Commonwealth v. Shaffer, J., Aplt. (concurring/dissenting)

Annotate this Case
Download PDF
[J-107-2018] [MO: Baer, J.] IN THE SUPREME COURT OF PENNSYLVANIA WESTERN DISTRICT COMMONWEALTH OF PENNSYLVANIA, Appellee v. JON ERIC SHAFFER, Appellant : : : : : : : : : : : No. 16 WAP 2018 Appeal from the Order of the Superior Court entered December 21, 2017 at No. 435 WDA 2017, affirming the Judgment of Sentence of the Court of Common Pleas of Butler County entered March 9, 2017, at No. CP-10CR-0000896-2016. ARGUED: December 6, 2018 CONCURRING AND DISSENTING OPINION JUSTICE WECHT DECIDED: JUNE 18, 2019 I concur only in the result that today’s learned Majority reaches. The Majority chooses to invoke our discretionary authority to affirm an order upon any basis, and does so on the basis of the “private search” doctrine.1 I would address instead the question of abandonment of privacy, which is the issue upon which this Court granted allocatur. As applied to these facts, this abandonment issue happens to resolve here in the Commonwealth’s favor. Accordingly, I would affirm the judgment of sentence, and I join the Majority only insofar as it reaches the same result. As my path to that result diverges from the Majority’s, I respectfully dissent from the Majority’s rationale. As the Majority aptly summarizes the history of the case,2 I reiterate here only those facts and events necessary to this discussion. On May 27, 2016, Jon Shaffer filed a motion seeking suppression of the child pornography seized from his personal computer. As the Majority recounts, Shaffer argued that Officer Christopher Maloney 1 Maj. Op. at 1-2 & n.1. 2 Id. at 2-12. unconstitutionally searched Shaffer’s computer without a search warrant when he directed a CompuGig employee to open the files on Shaffer’s computer and then proceeded to view those files. Shaffer argued that neither exigent circumstances nor any other exception to the warrant requirement of our Constitutions3 justified the warrantless intrusion. Shaffer asserted that he had a legitimate expectation of privacy in the contents of his laptop computer, an expectation which, he maintained, he did not relinquish by providing the computer to CompuGig for repairs. The Commonwealth responded by arguing that Shaffer abandoned any expectation of privacy that he had in the computer. The Commonwealth relied primarily upon the Superior Court’s decision in Commonwealth v. Sodomsky, 939 A.2d 363 (Pa. Super. 2007), a case that is both factually and legally similar to the instant dispute. On July 7, 2016, the trial court held a hearing on Shaffer’s suppression motion. Following testimony from CompuGig employee John Eidenmiller and Officer Maloney, the inquiry focused primarily upon the applicability of Sodomsky. The trial court found that the facts of this case were close enough to those in Sodomsky that the court was bound to apply its rationale. However, the trial court disagreed with the Commonwealth’s assertion that Shaffer abandoned his expectation of privacy the moment he delivered the computer to CompuGig. Instead, the trial court determined, it was not until Shaffer requested repairs that he abandoned any expectation that the contents of the computer would be kept private. At that point, Shaffer forfeited any right to challenge Officer Maloney’s actions. Consequently, the trial court denied Shaffer’s suppression motion, 3 In his brief to this Court, Shaffer invokes both the Fourth Amendment to the United States Constitution and Article I, Section 8 of the Pennsylvania Constitution. See Brief for Shaffer at 8. Shaffer does not provide an analysis pursuant to Commonwealth v. Edmunds, 586 A.2d 887 (Pa. 1991), in an effort to demonstrate that the Pennsylvania Constitution provides greater protections than its federal counterpart. [J-107-2018] [MO: Baer, J.] - 2 and, later sitting as the fact-finder, convicted Shaffer of the charges stemming from the images obtained from the computer. Initially, what is most important is what did not occur during the suppression proceedings. At no point did the Commonwealth assert that Officer Maloney’s actions with respect to the computer were constitutional due to an earlier private search. The Commonwealth placed all of its eggs into the Sodomsky basket (which addressed only whether a person has an expectation of privacy in these circumstances), and did not invoke the private search doctrine. The trial court ruled upon expectation of privacy grounds; it did not find that the search was a private one. Shaffer had no reason to anticipate or rebut any argument that Officer Maloney’s warrantless inquiry into the files on his computer was permissible as an extension of CompuGig’s private search. More importantly, Shaffer had no opportunity to create a record to defend against such an argument. As the Majority explains, the applicability of the private search doctrine hinges principally upon whether the police officer exceeded the bounds of the private action already undertaken.4 Given no reason to believe that the Commonwealth would one day claim that the search at issue was a private search, Shaffer had no cause specifically to cross-examine either Officer Maloney or CompuGig’s Eidenmiller regarding the particular actions performed by each. In a case involving the private search question, such cross-examination would be undertaken in order to ascertain whether Officer Maloney did, in fact, exceed the parameters of Eidenmiller’s actions. The case continued in the same character before the Superior Court, where the focus of the parties and the appellate panel remained upon Shaffer’s expectation of 4 See Maj. Op. at 20 (citing United States v. Jacobsen, 466 U.S. 109, 115, 117 (1984)). [J-107-2018] [MO: Baer, J.] - 3 privacy in the computer or his abandonment thereof. Once more, the Commonwealth did not raise the argument that the private search doctrine applied, and the Superior Court accordingly did not address that doctrine. The Superior Court held only that Shaffer had abandoned his expectation of privacy in the computer. We granted allocatur to address the following question: Does an individual give up his expectation of privacy in the closed private files stored on his computer, merely by taking his computer to a commercial establishment for service or repair, where the service or repair requested does not render the viewing of the citizen[’]s closed private files as foreseeable to either the customer or the computer technician? See Commonwealth v. Shaffer, 188 A.3d 1111 (Pa. 2018) (per curiam). Our order did not mention the private search doctrine, nor can one reasonably argue that the doctrine was fairly encompassed within the stated question. Nor did we direct any briefing or argument on the private search doctrine.5 The private search doctrine did not make any appearance in this case until it surfaced as the Commonwealth’s third line of argument in its brief to this Court.6 The Majority relies exclusively upon this tardy assertion to uphold Shaffer’s judgment of sentence. Under the “affirm-on-any-basis” jurisprudential device–which alternatively is known as the “right-for-any-reason” doctrine—the Majority undeniably has the 5 As the Majority correctly notes, the failure of the Commonwealth at any point to raise the issue does not amount to waiver of its right to raise it before us now. See Maj. Op. at 23-24 (citing Rufo v. Bd. of License & Inspection Review, 192 A.3d 1113, 1123 (Pa. 2018)). As the appellee at all stages, the Commonwealth had no burden to preserve any particular issue on pain of waiver. However, as I discuss below, the Commonwealth’s failure to do so undermines the notion that an issue raised for the first time before this Court is “of record” for purposes of our ability to affirm an order on any basis, and this failure places the other party at a significant disadvantage in his or her ability to argue successfully to this Court. 6 See Brief for the Commonwealth at 17. [J-107-2018] [MO: Baer, J.] - 4 discretionary authority to resolve the case in this manner. But there are compelling reasons not to do so. I. The Right-For-Any-Reason Doctrine The “right-for-any-reason” doctrine “allows an appellate court to affirm the trial court’s decision on any basis that is supported by the record.” In re A.J.R.-H., 188 A.3d 1157, 1175-76 (Pa. 2018) (citing Ario v. Ingram Micro, Inc., 965 A.2d 1194, 1200 (Pa. 2009)). The rationale behind the “right for any reason” doctrine is that appellate review is of “the judgment or order before the appellate court, rather than any particular reasoning or rationale employed by the lower tribunal.” Ario, 965 A.2d at 1200 (citing Hader v. Coplay Cement Mfg. Co., 189 A.2d 271, 274-75 (Pa. 1953)). As the United States Supreme Court has explained, “The reason for this rule is obvious. It would be wasteful to send a case back to a lower court to reinstate a decision which it had already made but which the appellate court concluded should properly be based on another ground within the power of the appellate court to formulate.” Sec. & Exch. Comm’n v. Chenery Corp., 318 U.S. 80, 88 (1943). Id. at 1176 (citations modified). However jurisprudentially economical the use of the doctrine may be, an appellate court is not bound to utilize it any time it can scour the record and find another basis upon which to affirm. The doctrine is, and always has been, discretionary and prudential. See id. at 1176 (“This Court has stated that an appellate court may apply the right for any reason doctrine . . . .”) (emphasis added); Commonwealth v. Wholaver, 177 A.3d 136, 145 (Pa. 2018) (“[I]t is well settled that this Court may affirm a valid judgment or order for any reason appearing as of record.”) (emphasis added); E. J. McAleer & Co. Inc. v. Iceland Prod., Inc., 381 A.2d 441, 443 n.4 (Pa. 1977) (“We may, of course, affirm the decision of the trial court if the result is correct on any ground without regard to the grounds which the trial court itself relied upon.”) (emphasis added). [J-107-2018] [MO: Baer, J.] - 5 The principal restraint upon an appellate court’s discretionary prerogative to apply the right-for-any-reason doctrine arises when the record does not contain a sufficient factual basis to support the new grounds for affirmance. As we explained most recently in In re A.J.R.-H., an appellate court may apply the doctrine if “the established facts support a legal conclusion producing the same outcome. It may not be used to affirm a decision when the appellate court must weigh evidence and engage in fact finding or make credibility determinations to reach a legal conclusion.” In re A.J.R.-H., 188 A.3d at 1176 (citing Chenery Corp., 318 U.S. at 88; Bearoff v. Bearoff Bros., Inc., 327 A.2d 72, 76 (Pa. 1974)). Thus, at the forefront of any inquiry into the propriety of the application of the rightfor-any-reason doctrine is the question of whether the newly asserted basis for affirmance is “of record,” i.e., whether the basis is supported by the existing factual record. In conducting this inquiry, we should not ignore how the record in this case was created. At no point before or during the evidentiary hearing on Shaffer’s motion did the Commonwealth raise the private search doctrine. Although the Commonwealth bears no issue-preservation duty as appellee, the arguments that it advanced in service of its initial burden at the suppression hearing played a significant role in the creation of the factual record. At the heart of any private search doctrine analysis is the question of whether the police officer’s subsequent actions exceeded those of the private citizen who conducted the first search.7 Had Shaffer been put on notice, actual or constructive, that he would have to rebut a private search argument, then or in the future, his counsel could have conducted the hearing differently, as any reasonably competent lawyer would. To defend against any private search claim, Shaffer’s counsel no doubt would have cross-examined 7 See Jacobsen, 466 U.S. at 115, 117; see also Maj. Op. at 20. [J-107-2018] [MO: Baer, J.] - 6 Eidenmiller in detail regarding the steps that the latter took until he eventually discovered the pornographic files. Counsel then would have inquired as extensively into Eidenmiller’s actions when Officer Maloney directed him to locate and display the files for the second time. Finally, counsel would have engaged in a similarly detailed examination of Officer Maloney. Only then would Shaffer have a factual record sufficient to oppose a claim of a private search and to argue that any discrepancies between the two searches (assuming that there were discrepancies and that the second search exceeded the first) rendered the private search doctrine inapplicable. At the very minimum, Shaffer should have had the opportunity to create a sufficient record. I do not maintain that notice always is a necessary precondition to application of the right-for-any-reason doctrine. Rather, under circumstances such as those presented here, the manner in which the record is created is both an important factor in an appellate court’s consideration of whether to apply the right-for-any-reason doctrine, and a significant factor in the crucial inquiry of whether the newly asserted basis for affirmance is “of record.” The sole inquiry from the outset of this case up to and through our grant of allocatur was whether Shaffer had an expectation of privacy in the laptop computer that he dropped off for repairs at CompuGig. That inquiry differs significantly from one assessing the private search doctrine. As a general matter, there are two essential elements that must be present before any search can be challenged constitutionally. The area searched must be an area in which the person challenging the search has a reasonable expectation of privacy, see Commonwealth v. Hawkins, 718 A.2d 265, 267 (Pa. 1998), and the search must be performed by a state actor. Commonwealth v. Price, 672 A.2d 280, 283 (Pa. 1996). The former element concerns whether the challenger has a privacy right in the area that was searched. The latter addresses the issue of who conducts the search. [J-107-2018] [MO: Baer, J.] - 7 These two elements entail different substantive analyses and examinations, both as to law and as to fact. The factual record created to establish one element cannot automatically be substituted as a sufficient factual record for the other. We cannot graft an evidentiary record focused entirely upon Shaffer’s expectation of privacy onto the Commonwealth’s new invocation of the private search doctrine. These are apples and oranges. To find a sufficient record basis for application of the private search doctrine, the Majority highlights a brief exchange between the Commonwealth’s attorney and Officer Maloney, as well as two limited interactions between Shaffer’s counsel and Officer Maloney.8 These excerpts cannot suffice as an evidentiary record that would enable a proper analysis of the private search doctrine under the facts and circumstances of this case. The Commonwealth was not attempting to establish that Officer Maloney’s examination of the computer did not exceed Eidenmiller’s initial actions. More importantly, a brief two question/and two answer exchange between Shaffer’s counsel and Officer Maloney that touched inadvertently upon matters that sometime later might be deemed pertinent to the private search doctrine is a far cry from the examination that would be necessary to build a record adequate to evaluate the private actor versus state actor dilemma. A review of one aspect of those exchanges will illustrate my point. When Officer Maloney was on the stand, Shaffer’s counsel asked him whether Eidenmiller, at the officer’s request, opened the file containing the pornographic images. Officer Maloney responded, “Yes, sir, he showed me the exact route taken to find the images.”9 The Majority construes this statement as conclusive evidence that Eidenmiller did, in fact, take 8 See Maj. Op. at 24-25. 9 N.T., 7/7/2016, at 30. [J-107-2018] [MO: Baer, J.] - 8 the same exact path in front of Officer Maloney, and, therefore, that Officer Maloney did not (and could not) exceed the scope of the private search. The problem is that Shaffer’s counsel did not test that statement through cross-examination. He simply let it go. The reason for the free pass is not difficult to discern. Shaffer’s counsel had no reason to know that the parallelism between the two searches would be an issue in the case, or that years later that one answer would form the factual basis to deny his client relief on a newly asserted, and entirely different, legal basis. Instead, counsel let Officer Maloney testify effectively to a legal conclusion without exploring the factual basis for that conclusion, through no fault of his own. No one would anticipate that a case would take on such a different character at the last stage of state appellate proceedings. That counsel, by happenstance or coincidence, stumbled upon one or two questions relevant to the new issue upon which this Court now chooses to focus does not mean that the record suffices for purposes of our discretionary application of the right-for-any-reason doctrine. Moreover, the problem is not only that the issue is not “of record.” The problem also is that it is inequitable to employ our discretionary authority to apply the right-for-anyreason doctrine here, inasmuch as the issue was thrust upon Shaffer only at this very late stage in the proceedings. When the Commonwealth raised the private search doctrine for the first time as its third argument in its brief to this Court, Shaffer was forced to respond to a new legal theory for the first time in his reply brief to this Court. Reply briefs, by rule, must be limited to 7000 words, and may not exceed fifteen pages.10 But the page limit is not the greatest obstacle that Shaffer must overcome. It is not what puts him at a significant disadvantage, not what hinders his ability to defend against the Commonwealth’s newly asserted theory. It is the state of the record in this case that 10 See Pa.R.A.P. 2135(a)(1). [J-107-2018] [MO: Baer, J.] - 9 precludes Shaffer effectively from defending against the new claim. The record before this Court is one tailored (“teed up,” as we say) specifically to the question of whether Shaffer retained an expectation of privacy in his laptop computer when he turned it over for repairs. It is not a record containing any meaningful evidentiary development of the facts necessary for evaluation of the private search doctrine in the context of this case. Shaffer is forced—in a reply brief—to try to make the record that we have suffice for the record that we need. He is forced to cram the proverbial square peg into a round hole. The right-for-any-reason doctrine is premised primarily upon the desirability of conserving judicial and prosecutorial resources. Laudable as that goal may be, we still must be judicious in our exercise of discretion, and we should not wield that tool when it would impose upon one litigant an inequitable handicap. We should apply the doctrine only when the newly invoked basis for relief truly is of record, and where the applicability of that new basis is sufficiently clear, such that further proceedings on remand would be a waste of time and resources. That is not the case here. There is another reason that I would not apply the right-for-any-reason doctrine in this case. As I discuss in greater detail in Part III below, Shaffer’s judgment of sentence should be affirmed on the merits of the question upon which we actually granted allocatur. In other words, there is no reason to find an alternative basis to affirm when the case, as is, necessitates affirmance on the precise question presented. II. The Private Search Doctrine Before proceeding to the merits of the abandonment of privacy question presented by this case, I will assume for the moment that it would be an equitable exercise of our discretion to apply the right-for-any-reason doctrine; I do so in order to note my disagreement with the Majority’s application of the private search doctrine. [J-107-2018] [MO: Baer, J.] - 10 The seminal case regarding the private search doctrine is the Supreme Court of the United States’ decision in Jacobsen. In that case, a supervisor at an airport location of Federal Express noticed that a forklift had damaged a package. Jacobsen, 466 U.S. at 111. Together with the office manager, the supervisor opened the damaged package in order to inventory its contents pursuant to a written insurance protocol. Inside the package was a tube assembled from duct tape. The Federal Express employees cut open the tube and found baggies containing what they believed to be cocaine. Immediately, they called the DEA and returned the baggies to the tube. A DEA agent arrived, removed the baggies from the tube, and examined the substance, which tested positive for cocaine. Id. at 111-12. Other DEA agents arrived on the scene and, ultimately, obtained a search warrant based in large part upon the search performed by the first agent. Id. at 112. As the Majority recounts, the Supreme Court considered the DEA agent’s initial search as a private search because “the federal agents did not infringe any constitutionally protected privacy interest that had not already been frustrated as the result of private conduct.” Id. at 126. Because the initial invasion of privacy occurred at the hands of a private individual, and was not performed by a government agent, the subsequent search by the DEA agent was not unreasonable. This doctrine poses readily identifiable risks to an individual’s right of privacy, and entails a considerable potential for abuse. The private search doctrine essentially places the state actor behind private eyes, allowing a law enforcement officer to go wherever a private person before him has gone. To cabin the potential hazard to privacy rights, the Supreme Court limited the subsequent governmental action to the bounds of the actions of the private individual. Any additional actions “must be tested by the degree to which [J-107-2018] [MO: Baer, J.] - 11 they exceeded the scope of the private search.” Id. at 115 (citing Walter v. United States, 447 U.S. 649 (1980)). More significant to the case sub judice, and as another limitation on the private search doctrine, the Supreme Court explained that the DEA’s subsequent opening of the package did not exceed the parameters of the initial, private search because “there was a virtual certainty that nothing else of significance was in the package and that a manual inspection of the tube and its contents would not tell [the DEA agent] anything more than he already had been told.” Id. at 119. It is this statement that distinguishes the circumstances in Jacobsen from Officer Maloney’s actions in this case. In Jacobsen, the DEA agent opened a package that contained a tube. In the tube were plastic bags containing cocaine. There was nothing else to find or discover. The DEA’s re-examination of the package posed no additional threat to Jacobsen’s privacy. It was “a virtual certainty” that the second search would reveal nothing but what the Federal Express employees had found and reported. The same cannot be said for a personal computer. Regardless of the path taken by CompuGig’s Eidenmiller to locate the suspicious files as directed by Officer Maloney, there existed a very real potential for exposure of information not yet discovered by the private search. In 2019, one’s personal computer contains a wealth of information, both private and public. Even the screen saver, wallpaper, and names of files on the home screen of a computer can expose private information about the individual who owns the computer. Unlike a duct tape tube that has only one area where items can be stored, a personal computer offers virtually limitless areas for exploration. An inadvertent click on a file or tab could uncover to a state actor private information that was not part of the information collected initially by the private actor. Eidenmiller’s navigation of a personal computer at the direction of a police officer does not entail the same “virtual certainty,” or [J-107-2018] [MO: Baer, J.] - 12 near guarantee, that no other private information could fall into the hands of the law enforcement agent in the same way that the tube in Jacobsen did. The tube in Jacobsen was a limited vessel, eliminating the possibility that the DEA agent would be able to exceed the bounds of the private search. Indeed, if the tube could be said to have an opposite, that opposite would be a personal computer. Because nothing in the record as established in this case convincingly demonstrates a “virtual certainty” that Officer Maloney’s second, warrantless search would not exceed the scope of the initial private search and would not reveal information other than what Eidenmiller already had discovered, I would find the private search doctrine to be inapplicable in this case in the event that the doctrine was properly before us. That does not mean that I would reverse the lower courts. For the reasons that follow, I would hold that Shaffer ultimately, though not initially, abandoned his expectation of privacy in the computer. III. Shaffer’s Expectation of Privacy in the Personal Computer We granted allocatur in this case to consider whether the owner of a personal computer abandons his or her expectation of privacy in closed files on that computer the moment he or she drops it off with a computer repair service. This question necessarily implicates the third-party doctrine. When we accepted this appeal, we provided ourselves with an opportunity to reconsider that doctrine in the context of our modern high-tech world, a world in which the interaction between technology and one’s personal information has changed significantly from the past. In Katz v. United States, 389 U.S. 347 (1967), the United States Supreme Court stated for the first time that the Fourth Amendment to the United States Constitution “protects people, not places.” Id. at 351. Katz expanded the protections of the Fourth [J-107-2018] [MO: Baer, J.] - 13 Amendment to include those places where one enjoys a reasonable expectation of privacy. This landmark decision marked the beginning of our current understanding that a person, place, area, or thing is protected by the Fourth Amendment if the person asserting the protection seeks to preserve the area or place infringed upon as private, and if the expectation of privacy is one that society would deem reasonable. See Commonwealth v. Shabezz, 166 A.3d 278, 288 (Pa. 2017). The third-party doctrine addresses the question of whether a person’s expectation of privacy applies when the object as to which the expectation is asserted is placed in the hands of a third person. Had this case been brought even a decade ago, its resolution as a matter of federal constitutional law would have been relatively straightforward. In United States v. Miller, 425 U.S. 435 (1976), and Smith v. Maryland, 442 U.S. 735 (1979), the Supreme Court of the United States firmly established the third-party doctrine, effectively holding that a person retained no expectation of privacy in materials given over to the possession of a third party. In Miller, the Court held that Miller’s bank records actually were business records of the bank in which Miller could “assert neither ownership nor possession.” Miller, 425 U.S. at 440. Further, the records, in possession of a third party, could not be deemed exclusively private to Miller as they were “exposed to [bank] employees in the ordinary course of business.” Id. at 442. Miller had “take[n] the risk, in revealing his affairs to another, that the information [would] be conveyed by that person to the [g]overnment.” Id. at 443. In Smith, the Supreme Court addressed Smith’s claim that he held a reasonable expectation of privacy in a pen register that recorded the outgoing numbers dialed from his landline telephone. The Court rejected Smith’s claim, opining that it “doubt[ed] that people in general entertain any actual expectation of privacy in the numbers they dial.” Smith, 442 U.S. at 742. The Court noted that, at the time, telephone companies used [J-107-2018] [MO: Baer, J.] - 14 dialed numbers for a variety of legitimate business purposes. When a person makes a call, the Smith Court reasoned, he or she voluntarily conveyed the dialed number to the phone company, which received the information in the regular course of business. Thus, as in Miller, Smith had assumed the risk that, by dialing a number, he subjected himself to the possibility that the telephone company would turn his dialing information over to the government. The Court explained that “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” Id. at 743-44. Under a reading of only Miller and Smith, it would appear that Shaffer could claim no legitimate expectation of privacy in his computer once he turned it over to CompuGig. By doing so, he would be deemed by those precedents voluntarily to have exposed the computer’s contents to CompuGig’s employees, who received the information in the regular course of their business. The argument would follow that Shaffer assumed the risk that a person working at CompuGig could turn any information found on the computer over to the police. However, the jurisprudential landscape has evolved since the 1970’s. A fair review of the United States Supreme Court’s recent cases, beginning with United States v. Jones, 565 U.S. 400 (2012), reveals that the Miller/Smith view of the third-party doctrine now is somewhat antiquated, inasmuch as modern technology has caused the High Court to think differently about third-party interactions. In 2012, the Court in Jones confronted the question of whether affixing a GPS device to a person’s vehicle and tracking his or her movements—without a search warrant—constitutes a search or seizure under the Fourth Amendment. Id. at 402. In deciding that doing so was indeed a search, the Court (in an opinion authored by Justice Scalia) emphasized the intrusiveness that the government’s actions entailed: “The Government physically occupied private property for the purpose of obtaining information.” Id. at 404. The Court had “no doubt” that this was [J-107-2018] [MO: Baer, J.] - 15 a search for purposes of the Fourth Amendment. Id. The installation of the GPS device effectively was a trespass that, for twenty-eight days, permitted the government to know and evaluate all of Jones’ vehicular movements. Justice Scalia’s majority opinion drew two concurrences relevant here. First, Justice Alito, joined by Justices Ginsburg, Breyer, and Kagan, rejected Justice Scalia’s trespass-oriented approach to the case. These four Justices would have simply concluded that attachment of the GPS device to Jones’ car was a search because it violated Jones’ reasonable expectation of privacy through “the long-term monitoring of the movements of the vehicle he drove.” Id. at 419. Justice Alito opined that “the use of longer term GPS monitoring in investigations of most offenses impinges on expectations of privacy. For such offenses, society's expectation has been that law enforcement agents and others would not—and indeed, in the main, simply could not—secretly monitor and catalogue every single movement of an individual's car for a very long period.” Id. at 430. Justice Sotomayor authored a concurring opinion in which she questioned whether the “Executive, in the absence of any oversight from a coordinate branch, [should have] a tool so amenable to misuse, especially in light of the Fourth Amendment’s goal to curb arbitrary exercises of police power . . . .” Id. at 416. More importantly for present purposes, Justice Sotomayor opined that “it may be necessary to reconsider the premise that an individual has no reasonable expectation of privacy in information voluntarily disclosed to third parties.” Id. at 417. Specifically with regard to the “digital age,” Justice Sotomayor found the third-party doctrine to be “ill suited” because people now “reveal a great deal about themselves to third parties in the course of carrying out mundane tasks.” Id. “People disclose the phone numbers that they dial or text to their cellular providers; the URLs that they visit and the e-mail addresses with which they correspond to their [J-107-2018] [MO: Baer, J.] - 16 Internet service providers; and the books, groceries, and medications they purchase to online retailers.” Id. In Justice Sotomayor’s view, a strict application of the third-party doctrine no longer is feasible. This is an idea that would pick up steam a few years later in Carpenter v. United States, 138 S. Ct. 2206 (2018). In Carpenter, the Supreme Court granted certiorari to determine “how to apply the Fourth Amendment to a new phenomenon: the ability to chronicle a person’s past movements through the record of his cell phone signals.” Id. at 2216. At issue were records obtained from communications between a person’s cellular telephone and a cellular tower. Through these records, police could track a person’s movement or determine whether that person had been in a particular area during a certain time period. In a majority opinion authored by Chief Justice Roberts, the Court declined to extend Miller’s and Smith’s strict third-party doctrine to preclude an expectation of privacy in the cellular tower records. The Court held first that, although Miller and Smith apply to phone numbers and bank records, the doctrine cannot apply automatically to the cellular tower records at issue. The core inquiry still must be whether society would deem reasonable an expectation of privacy in the area or items that were searched or seized. At the time that Miller and Smith were decided, few would have imagined a society so technologically advanced, or one in which citizens were so attached to electronic devices. Quoting Riley v. California, 573 U.S. 373 (2014) (holding that police must get a warrant before searching a cellular telephone seized incident to an arrest), the Court repeated its view that cell phones have become a “feature of human anatomy,” which “tracks nearly exactly the movements of its owner.” Carpenter, 138 S.Ct. at 2218. Modern people “compulsively carry cell phones with them all the time. A cell phone faithfully follows its owner beyond public thoroughfares and into private residences, doctor’s offices, political headquarters, and other potentially revealing locales.” Id. [J-107-2018] [MO: Baer, J.] - 17 The Court also found it important that cellular towers do not merely log phone numbers. The towers in actuality compile a comprehensive and detailed record of a person’s movements. These towers had generated “seismic shifts in digital technology that made possible the tracking of not only Carpenter’s location but also everyone else’s, not for a short period but for years and years.” Id. at 2219. The unique nature of the compilation of data by these towers necessarily overcomes the strict parameters of the third-party doctrine. “[A]n individual maintains a legitimate expectation of privacy in the record of his physical movements as captured through [cellular tower records.]” Id. at 2217. Thus, the reach of the earlier third-party doctrine cases has been substantially limited in this context. That the records technically are compiled for commercial purposes cannot negate a person’s expectation of privacy. In Carpenter, the government seized records encompassing one hundred and twenty-seven days of activity, “an all-encompassing record of the holder’s whereabouts.” Id. As was the case with the GPS tracker in Jones, the “time stamped data provides an intimate window into a person’s life, revealing not only his particular movements, but through them his ‘familial, political, professional, religious, and sexual associations.’” Id. (quoting Jones, 565 U.S. at 415 (Sotomayor, J., concurring)). Like the cell phones themselves, the records “hold for many Americans the privacies of life.” Id. (citation and quotation marks omitted). Rejecting a rote application of the third-party doctrine, as advocated by the Government and the dissenting Justices, the Carpenter Court explained that the doctrine is rooted in a “reduced” expectation of privacy; it does not mean that a person has no expectation of privacy at all. “[T]he fact of ‘diminished privacy interests does not mean that the Fourth Amendment falls out of the picture entirely.’” Id. at 2219 (quoting Riley, 573 U.S. at 392). Neither Miller nor Smith relied solely upon the fact that the relevant [J-107-2018] [MO: Baer, J.] - 18 materials were in the hands of another. Instead, the Court considered “the nature of the particular documents sought” to determine whether there was “a legitimate expectation of privacy concerning their contents.” Id. at 2219 (citation and quotation marks omitted). In dissent, Justice Thomas expressed reservations as to the continued viability of the third-party doctrine, as Justice Sotomayor had done in her concurring opinion in Jones. In Justice Thomas’ view, the Court approached the case incorrectly, inasmuch as the Court should not have contemplated at all whether a search occurred, but instead should have considered whose property was searched. Justice Thomas noted that the Fourth Amendment protects people from unreasonable searches of “their” places, property, and effects. Id. at 2235 (Thomas, J., dissenting). Thus, “each person has the right to be secure against unreasonable searches . . . in his own person, house, papers, and effects.” Id. (quoting Minnesota v. Carter, 525 U.S. 83, 92 (1998) (Scalia, J., concurring) (emphasis in original)). In Carpenter, the cellular tower records did not belong to Carpenter. Thus, according to Justice Thomas, he had no viable Fourth Amendment claim. Notably, this approach would eliminate the third-party doctrine altogether. As long as a person owned the property, he or she could claim a Fourth Amendment violation regardless of who was in possession at the time that the search occurred. It is noteworthy that both Justices Thomas and Sotomayor have opined that the long standing third-party doctrine is no longer sustainable, albeit for different reasons. Nonetheless, what is important presently is that Carpenter itself provides the roadmap to resolving the expectation of privacy issue before us today. Foremost, Carpenter expressly rejected the notion that a person loses all expectation of privacy in an object immediately upon it landing in the hands of a third party. The Court emphasized that, while one may have a diminished expectation of privacy in that object, he or she does not invariably forfeit his or her expectation of privacy entirely. Examining Miller and Smith, [J-107-2018] [MO: Baer, J.] - 19 the Court noted that what matters most was not that the materials at issue were in the hands of another, but rather “the nature of the particular documents sought” in ascertaining whether there existed a reasonable expectation of privacy in the contents searched or seized. Carpenter, 138 S. Ct. at 2219. In the modern digital age, personal computers and similar devices are quite like the cellular telephones at issue in Riley and the tracking of movements in Jones and Carpenter. Americans use these computing devices to aid in almost every aspect of their daily lives. We use them to get an education, to discuss politics and current events, to find a romantic partner, and to pay our bills. We store personal digital photographs on them, and engage in personal correspondence. We use computers for work, entertainment, and religion. We chronicle our lives with them. We shop with them. We pay our taxes with them. The personal computer, although not always carried everywhere we go like cell phones, has become equally important to the functioning of our daily lives. A search of a computer can provide the government with a complete snap-shot of a person’s private life, revealing information related to every aspect of our lives, including those things we seek to keep most private. “An Internet search and browsing history, for example, can be found on an Internet-enabled [personal computer] and could reveal an individual's private interests or concerns—perhaps a search for certain symptoms of disease, coupled with frequent visits to WebMD.” Riley, 573 U.S. at 395-96. Personal computers, like modern cellular telephones, “are not just another technological convenience. With all they contain and all they may reveal, they hold for many Americans the privacies of life.” Id. at 403 (citation and quotation marks omitted). For these reasons, personal computers align with cellular phones, GPS devices, and long-term records of a person’s movements, such that the third-party doctrine does not automatically extinguish any and all expectation of privacy that a person has in his or her [J-107-2018] [MO: Baer, J.] - 20 computer when it is in the hands of another.11 The protection of the Fourth Amendment simply “does not fall out of the picture entirely.” See Carpenter, supra.12 Nonetheless, that Shaffer maintained some expectation of privacy even though he submitted the computer to CompuGig does not mean that Shaffer retained that expectation forever. It is axiomatic that a person who has an expectation of privacy also can abandon that expectation. Commonwealth v. Dowds, 761 A.2d 1125, 1131 (Pa. 2000). Abandonment is a question of intent, and “may be inferred from words spoken, acts done, and other objective facts.” Id. (citing Commonwealth v. Shoatz, 366 A.2d 1216, 1220 (Pa. 1976)). Presently, Shaffer’s words and actions demonstrate clearly that he abandoned his expectation of privacy in the computer.13 In November 2015, Shaffer’s laptop stopped 11 The Majority chooses to resolve this case on the basis of the private search doctrine, concluding that “an individual’s expectation of privacy at the moment he relinquishes his computer to a commercial establishment for repair is irrelevant to our constitutional analysis because the computer technicians examining the contents of the computer are private actors, not subject to the restrictions of the Fourth Amendment.” Maj. Op. at 32. I disagree. If the expectation of privacy was irrelevant, then the Supreme Court of the United States’ analyses in Smith (bank records) and Miller (pen register) would be irrelevant. In those cases, the Supreme Court held that the defendants could not challenge a subsequent search or seizure of the relevant materials because, once those materials were exposed to a third party, the defendants no longer retained an expectation of privacy in them. The Court did not predicate its holding that the seizures were constitutional on the rationale that the subsequent search did not exceed what was exposed to the third-parties. Moreover, if a person does not hold an expectation of privacy in an item being searched, then it does not matter whether the person performing the search is a private or state actor. My perspective also is congruent with Pennsylvania’s Article I, Section 8 third-party doctrine. See Commonwealth v. DeJohn, 403 A.2d 1283 (Pa. 1979) (holding that, contrary to Miller and Smith, under the Pennsylvania Constitution, a person retains a reasonable expectation of privacy in bank records even though a bank employee would have free access to view the contents contained therein). 12 13 The Majority characterizes the application of an abandonment theory to the facts of this case as “profound,” and observes that such a theory is less protective (in some instances) of privacy rights than is the private search doctrine. Maj. Op. at 32. To be sure, [J-107-2018] [MO: Baer, J.] - 21 operating correctly. He believed that his son had downloaded some files on the computer that had affected its functionality. On November 25, 2015, Shaffer took the laptop to CompuGig for service. On the intake form, Shaffer indicated that the computer had been affected by “Spyware/virus” and that it could not “get the Internet.” He also indicated that, after his son had downloaded something, the laptop’s performance was riddled by “pop ups.” Shaffer provided CompuGig with his password, to allow CompuGig access to the computer, and he requested restorative services. Eidenmiller performed a basic diagnostic test, which revealed that the hard drive was failing. An administrator from CompuGig called Shaffer and told him of the results of this initial test. The administrator also informed Shaffer that the repairs would cost more than the initial estimate of $160. Shaffer told the administrator that, based upon the diagnostics, he wanted to replace the failing hard drive despite the increased cost. Shaffer then authorized further repairs. Shaffer made no efforts to limit CompuGig’s access to any file or folder on the laptop. any time that the state obtains and exercises carte blanche authority to invade a person’s effects, a profound act occurs, regardless of whether that search occurs because the person has given up any right to challenge the search or because the state actor is merely following the actions of a private citizen. It is true as well that the private search doctrine affords an extra layer of constitutional protection beyond that allowed by the traditional third-party doctrine, inasmuch as the latter necessarily entails an absolute abandonment of any and all privacy interests in the property or item provided to the third party, i.e., the person “checks his privacy interest at the door.” Id. at 32. I depart from the Majority because, as explained hereinabove, I would not apply the traditional third-party doctrine. The Supreme Court of the United States’ case law has evolved to the degree that a person no longer categorically checks his privacy interest at the door, at least when the item now in the hands of a third party is a personal computer. Having retained some privacy in that personal computer, the owner may, by limiting access to certain areas of the device, retain some of his or her privacy interest in it. Put differently, with regard to her personal computer and similar devices, a person does not automatically grant access to all of the files stored anywhere on the computer simply by turning it over for service. Of course, as with Shaffer here, the facts of the case may demonstrate that the person intended to grant unfettered access to the entire computer. [J-107-2018] [MO: Baer, J.] - 22 Eidenmiller was not a party to that call, but he continued to work on the laptop. Acting on what he believed was Shaffer’s request, Eidenmiller attempted to take an image of the hard drive and to place that image into a new hard drive. Although he successfully imaged the old hard drive, he was unable to insert that image onto a new hard drive. A CompuGig employee once more contacted Shaffer and told him of the failed attempt. Eidenmiller then determined that the only other way to save the files on the defective hard drive was to manually copy the files and transfer them to the new hard drive one-by-one. CompuGig again contacted Shaffer and informed him that this was the last viable option to save the files. Shaffer consented to the work. On these facts, Shaffer undeniably abandoned whatever expectation of privacy that he retained in the computer. Thus, by the time that Officer Maloney observed the pornographic photographs, Shaffer was unable to claim an expectation of privacy in the electronic folders in which they were stored. Having no such expectation, Shaffer is not entitled to suppression of those images. * * * Determination of whether a person has an expectation of privacy in an area searched is no easy task. It requires consideration of a number of factors, some of which are not always readily apparent. Police officers in the field make these decisions every day across Pennsylvania. Occasionally, and no doubt frustratingly, an appellate court will hold that an officer’s estimation of a person’s expectation of privacy was erroneous, leading to the suppression of evidence and, possibly, the dismissal of charges. The risk of such an outcome often can be ameliorated by following the letter of our Constitutions and obtaining a search warrant when probable cause exists. It is true that an officer is not required to get a warrant to search an area in which the suspect has no expectation of privacy. However, simply because an officer is not required to get a [J-107-2018] [MO: Baer, J.] - 23 warrant does not mean that he or she cannot (or should not) do so. To obtain a warrant is to provide the subsequent search with an added layer of protection from challenge, inasmuch as the search was authorized by a neutral and detached magistrate. Preapproval of the search by a judicial officer eliminates the officer’s need to make the much riskier decision of determining on the spot whether the subject has an expectation of privacy. In some instances, it will be patent and obvious that the suspect has no expectation of privacy in the area that the officer seeks to search. However, this is not that case. CompuGig had sole possession of Shaffer’s computer. An identified witness informed the police that he observed what he believed to be child pornography on the computer. Clearly, probable cause existed to obtain a warrant to search the computer. Instead of searching the computer immediately, the better (and more constitutionally adherent) practice is to secure the computer and proceed to get a warrant, thereby avoiding the risk of erroneously calculating whether Shaffer had an expectation of privacy. * * * For the reasons discussed, I concur in the result reached by the Majority. I dissent as to the Majority’s legal analysis. [J-107-2018] [MO: Baer, J.] - 24

Some case metadata and case summaries were written with the help of AI, which can produce inaccuracies. You should read the full case before relying on it for legal research purposes.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.