Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
University's Warrantless Search of Employee's Computer Did Not Violate Constitutional Rights
The Eighth Circuit has held that the University of Nebraska's warrantless search of an employee's computer did not violate the employee's Fourth Amendment Right to privacy where the search was conducted to uncover e-mails relating to a lawsuit and pending arbitration against a third party. Biby v. Board of Regents, of the University of Nebraska at Lincoln, 2005 WL 2000925 (8th Cir. Aug. 22).
Gerald Biby, a technology transfer coordinator at the University of Nebraska's Industrial Agricultural Products Center (IPAC), worked with companies in the private sector to formulate research and marketing opportunities for new technologies. After developing one such new technology, a product called Soft Touch II, Biby and his colleagues secured a provisional patent application in the University's name and entered into a licensing agreement with a company called Corn Card International. The agreement gave Corn Card the exclusive right to develop, market, and sell printable plastic phone cards, which used the Soft Touch II technology, in the United States, Mexico, and Canada. Biby then worked with the owner of Corn Card to begin establishing a business relationship with Gemplus, a card manufacturer interested in marketing phone cards with the Soft Touch II technology in Europe. It was hoped that the University would ultimately assign Corn Card's licensing rights to Gemplus so that Soft Touch II could be marketed worldwide.
After negotiations stalled pending University approval for the assignment, Corn Card threatened to take legal action, alleging that a refusal to assign would place the University in breach of the licensing agreement. The dispute was submitted to arbitration, and the parties involved executed a document in which they agreed to provide all relevant nonprivileged materials that had not already been requested by the University Associate Vice Chancellor at an earlier time. When Biby indicated to University officials that he was uncomfortable with the idea of them searching his computer files, the Associate Vice Chancellor sent him the University computer policy, which states that “the university will only search files if a legitimate reason exists, such as needed repair or maintenance of equipment, investigation of improper or illegal use of resources, and 'response to a public records request, administrative or judicial order or request for discovery in the course of litigation.'” After its first attempt to search Biby's computer files, during which Biby refused to consent to the search, the University conducted a second investigation, taking the position that it did not need a signed consent form to do so, by initiating a key word search of Biby's Lotus Notes e-mail files.
While the dispute between the University and Corn Card was eventually settled, Biby was terminated for allegedly misrepresenting himself in his negotiations with Corn Card and Gemplus. Biby then sued the University, asserting, among other things, that University officials had violated his privacy rights, guaranteed by the Fourth and Fourteenth Amendments. Affirming the district court's grant of summary judgment on this claim, the Eighth Circuit found that Biby did not have a constitutionally protected privacy interest in his work computer, that the University's reasons for searching his computer were legitimate, and that the scope of the search was reasonable. Citing the University of Nebraska's policy allowing searches of employees' computer files, including e-mail, when the University is responding to a discovery request in the course of litigation, the court determined that Biby did not have a reasonable expectation of privacy with regard to his work computer and that the search was being carried out for legitimate reasons. Further, the court found that the key word search conducted in Biby's e-mail files was “reasonably related to the objectives of the search and not excessively intrusive” in that a broad search was required to determine whether all discoverable documents had been gathered. Thus, the Eighth Circuit held that Biby had not “demonstrated that a clearly established right of his was violated by the search or that a reasonable official would have known that the inception or scope of the search would violate [his] Fourth Amendment rights.”
University's Warrantless Search of Employee's Computer Did Not Violate Constitutional Rights
The Eighth Circuit has held that the University of Nebraska's warrantless search of an employee's computer did not violate the employee's Fourth Amendment Right to privacy where the search was conducted to uncover e-mails relating to a lawsuit and pending arbitration against a third party. Biby v. Board of Regents, of the University of Nebraska at Lincoln, 2005 WL 2000925 (8th Cir. Aug. 22).
Gerald Biby, a technology transfer coordinator at the University of Nebraska's Industrial Agricultural Products Center (IPAC), worked with companies in the private sector to formulate research and marketing opportunities for new technologies. After developing one such new technology, a product called Soft Touch II, Biby and his colleagues secured a provisional patent application in the University's name and entered into a licensing agreement with a company called Corn Card International. The agreement gave Corn Card the exclusive right to develop, market, and sell printable plastic phone cards, which used the Soft Touch II technology, in the United States, Mexico, and Canada. Biby then worked with the owner of Corn Card to begin establishing a business relationship with Gemplus, a card manufacturer interested in marketing phone cards with the Soft Touch II technology in Europe. It was hoped that the University would ultimately assign Corn Card's licensing rights to Gemplus so that Soft Touch II could be marketed worldwide.
After negotiations stalled pending University approval for the assignment, Corn Card threatened to take legal action, alleging that a refusal to assign would place the University in breach of the licensing agreement. The dispute was submitted to arbitration, and the parties involved executed a document in which they agreed to provide all relevant nonprivileged materials that had not already been requested by the University Associate Vice Chancellor at an earlier time. When Biby indicated to University officials that he was uncomfortable with the idea of them searching his computer files, the Associate Vice Chancellor sent him the University computer policy, which states that “the university will only search files if a legitimate reason exists, such as needed repair or maintenance of equipment, investigation of improper or illegal use of resources, and 'response to a public records request, administrative or judicial order or request for discovery in the course of litigation.'” After its first attempt to search Biby's computer files, during which Biby refused to consent to the search, the University conducted a second investigation, taking the position that it did not need a signed consent form to do so, by initiating a key word search of Biby's Lotus Notes e-mail files.
While the dispute between the University and Corn Card was eventually settled, Biby was terminated for allegedly misrepresenting himself in his negotiations with Corn Card and Gemplus. Biby then sued the University, asserting, among other things, that University officials had violated his privacy rights, guaranteed by the Fourth and Fourteenth Amendments. Affirming the district court's grant of summary judgment on this claim, the Eighth Circuit found that Biby did not have a constitutionally protected privacy interest in his work computer, that the University's reasons for searching his computer were legitimate, and that the scope of the search was reasonable. Citing the University of Nebraska's policy allowing searches of employees' computer files, including e-mail, when the University is responding to a discovery request in the course of litigation, the court determined that Biby did not have a reasonable expectation of privacy with regard to his work computer and that the search was being carried out for legitimate reasons. Further, the court found that the key word search conducted in Biby's e-mail files was “reasonably related to the objectives of the search and not excessively intrusive” in that a broad search was required to determine whether all discoverable documents had been gathered. Thus, the Eighth Circuit held that Biby had not “demonstrated that a clearly established right of his was violated by the search or that a reasonable official would have known that the inception or scope of the search would violate [his] Fourth Amendment rights.”
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
Most of the federal circuit courts that have addressed what qualifies either as a "compilation" or as a single creative work apply an "independent economic value" analysis that looks at the market worth of the single creation as of the time when an infringement occurs. But in a recent ruling of first impression, the Fifth Circuit rejected the "independent economic value" test in determining which individual sound recordings are eligible for their own statutory awards and which are part of compilation.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.
Regardless of how a company proceeds with identifying AI governance challenges, and folds appropriate mitigation solution into a risk management framework, it is critical to begin with an AI governance program.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.