Monday, July 29, 2013

Small Business Cloud Computing




Small Business Cloud Computing

Lawyer: Cloud computing implementation can provide edge in courtroom


This guest article is written by Clarke Dummit of The Dummit Law Firm and is the fourth in a series of legal IT experts, attorneys and IT consultants who share their expertise on how legal firms can successfully and securely integrate IT into their practices.


In this day and age, being a smart and experienced trial lawyer, or “courtroom lawyer,” is not enough to be a great advocate for your client.  You have to be cutting edge in the use of technology, or you are just not practicing good law.  Not only is staying current the best business practice, but it will give you the slight edge in a courtroom, which is what out clients are hiring us to do.  

Office technology and practice issues

A large part of the practice of law is the collection, organization, and then communication of facts and legal concepts; cutting edge technology allows this process to flow smoother, and allows more minds to participate in the process; and you know three heads are better than one.   An aggressive firm must work swiftly to move as much as possible into the cloud, then reorganize the information into collaborative venues so all three heads of the beast can communicate effectively: the client, the staff and the attorneys. 

This is a constant work in progress as technology is ever evolving.  We have been utilizing Google Apps for many of these integrations; however Google is not yet 100% developed.  We are still working on the best project management tools within Google Apps to integrate the Email, projects, calendar, and tasks.  Our intra-net is hosted at Google put under our own domain so we have internal site, calendar, and resources available in the cloud.  We are open in two cities in North Carolina and expanding into a third.  Practicing good business and resource usage is critical to effectively representing our clients.  However we are still waiting for better security in the cloud before we move our client database and case management our into the cloud.  We expect that is still 6-9 months out.  

Legal IT and Courtroom Technology In Practice 

The Dummit Law Firm is utilizing Zoom tablets for mobile video conferring  directly from the courthouse, and developing our in house video editing so we are using tablets in the courtroom to display video clips as attorney’s used to use photos.  We lock down just the portion of the police video as we wish to use, then maintain it in a sub-file and only play that portion (directly from the tablet), during cross examination, as most effectively proves our point.  This gives our trail attorneys control over a video clips in the courtroom is a way that the opposing counsel, cannot control.  It is only if your law firm invests in, learns, trains, then utilizes technology that you can use it well under pressure in a courtroom.   

The most exciting development on the horizon right now for our practice is the development of using juror’s mobile devices in the court room during trials.  In a very short time, relatively, we will be asking jurors to pull out their phones, and follow along on their personal device, as we lead a witness on the stand through an exhibit or video on a tablet.  Yes, that day is still a little way out, not technologically, but in terms of acceptance in the courtroom.  We want to be leading the pack, not following.

Thursday, July 18, 2013

Give More Privacy to Email






An amendment proposed to the Electronic Communications Privacy Act may make it more difficult to obtain subscribers' webmail.


Extracted from

Law Technology News

July 19, 2013

From 1986 to 1987 the Internet Protocol became a standard operating procedure on PCs and the number of networks increased from 2,000 to 30,000. Given how far the internet has come since that time, it might be surprising to find that the most recent law requiring privacy standards for electronic communications is also from 1986.

With that in mind, several of the largest technology and internet companies have joined forces with conservative and liberal organizations in a show of solidarity for a proposed amendment to the 1986 Electronic Communications Privacy Act. In a July 12 letter to the Senate, technology and internet companies such as Microsoft, Oracle, Intel, Adobe, Facebook, Twitter, Google, and Yahoo urged passage of the amendment, which would modernize the ECPA and increase the level of protection given to emails and electronic communications from the government.

Under the current law, government agencies wishing to seize emails from third-party servers (like Yahoo or Gmail) need a warrant only for emails less than 180 days old. After that, the emails are considered to be abandoned under the ECPA, and the government only needs a subpoena or court order to get them. "Court orders and subpoenas are easier for law enforcement to obtain than a search warrant," said Wiebke Lips, a spokesperson for Adobe, in an email. "This may have made sense in 1986, long before the wide-spread adoption of cloud-based email and storage solutions. It does not make sense today."

The proposed amendment from Senators Patrick Leahy (D-Vermont) and Mike Lee (R-Utah) would force government agencies to get a warrant before they could access any emails or electronic communications stored on third-party servers, regardless of when they were received. "American consumers and businesses large and small are increasingly taking advantage of the efficiencies offered by web-based email servers and cloud-based storage and computing," the letter states. "Removing uncertainty about the level of legal protection afforded such information will encourage consumers and companies, including those outside the U.S., to utilize these services."

The letter also expressed opposition to a proposal from the Securities and Exchange Commission granting the agency an exemption from the amendment. In an April 24 letter to Senate Judiciary Committee Chairman Leahy, SEC Commissioner Mary Jo White cautioned that the amendment would have a "significant negative impact" on the SEC's enforcement capabilities. White argued that getting a subpoena or warrant for emails every single time was impractical and would encourage individuals or entities under investigation to delete incriminating emails. Instead, White proposed preserving the SEC's ability to get emails directly from third-party providers, "in appropriate circumstances."

"The SEC wants special treatment and wants the law to clarify that they don't need a warrant," says David LeDuc, senior director of public policy at the Software & Information Industry Association — a signatory of the letter. "It's shocking to us that they feel so emboldened to do that." LeDuc says that he and members of the Center for Democracy & Technology are currently in discussions with the SEC to see if they come to a resolution.

Instead, the companies and organizations argue that the traditional system should be maintained.A regulatory agency serves a subpoena on the target of its investigation forcing the target to turn over documents relevant to the subpoena. "The SEC proposal would turn that process on its head," the letter said. "If a civil regulatory agency could serve process on the target's communications service provider, the provider would be forced to turn over all of the information in the target's account, even if irrelevant to the subject of the investigation or legally privileged."

The amendment has galvanized companies and organizations of all persuasions. Signatories to the July letter span the spectrum of right and left wing politics, and big business, and non-profit interest groups. Supporters of the amendment include the U.S. Chamber of Commerce, conservative political organization Americans for Tax Reform, Tea Party group FreedomWorks, and internet civil liberties groups such as the Electronic Frontier Foundation and Demand Progress.

"At Adobe, we believe customer private communications should receive full constitutional protections," said Adobe spokesperson Lips. Other groups cite additional consequences of leaving the ECPA unamended. The Chamber of Commerce, for instance, worries about losing jobs to overseas competitors. "EU companies are pitching customers, telling them they should store stuff in the EU because they have stronger privacy protections than the United States," says Jason Goldman, senior telecommunications policy counsel for the Chamber, in an interview with Law Technology News. Meanwhile, Mason Clutter, national security and privacy counsel at the National Association of Criminal Defense Lawyers (link: http://www.nacdl.org), tells LTN that many of regulatory agencies have criminal components to them, meaning they could share information easily. "Regulatory agencies could obtain private information without a warrant and then hand it over to their criminal law counterparts to be used in prosecutions," says Clutter.

The amendment passed by the Senate Judiciary Committee in April. A vote before the full Senate has not yet been scheduled. On Wednesday, the House of Representatives Appropriations Committee unanimously passed a similar amendment giving emails the same protection as regular mail. "The IRS, SEC, and other government agencies have stated Americans don't have an expectation of privacy with their email,"

Victor Li is an LTN staff reporter. Email: VLi@alm.com.

Tuesday, July 9, 2013

Six Reasons Your Best Employees Quit You




Extracted from Forbes

By: Lewis Efron


There’s a saying that employees don’t leave companies, they leave managers – and today they are leaving more often than ever. According to recent Department of Labor statics, the average tenure of an employee in the U.S. is now only 1.5 years. What do these numbers mean? Are managers doing that bad of a job engaging and retaining their people. Is this churn and burn dynamic the new norm?

Wherever the macro trends are headed, the ability to engage and retain talented employees is a critical skill for managers. Here are six reasons good employees quit you and how to keep them – none of which involves throwing a pile of money around:

1) No Vision

Most employees don’t get out of bed each morning trying to hit a profit number. In the majority of companies there are only a handful of people that truly care about it or, in some cases, even understand exactly what it means to hit that number. As a manager, don’t confuse your financial objectives with vision. Vision feeds financials and not the other way around.

For example, Walt Disney DIS +1.39% was the master of painting a compelling vision of the future. He dreamed up Disneyland while his two young daughters were riding the carousel at Griffith Park in Los Angeles. Sitting on a park bench with other parents, he envisioned a place where both children and adults could play together. Today, Walt Disney’s vision is worth $128 billion and is his company is the largest media conglomerate in the world. Successful managers sell their employees on a vision of the future.

2) No Connection To The Big Picture

Gallup’s Q12 employee engagement survey asks the following question: “The mission or purpose of my company makes me feel my job is important.” Their extensive research shows that there is a direct correlation between how employees rate that one question and employee retention, customer metrics, productivity, and profitability. Gallup concludes that “The best workplaces give their employees a sense of purpose, help them feel they belong, and enable them to make a difference.”

One example of this dynamic is Google GOOG +1.25%. While almost no one understands exactly how Google’s search engine works, its mission is clear: “to organize the world’s information and make it universally accessible and useful.” It is a simple, actionable, and meaningful connection to the huge company. Successful companies and managers understand that business strategies may change, but a mission does not.

3) No Empathy

No one joining the workforce today expects to get a gold Rolex after 50 years with the same company. Employers let hundreds and thousands of people go each year while employees are just as likely to leave companies for other opportunities. Generally speaking, there is very little loyalty on either side. But there is an almost ridiculously simple and inexpensive solution for that problem: Take the time to listen to your people.

This is not just talk therapy – they should leave the conversation believing that you will take whatever action may be helpful and possible or at least logically explain why nothing can be done. But by leaving your door open to employee concerns and suggestions, leaders encourage them to feel that they have a stake in an organization that considers them important and cares enough to listen.

4) No (Effective) Motivation

In the 1990s, I spent several years working as a producer and director of Off Broadway productions. This wasn’t particularly lucrative work and I had to take on waiter jobs to pay my rent. But for theater aficionados like me, waiting tables was just a side job to enable me to do what I loved. In what I considered my “real work,” the rewards frequently consisted of internal gratification or audience applause. I certainly wouldn’t have turned down a big payday, but I could walk away from a poorly paid performance satisfied that I had done good work.

On the other hand, as a waiter I measured my success in cash, by the tips I had made. I rarely ended a poorly paid shift simply happy to have provided really good service. What’s more, because my job as a waiter offered nothing more than an opportunity to walk away with cash in hand, my connection to my employer was also monetized – a surprisingly weak connection.

In his 2009 book Drive, author Daniel Pink examined decades of social experiments that described the phenomenon that I had experienced in terms of “extrinsic” and “intrinsic” motivators. The “extrinsic” motivators consist of traditional carrot and stick rewards such as cash bonuses or punishment – the reward environment in which waiters work.

The “intrinsic” motivators are internal desires to do good work or create a successful product – the goal of many people working in the theatre. Pink’s argument is that, in the modern workplace, the “extrinsic” system of rewards is often a less effective motivator, but one on which too many managers still rely. In fact, there is no greater myth in managing a team or company than believing financial compensation is a sufficient incentive to engage and retain top talent and drive high performance.

5) No Future

In her Forbes article “What Employers Need To Know About The Class of 2012,” Jacquelyn Smith cites a recent study that shows that the majority of graduating students are looking for career advancement over anything else. This is certainly not a new concept, but a big disconnect from today’s burn and churn, transient employment market.

Creating career paths that are well communicated and understood by employees is not something most companies do well. Even in the best-case scenario where managers are holding regular performance reviews with their employee, employees often don’t understand how to move either horizontally or vertically in an organization. Of course, not every employee is going to end up as the CEO. Likewise, a person who is brilliant at product design won’t necessarily succeed in sales. But, for any employee that is worth retaining, a manager must make clear to them how and where they can move forward on their career path.

6) No Fun

For many employees, instant gratification is the new norm. The evolution of film, television, the internet, social media, and handheld devices means that everything is on demand all the time and wherever we may be. As a result, putting in eight straight hours of work at the same desk is less and less attractive to many employees. But this doesn’t mean the work force is lazier, it’s because defining work in such a traditional manner doesn’t make sense to employees in today’s constantly interconnected and fast-paced world.

For businesses, this means that attracting, engaging, and retaining top talent depends on reinventing their work environments, blurring the line between work and play. Companies must embrace a culture of increased autonomy and innovation, and engage employees around a powerful mission and purpose.


In 2003, Best Buy BBY +0.98%’s H.R. leaders began piloting a new approach to this engagement problem. Slowly, department-by-department, they rolled out a program called ROWE (Results-Only Work Environment) that relied on increased employee engagement by reducing work to a baseline: productivity. That was it!

Employees were released from a world of mandatory meetings, nine-to-five schedules, and long commutes. It was a radical departure and the results were emphatically positive, engagement rose, causing a spike in performance. The pilot continued until it was adopted throughout the entire Best Buy headquarters operation. In 2006 the company was included on Fortune’s list of America’s Most Admired Companies.

Of course, ROWE was designed to relieve the tedium of office work and there are serious limitations to this specific program. It is hard to imagine how a schedule-free, post-geographic work environment could be successful for a restaurant or a roofing company. And, sure enough, Best Buy was unable to roll out a version of ROWE to help combat the company’s 67% turnover rate at their retail stores. But the biggest lessons of ROWE’s measurable success – thinking about work as fun and flexible – can still be applied to any size and type of business, creating more productive work environments at every level.

Friday, July 5, 2013

Smartphone Searches



Extracted from: The Journal of the Missouri Bar

Written by:  H. MORLEY SWINGLE


Smartphone Searches
Incident to Arrest
 
 
 
 
Pursuant to the search incident to arrest doctrine, police officers have long been authorized to search the pockets, purses, wallets and other containers found on the person of suspects they have arrested. Courts are split, however, as to whether the reasonableness standard of the Fourth Amendment allows an arrest­ing officer to rummage through the massive and often personal con­tents of a cell phone or smartphone seized incident to an arrest.
 
Introduction
 
On a cold March morning in 2008, a public school teacher was arrested for driving while intoxicated. The arresting officer patted him down pursuant to a search incident to arrest and found a cell phone in his pocket. The officer opened the phone’s photograph folder and discovered pictures of the schoolteacher and his naked girlfriend in “sexually compromising positions.”2 Delighted with his find, the officer radioed other officers not involved in the arrest to come look at the photos for their “enjoyment.”3 Can it happen? It did, in Virginia. In a civil rights case brought by the schoolteacher against the police officer, a federal court ruled that the of­ficer was protected by qualified immu­nity since the scope of a search incident to arrest of a smartphone is still an open question under the law of search and seizure.4 In the majority of jurisdic­tions, the search of the contents of a cell phone on the person of an arrestee is allowed as a valid search incident to arrest.5 In a minority of jurisdictions, it has been held to be an unreasonable search.6 No Missouri appellate court has yet ruled upon the issue.
 
The Fourth Amendment
 
All warrantless searches are governed by the Fourth Amendment, which assures people the right “to be secure in their persons, houses, papers and ef­fects against unreasonable searches and seizures.”7 Reasonableness is the key. In the context of searches incident to a valid arrest, it has long been the rule that the area within the “wingspan” or “grab area” of the person being arrested may be searched, as well as the contents of his pockets and any containers on his person. This full search of the arrestee and the area within his immediate reach at the time of the arrest may be made without regard to any specific exigency or the seriousness of the offense, and regardless of any probability that the search will yield a weapon or evidence of a crime.8 The U. S. Supreme Court in United States v. Robinson9 and Chimel v. California10 established this “bright-line rule” in order to make the law easy to understand and apply.11 The rationale for the rule makes sense in that a person might have something in his pockets that could be used as a weapon against the officers, or that might constitute evidence that could be surreptitiously destroyed or discarded before the offi­cers got the suspect to the stationhouse. Under this traditional analysis, searches incident to arrest have been extended to things like purses,12 wallets,13 pagers,14 address books,15 briefcases,16 cigarette packages,17 aspirin bottles,18 film can­isters,19 gunshot residue testing20 and fingernail scrapings.21 As long as the sus­pect was validly arrested, pursu­ant to either probable cause or an arrest warrant,22 the search of his person and any containers on his person is fair game.
 
Smartphone Ubiquity and Capabilities
 
The beauty of the Fourth Amendment is that, by its use of the word “unreasonable,” it remains adaptable to the times. When 38-year-old James Madison worked on his first draft of the Fourth Amendment 200 years ago, he could not possibly have envisioned a time when a person would have in his pocket a device that could be used not only to communicate with other people, but to store thousands of photographs, e-mails, text messages, personal correspondence, medical records, addresses of family members and friends, plus records of re­cent phone calls made and received and Internet sites visited. In fact, an iPhone has enough memory to store more than “220,000 copies of the complete text of Lewis Carroll’s Alice in Wonderland.”23 If Madison were alive today, he would undoubtedly own one.
 
The use of cell phones and smart­phones has increased by leaps and bounds. Until the mid-1990s, cell phones were merely portable tele­phones.24 In that decade “Nokia intro­duced the first cell phone that was also a ‘hand-held’ computer.”25 Now, many cell phones are actually mini-computers, known as “smartphones,” and “store address books, calendars, voicemails, … text messages, … photos, music, movies, e-mails …, Internet history, … social networking profiles,” financial records, word processing applications, GPS location navigation records and personal notations.26 As of June 2010, there were nearly 293 million cell phone subscrib­ers in the United States,27 “almost ten times the number in 1994.”28 Experts estimate that by 2013 half of the cell phone users will carry smartphones.29 The U. S. Supreme Court recently observed: “Cell phone and text message communications are so pervasive that some persons may consider them to be essential means or necessary instruments for self-expression, even self-identifica­tion.”30 Is it reasonable to allow police officers to rummage through a citizen’s personal data simply because he has been arrested and happens to have his smartphone in his pocket at the time of his arrest? The issue will face more and more courts. So far, cases have come down on both sides.
 
Courts Approving Smartphone Searches Incident to Arrest
 
The most frequently cited case involv­ing a search of a cell phone is United States v. Finley.31 In this 2007 case, the court held it reasonable to search the text messages and call records of a cell phone incident to an arrest. The Finley court considered a cell phone just another type of container, and “[t]he permissible scope of a search incident to a lawful arrest extends to containers found on the arrestee’s person.”32 This has become the viewpoint in the major­ity of jurisdictions considering the is­sue.33 Existing case law strongly suggests that police officers may even unlock a password-protected phone seized during an arrest.34
 
Courts Disallowing Smart­phone Searches Incident to Arrest
 
In 2009, the Supreme Court of Ohio issued the most clear-cut case holding that a search of a smartphone incident to an arrest is unreasonable under the Fourth Amendment.35 In State v. Smith, the court held that because a smart­phone allows for high-speed Internet access and is capable of storing “tre­mendous amounts of private data,” it is unlike other containers for the pur­poses of Fourth Amendment analysis.36 Because of the large amount of personal information in a modern cell phone, its user has a high expectation of privacy in its contents; accordingly, “[o]nce the cell phone is in police custody, the state has satisfied its immediate interest in collecting and preserving evidence and . . . must then obtain a warrant before intruding into the phone’s contents.”37 A minority of other courts has reached the same result.3838 / Journal of the MISSOURI BAR
 
Applying Arizona v. Gant to Smartphone Searches
 
Although a case involving the search of a smartphone incident to an arrest has not yet made it to the
U. S. Supreme Court, it seems likely the Court might apply to such searches the same rule recently articulated for searches of occupants of automobiles incident to an arrest.39 Prior to 2009, the U. S. Supreme Court, in New York v. Belton,40 drew a “bright-line” around the interior compartment of a car, holding that if an occupant of a car was arrested, the passenger compartment of the car could be searched incident to that arrest, whether or not the arrestee was still within lunging distance of the car, and regardless of the type of crime for which the subject was being arrested. It was a simple rule, easy to apply on the street and in the court­room. In Arizona v. Gant,41 the Court rescinded that particular bright-line, holding that when an occupant of an automobile has been arrested, his car cannot be searched if he is no longer in a position to grab something in the car, with the only exception being that when officers have reason to believe that evidence of the specific crime for which they arrested him might be in the car, they can search it for evidence related to the arrest.
 
The Court in Gant explained its reasoning for scaling back the scope of a search of a car incident to arrest:
It is particularly significant that Belton searches autho­rize police officers to search not just the passenger com­partment but every purse, briefcase, or other container within that space. A rule that gives police the power to conduct such a search whenever an individual is caught committing a traffic offense, when there is no basis for believing evidence of the offense might be found in the vehicle, creates a serious and recurring threat to the privacy of countless individuals.42
 
Certainly, the threat of police officers rummaging through the contents of a cell phone belonging to a person who has merely committed a traffic offense is just as serious a threat to privacy as rummaging through the contents of a car.
 
The Gant “evidence-related-to-crime-of-arrest” analysis provides a workable framework to apply to searches of smartphones incident to arrest.43 Using an objective standard, if the officers have reasonable grounds to suspect that evidence of the crime for which they just arrested the individual might be in the phone, they could search it without a warrant. Other­wise, the phone’s contents would be off limits unless a judge found that probable cause existed for the issu­ance of a search warrant to examine the contents of the phone, or unless one of the other traditional exceptions to the search warrant requirement applied. Other possible exceptions potentially applicable to warrantless searches of cell phones include exigent circumstances,44 the automobile exception,45 the inventory exception,46 “the inevitable-discovery doctrine,”47 plain view,48 and consent.49
Examples of the application of the Gant test to searches incident to arrest are easy to imagine, and in some cases have already been litigated.
 
An officer who has arrested a drug dealer for a just-completed drug sale would have reasonable suspicion to think that telephone records, emails and even photographs of illegal drugs and accomplices might be in the phone.50 For example, a federal court recently held that the Gant limita­tions on a search incident to arrest of an occupant of a vehicle, if applied to cell phones, would allow officers who have arrested a drug dealer to search his cell phone for evidence related to his drug-dealing.51 On the other hand, another court ruled that while it would be reasonable to think evidence of the crime of arrest might be pres­ent in the cell phone when arresting a suspect for a just-completed drug sale, the lapse of 10 months between the date of the crime and the time of arrest, caused by a lengthy grand jury investigation, made it unlikely that evidence pertaining to the old drug sale would still be in the phone; hence, a search of the phone incident to arrest was improper.52
 
The California Court of Appeals recently held it lawful to search a car and the cell phone found inside it for evidence of drug use incident to the defendant’s arrest for driving under the influence of drugs. In regard to the cell phone, it was reasonable to sus­pect that it might “contain text mes­sages related to acquiring and offering drugs,” or “might have identified the controlled substance” involved, or amounting to admissions “as to what [the driver] had done that night.”53
 
As with recent drug sales and drug use, it is also reasonable for an arrest­ing officer to believe that a recently-ar­rested child pornographer might well have images of naked children in his phone; that a child molester just ar­rested for trying to lure an under-aged victim to meet him in a park might have text messages and e-mails relating to this victim or other victims in his phone; that a murder suspect placed under arrest might have in his phone photographs, texts or e-mails connect­ing him to the victim; that a person arrested for texting while driving might have text messages in his phone proving that he had just been using it; or that a man arrested for stalking a woman would have photographs, mes­sages or other information pertaining to her in his phone.
Conversely, a suspect arrested for driving while revoked would be unlikely to have evidence pertaining to his crime in his cell phone. For example, in United States v. Quintana, the court held that the cell phone of a suspect arrested for driving while sus­pended could not be searched incident to the arrest, explaining:

Where a [suspect] is arrested for drug-related activity, po­lice may be justified in search­ing the contents of a cell phone for evidence related to the crime of the arrest, even if the presence of such evidence is improbable. In this case, however, Defendant was arrested for driving with a suspended license. The search of the contents of Defendant’s cell phone had nothing to do with officer safety or the pres­ervation of evidence related to the crime of arrest.54

The same analysis would seem to ap­ply to a routine alcohol-related DWI arrest.

Likewise, it is hard to imagine how a person arrested for shoplifting, pass­ing bad checks or jaywalking would be likely to have evidence relating to the crime of arrest in his phone.
 
In each case, the test is an objec­tive one, based on the totality of the circumstances. When the officer has articulable suspicion that evidence of the crime of arrest is in the phone, he may conduct a warrantless search inci­dent to the arrest. Otherwise, he must wait and apply for a search warrant, and let a neutral and detached magis­trate make the decision as to whether probable cause exists to search the contents of the smartphone. Applica­tion of the Arizona v. Gant analysis to searches of cell phones incident to arrest would allow police to promptly seize relevant evidence in specific cases while still protecting the privacy rights of most citizens in most cases.

Exigent Circumstances

Exigent circumstances have al­lowed officers to conduct warrant­less searches of cell phones they have seized55 and to answer ringing cell phones in their custody.56 As technol­ogy continues to develop, the exigent circumstances exception will probably play a greater role in searches of smart­phones immediately after arrest. This is because many new phones, such as the iPhone, have remote-access wipe programs, allowing the data in the telephone to be deleted almost instan­taneously from a remote location.57 Such a feature would allow one drug dealer to wipe the data out of his co-conspirator’s telephone as soon as he realizes that his companion has been arrested. In these situations, exigent circumstances should allow officers to access the data without delaying to get a search warrant.58 In more than one 40 / Journal of the MISSOURI BAR

case, a search of a cell phone’s address book and call history incident to arrest has been upheld precisely because of this remote-access wipe capability.59 The issue may become complicated even more by the emerging use of Faraday bags, which are small light­weight bags into which police officers can place seized cell phones to prevent them from being remotely wiped.60 While these bags might prevent data inside the phone from being remotely wiped, they would not prevent data being stored in a “cloud” or other location from being destroyed, so exi­gent circumstances may still apply.

Conclusion

When dealing with new technol­ogy, the U. S. Supreme Court is often hesitant to paint new rules with a broad brush, precisely because tech­nology changes so quickly.61 What is reasonable in one decade can become unreasonable in another. For the time being, however, it seems that the best approach regarding searches of smart­phones under the Fourth Amendment is to hold that they are off limits un­less the arresting officer can articulate reasonable suspicion to believe that evidence pertaining to the crime for which the suspect was arrested is in the phone. Otherwise, they must not be searched unless one of the other exceptions to the warrant requirement exists62 or unless the officer has taken the time and trouble to get a search warrant.

Endnotes

1 Mr. Swingle is the prosecuting attorney for Cape Girardeau County, Missouri. He is a member of the Supreme Court of Missouri’s Committee on Procedure in Criminal Cases and a 1980 graduate of the University of Missouri-Columbia School of Law. He carries an iPhone.
2 Newhard v. Borders, 649 F.Supp.2d 440, 444 (W.D. Va. 2009).
3 Id. at 444.
4 Newhard v. Borders, 649 F.Supp.2d 440 (W.D. Va. 2009).
5 See United States v. Curtis, 635 F.3d 704 (5th Cir. 2011); United States v. Pineda-Areola, 372 F. App’x 661 (7th Cir. 2010); United States v. Fuentes, 368 F. App’x 95 (11th Cir. 2010); Silvan W. v. Briggs, 309 F. App’x 216 (10th Cir. 2009); United States v. Murphy, 552 F.3d 405 (4th Cir. 2009); United States v. Young, 278 F. App’x 242 (4th Cir. 2008); United States v. Finley, 477 F.3d 250 (5th Cir. 2007); United States v. Gomez, No. 11-20304-CR, 2011 WL 3841071 (S.D. Fla. Aug. 31, 2011); United States v. Hill, No. CR 10-00261 JSW, 2011 WL 90130 (N.D. Cal. Jan. 10, 2011); United States v. Salgado, No. 1:09-CR-454-CAP-ECS-5, 2010 WL 3062440 (N.D. Ga. June 12, 2010); United States v. Faller, 681 F.Supp.2d 1028 (E.D. Mo. 2010); United States v. Wurie, 612 F. Supp.2d 104 (D. Mass. 2009); United States v. McCray, No. CR408-231, 2009 WL 29607 (S.D. Ga. Jan. 5, 2009); United States v. Gates, No. 08-42-P-H, 2008 WL 5382285 (D. Me. Dec. 19, 2008); United States v. Santillan, 571 F.Supp.2d 1093 (D. Ariz. 2008); United States v Deans, 549 F.Supp.2d 1085 (D. Minn. 2008); United States v. Valdez, No. 06-CR-336, 2008 WL 360548 (E.D. Wis. Feb. 8, 2008); United States v. Curry, No. 07-100-P-H, 2008 WL 219966 (D. Me. Jan. 23, 2008); United States v. Dennis, No. 07-008-DLB, 2007 WL 3400500 (E.D. Ky. Nov. 13, 2007); United States v. Lottie, No. 3:07-cr-51-AS, 2007 WL 4722439 (N.D. Ind. Oct. 12, 2007); United States v. Mercado-Nava, 486 F.Supp.2d 1271 (D. Kan. 2007); United States v. Brookes, No. CRIM 2004-0154, 2005 WL 1940124 (D. V.I. June 16, 2005); United States v. Cote, No. 03CR271, 2005 WL 1323343 (N.D. Ill. May 26, 2005); People v. Diaz, 244 P.3d 501 (Cal. 2011); Fawdry v. State, 70 So.3d 626 (Fla. Dist. Ct. App. 2011); Smallwood v. State, 61 So.3d 448 (Fla. Dist. Ct. App 2011); State v. Nix, 237 P.3d 842 (Or. Ct. App. 2010); State v. Wilkerson, 683 S.E.2d 174 (N.C. 2009); State v. Harris, No. 1 CA-CR 07-0810, 2008 WL 4368209 (Ariz. Ct. App. Sept. 23, 2008).
6 See United States v. McGhee, , No. 8:09CR31, 2009 WL 2424104 (D. Neb. July 21, 2009); United States v. Quintana, 594 F.Supp.2d 1291 (M.D. Fla. 2009); United States v. Wall, No. 08-60016-CR, 2008 WL 5381412 (S.D. Fla. Dec. 22, 2008); United States v. Park, No. CR 05-375 SI, 2007 WL 1521573 (N.D. Cal. May 23, 2007); State v. Smith, 920 N.E.2d 949 (Ohio 2009).
7 U.S. Const. amend. IV.
8 United States v. Robinson, 414 U.S. 218, 236 (1973).
9 Id.
10 395 U.S. 752 (1969).
11 Adam M. Gershowitz, The iPhone Meets the Fourth Amendment, 56 UCLA L. Rev. 27, 45 (2008).
12 State v. Greene, 785 S.W.2d 574 (Mo. App. W.D. 1990); State v. Woods, 637 S.W.2d 113 (Mo. App. E.D. 1982).
13 United States v. Rodriguez, 995 F.2d 776 (7th Cir. 1993).
14 United States v. Chan, 830 F. Supp. 531 (N.D. Cal. 1993).
15 United States v. Holzman, 871 F.2d 1496 (9th Cir. 1989).
16 United States v. Valiant, 873 F.2d 205 (8th Cir. 1989).
17 United States v. Robinson, 414 U.S. 218 (1973).
18 Daniels v. State, 416 So.2d 760 (Ala. Crim. App. 1982).
19 State v. Greene, 785 S.W.2d 574 (Mo. App. W.D. 1990).
20 State v. Howell, 524 S.W.2d 11 (Mo. banc 1975).
21 State v. Magnotti, 502 A.2d 404 (Conn. 1985).
22 Virginia v. Moore, 553 U.S. 164 (2008).
23 Chelsea Oxton, Note, The Search Incident to Arrest Exception Plays Catch Up: Why Police May No Longer Search Cell Phones Incident to Arrest Without a Warrant, 43 Creighton L. Rev. 1157, 1162 (2010).
24 Jana L. Knott, Is There An App For That? Reexamining the Doctrine of Search Incident to Lawful Arrest in the Context of Cell Phones, 35 Okla. City U. L. Rev. 445, 454 (2010).
25 Id.
26 Knott at 455.
27 Ashley B. Snyder, Comment, The Fourth Amendment and Warrantless Cell Phone Searches: When Is Your Cell Phone Protected? 46 Wake Forest L. Rev. 155, 162 (2011).
28 Knott at 453.
29 Daniel Zamani, There’s An Amend­ment For That: A Comprehensive Application of Fourth Amendment Jurisprudence to Smart Phones, 38 Hastings Const. L.Q. 169, 170 (2010).
30 City of Ontario, Cal. v. Quon, 130 S. Ct. 2619, 2630 (2010).
31 477 F.3d 250 (5th Cir. 2007).
32 Id. at 260.
33 See note 5.
34 Adam M. Gershowitz, Password Pro­tected? Can a Password Save Your Cell Phone from a Search Incident to Arrest? 96 Iowa L. Rev. 1125, 1150 (2011).
35 State v. Smith, 920 N.E.2d 949 (Ohio 2009).
36 Id. at 954.
37 Id. at 955.
38 See note 6.
39 See Ben E. Stewart, Note, Cell Phone Searches Incident to Arrest: A New Standard Based on Arizona v. Gant, 99 Ky. L.J. 579 (2011); Gershowitz, note 34 at 1145; Justin M. Wolcott, Comment, Are Smartphones Like