Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
A case surrounding a mysterious death in a Benton County, AR, has far-reaching implications for the ownership and privacy of data generated from Internet-connected devices, aka, the Internet of Things (IoT).
County officials in Benton County have argued that IoT information is pertinent to their ongoing investigation into the death of Victor Collins, who was found deceased in the hot tub of a home belonging to James A. Bates on Nov. 22, 2015. The IoT data in question stems from Bates' Amazon Echo — a “smart speaker” that allows users to order products and access Amazon services through voice commands.
According to files from the Arkansas Administrative Office of the Courts, county law enforcement officials served Amazon with two search warrants requesting data accrued by the Amazon Echo, such as audio recordings and transcriptions of the night in question. See, http://bit.ly/2jb05OX. Amazon refused to fully comply with the warrant, framing the issue as one over the privacy of customer information.
What does the battle over this data say about a user's right to data privacy? Christopher Dore, partner at Edelson, notes that while the warrants for IoT data from an individual Amazon Echo was “very interesting,” it was not entirely an “unexpected development.”
“It was only a matter of time before law enforcement started to realize the usefulness of IoT [devices] and the effective monitoring abilities that these type of devices have,” Dore says.
Yet Dore questions just what relevant information could be from gathered an Amazon Echo. The device, when powered, is always ready to receive commands, enabled by a user saying “Alexa.” From there, audio is recorded for 60 seconds and erased upon the recording of new sounds.
Therefore, the usefulness of such data therefore rests on the possibility that when “some event was happening in a house, someone said or yelled a word that was close enough to 'Alexa'” so the device would start recording and store data, Dore says.
Legal Authority to Access Amazon
On its surface, the search warrant against Amazon may run into uncertain legal territory. Paul M. Tiao, partner at Hunton and Williams, questions the authority Benton County officials have to access Amazon cloud data that is potentially stored out of state.
“The fact that Amazon is resisting this indicates there may be some legal and factual arguments that the [local] government doesn't actually have the authority under the law to get this data,” he says.
Tiao notes that because that the case regards stored audio information, “the Stored Communications Act would be a good place to start to figure out what authority [any] government may have to obtain this data.”
“Typically the more sensitive the data, the higher the burden of proof the law will require,” he adds.
There may be, however, other factors at play besides legal authority to access the data. Tiao notes that Amazon's “objections are fairly typical objections to subpoenas and search warrants. Among other things, they might argue that the warrant isn't specific enough to cover the data requested here, it is too broad, or it would be unfairly burdensome on the company to isolate the pertinent communications and deliver them to the government.”
There is also the possibility, he adds, that “Amazon may be trying to make a statement to their clientele and customer base that they are very privacy protected, which is something customers care a lot about.”
While this situation may garner analogies to the “FBI v. Apple” fracas over encryption, Adam Levin, chairman and founder of identity and data protection company IDT911, cautions against thinking of them in the same light.
While this case involves a subpoena for an IoT device's cloud-stored information, “the Apple situation was different, because Apple was being asked to create something new. They were essentially being asked to create software that would break their system and enable someone to get in there,” he says.
And while Apple's situation had broader impacts for the future of encryption, and privacy of communications, this case more intimately concerns how vulnerable the growing amount of private information on an individual is given the growth of IoT devices.
“It's all about those devices that track us that can determine if someone is in a residence or anywhere, and how long they've been there, when they sleep, and when they wake up — all of these devices are gathering data that is being sent somewhere,” he says. “We're all leaving a trail of breadcrumbs, and the trail is getting longer and longer and it's getting more and more precise.
***** Ricci Dipshan writes for Legaltech News, an ALM sibling of this newsletter in which this article also appeared.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.
Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.