THE FEDERAL COURTS LAW REVIEW. Symposium Introduction: Privacy in the Federal Courts

Similar documents
Legislation to Permit the Secure and Privacy-Protective Exchange of Electronic Data for the Purposes of Combating Serious Crime Including Terrorism

CRS Report for Congress

Electronic Privacy Information Center September 24, 2001

INVESTIGATION OF ELECTRONIC DATA PROTECTED BY ENCRYPTION ETC DRAFT CODE OF PRACTICE

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act

THE RUTHERFORD INSTITUTE

CRIMINAL INVESTIGATIONS AND TECHNOLOGY: PROTECTING DATA AND RIGHTS

Electronic Access? State. Court Rules on Public Access? Materials/Info on the web?

Case 3:19-cv SK Document 1 Filed 01/17/19 Page 1 of 11

Judicial Merit Selection: Current Status

Chicago Council of Lawyers Cook County Circuit Court Clerk Questionnaire

Transparency and Civil Justice: The Internal and External Value of Sunlight

U.S. Department of Justice

tinitrd~tat s~fnatf WASHINGTON, DC 20510

Follow-up Question: How many separate grand juries were used?

Journal of Law and Policy

Sneak and Peak Search Warrants

CRS Report for Congress

KIMBERLY L. WEHLE 1 15 E. Irving Street Chevy Chase MD (202) (cell)

Washington, DC Washington, DC 20510

Case 1:09-mc EGS Document 84-7 Filed 03/15/12 Page 1 of 9 ADDENDUM

Written Testimony of Marc J. Zwillinger. Founder. ZwillGen PLLC. United States Senate Committee on the Judiciary. Hearing on

Section 4. Table of State Court Authorities Governing Judicial Adjuncts and Comparison Between State Rules and Fed. R. Civ. P. 53

Syllabus Law : Surveillance Law Seminar. George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall. Professor Jake Phillips

Notes on how to read the chart:

Security Breach Notification Chart

A SUMMARY OF THE SHORT, SUMMARY, AND EXPEDITED CIVIL ACTION PROGRAMS AROUND THE COUNTRY

UNMANNED AERIAL SYSTEMS LEGISLATION: STATE COMPARISON CHART

BILLS PENDING AS OF 9/11/13 THAT RELATE TO NSA SURVEILLANCE

Security Breach Notification Chart

Appendix B. State Wiretap Legislation (as of June 1, 2002)

The changes are aimed at fighting both terrorism and identity theft.

Case 1:16-cv Document 3 Filed 02/05/16 Page 1 of 66 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA ) ) ) ) ) ) ) ) ) ) ) ) ) )

Does your state have a MANDATORY rule requiring an attorney to designate a successor/surrogate/receiver in case of death or disability

National Security Letters in Foreign Intelligence Investigations: A Glimpse of the Legal Background and Recent Amendments

ELLEN E. SWARD Professor of Law University of Kansas School of Law 1535 W. 15 th Street Lawrence, KS (785)

at New York University School of Law A 50 state guide to redistricting

Computer Search and Seizure

The USA Freedom Act: A Partial Response to European Concerns about NSA Surveillance Peter Swire

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security.

Privacy And? Surveillance

Hubert H. Humphrey Institute of Public Affairs, University of Minnesota M.A., 1998; Degree Concentration in Women and Public Policy

Guidance for Implementation of the Judicial Conference Policy on Privacy and Public Access to Electronic Criminal Case Files

Ashley Green Sensitive Information in a Wired World Professor Joan Feigenbaum Yale University December 12, 2003

Issue Area Current Law S as reported by Senate Judiciary Comm. H.R as reported by House Judiciary Comm.

Case 1:14-cv Document 1-1 Filed 06/17/14 Page 1 of 61 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

NSI Law and Policy Paper. Reauthorization of the FISA Amendments Act

January 14, Dear Chairman Graham and Ranking Member Feinstein:

Legal Standard for Disclosure of Cell-Site Information (CSI) and Geolocation Information

The National Security Agency s Warrantless Wiretaps

T-Mobile Transparency Report for 2013 and 2014

OFFICE OF BOB BARR Member of Congress,

EXHIBIT 1: Mission of Our Chapter

THE MATRIX: Total Information Awareness Reloaded

Testimony of Peter P. Swire

OCTOBER 4, :15 A.M. 4:30 P.M.

JOINT STATEMENT FOR THE RECORD OF JAMES R. CLAPPER DIRECTOR OF NATIONAL INTELLIGENCE

Safeguarding Equality

BOARD CERTIFICATION Civil Appellate Law, Texas Board of Legal Specialization (1987-present)

Re: Request for Action Subsequent to the September 24, 2010 FBI Raids

Red, white, and blue. One for each state. Question 1 What are the colors of our flag? Question 2 What do the stars on the flag mean?

Interstate Commission for Adult Offender Supervision

I. THE COMMITTEE S INVESTIGATION

International Government Relations Committee

UNESCO INTERNET STUDY: Privacy and journalists sources

UNPUBLISHED UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT. No

Sample Standing Orders for a School Representative Body

Covert Human Intelligence Sources Code of Practice

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

7-45. Electronic Access to Legislative Documents. Legislative Documents

Testimony of the Brennan Center for Justice at New York University School of Law in Support of the Proposed Handschu Settlement Agreement

Reauthorization of the FISA Amendments Act

CRS Report for Congress

Strike all after the enacting clause and insert the

Government Collection of Private Information: Background and Issues Related to the USA PATRIOT Act Reauthorization

Statement of James X. Dempsey Executive Director Center for Democracy & Technology 1. before the House Permanent Select Committee on Intelligence

DATA BREACH CLAIMS IN THE US: An Overview of First Party Breach Requirements

Terance Healy v. Attorney General Pennsylvania

Draft Accra Declaration

- 6 - the statement will not be filed and will not be a part of the Court s file in the case.

The High-Profile Case: Where the Courts & The Media Meet

BYLAWS THE NATIONAL ASSOCIATION OF STATE WORKFORCE AGENCIES. (Formed under the Virginia Non-stock Corporation Act) Adopted September 28, 2016 MISSION

PRIVACY, TECHNOLOGY AND NATIONAL SECURITY: An Overview of Intelligence Collection by Robert S. Litt, ODNI General Counsel

Organization for Security and Co-operation in Europe

ADVANCEMENT, JURISDICTION-BY-JURISDICTION

United States District Court

Reauthorization of the FISA Amendments Act

THE IMPORTANCE OF IN THE GUARDIAN AD LITEM INVESTIGATION

WIRETAPPING, SURVEILLANCE AND

INDIVIDUAL PRACTICES IN CIVIL CASES Nelson S. Román, United States District Judge. Courtroom Deputy Clerk

TRANSPARENCY REPORTING FOR BEGINNERS: MEMO #1 *DRAFT* 2/26/14 A SURVEY OF

State Trial Courts with Incidental Appellate Jurisdiction, 2010

American Bar Association Criminal Justice Section 2017 William W. Greenhalgh Student Writing Competition Rules

UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF OHIO EASTERN DIVISION

FOREWORD 2007 FOURTH AMENDMENT SYMPOSIUM

NATIONAL ASSOCIATION OF STATE BOARDS OF ACCOUNTANCY, INC. Minutes of the 101st Annual Business Meeting

UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA. Plaintiff,

Do you consider FEIN's to be public or private information? Do you consider phone numbers to be private information?

TOP SECRET!/COMOO'//NO.i'ORN

THE UNITED STATES DISTRICT COURT DISTRICT OF SOUTH CAROLINA GREENVILLE DIVISION

Transcription:

THE FEDERAL COURTS LAW REVIEW Volume 3, Issue 2 2009 Symposium Introduction: Privacy in the Federal Courts Allyson W. Haynes 1 The essays and articles in this symposium issue are based on the presentations and panel discussions held on April 11, 2008 at the Charleston School of Law. The symposium was sponsored by the Federal Courts Law Review in conjunction with the Federal Magistrate Judges Association and the Federal Bar Association, South Carolina Chapter, and focused on privacy issues generally, including those arising from advances in technology and the ubiquity of the internet. The keynote speaker for the symposium was Arthur R. Miller, and his speech is reproduced for this edition. Professor Miller questions whether there is any privacy left in our current society where information is generated constantly and kept seemingly forever. In the metaphorical fish bowl that is our modern lives, every action we take contributes to the informational dossier that is then used by others to make decisions with real implications for everyday activities our ability to get a loan, to go through airport security, to get into law school. After forty years of thinking about privacy and the effects of government action on our civil liberties, Professor Miller notes how little has changed: For Vietnam, read Iraq or the War on Terror. For the Army, read the National Security Agency, or the FBI, or the Department of Homeland Security. For the 1970s covert open-air surveillance techniques, read today s monitoring of telephone calls and computer files (data mining). 1. Associate Professor of Law, Charleston School of Law. The success of this symposium is thanks in large part to the faculty, staff, administration, and founders of the Charleston School of Law, as well as to the efforts of the symposium participants. Thanks also to the dedication of the editors and staff of the Federal Courts Law Review, and the support of the Federal Magistrate Judges Association and the Federal Bar Association, South Carolina Chapter.

82 THE FEDERAL COURTS LAW REVIEW [Vol. 3 Privacy remains, as it has since Brandeis s day, 2 at the top of society s hierarchy of concerns, but our ability to protect information about ourselves is reduced to the point of disappearing. The second article is by Professor Robert E. Mensel, who looks at the origins and uses of the right to privacy in the federal courts and concludes that privacy was often used in opposition to progressive reform. The right to privacy arose as a reaction to the general inquisitiveness and intrusiveness of middle class society during the Progressive Era. Interestingly, privacy as a value developed into a shield that federal judges used in an attempt to protect the institutional competency of the courts and the proper administration of justice against the threat of progressive reform legislation. The liberalization of the Supreme Court ended the long battle between privacy and reform, and the right to be left alone was radically reduced. In its modern application, the right to privacy can be seen, on one hand, as a means of protecting one s identity and personality against the intrusiveness of the information age and, on the other, as a threat to our ability to protect the security of our nation and the open operation of our court system. Participants at the privacy symposium sat in panels, the first 3 of which took up the effects of secret settlements on the furtherance of justice. In particular, they questioned whether confidentiality truly affects parties incentives to settle cases, whether restricting a plaintiff s lawyer s legal representation in future cases against the defendant as a condition of settlement is against public policy, and what standards of good cause a court should consider in deciding whether a court-sponsored settlement agreement should be sealed. In addition, Panel I considered the issue of juror privacy. Juror questionnaires often seek highly personal information, including information about health, religion, and criminal activity, in addition to personal information that can be used by identity thieves. The panelists asked how courts might protect the privacy of that information, how anonymous juries might properly be used, and how 2. Samuel Warren & Louis Brandeis, The Right to Privacy, 4 HARV. L. REV. 193 (1890). 3. Panel I included the Honorable Joseph F. Anderson, Jr., District Judge for the District of South Carolina, the Honorable Valerie P. Cooke, Magistrate Judge for the District of Nevada, the Honorable Sam A. Joyner, Magistrate Judge for the Northern District of Oklahoma, and the Honorable Karen K. Klein, Magistrate Judge for the District of North Dakota. It was moderated by Professor Allyson W. Haynes.

2009] Symposium: Privacy in the Federal Courts 83 to strike the proper balance between juror privacy and the public s right to open court proceedings. Finally, Panel I considered the implications of privacy in electronic discovery issues. The changes in the electronic discovery rules and the increase in electronic discovery in general raise privacy issues for potential litigants, in that certain forms of communication they may think of as private are in fact subject to legitimate discovery requests. In contrast to the focus on secrecy of trial proceedings themselves, Panel II 4 addressed the broader privacy implications of online access to court records. The move toward such online access raises serious privacy issues, as court records relating to sensitive domestic and financial issues are more readily available and capable of dissemination online. These concerns were the focus of the 2001 Judicial Conference privacy policy, 5 which resulted in amendments to the federal appellate, bankruptcy, civil and criminal rules, requiring the redaction of personal identifier information from filings. 6 In the third article of this edition, Peter Winn tracks the history of on-line access to court records from the open ceremonial space of Westminster Hall to modern American courtrooms with their spectator pews. The case law reflects a nuanced view of the balance required between transparency of court proceedings and individual privacy, with courts granting public access when the underlying purpose is to ensure the integrity of the judicial process, but remaining quick to protect personal information when that purpose is unrelated to public oversight of the judicial system. The advent of online access to judicial records has laid bare the way that practical obscurity kept private much information that was technically open to access but required legwork and costs to retrieve. Professor Winn also analyzes the privacy amendments to the Federal Rules of Procedure, intended to address concerns about privacy and confidentiality in response to the PACER system, and 4. Panel II included the Honorable Boyd N. Boland, Magistrate Judge for the District of Colorado, the Honorable Lorenzo F. Garcia, Magistrate Judge for the District of New Mexico, and the Honorable James P. O Hara, Magistrate Judge for the District of Kansas. It was moderated by Peter A. Winn, Assistant United States Attorney and Adjunct Professor at the University of Washington School of Law. 5. Judiciary Conference of the United States, 01 Sept./Oct. 48-50; Judiciary Conference of the United States, 03 Sept. 15-16; available at http://www.privacy.uscourts.gov/policy.htm. 6. See Fed. R. Civ. P. 5.2; Fed. R. Crim. P. 49.1; Fed. R. App. P. 25; Fed. R. Bank. P. 9037; see also E-Government Act of 2002, PL 107-347, 2002 HR 2458.

84 THE FEDERAL COURTS LAW REVIEW [Vol. 3 finds that they represent an important step in addressing privacy concerns introduced by electronic access. He determines that [w]hile the new system of electronic information may provide less protection for privacy than in the past, it also provides new opportunities for the implementation of audit and oversight of its records so that information management can take place far more efficiently than ever before. He advocates the exercise of such oversight by the Administrative Office of the U.S. Courts, which could, among other things, require that companies providing data aggregation services adhere to the same principles of information management as apply to the courts. Fundamentally, information management policy should focus on encouraging public participation in the judicial process and discouraging practices which undermine the administration of justice. The final panel 7 of the symposium focused on privacy issues in criminal proceedings. While technological advances have greatly enhanced the effectiveness of law enforcement efforts, they have also given rise to more intrusive surveillance techniques that challenge our conceptions of privacy. The panelists discussed the implications of modern pen registers, trap and trace devices, wiretaps, and video surveillance on the right to privacy. In the final article of this edition, Judge Stephen Wm. Smith analogizes the growth of secrecy in the courts to the spread of the kudzu vine throughout the American South. Historically, American courts have followed the English common law tradition whereby the court system operates in view of the public. There is an important reason for this traditional openness: Most fundamentally of all, publicity conferred legitimacy upon court judgments. But beginning in the first half of the twentieth century, court decisions and legislation began to carve out exceptions to the general rule of public access to judicial records and proceedings. Like the kudzu vine that spread across farmlands, concealing whatever was underneath, the spread of the judicial use of sealed warrants and electronic surveillance orders as well as judicially-enforced secrecy of settlements conceal the inner workings of the court and threaten the system s very legitimacy. 7. Panel III included the Honorable William E. Callahan, Magistrate Judge for the Eastern District of Wisconsin, the Honorable Robert B. Collings, Magistrate Judge for the District of Massachusetts, and the Honorable Stephen Wm. Smith, Magistrate Judge for the Southern District of Texas. It was moderated by Miller W. Shealy, Jr., Assistant Professor at the Charleston School of Law.

2009] Symposium: Privacy in the Federal Courts 85 As the world grows increasingly technologically savvy and dependent upon online access to information, these important issues will continue to arise, and will undoubtedly arise in new and as yet unexpected ways. Our federal system is only beginning to respond to the effects of the internet on the age-old dilemma of public access versus personal privacy. Symposia like ours are an important venue for judges, scholars, practitioners, and students to debate the issues and consider possible solutions. We at the Charleston School of Law and the Federal Courts Law Review sincerely hope our efforts have shed light on the nature of the interests at stake, and have raised at least a glimmer of hope that a reasonable and appropriate balance might be reached.