Electronic Spying and Tracking Spouses in Divorce: Admissibility and - - PowerPoint PPT Presentation

electronic spying and tracking spouses in divorce
SMART_READER_LITE
LIVE PREVIEW

Electronic Spying and Tracking Spouses in Divorce: Admissibility and - - PowerPoint PPT Presentation

Presenting a live 90-minute webinar with interactive Q&A Electronic Spying and Tracking Spouses in Divorce: Admissibility and Privacy Issues Navigating Evidentiary Issues With Spyware, GPS Trackers, Cell Phone Forensics, Wiretaps, Social


slide-1
SLIDE 1

Electronic Spying and Tracking Spouses in Divorce: Admissibility and Privacy Issues

Navigating Evidentiary Issues With Spyware, GPS Trackers, Cell Phone Forensics, Wiretaps, Social Media and More Today’s faculty features:

1pm Eastern | 12pm Central | 11am Mountain | 10am Pacific

The audio portion of the conference may be accessed via the telephone or by using your computer's

  • speakers. Please refer to the instructions emailed to registrants for additional information. If you

have any questions, please contact Customer Service at 1-800-926-7926 ext. 10.

TUESDAY, MAY 7, 2013

Presenting a live 90-minute webinar with interactive Q&A

Henry S. Gornbein, Attorney, Henry S. Gornbein, Bloomfield Hills, Mich. Sharon D. Nelson, President, Sensei Enterprises, Fairfax, Va. John W. Simek, Vice President, Sensei Enterprises, Fairfax, Va. E.X. Martin, III, Law Offices of E.X. Martin, Dallas

slide-2
SLIDE 2

Sound Quality If you are listening via your computer speakers, please note that the quality of your sound will vary depending on the speed and quality of your internet connection. If the sound quality is not satisfactory and you are listening via your computer speakers, you may listen via the phone: dial 1-866-961-9091 and enter your PIN when prompted. Otherwise, please send us a chat or e-mail sound@straffordpub.com immediately so we can address the problem. If you dialed in and have any difficulties during the call, press *0 for assistance. Viewing Quality To maximize your screen, press the F11 key on your keyboard. To exit full screen, press the F11 key again.

slide-3
SLIDE 3

For CLE purposes, please let us know how many people are listening at your location by completing each of the following steps:

  • In the chat box, type (1) your company name and (2) the number of

attendees at your location

  • Click the SEND button beside the box

FOR LIVE EVENT ONLY

slide-4
SLIDE 4

If you have not printed the conference materials for this program, please complete the following steps:

  • Click on the + sign next to “Conference Materials” in the middle of the left-

hand column on your screen.

  • Click on the tab labeled “Handouts” that appears, and there you will see a

PDF of the slides for today's program.

  • Double click on the PDF and a separate page will open.
  • Print the slides by clicking on the printer icon.
slide-5
SLIDE 5

5

Presented by Sharon D. Nelson, Esq., and John W. Simek www.senseient.com snelson@senseient.com jsimek@senseient.com 703-359-0700 3975 University Dr., Suite 225 Fairfax, VA.

Strafford Publications

slide-6
SLIDE 6

6

Catherine and Joseph Zang –

  • Oct. 2012
slide-7
SLIDE 7

7

Catherine filed suit in federal court

  • Alleged that he:

– Installed a hidden video camera and mic – Installed spyware on her computer – GPS tracker in car

  • Also sued Joseph’s lawyer who

said she had evidence that would portray her in “unflattering, embarrassing manner”

slide-8
SLIDE 8

8

Danny Lee Hormann – 2010

  • GPS tracker on ex-wife’s car (ruled
  • k – he was partial owner)
  • Spyware on phone and computer
  • She and children searched garage

for cameras and whispered together on the lawn

  • Sentenced to 30 days for stalking
slide-9
SLIDE 9

Electronic Spying and Tracking Spouses in Divorce: Admissibility and Privacy Issues

Navigating the Legal and Ethical Challenges of Evidence Obtained Using Spyware, GPS Trackers, Wire Taps, Web Cams, Social Media Account Interception, and More Presentation By: Henry S. Gornbein 40900 Woodward Avenue, Suite 111 Bloomfield Hills, MI 48304 248/594-3444 DivorceSourceRadio.com hgornbein@familylawofmichigan.com Henry@divorceonline.com

slide-10
SLIDE 10

10

Indiana – David Voelkert

  • Charged with intercepting oral

communications of wife

  • “Confessed” to 17 year old girl
  • n FB that he had GPS tracking

device on wife’s car

  • He knew it was wife or friend

and signed a notarized affidavit when he got the friend request

  • Charges dismissed
slide-11
SLIDE 11

Electronic Spying and Tracking Spouses in Divorce: Admissibility and Privacy Issues

E.X. Martin, III

Attorney at Law 8828 Greenville Avenue Dallas, Texas 75243 (214) 343-7400 exmartin@airmail.net

slide-12
SLIDE 12

September 2012

  • Lawyer Mary Nolan indicted
  • Hired a PI to install listening

devices in cars of her clients’ spouses – she and staff listened to glean info

  • Six charges of wiretapping and

tax evasion- pled not guilty

12

slide-13
SLIDE 13

August 2012 – Changes to the Model Rules of Professional Conduct

13

slide-14
SLIDE 14

The tech-related changes

  • “Competence” (Rule

1.1) now means that you must be competent with technology

14

slide-15
SLIDE 15

15

Maintaining The Integrity Of The Profession Rule 8.4 Misconduct It is professional misconduct for a lawyer to: (a) violate or attempt to violate the Rules of Professional Conduct, knowingly assist or induce another to do so, or do so through the acts of another; (b) commit a criminal act that reflects adversely on the lawyer's honesty, trustworthiness or fitness as a lawyer in

  • ther respects;

(c) engage in conduct involving dishonesty, fraud, deceit or misrepresentation;

slide-16
SLIDE 16

Federal Criminal Laws

Defense Not unlawful for a person not acting under color of law to intercept a communication where such person is a party to the communication. 18 U.S.C. § 2511. Interception & disclosure of wire, oral or electronic communications prohibited !!! Punishment – Not More Than 5 years.

16

slide-17
SLIDE 17

Affirmative Defense

It is an affirmative defense to prosecution where a person not acting Under color of law intercepts a wire, oral, or electronic communication if: (A) The person is a party to the communication, or (A) One of the parties to the communication has given prior consent to the interception, unless the communication is intercepted for the purpose of committing an unlawful act.

17

slide-18
SLIDE 18

State laws

  • Nearly all are identical to federal law
  • Most but not all have exclusionary clauses

18

slide-19
SLIDE 19

National Conference of State Legislatures Guide to Electronic Surveillance Laws

19

slide-20
SLIDE 20

Recording Telephone Conversations Two party consent states: California, Connecticut, Delaware, Florida, Maryland, Massachusetts, Nevada, New Hampshire, Pennsylvania, Vermont, Washington, Illinois All other states are one party consent states by statute or case law

20

slide-21
SLIDE 21

Hi Tech Demonstrative Evidence Digital Audio Recorders Sony Digital Voice Editor Software Interface Sony MX20

Can Make Clients Be Nice !!!!!

21

slide-22
SLIDE 22

22

slide-23
SLIDE 23

Can’t Wish It Away ! Can’t Wash It Away !

23

slide-24
SLIDE 24

Admissibility of Wire and Electronic Communications Vicarious Consent The Texas penal code addresses the unlawful interception of communications, stating that a person commits an offense if he intentionally intercepts a wire, oral, or electronic

  • communication. Tex. Penal Code Ann. § 16.02(b)(1).

The statute lists various affirmative defenses to prosecution under section 16.02(b), including the following: It is an affirmative defense to prosecution under Subsection (b) that: . . . . (4) a person not acting under color of law intercepts a wire, oral, or electronic communication, if: (A) the person is a party to the communication; or (B) one of the parties to the communication has given prior consent to the interception, unless the communication is intercepted for the purpose of committing an unlawful act.

  • Id. § 16.02(c)(4). The statute does not specify that consent can be given vicariously by a

parent or guardian.

24

slide-25
SLIDE 25

In interpreting Sec. 16.02(c)(4)(B), Texas has joined a growing number of jurisdictions which recognize the Doctrine of Vicarious Consent, which allows a parent to consent to the recording on behalf of his or her child and secretly record the child without being part of the conversation as long as the parent has a good faith and

  • bjectively reasonable basis for believing the

recording is in the child’s best interests.

25

slide-26
SLIDE 26

Ussery v. State

Texas Court Of Criminal Appeals Decided January 30, 2008 Unpublished Opinion Recognizing that no Texas case had addressed a parent's authority to vicariously consent to the recording of a child's telephone conversation, the court looked to the Sixth Circuit's decision in Pollock v. Pollock, 154 F.3d 601 (6th Cir. 1998), the leading case regarding the vicarious-consent doctrine in the context of the federal wiretap statute.(fn3) In upholding the trial court's decision that the parent had not violated the federal prohibition of wiretapping when she recorded conversations between her daughter and the plaintiff, the Pollock court held: [A]s long as the guardian has a good faith, objectively reasonable basis for believing that it is necessary and in the best interest of the child to consent on behalf of his or her minor child to the taping of telephone conversations, the guardian may vicariously consent on behalf of the child to the recording. So what is the problem ? ?

26

slide-27
SLIDE 27

27

slide-28
SLIDE 28

28

Webcam laws

  • Illegal in some states where people might

expect privacy or where nudity is revealed

  • Sec. 18.2-386.1 in Virginia is pretty typical
  • Placement in bedroom specifically

mentioned

  • Explicit photos
  • Non-consenting person
  • Includes still photos as well as any kind of

video

slide-29
SLIDE 29

29

GPS tracking laws

  • In Virginia, you must have an ownership

interest in the vehicle to track it Section 46.2- 1088.6

  • Applies to lessee
  • No laws in many states and a lot of variants
slide-30
SLIDE 30

30

Keeping spouses out of computers and laptops

  • Strong password
  • Encrypt data
  • Biometric access
slide-31
SLIDE 31

31

What is spyware?

  • Definitions vary.

Generally, it is:

– Surreptitiously installed – To monitor a user’s conduct – Transmitting data to or holding it for a third party

slide-32
SLIDE 32

32

Hardware Keyloggers

  • KEYKatcher
  • KeyGhost
  • KeyLlama
  • No software
  • Requires physical access
  • Stores keystrokes to

flash memory

  • U.S. v. Ropp, 2004, U.S.
  • Dist. Ct. in L.A.
slide-33
SLIDE 33

33

Spyware and stalking go hand in hand

  • If they’re watching, they know where you are
  • Makes stalking frighteningly easy
  • Show up at lawyer’s office, lover’s home, etc.
slide-34
SLIDE 34

34

How do you get spyware that records computer activity installed on your machine?

  • Someone installs it on your machine

directly because they have access to it

  • It is remotely installed by someone,

usually via an e-mail attachment

  • You open an e-greeting card
  • Links from websites
slide-35
SLIDE 35

35

E-mail says: “Honey, I can’t apologize enough for my inexcusable behavior recently. I’ve attached a card to tell you how I really feel inside.”

slide-36
SLIDE 36

36

How do you get spyware that records computer activity?

  • You open a photo of

your children

  • Most folks simply can’t

resist this technique

slide-37
SLIDE 37

37

E-mail says: I just thought you might like to see the attached photo of the girls in the new summer outfits I bought them last night. Aren’t they adorable???

slide-38
SLIDE 38

38

How do you know if monitoring software is installed?

  • You don’t – unless an anti-spyware program picks

it up, and that’s a gamble

  • Spyware generally operates by stealth
  • It doesn’t show up in Programs
  • You can’t see it when you go to Add/Delete

Programs

  • In fact, you never see it
  • It changes the date of install after it’s installed
  • It changes its own name, usually to something

innocuous like systemchk.dll

  • In most cases, it takes forensics to find spyware
slide-39
SLIDE 39

39

What do we regularly see?

  • Specter Pro
  • eBlaster
  • The others, far less
  • Cost to find and document: generally between

$3000-$5000

  • Can we always tie it to the guilty party? No
  • In about 2/3 of our cases, the e-mail address to

which the report is transmitted has been found

slide-40
SLIDE 40

40

slide-41
SLIDE 41

41

slide-42
SLIDE 42

42

slide-43
SLIDE 43

43

Software to protect against spyware

  • There is no silver bullet
  • 2-3 programs recommended
  • Only use 1 to actively scan (Internet Suite)
  • You can still get spyware
  • You must manually scan periodically
  • Safe computing is still important
slide-44
SLIDE 44

44

What if your client installed/used spyware?

  • Tell them to stop (duh)
  • They may have to take the Fifth

in deposition or in court

  • You cannot be a party to their

deceitful conduct

  • However, the client may make

suggestions which would be helpful to a private investigator

  • In 2010, TN law firm sued for $2

million for allegedly using spyware evidence in a divorce proceeding

slide-45
SLIDE 45

45

What if your client was the victim?

  • This is the ace of trumps
  • Spend the money and document it
  • Make sure your client has machine cleaned

thereafter and changes all passwords

  • Ask questions in deposition from which there is no

retreat – get them on record

  • Be careful – a substantial minority of people believe

that spyware has been used when it has not

  • Remember, some people simply crack passwords –

also illegal!

slide-46
SLIDE 46

46

Is it ok to monitor children?

  • Yes, but spouse should be told
  • Cannot use this excuse to monitor spouse
slide-47
SLIDE 47

47

Smartphone Spyware

  • Big rise in volume
  • People text from phones
  • Phones are always with them
  • How does spyware get on your phone?
  • Tell client – never leave cell phone

unattended or loan it to someone

  • Mobile Spy and FlexiSpy seen most often
slide-48
SLIDE 48

48

slide-49
SLIDE 49

49

slide-50
SLIDE 50

50

slide-51
SLIDE 51

51

Never let a client accept a smartphone as a gift

  • Pre-installed with spyware
  • They won’t know
  • Will transmit all texts and

e-mails

  • Will call installer when

making a call to listen in

  • Can listen in even when
  • n a restaurant table
slide-52
SLIDE 52

52

What to tell clients

  • Call cell provider and make sure

location services are not enabled

  • Make sure they have their own

password-protected cell phone account

  • Set GPS to 911 only
  • Violence Against Women Act of

2005 (now stalking can include use of GPS)

slide-53
SLIDE 53

53

Stolen smartphones

  • Common to receive stolen

smartphones

  • Certify in writing that it is theirs

(or marital property) and that they have the legal right to freeze the data

  • Searching data?
  • Without PIN, the phone is “open”
  • With PIN, court order or consent

required

  • Law enforcement uninterested
slide-54
SLIDE 54

54

Finding smartphone spyware - iPhone

  • Has the phone been

jailbroken?

  • Can’t get it on without

jailbreaking

  • If jailbroken, expert will look

for iPhone spyware

  • Amateurs won’t find it
slide-55
SLIDE 55

55

Finding smartphone spyware - Androids

  • Apps in Playstore have

hopefully been vetted

  • See if phone is configured

to allow sideloading

  • If so, same drill looking

for Android spyware

slide-56
SLIDE 56

56

Must have possession of smartphone

  • In order to install spyware
  • Remote installation not possible - YET
slide-57
SLIDE 57

57

57

slide-58
SLIDE 58

58

58

Cellebrite UFED Touch

slide-59
SLIDE 59

59

59

File The Motion, Get The Discovery, Win !!!!!

slide-60
SLIDE 60

60

60

Cellebrite Physical Analyzer & Extraction Software Interface

slide-61
SLIDE 61

61

61

Cellebrite Physical Software Extraction Summary

slide-62
SLIDE 62

62

62

slide-63
SLIDE 63

63

63

slide-64
SLIDE 64

64

64

Calls From Justice Moseley

slide-65
SLIDE 65

65

65

slide-66
SLIDE 66

66

66 Attorney David Pire

slide-67
SLIDE 67

67

67 MMS Messages – Messages That Include Multimedia Content

slide-68
SLIDE 68

68

68

slide-69
SLIDE 69

69

69

slide-70
SLIDE 70

70

70

slide-71
SLIDE 71

71

iPhone Embedded GPS / Geolocation Data

slide-72
SLIDE 72

72

72

slide-73
SLIDE 73

73

Locations – Exported As KML File To Google Earth

slide-74
SLIDE 74

74

74

slide-75
SLIDE 75

75

75

slide-76
SLIDE 76

76

76

slide-77
SLIDE 77

77

77

Cell Phone Forensics For Criminal Defense Attorneys

  • E. X. Martin – Dallas, Texas
slide-78
SLIDE 78

78

Video Recording

78

slide-79
SLIDE 79

79

Recent Case Regarding Interception Nonconsensual Communications

79

slide-80
SLIDE 80

80

Can Spouse Authorize Forensic Imaging?

  • Yes, provided it is marital property
  • There are NO reported court cases, but no

court has yet failed to let evidence in or has raised an objection to it

slide-81
SLIDE 81

81

GPS trackers - $99-$500, battery powered, average 10-50 days

slide-82
SLIDE 82

82

What can GPS trackers tell you?

  • Can pinpoint location
  • Can show the whole route
  • Detailed activity reports
slide-83
SLIDE 83

83

What can GPS trackers tell you?

  • Alerts

– Arrival at defined address – Departure from defined address – Notification if vehicle moves – Notification if a vehicle does not move by a pre-defined time – Operation at odd hours

slide-84
SLIDE 84

84

GPS Web trackers

  • Man who put tracker on top of car
  • Mechanics often find them and point them out to

the victim

  • Good idea to look around car once in a while
  • Usually are tipped off because the other party

seems to know too much

  • Your cell phone can also be a GPS tracker

– Verizon (Family locater) – Sprint (Family locater) – Can buy a cell phone, register for GPS service and hide it in spouse’s car

slide-85
SLIDE 85

85

Webcams

  • Do you know if the
  • ther party is

recording?

  • Today’s

boyfriend/girlfriend is tomorrow’s worst enemy

  • Easily hidden, often

wireless

slide-86
SLIDE 86

86

TYPES OF INTERCEPTION AND COMPROMISE

SOCIAL MEDIA & THE INTERNET

There are some do’s and don’ts that I provide my clients with regard to Facebook and other social networking sites that have a substantial impact on divorce in my family law practice. It is becoming a larger and larger issue in more and more divorce and custody cases. Social media sites are not only a source of information but a cause for concern.

86

slide-87
SLIDE 87

87

The following are some do’s and don’ts that are worthwhile to provide to your clients in the event of a divorce:

  • 1. Do not post messages on Facebook. It is dangerous even if you

have tight privacy settings. You never know what one of your “friends” may do with what you post. Be discreet.

  • 2. Do not post photos of your boyfriend or girlfriend on the internet. I

have handled divorces where one of the parties has posted Facebook pictures of boyfriends or girlfriends, even in the middle of a divorce.

87

slide-88
SLIDE 88

88

  • 3. Be careful what you are saying in e-mails or texts. Text messages

brought down the mayor of Detroit.

  • 4. Compromising videos. Even videos that are shot during a marriage

can come to haunt you in the event of a divorce, especially if they get in the wrong hands.

  • 5. Gambling online is a form of addiction. I have had cases where

people have lost substantial sums of money that impact on a

  • divorce. Don’t. If you have a gambling problem, seek help.

88

slide-89
SLIDE 89

89

  • 6. I have had cases with E-trading. Be careful.
  • 7. Shopping online. People buy, and spend a lot of money on line.
  • 8. Pornography. I have had many cases where computers are filled

with pornographic images.

  • 9. I have had many cases where people have met online and been

involved in extra-marital affairs.

89

slide-90
SLIDE 90

90

  • 10. People use credit cards for charges on adult sites, for

charges when they’re meeting people.

  • 11. Watch your children. The internet can be very dangerous to

children with predators lurking everywhere.

  • 12. Remember that even when you press the delete button, the

images remain on your hard drive and can be retrieved until

  • verwritten – and you never know when that will happen.
  • 13. E-mail can be a treasure trove of information in a divorce.

90

slide-91
SLIDE 91

91

All states have computer crime laws which generally say that you cannot gain unauthorized access to data even if you own the computer or it is a marital asset. If a password protects data, you cannot guess or crack the password – or install spyware. If your client has done this, you may have to advise them to “take the Fifth.”

91

slide-92
SLIDE 92

92

  • SPYWARE

Spyware is never legal in divorce cases – it is illegal under both the federal wiretap law and state wiretap laws. Some clients become addicted to watching what their spouse is doing. You cannot continue to represent them if they will not stop because you then become part of the deceitful conduct.

  • GPS TRACKING

The laws are all over the map from state to state – there is no federal law except respecting law enforcement.

92

slide-93
SLIDE 93

FACEBOOK AS EVIDENCE

In 2010 and 2011, Westlaw revealed 689 published cases involving social media. In any divorce or other legal proceeding the key is that Facebook entries, You Tube videos, email exchanges, tweets, texts, and picture posts, that a client might have considered private, are discoverable and can be useful in a legal proceeding.

93

slide-94
SLIDE 94

1. The first issue is proper authentication due to the possibility of alteration, or that the communication was counterfeit. 2. The next issue is relevance. 3. The third issue is that if you are trying to offer it into evidence, you must show that the posting, photo, or other information was done by the particular person or entity who you claim it was posted by.

94

slide-95
SLIDE 95

4. Has the person or entity shared the password with any other person or entity? 5. Show whether the person or entity profile contains identifiable personal information, including birthdates, photographs, and other unique or known information about that person or entity. 6. Discovery Interrogatories should be sent to determine what sites, if any a party uses, the IP address, the user names, and the passwords.

95

slide-96
SLIDE 96

Another discovery method can be to have the opposing parties sign an authorization to provide access to that parties social media

  • profile. Facebook has recently added a feature allowing users to

download each and every activity from account opening to the final status update to a zip file. There are cases going in different directions regarding whether passwords should be turned over so that a party can make sure they are obtaining all of the requested content.

96

slide-97
SLIDE 97

The best interests of the child is almost universal regarding custody and parenting time. Suspicion of abuse, compromising photos, inappropriate activity that shows up

  • n Facebook are all fair game.

An example is the case of Elissan v. Lanb, Op. 51339(U), NY Family Court Monroe County (April 7, 2011). In this case, the mother used Facebook and blogs to rant about her ex-husband.

97

slide-98
SLIDE 98

These inappropriate photos clearly were evidence and had bearing on the court’s decision that the mother was a less fit parent than her ex-husband. There are cases across the country that have addressed the issue of social media content. The cases involved concluded that a profile or post from a party or witness that is public information is fair

  • game. See: NY Comm. Prof’l Ethics Op. 843 (9/10/10).

98

slide-99
SLIDE 99

Another issue is that a lawyer should not use assumption or trickery, such as friending a person under false pretenses to gain access to private information. See: Philadelphia Op. 2009-02; Assoc.

  • f the Bar of New York, Op. 2010-(2).

The use of social media as evidence is a growing field with technology far outpacing the law at this point.

99

slide-100
SLIDE 100

§ 16.06. UNLAWFUL INSTALLATION OF TRACKING DEVICE Texas Penal Code 16.06 A person commits an offense if the person knowingly installs an Electronic or mechanical tracking device on a motor vehicle owned Or leased by another person. Affirmative Defense: Obtained consent of the owner or lessee of the Vehicle before installation or was a peace officer with court order. Class A Misdemeanor

100

slide-101
SLIDE 101

Parties To Divorce Proceedings Have Been Prosecuted & Convicted Under § 16.02

Neither the Texas Penal Code nor the Federal Wiretap Statutes contain an exception for wiretaps between spouses. ****Party to a divorce in Collin County Texas has been arrested, tried, and convicted of unlawful interception of an electronic communication. See: Duffy v. State, 33 S.W.3rd 17 (Tex.App.-El Paso 2000)

101

slide-102
SLIDE 102

Admissibility Of Tape Recorded Evidence

Before tape recordings can be excluded from evidence, the objecting Party must show that their exclusion is required under either the federal Or state statute. Practice & Remedies Code does not specifically provide For the exclusion of illegally obtained evidence in a civil lawsuit.

Collins v. Collins, 904 S.W.2nd 792 (Tex.App. – Houston [1st Dist.] 1995)

Held that tape recorded conversations were not admissible because the Criminal statute dealing with the use of the intercepted communications Criminalizes their dissemination, and the civil statute provides a method To prevent dissemination. To permit such evidence to be introduced at Trial when it is illegal to disseminate it would make the court a partner To the illegal conduct the statute seeks to proscribe.

102

slide-103
SLIDE 103

Crimes Targeting A Specific Computer Or Network

Breach Of Computer Security - §33.02 Texas Penal Code

Hacking !!!!!

A person commits an offense if the person knowingly accesses a computer, computer network, or computer system without the effective consent of the owner. Class B Misdemeanor – unless in committing the offense the actor Knowingly obtains a benefit, defrauds or harms another, or alters, Damages, or deletes property.

Class A Misdemeanor To 1st Degree Felony

103

slide-104
SLIDE 104

Invasion Of Privacy

Supreme Court of Texas Texas State Employees Union v. Texas Dep’t of Mental Health & Retardation 746 S.W.2d 203 (Tex. 1987) Held: The Texas Constitution protects personal privacy from unreasonable Intrusion and guarantees the sanctity of the home and person against unreasonable intrusion.

Thomas v. Allsip

836 S.W.2d 825 (Tex.App.—Tyler 1992, no writ) Complainant must show:

  • 1. Conduct in the nature of an intrusion
  • 2. Private nature of the place intruded upon
  • 3. Intrusion was substantial and conduct highly offensive to

a reasonable person.

104

slide-105
SLIDE 105

Texas Civil Practices and Remedies Code Sec. 123.002

This statute creates a civil cause of action for interception “without the consent of a party to the communication.” “Communication” is defined as, “speech uttered by a person or information including speech that is transmitted in whole or in part with the aid of a wire or cable.” Sec. 123.001. A person who establishes a cause of action under Sec. 123 is entitled to: (1) an injunction prohibiting a further interception, attempted interception, or divulgence or use of information obtained by an interception; (2) statutory damages of $10,000 for each

  • ccurrence;

(3) all actual damages in excess of $10,000; (4) punitive damages in an amount determined by the court or jury; and (5) reasonable attorney's fees and costs.

105

slide-106
SLIDE 106

Online Impersonation – Texas Penal Code § 33.07

It is a 3rd Degree felony if a person without obtaining consent And with the intent to harm, defraud, intimidate, or threaten Any person, uses the name or personal data of another person to: (1) Create a web page on a commercial social networking side

  • r other Internet website; or

(2) Post or send one or more messages on or through a commercial social networking site or other Internet website, other than on or through an electronic mail program or message board program.

106

slide-107
SLIDE 107

A life is only important in the impact it has on others.

107