disclose the
contents of such communications to any other federal law enforcement official who is to receive the information to perform his official duties “to the extent such
contents include foreign intelligence or counterintelligence or foreign intelligence information.” In addition, Section 504 of the Act authorizes general
coordination between law enforcement and FISA surveillance.
5
These exceptions permit disclosure: (1) to an addressee or intended recipient of the communication or their agent; (2) as otherwise authorized in sections 2517,
2511(2)(a), or 2703 of Title 18; (3) with the lawful consent of the originator or an addressee or intended recipient of such communication, or the subscriber in the
case of remote computer service; (4) to a person employed or authorized or whose facilities are used to forward such communication to its destination; (5) as may
be necessarily incident to the rendition of the service or to the protection of the rights or property of the provider of that service; or (6) to a law enforcement
agency if the contents were inadvertently obtained by the provider and appear to pertain to the commission of a crime; or if required by section 227 of the Crime
Control Act of 1990. The USA PATRIOT Act, section 212, adds an exception and permits disclosures to law enforcement “if the emergency provider reasonably
believes that an emergency involving immediate danger of death or serious physical injury to any person requires disclosure of the information.”
Wiley Rein & Fielding LLP
http://www.ala.org/washoff/matrix.pdf
6
Previously, FISA authorized collection of business records in very limited situations, mainly records relating to common carriers, vehicles or travel, and only
via court order. The USA PATRIOT Act substantially expands this collection to all “tangible things,” including business records, that may be obtained via a
subpoena.
Wiley Rein & Fielding LLP
http://www.ala.org/washoff/matrix.pdf
REQUESTS FOR LIBRARY PATRON INFORMATION
STAFF GUIDELINES
1. State and federal laws can govern the proper release of University documents including library
users’ registration and circulation records. Legal documents such as court orders can be required
before disclosure of documents is permitted.
2. Staff who are approached by anyone requesting information about what library materials or
electronic content anyone has used or borrowed should refer them to the University Librarian
(333-0790), the Associate University Librarian (AUL) for Services (333-2293), or the AUL for
Planning and Budgeting (333-0317). Call to alert them that you have made the referral. Do not
provide the information that is being requested without consulting others as described in these
guidelines. If a law enforcement officer or other government agent presents a court order,
subpoena or other legal document after hours or on weekends, call Central Circulation (2440732), where someone will be designated to handle the request. All law enforcement or other
government agents should be asked to provide proper identification and a record of this
information should be made.
3. Legal Counsel (333-0560) will be called by the Library administrator to whom the requestor of
information has been referred immediately upon receipt of the referral to allow Legal Counsel to
review the legal sufficiency of the documents presented such as court orders, search warrants,
subpoenas and summons and to provide advice, direction and guidance on compliance with such
documents.
Campus Administrative Manual at III-14: “Legal documents received by all campus offices should be sent immediately to the Campus Legal Counsel for appropriate handling.” 4. If a federal law enforcement agent or other government agent is demanding immediate
compliance, contact Campus Police (333-1216) and ask to speak with a shift supervisor to verify
the credentials of the agent and the need for immediate compliance. Campus Police will aid in
seeing that the referral is made to a Library administrator and that all reasonable attempts are
made to contact Legal Counsel for guidance before any access to information is allowed.
Date Issued: 10/21/02 Approved by: University Librarian 10/2/02 Draft
http://www.library.uiuc.edu/administration/planningbudget/policies/patronrequest.htm
Confidentiality and Coping with Law Enforcement Inquiries
Guidelines for the Library and its Staff
Increased visits to libraries by law enforcement agents, including FBI agents and officers of
state, county, and municipal police departments, are raising c onsiderable concern among the
public and the library community. These visits are not only a result of the increased
surveillance and investigation prompted by the events of September 11, 2001 and the
subsequent passage of the USA Patriot Act, but also as a result of law enforcement officers
investigating computer crimes, including email threats and possible violations of the laws
addressing online obscenity and child pornography.
These guidelines, developed to assist libraries and library staff in dealing with law enforcement
inquiries, rely upon the ALA’s Policy on the Confidentiality of Library Records, its Policy
Concerning Confidentiality of Personally Identifiable Information, and the Code of Ethics.
Fundamental Principles
Librarians’ professional ethics require that personally identifiable information about library
users be kept confidential. This principle is reflected in Article III of the Code of Ethics, which
states that "[librarians] protect each library user’s right to privacy and confidentia lity with
respect to information sought or received, and resources consulted, borrowed, acquired, or
transmitted." 1
Currently, 48 states and the District of Columbia have laws protecting the confidentiality of
library records, and the Attorneys General of the remaining two states, Hawaii and Kentucky,
have ruled that library records are confidential and may not be disclosed under the laws
governing open records. Confidential library records should not be released or made available
in any format to a federa l agent, law enforcement officer, or other person unless a court order in
proper form has been entered by a court of competent jurisdiction after a showing of good
cause by the law enforcement agency or person seeking the records.
General Guidelines
Confidentiality of library records is a basic principle of librarianship. As a matter of policy
or procedure, the library administrator should ensure that:
¤ The library staff and governing board are familiar with the ALA Policy on
Confidentiality of Library Records, the Policy Concerning Confidentiality of Personally
Identifiable Information About Library Users, and other ALA documents on users'
privacy and confidentiality.
1
While library registration records are not included in this policy, libraries must be cautious about
making these records available to third parties.
1
http://www.ala.org/alaorg/oif/guidelineslibrary.pdf
¤ The library staff and governing board are familiar with their state's library
confidentiality statute or attorney general's opinion.
¤ The library adopts a policy on users' privacy and confidentiality, which includes
procedures for the staff and board to follow if the library is served with a court order for
records or if law enforcement age nts conduct inquiries in the library.
¤ The library staff is familiar with the library's policy on confidentiality and its
procedures for handling court orders and law enforcement inquiries.
Library Procedures Affect Confidentiality
Law enforcement visit s aside, be aware that library operating procedures have an impact on confidentiality. The following recommendations are suggestions to bring library procedures into compliance with most state confidentiality statutes, ALA policies on confidentiality and its Code of Ethics:
¤ Avoid creating unnecessary records. Only record a user's personally identifiable
information when necessary for the efficient operation of the library.
¤ Avoid retaining records that are not needed for efficient operation of the libr ary. Check
with your local governing body to learn if there are laws or policies addressing record
retention and in conformity with these laws or policies, develop policies on the length
of time necessary to retain a record. Assure that all kinds and typ es of records are
covered by the policy, including data -related logs, digital records, and system backups.
¤ Be aware of library practices and procedures that place information on public view, e.g.,
the use of postcards for overdue notices or requested mate rials, staff terminals placed so
that the screens can be read by the public, sign - in sheets to use computers or other
devices, and the provision of titles of reserve requests or interlibrary loans provided
over the telephone to users' family members or ans wering machines.
Recommended Procedures for Law Enforcement Visits
Before any visit :
¤ Designate the person or persons who will be responsible for handling law enforcement
requests. In most circumstances, it should be the library director, and, if avai lable, the
library's legal counsel.
2
http://www.ala.org/alaorg/oif/guidelineslibrary.pdf
¤ Train all library staff, including volunteers, on the library's procedure for handling law
enforcement requests. They should understand that it is lawful to refer the agent or
officer to an administrator in charge of t he library, and that they do not need to respond
immediately to any request.
¤ Review the library's confidentiality policy and state confidentiality law with library
counsel.
¤ A court order may require the removal of a computer workstation or other compu ter
storage device from the library. Have plans in place to address service interruptions and
any necessary backups for equipment and software.
During the visit:
¤ Staff should immediately ask for identification if they are approached by an agent or
officer, and then immediately refer the agent or officer to the library director or other
designated officer of the institution.
¤ The director or officer should meet with the agent with library counsel or another
colleague in attendance.
¤ If the agent or o fficer does not have a court order compelling the production of records,
the director or officer should explain the library's confidentiality policy and the state's
confidentiality law, and inform the agent or officer that users' records are not available
except when a proper court order in good form has been presented to the library.
¤ Without a court order, neither the FBI nor local law enforcement has authority to
compel cooperation with an investigation or require answers to questions, other than the
name and address of the person speaking to the agent or officer. If the agent or officer
persists, or makes an appeal to patriotism, the director or officer should explain that, as
good citizens, the library staff will not respond to informal requests for co nfidential
information, in conformity with professional ethics, First Amendment freedoms, and
state law.
¤ If the agent or officer presents a court order, the library director or officer should
immediately refer the court order to the library's legal counse l for review.
3
http://www.ala.org/alaorg/oif/guidelineslibrary.pdf
If the court order is in the form of a subpoena :
¤ Counsel should examine the subpoena for any legal defect, including the manner in
which it was served on the library, the breadth of its request, its form, or an insufficient
showing of goo d cause made to a court. If a defect exists, counsel will advise on the
best method to resist the subpoena. 2
¤ Through legal counsel, insist that any defect be cured before records are released and
that the subpoena is strictly limited to require release o f specifically identified records
or documents.
¤ Require that the agent, officer, or party requesting the information submit a new
subpoena in good form and without defects.
¤ Review the information that may be produced in response to the subpoena before
releasing the information. Follow the subpoena strictly and do not provide any
information that is not specifically requested in it.
¤ If disclosure is required, ask the court to enter a protective order (drafted by the library's
counsel) keeping the inform ation confidential and limiting its use to the particular case.
Ask that access be restricted to those persons working directly on the case.
If the court order is in the form of a search warrant:
¤ A search warrant is executable immediately, unlike a subp oena. The agent or officer
may begin a search of library records as soon as the library director or officer is served
with the court's order.
¤ Ask to have library counsel present before the search begins in order to allow library
counsel an opportunity t o examine the search warrant and to assure that the search
conforms to the terms of the search warrant.
¤ Cooperate with the search to ensure that only the records identified in the warrant are
produced and that no other users' records are viewed or scanned .
2
Usually, the library can file a motion to quash the subpoena or a motion for a protective order.
Normally, a hearing is held where the court will decide if good cause exists for the subpoena or if it is
defective, and then decide whether the library must comply with the subpoena. Consult with counsel
on all issues, including the payment of costs if the library is the unsuccessful party.
4
http://www.ala.org/alaorg/oif/guidelineslibrary.pdf
If the court order is a search warrant issued under the Foreign Intelligence Surveillance Act
(FISA) (USA Patriot Act amendment):
¤ The recommendations for a regular search warrant still apply. However, a search
warrant issued by a FISA court also co ntains a "gag order." That means that no person
or institution served with the warrant can disclose that the warrant has been served or
that records have been produced pursuant to the warrant.
¤ The library and its staff must comply with this order. No information can be disclosed
to any other party, including the patron whose records are the subject of the search
warrant.
¤ The gag order does not change a library's right to legal representation during the search.
The library can still seek legal advice concerning the warrant and request that the
library’s legal counsel be present during the actual search and execution of the warrant.
¤ If the library does not have legal counsel and wishes legal advice, the library can still
obtain assistance from Jenner & Block, the Freedom to Read Foundation's legal
counsel. Simply call the Office for Intellectual Freedom (1 -800-545-2433, ext. 4223)
and inform the staff that you need legal advice. OIF staff will assure that an attorney
from Jenner & Block returns your cal l. You do not have to and should not inform OIF
staff of the existence of the warrant.
After the visit:
¤ Review the court order with library counsel to ensure that the library complies with any
remaining requirements, including restrictions on sharing information with others.
¤ Review library policies and staff response and make any necessary revisions in light of
experience.
¤ Be prepared to communicate with the news media. Develop a public information
statement detailing the principles upholding libra ry confidentiality that includes an
explanation of the chilling effect on First Amendment rights caused by public access to
users' personally identifiable information.
¤ If possible, notify the ALA about your experience by calling the Office for Intellec tual
Freedom at 800-545-2433, extension 4223.
5
http://www.ala.org/alaorg/oif/guidelineslibrary.pdf
See also:
Privacy: An Interpretation of the Library Bill of Rights
http://www.ala.org/alaorg/oif/privacyinterpretation.html
Policy on Confidentiality of Library Records
http://www.ala.org/alaorg/oif/pol_co nf.html
Policy Concerning Confidentiality of Personally Identifiable Information About Library Users
http://www.ala.org/alaorg/oif/pol_user.html
American Library Association Code of Ethics
http://www.ala.org/alaorg/oif/ethics.html
http://www.ala.org/ alaorg/oif/guidelineslibrary.html
American Library Association
Office for Intellectual Freedom
April 2002
6
http://www.ala.org/alaorg/oif/guidelineslibrary.pdf
Download