AI Case Brief
Generate an AI-powered case brief with:
Estimated cost: $0.001 - $0.003 per brief
Full Opinion
This case arises from the Ontario Police Departmentâs review of text messages sent and received by Jeff Quon, a Sergeant and member of the City of Ontarioâs SWAT team. We must decide whether (1) Arch Wireless Operating Company Inc., the company with whom the City contracted for text messaging services, violated the Stored Communications Act, 18 U.S.C. §§ 2701-2711 (1986); and (2) whether the City, the Police Department, and Ontario Police Chief Lloyd Scharf violated Quonâs rights and the rights of those with whom he âtextedâ â Sergeant Steve Trujillo, Dispatcher April Florio, and his wife Jerilyn Quon 1 â under the Fourth Amendment to the United States Constitution and Article I, Section 1 of the California Constitution.
I. FACTUAL BACKGROUND
On October 24, 2001, Arch Wireless (âArch Wirelessâ) contracted to provide wireless text-messaging services for the City of Ontario. The City received twenty two-way alphanumeric pagers, which it distributed to its employees, including Ontario Police Department (âOPDâ or âDepartmentâ) Sergeants Quon and Trujillo, in late 2001 or early 2002.
According to Steven Niekamp, Director of Information Technology for Arch Wireless:
A text message originating from an Arch Wireless two-way alphanumeric text-messaging pager is sent to another two-way text-messaging pager as follows: The message leaves the originating pager via a radio frequency transmission. That transmission is received by any one of many receiving stations, which are owned by Arch Wireless. Depending on the location of the receiving station, the message is then entered into the Arch Wireless computer network either by wire transmission or via satellite by another radio frequency transmis *896 sion. Once in the Arch Wireless computer network, the message is sent to the Arch Wireless computer server. Once in the server, a copy of the message is archived. The message is also stored in the server system, for a period of up to 72 hours, until the recipient pager is ready to receive delivery of the text message. The recipient pager is ready to receive delivery of a message when it is both activated and located in an Arch Wireless service area. Once the recipient pager is able to receive delivery of the text message, the Arch Wireless server retrieves the stored message and sends it, via wire or radio frequency transmission, to the transmitting station closest to the recipient pager. The transmitting stations are owed [sic] by Arch Wireless. The message is then sent from the transmitting station, via a radio frequency transmission, to the recipient pager where it can be read by the user of the recipient pager.
The City had no official policy directed to text-messaging by use of the pagers. However, the City did have a general âComputer Usage, Internet and E-mail Policyâ (the âPolicyâ) applicable to all employees. The Policy stated that â[t]he use of City-owned computers and all associated equipment, software, programs, networks, Internet, e-mail and other systems operating on these computers is limited to City of Ontario related business. The use of these tools for personal benefit is a significant violation of City of Ontario Policy.â The Policy also provided:
C.Access to all sites on the Internet is recorded and will be periodically reviewed by the City. The City of Ontario reserves the right to monitor and log all network activity including e-mail and Internet use, with or without notice. Users should have no expectation of privacy or confidentiality when using these resources.
D. Access to the Internet and the email system is not confidential; and information produced either in hard copy or in electronic form is considered City property. As such, these systems should not be used for personal or confidential communications. Deletion of e-mail or other electronic information may not fully delete the information from the system.
E. The use of inappropriate, derogatory, obscene, suggestive, defamatory, or harassing language in the e-mail system will not be tolerated.
In 2000, before the City acquired the pagers, both Quon and Trujillo had signed an âEmployee Acknowledgment,â which borrowed language from the general Policy, indicating that they had âread and fully understand the City of Ontarioâs Computer Usage, Internet and E-mail policy.â The Employee Acknowledgment, among other things, states that â[t]he City of Ontario reserves the right to monitor and log all network activity including e-mail and Internet use, with or without notice,â and that â[u]sers should have no expectation of privacy or confidentiality when using these resources.â Two years later, on April 18, 2002, Quon attended a meeting during which Lieutenant Steve Duke, a Commander with the Ontario Police Departmentâs Administration Bureau, informed all present that the pager messages âwere considered e-mail, and that those messages would fall under the Cityâs policy as public information and eligible for auditing.â Quon âvaguely recalled attendingâ this meeting, but did not recall Lieutenant Duke stating at the meeting that use of the pagers was governed by the Cityâs Policy.
*897 Although the City had no official policy expressly governing use of the pagers, the City did have an informal policy governing their use. Under the Cityâs contract with Arch Wireless, each pager was allotted 25,000 characters, after which the City was required to pay overage charges. Lieutenant Duke âwas in charge of the purchasing contractâ and responsible for procuring payment for overages. He stated that â[t]he practice was, if there was overage, that the employee would pay for the overage that the City had.... [W]e would usually call the employee and say, âHey, look, youâre over X amount of characters. It comes out to X amount of dollars. Can you write me a check for your overagef?]â â
The informal policy governing use of the pagers came to light during the Internal Affairs investigation, which took place after Lieutenant Duke grew weary of his role as bill collector. In a July 2, 2003 memorandum entitled âInternal Affairs Investigation of Jeffery Quon,â (the âMcMahon Memorandumâ) OPD Sergeant Patrick McMahon wrote that upon interviewing Lieutenant Duke, he learned that early on
Lieutenant Duke went to Sergeant Quon and told him the City issued two-way pagers were considered e-mail and could be audited. He told Sergeant Quon it was not his intent to audit employeeâs [sic] text messages to see if the overage is due to work related transmissions. He advised Sergeant Quon he could reimburse the City for the overage so he would not have to audit the transmission and see how many messages were non-work related. Lieutenant Duke told Sergeant Quon he is doing this because if anybody wished to challenge their overage, he could audit the text transmissions to verify how many were non-work related. Lieutenant Duke added the text messages were considered public records and could be audited at any time.
For the most part, Lieutenant Duke agreed with McMahonâs characterization of what he said during his interview. Later, however, during his deposition, Lieutenant Duke recalled the interaction as follows:
I think what I told Quon was that he had to pay for his overage, that I did not want to determine if the overage was personal or business unless they wanted me to, because if they said, âItâs all business, Iâm not paying for it,â then I would do an audit to confirm that. And I didnât want to get into the bill collecting thing, so he needed to pay for his personal messages so we didnât â pay for the overage so we didnât do the audit. And he needed to cut down on his transmissions.
According to the McMahon Memorandum, Quon remembered the interaction differently. When asked âif he ever recalled a discussion with Lieutenant Duke that if his text-pager went over, his messages would be audited ... Sergeant Quon said, âNo. In fact he [Lieutenant Duke] said the other, if you donât want us to read it, pay the overage fee.â â
Quon went over the monthly character limit âthree or four timesâ and paid the City for the overages. Each time, âLieutenant Duke would come and tell [him] that[he] owed X amount of dollars because [he] went over [his] allotted characters.â Each of those times, Quon paid the City for the overages.
In August 2002, Quon and another officer again exceeded the 25,000 character limit. Lieutenant Duke then let it be known at a meeting that he was âtired of being a bill collector with guys going over the allotted amount of characters on their text pagers.â In response, Chief Scharf ordered Lieutenant Duke to ârequest the transcripts of those pagers for auditing *898 purposes.â Chief Scharf asked Lieutenant Duke âto determine if the messages were exclusively work related, thereby requiring an increase in the number of characters officers were permitted, which had occurred in the past, or if they were using the pagers for personal matters. One of the officers whose transcripts [he] requested was plaintiff Jeff Quon.â
City officials were not able to access the text messages themselves. Instead, the City e-mailed Jackie Deavers, a major account support specialist for Arch Wireless, requesting the transcripts. According to Deavers,
I checked the phone numbers on the transcripts against the e-mail that I had gotten, and I looked into the system to make sure they were actually pagers that belonged to the City of Ontario, and they were. So I took the transcripts and put them in a manila envelope [and brought them to the City].
Deavers stated that she did not determine whether private messages were being released, though she acknowledged that, upon reviewing approximately four lines of the transcript, she had realized that the messages were sexually explicit. She also stated that she would only deliver messages to the âcontactâ on the account, and that she would not deliver messages to the âuserâ unless he was also the contact on the account. In this case, the âcontactâ was the City.
After receiving the transcripts, Lieutenant Duke conducted an initial audit and reported the results to Chief Scharf. Subsequently, Chief Scharf and Quonâs supervisor, Lieutenant Tony Del Rio, reviewed the transcripts themselves. Then, in October 2002, Chief Scharf referred the matter to internal affairs âto determine if someone was wasting ... City time not doing work when they should be.â Sergeant McMahon, who conducted this investigation on behalf of Internal Affairs, enlisted the help of Sergeant Glenn, also a member of Internal Affairs. Sergeant McMahon released the McMahon Memorandum on July 2, 2003. According to the Memorandum, the transcripts revealed that Quon âhad exceeded his monthly allotted characters by 15,158 characters,â and that many of these messages were personal in nature and were often sexually explicit. These messages were directed to and received from, among others, the other Appellants.
II. PROCEDURAL BACKGROUND
On May 6, 2003, Appellants filed a Second Amended Complaint in the District Court for the Central District of California alleging, inter alia, violations of the Stored Communications Act (âSCAâ) and the Fourth Amendment. After the district court dismissed one of Appellantsâ claims against Arch Wireless pursuant to Federal Rule of Civil Procedure 12(b)(6), all parties filed numerous rounds of summary judgment motions. On August 15, 2006, the district court denied Appellantsâ summary judgment motion in full, and granted in part and denied in part Appelleesâ summary judgment motions.
Appellants appeal the district courtâs holding that Arch Wireless did not violate the SCA, 18 U.S.C. §§ 2701-2711. 2 The district court found that Arch Wireless was a âremote computing serviceâ under § 2702(a), and that it therefore committed no harm when it released the text-message transcripts to its âsubscriber,â the City.
*899 Appellants also appeal the district courtâs resolution of their claims against the City, the Department, Scharf, and Glenn. 3 Appellants argue that the City, the Department, and Scharf violated Appellantsâ Fourth Amendment rights to be free from unreasonable search and seizure pursuant to 42 U.S.C. § 1983, and that the City, Department, Scharf, and Glenn violated Article I, Section 1 of the California Constitution, which protects a citizenâs right to privacy. 4 The district court addressed only the Fourth Amendment claim. 5 Relying on OâConnor v. Ortega, 480 U.S. 709, 715, 725-26, 107 S.Ct. 1492, 94 L.Ed.2d 714 (1987), the district court determined that to prove a Fourth Amendment violation, the plaintiff must show that he had a reasonable expectation of privacy in his text messages, and that the governmentâs search or seizure was unreasonable under the circumstances. The district court held that, in light of Lieutenant Dukeâs informal policy that he would not audit a pager if the user paid the overage charges, Appellants had a reasonable expectation of privacy in their text messages as a matter of law. Regarding the reasonableness of the search, the district court found that whether Chief Scharf s intent was to uncover misconduct or to determine the efficacy of the 25,000 character limit was a genuine issue of material fact. If it was the former, the search was unreasonable; if it was the latter, the search was reasonable. Concluding that Chief Scharf was not entitled to qualified immunity on the Fourth Amendment claim, and that the City and the Department were not entitled to statutory immunity on the California constitutional privacy claim, the district court held a jury trial on the single issue of Chief Scharf s intent. The jury found that Chief Scharf s intent was to determine the efficacy of the character limit. Therefore, all defendants were absolved of liability for the search.
On December 7, 2006, Appellants filed a motion to amend or alter the judgment pursuant to Federal Rule of Civil Procedure 59(e), and a motion for new trial pursuant to Rule 59(a). The district court denied each of these motions. Appellants timely appeal.
III. JURISDICTION AND STANDARD OF REVIEW
The district court had jurisdiction pursuant to 28 U.S.C. §§ 1331 and 1343. We have jurisdiction over final judgments of the district courts pursuant to 28 U.S.C. § 1291.
We review a district courtâs grant of summary judgment de novo. Bagdadi v. Nazar, 84 F.3d 1194, 1197 (9th Cir.1996). In reviewing the grant of summary judgment, we âmust determine, viewing the *900 evidence in the light most favorable to the nonmoving party, whether genuine issues of material fact exist and whether the district court correctly applied the relevant substantive law.â Id.
IV. DISCUSSION
A. Stored Communications Act
Congress passed the Stored Communications Act in 1986 as part of the Electronic Communications Privacy Act. The SCA was enacted because the advent of the Internet presented a host of potential privacy breaches that the Fourth Amendment does not address. See Orin S. Kerr, A Userâs Guide to the Stored Communications Act, and a Legislatorâs Guide to Amending It, 72 Geo. Wash. L. Rev. 1208, 1209-13 (2004). Generally, the SCA prevents âprovidersâ of communication services from divulging private communications to certain entities and/or individuals. Id. at 1213. Appellants challenge the district courtâs finding that Arch Wireless is a âremote computing serviceâ (âRCSâ) as opposed to an âelectronic communication serviceâ (âECSâ) under the SCA, §§ 2701-2711. The district court correctly concluded that if Arch Wireless is an ECS, it is liable as a matter of law, and that if it is an RCS, it is not liable. However, we disagree with the district court that Arch Wireless acted as an RCS for the City. Therefore, summary judgment in favor of Arch Wireless was error.
Section 2702 of the SCA governs liability for both ECS and RCS providers. 18 U.S.C. § 2702(a)(l)-(2). The nature of the services Arch Wireless offered to the City determines whether Arch Wireless is an ECS or an RCS. As the Niekamp Declaration makes clear, Arch Wireless provided to the City a service whereby it would facilitate communication between two pagers â âtext messagingâ over radio frequencies. As part of that service, Arch Wireless archived a copy of the message on its server. When Arch Wireless released to the City the transcripts of Appellantsâ messages, Arch Wireless potentially ran afoul of the SCA. This is because both an ECS and RCS can release private information to, or with the lawful consent of, âan addressee or intended recipient of such communication,â id. § 2702(b)(1), (b)(3), whereas only an RCS can release such information âwith the lawful consent of ... the subscriber.â Id. § 2702(b)(3). It is undisputed that the City was not an âaddressee or intended recipient,â and that the City was a âsubscriber.â
The SCA defines an ECS as âany service which provides to users thereof the ability to send or receive wire or electronic communications.â Id. § 2510(15). The SCA prohibits an ECS from âknowingly divulg[ing] to any person or entity the contents of a communication while in electronic storage by that service,â unless, among other exceptions not relevant to this appeal, that person or entity is âan addressee or intended recipient of such communication.â Id. § 2702(a)(1), (b)(1), (b)(3). âElectronic storageâ is defined as â(A) any temporary, intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof; and (B) any storage of such communication by an electronic communication service for purposes of backup protection of such communication.â Id. § 2510(17).
An RCS is defined as âthe provision to the public of computer storage or processing services by means of an electronic communications system.â Id. § 2711(2). Electronic communication system â which is simply the means by which an RCS provides computer storage or processing services and has no bearing on how we interpret the meaning of âRCSâ â is defined as âany wire, radio, electromagnetic, photooptical or photoeleetronic facilities *901 for the transmission of wire or electronic communications, and any computer facilities or related electronic equipment for the electronic storage of such communications.â Id. § 2510(14). The SCA prohibits an RCS from âknowingly divulg[ing] to any person or entity the contents of any communication which is carried or maintained on that service.â Unlike an ECS, an RCS may release the contents of a communication with the lawful consent of a âsubscriber.â Id. § 2702(a)(2), (b)(3).
We turn to the plain language of the SCA, including its common-sense definitions, to properly categorize Arch Wireless. An ECS is defined as âany service which provides to users thereof the ability to send or receive wire or electronic communications.â 18 U.S.C. § 2510(15). On its face, this describes the text-messaging pager services that Arch Wireless provided. Arch Wireless provided a âserviceâ that enabled Quon and the other Appellants to âsend or receive ... electronic communications,â i.e., text messages. Contrast that definition with that for an RCS, which âmeans the provision to the public of computer storage or processing services by means of an electronic communications system.â Id. § 2711(2). Arch Wireless did not provide to the City âcomputer storageâ; nor did it provide âprocessing services.â By archiving the text messages on its server, Arch Wireless certainly was âstoringâ the messages. However, Congress contemplated this exact function could be performed by an ECS as well, stating that an ECS would provide (A) temporary storage incidental to the communication; and (B) storage for backup protection. Id. § 2510(17).
This reading of the SCA is supported by its legislative history. The Senate Report identifies two main services that providers performed in 1986:(1) data communication; and (2) data storage and processing. First, the report describes the means of communication of information:
[W]e have large-scale electronic mail operations, computer-to-computer data transmissions, cellular and cordless telephones, paging devices, and video teleconferencing .... [M]any different companies, not just common carriers, offer a wide variety of telephone and other communications services.
S. Rep. No. 99-541, at 2-3 (1986), U.S.Code Cong. & Admin.News 1986, pp. 3555, 3556-3557. Second,
[t]he Committee also recognizes that computers are used extensively today for the storage and processing of information. With the advent of computerized recordkeeping systems, Americans have lost the ability to lock away a great deal of personal and business information. For example, physicians and hospitals maintain medical files in offsite data banks, businesses of all sizes transmit their records to remote computers to obtain sophisticated data processing services. These services as well as the providers of electronic mail create electronic copies of private correspondence for later reference. This information is processed for the benefit of the user but often it is maintained for approximately 3 months to ensure system integrity.
Id. at 3. Under the heading âRemote Computer Services,â the Report further clarifies that term refers to the processing or storage of data by an off-site third party:
In the age of rapid computerization, a basic choice has faced the users of computer technology. That is, whether to process data inhouse on the userâs own computer or on someone elseâs equipment. Over the years, remote computer service companies have developed to provide sophisticated and convenient computing services to subscribers and customers from remote facilities. Today *902 businesses of all sizes â hospitals, banks and many others â use remote computing services for computer processing. This processing can be done with the customer or subscriber using the facilities of the remote computing service in essentially a time-sharing arrangement, or it can be accomplished by the service provider on the basis of information supplied by the subscriber or customer. Data is most often transmitted between these services and their customers by means of electronic communications.
Id. at 10-11.
In the Senate Report, Congress made clear what it meant by âstorage and processing of information.â It provided the following example of storage: âphysicians and hospitals maintain medical files in off-site data banks.â Congress appeared to view âstorageâ as a virtual filing cabinet, which is not the function Arch Wireless contracted to provide here. The Senate Report also provided an example of âprocessing of informationâ: âbusinesses of all sizes transmit their records to remote computers to obtain sophisticated data processing services.â In light of the Reportâs elaboration upon what Congress intended by the term âRemote Computer Services,â it is clear that, before the advent of advanced computer processing programs such as Microsoft Excel, businesses had to farm out sophisticated processing to a service that would process the information. See Kerr, 72 Geo. Wash. L. Rev. at 1213-14. Neither of these examples describes the service that Arch Wireless provided to the City.
Any lingering doubt that Arch Wireless is an ECS that retained messages in electronic storage is disposed of by Theofel v. Farey-Jones, 359 F.3d 1066, 1070 (9th Cir.2004). In Theofel, we held that a provider of e-mail services, undisputedly an ECS, stored e-mails on its servers for backup protection. Id. at 1075. NetGate was the plaintiffsâ Internet Service Provider (âISPâ). Pursuant to a subpoena, NetGate turned over plaintiffsâ e-mail messages to the defendants. We concluded that plaintiffsâ e-mail messages â which were stored on NetGateâs server after delivery to the recipient â were âstored âfor purposes of backup protectionâ .... within the ordinary meaning of those terms.â Id. (citation omitted).
The service provided by NetGate is closely analogous to Arch Wirelessâs storage of Appellantsâ messages. Much like Arch Wireless, NetGate served as a conduit for the transmission of electronic communications from one user to another, and stored those communications âas a âbackupâ for the user.â Id. Although it is not clear for whom Arch Wireless âarchivedâ the text messages â presumably for the user or Arch Wireless itself â it is clear that the messages were archived for âbackup protection,â just as they were in Theofel. Accordingly, Arch Wireless is more appropriately categorized as an ECS than an RCS.
Arch Wireless contends that our analysis in Theofel of the definition of âbackup protectionâ supports its position. There, we noted that â[wjhere the underlying message has expired in the normal course, any copy is no longer performing any backup function. An ISP that kept permanent copies of temporary messages could not fairly be described as âbacking upâ those messages.â Id. at 1070. Thus, the argument goes, Arch Wirelessâs permanent retention of the Appellantsâ text messages could not have been for backup purposes; instead, it must have been for storage purposes, which would require us to classify Arch Wireless as an RCS. This reading is not persuasive. First, there is no indication in the record that Arch Wireless retained a permanent copy of the text- *903 messages or stored them for the benefit of the City; instead, the Niekamp Declaration simply states that copies of the messages are âarchivedâ on Arch Wirelessâs server. More importantly, Theofelâs holding â that the e-mail messages stored on NetGateâs server after delivery were for âbackup protection,â and that NetGate was undisputedly an ECS' â -forecloses Arch Wirelessâs position.
We hold that Arch Wireless provided an âelectronic communication serviceâ to the City. The parties do not dispute that Arch Wireless acted âknowinglyâ when it released the transcripts to the City. When Arch Wireless knowingly turned over the text-messaging transcripts to the City, which was a âsubscriber,â not âan addressee or intended recipient of such communication,â it violated the SCA, 18 U.S.C. § 2702(a)(1). Accordingly, judgment in Appellantsâ favor on their claims against Arch Wireless is appropriate as a matter of law, and we remand to the district court for proceedings consistent with this holding.
B. Fourth Amendment
Appellants assert that they are entitled to summary judgment on their Fourth Amendment claim against the City, the Department, and Scharf, and on their California constitutional privacy claim against the City, the Department, Scharf, and Glenn. Specifically, Appellants agree with the district courtâs conclusion that they had a reasonable expectation of privacy in the text messages. However, they argue that the issue regarding Chief Scharfs intent in authorizing the search never should have gone to trial because the search was unreasonable as a matter of law. We agree.
âThe âprivacyâ protected by[Artiele I, Section 1 of the California Constitution] is no broader in the area of search and seizure than the âprivacyâ protected by the Fourth Amendment....â Hill v. Natâl Collegiate Ath. Assân, 7 Cal.4th 1, 30 n. 9, 26 Cal.Rptr.2d 834, 865 P.2d 633 (1994). Accordingly, our analysis proceeds under the Fourth Amendment to the United States Constitution. The Fourth Amendment protects the âright of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.â U.S. Const, amend. IV. â[T]he touchstone of the Fourth Amendment is reasonableness.â United States v. Kriesel, 508 F.3d 941, 947 (9th Cir.2007) (citing Samson v. California, 547 U.S. 843, 126 S.Ct. 2193, 2201 n. 4, 165 L.Ed.2d 250 (2006)). Under the âgeneral Fourth Amendment approach,â we examine âthe totality of the circumstances to determine whether a search is reasonable.â Id. âThe reasonableness of a search is determined by assessing, on the one hand, the degree to which it intrudes upon an individualâs privacy and, on the other, the degree to which it is needed for the promotion of legitimate governmental interests.â United States v. Knights, 534 U.S. 112, 118-19, 122 S.Ct. 587, 151 L.Ed.2d 497 (2001) (internal quotation marks omitted).
âSearches and seizures by government employers or supervisors of the private property of their employees ... are subject to the restraints of the Fourth Amendment.â OâConnor, 480 U.S. at 715, 107 S.Ct. 1492. In OâConnor, the Supreme Court reasoned that â[individuals do not lose Fourth Amendment rights merely because they work for the government instead of a private employer.â Id. at 717, 107 S.Ct. 1492. However, the Court also noted that â[t]he operational realities of the workplace ... may make some employeesâ expectations of privacy unreasonable.â Id. For example, â[p]ublic employeesâ expectations of privacy in their offices, desks, and file cabinets ... may be re *904 duced by virtue of actual office practices and procedures, or by legitimate regulation.â Id. The Court recognized that, â[g]iven the great variety of work environments in the public sector, the question whether an employee has a reasonable expectation of privacy must be addressed on a case-by-case basis.â Id. at 718, 107 S.Ct. 1492.
Even assuming an employee has a reasonable expectation of privacy in the item seized or the area searched, he must also demonstrate that the search was unreasonable to prove a Fourth Amendment violation: âpublic employer intrusions on the constitutionally protected privacy interests of government employees for non-investigatory, work-related purposes, as well as for investigations of work-related misconduct, should be judged by the standard of reasonableness under all the circumstances.â Id. at 725-26, 107 S.Ct. 1492. Under this standard, we must evaluate whether the search was âjustified at its inception,â and whether it âwas reasonably related in scope to the circumstances which justified the interference in the first place.â Id. at 726, 107 S.Ct. 1492 (internal quotation marks omitted).
1. Reasonable Expectation of Privacy
The extent to which the Fourth Amendment provides protection for the contents of electronic communications in the Internet age is an open question. The recently minted standard of electronic communication via e-mails, text messages, and other means opens a new frontier in Fourth Amendment jurisprudence that has been little explored. Here, we must first answer the threshold question: Do users of text messaging services such as those provided by Arch Wireless have a reasonable expectation of privacy in their text messages stored on the service providerâs network? We hold that they do.
In Katz v. United States, 389 U.S. 347, 88 S.Ct. 507, 19 L.Ed.2d 576 (1967), the government placed an electronic listening device on a public telephone booth, which allowed the government to listen to the telephone userâs conversation. Id. at 348, 88 S.Ct. 507. The Supreme Court held that listening to the conversation through the electronic device violated the userâs reasonable expectation of privacy. Id. at 353, 88 S.Ct. 507. In so holding, the Court reasoned, âOne who occupies [a phone booth], shuts the door behind him, and pays the toll that permits him to place a call is surely entitled to assume that the words he utters into the mouthpiece will not be broadcast to the world. To read the Constitution more narrowly is to ignore the vital role that the public telephone has come to play in private communication.â Id. at 352, 88 S.Ct. 507. Therefore, â[t]he Governmentâs activities in electronically listening to and recording the petitionerâs words violated the privacy upon which he justifiably relied while using the telephone booth and thus constituted a âsearch and seizureâ within the meaning of the Fourth Amendment.â Id. at 353, 88 S.Ct. 507.
On the other hand, the Court has also held that the governmentâs use of a pen register â a device that records the phone numbers one dials â does not violate the Fourth Amendment. This is because people ârealize that they must âconveyâ phone numbers to the telephone company, since it is through telephone company switching equipment that their calls are completed.â Smith v. Maryland, 442 U.S. 735, 742, 99 S.Ct. 2577, 61 L.Ed.2d 220 (1979). The Court distinguished Katz by noting that âa pen register differs significantly from the listening device employed in Katz, for pen registers do not acquire the contents of communications.â Id. at 741, 99 S.Ct. 2577.
*905 This distinction also applies to written communications, such as letters. It is well-settled that, âsince 1878, ... the Fourth Amendmentâs protection against âunreasonable searches and seizuresâ protects a citizen against the warrantless opening of sealed letters and packages addressed to him in order to examine the contents.â United States v. Choate, 576 F.2d 165, 174 (9th Cir.1978) (citing Ex parte Jackson, 96 U.S. 727, 24 L.Ed. 877 (1877)); see also United States v. Jacobsen, 466 U.S. 109, 114, 104 S.Ct. 1652, 80 L.Ed.2d 85 (1984) (âLetters and other sealed packages are in the general class of effects in which the public at large has a legitimate expectation of privacy.â). However, as with the phone numbers they dial, individuals do not enjoy a reasonable expectation of privacy in what they write on the outside of an envelope. See United States v. Hernandez, 313 F.3d 1206, 1209-10 (9th Cir.2002) (âAlthough a person has a legitimate interest that a mailed package will not be opened and searched en route, there can be no reasonable expectation that postal service employees will not handle the package or that they will not view its exteriorâ (citations omitted)).
Our Internet jurisprudence is instructive. In United States v. Forrester, we held that âe-mail ... users have no expectation of privacy in the to/from addresses of their messages ... because they should know that this information is provided to and used by Internet service providers for the specific purpose of directing the routing of information.â United States v. Forrester, 512 F.3d 500, 510 (9th Cir.2008). Thus, we have extended the pen register and outside-of-envelope rationales to the âto/fromâ line of e-mails. But we have not ruled on whether persons have a reasonable expectation of privacy in the content of e-mails. Like the Supreme Court in Smith, in Forrester we explicitly noted that âe-mail to/from addresses ... constitute addressing information and do not necessarily reveal any more about the underlying contents of communication than do phone numbers.â Id. Thus, we concluded that â[t]he privacy interests in these two forms of communication [letters and emails] are identical,â and that, while â[t]he contents may deserve Fourth Amendment protection ... the address and size of the package do not.â